The American Futurist: A Case Study in Decentralized Accelerationism
The American Futurist, commonly referred to as AmFuT or TAF, first emerged in 2020 as the media outlet and propaganda arm of the now-defunct white nationalist group National Socialist Resistance Front (NSRF), formerly known as the National Socialist Order (NSO). As that organization dissolved, AmFuT continued independently, evolving into a more digitally focused accelerationist extremist collective.
Today, AmFuT promotes a hardline neo-Nazi ideology rooted in the belief that the United States (US) government is irredeemable and must be brought down through violent revolution. The group explicitly rejects political solutions and aligns itself with the teachings of Siege by James Mason, pushing for lone-wolf attacks and the creation of chaos as a means to accelerate societal collapse.
Unlike threat actors that I profiled in previous reports, AmFuT does not revolve around individual identities or leadership figures. It functions as a decentralized propaganda cell, which made traditional attribution impossible. That is precisely what made it an ideal target to further test StealthMole’s capabilities.
Using StealthMole’s integrated tools, including Dark Web Tracker, Telegram Tracker, Compromised Data Set, ULP Binder and others, I was able to trace the group’s operational network, uncover its propaganda strategy, and document its partnerships and influence operations across the dark web and encrypted platforms.
Incident Trigger and Initial Investigation
The investigation began with a keyword query for "American Futurist" via StealthMole's Dark Web Tracker, which immediately identified an active .onion domain:
- http://nj********4qao3*******fgc**************************id.onion
This domain functions as AmFuT’s primary media hub. It hosts a range of extremist content, including ideological essays, neo-Nazi manifestos, propaganda, and commemorations of convicted white supremacist actors. The material is explicitly anti-government, advocates racial violence, and frequently references accelerationist doctrine, especially themes drawn from Siege by James Mason.
In addition to textual propaganda, the site features highly stylized visual assets: logos, cover images, and banners, that reinforce AmFuT’s brand and ideological positioning. These materials were later used to cross-reference and confirm the group’s presence across multiple other dark web services and Telegram channels.
What made this domain stand out during initial inspection was the strategic use of resilient design principles: multiple mirrors, frequent domain cycling, and hardened privacy features. This allowed AmFuT to remain active even as clearnet domains were monitored or removed. Their ability to continuously publish high-risk content with minimal downtime speaks to a professional-grade understanding of dark web operations.
Digital Infrastructure: A Decentralized Accelerationist Hub
A. Onion Network Mapping
Through recursive domain pivoting, five active dark web domains used by AmFuT were discovered:
- Primary portal:
- nj************************************************id.onion
- Staff page:
- uo****************************************************yd.onion
- Donations:
- j7****************************************************qd.onion/donate/
- Mirror host:
- amf*******************************************vgyd.onion
- Backup:
- amf**************************************************yd.onion
B. Email & Financial Infrastructure
AmFuT operates across multiple secure email services, including providers such as Tuta and ProtonMail, as well as a custom ideological domain (@hitler.rocks) used for branding and identity reinforcement:
- c********@tutamail.com
- c********@protonmail.com
- c********@hitler.rocks
- a********************@hitler.rocks
These email addresses were found embedded across AmFuT’s .onion infrastructure and Telegram properties, serving as primary contact points for content submission, donation inquiries, and propaganda distribution. Moreover, the @hitler.rocks domain is also used by a separate but ideologically aligned entity, “Frens Library,” which shares similar aesthetic branding and may be part of a broader hosting or publishing network.
AmFuT also solicits donations in Monero (XMR) to maintain operational anonymity and financial resilience. StealthMole’s cryptocurrency tracing capabilities identified the following wallet addresses tied to AmFuT donation pages:
- 8*******************************************************************************************y— Active wallet connected to their donation .onion page
- 82***************************************************************************************y— Dormant
- 8A1************************************************************************************i— Dormant
C. Telegram & Communication Layer
AmFuT operates through at least 6 Telegram channels, each with a specific role:
- Publishing hub: @ame*********************ng
- Broadcast media: @thef*************l
- Third Position outreach: @TP********y, mov************t
- Satirical/clone groups: @n*ttheame***********t, @not****F
Alias use like "TAF" appears consistently in channel bios and shared media. One surprising discovery via StealthMole's TG tracker linked the group's contact email to @r******_**1, a jihadist Telegram group, suggesting either shared infrastructure or tactical infiltration behavior.
D. Mailing Address
AmFuT publicly lists a mailing address linked to its operations as:
American Futurist Inc.
P.O. Box ***6
M*****, O*** 4***7
This address provides a real-world geographic anchor for at least one facet of the group’s logistics, likely tied to its publishing or merchandise distribution operations.
Personnel Analysis
AmFuT publicly lists a full roster of contributors on one of its .onion staff pages. While most contributors operate under pseudonyms, consistent with the group’s emphasis on anonymity, StealthMole helped highlight potential overlaps and behavioral signatures. The full list includes:
- Editor-in-Chief:
- G***t – Listed as the primary editor but remains completely anonymized with no external digital footprint.
- Contributors:
- R*** A****r – Host of "TAF Radio," actively producing long-form interviews including with Rinaldo Nazzaro (The Base founder)
- T****s M***n
- R***y S********d
- I****t D******n – Known cyber-offensive actor involved in hacking/doxing cases, notably compromising the online presence of adult performer Riley Reid; operates on Wire under @INJEKTDIVISION
- T** T*****e
- Texas P***
- D****** M***n – Convicted domestic terrorist, formerly associated with white supremacist group the White Aryan Resistance; likely included as symbolic endorsement rather than active contributor
- V*****t S****r
- A****f E.
- J*****h M****n
- J** R*****s
- L****s W****s
- A*** SK
- Dra*******e
- B** S***s
- Pope P**l IV
- Q**d
- A**** Rain
- E***** Young
- Anonymous – Used to indicate additional unnamed contributors
The diversity and range of aliases suggest a coordinated editorial effort rather than a lone operator. While many names appear to be invented or ideologically inspired pseudonyms, some, such as I*****t D******n and R**n A******r, demonstrate persistent activity across platforms, indicating recurring operator behavior.
Media Strategy: Radio & Propaganda Pipeline
AmFuT's influence model has evolved well beyond static manifestos. Today, its media strategy reflects a sophisticated understanding of multi-platform engagement, incorporating audio, visual, and interactive content to expand reach and deepen ideological impact.
One of the most notable examples uncovered through StealthMole’s Telegram detection module is American Futurist Radio, a podcast-style broadcast hosted via their Telegram channel @thef**************************l. The first episode featured Norman Spear (aka Rinaldo Nazzaro), the founder of the neo-Nazi paramilitary group The Base. Their discussion covered:
- Allegations of Russian FSB affiliation
- The ideological and operational failures of The Base
- His motivations for relocating to Russia
This broadcast format allows AmFuT to present itself as more than a static publishing operation. By hosting discussions with high-profile extremist figures, AmFuT positions itself as a central media outlet within the broader far-right ecosystem, controlling the narrative and amplifying ideologically compatible voices.
Network Affiliations: Aryan Freedom Network & Beyond
AmFuT’s operations do not occur in ideological isolation. Despite its self-positioning as an independent outlet, a deeper investigation through StealthMole’s infrastructure and content mapping tools revealed collaboration with other extremist ecosystems.
- Aryan Freedom Network (AFN): Several AmFuT .onion articles were authored or cross-posted by the Aryan Freedom Network. Event coverage for “Aryan Fest”, a white supremacist gathering, featured visual co-branding that included AFN flags. This challenges AmFuT’s public disavowals of groups like Atomwaffen and The Base.
- Third Positionist & Syncretic Channels: AmFuT engages in tactical promotion of ideologically adjacent groups such as the Third Position Directory and Movement Manifest. These Telegram-based outlets blend far-right racial ideology with anti-capitalist and anti-democratic rhetoric, representing a hybrid form of far-right ideology.
- Infrastructure Overlap with Extremist Jihadism? One unusual discovery via StealthMole’s Telegram tracker revealed that a known AmFuT email address (c*********@tutamail.com) was also registered in a jihadist-themed group, @r*****_**1. While likely the result of infrastructure reuse, compromise, or spoofing, it signals that AmFuT’s digital reach may inadvertently or deliberately cross ideological lines to exploit chaos narratives.
Threat Analysis
| Vector | Risk Level | Notes |
| Propaganda | High | Active recruitment, glorification of mass violence |
| Cyber Activity | Moderate | I****t D******n tied to doxxing/hacking |
| Real-world Action | Indirect | Encourages lone-wolf terrorism, glorifies attackers |
| Foreign Ties | Moderate | Dialogue with The Base founder suggests Russian-based ideological links |
Conclusion
The American Futurist (AmFuT) is not just a neo-Nazi blog, it is a highly strategic digital publication cell, mimicking journalistic aesthetics while disseminating far-right extremist propaganda. Its presence on multiple .onion sites, secure email domains, and encrypted messaging apps demonstrates a long-term operational strategy aimed at radicalizing decentralized actors.
What makes this case unique is the lack of clear attribution: no faces, no registrants, no exposed admins. Yet through StealthMole's ecosystem of intelligence modules, we were able to:
- Reconstruct their infrastructure
- Attribute operational personas
- Detect cross-platform collaborations
- Highlight active security risks
This case reinforces the importance of integrated intelligence systems like StealthMole, where infrastructure, behavioral analysis, and cross-platform detection reveal what the actors try hardest to hide.
Editorial Note
While every effort has been made to ensure the accuracy of this report, it is important to acknowledge that attribution in cyber investigations can never be guaranteed with complete certainty. The connections drawn are based on available open-source intelligence and StealthMole platform data. However, attribution remains probabilistic and subject to change as new information emerges.
The primary goal of this report is not just attribution, but also to showcase how StealthMole’s platform enables comprehensive, efficient, and intuitive profiling of threat actors through integrated tools such as Dark Web & Telegram Trackers, ULP Binder, the Compromised Data Set and others. These tools allow even independent researchers to connect dots across aliases, infrastructure, and behavioral patterns, transforming fragmented data into actionable intelligence.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com
Labels: Far-Right Extremism