Nathan Petty

103.2K posts

Nathan Petty banner
Nathan Petty

Nathan Petty

@MachoSStorage

North Texas

Присоединился Şubat 2014
4.3K Подписки3K Подписчики
Nathan Petty ретвитнул
Tim Burchett
Tim Burchett@timburchett·
Your tax dollars @OleMiss
Libs of TikTok@libsoftiktok

YIKES: @OleMiss is hosting a panel on "how the news media can regain public trust" featuring a RINO, a former Democrat Rep, and a fake news CNN host. What an all-star team they've assembled...

English
36
130
376
7.3K
Nathan Petty ретвитнул
protocolkills
protocolkills@protocolkills·
Texas fraud was working on the ground as well as in machine numbers manipulating.
James Matlock@matlockfortexas

This was one of the many that voted for me in Williamson County. He went to the location he has always voted and was turned away because it was now a Democrat only location. He was told that his location was a few miles away. He went to that location and was allowed to vote. He called me a little after 8 AM on March 3rd, Election Day, asking why he was turned away from the polling place he had always used. I urged him to file a complaint through the @KenPaxtonTX’s office. Apparently his ballot was classified as a provisional even though he cast his ballot in the mid morning hours. I’m just curious if anyone else has received a letter like this. If you have, let me know! My team will be submitting a FOIA to the Secretary of State’s office to determine the number of letters sent out for this reason. If you received a letter like this, dm me on here or email info@matlock4rrc.com.

English
0
3
4
64
Nathan Petty ретвитнул
James Matlock
James Matlock@matlockfortexas·
This was one of the many that voted for me in Williamson County. He went to the location he has always voted and was turned away because it was now a Democrat only location. He was told that his location was a few miles away. He went to that location and was allowed to vote. He called me a little after 8 AM on March 3rd, Election Day, asking why he was turned away from the polling place he had always used. I urged him to file a complaint through the @KenPaxtonTX’s office. Apparently his ballot was classified as a provisional even though he cast his ballot in the mid morning hours. I’m just curious if anyone else has received a letter like this. If you have, let me know! My team will be submitting a FOIA to the Secretary of State’s office to determine the number of letters sent out for this reason. If you received a letter like this, dm me on here or email info@matlock4rrc.com.
James Matlock tweet media
English
20
111
195
3K
Nathan Petty ретвитнул
Svetlana Lokhova
Svetlana Lokhova@RealSLokhova·
Last year, former Durham investigators now assisting Kash Patel, found out that Chris Wray and crew attempted to destroy documents. Why has not DoJ indicted them yet?
Svetlana Lokhova@RealSLokhova

🚨Mr President @realDonaldTrump: please order for the full content of the "burn bags" that senior FBI officials tried to destroy on Comey/Wray orders, to be published ASAP. Including: the CIA referral of the Hillary plan to destroy you, and Comey's receipt of this plan plus any notes or accompanying docs; Crossfire Hurricane documents, documents from the Durham criminal investigation; J6 documents; the Mar-a-Lago Raid documents. The people deserve to know what Christopher Wray and the FBI leaderships attempted to hide from them and destroy.

English
4
169
377
3.8K
Nathan Petty ретвитнул
Eric CIAramella’s Dirty Whistle
Elections March 2020: DARPA Could literally make a PowerPoint showing CISA AND THE FBI a map of Iranian hacking of our elections and they wouldn’t believe it… cause it makes them look “like shit.”This likely led to them missing solar winds and other APT’s by foreign adversaries
Eric CIAramella’s Dirty Whistle tweet media
English
3
13
23
559
Nathan Petty ретвитнул
AzPinkLady #SaveArizona #SaveAmerica
Reading through all 17 of Peter’s posts had my mind racing, putting the pieces together. I believe Peter and his team found the “hunting tools” Suzanne Spaulding wanted. She still drove that bus from her “advisory” role at CSIS. Here’s my case. Several clues in Peter’s posts fit the theory—CISA and MS-ISAC (a CISA-started function) being present is a big one. I’m not linking every previous post as it’s a lot, so here’s a reminder of my research. Spaulding’s goal was always to control the entire “critical infrastructure” under CISA’s watchful eye. They’ve gained more power and now oversee all .gov domains plus the judiciary. CISA wants to expand to states, cities, towns, private companies—and eventually you and me. The new “Patriot Act.” CISA even wants to hold entities accountable if they’re not under CISA protection during a cyber incident. (Sounds like Mafia protection.) Emails show they have access bypassing all security systems. I saw no indication of when the program started at DARPA/Georgia Tech. That needs congressional investigation. The 2/26/2020 memo looks like a punch list. On 2/25/2020, Chris Krebs, CISA head fired by tweet on 11/17/2020 after the 2020 election theft, spoke at an RSA Conference. He said once Iran got into the system, they’d have achieved their goal—referring to the 2016 election as the “Sputnik” moment when everyone united to prevent repeats. IMO, they were surprised the cheat was stopped. Byrne said in 2016 he and his dolphin speakers counter-hacked the data to stop the steal. x.com/azpinklady/sta… Spaulding discussed the SolarWinds (“detected” 11/2020) hack, noting they detect known threats well but not unknown ones. She wanted tools to anticipate unknowns. But the May 2020 memo proves they already saw everything; it was a ruse for more money and power. In 2016, CISA only issued security update notices (see Wayback clip). After the counter-hack, they united to prevent repeats. The May 2020 memo debated to notify DHS about Russia and Iran in systems without Albert sensors, deeming it unimportant. The DARPA rep said they needed access to all election networks. This shows they advanced unannounced penetration testing on everyone, accessing systems without contracts for Albert sensors. Dan Sutherland, former CISA counsel and current Chertoff Group Senior Advisor, said on an ABA podcast (10/8/2020) that CISA did penetration testing requiring lawyer-negotiated access. CISA wanted unauthorized access, moving from “hunted” to “hunter.” He confirmed on a 2021 episode that an EO granted it. Leading to 2020, registrations were hacked in spring, with detected access in fall—a 2016 repeat. This time, they only publicized the Russia hack and quietly reported Iran’s presence. They knew egress points existed in May. By October, their memo indicates they knew “a single callback to the manufacturer (for update or telemetry)” meant machines were wide open. I bet Trump knew, explaining Krebs’ firing by tweet. Remember my question: What if CISA, with a roadmap to every protected system, got hacked? One way in: backdoors installed, lying in wait. What’s the status of the Pythia system now? I’d love to have been a fly on the wall when the Serbia servers were “melted” 🤣
Peter Bernegger@PeterBernegger

🚨 Tweet #17: This email attached was written at midnight. March 30, 2020. Professor Manos Antonakakis was still working. He wrote this to his Defense Advanced Research Projects Agency handlers Christopher Schneck and Ian Crone: "Despite all that, we still have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related." Read that sentence one more time. --Russian command and control activity. --Iranian command and control activity. --Inside state and local government networks. --Networks his own analysis identified as potentially election related. Command and control is not passive observation. It is not reconnaissance. It is not probing. Command and control means a foreign adversary had established an active operating presence inside those networks. Sending instructions. Receiving data. Running operations. From inside networks connected to American elections. And Professor Antonakakis was not uncertain about it. He wrote "more than enough evidence." Not "possible evidence." Not "indicators suggesting." More than enough. Then he wrote something that should make every American stop cold. He compared the people questioning his findings to a doctor who refuses to diagnose a patient because the doctor lacks the right instrument. His exact words: "If they think this is not worth worrying about because they do not have an Albert sensor, then their argument is similar to this statement: I do not have Covid-19 because the doctor didn't have a way to diagnose it." Translation: Someone in the government was telling him his evidence was not valid because it did not come from their own official sensors. He was pushing back. He was telling them: the disease is there whether your instrument sees it or not. Russia and Iran were operating inside election related government networks. Georgia Tech could see it. The government's own sensors could not. Or would not. Now add what Defense Advanced Research Projects Agency Program Manager Ian Crone wrote in the same chain: "That is probably needed to get the Department of Homeland Security to believe us." The Department of Homeland Security. The agency responsible for protecting American elections. The agency that declared 2020 "the most secure election in American history." Defense Advanced Research Projects Agency was struggling to get the Department of Homeland Security to believe their own findings about foreign adversary activity in election networks. And later in the same email chain Antonakakis wrote this: "There is a group that has successfully penetrated these networks." Successfully penetrated. Not attempted. Not probed. Successfully penetrated. The names of who penetrated those networks are hidden behind black redaction bars. To this day nobody outside a classified setting knows whose names are under those bars. Here is the timeline you now have from this thread alone: February 2020 - Defense Advanced Research Projects Agency plans surveillance of voting machine manufacturers. March 2020 - Russian and Iranian command and control confirmed in election related networks. A foreign group confirmed to have successfully penetrated those networks. September 2020 - Defense Advanced Research Projects Agency employee writes "I know who to talk to if we find anything." October 21, 2020 - Dominion Voting egress points found in network data. Same day the man who found them is named to Georgia's official election security task force. November 3, 2020 - You voted. May 2023 - Special Counsel Durham refers the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation. Today: No findings. No charges. No public report. Complete silence. Russia and Iran were inside election related networks. Georgia Tech found them. The Department of Homeland Security declared the election the most secure in history. Durham referred the contract for criminal investigation. Washington went silent. Durham referred the Defense Advanced Research Projects Agency and Georgia Tech contract to the Department of Defense Inspector General for potential criminal investigation in May 2023. It has now been nearly two years. No findings. No charges. No public report. Someone needs to explain that silence. Tag your Senator. @SenRonJohnson @ChuckGrassley More in the morning. Thanks again to @TheAndersPaul for his tenaciousness in obtaining records for five years!

English
7
9
13
495
Nathan Petty ретвитнул
Nathan Petty ретвитнул
Brane
Brane@Branech·
Puisque cette vidéo de la presse chinoise a été interdite en France, remettons-en une couche au nom de la liberté d’expression. ✊📢
Yves Pozzo di Borgo@YvesPDB

La vidéo de la presse chinoise montrant l’explosion du meeting privé présidé par @netanyahu qui indique sa probable mort à d’abord été interdit du @X aux États Unis et vient d’être interdit sur @XFrance et Europe ! Jusqu’à Quand nos dirigeants vont continuer à nous mentir?

Français
238
1.8K
5K
718.4K
Nathan Petty ретвитнул
The SCIF
The SCIF@TheSCIF·
During the 2020 election, Dominion voting machines were allegedly set to flag ballots at a much higher rate in order to force ballots into adjudication. During adjudication, ballots can be altered and switched individually or in bulk, at the click of a button, with no oversight, transparency, or chain-of-custody. This method of election fraud was committed nationwide.
English
36
438
769
8.4K
Nathan Petty ретвитнул
M.A. Rothman
M.A. Rothman@MichaelARothman·
𝗛𝗢𝗡𝗘𝗦𝗧𝗥𝗘𝗣𝗢𝗥𝗧𝗜𝗡𝗚.𝗔𝗜 𝗧𝗥𝗔𝗖𝗞𝗘𝗗 𝗧𝗛𝗘 𝗝𝗢𝗘 𝗞𝗘𝗡𝗧 𝗡𝗔𝗥𝗥𝗔𝗧𝗜𝗩𝗘 𝗜𝗡 𝗥𝗘𝗔𝗟 𝗧𝗜𝗠𝗘. 𝗪𝗛𝗔𝗧 𝗧𝗛𝗘𝗬 𝗙𝗢𝗨𝗡𝗗 𝗦𝗛𝗢𝗨𝗟𝗗 𝗘𝗡𝗗 𝗧𝗛𝗘 𝗗𝗘𝗕𝗔𝗧𝗘. Joe Kent goes on Tucker Carlson. Within minutes — not hours, minutes — the same clip, same caption, same outrage floods hundreds of accounts simultaneously. HonestReporting.AI Labs tracked every amplification event in real time, and the data is damning. The trigger quote — 𝘵𝘩𝘦 𝘐𝘴𝘳𝘢𝘦𝘭𝘪𝘴 𝘥𝘳𝘰𝘷𝘦 𝘵𝘩𝘦 𝘥𝘦𝘤𝘪𝘴𝘪𝘰𝘯 — was clipped and posted across hundreds of accounts almost simultaneously. Not after it trended. During the broadcast. Real breaking news takes time to spread organically. This had a running start. Who amplified it? Look at the coalition: Russian state TV (RT). Iranian state media through HispanTV. Hamas-aligned Quds News Network. Turkish state broadcaster TRT. Sputnik Brasil. And simultaneously — Jackson Hinkle, Candace Owens, Marjorie Taylor Greene, and Max Blumenthal. Russia, Iran, Hamas, and MAGA dissidents. All posting the same message. At the same time. When does that happen naturally? It doesn't. The charts tell the story precisely. Within 2 to 4 hours of the Tucker broadcast, tracked amplification events spiked to 30 — dominated by MAGA dissident amplifiers and Pro-Palestinian/Islamist networks firing in parallel. The second chart shows how far the narrative traveled from what Kent actually said. By the time the amplification cycle was complete, the message had escalated from Kent's original claim all the way to "Israel controls America" — an approximately 85-90% departure from source material. That is not interpretation. That is narrative laundering. The rollout wasn't spontaneous. Kent resigned. Tucker booked him within hours. Real whistleblowers are chaotic. They call journalists from parking lots. They don't have a media tour lined up before the ink dries on their resignation letter. And here's what got buried in all of it: from 2020 to 2024, Joe Kent publicly and repeatedly called for destroying Iran's nuclear AND ballistic capabilities. That record was almost completely absent from the amplified conversation. Narrative laundering doesn't only determine what to amplify. It determines what to erase. The FBI was already investigating Kent. He resigned to control the narrative. The speed, the uniformity, and the foreign state amplification are not organic. This was a coordinated information operation — and the people pushing it included both foreign adversaries and Americans who should know better. 𝗥𝘂𝘀𝘀𝗶𝗮, 𝗜𝗿𝗮𝗻, 𝗛𝗮𝗺𝗮𝘀, 𝗮𝗻𝗱 𝗔𝗺𝗲𝗿𝗶𝗰𝗮𝗻 𝗱𝗶𝘀𝘀𝗶𝗱𝗲𝗻𝘁𝘀 𝗮𝗹𝗹 𝗽𝘂𝘀𝗵𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝗮𝗺𝗲 𝗺𝗲𝘀𝘀𝗮𝗴𝗲 𝗮𝘁 𝘁𝗵𝗲 𝘀𝗮𝗺𝗲 𝘁𝗶𝗺𝗲 𝗶𝘀 𝗻𝗼𝘁 𝗮 𝗰𝗼𝗶𝗻𝗰𝗶𝗱𝗲𝗻𝗰𝗲. 𝗜𝘁'𝘀 𝗮 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻.
M.A. Rothman tweet mediaM.A. Rothman tweet media
HonestReporting@HonestReporting

🧵 THREAD: This was coordinated. Joe Kent goes on Tucker Carlson. Within minutes, the exact same clip, same caption, same outrage floods the internet. Not organic. Not coincidence. HonestReporting.ai Labs tracked it in real time. What we found will shock you.

English
207
2.2K
3.9K
187K
Nathan Petty ретвитнул
AzPinkLady #SaveArizona #SaveAmerica
🚨🚨 This is the “money shot” on how are elections were stolen. Do you think people like @stephen_richer @GovernorHobbs @Adrian_Fontes @billgatesaz @jacksellers #Hickman #Gallardo @ThomasGalvin @DebbieLesko @KateMcGeeAZ @MarkStewart_AZ #GaretteArcher #ScottJarrett #ReyValenzuela would know this? Would know even the questions to ask? This elections stolen right under every election administrator that DEPEND on others to tell them everything is ok. The remaining question is: who knew what, when? Who assisted? Who were useful idiots? Were you a useful idiot Richer? Were you paid off to look the other way? Perhaps given lucrative jobs to “defend” the integrity of? The more ya know….
Peter Bernegger@PeterBernegger

🚨 Tweet #19: In Tweet #18 you saw this line from DARPA Program Manager Ian Crone to Georgia Tech Professor Manos Antonakakis: "Would you, quietly, run an [REDACTED] job and grep for recent state/local/election targets?" The redacted words? Based on every other document in this collection - the DARPA planning agenda, the election devices email, the Army Cyber email chain - the redacted term is almost certainly: "Active DNS" Here is why that matters. And here is why it should terrify us all. Most people think of the internet as a series of protected tunnels. Your data goes in one end encrypted and comes out the other end safely. (And yes, there are numerous configurations) That assumption is wrong when Active DNS Pythia is involved. Let us explain what this tool actually does in plain language. The internet runs on something called the Domain Name System. Think of it as the internet's phone book. Every single device - your phone, your computer, a voting tabulator or EMS in Fulton County Georgia or Milwaukee County Wisconsin - must look up an address before it connects to anything. That lookup is a Domain Name System query. There is no way to use the internet without making Domain Name System queries. None. Probably why communist Nellie Ohr used a ham radio instead of any internet with her Fusion GPS work. Active DNS Pythia was built to capture and analyze every single one of them. Here is what makes it extraordinary - and terrifying. Normal surveillance tools sit at one point and watch traffic pass by. Active DNS Pythia does something fundamentally different. It proactively asks the Domain Name System: "What does every known domain on the entire internet resolve to right now?" -Every day. -Continuously. Building a complete, living map of the entire internet's infrastructure updated daily. Not just what passes one sensor. Everything. Then comes Reverse Mode. This is the capability Defense Advanced Research Projects Agency wanted deployed inside the Department of Homeland Security. Normal mode: Start with a known threat and map its infrastructure outward. Reverse Mode: Pick any target network - a voting machine company, a state election system, a political party - and map every single connection going into it and coming out of it. Who is accessing it. From where. At what time. Through what pathway. On what devices. In a single overnight job Professor Antonakakis identified 292 hand-verified networks linked to the Republican National Committee, the Democratic National Committee, and state and local party committees. He then proposed running Reverse Mode against all of them. Now add the layer that makes encryption irrelevant. Most people believe encryption protects their data. It does to a point - unless the data is being hidden inside Domain Name System queries themselves. This is called Domain Name System tunneling. It works like this: A normal Domain Name System query asks: "What is the address of google . com?" A Domain Name System tunnel query asks: "What is the address of [this-is-actually-stolen-tally-data-encoded-in-the-address-field].server.com?" The actual data is hidden inside the address field of the query itself. Firewalls never block it because it looks like a normal address lookup. Encryption never protects it because the data never gets encrypted — it is smuggled inside the query. The SolarWinds attack used exactly this method. And the documents confirm the Georgia Tech team was specifically analyzing SolarWinds exfiltration using their Active DNS datasets. Meaning they had tools purpose built to detect Domain Name System tunneling - decode it - and read what was inside it. A system designed to detect tunneled data necessarily reads what is being tunneled. You cannot identify it without decoding it. Now add Rodney Joffe's company Neustar. Neustar operated authoritative Domain Name System resolution for large portions of the entire internet. Meaning when a Dominion voting tabulator in Fulton County Georgia made a Domain Name System query to reach an external server - that query very likely physically passed through Neustar's infrastructure before reaching its destination. At that junction Neustar could see: ✅ The full query - source device, destination address ✅ Complete data payload if unencrypted ✅ Traffic patterns and timing if encrypted ✅ Any data encoded inside Domain Name System queries ✅ The exact timing synchronized to election night tally transmission This is not hypothetical. This is the designed function of backbone Domain Name System infrastructure. Now put it all together. Defense Advanced Research Projects Agency funds Georgia Tech to build Active DNS Pythia. Active DNS Pythia gets deployed inside the Department of Homeland Security - the agency that declares elections secure. Voting machine manufacturers are listed as authorized Reverse Mode targets eight months before the election. Ian Crone asks Manos to quietly run an Active DNS job on state and local election targets. Thirteen days before the election egress points are found in Dominion Voting network data. Rodney Joffe - Durham Report "Tech Executive One" - sits in the blind copy field of emails about the same datasets. And Joffe's company Neustar sat at the exact backbone junctions where that election night traffic traversed. This was not a research project. This was the most powerful internet surveillance tool ever built by an American university - pointed directly at the infrastructure of American elections. And the raw data it collected? Still exists. -In the Georgia Tech datasets. -In Neustar's systems. -Waiting to be subpoenaed. ACRONYM DECODER for "To talk about today" email shown here: Defense Advanced Research Projects Agency / Georgia Tech February 26, 2020 EA - Enhanced Attribution. The Defense Advanced Research Projects Agency program funding Georgia Tech to track and identify cyber attackers using internet traffic data. APT 28 - Advanced Persistent Threat 28. The United States government code name for Russian Military Intelligence hacking unit. Also known as Fancy Bear. Delphi - Georgia Tech's surveillance platform. Used to run reverse mode reconnaissance against target networks. NSA - National Security Agency. United States signals intelligence agency. Rev mode - Reverse Mode. Picks a target network and maps every connection going in and out of it. IPv4 - Internet Protocol Version 4. The addressing system that identifies every device connected to the internet. GT LOE - Georgia Tech Level of Effort. Georgia Tech's own separately funded work stream outside standard Defense Advanced Research Projects Agency program oversight. FSARC - Financial Systemic Analysis and Resilience Center. A financial sector cybersecurity organization. ADNS - Active Domain Name System. Georgia Tech's internet-wide surveillance system that maps every domain and connection on the entire internet daily. Pythia - The intelligence and attribution engine built on top of Active Domain Name System. Can identify, track, and decode network connections on any target. DDS - Defense Digital Service. The Pentagon's own internal technology unit. CIS - Center for Internet Security. Connected to the Department of Homeland Security. Responsible for protecting state and local election infrastructure. DHS - Department of Homeland Security. The federal agency that declared the 2020 election "the most secure in American history." CNMF - Cyber National Mission Force. The United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces. TF Raider - Task Force Raider. A United States military cyber task force designation. Dodin - Department of Defense Information Networks. The entire military's internal computer and communications infrastructure. AR - Active Reconnaissance. Proactive scanning of target networks to identify connected devices, open pathways, and network activity. TTPs - Tactics, Techniques and Procedures. Operational methods used in cyber surveillance and attack operations. PF - Passive Fingerprinting. Identifying devices and systems by observing their network behavior without actively probing them.

English
0
4
6
156
Nathan Petty ретвитнул
Barbara M Boyd
Barbara M Boyd@BarbaraMBoyd·
WHY IS THE DEEP STATE AND ITS MEDIA ARM GOING AFTER TULSI GABBARD? A thread. 1/ The attacks started the moment she was confirmed as DNI. The NYT, WaPo, Guardian — coordinated barrages. But look at the *pattern* and ask who benefits. 2/ WAVE ONE — THE IRAN TRAP (March 2025): Tulsi testified that the IC assessed Iran was NOT building a nuclear weapon. That is literally her job — she read the community's assessment. It was NOT her personal opinion. But the press plastered it everywhere to wedge her from Trump. 3/ WAVE TWO — THE WHISTLEBLOWER SMEAR (Feb 2026): The Guardian and NYT ran coordinated stories claiming Tulsi 'hid' a complaint for 8 months. Tulsi fired back: the IG found the complaint NOT CREDIBLE. Sen. Tom Cotton: 'just another smear campaign.' She followed the law. Every. Single. Time. 4/ WAVE THREE — JOE KENT (March 2026): Tulsi appointed Kent to lead NCTC. This same man spent YEARS warning Iran was a major threat. Then he abruptly quits, does a Tucker Carlson tour, and NOW says Iran is no threat and Trump was 'dragged into war by Israel.' An about-face so complete it's almost choreographed. The press immediately tied the Kent chaos back to TULSI — not to Kent. 5/ WHY TULSI? Because while all this noise was being made, she was quietly doing THIS: ✅ Declassified JFK, RFK & MLK files ✅ Released proof Obama's team MANUFACTURED the Russia hoax ICA ✅ Declassified Biden-era docs labeling political dissidents as 'domestic extremists' ✅ Cut ODNI bloat by 40%, saving $700M/year ✅ Revoked clearances of Clapper, Brennan-linked figures ✅ Investigating Crossfire Hurricane, COVID origins, election security 6/ THE DNI HAS UNIQUE DECLASSIFICATION POWER. No other cabinet official can do what she's doing. She is the only person in government with the authority and the will to expose the institutional criminality of the intelligence community — and they know it. 7/ Joe Kent didn't embarrass himself. He was deployed as a heat-seeking missile aimed at Tulsi — to give the media a 'Gabbard chaos' narrative, create distance between her and Trump, and pressure her resignation before she finishes the job. 8/ The London press, the NYT, the WaPo — none of them are covering what she's actually DONE. They're covering the noise designed to stop her. Tulsi Gabbard is directly over the target. That's why every gun is pointing at her.
English
58
417
899
13.3K
Nathan Petty ретвитнул
Patrick Colbeck✝️
Patrick Colbeck✝️@pjcolbeck·
VOTE TALLY CHAIN OF CUSTODY Since the beginning of my election integrity investigations, I have attempted to have a complete understanding of the entire vote tally chain of custody. This has been difficult since much of the process is managed by NGO's not subject to FOIA requests. AI tools have enabled me to make a breakthrough. The attached diagrams are the best depictions of the REAL vote tally chain of custody that I have yet to see. Please note the following security vulnerabilities: - Internet-based transfers - Foreign actors with access to Election Management Systems - Associated Press API interfaces All of these vulnerabilities are made possible by the use of electronic voting systems. MACHINES MUST GO! @data_republican @DataRepublican @RealLindellTV @realMikeLindell @PatrickByrne @GenFlynn @laralogan @RalphPezzullo @DNIGabbard @ParikhClay @EmeraldRobinson @AGPamBondi @Kash_Patel @SenMullin
Patrick Colbeck✝️ tweet mediaPatrick Colbeck✝️ tweet media
English
4
33
56
600
C
C@Bluecorrie·
@myers_stev53030 @MachoSStorage @MissyIsMaga @WallStreetApes Looking at Mennonites and Hutterites a you can see affects of marriages with close share dna. I remember a ad years ago asking for young men to bring new blood to the farms. So again where is real proof please
English
1
0
1
5
Wall Street Apes
Wall Street Apes@WallStreetApes·
This is absolutely insane Journalist Angela Rose investigates Minnesota Rep Ilhan Omar’s consulting headquarters who claims to manage $60 billion in assets She goes into the building, walks every floor They DO NOT EXIST. (Holy Sh*t) “We are going to be infiltrating Ilhan Omar's sketchy consulting headquarters that claims that they have $60 billion in assets under their management. Yet they are located out of a co-working place called WeWork. This company is called Rose Lake Capital and it is co-owned by Ilhan Omar's husband Timothy Manette. And similar to the winery in 2023, it made up to $51,000 and it had a sudden and very suspicious increase in net worth up to $30 million in 2024” “I walked by every single office in this building and everyone has their logos proudly displayed on the wall. I asked around for Rose Lake Capital and people were not familiar with it. I looked at every logo and Rose Lake Capital did not have an office here.”
English
1.1K
20.6K
51.6K
567.1K