Jackie Singh (Inactive) Profile picture
Dec 12, 2024 8 tweets 5 min read Read on X
1/ The promised laughs/tears of the day have arrived!

Buckle up y'all! Remember that incel loser who came at me the other day (image below, top left)? 👇🤠

Let's talk about it. Signals indicate the account belongs to Vladislav "Artem" Klyushin, a convicted hacker who was recently traded back to Moscow (Artem is a common diminutive for Vladislav).

He's wealthy and well-connected, is an associate of a GRU operative already indicted by the U.S. for interference in the 2016 election, runs cybersecurity firm "M-13" which does IT work for Putin's office, and was–and may still actively be–one of Putin's "Musketeers" (bodyguards, somewhat akin to the Secret Service) in the Federal Protective Service (FSO), which is reportedly assigned some level of responsibility over information warfare.

ARTEM_KLYUSHIN represents a high-level Kremlin influence actor who combines cyber and info warfare capabilities, financial operations, and direct policy influence through social media channels owned by his partners to achieve the goals of the man to whom he is loyal.

KEY FINDINGS

> Direct operational connection to GRU through indicted business partner Yermakov
> Demonstrated ability to predict and potentially influence major U.S. policy decisions
> Pre-arranged platform access on X
> Evidence of active, long-running coordination with Trump world + Musk
> Visible systematic strategy to degrade U.S. institutional safeguards

I apologize if images are a bit fuzzy, as the size limit on X is 10mb–I can also mirror these elsewhere later.Image
2/ Klyushin's cyber capabilities and social media operations likely stem from FSO training/connections rather than just GRU links. His relative ease of access to both Putin and elite western figures fits the operational pattern of FSO based on what is publicly known.

> FSO training/connection explains combination of technical and social capabilities
> Part of Putin's "Musketeers" system of trusted operators in strategic positions
> Activities mirror FSO's evolution from protection to Active Measures
> Uses FSO-style elite access patterns (ex. social events)
> Demonstrates FSO's characteristic focus on info warfare and institutional penetration

FSO officers being "elevated to ministerial posts and regional leadership positions" as described in the article below contextualizes Klyushin's focus on U.S. personnel appointments and institutional restructuring in his recent social media activity.Image
3/ Following his August 2024 release in a prisoner swap with the Kremlin in which he was exchanged for Evan Gershkovich, Paul Whelan, and others, he has publicly demonstrated a coordinated strategy of malicious targeting of U.S. institutions in collusion with domestic elected officials and unelected actors from the safety of his newly Russian digs.

Klyushin's post-release strategy shows three phases:

1. Electoral predictions and maps (establishing credibility, suggesting control)
2. Institutional restructuring "proposals" (targeting security apparatus)
3. "The Plan" narrative (coordinating multiple actors)

Each phase demonstrates increasing operational boldness–but who really needs a covert channel when you can publicly direct your men Donald Trump and Elon Musk from the safety of the platform and administration they purchased and own?

OPERATIONAL METHODS

Info Ops
> Multi-phase messaging strategy progressing from cryptic to explicit
> Uses accurate predictions to build credibility
> Coordinates timing of releases with official announcements
> Maintains parallel Russian/English messaging tracks

Platform Manipulation
> Direct communication channel with platform ownership
> Sophisticated understanding of engagement metrics
> Strategic use of reposting and amplification
> Extremely low engagement relative to bot/follower activity

Network Activation
> Direct tagging of key figures (realDonaldTrump, elonmusk)
> Interaction with Trump Jr. regarding nominations
> Signs of coordinated messaging with other platform actors
> Strategic amplification of specific proposalsImage
4/ Below is a sample of aligned and/or coordinated messaging with a known-bad actor, Felix Sater.

en.wikipedia.org/wiki/Felix_Sat…Image
5/ His personnel predictions and public behaviors suggest a potentially high level of access to Trump's policy and decision making.

In 2018, he ordered John Kelly's firing, calling for "more compromising person."

Within 24 hours, Kelly was out.

In 2020, he directed Amy Coney Barrett's Supreme Court nomination–implemented within days.Image
Image
6/ This year, same pattern with Kash Patel for FBI.

STRATEGIC OBJECTIVES

Institutional Degradation
> Disable FBI counterintelligence capabilities
> Bypass State Department security protocols
> Install compromised individuals in key positions
> Create parallel power structures outside oversight

Network Establishment
> Position trusted actors in key roles
> Create direct communication channels
> Bypass traditional diplomatic protocols
> Establish family-based foreign policy apparatus

Systematic Vulnerability Creation
> Remove career intelligence professionals
> Disable internal security mechanisms
> Create unmonitored communication channels
> Establish deniable influence pathwaysImage
7/ Klyushin represents a new model of open influence operations–one in which cover for direct institutional targeting is barely required.

His operation demonstrates planning, integration, sophisticated understanding of America's vulnerabilities, and unprecedented boldness in openly proposing their exploitation.

His success rate in directing US personnel changes suggests sophisticated network of influence requiring immediate counterintelligence focus.

@DOJNatSec @FBI Anyone home? 👀

See also: x.com/davetroy/statu…
@threadreaderapp unroll

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jackie Singh (Inactive)

Jackie Singh (Inactive) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @HackingButLegal

Nov 26
1/ Yesterday, Press Sec Karoline Leavitt appeared at the 78th annual National Thanksgiving Turkey Pardon wearing what can only be described as pilgrim cosplay 💀🦃

This wasn't an accident. A thread on political fashion as ideological theater. 🧵
2/ The outfit immediately drew comparisons to 17th-century Puritan dress, specifically the clothing women may have worn at the mythologized "First Thanksgiving" in 1621. Media called it "full cosplay" and "pilgrim-core." But dismissing it as a fashion miss understates the matter
3/ The "First Thanksgiving" narrative is one of America's most contested origin myths. Historians have spent decades unpacking how this story sanitizes colonization, erases Indigenous perspectives, & constructs European Christian settlers as top protagonists of American identity.
Read 11 tweets
Nov 21
I can tell you how they did it, because they tried to do it to me—

Be very careful with anyone new being joined to your Signal chats; be cautious with what you say in group chats where you don't explicitly know (IRL) and trust every member.

Most of all, beware group invites. 1/ Image
2/ They may try to use people of color to lure you in, or use some other commonality between you and their surveillance persona. They may appear on the surface to be genuine activists. Ask a lot of questions, act legally in your dealings, and follow your gut.
3/ I am not a lawyer. I suggest folks seek legal advice from a competent professional. But it stands to reason that if you follow the law, and distance yourself from those who don't intend to, you can keep your nose clean enough to avoid this type of risk

Read 4 tweets
Nov 20
🚨 THREAD: NEW preprint paper by Cornell University researchers found that @elonmusk's @Grokipedia cited the white nationalist site VDare 107 times, the neo-Nazi site Stormfront 42 times, and the conspiracy site Infowars 34 times. 👀👇 1/🧵

#AdversarialML #AIethics Image
2/ Their analysis of over 880K articles revealed 12,522 citations to sources deemed low-credibility by academic research (3x higher than Wikipedia). They found ~5.5% of Grokipedia articles have citations to sources strictly blacklisted by the Wiki community for unreliability. Image
3/ Unlike Wikipedia's volunteer-based system, Grokipedia centralizes control through Elon Musk’s xAI.

Researchers identified 1,050 instances where Grokipedia cited AI conversations with the Grok chatbot as authoritative sources. Image
Read 7 tweets
Nov 20
There are so many wild details in here, holy shit.
Legacy reporters ignored while the new MAGA-friendly press corps boasts of a direct hotline to officials. Access is now a reward for loyalty. The govt has created an information asymmetry where approved narratives get speed and access; critical inquiry gets the silent treatment.
New press badges have been issued to outlets linked to conspiracy theories and defamation. The official record of US military action is now curated by outlets prioritizing partisan activism over objective fact-finding. Conspiracy theories are entering the official briefing room.
Read 8 tweets
Nov 16
We keep talking about "Russian hybrid warfare" but what we are facing is a deliberate pincer designed to break states without ever declaring war.​ Four blades close simultaneously: institutional capture, disinformation & psyops, legal attacks, and physical acts of sabotage.​ 1/🧵
2/ First axis: institutional capture.​

Moscow cultivates political parties, media outlets, churches, business lobbies, and "cultural" fronts that gradually bend key nodes of our own systems toward Russian interests while retaining plausible deniability.
3/ This capture often runs through oligarch money, energy dependence, and elite networks rather than open ideology.​ Intelligence-linked orgs, "patriotic" NGOs, and Orthodox-aligned initiatives provide cover for recruitment, financing, and narrative shaping inside target states.
Read 17 tweets
Nov 11
Alaska Airlines Flight 1282 revealed a deeper problem: Boeing couldn't identify who reinstalled the door plug that blew off mid-flight. The NTSB found no names, no records, no footage.

Similar gaps echo across other airlines and incidents. 🧵
The 737 MAX-9 lost its door plug minutes after takeoff. Nine passengers sustained minor injuries. Boeing admitted it had no record of who performed the door work. 25 unidentified personnel, overwritten video, missing oversight.
Heathrow, March 2023: a 777 returned for emergency inspection after an engine oil system anomaly; no casualties. Logs lacked technician IDs. Surveillance footage for the repair period was "lost" due to a storage error, preventing verification of who handled the engine system.
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(