The above from Kristal Neant's article should be clear enough and she asks the right questions. Bellingcat's Aric Toler work with privateer groups has included trying to leverage their collective expertise and locate and rendition me.
Here's the kicker, almost every time I've been threatened by Ukraine, it's an American collaborator making the threat for them. The linked article shows this person designed Ukraine's Information Policy. He also wrote the policy paper for the US government's cyber policy.
The same people that testify for Congress on cyber and OSINT are the same people doing these things. Not only to me, but they are training and setting up groups in multiple countries and under different auspices.
More than one of them trained the full spectrum of alphabet agencies. CIA, NSA, DIA, FBI, DNI, DOD, and we can keep going across the board.
They were behind setting up the policy that guided the Tallinn Manual defining cyberwar and international law. We'll be opening that up within a couple of articles.
As a testament of their cyber mojo, they spent the last few years collectively trying to locate someone who didn't change locations often and used normal communications and social media. I publish articles in 5 or 6 publications regularly. I have 4 or 5 different social platform accounts.
They couldn't figure out that I was where I said I was for the last 5 years. This spring I wrote a Victory Day article with local video and interviews. Even though I clearly showed my location, they still weren't too sure.
The one thing you can say about them and their ally Bellingcatis they are consistent. Consistently wrong that is. In Ukraine, Bellingcat'schief source of Intel is Ukrainian Intelligence. This includes the Ukrainian State hackers that contacted me after my sister was hacked. Journalism from the Donbass side of the contact line is a crime against Ukrainian sensibilities. What a bunch of sissies.
This group supplies Intel to NATO and individual EU countries and makes the rounds in Congress. Bellingcat's work in Syria is chiefly supplied by the other side of Bellingcat's Intel fabricators who also work for Ukraine.
We now have Americans working with foreign Intel stalking Americans and foreign citizens/ journalists for foreign countries they know will be tortured and killed. This clearly falls under terrorist activity.
One side of the group that works for Ukrainian Intel contacted me for the first time the day after the bank account was hacked and cleaned out using the hacker's preferred method. What was the reason for the sudden communication? He wanted me to know how smart he really was.
Yet, these same so-called super spies claim to be able to find information about things people are actively trying to hide like weapons systems, motives, etc. Most of the time they don't speak the language of the country they claim expertise for. They decide guilt even though reality shows they aren't able to actually do the job. Strange, isn't it?
It was US policy to make them extra-legal but not illegal in the US after 9-11. Congress worked with these groups to write laws that refuse to criminalize what they do when it's done on citizens. In fact, it no longer matters which side of the spectrum holds the reins, they feel empowered and will continue to do so until laws are written regulating their industry.
Make no doubt about it, they are terrorists. They can be treated like terrorists and people have the right to robustly defend themselves. After I cover the legal aspect, I'll spell out what a robust defense really means.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).