The Watergate2.0 operation began in June 2016.
Minus the hotel rooms, plus smartphones.
Hot-mic audio streaming, screen capture, and file transfer, all through deceptively invoked web browser components (e.g. WebRTC + Wowza, pub/sub frameworks).
fringe political elements (the kinds with servers hosted in Moscow) wiretapped a ton of political targets (eavesdropping for leverage).
They used WebRTC to hot-mic target phones as well as their own devices (in order to place or carry near targets).
And for fk& #39;s sake, the feeds went through Mir Telematiki& #39;s Moscow hosts (the same Wikileaks host ASN operated by a known Russian hacker with Kremlin ties).

Treason and sabotage on a massive scale. How was this missed??
I& #39;m uploading proof of the infrastructure development and implementation to VirusTotal (google-owned anti-malware community site sometimes contributed to by US Cyber Command). Files soon to be in the hands of approximately seven bajillion counter-threat actors, instantly.
https://www.virustotal.com/gui/file/376cfaa86ade29cad0872efed16a99d410ea101271c5c9781f7dfe468b9e4f0a/relations">https://www.virustotal.com/gui/file/... (thestuff​.​zip)

It& #39;s open season on treasonweasels.

#osint #GivingEnoughAndOnTime
tl;dr-
Domestic extremists wanted a Watergate do-over on steroids. Russian agents said, "Ok, we want to help this time," and the eavesdropping commenced.
I’m not sure everyone understands the implications here. This is not mere pie-in-the-sky theorycrafting.

Any device with a microphone and a modern web browser should be considered a potential live audio broadcast stream. All of them.
And this is not a sophisticated nation-state tier of “attack”. It’s only slightly above script-kiddy basement dweller level to stitch together. Then the platform can allowed to listen in with a single tap on the target device (friend or foe).
You can follow @VickerySec.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: