John Scott-Railton Profile picture
Jan 28, 2021 9 tweets 6 min read Read on X
New #OathKeepers indictment is surfacing interesting puzzle pieces, like:

-Coordination between regional Oath Keepers groups
-A Dec. North Carolina training camp & contingent on the 6th.
-Weapons brought up separately

& more

Quick THREAD 1/
Source: justice.gov/usao-dc/press-… ImageImageImage
2/ "...our duty as Americans to fight, kill and die for our rights."

By November 2020 there is talk among the conspirators of the need to get violent..

By Dec. 20 hotel reservations are made by CALDWELL for the 6th... and CROWL has attended a North Carolina training camp. Image
3/ By Dec 30, WATKINS (Ohio) confirms to CALDWELL (Virginia) that her group will come. They discuss staging, logistics..

CALDWELL says a "full bus 40+" people coming from North Carolina.

[Observation: I suspect we will learn a lot more about NC folks in coming weeks] Image
4/ "That way the boys don't have to try to schlep weps on the bus"

-CALDWELL to WATKINS on Dec 30, explaining that an unnamed [PERSON THREE] will drive up a truck with weapons separately from one of the bussed-in contingents.

"Leadership only" conference call is named "DC op" ImageImage
5/ Chats describe how CROWL & WATKINS (and others) will "link up" with the "North Carolina crew" On the 4th they depart Ohio, headed for DC.

On the morning of January 6th, they kit up for battle and head to the #Capitol. ImageImage
6/ Here they are: CROWL, WATKINS & others in a disciplined, geared-up line... moving up the #Capitol steps on the East side.

Per the indictment, they forced their way past police and into the building.

Footage: @rstevensbrody
7/ Meanwhile, over on the West side of the #Capitol, CALDWELL & unnamed others are in the mob fighting through police lines, up the stairs, and eventually breaching the doors.

By 3:05pm he reports making it inside. Image
8/ After the storming of the #Capitol they start trying to hide their tracks, deleting messages, etc.

WATKINS & CROWL return to Ohio. But after they are identified on the 14th (see tweet👇👇) they head to Virginia to stay w/ CALDWELL.

Image
Open questions:

-What role did Oath Keepers leader Elmer Stewart Rhodes "[PERSON ONE]" play? He was in crowd (pic).

-Reporting has focused on OH & VA Oath Keepers at #Capitol, but Important to know about others, esp. NC.

Pic: pbs.org/wgbh/frontline… Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

Oct 10
WOW: @Apple donating a thousand new #iPhone17 s to civil society at-risk from mercenary spyware.

Good. This will help get Apple's most secure devices to where they need to be..

Truth is: those at the greatest risk from spyware are often least able to afford more secure phones 1/Image
2/ Memory Integrity Enforcement = big deal Radically hardens iPhones from common attack vectors.

So it was a bittersweet to see this announcement and think "yeah it's going to be a long time before highest risk ppl can get them."..
3/ You're reading this on a device that is probably more secure thanks to the vigilance of an activist somewhere...

Seems @Apple recognizes this & also knows how much of a game changer getting their most secure devices into the hands of civil society could be.

security.apple.com/blog/apple-sec…
Read 4 tweets
Oct 10
NEW: fresh trouble for mercenary spyware companies like NSO Group.

@Apple launching substantial bounties on the zero-click exploits that feed the supply chain behind products like Pegasus & Paragon's Graphite.

With bonuses, exploit developers can hit $5 million payouts. 1/Image
Image
2/ Apple is introducing Target Flags which speeds the process of getting exploits found & submitters rewarded.

This faster tempo is also a strike against the mercenary spyware ecosystem.

And the expanded categories also hit more widely against commercial surveillance vendors. Image
3/ If I contemplating investing in spyware companies I'd want to carefully evaluate whether their exploit pipeline can match what @apple just threw down.

security.apple.com/blog/apple-sec…
Read 4 tweets
Oct 10
NEW: Pegasus spyware coming to America?

An ex-Adam Sandler producer is again trying acquire the notorious NSO Group.

Simonds fronted this before in 2023 & failed. But the backers of this idea haven't given up.

Where is the money coming from?

The unanswered questions should worry every American 1/Image
Image
Image
Image
2/ Back in 2023 it wasn't clear to me where the money backing Robert Simonds big spyware plans came from.

It still isn't.

So, whose money will actually be buying Pegasus?

And what is the end goal?

Report by @globesnews' @assafgi
globes.co.il/news/article.a…Image
Image
@globesnews @assafgi 3/ Robert Simonds on why🇨🇳#China's @TencentGlobal is a great owner of his @STXfilms.

He has zero experience with the spyware industry, but is once more showing a sudden focus on acquiring the company that makes #Pegasus.

Read 6 tweets
Sep 2
NEW: foreign mercenary spyware is coming to the US.

ICE just quietly unsuspended contract with spyware maker #Paragon.

Remember them?

Caught earlier this year being used to hack journalists.

Bad move for Americans rights, national security & counterintelligence 1/Image
2/ #Paragon was co-founded in Israel in 2019 by ex head of Israel's NSA equivalent (Unit 8200) w/ major backing from former Israeli PM Ehud Barak.

Pitched themselves as stealthy & abuse-proof alternative to NSO Group's Pegasus.

& have been trying to get into the US market for years.Image
Image
Image
Image
3/For a long time all we knew about Paragon was their performance as a 'virtuous' spyware company with values.

All that came to a crashing halt in 2025 when they got very caught, helping customers hack targets across @WhatsApp.

WhatsApp did the right thing & notified users.

By @razhael
Image
Image
Image
Read 18 tweets
Aug 29
NEW: @WhatsApp caught & fixed a sophisticated zero click attack...

Now they've published an advisory about it.

Say attackers combined the exploit with an @Apple vulnerability to hack a specific group of targets (i.e. this wasn't pointed at everybody)

Quick thoughts 1/Image
Wait, you say, haven't I heard of @WhatsApp zero-click exploits before?

You have.

A big user base makes a platform big target for exploit development.

Think about it from the attacker's perspective: an exploit against a popular messenger gives you potential access to a lot of devices.

You probably want maximum mileage from that painstakingly developed, weaponized, and tested exploit code you created/ purchased (or got bundled into your Pegasus subscription).
3/ The regular tempo of large platforms catching sophisticated exploits is a good sign.

They're paying attention & devoting resources to this growing category of highly targeted, sophisticated attacks.

But it's also a reminder of the magnitude of the threat out there...

whatsapp.com/security/advis…
Read 4 tweets
Aug 20
WHOA: megapublisher @axelspringer is asking a German court to ban an ad-blocker.

Their claim that should make everyone nervous:

The HTML/ CSS code of websites are protected computer programs.

And influencing they are displayed (e.g by removing ads) violates copyright.

1/Image
2/ Preventing ad-blocking would be a huge blow to German cybersecurity and privacy.

There are critical security & privacy reasons to influence how a websites code gets displayed.

Like stripping out dangerous code & malvertising.

Or blocking unwanted trackers.

This is why most governments do it on their systems.Image
3/Defining HTML/CSS as a protected computer program will quickly lead to absurdities touching every corner of the internet.

Just think of the potential infringements:

-Screen readers for the blind
-'Dark mode' bowser extensions
-Displaying snippets of code in a university class
-Inspecting & modifying code in your own browser
-Website translators
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(