It’s a pipeline.
A routine DMV interaction → federal verification → centralized data systems → silent downstream consequences.
Most people only ever see Panel 1.
The rest happens out of sight.
🧵⬇️
It’s a pipeline.
A routine DMV interaction → federal verification → centralized data systems → silent downstream consequences.
Most people only ever see Panel 1.
The rest happens out of sight.
🧵⬇️
It’s a pipeline.
A routine DMV interaction → federal verification → centralized data systems → silent downstream consequences.
Most people only ever see Panel 1.
The rest happens out of sight.
🧵⬇️
restoring-democracy.org/dream_machine
restoring-democracy.org/dream_machine
You don’t need malice.
You don’t need intent.
You just need a clock, incomplete data, and silence.
That’s how administrative systems quietly reshape lives.
You don’t need malice.
You don’t need intent.
You just need a clock, incomplete data, and silence.
That’s how administrative systems quietly reshape lives.
It’s:
• bulk uploads
• automated matching
• mismatch flags
• notices
• deadlines
Errors + short cure windows turn data outputs into real-world pressure.
It’s:
• bulk uploads
• automated matching
• mismatch flags
• notices
• deadlines
Errors + short cure windows turn data outputs into real-world pressure.
It’s a pipeline.
A routine DMV interaction → federal verification → centralized data systems → silent downstream consequences.
Most people only ever see Panel 1.
The rest happens out of sight.
🧵⬇️
It’s a pipeline.
A routine DMV interaction → federal verification → centralized data systems → silent downstream consequences.
Most people only ever see Panel 1.
The rest happens out of sight.
🧵⬇️
Each deportation costs thousands, plus additional taxpayer impacts because of police overtime and lost business due to Trump crackdowns
www.independent.co.uk/news/world/a...
Each deportation costs thousands, plus additional taxpayer impacts because of police overtime and lost business due to Trump crackdowns
www.independent.co.uk/news/world/a...
What’s being normalized in Minnesota—armed, masked federal enforcement as a daily routine—is a constitutional red flag.
Statement:
exposed1.substack.com/p/when-did-a...
What’s being normalized in Minnesota—armed, masked federal enforcement as a daily routine—is a constitutional red flag.
Statement:
exposed1.substack.com/p/when-did-a...
New Mexico Idaho Alabama Iowa Missouri Wisconsin Indiana NY Maine Kentucky Virginia Tennessee North Carolina Georgia Arizona Nebraska Montana Utah Carolina Kansas Arkansas Wyoming Louisiana Texas Minnesota Michigan Florida Oregon Pennsylvania Massachusetts California
New Mexico Idaho Alabama Iowa Missouri Wisconsin Indiana NY Maine Kentucky Virginia Tennessee North Carolina Georgia Arizona Nebraska Montana Utah Carolina Kansas Arkansas Wyoming Louisiana Texas Minnesota Michigan Florida Oregon Pennsylvania Massachusetts California
The pattern: states are pressed into sending voter-roll data to DHS/SAVE (often via admin agreements), and only later does the public get a debate. Often via admin agreements quietly, then publicly later.
The pattern: states are pressed into sending voter-roll data to DHS/SAVE (often via admin agreements), and only later does the public get a debate. Often via admin agreements quietly, then publicly later.
When DOJ demands voter rolls and states plug into verification systems, the gate isn’t the ballot box—it’s the backend.
Thread + updated map below ⬇️
But the new model is built before one—quietly, legally, nationwide.
Part IV of our Warrantless Surveillance Series: how “public safety” became a national data pipeline. 1/4🧵⬇️
When DOJ demands voter rolls and states plug into verification systems, the gate isn’t the ballot box—it’s the backend.
Thread + updated map below ⬇️
• Crypto ATMs → “fraud prevention”
• ALPR cameras → “local crime”
• Fusion centers → “sharing”
Different excuses. Same architecture: collect → retain → route → federate. 2/4🧵⬇️
• Crypto ATMs → “fraud prevention”
• ALPR cameras → “local crime”
• Fusion centers → “sharing”
Different excuses. Same architecture: collect → retain → route → federate. 2/4🧵⬇️
Following further document review, several states previously marked hybrid or unconfirmed are now verified as operating inside SAVE usage. The scope is broader—and more normalized—than initially visible.
Updated map below current known status as of 1/9/2025.
Following further document review, several states previously marked hybrid or unconfirmed are now verified as operating inside SAVE usage. The scope is broader—and more normalized—than initially visible.
Updated map below current known status as of 1/9/2025.
When movement + financial + identity records merge, you don’t need warrants—you need access.
Full Part IV linked below. 4/4 🧵
exposed1.substack.com/p/dojs-confi...
When movement + financial + identity records merge, you don’t need warrants—you need access.
Full Part IV linked below. 4/4 🧵
exposed1.substack.com/p/dojs-confi...
When movement + financial + identity records merge, you don’t need warrants—you need access.
Full Part IV linked below. 4/4 🧵
exposed1.substack.com/p/dojs-confi...
When movement + financial + identity records merge, you don’t need warrants—you need access.
Full Part IV linked below. 4/4 🧵
exposed1.substack.com/p/dojs-confi...
And the “30-day retention” promise? It collapses fast. In practice, data persists for years—and travels. 3/4🧵
And the “30-day retention” promise? It collapses fast. In practice, data persists for years—and travels. 3/4🧵
• Crypto ATMs → “fraud prevention”
• ALPR cameras → “local crime”
• Fusion centers → “sharing”
Different excuses. Same architecture: collect → retain → route → federate. 2/4🧵⬇️
• Crypto ATMs → “fraud prevention”
• ALPR cameras → “local crime”
• Fusion centers → “sharing”
Different excuses. Same architecture: collect → retain → route → federate. 2/4🧵⬇️
But the new model is built before one—quietly, legally, nationwide.
Part IV of our Warrantless Surveillance Series: how “public safety” became a national data pipeline. 1/4🧵⬇️
But the new model is built before one—quietly, legally, nationwide.
Part IV of our Warrantless Surveillance Series: how “public safety” became a national data pipeline. 1/4🧵⬇️