Anonymous ID: 68d912 Aug. 31, 2021, 6:31 a.m. No.14496893   🗄️.is 🔗kun   >>6895

>>14496637

>>14496718

>>14496831

298GB

>README.TXT

On August 10 2021, Mike Lindell invited "cyber-experts" to a symposium where he promised to

give them "packet-captures" proving votes were flipped in the 2020 election. He did not

provide the promised data. But he did provide other data, this archive. This document describes

what was provided.

 

This archive is divided into two parts. The "Pod_Dist" directory contains old data, the tables

Lindell has been showing in his videos. The "newdata" is post-election data collected from

county election offices by so-called "whistleblowers".

 

Some things that were originally sub-directories have been ZIPped up into files instead. In

particular, the 'frames' directory had 70,000 files - managing them as 'frames.zip' instead is

much easier. This reduces the torrent to only around 70 files.

 

Lindell claims he gave the cyber-experts raw 2020 election data. Thus, he'll have to claim the

data is here, or that this archive is incomplete. Either way, simply showing the data in question

will substantiate his claims, and not showing the data leaves his claims unsubstantiated.

 

Nowhere in this data is there any "proof" of votes being flipped. The "Final.csv" contains a table

of claimed flips, but that's just what Lindell claims, it could be completely made up.

 

Pod_Dist

 

The cyber-experts were not given data directly, such as on a flash-drives. Instead, they were

given the WiFi password and a guest login for a server. We were told to copy the information

from the server (\usaserver01\cyber\Pod_Dist). Files were added to that directory during the

first two days.

 

The big files rnx*.bin are in Dennis Montgomery's private "BLX" format. This is a bizarre

format that somewhat encrypts and somewhat rearranges data in order to avoid the law. We

weren't given the encryption key or algorithm to access those files except for the ability to

extract some CSV files.

 

The tool CExtract is able to extract CSV files from the BLX format. However, this accounts for

only around 1% of the data in those BLX files, so we don't know the rest of the content.

 

The CExtract tool cannot be run as-is, as it checks Montgomery's website for a license.

However, the source is provided which can be compiled with VisualStudio 2022. A programmer

can easily remove those web checks. The source project is in "CExtract.zip". The code is

Microsoft's C++/.NET hybrid.

 

The CSVs extracted from the BLX files are roughly the same as found in the CSV files, namely

"Final.csv". This file is close (though not exactly) the data seen in Lindell's videos.

 

Each row shows an attacker and victim IP addresses, GPS location, and a number of votes

claimed that the attacker flipped from Biden to trump. It's from this that Lindell gets votes

flipped per state.

 

This CSV file is also the source of that "pew-pew" graph in Lindell's video. The file "google.zip"

contains an active webpage ("map.html") that can ingest this file to produce a pew-pew graph.

This appears to have been created by Dennis Montgomery (as his name is in the web page). The

directory "frames" (actually, ZIP) contains 70k JPG files that can be combined into a video of

this pew-pew graph.

Anonymous ID: 68d912 Aug. 31, 2021, 6:32 a.m. No.14496895   🗄️.is 🔗kun   >>6917 >>6937

>>14496893

>CONT.

This CSV file is also the source of the "scrolling hex". The program UltraEdit was used to display

this CSV file as hex. In his videos and symposium talks, Lindell repeatedly points to this scrolling

data as packet-captures that cyber-experts can read. It's not packet-captures, and experts don't

like to read CSV files in hex. Showing hex is pointless obfuscation.

 

There is a weird fetish with hexdumps. The files ending in "HEX.txt" are originally RTF files that

have been printed to hex. Use xxd -r -p to convert them back to RTF. Nobody has been able to

figure out what these RTF documents mean.

 

Newdata

 

This directory contains new things that came after the 2020 election. These were originally

provided in the Pod_Dist directory, but moved here since there were a different class of things.

 

The new pcaps are from "Mesa Count, Colorado", "Lake County, Ohio", and "Clark County, Unnown".

The file "streams3.csv" appears to be a printout of one of the Mesa County captures.

The other two "streams.csv" files appear to be loopback captures of things happening within a

computer rather than a network packet-capture.

 

The torrents point to downloads for system images released during the conference. They seem

to be incomplete Encase files when downloaded.

 

It's been claimed that Conan Hayes was the source of the system images and packet-captures

from Mesa, County. This can be substantiated by checking whether the adapter name in the

pcapng files matches his laptop.

 

Conclusion

 

As you can see, there are no pcaps from the 2020 election, or any raw data, that substantiates

Lindell's claims that votes were switched.

 

What we do see here is bizarre data, from the strange BLX format to the obsession with CSV

files and hexdumps.