Jackie Singh Profile picture
Mastodon: @hackingbutlegal@toad.social Bluesky: @hackingbutlegal.bsky.social
10 subscribers
Nov 2 5 tweets 7 min read
I've been developing a news analysis tool. Want to see what it can do? 😉 Ignore the numerical score for now.

Analysis: "Social media star Peanut the Squirrel has been euthanized after being seized from NY home"

The USA TODAY article covering the euthanization of Peanut the Squirrel presents as straightforward news reporting, but reveals concerning patterns when examined in depth.

The analysis indicates the article may inadvertently serve as a vehicle for state enforcement messaging, with a final risk score of 924 (High-Moderate Risk) after reliability adjustments.

The article's framing demonstrates several critical issues:

1. Selective Context: While the article mentions the bite incident that precipitated euthanization, it omits crucial context about:
- The animal's long-term health history
- The absence of prior rabies symptoms
- The owner's demonstrated animal care expertise
- Alternative testing or quarantine options

2. Authority Perspective Dominance: The narrative heavily centers official justifications while providing limited scrutiny of:
- The necessity for immediate euthanization
- The decision to euthanize both animals simultaneously
- The timing of enforcement action against a high-profile social media pet
- The relationship between viral status and enforcement priorities

3. Enforcement Pattern Indicators: Several elements suggest potential use of public health protocols as an enforcement tool:
- Timing of the seizure
- Immediate move to euthanization
- Targeting of both animals
- Use of rabies testing justification despite no prior symptoms

Public Interest Implications
The case raises significant public interest concerns regarding:
- Use of administrative powers
- Wildlife pet enforcement strategies
- Social media influence on enforcement
- Public health protocol application

Critical Omissions
The article's reliability is significantly impacted by failure to address:
1. Alternative testing options
2. Standard protocols for suspected rabies cases
3. Pattern of enforcement against social media pets
4. Prior relationship between authorities and the sanctuary

Propaganda Elements
State propaganda elements score highly due to:
- Uncritical presentation of authority justifications
- Emphasis on deterrence messaging
- Selective information presentation
- Use of public health concerns to justify immediate action

Broader Context
The analysis reveals potential patterns in wildlife regulation enforcement:
1. Higher scrutiny of visible social media cases
2. Use of public health protocols as enforcement mechanisms
3. Immediate euthanization as deterrent strategy
4. Limited consideration of alternative solutions

Public Interest vs. Authority Narrative
The article demonstrates tension between:
- Public health protection claims
- Enforcement agenda execution
- Social media influence on enforcement
- Animal welfare considerations

Conclusion
While presenting as straightforward news reporting, the article reveals concerning patterns in wildlife regulation enforcement and raises questions about the use of public health protocols as enforcement tools. The high-moderate risk assessment reflects significant concerns about narrative framing and potential state agenda, despite the article's apparent neutrality.

The analysis suggests readers should approach the official narrative with skepticism and consider broader patterns of enforcement, particularly regarding high-profile social media pets. The case may represent a larger trend of using public health protocols as enforcement mechanisms against wildlife pets, regardless of their care conditions or history.

Recommendations for Readers
1. Question the necessity of immediate euthanization
2. Consider broader enforcement patterns
3. Examine the relationship between social media visibility and enforcement
4. Research similar cases and outcomes
5. Consider alternative testing protocols

Areas for Further Investigation
1. Pattern of enforcement actions against viral pet accounts
2. Alternative rabies testing protocols
3. Standard quarantine procedures
4. History of department's enforcement strategies
5. Relationship between social media visibility and enforcement priorities

Source: usatoday.com/story/news/nat…Image Core Ethics Breached:
cm.usatoday.com/ethical-conduct

❌ Truth & Thoroughness
- Didn't question why both animals needed immediate euthanization
- Failed to verify necessity of killing vs quarantine
- No expert input on rabies testing alternatives
- No investigation of bite incident details
- Omitted crucial context about animals' health histories

❌ Watchdog Function
- Accepted authority narrative without scrutiny
- Failed to question timing of seizure
- No investigation of enforcement patterns
- Didn't challenge simultaneous euthanization justification
- Ignored red flags about possible ulterior motives

❌ Balance & Fair Play
- Over-relied on authority sources
- Under-represented sanctuary owner's expertise
- No veterinary/wildlife expert perspectives
- Failed to explore standard protocols
- Didn't question why both animals were targeted

❌ Independence
- Functioned more as authority mouthpiece than independent press
- Amplified deterrence message uncritically
- Failed to maintain skeptical distance from official narrative
- Didn't question enforcement timing vs social media status

Bottom Line: Paper essentially served as uncritical platform for authority action rather than fulfilling journalistic duty to investigate and question government power exercise. Classic case of "stenography journalism" rather than watchdog reporting.

Key Question Ignored: Why euthanize both animals immediately when neither showed rabies symptoms and one wasn't even involved in alleged bite?
Sep 24 10 tweets 7 min read
When these spies travel to another country and need to become established, they must work to build their 'legend'–A convincing backstory.

One of the handiest ways to do this and make relationships in the local community is Meetup.

> On the left: The guy in the thread below
> On the right: The lying troll @/cafrozed who submitted fake evidence in the torswats case to @seminolesheriff @SeminoleSO @FBI @WIRED.

His real name isn't Brad Dennis, and his real job isn't Private Investigator 🤡

1/Image
Image
2/ His name is actually Michael O'Leary and he holds a top secret TS/SCI security clearance bc he works in skunkworks (highly classified projects) for government contractors in the aerospace and weapons industry.

@DeptofDefense @RaytheonDefen__ @RTX_News This guy appears to be a mole FYI, linked to Seattle in public record and lots of inconsistencies.

Lying to/working with the press ( ) to obscure true evidence regarding a matter of national security (nationwide SWATTING attacks on POLITICIANS) while using a covert identity.

wired.com/story/torswats…
linkedin.com/in/mfolearyImage
Image
Image
Sep 24 10 tweets 6 min read
Oh, I see why. 🤡 Another Russian illegal.

1. Here's the guy's biometric match: a cached profile pic from a VK domain: (Source: ) - Try changing the URL parameters to get the Russian error message.

2. Here he is again as a sheep in wolf's clothing at a @Y_P_I event in Providence, RI around roughly June 2022. (Source: )

3. Third image: His avatar from Spoutible.

Fuck you, Putin! 🖕 CC: @DOJNatSec @FBIsun1-54.userapi.com/s/v1/if1/BBv0c…
myemail.constantcontact.com/YPI-Summer-New…Image
Image
Image
He's scared now? Good. The jig's up. Get the FUCK out of my country.
Image
Image
Sep 21 8 tweets 3 min read
So it seems that Musk did gift some Cybertrucks to Putin's Chechen warlord Kadyrov, but when the news got out was forced to remotely disable them lest he be arrested for an intentional sanctions violation.

1/ One more piece of important evidence ⬇️

edition.cnn.com/2024/09/20/bus… 2/ Yes, Elon, we really do think you're poorly intentioned and colluding with enemies of America. It's very easy to believe based on everything else you've done.

Sep 19 10 tweets 9 min read
1/🧵 Russia's Information Warfare: What is it?

The Kremlin uses disinformation as a tool to manipulate events & erode trust beyond its goal of influencing public opinion. It aims to achieve political goals (chiefly, Putin's revanchist fantasies) through intricate information warfare strategies. 🕵️‍♀️💻

👀 Their tactics are diverse, & constantly evolving:

Amplified Propaganda: Spreading biased or false narratives via traditional media & online channels (bots, paid influencers) - often targeting specific political agendas. 💥🌎
Information Warfare Operations: Disrupting information flows to influence public opinion on crucial issues like elections and international conflicts. 💣

This thread discusses a few of these tactics and explores the impact of Russian hybrid warfare strategies on global politics.

Let's go! 🌍➡️🤓 2/🧵 Create ‘Information Bubbles’, Amplify Narratives 🫧📢

Concept: This involves targeting specific audiences with tailored information to solidify their pre-existing biases or prejudices, creating echo chambers that limit exposure to opposing viewpoints. This can be achieved through carefully crafted online content and propaganda campaigns on social media platforms using algorithms designed for targeted advertising ("Information Bubbles", "Propagande Media").

Sample methods include:
- Using fake accounts or bots on Twitter, Facebook, Telegram, etc. to sow discord by spreading disinformation.
- Provocative online articles and analyses targeting one or more specific demographic(s) with inflammatory/hateful rhetoric.

Historical Example: In 2014's early stages of the Ukrainian crisis, Russia employed a multifaceted information warfare strategy, using targeted social media campaigns on platforms favored by anti-Western or nationalist audiences while leveraging pro-Russian propaganda channels like RT. A deliberate operation aimed at weakening Ukrainian civil society and media outlets was undertaken to spread disinfo about government actions in Ukraine.

"Ukrainian territories that Russia unlawfully occupies have served as a testing ground for the Kremlin’s information operations and provide us with a glimpse into its present and future propaganda tactics."
–@AIIANational

Source: internationalaffairs.org.au/australianoutl…
Sep 16 17 tweets 11 min read
🚨 Trump's would-be assassin, Ryan Wesley Routh?

His Facebook + website indicate he's been working an active psyop campaign on behalf of Russia to recruit volunteers for Ukraine.

I invite those with Ukraine-specific knowledge to examine the website:

1/ fightforukraine.com.ua


Image
Image
Image
2/ There are many signals in the text indicating that the website and his operation were a psyop.

The goal right now will be to paint him as a supporter of Ukraine. However, I will demonstrate why we should be very suspicious of this narrative, which Rouch worked hard to seed.
Sep 13 16 tweets 5 min read
WHY were Springfield elem. schools targeted with terror threats today? WHO created the lying, hateful propaganda about Haitians in Ohio BEFORE the debate?

A: TENET Media 🇷🇺 + @libsoftiktok

🚩 Trump/Vance are weaponizing Russian propaganda against Americans!

Details below 1/Image 2/ A big-picture overview of media reporting on this conspiracy theory and how it came to the forefront of American consciousness.
Aug 9 5 tweets 3 min read
🚨 BREAKING: Two "asylum-seekers" to the U.S., one Russian and one Kazakh, have just been arrested in Miami and charged with cybercrimes for running crime forum "WWH club" together.

I just found an INSANE detail in the criminal complaint that suggests Kremlin involvement 🤯

1/

Image
Image
Image
2/ This highlighted text is pretty suspicious!

Why? 👀

Copper isotopic atomic fractions refer to the relative abundances of different isotopes of copper in a sample. That this was specifically called out in the complaint is suggests natsec concerns abound for several reasons:

👀 Certain copper isotopes can be used in nuclear reactors or weapons research. Highly enriched copper isotopes can have specialized nuclear applications. Copper isotope ratios can also be used to trace the origin of materials, which is valuable for tracking illicit nuclear activities or materials.

👀 Precise control of copper isotopic fractions is important for certain high-tech applications in electronics, superconductors, and advanced materials.

A foreign agent's interest in such specialized materials could indicate attempts to acquire sensitive technical knowledge or capabilities...

Transactions involving isotopically enriched materials can also relate to efforts to circumvent non-proliferation controls and sanctions. The use of cryptocurrency, as in this case, sharply increases the likelihood of this risk.

👀 If the two men are actually Kremlim spies, them engaging in transactions related to copper isotopic atomic fractions on domestic soil can suggest attempts to:

- Acquire restricted materials or technology
- Gather intelligence on domestic nuclear or high-tech capabilities
- Establish procurement networks for sensitive materials
- Probe for vulnerabilities in export controls or material safeguards

Would love to know more about the exact nature of those transactions and the quantities involved...Image
Jul 18 4 tweets 3 min read
JD Vance, referring to his childhood experiences:

“Seeing people insult, scream, and sometimes physically fight was just a part of our life. After a while, you didn’t even notice it.

I always thought it was how adults spoke to one another.”

1/
Image “Over time, I started to like the drama.

Instead of hiding from it, I’d run downstairs or put my ear to the wall to get a better listen. My heart would still race, but in an anticipatory way, like it did when I was about to score in a basketball game. [...]

This thing that I hated had become a sort of drug.”

2/Image
Jul 10 4 tweets 2 min read
The origins of some alleged commenters on #HeritageFoundation's website.

Why are they involved in U.S. politics? Here's an example of the fun we can have here:

Match suspicious comments to suspicious IP addresses. Here we have "Clint" who asks,

"I am not sure who told you that 'Space-based interceptors present the best option for a boost-phase missile defense.' Can you point me to a technical study? This Air Force (ex-AF) officer says the opposite is true: that space based missile defense is not feasible [links]

So I am confused -- it seems space based missile defense is not the most sensible thing to do. If you have any other information to share on this issue that would be good. Thanks."

"Clint" 🤡 made this particular comment from an IP address originating from Kathmandu, Nepal.Image
Image
Jul 10 18 tweets 6 min read
I am reviewing this alleged hack of The Heritage Foundation.

I have identified very embarrassing data within this dataset. Why so many Chinese IP addresses? 🤔 The zipped file contains one single file:

"daily-signal_dev_database_new.sql"

This appears to be a combined set of exports from a SQL database. Here are the first lines Image
Jun 29 5 tweets 2 min read
New report from @FDD:

China, Russia, and Iran are waging an information war against the United States, yet many Americans do not realize they are under attack.

Nor do they appreciate that developments on the battlefield of ideas and beliefs can have a decisive impact on the security and way of life Americans enjoy.

This lack of awareness is ideal for Beijing, Moscow, and Tehran — predators like nothing better than hunting slumbering prey.

Americans may not realize they are already in an information war because adversaries attempt to conceal their activities.

To make matters worse, Americans often think of international conflict consciously or subconsciously in the context of kinetic war — soldiers, ships, and aircraft battling one another on land, at sea, or in the air.

So, when there is no overt conflict, Americans can be lulled into a false sense of security.

This propensity works to the advantage of China, Russia, and Iran, which view conflict with the United States more like a dial than a two-way switch.

These adversaries turn the dial’s intensity up or down as needed, but hostile intentions toward the United States and attacks in the information domain remain constant regardless of whether a ‘shooting war’ is underway.

So, what exactly does this information warfare look like?

Read: fdd.org/analysis/2024/… China's approach:

- Aims to become a "discourse superpower" by shaping global narratives.
- Uses state media, social media platforms, and influencers to spread propaganda.
- Spends billions annually on its discourse ecosystem.
Jun 19 23 tweets 7 min read
BREAKING: Parolee and known douchebag Martin Shkreli has been identified by cryptocurrency crime investigator @ZachXBT as the creator of the $DJT token, and after being publicly doxed as such, now claims he's running it for Trump

Not sure he's allowed per his release terms! 1/ Arkham is an intelligence company for blockchains. They posted a bounty for the identity of the cryptocurrency token's creator earlier in the day.

Jun 17 5 tweets 1 min read
While the editorial staff at the Washington Post is under the microscope, perhaps folks there also want to take a look at the son of a Russian propagandist who started on the games desk but has already moved over to foreign affairs.

WaPo has previously been notified. In fact, they were notified while he was still working on stories about gaming. He was later reassigned
May 23 5 tweets 3 min read
🚨 BREAKING: The below images indicate that an organization identifying itself as "America First" is engaging in illegal voter intimidation tactics!

A Texas voter allegedly received the below mailings via USPS and posted a @Reddit thread which was censored by mods just as it was picking up steam! First, the thread was locked so new replies could not be added. Now, the images have been fully removed.

Good thing I saved a copy! 👁️👄👁️

1/ Whose dark money PAC or campaign is paying for this criminality? (Yes, this is illegal asf)Image
Image
Image
2/ The images show what appears to be a fearmongering voter intimidation tactic, claiming to send an "official list" to Trump of Republicans who fail to vote for him in an upcoming election runoff.

It states "Public records show that YOU HAVE NOT VOTED" and threatens to report the recipient to Trump if they don't vote early by a certain deadline!

This kind of misleading and intimidating mailing is very likely illegal under U.S. election laws. Federal law prohibits any acts that intimidate, threaten or coerce voters, or attempt to do so.

Sending deceptive mailings that shame or pressure people to vote a certain way by claiming their voting record will be reported would almost certainly violate these voter intimidation statutes. State laws also prohibit various forms of voter intimidation and deception. While campaigns and PACS have broad 1A rights for political speech, communications that cross the line into false statements, threats and intimidation tactics targeting voters are not protected and are subject to criminal penalties!

Election authorities will likely view these mailings as unlawful attempts to coerce voting behavior.

The specific sender could face legal consequences if reported and investigated!!
May 1 4 tweets 2 min read
The owner of this platform has made many small changes to allow bad actors to run wild.

Death by 1,000 cuts.

Just off the top of my head:

- Free API gone, new API insanely expensive
- Followers/following no longer in order
- Block list cannot be exported through Archive
- Most tweet engagement stats now censored
- Twitter Analytics remains mostly broken
- Can't view tweets without login, eliminating third party website embeds and scraping
- Twitter's public academic research into influence actors (previously downloadable) has been eliminated
- Community Notes often hijacked/seemingly manipulated
- Only blue checks get visibility
- Random shadowbanning of activist accounts
- Trust & Safety tools now used for censorship
- Reporting ToS violations rarely results in suspension

Twitter has completed its transformation to an information warfare platform. These changes limit major research activities into influence actors to those who can pay exorbitant API cost. Some will say, that's just good business! But in cybersecurity, we call it something like "imposing cost", or "increasing the cost of an attack to reduce its likelihood".
Apr 24 5 tweets 2 min read
"The Army falsely denied that General Flynn was ever on the call"

The call in question?

One in which senior Pentagon leaders made decisions about whether to send the National Guard to protect the Capitol while we Americans watched countless livestreams with horror as our democracy failed.

One particular participant wasn't even supposed to be there. He had no leadership responsibility. Yet he was there, speaking, and at least one other participant lied to the media about his presence. He is still a serving 4star General and his brother actively runs election-related psyops on Americans.

Follow @jimstewartson and @Heidi_Cuda who doggedly report on these topics and will not be intimidated away from the truth. Source: "Oversight Subcommittee, "3 Years Later: D.C. National Guard Whistleblowers Speak Out on Jan 6 Delay", The Committee on House Administration, YouTube, April 17, 2024

Dec 29, 2023 43 tweets 22 min read
👋 🔊 Happy New Year, Readers!
It's my first annual roundup! 🎉 🥳 🪩

I migrated to Substack and spent some time in film school (I'll branch out to video in 2024!)

I was cited by various publications including MIT Technology Review, Bloomberg Law, and RFA Asia!

1/ Let's go! 🧵 2/ Jan: Investigative journalist Michael Hastings' mysterious 2013 death resurfaces in recent tweets by Joseph Flynn, sparking questions about the circumstances surrounding Hastings' fatal car crash and potential connections to influential figures.

hackingbutlegal.com/p/michael-hast…
Image
Dec 28, 2023 12 tweets 3 min read
1/ For anyone who might be new to my feed and confused about what is happening here, for the past year I have been researching sick individuals who participate in Internet communities to engage in abusive and criminal behaviors: targeted harassment, doxing, stalking, swatting. 2/ My methodology to produce useful information, which allows me to more completely profile these individuals, has led me to a practice of direct engagement as opposed to avoidance—often simply to confirm investigative possibilities or likely conclusions.
Oct 20, 2023 4 tweets 3 min read
1/ Note:

If you search @Heritage's Project 2025 manifesto for the term "CISA", you'll find detailed information describing the very specific harm the Right clearly plans to wreak onto America by fucking over, among many other things, our cybersecurity agency @CISAgov!

#infosec


Image
Image
Image
2/ No surprise "immigration hardliner" (known racist) Cuccinelli authored this 💩!

He hates CISA for stoping disinfo, helping secure elections. They attempted a fascist takeover at DHS by making up a job for him, making him 2nd in command. Got fired by judge—after harm was done! Image
Sep 12, 2023 16 tweets 9 min read
1/🧵 Hmm, so Jim's crazy, huh? That's what all of the very aggressive trolls who circle him have to say! #BlueAnon 🤡

Besides everything already said, let's spend 5 mins to catch up this one political chaos actor: James Brower.

What has he been up to? ⬇️ #ElectionInterference 2/ Nov 9, 2016: Donald Trump supporters chant "lock her up" during an election party. Trump employee Brower is front and center.

Source: telegram.com/story/news/pol…

Image
Image