High Level Dump Timeline Add

Thoughts when I Started

  • Saw Mueller She Wrote’s interview with Jay re: OPM and thought about what the server was really doing because the entire GWES email database would fit on a thumb drive
  • Looked at BB’s Prometheus/Kube cluster but literally didn’t believe the numbers of 30 TB in/45 TB out and thought I was misunderstanding something
  • Wasn’t sure if fed systems were always this vulnerable and now I’m just paying attention. Andy concurs with this. But it seemingly got worse because experienced feds said it’s not normal.

Phase 1

  • Prep/staging was in full swing by December. Huge number of hits for Jan 1/14 which is when a lot of this stuff came online. Later found the container startup times on Packetware matched perfectly. I started recording data earlier enough I should have seen more normal observations within 90 day window, but Jan 12/14 kept coming up.
    • FEMA,

Looking back and Putting Things together

  • NNSA with no SNI/bare IP addresses seemed like a bad idea. I reported it to DOE.

Ways I Was Proven Right

Stuff I Can’t Say

Feb 2025- I was looking at inventry.ai on the exact same day a source later told NPR DOGE was using it. Direct hit.

March-April 2025 - Hearing from Jay that RDP is a big deal, group chat was lit and feds were impressed with what I dug
up.

Certificates - Jay also did work looking at the wildcard Treasury certificate.

  • When it was reported to Treasury (FIND THE DATE FOR THIS!! it was before D resigned, before he disclosed, I think before DC and he called being freaked out), FBI and (Defense CI Agency..?) showed up the next day asking about contact with foreign nationals. When was his polygraph scheduled? That day or shortly after? Does it line up with polygraphs at FEMA preceding April 12?
    • One FEMA official, who declined to be identified out of fear of retribution, said: “They’re going after rank-and-file employees and instilling this culture of fear.” The Trump administration, including at DHS and the Department of Defense, has launched various investigations involving polygraphs into unauthorized disclosures of classified and national security information.

SSA - Proton Drive screenshots. DOGE workers at SSA as contractors before publicly known. SSA VPN troubles.

February 6, 2025 was a big day. Wired article named BB,

and issued North Korea-style press release. This was almost certainly pertaining to my findings from Feb about FEMA SQL and RDP hosts with links to South Korea. Happened in middle of Epstein scandal but they still took the time of day to respond.

August 28, 2025 Secretary Noem Terminates Inept FEMA Employees After Uncovering Massive Cyber Failures, Demands Accountability | Homeland Security https://www.dhs.gov/news/2025/08/29/secretary-noem-terminates-inept-fema-employees-after-uncovering-massive-cyber

  • FEMA Chief Information Officer (CIO) Charles Armstrong, Chief Information Security Officer (CISO) Gregory Edwards, and 22 other FEMA IT employees directly responsible were immediately terminated.

  • This vulnerability was only discovered because Secretary Noem ordered a review of all of FEMA’s operations and IT systems.

  • discovered significant security vulnerabilities that gave a threat actor access to FEMA’s network. The investigation uncovered several severe lapses in security that allowed the threat actor to breach FEMA’s network and threaten the entire Department and the nation as a whole.

  • failing to fix known and critical vulnerabilities, and inadequate operational visibility.

  • Permanent copy

The above was written between 7-10 pm EST on September 30, 2025

This Was Transcribed Approx 2 Am October 1, 2025 with Whisper FOSS App, Check Phone Settings for Access Levels. Firewall AI Prevents Internet Connection, Double Check That. Used Soundcore Bluetooth Earbuds, no One Was in Bluetooth Range and I Was Walking as I Spoke. Not a Soul Was on the Street, no Video or Audio Playing on Phone, I Had to Whitelist Microphone Access for Notesnook to Do This. The Highlighted Parts Are Things I Didnt Say and Were not Phonetically or Conceptually close to what I WAS Saying. The End of the World part is when I Pressed Record and Said Nothing. I Had Tried Sayboard but Chose Whisper because Its Transcription Was Better

Alright so a couple of important i realized when talking with jay number one is to china is the report by a timeline karma it’s not my job to prove one hundred percent causation but i can wind up to physical timeline alongside the data is collected and and say these look an awful lot like x filtration events

to highlight the Treasury Department is part of the Intelligence Community. and the reason the treasury is such a high value target for China and Russia is because they’re responsible for investigating money laundering and sanctions violations which lead into counterintelligence and catching spies.

and the current current current current current current current current current current current current current current

Note: this was the first glitch, it wrote the word current to fillnmy phone screen, I deletef most of it thinking it was a glitch but kept this part.

this is why they know Jessica and DC because she was investigating Russian oligarchs and money laundering comma this is why they hacked the federal court system because they wanted to know more about the mid level investigations of the Russian oligarchs. and even made it create possible nirability for the defendants by saying, hey, you got hacked. Who even knows if those documents are real. data. So then I can talk about the CRIMS database and maybe try to get more clarity from the other jay about proof that they for sure were copied.

So really drive home to the public You might not understand why exactly you treasure is a high value target. Why exactly, well, they would probably know why the nnsa is a high value target.

at the bare minimum, They left us crucially and critically expose to cyber attacks and they continue to have access to sensitive and even classified data to this day.

The video is on the screen. Another thing that makes more sense now is at the beginning. I didn’t know the significance of January 14th or why so many observations began on that date. Comma. But later after reviewing packet where is container start times. I realized now that a bunch of stuff was being spun up on that day in particular. What a coincidence.

data. Other comments we have to think about the massive amount of data that left packet where is system. for comparison. Coca-Cola, their entire corporate database is maybe like 1.2 terabytes. • Even if the insider threats had gotten their hands on every single piece of data at every single agency they had visited by February 6thdata and the data is not a data. It The video is on the screen. It’s still doesn’t add up to or explain 45 terabytes worth going out in a 12 hour period. Thank you for watching! The End of the World of the World of the World The End of the World of the World The End of the World of the World The End of the World of the World The End of the World of the World of the World The End of the World of the World The End of the World of the World of the World The End of the World of the World of the World of the World The End of the World of the World of the World The End of the World of the World of the World of the World of the World The End of the World of the World of the World of the World of the World The End of the World of the World of the World of the World The End of the World of the World of the World of the World of the End of the World of the World of the World of the World of the End of the World of the World of the World of the World of the World The End of the World of the World of the World of the World of the End of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World of the World

Timeline