They send death threats. They wage disinformation campaigns.
In August 2017, he launched a hashtag that translates to #the_black_list in English — it threatened dissidents that they would be "followed" if tagged.
We did it by using information leakage on Twitter and Google's password recovery pages.
+966 55 548 9750 and email@example.com are both linked to @saudq1978's verified Twitter account.
His firstname.lastname@example.org account was trickier.
We couldn't confirm it using information leakage. We relied on a telling exchange with a Hacking Team employee.
And in 2010. And in 2015.
He was also hacked in 2015, and someone used his account to defraud users of Bitcoin.
He got his account back & recommended everyone turn on #2FA.
Reminder: This is a top intel official.
Well, he bought and used as much remote hacking malware (RATs) as he could, including Blackshades, which was the subject of an unprecedented global law enforcement operation.
He paid for the deletion of a YouTube channel & said a Hack Forums user had deleted 20 videos for him. He sought a tool to ban Twitter profiles
The Lord of the Flies also had an insatiable appetite for MOAR BOTS.
The most disturbing finding was al-Qahtani's network of domains, some of which were used for hosting malware and launching DDoS attacks.
We encourage readers to build off these findings in your own investigations.
Suffice to say, nothing good.
In the meantime, please read the report.
Victims like #Khashoggi are owed the truth.
In fact, if @guardian's reporting is correct, he's still very much active.
The UN's @AgnesCallamard wants him investigated. We agree.