dloda

2.8K posts

dloda banner
dloda

dloda

@ghostfinderorg

Retired military, alarm rider, Patriot. https://t.co/XPqfkTYito Team Leader. Fight like your country's survival depends on it. Because it does.

Norwich, CT Katılım Kasım 2022
405 Takip Edilen553 Takipçiler
Sabitlenmiş Tweet
dloda
dloda@ghostfinderorg·
Timing is everything - especially when it comes to taking down a deeply embedded Fifth Column in our institutions. When laying an ambush, you don't shoot the moment some of the enemy becomes exposed. As the order was given during the Battle of Breed's (Bunker) Hill)... "Hold steady lads, and don't fire until you see the whites of their eyes!" When it happens, it will be unexpected, lightening fast and done with unprecedented force and scope. Hold the line.
dloda tweet media
English
8
11
47
1.1K
dloda
dloda@ghostfinderorg·
@AgnesBullock62 @AuronMacintyre Trump to Leftist "American" Politicians who steal our tax dollars for their own profit and kickbacks. There, fixed it for you.
English
0
0
0
7
Auron MacIntyre
Auron MacIntyre@AuronMacintyre·
You barley need ICE agents if you tax remittances, punish the employers of illegal, and deny them banking End healthcare, education, and welfare for illegals and the scam is over Everyone knows this, including the Trump admin
English
290
1.7K
10.4K
122.7K
dloda
dloda@ghostfinderorg·
@lamps_apple @EdMarkey I'm in CT and I paid $1500 last month. Nothing near to what I paid in WI and that's a lot closer to the Arctic Circle....
English
0
0
1
13
Apple Lamps
Apple Lamps@lamps_apple·
It absolutely enrages me like nothing ever has before. The way these politicians lie is just the grossest thing I’ve ever seen. The Democrats’ green policies have absolutely destroyed the state of Massachusetts to the point where we pay $1,000 a month to heat and light our homes. This has absolutely nothing to do with Trump, and they know it.
Apple Lamps tweet mediaApple Lamps tweet mediaApple Lamps tweet media
English
5
26
104
1.1K
Ed Markey
Ed Markey@EdMarkey·
Massachusetts residents are being crushed by their electric bills. That's unacceptable. It's why I'm pushing for clean, cheap and comprehensive energy solutions to make electricity affordable for all.
English
55
11
39
2.4K
dloda
dloda@ghostfinderorg·
@PeterBernegger Incredible work Peter! Please take care of yourself.....
English
0
0
0
46
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #17: This email attached was written at midnight. March 30, 2020. Professor Manos Antonakakis was still working. He wrote this to his Defense Advanced Research Projects Agency handlers Christopher Schneck and Ian Crone: "Despite all that, we still have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Read that sentence one more time. --Russian command and control activity. --Iranian command and control activity. --Inside state and local government networks. --Networks his own analysis identified as potentially election related. Command and control is not passive observation. It is not reconnaissance. It is not probing. Command and control means a foreign adversary had established an active operating presence inside those networks. Sending instructions. Receiving data. Running operations. From inside networks connected to American elections. And Professor Antonakakis was not uncertain about it. He wrote "more than enough evidence." Not "possible evidence." Not "indicators suggesting." More than enough. Then he wrote something that should make every American stop cold. He compared the people questioning his findings to a doctor who refuses to diagnose a patient because the doctor lacks the right instrument. His exact words: "If they think this is not worth worrying about because they do not have an Albert sensor, then their argument is similar to this statement: I do not have Covid-19 because the doctor didn't have a way to diagnose it." Translation: Someone in the government was telling him his evidence was not valid because it did not come from their own official sensors. He was pushing back. He was telling them: the disease is there whether your instrument sees it or not. Russia and Iran were operating inside election related government networks. Georgia Tech could see it. The government's own sensors could not. Or would not. Now add what Defense Advanced Research Projects Agency Program Manager Ian Crone wrote in the same chain: "That is probably needed to get the Department of Homeland Security to believe us." The Department of Homeland Security. The agency responsible for protecting American elections. The agency that declared 2020 "the most secure election in American history." Defense Advanced Research Projects Agency was struggling to get the Department of Homeland Security to believe their own findings about foreign adversary activity in election networks. And later in the same email chain Antonakakis wrote this: "There is a group that has successfully penetrated these networks." Successfully penetrated. Not attempted. Not probed. Successfully penetrated. The names of who penetrated those networks are hidden behind black redaction bars. To this day nobody outside a classified setting knows whose names are under those bars. Here is the timeline you now have from this thread alone: February 2020 - Defense Advanced Research Projects Agency plans surveillance of voting machine manufacturers. March 2020 - Russian and Iranian command and control confirmed in election related networks. A foreign group confirmed to have successfully penetrated those networks. September 2020 - Defense Advanced Research Projects Agency employee writes "I know who to talk to if we find anything." October 21, 2020 - Dominion Voting egress points found in network data. Same day the man who found them is named to Georgia's official election security task force. November 3, 2020 - You voted. May 2023 - Special Counsel Durham refers the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation. Today: No findings. No charges. No public report. Complete silence. Russia and Iran were inside election related networks. Georgia Tech found them. The Department of Homeland Security declared the election the most secure in history. Durham referred the contract for criminal investigation. Washington went silent. Durham referred the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation in May 2023. It has now been nearly two years. No findings. No charges. No public report. Someone needs to explain that silence. Tag your Senator. @SenRonJohnson @ChuckGrassley More in the morning. Thanks again to @TheAndersPaul for his tenaciousness in obtaining records for five years!
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
18
118
199
3.4K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #16: Special Counsel John Durham spent four years investigating what happened to American elections. His final report was delivered to Congress in May 2023. Inside that report was a criminal referral. Not to the Department of Justice. Not to the Federal Bureau of Investigation. To the Department of Defense Inspector General. The internal watchdog of the entire United States military. The referral identified one specific matter: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. Durham had reviewed the Defense Advanced Research Projects Agency contract with Georgia Tech and found something significant enough to send to the Department of Defense's own internal investigator for potential criminal review. Not a footnote. Not a passing mention. A formal referral. Now look at what you have seen in this thread about that exact contract: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers eight months before the election. The Pythia surveillance weapon deployed inside the Department of Homeland Security before the election. Active reconnaissance jobs running against Dominion Voting network infrastructure thirteen days before the election. Egress points found in Dominion Voting network data. United States Army soldiers trained on the surveillance weapon at Georgia Tech's campus. Central Command military network data handed to a civilian university professor for analysis. Russian and Iranian command and control confirmed in election related state and local government networks. A Defense Advanced Research Projects Agency employee writing "I know who to talk to if we find anything." And the man who found egress points in Dominion Voting data named to Georgia's official election security task force on the very same day. Durham saw enough in that contract to make a criminal referral to the Department of Defense Inspector General. Here is what happened next: Nothing. -No findings were announced. -No charges were filed. -No public report was released. -The referral was received. -Then it vanished. The Department of Defense Inspector General has never publicly addressed it. The Defense Advanced Research Projects Agency has never publicly addressed it. Nor Georgia Tech, and Congress never held a single public hearing about it. Think about what that means. The top prosecutor in America found something troubling enough in a Defense Advanced Research Projects Agency contract with a university to formally refer it for potential criminal investigation. And every single institution that received that referral went silent. Durham found it. The Department of Defense Inspector General received it. Washington buried it. There is only one question left. Who had the power to make a Special Counsel criminal referral disappear - and why did they use it? Emails obtained by Patriot @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
40
534
869
16.8K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #15: Pay close attention to this date. October 21, 2020. You have already seen what happened on that date in Tweet #13. Georgia Tech Professor Angelos Keromytis was running Defense Advanced Research Projects Agency surveillance on voting machine manufacturer networks. He identified Dominion Voting in the network data. His colleague Professor Manos Antonakakis typed "Oh, shit. These look like egress points." See prior tweet. That was October 21, 2020. Now here is what else happened on that exact same date. Georgia Secretary of State Brad Raffensperger issued a press release. He was forming an official government body called the Georgia Bipartisan Task Force for Safe, Secure, and Accessible Elections. Among the confirmed participants listed in that press release: "Professor Angelos Keromytis. Georgia Institute of Technology." The same professor. The same day. On the morning of October 21, 2020 Angelos Keromytis was identifying Dominion Voting egress points in Defense Advanced Research Projects Agency network surveillance data. On that same day he was named to the official Georgia government body responsible for overseeing election security. It gets worse. That task force did not dissolve after the election. In March 2021 the task force issued a public statement. Keromytis was still listed as a member. That is five months after Election Day. Five months after his team found egress points in Dominion Voting network traffic. Five months during which he sat on the official Georgia election security body. Five months during which none of what you have read in this thread was ever publicly disclosed. Keromytis's own public professional resume confirms it. He listed it himself: "Member, Georgia Secretary of State Bipartisan Task Force for Safe, Secure, and Accessible Elections, 2020." Now ask yourself the questions that nobody in Georgia has ever been forced to answer publicly: i. Did Keromytis disclose to the Georgia Secretary of State that he had identified Dominion Voting egress points in network surveillance data thirteen days before the election? ii. Did the Georgia Secretary of State know his own task force member had been running Defense Advanced Research Projects Agency surveillance on Georgia's voting machine infrastructure? iii. Did Brad Raffensperger know? iv. Who else on that task force knew? v. And if nobody knew - why not? The man who found the egress points was put in charge of telling Georgia its elections were secure. That is not oversight. That is a conflict of interest on a scale that demands a federal investigation. Tweet #16 reveals what Special Counsel Durham specifically referred to the Department of Defense Inspector General - and why that referral quietly disappeared without a single public finding. Georgia Tech Professor Angelos Keromytis:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
10
149
218
3.4K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #14: What you have read in this thread is not new to everyone. Two United States Senators already knew. And Special Counsel John Durham already knew. Here is what they found and what they did about it. United States Senator Chuck Grassley of Iowa and United States Senator Ron Johnson of Wisconsin uncovered email evidence of Professor Manos Antonakakis's Defense Advanced Research Projects Agency funded work. What they found in those emails stopped them cold. A Defense Advanced Research Projects Agency employee - referring to the Georgia Tech operation - wrote this: "Sensitive stuff worth doing." Same Defense Advanced Research Projects Agency (DARPA) employee. Same email chain. Same date as the United States Postal Service swing state scanning email — September 25, 2020: "I know who to talk to if we find anything." Not "I know who to report it to." Not "I know who to alert." But "I know who to talk to if we find anything." That is not the language of a defensive cybersecurity operation protecting elections. That is the language of an intelligence operation with a predetermined recipient for whatever was found inside American voting infrastructure. Who was that person? That question has never been answered publicly. Now add this. Special Counsel John Durham completed his investigation in May 2023. In his final report Durham made a criminal referral to the Department of Defense Inspector General. That referral specifically identified: "One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology." One sentence. In a Special Counsel report to the United States Congress. The Defense Advanced Research Projects Agency. Georgia Tech. A specific contract. Referred for potential criminal investigation. Durham found something significant enough in that contract to send it to the Department of Defense's own internal investigator. The Department of Defense Inspector General received that referral. What happened next has never been made public. -No findings were announced. -No charges were filed. -No report was released. -The referral vanished. Now look at what you have seen in this thread: A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers. Active surveillance of Dominion Voting network traffic thirteen days before the election. Egress points found in voting machine infrastructure. Russian and Iranian command and control confirmed in state and local election networks. An Army unit trained on the surveillance weapon used to do all of this. We caught the US Army inside a Dominion EMS. A Defense Advanced Research Projects Agency employee who knew exactly "who to talk to" if anything was found. And a Special Counsel referral to the Department of Defense Inspector General that quietly disappeared. Two United States Senators saw enough to raise alarms. The top prosecutor in America saw enough to make a criminal referral. You were never told any of it. Look at what US Senators Ron Johnson and Chuck Grassley were after in their (second) letter to DARPA:
Peter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet mediaPeter Bernegger tweet media
English
11
177
273
4.6K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #13: October 21, 2020. Thirteen days before the presidential election. Two Georgia Tech professors are running their Defense Advanced Research Projects Agency surveillance tool against voting machine manufacturer networks. Remember Tweet #12. The planning document. Voting machine manufacturers were an authorized Delphi target. This was not accidental. This was the operation executing exactly as planned. Here is what happened when the results came back. Professor Angelos Keromytis typed four words: "It's Dominion Voting." Professor Manos Antonakakis typed six words: "Oh, shit. These look like egress points." A Defense Advanced Research Projects Agency funded professor. Running authorized surveillance on voting machine networks. Thirteen days before you voted. And when the data came back he typed "Oh, shit." That is not the reaction of someone who found nothing. That is not the reaction of someone who found what they expected. That is the reaction of someone who found something that even he was not prepared to see. Now understand what "egress points" means in plain language. An egress point is a place where data leaves a network and goes somewhere else. On a properly secured voting machine system there should be no egress points. The machines are supposed to be air gapped. Meaning completely isolated from the internet and all outside networks. Our election officials however have been lying to us, as first off they don't even know what a true air gap - and - their voting systems don't have them. It pretend theater. Eric Coomer told the court the machines had no "direct" connection to the internet. Notice he said "direct." The egress points his own colleagues found in the network data thirteen days before the election suggest the machines had something other than a direct connection. And notice something else. Before Antonakakis typed "Oh, shit" he wrote: "Let me check something..." Then he posted a link to the United States Election Assistance Commission's official government page listing all registered voting equipment manufacturers. He was cross referencing what he found in the live network data against the official government registry of voting machine companies. He was confirming the identity of what he was seeing in the data. He confirmed it. Then typed what he did. These are not the emails of people passively watching foreign adversaries attack American systems. These are the emails of people who just found something unexpected inside American voting infrastructure. Thirteen days before the election. -Who did they tell? -What did they do with what they found? -Why has none of this ever been publicly disclosed? Tweet #14 will show you the document that connects all of this directly to the highest levels of the United States Senate and Special Counsel John Durham's own investigation. Professor Manos Antonakakis of GAtech:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
1
101
157
2.8K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #12: This is the document that proves it was all planned. Defense Advanced Research Projects Agency contractor Christopher Schneck sent this email to Georgia Tech Professor Manos Antonakakis on February 26, 2020. Eight months before the presidential election. Subject: "To talk about today." It is a working agenda. Decoding every line: Item 1: Enhanced Attribution Use Cases Enhanced Attribution is the Defense Advanced Research Projects Agency program funding Georgia Tech to identify and track cyber attackers using internet traffic data. Listed under "Election / Advanced Persistent Threat 28 related" Advanced Persistent Threat 28 is the code name for Russian Military Intelligence. That label is the legal justification attached to everything below. It converts domestic surveillance into a national security operation. Now look at what is listed underneath that label: ✅ "Reverse Mode on Networks (Delphi)" Delphi is the Georgia Tech surveillance platform. Reverse Mode means: pick a target network and map every single connection going into it and leaving it. ✅ "Voting Machine Manufacturers (Delphi)" Dominion Voting. Election Systems and Software. Hart InterCivic. The companies that make the machines that count your votes. Targeted for reverse mode network surveillance. Eight months before the election. ✅ "Burisma (Delphi)" The Ukrainian energy company at the center of the Biden family controversy. On the same Defense Advanced Research Projects Agency targeting list as voting machine manufacturers. ✅ "Department of State (Delphi)" The United States State Department. Also a Delphi reverse mode target. ✅ "National Security Agency Leaked Report (Delphi)" An actual National Security Agency intelligence leak being analyzed by a university professor under a Defense Advanced Research Projects Agency contract. ✅ "Reverse Pythia on Internet Protocol Version 4 (Enhanced Attribution)" Running Pythia's reverse surveillance mode across the entire public internet address space. Every device. Every connection. Simultaneously. ✅ "State of Georgia (neither, Georgia Tech Level of Effort)" Georgia gets its own separate line. Not running under the Russian threat label. Not running under Enhanced Attribution. Running under Georgia Tech's own funded effort. Meaning it operates outside standard Defense Advanced Research Projects Agency program oversight entirely. ✅ "Chase / Enhanced Attribution" JPMorgan Chase bank. Being monitored under the same program as voting machine manufacturers. Item 2: Deploying Active Domain Name System Pythia The total internet surveillance weapon described in Tweet #11 was being deployed to two locations: Defense Digital Service: the Pentagon's own internal technology unit. Center for Internet Security / Department of Homeland Security: the federal agency responsible for protecting election infrastructure. The same agency that later declared the 2020 election "the most secure in American history." More solid evidence Chris Krebs lied through his teeth! The note reads: "Wants to be able to run Reverse Mode and find unknowns. What is required?" The Department of Homeland Security wanted Pythia's reverse surveillance capability deployed inside their own walls. They were asking Georgia Tech what it would take. Item 3: Delphi Support "Russian Election Feed to Cyber National Mission Force and Task Force Raider" Cyber National Mission Force is the United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. Task Force Raider is a military cyber task force. Intelligence derived from surveilling voting machine manufacturers and election networks was being fed directly to military cyber warfare units in real time. "Defend the Department of Defense Information Networks" The same surveillance infrastructure protecting military networks was also watching election infrastructure. Same team. Same tools. Same data pipeline. Item 7: Pythia Documentation They were writing the manual for this weapon. Now read this entire email again knowing one thing: The Defense Advanced Research Projects Agency contractor who sent this agenda is the same man who later wrote to the same Georgia Tech professor: "Collect a week worth of data from the egress point." That was Tweet #2. The email that started this entire thread. The one with the 2 red highlight rectangular boxes we inserted. It was not random. It was not accidental. This document proves it was a coordinated, pre-planned, institutionally authorized operation targeting voting machine companies, Georgia specifically, and the Biden family's business partners: eight months before the 2020 presidential election. And the Department of Homeland Security - the agency that declared your election secure - had this weapon deployed inside their own walls. Tweet #13 will show you what happened when they pointed it directly at Dominion Voting thirteen days before Election Day: and the exact words a Georgia Tech professor typed when he saw what came back.
Peter Bernegger tweet media
English
13
160
260
5.9K
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #11: The weapon they built is called Pythia. Built at Georgia Institute of Technology. Funded by the Defense Advanced Research Projects Agency. But this is not theory. We have the Defense Advanced Research Projects Agency's own internal planning document - a working agenda sent by Defense Advanced Research Projects Agency contractor Christopher Schneck to Professor Manos Antonakakis on February 26, 2020 - eight months before the 2020 election. Read what is on that agenda. Word for word: "Deploying Active Domain Name System Pythia - Defense Digital Service / Department of Homeland Security" "Wants to be able to run Reverse Mode and find unknowns." Translation for non-technical readers: Pythia was being embedded inside the Department of Homeland Security, the very agency responsible for declaring elections secure, with the specific goal of running Reverse Mode. Here is what Reverse Mode does in plain language: You pick a target network - say, a voting machine company. Once inside a network, and the documents confirm Pythia was deployed inside the Department of Homeland Security by February 2020, Pythia maps every single connection on that network. Public or private. Internal or external. There is nowhere to hide. Who is accessing it. From where. At what time. Through what pathway. Encryption does not hide this. Firewalls do not block this. Because Pythia operates at the Domain Name System layer: the foundational address system every internet-connected device must use to function. There is no way around it. And here is what else is on that same Defense Advanced Research Projects Agency agenda - listed as Reverse Mode targets: ✅ Voting machine manufacturers ✅ Burisma - the Ukrainian energy company ✅ Department of State ✅ National Security Agency leaked report ✅ State of Georgia - its own separate line item All of this. On one Defense Advanced Research Projects Agency planning document. Eight months before you voted. And United States Army soldiers were trained on this weapon at Georgia Tech's campus. One of those soldiers wrote this to Professor Antonakakis after his training: "Thanks for hosting the Pythia training a couple of weeks ago. It was very interesting seeing the tool in action." The Army unit's motto: 'Pierce the Shadows.' They were not kidding. Captain Severson's email signature contains the Second Battalion Cyber Protection Brigade motto: "Pierce the Shadows." It is in the document. In Ancient Greece, Pythia was the Oracle of Delphi. Nice documents @TheAndersPaul - he obtained them via public records requests and hit gold.
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
17
167
293
4.9K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #10: One name connects everything in this thread to the highest levels of American politics. Rodney Joffe. For those who have not heard of him - here is why his name should stop you cold. Special Counsel John Durham's report identified Joffe as "Tech Executive One." Durham found that Joffe directed the harvesting of Domain Name System data - internet traffic logs belonging to a presidential candidate, Trump Tower, and even the Executive Office of the President of the United States - and fed that data to political operatives. Those operatives took it to the Federal Bureau of Investigation and the Central Intelligence Agency to construct a false intelligence narrative against a sitting president. Now look at what we have shown you in this thread. That same Rodney Joffe was secretly blind-copied on a Georgia Institute of Technology professor's email discussing "opaque" targeting analysis of election-related network surveillance data - intended for the Department of Defense. The same tool used to spy on a presidential candidate. The same man. Now connected to Defense Advanced Research Projects (DARPA) Agency-funded surveillance of American election infrastructure. This was not a coincidence. This was not academic research. Who tasked him? Who received his analysis? What did they do with it? Tweet #11 reveals the weapon they built to do all of this. Now expanding this story to 20 tweets.
Peter Bernegger tweet media
English
22
311
536
20.3K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #9: Suggest reading this slowly. A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - wrote this in an email: "We have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Same professor. Days later: "There is a group that has successfully penetrated these networks." Defense Advanced Research Projects Agency (DARPA) Program Manager Ian Crone confirmed in writing they were analyzing "actual election networks." His response when briefed on the penetration? "I think their muted response was because they're a little dazed." The people in that room when all of this was confirmed: ✅ Defense Advanced Research Projects Agency ✅ Cybersecurity and Infrastructure Security Agency - Department of Homeland Security ✅ Multi-State Information Sharing and Analysis Center - the organization that monitors every single state and local election network in America Russia and Iran were inside networks tied to our elections. Every one of these agencies knew. You were never told. Tweet #10 coming. You need to know who else was watching.
Peter Bernegger tweet media
English
19
373
746
26.8K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #8: Forty days before the 2020 election. A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - emailed his Defense Advanced Research Projects Agency handler with a new target: The United States Postal Service. Professor Manos Antonakakis wrote: "I would down select United States Postal Service networks in swing states." The Defense Advanced Research Projects Agency Program Manager's response? "Awesome idea." Antonakakis then confirmed: "I will spend a few hours to try to find their networks. If I find any networks, I will run a couple jobs to see if we can even witness any traffic." A university professor. Scanning federal government postal networks. In swing states. Forty days before a presidential election. With Defense Advanced Research Projects Agency blessing. Who authorized this? Who ordered this? Who saw the results? Document obtained by @TheAndersPaul
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
8
245
420
5.3K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #7: Thirteen days before the 2020 election. Two Georgia Institute of Technology professors - working under a Defense Advanced Research Projects Agency contract - were actively scanning voting machine manufacturer networks to find out if the machines were "pinging back" to outside servers while votes were being cast. Professor Angelos Keromytis wrote: "But if the voting machines do ping-back and are online while deployed and in use, that makes them interesting..." Professor Manos Antonakakis replied: "Already running an Active Reconnaissance job. We will know soon." October 21, 2020. Thirteen days before you voted. Big shoutout to @TheAndersPaul for obtaining these records in his unrelenting persistence. This is not a theory. These are their actual emails:
Peter Bernegger tweet mediaPeter Bernegger tweet media
English
12
232
398
4.6K
dloda
dloda@ghostfinderorg·
@PeterBernegger Incredible. This is a massive revelation Peter. Please take care of yourself, you are exposing some major players.
English
0
1
4
99
dloda
dloda@ghostfinderorg·
@PattyMurray The evidence proving otherwise is growing exponentially. Let's have this discussion again in 6 months. It will be a title wave.
English
0
0
0
4
Senator Patty Murray
Senator Patty Murray@PattyMurray·
The average person is more likely to be struck by lightning than they are to commit voter fraud. Seriously. That's a real stat. I'm voting NO on the SAVE America Act.
English
10.7K
1.6K
9.4K
372.8K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
🚨 Tweet #6: slight detour - A Dominion Voting tablet was shipped through Shanghai, China customs. Chinese engineers had direct server access to firmware files for American voting machines. The Dominion manager overseeing all of it? Sitting in Belgrade, Serbia. His name: Djordje Matijevic - Manager of Software Development, Dominion Voting Systems. This is not a theory. This is a CONFIDENTIAL internal Dominion document. Discovery Bates Number DOM_DC01459733 - produced by Attorney Stefanie Lambert in the active federal lawsuit Dominion Voting Systems versus Patrick Byrne, currently open in United States District Court. China had access to the machines that counted your votes. A Serbian manager was in charge of the software. China. Serbia. Your votes. Read that again.
Peter Bernegger tweet media
English
34
1.2K
1.7K
15.3K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
Tweet #5: here are some of the people and entities we will be exposing for what they have done: GEORGIA TECH Manos Antonakakis - Associate Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Ran active reconnaissance jobs on election networks for DARPA. Angelos Keromytis - Professor, Georgia Institute of Technology. Co-Director, COEUS cyber center. Discussed whether voting machines were "pinging back" while deployed on Election Day. DARPA I2O (Defense Advanced Research Projects Agency) Ian Crone - DARPA I2O Program Manager. Approved monitoring of USPS swing-state networks. Confirmed his team was monitoring "actual election networks." Christopher Schneck - DARPA I2O Contractor. Wrote the directive: "collect a week worth of data from the egress point." Liaison between U.S. Army Cyber and Georgia Tech. Anna Rubinstein - DARPA I2O Contractor. CC'd on multiple email chains coordinating election network monitoring. Allison Kline - DARPA. Recipient of the SUNBURST/SolarWinds "opaque targeting" email from Antonakakis, March 2021. CISA - DHS Geoffrey Ensley - CISA. Organized the joint DARPA/CISA/MS-ISAC technical coordination call, March 30, 2020. Ethan Bowen - CISA. On the March 2020 coordination call. David Howard - CISA. On the March 2020 coordination call. David Stern - CISA. On the March 2020 coordination call. Jeffrey Rabinovitz - CISA. On the March 2020 coordination call. Brian Dewyngaert - CISA. On the March 2020 coordination call. Jillian Rucker - CISA. On the March 2020 coordination call. Brandon Seay - CISA. On the March 2020 coordination call. Annika Shogren - CISA. On the March 2020 coordination call. Jill Hallgren - CISA contractor AND MS-ISAC. Bridged federal cybersecurity and state election infrastructure monitoring. MS-ISAC / CISecurity Marisa Atkinson - MS-ISAC. On the DARPA/CISA/MS-ISAC coordination call. MS-ISAC monitors state and local election networks nationwide. Matthew Grieco - MS-ISAC. On the coordination call. Faith Lawless - MS-ISAC. On the coordination call. U.S. ARMY CYBER - Fort Gordon / CENTCOM CPT Brian K. Severson - U.S. Army Cyber Protection Brigade, Fort Gordon. Requested the briefing report for CENTCOM network owners. His request triggered the "egress point" directive from DARPA. CPT Sean K. Eyre - U.S. Army Cyber Protection Brigade, Fort Gordon. CC'd on the egress point email chain. CPT Antonia L. Feffer - U.S. Army Cyber Protection Brigade, Fort Gordon. CC'd on the egress point email chain. NEUSTAR / SUNBURST CONNECTION Rodney Joffe - Senior VP, Neustar. BCC'd on Antonakakis's March 2021 SUNBURST email. Later identified in the Durham Report as providing DNS data to political operatives during the 2016 and 2020 elections. In 2016–2017, Joffe oversaw projects analyzing DNS logs for unusual patterns linking the Trump Organization and Alfa Bank, which were shared with intermediaries like attorney Michael Sussmann for evaluation by the FBI and CIA. DOMINION VOTING SYSTEMS Eric Coomer - Former VP of Product Strategy & Security, Dominion Voting Systems. Developer on predecessor Sequoia/WinEDS election software. Admitted under oath that foreign nations had remote access to internal Dominion networks. See Tweets #1 thru #4 below for the beginning of the story. The Durham report supposedly listed Joffe as "Tech Executive -1". Rodney Joffe - Senior VP, Neustar:
Peter Bernegger tweet media
English
31
308
564
10.8K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
📢 Tweet #4: We found the U.S. Army's Fort Huachuca, Arizona INSIDE a county's Dominion Voting Election Management System (EMS). A former person stationed there turned WHITE AS A GHOST when told what we found in Dominion's files. The person confirmed what we found. We posted about it on Mar 7, 2025 in two tweets that day. Now we go deeper. Tweet #1 is the Pennsylvania Attorney's letter about Dominion, posted March 17th. Tweet #2 is the "egress" email with the 2 red rectangle highlight boxes.
Peter Bernegger tweet media
English
28
508
1K
24.5K
dloda retweetledi
Peter Bernegger
Peter Bernegger@PeterBernegger·
English
15
113
378
26.8K