Not So Fast, Netanyahu: Trump Assassination Plots Trace Back to Ukraine—Not Iran—While FBI Stonewalls on Crooks’ Encrypted Messages

Trump pumped his fist in defiance after the failed assassination attempt in Butler on July 13, 2024.

Source: Unleashed.news

On Sunday, June 15, Israeli Prime Minister Benjamin Netanyahu made the explosive claim on Fox News’ Special Report with Bret Baier that Iran was behind the two assassination attempts on President Trump.

Israeli Prime Minister @netanyahu on intel of Iranian attempts to assassinate President @realDonaldTrump— “he’s enemy number one..” and on when he let President Trump know of the plans for launching the strikes #FoxNews #SpecialReport #Israel pic.twitter.com/l2xX10ZwfH

— Bret Baier (@BretBaier) June 15, 2025

We beg to differ.

We, the American People, Invite the FBI & DOJ to Be Heroes of Transparency

Uncover the Explosive Ukrainian-Linked Patterns in the Trump Assassination Plots and Include the Butler Attempt by Thomas Matthew Crooks

Critical Data on Crooks’ Encrypted Communications Remains Hidden — Will the FBI & DOJ Step Up to Unveil Who Thomas Matthew Crooks Was Communicating With?

Bret Baier interviews President Trump and asks whether we will get transparency around Butler. POTUS responds, “It’s a little bit strange.”

BUTLER, PENNSYLVANIA — On July 13, 2024, at approximately 6:11 p.m. EDT, former President Donald Trump became the target of an assassination attempt during a campaign rally at the Butler Farm Show Grounds in Pennsylvania. The assailant, 20-year-old Thomas Matthew Crooks, opened fire from the roof of a nearby building, situated approximately 400 to 450 feet (about 133 to 150 yards) away from the stage.

Crooks took aim and had his target squarely in his sights, then squeezed the trigger. In a miraculous twist of fate, something caused President Trump to sharply turn his head at that precise moment the first bullet rocketed out of the chamber. It instantly pierced through his right ear and was immediately followed by a barrage of shots from his rifle — a near-fatal mark that, had he not turned at that exact instant, would almost certainly have ended his life and forever changed the course of American history.

The very next day, FBI investigators were seen hosing down the rooftop from which Thomas Matthew Crooks had opened fire — just hours after he was eliminated by a Secret Service sniper. This rapid cleanup, first captured in images published by ABC News on July 14, 2024, has sparked intense scrutiny and raised troubling questions about the handling of critical evidence.

Shortly after, on July 17, 2024, the FBI and Secret Service briefed members of Congress about their findings on Thomas Matthew Crooks’ online activity. During this closed-door session, officials disclosed that Crooks had been using three encrypted messaging platforms hosted on overseas servers located in Germany, New Zealand, and Belgium. Investigators were still attempting to access these platforms at the time of the briefing.

BREAKING: Congressman Mike Waltz says according to an FBI briefing, the Trump shooter had three encrypted accounts OVERSEAS, at the same time we’re hearing the Iranians are plotting against Trump. pic.twitter.com/fXMjenRVe0

— Jesse Watters (@JesseBWatters) July 19, 2024

The FBI confirmed that they had accessed multiple cellphones related to Crooks. One of the phones—recovered from his body at the scene of the assassination attempt—was accessed a couple of days later (on July 15, 2024). Investigators successfully unlocked it using a newly unreleased version of Cellebrite technology within 40 minutes of being granted access to it. Another phone was found at his residence, which contained 27 contacts. The FBI has been in the process of tracking down and interviewing those individuals.

Crooks utilized encrypted messaging accounts on platforms based in Belgium, Germany, and New Zealand. These foreign-based encrypted accounts posed initial challenges for investigators due to the complexities of international data access. However, the FBI, working closely with foreign partners, was able to obtain information from these accounts.

The FBI’s analysis of Crooks’ electronic devices revealed that he used these encrypted platforms primarily to purchase firearm components, chemicals, and other explosive materials.

While some details from Crooks’ devices have been disclosed, such as search histories and certain communications, comprehensive information about the contents of the second phone and the full extent of his communications on encrypted platforms has not been fully released to the public.

According to FBI Special Agent Kevin Rojek (FBI.gov – Investigative Updates on the Butler, Pennsylvania, Assassination Attempt), the encryption used was not highly sophisticated, and agents were able to analyze the content of Crooks’ accounts. The FBI also unlocked Crooks’ Samsung phone and examined his online searches and social media activity, which provided valuable insight into his mindset before the assassination attempt.

So the FBI has admitted that Thomas Matthew Crooks was communicating on encrypted apps through servers located overseas — but which encrypted apps, on which servers specifically, belonging to whom? And, most importantly, who was he communicating with?

Yet, for some strange reason, the FBI has kept all of this extraordinarily pertinent information a secret. Information that could lead us to understanding whether or not other individuals were involved with him or perhaps whether he was communicating with handlers. Did he truly act alone? None of these questions have been answered. This is the central mystery of this story — the FBI has refused to disclose which platforms Crooks was using, which servers they were on, and who he was speaking with.

Now, we’re going to take you on an eye-opening journey through newly uncovered connections — a web of striking coincidences that should not only shock you but also reveal a clear and present danger. These revelations expose uncomfortable truths, and the American people now respectfully call on the directors of our intelligence agencies and the Department of Justice to address these serious questions directly to the American public.

We specifically invite Kash Patel, Dan Bongino, and DOJ Director Pam Bondi to speak publicly about this critical information. If, for any reason, they are unable to disclose it due to an ongoing investigation, then at a minimum, they should immediately consider briefing the President of the United States. His life is on the line, and he deserves to know all the facts in the Butler case — including which encrypted networks the suspect was using, which overseas servers were involved, which platforms they belonged to, and most importantly, who he was communicating with: which handles, personas, or entities were on the other end.

Chilling Plots Clearly Tied to Ukraine

Everyone remembers Ryan Wesley Routh, the deranged individual who showed up and lay in wait along the fence line of Trump National Golf Club in West Palm Beach, Florida — poised to ambush President Trump in a second assassination attempt.

Routh was born in Guilford County, North Carolina, and spent most of his life in Greensboro, North Carolina, before moving to Hawaii in 2018. This move raised eyebrows, given his extensive criminal record and well-documented financial struggles.

Over the years, Routh racked up an astonishing 11 felony charges in North Carolina alone, with convictions that included possessing a weapon of mass destruction and possessing stolen goods. His record is riddled with 74 arrests and over 100 criminal charges between 1996 and 2014 — a pattern of repeated offenses that somehow never resulted in significant prison time. Instead, Routh received probation and suspended sentences for his 2002 and 2010 felony convictions, avoiding the extended incarceration that would normally be expected for someone with such a history.

In fact, under North Carolina’s structured sentencing guidelines, a defendant with that many felony convictions would typically be facing at least 13 to 20 years in prison if those sentences were imposed consecutively. Instead, Routh walked free on probation — a glaring discrepancy that raises questions about how he slipped through the cracks of the justice system.

In 2018, Ryan Wesley Routh made a surprising move to Kaʻaʻawa, Hawaii, a small coastal community just outside of Honolulu. Before moving, Routh was indigent, yet he somehow managed to relocate to Kaʻaʻawa, a place where the cost of living is 93% higher than the national average and 12% higher than the Hawaii average. Despite these steep costs, he also found a way to launch a business venture with his adult son.

Together, they began constructing and selling small wooden sheds in Kaʻaʻawa. Reports indicate that the shed-building business did not generate sustainable income, and Routh continued to struggle financially.

And yet, despite his well-documented indigence and persistent financial woes, this same man found the means to travel to and from Ukraine, working to recruit foreign fighters from Afghanistan to join the war in Ukraine against Russia. The question looms: How did a man with such a long and troubling criminal past — and so few financial resources — end up in Hawaii and then crisscrossing the globe, poised to become a second would-be assassin of a former U.S. President?

While in Ukraine, Ryan Wesley Routh advocated for the war against Russia and spent time recruiting foreign fighters from Afghanistan. He appeared in a slickly produced propaganda video, and rumors quickly spread online claiming it was from BlackRock, similar to the one Thomas Matthew Crooks was seen in. However, this was not accurate and was quite possibly disinformation.

Ryan Wesley Routh is seen in a propaganda video by @save_mrpl, a propaganda arm tied to the Azov Battalion.

This video is a message to the world from the Mariupol defenders.They are grateful for our support and ask us to keep on fighting.“Thank you to everyone who supports the Defenders of Mariupol and raises the issue of Mariupol at the international level
Mariupol is”#savemariupol pic.twitter.com/WiQfSiA2Gx

— SAVE AZOV (@save_mrpl) May 1, 2022

Our investigation confirmed that the video Routh was seen in originated from a production team dedicated to the support of the Azov Battalion. It was first published on May 1, 2022, by the X account SAVE AZOV, which promotes the 4308 Regiment and urges Ukrainian authorities and world leaders to support the Azov Brigade. The video was produced by Олександр Алфьоров and appeared on a YouTube channel under the handle @OleksandrAlforov, directly connecting it to Azov’s media operation.

YouTube link: https://www.youtube.com/@OleksandrAlforov

3rd Separate Assault Brigade
The emblem of Ukraine’s 3rd Separate Assault Brigade—an elite unit descended from the Azov Battalion—features a reworked Wolfsangel, a symbol historically tied to Nazi Germany.

Cellphone data confirms that on September 15, 2024, Routh positioned himself along the tree line at Trump National Golf Club in West Palm Beach, waiting nearly 12 hours for an opportunity to strike. From 1:59 a.m. to 1:31 p.m., he remained stationed along the perimeter of the golf course — a chilling display of premeditation and patience.

According to Acting Secret Service Director Ronald Rowe Jr., President Trump’s decision to play golf that day was a last-minute decision, entirely off the record and not on his official schedule. “The president wasn’t even really supposed to go there,” Rowe stated. But Routh was already there — hours earlier. That suggests inside knowledge or surveillance beyond coincidence.

The Chilling 3rd Assassination Plot of Nikita Casap and a Handler Connected to a Ukrainian-Linked Telegram Account

A newly unsealed FBI affidavit reveals that 17-year-old Wisconsin native Nikita Casap — who murdered his parents, stole $14,000 in cash, and plotted to assassinate President Trump using a militarized drone — was communicating via Telegram with an overseas phone number registered to Vodafone Ukraine, one of the country’s largest mobile carriers.

Casap was communicating with at least two individuals connected to Ukraine. One of these handlers used the Telegram username “PoМаН ВіКТОВИЧ,” which translates to Roman Viktorovych, linked to a Vodafone Ukraine phone number. The affidavit further reveals that Casap discussed post-assassination escape plans with Roman Viktorovych, asking how long he would need to hide before being moved to Ukraine and whether he could expect to live a normal life there.

The Telegram account linked to the overseas phone number +380 50 259 5318 — registered under Vodafone Ukraine — was found to be communicating in Cyrillic script, specifically written in the Ukrainian language.

The Telegram username “PoМаН ВіКТОВИЧ” — written in Ukrainian Cyrillic — translates to Roman Viktorovych, the shadowy figure linked to a foreign cell guiding a would-be Trump assassin.

How We Confirmed It Was Ukrainian, Not Russian:
1. Country Code +380
The +380 prefix is the internationally recognized country code for Ukraine, confirming the phone number is Ukrainian in origin.

The mobile prefix 050 specifically identifies the number as belonging to Vodafone Ukraine, one of the country’s leading mobile operators.

2. Telegram Display Name: РОМаН ВіКТОВИЧ
This is the Cyrillic version of the name Roman Viktorovych.

The presence of the letter “і” in “ВіКТОВИЧ” is key:

The letter “і” is used in Ukrainian, but not in modern Russian (Russian uses “и” instead).

Ukrainian also includes unique letters like “ї”, “є”, and “ґ” which do not appear in the Russian alphabet.

3. Script Usage in Context
The Telegram user under this number also communicated with Nikita Casap in Cyrillic script, as confirmed by the FBI affidavit.

The linguistic patterns in the messages observed align with Ukrainian Cyrillic orthography, not Russian.

4. Affidavit Clues
The FBI affidavit references that at least two individuals Casap communicated with “wrote in Cyrillic.”

Cross-analysis of names and phonetics — especially “ВіКТОВИЧ” — confirms Ukrainian spelling.

Actual Telegram screenshot.

These are just some of the chilling communications uncovered between 17-year-old would-be assassin Nikita Casap and multiple Telegram accounts — including at least two that communicated in Ukrainian Cyrillic.

As part of his diabolical plot, Casap brutally murdered his mother and stepfather to steal $14,000 in cash — money he intended to use to acquire a customized militarized drone capable of dropping and detonating an explosive device in an attempt to assassinate President Donald Trump.

He actively coordinated an escape plan to Ukraine, even asking one handler if he could still live a “normal life” there — even if the world found out what he had done.

One of the Telegram accounts instructed Casap on how to hide the bodies of his parents, advising him to drag them into the basement to avoid detection.

According to the FBI affidavit, he was also given specific instructions on how to swap out the license plate on his stepfather’s vehicle to evade law enforcement, along with a carefully mapped escape route that took him from southeastern Wyoming, through Kansas, to a waypoint near Pumpkin Center, Oklahoma — a remote location likely chosen to avoid detection — before continuing to California, where he planned to await extraction to Ukraine.

“200 wheels” is almost certainly terrorist code for explosive materials or fragmentation elements intended to maximize casualties when detonated by the drone.

He was also actively communicating in Nazi chat groups on Telegram, specifically within the Terrorgram network, and was linked to The Order of Nine Angles and the Misanthropic Division — a Ukrainian Nazi accelerationist group historically linked to the Azov Battalion.

The Tesla Cybertruck Explosion Outside Trump International Hotel

On January 1, 2025, a Tesla Cybertruck exploded outside the Trump International Hotel in Las Vegas. The driver, identified as 37-year-old U.S. Army Master Sergeant Matthew Livelsberger, was a highly decorated Green Beret with deployments in Afghanistan, Ukraine, Tajikistan, Georgia, and the Congo. Authorities reported that Livelsberger shot himself in the head just before the explosion, which was caused by fireworks and fuel canisters packed inside the vehicle.

Livelsberger had extensive experience in drone operations and maintenance, serving as a remote and autonomous systems manager for the Army. He was responsible for the operations, maintenance, and integration of drones in the military.

Beyond his military duties, Livelsberger was actively recruiting former military personnel and others to fight in the war in Ukraine, leveraging his experience and connections to place them in combat roles. Reports indicate that these recruitment efforts were ongoing and occurred after his military service, reflecting a sustained commitment to advancing the Ukrainian war effort.

Holy smokes. The Cybertruck bomber was apparently setting up recently retired Special Forces guys with contracts to go to Ukraine. pic.twitter.com/D9MeDSR1Uk

— johnny maga (@_johnnymaga) January 2, 2025

A critical piece of evidence was uncovered during an investigation into Livelsberger’s social media accounts: a photograph of him with his ex-wife, in which he is seen wearing a T-shirt bearing the phrase “Слава Україні – Героям Слава” (“Glory to Ukraine, Glory to the Heroes”) written in Ukrainian. The image was analyzed, enhanced, transcribed, and translated to confirm the message—highlighting Livelsberger’s explicit support for Ukraine’s nationalist cause.

Matt Livelsberger is seen wearing a T-shirt inscribed in Ukrainian with the phrase ‘Glory to Ukraine,’ a national salute widely used as a patriotic rallying cry.

This evidence underscores that Livelsberger was not a Trump supporter but rather someone deeply enmeshed in foreign conflicts — actively recruiting others to fight and potentially die in Ukraine and proudly displaying symbols of Ukrainian nationalism in his personal life.

This is imperative given the weight of these exposed connections, with all roads seemingly leading to Ukraine and the glaring question mark surrounding Crooks.

The post Not So Fast, Netanyahu: Trump Assassination Plots Trace Back to Ukraine—Not Iran—While FBI Stonewalls on Crooks’ Encrypted Messages appeared first on The Gateway Pundit.

Previous post FBI Director Kash Patel Reveals Chinese Plot to Create Thousands of Fake Mail-In Ballots in 2020 Election – Chris Wray Hid This Like He Did the Iranian Breach of the 2020 Election System!
Next post Gen. Mike Flynn: Trump’s Great Test – Peace Through Strength or Endless Wars