Anonymous ID: c64545 Dec. 6, 2020, 9:38 a.m. No.11925091   🗄️.is 🔗kun   >>5195

Jenna Ellis Confirms Judge Granted Trump Campaign Access to 22 Dominion Machines in Michigan

 

On November 5th, two days after the presidential election, an election clerk in Antrim County Michigan discovered that the total votes counted by election software DID NOT MATCH the printed tabulator tapes.

 

The Michigan software used to count votes put up incorrect totals and took nearly 3,000 votes from President Trump and handed them over to Joe Biden.

 

Wow!

 

Now a judge in Antrim county ordered a forensic audit of 22 Dominion Voting Systems machines in the state of Michigan

 

On Sunday morning Trump Attorney Jenna Ellis confirmed the Trump campaign has access to 22 Dominion voting machines in Wisconsion.

 

Jenna Ellis was on FOX and Friends Weekend this morning.

 

According to Jenna the Trump campaign will have access to the machines for 8 hours and will be able to report on their results in 48 hours.

 

https://www.thegatewaypundit.com/2020/12/jenna-ellis-confirms-judge-granted-trump-campaign-access-22-dominion-machines-michigan/

 

No FBI DOJ fucking joke

Anonymous ID: c64545 Dec. 6, 2020, 9:40 a.m. No.11925116   🗄️.is 🔗kun   >>5151 >>5195

For The First Time, A US State Will Require Disclosure Of PCR 'Cycle Threshold' Data In COVID Tests

 

We have detailed the controversy surrounding America's COVID "casedemic" and the misleading results of the PCR test and its amplification procedure in great detail over the past few months.

 

As a reminder, "cycle thresholds" (Ct) are the level at which widely used polymerase chain reaction (PCR) test can detect a sample of the COVID-19 virus. The higher the number of cycles, the lower the amount of viral load in the sample; the lower the cycles, the more prevalent the virus was in the original sample.

 

Numerous epidemiological experts have argued that cycle thresholds are an important metric by which patients, the public, and policymakers can make more informed decisions about how infectious and/or sick an individual with a positive COVID-19 test might be. However, as JustTheNews reports, health departments across the country are failing to collect that data.

 

Here are a few headlines from those experts and scientific studies:

 

1. Experts compiled three datasets with officials from the states of Massachusetts, New York and Nevada that conclude:“Up to 90% of the people who tested positive did not carry a virus."

 

2. The Wadworth Center, a New York State laboratory, analyzed the results of its July tests at the request of the NYT: 794 positive tests with a Ct of 40: “With a Ct threshold of 35, approximately half of these PCR tests would no longer be considered positive,” said the NYT. “And about 70% would no longer be considered positive with a Ct of 30! “

 

3. An appeals court in Portugal has ruled that the PCR process is not a reliable test for Sars-Cov-2, and therefore any enforced quarantine based on those test results is unlawful.

 

4. A new study from the Infectious Diseases Society of America, found that at 25 cycles of amplification, 70% of PCR test "positives" are not "cases" since the virus cannot be cultured, it's dead. And by 35: 97% of the positives are non-clinical.

 

5. PCR is not testing for disease, it's testing for a specific RNA pattern and this is the key pivot. When you crank it up to 25, 70% of the positive results are not really "positives" in any clinical sense, since it cannot make you or anyone else sick

 

https://www.zerohedge.com/medical/first-time-us-state-will-require-disclosure-pcr-test-cycle-data

Anonymous ID: c64545 Dec. 6, 2020, 9:41 a.m. No.11925132   🗄️.is 🔗kun   >>5195

Thousands of files STOLEN from NATO cybersecurity contractor, as arrests made in lengthy data theft scheme

 

Italian police have arrested two suspects on charges of stealing sensitive data from the computers of Italian defense group Leonardo. The company provides cybersecurity services to NATO.

 

Based in Rome, Leonardo specializes in aerospace and security. It's one of the world's largest contractors and boasts NATO among its customers when it comes to cybersecurity. Yet, its image suffered a heavy blow when it turned out that a former employee and a contractor managed to bypass the company’s cybersecurity defenses and steal sensitive data from right under its nose.

 

In a lengthy investigation, prosecutors from the Italian city of Naples found out that two hackers managed to get away with stealing the company’s secrets between 2015 and 2017. Both men were detained on Saturday.

 

One of the suspects allegedly infected the company’s computers with a specially engineered Trojan virus through a USB device. The virus then spread to 94 machines belonging to IT departments of the company’s Aerostructures and Aircraft Divisions, including 33 located at a factory in the town of Pomigliano d'Arco, near Naples.

 

Over two years, the hackers managed to steal some 10 gigabytes of data equaling some 100,000 files, including management and human resources records, information on procurement and distribution of capital goods as well as documents related to the design of civil and military aircraft. The virus also infected over 50 computers belonging to other companies and individuals that were active in the aerospace industry.

 

https://www.rt.com/news/508807-italy-nato-contractor-data-theft/