Quantcast

Voter fraud and the 2020 election

Doomsday Prepper Forums - The Number One Prepper Site

Help Support Doomsday Prepper Forums:

Danil54grl

A True Doomsday Prepper
Member
Joined
Dec 29, 2012
Messages
6,364
Reaction score
19,110
Location
Texas
Code Monkey 1 of 2 videos

Watch a Dominion Representative at Gwinnett County Election Central, responsible for tabulating ballots and certifying results, download data to a USB from the Election Management Server, plug it into a laptop, manipulate the data, then palm the USB.





Be ready to immediately backup and spread these two videos.


12:11 AM • Dec 1, 2020





Watch a Dominion Representative at Gwinnett County Election Central, responsible for tabulating ballots and certifying results, download data to a USB from the Election Management Server, plug it into a laptop, manipulate the data, then palm the USB.


12:18 AM • Dec 1, 2020•





Not convinced he is a Dominion Representative? Lets take a close look at his badge.


12:19 AM • Dec 1, 2020•





Grab these videos ASAP and backup locally! They are high-risk for deletion. Thanks

@launa_usa

for closely watching this Dominion Representative all night and filming him. Thanks Neonrevolt over at Gab for helping with the vid upload.


12:22 AM • Dec 1, 2020



He downloads data from the Election Management Server onto a USB, inserts it into the external laptop, manipulates ballot scans in the file explorer, ejects the usb, palms it, distracts the people nearby, then suspiciously walks out of the room.


12:25 AM • Dec 1, 2020



Heres a closeup of the Dominion Rep's badge with the Dominion logo on the bottom right, and his official title of "County Technician".

https://twitter.com/CodeMonkeyZ/status/1333645116502810624

12:32 AM • Dec 1, 2020
 

DrHenley

Top Poster
Global Moderator
VIP Supporting Member
Member
Joined
Sep 7, 2013
Messages
11,051
Reaction score
34,307
Location
Columbus, GA USA
Brent, here is an affadavit for you to read from Dr. Navid Keshavarz-Nia.

First, let me tell you what the New York Times said about Dr. Keshavarz-Nia in an article about cyber security:
Navid Keshavarz-Nia, those who worked with him said, “was always the smartest person in the room.” In doing cybersecurity and technical counterintelligence work for the C.I.A., N.S.A. and F.B.I., he had spent decades connecting top-secret dots.

Here is his affadavit in toto. I'll have to break it up because it's too long to post in one post.
1 DECLERATION OF DR. NAVID KESHAVARZ-NIA I, Navid Keshavarz-Nia, declare as follows:
1. I am 59 years old and have been a resident of Temecula, California for one year. Previously, I resided in the Washington DC metropolitan area for nearly forty years. I have personal knowledge of the contents of this Declaration and if called as a witness, I could and would testify competently as to their truth.

2. I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University. I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).

3. I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security. During my career, I have conducted security assessment, data analysis and security counterintelligence, and forensics investigations on hundreds of systems. My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia. I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.

4. The USIC has developed the Hammer and Scorecard tools, which were released by Wiki Leaks and independently confirmed by Lt. Gen Thomas McInerney (USAF, retired), Kirk Wiebe, former NSA official and Dennis Montgomery, former CIA analyst). The Hammer and Scorecard capabilities are tradecrafts used by US intelligence analysts to conduct MITM attacks on foreign voting systems, including the Dominion Voting System (DVS) Democracy Suite and Systems and Software (ES&S) voting machines without leaving an electronic fingerprint. As such, these tools are used by nefarious operators to influence voting systems by covertly accessing DVS and altering the results in real-time and without leaving an electronic fingerprint. The DVS Democracy Suite Election Management System (EMS) consists of a set of applications that perform pre-voting and post-voting activities.

5. I have conducted data collection and forensic analysis using a combination of signals intelligence (SIGINT), human intelligence (HUMINT) and open source intelligence (OSINT) data associated with Chinese and other Foreign Intelligence Service (FIS) operators targeting US critical infrastructures. In that capacity, I have also conducted ethical hacking to support USIC missions.

6. I have performed forensic analysis of electronic voting systems, including the DVS Democracy Suite, ES&S (acquired by DVS), Scytl/SOE Software, and the Smartmatic systems used in hundreds of precincts in key battleground states. I have previously discovered major exploitable vulnerabilities in DVS and ES&S that permit a nefarious operator to perform sensitive functions via its built-in covert backdoor. The backdoor enables an operator to access to perform system updates and testing via the Internet without detection. However, it can also be used to conduct illicit activities such as shifting votes, deleting votes, or adding votes in real-time (Source: DVS Democracy Suite EMS Manual, version 5.11-CO::7, P.43). These events can take place through the Internet and without leaving a trace.

7. During my career, I have studied network communication reports that show DVS data being transferred to Internet Protocol (IP) addresses registered to Scytl in Barcelona, Spain. The results showed that Scytl maintained its SOE Software servers in a Barcelona data center for disaster recovery and backup purposes. In 2020, the SOE Software data center was moved to Frankfurt Germany where I believe 2020 election data was transferred.

continued...
 

DrHenley

Top Poster
Global Moderator
VIP Supporting Member
Member
Joined
Sep 7, 2013
Messages
11,051
Reaction score
34,307
Location
Columbus, GA USA
continuation...
8. Dominion Voting Systems (DVS) Corporation was founded in 2003 in Toronto, Ontario, Canada, by John Poulos and James Hoover. The company develops proprietary software and sells electronic voting hardware and software, including voting machines and tabulators, throughout the United States and other parts of the world. DVS reportedly had a strategic relationship with Venezuela’s Bitza Corporation, which was 28% owned by the former President Chavez. Intelligence reports indicate that the DVS/Bitza software was co-developed in Venezuela to alter vote counts to ensure President Chavez (and later, President Maduro) were guaranteed to win an election. The combined DVS/Bitza software was used in numerous countries such as Bolivia and Philippines to forge election results to favor a specific candidate. Subsequently, DVS and its international partners, including Diebold/ES&S (later acquired by DVS), Scytl, SOE Software/eClarity and Smartmatic to establish a global monopoly.

9. Reports show that DVS is comprised of several companies which obfuscate its true organizational and ownership structures. The DVS companies include: 1) Dominion Voting Systems International Corporation, a Barbados corporation; 2) Dominion Voting Systems, Inc., a Delaware corporation; and 3) Dominion Voting Systems Corporation, a Canadian corporation. Similarly, Smartmatic is comprised of: 1) Smartmatic International Corporation, a Barbados corporation; 2) Smartmatic USA Corporation, a Delaware corporation; 3) Smartmatic International Holding B.V, a Netherlands corporation; and 4) Smartmatic TIM Corporation, a Philippines corporation. Based on my counterintelligence experience in USIC, I conclude that corporate structures were partially designed to obfuscate their complex relationships, especially with Venezuela, China and Cuba; and impede discovery by investigators.

10. According to NT Times, in April 2018, J. Alex Halderman from University of Michigan computer scientist demonstrated in a video how simple it is to rig a DVS machine. In the video, Dr. Halderman demonstrates how easy it is to rig the DVS machine. The name of the video is “I Hacked an Election. So Can the Russians.” A caption next to the title read “It’s time America’s leaders got serious about voting security.” (Source: Washington Journal: J. Alex Halderman Discusses Election Security)

11. Despite DVS’s constant denial about the flaws of its systems, the company’s ImageCast Precinct optical scanner system was totally hacked in August 2019. This occurred during the largest and most notable hacker convention, called DEFCON Voting Machine Hacking Village in Nevada. The DVS ImageCast Precinct is an integrated hybrid voting equipment by combining an optical paper ballot and ballot marking device to allow accessibility for the visually impaired. The system runs the Busybox Linux 1.7.4 operating system, which has known medium to high level exploitable vulnerabilities to allow remote attackers to compromise the VDS. (J. Moss, H. Hurtsi, M. Blaze et al., Voting Village Report, DEFCON Village Report in association with and Georgetown University Law Studies; Online Source: https://media.defcon.org/DEF CON 27/voting-village-report-defcon27.pdf). The report indicated that “many of the specific vulnerabilities reported over a decade earlier (in the California and Ohio studies, for example) are still present in these systems today (A. Padilla, Consolidated report by California Secretary of State, Top-to-Bottom Review summary and detailed report, Page 4 (Online Source: Top-to-Bottom Review :: California Secretary of State)

12. In 2019, a computer laptop and several USB memory cards containing the cryptographic key to access DVS systems were stolen in Philadelphia. The company disputes the risks posed by lost USB memory cards containing the cryptographic key. However, according to the election security expert Eddie Perez of the nonpartisan OSET Institute states “it is very common that a USB memory card has a wealth of information that is related not only to the configuration of the election and its ballot — and the behavior of the voting device — but also internal system data used to validate the election.” I have previously analyzed the contents of the DVS and other voting system cryptographic keys. I believe that USB memory cards were used to facilitate administrative access to the backdoor to disrupt polling operations and impact ballot counting across MI, GA, PA, AZ and WI.

13. In 2018, NY Times conducted an investigation and concluded that DVS machines can be easily hacked. Subsequently, security experts conducted comprehensive security testing on DVS in August 2019 and discovered innumerable exploitable vulnerabilities that do not require extensive technical skill to breach. The DEFCON report identified major exploitable security flaws in DVS that were shared with the vendor. However, there is ample indication that these problems were not resolved. Moreover, DVS maintains the position that its voting machines are fully secure. They continue to avoid transparency or make their software codes to be analyzed by independent security investigators. In turn, December 2019, Senators Elizabeth Warren, Ron Wyden and Amy Klobuchar, along with Democratic Representative Mark Pocan raised major concerns regarding security vulnerabilities in DVS machines.

14. In my expert opinion, the combination of DVS, Scytl/SOE Software/eClarity and Smartmatic are vulnerable to data manipulation by unauthorized means. My judgment is based on conducting more than a dozen experiments combined with analyzing the 2020 Election data sets. Additionally, a number of investigators have examined DVS and reported their security findings (J. Schwartz, Scientific American Journal, 2018; DEFCON 2019; L. Norden et. al, America’s Voting Machines at Risk, Brennan Center for Justice, NYU Law, 2014) confirming that electronic voting machines, including DVS have glaring security weaknesses that have remained unresolved.

continued...
 

DrHenley

Top Poster
Global Moderator
VIP Supporting Member
Member
Joined
Sep 7, 2013
Messages
11,051
Reaction score
34,307
Location
Columbus, GA USA
continuation...
15. I have not been granted access to examine any of the systems used in the 2020 Election. However, I have conducted detailed analysis of the NY Times data sets and have discovered significant anomalies are caused by fraudulent manipulation of the results. In my expert judgment, the evidence is widespread and throughout all battleground states I have studied. I conclude the following: a. The vote count distribution in PA, WI, MI, AZ, NV, and GA are not based on normal system operation. Instead, they are caused by fraudulent electronic manipulation of the targeted voting machines. b. On approximately 2:30 AM EST, TV broadcasts reported that PA, WI, AZ, NV and GA have decided to cease vote counting operations and will continue the following day. The unanimous decision to intentionally stop counting by all 5 battleground states is highly unusual, possibly unprecedented and demonstrates prior coordination by election officials in battleground state. There would be no legitimate reason battleground states need to pre-coordinate election activities and stop on-going adjudication processes. However, is equally puzzling that the vote counting did not stop, as reported. In fact, it continued behind closed doors in early hours of November 4, 2020. This activity is highly unusually and demonstrates collusion to achieve desired results without being monitored by watchers. c. When analyzing the NT Times data for the 2020 election, I conclude that the software algorithm manipulated votes counts forging between 1-2% of the precinct results to favor Vice President Biden. The software performed data alteration in real-time in order to maintain close parity among the candidates and without raising red flags. The specific software algorithm was developed by Smartmatic and implemented in DVS machines to facilitate backdoor access by a nefarious operator to manipulate live data, as desired. d. The DVS Democracy Suite’s ImageCast Central optical scanner failed to correctly verify and validate absentee ballots, as described in its own literature. There is reported evidence that the optical scanner accepted and adjudicated ballots that did not have signatures or other key features that is required for ballot validation and verification. This indicates that the DVS system configuration was modified to accept invalid ballots when they should have been rejected. e. After the DVS ImageCast scanner validates a ballot, by design, it is required to tabulate and store the results in a cast vote record along with a human-readable image of the ballot that has been scanned. The image, called AuditMark provides the user with scanned results that is verifiable. However, media reports indicate that not only did the ImageCast fail to properly verify absentee ballots; it also failed to maintain records of the AutitMark that would be necessary to conduct an audit. The only way to alter this protocol is to alter the system configuration and prevent the ImageCast scanner from rejecting illegal ballots; and reprogram AuditMark to store ballot image that could be verified. This is evidence of fraud perpetrated to prevent investigators to discover the number of invalid votes that were cast. f. The cryptographic key store on DVS thumb drive (reported stolen in Philadelphia) was used alter vote counts prior to up chain reporting. Since DVS uses the same cryptographic key for all its voting systems in all battleground states, the key allowed a remote operator to conduct massive attacks on all battleground state data set without being detected. g. Beginning on approximately 4:30 AM EST on November 4, 2020, the vote counts favored Vice President Biden by nearly 80% in many jurisdictions. The data distribution is statistically congruent, even when considering a larger number of absentee ballots were collected for Vice President Biden. h. The data variance favoring Vice President continues to accelerate after 4:30 AM EST on November 4, 2020 and continues until it momentum through November 9, 2020. This abnormality in variance is evident by the unusually steep slope for Vice President Biden in all battleground states on November 4, 2020. A sudden rise in slope is not normal and demonstrates data manipulation by artificial means. For example in PA, President Trump’s lead of more than 700,000 count advantage was reduced to less than 300,000 in a few short hours, which does not occur in the real world without an external influence. I conclude that manually feeding more than 400,000 mostly absentee ballots cannot be accomplished in a short time frame (i.e., 2-3 hours) without illegal vote count alteration. In another case for Edison County, MI, Vice President Biden received more than 100% of the votes at 5:59 PM EST on November 4, 2020 and again he received 99.61% of the votes at 2:23 PM EST on November 5, 2020. These distributions are cause for concern and indicate fraud. i. DVS has acknowledged that Chinese made parts are used in its voting machines. However, the company is unwilling to share details on its supply chains, foreign ownership, or its relationship with China, Venezuela and Cuba. In particular, I have seen USIC intelligence reports showing China’s espionage activities in the United States and efforts to infiltrate elections. Since these countries are our enemies, I conclude that FIS and other operators were involved to influence the outcome of the 2020 election. j. A Man-in-the-Middle (MITM) cyber attack was carried out by covert operators using sophisticated tools, such as Hammer and Scorecard. The MITM attack occurred in two ways. Initially, remote operatives used USB memory cards containing cryptographic keys and access system backdoors to alter votes in battleground states. Subsequently, the results were forwarded to Scytl/SOE Software servers located in Frankfurt, Germany (previously, Barcelona, Spain). The MITM attack was structured to ensure sufficient data alteration had occurred prior to forwarding the tallied results to the Scytl/eClarity Software Electronic Night Reporting (ENR) system. The reason election data are forwarded overseas is to avoid detection and monitoring by the USIC to obfuscate the MITM. k. In my expert opinion, the DVS Democracy Suite, Scytl/SOE Software/eClarity and Smartmatic have not produced auditable results in the 2020 election. It is evident that ballots were not properly validated, system records were not kept, and the system experience considerable instability even several days prior to November 4, 2020 that require DVS to implement software changes at the last minute. In addition, the disparity in data distribution after 4:30 AM on November 4, 2020 indicates significant systemic anomalies that were widespread among all battleground states. The evidence is both extensive and persuasive and indicates large-scale fraud by remote operators.

16. I conclude that a combination of lost cryptographic key contained on stolen USB memory cards, serious exploitable system and software vulnerabilities and operating system backdoor in DVS, Scytl, SOE Software/eClarity and Smartmatic created the perfect environment to commit widespread fraud in all states where these systems are installed. My analysis of the 2020 Election from NY Times data shows statistical anomalies across the battleground state votes. These failures are widespread and systemic - and sufficient to invalidate the vote counts.

17. I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible. Pursuant to 28 U.S.S. 1746, I declare under penalty of perjury under the laws of the United States of America that the foregoing is true and correct to the best of my knowledge. EXECUTED ON: November 25, 2020 By: Navid Keshavarz-Nia, Ph.D., Ed.D. Case 2:20-cv-13134-LVP-RSW ECF No. 1-19,
 

Danil54grl

A True Doomsday Prepper
Member
Joined
Dec 29, 2012
Messages
6,364
Reaction score
19,110
Location
Texas

Danil54grl

A True Doomsday Prepper
Member
Joined
Dec 29, 2012
Messages
6,364
Reaction score
19,110
Location
Texas
continued story
Report: Democrats face voter fraud allegations after ballot review by Dem judge erased Republican lead

Democrats are reportedly facing voter fraud accusations in an extremely tight New York congressional race that resulted in a Republican candidate having her lead over a Democratic incumbent completely erased, the Washington Examiner reported.
What are the details?

On election night, freshman Democratic Rep. Anthony Brindisi (N.Y.) trailed Republican challenger Claudia Tenney by over 28,000 votes. Then, as mail-in ballots were counted over the coming weeks, Brindisi's deficit was erased, and he trailed Tenney by just 100-200 votes, the Examiner noted.

That's when Oswego County state Supreme Court Justice Scott DelConte, a Democrat, intervened, reviewing "spoiled" ballots that had been initially rejected, which gave Brindisi the lead — by just 13 votes.

"BREAKING: sources on both Dem & GOP sides confirm that the final counts submitted by all 8 counties in #NY22 to NY Supreme Court Justice Scott DelConte will show Rep. Anthony Brindisi (D) *ahead* of Claudia Tenney (R) by either 12 or 13 votes. Wow," Cook Report's Dave Wasserman reported following the development.

"In NY-22, the Democrat incumbent was trailing by almost 30K on election night. The mail-in ballots got him close. Then a Democrat judge from Syracuse ruled he would personally 'review' all of the spoiled ballots that had been rejected. Guess what happened next," Hot Air editor Jazz Shaw explained. "The judge miraculously 'found' enough ballots that he felt were okay and the incumbent now 'leads' by 13 votes."
How did the campaigns respond?

Despite the narrow gap, Brindisi responded to the judge's actions by declaring victory.

"This process and the integrity of our election are critical to our republic. This judicial review has been fair, open, honest, and transparent and I remain confident that voters' voices will be heard," Brindisi said. "In January I will be sworn in and continue to work with both parties and stand up to anyone on behalf of all of New York's 22nd district."

Meanwhile, Tenney's campaign explained in a statement they essentially believe that voter fraud gave Brindisi the edge.

Campaign spokesman Sean Kennedy said, according to WSTM-TV:

Governor Cuomo's unfair, unwise, and unilateral rules changes and administrative burdens overwhelmed our voting system and created this utter dysfunction. As a result, the law was not followed when ballots were challenged and tabulated in this election. The result remains far from resolved. Hundreds of ineligible ballots were illegally or improperly cast including votes by the dead, non-residents, or unregistered voters. Those ballots should not – and must not – be counted. The hearing in court has already established that the current tally includes invalid votes and that the process to review and count the massive amount of paper ballots is fractured. Today's misleading and inaccurate tally is rife with errors and mistakes that must be rectified before this election is certified. It is far from final. Our team will fight to ensure the rights of every voter who cast a legal and proper ballot are preserved and not diluted. We cannot sacrifice accuracy for speed. When that is done, we feel strongly that Claudia Tenney will be certified the winner of the race for the 22nd District of New York.

Report: Democrats face voter fraud allegations after ballot review by Dem judge erased Republican lead
 

robinjopo

A True Doomsday Prepper
Member
Joined
Nov 27, 2015
Messages
5,579
Reaction score
17,356
Location
Tennessee
These people involved in the fraud have no idea how bad it is. They have never seen anyone tried for their crimes except for Ames but that was years ago. They need to find out what happens when you plot against the U.S. Gitmo haa been expanded, so let's fill her up and execute a few too.
 

Danil54grl

A True Doomsday Prepper
Member
Joined
Dec 29, 2012
Messages
6,364
Reaction score
19,110
Location
Texas
Looks like this is the beginning, order is strange. A more complete version?

I. My name is Mellissa A. Carone, I was contracted by Dominion Voting Services to do IT work at the TCF Center for the November 3, 2020 election, and I am a resident of Wayne County.

2. I arrived at the TCF Center at approximately 6: 15 AM November 3, 2020 and worked until 4:00 AM November 4, 2020. I went home to get some sleep, then arrived back at the TCF Center at I 0:00 AM in which I stayed until 1 :45 PM. During this time I witnessed nothing but fraudulent actions take place.

3. The counters (which were trained very little or not at all), were handed a "batch" (stack of 50) of mail-in ballots in which they would run through the tabulator. The tabulators would get jammed 4-5 times an hour, when they jammed the computer would put out an error that tells the worker the ballot number that was jammed and gives an option to either discard the batch or continue scanning at which the counter should discard the batch, put the issue ballot on top of the batch and rescan the entire batch. I witnessed countless workers rescanning the batches without discarding them first which resulted in ballots being counted 4-5 times.

4. At approximately midnight I was called over to assist one of the counters with a paper jam and noticed his PC had a number of over 400 ballots scanned- which means one batch was counted over 8 times. This happened countless times while I was at the TCF Center. I confronted my manager, Nick Ikonornakis saying how big of a problem this was, Nick told me he didn't want to
hear that we have a big problem. He told me we are here to do assist with IT work, not to run their election.

5. The adjudication process, from my understanding there's supposed to be a republican and a democrat judging these ballots. I overheard numerous workers talking during shift change in which over 20 machines had two democrats judging the ballots-resulting in an unfair process.

6. Next, I want to describe what went on during shift change, it was a chaotic disaster. It took over two hours for workers to arrive at their "assigned areas", over 30 workers were taken upstairs and told they didn't have a job for them to do. These people were chosen to be counters, in which 6 workers admitted to me that they received absolutely no training at all.

7. The night shift workers were free to come and go as they pleased, they could go out and smoke from the counting room. This is illegal, as there were boxes and stacks of ballots everywhere, anyone could have taken some out or brought some in, and No one was watching them.


8. There was two vans that pulled into the garage of the counting room, one on day shift and one on night shift. These vans were apparently bringing food into the building because they only had enough food for not even 1/3 of the workers. I never saw any food corning out of these vans, coincidently it was announced on the news that Michigan had discovered over 100,000 more ballots- not even two hours after the last van left.

9. When a worker had a ballot that they either could not read, or it had something spilled on it, they would go to a table that had blank ballots on it and fill it out. They were supposed to be filling them out exactly like the one they had received but this was not the case at all. The workers would also sign the name of the person that the ballot belonged to-which is clearly illegal.


IO. Samuel Challandes and one more young man in his mid-20 were responsible for submitting the numbers into the main computer. They had absolutely no overhead, my manager Nick would assist them with any questions but Nick was on the floor assisting with IT most of the time.

11 . There was a time I overheard Samuel talking to Nick about losing tons of data, they all got on their phones and stepped to the side of the stage. I asked Nick what was going one and he told me it was all taken care of and not to worry about it. I fully believe that this was something very crucial that they just covered up.

12. I was the only republican working for Dominion Voting, and on the stage there was many terrible comments being made by the city workers and Dominion workers about republicans. I did not give out any indication that I was a republican, I have a family at home and knew I was going to have to walk to my car at the end of my shift. If anyone had an American flag on their shirt or mask, they were automatically deemed to be Trump supporters.

13 . I called the FBI and made a report with them, I was told that I will be getting a call back.

14. I am doing my best to make sure something is done about this, I was there and I seen all of this
take place.

https://www.greatlakesjc.org/wp-content/uploads/Supplemental-Brief-Motion-for-TRO-Costantino.pdf
 

Latest posts

Top