Anonymous Ukraine Hack Correspondence of US Army Attache Assistant in Kiev and Discover a Plot Against Ukraine from Spike EP on Vimeo.
Ihor,
Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it's time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.
Respectfully,
JP
Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 - 5444 | Fax (380-44) 521 - 5636
Hello
We are Anonymous Ukraine
We have hacked e-mail correspondence of US Army Attache Assistant in Kiev Jason Gresh and a high ranking official from Ukrainian General Staff Igor Protsyk.
It appears that they are planning to conduct a series of attacks on Ukrainian military bases in order to destabilize the situation in Ukraine.
Particularly, Jason Gresh writes to Igor Protsyk that it’s time to implement a plan that implies “causing problems to the transport hubs in the south-east of Ukraine in order to frame-up the neighbor. It will create favorable conditions for Pentagon to act”, says Jason Gresh.
In his turn, Protsyk writes to some "Vasil" and tells him to arrange an attack on an airbase of 25 aviation brigade of Ukrainian air force stationed in Melitopol.
This "Vasil" is responsible for arranging the details of the attack, gathering of the gunmen and providing them with a map of sites that are chosen to be attacked.
We strongly recommend everyone to look through these documents. There you will find all the details.
(SNIP - Turner Radio Network will not directly reproduce the Hyper-Links to the 7.9 MB files full of allegedly stolen emails)
--------------------- END of Anonymous' Announcement -----------------
Behold, what is alleged to be one of the hacked e-mails, complete with IP addresses, e-mail addresses and full internet server routing information PROVING state-sponsored terrorism, perpetrated by the United States government, specifically designed to start a war with Russia:
From: "Gresh, Jason P" < GreshJP@state.gov>
To: igor.protsyk@gmail.com, i.v.protsyk@mil.gov.ua
Subj: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Delivered-To: igor.protsyk@gmail.com
Received: by 10.220.4.2 with SMTP id 2csp62561vcp;
Sun, 9 Mar 2014 08:57:15 -0700 (PDT)
X-Received: by 10.224.51.74 with SMTP id c10mr35436450qag.33.1394380635325;
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Return-Path: < GreshJP@state.gov>
Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
for < igor.protsyk@gmail.com>
(version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of GreshJP@state.govdesignates 169.253.194.10 as permitted sender) client-ip=169.253.194.10;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of GreshJP@state.gov designates169.253.194.10 as permitted sender) smtp.mail= GreshJP@state.gov
Received: from EEAPPSEREDG02.appservices.state.sbu ([10.47.98.102])
by haig2.state.gov with ESMTP id s29FgT0w013967-s29FgT0x013967;
Sun, 9 Mar 2014 11:42:29 -0400
Received: from EEAPPSEREX06.appservices.state.sbu (10.47.98.206) by
EEAPPSEREDG02.appservices.state.sbu (10.47.98.102) with Microsoft SMTP Server
(TLS) id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Received: from KIEVMB01.eur.state.sbu (10.168.34.7) by
EEAPPSEREX06.appservices.state.sbu (10.47.98.206) with Microsoft SMTP Server
id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MimeOLE: Produced By Microsoft Exchange V6.5
Subject: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Message-ID: < 71C9088C4C6F7A4582772808F54C25520349E214@KIEVMB01.eur.state.sbu>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Peninsula
Thread-Index: Ac87sDqNfxCUW94zShqj0tXF8YAqGQ==
From: "Gresh, Jason P" < GreshJP@state.gov>
To: < igor.protsyk@gmail.com>, < i.v.protsyk@mil.gov.ua>
X-FEAS-SYSTEM-WL: 10.47.98.102
Ihor,
Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it's time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.
Respectfully,
JP
Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 - 5444 | Fax (380-44) 521 - 5636
To: igor.protsyk@gmail.com, i.v.protsyk@mil.gov.ua
Subj: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Delivered-To: igor.protsyk@gmail.com
Received: by 10.220.4.2 with SMTP id 2csp62561vcp;
Sun, 9 Mar 2014 08:57:15 -0700 (PDT)
X-Received: by 10.224.51.74 with SMTP id c10mr35436450qag.33.1394380635325;
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Return-Path: < GreshJP@state.gov>
Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
for < igor.protsyk@gmail.com>
(version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of GreshJP@state.govdesignates 169.253.194.10 as permitted sender) client-ip=169.253.194.10;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of GreshJP@state.gov designates169.253.194.10 as permitted sender) smtp.mail= GreshJP@state.gov
Received: from EEAPPSEREDG02.appservices.state.sbu ([10.47.98.102])
by haig2.state.gov with ESMTP id s29FgT0w013967-s29FgT0x013967;
Sun, 9 Mar 2014 11:42:29 -0400
Received: from EEAPPSEREX06.appservices.state.sbu (10.47.98.206) by
EEAPPSEREDG02.appservices.state.sbu (10.47.98.102) with Microsoft SMTP Server
(TLS) id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Received: from KIEVMB01.eur.state.sbu (10.168.34.7) by
EEAPPSEREX06.appservices.state.sbu (10.47.98.206) with Microsoft SMTP Server
id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MimeOLE: Produced By Microsoft Exchange V6.5
Subject: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Message-ID: < 71C9088C4C6F7A4582772808F54C25520349E214@KIEVMB01.eur.state.sbu>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Peninsula
Thread-Index: Ac87sDqNfxCUW94zShqj0tXF8YAqGQ==
From: "Gresh, Jason P" < GreshJP@state.gov>
To: < igor.protsyk@gmail.com>, < i.v.protsyk@mil.gov.ua>
X-FEAS-SYSTEM-WL: 10.47.98.102
Ihor,
Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it's time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.
Respectfully,
JP
Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 - 5444 | Fax (380-44) 521 - 5636
Jason P. Gresh's Summary
Currently serving as the Assistant Army Attache at the U.S. Embassy, Kyiv, Ukraine.
Advises the U.S. Ambassador to Ukraine, European Combatant Command, Headquarters U.S. Army, and the Joint Chiefs of Staff on Ground Force military issues pertaining to the country of Ukraine. Helps formulate and synthesize U.S. security strategy towards the greater Black Sea region.
A Foreign Area Officer with 16 plus years experience in the U.S. Army. Formerly commanded as an Armor Officer at the platoon and company level.
Jason P. Gresh's Experience
Assistant Army Attache
U.S. Embassy, Kyiv, Ukraine
2011 – Present (3 years)
Assistant Army Attache
U.S. Embassy Kyiv
June 2011 – Present (2 years 10 months)
Graduate Research Assistant
Woodrow Wilson International Center for Scholars
Nonprofit; 51-200 employees; Think Tanks industry
June 2009 – August 2009 (3 months) Washington D.C. Metro Area
Assistant to the ODC
U.S. Embassy, Dushanbe
January 2008 – May 2008 (5 months)
Company Commander
1st Battalion, 63rd Armor
November 2004 – December 2005 (1 year 2 months) Vilseck, Germany
Platoon Leader
1st Squadron, 3rd ACR
1998 – 2001 (3 years)
Jason P. Gresh's Languages
*
English
(Native or bilingual proficiency)
*
Russian
(Professional working proficiency)
*
Ukrainian
(Professional working proficiency)
Jason P. Gresh's Skills & Expertise
1. Security Clearance
2. International Relations
3. National Security
4. Policy Analysis
5. Research
6. Government
7. Counterterrorism
Jason P. Gresh's Education
Georgetown University
Master of Arts (M.A.), Russian, Central European, East European and Eurasian Studies
2008 – 2010
George C. Marshall Center
2007 – 2008
United States Military Academy at West Point
B.S., Civil Engineering
1993 – 1997
Activities and Societies: Chapel Ushers, Cadet Orienteering Team
UPDATE 1:43 AM EDT MARCH 13, 2014
A map of an Melitopol.airport was attached to one of the allegedly hacked emails showing exactly what parts of an airport the U.S. wanted attacked by terrorists they were paying. According to one of the allegedly hacked emails,this airport was/is to be attacked on March 15. That map, with Russian writing on the image, is shown below (Click image to enlarge):
No comments:
Post a Comment