Ya know... trump is currently doing the exact thing Julian Assange/Wikileaks told him to do if he had lost the 2016 election.

He *is* carrying out those GRU-linked instructions from disclosed 2016 twitter dm messages.

Not saying this alone means anything. Just interesting.
When extensive official investigations show that someone has been "tasked" by an adversarial foreign military intel unit, and that person follows those tasking instructions despite the clear and obvious harm it causes our nation and with zero reasonable expectation of success...
...that's a problem. There are supposed to be ways of mitigating that kind of problem.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Chris Vickery

Chris Vickery Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VickerySec

22 Nov
Every person on Earth of ≥ average reading comprehension must re-familiarize themselves with the concepts of Classical Conditioning (aka Pavlovian Conditioning) en.wikipedia.org/wiki/Classical…
If you use the internet today, you are being targeted and subjected to Pavlovian Conditioning.
This was not always the case, but it is now.

Until approximately 10 years ago, online marketing and advertisement still primarily involved wide broadcasting of words and appealing imagery. In today's world, this is not longer the case.
The most powerful players in marketing now masquerade as if still serving that past purpose in order to maintain an appearance of legitimacy. It is camoflage.
Read 5 tweets
21 Nov
The election manipulation cabal uses an array of words for the purpose of signaling their involvement. Similar to the concept of a “secret handshake” or inside-joke/meme (but with addition of underlying malicious intent to cooperate toward similar goals).
Those words include:

-water
-stone
-wood
-black
-coffee
-bridge
-impact
-rock
-one

and others.
Read 4 tweets
20 Nov
Note regarding “Patrollin”:

I did some very basic overview of "patrollin[.]com" and it is highly suspicious. I'm currently assuming it's an intentional trap. Whoever is running it has created patrollin[.]com in a way that the page...
...source clearly establishes it is serving resources from a location of patrollin-cdn[.]com (which normally would indicate a site's Content Distribution Network endpoint).
patrollin-cdn[.]com does exist, but appears to be intentionally imitating the appearance of a public AWS S3 bucket. But, I attempted to verify its existence within AWS, and there does not appear to actually be any aws s3 bucket with the name patrollin-cdn[.]com...
Read 6 tweets
19 Nov
Ben,
I am not thrilled by this paper. It reads as if authored by smart network enthusiasts who do understand the past, but are not particularly gifted at forecasting the future of interaction with evolving fields of tech.
It lacks the wisdom and insight one hopes to see on display in this level of publication. Some pointers:
-Artificial Intelligence is not Machine Learning. Machine Learning is not necessarily assistive to a human operator unless intentionally directed toward that purpose.
-The "Cyber Kill Chain" concept needs to dropped. It is narrow minded tunnel vision and limits the public understanding of important security concepts outside of that one relatively small category of pre-meditated purpose driven action.
Read 9 tweets
19 Nov
Do you have a pet dog or cat? Did someone pretty much force you to have them chipped? ("it really would be a shame if that little fluffy loved-one got lost... let's put a tiny microchip in them.")
And you said "Ok" because they exploited your fears, correct?
Congratulations! That's not just your pet's identification tag, it's yours, too!

If a smartphone is close enough to your pet, it can read that little rfid tag. But, hey, let's all post some more lolcat pictures, right?

Technology never spoils anything :(.
If anyone (company, organization, person, agency, etc.) remotely utilizes a smartphone or other device, without informed consent of subject, to gather information about a surrounding environment of a person, we must prosecute mercilessly. Fines and jail time *per* victim.
Read 4 tweets
18 Nov
Remember when Secretary of State Mike Pompeo announced a $10 million Rewards for Justice offer for information about election meddling/hacking/fraud/etc back in August 2020?

Their poster says to submit an email to info@rewardsforjustice[.]net. I sent an email on August 5th.
Result?
One single auto response asking about the nature of my "tip". I already explained the "nature" of it in the original email. If they need to see *everything* up front, they are going to need to set up some sort of large file hosting. Email attachments don't cut it.
The validity of my information can be easily verified by, for example, contacting any of the government entities I already listed in the original email who know of these events or already have copies of portions of this evidence.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!