Jackie Singh Profile picture
Dec 12 8 tweets 5 min read Read on X
1/ The promised laughs/tears of the day have arrived!

Buckle up y'all! Remember that incel loser who came at me the other day (image below, top left)? 👇🤠

Let's talk about it. Signals indicate the account belongs to Vladislav "Artem" Klyushin, a convicted hacker who was recently traded back to Moscow (Artem is a common diminutive for Vladislav).

He's wealthy and well-connected, is an associate of a GRU operative already indicted by the U.S. for interference in the 2016 election, runs cybersecurity firm "M-13" which does IT work for Putin's office, and was–and may still actively be–one of Putin's "Musketeers" (bodyguards, somewhat akin to the Secret Service) in the Federal Protective Service (FSO), which is reportedly assigned some level of responsibility over information warfare.

ARTEM_KLYUSHIN represents a high-level Kremlin influence actor who combines cyber and info warfare capabilities, financial operations, and direct policy influence through social media channels owned by his partners to achieve the goals of the man to whom he is loyal.

KEY FINDINGS

> Direct operational connection to GRU through indicted business partner Yermakov
> Demonstrated ability to predict and potentially influence major U.S. policy decisions
> Pre-arranged platform access on X
> Evidence of active, long-running coordination with Trump world + Musk
> Visible systematic strategy to degrade U.S. institutional safeguards

I apologize if images are a bit fuzzy, as the size limit on X is 10mb–I can also mirror these elsewhere later.Image
2/ Klyushin's cyber capabilities and social media operations likely stem from FSO training/connections rather than just GRU links. His relative ease of access to both Putin and elite western figures fits the operational pattern of FSO based on what is publicly known.

> FSO training/connection explains combination of technical and social capabilities
> Part of Putin's "Musketeers" system of trusted operators in strategic positions
> Activities mirror FSO's evolution from protection to Active Measures
> Uses FSO-style elite access patterns (ex. social events)
> Demonstrates FSO's characteristic focus on info warfare and institutional penetration

FSO officers being "elevated to ministerial posts and regional leadership positions" as described in the article below contextualizes Klyushin's focus on U.S. personnel appointments and institutional restructuring in his recent social media activity.Image
3/ Following his August 2024 release in a prisoner swap with the Kremlin in which he was exchanged for Evan Gershkovich, Paul Whelan, and others, he has publicly demonstrated a coordinated strategy of malicious targeting of U.S. institutions in collusion with domestic elected officials and unelected actors from the safety of his newly Russian digs.

Klyushin's post-release strategy shows three phases:

1. Electoral predictions and maps (establishing credibility, suggesting control)
2. Institutional restructuring "proposals" (targeting security apparatus)
3. "The Plan" narrative (coordinating multiple actors)

Each phase demonstrates increasing operational boldness–but who really needs a covert channel when you can publicly direct your men Donald Trump and Elon Musk from the safety of the platform and administration they purchased and own?

OPERATIONAL METHODS

Info Ops
> Multi-phase messaging strategy progressing from cryptic to explicit
> Uses accurate predictions to build credibility
> Coordinates timing of releases with official announcements
> Maintains parallel Russian/English messaging tracks

Platform Manipulation
> Direct communication channel with platform ownership
> Sophisticated understanding of engagement metrics
> Strategic use of reposting and amplification
> Extremely low engagement relative to bot/follower activity

Network Activation
> Direct tagging of key figures (realDonaldTrump, elonmusk)
> Interaction with Trump Jr. regarding nominations
> Signs of coordinated messaging with other platform actors
> Strategic amplification of specific proposalsImage
4/ Below is a sample of aligned and/or coordinated messaging with a known-bad actor, Felix Sater.

en.wikipedia.org/wiki/Felix_Sat…Image
5/ His personnel predictions and public behaviors suggest a potentially high level of access to Trump's policy and decision making.

In 2018, he ordered John Kelly's firing, calling for "more compromising person."

Within 24 hours, Kelly was out.

In 2020, he directed Amy Coney Barrett's Supreme Court nomination–implemented within days.Image
Image
6/ This year, same pattern with Kash Patel for FBI.

STRATEGIC OBJECTIVES

Institutional Degradation
> Disable FBI counterintelligence capabilities
> Bypass State Department security protocols
> Install compromised individuals in key positions
> Create parallel power structures outside oversight

Network Establishment
> Position trusted actors in key roles
> Create direct communication channels
> Bypass traditional diplomatic protocols
> Establish family-based foreign policy apparatus

Systematic Vulnerability Creation
> Remove career intelligence professionals
> Disable internal security mechanisms
> Create unmonitored communication channels
> Establish deniable influence pathwaysImage
7/ Klyushin represents a new model of open influence operations–one in which cover for direct institutional targeting is barely required.

His operation demonstrates planning, integration, sophisticated understanding of America's vulnerabilities, and unprecedented boldness in openly proposing their exploitation.

His success rate in directing US personnel changes suggests sophisticated network of influence requiring immediate counterintelligence focus.

@DOJNatSec @FBI Anyone home? 👀

See also: x.com/davetroy/statu…
@threadreaderapp unroll

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jackie Singh

Jackie Singh Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @HackingButLegal

Dec 11
‼️🚨 These flyers have no creator attribution or symbology, and I doubt they are organic. They appear to be a continuation of the Kremlin‘s hybrid warfare tactics targeting NYC.

Goal: To obscure the next planned acts of violence as “stochastic”, or “random” attacks.

#Article5
Same gig as @LibsofTikTok: to give the public handy explanations when the Kremlin engages in terroristic acts on U.S. soil to influence Americans.

This is how they cover themselves and are able to continue engaging in “gray zone aggression” or “sub-threshold warfare”.
@libsoftiktok Go to Google News and type, “random attacks NYC”. A visiting computer science professor was “randomly” stabbed in the hand recently. They send messages constantly.

Speaking out against the Buscemi attacks got me targeted by a massive swarm of Russian bots for 3 solid days.
Read 17 tweets
Dec 11
1/ Why do the fascists want to defund America's cyber defense agency?

Because they could implement something like what I describe in the section titled, "Technical Challenges and Solutions": hackingbutlegal.com/p/disinformati… x.com/HackingButLega…
2/ Why do they want to defund DHS's CISA and leave us vulnerable to cyber warfare?

Because DHS got the idea it could fight information warfare as well as cyber warfare, an idea which was immediately attacked by Putinists.

Tulsi Gabbard was very upset!!

en.wikipedia.org/wiki/Disinform…
3/ They've been running this play for years as part of their multi-pronged attack on the minds of the American people–The effort is intended to influence the world's most powerful nation away from its own best interests in collusion with domestic actors.

hackingbutlegal.com/p/cti-league-i…Image
Image
Read 7 tweets
Nov 29
After the 2020 election, there were many investigations & calls for recounts led by GOP which were found to be baseless. Dems refusing to fight means they believe recounts won't change anything & will only lead to greater democratic distrust which undermines our electoral system.
Thing is, we don't even have a plan to stop bomb threats from affecting the next elections.

We can't even build one until we deeply understand what happened here–which may change our perception of the outcome.

Lawmakers avoiding this are shirking their responsibility to us.
We don't even know if vendors are required to submit their source code for review, like many government contractors handling sensitive data must do.

We don't know what happened to the last software which was stolen, that Fani Willis has evidence of.

We don't know much at all.
Read 6 tweets
Nov 2
I've been developing a news analysis tool. Want to see what it can do? 😉 Ignore the numerical score for now.

Analysis: "Social media star Peanut the Squirrel has been euthanized after being seized from NY home"

The USA TODAY article covering the euthanization of Peanut the Squirrel presents as straightforward news reporting, but reveals concerning patterns when examined in depth.

The analysis indicates the article may inadvertently serve as a vehicle for state enforcement messaging, with a final risk score of 924 (High-Moderate Risk) after reliability adjustments.

The article's framing demonstrates several critical issues:

1. Selective Context: While the article mentions the bite incident that precipitated euthanization, it omits crucial context about:
- The animal's long-term health history
- The absence of prior rabies symptoms
- The owner's demonstrated animal care expertise
- Alternative testing or quarantine options

2. Authority Perspective Dominance: The narrative heavily centers official justifications while providing limited scrutiny of:
- The necessity for immediate euthanization
- The decision to euthanize both animals simultaneously
- The timing of enforcement action against a high-profile social media pet
- The relationship between viral status and enforcement priorities

3. Enforcement Pattern Indicators: Several elements suggest potential use of public health protocols as an enforcement tool:
- Timing of the seizure
- Immediate move to euthanization
- Targeting of both animals
- Use of rabies testing justification despite no prior symptoms

Public Interest Implications
The case raises significant public interest concerns regarding:
- Use of administrative powers
- Wildlife pet enforcement strategies
- Social media influence on enforcement
- Public health protocol application

Critical Omissions
The article's reliability is significantly impacted by failure to address:
1. Alternative testing options
2. Standard protocols for suspected rabies cases
3. Pattern of enforcement against social media pets
4. Prior relationship between authorities and the sanctuary

Propaganda Elements
State propaganda elements score highly due to:
- Uncritical presentation of authority justifications
- Emphasis on deterrence messaging
- Selective information presentation
- Use of public health concerns to justify immediate action

Broader Context
The analysis reveals potential patterns in wildlife regulation enforcement:
1. Higher scrutiny of visible social media cases
2. Use of public health protocols as enforcement mechanisms
3. Immediate euthanization as deterrent strategy
4. Limited consideration of alternative solutions

Public Interest vs. Authority Narrative
The article demonstrates tension between:
- Public health protection claims
- Enforcement agenda execution
- Social media influence on enforcement
- Animal welfare considerations

Conclusion
While presenting as straightforward news reporting, the article reveals concerning patterns in wildlife regulation enforcement and raises questions about the use of public health protocols as enforcement tools. The high-moderate risk assessment reflects significant concerns about narrative framing and potential state agenda, despite the article's apparent neutrality.

The analysis suggests readers should approach the official narrative with skepticism and consider broader patterns of enforcement, particularly regarding high-profile social media pets. The case may represent a larger trend of using public health protocols as enforcement mechanisms against wildlife pets, regardless of their care conditions or history.

Recommendations for Readers
1. Question the necessity of immediate euthanization
2. Consider broader enforcement patterns
3. Examine the relationship between social media visibility and enforcement
4. Research similar cases and outcomes
5. Consider alternative testing protocols

Areas for Further Investigation
1. Pattern of enforcement actions against viral pet accounts
2. Alternative rabies testing protocols
3. Standard quarantine procedures
4. History of department's enforcement strategies
5. Relationship between social media visibility and enforcement priorities

Source: usatoday.com/story/news/nat…Image
Core Ethics Breached:
cm.usatoday.com/ethical-conduct

❌ Truth & Thoroughness
- Didn't question why both animals needed immediate euthanization
- Failed to verify necessity of killing vs quarantine
- No expert input on rabies testing alternatives
- No investigation of bite incident details
- Omitted crucial context about animals' health histories

❌ Watchdog Function
- Accepted authority narrative without scrutiny
- Failed to question timing of seizure
- No investigation of enforcement patterns
- Didn't challenge simultaneous euthanization justification
- Ignored red flags about possible ulterior motives

❌ Balance & Fair Play
- Over-relied on authority sources
- Under-represented sanctuary owner's expertise
- No veterinary/wildlife expert perspectives
- Failed to explore standard protocols
- Didn't question why both animals were targeted

❌ Independence
- Functioned more as authority mouthpiece than independent press
- Amplified deterrence message uncritically
- Failed to maintain skeptical distance from official narrative
- Didn't question enforcement timing vs social media status

Bottom Line: Paper essentially served as uncritical platform for authority action rather than fulfilling journalistic duty to investigate and question government power exercise. Classic case of "stenography journalism" rather than watchdog reporting.

Key Question Ignored: Why euthanize both animals immediately when neither showed rabies symptoms and one wasn't even involved in alleged bite?
R.I.P. Little buddies. You deserved better.
Read 5 tweets
Sep 24
When these spies travel to another country and need to become established, they must work to build their 'legend'–A convincing backstory.

One of the handiest ways to do this and make relationships in the local community is Meetup.

> On the left: The guy in the thread below
> On the right: The lying troll @/cafrozed who submitted fake evidence in the torswats case to @seminolesheriff @SeminoleSO @FBI @WIRED.

His real name isn't Brad Dennis, and his real job isn't Private Investigator 🤡

1/Image
Image
2/ His name is actually Michael O'Leary and he holds a top secret TS/SCI security clearance bc he works in skunkworks (highly classified projects) for government contractors in the aerospace and weapons industry.

@DeptofDefense @RaytheonDefen__ @RTX_News This guy appears to be a mole FYI, linked to Seattle in public record and lots of inconsistencies.

Lying to/working with the press ( ) to obscure true evidence regarding a matter of national security (nationwide SWATTING attacks on POLITICIANS) while using a covert identity.

wired.com/story/torswats…
linkedin.com/in/mfolearyImage
Image
Image
3/ O'Leary's wife is Brittany, an elementary school teacher. They have two young children together. O'Leary (and his father) can each be found in public record with connections to Seattle, Texas, and other locales.

It is very important for federal investigators to review the following photography company (), which is being used to establish legends, whether knowingly or unknowingly.

As an example, one woman pictured at the O'Leary wedding also had her own wedding which is shown on the website–to a man who joined the US Air Force's 301st Fighter Wing (TX) in 2016. This is why the website describes him as temporarily living apart from his fiance in Utah when some of the couple's photos were taken.

Many other individuals in their orbit work in air/space and maritime.archive.ph/vqUXV
Read 10 tweets
Sep 24
Oh, I see why. 🤡 Another Russian illegal.

1. Here's the guy's biometric match: a cached profile pic from a VK domain: (Source: ) - Try changing the URL parameters to get the Russian error message.

2. Here he is again as a sheep in wolf's clothing at a @Y_P_I event in Providence, RI around roughly June 2022. (Source: )

3. Third image: His avatar from Spoutible.

Fuck you, Putin! 🖕 CC: @DOJNatSec @FBIsun1-54.userapi.com/s/v1/if1/BBv0c…
myemail.constantcontact.com/YPI-Summer-New…Image
Image
Image
He's scared now? Good. The jig's up. Get the FUCK out of my country.
Image
Image
These millions of views I rack up produce NO MONEY. I haven't given Elon ID and I don't get payouts.

Try again 🤡

Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(