Mike Lindell's Spy Drone Army Will Track Your Movements on Election Day
After failing to prove 2020 election fraud, Mike Lindell plans to spy on voters with drones equipped to intercept data and disrupt cellular communications on Election Day. I wish I was kidding.
Mike Lindell is a prominent Trump ally and mega-donor to a variety of groups intent on accomplishing what they failed to do in 2020—prove systematic and widespread election fraud favoring Democrats in 2024.
Lindell faces legal troubles for his role in leaking election data on live TV in 2021, data that was stolen by MAGA activist and disgraced former Mesa County clerk Tina Peters.
Peters is now serving a 9-year prison sentence for carrying out a plot to steal 2020 election data in an attempt to prove discredited election conspiracy theories.
Will a drone-mounted WMD be tracking your movements on Election Day?
Lindell has funded the development of a device that will conduct surveillance of WiFi networks and cell phones at polling places across the country on Election Day, called a WMD. This plan to spy on voters is all in pursuit of the smoking gun that has yet to materialize—proof that US voting machines are connected to the Internet, a linchpin of Lindell’s unfounded claims of a conspiracy to systematically change vote counts.
Source: Mike Lindell Election Summit 2023, around 04:37:20
The device identifies the location of all Internet-connected devices (including cell phones) in the vicinity of voting sites.
Lindell plans to surveil polling precincts across the country with an army of drones carrying a portable device he dubs the “WMD,” locating all devices connected to the Internet (including cell phones) and uploading the data to a central command center.
Lindell says he has 5,000 of these devices, enough to blanket each swing state with an army of spy drones.
The device would then upload data to a central database controlled by Lindell’s Election Crimes Bureau,
to to be analyzed by MAGA-allied IT consultants for so-far-elusive proof of election fraud favoring Democrats.
Identifying the developers of WMD
Identical website content: Hughes Tech Group (WMD), is a near-identical copy of Blxware’s 2023 site, as well as 3Net Labs, effectively linking all 3 sites to long-time fraudster and conspiracy theorist Dennis Montgomery.
Website hosting: Tracker1 developed by 3Net Labs IP address 50.251.99.121 which is owned by Montgomery. HughesTechGroup.com IP address was identical in 2023, and is now hosted on adjacent IP address 50.251.99.123, indicating shared hosting.
Business records: 3NET Labs (formerly 3NET Systems) and Blxware both list Dennis Montgomery as officer. No business records could be found for Hughes Tech Group.
In short, 3Net Labs’ Tracker 1 and Blxware’s WMD are identical in terms of physical form, command center, and are products sold by Dennis Montgomery’s businesses.
The device labeled Tracker1 is identical to Lindell’s WMD.
At Lindell’s 2023 Election Summit, Mike Lindell and his election denialist ally Jeffrey O’Donnell offered a preview of the WMD’s capabilities.
An eagle-eyed reporter Maarten Schenk noted that the site initially loads from HughesTechGroup.com before redirecting to the Election Crimes Bureau website.
When comparing Lindell’s WMD Online Detection Viewer developed by HughesTechGroup.com IP address 50.251.99.123, the interface is nearly identical to Montgomery’s Tracker1, developed by 3Net Labs IP address 50.251.99.121.
The same footage shown by Lindell is also used in 3Net Labs’ promotional videos for Tracker1.
Despite Lindell’s claims that the WMD only performs passive network scans, the website WMD1.org shows advanced capabilities that are far more intrusive.
Lindell’s plan to passively collect voters’ sensitive data was concerning enough, but these techniques move into the realm of active cyber-attacks that can disrupt cellular and wireless connections in the target area, posing a grave threat to election security.
A company website advertising the WMD shows options for both passive and active surveillance modes. Targeting voters with passive scans on Election Day is already a legal grey area, but active scans and attacks on networks is definitely illegal any day, especially in the context of targeting US elections.
This screen allows the user to carry out advanced attacks on targeted networks (in this case, anyone in the vicinity of a polling location with a cell phone or any WiFi network in range)
Deauthenticate is an attack that forcibly disconnects all devices from a specific WiFi network. The “all” feature would attack all WiFi networks within range.
Flood attack is used to temporarily jam cellular communications by “flooding” local cell towers with fake signals. A successful flooding attack can make it impossible for users to make phone calls or send texts.
Triangulate would map the locations of all devices in the target area by measuring signal strength relative to the sensor.
Each of these attacks are advanced methods used by law enforcement and cybercriminals.
Connection to Russia
Very alarmingly, the previous owner of Tracker1.org registered the domain in Russia in 2017. The domain lay dormant for 8 years before being registered in May 2024 by the current site administrators.
It’s possible there’s no connection between the two owners. But it’s interesting that WMD’s developer, who has previously employed Russians for his company 3Net back when it was called 3Net Systems Inc., also purchased a domain name with links to Russia.
Flying advanced hacking devices on drones to spy on and even attack communication networks on Election Day sounds insane, but it’s exactly what Lindell is capable of doing.
I can’t see into the future, but if Lindell didn’t plan on carrying out attacks on election-related networks, why did he fund the development of a device that can do it with the click of a button?
Performing these attacks without authorization is illegal and violates voter privacy, especially in the context of targeting Presidential elections.
Spying on voters with advanced aerial surveillance sets a dangerous precedent for American democracy.
Election security risks include:
Voters’ movements can be tracked on Election Day through the collection of device fingerprints, unnecessarily compromising voter privacy
There’s no known method of distinguishing between voting machines and voters’ cell phones, even IF voting machines were connected to the Internet (they’re not)
Geo-targeted election disinformation - Identifying areas of high voter turnout can lead to geo-targeted online disinformation campaigns, potentially motivating election conspiracists to descend on polling locations and disrupt voting.
Surveilling voters to this degree is intimidating and can create a chilling effect that discourages voters who don’t want to be mistakenly targeted by election denialists
False positives could put innocent voters or election officials in the cross-hairs of threats or violence by angry election deniers.
If they’re built like his products we good. They will not function. Man fucks up a pillow. A fucking pillow.
Attacks like these also violate communications laws passed by Congress and enforced by FCC regulations. All 3 of them could find themselves in deep legal trouble.