Nathan Petty

103.2K posts

Nathan Petty banner
Nathan Petty

Nathan Petty

@MachoSStorage

North Texas

Inscrit le Şubat 2014
4.3K Abonnements3K Abonnés
Nathan Petty retweeté
Wall Street Apes
Wall Street Apes@WallStreetApes·
This is absolutely insane Journalist Angela Rose investigates Minnesota Rep Ilhan Omar’s consulting headquarters who claims to manage $60 billion in assets She goes into the building, walks every floor They DO NOT EXIST. (Holy Sh*t) “We are going to be infiltrating Ilhan Omar's sketchy consulting headquarters that claims that they have $60 billion in assets under their management. Yet they are located out of a co-working place called WeWork. This company is called Rose Lake Capital and it is co-owned by Ilhan Omar's husband Timothy Manette. And similar to the winery in 2023, it made up to $51,000 and it had a sudden and very suspicious increase in net worth up to $30 million in 2024” “I walked by every single office in this building and everyone has their logos proudly displayed on the wall. I asked around for Rose Lake Capital and people were not familiar with it. I looked at every logo and Rose Lake Capital did not have an office here.”
English
927
18.1K
45.3K
462.2K
Nathan Petty retweeté
@RealRightwinginit
@RealRightwinginit@DebRusso2733·
BREAKING: The Republic of Somaliland just dropped bombshell receipts on Ilhan Omar. On March 19, 2026, the official @RepOfSomaliland account posted what they claim are 2009 Minnesota marriage documents showing Ilhan Abdullahi Omar wed Ahmed Nur Said Elmi—identified as her brother. The full main tweet reads: "🧾 Receipts: Ilhan Omar’s original last name was Elmi before it was changed. This evidence was available, but the Obama Justice Department refused to investigate. Her brother, Ahmed Nur Said Elmi, and their father, Nur Said Elmi (also known as Nur Omar), used multiple names across different countries. Part of the family fled to the United Kingdom, while Ilhan Omar and others entered the United States under their father’s assumed name, “Omar.” These name changes and split identities were used to conceal the father’s true war crimes and identity. Marriage details: • Groom: Ahmed Nur Said Elmi • Bride: Ilhan Abdullahi Omar (real name Ilhan Elmi) Extradition? @TheJusticeDept @DHSgov @WhiteHouse" (The post quotes an earlier tweet from March 17: "Careful now, daughter of the Colonel… it’s all true. ALL of it. We’ve got the receipts—and they’re looking extra right now. Might be time to talk extradition… DOJ.") Attached are two scanned images purportedly showing the marriage certificate listing the groom as Ahmed Nur Said Elmi and the bride as Ilhan Abdullahi Omar, dated 2009 in Minnesota. The thread revives long-standing allegations of immigration fraud via a sham sibling marriage, first raised in 2016 and amplified by President Trump in late 2025 during his second term. It ties the claims to Omar's opposition to Somaliland recognition and her support for a unified Somalia in regional disputes—calling her "daughter of the Colonel" and pushing for DOJ extradition. Despite renewed scrutiny—including Trump rally calls, congressional subpoenas by Rep. Nancy Mace in early 2026, and reviews by Border Czar Tom Homan—no criminal charges have resulted. Omar has denied the claims as baseless and bigoted attacks. Fact-checkers like Snopes continue to rate the brother-marriage allegation as lacking solid proof. Somaliland's post looks like straight geopolitical payback: Omar backs Somalia against their independence bid. With Republicans holding power in Washington, the thread demands real answers—or real consequences.
@RealRightwinginit tweet media@RealRightwinginit tweet media@RealRightwinginit tweet media
English
12
84
227
6.8K
Nathan Petty retweeté
REPUBLIC OF SOMALILAND
REPUBLIC OF SOMALILAND@RepOfSomaliland·
“Somalia is a failed state … it’s not a nation. Got no government, got no police, got no military, got no nothing. Somalia is not even a country. They don’t have anything that resembles a country.” — Donald J. Trump
REPUBLIC OF SOMALILAND tweet media
English
9
13
63
964
Nathan Petty retweeté
Nathan Petty retweeté
The Milgram experiment had an exit door
@MachoSStorage @C__Herridge The US didn't just slide into where we are now. Trillions of dollars were spent by what is essentially a federation of organized crime mobs, within and outside the government, run by global predators with a goal to turn the world into a sick, hungry debtor's prison.
The Milgram experiment had an exit door tweet media
English
1
1
1
12
Catherine Herridge
Catherine Herridge@C__Herridge·
BREAKING: Longtime Trump Advisor @MichaelRCaputo Shares Never-Before-Seen FBI Subpoena And Search Warrant Targeting Him During Biden Administration; Alleges Biden Era Weaponization Continued at DOJ During Trump’s Second Term This week on Straight to the Point I sat down with Michael Caputo, a longtime confidant and advisor to President Trump. In this exclusive interview, Caputo shares a never-before-seen FBI subpoena and sweeping federal search warrant that targeted him during the Biden Administration. Caputo details the horrifying fallout of the secret Biden-era investigation over his Ukraine reporting and anti-weaponization policy work that stayed active even inside the Trump administration and the devastating toll it took on his family. @thelatmg @latimesstudios_ Straight to the Point: FBI’s Secret Targeting of Team Trump 00:35 Michael Caputo: Biden Era FBI ‘Surveilled’ Dozens of Trump Associates 01:28 Caputo Says He Was Targeted Over His Investigation Into Bidens and Anti-Weaponization Initiative 02:12 How Did the Biden-Era Investigation Continue Under AG Bondi? 03:10 Google Alert: FBI Subpoenaed His Records 04:29 Caputo Says He Was Working In Same DOJ Building As DOJ Investigation Targeting Him 06:00 August 2024 Susie Wiles Calls With Shocking News 06:40 Before Presidential Election, FBI Laid A Trap? 07:58 Federal Warrant Wanted Information About Caputo’s State of Mind 09:30 FBI Should Be Shattered: ‘Russia, Russia, Russia All Over Again’ 10:42 FBI File: Caputo Called A Radical Traditionalist Catholic (RTC) 11:30 Caputo 'Had To Go To The Highest Authority’ To Get Case Closed 12:44 Russia Gate Cost Caputo’s Family Everything 13:55 Threats To Caputo And Family 16:10 Accountability For RussiaGate 18:00 If Democrats Win Mid-Terms: Weaponization Will Increase 10x 19:50 Caputo: Task Force For Americans Who Were Harmed By Weaponization 20:50 Response to Critics Who Say Caputo Sees Conspiracies 21:43 Independent Journalism
English
178
2.3K
5.4K
1.7M
Nathan Petty retweeté
The Milgram experiment had an exit door
People who knew EM when he was child say that he was being groomed to usher in The Mark. What do you think XMoney is? Read that user agreement carefully, you may be signing away more than your privacy.
The Milgram experiment had an exit door tweet media
English
2
4
10
380
Nathan Petty retweeté
Walter Kirn
Walter Kirn@walterkirn·
To produce a machine that will fool all of the people all of the time -- that supposedly impossible thing -- is the very definition of the AI engineering effort. For better or for worse.
English
39
24
330
9.5K
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #20: Tweet #19 showed you how Active DNS Pythia maps every connection on the internet. How Domain Name System tunneling smuggles data inside encrypted traffic. How Neustar sat at the exact backbone junctions where election night traffic traveled. But there is one more capability we have not covered yet: The most dangerous one of all. It is called a pre-encryption endpoint agent. And it makes everything else in Tweet #19 look simple. Here is how it works in plain language. Most people think encryption works like a sealed envelope. Once your data is inside the envelope nobody can read it while it travels across the internet. That is correct. But a pre-encryption endpoint agent does not attack the envelope. It reads the letter before it ever goes into the envelope. Here is the sequence step by step. Step 1: A software agent is installed silently inside the target device. A voting tabulator. An Election Management System. A county server. Step 2: The agent sits there invisibly. Standard security scans do not detect it. Election officials do not know it is there. Step 3: When the machine processes sensitive data - vote tallies, ballot records, database entries - the agent reads it before encryption is applied. Step 4: The agent smuggles what it read out of the machine. Hidden inside perfectly normal looking encrypted traffic. Step 5: The encrypted traffic arrives at its destination. -The agent's payload is extracted and read. -The encryption was never broken. -The security logs show nothing unusual. -The data was already gone before the envelope was ever sealed. Now here is the connection that should make every American demand answers. The SolarWinds attack worked exactly this way. SolarWinds installed a software agent called SUNBURST inside target networks through a trusted software update. The agent collected data internally before encryption. Transmitted it out hidden inside normal Domain Name System queries. Made the transmission look like routine software traffic. Remained dormant for weeks before activating. Nobody detected it until it was too late. Now look at what the documents in this thread confirm. The Georgia Tech team was specifically analyzing SolarWinds SUNBURST exfiltration using their Active Domain Name System datasets. Meaning they had tools purpose built to: ✅ Detect pre-encryption agents inside target networks ✅ Identify the hidden data they were smuggling out ✅ Decode what was being transmitted ✅ Reconstruct it into readable files and records A system designed to detect pre-encryption agents necessarily reads what the agents are stealing. You cannot identify stolen data without decoding it. These same tools were pointed at Dominion Voting network traffic thirteen days before the 2020 election. Professor Angelos Keromytis identified the network data and typed: "It's Dominion Voting." Professor Manos Antonakakis saw the results and typed: "Oh, shit. These look like egress points." Egress points are the outbound data pathways. The signature a pre-encryption agent leaves behind when it transmits stolen data out of a machine. He had spent years analyzing exactly this type of activity. He recognized immediately what he was looking at. "Oh, shit." Now add Eric Coomer's own admission under oath. In the @PatrickByrne defamation lawsuit, which is still open by the way. Dominion had remote access to election equipment live during elections. Including access to the tally. Remote access means an external party was already connected inside the voting equipment. Already inside the encryption perimeter. Already reading data before it was ever sealed in the envelope. The egress points Georgia Tech found in Dominion network data thirteen days before the election are consistent with exactly this type of activity. The raw data from these observations still exists. In Georgia Tech's Active Domain Name System datasets. In Neustar's backbone infrastructure logs. In the Defense Advanced Research Projects Agency program records that Senators Grassley and Johnson demanded. In the contract records that Special Counsel Durham referred to the Department of Defense Inspector General for potential criminal investigation. The data to answer every question in this thread exists. It has not been destroyed. It has not been released. It is sitting in servers right now waiting for someone with subpoena power to demand it. Congress has that power. A grand jury has that power. The question is whether anyone in Washington has the will to use it. Item 4 on this Defense Advanced Research Projects Agency agenda: 'Active Reconnaissance data, new Tactics Techniques and Procedures.' Active Reconnaissance data from Dominion Voting networks. Collected. Stored. Never disclosed. Waiting to be subpoenaed." Right before your eyes:
Peter Bernegger tweet media
English
9
52
72
1.3K
Nathan Petty retweeté
Nathan Petty retweeté
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #19: In Tweet #18 you saw this line from DARPA Program Manager Ian Crone to Georgia Tech Professor Manos Antonakakis: "Would you, quietly, run an [REDACTED] job and grep for recent state/local/election targets?" The redacted words? Based on every other document in this collection - the DARPA planning agenda, the election devices email, the Army Cyber email chain - the redacted term is almost certainly: "Active DNS" Here is why that matters. And here is why it should terrify us all. Most people think of the internet as a series of protected tunnels. Your data goes in one end encrypted and comes out the other end safely. (And yes, there are numerous configurations) That assumption is wrong when Active DNS Pythia is involved. Let us explain what this tool actually does in plain language. The internet runs on something called the Domain Name System. Think of it as the internet's phone book. Every single device - your phone, your computer, a voting tabulator or EMS in Fulton County Georgia or Milwaukee County Wisconsin - must look up an address before it connects to anything. That lookup is a Domain Name System query. There is no way to use the internet without making Domain Name System queries. None. Probably why communist Nellie Ohr used a ham radio instead of any internet with her Fusion GPS work. Active DNS Pythia was built to capture and analyze every single one of them. Here is what makes it extraordinary - and terrifying. Normal surveillance tools sit at one point and watch traffic pass by. Active DNS Pythia does something fundamentally different. It proactively asks the Domain Name System: "What does every known domain on the entire internet resolve to right now?" -Every day. -Continuously. Building a complete, living map of the entire internet's infrastructure updated daily. Not just what passes one sensor. Everything. Then comes Reverse Mode. This is the capability Defense Advanced Research Projects Agency wanted deployed inside the Department of Homeland Security. Normal mode: Start with a known threat and map its infrastructure outward. Reverse Mode: Pick any target network - a voting machine company, a state election system, a political party - and map every single connection going into it and coming out of it. Who is accessing it. From where. At what time. Through what pathway. On what devices. In a single overnight job Professor Antonakakis identified 292 hand-verified networks linked to the Republican National Committee, the Democratic National Committee, and state and local party committees. He then proposed running Reverse Mode against all of them. Now add the layer that makes encryption irrelevant. Most people believe encryption protects their data. It does to a point - unless the data is being hidden inside Domain Name System queries themselves. This is called Domain Name System tunneling. It works like this: A normal Domain Name System query asks: "What is the address of google . com?" A Domain Name System tunnel query asks: "What is the address of [this-is-actually-stolen-tally-data-encoded-in-the-address-field].server.com?" The actual data is hidden inside the address field of the query itself. Firewalls never block it because it looks like a normal address lookup. Encryption never protects it because the data never gets encrypted — it is smuggled inside the query. The SolarWinds attack used exactly this method. And the documents confirm the Georgia Tech team was specifically analyzing SolarWinds exfiltration using their Active DNS datasets. Meaning they had tools purpose built to detect Domain Name System tunneling - decode it - and read what was inside it. A system designed to detect tunneled data necessarily reads what is being tunneled. You cannot identify it without decoding it. Now add Rodney Joffe's company Neustar. Neustar operated authoritative Domain Name System resolution for large portions of the entire internet. Meaning when a Dominion voting tabulator in Fulton County Georgia made a Domain Name System query to reach an external server - that query very likely physically passed through Neustar's infrastructure before reaching its destination. At that junction Neustar could see: ✅ The full query - source device, destination address ✅ Complete data payload if unencrypted ✅ Traffic patterns and timing if encrypted ✅ Any data encoded inside Domain Name System queries ✅ The exact timing synchronized to election night tally transmission This is not hypothetical. This is the designed function of backbone Domain Name System infrastructure. Now put it all together. Defense Advanced Research Projects Agency funds Georgia Tech to build Active DNS Pythia. Active DNS Pythia gets deployed inside the Department of Homeland Security - the agency that declares elections secure. Voting machine manufacturers are listed as authorized Reverse Mode targets eight months before the election. Ian Crone asks Manos to quietly run an Active DNS job on state and local election targets. Thirteen days before the election egress points are found in Dominion Voting network data. Rodney Joffe - Durham Report "Tech Executive One" - sits in the blind copy field of emails about the same datasets. And Joffe's company Neustar sat at the exact backbone junctions where that election night traffic traversed. This was not a research project. This was the most powerful internet surveillance tool ever built by an American university - pointed directly at the infrastructure of American elections. And the raw data it collected? Still exists. -In the Georgia Tech datasets. -In Neustar's systems. -Waiting to be subpoenaed. ACRONYM DECODER for "To talk about today" email shown here: Defense Advanced Research Projects Agency / Georgia Tech February 26, 2020 EA - Enhanced Attribution. The Defense Advanced Research Projects Agency program funding Georgia Tech to track and identify cyber attackers using internet traffic data. APT 28 - Advanced Persistent Threat 28. The United States government code name for Russian Military Intelligence hacking unit. Also known as Fancy Bear. Delphi - Georgia Tech's surveillance platform. Used to run reverse mode reconnaissance against target networks. NSA - National Security Agency. United States signals intelligence agency. Rev mode - Reverse Mode. Picks a target network and maps every connection going in and out of it. IPv4 - Internet Protocol Version 4. The addressing system that identifies every device connected to the internet. GT LOE - Georgia Tech Level of Effort. Georgia Tech's own separately funded work stream outside standard Defense Advanced Research Projects Agency program oversight. FSARC - Financial Systemic Analysis and Resilience Center. A financial sector cybersecurity organization. ADNS - Active Domain Name System. Georgia Tech's internet-wide surveillance system that maps every domain and connection on the entire internet daily. Pythia - The intelligence and attribution engine built on top of Active Domain Name System. Can identify, track, and decode network connections on any target. DDS - Defense Digital Service. The Pentagon's own internal technology unit. CIS - Center for Internet Security. Connected to the Department of Homeland Security. Responsible for protecting state and local election infrastructure. DHS - Department of Homeland Security. The federal agency that declared the 2020 election "the most secure in American history." CNMF - Cyber National Mission Force. The United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. TF Raider - Task Force Raider. A United States military cyber task force designation. Dodin - Department of Defense Information Networks. The entire military's internal computer and communications infrastructure. AR - Active Reconnaissance. Proactive scanning of target networks to identify connected devices, open pathways, and network activity. TTPs - Tactics, Techniques and Procedures. Operational methods used in cyber surveillance and attack operations. PF - Passive Fingerprinting. Identifying devices and systems by observing their network behavior without actively probing them.
Peter Bernegger tweet media
English
6
61
108
1.9K
Nathan Petty retweeté
Patrick Byrne
Patrick Byrne@PatrickByrne·
About a decade ago, I learned that the firm Mitt Romney uses to do opposition research on people, was investigating me. (a patriot inside the firm got in touch to leak it to me) Why was Mitt Romney doing opposition research on me? Any ideas?
English
81
108
598
8.6K
Nathan Petty retweeté
Tony Buzbee
Tony Buzbee@TonyBuzbee2·
When you make it to the big stage, be ready. Picture the scene. The AG of Texas on trial with twenty articles of impeachment. The entire Texas Senate is seated as the jury. The Lt. Gov. is acting as the judge. This is your time to shine. You’ve got limited time. You can’t get bogged down. This is the “impeachment” team they brought against General Paxton. It. Fell. Flat. Justice prevailed.
English
30
116
467
14.1K