TheGoodFight

49.1K posts

TheGoodFight banner
TheGoodFight

TheGoodFight

@TheGoodFight

US Army vet. Want your rights back? File lawsuits! Psalm 19:1, Romans 8:31

Katılım Mayıs 2023
332 Takip Edilen2.6K Takipçiler
TheGoodFight retweetledi
Александар Стефановић
4⃣that the software was written in Serbia and that he is very well familiar with the US election system. Goran Obradovic is the patent owner for the voting machines, shareholder and Vicepresident of Dominion. There are articles by Serbian media which state that Serbian 👇
Александар Стефановић tweet mediaАлександар Стефановић tweet mediaАлександар Стефановић tweet mediaАлександар Стефановић tweet media
English
4
30
62
0
TheGoodFight retweetledi
Александар Стефановић
3⃣ What could possibly not be clear and what is left to explain anymore to anyone.1.The software for the voting machines was made in Belgrade. This was confirmed by director of Dominion Representation Bojan Djordjevic who admitted during exchange at twitter account @srdjan_nogo👇
Александар Стефановић tweet mediaАлександар Стефановић tweet mediaАлександар Стефановић tweet mediaАлександар Стефановић tweet media
English
4
38
80
0
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #17: This email attached was written at midnight. March 30, 2020. Professor Manos Antonakakis was still working. He wrote this to his Defense Advanced Research Projects Agency handlers Christopher Schneck and Ian Crone: "Despite all that, we still have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Read that sentence one more time. --Russian command and control activity. --Iranian command and control activity. --Inside state and local government networks. --Networks his own analysis identified as potentially election related. Command and control is not passive observation. It is not reconnaissance. It is not probing. Command and control means a foreign adversary had established an active operating presence inside those networks. Sending instructions. Receiving data. Running operations. From inside networks connected to American elections. And Professor Antonakakis was not uncertain about it. He wrote "more than enough evidence." Not "possible evidence." Not "indicators suggesting." More than enough. Then he wrote something that should make every American stop cold. He compared the people questioning his findings to a doctor who refuses to diagnose a patient because the doctor lacks the right instrument. His exact words: "If they think this is not worth worrying about because they do not have an Albert sensor, then their argument is similar to this statement: I do not have Covid-19 because the doctor didn't have a way to diagnose it." Translation: Someone in the government was telling him his evidence was not valid because it did not come from their own official sensors. He was pushing back. He was telling them: the disease is there whether your instrument sees it or not. Russia and Iran were operating inside election related government networks. Georgia Tech could see it. The government's own sensors could not. Or would not. Now add what Defense Advanced Research Projects Agency Program Manager Ian Crone wrote in the same chain: "That is probably needed to get the Department of Homeland Security to believe us." The Department of Homeland Security. The agency responsible for protecting American elections. The agency that declared 2020 "the most secure election in American history." Defense Advanced Research Projects Agency was struggling to get the Department of Homeland Security to believe their own findings about foreign adversary activity in election networks. And later in the same email chain Antonakakis wrote this: "There is a group that has successfully penetrated these networks." Successfully penetrated. Not attempted. Not probed. Successfully penetrated. The names of who penetrated those networks are hidden behind black redaction bars. To this day nobody outside a classified setting knows whose names are under those bars. Here is the timeline you now have from this thread alone: February 2020 - Defense Advanced Research Projects Agency plans surveillance of voting machine manufacturers. March 2020 - Russian and Iranian command and control confirmed in election related networks. A foreign group confirmed to have successfully penetrated those networks. September 2020 - Defense Advanced Research Projects Agency employee writes "I know who to talk to if we find anything." October 21, 2020 - Dominion Voting egress points found in network data. Same day the man who found them is named to Georgia's official election security task force. November 3, 2020 - You voted. May 2023 - Special Counsel Durham refers the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation. Today: No findings. No charges. No public report. Complete silence. Russia and Iran were inside election related networks. Georgia Tech found them. The Department of Homeland Security declared the election the most secure in history. Durham referred the contract for criminal investigation. Washington went silent. Durham referred the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation in May 2023. It has now been nearly two years. No findings. No charges. No public report. Someone needs to explain that silence. Tag your Senator. @SenRonJohnson @ChuckGrassley More in the morning. Thanks again to @TheAndersPaul for his tenaciousness in obtaining records for five years!
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
14
86
130
2.3K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #16: Special Counsel John Durham spent four years investigating what happened to American elections. His final report was delivered to Congress in May 2023. Inside that report was a criminal referral. Not to the Department of Justice. Not to the Federal Bureau of Investigation. To the Department of Defense Inspector General. The internal watchdog of the entire United States military. The referral identified one specific matter: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. Durham had reviewed the Defense Advanced Research Projects Agency contract with Georgia Tech and found something significant enough to send to the Department of Defense's own internal investigator for potential criminal review. Not a footnote. Not a passing mention. A formal referral. Now look at what you have seen in this thread about that exact contract: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers eight months before the election. The Pythia surveillance weapon deployed inside the Department of Homeland Security before the election. Active reconnaissance jobs running against Dominion Voting network infrastructure thirteen days before the election. Egress points found in Dominion Voting network data. United States Army soldiers trained on the surveillance weapon at Georgia Tech's campus. Central Command military network data handed to a civilian university professor for analysis. Russian and Iranian command and control confirmed in election related state and local government networks. A Defense Advanced Research Projects Agency employee writing "I know who to talk to if we find anything." And the man who found egress points in Dominion Voting data named to Georgia's official election security task force on the very same day. Durham saw enough in that contract to make a criminal referral to the Department of Defense Inspector General. Here is what happened next: Nothing. -No findings were announced. -No charges were filed. -No public report was released. -The referral was received. -Then it vanished. The Department of Defense Inspector General has never publicly addressed it. The Defense Advanced Research Projects Agency has never publicly addressed it. Nor Georgia Tech, and Congress never held a single public hearing about it. Think about what that means. The top prosecutor in America found something troubling enough in a Defense Advanced Research Projects Agency contract with a university to formally refer it for potential criminal investigation. And every single institution that received that referral went silent. Durham found it. The Department of Defense Inspector General received it. Washington buried it. There is only one question left. Who had the power to make a Special Counsel criminal referral disappear - and why did they use it? Emails obtained by Patriot @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
24
226
369
6K
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #15: Pay close attention to this date. October 21, 2020. You have already seen what happened on that date in Tweet #13. Georgia Tech Professor Angelos Keromytis was running Defense Advanced Research Projects Agency surveillance on voting machine manufacturer networks. He identified Dominion Voting in the network data. His colleague Professor Manos Antonakakis typed "Oh, shit. These look like egress points." See prior tweet. That was October 21, 2020. Now here is what else happened on that exact same date. Georgia Secretary of State Brad Raffensperger issued a press release. He was forming an official government body called the Georgia Bipartisan Task Force for Safe, Secure, and Accessible Elections. Among the confirmed participants listed in that press release: "Professor Angelos Keromytis. Georgia Institute of Technology." The same professor. The same day. On the morning of October 21, 2020 Angelos Keromytis was identifying Dominion Voting egress points in Defense Advanced Research Projects Agency network surveillance data. On that same day he was named to the official Georgia government body responsible for overseeing election security. It gets worse. That task force did not dissolve after the election. In March 2021 the task force issued a public statement. Keromytis was still listed as a member. That is five months after Election Day. Five months after his team found egress points in Dominion Voting network traffic. Five months during which he sat on the official Georgia election security body. Five months during which none of what you have read in this thread was ever publicly disclosed. Keromytis's own public professional resume confirms it. He listed it himself: "Member, Georgia Secretary of State Bipartisan Task Force for Safe, Secure, and Accessible Elections, 2020." Now ask yourself the questions that nobody in Georgia has ever been forced to answer publicly: i. Did Keromytis disclose to the Georgia Secretary of State that he had identified Dominion Voting egress points in network surveillance data thirteen days before the election? ii. Did the Georgia Secretary of State know his own task force member had been running Defense Advanced Research Projects Agency surveillance on Georgia's voting machine infrastructure? iii. Did Brad Raffensperger know? iv. Who else on that task force knew? v. And if nobody knew - why not? The man who found the egress points was put in charge of telling Georgia its elections were secure. That is not oversight. That is a conflict of interest on a scale that demands a federal investigation. Tweet #16 reveals what Special Counsel Durham specifically referred to the Department of Defense Inspector General - and why that referral quietly disappeared without a single public finding. Georgia Tech Professor Angelos Keromytis:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
9
119
170
2.6K
TheGoodFight
TheGoodFight@TheGoodFight·
@PeterBernegger There's a plethora of @TheAndersPaul ORR emails that prove the ACLU (Vasu dude on GA SoS Cmte) ran the Fulton co. election in 2020. They were given administrator passwords so they could delete absentee ballots and allow voting by peeps w/no proof of residence. Oh yeah,Ratt knew.
English
2
0
2
24
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #14: What you have read in this thread is not new to everyone. Two United States Senators already knew. And Special Counsel John Durham already knew. Here is what they found and what they did about it. United States Senator Chuck Grassley of Iowa and United States Senator Ron Johnson of Wisconsin uncovered email evidence of Professor Manos Antonakakis's Defense Advanced Research Projects Agency funded work. What they found in those emails stopped them cold. A Defense Advanced Research Projects Agency employee - referring to the Georgia Tech operation - wrote this: "Sensitive stuff worth doing." Same Defense Advanced Research Projects Agency (DARPA) employee. Same email chain. Same date as the United States Postal Service swing state scanning email — September 25, 2020: "I know who to talk to if we find anything." Not "I know who to report it to." Not "I know who to alert." But "I know who to talk to if we find anything." That is not the language of a defensive cybersecurity operation protecting elections. That is the language of an intelligence operation with a predetermined recipient for whatever was found inside American voting infrastructure. Who was that person? That question has never been answered publicly. Now add this. Special Counsel John Durham completed his investigation in May 2023. In his final report Durham made a criminal referral to the Department of Defense Inspector General. That referral specifically identified: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. The Defense Advanced Research Projects Agency. Georgia Tech. A specific contract. Referred for potential criminal investigation. Durham found something significant enough in that contract to send it to the Department of Defense's own internal investigator. The Department of Defense Inspector General received that referral. What happened next has never been made public. -No findings were announced. -No charges were filed. -No report was released. -The referral vanished. Now look at what you have seen in this thread: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers. Active surveillance of Dominion Voting network traffic thirteen days before the election. Egress points found in voting machine infrastructure. Russian and Iranian command and control confirmed in state and local election networks. An Army unit trained on the surveillance weapon used to do all of this. We caught the US Army inside a Dominion EMS. A Defense Advanced Research Projects Agency employee who knew exactly "who to talk to" if anything was found. And a Special Counsel referral to the Department of Defense Inspector General that quietly disappeared. Two United States Senators saw enough to raise alarms. The top prosecutor in America saw enough to make a criminal referral. You were never told any of it. Look at what US Senators Ron Johnson and Chuck Grassley were after in their (second) letter to DARPA:
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
10
133
217
3.3K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #13: October 21, 2020. Thirteen days before the presidential election. Two Georgia Tech professors are running their Defense Advanced Research Projects Agency surveillance tool against voting machine manufacturer networks. Remember Tweet #12. The planning document. Voting machine manufacturers were an authorized Delphi target. This was not accidental. This was the operation executing exactly as planned. Here is what happened when the results came back. Professor Angelos Keromytis typed four words: "It's Dominion Voting." Professor Manos Antonakakis typed six words: "Oh, shit. These look like egress points." A Defense Advanced Research Projects Agency funded professor. Running authorized surveillance on voting machine networks. Thirteen days before you voted. And when the data came back he typed "Oh, shit." That is not the reaction of someone who found nothing. That is not the reaction of someone who found what they expected. That is the reaction of someone who found something that even he was not prepared to see. Now understand what "egress points" means in plain language. An egress point is a place where data leaves a network and goes somewhere else. On a properly secured voting machine system there should be no egress points. The machines are supposed to be air gapped. Meaning completely isolated from the internet and all outside networks. Our election officials however have been lying to us, as first off they don't even know what a true air gap - and - their voting systems don't have them. It pretend theater. Eric Coomer told the court the machines had no "direct" connection to the internet. Notice he said "direct." The egress points his own colleagues found in the network data thirteen days before the election suggest the machines had something other than a direct connection. And notice something else. Before Antonakakis typed "Oh, shit" he wrote: "Let me check something..." Then he posted a link to the United States Election Assistance Commission's official government page listing all registered voting equipment manufacturers. He was cross referencing what he found in the live network data against the official government registry of voting machine companies. He was confirming the identity of what he was seeing in the data. He confirmed it. Then typed what he did. These are not the emails of people passively watching foreign adversaries attack American systems. These are the emails of people who just found something unexpected inside American voting infrastructure. Thirteen days before the election. -Who did they tell? -What did they do with what they found? -Why has none of this ever been publicly disclosed? Tweet #14 will show you the document that connects all of this directly to the highest levels of the United States Senate and Special Counsel John Durham's own investigation. Professor Manos Antonakakis of GAtech:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
1
87
136
2.3K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #12: This is the document that proves it was all planned. Defense Advanced Research Projects Agency contractor Christopher Schneck sent this email to Georgia Tech Professor Manos Antonakakis on February 26, 2020. Eight months before the presidential election. Subject: "To talk about today." It is a working agenda. Decoding every line: Item 1: Enhanced Attribution Use Cases Enhanced Attribution is the Defense Advanced Research Projects Agency program funding Georgia Tech to identify and track cyber attackers using internet traffic data. Listed under "Election / Advanced Persistent Threat 28 related" Advanced Persistent Threat 28 is the code name for Russian Military Intelligence. That label is the legal justification attached to everything below. It converts domestic surveillance into a national security operation. Now look at what is listed underneath that label: ✅ "Reverse Mode on Networks (Delphi)" Delphi is the Georgia Tech surveillance platform. Reverse Mode means: pick a target network and map every single connection going into it and leaving it. ✅ "Voting Machine Manufacturers (Delphi)" Dominion Voting. Election Systems and Software. Hart InterCivic. The companies that make the machines that count your votes. Targeted for reverse mode network surveillance. Eight months before the election. ✅ "Burisma (Delphi)" The Ukrainian energy company at the center of the Biden family controversy. On the same Defense Advanced Research Projects Agency targeting list as voting machine manufacturers. ✅ "Department of State (Delphi)" The United States State Department. Also a Delphi reverse mode target. ✅ "National Security Agency Leaked Report (Delphi)" An actual National Security Agency intelligence leak being analyzed by a university professor under a Defense Advanced Research Projects Agency contract. ✅ "Reverse Pythia on Internet Protocol Version 4 (Enhanced Attribution)" Running Pythia's reverse surveillance mode across the entire public internet address space. Every device. Every connection. Simultaneously. ✅ "State of Georgia (neither, Georgia Tech Level of Effort)" Georgia gets its own separate line. Not running under the Russian threat label. Not running under Enhanced Attribution. Running under Georgia Tech's own funded effort. Meaning it operates outside standard Defense Advanced Research Projects Agency program oversight entirely. ✅ "Chase / Enhanced Attribution" JPMorgan Chase bank. Being monitored under the same program as voting machine manufacturers. Item 2: Deploying Active Domain Name System Pythia The total internet surveillance weapon described in Tweet #11 was being deployed to two locations: Defense Digital Service: the Pentagon's own internal technology unit. Center for Internet Security / Department of Homeland Security: the federal agency responsible for protecting election infrastructure. The same agency that later declared the 2020 election "the most secure in American history." More solid evidence Chris Krebs lied through his teeth! The note reads: "Wants to be able to run Reverse Mode and find unknowns. What is required?" The Department of Homeland Security wanted Pythia's reverse surveillance capability deployed inside their own walls. They were asking Georgia Tech what it would take. Item 3: Delphi Support "Russian Election Feed to Cyber National Mission Force and Task Force Raider" Cyber National Mission Force is the United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. Task Force Raider is a military cyber task force. Intelligence derived from surveilling voting machine manufacturers and election networks was being fed directly to military cyber warfare units in real time. "Defend the Department of Defense Information Networks" The same surveillance infrastructure protecting military networks was also watching election infrastructure. Same team. Same tools. Same data pipeline. Item 7: Pythia Documentation They were writing the manual for this weapon. Now read this entire email again knowing one thing: The Defense Advanced Research Projects Agency contractor who sent this agenda is the same man who later wrote to the same Georgia Tech professor: "Collect a week worth of data from the egress point." That was Tweet #2. The email that started this entire thread. The one with the 2 red highlight rectangular boxes we inserted. It was not random. It was not accidental. This document proves it was a coordinated, pre-planned, institutionally authorized operation targeting voting machine companies, Georgia specifically, and the Biden family's business partners: eight months before the 2020 presidential election. And the Department of Homeland Security - the agency that declared your election secure - had this weapon deployed inside their own walls. Tweet #13 will show you what happened when they pointed it directly at Dominion Voting thirteen days before Election Day: and the exact words a Georgia Tech professor typed when he saw what came back.
Peter Bernegger tweet media
English
11
143
229
4.9K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #11: The weapon they built is called Pythia. Built at Georgia Institute of Technology. Funded by the Defense Advanced Research Projects Agency. But this is not theory. We have the Defense Advanced Research Projects Agency's own internal planning document - a working agenda sent by Defense Advanced Research Projects Agency contractor Christopher Schneck to Professor Manos Antonakakis on February 26, 2020 - eight months before the 2020 election. Read what is on that agenda. Word for word: "Deploying Active Domain Name System Pythia - Defense Digital Service / Department of Homeland Security" "Wants to be able to run Reverse Mode and find unknowns." Translation for non-technical readers: Pythia was being embedded inside the Department of Homeland Security, the very agency responsible for declaring elections secure, with the specific goal of running Reverse Mode. Here is what Reverse Mode does in plain language: You pick a target network - say, a voting machine company. Once inside a network, and the documents confirm Pythia was deployed inside the Department of Homeland Security by February 2020, Pythia maps every single connection on that network. Public or private. Internal or external. There is nowhere to hide. Who is accessing it. From where. At what time. Through what pathway. Encryption does not hide this. Firewalls do not block this. Because Pythia operates at the Domain Name System layer: the foundational address system every internet-connected device must use to function. There is no way around it. And here is what else is on that same Defense Advanced Research Projects Agency agenda - listed as Reverse Mode targets: ✅ Voting machine manufacturers ✅ Burisma - the Ukrainian energy company ✅ Department of State ✅ National Security Agency leaked report ✅ State of Georgia - its own separate line item All of this. On one Defense Advanced Research Projects Agency planning document. Eight months before you voted. And United States Army soldiers were trained on this weapon at Georgia Tech's campus. One of those soldiers wrote this to Professor Antonakakis after his training: "Thanks for hosting the Pythia training a couple of weeks ago. It was very interesting seeing the tool in action." The Army unit's motto: 'Pierce the Shadows.' They were not kidding. Captain Severson's email signature contains the Second Battalion Cyber Protection Brigade motto: "Pierce the Shadows." It is in the document. In Ancient Greece, Pythia was the Oracle of Delphi. Nice documents @TheAndersPaul - he obtained them via public records requests and hit gold.
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
15
123
217
3.4K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #10: One name connects everything in this thread to the highest levels of American politics. Rodney Joffe. For those who have not heard of him - here is why his name should stop you cold. Special Counsel John Durham's report identified Joffe as "Tech Executive One." Durham found that Joffe directed the harvesting of Domain Name System data - internet traffic logs belonging to a presidential candidate, Trump Tower, and even the Executive Office of the President of the United States - and fed that data to political operatives. Those operatives took it to the Federal Bureau of Investigation and the Central Intelligence Agency to construct a false intelligence narrative against a sitting president. Now look at what we have shown you in this thread. That same Rodney Joffe was secretly blind-copied on a Georgia Institute of Technology professor's email discussing "opaque" targeting analysis of election-related network surveillance data - intended for the Department of Defense. The same tool used to spy on a presidential candidate. The same man. Now connected to Defense Advanced Research Projects (DARPA) Agency-funded surveillance of American election infrastructure. This was not a coincidence. This was not academic research. Who tasked him? Who received his analysis? What did they do with it? Tweet #11 reveals the weapon they built to do all of this. Now expanding this story to 20 tweets.
Peter Bernegger tweet media
English
21
271
473
14.4K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #9: Suggest reading this slowly. A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - wrote this in an email: "We have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Same professor. Days later: "There is a group that has successfully penetrated these networks." Defense Advanced Research Projects Agency (DARPA) Program Manager Ian Crone confirmed in writing they were analyzing "actual election networks." His response when briefed on the penetration? "I think their muted response was because they're a little dazed." The people in that room when all of this was confirmed: ✅ Defense Advanced Research Projects Agency ✅ Cybersecurity and Infrastructure Security Agency - Department of Homeland Security ✅ Multi-State Information Sharing and Analysis Center - the organization that monitors every single state and local election network in America Russia and Iran were inside networks tied to our elections. Every one of these agencies knew. You were never told. Tweet #10 coming. You need to know who else was watching.
Peter Bernegger tweet media
English
17
300
616
18.6K
TheGoodFight retweetledi
Theonlymethereis
Theonlymethereis@Theonlyme333·
@TrueNorth444 So much effort, by so many... Countless hours of precious life... Sacrificed safety... And yet, here we are...
English
0
1
2
27
TheGoodFight retweetledi
@dessere88fenice
@dessere88fenice@dessere88fenice·
🙏🏼⛪🙏🏼✝️👇PREGHIAMO MESSAGGIO DEL VESCOVO NASSIF, VESCOVO SIRIACO CATTOLICO DEL SUD DEL LIBANO: Buonasera, permettetemi di condividere il mio dolore con voi. L'esercito israeliano ha appena ordinato l'evacuazione dei villaggi libanesi in una vasta regione di confine. I sacerdoti dei principali villaggi cristiani della zona, come Qlaia, Marjeayoun, Rmeich, Debel, Kawkaba, Alma el-Charb e Ain Ebel, si sono rifiutati di andarsene, così come molti altri cristiani. Hanno suonato le campane delle loro chiese per manifestare il loro rifiuto. Ieri, il fratello di un mio amico, padre Maroun Ghafari, parroco di Alma el-Charb, un pastore che lavorava nel campo, è stato attaccato: è morto sul posto. Mezz'ora fa, il parroco di Qlaia, il mio caro collega, padre Pierre al-Rai, è stato attaccato ed è stato appena ucciso. È diventato un martire della Chiesa e del Libano. In questi villaggi, nulla può minacciare la sicurezza di Israele. Siamo stati cristiani in questa terra per 2000 anni. È una terra benedetta, calpestata da Cristo e dalla sua Santissima Madre. Non abbandoneremo la nostra terra libanese nel sud del Libano. Vi chiedo umilmente le vostre preghiere per i miei fratelli sacerdoti in questi villaggi cristiani del sud del Libano. Che San Charbel sia con la sua Chiesa. Che la Vergine Maria ci protegga con i suoi angeli. Mi sento onorato della coraggiosità di questi cristiani e del loro clero. Saluti cordiali, Vescovo Nassif
GIF
Italiano
112
952
1.9K
64.8K
TheGoodFight retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #8: Forty days before the 2020 election. A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - emailed his Defense Advanced Research Projects Agency handler with a new target: The United States Postal Service. Professor Manos Antonakakis wrote: "I would down select United States Postal Service networks in swing states." The Defense Advanced Research Projects Agency Program Manager's response? "Awesome idea." Antonakakis then confirmed: "I will spend a few hours to try to find their networks. If I find any networks, I will run a couple jobs to see if we can even witness any traffic." A university professor. Scanning federal government postal networks. In swing states. Forty days before a presidential election. With Defense Advanced Research Projects Agency blessing. Who authorized this? Who ordered this? Who saw the results? Document obtained by @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
6
217
370
4.6K
TheGoodFight retweetledi
C3
C3@C_3C_3·
Reminder… Judge Arthur Engoron and Leticia James claimed Mar-a-Lago was worth between $18 million and $27.6 million. Forbes just valued Mar-a- Lago at $650 million. 36 times what they claimed. They scammed just to get Trump on fraud. They both belong in prison. Evil.
C3 tweet mediaC3 tweet mediaC3 tweet media
English
877
13K
40.8K
232.5K