Saturday, September 12, 2015

Anonymous: A Message to the Awakened Ones

The Anonymous collective in 2013 had a serious goal when they initiated the “A message to the awakened ones” project. The project which was initiated in 2013 is still going strong in 2015. On 21-08-2015, the Youtube user “Anonymous#1867” re-uploaded the Anonymous video “A message to the awakened ones”.
In this video, the Anonymous collective calls upon everyone which is collecting and sharing specific information in their private groups. The Anonymous collective claims that everyone should start sharing the information which they posses as it will serve a greater goal.

You can watch the reuploaded Anonymous video below.

via http://cyberwarzone.com/

Anonymous opNestle will hit Nestle on the 5th of September

he Anonymous collective has intiated a new operation which they have titled “opNestle”. The ‘opNestle’ operation will target the Nestle company globally, but from the information which we have seen, we can claim that the Anonymous collective in The Netherlands will target the Nestle company which is located in Amstelveen.

The Anonymous opNestle collective is active on the Anonymous Operation Nestle Facebook group. The group currently holds 2523 members.

via http://cyberwarzone.com/

The Dark Side Of Chocolate – The Documentary Nestle Refused To Watch

When Nestle refused to watch this documentary (original title: “Shady Chocolate“) about the exploitation of African children in the cocoa industry, the documentary’s director, Miki Mistrati, set up a giant screen next to Nestle’s headquarters in Switzerland and played it there.

via http://anonhq.com

Saturday, August 8, 2015

How to Watch the Watchers #NSA #GCHQ

http://pastebin.com/yvTdhdjd
#BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO #PRISM #TURBINE #TURMOIL #POISENNUT
#MALIBU #FOURSCORE #XKeyscore #TUNDRA #TOYGRIPPE #BLEAKINQUIRY #VULCANDEATHGRIP #VULCANMINDMELD #CORALREEF
#HAMMERMILL #BRAVENICKEL #HAMMERSTEIN #GENIE #SCHOOLMONTANA #SIERRAMONTANA #STUCCOMONTANA #STRAITBIZARRE
#WISTFULTOLL #COTTONMOUTH #TOTEGHOSTLY #DROPOUTJEEP #TURBINE #TURMOIL #WARRIORPRIDE #Regin #QWERTY
#VALIDATOR #UNITEDRAKE #QUANTUM #GROK #SALVAGERABBIT #FOGGYBOTTOM #GUMFISH #CAPTIVATEDAUDIENCE #SIGINT
              \!/  wget --wait=5s http://www.spiegel.de/media/media-355{09..52}.pdf  \!/
                          ^Command to download all the recently released NSA DOX!
********************** MY Last Paste about spying on NSA via ICWATCH was deleted! ******************************
Here is proof my last paste about NSA was forcibly removed without notifying me!
http://imgur.com/QE88NDZ
New Mirrors:
****************************************************************************************************************
Recently a German researcher @Shidash, displayed a program #ICWATCH at a german security conferance @republica. The
program dubbed ICWATCH is a searchable database of over 27,000 NSA security contractors. Still in disbelief and
not sure how NSA could have such bad OpSec, after all the snowden files leaked to allow employees to list top secret
govt program codewords on a social media platform. Furthermore public profiles on Linkedin are indexed by Google
making them dork-able! Also there a graph on number of db user stats and even a live graph for correlation and relations
of the different departments/companies/govts. You would think after over half their programs were exposed by Snowden
docs they would have made employees remove codewords from profiles creds or at least make them private but no... the arrogance
and OpSec failz continue... so basically we all know who has access to what systems and their clearance levels lol
I wouldnt be surprised if these people get swatted, blackmailed or phished real soon... just stating the obv XD
Either way this is perfect example of how you can use the watchers tools(google dbs) against them... just proves
my point again that people are still the main vuln in any networks opsec lol
+Here is the dork to find NSA/GCHQ Linkedin profiles with top secret surveillance programs as credentials:
(change the key words to different programs listed at top)
site:linkedin.com/pub xkeyscore SIGINT
+Video of the security talk:
https://www.youtube.com/watch?v=xipI-0HU010

+Malicious Sites used to infect users with NSA FiveEyes Malware! #EquationGroup
+Different type of crypto to avoid these spy programs
[+] Source [+]
prism-break.org/en/

Sunday, July 19, 2015

Anonymous Operation AnonDown: Cops Kill Man in Guy Fawkes Mask, Anonymous Vows to “Avenge” the Police Killing #OpAnonDown #AnonFamily

 #OpAnonDown



Anonymous Operation Anon Down


www.OperationAnonDown.cf

#AnonFamily
Anonymous Press Release: Operation Anon Down
Saturday - July 18, 2015 4:00 PM ET At approximately 6:30 PM PT on July 17, 2015 at an Anonymous protest in Dawson Creek, British Columbia which the RCMP was informed about in advance, an RCMP officer mercilessly shot and killed a masked Anon without provocation or cause. The situation should have been handled according to Treaty 8 protocols. And, if Canadian police were as brave as Canadian nurses, they could deal with people with knives without hiding behind bullets. This is the fourth Anon to be slain by security forces around the world in as many years. Turkey, Egypt, Palestine and now British Columbia in Canada. As in the past, Anonymous will not stand idly by while our own are cut down in mask. Anonymous has fought for the lives of protesters all over the globe, from Tahir Square in Egypt to Ferguson, Missouri. We will most certainly avenge one of our own when they are cut down in the streets while protesting the earth wrecking environmental policies of the Canadian government.

To this end Anonymous announces the launch of Operation Anon Down. The focus of this Op going forward will be gaining justice (and vengeance if necessary) for our fallen comrade in Dawson Creek. But we will also memorialize our previously slain brethren, and prepare to take action for future Anons killed by police - as we have no doubt they will cut down more of us.

To begin we will identify the RCMP officer involved, thoroughly dox him - and release that dox on the Internet. Because the world has a right to know every detail about killer cops. We will offer support and raise funds if necessary to cover the burial expenses of our fallen comrade. He will be buried with the honor and dignity that his courage has earned him. We will ensure that he is never forgotten, and takes his place in the growing ledger of brave Anonymous martyrs around the world. Then we will press the RCMP and Canadian government for justice. This RCMP officer must be named, fired, and charged - for the murder of our brother Anon. And if we do not receive justice, rest assured there will be revenge.

We call upon our fellow Anons in Canada to take to the streets and protest at the RCMP headquarters in every Province, every day - until our demands for justice are met. We call upon the Global Collective of Anonymous and allied crews to remove the RCMP cyber infrastructure from the Internet. March, create and sign petitions, hack, dox. We may not be able to bring back our fallen comrade, we may not even be able to prevent other Anons from being slain by murderous police - but we can sure as hell show them that there will be a steep price to pay when they kill us.




"Behind this mask there is more than flesh and blood
Behind this mask is an idea




And ideas are bullet proof"
We Are Anonymous
We Are LegionWe Are Everywhere
We Do Not Forgive
We Do Not Forget
To the murderous officers of the RCMP...it is to late to Expect Us

 Operation Anon Down Twitter - FOLLOW HERE

Op E-Mail Address - AnonymousGlobal@riseup.net

Anonymous Care Package - DOWNLOAD NOW

Press Release READ HERE

Operational Information CLICK HERE





________________________________________________________________________________


 A man wearing an Anonymous mask was killed by Royal Canadian Mounted Police (RCMP) outside of a Dawson Creek restaurant last night. Since then, the hacking collective took to Twitter vowing to avenge their fallen Anon with the launch of #OpAnonDown.

In a tweet later deleted, the hacktivist group made it be known that they would respond to the killing of their comrade.

Like we will not fight back, like we will not avenge our fallen. #AnonLivesMatter Fucking Expect Us.
— Anonymous (@YourAnonNews) July 18, 2015

The man killed by police was initially misidentified by police investigators as being related to a disturbance call inside of a public hearing, but police later admitted that these incidents were in no way related to one another.

This initial misinformation has led to accusations from Anonymous that police are in the initial phases of a cover up.

In a video appearing on Facebook, two officers are seen standing over a man with their guns drawn as the man lay on the ground, wearing a Guy Fawkes mask and a grey hoodie.


Police claim the man refused to drop a pocket knife. In the video, the officer appears to kick something away from the man’s body, although no object can be readily seen. In typical police fashion, officers can be seen handcuffing the victims body as he lay in a pool of blood.

According to a report by The Province:

Kellie Kilpatrick, spokeswoman for the police watchdog, the Independent Investigations Office, issued a clarification Friday night, saying that two men, not one as was initially reported, were involved in the incident that happened as a public hearing for the contentious Site C dam was taking place.

“Police arrive at the location and they come into contact with a second individual who is unrelated to the original complaint,” she said. “He is aggressive. He does not follow police commands and he is shot. He is transported to hospital but he does not survive.”

When asked by a reporter from The Province how this misidentification happened, Kilpatrick stated, “At this point I don’t have that information.”

She refused to name the victim or the name of the officers involved in the killing.

Anonymous Press Release: Operation Anon Down

Anonymous Press Release: Operation Anon Down
 
Saturday - July 18, 2015  4:00 PM ET
 
At approximately 6:30 PM PT on July 17, 2015 at an Anonymous protest in Dawson Creek, British Columbia which the RCMP was informed about in advance, an RCMP officer mercilessly shot and killed a masked Anon without provocation or cause. This is the fourth Anon to be slain by security forces around the world in as many years. Turkey, Egypt, Palestine and now British Columbia in Canada. As in the past, Anonymous will not stand idly by while our own are cut down in mask. Anonymous has fought for the lives of protesters all over the globe, from Tahir Square in Egypt to Ferguson, Missouri. We will most certainly avenge one of our own when they are cut down in the streets while protesting the earth wrecking environmental policies of the Canadian government.
 
To this end Anonymous announces the launch of Operation Anon Down. The focus of this Op going forward will be gaining justice (and vengeance if necessary) for our fallen comrade in Dawson Creek. But we will also memorialize our previously slain brethren, and prepare to take action for future Anons killed by police - as we have no doubt they will cut down more of us.
 
To begin we will identify the RCMP officer involved, thoroughly dox him - and release that dox on the Internet. Because the world has a right to know every detail about killer cops. We will offer support and raise funds if necessary to cover the burial expenses of our fallen comrade. He will be buried with the honor and dignity that his courage has earned him. We will ensure that he is never forgotten, and takes his place in the growing ledger of brave Anonymous martyrs around the world. Then we will press the RCMP and Canadian government for justice. This RCMP officer must be named, fired, and charged - for the murder of our brother Anon. And if we do not receive justice, rest assured there will be revenge.
 
We call upon our fellow Anons in Canada to take to the streets and protest at the RCMP headquarters in every Province, every day - until our demands for justice are met. We call upon the Global Collective of Anonymous and allied crews to remove the RCMP cyber infrastructure from the Internet. March, create and sign petitions, hack, dox. We may not be able to bring back our fallen comrade, we may not even be able to prevent other Anons from being slain by murderous police - but we can sure as hell show them that there will be a steep price to pay when they kill us.
 
                             "Behind this mask there is more than flesh and blood
                                        Behind this mask is an idea
                                        And ideas are bullet proof"
 
We Are Anonymous
 
We Are Legion
 
We Are Everywhere
 
We Do Not Forgive
 
We Do Not Forget
 
To the murderous officers of the RCMP...it is to late to Expect Us
 
------------------------------------------------------------------
 
Website - www.OperationAnonDown.cf
 
Twitter - @OpAnonDown

Thursday, July 16, 2015

Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney (2015 HBO)

Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney subtitled in Castilian (2015 HBO)

By Petete "Argie" Anon Anonymous Argentina

Documentary "Going Clear: Scientology and the Prison of Belief" by Alex Gibney subtitled in Castilian (2015 HBO)
Click on the link above to see it on Youtube (and that the insertion sites is disabled on the video source)
or try this one

We are pleased to see someone beat us to present this documentary online brand produced by HBO with subtitles in Castilian. Anyway we are working on our own version, should disappear from Youtube.

This is the documentary about the cult "Church of Scientology" (Scientology) the talented Alex Gibney (responsible inter alia documentary about Wikileaks and its founder Armand Assange, child abuse in the Catholic Church and the collapse of the Enron Corporation) . It premiered in a select number of theaters on March 13, 2015 and aired on HBO on March 29, 2015. It was an absolute success rating by mid April and had seen half people 5 million, becoming the second most watched HBO documentary of the decade.

The documentary is based on the book by award-winning journalist Lawrence Wright as it covers from the beginnings of L. Ron Hubbard to present Scientology David Miscavige, with an excellent level of detail in the research, in addition to the testimonies many ex-cult members, journalists and specialists on the subject.

Consider in detail the beginnings of Hubbard in black magic, his psychiatric problems and family, and touch issues like dirty operations so characteristic of the sect as "Operation Freakout" -destinada going crazy and imprison the journalist Paulette Cooper in retaliation for written the book "The Scandal of Scientology" - concentration camps Scientology FBI infiltration, the victory of the sect against the IRS, current recruitment campaigns and fund-intensive funds, and we prefer to leave much appreciated instead of giving an innumerable list.

But it should be mentioned some things that they especially like us, like the story of the relationship between Sylvia "Spanky" Taylor and actor John Travolta Scientology member. "Spanky" Taylor was who attended Travolta within the sect after his acting success, and although it was the guide of the actor within the sect, someone Travolta came to depend more than his agent, from one day to another without explanation the sect wiped out "Spanky" Travolta's life by sending one of their camps. Later, they asked him to organize a special role in the cult of "Fever Saturday Night" (Saturday Night Fever) with the presence of Travolta, who never knew the reason for the disappearance of "Spanky" of his life, and when it was organized, they were not allowed to attend, sending it back to camp. Although Travolta came to know details of the suffering of "Spanky" in Scientology he never spoke about it and remains a member of the sect even after having lost a child due to lack of treatment because of their beliefs and practices; however Travolta's sister was a key figure that allowed "Spanky" after escaping from Scientology.

Another wonderful detail inédita- documentary is now up to the inclusion of an audio fragment obtained the filming of the documentary The Shrinking World of L. Ron Hubbard "where the founder of Scientology, L. Ron Hubbard, Scientology abuses within admits. This fragment was recorded off camera, while the cameras were rolling as the interview of the "World in Action" program was being prepared, and although it was not included in the original program, the director Alex Gibney won it after contact with journalist who interviewed Hubbard, who was the first and only journalist (outside the sect) to obtain an interview with the sectarian guru.

Also very interesting the part where it talks about how Scientology handled by decades the life of Tom Cruise, away from his then-wife Nicole Kidman, pulling the cult leader David Miscavige, getting girlfriends, etc.

Finally we highlight the performance in this documentary of a new audiovisual interpretation of the story of Xenu, the intergalactic emperor who believe in those who reach the highest levels of Scientology (OT3), which they deny this but too many tests by records obtained in trials of former members who leaked secrets and journalistic investigations levels.

It is by far one of the best documentaries about Scientology, undoubtedly. And as expected, even before its release, the sect "Iglesiia of Scientology" (Scientology) launched its so characteristic campaigns black propaganda and defamation against the director Alex Gibney, producers, former members and journalists who spoke in the documentary, the network that produced and issued (HBO), and to put pressure on critics who praised it.

The funny and pathetic, in addition to the campaign itself, it was that she used materials from previous campaigns attack on ex-cult members and journalists who had made media sites that allegedly did not belong to them, or so declared them, though everyone to see the obvious. It seems that in desperation to discredit all those involved in the making of this documentary Scientology did not realize he was bringing out using as their own material that had previously refused out by them or belonged to them.

They say that the lie has short legs, and there is no evil that lasts forever ...

In short, an excellent documentary that we strongly recommend.
Published by Petete "Argie" Anon in 5:18 a.m.

tags: : Alex Gibney, david miscavige, documentales, Going Clear, HBO, IGLESIA DE SCIENTOLOGY, john travolta, l. ron hubbard, Lawrence Wright, Marty Rathbun, mike rinder, paul haggis, scientology, Tom Cruise

Orignal Post= in spanish
http://anonymousdeargentina.blogspot.sg/2015/05/documental-going-clear-scientology-y-la.html

http://www.hbo.com/documentaries/going-clear#/
http://www.imdb.com/title/tt4257858/

Monday, July 13, 2015

#FreeAken #FreeOtherwise

#FreeAken #FreeOtherwise


When an Anon is arrested his identity is revealed as a death. But stronger than death is love .
Our beloved companions are with us, in our hearts. No arrests will take you from us.
Otherwise and Aken, they were and are true anons who fought for the ideal knowing the
consequences they would pay.
All legion feels your loss and we will not allow your efforts to be in vain.  There will be revenge for you, brothers.
Finally we want to thank you for everything you have done for us and for the time spent together .
We will never forget you.
We are Anonymous
We are a Legion
We do not forgive
We do not forget
Expect us
http://operationgreenrights.blogspot.com/

Hacking Team Hacked: 400GB Data Dump of Internal Documents/Emails/Source Code from Notorious Spyware Dealer

Hacking Team Hacked: 400GB Data Dump of Internal Documents/Emails/Source Code from Notorious Spyware Dealer

on July 7, 2015 at 9:07 AM
hacked-team
07/05-09/2015
The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, has been seriously hacked.
Hackers have made 400GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download.
What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
hacked-team
Last year, a hacker who only went by the name “PhineasFisher” hacked the controversial surveillance tech company Gamma International, a British-German surveillance company that sells the spyware software FinFisher. He then went on to leak more than 40GB of internal data from the company, which has been long criticized for selling to repressive governments.
hacking-team-finfisher-hack

That same hacker has now claimed responsibility for the breach of Hacking Team, that sells a similar product called Remote Controlled System Galileo.


Lorenzo Franceschi-Bicchierai/Motherboard:
On Sunday night, I reached out to the hacker while he was in control of Hacking Team’s Twitter account via a direct message to @hackingteam. Initially, PhineasFisher responded with sarcasm, saying he was willing to chat because “we got such good publicity from your last story!” referring to a recent story I wrote about the company’s CEO claiming to be able to crack the dark web.
Afterwards, however, he also claimed that he was PhineasFisher. To prove it, he told me he would use the parody account he used last year to promote the FinFisher hack to claim responsibility.
“I am the same person behind that hack,” he told me before coming out publicly.
The hacker, however, declined to answer to any further questions.
The leak of 400GB of internal files contains “everything,” according to a person close to the company, who only spoke on condition of anonymity. The files contain internal emails between employees; a list of customers, including some, such as the FBI, that were previously unknown; and allegedly even the source code of Hacking Team’s software, its crown jewels.
——————————————————————————————————————————————————————————————————-
HIGHLIGHTS:

——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
Screenshot shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients.
hacking-team-citizen-lab
Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
The email about Citizen Lab is filed in a folder called “Anti HT activists.”
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
via Thomas Fox-Brewster/Forbes:
In-depth notes on the level of exploitation across a number of Android devices, from the likes of Samsung, HTC and Huawei. It appears the exploits weren’t always successful in accessing voice or texts on phones.
Hacking Team operations manager Daniele Milan’s email from January indicated some imminent features in Hacking Team’s tools included “physical infection of BitLocker protected disks”, thereby bypassing the much-used Microsoft disk encryption technology, as well as “extraction of information from pictures posted on Facebook and Twitter”. It will also soon be able to “capture of documents edited using Google Docs or Office 365”, the roadmap suggested.
Another email from Milan, dated 15 May, indicated the security-focused messaging application Wickr was on the target list too, thanks to a request from the US government. “I had a call this morning with an agent from Homeland Security Investigations [a body within the Department of Homeland Security], and he told me he got some requests to intercept suspects using this application, Wickr… we may want to keep an eye on it and eventually evaluate to add support.”
via Dan Goodin/ArsTechnica:
Another document boasts of Hacking Team’s ability to bypass certificate pinning and the HTTP strict transport security mechanisms that are designed to make HTTPS website encryption more reliable and secure. “Our solution is the only way to intercept TOR traffic at the moment,” the undated PowerPoint presentation went on to say.
Elsewhere, the document stated: “HTTPS Everywhere enforces https and could send rogue certificates to the EFF SSL Observatory.” HTTPS Everywhere is a browser extension developed by the Electronic Frontier Foundation that ensures end users use HTTPS when connecting to a preset list of websites. The statement appears to be a warning that any fraudulent certificates Galileo relies on could become public if used against HTTPS Everywhere users when they have selected an option to send anonymous copies of HTTPS certificates to EFF’s SSL Observatory database.
——————————————————————————————————————————————————————————————————-
Renowned cryptographer Bruce Schneier: “The Hacking Team CEO, David Vincenzetti, doesn’t like me:”
In another [e-mail], the Hacking Team CEO on 15 May claimed renowned cryptographer Bruce Schneier was “exploiting the Big Brother is Watching You FUD (Fear, Uncertainty and Doubt) phenomenon in order to sell his books, write quite self-promoting essays, give interviews, do consulting etc. and earn his hefty money.”
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
Lorenzo Franceschi-Bicchierai/Motherboard:
After suffering a massive hack, the controversial surveillance tech company Hacking Team is scrambling to limit the damage as well as trying to figure out exactly how the attackers hacked their systems.
But the hack hasn’t just ruined the day for Hacking Team’s employees. The company has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned.
“They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.
Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said.
A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data.
It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source.
In a series of tweets on Monday morning, which have been since deleted, Pozzi said that Hacking Team was working closely with the police, and warned everyone who was downloading the files and commenting on them.
“Be warned that the torrent file the attackers claim is clean has a virus,” he wrote. “Stop seeding and spreading false info.”
The future of the company, at this point, it’s uncertain.
Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard.
It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts.
Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely.
The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about.
To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.
Hacking Team did not answer to repeated requests for comment, both to its US spokesperson Eric Rabe as well as directly to its office in Milan, Italy.
——————————————————————————————————————————————————————————————————-
When asked about the identity of the person or group who carried out the attack, Rabe indicated that he believed the attack was the work of a nation state or a criminal gang, and not the work of an activist as many have speculated:
“Doing our own forensics here, we think this was a very sophisticated attack, and certainly not the work of an amateur. The press seems to take the view that this was some sort of human rights activist but I think that is far from certain and it could easily have been criminal activity or some government activity,” adding that “this is almost certainly an international crime”.
When it was pointed out that if a government or criminal group was behind the attack then posting all the information online seems a strange move, Rabe said: “I am not sure why anybody would do that, but part of the effort here was to disrupt our operations as much as possible so I think that would be a motive for many different people.”
When asked if this could be the work of one of Hacking Team’s competitors such as UK-based Gamma International or Israeli NSO Group, Rabe said: “I think that is unlikely” though he admitted that just like everyone else he was speculating.
While some media reports have suggested the company is working with the Italian police to investigate the attack, Rabe says that all he will say is that the company is “working with law enforcement” reiterating that this was an international attack.
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
——————————————————————————————————————————————————————————————————-
*This post will be continuously updated as there is much more new information emerging. Post anything you find in the comments below and I will add them to the article. LAST UPDATE: 07/09/2015 @ 5PM EST

——————————————————————————————————————————————————————————————————-
Related Links:
To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3

http://leaksource.info/2015/07/07/hacking-team-hacked-400gb-data-dump-of-internal-documents-emails-source-code-from-notorious-spyware-dealer/

Leaked Video Shows Making of Islamic State “Execution” in Studio — via CyberBerkut Hack of Sen. McCain Staffer

Leaked Video Shows Making of Islamic State “Execution” in Studio — via CyberBerkut Hack of Sen. McCain Staffer

 on July 12, 2015 at 2:56 PM
islamic-state-studio
07/11/2015
CyberBerkut (Google Translation):
We CyberBerkut received at the disposal of the file whose value can not be overstated!
Dear Senator McCain! We recommend you next time in foreign travel, and especially on the territory of Ukraine, not to take confidential documents.
On one of the devices of your colleagues, we found a lot of interesting things. Something we decided to put: this video should become the property of the international community!
——————————————————————————————————————————————————————————————————-
The 3 ½ minute silent video appears to show infamous Islamic State executioner Jihadi John (aka Mohammed Emwazi) in front of a giant green screen, standing beside a kneeling hostage wearing an orange jumpsuit and a green screen hood. They are inside a lit studio with a production crew and can be seen rehearsing an “execution”. The desert scene of the set, complete with wind machine, are similar to that shown in the beheading videos of James Foley, Steven Sotloff, David Haines, and Alan Henning.

x
——————————————————————————————————————————————————————————————————-
Here is an example someone put together showing the similarities between the leaked studio video and the Foley beheading video. Though they are not identical, it gives a good comparison:
islamic-state-studio-foley-comparison
——————————————————————————————————————————————————————————————————-
British forensic experts concluded that the James Foley video was likely staged using “camera trickery and slick post-production techniques.”

Terrorism research expert Veryan Khan said the video of Japanese hostages Kenji Goto and Haruna Yukawa was likely completed in an indoor studio with a false backdrop.

Hollywood horror film director Mary Lambert said of the Islamic State video showing the killing of 21 Egyptian Coptic Christians on a Libyan beach, that “in the opening shot all the figures might be animated. They never had more than six men on the beach … The close-ups of jihadists on the beach are most likely green screen … The sea turning red is obviously FX.”

Journalist Thomas Wictor has claimed that the Islamic State video showing Jordanian pilot Mu’ath al-Kaseasbeh burned alive was actually fake, pointing to evidence of CGI flames and video glitches.
——————————————————————————————————————————————————————————————————-
LeakSource cannot confirm the video’s authenticity. If it’s a hoax, it’s a pretty elaborate one. Is it legit? If so, was it done by an Islamic State production crew (unlikely with a female PA on set) , or someone else (ie. intelligence agency). And why was it found on a device of Senator John McCain’s staffer?
——————————————————————————————————————————————————————————————————-
Steve Watson/PrisonPlanet (05/25/2010) & Mikael Thalen/Infowars (09/03/2014):
A 2010 Washington Post article authored by former Army Intelligence Officer Jeff Stein features a detailed account of how the CIA admittedly filmed a fake Bin Laden video during the run up to the 2003 Iraq war.

The article, which includes comments from multiple sources within the CIA’s Iraq Operations Group, explains how the agency had planned to “flood Iraq with the videos” depicting several controversial scenarios.

“The agency actually did make a video purporting to show Osama bin Laden and his cronies sitting around a campfire swigging bottles of liquor and savoring their conquests with boys, one of the former CIA officers recalled, chuckling at the memory,” the article states. “The actors were drawn from ‘some of us darker-skinned employees.’”

Other CIA officials admitted to planning several fake videos featuring former Iraqi President Saddam Hussein, one of which would depict the leader engaged in sexual acts with a teenage boy.
“It would look like it was taken by a hidden camera,” said one of the former officials. “Very grainy, like it was a secret videotaping of a sex session.”

Another idea was to interrupt Iraqi television programming with a fake special news bulletin. An actor playing Hussein would announce that he was stepping down in favor of his (much-reviled) son Uday.

“I’m sure you will throw your support behind His Excellency Uday,” the fake Hussein would intone.
According to one official, the video ideas were eventually scrapped due to the CIA officers, who spent their careers in Latin America and East Asia, not understanding “the cultural nuances of the region.”

The former officials told Stein that the project was taken over by the military after it ground to a halt:
The reality, the former officials said, was that the agency really didn’t have enough money and expertise to carry out the projects.

“The military took them over,” said one. “They had assets in psy-war down at Ft. Bragg,” at the army’s special warfare center.

This latest revelation bolsters evidence that the intelligence agencies, and perhaps more significantly, the military have been engaged in creating fake Bin Laden videos in the past.
As we have exhaustively documented, Intelcenter, the U.S. monitoring group that routinely releases Bin Laden video and audio, much of which have been proven to be either rehashed old footage or outright fakes, is an offshoot of IDEFENSE, a web security company that monitors intelligence from the middle east.

IDEFENSE is heavily populated by long serving ex military intelligence officials, such as senior military psy-op intelligence officer Jim Melnick, who served 16 years in the US army and the Defense Intelligence Agency (DIA) in psychological operations. Melnick has also worked directly for former Defense Secretary Donald Rumsfeld.

Intelcenter notoriously released the “laughing hijackers” tape and claimed it was an Al-Qaeda video, despite the fact that the footage was obtained by a “security agency” at a 2000 Bin Laden speech.
IntelCenter was also caught adding its logo to a tape at the same time as Al-Qaeda’s so-called media arm As-Sahab added its logo, proving the two organizations were one and the same.

Could the CIA group of “dark skinned actors” have been behind the infamous December 2001 “Fat nosed” Bin Laden video, that was magically found in a house in Jalalabad after anti-Taliban forces moved in?

The tape featured a fat Osama laughing and joking about how he’d carried out 9/11. The video was also mistranslated in order to manipulate viewer opinion and featured “Bin Laden” praising two of the hijackers, only he got their names wrong. This Osama also used the wrong hand to write with and wore gold rings, a practice totally in opposition to the Muslim faith.

Despite the fact that the man in the video looks nothing like Bin Laden, the CIA stood by it and declared it to be the official “9/11 confession video”.

The latest revelations also shed light on another past Bin Laden release – a tape in which he ludicrously declared himself in league with Saddam Hussein in the weeks before the invasion of Iraq.
The notion that the CIA project was taken over and drastically improved by the Pentagon at some point after 2003 jives with the improvement in quality of Bin Laden videos in later years. Most notably the video that was released immediately ahead of the 2004 election, and it’s digitally manipulated duplicate from 2007, in which Bin Laden appeared to have a dyed beard.
——————————————————————————————————————————————————————————————————-
John McCain’s last visit to Ukraine was June 19th, 2015. If this is when the hack occurred is unclear. He was also accompanied by Senators Tom Cotton and John Barrasso. They were welcomed by U.S. Ambassador to Ukraine Geoffrey Pyatt, and met with senior Ukrainian officials, including President Petro Poroshenko, after visiting troops and volunteers working on the front line. Since McCain is referenced by CyberBerkut, it is most likely that one of his staffers was hacked and not the other senators. Someone needs to FOIA which staffers accompanied McCain on his trip and if any have lost their jobs unceremoniously.
——————————————————————————————————————————————————————————————————-
*LeakSource has requested a comment directly from CyberBerkut to confirm the hack and provide more information. This post will be updated with their response when it becomes available along with any other details as they emerge.

http://leaksource.info/2015/07/12/leaked-video-shows-making-of-islamic-state-execution-in-studio-via-cyberberkut-hack-of-sen-mccain-staffer/