Pat1776

237.4K posts

Pat1776

Pat1776

@Matka1776

EVIL ONLY THRIVES IN DARKNESS! Expose everything…bring it into the light! Stay united and hold the line…God wins!!!

Katılım Temmuz 2016
4.6K Takip Edilen3.4K Takipçiler
Pat1776
Pat1776@Matka1776·
@PeterBernegger Did you look at the Congress members cc’d on the letter? That should be a red flag! Both are Democrats from consistently blue states.
English
0
0
2
25
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #14: What you have read in this thread is not new to everyone. Two United States Senators already knew. And Special Counsel John Durham already knew. Here is what they found and what they did about it. United States Senator Chuck Grassley of Iowa and United States Senator Ron Johnson of Wisconsin uncovered email evidence of Professor Manos Antonakakis's Defense Advanced Research Projects Agency funded work. What they found in those emails stopped them cold. A Defense Advanced Research Projects Agency employee - referring to the Georgia Tech operation - wrote this: "Sensitive stuff worth doing." Same Defense Advanced Research Projects Agency (DARPA) employee. Same email chain. Same date as the United States Postal Service swing state scanning email — September 25, 2020: "I know who to talk to if we find anything." Not "I know who to report it to." Not "I know who to alert." But "I know who to talk to if we find anything." That is not the language of a defensive cybersecurity operation protecting elections. That is the language of an intelligence operation with a predetermined recipient for whatever was found inside American voting infrastructure. Who was that person? That question has never been answered publicly. Now add this. Special Counsel John Durham completed his investigation in May 2023. In his final report Durham made a criminal referral to the Department of Defense Inspector General. That referral specifically identified: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. The Defense Advanced Research Projects Agency. Georgia Tech. A specific contract. Referred for potential criminal investigation. Durham found something significant enough in that contract to send it to the Department of Defense's own internal investigator. The Department of Defense Inspector General received that referral. What happened next has never been made public. -No findings were announced. -No charges were filed. -No report was released. -The referral vanished. Now look at what you have seen in this thread: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers. Active surveillance of Dominion Voting network traffic thirteen days before the election. Egress points found in voting machine infrastructure. Russian and Iranian command and control confirmed in state and local election networks. An Army unit trained on the surveillance weapon used to do all of this. We caught the US Army inside a Dominion EMS. A Defense Advanced Research Projects Agency employee who knew exactly "who to talk to" if anything was found. And a Special Counsel referral to the Department of Defense Inspector General that quietly disappeared. Two United States Senators saw enough to raise alarms. The top prosecutor in America saw enough to make a criminal referral. You were never told any of it. Look at what US Senators Ron Johnson and Chuck Grassley were after in their (second) letter to DARPA:
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
11
160
259
4.1K
Pat1776 retweetledi
The Researcher
The Researcher@listen_2learn·
Like Norm Eisen, Russia collision criminal Marc Elias is very excited about the destructive Susie Wiles making it next to impossible to prosecute him and all of his fellow criminals. Democrats live in a different reality where a sitting senator, Sheldon Whitehouse, says that republicans are liars while talking to Russia collusion criminal Marc Elias who engaged in an attempted coup of Trump 1.0 based in large part on lies. Dummy Whitehouse also said that Lindsey Halligan brought fake indictments against Russia collusion criminal James Comey and Norm Eisen’s lawfare partner Leticia James. Trump needs to fire Susie Wiles and Pam Bondi or they are going to destroy his presidency (if they haven’t already done so). He needs to bring in an AG who is competent and knows how to break through the Russia collusion disinformation that has been fed to millions of people (including judges) for almost ten years. It was previously reported that the hapless Pam Bondi doesn’t even know the truth. What a mess.
English
31
129
261
31.9K
Pat1776 retweetledi
Svetlana Lokhova
Svetlana Lokhova@RealSLokhova·
Elias should be jail JAILED The SC Durham team had built all the evidence against Elias, as a co-conspirator in the plot against President Trump. I know this because I worked with the Durham investigation. Durham got shut down during Obama’s third term. The DoJ can easily charge Elias now, all the evidence is there and it’s prosecutable Every day the coup plotters remain at liberty, the risk to your democratic Republic grows exponentially
The Mel K Show@MelKShow

Does anyone know who chose @marceelias to be in charge of the elections in our country? Why is he endlessly filing lawsuits as if he represents We the People? The guy is the guru behind the Russia Hoax and Hillary’s fake dossier. He should have lost his law license years ago.

English
35
940
2.2K
23.6K
Pat1776 retweetledi
The SCIF
The SCIF@TheSCIF·
James Comey was involved in the fraudulent intelligence assessment that Russia was helping President Trump in the 2016 election, and now he must suffer the consequences.
English
24
198
663
6.7K
Pat1776
Pat1776@Matka1776·
@StephenM Probably, the same House Representatives who vote to fund these criminal activities and refuse to make the DOGE cuts. Follow the money and make arrests, even if it means arresting Congress members who “benefit” from these funds.
English
0
1
1
11
Pat1776 retweetledi
Tony Seruga
Tony Seruga@TonySeruga·
🚨 Judge Strikes Down 10 Commandments Display I’ll say it again and keep saying it. We should take a page from El Salvador President Nayib Bukele: "The first thing we did to save our country was to impeach and remove all of the corrupt Judges..." 🎯 These are the kinds of activist judges that need to be removed! LFG! Maybe it's past time to begin rounding up the judges and see just how committed they are to their judicial activism! #selection-271.19-271.83" target="_blank" rel="nofollow noopener">archive.is/Ks7MW#selectio
Tony Seruga tweet media
English
50
646
1.2K
10.4K
Pat1776
Pat1776@Matka1776·
Senator Johnson seems to be a pivotal Congress member in the performance of election fraud investigations. However, similar to his Covid hearings, nothing effective came of his knowledge within the Congress or within the rest of the federal government. “Why?” Is the key question to which many Americans have deduced an answer since 2020.
Emerald Robinson ✝️@EmeraldRobinson

64. Among the US Senators who were briefed were Sen. Kevin Cramer (R-N.D.) & Ron Johnson (R-Wis.). Several NSC officials also got the documents. Neither Cramer nor Johnson nor Trump's NSC officials tried to authorize the investigation outlined in the docs.

English
0
0
1
56
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #17: This email attached was written at midnight. March 30, 2020. Professor Manos Antonakakis was still working. He wrote this to his Defense Advanced Research Projects Agency handlers Christopher Schneck and Ian Crone: "Despite all that, we still have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Read that sentence one more time. --Russian command and control activity. --Iranian command and control activity. --Inside state and local government networks. --Networks his own analysis identified as potentially election related. Command and control is not passive observation. It is not reconnaissance. It is not probing. Command and control means a foreign adversary had established an active operating presence inside those networks. Sending instructions. Receiving data. Running operations. From inside networks connected to American elections. And Professor Antonakakis was not uncertain about it. He wrote "more than enough evidence." Not "possible evidence." Not "indicators suggesting." More than enough. Then he wrote something that should make every American stop cold. He compared the people questioning his findings to a doctor who refuses to diagnose a patient because the doctor lacks the right instrument. His exact words: "If they think this is not worth worrying about because they do not have an Albert sensor, then their argument is similar to this statement: I do not have Covid-19 because the doctor didn't have a way to diagnose it." Translation: Someone in the government was telling him his evidence was not valid because it did not come from their own official sensors. He was pushing back. He was telling them: the disease is there whether your instrument sees it or not. Russia and Iran were operating inside election related government networks. Georgia Tech could see it. The government's own sensors could not. Or would not. Now add what Defense Advanced Research Projects Agency Program Manager Ian Crone wrote in the same chain: "That is probably needed to get the Department of Homeland Security to believe us." The Department of Homeland Security. The agency responsible for protecting American elections. The agency that declared 2020 "the most secure election in American history." Defense Advanced Research Projects Agency was struggling to get the Department of Homeland Security to believe their own findings about foreign adversary activity in election networks. And later in the same email chain Antonakakis wrote this: "There is a group that has successfully penetrated these networks." Successfully penetrated. Not attempted. Not probed. Successfully penetrated. The names of who penetrated those networks are hidden behind black redaction bars. To this day nobody outside a classified setting knows whose names are under those bars. Here is the timeline you now have from this thread alone: February 2020 - Defense Advanced Research Projects Agency plans surveillance of voting machine manufacturers. March 2020 - Russian and Iranian command and control confirmed in election related networks. A foreign group confirmed to have successfully penetrated those networks. September 2020 - Defense Advanced Research Projects Agency employee writes "I know who to talk to if we find anything." October 21, 2020 - Dominion Voting egress points found in network data. Same day the man who found them is named to Georgia's official election security task force. November 3, 2020 - You voted. May 2023 - Special Counsel Durham refers the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation. Today: No findings. No charges. No public report. Complete silence. Russia and Iran were inside election related networks. Georgia Tech found them. The Department of Homeland Security declared the election the most secure in history. Durham referred the contract for criminal investigation. Washington went silent. Durham referred the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation in May 2023. It has now been nearly two years. No findings. No charges. No public report. Someone needs to explain that silence. Tag your Senator. @SenRonJohnson @ChuckGrassley More in the morning. Thanks again to @TheAndersPaul for his tenaciousness in obtaining records for five years!
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
17
102
168
2.9K
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #16: Special Counsel John Durham spent four years investigating what happened to American elections. His final report was delivered to Congress in May 2023. Inside that report was a criminal referral. Not to the Department of Justice. Not to the Federal Bureau of Investigation. To the Department of Defense Inspector General. The internal watchdog of the entire United States military. The referral identified one specific matter: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. Durham had reviewed the Defense Advanced Research Projects Agency contract with Georgia Tech and found something significant enough to send to the Department of Defense's own internal investigator for potential criminal review. Not a footnote. Not a passing mention. A formal referral. Now look at what you have seen in this thread about that exact contract: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers eight months before the election. The Pythia surveillance weapon deployed inside the Department of Homeland Security before the election. Active reconnaissance jobs running against Dominion Voting network infrastructure thirteen days before the election. Egress points found in Dominion Voting network data. United States Army soldiers trained on the surveillance weapon at Georgia Tech's campus. Central Command military network data handed to a civilian university professor for analysis. Russian and Iranian command and control confirmed in election related state and local government networks. A Defense Advanced Research Projects Agency employee writing "I know who to talk to if we find anything." And the man who found egress points in Dominion Voting data named to Georgia's official election security task force on the very same day. Durham saw enough in that contract to make a criminal referral to the Department of Defense Inspector General. Here is what happened next: Nothing. -No findings were announced. -No charges were filed. -No public report was released. -The referral was received. -Then it vanished. The Department of Defense Inspector General has never publicly addressed it. The Defense Advanced Research Projects Agency has never publicly addressed it. Nor Georgia Tech, and Congress never held a single public hearing about it. Think about what that means. The top prosecutor in America found something troubling enough in a Defense Advanced Research Projects Agency contract with a university to formally refer it for potential criminal investigation. And every single institution that received that referral went silent. Durham found it. The Department of Defense Inspector General received it. Washington buried it. There is only one question left. Who had the power to make a Special Counsel criminal referral disappear - and why did they use it? Emails obtained by Patriot @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
34
406
648
11.6K
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #15: Pay close attention to this date. October 21, 2020. You have already seen what happened on that date in Tweet #13. Georgia Tech Professor Angelos Keromytis was running Defense Advanced Research Projects Agency surveillance on voting machine manufacturer networks. He identified Dominion Voting in the network data. His colleague Professor Manos Antonakakis typed "Oh, shit. These look like egress points." See prior tweet. That was October 21, 2020. Now here is what else happened on that exact same date. Georgia Secretary of State Brad Raffensperger issued a press release. He was forming an official government body called the Georgia Bipartisan Task Force for Safe, Secure, and Accessible Elections. Among the confirmed participants listed in that press release: "Professor Angelos Keromytis. Georgia Institute of Technology." The same professor. The same day. On the morning of October 21, 2020 Angelos Keromytis was identifying Dominion Voting egress points in Defense Advanced Research Projects Agency network surveillance data. On that same day he was named to the official Georgia government body responsible for overseeing election security. It gets worse. That task force did not dissolve after the election. In March 2021 the task force issued a public statement. Keromytis was still listed as a member. That is five months after Election Day. Five months after his team found egress points in Dominion Voting network traffic. Five months during which he sat on the official Georgia election security body. Five months during which none of what you have read in this thread was ever publicly disclosed. Keromytis's own public professional resume confirms it. He listed it himself: "Member, Georgia Secretary of State Bipartisan Task Force for Safe, Secure, and Accessible Elections, 2020." Now ask yourself the questions that nobody in Georgia has ever been forced to answer publicly: i. Did Keromytis disclose to the Georgia Secretary of State that he had identified Dominion Voting egress points in network surveillance data thirteen days before the election? ii. Did the Georgia Secretary of State know his own task force member had been running Defense Advanced Research Projects Agency surveillance on Georgia's voting machine infrastructure? iii. Did Brad Raffensperger know? iv. Who else on that task force knew? v. And if nobody knew - why not? The man who found the egress points was put in charge of telling Georgia its elections were secure. That is not oversight. That is a conflict of interest on a scale that demands a federal investigation. Tweet #16 reveals what Special Counsel Durham specifically referred to the Department of Defense Inspector General - and why that referral quietly disappeared without a single public finding. Georgia Tech Professor Angelos Keromytis:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
10
130
194
3.1K
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #13: October 21, 2020. Thirteen days before the presidential election. Two Georgia Tech professors are running their Defense Advanced Research Projects Agency surveillance tool against voting machine manufacturer networks. Remember Tweet #12. The planning document. Voting machine manufacturers were an authorized Delphi target. This was not accidental. This was the operation executing exactly as planned. Here is what happened when the results came back. Professor Angelos Keromytis typed four words: "It's Dominion Voting." Professor Manos Antonakakis typed six words: "Oh, shit. These look like egress points." A Defense Advanced Research Projects Agency funded professor. Running authorized surveillance on voting machine networks. Thirteen days before you voted. And when the data came back he typed "Oh, shit." That is not the reaction of someone who found nothing. That is not the reaction of someone who found what they expected. That is the reaction of someone who found something that even he was not prepared to see. Now understand what "egress points" means in plain language. An egress point is a place where data leaves a network and goes somewhere else. On a properly secured voting machine system there should be no egress points. The machines are supposed to be air gapped. Meaning completely isolated from the internet and all outside networks. Our election officials however have been lying to us, as first off they don't even know what a true air gap - and - their voting systems don't have them. It pretend theater. Eric Coomer told the court the machines had no "direct" connection to the internet. Notice he said "direct." The egress points his own colleagues found in the network data thirteen days before the election suggest the machines had something other than a direct connection. And notice something else. Before Antonakakis typed "Oh, shit" he wrote: "Let me check something..." Then he posted a link to the United States Election Assistance Commission's official government page listing all registered voting equipment manufacturers. He was cross referencing what he found in the live network data against the official government registry of voting machine companies. He was confirming the identity of what he was seeing in the data. He confirmed it. Then typed what he did. These are not the emails of people passively watching foreign adversaries attack American systems. These are the emails of people who just found something unexpected inside American voting infrastructure. Thirteen days before the election. -Who did they tell? -What did they do with what they found? -Why has none of this ever been publicly disclosed? Tweet #14 will show you the document that connects all of this directly to the highest levels of the United States Senate and Special Counsel John Durham's own investigation. Professor Manos Antonakakis of GAtech:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
1
93
145
2.6K
Pat1776 retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #12: This is the document that proves it was all planned. Defense Advanced Research Projects Agency contractor Christopher Schneck sent this email to Georgia Tech Professor Manos Antonakakis on February 26, 2020. Eight months before the presidential election. Subject: "To talk about today." It is a working agenda. Decoding every line: Item 1: Enhanced Attribution Use Cases Enhanced Attribution is the Defense Advanced Research Projects Agency program funding Georgia Tech to identify and track cyber attackers using internet traffic data. Listed under "Election / Advanced Persistent Threat 28 related" Advanced Persistent Threat 28 is the code name for Russian Military Intelligence. That label is the legal justification attached to everything below. It converts domestic surveillance into a national security operation. Now look at what is listed underneath that label: ✅ "Reverse Mode on Networks (Delphi)" Delphi is the Georgia Tech surveillance platform. Reverse Mode means: pick a target network and map every single connection going into it and leaving it. ✅ "Voting Machine Manufacturers (Delphi)" Dominion Voting. Election Systems and Software. Hart InterCivic. The companies that make the machines that count your votes. Targeted for reverse mode network surveillance. Eight months before the election. ✅ "Burisma (Delphi)" The Ukrainian energy company at the center of the Biden family controversy. On the same Defense Advanced Research Projects Agency targeting list as voting machine manufacturers. ✅ "Department of State (Delphi)" The United States State Department. Also a Delphi reverse mode target. ✅ "National Security Agency Leaked Report (Delphi)" An actual National Security Agency intelligence leak being analyzed by a university professor under a Defense Advanced Research Projects Agency contract. ✅ "Reverse Pythia on Internet Protocol Version 4 (Enhanced Attribution)" Running Pythia's reverse surveillance mode across the entire public internet address space. Every device. Every connection. Simultaneously. ✅ "State of Georgia (neither, Georgia Tech Level of Effort)" Georgia gets its own separate line. Not running under the Russian threat label. Not running under Enhanced Attribution. Running under Georgia Tech's own funded effort. Meaning it operates outside standard Defense Advanced Research Projects Agency program oversight entirely. ✅ "Chase / Enhanced Attribution" JPMorgan Chase bank. Being monitored under the same program as voting machine manufacturers. Item 2: Deploying Active Domain Name System Pythia The total internet surveillance weapon described in Tweet #11 was being deployed to two locations: Defense Digital Service: the Pentagon's own internal technology unit. Center for Internet Security / Department of Homeland Security: the federal agency responsible for protecting election infrastructure. The same agency that later declared the 2020 election "the most secure in American history." More solid evidence Chris Krebs lied through his teeth! The note reads: "Wants to be able to run Reverse Mode and find unknowns. What is required?" The Department of Homeland Security wanted Pythia's reverse surveillance capability deployed inside their own walls. They were asking Georgia Tech what it would take. Item 3: Delphi Support "Russian Election Feed to Cyber National Mission Force and Task Force Raider" Cyber National Mission Force is the United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. Task Force Raider is a military cyber task force. Intelligence derived from surveilling voting machine manufacturers and election networks was being fed directly to military cyber warfare units in real time. "Defend the Department of Defense Information Networks" The same surveillance infrastructure protecting military networks was also watching election infrastructure. Same team. Same tools. Same data pipeline. Item 7: Pythia Documentation They were writing the manual for this weapon. Now read this entire email again knowing one thing: The Defense Advanced Research Projects Agency contractor who sent this agenda is the same man who later wrote to the same Georgia Tech professor: "Collect a week worth of data from the egress point." That was Tweet #2. The email that started this entire thread. The one with the 2 red highlight rectangular boxes we inserted. It was not random. It was not accidental. This document proves it was a coordinated, pre-planned, institutionally authorized operation targeting voting machine companies, Georgia specifically, and the Biden family's business partners: eight months before the 2020 presidential election. And the Department of Homeland Security - the agency that declared your election secure - had this weapon deployed inside their own walls. Tweet #13 will show you what happened when they pointed it directly at Dominion Voting thirteen days before Election Day: and the exact words a Georgia Tech professor typed when he saw what came back.
Peter Bernegger tweet media
English
11
154
250
5.5K
Mike Benz
Mike Benz@MikeBenzCyber·
So Texas taxpayers are, as we speak, paying CIA Director John Brennan to be a university advisor specializing on “the far right, populism and nationalism”
Bad Kitty Unleashed 🦁 💪🏻@pepesgrandma

🔥🔥🔥Holy Cow! John Brennan is linked to global disinfo and anti conservative orgs! You see, the Intelligence Studies Project (ISP) that John Brennan and two other ex CIA belonged to was involved in the Global Disinformation Index (GDI) thru the Global Disinformation Lab (GDIL). It’s also affiliated with the illiberalism Studies Program. Plus, I have a massive surprise at the end! Remember the Texas National Security Network? It’s the entire University Of Texas state wide campus’s and its orgs. They all work together interchangeably. Part of this Network is the LBJ School of Public Affairs. LBJ is where ex CIA John Brennan, Paul Pope, and Stephen Slick run the Intelligence Studies Program. Both Global Disinformation Lab cofounders (Ryan Williams and Kiril Avramov) are from LBJ. Ryan Williams headed up the Global Disinformation Labs Project Evergreen. Where they used a Policy Research Project team from the LBJ School of Public Affairs to write a database of global policy responses to disinformation. Brennan, Pope, and Slicks Intelligence Studies Project is at LJB and often sponsored events for the Global Disinformation Lab. Just one big happy family. The Global Disinformation Lab proclaimed an outright partnership with the Global Disinformation Index. And also worked with each other on a Disinformation Risk Assessment. Here are the Global Disinformation Labs affiliates. -illiberalism Studies Program -Intelligence Studies Project -Strauss center -Clements center -Center for European Studies university Texas Austin -Center for Russian, Eastern European and Eurasian Studies (CREEES) * Intelligence Studies Project is ran By Strauss and Clements at LBJ. Biden’s State department worked with them too. Liz Allen the Under Secretary of State for Public Diplomacy and Public was their go to. “Really appreciate US Dept of States efforts in working to understand and countering mis- and disinformation. Looking forward to jointly collaborating on these efforts!” ♦️The Illiberalism Studies Program: “Addresses questions related to democratic backlash, the spread of authoritarianism, post-liberalism, the far right, populism and nationalism.” “Adherents of illiberalism argue that, in the face of a liberalism that has “gone too far,” it is time to reassert the rights of the collective, or of an alleged silent majority, by restoring national sovereignty in various spheres: politically, by rejecting supranational and multilateral institutions in favor of the nation-state and preferring a strong leader.” Plus I have a 110 page report where they compare republican Christians to Russians: “Marlene Laruelle explores the parallel between US Christian nationalism and the Russian case of a blending of the Russian Orthodox Church with the political language of the Putin regime. ♦️Now the Global Disinformation Lab works on more than disinfo. They work with the Army Cyber Institute of the U.S. Military Academy at West Point to the tune of $250,000. This also involves Threatcasting which I have previously discussed during my CTI League files exposé. I don’t trust this disinfo lab in this arena. They also run Project Tearline, where the military even gave it its own website. Tearline.mil ♦️ Now for even more big news! John Brennan was involved in a US Election LBJ Policy Research Project headed by Stephan Slick. This also involved Chris Krebs, Michael Daniel, Nick Rasmussen, & more. I have this below mentioned 243 page report and Brennan talks Russiagate outta the wazoo. I think a lot of X folks in the Spygate corner would be extremely interested in this. “Working in collaboration with Nicholas Rasmussen, an Intelligence Studies Project Senior Fellow who serves as the director of the Global Internet Forum to Counter Terrorism, Slick & his students will draft a final report to counterparts at Office of the DNI that includes recommendations to defend against future attempts to influence elections. Sources to follow!

English
216
2K
3.9K
81.2K