Hat tip Mark L
A theory of how Trump caught them all
Considering the recent filing by John Durham there is quite a bit of really good information circling around in our little corner of the internet. Most of this information has already been covered by the likes of Brian Cates and Just Human on their substacks and Telegram channels. It is not my intention to challenge any of that. What I do want to do is submit my thoughts around what is currently happening from the vantage point of someone who has worked with Packet Captures and DNS (and a bunch of other nerdy stuff) for the last 15 years…me
For those of you that do not know, Special Council John Durham submitted a filing that is referenced below in Techno Fog’s Twitter:
While others will highlight other subjects in this filing, it is the DNS (Domain Name Service) references that catch my attention. I have been working in Information Technology (IT) and Telecommunications for almost 25 years and never did I think any of the technologies/protocols that I work with every day would be talked about so extensively in the news. Yet here we are.
It would appear that DNS and specifically DNS traffic is going to be central to much of the evidence that Trump and his team will use, not only in the case of Spygate, but also when the case is actually made for the “Crime of the Century”(election fraud). This can be witnessed in Trumps’s latest statement:
This proves to be where the sleuths in my orbit of Free Atlantis, Substack, and Telegram really proved their worth. Almost before I could even catch up to the news on Saturday, these digital soldiers were all over the “Robert Durham” mentioned in in the above statement. That is NOT a mistake! Trump did not mean John Durham. LilMoWethePeeps (mastodon instance Free Atlantis) gets credit for finding that there is a Robert Durham who holds a couple of very interesting patents. You can find them here: https://patents.justia.com/inventor/robert-durham
One patent in particular I want to show you:
Publication number: 20040098485
Abstract: A secure domain name service for a computer network is disclosed that includes a portal connected to a computer network, such as the Internet, and a domain name database connected to the computer network through the portal. The portal authenticates a query for a secure computer network address, and the domain name database stores secure computer network addresses for the computer network. Each secure computer network address is based on a non-standard top-level domain name, such as .scom, .sorg, .snet, .snet, .sedu, .smil and .sint.
Filed: November 18, 2003
Publication date: May 20, 2004
Applicant: Science Applications International Corporation
Inventors: Victor Larson, Robert Durham Short, Edmund Colby Munger, Michael Williamson
Is it any coincidence that the statement by Donald Trump includes the subject of DNS traffic and also include a “mistake” referencing an inventor of secure Domain Name Services? I don’t think so. It is my belief that Trump purposely communicated this. I take this as a message that not only does Trump have the Packet Captures (PCAPs), but he has the right people involved to truly capture it ALL.
I have one other piece of information to reference before I get into the meat of what I am theorizing. The following is great article about the recent developments that I encourage everyone to read.
Durham also writes that during Sussman’s trial, the government will establish that among the Internet data Tech Executive-1 and his associates exploited was domain name system (DNS) internet traffic pertaining to “(i) a particular healthcare provider, (ii) Trump Tower, (iii) Donald Trump’s Central Park West apartment building, and (iv) the Executive Office of the President of the United States (EOP).”
Durham states that the internet company that Tech Executive-1 worked for “had come to access and maintain dedicated servers” for the Executive Office of the President as “part of a sensitive arrangement whereby it provided DNS resolution services to the EOP.”
“Tech Executive-1 and his associates exploited this arrangement by mining the EOP’s DNS traffic and other data for the purpose of gathering derogatory information about Donald Trump,” Durham states.
The filing also reveals that Sussman provided “an updated set of allegations” including the Russian bank data, and additional allegations relating to Trump “to a second agency of the U.S. government” in 2017.
Durham says the allegations “relied, in part, on the purported DNS traffic” that Tech Executive-1 and others “had assembled pertaining to Trump Tower, Donald Trump’s New York City apartment building, the EOP, and the aforementioned healthcare provider.”
In Sussman’s meeting with the second U.S. government agency, Durham says he “provided data which he claimed reflected purportedly suspicious DNS lookups by these entities of internet protocol (IP) addresses affiliated with a Russian mobile phone provider,” and claimed that the lookups “demonstrated Trump and/or his associates were using supposedly rare, Russian-made wireless phones in the vicinity of the White House and other locations.”
“Tech executive-1” is widely believed to be Rodney Joffe. He is the Senior Vice President for a company called Nuestar. On Telegram CatTheGreat had this to say:
Rodney Joffe could very well be next John Durham indictment for his involvement with spying on then President Trump (Just Human called this long ago). Are you starting to see the central role that DNS is playing in Spygate? The fact is that the players and the crimes are all separate spheres that all seem to intersect at different points in time. Paul Saulino was the recipient of all those Department of Defense IP’s released on Jan 20, 2020. Saulino’s company Packet forensics inspects Data packets and apparently sells Data Capture Devices (see above). No one has been able to put together a solid theory as to what was done with those 175 million IP addresses. The official press release was that the DoD never used them prior to Jan 20th, gave them to Global Resource Systems LLC (Saulinos company), and then took them back several months later.
What if the DoD claim that it never used those 175 million IPs is disinformation?
What if we should be looking to what was done with them prior to Jan 20th, 2020? It is clear to me that Trump and his team know about DNS traffic and have surrounded themselves with the correct people to catch them all. I believe DNS servers, DNS traffic, and DNS Domains will play a big part in proving election fraud. Here is where I have to rely more on my experience than links and posts of others.
The problem I have with PCAPs (Packet Captures) is this: in many cases the packet captures are simply header information. Think of a shipping label with no package. It’s the package or the payload that you want. Now, it is possible that you could set it up where payload is included with the PCAP but this often not the case and very difficult to pull off. The capture that I saw of Mike Lindell’s PCAPs were not captures at all but looked more like a spreadsheet. Is that going to hold up in court? This what raw PCAP data look like:
That collection of data doesn’t mean much to me. I have used a tool called Wireshark for years to view PCAPs and they assemble like this:
This is something that a person like me can work with. An originating IP address, a destination IP address, protocol (TCP), length, and additional information. Yet even with this you do not have the payload. The payload or the package is what is going to prove the fraud. In the Voice over IP (VoIP) world the payload is called Real Time Protocol (RTP or SRTP for secured RTP). That is how I believe Trump intends to prove election fraud…a “Crime of the century in Real Time”
Timing is everything. And it appears to me now that Trump intends to finish all 3 chessboards at the same time (Election Fraud, Durham, and Globalists). What I am suggesting is that it is not enough to have the PCAPs. In my industry we reserve that tool for last resort and when we suspect there is a communication problem. There is no problem with the network/communications. I believe Trump caught them in real time while the election was being stolen and this is my spitball how.
Trump is drawing our attention to PCAPs and DNS because that will lead us to the type of evidence he intends to use. To catch them in real time I believe Trump needed to create an instance that could intercept DNS traffic: from the Dominion voter machines, to their destination where the votes were flipped, and back to the aggregate dominion machine…all without being known.
There is a company that all providers must register their IPs within the US and that is ARIN. The American Registry of Internet Numbers controls ALL IPs in the US. If you read my previous article on FaceBook you know the Department of Treasury has a process for seizing websites and internet domains. They use a technique called AS High jacking where they emulate a routers unique AS number (which you get from ARIN). The user has no idea they are going to a different location physically as it all appears to be the same. I believe the same could be done with critical infrastructure like the 2020 elections (and the 2018 elections). They could emulate the Dominion Aggregate environment without anyone knowing the difference.
To pull this off you would need the following:
· IP addresses (175 million should do it)
· Access to ARIN
· Access to Data Collection Device (Packet Forensics)
· A Secure Domain and a method of hiding it (Robert Durham)
Do you see where ALL the pieces are there to create an entirely new and parallel Data Collection Secure Domain that intercepts the voting data in real time, collects it, and delivers it back to the Dominion Aggregate server? This becomes even more possible if someone like Robert Durham is able to deliver this without being detected.
Whether or not Trump did this or not, I have no real way of knowing. I do know this; I am not that smart and even I know this is plausible. It has been done before by the Department of Treasury in some fashion and seems Trump is pointing us in this direction. I suspect that since the Data Collection Devices were purchased in 2014 that this environment was probably stood up in time for the 2018 elections and no longer necessary after the 2020 election was stolen.
The Crime of the Century was caught in real time. Rather than looking forward in time for a use of those 175 million IP addresses I think we looked back in time and found out how they could have already been used.
“I would rather die with hope and Christ in my heart and be called a fool than to stand over the dead corpse of the republic and say I told you so.”