May 18, 2026
-
WMD Scandal
Transcript verbatim from the recorded session
David · 00:00:00
What's the matter? You don't think that we have people in our government intelligence agencies that would do this sort of thing? I bet that's what you're thinking. You should come over to plausible denial and take a look at the weapons of mass destruction dossier I have on the Iraq war from years ago. The entire framework for launching this country into a foreign war was fabricated by intelligence agencies, not just from the United States either. This was done on purpose.
Now imagine this, okay, a small handful of people, I don't know, I can't speculate on how many, maybe less than 50, collaborated to lie, make up evidence, to convince an entire nation to send their soldiers into a war zone, and to destroy a foreign country's capital city. And this has resulted in infrastructure contracts for United States companies worth billions of dollars. And destruction of antiquities over decades now. There's thousands of sites, Sumerian sites that have been looted as a result of collaboration and lies of probably less than 50 individuals on this planet. And those who took their recommendations and sent an entire country to war.
Can you imagine all that money they spent and earned off the back of some other country? It's fucking heinous. And I'm not going to fucking stop talking about it. And I will inflame the rhetoric as long as I am being targeted in this manner. Y'all want this shit buried in the sand? I'm digging it fucking up.
-
FISA Abuse
Transcript verbatim from the recorded session
David · 00:00:00
Y'all understand about metadata, right? This is the record of what your phone, for example, with phone calls, the record of what your phone is doing as far as who called you and who you called or texted without the contents of the conversation. So if somebody who is a shitbag working in a government agency wanted to frame you or simply extend FISA-authorized surveillance on you, which would allow them to invade your privacy, hack into your computers with government tools or access to special telephone networks, for example, because of their position of authority, they could take a list of conversations that it looks like you're having to a FISA court judge and without the contents of the text messages, for example.
So if somebody texts you from a number you don't know and you go and have a back-and-forth conversation with them, I'm sorry, you've got the wrong number. Oh, really? Sorry to bother you. That's okay. Don't worry about it. You know, you're just being nice. And then they engage you in a vanilla conversation. Well, so what are you doing today? Oh, I don't know. I'm bored. I guess I'll talk to you for a minute.
And it turns out that that other conversation, that other person whose number you didn't know is someone scandalous for any reason, say a drug dealer or a prostitute or something like that, something obvious, then this hypothetical shitbag abuser of authority could take that conversation and take it into a FISA court and could present it to a judge and say, now look here, we know this person who's the unknown sender that I'm referring to. We have all this evidence that this person is a prostitute. Or a drug dealer. Or another criminal. And our subject that we're investigating here is having these back and forth conversations with a known drug dealer. Or a known prostitute, for example. So therefore, we need you, this is our evidence, that we need you to extend the FISA court warrant so that we, as shitbag authoritarians who think they have a right to break into our technology and use our FISA court authorizations, they basically frame you.
This is a possibility is what I'm saying. A very real possibility. And is a major problem with metadata collection alone. It sounds harmless, right? Well that judge, even if he wanted, I don't think he can go in and get the content because of the restrictions to just metadata. How's that? How's that for an even tighter safeguard? So if that FISA, if a FISA court judge is actually just sitting on his bench doing his job, I'm not sure he even has access to say, well I want to see the content of this conversation.
This is a real problem. This is why I post these things. I'm not certain that this is happening to me. How could I possibly be, right? I am going to fire off probably a huge round of FOIA requests here very soon. So that is coming. And I may not get, I may not get information back, but I'll get denials and such, such certain kinds of replies they have to make and how long it takes them to reply can reveal enough.
But I just thought I would talk about this for a minute. How important it is that the people who actually work in these systems of government are vetted thoroughly. It's my opinion that they all need to be put through a, a sanity fucking test for narcissism. Because if they score highly, on a mental health evaluation exams for narcissistic personality disorder, they shouldn't be working in our intelligence agencies at all. Or law enforcement. And of any fucking kind. They're dangerous individuals. I'm not suggesting we commit them. I'm far, far away from suggesting people are collected by the state and put anywhere. But as far as holding positions of authority, hell fucking no. It's dangerous.
Do you see how easy this would be to, to frame someone wouldn't require the judge's complicency. All it would require is one person and their assets in the field. Whoever the hell Tyrone is who submitted the contact form, for example, or hell, maybe they could submit it themselves. I'm fucking tired of this shit. I'm so fucking tired of this shit. I haven't done anything to deserve it.
-
Auto Trader
A coordinated hop-seeding campaign across voicemail and SMS — three contacts in twenty-four hours, three different sender numbers in the same Las Vegas area code, all pretending I am "Tyrone" interested in a Jeep Wrangler at a fictional dealership called Desert 215 Superstore.
A coordinated hop-seeding attempt that this time reached across two channels and three sender numbers within twenty-four hours. The cover story was a car-dealership follow-up: an entirely fictional business called Desert 215 Superstore claiming I had inquired about a 2026 Wrangler. The recipient name they used — when they used one — was "Tyrone".
The voicemail above is the first contact. The phone clock reads 10:32; the voicemail came in at 10:27 the same morning. "Hey, Tyrone, this is Don Nelly from Desert 215. Show your interest in a 26 Wrangler we have on the lot." The callback number is in the 702 area code — Las Vegas — different from the originating number, which is in 725 (also Las Vegas).
The first screenshot is the SMS from the same morning: same name (Nelly), same dealership (Desert 215 Superstore), same vehicle, different sender number. I replied "Wrong number." The reply was met with a friendly "no worries sorry for the inconvience."
The second screenshot is the SMS from the prior day — different sender number again, same area code. This one used a different fake agent name (Miranda Tate) and a different specific pretext (a "vehicle configuration" supposedly submitted online), but the same fictional dealership and the same fictional recipient — "Tyrone". It also included a callback number in the 832 area code (Houston) and a link to a domain carleadsup.com, which is the kind of auxiliary infrastructure these campaigns use to enrich whatever metadata edge a recipient creates by following the link.
What this entry documents: three distinct sender phone numbers, all in the same regional cluster (725 area code, Las Vegas), all reading from the same shared script with cosmetic variations, all directed at the same fictional recipient at my phone number. The variation in agent names and sender numbers is meant to suggest distinct independent contacts. The throughline of "Tyrone" and "Desert 215 Superstore" reveals it is a single coordinated campaign.