John Scott-Railton Profile picture
Jan 27, 2021 16 tweets 14 min read Read on X
MUST WATCH: investigation by @WSJ shows 100+ Proud Boys coordinating, instigating and leading key elements of the #Capitol breach

Proud Boy 1: "Lets take the f* ** capitol"
Proud Boy 2: "Lets not F*** yell that alright"...

Etc.

wsj.com/video/video-in…
2/ The investigation walks through the footage (props to @WSJ, there's so much!) starting with Proud Boys staging under the direction of leaders including (now-arrested) Joe Biggs outside the #Capitol ImageImageImage
3/ In the staging area, a Proud Boy identified as Dan Scott aka 'Milkshake' yells "lets take the f***ng capitol"
-Milkshake is admonished by another PB.
-Someone makes fun of 'Milkshake' for the indiscretion(?). Some laughter.
-"Don't yell it, do it" says another, quietly. ImageImageImageImage
4/ The @WSJ places key Proud Boys from pre-breach meet-ups as instigators of later violence and activity by the crowd.

This absolutely matches what many of us have observed... ImageImage
5/ Breach begins: @WSJ finds Proud Boys leader Joe Biggs in the crowd at an outer police cordon, communicating with a man in a red hat.

Minutes later, red hat man is the 1st past the breached police line. ImageImageImage
6/ As the first police line goes down we see multiple identifiable Proud Boys at the front. @WSJ names Michael Porter, for example.

Note the orange tape on helmets. This is an identification sign that many of us observed Proud Boys using throughout the day. Image
7/ Proud Boys stay at the front of the rush of people, squaring off as they encounter #Capitol Police at the West Entrance. The @WSJ spots Proud Boy #Spazzo.

Remember him? He was the earpiece-wearing window breacher. ImageImage
@WSJ 7/ Zen sidebar on window-breacher Dominic ‘Spazzo’ Pezzola: his lawyer claimed to the @WSJ that his radio earpiece was "for listening to music" Image
8/ A Proud Boy exhorts the crowd gathering in front of the police line at base of Capitol:

"Do you want your house back?... Take it!"

Note the orange tape. Also, here's now-arrested Robert Gieswein.

Details on how some of us originally ID'd him here👇 ImageImage
9/ After staying in the front of the melee w/police... some Proud Boys flank the officers and join a group fighting their way up the left side, through scaffolding and stairs.

Dominic ‘Spazzo’ Pezzola & Gieswein are spotted. Gieswein sprays something at officers... ImageImage
10/ Its 2:12 pm. Now up the stairs and against the building Dominic ‘Spazzo’ Pezzola uses a police shield to breach the window, then steps back and lets others including Gieswein inside accompanied by cries of "Go go go!" Then joins them. ImageImage
11/ The breaching party is inside. Men including Gieswein & Spazzo encounter, then chase officer Eugene Goodman up the stairs..

They come incredibly close to the undefended lawmakers in the Senate (door highlighted in blue). Thankfully, Goodman distracts them. ImageImage
12/ Proud Boys leader Joe Biggs isn't far behind.

"This is awesome"

Pic right: Biggs has told @DailyMail he
- only went into the #Capitol to find a bathroom
- no planned storming...
- he actually meant "awe-inspiring" & also "awful"

SMH.

Source: dailymail.co.uk/news/article-9… ImageImage
13/ Shortly after, and now back outside, the main police line is breached. Other Proud Boys make it into #Capitol with this larger group. One takes this selfie.

Another roams halls calling out for @SpeakerPelosi to "come out and play" His lawyer says "comments were in jest" ImageImageImage
14/ The @WSJ piece is an excellent, damming illustration of what many of us observed: Proud Boys played a key role at the #Capitol.

Congrats to the team that assembled it & their colleagues that helped out.

Why I'm a @WSJ subscriber. Subscribe here: subscribe.wsj.com
15/ Coda: Robert Gieswein wore several patches, including Woodland Wild Dogs (his own thing), & has some militia connections.

However, remains unclear (to me) whether his co-presence w/Proud Boys around #Capitol points a longer-term relationship.

Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Feb 1
NEW: @WhatsApp says Israeli mercenary spyware company #Paragon targeted scores of users around world.

The infection happened with no interaction. No link to click or attachment to open.

This is called a "zero-click" attack.

WA says targets included journalists & members of civil society.

They dismantled the attack vector & notified users.

Good.

We at @citizenlab shared some info instrumental to their investigation of the vector.

This is a BIG deal. Here's why 1/Image
Image
Image
Image
2/ For a few years the only source of information about #Paragon... has been Paragon.

They marketed themselves as the anti-NSO.

(NSO makes the notorious #Pegasus spyware)

It's easier to frame yourself as virtuous in the spyware game if nobody can look over your shoulder.

By @iblametom
forbes.com/sites/thomasbr…

By @RonanFarrow
newyorker.com/magazine/2022/…Image
Image
Image
Image
3/ Late last year, partly on the strength of their promised virtue #Paragon seemed closer than ever to landing the industrys juiciest of prices.

Market access into the USA.

This is the goal of a lot of spyware companies & their investors...

At the time, there simply were no pesky reports on Paragon that showed anything might be other than rosy.

Story @criticalvas
wired.com/story/ice-para…Image
Read 12 tweets
Jan 23
NEW: US seeks extradition of Israeli private spy over sprawling hacking against 🇺🇸American nonprofits.

Amit Forlit's alleged customer? US lobbying firm @DCIGroup... representing @exxonmobil

Extradition filings in UK give fresh peek into this wild case 1/Image
Image
Image
Image
2/ The case was triggered back in 2018, when US-based nonprofits targeted by hackers requested that @citizenlab notify the authorities.

In 2020, we went public with the investigation, alongside @jc_stubbs @razhael & @Bing_Chris 👇

3/ Fast forward to today's efforts to extradite Amit Forlit, who was arrested at Heathrow last year.

He's actually the second Israeli private investigator charged in this massive hacking scheme targeting Americans.

The first, Aviram Azari, was arrested in 2019, convicted & is serving out his sentence.

justice.gov/usao-sdny/pr/i…Image
Image
Image
Read 7 tweets
Dec 23, 2024
The volume of scam phone calls targeting elderly people in the US is insane.

Anyone that has visited an aging person knows what I'm talking about.

Ring after ring.

Several calls a day isn't out of the ordinary each of them a risk of wiping out their savings.

It's an untenable situation and will only get worse without focused government action.
Phone predators constantly target your parents.

Foreign scam call centers are running on an industrial scale.

Efforts phone companies are making are obviously not up to the task.

Just ask any retired person you know when they last got a scam call.
The constant phone scamming of elderly Americans is like an opportunistic infection.

It is a symptom showing that the US phone system's defenses against foreign abuses are diminished.

With increasingly clever AI/ deepfake voices & automation, the problem is set to get worse.
Read 4 tweets
Dec 23, 2024
VPN advertising is the most common source of security misinformation that I encounter.

By far.

So many people misplace their trust in dubious consumer VPN products.

The industry is a scourge.
VPNs don't do most of the things that podcasters imply they do.

Security:
Coffee shop attacks on unencrypted logins are a thing of a decade ago.

VPNs won't stop even the dumbest spyware & phishing.

Privacy:
Advertisers still know it's you when you turn on a VPN... they use many other identifying signals from your device, like your browser & advertising IDs. Those don't change when you turn on a VPN.
Trust:
A lot of VPN companies are shady.... and the industry is consolidating fast around some questionable players with concerning histories.

When you turn on a VPN you entrust all of your data to those companies.
Read 7 tweets
Dec 21, 2024
BREAKING: NSO Group liable for #Pegasus hacking of @WhatsApp users.

Big win for spyware victims.

Big loss for NSO.

Bad time to be a spyware company.

Landmark case. Huge implications. 1/ 🧵Image
Image
Image
Image
2/ In 2019, 1,400 @WhatsApp users were targeted with #Pegasus.

WhatsApp did the right thing & sued NSO Group.

NSO has spent 5 years trying to claim that they are above the law.

And engaged in all sorts of maneuvering.

With this order, the music stopped and NSO is now without a chair.Image
Image
3/ Today, the court decided that enough was enough with NSO's gambits & efforts to hide source code.

Judge Hamilton granted @WhatsApp's motion for summary judgement against the #Pegasus spyware maker.

The judge finds NSO's hacking violated the federal Computer Fraud & Abuse Act (#CFAA), California state anti-fraud law #CDFA, and was a breach of contract.

What happens next? The trial proceeds only on the issue of resolving damages stemming from NSO's hacking.

Order: storage.courtlistener.com/recap/gov.usco…Image
Read 12 tweets
Dec 18, 2024
NEW: US considering ban on @TPLINK routers.

Company has a majority of the US market share for homes & small biz.

Concerns stem from repeated use in cyberattacks from #China & concerns over supply chain security.

Reportedly an office of @CommerceGov has subpoenaed the company. 1/

Story by @heathersomervil @dnvolz & @aviswanathaImage
Image
Image
Image
2/ @TPLINK has quickly grown market share, even as concerns have grown over vulnerabilities in the routers being used in #China-linked hacking operations.

wsj.com/politics/natio…Image
3/ As Microsoft's @MsftSecIntel reported earlier this year, for example, #TPLINK routers make up the bulk of the CovertNetwork-1658 attack infrastructure.

This operator was conducting so-called password spray attacks, and taking steps to be discrete.

The credentials are then used by multiple #China-based threat actors....

microsoft.com/en-us/security…Image
Image
Image
Image
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(