The Watergate2.0 operation began in June 2016.
Minus the hotel rooms, plus smartphones.
Hot-mic audio streaming, screen capture, and file transfer, all through deceptively invoked web browser components (e.g. WebRTC + Wowza, pub/sub frameworks).
fringe political elements (the kinds with servers hosted in Moscow) wiretapped a ton of political targets (eavesdropping for leverage).
They used WebRTC to hot-mic target phones as well as their own devices (in order to place or carry near targets).
And for fk's sake, the feeds went through Mir Telematiki's Moscow hosts (the same Wikileaks host ASN operated by a known Russian hacker with Kremlin ties).

Treason and sabotage on a massive scale. How was this missed??
I'm uploading proof of the infrastructure development and implementation to VirusTotal (google-owned anti-malware community site sometimes contributed to by US Cyber Command). Files soon to be in the hands of approximately seven bajillion counter-threat actors, instantly.
tl;dr-
Domestic extremists wanted a Watergate do-over on steroids. Russian agents said, "Ok, we want to help this time," and the eavesdropping commenced.
I’m not sure everyone understands the implications here. This is not mere pie-in-the-sky theorycrafting.

Any device with a microphone and a modern web browser should be considered a potential live audio broadcast stream. All of them.
And this is not a sophisticated nation-state tier of “attack”. It’s only slightly above script-kiddy basement dweller level to stitch together. Then the platform can allowed to listen in with a single tap on the target device (friend or foe).
You can follow @VickerySec.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: