298GB
>README.TXT
On August 10 2021, Mike Lindell invited "cyber-experts" to a symposium where he promised to
give them "packet-captures" proving votes were flipped in the 2020 election. He did not
provide the promised data. But he did provide other data, this archive. This document describes
what was provided.
This archive is divided into two parts. The "Pod_Dist" directory contains old data, the tables
Lindell has been showing in his videos. The "newdata" is post-election data collected from
county election offices by so-called "whistleblowers".
Some things that were originally sub-directories have been ZIPped up into files instead. In
particular, the 'frames' directory had 70,000 files - managing them as 'frames.zip' instead is
much easier. This reduces the torrent to only around 70 files.
Lindell claims he gave the cyber-experts raw 2020 election data. Thus, he'll have to claim the
data is here, or that this archive is incomplete. Either way, simply showing the data in question
will substantiate his claims, and not showing the data leaves his claims unsubstantiated.
Nowhere in this data is there any "proof" of votes being flipped. The "Final.csv" contains a table
of claimed flips, but that's just what Lindell claims, it could be completely made up.
Pod_Dist
The cyber-experts were not given data directly, such as on a flash-drives. Instead, they were
given the WiFi password and a guest login for a server. We were told to copy the information
from the server (\usaserver01\cyber\Pod_Dist). Files were added to that directory during the
first two days.
The big files rnx*.bin
are in Dennis Montgomery's private "BLX" format. This is a bizarre
format that somewhat encrypts and somewhat rearranges data in order to avoid the law. We
weren't given the encryption key or algorithm to access those files except for the ability to
extract some CSV files.
The tool CExtract is able to extract CSV files from the BLX format. However, this accounts for
only around 1% of the data in those BLX files, so we don't know the rest of the content.
The CExtract tool cannot be run as-is, as it checks Montgomery's website for a license.
However, the source is provided which can be compiled with VisualStudio 2022. A programmer
can easily remove those web checks. The source project is in "CExtract.zip". The code is
Microsoft's C++/.NET hybrid.
The CSVs extracted from the BLX files are roughly the same as found in the CSV files, namely
"Final.csv". This file is close (though not exactly) the data seen in Lindell's videos.
Each row shows an attacker and victim IP addresses, GPS location, and a number of votes
claimed that the attacker flipped from Biden to trump. It's from this that Lindell gets votes
flipped per state.
This CSV file is also the source of that "pew-pew" graph in Lindell's video. The file "google.zip"
contains an active webpage ("map.html") that can ingest this file to produce a pew-pew graph.
This appears to have been created by Dennis Montgomery (as his name is in the web page). The
directory "frames" (actually, ZIP) contains 70k JPG files that can be combined into a video of
this pew-pew graph.