REGIME-CHANGING INFORMATION OPERATIONS CHARTED A PATH THROUGH UKRAINE: “The newest iteration of this method was developed in 2012... “In military Information Operations (IO) center on the ability to influence foreign audiences, US and global audiences, and adversely affect enemy decision making through an integrated approach. Even current event news is released in this fashion. Each portal is given messages that follow the same themes because it is an across the board mainstream effort that fills the information space entirely when it is working correctly.
The purpose of “Inform and Influence Operations” is not to provide a perspective, opinion, or lay out a policy. It is defined as the ability to make audiences “think and act” in a manner favorable to the mission objectives. This is done through applying perception management techniques which target the audience’s emotions, motives, and reasoning.
These techniques are not geared for debate. It is to overwhelm and change the target psyche.
Using these techniques information sources can be manipulated and those that write, speak, or think counter to the objective are relegated as propaganda, ill informed, or irrelevant.”
Former Green Beret Joel Harding pioneered IO for the US military. In 2012, he took his expertise, the core of regime change, to the extreme for Ukrainian nationalists inside the State Department and in the US Ukrainian Diaspora.
Harding revolutionized regime change by asking the crucial question; What if we did this at a whole nation level?
...Today, this method is being used in the United States by public Intel officials, NGOs, lobbyists, and private IO and Intel contractors.
Joel Harding developed this IO program for the 2014 coup in Ukraine to enact regime change. It is being used to provoke a war with Russia in the western media. His method is being used across many of the conflict areas primed for regime change in the post-2014 world...
Instead of focusing on a small group, Harding’s methods speed the process by controlling all the information everyone has access to within the operation zone and every zone that can influence the operation outcome across the world... This enables him to define the terms used and the enemies fought. Controlling the information means you decide who and where the enemy is. You decide what the enemy is.
All this deals with information that an adversary desperately needs to make an informed decision. That is how we ” influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries”.
“Bottom line on the bottom. Cyber and EW are cool, but we dare not lose sight of their ultimate goal, targeting an adversary’s or potential adversary’s decision cycle. Cyber and EW are not goals nor ends by themselves, it’s all about information. Information is the most powerful tool or weapon at our disposal at all times. To Inform is to Influence”
After managing the coup in 2014 Ukraine, Harding’s IO group started the war in Donbass. Every major event from the overthrow of Victor Yanukovych until today in Ukraine has its clear marker on it.
This same group is responsible for Russian interference accusations before and during the 2016 election as well as blaming Russia for the DNC hacking exploits. This is very dangerous. The real “hackers” had State Department server passwords from two sources for years, access to DNC servers, as well as state-level tools and support...
This current IO group works with the US State Department and all the agencies from the ODNI including the FBI, CIA, NSA, DHS, etc. Many of them are still trainers and contractors. They still provide the Intel that goes into the President’s Daily Briefing. They can and do literally provide the president of the United States with enough rope to hang himself through foreign policy missteps.
This quagmire has to be cleaned up.
The group we expose today is infecting the US and international media with their Information Operation talking points. This is part is integral to the process of regime change. None of them do this for any high or lofty goal of a better life.
They do this for money and an anti-American contempt for US democracy...
...On March 1 st 2014 Harding announced cyber options for Ukraine. “Since March 2014, in the wake of the rise of the volunteer movement, several activist groups and individuals assumed the state security functions in the media- and cyber-space
In January 2014, Harding worked with 17-year-old Sviatoslav Yurash to open Euromaidanpress.com. He took Yurash under his wing showing him how to run an IO platform. This can be seen in the comments early on. Sviatoslav Yurash went on to become the deputy representative in Kiev for the Ukrainian World Congress (UWC). The UWC was a sponsor of the 2014 coup and is a signatory partner to the Atlantic Council.
Yurash became the spokesman for the EuroMaidan protest that was turning into an insurgency. He became the post-coup Ukrainian Defense Ministry, Dimitry Yarosh, as well as the 3 conspirators, Arsenii Yatsenyuk, V. Klitschko, and Oleh Tyanhybok.
Yurash web properties spawned InformNapalm and Ukrainian Cyber Intel UCA, CyberHunta, RUH8, TRINITY, Shaltay Boltay (Humpty Dumpty) aka Anonymous Ukraine: This hacker group is the branch of the hacktivist movement Anonymous in Ukraine. It is, however, internally divided in its position regarding the conflict in Eastern Ukraine. Some of its members are pro-Ukrainian and tend to be close to Cyber Hundred and Null Sector, while others are pro-Russian and close to CyberBerkut. The pro-Russian element is prominent, having claimed several attacks on NATO, US and EU governments’ websites (Carr, 2014). Cyber and Information warfare in the Ukrainian conflict
Anonymous/ Shaltay Boltay/Humpty Dumpty very important when the DNC hacks and influence story comes into play. Note now, they fall under Joel Harding’s IO operation. The other names for these combined groups you are more familiar with are APT 28, APT29, Fancy Bear, and Cozy Bear.
According to InformNapalm, InformNapalm, Myrotvorets, Ukrainian Cyber army, and other volunteer communities organized a series of effective campaigns in data collection, data analysis, identification of hostile activities and retaliation against them. The volunteers took on the roles of intelligence and counterintelligence agents.
They collected the information on locations and movements of enemy weapons and equipment, blocked servers and websites engaged in Russian terrorist propaganda, and blocked bank accounts of the militants. And they still continue carrying out the important volunteer work in cyberspace. 2016 became the year of escalation of cyber-warfare…
Sviatoslav Yurash worked with Andrea Chalupa, Alexandra, Chalupa, and Irena Chalupa. His team works directly with the Atlantic Council through Bellingcat and Dimtri Alperovich from Crowdstrike...
[On] February 23rd 2015, Harding tweeted the creation of the i-army. The next day it was announced to the world. “This effort is geared to contain what they call Russian propaganda in the west.”In late January, Ukraine’s Minister of Information Policy, Yuriy Stets, promised to create an “information-army” to fight Russian propaganda…”
With this, the concept of the troll army was born. Right out of the gate, Ukraine was bragging the Ukrainian I-Army numbered over 40,000 volunteer trolls, hackers, commenters, and propagandists. According to the Ukrainian Information Ministry– The first assignment is to “Invite your best and closest friends to the website of the Ukrainian Information Forces, where they can join the army by subscribing to a mailing list of daily assignments. This is very important, considering our information struggle against the foreign aggressor.”
Ukrainian Cyber Troops/Army: This hacker group, which was founded by Eugene Dukokin, a former cybersecurity consultant and programmer (Maheshwari, 2015), targets pro-Russian separatists and Russian troops in Ukraine. They report accounts of pro-Russian officials to various banking and payment websites or social media in order to get the accounts closed...
In January 2015 Andrew Weisburd starting work for the Ukrainiansshowing them how he finds the networks of people he is paid to hurt.
Weisburd starts Kremlintrolls.com and builds the first list of journalists and publications that are against Harding’s Ukrainian Information Ministry agenda.
Between him and Joel Harding, over 200 publications were listed as Russian assets. Many of them are American websites.
It should be noted that according to Weisburd and Harding the only real qualifier to be included on the lists is supporting someone other than Hillary Clinton...
REGIME-CHANGING INFORMATION OPERATIONS CHARTED A PATH THROUGH UKRAINE: “The newest iteration of this method was developed in 2012... “In military Information Operations (IO) center on the ability to influence foreign audiences, US and global audiences, and adversely affect enemy decision making through an integrated approach. Even current event news is released in this fashion. Each portal is given messages that follow the same themes because it is an across the board mainstream effort that fills the information space entirely when it is working correctly.
The purpose of “Inform and Influence Operations” is not to provide a perspective, opinion, or lay out a policy. It is defined as the ability to make audiences “think and act” in a manner favorable to the mission objectives. This is done through applying perception management techniques which target the audience’s emotions, motives, and reasoning.
These techniques are not geared for debate. It is to overwhelm and change the target psyche.
Using these techniques information sources can be manipulated and those that write, speak, or think counter to the objective are relegated as propaganda, ill informed, or irrelevant.”
Former Green Beret Joel Harding pioneered IO for the US military. In 2012, he took his expertise, the core of regime change, to the extreme for Ukrainian nationalists inside the State Department and in the US Ukrainian Diaspora.
Harding revolutionized regime change by asking the crucial question; What if we did this at a whole nation level?
...Today, this method is being used in the United States by public Intel officials, NGOs, lobbyists, and private IO and Intel contractors.
Joel Harding developed this IO program for the 2014 coup in Ukraine to enact regime change. It is being used to provoke a war with Russia in the western media. His method is being used across many of the conflict areas primed for regime change in the post-2014 world...
Instead of focusing on a small group, Harding’s methods speed the process by controlling all the information everyone has access to within the operation zone and every zone that can influence the operation outcome across the world... This enables him to define the terms used and the enemies fought. Controlling the information means you decide who and where the enemy is. You decide what the enemy is.
All this deals with information that an adversary desperately needs to make an informed decision. That is how we ” influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries”.
“Bottom line on the bottom. Cyber and EW are cool, but we dare not lose sight of their ultimate goal, targeting an adversary’s or potential adversary’s decision cycle. Cyber and EW are not goals nor ends by themselves, it’s all about information. Information is the most powerful tool or weapon at our disposal at all times. To Inform is to Influence”
After managing the coup in 2014 Ukraine, Harding’s IO group started the war in Donbass. Every major event from the overthrow of Victor Yanukovych until today in Ukraine has its clear marker on it.
This same group is responsible for Russian interference accusations before and during the 2016 election as well as blaming Russia for the DNC hacking exploits. This is very dangerous. The real “hackers” had State Department server passwords from two sources for years, access to DNC servers, as well as state-level tools and support...
This current IO group works with the US State Department and all the agencies from the ODNI including the FBI, CIA, NSA, DHS, etc. Many of them are still trainers and contractors. They still provide the Intel that goes into the President’s Daily Briefing. They can and do literally provide the president of the United States with enough rope to hang himself through foreign policy missteps.
This quagmire has to be cleaned up.
The group we expose today is infecting the US and international media with their Information Operation talking points. This is part is integral to the process of regime change. None of them do this for any high or lofty goal of a better life.
They do this for money and an anti-American contempt for US democracy...
...On March 1 st 2014 Harding announced cyber options for Ukraine. “Since March 2014, in the wake of the rise of the volunteer movement, several activist groups and individuals assumed the state security functions in the media- and cyber-space In January 2014, Harding worked with 17-year-old Sviatoslav Yurash to open Euromaidanpress.com. He took Yurash under his wing showing him how to run an IO platform. This can be seen in the comments early on. Sviatoslav Yurash went on to become the deputy representative in Kiev for the Ukrainian World Congress (UWC). The UWC was a sponsor of the 2014 coup and is a signatory partner to the Atlantic Council.
Yurash became the spokesman for the EuroMaidan protest that was turning into an insurgency. He became the post-coup Ukrainian Defense Ministry, Dimitry Yarosh, as well as the 3 conspirators, Arsenii Yatsenyuk, V. Klitschko, and Oleh Tyanhybok.
Yurash web properties spawned InformNapalm and Ukrainian Cyber Intel UCA, CyberHunta, RUH8, TRINITY, Shaltay Boltay (Humpty Dumpty) aka Anonymous Ukraine: This hacker group is the branch of the hacktivist movement Anonymous in Ukraine. It is, however, internally divided in its position regarding the conflict in Eastern Ukraine. Some of its members are pro-Ukrainian and tend to be close to Cyber Hundred and Null Sector, while others are pro-Russian and close to CyberBerkut. The pro-Russian element is prominent, having claimed several attacks on NATO, US and EU governments’ websites (Carr, 2014). Cyber and Information warfare in the Ukrainian conflict
Anonymous/ Shaltay Boltay/Humpty Dumpty very important when the DNC hacks and influence story comes into play. Note now, they fall under Joel Harding’s IO operation. The other names for these combined groups you are more familiar with are APT 28, APT29, Fancy Bear, and Cozy Bear.
According to InformNapalm, InformNapalm, Myrotvorets, Ukrainian Cyber army, and other volunteer communities organized a series of effective campaigns in data collection, data analysis, identification of hostile activities and retaliation against them. The volunteers took on the roles of intelligence and counterintelligence agents.
They collected the information on locations and movements of enemy weapons and equipment, blocked servers and websites engaged in Russian terrorist propaganda, and blocked bank accounts of the militants. And they still continue carrying out the important volunteer work in cyberspace. 2016 became the year of escalation of cyber-warfare…
Sviatoslav Yurash worked with Andrea Chalupa, Alexandra, Chalupa, and Irena Chalupa. His team works directly with the Atlantic Council through Bellingcat and Dimtri Alperovich from Crowdstrike...
[On] February 23rd 2015, Harding tweeted the creation of the i-army. The next day it was announced to the world. “This effort is geared to contain what they call Russian propaganda in the west.”In late January, Ukraine’s Minister of Information Policy, Yuriy Stets, promised to create an “information-army” to fight Russian propaganda…”
With this, the concept of the troll army was born. Right out of the gate, Ukraine was bragging the Ukrainian I-Army numbered over 40,000 volunteer trolls, hackers, commenters, and propagandists. According to the Ukrainian Information Ministry– The first assignment is to “Invite your best and closest friends to the website of the Ukrainian Information Forces, where they can join the army by subscribing to a mailing list of daily assignments. This is very important, considering our information struggle against the foreign aggressor.”
Ukrainian Cyber Troops/Army: This hacker group, which was founded by Eugene Dukokin, a former cybersecurity consultant and programmer (Maheshwari, 2015), targets pro-Russian separatists and Russian troops in Ukraine. They report accounts of pro-Russian officials to various banking and payment websites or social media in order to get the accounts closed...
In January 2015 Andrew Weisburd starting work for the Ukrainiansshowing them how he finds the networks of people he is paid to hurt.
Weisburd starts Kremlintrolls.com and builds the first list of journalists and publications that are against Harding’s Ukrainian Information Ministry agenda.
Between him and Joel Harding, over 200 publications were listed as Russian assets. Many of them are American websites.
It should be noted that according to Weisburd and Harding the only real qualifier to be included on the lists is supporting someone other than Hillary Clinton...
(CONT)