─── Real Investigative Journalism ·
A CDM Site
───
─ Real Investigative Journalism ·
A CDM Site
  • UPDATE: Foreign Actors Were Found Conducting 'Command And Control' Of Networks During 2020 Election

    March 20, 2026
    0
    Share

    UPDATE: Forty Days Before 2020 Election - GA Tech Prof Scans US Postal Service Networks With DARPA

    UPDATE: 13 Days Before 2020 Election GA Tech Profs Working Under DARPA Contract Were Actively Scanning Voting Machine Manufacturer Networks For "Pinging Back" To Outside Servers While Votes Were Being Cast

    BERNEGGER: Individuals At Georgia Tech, Secretary Of State's Office Knew Dominion Was Extracting Data From Machines During 2020 Election

    Image by Wizzito

    Please Follow us on Gab, Minds, Telegram, Rumble, GETTR, Truth Social, Twitter, Youtube 

    Editor's Note: We have reached out to Georgia Tech for comment with no response as of yet...

    This story is developing...you may want to start at the first update at the bottom and work your way up...

    UPDATE:

    Suggest reading this slowly.

    A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - wrote this in an email: "We have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related."

    Same professor. Days later: "There is a group that has successfully penetrated these networks." Defense Advanced Research Projects Agency (DARPA) Program Manager Ian Crone confirmed in writing they were analyzing "actual election networks."

    His response when briefed on the penetration? "I think their muted response was because they're a little dazed."

    The people in that room when all of this was confirmed:

    Defense Advanced Research Projects Agency

    Cybersecurity and Infrastructure Security Agency - Department of Homeland Security

    Multi-State Information Sharing and Analysis Center - the organization that monitors every single state and local election network in America Russia and Iran were inside networks tied to our elections. Every one of these agencies knew. You were never told.

    UPDATE:

    A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - emailed his Defense Advanced Research Projects Agency handler with a new target:

    The United States Postal Service.

    Professor Manos Antonakakis wrote: "I would down select United States Postal Service networks in swing states." The Defense Advanced Research Projects Agency Program Manager's response? "Awesome idea." Antonakakis then confirmed: "I will spend a few hours to try to find their networks. If I find any networks, I will run a couple jobs to see if we can even witness any traffic."

    A university professor. Scanning federal government postal networks. In swing states. Forty days before a presidential election. With Defense Advanced Research Projects Agency blessing.

    Who authorized this? Who ordered this? Who saw the results? Document obtained by

    @TheAndersPaul


    UPDATE:

    Thirteen days before the 2020 election. Two Georgia Institute of Technology professors - working under a Defense Advanced Research Projects Agency contract - were actively scanning voting machine manufacturer networks to find out if the machines were "pinging back" to outside servers while votes were being cast. Professor Angelos Keromytis wrote: "But if the voting machines do ping-back and are online while deployed and in use, that makes them interesting..." Professor Manos Antonakakis replied: "Already running an Active Reconnaissance job. We will know soon." October 21, 2020. Thirteen days before you voted. Big shoutout to @TheAndersPaul for obtaining these records in his unrelenting persistence. This is not a theory. These are their actual emails:


    Wisconsin independent journalist and election fraud investigator Peter Bernegger, who works closely with CDM contributor Chris Gleason, is posting on his Telegram channel information about faculty at Georgia Tech during the 2020 election seeing likely fraudulent activity within the Georgia election system.

    Bernegger posted the following:

    Emails between the Georgia Secretary of State's Office and Georgia IT cyber geeks. Look who they found accessing their voting system!

    For those who don't know: an egress point is the place in a computer network where data leaves to go somewhere else. Such as the internet.

    Bernegger went on to post the following information regarding faculty members at Georgia Tech, along with many other individuals tied to the Department of Defense, CISA in 2020.

    GEORGIA TECH

    Manos Antonakakis - Associate Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Ran active reconnaissance jobs on election networks for DARPA.

    Angelos Keromytis - Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Discussed whether voting machines were "pinging back" while deployed on Election Day.

    ‘NO AD’ subscription for CDM!  Sign up here and support real investigative journalism and help save the republic!  

    Share

    Author

    Avatar photo
    L. Todd Wood is the CEO of CDM.press, the parent company of The Georgia Record. He's also been a longtime national security columnist for the Washington Times, and other large publications. Visit LToddWood.com.
  • guest

    0 Comments
    Oldest
    Newest Most Voted
    Inline Feedbacks
    View all comments
  • magnifiercrossmenuchevron-down