Group 2: window entry. First man in helped by others, is wearing a bulletproof plate visible as a bulge under his jacket. Other men with kevlar helmets follow with heavy military backpacks & gear.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
WILD: actual photo of Musk-hired door knockers being driven around #Michigan.
This group of mostly-black workers were driven in the back of a truck with no seats.
They say they were flown in, given unrealistic goals, and threatened with their lodging being cut off & being forced to pay their own way home if they couldn't meet them.
Some didn't even know which candidate they were working for.
A "PRO-ISRAEL TEAM WE CAN TRUST" designed to look like a #HarrisWalz campaign ad is micro-targeted to areas with a high muslim population around Dearborn, Michigan.
Meanwhile, same Musk-backed PAC has a "WHY PANDER TO PALESTINE?" ad micro-targeted to areas in Pennsylvania.
2/ Beyond targeting the national election, specific Senate & House races were also a focus of efforts. As were specific figures like @SenatorBaldwin, who was apparently a perennial target.
3/ @DarrenLinvill is absolutely right here.
This campaign exposed by the @ClemsonHub team still gives off early-day vibes.
It is only going to get more sophisticated from here.
Manufacturers of networking and phone gear must follow specific standards for 'lawful interception' in different jurisdictions (e.g. CALEA & ETSI's standards)
But as we learn time & time again, the scope of potential access & harm almost never matched by efforts to detect & block malicious use.
There's constant pressure from governments to bake-in systems for access.
Failure to comply with those demands is met with big sanctions. Just look at Durov.
Yet I predict that there will be zero meaningful accountability over this breach.