High crime talk from Fredo

VA curfew https://t.co/KgPuwaSNWT
Sen. Grassley - Biden family investigated, potential financial crimes WW including China https://t.co/B29rpHwrdF
Warning https://t.co/W18pBE5RID
March
Counter march
Monday 12/14
Republicans refuse to acknowledge preparations for Biden's inauguration https://t.co/Gke3tIlm18
Monday - Electoral College showdown
Election Will Be Overturned Based On GROSS VIOLATIONS of President Trump’s 2018 Executive Order On Election Interference https://t.co/22ROfbUvSe via @pamelageller
Dec 18 President Trump gets report on foreign election interference
Report can trigger asset seizure
“All assets on the table”
Pentagon to End Military Support for CIA Counterterrorism Missions https://t.co/PVKzNCFiwB #Newsmax via @Newsmax
“This is going to escalate dramatically.”

https://t.co/1BsRpLKaHY
“A coup is taking place in front of our eyes, and the public can’t take this anymore.”
“Green means go”
“Time to execute”

More from Dannielle (Dossy) Blumenthal PhD

Sharing.


“What authority does POTUS have specifically over the Marines?”

“only branch of service that falls directly under exec command”

“Nati Sec Act of 1947, amended in 1952, specifies the duties of the USMC to include: ‘perform such other duties as the president may direct.’”


This is the QProof. Go back


10/31/2017, Q wrote:

“Why is ANTIFA allowed to operate?
Why hasn't the MB been classified as a terrorist org?
What happens if Soros funded operations get violent and engage in domestic terrorism?
What happens if mayors/ police comms/chiefs do not enforce the law?”

2020...


How is it possible?
SolarWinds follow up. Very good tweet explaining what happened.


Basically what this means is that SolarWinds itself was exploited. Someone posted an infected update as legitimate (digitally signed), leading customers to download a bad update.

“Multiple trojanized updates were digitally signed from March - May 2020 and posted to the SolarWinds updates website” https://t.co/8e3bMFWXYu


FireEye then explains that infected organizations were approached and exploited. This is a separate Step 2.

At this point, information is already going to “malicious domains” without extra intervention, after the malware does nothing for “up to two weeks”

More from Law

You May Also Like

These 10 threads will teach you more than reading 100 books

Five billionaires share their top lessons on startups, life and entrepreneurship (1/10)


10 competitive advantages that will trump talent (2/10)


Some harsh truths you probably don’t want to hear (3/10)


10 significant lies you’re told about the world (4/10)