1/ The promised laughs/tears of the day have arrived!
Buckle up y'all! Remember that incel loser who came at me the other day (image below, top left)? 👇🤠
Let's talk about it. Signals indicate the account belongs to Vladislav "Artem" Klyushin, a convicted hacker who was recently traded back to Moscow (Artem is a common diminutive for Vladislav).
He's wealthy and well-connected, is an associate of a GRU operative already indicted by the U.S. for interference in the 2016 election, runs cybersecurity firm "M-13" which does IT work for Putin's office, and was–and may still actively be–one of Putin's "Musketeers" (bodyguards, somewhat akin to the Secret Service) in the Federal Protective Service (FSO), which is reportedly assigned some level of responsibility over information warfare.
ARTEM_KLYUSHIN represents a high-level Kremlin influence actor who combines cyber and info warfare capabilities, financial operations, and direct policy influence through social media channels owned by his partners to achieve the goals of the man to whom he is loyal.
KEY FINDINGS
> Direct operational connection to GRU through indicted business partner Yermakov
> Demonstrated ability to predict and potentially influence major U.S. policy decisions
> Pre-arranged platform access on X
> Evidence of active, long-running coordination with Trump world + Musk
> Visible systematic strategy to degrade U.S. institutional safeguards
I apologize if images are a bit fuzzy, as the size limit on X is 10mb–I can also mirror these elsewhere later.
2/ Klyushin's cyber capabilities and social media operations likely stem from FSO training/connections rather than just GRU links. His relative ease of access to both Putin and elite western figures fits the operational pattern of FSO based on what is publicly known.
> FSO training/connection explains combination of technical and social capabilities
> Part of Putin's "Musketeers" system of trusted operators in strategic positions
> Activities mirror FSO's evolution from protection to Active Measures
> Uses FSO-style elite access patterns (ex. social events)
> Demonstrates FSO's characteristic focus on info warfare and institutional penetration
FSO officers being "elevated to ministerial posts and regional leadership positions" as described in the article below contextualizes Klyushin's focus on U.S. personnel appointments and institutional restructuring in his recent social media activity.
3/ Following his August 2024 release in a prisoner swap with the Kremlin in which he was exchanged for Evan Gershkovich, Paul Whelan, and others, he has publicly demonstrated a coordinated strategy of malicious targeting of U.S. institutions in collusion with domestic elected officials and unelected actors from the safety of his newly Russian digs.
Klyushin's post-release strategy shows three phases:
Each phase demonstrates increasing operational boldness–but who really needs a covert channel when you can publicly direct your men Donald Trump and Elon Musk from the safety of the platform and administration they purchased and own?
OPERATIONAL METHODS
Info Ops
> Multi-phase messaging strategy progressing from cryptic to explicit
> Uses accurate predictions to build credibility
> Coordinates timing of releases with official announcements
> Maintains parallel Russian/English messaging tracks
Platform Manipulation
> Direct communication channel with platform ownership
> Sophisticated understanding of engagement metrics
> Strategic use of reposting and amplification
> Extremely low engagement relative to bot/follower activity
Network Activation
> Direct tagging of key figures (realDonaldTrump, elonmusk)
> Interaction with Trump Jr. regarding nominations
> Signs of coordinated messaging with other platform actors
> Strategic amplification of specific proposals
4/ Below is a sample of aligned and/or coordinated messaging with a known-bad actor, Felix Sater.
5/ His personnel predictions and public behaviors suggest a potentially high level of access to Trump's policy and decision making.
In 2018, he ordered John Kelly's firing, calling for "more compromising person."
Within 24 hours, Kelly was out.
In 2020, he directed Amy Coney Barrett's Supreme Court nomination–implemented within days.
6/ This year, same pattern with Kash Patel for FBI.
STRATEGIC OBJECTIVES
Institutional Degradation
> Disable FBI counterintelligence capabilities
> Bypass State Department security protocols
> Install compromised individuals in key positions
> Create parallel power structures outside oversight
Network Establishment
> Position trusted actors in key roles
> Create direct communication channels
> Bypass traditional diplomatic protocols
> Establish family-based foreign policy apparatus
7/ Klyushin represents a new model of open influence operations–one in which cover for direct institutional targeting is barely required.
His operation demonstrates planning, integration, sophisticated understanding of America's vulnerabilities, and unprecedented boldness in openly proposing their exploitation.
His success rate in directing US personnel changes suggests sophisticated network of influence requiring immediate counterintelligence focus.
1/ Yesterday, Press Sec Karoline Leavitt appeared at the 78th annual National Thanksgiving Turkey Pardon wearing what can only be described as pilgrim cosplay 💀🦃
This wasn't an accident. A thread on political fashion as ideological theater. 🧵
2/ The outfit immediately drew comparisons to 17th-century Puritan dress, specifically the clothing women may have worn at the mythologized "First Thanksgiving" in 1621. Media called it "full cosplay" and "pilgrim-core." But dismissing it as a fashion miss understates the matter
3/ The "First Thanksgiving" narrative is one of America's most contested origin myths. Historians have spent decades unpacking how this story sanitizes colonization, erases Indigenous perspectives, & constructs European Christian settlers as top protagonists of American identity.
I can tell you how they did it, because they tried to do it to me—
Be very careful with anyone new being joined to your Signal chats; be cautious with what you say in group chats where you don't explicitly know (IRL) and trust every member.
2/ They may try to use people of color to lure you in, or use some other commonality between you and their surveillance persona. They may appear on the surface to be genuine activists. Ask a lot of questions, act legally in your dealings, and follow your gut.
3/ I am not a lawyer. I suggest folks seek legal advice from a competent professional. But it stands to reason that if you follow the law, and distance yourself from those who don't intend to, you can keep your nose clean enough to avoid this type of risk
🚨 THREAD: NEW preprint paper by Cornell University researchers found that @elonmusk's @Grokipedia cited the white nationalist site VDare 107 times, the neo-Nazi site Stormfront 42 times, and the conspiracy site Infowars 34 times. 👀👇 1/🧵
#AdversarialML #AIethics
2/ Their analysis of over 880K articles revealed 12,522 citations to sources deemed low-credibility by academic research (3x higher than Wikipedia). They found ~5.5% of Grokipedia articles have citations to sources strictly blacklisted by the Wiki community for unreliability.
3/ Unlike Wikipedia's volunteer-based system, Grokipedia centralizes control through Elon Musk’s xAI.
Researchers identified 1,050 instances where Grokipedia cited AI conversations with the Grok chatbot as authoritative sources.
Legacy reporters ignored while the new MAGA-friendly press corps boasts of a direct hotline to officials. Access is now a reward for loyalty. The govt has created an information asymmetry where approved narratives get speed and access; critical inquiry gets the silent treatment.
New press badges have been issued to outlets linked to conspiracy theories and defamation. The official record of US military action is now curated by outlets prioritizing partisan activism over objective fact-finding. Conspiracy theories are entering the official briefing room.
We keep talking about "Russian hybrid warfare" but what we are facing is a deliberate pincer designed to break states without ever declaring war. Four blades close simultaneously: institutional capture, disinformation & psyops, legal attacks, and physical acts of sabotage. 1/🧵
2/ First axis: institutional capture.
Moscow cultivates political parties, media outlets, churches, business lobbies, and "cultural" fronts that gradually bend key nodes of our own systems toward Russian interests while retaining plausible deniability.
3/ This capture often runs through oligarch money, energy dependence, and elite networks rather than open ideology. Intelligence-linked orgs, "patriotic" NGOs, and Orthodox-aligned initiatives provide cover for recruitment, financing, and narrative shaping inside target states.
Alaska Airlines Flight 1282 revealed a deeper problem: Boeing couldn't identify who reinstalled the door plug that blew off mid-flight. The NTSB found no names, no records, no footage.
Similar gaps echo across other airlines and incidents. 🧵
The 737 MAX-9 lost its door plug minutes after takeoff. Nine passengers sustained minor injuries. Boeing admitted it had no record of who performed the door work. 25 unidentified personnel, overwritten video, missing oversight.
Heathrow, March 2023: a 777 returned for emergency inspection after an engine oil system anomaly; no casualties. Logs lacked technician IDs. Surveillance footage for the repair period was "lost" due to a storage error, preventing verification of who handled the engine system.