Username Analysis: Could “@churbum75m” and Related Posts Be Linked to the Charlie Kirk Assassination?
By Caveman In politicsAn evidence-minded, cautious review of social traces, possible codewords, and what they may — and may not — mean.
Summary / Key takeaway
Social posts and screenshots circulating online indicate an account using the handle @churbum75m posted celebratory or taunting content after the assassination of Charlie Kirk (September 10, 2025). Some observers have suggested the handle encodes references to Kirk and the shooting. Those suggestions are plausible at a surface-linguistic level, but the available public evidence is fragmentary and unverified — meaning the observations below should be treated as hypotheses that warrant further, formal investigation (by law enforcement and platform moderators), not as proven facts.
What we found (public traces)
- Presence of the handle online: archived X posts and social-media screenshots show activity from an account named
@churbum75m, including a July 31, 2025 X post that mentions seeing “Tyler” and later posts after the September 10 event that readers allege celebrated the shooting. - Media reporting linking the handle to people in the suspect’s circle: at least one news/aggregate article cites screenshots and claims the account was followed by a person identified in reporting as connected to the suspect’s social circle. Those reports are part of the public conversation but rely on screenshots and secondary sourcing. :contentReference[oaicite:2]{index=2}
- Context — the assassination and suspect: the killing of Charlie Kirk on September 10, 2025, and the subsequent identification and charging of Tyler James Robinson have been widely reported; any social account claims must be read against the verified facts of the investigation.
Linguistic breakdown: what the handle might mean
Breaking churbum75m into segments yields a few plausible readings — again, plausible, not proven:
- “Chur” — could be a clipped form of “Charlie” (phonetic / slang-based abbreviations are common in handles).
- “Bum” — in some slang contexts, this can carry violent or pejorative connotations (e.g., roughly “shot” or an insult), and when paired with a public violent event the pairing reads as taunting.
- “75m” / “75 mm” — visually resembles a caliber specification (e.g., “75mm”). Social-media trolls sometimes exaggerate numbers to troll; some posts claim the weapon used was a Mauser Model 98 in .30-06 (≈7.62–7.5mm in casual speech), which would make “75mm” a crude numeric echo rather than a technically correct caliber notation. This could be intended as a provocative nod rather than a literal technical claim.
Put together, the handle can be interpreted by a reader familiar with the event as a taunting or celebratory reference to Charlie Kirk and the shooting. That interpretation is consistent with the content attributed to the account in screenshots and reporting — but interpretation ≠ proof of involvement or foreknowledge.
The parallel post: “Another Chud Bites The Dust”
A separate account, reported as @fujoshishincel, posted the phrase “Another Chud Bites The Dust” (September 15, 2025) — language that echoes the tone and apparent intent of the @churbum75m posts. “Chud” is an established derogatory slang targetting certain political groups; observers note the similarity between “Chud” and the hypothesized shorthand “Chur” for Charlie. While typos and slang shifts are common online, the textual parallel increases the plausibility of coordination or at least shared rhetorical framing among accounts celebrating the assassination.
Possible explanations — ranked by plausibility
- Trolling and performative gloating: the handle and posts were created after the fact by users celebrating the event. This fits much of the public pattern (most online celebratory posts are reactive rather than evidence of prior knowledge).
- Coordination within an online subculture: the similar language and mutual follows could indicate a ragged network (friends/follower cluster) celebrating or amplifying the same message.
- Insider or foreknowledge (less likely based on public data): while some circulating screenshots claim “we did it” style posts, public evidence available via screenshots and reporting is not sufficient to prove prior knowledge or direct involvement; that is a law-enforcement question requiring forensic data (account metadata, IPs, device records, timestamps, and platform logs). Do not conflate suggestive language with criminal proof.
What investigators and journalists should do next
If these social traces are relevant to an ongoing criminal matter, rigorous steps are required — public post text and screenshots alone cannot establish criminal liability or prior knowledge. Recommended next steps:
- Preserve original content (platform-native timestamps, HTML, and API exports) before accounts are deleted. Screenshots are weak evidence without provenance.
- Request metadata and logs from the platforms (X, TikTok, etc.) under lawful process — timestamps, IP addresses, device fingerprints, account creation details, follower graphs, and deleted-message logs.
- Correlate preserved platform records with investigative leads (communications seized during lawful searches, witness statements, phone records) to test whether posts predate public knowledge or match suspect activity patterns.
- Coordinate with platform trust-and-safety teams to identify coordinated inauthentic behavior or botnets (if present) and to preserve accounts for forensics.
Legal and ethical note
Publicly accusing individuals of foreknowledge or participation on the basis of usernames, slang inference, or screenshots risks defamation and harms investigations. This post is an analytical read of public traces and should not be taken as an accusation. Any formal allegation must come from law-enforcement findings supported by subpoenas and verified metadata. Platform moderation and criminal investigators are the proper channels for escalation.
Methodology & sources
This piece analyzed available public posts, screenshots, and media reporting about social accounts allegedly connected to the suspect’s circle. Reported facts about the assassination and suspect identification were cross-referenced with widely reported timelines. Public traces examined include archived X posts attributed to @churbum75m, media reports compiling screenshots, and centralized summaries of the event. Key public sources used during drafting are cited below; they reflect the publicly available reporting at the time of writing and do not replace formal evidence collection.

No Comments