Is This the Work of Harry Reid?

Former Nevada Senator Harry Reid may not exert his power in the halls of Congress anymore, but the petty, greedy, ethics free little man has not released the reins of power.

That’s what analysts say about him in Nevada, where he still calls the shots allegedly via intimidation, extortion and blackmail. You didn’t think the weasel from Searchlight, Nevada, would go away quietly, did you?

Here he is after some kind of scuffle allegedly with his brother.

You can probably ascertain his handiwork in yesterday’s ruling against Team Trump’s case that voter fraud inflected their election. That it was an Obama judge who ruled just made it an easier task for him.

The Nevada Independent reported:

President Donald Trump’s legal effort to overturn presidential results in Nevada has fallen short after a Carson City District Court judge rejected his team’s request to award the state’s six electoral votes to the incumbent.

Judge James Russell ruled Friday against the Trump campaign’s unprecedented request to either block certification of the state’s presidential election results or award the state’s electoral votes to Trump, saying in a written order that the campaign’s claims of voter fraud to the level needed to bring the state’s presidential results into question fell far short of the evidentiary standard needed to contest the results of the presidential election.

In his 35-page order, Russell wrote that he found the evidence offered by the Trump campaign to have “little to no value,” and failed to provide under any standard of proof that the campaign’s long list of alleged fraud and vote irregularities could be backed up under any evidentiary standard.

Here’s what he found of “little to no value”

That’s more than 20 binders full of evidence of voter fraud. In it were hundreds of affidavits of voter fraud.
Here is the judge

Many of these judges were pushed by the Soros people who realized early on that getting leftist/progressive judges in positions of power are worth the money you put in to electing them. Also state attorneys generals and local AGs. It was a savvy move, unfortunately for those who care about adherence to the law.

Look at Powell and Wood Website Before Tech Takes It Down

Sidney Powell and Linn Wood have begun a new website you might want to check out.

Twitter supposedly won’t let them mention it and has silenced Sidney Powell once again.

Here’s the website:

Some stories are from the Epoch Times, which isn’t accessible unless you subscribe, but there are many other stories and videos like  this one:

Trump Has the Goods

Intelligence and military analyst Thomas Wictor described Trump’s strategy for overturning the rigged election. He described this week as “Trump preparing the battlefield by getting the public used to the idea that the election was stolen. Mission accomplished.”

It certainly was. Interested Americans listened to story after story of all kinds of voter fraud from state after state. The culmination was yesterday in Atlanta with the video of poll workers (after they sent Republicans and watchers home in the middle of the night) pulling suitcases full of ballots from underneath tables in the arena.

Could it get any worse?

With the clock ticking, that sets up next week as an explosive one. You can be sure Donald J. Trump has a plan.

There was this interesting find from Jamesthe17th on Twitter: “BREAKING: Trump team now has a Dominion machine from Ware County, #Georgia with EVIDENCE of Trump votes being switched to Biden. Source: John Fredericks on Steve Bannon War Room”

Here’s the video where a reporter relays this. It starts at 52:30:

And gives more info. You can decide for yourself whether it is speculation or based in truth.

Ask yourself this question: What was the purpose of yesterday’s White House speech about election fraud and vote rigging?

If you think it was all about Trump communicating to the people, think again. This speech was really about Trump communicating with Chris Miller and the DoD about foreign interference in the U.S. election while laying out the key national security justifications that are necessary to invoke what I’m calling the “national security option” for defending the United States against an attempted cyber warfare coup.

In this article, I present details from 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, “Authorities concerning military cyber operations” as well as National Security Presidential Memoranda (NSPM) #13, covering “offensive cyber operations.” See below.

In today’s Situation Update (Dec. 3rd), I lay out all the details of how Trump just invoked the legal framework — and national security provisions — necessary to allow the Secretary of Defense (Chris Miller) to activate military processes that lead to a tactical takedown of domestic enemies and active traitors.

Decoding President Trump’s Dec. 2nd speech

Consider what Trump said in yesterday’s speech. You can watch the full speech, but if you don’t know what to listen for, you’ll miss all the important language. About 95% of this speech was filler. Only 5% really matters, as I detail below:

First, he lays out that he has a sworn oath to defend the United States Constitution against the wartime “siege” that’s under way:

‘As President I have no higher duty than to defend the laws and the constitution of the United States. That is why I am determined to protect our election system, which is now under coordinated assault and siege.’

He then explains that the vote was criminally rigged with “fraud” (which is a crime) and that it’s now time to overturn the election results and correct them:

Millions of votes were cast illegally in the swing states alone, and if that’s the case, the results of the individual swing states must be overturned, and overturned immediately.

Then he explains that China was part of this entire plan from the very beginning, via their engineering and launching of the coronavirus, which Democrats used to justify mass mail-in ballots which were used to steal the election. This statement specifically invoked national security elements of our defense protocols:

The Democrats had this election rigged right from the beginning. They used the pandemic as an excuse to mail out tens of millions of ballots, which led to a big part of the fraud… and there is no one happier than China.

Trump then calls for a “full forensic audit,” which can obviously only take place under military authority, since the local elections officials are corrupt, fraudulent criminals. He explains this himself:

“Dramatically eroding the integrity of our elections was the Democrats’ number one priority. For a simple reason: They wanted to steal the 2020 presidential election. All of the Democrat efforts to expand mail-in balloting laid the groundwork for the systematic and pervasive fraud that occurred in this election.”

Then, about 30 minutes into the speech, he invokes legal language that clearly references Trump’s Sep. 12, 2018 executive order which describes remedies for foreign interference in U.S. elections. Here’s what Trump says:

“The only conceivable reason why you would block commonsense measures to verify legal eligibility for voting, is you are trying to encourage, enable, solicit or carry out fraud. It is important for Americans to understand that these destructive changes to our election laws were NOT a necessary response to the pandemic. The pandemic simply gave the Democrats an excuse to do what they were trying to do with many many years.”

Note carefully the phrase, “…trying to encourage, enable, solicit or carry out fraud.”

Where have we heard something very similar before? In the 2018 EO, which describes who will be subjected to having all their assets seized by the United States government — and note that this applies to corporations, individuals, partnerships and even non-profits:

Sec. 2. a (ii) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of, any activity described in subsection (a)(i)

Sec. 2. a (i) to have directly or indirectly engaged in, sponsored, concealed, or otherwise been complicit in foreign interference in a United States election;

Thus, Trump just invoked the 2018 EO and sent an undeniable signal to Chris Miller at the DoD (as well as many other groups) that the Democrats, the treasonous media and the complicit Big Tech giants have all engaged in concealing, advocating or supporting “foreign interference” in the U.S. election.
Treason, rendition flights and military tribunals

What is the remedy for such actions of treason against the United States?

Under existing U.S. law, it’s a felony crime to try to rig votes. Under military law during a time of war, it’s treason. And under the 2018 EO, each of the entities engaging in this behavior will have all their assets seized by the U.S. Treasury.

Translated into plain language, this means that Twitter, Facebook, CNN, the Washington Post, Google, MSNBC, etc., are all now able to be completely seized, shut down or taken over by the Trump administration, as they all engaged in the defined behaviors outlined in the 2018 EO, which Trump just cited.

Consider that as I list all the evidence that Trump’s attorneys and DoD “white hat” team members now possess, much of which will surely be presented to SCOTUS, most likely by Sidney Powell, once one of her cases reaches that level of the judicial system:

CIA director Gina Haspel admitting to election interference in a full confession which has now been acquired.
Dominion executives confessing to engineering backdoors into the systems, which has also been acquired.
Packet analysis results from “white hats” who intercepted all the real-time vote rigging traffic, which includes the specific instructions from CIA servers to add the hundreds of thousands of votes in real time to Dominion tabulation machines in swing states. This is now publicly confirmed by Col. Phil Waldron.
Log files and software evidence from the seized CIA servers in Frankfurt, which provides physical and intellectual proof that the CIA inserted hundreds of thousands of votes into the Dominion tabulation machines.

All this evidence exists right now. Trump has it all. His speech lays the official groundwork that can now be cited by other officials (namely, in the DoD and Treasury, which runs the US Secret Service), in order to justify their own initiation of orders for further arrests, rendition flights and wartime activities necessary to defend the United States of America against foreign enemies who are waging cyber warfare against the United States.
10 USC 394: Authorities concerning military cyber operations

In case you’re wondering whether the U.S. military under Trump really has the authorization to respond to acts of cyber warfare with coordinated conventional military actions, read 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, which is available via

§394. Authorities concerning military cyber operations
(a) In General.-The Secretary of Defense shall develop, prepare, and coordinate; make ready all armed forces for purposes of; and, when appropriately authorized to do so, conduct, military cyber activities or operations in cyberspace, including clandestine military activities or operations in cyberspace, to defend the United States and its allies, including in response to malicious cyber activity carried out against the United States or a United States person by a foreign power.

(b) Affirmation of Authority.- Congress affirms that the activities or operations referred to in subsection (a), when appropriately authorized, include the conduct of military activities or operations in cyberspace short of hostilities (as such term is used in the War Powers Resolution (Public Law 93–148; 50 U.S.C. 1541 et seq.)) or in areas in which hostilities are not occurring, including for the purpose of preparation of the environment, information operations, force protection, and deterrence of hostilities, or counterterrorism operations involving the Armed Forces of the United States.

(c) Clandestine Activities or Operations.- A clandestine military activity or operation in cyberspace shall be considered a traditional military activity for the purposes of section 503(e)(2) of the National Security Act of 1947 (50 U.S.C. 3093(e)(2)).

f) Definitions.-In this section:

(1) The term “clandestine military activity or operation in cyberspace” means a military activity or military operation carried out in cyberspace, or associated preparatory actions, authorized by the President or the Secretary that-

(A) is marked by, held in, or conducted with secrecy, where the intent is that the activity or operation will not be apparent or acknowledged publicly; and

(B) is to be carried out-

(i) as part of a military operation plan approved by the President or the Secretary in anticipation of hostilities or as directed by the President or the Secretary;

(ii) to deter, safeguard, or defend against attacks or malicious cyber activities against the United States or Department of Defense information, networks, systems, installations, facilities, or other assets; or

(iii) in support of information related capabilities.
Trump announced “offensive cyber operations” just one week after signing his Sep 12, 2018 Executive Order

As you ponder all the implications of that, note carefully that just 8 days after President Trump signed his September 12, 2018 executive order, the Trump administration announced the launch of “offensive cyber operations” against foreign enemies. This was reported by the Washington Post, which explained, “The strategy incorporates a new classified presidential directive that replaced one from the Obama administration… It allows the military and other agencies to undertake cyber operations intended to protect their systems and the nation’s critical networks.”

What would be considered “offensive cyber operations?” Kraken, of course. The 305th military intelligence battalion.

Of course, just 8 days earlier, President Trump had designated elections infrastructure as “critical infrastructure.” So now the pieces fit. The circle is complete. The election theft was cyber warfare against critical U.S. infrastructure. This authorizes all kinds of national security activities, such as using U.S. Army Special Forces units to raid the CIA server farm in Frankfurt, which took place shortly after the election.

Also in 2018, President Trump had authorized the National Security Presidential Memoranda (NSPM) #13, covering “offensive cyber operations.” Here’s a list of all the NSPMs, but notably, “offensive cyber operations” is a secret and is not publicly shown.

In fact, the Trump administration fought to keep this document hidden from Congress, given that in 2018, the House was run by Pelosi and other treasonous actors who had just pulled off the 2018 cyber attack on the U.S. elections infrastructure, stealing dozens of House seats in order to “win” a majority in the House, from which Adam Schiff could launch his impeachment scheme to try to remove Trump from power.

Trump was able to prevent the House from reading NSPM #13 for 17 months, according to Fifth Domain, which reported:

“On a bipartisan basis some of us sent a letter to the Trump administration demanding that they share with, at least some of the leadership on the Armed Services Committees, the rules of engagement for certain cyber contingencies,” Rep. Mac Thornberry, R-Texas, said at the time. “The Obama folks did give us that information, the Trump people changed it, but then they were reluctant to show us.”

What we now know is that Trump was planning the 2020 election sting/cyber warfare “trap” in 2018, and that these cyber warfare response protocols were intentionally kept from Congress for as long as possible while plans were put in place to catch the Democrats stealing the next election (the 2020 election).

Rest assured, what we now know with absolute certainty is that Trump, Miller, Cohen-Watnick and other key players put the cyber warfare infrastructure in place in 2018 that would allow them to unleash a domestic military response to arrest, detain and prosecute all those who were complicit in the attack on America.

The patriots, in other words, really are in charge. And they planned all this since 2018, putting in place the framework to trigger the appropriate national security resources once the Democrats took the bait and tried to steal the 2020 election.

GITMO must be getting close to full capacity at this point, with lots more detainees on their way. The mass arrests are coming. Trump is in charge, and the Dems who know what’s really happening are beyond terrified. They know they’ve been caught. Some will be charged with treason. Many will face military tribunals. A few will likely be executed after found guilty of treason.

Finally, lock and load, patriots, because Trump may still need a million armed patriots to show up in D.C. as the critical moments of all this are publicly announced. Stand by for further instructions from your Commander-In-Chief.

Let’s hope this is true.

Personal Accounts of Detroit Fraud

In this video, two workers in Michigan describe what happened on election night and the early morning of Nov. 4. They were so outraged they braved a blizzard in Lansing Wednesday to give testimony to the legislature.

“Nothing prepared me for what I saw,” one of them said about election night.

What they describe is a hostile atmosphere, intimidation, sexual and racial harassment and just about every kind of fraud imaginable. They have had their lives threatened, their jobs imperiled and one had sugar poured in her gas tank, ruining her car.

This is one of the best personal accounts yet given.

Church Militant is a Catholic website, but aside from a prayer, host Michael Voris’ interview is all about the politics. He has a unique perspective since they are based in Detroit, one of the epicenters of fraud, and he was an Emmy winning reporter before founding the network.

Voris has a nightly show at 5:30 Central updating on the election aftermath and status of cases regarding the fraud.

Take a Look, Mr. Barr

Here’s what one listener picked up on at today’s hearing in Georgia:

Ranked Choice Voting Leads to Fraud

In a recent election, Memphians were asked to vote on ranked choice voting, aka instant runoff voting. In case you have forgotten what that is, Ballotpedia explains: “A ranked-choice voting system (RCV) is an electoral system in which voters rank candidates by preference on their ballots. If a candidate wins a majority of first-preference votes, he or she is declared the winner. If no candidate wins a majority of first-preference votes, the candidate with the fewest first-preference votes is eliminated. First-preference votes cast for the failed candidate are eliminated, lifting the second-preference choices indicated on those ballots. A new tally is conducted to determine whether any candidate has won a majority of the adjusted votes. The process is repeated until a candidate wins an outright majority.”

In other words, if a candidate does not top 50%, the instant runoff is triggered. You can end up with the winner being someone no one really liked. It’s a very convoluted and, in my opinion, undemocratic way to elect someone that no one has chosen. It’s manipulation of the vote. It goes against the idea of one person exercising their candidate preference.

Yet in the runup to a recent local election, many were hailing it. They said it would save money by eliminating the need for followup elections. As if governments ever cared about saving the taxpayer money!

In 2018 Memphians voted (62%) for instant runoff voting. In a city where we already have an imbalance in parties, this could be disastrous. Fortunately for us, a judge ruled that Tennessee does not allow ranked choice voting so it hasn’t been implemented.

Why is this important now?

Sidney Powell filed a lawsuit in Michigan that the votes were counted by decimals in a scheme called a “Ranked Choice Voting Algorithm” — 1 vote per citizen? No, you get 0.534 of a vote. It quotes Ramsdale, the election expert who advised Texas against Dominion machines, as

Once you allow such manipulation of the vote you get, well, manipulation.

And, loss.

Wood and Sidney Get Kraken’

A high energy, excited crowd greeted Linn Wood and Sidney Powell as they held a press conference in Georgia this afternoon.

Wood told the people “we’re going to send a message to the state capitol in the golden dome of Georgia, to the tin roof of the governor’s mansion in Georgia. The message is this: It’s 1776 again and you’re not going to take our freedom. We’ll make it heard all the way to Beijing China. You picked a fight with the wrong people.”

“Joe Biden will never set foot in the Oval office of the White House. Never going to happen on our watch.”
He was greeted with people chanting USA! USA!

Wood had a message: “Get out of our country George Soros. We’re not going to vote on your damn machines made in China.”
He then told the crowd to “go to the governor’s mansion, encircle it and honk horns until Kemp comes out and calls a special session of the legislature. Then he can resign. Then we can lock him up.

“A few others need to go with him,” Wood said. He also told the audience “stop reading the media. It’s a lie. Stick with OAN and Newsmax. They tell you the truth. Read the Epoch Times they tell you the truth. This is the battle between good and evil, truth and lies.”

Powell took the stage and explained, “There was and is massive fraud. It’s in the DNA of every voting system. There was an algorithm used all across the country to flip votes from Mr. Biden to President Trump. Ballots were injected at a rate of 90% for Biden; 10% for Trump. We all know that defies reality.

“Lots of people got cheated; even local races, congressional seats, Senate seats. There should not be a runoff, certainly not on Dominion machines.
I would make it known to all Georgians that you should not vote until you know your vote is secure. We must have voter ID; go back to paper ballots that are signed and have your thumbprint on them; they should be able to find a system that can count them, even if it has to be done by hand.”

Powell said she wants to know what role our 3 letter agencies had in the creation and distribution of the voting system.

“I knew the swamp was really bad, but it’s at least 20% worse than I thought it was. We have traced a lot of the money back to china. White hat hackers saw doors open in China, Hong Kong, Serbia. We will give all of our evidence to the DOJ as soon as we get it pulled together. I do have concerns about how that will be handled. We need a lot of indictments and fast.”
She said she has proof that votes were bought with checks from an office in K street. We know that there were planes full of ballots brought in and ballots from Mexico.

“There was no kind of voter fraud that hasn’t been experienced throughout the country. Georgia was absolutely full of it.”
Powell and Wood both asked everyone to flood the legislature, governor and secretary of state with phone calls and letters and also to the DOJ.

CEO: Election Was Rigged

Patrick Byrne came on the radar in 2019 when the former CEO claimed that the FBI asked him the summer of 2016 to pursue a relationship with Russian spy Maria Butina.

She was the one who supposedly tried to lure Donald Trump Jr. into some Russian child adoption scheme. Jr. denied the charge and no one believed her.

Byrne continued to insist that he was used by the Deep State – a claim that doesn’t at all seem unlikely.

Byrne has now said that this summer he assembled a team of cyber experts to investigate just how the 2020 election might be stolen. They employed the Chinese technique of reverse engineering and he believes they came up with the exact scheme the Democrats used to steal the election.

Byrne lays out what he found in his website, He believes the election was rigged. His team has assembled many graphs and charts to make his points.

Although he has attempted to get the information to the mainstream media, Byrne says – not surprisingly – he has met with a brick wall.
He writes, “The Cone of Silence is nearly absolute these days. Journalists who have spoken to me for years, and who have been haranguing me to give them the rest of the story when I am ready to come forward, have (now that they understand it) crawled under their covers in fear of handling it. They have confirmed numerous parts of it, spoken to others involved… and still refuse to run it out of fear of angering the Powers That Be (or those that are soon to be). When the whole story is out and confirmed, I look forward to writing a piece naming them and shaming their weepiness.”

Newsmax did want to hear what he had to say and he explains: