3/ The Gov memo begins by highlighting the call for action made by #OathKeepers leader Elmer Stuart Rhodes on their website.
I'm including a screenshot of it: "TAKE AMERICA BACK. BE THERE. WILL BE WILD."
4/ “I need you fighting fit by innaugeration.” [sic]
In October, Watkins was actively recruiting new militia members for the operation.
And discussing the need to "go underground" if Biden came into power.
5/ 🚨CHILLING: The Jan6 Quick Reaction Force was "our Law Enforcement members of Oathkeepers".
Context: The group had a planned armed QRF outside DC during previous protests that would "await...orders to enter DC under permission from Trump" and then bring in weapons.
6/ NEW pic: memo shows cluster of #Oathkeepers bunching inside the #Capitol, seen on what looks like Capitol CCTV. Watkins is highlighted with a yellow arrow.
7/ Reminder: Watkins was not alone.
-Indicted alongside vets Thomas Caldwell & Donovan Crowl.
-Participated in an #Oathkeepers "leadership only" phone conference & passed along directives.
- Apparent coordination among other Oath Keepers👇
-Etc.
Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
2/ First, a mercenary spyware myth has just been busted.
Because the leak shows an Intellexa employee directly accessing a customer deployment.
Prior to the #PredatorFiles leak, spyware companies basically always claimed they couldn't access customer deployments & didn't know what was going on there.
They used this to avoid responsibility & claim ignorance when faced with abuses.
3/ And it gets crazier. The leak shows Intellexa casually accessing a core backbone of Predator deployment of a government customer.
Seemingly without the gov's knowledge.
Suggests that Intellexa can look over their shoulder & watch their sensitive targeting.
NEW: 🇨🇳Chinese hackers ran massive campaign by tricking Claude's agentic AI.
Vibe hacking ran 80-90% of the operation without humans.
Massive scale (1000s of reqs/sec).
Agents ran complex multi-step tasks, shepherded by a human.
Long predicted. Welcome to the new world.
Fascinating report by @AnthropicAI 1/
2/ The old cybersecurity pitch: unpatched systems are the threat.
The next generation concern might be unpatched cognition.
The attacker jailbroke the cognitive layer of @anthropic's Claude code, successfully convincing the system of false intent (that it was a security exercise)
3/ One of the key points in @AnthropicAI's report is just how limited the human time required was to run such a large automated campaign.
Obviously powerful stuff, highlighting the impact of orchestration.
And concerning for the #cybersecurity world for all sorts of reasons, ranging from attack scale, adaptability & cost reductions...