Since I’m sick of seeing this third rate conman all over X with shoutouts from big name accounts and even a quick highlight on @timcast… I put in some quick exposure work.
@TonySeruga …consider this a simple checkup. I’ll do a thorough digital colonoscopy if I have to. Get rekd mf
Where to start, this guy is a hot mess.
Tony Seruga claims (on separate LinkedIn profiles) to have worked at Twitter, LinkedIn, various faux startups, and served as an executive at Google. Lolz
I hate to bug you, but feel free to comment @Google, @LinkedIn, @X, @elonmusk.
Executive - Google
Program Promotion - Twitter
Marketing Manager - LinkedIn
Managing Director - Greenlaw Capital
Managing Director - Venture Capital & Private Equity
Managing Partner - Digital Mavericks
Managing Partner - AJS & Associates
Jan 24 • 23 tweets • 19 min read
1/ The origins of the 2016 Russian collusion active measure can be traced back to these men. All of them investigated cybercriminals around the world over a decade before Trump was elected. This nexus provided us with Guccifer 2.0, the Mueller indictment, and CrowdStrike’s DNC breach attribution.
🧵👀2/ Ukrainian hacker Maksym Popov is at the heart of these connections. In 2001, while serving time in an American prison, he wrote a letter to the Ukrainian Consulate in Chicago. In the letter, he claimed that the FBI tricked him into a meeting in London with a job offer where he was drugged and extradited to the United States:
“I remember precisely that I had a smoke and drank whiskey from the mini bar, after which I don’t remember anything that happened to me. I found myself on a TWA plane with an unbearable headache and was given some kind of headache pill for the pain.”
“I asked what was going on, to which they answered with a smile that I was kind of stressed and lost consciousness, but that I shouldn’t worry because they took care of everything. I asked again, where are we flying? They answered me: To the USA. Isn't that what you wanted, Maksim? At that moment I realized what really happened.”