Peter Bernegger
2.68K subscribers
1.29K photos
59 videos
1 file
1.76K links
Independent Journalist, exposing election fraud.

https://electionwatch.info/
Download Telegram
๐Ÿšจ Post #9: Suggest reading this slowly.

A Georgia Institute of Technology professor - under a Defense Advanced Research Projects Agency contract - wrote this in an email:

"We have more than enough evidence of what looks to be Russian and Iranian command and control activities from state, local, tribal and territorial government networks that we have analysis that potentially makes them election related."

Same professor. Days later:

"There is a group that has successfully penetrated these networks."

Defense Advanced Research Projects Agency (DARPA) Program Manager Ian Crone confirmed in writing they were analyzing "actual election networks."

His response when briefed on the penetration?

"I think their muted response was because they're a little dazed."

The people in that room when all of this was confirmed:

โœ… Defense Advanced Research Projects Agency
โœ… Cybersecurity and Infrastructure Security Agency - Department of Homeland Security
โœ… Multi-State Information Sharing and Analysis Center - the organization that monitors every single state and local election network in America

Russia and Iran were inside networks tied to our elections.

Every one of these agencies knew. You were never told.

You need to know who else was watching.

~ Peter Bernegger
๐Ÿคฌ20๐Ÿ‘10๐Ÿ”ฅ6๐Ÿ’ฏ2๐Ÿ˜ก2โค1
๐Ÿ”ฅ5๐Ÿ˜ฑ1
๐Ÿšจ Post #10: One name connects everything in this thread to the highest levels of American politics. 

Rodney Joffe. 

For those who have not heard of him - here is why his name should stop you cold. Special Counsel John Durham's report identified Joffe as "Tech Executive One." 

Durham found that Joffe directed the harvesting of Domain Name System data - internet traffic logs belonging to a presidential candidate, Trump Tower, and even the Executive Office of the President of the United States - and fed that data to political operatives. 

Those operatives took it to the Federal Bureau of Investigation and the Central Intelligence Agency to construct a false intelligence narrative against a sitting president. 

Now look at what we have shown you in this thread. 

That same Rodney Joffe was secretly blind-copied on a Georgia Institute of Technology professor's email discussing "opaque" targeting analysis of election-related network surveillance data - intended for the Department of Defense. 

The same tool used to spy on a presidential candidate. 

The same man. 

Now connected to Defense Advanced Research Projects (DARPA) Agency-funded surveillance of American election infrastructure. 

This was not a coincidence. This was not academic research. 

Who tasked him? 
Who received his analysis? 
What did they do with it?

~ Peter Bernegger
๐Ÿ”ฅ43๐Ÿคฌ10โค5๐Ÿ™2๐Ÿ’ฏ2๐Ÿ‘1
๐Ÿ‘4๐Ÿ”ฅ4
Peter Bernegger
Photo
๐Ÿšจ Post #11: The weapon they built is called Pythia.

Built at Georgia Institute of Technology. Funded by the Defense Advanced Research Projects Agency.

But this is not theory. We have the Defense Advanced Research Projects Agency's own internal planning document - a working agenda sent by Defense Advanced Research Projects Agency contractor Christopher Schneck to Professor Manos Antonakakis on February 26, 2020 - eight months before the 2020 election.

Read what is on that agenda. Word for word:

"Deploying Active Domain Name System Pythia - Defense Digital Service / Department of Homeland Security"

"Wants to be able to run Reverse Mode and find unknowns."

Translation for non-technical readers:
Pythia was being embedded inside the Department of Homeland Security, the very agency responsible for declaring elections secure, with the specific goal of running Reverse Mode.

Here is what Reverse Mode does in plain language:

You pick a target network - say, a voting machine company.

Once inside a network, and the documents confirm Pythia was deployed inside the Department of Homeland Security by February 2020, Pythia maps every single connection on that network. Public or private. Internal or external. There is nowhere to hide.

Who is accessing it.
From where.
At what time.
Through what pathway.
Encryption does not hide this.
Firewalls do not block this.

Because Pythia operates at the Domain Name System layer: the foundational address system every internet-connected device must use to function. There is no way around it.

And here is what else is on that same Defense Advanced Research Projects Agency agenda - listed as Reverse Mode targets:

โœ… Voting machine manufacturers
โœ… Burisma - the Ukrainian energy company
โœ… Department of State
โœ… National Security Agency leaked report
โœ… State of Georgia - its own separate line item

All of this. On one Defense Advanced Research Projects Agency planning document.

Eight months before you voted.

And United States Army soldiers were trained on this weapon at Georgia Tech's campus.

One of those soldiers wrote this to Professor Antonakakis after his training:

"Thanks for hosting the Pythia training a couple of weeks ago. It was very interesting seeing the tool in action."

The Army unit's motto: 'Pierce the Shadows.' They were not kidding. Captain Severson's email signature contains the Second Battalion Cyber Protection Brigade motto: "Pierce the Shadows." It is in the document.

In Ancient Greece, Pythia was the Oracle of Delphi.

~ Peter Bernegger
๐Ÿ‘15๐Ÿ”ฅ9๐Ÿคฏ7๐Ÿคฌ1๐Ÿคจ1
๐Ÿ”ฅ4โค1๐Ÿ‘€1
๐Ÿšจ Post #12: This is the document that proves it was all planned.

Defense Advanced Research Projects Agency contractor Christopher Schneck sent this email to Georgia Tech Professor Manos Antonakakis on February 26, 2020.

Eight months before the presidential election. Subject: "To talk about today."

It is a working agenda. Decoding every line:

Item 1: Enhanced Attribution Use Cases
Enhanced Attribution is the Defense Advanced Research Projects Agency program funding Georgia Tech to identify and track cyber attackers using internet traffic data.

Listed under "Election / Advanced Persistent Threat 28 related"

Advanced Persistent Threat 28 is the code name for Russian Military Intelligence. That label is the legal justification attached to everything below.

It converts domestic surveillance into a national security operation.

Now look at what is listed underneath that label:

โœ… "Reverse Mode on Networks (Delphi)"
Delphi is the Georgia Tech surveillance platform. Reverse Mode means: pick a target network and map every single connection going into it and leaving it.

โœ… "Voting Machine Manufacturers (Delphi)"
Dominion Voting. Election Systems and Software. Hart InterCivic. The companies that make the machines that count your votes. Targeted for reverse mode network surveillance. Eight months before the election.

โœ… "Burisma (Delphi)"
The Ukrainian energy company at the center of the Biden family controversy. On the same Defense Advanced Research Projects Agency targeting list as voting machine manufacturers.

โœ… "Department of State (Delphi)"
The United States State Department. Also a Delphi reverse mode target.

โœ… "National Security Agency Leaked Report (Delphi)"
An actual National Security Agency intelligence leak being analyzed by a university professor under a Defense Advanced Research Projects Agency contract.

โœ… "Reverse Pythia on Internet Protocol Version 4 (Enhanced Attribution)"
Running Pythia's reverse surveillance mode across the entire public internet address space. Every device. Every connection. Simultaneously.

โœ… "State of Georgia (neither, Georgia Tech Level of Effort)"
Georgia gets its own separate line. Not running under the Russian threat label. Not running under Enhanced Attribution. Running under Georgia Tech's own funded effort. Meaning it operates outside standard Defense Advanced Research Projects Agency program oversight entirely.

โœ… "Chase / Enhanced Attribution"
JPMorgan Chase bank. Being monitored under the same program as voting machine manufacturers.

Item 2: Deploying Active Domain Name System Pythia

The total internet surveillance weapon described in Tweet #11 was being deployed to two locations:

Defense Digital Service: the Pentagon's own internal technology unit.

Center for Internet Security / Department of Homeland Security: the federal agency responsible for protecting election infrastructure.

The same agency that later declared the 2020 election "the most secure in American history." More solid evidence Chris Krebs lied through his teeth!

The note reads: "Wants to be able to run Reverse Mode and find unknowns. What is required?"

The Department of Homeland Security wanted Pythia's reverse surveillance capability deployed inside their own walls. They were asking Georgia Tech what it would take.

Item 3: Delphi Support

"Russian Election Feed to Cyber National Mission Force and Task Force Raider"

Cyber National Mission Force is the United States military's offensive and defensive cyber warfare unit. The cyber equivalent of Special Forces.

Task Force Raider is a military cyber task force.
Intelligence derived from surveilling voting machine manufacturers and election networks was being fed directly to military cyber warfare units in real time.

"Defend the Department of Defense Information Networks"

The same surveillance infrastructure protecting military networks was also watching election infrastructure. Same team. Same tools. Same data pipeline.

Item 7: Pythia Documentation

They were writing the manual for this weapon.
๐Ÿ‘17๐Ÿ”ฅ15โค1๐Ÿคฏ1๐Ÿคฌ1
Now read this entire email again knowing one thing:

The Defense Advanced Research Projects Agency contractor who sent this agenda is the same man who later wrote to the same Georgia Tech professor:

"Collect a week worth of data from the egress point."

That was Post #2. The email that started this entire thread. The one with the 2 red highlight rectangular boxes we inserted.

It was not random. It was not accidental.

This document proves it was a coordinated, pre-planned, institutionally authorized operation targeting voting machine companies, Georgia specifically, and the Biden family's business partners: eight months before the 2020 presidential election.

And the Department of Homeland Security - the agency that declared your election secure - had this weapon deployed inside their own walls.

Post #13 will show you what happened when they pointed it directly at Dominion Voting thirteen days before Election Day: and the exact words a Georgia Tech professor typed when he saw what came back.

~ Peter Bernegger
๐Ÿ”ฅ30๐Ÿ‘9โค8๐Ÿคฏ1๐Ÿคฌ1
๐Ÿ’ฉ2๐Ÿ˜ก2
Peter Bernegger
Photo
๐Ÿšจ Post #13: October 21, 2020.

Thirteen days before the presidential election.

Two Georgia Tech professors are running their Defense Advanced Research Projects Agency surveillance tool against voting machine manufacturer networks.

Remember Post #12. The planning document.

Voting machine manufacturers were an authorized Delphi target. This was not accidental. This was the operation executing exactly as planned.

Here is what happened when the results came back.

Professor Angelos Keromytis typed four words:
"It's Dominion Voting."

Professor Manos Antonakakis typed six words:
"Oh, shit. These look like egress points."

A Defense Advanced Research Projects Agency funded professor. Running authorized surveillance on voting machine networks. Thirteen days before you voted.

And when the data came back he typed "Oh, shit."

That is not the reaction of someone who found nothing.

That is not the reaction of someone who found what they expected.

That is the reaction of someone who found something that even he was not prepared to see.

Now understand what "egress points" means in plain language.

An egress point is a place where data leaves a network and goes somewhere else.

On a properly secured voting machine system there should be no egress points. The machines are supposed to be air gapped. Meaning completely isolated from the internet and all outside networks.

Our election officials however have been lying to us, as first off they don't even know what a true air gap - and - their voting systems don't have them. It pretend theater.

Eric Coomer told the court the machines had no "direct" connection to the internet.

Notice he said "direct."

The egress points his own colleagues found in the network data thirteen days before the election suggest the machines had something other than a direct connection.

And notice something else.

Before Antonakakis typed "Oh, shit" he wrote:
"Let me check something..."

Then he posted a link to the United States Election Assistance Commission's official government page listing all registered voting equipment manufacturers.

He was cross referencing what he found in the live network data against the official government registry of voting machine companies.

He was confirming the identity of what he was seeing in the data.

He confirmed it. Then typed what he did.

These are not the emails of people passively watching foreign adversaries attack American systems.

These are the emails of people who just found something unexpected inside American voting infrastructure.

Thirteen days before the election.

-Who did they tell?
-What did they do with what they found?
-Why has none of this ever been publicly disclosed?

Post #14 will show you the document that connects all of this directly to the highest levels of the United States Senate and Special Counsel John Durham's own investigation.

~ Peter Bernegger
๐Ÿ”ฅ24๐Ÿ‘3๐Ÿคฏ1
๐Ÿ”ฅ7
Peter Bernegger
Photo
๐Ÿšจ Post #14: What you have read in this thread is not new to everyone.

Two United States Senators already knew.

And Special Counsel John Durham already knew.

Here is what they found and what they did about it.

United States Senator Chuck Grassley of Iowa and United States Senator Ron Johnson of Wisconsin uncovered email evidence of Professor Manos Antonakakis's Defense Advanced Research Projects Agency funded work.

What they found in those emails stopped them cold.

A Defense Advanced Research Projects Agency employee - referring to the Georgia Tech operation - wrote this:

"Sensitive stuff worth doing."

Same Defense Advanced Research Projects Agency (DARPA) employee. Same email chain. Same date as the United States Postal Service swing state scanning email โ€” September 25, 2020:

"I know who to talk to if we find anything."

Not "I know who to report it to."

Not "I know who to alert."

But "I know who to talk to if we find anything."

That is not the language of a defensive cybersecurity operation protecting elections.

That is the language of an intelligence operation with a predetermined recipient for whatever was found inside American voting infrastructure.

Who was that person?

That question has never been answered publicly.

Now add this. Special Counsel John Durham completed his investigation in May 2023.

In his final report Durham made a criminal referral to the Department of Defense Inspector General.

That referral specifically identified:
"One matter involving the execution of a contract between the Defense Advanced Research Projects Agency and the Georgia Institute of Technology."

One sentence. In a Special Counsel report to the United States Congress.

The Defense Advanced Research Projects Agency. Georgia Tech. A specific contract. Referred for potential criminal investigation.

Durham found something significant enough in that contract to send it to the Department of Defense's own internal investigator.

The Department of Defense Inspector General received that referral.

What happened next has never been made public.

-No findings were announced.
-No charges were filed.
-No report was released.
-The referral vanished.

Now look at what you have seen in this thread:

A Defense Advanced Research Projects Agency planning document targeting voting machine manufacturers.

Active surveillance of Dominion Voting network traffic thirteen days before the election.

Egress points found in voting machine infrastructure.
Russian and Iranian command and control confirmed in state and local election networks.

An Army unit trained on the surveillance weapon used to do all of this.

We caught the US Army inside a Dominion EMS.

A Defense Advanced Research Projects Agency employee who knew exactly "who to talk to" if anything was found.

And a Special Counsel referral to the Department of Defense Inspector General that quietly disappeared.

Two United States Senators saw enough to raise alarms.

The top prosecutor in America saw enough to make a criminal referral.

You were never told any of it.

Look at what US Senators Ron Johnson and Chuck Grassley were after in their (second) letter to DARPA.

~ Peter Bernegger
๐Ÿ”ฅ15โค3๐Ÿ‘3๐Ÿ˜ฑ3
๐Ÿ”ฅ3๐Ÿ’ฉ2๐Ÿ‘Ž1
Peter Bernegger
Photo
๐Ÿšจ Post #15: Pay close attention to this date.

October 21, 2020.

You have already seen what happened on that date in Post #13.

Georgia Tech Professor Angelos Keromytis was running Defense Advanced Research Projects Agency surveillance on voting machine manufacturer networks.

He identified Dominion Voting in the network data.

His colleague Professor Manos Antonakakis typed "Oh, shit. These look like egress points." See prior tweet.

That was October 21, 2020.

Now here is what else happened on that exact same date.

Georgia Secretary of State Brad Raffensperger issued a press release.

He was forming an official government body called the Georgia Bipartisan Task Force for Safe, Secure, and Accessible Elections.

Among the confirmed participants listed in that press release: "Professor Angelos Keromytis. Georgia Institute of Technology."

The same professor.

The same day.

On the morning of October 21, 2020 Angelos Keromytis was identifying Dominion Voting egress points in Defense Advanced Research Projects Agency network surveillance data.

On that same day he was named to the official Georgia government body responsible for overseeing election security.

It gets worse.

That task force did not dissolve after the election.

In March 2021 the task force issued a public statement.
Keromytis was still listed as a member. That is five months after Election Day.

Five months after his team found egress points in Dominion Voting network traffic.

Five months during which he sat on the official Georgia election security body.

Five months during which none of what you have read in this thread was ever publicly disclosed.

Keromytis's own public professional resume confirms it.

He listed it himself:
"Member, Georgia Secretary of State Bipartisan Task Force for Safe, Secure, and Accessible Elections, 2020."

Now ask yourself the questions that nobody in Georgia has ever been forced to answer publicly:

i. Did Keromytis disclose to the Georgia Secretary of State that he had identified Dominion Voting egress points in network surveillance data thirteen days before the election?

ii. Did the Georgia Secretary of State know his own task force member had been running Defense Advanced Research Projects Agency surveillance on Georgia's voting machine infrastructure?

iii. Did Brad Raffensperger know?

iv.  Who else on that task force knew?

v.  And if nobody knew - why not?

The man who found the egress points was put in charge of telling Georgia its elections were secure. That is not oversight.

That is a conflict of interest on a scale that demands a federal investigation.

Post #16 reveals what Special Counsel Durham specifically referred to the Department of Defense Inspector General - and why that referral quietly disappeared without a single public finding.

~ Peter Bernegger
๐Ÿ”ฅ22๐Ÿคฏ13โค4๐Ÿ‘€3๐Ÿ‘2๐Ÿคฌ2