- Dec 3, 2010
- 7,757
- 3,292
- 136
Mike Lindell disclosed the warrant used in the recent seizure of his cell phone.
Based on the warrant, it looks like he tried to hire someone to hack into a Dominion voting machine and steal the source code/BIOS.
Based on the warrant, it looks like he tried to hire someone to hack into a Dominion voting machine and steal the source code/BIOS.
Read FBI's Mike Lindell Search Warrant 'Items To Be Seized'
The MyPillow CEO said he had his phone seized as part of an investigation into a Colorado clerk accused of tampering with election equipment.
www.newsweek.com
I. The physical cellular telephone assigned call number [Redacted] "LINDELL CELLPHONE"; and
2. All records and information on the LINDELL CELLPHONE that constitute fruits, evidence, or instrumentalities of violations of 18 U.S.C. §§ 1028(aX7) (identity theft), 1030(aX5XA)(intentional damage to a protected computer), and/or 311 (conspiracy to cufflink identity theft and/or to cause intentional damage to a protected computer)-(the "SUBJECT OFFENSES")-those violations involving Tina Peters, Conan James Hayes, Belinda Knisley, Sandra Brown, Sherronna Bishop, Michael Lindell, and/or Douglas Frank, among other co-conspirators known and unknown to the government (the "SUBJECTS"), since November 1, 2020, including:
a. All records and information relating to damage to any Dominion computerized voting system, including any impairment to, or attempt to impair, the integrity or availability of data, a program, a system, or information:
b. All records and information relating to BIOS on any Dominion computerized voting system, including any modification to, or attempt to modify, a BIOS setting.
c. All records and information relating to the attachment of any peripheral to any Dominion computerized voting system, including any USB flash storage drive or other external storage media;
d. All records and information relating to the operation of any Optical Disc Drive on any Dominion computerized voting system, including the use or attempted use of CDs or DVDs to run software:
e. All records and information relating to any software, program, application, or code used to obtain information about the configuration. security features, contents, or vulnerabilities of any Dominion computerized voting system;
f. All records and information relating to authorization or lack of authorization to damage or modify any Dominion computerized voting system;
g. All records and information relating to any attempted or successful misappropriation, theft, conversion, transfer, or exfiltration of any proprietary hardware, software, or other data;
h. All records and information relating to Conan James Hayes' use of another person's name, photograph, credentials, or other identifying information or documents;
i. All records and information indicating the geographical location of any SUBJECT.
j. All records and information indicating the state of mind of any SUBJECT, as it relates to the SUBJECT OFFENSES discussed in the Affidavit;
k. All records and information indicating attempts by any SUBJECT to conceal an individual's involvement in the SUBJECT OFFENSES;
l. All records and information indicating the identity of any person(s)-including records that help reveal the whereabouts of the person(s)- who communicated with any SUBJECT about any matters related to the commission of the SUBJECT OFFENSES;
m. Evidence of who used, owned, or controlled the LINDELL CELLPHONE at the time the things described in this warrant were created, edited, or deleted, such as logs, registry entries, configuration files, saved usernames and passwords, documents, browsing history, user profiles, email, email contacts, chat, instant messaging logs, photographs, and correspondence;
n. Evidence of software, or the lack thereof, that would allow others to control the LINDELL CELLPHONE, such as viruses, Trojan horses, and other forms of malicious software, as well as evidence of the presence or absence of security software designed to detect malicious software;
o. Evidence of the attachment to the LINDELL CELLPHONE of other storage devices or similar containers for electronic evidence.
p. Evidence of counter-forensic programs (and associated data) that are designed to eliminate data from the LINDELL CELLPHONE:
q. Evidence of the times the LINDELL CELLPHONE was used:
r. Passwords, encryption keys, and other access devices that may be necessary to access the LINDELL CELLPHONE;
s. Volatile data and volatile memory stored in the LINDELL CELLPHONE;
t. Documentation and manuals that may be necessary to access the LINDELL CELLPHONE or applications on the LINDELL CELLPHONE, or to conduct a forensic examination of the LINDELL CELLPHONE;
u. Records of or information about Internet Protocol addresses used by the LINDELL CELLPHONE."