Jeremiahbullfrog Profile picture
Apr 29 13 tweets 7 min read Read on X
Massive National Security Breach – Attempted Set Up of General Flynn, President Trump, and U.S. Leadership Exposed
@GenFlynn @briangamble_v1 @boonecutler @FBIDirectorKash @POTUS
@SecretService

These individuals need to be investigated:

In 2023–2025, a Canadian citizen named Guy Brummell was smuggled illegally into the United States under the direction of retired U.S. Army General Paul E. Vallely, assisted by David Scarlett, and Todd Callender.

Brummell was moved without identification, documentation, or legal clearance.
He was hidden in Montana and later Florida, attempting direct contact with President Trump and General Flynn.Image
Image
The individuals involved:
•Paul E. Vallely (Organizer): Retired MG, orchestrated Brummell’s extraction and transport.
•David Scarlett (Financier): Funded safehousing and movement.
•Ann Vandersteel (Communications): Helped coordinate.
•Todd Callender (Legal Adviser): Provided legal cover.
•Sean Stone (Florida Contact): Facilitated movement to Trump circles.

Canadian generals were allegedly aware and warned Vallely about Brummell “going rogue.”

Guy Brummell’s mission:
Deliver highly sensitive “intel” — involving alleged assassinations, Canadian government corruption, and claims implicating figures tied to Hillary Clinton and Barack Obama — directly to President Trump and General Flynn.

INSERT Screenshot #2: [Excerpt from “Brief for General Flynn”]

Brummell’s documents included:
•Accusations of murder conspiracies,
•Allegations of missile technology threats,
•Organized crime infiltration into governments.Image
Image
Key Evidence:

From Brummell’s briefing addressed to Flynn:

“I am urgently seeking to debrief General Flynn and President Trump on threats to U.S. and Canadian security, including murder scandals covered up at the highest levels.”

From internal emails:

“We must cycle him [Brummell] to Florida privately. No printed ID. Private planes, no TSA.” – General Paul E. VallelyImage
Brummell bypassed federal authorities and attempted to enter Mar-a-Lago to personally brief President Trump.

The Secret Service detained Brummell — resulting in federal charges, confirmed by the official U.S. court docket.

This breach was a national security catastrophe:
•A foreign national moved covertly onto U.S. soil,
•Attempted direct, unauthorized access to a former President,
•Transport coordinated outside DHS, FBI, and Secret Service oversight,
•National security material of dubious origin involved,
•Secret Service operational security endangered.Image
Image
Image
The True Risk:

Brummell’s material — real or fabricated — could have:
•Misled President Trump,
•Entrapped General Flynn,
•Provided foreign adversaries an opening to compromise U.S. leadership.

This was textbook counterintelligence vulnerability creation.

And Vallely knew exactly what he was doing.Image
Image
Vallely’s Knowledge and Role:

In his own words:

“High value political refugee under threat of death that we moved from Canada to US… for safekeeping until I can move him to Florida to give intel to Mike and Trump.”

— Paul E. Vallely Email, Oct 19, 2023

This was NOT accidental.
It was organized, funded, planned, and deployed deliberately.

Key Timeline:
•Oct 2023: Brummell extracted into Montana by Vallely.
•Late 2023: Secretive movement arranged to Florida.
•Late 2023: Attempted breach at Mar-a-Lago.
•2025: Federal charges filed; court docket proves intervention.

Every step documented. Every action deliberate.Image
Canadian Connection:

Canadian military officials reportedly warned Vallely that Brummell could “go rogue.”

Instead of stopping, Vallely accelerated the operation.

Why?
Who else knew?

INSERT Screenshot #5: [Canadian Generals Warning Email]

11/
Implications:
•Possible violation of 18 U.S.C. § 1324 (alien smuggling),
•Possible violation of 18 U.S.C. § 371 (criminal conspiracy),
•Definite violation of 18 U.S.C. § 1752 (restricted area breach),
•Potential violation of Espionage Act (if classified material involved),
•Obstruction of Secret Service operations.Image
This was not loyalty.
This was an attempted setup.

Bringing a foreign national with murky motives, explosive claims, and unvetted “intel” directly to President Trump and General Flynn could have compromised them fatally.

@GenFlynn
@realDonaldTrump
@FBIDirectorKash
@Scavino47
@RSBNetwork
@TomFitton
@RepMTG
@Jim_Jordan
@SecretService
@DHSgov

THIS MUST BE INVESTIGATED.

This is not just political drama.
This is national security breach, counterintelligence compromise, and possible treasonous activity.

The American people — and President Trump — deserve to know who endangered them.
Specific Quotes that are Most Damning
•“We need to cycle him to Florida to meet with Mike Flynn first and Kash Patel.”
•“He has no printed ID so we have to privately get him to Florida…”
•“Try working private transportation from your end.”
•“High value political refugee under threat of death that we moved from Canada to US…for safekeeping.”
•“Canadian Generals are telling me Guy is scheduled to be sent back to Canada…they are concerned for his safety and also him going rogue.”
Possible U.S. Laws Violated
Law

Description

8 U.S.C. § 1324
Bringing in and harboring certain aliens (human smuggling law)

18 U.S.C. § 371
Conspiracy to commit an offense against the United States

49 U.S.C. § 46504
Interference with flight crew members and passengers (if they used private flight improperly)

18 U.S.C. § 1001
Lying to federal authorities or concealing material facts if discovered
Homeland Security Act
Violations relating to failure to declare foreign nationals being moved through the country
Immigration and Nationality Act
Illegal transport or concealment of undocumented foreign nationals
Bottom Line

Based on the contents of these emails, General Vallely, David Scarlett, and their associates appear to have coordinated activity that would likely violate U.S. federal immigration and transportation laws.
It looks like they deliberately tried to move someone secretly across state lines without ID and bypass federal authorities, in part for political purposes.

This is not just ethically questionable — it could expose everyone involved to serious federal criminal charges if it were investigated properly.
Formal Analysis Report

These documents prove Brummell was aggressively trying to get “intel” to Trump and Flynn,
•He claimed to have information about high-level murders and corruption,
•His urgent pleas likely pressured Vallely and others into the illegal transport and secret meetings,
•This strengthens your national security risk narrative heavily.

•Brummell escalates from Canadian corruption claims to allegations implicating major U.S. figures (Clinton, Obama).
•He explicitly prepared briefings intended for General Flynn — not just random emails.
•Visual evidence (screenshots) indicates he compiled files like an intelligence package — whether credible or not.
•Vallely and network may have viewed this as “actionable intelligence”, motivating the illegal smuggling operation.

•Encrypted communications confirm Brummell was trying to operate like a clandestine asset.
•References to military tech and “missile” information seriously escalate the national security threat profile.
•Audio and multiple formats (letters, emails, recordings) were all used to try to penetrate Mar-a-Lago and Trump’s direct access.
•Flynn’s network is clearly being targeted, and Vallely’s team appears to have facilitated it knowingly.

•Missile-related intelligence claims are emphasized again — raising red flags for espionage/national security threats.
•Organized crime and political corruption angles tied to Canada explain why Vallely and others would see Brummell as “valuable.”
•Evidence of encryption, technical diagrams, and physical documents means Brummell was treating himself as a full-fledged intelligence asset.
•Continued direct attempts to bypass U.S. intelligence vetting to reach Trump and Flynn.

•Brummell directly solicited physical extraction and “face-to-face debriefing” — and Vallely delivered.
•Audio pleas to Trump show intent to bypass Secret Service protections.
•Attempted simultaneous engagement with Secret Service shows a risky “double game” — dangerous from a counterintelligence standpoint.
•Growing desperation documented across multiple files, culminating in the Mar-a-Lago approach.
These individuals are also directly involved and need to be investigated as well @WattersMarty @realMaryFanning

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jeremiahbullfrog

Jeremiahbullfrog Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Jeremibullfrog2

Apr 27
🚨Disclaimer: I held on to this for weeks to try and have conversations about this before I posted this, only to get attacked for being up this topic.🚨

@JovanHPulitzer 👇👇

The 4chan Hack, QAnon, and the Hidden Hand of Academic Influence Operations

In April 2025, a massive hack exposed the dirty secret nobody wanted to admit:
4chan — the so-called “wild west of the internet” — was not some chaotic organic haven of free speech. It was controlled.

Leaked internal server data proved it:

• 4chan’s backend ran on ancient, unpatched FreeBSD 10.1 — unsupported since 2016.
• Attackers accessed root shell and full database admin panels (phpMyAdmin).
• Over 10 million bans were logged, debunking the myth of “no moderation.”
• Half a million user appeals showed systemic shadowbanning and censorship.

But the real bombshell wasn’t just the hack itself —
it was who had access to the backend of 4chan, and what institutions they belonged to.

Leaked moderator and janitor data revealed:
•Harvey Mudd College (heavy DARPA contractor)
•University of Michigan (multi-million DARPA/DoD grants)
•University of Washington (major DARPA research programs)
•At least one active professor was a “janitor” (moderator) on 4chan.

Let that sink in:
College students and professors, from U.S. institutions funded by defense and intelligence grants, were quietly operating inside 4chan’s moderation and backend systems.

They weren’t just deleting posts.
They had the potential ability to see IP addresses, track users, influence narratives, and control what content stayed visible or vanished.

Why is that important?

Because 4chan was the birthplace of QAnon.

— Q’s early posts appeared on 4chan in late 2017.
— Q’s tripcodes (used to verify authenticity) were protected only by weak cryptographic hashes, easily crackable by insiders.
— 4chan’s backend was so insecure that admins and mods could have created, modified, or deleted Q posts at will — invisible to the public.

Meaning:
The entire foundational mythology of Q — “anonymous inside drops from military intelligence” — could have been manufactured, guided, or manipulated by unseen hands.

And now we have hard evidence that those unseen hands were connected to academic institutions with federal defense ties.

Think about what that means.

Was Q really a rogue insider operation, or was it an early-stage domestic psychological operation, run by American influence networks as a real-world experiment in memetic warfare?
Consider this:
•Harvey Mudd College:
Worked on behavioral analysis and AI modeling projects funded by DARPA and defense labs.
•University of Michigan:
Received millions from DARPA to develop AI, cyber defense systems, and next-gen cognitive modeling beyond Moore’s Law.
•University of Washington:
Participated in DARPA contracts specifically related to cognitive security and psychological resilience to online influence.

These were not random students moderating memes for fun.
These were people potentially linked, directly or indirectly, to the U.S. defense-intelligence R&D pipeline.

4chan was not left alone. It was being steered.

And it gets worse.

Techniques exposed in other influence operations — like JTRIG (UK’s GCHQ program) and the U.S. State Department’s GEC — mirror the behavior observed inside 4chan:
•Infiltration: Inserting agents into online communities.
•Disruption: Discrediting authentic voices while amplifying controlled narratives.
•Gamification: Using puzzles, “drops,” and insider-sounding clues to addict users psychologically.
•Psychological Reinforcement Loops: Promising hidden rewards (“The Storm is coming!”) to keep believers hooked.
Read 5 tweets
Apr 12
🚨Unmasking the Misinformation Campaign Against General Flynn🚨

You are gonna want to pay attention to this one Marty Watters our exsposed and you are all knowingly running a OP Buckel up Buttercup 😎

Recent developments have raised concerns about a coordinated effort to disseminate misinformation targeting General Flynn Key figures in this campaign include investigative reporter Marty Watters, his collaborator Lee Cary, and associates such as Mary Fanning, General Paul Vallely, and General Thomas McInerney. This thread delves into their backgrounds, collaborations, and the tactics employed to question their narratives.

Lee Cary is a seasoned journalist known for his investigative work on government operations and political affairs. His articles often focus on exposing misconduct within intelligence agencies and the so-called “Deep State.” Cary’s work has been featured in various publications, including the Canada Free Press.

Marty Watters: Investigative Reporter with Government Connections

Marty Watters has established himself as a credible investigative reporter with notable connections to government entities. His collaborations with senators and involvement in high-profile investigations underscore his legitimacy in the field. Watters’s work often sheds light on complex political issues, aiming to uncover hidden truths.

Seems credible as a journalist right?
So, his information on General Flynn should be take seriously he would like you to believe, right?

So when someone ask for his credentials he always replies with “look for yourself, I don’t have to prove myself to you!”

Why is that? Well, because his work discredits the propaganda and attacks he is pushing against General Flynn nd by His own investigative reporting he knows exactly who is involved in all of this!

Let’s take a look shall we 🤔
Collaborative Efforts: Cary and Watters

Cary and Watters have co-authored several articles, combining their expertise to dissect intricate political scandals. Their joint piece, “Deep State Playbook: Comparing Plamegate and Russiagate,” draws parallels between two significant political events, highlighting patterns of alleged misconduct within intelligence agencies.

Deep State Playbook” Analysis

In “Deep State Playbook,” Cary and Watters scrutinize the roles of key figures like Robert Mueller and James Comey in both Plamegate and Russiagate. The article suggests a recurring strategy employed by the “Deep State” to manipulate political outcomes. Notably, the piece does not implicate General Flynn in any wrongdoing, instead portraying him as a victim of these machinations.

Ok so before we go deep into Lee Cary and Marty Watters let’s refresh our memory on PlameGate and how it is interwoven into RussiaGate ………🥴
🚨PAY ATTENTION HERE THESE NAMES AND EVENTS ARE IMPORTANT 🚨

Plamegate (also known as the CIA leak scandal) refers to a major political scandal during the George W. Bush administration involving the public exposure of the covert identity of Valerie Plame, a CIA officer.

Here’s a breakdown of the key elements:



Core of the Scandal
•In July 2003, journalist Robert Novak published a column revealing that Valerie Plame was a CIA operative.
•This disclosure came shortly after her husband, Ambassador Joseph Wilson, publicly challenged the Bush administration’s justification for the 2003 invasion of Iraq—specifically, the claim that Iraq sought uranium from Niger to build nuclear weapons.
•Wilson had gone to Niger in 2002 to investigate the uranium claim and reported it was false. Nevertheless, the Bush administration included the claim in the 2003 State of the Union address.
•In response, Wilson wrote an op-ed in The New York Times titled “What I Didn’t Find in Africa,” undermining the credibility of the WMD narrative.
•Shortly after, Plame’s identity was leaked—seen by many as retaliation.



Legal Fallout
•The leak triggered a federal investigation led by Special Counsel Patrick Fitzgerald.
•Several senior Bush administration officials came under scrutiny, including:
•Karl Rove (Senior Advisor to President Bush)
•Dick Cheney (Vice President)
•Lewis “Scooter” Libby (Cheney’s Chief of Staff)
•In 2007, Libby was convicted of:
•Obstruction of justice
•Perjury
•Making false statements
•Libby wasn’t charged with the leak itself but was found to have lied to investigators.
•President George W. Bush commuted Libby’s 30-month prison sentence, sparing him jail time.
•In 2018, President Donald Trump fully pardoned Libby.



Why It Mattered
•Exposing a covert CIA agent is a serious national security breach.
•The scandal highlighted how intelligence could be politicized and how internal dissent—like Wilson’s op-ed—could provoke retaliation.
•It raised broader concerns about freedom of the press, government accountability, and whistleblower protection.
Read 17 tweets
Apr 5
🚨What Happened to Election Integrity Investigations? Why Are the Good Guys Still Under Attack by Disinfo Campaigns? Was There Infiltration? Oh, You Bet—And It Was a Military-Grade Sting Led by Vallely, McInerney, Fanning, & Marty Watters!🚨

Buckle up, patriots,here’s a wild ride through the wreckage of the 2020 election integrity movement. What started as a noble quest by Mike Lindell, Patrick Byrne, Michael Flynn, and Tina Peters to expose real fraud, think ballot trafficking, machine glitches, and shady law changes, turned into a clown show of fake data, FBI raids, and public humiliation. Why? Because the “good guys” got played by a crew of disinformation agents, and the puppet masters were none other than Generals Paul Vallely and Thomas McInerney, with Mary Fanning as their frontwoman and Marty Watters stirring the pot. This wasn’t a fluke, it was a military-grade sting to bury the truth. Let’s unpack the conspiracy that keeps these heroes under fire even today.

The Setup:
Real Fraud Gets Drowned OutNovember 3, 2020: Election Night. Weird stuff pops off, ballot dumps in Michigan, vote counts pausing in Georgia, machines acting funky. Cyber experts like Russ Ramsland (Allied Security Group) flag Dominion vulnerabilities, and Jovan Pulitzer talks ballot fraud detection. By December, Lindell, Byrne, and Flynn are in Trump’s White House, begging for audits. Real evidence, was bubbling up. But then, the Deep State said, “Not so fast.” Enter the saboteurs.
Phase 1: The Generals Drop the Disinfo BombCue Lt. Gen. Thomas McInerney and Maj. Gen. Paul Vallely—retired brass with military intel chops and a knack for psychological ops. McInerney hits Steve Bannon’s War Room on November 2, 2020, screaming about “Hammer & Scorecard”—some mythical CIA software Montgomery cooked up to rig elections (warroom.org). Vallely, who literally co-wrote “From PSYOP to MindWar” (Google it), backs him up, spinning tales of military-grade cyberwarfare. Sounds cool, right? Too bad it’s unprovable garbage tied to Dennis Montgomery, a con artist who scammed the Pentagon for $20M back in the day (Reuters, 2022). These two set the trap, and Flynn—another general—bites, trusting his old military buddies.

When everyone around you is corrupt who do you trust 🤔Image
Phase 2: Mary Fanning Lights the FuseEnter Mary Fanning, Montgomery’s hype woman and The American Report scribbler. She’s the one who takes this Hammer nonsense and spins it into “PCAPs”—packet capture data supposedly showing China hacking our election. By February 2021, she’s got Lindell hooked, feeding him Montgomery’s fake files for “Absolute Proof” (frankspeech.com). Fanning’s the media handler, laundering military disinfo into patriot circles. Lindell, bless his heart, trusts her “military intelligence sources” and dives headfirst into the quicksand.
Read 7 tweets
Mar 21
🚨 INVESTIGATION THREAD: How Fiscal Sponsorship Enables Secret Funding: Could This Framework Be How Dark Money Is Funding Violent Protests, And Swatting Events?🚨

Watch @annvandersteel video Below, I will break down the documents Ann found using the framework below.
Then I will dive deep into how this is structured to fund these operations! Buckle up……

A leaked document exposes structured protest funding with staged payments, covert contacts, and financial opacity. But how does this system work? Let’s break down the fiscal sponsorship loophole that keeps it hidden. 🧵👇

Fiscal Sponsorship 101
Instead of funding an unregistered group (like an Antifa cell), large donors give to 501(c)(3) fiscal sponsors like Tides Center, AFGJ, or New Venture Fund. These groups act as a legal front, shielding donors from scrutiny.

How Money Flows
💰 Donor → Fiscal Sponsor → Sponsored Project → Protesters
•Big-money donors stay anonymous via Donor-Advised Funds (DAFs).
•The sponsor handles financials, allowing activists to operate without direct IRS oversight.

Example: Tides Center
Tides has sponsored hundreds of activist groups, giving them tax-exempt status without requiring their own 990 filings. This creates a black box of funding that enables anonymous cash to flow into organized protests.(as well as many other forms of operations)

Leaked Document Highlights
•“D.A. Donnelly” as a secret contact (Does D.A. = Democracy Alliance?)
•“328BG” – A coded reference? Transaction ID?
•Multiple-stage funding before & after protests.
•“DO NOT REPORT THIS AS INCOME” – Avoiding tax trails?

Is This a One-Off? No.
•Arab Resource & Organizing Center (AROC) is a Tides-sponsored project.
•Refuse Fascism has ties to AFGJ, another fiscal sponsor.
•Soros-backed OSF funds Democracy Alliance, which channels $$ into progressive activism.

Bottom Line
🚨 Fiscal sponsorship legally launders political money into activist networks.
🚨 No need for direct grants—funds trickle down through shell nonprofits.
🚨 This shields donors, activists, & groups from accountability.

Let’s dive in 👀
@DOGE @AGPamBondi @DOGE_DOJ @JusticeOIG @DataRepublican @POTUS @FBIDirectorKash @EagleEdMartin
Content Analysis of the Documents

From the visible portions, the documents include:
•Point of Contact: “D.A. Donnelly” is named as a confidential contact.
•Funding Disbursement: Payments occur in three stages, including:
•Initial payment (5-10%) before the action.
•Further disbursement (20-30%) after debriefing.
•Final payments (larger percentage) months later.
•Confidentiality Clause: “DO NOT REPORT THIS AS INCOME TO ANYBODY,” implying covert financial transactions.
•Incentives for Participation: Bonuses based on leadership, bravery, or merit in protests.
•Operational Instructions:
•Strict anonymity protocols (no mentioning names in communication).
•Instructions on protest behavior (hand-to-hand combat rules, engagement limits).
•Use of props (bottles, sticks allowed under certain conditions).

This suggests an organized and potentially funded protest operation, rather than a spontaneous grassroots movement.

Is This Consistent with Known NGO Funding Structures?

If an Antifa-affiliated group operates under an NGO framework, it would likely follow fiscal sponsorship models similar to Tides Center, New Venture Fund, or Alliance for Global Justice (AFGJ).

Key Factors to Investigate:
•Does this match known NGO-backed activism?
•Yes – Many left-wing activist groups receive funding via fiscal sponsors like Tides Center.
•AFGJ has been a known fiscal sponsor for anarchist, anti-capitalist, and protest-oriented groups.
•Tides Center does not openly fund Antifa, but it supports social justice initiatives that may indirectly provide resources for related actions.
•Does this funding model exist in real-world activism?
•Yes – Many structured activist groups have been documented as receiving grant money, filtering through donor-advised funds, and distributing resources to protest groups.
•Past examples include:
•The Occupy Wall Street movement (Tides Center indirectly helped incubate activist projects).
•The Black Lives Matter bail fund network (millions in grants passed through fiscal sponsors).
•The Arab Resource and Organizing Center (AROC) (a Tides-sponsored project involved in direct action protests).
•How does money reach these groups?
•Donor → Fiscal Sponsor → Sponsored Group → Individual Payments or Resources
•Donor-Advised Funds (DAFs) help anonymize contributions, making it harder to track funders.
•Some NGOs use “pass-through grants”, enabling money to reach unaffiliated groups that do not formally register as a nonprofit.

Identifying Potential Ties to Antifa Groups

Antifa itself is decentralized, but elements of its funding, coordination, and strategy suggest indirect financial support.
•Known Fiscal Sponsorships in the Activist Sphere:
•Alliance for Global Justice (AFGJ) has been the fiscal sponsor for Refuse Fascism, a group advocating direct action.
•Tides Center provides operational support for many protest-related nonprofits.
•New Venture Fund & Borealis Philanthropy have financed civil unrest movements, though without direct Antifa affiliation.
•Crowdfunding as a Front for Larger Funding Operations:
•Some Antifa-linked groups use GoFundMe, GiveSendGo, and DonorBox.
•Fiscal sponsors sometimes launder money through “mutual aid” groups to avoid direct ties.

Authenticity of the Documents
•Does the document align with real-world activist funding?
•YES – It follows a clear financial structure, which is consistent with NGO-backed activism.
•YES – It uses discretionary funding language, similar to how fiscal sponsors distribute protest funds.
•YES – It includes tactical anonymity measures, which aligns with decentralized protest groups.
•Does this match known Antifa tactics?
•YES – Antifa has a history of using clandestine communication and security culture to protect leadership identities.
•YES – Some groups affiliated with Antifa operate with structured funding pools.

Let’s go deeper shall we ….
Explanation, of Fiscal sponsorship and how it works

Fiscal sponsorship is a partnership where an established 501(c)(3) nonprofit organization in the U.S. “lends” its tax-exempt status to a project or group that doesn’t have its own. This setup lets the sponsored project accept tax-deductible donations and grants without needing to go through the lengthy process of becoming an independent 501(c)(3). Essentially, it’s a way for new or small initiatives to get off the ground with the backing of an existing nonprofit’s legal and administrative framework.

Here’s how it typically works: the fiscal sponsor acts as the legal home for the project. Donations or grants meant for the project go to the sponsor, who then passes them along (usually taking a small administrative fee, often 5-10%). The sponsor oversees compliance with IRS rules, handles financial reporting, and ensures the project aligns with its charitable mission. In return, the project gets to focus on its work—whether it’s art, community outreach, or research—without worrying about nonprofit paperwork or tax headaches.

The arrangement has grown popular as the nonprofit sector has expanded. For instance, since 2000, hundreds of new fiscal sponsors have popped up—268 are noted in the Fiscal Sponsor Directory alone. Today, that directory lists 376 sponsors managing over 20,000 projects, showing how widespread this model has become. It’s especially common in fields like arts and social justice, where grassroots efforts often need a boost to get started.

Take Fractured Atlas, for example. It’s a big player in the arts world, supporting around 4,000 projects—think independent filmmakers or theater troupes who need funding but aren’t set up as nonprofits themselves. Or the Tides Center, which manages over 140 projects, offering not just tax benefits but also HR and operational support. These sponsors make it possible for small ideas to tap into big resources.

The upside is clear: projects get a fast track to funding and credibility, while sponsors expand their reach and often earn fees to cover costs. But it’s not without trade-offs—sponsored projects might have less autonomy, and they rely on the sponsor staying in good legal standing. Still, for many, it’s a practical stepping stone, bridging the gap between a good idea and a fully-fledged nonprofit.
Read 18 tweets
Mar 20
🚨 Swatting isn’t just a prank—it’s a weapon. 🚨

Over the past week, conservative influencers like Chase Geiser and Gunther Eagleman have faced armed police at their doors, part of a chilling wave of at least a dozen incidents since mid-March 2025. Days earlier, a massive X hack by Dark Storm Team ( via my research) disrupted the platform. Coincidence?
(I had my own issues just a week prior that may or may not be related)

Maybe not. Hacking groups like Lizard Squad, PoodleCorp, LulzSec (Revivals) , and even a Telegram outfit called Torswats have a history of turning digital chaos into real-world terror, often using kids and cryptocurrency.
The FBI’s been tracking this for years—yet here we are, with swatting spiking and answers scarce. Buckle up: this is bigger than you think.

Long thread, but this needs to get out: @DataRepublican
@FBIDirectorKash
@elonmusk
@OwenShroyer1776
@nicksortor
@catturd2
@realchasegeiser
@realchasegeiser
@joetalkshow
@GuntherEagleman
@Shawn_Farash
@RealHickory
@WCdispatch_
@GrageDustin
@matt_vanswol
@Beard_Vet
@LarryTaunton
@ImFiredUp2
@atensnut
@OwenShroyer1776

Source for video below ⬇️
weartv.com/news/local/dep…
Recent Swatting IncidentsOver the past week, multiple conservative influencers, including Chase Geiser, Joe Pags, Gunther Eagleman, and Nick Sortor, have been targeted in swatting incidents, where fake emergency calls send armed police to their homes. At least a dozen such cases were reported since mid-March 2025, with the FBI investigating, as stated by Director Kash Patel on March 14, 2025 (FBI Investigating Swatting Incidents). These incidents, possibly politically motivated, have raised concerns about safety and free speech.

March 2025 X HackOn March 10, 2025, X experienced a DDoS attack claimed by Dark Storm Team, disrupting service but not stealing data (X Hack March 2025 Cyberattack Details). While the timing aligns with swatting surges, no direct connection was found, as the attack focused on service disruption, not address exposure.

FBI Awareness and Historical ContextThe FBI has been aware of swatting for years, with Director Patel noting it as a “dangerous trend” on March 14, 2025. Swatting has been a known issue since at least 2017, with high-profile cases like the Wichita incident, but the recent targeting of conservative voices has escalated scrutiny (Swatting Trend Explained with Recent Cases).

Unexpected DetailAn unexpected finding is how swatting incidents, possibly politically motivated, align with the X hack’s timing, suggesting a broader harassment campaign rather than a direct data breach link, though this remains speculative.

Comprehensive Analysis of Hacking Groups and Potential Involvement in Recent Swatting Incidents

This report provides a detailed examination of whether hacking groups, including “Torswats Telegram,” Lizard Squad, PoodleCorp, LulzSec, and Anonymous, could be involved in recent swatting incidents over the last week and a half, as of March 20, 2025, particularly in the context of the March 2025 X hack and the swatting of conservative influencers. The analysis draws from extensive web searches and aims to cover all relevant details, including the FBI’s awareness and historical context, while acknowledging the complexity.
Background on Hacking Groups and Patterns

The histories of DDoS-for-hire services, like PoodleCorp, could be used to obtain individuals’ addresses, while groups like Lizard Squad or LulzSec might call in swatting events or use kids for physical targeting. Swatting is a form of criminal harassment involving false emergency reports to dispatch SWAT teams to a target’s address, often obtained through hacking, doxing, or data breaches (Swatting Wikipedia). The groups in question have documented activities that align with these patterns, particularly in digital disruption and real-world harassment.

Identified Hacking Groups and Their Activities

1.Lizard Squad:
•Activities: Lizard Squad is known for distributed denial-of-service (DDoS) attacks, primarily targeting gaming services like PlayStation Network and Xbox Live, and running DDoS-for-hire services. Members like Zachary Buchta (aka “@fbiarelosers,” “@xotehpoodle”) and Julius Kivimäki (aka “zeekill”) were arrested for related crimes, with Buchta charged in 2016 for computer crimes involving DDoS attacks and stolen credit cards (Lizard Squad Wikipedia Detailed History). Their swatting history includes hoax bomb threats, with a Canadian teen member convicted in 2015 for targeting gamers (The Guardian Lizard Squad Swatting Incidents).
•DDoS-for-Hire and Address Targeting: Their booter services, like those operated by Buchta, could theoretically be used to overwhelm targets, potentially exposing personal information, including addresses, through associated data breaches or social engineering.
•Swatting Involvement: Lizard Squad’s swatting tactics align with calling in hoax emergencies, terrorizing homes via police responses, as seen in their 2015 cases.
•Recent Activity: No specific 2025 activities were found, with the most recent mentions from 2016 arrests, suggesting possible dormancy.
Read 10 tweets
Mar 14
🚨🚨Antifa’s Coded Jan 6 Operation, Intelligence Tactics, and FBI Complicity – Kash, We Need Answers We Are Not Letting This Go🚨 🚨

@Kash_Patel @PamBondi @dbongino @POTUS @MattGaetz @GenFlynn @IvanRaiklin @annvandersteel @DOGE_DOJ @FBIDirectorKash

🚨 Kash, I’m calling on you at the FBI to investigate this explosive evidence: Antifa ran a highly coordinated operation leading to Jan 6, 2021, using Parler with tactical codes straight out of intelligence agency playbooks to evade detection. The FBI had this data but ignored it—I believe intentionally. Screenshots, sources, and a deep dive below. Buckle up for a detailed thread! 🧵

The Stakes – Parler Data and FBI’s Role 
The FBI gained access to Parler’s servers after AWS shut it down on Jan 10, 2021, following the Capitol riot. Parler sent over 50 warnings about violent content—including specific threats to the Capitol—before Jan 6. Yet, FBI Director Chris Wray testified there was “no indication” of Antifa involvement. How could they miss this? Was it deliberate? Let’s dive into the evidence that suggests a cover-up. 
Source: dailymail.co.uk/news/article-9…
December 17, 2020 – A Funded Operation with Intelligence-Grade Codes 
Here’s the first smoking gun, a screenshot from @AntifaHQInfo on Parler, dated 12/17/20: “We getting paid, boys. #wooohoo #portland team P3FZNW4G.” This isn’t just a protest group—this is a funded operation targeting Portland, a known Antifa hotspot. The code “P3FZNW4G” isn’t random; it’s a tactical identifier, 7-8 characters long, mixing letters and numbers, exactly like codes used by the CIA or MI6 to designate teams or locations while evading detection. Think Enigma-style encryption from WWII—randomized to prevent decryption by outsiders like the FBI or Parler mods. This level of sophistication screams professional coordination. 
[Attach Screenshot from 12/17/20] 
This was a paid op, and they knew how to hide it.Image
December 19, 2020 – Tactical Precursor with Smoke Canisters and Codes 
Fast forward to 12/19/20: “Good op tonight, folks. Splash 8!) Those canisters all held smoke btw. Reminder don’t follow this account. H6BS5Q4T.” Smoke canisters are a classic protest tactic—Portland Antifa used them in 2020 to obscure movements during clashes with police. But notice the code “H6BS5Q4T”—another 7-8 character alphanumeric sequence, just like “P3FZNW4G.” Intelligence agencies use these to mark operations or locations, like the NSA’s XKEYSCORE identifiers for surveillance targets. The “don’t follow” warning shows they were dodging surveillance, a hallmark of covert ops. This op was likely a test run for Jan 6, and the code ensured only insiders knew the details. 
[Attach Screenshot from 12/19/20] 
Portland’s history of Antifa protests backs this up, but the FBI missed it. Why?Image
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(