David

93.4K posts

David banner
David

David

@blueblooded_AP

Saved By Jesus Christ, receiver of the Holy Spirit, Husband, Father, Gators For Life, Proud American, PureBlood

Oregon, USA Katılım Mayıs 2009
1.6K Takip Edilen2.8K Takipçiler
David retweetledi
Kim "Katie" USA
Kim "Katie" USA@KimKatieUSA·
BREAKING: Liam Conejo Ramos and his family have had their asylum request DENIED. Liam and his father have once again been detained and are scheduled for deportation to Ecuador.
English
30
76
622
7.4K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #16: Special Counsel John Durham spent four years investigating what happened to American elections. His final report was delivered to Congress in May 2023. Inside that report was a criminal referral. Not to the Department of Justice. Not to the Federal Bureau of Investigation. To the Department of Defense Inspector General. The internal watchdog of the entire United States military. The referral identified one specific matter: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. Durham had reviewed the Defense Advanced Research Projects Agency contract with Georgia Tech and found something significant enough to send to the Department of Defense's own internal investigator for potential criminal review. Not a footnote. Not a passing mention. A formal referral. Now look at what you have seen in this thread about that exact contract: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers eight months before the election. The Pythia surveillance weapon deployed inside the Department of Homeland Security before the election. Active reconnaissance jobs running against Dominion Voting network infrastructure thirteen days before the election. Egress points found in Dominion Voting network data. United States Army soldiers trained on the surveillance weapon at Georgia Tech's campus. Central Command military network data handed to a civilian university professor for analysis. Russian and Iranian command and control confirmed in election related state and local government networks. A Defense Advanced Research Projects Agency employee writing "I know who to talk to if we find anything." And the man who found egress points in Dominion Voting data named to Georgia's official election security task force on the very same day. Durham saw enough in that contract to make a criminal referral to the Department of Defense Inspector General. Here is what happened next: Nothing. -No findings were announced. -No charges were filed. -No public report was released. -The referral was received. -Then it vanished. The Department of Defense Inspector General has never publicly addressed it. The Defense Advanced Research Projects Agency has never publicly addressed it. Nor Georgia Tech, and Congress never held a single public hearing about it. Think about what that means. The top prosecutor in America found something troubling enough in a Defense Advanced Research Projects Agency contract with a university to formally refer it for potential criminal investigation. And every single institution that received that referral went silent. Durham found it. The Department of Defense Inspector General received it. Washington buried it. There is only one question left. Who had the power to make a Special Counsel criminal referral disappear - and why did they use it? Emails obtained by Patriot @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
12
71
120
1.7K
David retweetledi
MayDay
MayDay@TheRealMayDayT·
Really? The risk to the funds is and has always been Gavin Newscum, Unions and China. Ever heard of Sequoia Capitol or Amalgamated Bank or $100 Billion for the climate action plan (Green funds)? You might look deeper and then you would know pensions have already been squandered away, years ago! @CalPERS Not to mention those sElected officials that are potentially double dipping #PlacerCounty toresays.com/2019/10/04/cou…
The Sacramento Bee@sacbee_news

As war with Iran threatens to disrupt economy, CalPERS considers risks to fund sacbee.com/news/politics-…

English
0
3
3
35
David retweetledi
NIK
NIK@ns123abc·
🚨BREAKING: SUPER MICRO CO-FOUNDER ARRESTED FOR SMUGGLING $2.5B IN NVIDIA GPUs TO CHINA >SMCI co-founder Yih-Shyan "Wally" Liaw arrested today >personally holds $464 MILLION in SMCI stock >charged with smuggling BILLIONS in Nvidia servers to china >used a southeast asian shell company to funnel $2.5B in servers to chinese buyers >$510 million worth shipped in just THREE WEEKS in spring 2025 >built thousands of fake dummy servers to fool U.S compliance auditors >caught on surveillance camera using a HAIR DRYER to swap serial number stickers >coordinated the whole thing over encrypted group chats >SMCI down 12% after hours >faces up to 30 years in federal prison ITS SO OVER…
NIK tweet mediaNIK tweet media
National Security Division, U.S. Dept of Justice@DOJNatSec

Three Charged with Conspiring to Unlawfully Divert Cutting Edge U.S. Artificial Intelligence Technology to China “The indictment unsealed today details alleged efforts to evade U.S. export laws through false documents, staged dummy servers to mislead inspectors, and convoluted transshipment schemes, in order to obfuscate the true destination of restricted AI technology—China,” said John A. Eisenberg, Assistant Attorney General for National Security. “These chips are the product of American ingenuity, and NSD will continue to enforce our export-control laws to protect that advantage.” 🔗: justice.gov/opa/pr/three-c…

English
308
1.5K
6.5K
581.6K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #15: Pay close attention to this date. October 21, 2020. You have already seen what happened on that date in Tweet #13. Georgia Tech Professor Angelos Keromytis was running Defense Advanced Research Projects Agency surveillance on voting machine manufacturer networks. He identified Dominion Voting in the network data. His colleague Professor Manos Antonakakis typed "Oh, shit. These look like egress points." See prior tweet. That was October 21, 2020. Now here is what else happened on that exact same date. Georgia Secretary of State Brad Raffensperger issued a press release. He was forming an official government body called the Georgia Bipartisan Task Force for Safe, Secure, and Accessible Elections. Among the confirmed participants listed in that press release: "Professor Angelos Keromytis. Georgia Institute of Technology." The same professor. The same day. On the morning of October 21, 2020 Angelos Keromytis was identifying Dominion Voting egress points in Defense Advanced Research Projects Agency network surveillance data. On that same day he was named to the official Georgia government body responsible for overseeing election security. It gets worse. That task force did not dissolve after the election. In March 2021 the task force issued a public statement. Keromytis was still listed as a member. That is five months after Election Day. Five months after his team found egress points in Dominion Voting network traffic. Five months during which he sat on the official Georgia election security body. Five months during which none of what you have read in this thread was ever publicly disclosed. Keromytis's own public professional resume confirms it. He listed it himself: "Member, Georgia Secretary of State Bipartisan Task Force for Safe, Secure, and Accessible Elections, 2020." Now ask yourself the questions that nobody in Georgia has ever been forced to answer publicly: i. Did Keromytis disclose to the Georgia Secretary of State that he had identified Dominion Voting egress points in network surveillance data thirteen days before the election? ii. Did the Georgia Secretary of State know his own task force member had been running Defense Advanced Research Projects Agency surveillance on Georgia's voting machine infrastructure? iii. Did Brad Raffensperger know? iv. Who else on that task force knew? v. And if nobody knew - why not? The man who found the egress points was put in charge of telling Georgia its elections were secure. That is not oversight. That is a conflict of interest on a scale that demands a federal investigation. Tweet #16 reveals what Special Counsel Durham specifically referred to the Department of Defense Inspector General - and why that referral quietly disappeared without a single public finding. Georgia Tech Professor Angelos Keromytis:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
4
86
118
1.6K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #14: What you have read in this thread is not new to everyone. Two United States Senators already knew. And Special Counsel John Durham already knew. Here is what they found and what they did about it. United States Senator Chuck Grassley of Iowa and United States Senator Ron Johnson of Wisconsin uncovered email evidence of Professor Manos Antonakakis's Defense Advanced Research Projects Agency funded work. What they found in those emails stopped them cold. A Defense Advanced Research Projects Agency employee - referring to the Georgia Tech operation - wrote this: "Sensitive stuff worth doing." Same Defense Advanced Research Projects Agency (DARPA) employee. Same email chain. Same date as the United States Postal Service swing state scanning email — September 25, 2020: "I know who to talk to if we find anything." Not "I know who to report it to." Not "I know who to alert." But "I know who to talk to if we find anything." That is not the language of a defensive cybersecurity operation protecting elections. That is the language of an intelligence operation with a predetermined recipient for whatever was found inside American voting infrastructure. Who was that person? That question has never been answered publicly. Now add this. Special Counsel John Durham completed his investigation in May 2023. In his final report Durham made a criminal referral to the Department of Defense Inspector General. That referral specifically identified: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. The Defense Advanced Research Projects Agency. Georgia Tech. A specific contract. Referred for potential criminal investigation. Durham found something significant enough in that contract to send it to the Department of Defense's own internal investigator. The Department of Defense Inspector General received that referral. What happened next has never been made public. -No findings were announced. -No charges were filed. -No report was released. -The referral vanished. Now look at what you have seen in this thread: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers. Active surveillance of Dominion Voting network traffic thirteen days before the election. Egress points found in voting machine infrastructure. Russian and Iranian command and control confirmed in state and local election networks. An Army unit trained on the surveillance weapon used to do all of this. We caught the US Army inside a Dominion EMS. A Defense Advanced Research Projects Agency employee who knew exactly "who to talk to" if anything was found. And a Special Counsel referral to the Department of Defense Inspector General that quietly disappeared. Two United States Senators saw enough to raise alarms. The top prosecutor in America saw enough to make a criminal referral. You were never told any of it. Look at what US Senators Ron Johnson and Chuck Grassley were after in their (second) letter to DARPA:
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
7
99
169
2.5K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #13: October 21, 2020. Thirteen days before the presidential election. Two Georgia Tech professors are running their Defense Advanced Research Projects Agency surveillance tool against voting machine manufacturer networks. Remember Tweet #12. The planning document. Voting machine manufacturers were an authorized Delphi target. This was not accidental. This was the operation executing exactly as planned. Here is what happened when the results came back. Professor Angelos Keromytis typed four words: "It's Dominion Voting." Professor Manos Antonakakis typed six words: "Oh, shit. These look like egress points." A Defense Advanced Research Projects Agency funded professor. Running authorized surveillance on voting machine networks. Thirteen days before you voted. And when the data came back he typed "Oh, shit." That is not the reaction of someone who found nothing. That is not the reaction of someone who found what they expected. That is the reaction of someone who found something that even he was not prepared to see. Now understand what "egress points" means in plain language. An egress point is a place where data leaves a network and goes somewhere else. On a properly secured voting machine system there should be no egress points. The machines are supposed to be air gapped. Meaning completely isolated from the internet and all outside networks. Our election officials however have been lying to us, as first off they don't even know what a true air gap - and - their voting systems don't have them. It pretend theater. Eric Coomer told the court the machines had no "direct" connection to the internet. Notice he said "direct." The egress points his own colleagues found in the network data thirteen days before the election suggest the machines had something other than a direct connection. And notice something else. Before Antonakakis typed "Oh, shit" he wrote: "Let me check something..." Then he posted a link to the United States Election Assistance Commission's official government page listing all registered voting equipment manufacturers. He was cross referencing what he found in the live network data against the official government registry of voting machine companies. He was confirming the identity of what he was seeing in the data. He confirmed it. Then typed what he did. These are not the emails of people passively watching foreign adversaries attack American systems. These are the emails of people who just found something unexpected inside American voting infrastructure. Thirteen days before the election. -Who did they tell? -What did they do with what they found? -Why has none of this ever been publicly disclosed? Tweet #14 will show you the document that connects all of this directly to the highest levels of the United States Senate and Special Counsel John Durham's own investigation. Professor Manos Antonakakis of GAtech:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
1
71
110
1.9K
David retweetledi
Mike Lee
Mike Lee@SenMikeLee·
Chuck Schumer and other Democrats have insisted that they actually support Voter ID—they just object to other parts of the SAVE America Act. Well, @SenJonHusted just asked unanimous consent to pass ONLY the Voter ID portion of the bill. Democrats blocked it.
English
236
2K
5.9K
101.5K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #11: The weapon they built is called Pythia. Built at Georgia Institute of Technology. Funded by the Defense Advanced Research Projects Agency. But this is not theory. We have the Defense Advanced Research Projects Agency's own internal planning document - a working agenda sent by Defense Advanced Research Projects Agency contractor Christopher Schneck to Professor Manos Antonakakis on February 26, 2020 - eight months before the 2020 election. Read what is on that agenda. Word for word: "Deploying Active Domain Name System Pythia - Defense Digital Service / Department of Homeland Security" "Wants to be able to run Reverse Mode and find unknowns." Translation for non-technical readers: Pythia was being embedded inside the Department of Homeland Security, the very agency responsible for declaring elections secure, with the specific goal of running Reverse Mode. Here is what Reverse Mode does in plain language: You pick a target network - say, a voting machine company. Once inside a network, and the documents confirm Pythia was deployed inside the Department of Homeland Security by February 2020, Pythia maps every single connection on that network. Public or private. Internal or external. There is nowhere to hide. Who is accessing it. From where. At what time. Through what pathway. Encryption does not hide this. Firewalls do not block this. Because Pythia operates at the Domain Name System layer: the foundational address system every internet-connected device must use to function. There is no way around it. And here is what else is on that same Defense Advanced Research Projects Agency agenda - listed as Reverse Mode targets: ✅ Voting machine manufacturers ✅ Burisma - the Ukrainian energy company ✅ Department of State ✅ National Security Agency leaked report ✅ State of Georgia - its own separate line item All of this. On one Defense Advanced Research Projects Agency planning document. Eight months before you voted. And United States Army soldiers were trained on this weapon at Georgia Tech's campus. One of those soldiers wrote this to Professor Antonakakis after his training: "Thanks for hosting the Pythia training a couple of weeks ago. It was very interesting seeing the tool in action." The Army unit's motto: 'Pierce the Shadows.' They were not kidding. Captain Severson's email signature contains the Second Battalion Cyber Protection Brigade motto: "Pierce the Shadows." It is in the document. In Ancient Greece, Pythia was the Oracle of Delphi. Nice documents @TheAndersPaul - he obtained them via public records requests and hit gold.
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
9
95
163
2.6K
David retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #12: This is the document that proves it was all planned. Defense Advanced Research Projects Agency contractor Christopher Schneck sent this email to Georgia Tech Professor Manos Antonakakis on February 26, 2020. Eight months before the presidential election. Subject: "To talk about today." It is a working agenda. Decoding every line: Item 1: Enhanced Attribution Use Cases Enhanced Attribution is the Defense Advanced Research Projects Agency program funding Georgia Tech to identify and track cyber attackers using internet traffic data. Listed under "Election / Advanced Persistent Threat 28 related" Advanced Persistent Threat 28 is the code name for Russian Military Intelligence. That label is the legal justification attached to everything below. It converts domestic surveillance into a national security operation. Now look at what is listed underneath that label: ✅ "Reverse Mode on Networks (Delphi)" Delphi is the Georgia Tech surveillance platform. Reverse Mode means: pick a target network and map every single connection going into it and leaving it. ✅ "Voting Machine Manufacturers (Delphi)" Dominion Voting. Election Systems and Software. Hart InterCivic. The companies that make the machines that count your votes. Targeted for reverse mode network surveillance. Eight months before the election. ✅ "Burisma (Delphi)" The Ukrainian energy company at the center of the Biden family controversy. On the same Defense Advanced Research Projects Agency targeting list as voting machine manufacturers. ✅ "Department of State (Delphi)" The United States State Department. Also a Delphi reverse mode target. ✅ "National Security Agency Leaked Report (Delphi)" An actual National Security Agency intelligence leak being analyzed by a university professor under a Defense Advanced Research Projects Agency contract. ✅ "Reverse Pythia on Internet Protocol Version 4 (Enhanced Attribution)" Running Pythia's reverse surveillance mode across the entire public internet address space. Every device. Every connection. Simultaneously. ✅ "State of Georgia (neither, Georgia Tech Level of Effort)" Georgia gets its own separate line. Not running under the Russian threat label. Not running under Enhanced Attribution. Running under Georgia Tech's own funded effort. Meaning it operates outside standard Defense Advanced Research Projects Agency program oversight entirely. ✅ "Chase / Enhanced Attribution" JPMorgan Chase bank. Being monitored under the same program as voting machine manufacturers. Item 2: Deploying Active Domain Name System Pythia The total internet surveillance weapon described in Tweet #11 was being deployed to two locations: Defense Digital Service: the Pentagon's own internal technology unit. Center for Internet Security / Department of Homeland Security: the federal agency responsible for protecting election infrastructure. The same agency that later declared the 2020 election "the most secure in American history." More solid evidence Chris Krebs lied through his teeth! The note reads: "Wants to be able to run Reverse Mode and find unknowns. What is required?" The Department of Homeland Security wanted Pythia's reverse surveillance capability deployed inside their own walls. They were asking Georgia Tech what it would take. Item 3: Delphi Support "Russian Election Feed to Cyber National Mission Force and Task Force Raider" Cyber National Mission Force is the United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. Task Force Raider is a military cyber task force. Intelligence derived from surveilling voting machine manufacturers and election networks was being fed directly to military cyber warfare units in real time. "Defend the Department of Defense Information Networks" The same surveillance infrastructure protecting military networks was also watching election infrastructure. Same team. Same tools. Same data pipeline. Item 7: Pythia Documentation They were writing the manual for this weapon. Now read this entire email again knowing one thing: The Defense Advanced Research Projects Agency contractor who sent this agenda is the same man who later wrote to the same Georgia Tech professor: "Collect a week worth of data from the egress point." That was Tweet #2. The email that started this entire thread. The one with the 2 red highlight rectangular boxes we inserted. It was not random. It was not accidental. This document proves it was a coordinated, pre-planned, institutionally authorized operation targeting voting machine companies, Georgia specifically, and the Biden family's business partners: eight months before the 2020 presidential election. And the Department of Homeland Security - the agency that declared your election secure - had this weapon deployed inside their own walls. Tweet #13 will show you what happened when they pointed it directly at Dominion Voting thirteen days before Election Day: and the exact words a Georgia Tech professor typed when he saw what came back.
Peter Bernegger tweet media
English
9
130
209
4.1K
David retweetledi
Rapid Response 47
Rapid Response 47@RapidResponse47·
Japanese PM @takaichi_sanae: "Tomorrow is the birthday of your son, Mr. Barron Trump, and I know he has grown up so much, into a very tall, good looking gentleman. As I see you, Donald, it is very clear where he got it... please convey my sincere happy birthday wishes to him."❤️
English
189
1.8K
13.7K
195.9K
David retweetledi
Katie Daviscourt 📸
Katie Daviscourt 📸@KatieDaviscourt·
Federal agents have captured a Venezuelan brother and sister accused of operating a Tren de Aragua sex trafficking ring in Seattle, a sanctuary city. Jose Luis Hernandez Perez and Andreina Del Carmen Hernandez were taken into custody on sex trafficking conspiracy charges. Authorities say they have been operating on behalf of the "Espartanos," a TdA offshoot active in Seattle and New York City. Andreina's alleged role was to post images of the sex trafficking victims online and secure appointments for them. She would then contact ringleader Barrios Garcia, who has been arrested in New York, to give him the greenlight that they had clients. Barrios Garcia would then send members of the Espartanos to pick up the sex trafficking victims and drive them to their appointments at gunpoint. The victims were forced to work six days per week, perform sex acts on multiple clients daily, and were threatened with death to keep them in line. Jose Luis, one of the drivers, was in charge of collecting the money. He has been accused of shooting another member of the Espartanos at the direction of Barrios Garcia. The pair lived near student housing at the University of Washington in Seattle. They are scheduled to appear in court next week.
Katie Daviscourt 📸 tweet media
English
19
191
444
5.7K
Fletch17
Fletch17@RealFletch17·
THE MATRIX One of the best edits I’ve Ever Ever seen Wait till the end! 👇🏻👇🏻👇🏻
English
8
82
228
6K
David retweetledi
@amuse
@amuse@amuse·
This is a complete fabrication, including the fake "CNN Report." The markings "LF" and "VFA-125" on the aircraft's tail directly disprove the claim that it was involved in combat with Iran and made an emergency landing in the Middle East. They identify the jet as belonging to a domestic training unit, Strike Fighter Squadron 125, based thousands of miles away at Naval Air Station Lemoore, California. The photo is actually from a well-documented non-combat "ground mishap" that occurred on their base on January 26, 2024, involving a landing gear collapse, not damage from enemy fire.
English
51
389
2.4K
44.6K
David retweetledi
Senator Jeff Merkley
Senator Jeff Merkley@SenJeffMerkley·
Because of a change in the U.S. Senate voting schedule, I am postponing the Klamath, Lake, Deschutes, Crook, and Jefferson County town halls scheduled for 3/20 and 3/21. An updated event schedule and invitations will be shared in the coming weeks, so please stay tuned!
English
21
2
24
1.4K