Cybersecurity Experts: Chinese Cyberwafare Attacks Flipped U.S. Election From Trump To Biden

In the documentary ABSOLUTE INTERFERENCE, which debuted on April 20, 2021, cybersecurity experts came forward and verified that a Chinese-led foreign cyberwafare attack targeted the 2020 U.S. election.

The first documentary in the series initially presented extensive digital forensic evidence of the Chinese-led foreign cyberwarfare attack on the 2020 U.S. election.

In ABSOLUTE INTERFERENCE, additional cybersecurity experts subsequently verified China’s cyberwarfare interference.

Further, a whistleblower featured in ABSOLUTE INTERFERENCE revealed that numerous Chinese-made TCL / Alcatel model 40440 flip phones covertly functioned as heavily-encrypted Trojan Horse 4G WiFi hotspots. The TCL / Alcatel phones were distributed to Georgia poll managers with written instructions. According to sworn affidavits of multiple poll managers, they were instructed to carry the TCL / Alcatel flip phones into polling sites and were to keep them powered up at all times. The TCL / Alcatel flip phones were utilized in Georgia during both the November 3, 2020 U.S. election and the January 5, 2021 Senate runoff election.

TCL / Alcatel model 40440 printed “Cell Phone Quick Guide” instructions poll managers received with their flip phones.

When powered up, the Chinese TCL / Alcatel flip phones connected electronic vote tabulators inside election precinct polling sites across multiple Georgia counties to the internet.

The KNOWiNK brand electronic poll pads, which have their own cellular connection, track which registered voters have voted and which have not. The real-time poll pad data is critical to the artificial intelligence (AI) algorithm that inserts phantom voters into the election.

The Alcatel / TCL phones work in concert with the tabulators to steal votes. This gives the bad actors, in this case China, the ability to access the pool of phantom voters and to vote those phantom votes as they wish. In all cases the phantom fraudulent votes went to Joe Biden.

WATCH Absolute Interference Here:

https://www.worldviewweekend.com/tv/video/absolute-interference-sequel-…

 

WATCH ABSOLUTE PROOF (FULL LENGTH) HERE:
 

 

WATCH SCIENTIFIC PROOF HERE:

WATCH ABSOLUTE Proof Here:

https://www.worldviewweekend.com/absolute-proof

Cybersecurity Expert Featured In ABSOLUTE INTERFERENCE Verified That A Mere Nineteen Chinese Cyberwarfare Intrusions Into Five Battleground States — Arizona, Michigan, Pennsylvania, Wisconsin, and Georgia — Switched Enough Votes From Trump To Biden To Flip The Entire U.S. Election; Foreign Cyberwarfare Attacks Targeted U.S. Election Networks In 2,995 Counties Across 50 States

One of the cybersecurity experts featured in ABSOLUTE INTERFERENCE verified that a mere nineteen of the cyberwarfare attacks by China across just five U.S. election battleground states flipped those entire states from the true winner, President Donald Trump, to candidate Joe Biden. China, therefore, determined the outcome of the entire U.S. national election.

If those votes that were stolen from the American electorate are restored through legal action, then President Trump remains the President of the United States of America and the  commander-in-chief of the United States military, according to the true vote count.

Those nineteen intrusions, however, comprise only the tip of the foreign interference iceberg. During the 2020 U.S. election, there were thousands of inbound cyberwarfare attacks originating from outside the United States, with the preponderance of those attacks coming from China.

2020 U.S. Election Cyberwafare Attack Map Decoded

In ABSOLUTE INTERFERENCE, a cybersecurity expert presented an animated map of the cyberwarfare attack on the 2020 U.S. election and explained China’s attack on the U.S. election in detail.

But it was not only China and other foreign adversaries that attacked the 2020 U.S. election. As U.S. Army Colonel Phil Waldron (Ret.) said, “China could not have accomplished what they did without the assistance of domestic traitors.”

Whistleblowers came forward with proof that domestic traitors inside the United States were working in concert with China.

Chinese-Made TCL / Alcatel Mobile Flip Phones Distributed To Poll Managers Created Secret Wi-Fi Hot Spots That Connected  Election Tabulators To The Internet, Creating A Digital Pathway For China’s Cyberwarfare Attack On The 2020 U.S. Election

Also presented in ABSOLUTE INTERFERENCE, during the November 3, 2020 U.S. election and the January 5, 2021 Georgia U.S. Senate runoff, poll managers across multiple Georgia precincts were provided with TCL / Alcatel flip-phones and were ordered to keep them powered on throughout the voting and tabulation process, according to election whistleblowers whose identities are being protected.

Georgia poll managers were provided with express written instructions along with their Trojan Horse WiFi centers that masqueraded as older-style flip phones.

The U.S. Department of Homeland Security has had TCL on its radar as a national security threat.

Chinese company TCL, according to the U.S. Department of Homeland Security “receives CCP [Chinese Communist Party] state support to compete in the global electronics market” and has “incorporated backdoors into all of its TV sets” as a spying tool.

This well-orchestrated operation to infiltrate U.S. election polling sites with Alcatel wireless equipment built by TCL played a key role in providing China with secret internet connections into the U.S. election infrastructure.

Business technology website ZDNet reported in a January 10, 2019 article titled “Malware found preinstalled on some Alcatel smartphones”:

A weather app that comes preinstalled on Alcatel smartphones contained malware that surreptitiously subscribed device owners to premium phone numbers behind their backs.

The app, named "Weather Forecast-World Weather Accurate Radar," was developed by TCL Corporation, a Chinese electronics company that among other things owns the Alcatel, BlackBerry, and Palm brands.

The BBC also reported on TCL’s weather app spyware:

Data including email addresses and mobile identity numbers have been transmitted to servers based in China…

...According to the security and mobile commerce firm, Upstream Systems, TCL's 'Weather Forecast' asks to collect information including users' geographic locations, email addresses and International Mobile Equipment Identity (IMEI) numbers - a 15-digit code used to identify devices.

Electronic voting machine vendors maintain that their equipment is not connected to the internet.

VIDEO: MACHINES ARE AIR GAPPED - NOT CONNECTED TO INTERNET https://videos.theamericanreport.org/machines-are-air-gapped-not-connected-to-internet.mp4

The multiple whistleblowers’ discovery that the TCL / Alcatel model 40440 with 4G WiFi hotspots were distributed to poll managers with specific directions to keep the devices on their persons and powered on at all times suggests otherwise.

YOUTUBE VIDEO: VOTING EQUIPMENT EXPOhttps://www.youtube.com/watch?v=YLIS68YfMYU&t=2201s

These multiple election whistleblowers explained that the key technical detail of the operation was the TCL / Alcatel flip phone’s capability to covertly connect the precinct-level local area network (LAN) intranet to the internet.

The Chinese TCL / Alcatel flip phones were equipped with special chips with heavy encryption, according to cybersecurity experts who analyzed the flip phones.

A whistleblower stated, the TCL / Alcatel flip phones “were connected [to the internet] and [they were] doing their best to hide it” ... “We have the absolute proof that they stole it [the election].

According to these whistleblowers, “TCL accessed over 150 election servers in 14 different states, including multiple secretary of state networks.”

“Hence, when able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.”

― Sun Tzu, The Art of War

Although multiple poll managers were suspicious of the TCL / Alcatel devices, they had no way of knowing that the innocuous-looking flip phones that they had been ordered to carry inside the polling sites and to keep powered on at all times were actually sophisticated hand-held Trojan Horse cyberwarfare weapons.

Consistent with Sun Tzu’s maxim, the Chinese Communist Party was as near as one can get. They were inside the wire. China was inside U.S. polling stations. China was there to steal the American peoples’ votes, and steal the vote they did.

In “Unrestricted Warfare,” two senior Chinese Air Force colonels talk about defeating their technologically superior opponents through means other than direct military confrontation. Stealing an election via cyberwarfare was just such a stealth attack on America.

The Chinese colonels wrote that their stealth cyber attack would "have the same and even greater destructive force than military warfare..."

When foreign adversaries promise to attack, believe them.

2020 HBO Documentary “Kill Chain: The Cyber War on America’s Elections” Featured Democrats Expressing Worry Over Vulnerability Of U.S. Election Voting Machines To Foreign Cyberwarfare Hacking Of The 2016 U.S. Election

The March 26, 2020 HBO documentary “Kill Chain: The Cyber War on America’s Elections,” featuring Harri Hursti, focuses on the 2016 U.S. election that Donald Trump won.

“Kill Chain” exposed security flaws in electronic voting machines used in U.S. elections. During an interview included in the documentary, one-time presidential candidate Senator Amy Klobuchar (D-MN) stated “We’re very concerned because there are only three companies. You could easily hack into them. It makes it seem like all of these states are doing different things but in fact three companies are controlling this.”

VIDEO: Amy Klobuchar quote from Kill Chain

https://videos.theamericanreport.org/kill-chain-amy-klobuchar.mp4

 “Kill Chain” reveals that the 2016 election was insecure and that U.S. election electronic voting contracts are dominated by three voting machine vendors: Dominion Voting Systems, ES&S, and Hart InterCivic.

When “Kill Chain” attempted to discredit Trump’s 2016 victory, it was apparently acceptable to criticize Dominion Voting Systems, which along with ES&S and Hart InterCivic, “declined to be interviewed” for the HBO documentary.

Screenshot from the HBO documentary “Kill Chain: The Cyber War on America’s Elections”

Did Dominion Voting Systems file lawsuits against HBO or HBO’s parent companies WarnerMedia and AT&T over the content of “Kill Chain”? AT&T’s WarnerMedia also owns CNN.

Did Dominion Voting Systems file lawsuits against the avalanche of left-leaning news media outlets that promoted “Kill Chain” such as Rolling Stone, Deadline, the Los Angeles Times, the New York Times, the Boston Globe, the Palm Beach Post, Time Magazine, Forbes, ABC News, CBS New York, Fortune, Wired, Mother Jones, Roll Call, The Guardian, Yahoo Entertainment, Yahoo Finance, Yahoo TV, and Yahoo News?

TCL / Alcatel’s Corporate Structure And Its Connections To The Chinese Communist Party (CCP), KaiOS Technologies, And YouTube Owner Google

TCL was founded as a Chinese state-owned enterprise.

CBS News reported:

TCL was founded in 1980 in Huizhou, an electronics export base in southern China's Guangdong province. In a letter to employees ... TCL's chairman Li Dongsheng - a Communist Party member and “model laborer” - waxed patriotic when describing his company's strategy and called selling televisions around the world a “historic mission.”

What could be a more “historic mission” for TCL than for TCL than to sell televisions containing backdoors designed to extract user data from unsuspecting Americans?

An even more “historic mission” for TCL was helping the CCP stage an election coup inside the United States and installing Joe Biden as Beijing’s puppet as the U.S. president.

TCL Chairman Li Dongsheng is a member of Chinese Communist Party

The Alcatel brand was licensed from Alcatel-Lucent to China-based TCL Technology in 2005. Alcatel’s headquarters are located in Shenzhen, China and Nanterre, France. Nokia acquired Alcatel-Lucent along with the company’s licensing deal to TCL in 2016. TCL is headquartered in Huizhou, Guandong, China.

The TCL / Alcatel model 40440’s operating system is called KaiOS. KaiOS was made by Hong Kong-based KaiOS Technologies.

TCL is the largest equity holder in KaiOS Technologies. Alphabet’s Google has invested at least $22 million in KaiOS Technologies.

Google is the parent company of YouTube, the video hosting company that routinely censors videos about foreign interference in the 2020 U.S. election.

The acts of both stealthily handing out the Chinese TCL / Alcatel phones running on TCL and Google-invested KaiOS operating systems to election poll managers and Google-owned YouTube removing videos that expose the Chinese-led cyberwarfare attack on the 2020 U.S. election suggest mens rea, or a “guilty mind.”

Working in concert with communist China to steal a U.S. election is in fact treason.

In 2017, During The CFIUS Process, Trump Administration Blocked Chinese TCL / Jade Ocean Global Attempt To Acquire U.S.-Based Novatel; Novatel Makes 3G LTE / 4G Wireless Routers That CA Secretary Of State Alex Padilla Certified In 2018 For Use With KNOWiNK PollPad Plus

“In June 2017, Chinese firm TCL Industries Holdings withdrew its CFIUS notice of its proposed purchase of Novatel Wireless, Inc., the wireless "MiFi business" of Inseego Corp.,” according to international law firm Arnold & Porter. TCL tried to acquire Novatel / Inseego through TCL’s subsidiary Jade Ocean Global before the Trump administration stopped the deal in its tracks.

Reuters reported on April 20, 2017:

[CCP member and TCL Chairman Li Dongsheng] said the U.S. deal was "very close to approval" before President Donald Trump assumed office, after which all administrative reviews were frozen. TCL was then required to resubmit all material related to the deal and was told it may not be approved, [TCL chairman] Li said.

"(The target company) has nothing to do with the military. That's why I am unhappy they would not approve it," he said, declining to elaborate.

He said the group is still working toward the deal and "hoping for a miracle.”

TCL’s efforts to hack into U.S. presidential elections which decide the commander in chief of the U.S. military had all the hallmarks of a Chinese military operation.

TCL planned to use the Novatel MiFi wireless routers to connect to KNOWiNK PollPad Plus electronic poll pads, a technical configuration that was certified by California Secretary of State Alex Padilla in 2018.

Although TCL’s plan to buy American WiFi router company Novatel fell through, TCL proceeded to get its TCL / Alcatel 40440 flip phones with WiFi hotspots into the 2020 U.S. election.

Whistleblowers With Raspberry Pi Zero W (Wireless) Intercepted Data Packet Transmissions At Multiple Election Precincts In Georgia

The whistleblowers have cyber forensic proof that they collected from the airwaves around Georgia election polling sites by using small electronic devices known as Raspberry Pi Zero W (wireless).

At election precincts in Georgia’s Cobb County, Fulton County and Gwinnett County, witnesses who have asked for their identities be protected,   intercepted WiFi traffic at multiple election precincts.

“We found them in not one but six different precincts in three different counties (Cobb, Gwinnett, Fulton) on the January 5th run off,” one of the whistleblower stated.

Using the Raspberry Pi Zero W, the election investigators found hidden SSIDs, or Service Set IDentifiers, a technical term that means a network name. In other words, the whistleblowers investigated and discovered multiple hidden wireless networks at the election sites they visited.

One whistleblower stated during ABSOLUTE INTERFERENCE:

We found a lot of hidden networks [SSDIs]. You need specialized software/devices to find these networks...

We found that at the precinct levels they were connected to the internet and TCL was one of the IP addresses that we traced back to China during the steal…

...we have verified connection to the polling pads [and the  election vote tabulators] with China by this TCL flip phone. We also have the absolute proof of interference by the fact that we have transmissions that go back to this Chinese state-owned company TCL. We have the absolute proof of their incursion, their illegal incursion, into 150 servers in 14 different states, including multiple secretary of state offices.

China chose Biden, not the American people...

...We have multiple sources that are recording this at the same time showing matching mac addresses and matching IP addresses for devices communicating with this TCL company in China.

U.S. Air Force General Thomas McInerney, Former DIA Director U.S. Army General Michael Flynn, And NSA Director U.S. Army General Paul Nakasone: A Study In Contrasts

U.S. Air Force General Thomas McInerney (Ret.)

A West Point graduate and former Vietnam War Air Force pilot, U.S. Air Force General Thomas McInerney (Ret.) served as the U.S. Air Force Assistant Vice Chief of Staff, the third-highest ranking air force officer. General McInerney flew over 400 combat missions and flew U.S. military reconnaissance missions during the Cuban Missile Crisis, served as the military assistant to the advisor to the Secretary of Defense on NATO affairs, and was the Commander of the Alaskan Air Command, Alaskan NORAD Region, and the 11th Air Force. At the Pentagon, General McInerney was responsible for U.S. nuclear weapons.

General McInerney weighed in on the stolen U.S. election and stated during ABSOLUTE INTERFERENCE:

We had the most massive cyberwarfare attack in the history on our electoral system. There has never been anything of that magnitude...

...There is no way that our cyber command and NSA could have ever missed the amount of cyberwarfare that went on during the early hours of 4 November. There’s no way they could miss it.

U.S. Army General Michael Flynn (Ret.)

U.S. Army General Michael Flynn (Ret.), former director of the Defense Intelligence Agency (DIA) and President Trump’s former national security adviser stated:

...what we do know, one of the things that we know for certain is that the machines are connected to the internet...I believe, in everything we discovered, none of those machines are supposed to be connected to the internet. None of them...

...Who are these groups of countries that are working together to interfere in our election?... The big sort of guerilla in the room is China...

...We can actually see the electronic activity, and believe me folks, if you’re paying attention and you’ve watched some of the data that Mike Lindell is talking about, putting out there [in the movie ABSOLUTE PROOF], take a look at it! I mean, this is not made up stuff. This is real stuff and It proves that we had foreign interference in our [2020] election.

One-time Director of the Defense Intelligence Agency General Michael Flynn says that there was interference in the 2020 U.S. election by China.

Which brings us to U.S. Army General Paul Nakasone, Director of the National Security Agency (NSA). The NSA works together with the Defense Department and other U.S. Intelligence Community agencies to monitor cybersecurity threats.

U.S. Army General Paul Nakasone, Director of the NSA

General Nakasone “placed [NSA General Counsel Mike Ellis] on administrative leave the day President Donald Trump left the White House — just as Ellis was taking up the position,” NBC News reported.

Newsmax reported:

"I have been on administrative leave for nearly three months without any explanation or updates, and there is no sign that NSA will attempt to solve the issue. I therefore resign my position, effective immediately," Ellis wrote to NSA Director General Paul Nakasone in a letter published Saturday by The Washington Post…

...However, Nakasone was ‘aware in December 2020 that the Department of Defense Inspector General had completed a preliminary review of the process that led to my selection and found no improper political influence,’ Ellis's letter stated according to the Hill.

Under President Obama, General Nakasone took command of the United States Army Cyber Command on October 14, 2016, two weeks before the 2016 U.S. election.

General Nakasone was the head of U.S. Army Cyber Command during the 2016 presidential election which, according to HBO’s “Kill Chain” documentary, was compromised when a foreign hacker successfully penetrated the Alaska Division of Elections computer network.

Where is General Paul Nakasone regarding this cyberwarfare attack by China against the 2020 United States election?

Is General Nakasone copacetic with China stealing the U.S. election and China  deciding who should be the President of the United States of America, the commander in chief of the United States military, and leader of the Free World?

COPYRIGHT 2021 MARY FANNING AND ALAN JONES

 

 

 

Topic Tags

WE'RE A 100% LISTENER SUPPORTED NETWORK

3 Simple Ways to Support WVW Foundation

Credit Card
100% Tax-Deductable
Paypal
100% Tax-Deductable

Make Monthly Donations

 

-or-

A One-Time Donation

 
Mail or Phone
100% Tax-Deductable
  • Mail In Your Donation

    Worldview Weekend Foundation
    PO BOX 1690
    Collierville, TN, 38027 USA

  • Donate by Phone

    901-825-0652