Jackie Singh's Avatar

Jackie Singh

@hackingbutlegal

Twitter: @hackingbutlegal Mastodon: @hackingbutlegal@toad.social

26,225
Followers
47
Following
359
Posts
06.07.2023
Joined
Posts Following

Latest posts by Jackie Singh @hackingbutlegal

Preview
The Industry That Fights Governments for a Living Won't Fight This One On clearances, salaries, and the structural silence of the American infosec community.

Infosec pros fight ransomware, APTs, and foreign disinfo for a living. But when Trump weaponizes clearances, hollows out @CISAgov, and unleashes @DOGE as a systemic insider threat, our industry mostly chooses self‑preservation.

I unpack that trap: www.hackingbutlegal.com/p/the-indust... #infosec

07.03.2026 01:26 πŸ‘ 7 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Preview
Trump Pardon Buries FBI's Secret Work for Putin's Oligarchs The former FBI agent's pardon came after his co-defendant’s daughter donated $3.5 million to Donald Trump

🚨 Trump has pardoned a former FBI counterintelligence agent who had refused to testify about his work for Oleg Deripaska and Dmitry Rybolovlev – two Russian oligarchs with direct ties to Putin’s inner circle.
@bylinetimes.bsky.social @hackingbutlegal.bsky.social
bylinetimes.com/2026/02/11/t... ⬇️

17.02.2026 17:00 πŸ‘ 296 πŸ” 262 πŸ’¬ 29 πŸ“Œ 35

Three typos just in this paragraph alone and NO IOCs πŸ€”πŸ€”πŸ€”πŸ€”πŸ€”

"Multiple independaent security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign."

02.02.2026 14:37 πŸ‘ 2 πŸ” 1 πŸ’¬ 2 πŸ“Œ 0

Three typos just in this paragraph alone and NO IOCs πŸ€”πŸ€”πŸ€”πŸ€”πŸ€”

"Multiple independaent security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign."

02.02.2026 14:37 πŸ‘ 2 πŸ” 1 πŸ’¬ 2 πŸ“Œ 0

We have scores of men, women, and children kidnapped by government forces and we often don't know where they are or if they are safe or alive.

31.01.2026 03:55 πŸ‘ 34 πŸ” 9 πŸ’¬ 1 πŸ“Œ 0

Jackie’s breakdown here is a masterclass on how/why psyops are effective. Long, but worth it.
🎩 @norby36.bsky.social
@jupiterdi.bsky.social @okovody.bsky.social @indigopatricia.bsky.social @blukryptonian.bsky.social @jeffjwarwick.bsky.social @redrumofcrows.bsky.social @satirehat.bsky.social

30.01.2026 23:36 πŸ‘ 18 πŸ” 9 πŸ’¬ 2 πŸ“Œ 0
Post image
27.01.2026 21:16 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Strange Case of ICE at the Winter Olympics Trump is sending ICE agents to Italy. The backlash has been fierce.

🚨 NEW: ICE’s investigative arm (HSI) is being slotted into U.S. Olympic security in Italy in a way that appears without public precedent. I mapped the trail, missing record, and political motiveβ€”plus the intimidation video that detonated outrage in Italy.

πŸ”— www.hackingbutlegal.com/p/the-strang...

27.01.2026 21:15 πŸ‘ 9 πŸ” 8 πŸ’¬ 2 πŸ“Œ 0
Post image

NEW: The Pittman case isn't terrorism. It isn't "just" mental illness. It's something we don't have a name for yet, and that's exactly the problem.

Report: www.hackingbutlegal.com/p/when-psych...

26.01.2026 14:49 πŸ‘ 16 πŸ” 8 πŸ’¬ 1 πŸ“Œ 0
Preview
Anatomy of a Modern Phishing Attack How a single suspicious email from Reagan.com reveals a cybercrime operation spanning three continents, thousands of vulnerable routers, and flaws in Google’s most advanced email protection

A really detailed breakdown by @hackingbutlegal.bsky.social on a phishing campaign that Google's authentication missed. How does the average user stand a chance against this level of sophistication?

Anatomy of a Modern Phishing Attack
open.substack.com/pub/hackingb...

21.01.2026 11:50 πŸ‘ 15 πŸ” 7 πŸ’¬ 1 πŸ“Œ 3

A fairly long read but a real eye-opener for me on how devious scammers have become, and the importance of very sophisticated criminally managed and operated Phishing As A Service companies.

21.01.2026 12:21 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

πŸ™

26.01.2026 14:47 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Almost nothing makes it through. It's very effective. I know a large part of it is auth, but Google advertises APP primarily as an anti-phishing capability, and they claim: "Strong protections against malware are built into all Google products [...] but A.P. performs even more stringent checks."

26.01.2026 14:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Thanks Mike; my config is correct. The content was toxic and shouldn't have landed in my inbox. It wasn't delivered with a warning banner. As I wrote in the story, Gmail flagged it as "Important".

26.01.2026 14:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

NEW: Anatomy of a Modern Phishing Attack

How a single suspicious email from Reagan[.]com reveals a cybercrime operation spanning three continents, thousands of vulnerable routers, and flaws in Google’s most advanced email protection πŸ‘‡πŸŽ£

www.hackingbutlegal.com/p/anatomy-of... #infosec

21.01.2026 11:25 πŸ‘ 14 πŸ” 8 πŸ’¬ 1 πŸ“Œ 1

Oh you don't have to credit me for anything, Will. Thank you for supporting my work and please feel free to repost anything of mine with or without attribution.

06.01.2026 19:38 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

"A 2016 Politico investigation into the Kremlin’s media strategy identified Flynn as a prime example of how Russia was successfully recruiting and amplifying disaffected members of the American establishment."

06.01.2026 18:27 πŸ‘ 12 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
Preview
a red object is on a table next to a person 's hand ALT: a red object is on a table next to a person 's hand
06.01.2026 19:37 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

🚨 NEW: Cognitive warfare isn't just about "fake news" or propaganda; it's the weaponization of public opinion and the systematic manipulation of the human mind as a field of battle.

To understand how this works in practice, we must examine the mechanics.

πŸ”— www.hackingbutlegal.com/p/the-qanon-...

06.01.2026 02:09 πŸ‘ 26 πŸ” 15 πŸ’¬ 2 πŸ“Œ 3
Post image

🚨 NEW: Cognitive warfare isn't just about "fake news" or propaganda; it's the weaponization of public opinion and the systematic manipulation of the human mind as a field of battle.

To understand how this works in practice, we must examine the mechanics.

πŸ”— www.hackingbutlegal.com/p/the-qanon-...

06.01.2026 02:09 πŸ‘ 26 πŸ” 15 πŸ’¬ 2 πŸ“Œ 3
Preview
Explainer: How AdTech Doubles as an Intelligence Platform The Dossiers About Us Are More Detailed than the Stasi Could Have Imagined

Online ads generate detailed commercial profiles of users in real time in order to decide which ad to display. This is ready made infrastructure for mass surveillance by a government:
www.hackingbutlegal.com/p/explainer-...
(by Jackie Singh, AKA @hackingbutlegal.bsky.social)

23.12.2025 02:09 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Hmm

19.11.2025 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

What happened at Quantico wasn’t just theater. It was a blueprint: punish dissent, erase DEI, police the homefront. You don’t need to agree with me. You only need to read what was said, verbatim, by the Secretary of "War" and POTUS. Then decide if this is the military you want.

02.10.2025 00:45 πŸ‘ 18 πŸ” 6 πŸ’¬ 0 πŸ“Œ 1
Preview
Pete Hegseth Revives Segregation in the "War" Department Loyalty Tests and Identity Purges Now Threaten America’s Fighting Force

READ: Pete Hegseth Revives Segregation in the "War" Department, Employs PsyOps Against America's Warriors

www.hackingbutlegal.com/p/pete-hegse...

02.10.2025 00:32 πŸ‘ 8 πŸ” 3 πŸ’¬ 0 πŸ“Œ 1

You are correct when you surmise their intention to commit war crimes. They are actively committing a litany of human rights violations against their own people and I believe they intend to escalate even further. Their eugenicist policies are part and parcel of the coup. bsky.app/profile/hack...

28.09.2025 12:34 πŸ‘ 13 πŸ” 7 πŸ’¬ 0 πŸ“Œ 1

You are correct when you surmise their intention to commit war crimes. They are actively committing a litany of human rights violations against their own people and I believe they intend to escalate even further. Their eugenicist policies are part and parcel of the coup. bsky.app/profile/hack...

28.09.2025 12:34 πŸ‘ 13 πŸ” 7 πŸ’¬ 0 πŸ“Œ 1
Post image

Only an administration intent on committing war crimes in the present and future would stoop to calling Wounded Knee a "battle" rather than what it truly was: a massacre of over 250 Lakotas, mainly women, children, and the elderly. 1/

26.09.2025 11:11 πŸ‘ 20612 πŸ” 7428 πŸ’¬ 1032 πŸ“Œ 787
Post image

I am officially begging you to READ and REPOST this FREE story with everyone you know.

Please! πŸ™

www.hackingbutlegal.com/p/the-case-f...

01.09.2025 18:51 πŸ‘ 40 πŸ” 21 πŸ’¬ 2 πŸ“Œ 9

"The strategic 'correction' of high-profile 'mistaken' detentions, is a sophisticated form of denial. By performatively releasing a detained citizen, the state creates the illusion of a self-correcting system, diverting public outrage...and...normalizing increasing levels of 'collateral damage'.."

01.09.2025 22:01 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Thank you for keeping your eyes, mind, and heart open enough to read it.

19.09.2025 14:33 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0