2/ "...our duty as Americans to fight, kill and die for our rights."
By November 2020 there is talk among the conspirators of the need to get violent..
By Dec. 20 hotel reservations are made by CALDWELL for the 6th... and CROWL has attended a North Carolina training camp.
3/ By Dec 30, WATKINS (Ohio) confirms to CALDWELL (Virginia) that her group will come. They discuss staging, logistics..
CALDWELL says a "full bus 40+" people coming from North Carolina.
[Observation: I suspect we will learn a lot more about NC folks in coming weeks]
4/ "That way the boys don't have to try to schlep weps on the bus"
-CALDWELL to WATKINS on Dec 30, explaining that an unnamed [PERSON THREE] will drive up a truck with weapons separately from one of the bussed-in contingents.
"Leadership only" conference call is named "DC op"
5/ Chats describe how CROWL & WATKINS (and others) will "link up" with the "North Carolina crew" On the 4th they depart Ohio, headed for DC.
On the morning of January 6th, they kit up for battle and head to the #Capitol.
6/ Here they are: CROWL, WATKINS & others in a disciplined, geared-up line... moving up the #Capitol steps on the East side.
Per the indictment, they forced their way past police and into the building.
7/ Meanwhile, over on the West side of the #Capitol, CALDWELL & unnamed others are in the mob fighting through police lines, up the stairs, and eventually breaching the doors.
By 3:05pm he reports making it inside.
8/ After the storming of the #Capitol they start trying to hide their tracks, deleting messages, etc.
WATKINS & CROWL return to Ohio. But after they are identified on the 14th (see tweet👇👇) they head to Virginia to stay w/ CALDWELL.
BREAKING: NSO Group liable for #Pegasus hacking of @WhatsApp users.
Big win for spyware victims.
Big loss for NSO.
Bad time to be a spyware company.
Landmark case. Huge implications. 1/ 🧵
2/ In 2019, 1,400 @WhatsApp users were targeted with #Pegasus.
WhatsApp did the right thing & sued NSO Group.
NSO has spent 5 years trying to claim that they are above the law.
And engaged in all sorts of maneuvering.
With this order, the music stopped and NSO is now without a chair.
3/ Today, the court decided that enough was enough with NSO's gambits & efforts to hide source code.
Judge Hamilton granted @WhatsApp's motion for summary judgement against the #Pegasus spyware maker.
The judge finds NSO's hacking violated the federal Computer Fraud & Abuse Act (#CFAA), California state anti-fraud law #CDFA, and was a breach of contract.
What happens next? The trial proceeds only on the issue of resolving damages stemming from NSO's hacking.
Company has a majority of the US market share for homes & small biz.
Concerns stem from repeated use in cyberattacks from #China & concerns over supply chain security.
Reportedly an office of @CommerceGov has subpoenaed the company. 1/
Story by @heathersomervil @dnvolz & @aviswanatha
2/ @TPLINK has quickly grown market share, even as concerns have grown over vulnerabilities in the routers being used in #China-linked hacking operations.
3/ As Microsoft's @MsftSecIntel reported earlier this year, for example, #TPLINK routers make up the bulk of the CovertNetwork-1658 attack infrastructure.
This operator was conducting so-called password spray attacks, and taking steps to be discrete.
The credentials are then used by multiple #China-based threat actors....
Use only end-to-end encrypted communications says @CISAgov.
YES!
End-to-end encryption is critical infrastructure for a safe society.
Plenty of other solid guidance for mobile users at risk here.
Let's look at their #iPhone & #Android-specific recs... 1/
2/ @CISAgov's top recommendation for Apple users is to✅ enable #LockdownMode
It's my top guidance for high-risk #iPhone users..
Because as researchers tracking sophisticated threats we see Lockdown Mode blunt advanced attacks...
Other solid guidance:
✅Protect your DNS
✅Disable fallback to SMS
✅Enroll in iCloud Private Relay
✅Trim App permissions.
3/ @CISAgov's guidance for #Android starts from the unavoidable fact that many Android manufacturers truly don't respect users security or privacy.
So ✅pick a company that won't leave you insecure after 2-3 years.
Other good guidance here includes...
✅ Only use RCS with end-to-end encryption
✅ Using Android Private DNS
✅ Use Enhanced Protection for Safe Browsing
✅ Google Play Protect
✅ Manage permissions.
3/ There's an active global market for companies whose product line revolves around abusing the trusting nature of call routing to conduct surveillance.
We @citizenlab ran scans & mapped deployments of this tech by one such player: Circles.
Circles had previously merged with NSO Group, which makes #Pegasus.
NEW: police in #Serbia caught unlocking activists phones with @Cellebrite's mobile forensic tools & planting spyware on them.
Incredibly troubling investigation by @AmnestyTech delves into how the Serbian authorities mix a toxic brew of repression out of homegrown + foreign mercenary spyware like #Pegasus + $CLBT's forensic tools possibly supplied as part of foreign assistance from #Norway. 1/
3/ When the couple was eventually released , Parubets was eventually able to pick up his devices from the #FSB at the dreaded Lubyanka building (former KGB HQ, also a prison).
As a programmer, he carefully scrutinized his returned devices & noticed a weird notification on his Android...