Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Vanity: Shooter used "Encrypted Comms"
VANITY

Posted on 07/17/2024 1:53:26 PM PDT by TigerClaws

Andrew Desiderio @AndrewDesiderio NEWS — Senate briefing on Trump rally shooting just concluded. Top lines, per 2 senators on the call:

—The shooter visited the rally site a few days in advance to scope it out —62 mins elapsed between the time the shooter was photographed as being suspicious and when he fired the shots —20 mins elapsed between the time he was spotted by snipers & when he fired the shots —FBI Director Wray said there’s no known foreign nexus but no established motive as of now. Shooter used encrypted comms and had little to no social media presence


TOPICS: Conspiracy
KEYWORDS: andrewdesiderio; communication; desiderio; encryptedcomms; encryption; thomasmatthewcrooks; tinfoilbrigade; tinfoilhattery; vanity
Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last
Encrypted comms?

Exactly with whom was our shooter speaking?

CONSPIRACY.

1 posted on 07/17/2024 1:53:26 PM PDT by TigerClaws
[ Post Reply | Private Reply | View Replies]

To: TigerClaws

Prove it or take this BS down.


2 posted on 07/17/2024 1:55:04 PM PDT by bigbob
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

A lot of people use email encryption. It’s not proof of any ‘conspiracy’.


3 posted on 07/17/2024 1:55:38 PM PDT by Jamestown1630 ("A Republic, if you can keep it.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

Encrypted comms..this points to Government entities kid doesn’t look sharp enough to cut butter...Or this is BS..


4 posted on 07/17/2024 1:56:00 PM PDT by dpetty121263
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

It could have been as simple as WhatsApp.


5 posted on 07/17/2024 1:56:40 PM PDT by jjotto ( Blessed are You LORD, who crushes enemies and subdues the wicked.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jjotto
It could have been as simple as WhatsApp.

exactly

6 posted on 07/17/2024 1:59:02 PM PDT by 1Old Pro
[ Post Reply | Private Reply | To 5 | View Replies]

and the proof is...


7 posted on 07/17/2024 2:00:34 PM PDT by Chode (there is no fall back position, there's no rally point, there is no LZ... we're on our own. #FJB)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws
Encrypted comms means nothing. He's a 20 year old. They need to explain what does he have specifically? Is he tied with Antifa or something?

I bet all of us have encryption on our phones nowadays.

8 posted on 07/17/2024 2:01:55 PM PDT by Reno89519 (Trump / Vance 2024 - Make America Great Again)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dpetty121263

No...he’s a smart kid...two years engineering after High School...applied to Robert Morris


9 posted on 07/17/2024 2:01:56 PM PDT by Sacajaweau
[ Post Reply | Private Reply | To 4 | View Replies]

To: TigerClaws
Encrypted comms?

Seriously, lets not post crap that isnt sourced or substantiated. I am not saying their wasnt a conspiracy, but the rational approach is to wait for evidence of such. People look like kooks when they jump to the extreme without foundation. Makes the entire conservative side look bad if it turns out that Crook was just a lone nut case and a series of failures by SS gave him a chance to get under the wire. Sure, lots of info that looks suspicious, but also lots of wrong reporting as well.

10 posted on 07/17/2024 2:03:50 PM PDT by Magnum44 (...against all enemies, foreign and domestic... )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sacajaweau

Not so smart to go and get himself killed in a way anyone with 2 braincells would or should know that was a life ending endeavor.


11 posted on 07/17/2024 2:06:00 PM PDT by dpetty121263
[ Post Reply | Private Reply | To 9 | View Replies]

To: Reno89519

He’s an ex 20 year old. Pining for the fjords!


12 posted on 07/17/2024 2:06:48 PM PDT by xp38
[ Post Reply | Private Reply | To 8 | View Replies]

To: TigerClaws

“encrypted comms” to his CIA handler?

Who is the unknown guy referenced a couple days ago with the weird anarchist handle? One of our FR colleagues immediately tagged him as the CIA handler.


13 posted on 07/17/2024 2:08:01 PM PDT by ProtectOurFreedom (“When exposing a crime is treated like a crime, you are being ruled by criminals” – Edward Snowden)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dpetty121263

He knew it was suicide mission when he accepted it. His contribution to The Revolution.


14 posted on 07/17/2024 2:10:08 PM PDT by ProtectOurFreedom (“When exposing a crime is treated like a crime, you are being ruled by criminals” – Edward Snowden)
[ Post Reply | Private Reply | To 11 | View Replies]

To: TigerClaws

Even Discord is ‘encrypted’ IIRC.


15 posted on 07/17/2024 2:10:25 PM PDT by Blueflag (To not carry is to choose to be defenseless.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

“Encyrpted comms” can mean anything from an encrypted app like whatsapp or a scrambled radio or even just a DNS provider for regular internet use.


16 posted on 07/17/2024 2:11:53 PM PDT by z3n (Kakistocracy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerClaws

So that sex toy on the roof that was disguised as a ‘transmitter device’, was really an encrypted comms packet radio.

OK, gun control aside for a second, we must have HAM radio control.

Now about that phrase ‘Encyrpted Comms’ - - -

This is a vague term, issued to spawn conjecture from the news and interested parties, such as you and I.

So everyone speculates on what is ‘encrypted’ and ‘comms’.

Now the narrative has an infinite variety of interpretations to choose from, to propagate and further steer (or confuse) the future narrative.

Someone said it could be WhatsApp

Or he flipped his trigger finger at them, an encrypted version of ‘the bird’.

Or he had a youtube of Biden, or even Kamel - both speak encrypted.

Or Heaven forbid, A Bible Verse (EEK EEK) which is encrypted to many people, and subversive, etc.


17 posted on 07/17/2024 2:13:38 PM PDT by Scrambler Bob (Running Rampant, and not endorsing nonsense; My pronoun is EXIT. And I am generally full of /S)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

There was an update of U.S. Senators today regarding the shooting. They weren’t allowed to ask questions.

Here’s links for those that asked:

https://www.newsnationnow.com/politics/2024-election/senators-briefed-trump-rally-shooting/

ENCRYPTED COMMS is last comment here:

https://x.com/AndrewDesiderio/status/1813666840671085036


18 posted on 07/17/2024 2:15:21 PM PDT by TigerClaws
[ Post Reply | Private Reply | To 13 | View Replies]

To: ProtectOurFreedom
Who is the unknown guy referenced a couple days ago with the weird anarchist handle? One of our FR colleagues immediately tagged him as the CIA handler.

I saw one post a couple of days ago that stated his parents both were consultants/contracted counselors with/for the CIA.

[Have seen no further verification of this.]

19 posted on 07/17/2024 2:17:09 PM PDT by TomGuy
[ Post Reply | Private Reply | To 13 | View Replies]

To: Scrambler Bob

Encrypted communications is when two entities are communicating and do not want a third party to intercept or to listen in. Encrypted communication means people can share information with varying degrees of certainty that third parties cannot intercept what was said. An encrypted phone is a highly secured phone with encrypted internal components and encrypted communications such as encrypted calls, sms, messages, file share and encrypted storage.

Secured Phones and Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance. Encrypted phones can protect calls from interception by using algorithms to encrypt the signals. The phones have a cryptographic chip that handles encryption and decryption. Two algorithms are programmed into the chip, a key-exchange algorithm for the key agreement protocol and a symmetric-key algorithm for voice encryption.

Encrypted Mobile Phone Calls consist of securing and encrypting mobile phone communications by all layers of communication such as full end to end encryption for Voice calls between both phones via a secured encrypted platform. Secured Phones are mobile telephones that provide security against eavesdropping and electronic surveillance. Digitpol supplies highly secured phones, laptops and encrypted communication platforms to the corporate sector.

Source:

https://digitpol.com/encrypted-communications/

The FBI cracked his phone - per the NY Times.

What’d they find?

Did someone tell him the building would be clear?

Did someone help him get up on the building?

Did someone place the ladder there?

How’d he get his AR platform weapon up there?

Were there ‘other players’ involved in this incident?

The fact he may have not been a ‘lone gunman’ means there could be other bad actors out there creating a danger to Trump and others.


20 posted on 07/17/2024 2:18:29 PM PDT by TigerClaws
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson