







Please Follow us on Gab, Minds, Telegram, Rumble, GETTR, Truth Social, Twitter, Youtube
Editor's Note: We have reached out to Georgia Tech for comment with no response as of yet...
This story is developing...you may want to start at the first update at the bottom and work your way up...
UPDATE:
Suggest reading this slowly.
A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - wrote this in an email: "We have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related."
Same professor. Days later: "There is a group that has successfully penetrated these networks." Defense Advanced Research Projects Agency (DARPA) Program Manager Ian Crone confirmed in writing they were analyzing "actual election networks."
His response when briefed on the penetration? "I think their muted response was because they're a little dazed."
The people in that room when all of this was confirmed:
Defense Advanced Research Projects Agency
Cybersecurity and Infrastructure Security Agency - Department of Homeland Security
Multi-State Information Sharing and Analysis Center - the organization that monitors every single state and local election network in America Russia and Iran were inside networks tied to our elections. Every one of these agencies knew. You were never told.
UPDATE:
A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - emailed his Defense Advanced Research Projects Agency handler with a new target:
The United States Postal Service.
Professor Manos Antonakakis wrote: "I would down select United States Postal Service networks in swing states." The Defense Advanced Research Projects Agency Program Manager's response? "Awesome idea." Antonakakis then confirmed: "I will spend a few hours to try to find their networks. If I find any networks, I will run a couple jobs to see if we can even witness any traffic."
A university professor. Scanning federal government postal networks. In swing states. Forty days before a presidential election. With Defense Advanced Research Projects Agency blessing.
Who authorized this? Who ordered this? Who saw the results? Document obtained by
UPDATE:
Thirteen days before the 2020 election. Two Georgia Institute of Technology professors - working under a Defense Advanced Research Projects Agency contract - were actively scanning voting machine manufacturer networks to find out if the machines were "pinging back" to outside servers while votes were being cast. Professor Angelos Keromytis wrote: "But if the voting machines do ping-back and are online while deployed and in use, that makes them interesting..." Professor Manos Antonakakis replied: "Already running an Active Reconnaissance job. We will know soon." October 21, 2020. Thirteen days before you voted. Big shoutout to @TheAndersPaul for obtaining these records in his unrelenting persistence. This is not a theory. These are their actual emails:
Wisconsin independent journalist and election fraud investigator Peter Bernegger, who works closely with CDM contributor Chris Gleason, is posting on his Telegram channel information about faculty at Georgia Tech during the 2020 election seeing likely fraudulent activity within the Georgia election system.
Bernegger posted the following:
Emails between the Georgia Secretary of State's Office and Georgia IT cyber geeks. Look who they found accessing their voting system!
For those who don't know: an egress point is the place in a computer network where data leaves to go somewhere else. Such as the internet.

Bernegger went on to post the following information regarding faculty members at Georgia Tech, along with many other individuals tied to the Department of Defense, CISA in 2020.
GEORGIA TECH
Manos Antonakakis - Associate Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Ran active reconnaissance jobs on election networks for DARPA.
Angelos Keromytis - Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Discussed whether voting machines were "pinging back" while deployed on Election Day.








