By Cheryl Sullenger
Sioux Falls, SD — Drama was not lacking on the final day of Mike Lindell’s Cyber Symposium, which was held in Sioux Falls, South Dakota, and featured striking evidence of election fraud and a plan to secure our elections. Despite the attempts to disrupt and discredit it, the Symposium was successful at showing new evidence of election fraud, clarifying various aspects of the 2020 Presidential Election, and outlining paths forward for auditing all fifty states and making our future elections secure and trustworthy.
As noted previously, the day began with an announcement by Mike Lindell that he had been physically attacked at his hotel the previous night. He also informed the gathering that another unnamed Colorado official has his home raided at around 10:30 p.m., frightening his wife and four children. Electronic devices were seized. This follows the raid on the office of Mesa County Colorado’s Clerk of Records, Tina Peters, as she was on a flight to South Dakota for the Symposium.
Col. Phil Waldron then briefed the Symposium on several threats that had been detected by his team, including infiltration of the venue by members of Antifa, who also were outside the Symposium venue attempting to disrupt it. He described their behavior as “typical insurrection-type activity” that was part of the color revolution that is ongoing in our nation and is attempting to divide us. See briefing video above.
In his briefing, Col. Waldron also described a credible threat that a “poison pill” had been inserted into their data. His team managed to find the malicious code and eliminate it before it could be released. Col. Waldron indicated that if that had not been done, some people would have been placed at risk. The attack was being handled in accordance with the Cyber Security Act of 2015 and various Executive Orders and has been reported to the appropriate authorities.
Later Col. Waldron explained during a televised interview with OANN that one of their main team members had to pull out of the Symposium due to health issues, and that impacted their ability to discuss some information they had planned to present. This, and the “poison pill” incident may be why the Packet Capture data was not more fully discussed during the Symposium, although details related to the Packet Captures is still unclear.
Freedom of Speech
Attorney Alan Dershowitz discussed Dominion Voting Systems’ defamation lawsuits against Mike Lindell and his My Pillow company, noting that the government is engaged in censorship. As Dr. Shiva Ayyadurai explained during his presentation on Day 2, this is being done through the use of news and social media platforms.
“McCarthyism has become a tactic of the extreme left,” Dershowitz warned.
“Censorship has been long experienced by those of us who work to end abortion,” said Operation Rescue President Troy Newman. “For years the issue was ignored as we were lied about, vilified, and censored by the mainstream fake news and social media. Now that it is happening to others, people are beginning to wake up to the fact that our Freedom of Speech has been nearly obliterated at the behest of those in the government who oppose us.”
During the Symposium, a mock election was conducted using the same voting equipment that was used in several states during the 2020 election. Participants were invited to use the machines to cast their votes.
A panel discussion about the mock election results featured Draza Smith, who holds a Master’s Degree in electrical engineering and a second Master’s Degree in cyber engineering. She explained how the system worked and revealed that someone inside the venue was able to hack the system in five minutes using a cell phone. The intrusion was detected within minutes and the hacker was locked out, but the demonstration proved how easy it was to hack voting machines during the election.
The primary reason for the ease of the hack was a wireless modem attached to the motherboard of the voting machines – something some election officials did not even know was there. That modem allowed connection through a wireless network.
This demonstrated that the machines were in fact accessible over the Internet despite not being hardwired to it.