Premium Only Content
Mike Lindell: absolute proof !!
But what we are seeing here if we look at these charts is that there were cybersecurity experts who began collecting information on November 1st. They collected terabytes of information before, during, and after the election… which document the foreign intrusion and fraud that happened. This was documented from 2995 counties in the United States and was collected in realtime. In the first column it shows the time and IP address of the hacker. The second column is the owner or source of that IP address. It shows the ID of the computer that entered into our election. The next is the target IP address. The next is the target state and county. And then the ID address of another computer in the United States. The next column is the method. Ie: using credentials or broke through the firewall. The next column is whether it is successful. Sometimes it is not successful. In the final column is the votes changed. In Emmett country election they stole thousands of votes from Donald Trump and gave it to Joe Biden. We see multiple intrusions into our election. You’ll notice over 66% of these intrusions come from China. Why is this important. Somethings were set in place during the COVID 19 virus. So each one of these is proof of identification of what took place at which time.
This is forensic evidence showing the hacking attempts of our election showing exactly where they came from and what they did. They show which computer exactly in what state and what county. It also shows the votes they stole from Donald Trump.
Every one was Donald Trump down, down, down.
This is the biggest attack in history. There are thousands of pages of every single attack. We see this from multiple places across China, but also from Iran.. this is the threat to our election. And give us the exact totals that Trump actually got. Trump won 79 million votes and Biden got 68 million. And that is not counting all the other kind of fraud that happened during the election.
This is a graphical representation of the hacking of our election from before the election until after the election. They documented the footprints of the foreign intrusion. Foreign powers chose who would rule in our country.
The cybersecurity battlefield was planned beforehand. This was an act of war by our foreign adversaries. The video will show it. This is the surveillant system that was built by the cybersecurity teams. They built these tools to keep this country safe. Every line the IP dresses on the chart.
It is the documentation of the realtime theft of our elections.
This type of information was given to James COmey in 2015. They knew our election machines were open to hacking. It is important to understand is that there are algorithms which steal the votes at the transfer point. That is between the machines and the secretary of the state office.
-
5:27
Obscured Trends
10 months agoVivek schools 'journalists' again!
1.28K -
15:14
Joe Pags
3 years agoMike Lindell on his Video -- Absolute Proof
50.7K -
1:04:54
The Eric Metaxas Radio Show
3 years agoMike Lindell Previews His Documentary: Absolute Proof | michaeljlindell.com
68K215 -
6:34
William Hall
3 years agoMike Lindell V. Newsmax
5.92K44 -
7:43
One America News Network
3 years agoDan Ball W/ Mike Lindell
23.7K187 -
2:18:59
WeAreChange
5 hours agoCOUP ATTEMPT?! Dems Trying To Usurp Control Of Military In Move Against Trump
97.4K22 -
1:17:41
Josh Pate's College Football Show
3 hours ago $0.15 earnedCFP Rankings Reaction | Conference Championship Predictions | New JP Poll | Portal Chaos Ahead
23.5K -
59:27
The StoneZONE with Roger Stone
5 hours agoWill America’s Sheriffs Aid the Deportation of Violent Illegals? w/ Sheriff Richard Mack | StoneZONE
22.4K2 -
4:18:52
RamrodJenkins
5 hours agoI am loving Rumble! Come on by and hang out!
13.5K1 -
1:02:24
Patriots With Grit
5 hours agoHow To Influence Your State Leaders : The Will Of The People | Raj Doraisamy and Mason Weaver
11.5K