Jackie Singh Profile picture
Mastodon: @hackingbutlegal@toad.social Bluesky: @hackingbutlegal.bsky.social
11 subscribers
Dec 18 7 tweets 2 min read
1/🧵

Q: Why do the GOP and Kremlin bots slander Kamala Harris and other Dems as "Marxist"?

A: I can explain! First, a little context:

Social Murder is a term used to describe unnatural deaths caused by social, political, or economic oppression, rather than direct violence. Image 2/ Social murder is committed by the elites against the poor, sometimes through omission rather than commission, & results in deaths that may seem natural, but were actually preventable.
Dec 12 8 tweets 5 min read
1/ The promised laughs/tears of the day have arrived!

Buckle up y'all! Remember that incel loser who came at me the other day (image below, top left)? 👇🤠

Let's talk about it. Signals indicate the account belongs to Vladislav "Artem" Klyushin, a convicted hacker who was recently traded back to Moscow (Artem is a common diminutive for Vladislav).

He's wealthy and well-connected, is an associate of a GRU operative already indicted by the U.S. for interference in the 2016 election, runs cybersecurity firm "M-13" which does IT work for Putin's office, and was–and may still actively be–one of Putin's "Musketeers" (bodyguards, somewhat akin to the Secret Service) in the Federal Protective Service (FSO), which is reportedly assigned some level of responsibility over information warfare.

ARTEM_KLYUSHIN represents a high-level Kremlin influence actor who combines cyber and info warfare capabilities, financial operations, and direct policy influence through social media channels owned by his partners to achieve the goals of the man to whom he is loyal.

KEY FINDINGS

> Direct operational connection to GRU through indicted business partner Yermakov
> Demonstrated ability to predict and potentially influence major U.S. policy decisions
> Pre-arranged platform access on X
> Evidence of active, long-running coordination with Trump world + Musk
> Visible systematic strategy to degrade U.S. institutional safeguards

I apologize if images are a bit fuzzy, as the size limit on X is 10mb–I can also mirror these elsewhere later.Image 2/ Klyushin's cyber capabilities and social media operations likely stem from FSO training/connections rather than just GRU links. His relative ease of access to both Putin and elite western figures fits the operational pattern of FSO based on what is publicly known.

> FSO training/connection explains combination of technical and social capabilities
> Part of Putin's "Musketeers" system of trusted operators in strategic positions
> Activities mirror FSO's evolution from protection to Active Measures
> Uses FSO-style elite access patterns (ex. social events)
> Demonstrates FSO's characteristic focus on info warfare and institutional penetration

FSO officers being "elevated to ministerial posts and regional leadership positions" as described in the article below contextualizes Klyushin's focus on U.S. personnel appointments and institutional restructuring in his recent social media activity.Image
Dec 11 17 tweets 5 min read
‼️🚨 These flyers have no creator attribution or symbology, and I doubt they are organic. They appear to be a continuation of the Kremlin‘s hybrid warfare tactics targeting NYC.

Goal: To obscure the next planned acts of violence as “stochastic”, or “random” attacks.

#Article5 Same gig as @LibsofTikTok: to give the public handy explanations when the Kremlin engages in terroristic acts on U.S. soil to influence Americans.

This is how they cover themselves and are able to continue engaging in “gray zone aggression” or “sub-threshold warfare”.
Dec 11 7 tweets 3 min read
1/ Why do the fascists want to defund America's cyber defense agency?

Because they could implement something like what I describe in the section titled, "Technical Challenges and Solutions": hackingbutlegal.com/p/disinformati… x.com/HackingButLega… 2/ Why do they want to defund DHS's CISA and leave us vulnerable to cyber warfare?

Because DHS got the idea it could fight information warfare as well as cyber warfare, an idea which was immediately attacked by Putinists.

Tulsi Gabbard was very upset!!

en.wikipedia.org/wiki/Disinform…
Nov 29 6 tweets 2 min read
After the 2020 election, there were many investigations & calls for recounts led by GOP which were found to be baseless. Dems refusing to fight means they believe recounts won't change anything & will only lead to greater democratic distrust which undermines our electoral system. Thing is, we don't even have a plan to stop bomb threats from affecting the next elections.

We can't even build one until we deeply understand what happened here–which may change our perception of the outcome.

Lawmakers avoiding this are shirking their responsibility to us.
Nov 2 5 tweets 7 min read
I've been developing a news analysis tool. Want to see what it can do? 😉 Ignore the numerical score for now.

Analysis: "Social media star Peanut the Squirrel has been euthanized after being seized from NY home"

The USA TODAY article covering the euthanization of Peanut the Squirrel presents as straightforward news reporting, but reveals concerning patterns when examined in depth.

The analysis indicates the article may inadvertently serve as a vehicle for state enforcement messaging, with a final risk score of 924 (High-Moderate Risk) after reliability adjustments.

The article's framing demonstrates several critical issues:

1. Selective Context: While the article mentions the bite incident that precipitated euthanization, it omits crucial context about:
- The animal's long-term health history
- The absence of prior rabies symptoms
- The owner's demonstrated animal care expertise
- Alternative testing or quarantine options

2. Authority Perspective Dominance: The narrative heavily centers official justifications while providing limited scrutiny of:
- The necessity for immediate euthanization
- The decision to euthanize both animals simultaneously
- The timing of enforcement action against a high-profile social media pet
- The relationship between viral status and enforcement priorities

3. Enforcement Pattern Indicators: Several elements suggest potential use of public health protocols as an enforcement tool:
- Timing of the seizure
- Immediate move to euthanization
- Targeting of both animals
- Use of rabies testing justification despite no prior symptoms

Public Interest Implications
The case raises significant public interest concerns regarding:
- Use of administrative powers
- Wildlife pet enforcement strategies
- Social media influence on enforcement
- Public health protocol application

Critical Omissions
The article's reliability is significantly impacted by failure to address:
1. Alternative testing options
2. Standard protocols for suspected rabies cases
3. Pattern of enforcement against social media pets
4. Prior relationship between authorities and the sanctuary

Propaganda Elements
State propaganda elements score highly due to:
- Uncritical presentation of authority justifications
- Emphasis on deterrence messaging
- Selective information presentation
- Use of public health concerns to justify immediate action

Broader Context
The analysis reveals potential patterns in wildlife regulation enforcement:
1. Higher scrutiny of visible social media cases
2. Use of public health protocols as enforcement mechanisms
3. Immediate euthanization as deterrent strategy
4. Limited consideration of alternative solutions

Public Interest vs. Authority Narrative
The article demonstrates tension between:
- Public health protection claims
- Enforcement agenda execution
- Social media influence on enforcement
- Animal welfare considerations

Conclusion
While presenting as straightforward news reporting, the article reveals concerning patterns in wildlife regulation enforcement and raises questions about the use of public health protocols as enforcement tools. The high-moderate risk assessment reflects significant concerns about narrative framing and potential state agenda, despite the article's apparent neutrality.

The analysis suggests readers should approach the official narrative with skepticism and consider broader patterns of enforcement, particularly regarding high-profile social media pets. The case may represent a larger trend of using public health protocols as enforcement mechanisms against wildlife pets, regardless of their care conditions or history.

Recommendations for Readers
1. Question the necessity of immediate euthanization
2. Consider broader enforcement patterns
3. Examine the relationship between social media visibility and enforcement
4. Research similar cases and outcomes
5. Consider alternative testing protocols

Areas for Further Investigation
1. Pattern of enforcement actions against viral pet accounts
2. Alternative rabies testing protocols
3. Standard quarantine procedures
4. History of department's enforcement strategies
5. Relationship between social media visibility and enforcement priorities

Source: usatoday.com/story/news/nat…Image Core Ethics Breached:
cm.usatoday.com/ethical-conduct

❌ Truth & Thoroughness
- Didn't question why both animals needed immediate euthanization
- Failed to verify necessity of killing vs quarantine
- No expert input on rabies testing alternatives
- No investigation of bite incident details
- Omitted crucial context about animals' health histories

❌ Watchdog Function
- Accepted authority narrative without scrutiny
- Failed to question timing of seizure
- No investigation of enforcement patterns
- Didn't challenge simultaneous euthanization justification
- Ignored red flags about possible ulterior motives

❌ Balance & Fair Play
- Over-relied on authority sources
- Under-represented sanctuary owner's expertise
- No veterinary/wildlife expert perspectives
- Failed to explore standard protocols
- Didn't question why both animals were targeted

❌ Independence
- Functioned more as authority mouthpiece than independent press
- Amplified deterrence message uncritically
- Failed to maintain skeptical distance from official narrative
- Didn't question enforcement timing vs social media status

Bottom Line: Paper essentially served as uncritical platform for authority action rather than fulfilling journalistic duty to investigate and question government power exercise. Classic case of "stenography journalism" rather than watchdog reporting.

Key Question Ignored: Why euthanize both animals immediately when neither showed rabies symptoms and one wasn't even involved in alleged bite?
Sep 24 10 tweets 7 min read
When these spies travel to another country and need to become established, they must work to build their 'legend'–A convincing backstory.

One of the handiest ways to do this and make relationships in the local community is Meetup.

> On the left: The guy in the thread below
> On the right: The lying troll @/cafrozed who submitted fake evidence in the torswats case to @seminolesheriff @SeminoleSO @FBI @WIRED.

His real name isn't Brad Dennis, and his real job isn't Private Investigator 🤡

1/Image
Image
2/ His name is actually Michael O'Leary and he holds a top secret TS/SCI security clearance bc he works in skunkworks (highly classified projects) for government contractors in the aerospace and weapons industry.

@DeptofDefense @RaytheonDefen__ @RTX_News This guy appears to be a mole FYI, linked to Seattle in public record and lots of inconsistencies.

Lying to/working with the press ( ) to obscure true evidence regarding a matter of national security (nationwide SWATTING attacks on POLITICIANS) while using a covert identity.

wired.com/story/torswats…
linkedin.com/in/mfolearyImage
Image
Image
Sep 24 10 tweets 6 min read
Oh, I see why. 🤡 Another Russian illegal.

1. Here's the guy's biometric match: a cached profile pic from a VK domain: (Source: ) - Try changing the URL parameters to get the Russian error message.

2. Here he is again as a sheep in wolf's clothing at a @Y_P_I event in Providence, RI around roughly June 2022. (Source: )

3. Third image: His avatar from Spoutible.

Fuck you, Putin! 🖕 CC: @DOJNatSec @FBIsun1-54.userapi.com/s/v1/if1/BBv0c…
myemail.constantcontact.com/YPI-Summer-New…Image
Image
Image
He's scared now? Good. The jig's up. Get the FUCK out of my country.
Image
Image
Sep 21 8 tweets 3 min read
So it seems that Musk did gift some Cybertrucks to Putin's Chechen warlord Kadyrov, but when the news got out was forced to remotely disable them lest he be arrested for an intentional sanctions violation.

1/ One more piece of important evidence ⬇️

edition.cnn.com/2024/09/20/bus… 2/ Yes, Elon, we really do think you're poorly intentioned and colluding with enemies of America. It's very easy to believe based on everything else you've done.

Sep 19 10 tweets 9 min read
1/🧵 Russia's Information Warfare: What is it?

The Kremlin uses disinformation as a tool to manipulate events & erode trust beyond its goal of influencing public opinion. It aims to achieve political goals (chiefly, Putin's revanchist fantasies) through intricate information warfare strategies. 🕵️‍♀️💻

👀 Their tactics are diverse, & constantly evolving:

Amplified Propaganda: Spreading biased or false narratives via traditional media & online channels (bots, paid influencers) - often targeting specific political agendas. 💥🌎
Information Warfare Operations: Disrupting information flows to influence public opinion on crucial issues like elections and international conflicts. 💣

This thread discusses a few of these tactics and explores the impact of Russian hybrid warfare strategies on global politics.

Let's go! 🌍➡️🤓 2/🧵 Create ‘Information Bubbles’, Amplify Narratives 🫧📢

Concept: This involves targeting specific audiences with tailored information to solidify their pre-existing biases or prejudices, creating echo chambers that limit exposure to opposing viewpoints. This can be achieved through carefully crafted online content and propaganda campaigns on social media platforms using algorithms designed for targeted advertising ("Information Bubbles", "Propagande Media").

Sample methods include:
- Using fake accounts or bots on Twitter, Facebook, Telegram, etc. to sow discord by spreading disinformation.
- Provocative online articles and analyses targeting one or more specific demographic(s) with inflammatory/hateful rhetoric.

Historical Example: In 2014's early stages of the Ukrainian crisis, Russia employed a multifaceted information warfare strategy, using targeted social media campaigns on platforms favored by anti-Western or nationalist audiences while leveraging pro-Russian propaganda channels like RT. A deliberate operation aimed at weakening Ukrainian civil society and media outlets was undertaken to spread disinfo about government actions in Ukraine.

"Ukrainian territories that Russia unlawfully occupies have served as a testing ground for the Kremlin’s information operations and provide us with a glimpse into its present and future propaganda tactics."
–@AIIANational

Source: internationalaffairs.org.au/australianoutl…
Sep 16 17 tweets 11 min read
🚨 Trump's would-be assassin, Ryan Wesley Routh?

His Facebook + website indicate he's been working an active psyop campaign on behalf of Russia to recruit volunteers for Ukraine.

I invite those with Ukraine-specific knowledge to examine the website:

1/ fightforukraine.com.ua


Image
Image
Image
2/ There are many signals in the text indicating that the website and his operation were a psyop.

The goal right now will be to paint him as a supporter of Ukraine. However, I will demonstrate why we should be very suspicious of this narrative, which Rouch worked hard to seed.
Sep 13 16 tweets 5 min read
WHY were Springfield elem. schools targeted with terror threats today? WHO created the lying, hateful propaganda about Haitians in Ohio BEFORE the debate?

A: TENET Media 🇷🇺 + @libsoftiktok

🚩 Trump/Vance are weaponizing Russian propaganda against Americans!

Details below 1/Image 2/ A big-picture overview of media reporting on this conspiracy theory and how it came to the forefront of American consciousness.
Aug 9 5 tweets 3 min read
🚨 BREAKING: Two "asylum-seekers" to the U.S., one Russian and one Kazakh, have just been arrested in Miami and charged with cybercrimes for running crime forum "WWH club" together.

I just found an INSANE detail in the criminal complaint that suggests Kremlin involvement 🤯

1/

Image
Image
Image
2/ This highlighted text is pretty suspicious!

Why? 👀

Copper isotopic atomic fractions refer to the relative abundances of different isotopes of copper in a sample. That this was specifically called out in the complaint is suggests natsec concerns abound for several reasons:

👀 Certain copper isotopes can be used in nuclear reactors or weapons research. Highly enriched copper isotopes can have specialized nuclear applications. Copper isotope ratios can also be used to trace the origin of materials, which is valuable for tracking illicit nuclear activities or materials.

👀 Precise control of copper isotopic fractions is important for certain high-tech applications in electronics, superconductors, and advanced materials.

A foreign agent's interest in such specialized materials could indicate attempts to acquire sensitive technical knowledge or capabilities...

Transactions involving isotopically enriched materials can also relate to efforts to circumvent non-proliferation controls and sanctions. The use of cryptocurrency, as in this case, sharply increases the likelihood of this risk.

👀 If the two men are actually Kremlim spies, them engaging in transactions related to copper isotopic atomic fractions on domestic soil can suggest attempts to:

- Acquire restricted materials or technology
- Gather intelligence on domestic nuclear or high-tech capabilities
- Establish procurement networks for sensitive materials
- Probe for vulnerabilities in export controls or material safeguards

Would love to know more about the exact nature of those transactions and the quantities involved...Image
Jul 18 4 tweets 3 min read
JD Vance, referring to his childhood experiences:

“Seeing people insult, scream, and sometimes physically fight was just a part of our life. After a while, you didn’t even notice it.

I always thought it was how adults spoke to one another.”

1/
Image “Over time, I started to like the drama.

Instead of hiding from it, I’d run downstairs or put my ear to the wall to get a better listen. My heart would still race, but in an anticipatory way, like it did when I was about to score in a basketball game. [...]

This thing that I hated had become a sort of drug.”

2/Image
Jul 10 4 tweets 2 min read
The origins of some alleged commenters on #HeritageFoundation's website.

Why are they involved in U.S. politics? Here's an example of the fun we can have here:

Match suspicious comments to suspicious IP addresses. Here we have "Clint" who asks,

"I am not sure who told you that 'Space-based interceptors present the best option for a boost-phase missile defense.' Can you point me to a technical study? This Air Force (ex-AF) officer says the opposite is true: that space based missile defense is not feasible [links]

So I am confused -- it seems space based missile defense is not the most sensible thing to do. If you have any other information to share on this issue that would be good. Thanks."

"Clint" 🤡 made this particular comment from an IP address originating from Kathmandu, Nepal.Image
Image
Jul 10 18 tweets 6 min read
I am reviewing this alleged hack of The Heritage Foundation.

I have identified very embarrassing data within this dataset. Why so many Chinese IP addresses? 🤔 The zipped file contains one single file:

"daily-signal_dev_database_new.sql"

This appears to be a combined set of exports from a SQL database. Here are the first lines Image
Jun 29 5 tweets 2 min read
New report from @FDD:

China, Russia, and Iran are waging an information war against the United States, yet many Americans do not realize they are under attack.

Nor do they appreciate that developments on the battlefield of ideas and beliefs can have a decisive impact on the security and way of life Americans enjoy.

This lack of awareness is ideal for Beijing, Moscow, and Tehran — predators like nothing better than hunting slumbering prey.

Americans may not realize they are already in an information war because adversaries attempt to conceal their activities.

To make matters worse, Americans often think of international conflict consciously or subconsciously in the context of kinetic war — soldiers, ships, and aircraft battling one another on land, at sea, or in the air.

So, when there is no overt conflict, Americans can be lulled into a false sense of security.

This propensity works to the advantage of China, Russia, and Iran, which view conflict with the United States more like a dial than a two-way switch.

These adversaries turn the dial’s intensity up or down as needed, but hostile intentions toward the United States and attacks in the information domain remain constant regardless of whether a ‘shooting war’ is underway.

So, what exactly does this information warfare look like?

Read: fdd.org/analysis/2024/… China's approach:

- Aims to become a "discourse superpower" by shaping global narratives.
- Uses state media, social media platforms, and influencers to spread propaganda.
- Spends billions annually on its discourse ecosystem.
Jun 19 23 tweets 7 min read
BREAKING: Parolee and known douchebag Martin Shkreli has been identified by cryptocurrency crime investigator @ZachXBT as the creator of the $DJT token, and after being publicly doxed as such, now claims he's running it for Trump

Not sure he's allowed per his release terms! 1/ Arkham is an intelligence company for blockchains. They posted a bounty for the identity of the cryptocurrency token's creator earlier in the day.

Jun 17 5 tweets 1 min read
While the editorial staff at the Washington Post is under the microscope, perhaps folks there also want to take a look at the son of a Russian propagandist who started on the games desk but has already moved over to foreign affairs.

WaPo has previously been notified. In fact, they were notified while he was still working on stories about gaming. He was later reassigned
May 23 5 tweets 3 min read
🚨 BREAKING: The below images indicate that an organization identifying itself as "America First" is engaging in illegal voter intimidation tactics!

A Texas voter allegedly received the below mailings via USPS and posted a @Reddit thread which was censored by mods just as it was picking up steam! First, the thread was locked so new replies could not be added. Now, the images have been fully removed.

Good thing I saved a copy! 👁️👄👁️

1/ Whose dark money PAC or campaign is paying for this criminality? (Yes, this is illegal asf)Image
Image
Image
2/ The images show what appears to be a fearmongering voter intimidation tactic, claiming to send an "official list" to Trump of Republicans who fail to vote for him in an upcoming election runoff.

It states "Public records show that YOU HAVE NOT VOTED" and threatens to report the recipient to Trump if they don't vote early by a certain deadline!

This kind of misleading and intimidating mailing is very likely illegal under U.S. election laws. Federal law prohibits any acts that intimidate, threaten or coerce voters, or attempt to do so.

Sending deceptive mailings that shame or pressure people to vote a certain way by claiming their voting record will be reported would almost certainly violate these voter intimidation statutes. State laws also prohibit various forms of voter intimidation and deception. While campaigns and PACS have broad 1A rights for political speech, communications that cross the line into false statements, threats and intimidation tactics targeting voters are not protected and are subject to criminal penalties!

Election authorities will likely view these mailings as unlawful attempts to coerce voting behavior.

The specific sender could face legal consequences if reported and investigated!!
May 1 4 tweets 2 min read
The owner of this platform has made many small changes to allow bad actors to run wild.

Death by 1,000 cuts.

Just off the top of my head:

- Free API gone, new API insanely expensive
- Followers/following no longer in order
- Block list cannot be exported through Archive
- Most tweet engagement stats now censored
- Twitter Analytics remains mostly broken
- Can't view tweets without login, eliminating third party website embeds and scraping
- Twitter's public academic research into influence actors (previously downloadable) has been eliminated
- Community Notes often hijacked/seemingly manipulated
- Only blue checks get visibility
- Random shadowbanning of activist accounts
- Trust & Safety tools now used for censorship
- Reporting ToS violations rarely results in suspension

Twitter has completed its transformation to an information warfare platform. These changes limit major research activities into influence actors to those who can pay exorbitant API cost. Some will say, that's just good business! But in cybersecurity, we call it something like "imposing cost", or "increasing the cost of an attack to reduce its likelihood".