Jackie Singh @KinexisAI Profile picture
Dec 12, 2024 8 tweets 5 min read Read on X
1/ The promised laughs/tears of the day have arrived!

Buckle up y'all! Remember that incel loser who came at me the other day (image below, top left)? 👇🤠

Let's talk about it. Signals indicate the account belongs to Vladislav "Artem" Klyushin, a convicted hacker who was recently traded back to Moscow (Artem is a common diminutive for Vladislav).

He's wealthy and well-connected, is an associate of a GRU operative already indicted by the U.S. for interference in the 2016 election, runs cybersecurity firm "M-13" which does IT work for Putin's office, and was–and may still actively be–one of Putin's "Musketeers" (bodyguards, somewhat akin to the Secret Service) in the Federal Protective Service (FSO), which is reportedly assigned some level of responsibility over information warfare.

ARTEM_KLYUSHIN represents a high-level Kremlin influence actor who combines cyber and info warfare capabilities, financial operations, and direct policy influence through social media channels owned by his partners to achieve the goals of the man to whom he is loyal.

KEY FINDINGS

> Direct operational connection to GRU through indicted business partner Yermakov
> Demonstrated ability to predict and potentially influence major U.S. policy decisions
> Pre-arranged platform access on X
> Evidence of active, long-running coordination with Trump world + Musk
> Visible systematic strategy to degrade U.S. institutional safeguards

I apologize if images are a bit fuzzy, as the size limit on X is 10mb–I can also mirror these elsewhere later.Image
2/ Klyushin's cyber capabilities and social media operations likely stem from FSO training/connections rather than just GRU links. His relative ease of access to both Putin and elite western figures fits the operational pattern of FSO based on what is publicly known.

> FSO training/connection explains combination of technical and social capabilities
> Part of Putin's "Musketeers" system of trusted operators in strategic positions
> Activities mirror FSO's evolution from protection to Active Measures
> Uses FSO-style elite access patterns (ex. social events)
> Demonstrates FSO's characteristic focus on info warfare and institutional penetration

FSO officers being "elevated to ministerial posts and regional leadership positions" as described in the article below contextualizes Klyushin's focus on U.S. personnel appointments and institutional restructuring in his recent social media activity.Image
3/ Following his August 2024 release in a prisoner swap with the Kremlin in which he was exchanged for Evan Gershkovich, Paul Whelan, and others, he has publicly demonstrated a coordinated strategy of malicious targeting of U.S. institutions in collusion with domestic elected officials and unelected actors from the safety of his newly Russian digs.

Klyushin's post-release strategy shows three phases:

1. Electoral predictions and maps (establishing credibility, suggesting control)
2. Institutional restructuring "proposals" (targeting security apparatus)
3. "The Plan" narrative (coordinating multiple actors)

Each phase demonstrates increasing operational boldness–but who really needs a covert channel when you can publicly direct your men Donald Trump and Elon Musk from the safety of the platform and administration they purchased and own?

OPERATIONAL METHODS

Info Ops
> Multi-phase messaging strategy progressing from cryptic to explicit
> Uses accurate predictions to build credibility
> Coordinates timing of releases with official announcements
> Maintains parallel Russian/English messaging tracks

Platform Manipulation
> Direct communication channel with platform ownership
> Sophisticated understanding of engagement metrics
> Strategic use of reposting and amplification
> Extremely low engagement relative to bot/follower activity

Network Activation
> Direct tagging of key figures (realDonaldTrump, elonmusk)
> Interaction with Trump Jr. regarding nominations
> Signs of coordinated messaging with other platform actors
> Strategic amplification of specific proposalsImage
4/ Below is a sample of aligned and/or coordinated messaging with a known-bad actor, Felix Sater.

en.wikipedia.org/wiki/Felix_Sat…Image
5/ His personnel predictions and public behaviors suggest a potentially high level of access to Trump's policy and decision making.

In 2018, he ordered John Kelly's firing, calling for "more compromising person."

Within 24 hours, Kelly was out.

In 2020, he directed Amy Coney Barrett's Supreme Court nomination–implemented within days.Image
Image
6/ This year, same pattern with Kash Patel for FBI.

STRATEGIC OBJECTIVES

Institutional Degradation
> Disable FBI counterintelligence capabilities
> Bypass State Department security protocols
> Install compromised individuals in key positions
> Create parallel power structures outside oversight

Network Establishment
> Position trusted actors in key roles
> Create direct communication channels
> Bypass traditional diplomatic protocols
> Establish family-based foreign policy apparatus

Systematic Vulnerability Creation
> Remove career intelligence professionals
> Disable internal security mechanisms
> Create unmonitored communication channels
> Establish deniable influence pathwaysImage
7/ Klyushin represents a new model of open influence operations–one in which cover for direct institutional targeting is barely required.

His operation demonstrates planning, integration, sophisticated understanding of America's vulnerabilities, and unprecedented boldness in openly proposing their exploitation.

His success rate in directing US personnel changes suggests sophisticated network of influence requiring immediate counterintelligence focus.

@DOJNatSec @FBI Anyone home? 👀

See also: x.com/davetroy/statu…
@threadreaderapp unroll

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jackie Singh @KinexisAI

Jackie Singh @KinexisAI Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @HackingButLegal

Mar 14
1/🧐 "The cybersecurity experts weren't enough"

Let's do the *actual math* on @ThisWillHold2's "irrefutable" Amendment 4 fraud claim because the numbers they cite are publicly available and tell a totally different story.

🧵 Thread:
2/ They claim 6,371,645 R+D early votes "coincidentally" equals the 60% threshold for Amendment 4, which got 6,070,758 YES out of 10,619,137 votes cast. The actual 60% bar was 6,371,482.

Their magic number is off by ~163 votes from the threshold. That's their "irrefutable" math.
3/ @ThisWillHold2 says 6,371,645 was used as a ceiling so Amendment 4 would land exactly at 60%. But the real 60% threshold was 6,371,482, and Amendment 4 only got 6,070,758 YES. That is a 300,724 vote gap.

The outcome wasn't even close to the bar.
Read 14 tweets
Mar 12
Do you want to know how I tweeted that we did the attack on the school before it was confirmed? 'Twas a strong hunch based on TikTok comments posted to videos showing immediate aftermath of the event, like, "that doesn't look like Iran" to confuse viewers and avoid attribution.
By the time the news started filtering out internationally, Hegseth already knew DoD had made a mistake, and (U.S. or Israeli) bots started covering for the crime pretty much immediately using the deescalation tactics I further describe in the linked thread above.
On X, the bots covering had an Israeli vibe based on profile content and feed (like this one below). In hindsight, they may have been sent to confuse attribution but seemed more concerned with avoiding the world thinking Israel had been the one to bomb the school. Image
Image
Read 5 tweets
Feb 28
I have established that Donald Trump's statement of war against Iran which was broadcast in the wee hours of this morning is an AI deepfake.



1/🧵 How can we know it's a fake? 👀👇
2/ There is a complete absence of natural breathing patterns, spontaneous illustrators, or small fluctuations in Trump's facial musculature. His delivery remains highly monotonous in rhythm. Facial expressions are limited to rhythmic brow lowering and lip tightening and...
3/ ...lack natural spontaneous variation. His visual presentation shows a lack of natural breathing pauses or any of the shifts in weight that are typical of a live speech. Trump maintains a rigid, forward-facing posture with minimal body movement throughout.
Read 6 tweets
Feb 21
"I am fully aware of the charges to which Ghislaine has been found guilty. Despite this fact, I continue to hold my sister in the highest regard."

"I am of course aware of the charges of which she has been found guilty at jury trial. I have been present at every ..." (Cont.) 👇
"... one of the pretrial and trial court days. Notwithstanding the jury's verdict, I continue to hold Ghislaine in the highest regard and I believe very strongly that she still has much of value to contribute in the world."

🤡 EFTA02838285.pdf
"I write this letter in support of my sister, Ghislaine, aware of the charges she was been found guilty of, noting too that she has no prior criminal convictions in any jurisdiction. ..." (Cont.)
Read 10 tweets
Feb 15
BULLETIN: Those promoting the acronym "TND" are associated with Russia's Wagner Group. They are running rampant— Involved in child abuse via 764/Temple ov Blood, and have been working hard to radicalize (brainwash/abuse) trans youth into ?mass murdering others and themselves. Image
They also appear to have a woman deployed to perform narrative control on this topic. The goal is to ensure the public is not aware of the relationship between Russia and the child abuse conducted from afar.
Another related acronym is "DNB" (don't ask what it stands for). Note the original poster with a trans flag in bio. They actively hunt for vulnerable Western children. Image
Image
Read 9 tweets
Feb 11
1/🧵 Breaking analysis from @guardian:

Epstein Files describe a pattern of behavior around Kimbal Musk and the Tesla/SpaceX world that raise serious natsec and corruption concerns. Image
2/🚩 The behavior described looks very similar to how powerful people are identified, studied, and slowly drawn into compromising relationships—
Especially through their close friends and family.
3/🚩 Warning signs can include the use of controlled romantic or sexual partners, mixing social access with business opportunities, and maintaining close contact with a known predator.
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(