Pegasus project turns spotlight on spyware firm NSO’s ties to Israeli state | Israel | The Guardian

The NSO Group chief executive, Shalev Hulio

Source: Pegasus project turns spotlight on spyware firm NSO’s ties to Israeli state | Israel | The Guardian

Disclosures about political figures put Israel under increasing pressure over extent of surveillance

 in Washington,  in Jerusalem and  in Budapest

Back in 2017, few would have disputed that Israel and Saudi Arabia were regional foes. Officially, the countries had no diplomatic ties. Yet for a small group of Israeli businesspeople attending secret meetings with Saudi officials in Vienna, Cyprus and Riyadh that summer, there were signs relations were warming.

The businesspeople represented NSO Group. Their mission was to sell the Saudis NSO’s weapons–grade spyware system, Pegasus.

According to a person who attended the meeting in June 2017 in Cyprus, a senior Saudi intelligence official was “amazed” by what he saw. After a lengthy and technical discussion, the Saudi spy, who had brought a new iPhone, was shown how Pegasus could infect the phone and then be used to remotely operate its camera.

“You don’t need to understand the language to see they were amazed and excited and that they saw what they needed to,” the person said.

NSO Group had been given explicit permission by the Israeli government to try to sell the homegrown hacking tools to the Saudis. It was a classified arrangement and resulted in the sale later being sealed in Riyadh in a deal reportedly worth at least $55m.

“In Israel there is a strong political movement to make diplomacy through business,” said the person, speaking on the condition of anonymity. “Business first, diplomacy later. When you make a deal together, it opens a lot of doors to diplomacy.”

It is common for governments to help companies export their products. NSO, after all, employs former Israeli cyber-intelligence officials and retains links to the defence ministry.

Quick Guide

What is in the Pegasus project data?

Show

But revelations about how repressive states such as Saudi Arabia, the United Arab Emirates, Azerbaijan and others have used NSO’s technology to target human rights lawyers, activists and journalists raise questions for Israel and have put the issue under fresh scrutiny.

The disclosures threaten to put diplomatic pressure on Israel, amid questions over whether it is using the licensing of NSO’s spyware for political leverage – and allowing the software to be sold to undemocratic countries that are likely to misuse it.

A recent transparency report released by NSO Group acknowledged the company was “closely regulated” by export control authorities in Israel. The Defense Export Controls Agency (DECA) within the Israeli defence ministry “strictly restricts” the licensing of some surveillance products based on its own analysis of potential customers from a human rights perspective, the company said, and had rejected NSO requests for export licences “in quite a few cases”.

Moreover, NSO was also subject to an “in-depth” regulatory review by Israel on top of its own “robust internal framework”.

The Azerbaijani president, Ilham Aliyev, who in 2016 praised Benjamin Netanyahu for Israel’s close cooperation with Baku on defence industries
The Azerbaijani president, Ilham Aliyev, who in 2016 praised Benjamin Netanyahu for Israel’s close cooperation with Baku on defence industries. Photograph: Roman Ismayilov/EPA

Within NSO, the process Israel uses to assess whether countries can be sold the technology is considered a “state secret”. A person familiar with the process said officials in both Israel’s national security council and prime minister’s office had been known to give their input.

In the case of Saudi Arabia, sources familiar with the matter said the kingdom was temporarily cut off from using Pegasus in 2018, for several months, following the murder of Jamal Khashoggi, but was allowed to begin using the spyware again in 2019 following the intervention of the Israeli government.

It is unclear why the Israeli government urged NSO to reconnect the surveillance tool for Riyadh.

However, the 10 countries that the forensic analysis for the Pegasus project suggests have actually been abusing the technology all enjoy trade relations with Israel or have diplomatic ties with the country that have been improving markedly in recent years.

In two NSO client countries, India and Hungary, it appears governments began using the company’s technology as or after their respective prime ministers met the then Israeli prime minister, Benjamin Netanyahu, in high-profile encounters intended to boost trade and security cooperation. It is understood no countries that are considered enemies of Israel – such as Turkey – have been allowed to buy NSO’s wares.

Benjamin Netanyahu, left, and the Hungarian prime minister, Viktor Orbán at a signing ceremony in Budapest in 2017
Benjamin Netanyahu, left, and Viktor Orbán meeting in Budapest in 2017. Photograph: Balázs Mohai/AP

“Markets dictate what works, I don’t dictate … the only place I have actually intervened … is cybersecurity,” Netanyahu said in a press conference in Hungary in 2017 as he stood next to the country’s prime minister, Viktor Orbán.

What remains unclear is whether Israel’s intelligence agencies might have special privileges with NSO, such as access to surveillance material gathered using its spyware. One person close to the company, who asked to remain anonymous, said it was a frequent topic of speculation. Asked whether Israel could access intelligence gathered by NSO clients, they replied: “The Americans think so.”

That view was supported by current and former US intelligence officials, who told the Washington Post, a partner in the Pegasus project, that there was a presumption that Israel had some access – via a “backdoor” – to intelligence unearthed via such surveillance tools.

John Scott-Railton, a senior researcher at the Citizen Lab at the University of Toronto, said he believed it would be “irresponsible” for a state to allow the large-scale distribution of a powerful surveillance tool such as Pegasus without being able to keep an eye on what was being done with it.

He said court records had revealed that NSO used servers that were not always located on the premises of the client. “What that means is there’s the potential for visibility. And it would be crazy for them [the Israelis] not to have visibility,” he said.

NSO strongly denied that Israel had any access to its customers’ systems.

“NSO Group is a private company. It is not a ‘tool of Israeli diplomacy’; it is not a backdoor for Israeli intelligence; and it does not take direction from any government leader,” NSO’s lawyer said.

In a statement, the Israeli Ministry of Defense said Israel marketed and exported cyber products in accordance with its 2007 Defense Export Control Act and that policy decisions take “national security and strategic considerations” into account, which include adherence to international arrangements.

Q&A

What is the Pegasus project?

Show

“As a matter of policy, the state of Israel approves the export of cyber products exclusively to governmental entities, for lawful use, and only for the purpose of preventing and investigating crime and counter-terrorism, under end-use/end-user certificates provided by the acquiring government,” the ministry said.

It said “appropriate measures” were taken in cases where exported items are used in violation of export licences.

The ministry added: “Israel does not have access to the information gathered by NSO’s clients.”

For Israel, few clients whom it has approved to use Pegasus have been as problematic as Saudi. Weeks ago, NSO cut the kingdom off once more, following allegations that Saudi had used Pegasus to hack dozens of Al Jazeera journalists.

Saudi Arabia declined to comment.

 

Ep. 1565 What is Pegasus? – The Dan Bongino Show

Pegasus can infect a phone through ‘zero-click’ attacks, which do not require any interaction from the phone’s owner to succeed.

Source: Ep. 1565 What is Pegasus? – The Dan Bongino Show

What is Pegasus? This is the biggest story of the day. In this episode, I discuss the troubling revelations about this new surveillance tool.

What is Pegasus spyware and how does it hack phones?

Pegasus can infect a phone through ‘zero-click’ attacks, which do not require any interaction from the phone’s owner to succeed. Composite: AFP via Getty

NSO Group software can record your calls, copy your messages and secretly film you

 and 
Sun 18 Jul 2021 12.00 EDT

It is the name for perhaps the most powerful piece of spyware ever developed – certainly by a private company. Once it has wormed its way on to your phone, without you noticing, it can turn it into a 24-hour surveillance device. It can copy messages you send or receive, harvest your photos and record your calls. It might secretly film you through your phone’s camera, or activate the microphone to record your conversations. It can potentially pinpoint where you are, where you’ve been, and who you’ve met.

Pegasus is the hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones running either iOS or Android operating systems.

The earliest version of Pegasus discovered, which was captured by researchers in 2016, infected phones through what is called spear-phishing – text messages or emails that trick a target into clicking on a malicious link.

Quick Guide

What is in the Pegasus project data?

What is in the data leak?

The data leak is a list of more than 50,000 phone numbers that, since 2016, are believed to have been selected as those of people of interest by government clients of NSO Group, which sells surveillance software. The data also contains the time and date that numbers were selected, or entered on to a system. Forbidden Stories, a Paris-based nonprofit journalism organisation, and Amnesty International initially had access to the list and shared access with 16 media organisations including the Guardian. More than 80 journalists have worked together over several months as part of the Pegasus project. Amnesty’s Security Lab, a technical partner on the project, did the forensic analyses.

What does the leak indicate?

The consortium believes the data indicates the potential targets NSO’s government clients identified in advance of possible surveillance. While the data is an indication of intent, the presence of a number in the data does not reveal whether there was an attempt to infect the phone with spyware such as Pegasus, the company’s signature surveillance tool, or whether any attempt succeeded. The presence in the data of a very small number of landlines and US numbers, which NSO says are “technically impossible” to access with its tools, reveals some targets were selected by NSO clients even though they could not be infected with Pegasus. However, forensic examinations of a small sample of mobile phones with numbers on the list found tight correlations between the time and date of a number in the data and the start of Pegasus activity – in some cases as little as a few seconds.

What did forensic analysis reveal?

Amnesty examined 67 smartphones where attacks were suspected. Of those, 23 were successfully infected and 14 showed signs of attempted penetration. For the remaining 30, the tests were inconclusive, in several cases because the handsets had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, phones that use Android do not log the kinds of information required for Amnesty’s detective work. Three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

Amnesty shared “backup copies” of four iPhones with Citizen Lab, a research group at the University of Toronto that specialises in studying Pegasus, which confirmed that they showed signs of Pegasus infection. Citizen Lab also conducted a peer review of Amnesty’s forensic methods, and found them to be sound.

Which NSO clients were selecting numbers?

While the data is organised into clusters, indicative of individual NSO clients, it does not say which NSO client was responsible for selecting any given number. NSO claims to sell its tools to 60 clients in 40 countries, but refuses to identify them. By closely examining the pattern of targeting by individual clients in the leaked data, media partners were able to identify 10 governments believed to be responsible for selecting the targets: Azerbaijan, Bahrain, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Hungary, India, and the United Arab Emirates. Citizen Lab has also found evidence of all 10 being clients of NSO.

What does NSO Group say?

You can read NSO Group’s full statement here. The company has always said it does not have access to the data of its customers’ targets. Through its lawyers, NSO said the consortium had made “incorrect assumptions” about which clients use the company’s technology. It said the 50,000 number was “exaggerated” and the list could not be a list of numbers “targeted by governments using Pegasus”. The lawyers said NSO had reason to believe the list accessed by the consortium “is not a list of numbers targeted by governments using Pegasus, but instead, may be part of a larger list of numbers that might have been used by NSO Group customers for other purposes”. After further questions, the lawyers said the consortium was basing its findings “on misleading interpretation of leaked data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customers’ targets of Pegasus or any other NSO products … we still do not see any correlation of these lists to anything related to use of NSO Group technologies”.

What is HLR lookup data?

The term HLR, or home location register, refers to a database that is essential to operating mobile phone networks. Such registers keep records on the networks of phone users and their general locations, along with other identifying information that is used routinely in routing calls and texts. Telecoms and surveillance experts say HLR data can sometimes be used in the early phase of a surveillance attempt, when identifying whether it is possible to connect to a phone. The consortium understands NSO clients have the capability through an interface on the Pegasus system to conduct HLR lookup inquiries. It is unclear whether Pegasus operators are required to conduct HRL lookup inquiries via its interface to use its software; an NSO source stressed its clients may have different reasons – unrelated to Pegasus – for conducting HLR lookups via an NSO system.

Since then, however, NSO’s attack capabilities have become more advanced. Pegasus infections can be achieved through so-called “zero-click” attacks, which do not require any interaction from the phone’s owner in order to succeed. These will often exploit “zero-day” vulnerabilities, which are flaws or bugs in an operating system that the mobile phone’s manufacturer does not yet know about and so has not been able to fix.

In 2019 WhatsApp revealed that NSO’s software had been used to send malware to more than 1,400 phones by exploiting a zero-day vulnerability. Simply by placing a WhatsApp call to a target device, malicious Pegasus code could be installed on the phone, even if the target never answered the call. More recently NSO has begun exploiting vulnerabilities in Apple’s iMessage software, giving it backdoor access to hundreds of millions of iPhones. Apple says it is continually updating its software to prevent such attacks.

Technical understanding of Pegasus, and how to find the evidential breadcrumbs it leaves on a phone after a successful infection, has been improved by research conducted by Claudio Guarnieri, who runs Amnesty International’s Berlin-based Security Lab.

“Things are becoming a lot more complicated for the targets to notice,” said Guarnieri, who explained that NSO clients had largely abandoned suspicious SMS messages for more subtle zero-click attacks.

Pegasus: the spyware technology that threatens democracy – video
04:55
Pegasus: the spyware technology that threatens democracy – video

For companies such as NSO, exploiting software that is either installed on devices by default, such as iMessage, or is very widely used, such as WhatsApp, is especially attractive, because it dramatically increases the number of mobile phones Pegasus can successfully attack.

As the technical partner of the Pegasus project, an international consortium of media organisations including the Guardian, Amnesty’s lab has discovered traces of successful attacks by Pegasus customers on iPhones running up-to-date versions of Apple’s iOS. The attacks were carried out as recently as July 2021.

Forensic analysis of the phones of victims has also identified evidence suggesting NSO’s constant search for weaknesses may have expanded to other commonplace apps. In some of the cases analysed by Guarnieri and his team, peculiar network traffic relating to Apple’s Photos and Music apps can be seen at the times of the infections, suggesting NSO may have begun leveraging new vulnerabilities.

Where neither spear-phishing nor zero-click attacks succeed, Pegasus can also be installed over a wireless transceiver located near a target, or, according to an NSO brochure, simply manually installed if an agent can steal the target’s phone.

Once installed on a phone, Pegasus can harvest more or less any information or extract any file. SMS messages, address books, call history, calendars, emails and internet browsing histories can all be exfiltrated.

“When an iPhone is compromised, it’s done in such a way that allows the attacker to obtain so-called root privileges, or administrative privileges, on the device,” said Guarnieri. “Pegasus can do more than what the owner of the device can do.”

Lawyers for NSO claimed that Amnesty International’s technical report was conjecture, describing it as “a compilation of speculative and baseless assumptions”. However, they did not dispute any of its specific findings or conclusions.

NSO has invested substantial effort in making its software difficult to detect and Pegasus infections are now very hard to identify. Security researchers suspect more recent versions of Pegasus only ever inhabit the phone’s temporary memory, rather than its hard drive, meaning that once the phone is powered down virtually all trace of the software vanishes.

One of the most significant challenges that Pegasus presents to journalists and human rights defenders is the fact that the software exploits undiscovered vulnerabilities, meaning even the most security-conscious mobile phone user cannot prevent an attack.

“This is a question that gets asked to me pretty much every time we do forensics with somebody: ‘What can I do to stop this happening again?’” said Guarnieri. “The real honest answer is nothing.”

Ep. 2530b-The Enormity Of What Is Coming Will Shock The World,Prepare For The Shock Wave,[Zero-Day]

 

Source: Ep. 2530b-The Enormity Of What Is Coming Will Shock The World,Prepare For The Shock Wave,[Zero-Day]

The [DS]/corrupt politicians are now bracing for the shock wave. The truth and facts are coming out the people are going to wake up and understand that the election was controlled by the [DS] players. The [DS] will deploy every asset they have to stop this, prepare for [zero-day] communication blackout. The [DS] will not stop there, they will then push riots and try to make it seem like the Trump supporters became upset because Trump was not reinstated in August.  This will fail, the truth always wins.

 

Why The Vaxxed are Acting Strange – And Why it Will Get Even Worse!

Source: Brighteon

TruthAndFreedom1

“DONT CLOSE YOUR BUSINESS-NO COVID19 LAW CAN CLOSE YOUR BUSINESS LEGALLY!”
“Mandatory masks from an fake pandemic=Covid19 are just an excuse to create a reason to close all stores and physical spaces such as: Hospitals, schools, small commercial spaces, etc. imposing the next industrial era – The Internet of things.The whole plan of the false pandemic = close all physical spaces with fake videos to impose fear on the internet and on TV to keep people away from physical stores, schools, hospitals, etc. to implement the “internet of things” = Staying closed at home like cattle to do (tele work) and everything else.

 

TEXAS DOCTOR SAYS DON,T TAKE THE DEADLYJABS – THEY ARE CARCINOGENIC TO HUMANS AND IS NOT A VACCINE ! + MY COMMON SENSE SCIENCE – USE A GLUTATHIONE AS A REVERSAL CURE! FOR THE MRNA MAGNETIZED :-)

Source: Brighteon

https://www.bitchute.com/video/WsMHPUcvWqt0/
THE JAB DEATHS ARE 1 MILLION THREE HUNDRED THOUSAND AND RISING IN EUROUPE ALONE
PLEASE TALK ABOUT THIS ITS IMPORTANT FOR HUMANITY -GRAPHENE OXIDE IS POISONING THE BLOOD STREAMS OF THE VACCINATED! – WE CAN REVERSE THIS WITH GLUTATHIONE IT DEPLETES GRAPHENE OXIDES.
LOOK HOW THEY POISON YOU CHILDREN – https://www.brighteon.com/16ce23fe-0091-41f2-85f3-a6d9e41511c2

https://www.bitchute.com/video/WsMHPUcvWqt0/
ALL U NEED 2 KNOW – https://www.brighteon.com/2ffbd8f8-25dd-4a24-afaf-b65baf19135f
GRAPHENE WHAT IS IT AND WHY IS IT IN THE SHOTS JABS – https://www.bitchute.com/video/WsMHPUcvWqt0/
DR MULLINS INVENTOR OF THE PCR TEST TELL YOU THE TRUTH ON TESTING –
https://www.brighteon.com/d81faa4f-8319-4d03-a755-58b21d91711e
https://www.brighteon.com/58e34954-01fc-4809-bb1b-96497e61bd1a
https://www.brighteon.com/a37e209f-968a-43c3-ab47-56ab16cbdfbc
THE FAMOUS BLACK EYE CLUB – DO YOUR RESEARCH ON WHY ALL LEADERS HAVE THIS MARK! – BE STRONG HOLD THE LINE EVIL IS LOOSING – GOD IS THE GREATEST AND THE CHAMPION OF ALL CHAMPIONS! – HE LAYS IT OUT FOR YOU IN PLAIN SIGHT – FOR THOSE OF YOU WITH EYES TO SEE – HIDE NOT YOUR GAZE BUT LIFT UP YOUR HEARS TO GOD AND FIGHT THE GOOD FIGHT! – GOD ALWAYS WINS” REJOICE IN THY FAITH LET IT BE THY COMFORT IN THE DARK AND THY ROD AGAINST THY ENEMY’S AND YOUR WITNESS ON JUDGEMENT DAY! – HALLELUJAH – HALLELUJAH – HALLELUJAH ALL PRAISE TO THE ONE TRUE GOD THE GOD OF ABRAHAM JESUS AND MOHAMMED. YOU ARE ALL 1 – “UNITE”
Time to Love no!t Hate – but be VERY firm! and RESIST TYRANNY. – https://www.youtube.com/watch?v=lh7yZZN2oz0 LET BROTHER NELSON REMIND YOU!
REMEMBER TO SMILE – BILL GATES – https://www.brighteon.com/16e0a641-2f0a-40e9-b093-c0e35866b88d
NV – VERY CLOSE TO THE TRUTH – THE MATRIX IS UNFOLDING! – https://www.brighteon.com/dashboard/videos/0bea4f6d-2aa6-4bad-a9ad-45c9635dd1c2
URGENT PLEASE WATCH! – https://www.brighteon.com/0b675917-b18a-488a-9075-9b28a61dd7f5
AND THIS – https://www.brighteon.com/e956e6a6-9942-4d41-9f0c-8d02f9d6734b
MIKE ADAMS UPDATE – https://www.brighteon.com/ade86bd6-f794-4432-aa7e-50bbae7b28d7
INJECTION UPDATE IMPORTANT DISCOVERY – https://www.brighteon.com/007fbf34-a1d3-4b05-aed9-1286b75504a5
MIKE ADAMS INTERVIEW – CELLS https://www.brighteon.com/a7434ce1-16af-49c4-a905-cfb5ccb8717b
DR STELLA – SPIRITUAL WARFARE https://www.brighteon.com/7815b4f3-186e-44e3-8ce6-b4439da6a5d5
UNVAXXED MEN WILL BE IN HIGH DEMAND IN 2030 – UNINFECTED SPERM – https://www.bitchute.com/video/RvWwNTEvwvSI/
blood poisoning from jab – latest today – https://www.brighteon.com/2452faf3-14cc-42dc-a68c-07ba1ba03b37
astra zenica side effects sheet advice in the box – https://www.brighteon.com/356bbdbd-f56d-4e1f-89fd-73262c76f990
marc steel kate sheramani c ward – https://www.bitchute.com/video/5FAGqT5cxXKS/
uk adverse AFFECTE ASTRA ZENICA BELLS PALSY – https://www.bitchute.com/video/6tOCnToPP9x7/
MAGNACARTA https://www.brighteon.com/3ad35ea4-dd6d-47e6-804b-2d4fabfc87e5
DR SAM BAILEY THE LINK BETWEEN CANCER COVID SHOTS AND HIV – https://www.brighteon.com/d1c9045a-454a-42b9-bcf2-b4da00faa238
DR REINER FUELLMICH & DR MARTIN LATEST – COVID19 WAS A SCAM – https://www.brighteon.com/670bdad7-6700-43d4-8792-16d3eaecfcf6
MAG BITTER TRUTH – https://www.brighteon.com/43d5ef87-6b3d-497a-b1a4-38b1c6000473
DR CARRIE MADEJ LATEST ON THE SCAMDEMIC – https://www.bitchute.com/video/3zgrbFNK0oyg/
BBC USES ACTORS TO FOOL THE BRITISH PEOPLE – BBC FRAUD DISINFORMATION –https://www.brighteon.com/50504794-7729-43ce-91e7-41377a58ac77
inalienable rights and common sense – https://www.brighteon.com/bd6a06e1-38c4-4def-9afd-56a8a53dc304
BREAKING INDIA – FREQUENCIES – WHAT YOU ARE LOOKING AT IS AN ENERGY RING CONSISTING OF NANO PARTICLES OF GRAPHENE SPRAYED FROM PLANES IN THE TRAIL – BUNKER FUEL WITH A TWIST! – THE MICRO WAVES FORM AN ENERGY FIELD THE GRAPHENE STICKS TO THE ELECTRO PARTICLES – NOW! – IMAGINE WHAT THE ELECTRO CHARGE SUPER CONDUCTOR GRAPHENE IS DOING INSIDE YOUR BODY???
THATS WHY IT WAS SECRETLY HIDDEN IN THE BILLIONS OF VACCINES ALL OF THEM HAVE IT IN – NO ESCAPE WHAT EVER THE SHOT – THIS NURAL LACE TEC CAN DROP YOU LIKE A FLY – JUST CHANGE THE FREQUENCY AND YOUR TOAST JACK OR JILL THEY DONT DISCRIMINATE IN GENOCIDE YOUR ALL FAIR GAME! – FIGHT BACK NOW OR HAVE A PLANET OF CONTROLLED ZOMBIES! – NO JOKE! – ITS A BIO-WEAPON – https://www.brighteon.com/b1042523-d8b9-4509-b7d7-886587c5f1d7
france man drops dead 30 seconds after jibby jabb – https://www.brighteon.com/1fd4990d-7b23-444e-a8d6-99344fc00ec5
UK LEAKED DOCUMENT SECRET SAGE PLANS UNCOVERED – PURE EVIL -IMPERIAL COLLAGE LEAKED DOCUMENT EXPOSED -ITS ALL A SCAM! -ARREST THESE CROOKS NOW! – https://www.brighteon.com/fa71ef49-225e-4109-bf8e-c1a0bed57a46
KATE SHERAMANI – https://www.brighteon.com/b2934e8d-6658-45d3-96d4-889642e29789
CONTENTS OF THE VACCINE VILES – GRAPHENE – https://www.bitchute.com/video/WsMHPUcvWqt0/
YOUR OTHER HOMEWORK CHILDREN – https://www.brighteon.com/130a9ff7-9fa5-4f9f-9561-06fa65970f0e

Every American Needs to Hear This!

Source: Every American Needs to Hear This!

What can we do? The Biden’s Regime Federal government is NOT helping it’s citizens, it is aggressively violating OUR rights for a power grab!

Illegal Aliens = 22 million
DNC = Calling for legalization of illegal aliens
The largest gap in ANY Presidential Election was 1984 (Reagan) 17 million

This BORDER CRISIS is ONLY about a power grab by the Democrats. “Every American citizen needs to watch this.” Tim Swain https://twitter.com/SwainForSenate/status/1415515226640818179

Patriots just want aliens to come through LEGALLY! We are getting arrested but the illegal aliens are not! They are even get FREE flight transportation with OUR TAX DOLLARS!!! WAKE UP!

Contact the Governor’s office in the border state closest to YOU and ask what you can do? We are self-organizing support for the states completing the border wall (more info coming soon). The Federal government is NOT our overlord our 50 States are SOVEREIGN!

Alternatively, follow your states audit watch channel, volunteer virtually, it’s free:
America First Audits https://t.me/AmericaFirstAudits (check their pinned messages for the full list of every state)

Join President Trumps class action lawsuit (if you have been censored): http://takeonbigtech.com
General Flynn https://t.me/RealGenFlynn
Patrick Byrne https://www.theamericaproject.com
Mike Lindell https://frankspeech.com

Source, Patrick Coffin Show via The Columbia Bugle https://twitter.com/SwainForSenate/status/1415515226640818179

*For educational purposes.