John Scott-Railton Profile picture
Jan 27, 2021 16 tweets 14 min read Read on X
MUST WATCH: investigation by @WSJ shows 100+ Proud Boys coordinating, instigating and leading key elements of the #Capitol breach

Proud Boy 1: "Lets take the f* ** capitol"
Proud Boy 2: "Lets not F*** yell that alright"...

Etc.

wsj.com/video/video-in…
2/ The investigation walks through the footage (props to @WSJ, there's so much!) starting with Proud Boys staging under the direction of leaders including (now-arrested) Joe Biggs outside the #Capitol ImageImageImage
3/ In the staging area, a Proud Boy identified as Dan Scott aka 'Milkshake' yells "lets take the f***ng capitol"
-Milkshake is admonished by another PB.
-Someone makes fun of 'Milkshake' for the indiscretion(?). Some laughter.
-"Don't yell it, do it" says another, quietly. ImageImageImageImage
4/ The @WSJ places key Proud Boys from pre-breach meet-ups as instigators of later violence and activity by the crowd.

This absolutely matches what many of us have observed... ImageImage
5/ Breach begins: @WSJ finds Proud Boys leader Joe Biggs in the crowd at an outer police cordon, communicating with a man in a red hat.

Minutes later, red hat man is the 1st past the breached police line. ImageImageImage
6/ As the first police line goes down we see multiple identifiable Proud Boys at the front. @WSJ names Michael Porter, for example.

Note the orange tape on helmets. This is an identification sign that many of us observed Proud Boys using throughout the day. Image
7/ Proud Boys stay at the front of the rush of people, squaring off as they encounter #Capitol Police at the West Entrance. The @WSJ spots Proud Boy #Spazzo.

Remember him? He was the earpiece-wearing window breacher. ImageImage
@WSJ 7/ Zen sidebar on window-breacher Dominic ‘Spazzo’ Pezzola: his lawyer claimed to the @WSJ that his radio earpiece was "for listening to music" Image
8/ A Proud Boy exhorts the crowd gathering in front of the police line at base of Capitol:

"Do you want your house back?... Take it!"

Note the orange tape. Also, here's now-arrested Robert Gieswein.

Details on how some of us originally ID'd him here👇 ImageImage
9/ After staying in the front of the melee w/police... some Proud Boys flank the officers and join a group fighting their way up the left side, through scaffolding and stairs.

Dominic ‘Spazzo’ Pezzola & Gieswein are spotted. Gieswein sprays something at officers... ImageImage
10/ Its 2:12 pm. Now up the stairs and against the building Dominic ‘Spazzo’ Pezzola uses a police shield to breach the window, then steps back and lets others including Gieswein inside accompanied by cries of "Go go go!" Then joins them. ImageImage
11/ The breaching party is inside. Men including Gieswein & Spazzo encounter, then chase officer Eugene Goodman up the stairs..

They come incredibly close to the undefended lawmakers in the Senate (door highlighted in blue). Thankfully, Goodman distracts them. ImageImage
12/ Proud Boys leader Joe Biggs isn't far behind.

"This is awesome"

Pic right: Biggs has told @DailyMail he
- only went into the #Capitol to find a bathroom
- no planned storming...
- he actually meant "awe-inspiring" & also "awful"

SMH.

Source: dailymail.co.uk/news/article-9… ImageImage
13/ Shortly after, and now back outside, the main police line is breached. Other Proud Boys make it into #Capitol with this larger group. One takes this selfie.

Another roams halls calling out for @SpeakerPelosi to "come out and play" His lawyer says "comments were in jest" ImageImageImage
14/ The @WSJ piece is an excellent, damming illustration of what many of us observed: Proud Boys played a key role at the #Capitol.

Congrats to the team that assembled it & their colleagues that helped out.

Why I'm a @WSJ subscriber. Subscribe here: subscribe.wsj.com
15/ Coda: Robert Gieswein wore several patches, including Woodland Wild Dogs (his own thing), & has some militia connections.

However, remains unclear (to me) whether his co-presence w/Proud Boys around #Capitol points a longer-term relationship.

Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Jul 10
NEW: Mexico's former president under investigation for taking bribes from spyware industry.

Contracts included #Pegasus deal.

Story from @TheRecord_Media's Suzanne Smalley 1/Image
Image
Image
2/ Mexico's former president is denying everything...

But folks may recall that Pegasus was massively and systematically abused in Mexico.

Against journalists, spouses of cartel victims, lawyers, families of cartel-disappeared people, anti-corruption groups etc. etc.

There were so many cases that we eventually had EIGHT investigative reports...
therecord.media/former-mexican…Image
3/ What still gives me chills is how many cases surfaced of people killed by cartels... or their family members... getting targeted with Pegasus spyware.

The #PegasusProject found even more potential cases in Mexico. Image
Image
Image
Image
Read 5 tweets
Jun 18
🚨NEW REPORT: exposing a new hacking tactic.

🇷🇺Russian state-backed hackers used an App-Specific Password attack against prominent Russia expert @KeirGiles & others.

It's like they know what we all expect from them...and then did the opposite 1/

By us @citizenlab & @google's GTIGImage
Image
Image
2/ Let's begin: @KeirGiles gets a message purporting to be from @StateDept asking for a consultation.

The attackers send the message from a @gmail, but CC'd a bunch of email addresses @ state.gov.

Strong credibility signal to have a bunch of gov ppl on the CC line right?

Well, what the attackers were counting on is that the State Dept mailserver just accepts all email addresses without emitting a bounce.

So they seem to have just created some fake State Dept staff names and addresses.Image
3/ The attackers wait for the 2nd interaction to introduce the pivotal deception: getting @KeirGiles to 'connect to a secure platform.'

In the next days they patiently walk him through what they want him to do, even sending a very official looking (but fake) State Dept. documentImage
Image
Read 10 tweets
Jun 12
🚨NEW INVESTIGATION: We just forensically unmasked #Paragon's Apple spyware.

Zero-click targets: Journalists. In 🇪🇺Europe.

Like 🇮🇹Italian reporter @ciropellegrino.

Reopen's #Italy's spyware scandal.

Follows our @citizenlab investigation of their Android spyware. 1/ Image
2/ Back in April, @Apple sent out a threat notification to a select group of users. Some got in touch with us @citizenlab to get analyzed.

They'd been targeted with a sophisticated zero-click attack (think: no click, no attachment to open, no mistake needed...).Image
3/ While my brilliant colleague @billmarczak was working on the phone of a prominent European journalist, he made a smoking gun discovery:

Requests to server matching our P1 fingerprint for #Paragon's graphite.

Paragon's 'undetectable' Apple spyware had just been found...Image
Image
Image
Read 13 tweets
Jun 9
NEW: #Italy's spyware scandal just deepened.

Just days ago, #Italy claimed to not know who targeted Journalist @fcancellato with #Paragon spyware.

But now the spyware company is dropping heavy hints that this wasn't the full story👇
2/ Last week the #Italian government published a report acknowledging that they were responsible for certain #paragon spyware cases.

But left the politically trickiest case unanswered...
3/ Paragon frames itself as the anti-NSO... a "clean" spyware company.

But it didn't take long for them to get mired in an mess scandal in #Italy.

Now it looks like they are trying to find a way to fully wash their hands of the affair...

Read 7 tweets
Jun 6
NEW: Italy admits hacking activists with #Paragon spyware.

Blow to the reputation of a mercenary spyware company that marketed itself as an ethically clean anti-NSO.

But the official investigation doesn't answer a big mystery that's bad for #Italy & Paragon 1/..

By @omerbenjImage
2/ While Italy confirms the activist cases, they deny doing the politically explosive one:

Journalist & @fanpage editor Francesco Cancellato, whose reporting has tangled with the Prime Minister.

So who pointed Paragon against @fcancellato?

None of the answers are good... Image
3/ If we take the Italian government's claims to not know who targeted Italian journalist @fcancellato at face value...

Then it is a very bad look for #Paragon to have this case unexplained.

Who pointed their Graphite spyware at this European journalist?Image
Read 6 tweets
May 20
NEW: Pegasus spyware maker NSO Group just got publicly rebuffed by the US.

They came to DC to get off the US blacklist.

It did not work out. Thanks to their own actions.

You know about the human rights issues, but let me tell you why NSO is no friend to the United States. 1/ Image
2/ First, it's important to know that NSO was shady in how they set up the meeting.

For close observers, this is no surprise.

NSO constantly thinks that they can play the United States.

Part of what got them in trouble in the first place, but let's go deeper.Image
3/ First, NSO has consistently helped foreign governments target the US government.

And hack regular US citizens.

The first cases date back a decade to when the president of Panama used it to monitor the US embassy (and his mistress).

A decade later it was still happening...Image
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(