TruthArchive.ai - Tweets Saved By @drjamesbjoyce

Saved - February 9, 2024 at 6:02 AM
reSee.it AI Summary
Highlights: 1) The book is a mix of fact and fiction. 2) Published after the SMMA passed. 3) The NY Times is criticized for biased reporting. 4) Powergrid is not legally connected to the internet, but if it were, there would be security measures in place. 5) CISA is deemed untrustworthy. 6) Fearmongering is prevalent. 7) A future villain is established. 8) Claims of state-led hacking efforts are questioned. 9) The author had meetings with influential figures and developed technology to prevent future scenarios. 10) The CIA may attempt a false flag cyberattack before the election, causing power outages and blaming other countries. 11) Sleeper cells in the US may initiate physical attacks on critical infrastructure. 12) The author suspects the attacks will happen before the election, followed by additional false flags and attacks on resistance groups.

@drjamesbjoyce - Dr. James Joyce

Whew… Okay… WAAAAAAY too much to type. Full convo re this should happen offline, but here are some highlights in no particular order of importance: 1) The book is fact/fiction💯 2) Published just after the SMMA passed🤔 3) NY Times - “All the news that’s print to fit.” Susmax (👈🏽new word) 4) Powergrid is on SCADA and is not, legally, connected to the Internet. If it is illegally connected to the Internet, bajillions of sensor go apesh17 and the links are blocked by the actions of heuristic filters, or what GWB would call “deciders”… like him 🤠 5) CISA cannot be trusted💯 6) Fear p0rn💯 7) Establishing a “plausible” future villain 👿 8) “Evidence” of active successful state-led Iranian and Russian hacking efforts against our critical infrastructure is as fake as a CROWDSTRIKE logfile 👀👀👀👀👀👀 9) I had a meeting in around late 2004 or early 2005 in Holland, Michigan with Pete Hoekstra (Chairman of the House Permanent Select Committee on Intelligence), John McCain, Cindy McCain, and few staffers… um… erm… oh… where I briefed them on this exact possible future scenario, how to prevent it, etc. Then I briefed critical peeps in DC (like, ‘erebody). Then I invented and developed some tech TO prevent it (NIST help pay for me to do it via an ATP grant of about $1.5million). Then the government put it on every system within our critical infrastructure and the entire defense/intel community (every device). This has been in place starting in around 2007 an they rolled it out as fast as they could. Just ask the Ft. Huachuca peeps🇺🇸 10) I suspect the CIA will attempt to pull off a related false flag before the election, that it will affect all major comms platforms (except for analog low tech and PERHAPS Starlink), that there will be significant power outages ESPECIALLY in major urban areas, with sporadic local rural outages, that the blame will be placed on Russia, China, Iran, and North Korea, that Martial Law will be declared, and that much of our population will be confused and scared 11) I also suspect this “cyberattack” will be preceded by an awakening of the sleepers here in the US who will begin physical attacks on power plants, water facilities, oil refineries and distribution centers, first responder facilities, forests and fields (scorched earth), and people from coast to coast 😞 12) I ALSO suspect this will be done before the election with enough time to kick off a few more false flags for support, and that these extra false flags (real events) will be mercenaries attacking local/regional pockets of resistance around the country, hitting the most organized groups of patriots first and hardest. Best to be prepared🤷🏽‍♂️

Saved - November 11, 2023 at 10:52 AM
reSee.it AI Summary
A computer programmer claims to have written code to flip votes on electronic voting machines. The conversation discusses the 2000 election, alleging voter fraud and rigging in Florida. The programmer implicates the Republican party and George W. Bush, mentioning the creation of TSA, DHS, and the Patriot Act. The conversation also mentions a consultation with the FBI and CIA about election rigging.

@NetworksManager - Bruce Porter Jr. 

Computer programmer who wrote the code to flip votes on magic electronic voting machines👇🏻 No way we can have a safe election in 2024 on the magic machines Strongly believe that we must come to Washington, DC to peacefully make change #MAGA https://t.co/U0lfHfDtOp https://t.co/W6dG0eVOpF

Video Transcript AI Summary
Clinton Eugene Curtis, a computer programmer, testified that he created a prototype program in 2000 that could secretly fix elections. The program could flip votes to any desired candidate without detection by election officials. Curtis stated that the only way to detect such a program would be to examine the source code or compare paper receipts to the actual vote totals. He also mentioned that he was asked by Tom Feeney, who was a lobbyist for Yang Enterprises and the speaker of the Florida House at the time, to design a program to rig the election. Curtis believed that the Ohio presidential election was hacked based on statistical anomalies between exit polls and tabulated results. He admitted that it would be difficult to detect the rigged software unless the machines were examined before being tampered with.
Full Transcript
Speaker 0: Mister Curtis would you please state your full name for the record? Speaker 1: Name is Clinton Eugene Curtis Speaker 0: And where do you reside? Speaker 1: Tallahassee, Florida. Speaker 0: And what is your profession? Speaker 1: I'm a computer programmer. Speaker 0: Would you please speak into the microphone so the audience can hear your testimony? I'm a computer programmer. Mister Curtis, are there programs that can be used to secretly fix elections? Yes. How do you know that to be the case? Speaker 1: Because in October of 2000, I wrote a prototype for president's congressman Tom Feeney At the company I work for in Oviedo, Florida that did just that. Speaker 0: And when you say did did just that, it would rig an election? It would flip Speaker 1: the vote 5149 Whoever you wanted it to go to and whichever race you wanted to win. Speaker 0: And would that program that you designed be something that elections officials that might be on County boards of elections could detect. They never see it. Mister, Would you answer that question once again? Speaker 1: They would never see it. Speaker 0: So how would such a program, a secret program that Graham, that, fixes the election. How could it be detected? Speaker 1: You would have to view it either in the source code or you'd have to have a receipt and then count the hard paper against the actual boat total. Other than that, you won't see it. Speaker 0: Alright. Mister Curtis, if you had been asked You or others with your professional expertise have been asked to design a protective program To that would protect the Ohio elections from against against such software to fix the election, could you have done so? Speaker 1: If we've been asked to make a program that could fix the election, sure. Anybody can do it. Speaker 0: No. Could could you have designed a program or to a procedure or a protocol that would have protected Ohio against this kind of rigging. Speaker 1: No. You have to look at the source code. You have to get probably programmers from both or all parties to look at the source code and determine if there's anything in there that shouldn't be that I mean, it's a simple program. You're adding one To a person's total, it's a 100 lines of code tops. Speaker 0: Alright. Yes, Rusty. Are you aware of whether there was any protective action in Ohio against this kind of vote ringing through software? Speaker 1: I don't know. You don't know? I don't know. Speaker 0: You were you were not asked to assist in the development of any protective system. Is that correct? Speaker 1: No. I was not. Speaker 0: In Europe, have you reviewed at all the election results in Ohio? Speaker 1: No, I haven't. Speaker 0: Given the availability of such The boat rigging software and the testimony that has been given under oath of substantial statistical anomalies, it grows These differences between exit polling data and the actual tabulated results, do you have an opinion whether or not Ohio Election the Ohio election, presidential election was hacked. Speaker 1: Yes. I would say it was. I mean, if you're if you have exit pulling data that is significantly We have to go to the Speaker 0: next level of And the testimony you've given is true. Speaker 1: Yes, sir. Speaker 0: Thank you. Speaker 1: Question back to Speaker 2: the podium? Who did you say you were asked to prepare? Speaker 1: I was asked by Tom Feeney. He's now congressman at that time. He was, speaker of the house of Florida, Yang Enterprises, which is the company I work for, lobbyists and their corporate attorney. We wore a lot of hats. Speaker 2: And at the time, he was the speaker of the House of Florida. Is that what you said? Speaker 1: Yes. Okay. Speaker 2: Thank you. Yeah. Congressman. You're saying he was the the lobbyist for the voting machine company at the same time as the speaker of the house? Speaker 1: I don't know what the building machine company is. He was a lobbyist for Yang Enterprises. We had NASA contracts and And Speaker 2: Yang Enterprises did what? Computers? Computers. Okay. And he was your lobbyist? Speaker 1: The lobbyist of that company, yes. Speaker 2: And he asked you to design a to seek to design a counterargument ratio? Yes. While he was speaker of the party house? Speaker 1: Yes. Speaker 2: This is during or previous to the 2,000 election? Speaker 1: Yes. October, end of September. Speaker 2: And did he ever express why he wanted to go to reading the election? Speaker 1: No. I immediately assumed that They were trying to keep you guys from cheating. So so I wrote up the documentation of what you would look for in the source code, how you would make sure that you didn't get, you know, taken advantage of, make sure that all voting machines had receipts because that way you could back count the ones that looked a little funny. And I handed it over Speaker 2: Are receipts you mean a paper trail? Speaker 1: Yes. Paper trail. And I handed that in to missus Yang and said, Speaker 2: here's your report. Here's your program. Speaker 1: And she said, you don't understand. We need to hide the fraud in the source In the source code. I destroyed, not revealed. Not revealed the fraud because it needed to con to control the boat in South Florida, was what she said. Speaker 2: That's what she said. To your knowledge to your knowledge, was this used? I have Speaker 1: no idea. I I was ready to leave, Speaker 2: Your testimony a moment ago, I think you said just before you left and answered the Congressman and Tony Jones' question, Would you just repeat what you said in terms of the the exit polls? Speaker 1: The exit polls should not be significantly different than the vote. Speaker 2: And if they were, you would conclude what? Speaker 1: I would conclude someone's playing with the vote. Speaker 2: Now with the exit polls? Speaker 1: That's possible too. Speaker 2: Okay. Today's why Something is definitely skewed. Something is skewed in one or Speaker 0: the other. Right. Speaker 1: Just select which one you'd have to see where the problem is. Speaker 2: One further question. Assuming for the moment that such software, That's what you thought it's such software to to rig a vote was used in 1 or more machines in Ohio or in Florida. Could you today detect that if you look at the source code? Speaker 1: If you could get the machines and they have not been patched yet I mean, once they get in and touch them, anything can happen. You can also set timers through that, but then you see the timers. Then you'd have to take those machines, Decompile them, which I couldn't do, but possibly a Microsoft, an MIT, something to do. You might you might be able to see it. You might not. This is depends on how good they are at destroying what they had.

@drjamesbjoyce - Dr. James Joyce

@NetworksManager Yes, he wrote that code in 2000. I SAW that code. So, was there anything unusual about the Florida voting in the 2000 election… when at the very last minute, GWB came from way behind and barely won Florida and the presidency… and Al Gore tried to sue him?

@NetworksManager - Bruce Porter Jr. 

@drjamesbjoyce Then the Republican held state Supreme Court shut down the lawsuit. SCOTUS refused to hear it and we got George W. Bush. Who went on setup the TSA, DHS and take away our constitutional rights with the Patriot Act, expanding FISA...and he also killed over 500,000 people in Iraq..

@drjamesbjoyce - Dr. James Joyce

Yep. Curtis said in the video who hired him to write the code… Same person who ultimately signed off on the election. Here’s the thing, though. GWB pulled off Florida (when his brother was governor). Al Gore had a much more significant voter fraud organization going than GWB and his folks flipped a lot more than Bush’s folks. If all had been square up, Bush would’ve won the presidency easily, but it took a rigging of Florida to make it happen in the rigged system. The FBI and a liaison from the CIA consulted with me (also in 2000) about the possibility of rigging an election and if elections could ever be done fairly over the Internet, etc… We did that consult in the St. Louis FBI field office. The primary Special Agent I worked with on that (A.L.) retired several years ago. The CIA asset is almost certainly still active.

View Full Interactive Feed