Erin Olszewski
How does a nurse that specialized in psychological operations end up in an alt-music video with Robert Malone?
For what purpose? To gain social proof and popularity.
Buy her narrative. Buy her book. Buy her time.
Speaking events + Tours = Influence.
Does 2 + 2 = 5?
Only with Captain Toodles.
THE RISE OF ERIN OLSZEWSKI
THE RISE OF ERIN OLSZEWSKI
CLICK to EXPAND
Erin Malone Olszewski describes herself as a lifelong business owner and the “Undercover Nurse of Elmhurst”. earlier assignment to the 432nd Civil Affairs Battalion provides her with a unique skillset.
During an interview on Alex Jones, Olszewski hints she took part in [covert action?] operations while in the Middle East.
She likely uses the knowledge, skills, and abilities acquired in the military to operate [knowingly or unknowingly] in the capacity of a case officer.
Olszewski’s political affiliation with Scientologist lobbyist Greg Mitchell, Leigh Dundas, COGOP Chair candidate Jonathan Lockwood, and ‘Militia Mom’ Denise Aguilar make her a key asset.
//SUMMARY//
Olszewski’s rise to prominence occurred in the summer of 2020 after her ‘chance’ assignment to Elmhurst Hospital in New York.
Prior to her Elmhurst assignment, analysts first observed Olszewski’s protest activities in California (MAR 18). Olszewski moved from Wisconsin to Florida later that summer.
Shortly after moving, Olszewski met other prominent West Coast activists in Atlanta, GA for a photo op with Dr. Paul Offit (OCT18).
Coincidentally, Denise Aguilar participated in the same picture with Paul Offit. Two months before, Aguilar planned a large rally in two weeks with no previous experience.
Laira de la Vega is a Mitchell Firm asset and co-planner for the rally. She admitted the goal for the rally was to mimic the Yellow Vest movement in Italy.
Even so, the Offit photo op had its intended effect successfully agitating the anti-vaccine community.
The goal was to funnel the angry parents into organizations participating in what are called euphemistically as civil disobedience events.
Olszewski worked on four new non-profit organizations in less than six months (OCT18 – APR19).
Sources report social media chatter for a fifth organization during the summer of 2019.
Olszewski’s behaviors as president of non-profit organization are atypical.
She attempted to embed personnel like Rachel Celler, the Forensic Nurse. A brief look at Celler’s history alone should have us question Olszewski’s judgement.
She also brought former USAF Public Affairs Officer and huckster Kevin Gene Tuttle into the anti-vaccine movement. Sources report a very close relationship between both parties while in operating in Wisconsin.
It is notable that Kevin Gene Tuttle operated a fake non-profit organization called AERIC. Analysts observed Olszewski with AERIC board members at protests in California.
Lastly, Olszewski’s organizations functioned as a temporary means to fund operations. At the same time the organizational charter focused on protest activity.
Analysts observed Florida Freedom Alliance’s affiliation to the Yellow Vest [Color Revolution] protests. The operation included personnel from organizations in Wisconsin and Florida.
Like Denise Aguilar, Erin Malone Olszewski’s rise to fame and influence within the anti-vaccine movement is not an accident.
We assess Erin’s skillset align more with Mitchell Firm operations versus a serious leader of a non-profit organization.
Facts to know: 1) Proper paperwork takes about one month of effort out of the calendar year to operate a successful non-profit. 2) Erin Olszewski worked directly for the Mitchell Firm. 3) Erin Olszewski’s activities on social media and in business indicate inorganic growth with a high degree of sponsorship.
//RISE OF ERIN OLSZEWSKI//
[08:55] Video Playtime
=====[Video Markers] =====
[00:15] Not the first time undercover
[00:24] Doesn’t have typical job
[00:28] Works for WASH DC lobbyist
[00:36] Military ‘movement within movement’
[00:49] Rachel Celler Forensic Nurse
[00:55] Erin and Aly Legge
[01:06] Matthew Legge HUMINT recruiter
[01:11] Aly Legge, Capt Toodles, Erin Olzsewski
[01:18] Military plant in Florida
[01:26] Scripted question to Olzsewski
[01:36] Alex Jones question
[01:55] Erin grows up in broken family
[02:03] Travels to multiple US cities
[02:10] #InVinoVeritas
[02:32] Expensive to travel
[02:39] Travel with financial issues
[03:05] Erin claims she doesn’t want money
[03:07] Nurses for Vaccine Safety Alliance
[03:23] Rachel Celler and felonies
[03:39] Social Media astroturfing
[04:10] Attention-seeking behavior
[04:24] Multistate nursing license
[04:34] Can’t account for schedule
[04:39] Sells home (31MAY18)
[04:54] Home sale overlaps activism
[05:06] Business opportunities (27JUN18)
[05:35] Moves to Florida (17JUL18)
[06:04] Meets with Paul Offit (OCT 18)
[06:15] Law student and doctor
[06:33] Women are jealous bitches
[06:40] Talks about Offit photo op (OCT 18)
[07:18] Admits Offit photo op is for agitation
[07:29] Kevin Gene Tuttle starts activism (OCT 18)
[07:51] Tuttle’s fraudulent non-profit
[08:19] Erin is a business owner
[09:00] #InVinoVeritas
Credits: Erin Marie Olszewski (Undercover Nurse), Kevin Gene Tuttle (USAF Public Affairs – Captain Toodles), Michelle Ford (Scientologist), Jonathan Lockwood (Colorado GOP Chair candidate), Greg Mitchell (Washington DC Lobbyist), Renee Bessone (Greg Mitchell’s wife), Denise Aguilar (Militia Mom), James Morgan Scherrer
Information provided by COINTEL 2.0
THE RISE OF DENISE AGUILAR
THE RISE OF DENISE AGUILAR
CLICK to EXPAND
Denise Aguilar is the self-purported leader of the “Mom Militia”, Freedom Angels, and Latinos for Medical Freedom.
Her rise to fame and influence within the anti-vaccine movement are no accident. Elements within Scientology and the Nation of Islam groomed her as part of an influence operation, labeled by our analysts as #OperationFuriosa.
//SUMMARY//
Denise Aguilar and Laira de la Vega coordinated a large rally on Monday, August 6, 2018 at the State Capital in Sacramento, California.
Her stated purpose for the “Rally for Justice” was to get media coverage for the lawsuit. Robert F. Kennedy, Jr and Del Bigtree won a lawsuit against Health & Human Services (HHS) for not filing required vaccine safety reports with Congress.
Aguilar used the event as social proof to penetrate the anti-vaccine movement.
Bigtree hosted Aguilar and Vega on an episode of the Highwire shortly after the rally.
COINTEL 2.0, [5/26/2021 3:19 PM]
Bigtree acknowledged three key facts: 1) he had no previous knowledge of Aguilar, 2) Aguilar never planned a rally prior to the 2018 event, and 3) Aguilar coordinated the event in less than two weeks.
We assess it is highly unlikely someone like Aguilar could plan a successful event without significant connections or resources in the allotted timeframe.
[Video Markers] Rise of Denise Aguilar
[00:10] Aguilar joins Bigtree on Highwire
[00:15] Bigtree not involved w/ planning rally
[00:28] Aguilar and Vega ‘brains’ behind rally
[00:34] Aguilar has skeletons in her closet
[00:40] Aguilar had idea for rally
[00:49] Bigtree admits he never met Aguilar
[00:51] Aguilar admits no experience
[00:59] Bigtree “surprised” on rally turnout
[01:05] Bigtree works with rally coordinators
[01:10] Script for rally is spontaneous
[01:30] Purpose of rally was to get media out
[01:41] Asset Kevin Gene Tuttle (USAF)
[01:54] Scientology & Conscience Coalition
[02:04] Lockwood and Denise Aguilar
[02:09] #InVinoVeritas
Credits: Del Bigtree, Denise Aguilar, Laira de la Vega, Austin Bennett, Kevin Gene Tuttle, Jonathan Lockwood (Colorado GOP Chair candidate), Greg Mitchell, Renee Bessone, Lynette Baron, Erin Marie Olszewski.
Information provided by COINTEL 2.0
Renne DiResta
Renee DiResta is an intelligence asset.
How does she relate to the others?
Look behind the scenes. The answers are in this channel if you so decide to look.
Remember. Your state groups were infiltrated by operatives for a larger objective.
Credit: COINTEL 2.0
Source: https://www.intelligence.senate.gov/sites/default/files/documents/os-rdiresta-080118.pdf
CLICK to EXPAND
Statement for the record from Renee DiResta, Director of Research, New Knowledge
Honorable Committee Members –
My name is Renee DiResta, and I research influence operations and social network
manipulation. I appreciate the opportunity to submit this written and verbal testimony to
your committee.
Over the past decade, disinformation, misinformation, and social media hoaxes have
evolved from a nuisance into high-stakes information war. Our frameworks for dealing
with them, however, remain the same — we discuss counter-messaging and
counter-narratives, falling into the trap of treating this as a problem of false stories
rather than as an attack on our information ecosystem. We find ourselves in the midst of
an arms race, in which responsibility for the integrity of public discourse is largely in the
hands of private social platforms, and determined adversaries continually find new ways
to manipulate evolving feature sets and circumvent new security measures. It is critical
to acknowledge that computational propaganda and disinformation is not about
arbitrating truth, nor is it a question of free speech. Information Warfare is a
cybersecurity issue, it is an ongoing national security issue, and it must be addressed
through a collaboration between governments responsible for the safety of their citizens
and private industry responsible for the integrity of their products and platforms.
Propaganda and malign narratives have existed for a very long time, but today’s
influence operations, which co-opt popular social platforms, are materially different – the
propaganda is shared by our friends, often in the form of highly effective, shareable,
immediately graspable memes. It is efficiently amplified by algorithms, and the
campaigns achieve unprecedented scale. To conduct an operation, adversaries
leverage the entire media ecosystem to push a narrative and manufacture the
appearance of popular consensus. The operation is planned on one platform, such as a
messaging or chat board. Content is created, tested, and hosted on others, such as
Reddit, Pinterest and YouTube. It’s then pushed to platforms like Twitter and Facebook,
with standing audiences of hundreds of millions of people, and targeted at those most
likely to be receptive to it. The platform’s trending algorithms are gamed to make the
content go viral – this often delivers the added benefit of mainstream media coverage,
increasing attention via traditional media channels including television. If an operation is
successful and the content gets wide distribution, or a manipulative Page or Group
gains enough followers, the recommendation engine and search engine will continue to
serve up the content on an ongoing basis.
We are here because the Internet Research Agency (IRA) employed this playbook,
conducting an operation that leveraged our social networks to spread propaganda and
disinformation directly to American citizens. Their operation likely began sometime in
2013, continued throughout the 2016 election cycle, and even increased on Instagram
in 2017. While many accounts were shut down in 2017 as the tech companies began
their investigations, Twitter accounts and Facebook pages associated with the IRA
remain active. The IRA content on Facebook and Instagram alone had hundreds of
millions of engagements; Facebook itself estimates 146 million users across the two
platforms were affected. The Internet Research Agency’s disinformation campaign was
conducted on all the major platforms in the social network ecosystem. The presence of
manipulated content on Facebook and Twitter is well-documented. In the case of
Alphabet, YouTube, G+, and other properties were leveraged to either host content or to
support personas. Reddit, Tumblr, and Medium have confirmed that they were misused;
Twitter’s Vine video app was co-opted as well, and IRA meme boards were discovered
on Pinterest. Games and music apps were created and pushed to teenagers to
download. Even popular game Pokemon Go was incorporated into the operation.
Outside of social platforms, a number of websites were created to host original written
content, many of which looked very much like citizen journalism-style blogs and think
tanks. Topics ran the gamut, from social issues to concerns about war, the environment,
corporate greed, GMOs, energy policy, and immigration. Twitter accounts were created
to masquerade as local news stations. White House petitions were either created or
co-opted to engineer a perception of social consensus. Dozens of Facebook Events
were promoted, and activists were contacted personally via Messenger, to take the
operation to the streets.
The Internet Research Agency’s campaign pressed on a variety of socially divisive
issues, but the primary focus was on racial tension. Despite YouTube’s claim that the
content attributed to the IRA on its platform was “not targeted to the US or to any
particular sector of the US population”, it appears that the overwhelming majority of the
videos we are aware of were related to issues of importance to the black community,
particularly officer-involved shootings. Hundreds of thousands of Americans liked
Facebook Pages with names like Blacktivist, Heart of Texas, and Stop All Invaders. The
percentage of explicitly political content that mentioned candidates by name was small –
approximately 10% of known content – but the political content targeting both
right-leaning and left-leaning Americans was unified in its negativity toward the
candidacy of Secretary Clinton. In pages targeting the left, this included content
intended to depress voter turnout among black voters, or to paint Secretary Clinton in a
negative light as compared to candidates Jill Stein or Senator Bernie Sanders. Only the
social networks that hosted this campaign are in a position to gauge its full impact in
changing voter attitudes on their respective platforms. However, independent of its
impact, the fact that it was attempted, went undetected, and achieved such significant
reach is sufficient cause for concern.
Although this hearing was convened because of the Internet Research Agency’s
interference in the 2016 election, Russia was not the first to target American citizens
with propaganda using the social ecosystem. In 2014, the co-opting of social
communication infrastructure rose to mainstream awareness in the United States as
ISIS established a virtual caliphate, using every social app imaginable to push
propaganda boldly and transparently, using the features of our of social ecosystem in
precisely the way they were meant to be used: to build an audience and connect with
followers. This was a visible indication that the tools built to enable marketers and
messengers and friends to communicate could be co-opted and misused; the ensuing
debate about what to do about the problem made it apparent to anyone watching that
no one was in charge, and that American companies, American civil society
organizations, and the American government were deeply divided on how to respond to
the threat. That confusion continues even as the threat expands beyond extremists and
state actors: the Wall Street Journal recently revealed that a private intelligence
company, Psy-Group, openly marketed their ability to conduct similar types of influence
operations to impact the 2016 election.
As the internet has evolved, we’ve seen the consolidation of users into large standing
audiences on a small handful of social networks. This infrastructure has been a
phenomenal tool for small businesses to reach customers, and for the previously
voiceless to find a voice. But like any tool without appropriate safeguards, it can be
misused. These platforms employ gameable algorithms, and facilitate personalized
targeting that is enabled by the ongoing collection of extensive amounts of personal
data. As a result, social networks continue to be the most effective vector to manipulate
public sentiment and cause lasting damage to our democratic process. To combat this
evolving threat, we have to address those structural weaknesses and design an
effective deterrence strategy.
Individually, several social platforms have begun to take steps to reduce the spread of
disinformation, by disrupting economic incentive structures, reducing the spread of
clickbait headlines, and reducing the granularity of targeting criteria that were used to
push malicious content directly to subsets of the American people. Political ad content
on Facebook and Twitter is somewhat public now; we look forward to this database
being searchable via API, better equipping researchers and journalists to understand
our paid political conversation. Several platforms are beginning to take source quality
into account, which may help curb the ability of manipulative propaganda websites to
reach their audience. These steps, several of which were inspired by prior hearings in
this chamber, are a good start. But as platform features and protections change,
determined adversaries will develop new tactics.
In addition to the ongoing exploitation of social divisions, targeting of elections, and
disinformation about geopolitical events (such as the conflict in Syria), campaigns
targeting U.S. industry have emerged and are thriving. Influence operations are
increasingly appealing to a variety of actors: ideological true believers, non-state
extremists, economically-motivated enterprises, and State Actors. The last of these
requires a whole-of-government defense strategy, as it’s unlikely that commercial
platforms will be able to compete with the sophistication of well-resourced and
motivated hostile foreign government experienced in bypassing common security
checks.
The gaps in our ability to combat this type of information warfare became apparent
while attempting to address ISIS propaganda: the U.S. government was legally
constrained in its ability to respond, and the social platforms proved slow to act as
extremist content, assisted by platform targeting algorithms, easily made its way into the
social feeds of Americans. That wake-up call fell on deaf ears as our adversaries
prioritized, deployed, and perfected their influence operation capabilities. They were
able to exploit gaps in our intelligence community’s authorities, and take advantage of
our commitment to civil liberties; this left social platforms in the impossible position of
having to individually respond to this global threat, which has resulted in the
implementation of inadequate solutions and self-serving defensive policies on the part
of those private companies.
Several years after the threat emerged, the U.S. Government and the tech industry
respectively took small steps towards combating this threat by establishing the Global
Engagement Center and the Global Internet Forum to Counter Terrorism. The focus of
the latter is still solely terrorism, although the Global Engagement Center’s mandate has
expanded to countering foreign propaganda. The DOJ and NSA & Cyber Command’s
recent announcements that they will prioritize the mitigation and prosecution of this
activity is a positive sign. However, addressing this asymmetric threat requires a 21st
century Information Operations Doctrine, the implementation of a global real-time
detection and deterrence strategy, and the cooperation of private industry, press, law
enforcement, and the intelligence community.
The evolution of social media propaganda and influence techniques will bring serious
threats. We should anticipate an increase in the misuse of less popular and less
resourced social platforms, and an increase in the use of peer-to-peer messaging
services. We believe that future campaigns will be compounded by the employment of
witting or unwitting U.S. Persons through whom these state actors will filter their
propaganda, in order to circumvent detection by social platforms and law enforcement.
We should anticipate the incorporation of new technologies, such as videos and audio
produced by artificial intelligence, to supplement these operations, making it
increasingly difficult for citizens to trust their own eyes.
This will be one of the defining threats of our generation. Influence operations exploit
divisions in our society using vulnerabilities in our information ecosystem. They take
advantage of America’s commitment to freedom of speech and the free flow of ideas.
The social media platforms cannot, and should not, be the sole defenders of democracy
and public discourse. In that light, here are several recommendations we are proposing
toward achieving the goal of restoring integrity to the information ecosystem:
First, to address the most pressing short term issue, we recommend immediate
government action to identify and eliminate malign influence campaigns and to educate
the public in preparation for the 2018 elections.
Second, this domestic defense must be complimented by an updated global IO doctrine
and international detection and deterrence strategy, with the goal of mitigating foreign
influence targeting our allies, including the clear delegation of responsibility of this
activity within the U.S. Government. Taking example from the U.S. Government’s cyber
security response over the past decade, we must implement legislation that defines and
criminalizes foreign propaganda that targets not just our political process but also
addresses the targeting of commercial industry and social issues. Empowering law
enforcement with updated legal tools to investigate and prosecute sophisticated foreign
propaganda is essential to combatting this threat in the age of information warfare.
Third, the private tech platforms must be held accountable to ensure that they are doing
their utmost to manage and mitigate the pervasiveness of disinformation and
manipulative narratives in our privately-owned public squares. A number of regulatory
frameworks are on the table, including mandating that automated accounts be labeled,
limiting high-frequency advertising practices, and curtailing and reporting inauthentic
accounts. Regardless of which is chosen, and whether these policies are implemented
voluntarily by platforms (self-regulatory action) or via formal regulation, the incorporation
of oversight is key.
Finally, given that this asymmetric persistent threat impacts our social, geo-political, and
economic spheres, and given the sophistication of its tradecraft, we need new
structures for cooperation and information sharing between the public and private
sectors. Formal partnerships between security companies, researchers, and
government will be essential to defending our values, our democracy, and our society.
Thank you
Comments are closed.