1st Amendment Praetorian – Telegram
1st Amendment Praetorian
4.12K subscribers
40.7K photos
2.97K videos
257 files
20K links
1AP is a group of military, law enforcement & intel community vets who protect Americans. https://1APraetorian.com
Download Telegram
Forwarded from Geno
NBC Faces Lawsuit For Defaming Mother Whose Daughter Died 36 Hours After Vaccines
https://circleofmamas.com/health-news/nbc-faces-lawsuit-for-defaming-mother-whose-daughter-died-36-hours-after-vaccines/
Forwarded from The Library (Harold Wren)
Forwarded from Liberty Overwatch (Patriot)
Anatomy of the Steal: The Four Phases of an Election Takeover

Former Michigan Senator Patrick Colbeck gives an excellent breakdown of the 2020 election robbery from a systems engineering perspective.

Colbeck partitions the steal into 4 phases:

1) Preparation

The key goal of this phase is to create and exploit weaknesses in our election system. How? By weakening the election record chain of custody for the (i) qualified voter file (QVF), (ii) poll books, (iii) ballots, and (iv) vote tally.

The criminals start by seeding the QVF. For example, there were more than 616K ineligible voters in the Michigan QVF heading into the 2020 election.

Other weakening measures include no-excuse absentee voting, same-day voter registration, elimination of voter ID and signature verification requirements, and centralized, networked, voting systems. All of these erosions reduce the number of bad actors needed to steal an election.

2) Main Attack

The central tool in this second phase is ballot stuffing via mail-in votes, enabled by seeding the QVF with low propensity and ineligible voters.

Importantly, phase 2 requires an accurate prediction of voter turnout to be successful. If those forecasts fail (as they did in the 2020 election), the perpetrators have to shift to a backup plan, the Backup Attack phase.

3) Backup Attack

Phase 3 involves algorithmic manipulation of the vote tally when ballot stuffing isn’t netting enough votes.

Lady Draza identified a digital fingerprint for something called the “PID controller” during this phase. As she was monitoring the election night results in multiple states, she noticed the cumulative vote total would periodically drop to zero in the Edison reporting stream before surging back up. This is NOT normal.

Once the vote tallies have been altered, ballots must be added for reconciliation. And, that’s exactly what we saw with the 3AM ballot drop-offs at the TCF center and the halted late-night vote counts in every swing state.

4) Defense

The defense phase involves censorship and evidence destruction.

Colbeck says canvassing is critical to combat the fraud, and recommends starting with the QVF.

Also on Colbeck’s investigation wishlist: an audit of the election night reporting results, from the precinct level to the New York Times. No one has done this yet.

Watch 📺 Colbeck downloaded video, YouTube link
Hat tip🤠 @VoteLizHarris🇺🇸

@LibertyOverwatchChannel
Forwarded from The Library (Harold Wren)
My fiance was killed in the World Trade Center terror attack. This video put a big smile on my face. Someday i hope to buy this man a beer, or whatever his drink of choice is.
Forwarded from The Library (Mr Dirt)
This is why you push back and push back hard. When they say they don’t want you at school boards, bring even more people the next time. When they say don’t get loud, get even louder. This works on the American communist because there’s a secret about the American communist. 1/

The American communist is soft. He’s soft because he’s never faced real opposition from the pathetic, spineless, “principled” American Right. The American Right is so soft, they’ll actually scold themselves if one of their own pushes back too hard against the communists. 2/

Communists in other nations had to fight tooth and nail to gain power. From Russia to China to Cuba, the communist was a fighter. Those communists were hard as nails because they came up facing things like the White Army or Chiang Kai-shek. Things that hit back. And hard. 3/

Not the American communist. He’s spent his entire life luxuriating in a country where he never faces real pain or consequences for his actions. He’s been able to pillage and destroy at will. This easy life has made him weak. 4/

https://twitter.com/JesseKellyDC/status/1451966457005367299?s=19
Forwarded from The Library (Harold Wren)
Forwarded from The Library (Harold Wren)
Forwarded from The Library (Harold Wren)
Forwarded from The Library (Harold Wren)
Forwarded from KanekoaTheGreat
A 2018 article ennoscriptd, "Immunization: an entry point for digital identity" written by Bill Gates' ID2020 organization.

"In order to enable digital identity at scale, we will need to identify and leverage many entry points. Immunization service delivery presents a tremendous opportunity to provide children with a durable, portable and secure digital identity early in life, enabling access to a wider range of social services, while also improving access to the health interventions all children need and deserve."

https://medium.com/id2020/immunization-an-entry-point-for-digital-identity-ea37d9c3b77e

@KanekoaTheGreat
Forwarded from KanekoaTheGreat
image_2021-10-23_16-06-41.png
366.9 KB
In 2017, Dr Seth Berkley, CEO of Bill Gates' Gavi Vaccine Alliance, wrote a piece for Nature that emphasized the pressing need to move to digital ID systems.

In 2018, GAVI Vaccine Alliance announced that digital identity was its focus for its 2018 INFUSE program.

In this infograph, now removed from GAVI's website, the final stage of the digital identity vaccine passport system is "Access To Other Services".

"...the digital child health card can be used to access secondary services, such as primary school, or financial services, serving as the foundation for a broadly recognised digital identity."

https://web.archive.org/web/20180308005056/https://www.gavi.org/infuse/calls-to-innovate/2018/

@KanekoaTheGreat
Forwarded from G.M. Ziegler
1_US_LNG_Upstream_y_Midstream_pdf_MervynSlides_v5_11_28_17_copy.pdf
2.1 MB
Hunter was planning with literal ChiComs (Mervyn YAN, Ye JIANMING, Gongwen DONG, et al) to have a CCP-connected firm, known as CEFC, buy up your shale. It's all right here.

Treason comes in many forms. Economic is one of them.