<?xml version="1.0"?>
<rss version="2.0" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:yt="http://gdata.youtube.com/schemas/2007" xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
      <title>leaksource.wordpress.com</title>
      <description>#1 source for leaks around the world</description>
      <link>http://pipes.yahoo.com/pipes/pipe.info?_id=5c2b9fcc1943a78123e28eaff60d4735</link>
      <atom:link rel="next" href="http://pipes.yahoo.com/pipes/pipe.run?_id=5c2b9fcc1943a78123e28eaff60d4735&amp;_render=rss&amp;page=2"/>
      <pubDate>Thu, 01 Oct 2015 23:16:22 +0000</pubDate>
      <generator>http://pipes.yahoo.com/pipes/</generator>
      <item>
         <title>Putin, “NO Regime Change in Syria”: US Ready to Destroy Another Nation</title>
         <link>http://leaksource.info/2015/09/19/putin-no-regime-change-in-syria-us-ready-to-destroy-another-nation/</link>
         <description>&lt;div class=&quot;sharedaddy sd-sharing-enabled&quot;&gt;
&lt;div class=&quot;robots-nocontent sd-block sd-social sd-social-official sd-sharing&quot;&gt;
&lt;div class=&quot;sd-content&quot;&gt;
&lt;p&gt;&lt;em&gt;“Obama administration officials, who have been negotiating with Turkey for months, said Thursday that they had reached an agreement for manned and unmanned American warplanes to carry out aerial attacks on Islamic State positions from air bases at Incirlik and Diyarbakir. The agreement was described by one senior administration official as a “game changer.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The New York Times, July 23, 2015&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;iol_imc&quot;&gt;&lt;img class=&quot;mainImage&quot; src=&quot;http://www.sott.net/image/s13/267538/large/1026616471.jpg&quot; alt=&quot;&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Syrian war can divided into two parts: The pre-Incirlik period and the post-Incirlik period. The pre-Incirlik period is roughly the four year stretch during which US-backed Islamic militias and al Qaida-linked groups fought the Syrian army with the intention of removing President Bashar al Assad from power. This first phase of the war ended in a draw.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post_content&quot;&gt;
&lt;p&gt;The post-Incirlik period looks like it could produce an entirely different outcome due to the fact that the US will be able to deploy its drones and warplanes from a Turkish airbase (Incirlik) that’s just 15 minutes flying-time from Syria.&lt;/p&gt;
&lt;p&gt;That will boost the number of sorties the USAF can able to carry out while increasing the effectiveness of its jihadi forces on the ground which will conduct their operations under the protection of US air cover. This will greatly improve their chances for success.&lt;/p&gt;
&lt;p&gt;The &lt;em&gt;New York Times&lt;/em&gt; calls the Incirlik deal a “game-changer” which is an understatement. By allowing US F-16s to patrol the skies over Syria, Washington will impose a de facto no-fly zone over the country severely limiting Assad’s ability to battle the US-backed militias that have seized large swaths of the countryside and are now descending on Damascus.&lt;/p&gt;
&lt;p&gt;And while the war cannot be won by airpower alone, this new tactical reality tilts the playing field in favor the jihadis. In other words, the Incirlik agreement changes everything.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://uziiw38pmyg1ai60732c4011.wpengine.netdna-cdn.com/wp-content/dropzone/2015/09/putin-assad_2577178b.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-large wp-image-74265&quot; src=&quot;http://uziiw38pmyg1ai60732c4011.wpengine.netdna-cdn.com/wp-content/dropzone/2015/09/putin-assad_2577178b-510x318.jpg&quot; alt=&quot;putin-assad_2577178b&quot; width=&quot;510&quot; height=&quot;318&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Obama administration now believes that regime change is within its reach. Yes, they know it will require some back-up from US Special Forces and Turkish combat troops, but it’s all doable.  This is why Obama has shrugged off Russia’s plan for a transitional government or for forming a coalition to defeat ISIS.&lt;/p&gt;
&lt;p&gt;The US doesn’t have to compromise on these matters because, after all, it has a strategically-located airbase from which it can protect its proxy-army, bomb cross-border targets, and control the skies over Syria.&lt;/p&gt;
&lt;p&gt;All Obama needs to do is intensify the war effort, put a little more pressure on Assad, and wait for the regime to collapse. This is why we should expect a dramatic escalation as we begin Phase 2 of the conflict.&lt;/p&gt;
&lt;p&gt;Russian President Vladimir Putin knows this, which is why he’s sending more weapons, supplies and advisors to Syria. He’s signaling to Washington that he knows what they’re up to and that he’ll respond if they carry things too far.&lt;/p&gt;
&lt;p&gt;In an interview with Russia’s state Channel 1, Putin said, &lt;em&gt;&lt;strong&gt;“We have our ideas about what we will do and how we will do it in case the situation develops toward the use of force or otherwise. We have our plans.”&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The administration is very nervous about Putin’s plans which is why they keep probing to see if they can figure out what he has up his sleeve. Just days ago,  Secretary of State John Kerry phoned his Russian counterpart Sergei Lavrov to express his concerns about “an imminent enhanced Russian military buildup” in Syria.&lt;/p&gt;
&lt;p&gt;The call was a clumsy attempt to trick Lavrov into volunteering information that might shed light on what Moscow intends to do if Washington goes ahead with its regime change strategy.  But Russia’s foreign minister didn’t take the bait. He stuck to his script and didn’t tell Kerry anything he didn’t already know.&lt;/p&gt;
&lt;p&gt;But the fact is, Putin is not going to allow Assad to be removed by force. It’s that simple. Obama and his advisors suspect this, but they are not 100 percent certain so they keep looking for confirmation one way or the other.&lt;/p&gt;
&lt;p&gt;But Putin is not going to provide a clear answer because he doesn’t want to tip his hand or appear confrontational. But that doesn’t mean he’s not resolute. He is, and Washington knows it. In effect, Putin has drawn a line in the sand and told the US that if they cross that line, there’s going to [be a] trouble.&lt;/p&gt;
&lt;p&gt;So it’s up to Obama really. He can either seek a peaceful solution along the lines that Moscow has recommended or push for regime change and risk a confrontation with Russia. Those are the two choices.&lt;/p&gt;
&lt;p&gt;Unfortunately, Washington doesn’t have an “off” switch anymore, so changing policy is really not in the cards. Instead, the US war machine will continue to lumber ahead erratically until it hits an impasse and sputters to a halt.&lt;/p&gt;
&lt;p&gt;Once again, the immovable object will prevail over the unstoppable force (as it did in Ukraine), albeit at great cost to the battered people of Syria, their nation and the entire region.&lt;/p&gt;
&lt;p&gt;Keep in mind, that the imperial plan for Syria is subtler than many people realize. As the Brookings Institute’s Michael E. O’Hanlon states in his piece titled “Deconstructing Syria: A new strategy for America’s most hopeless war”:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;em&gt;“The plan… would not explicitly seek to overthrow him (Assad), so much as deny him control of territory that he might still aspire to govern again. The autonomous zones would be liberated with the clear understanding that there was no going back to rule by Assad or a successor. In any case, Assad would not be a military target under this concept, but areas he currently controls… would be. And if Assad delayed too long in accepting a deal for exile, he could inevitably face direct dangers to his rule and even his person.”&lt;/em&gt; (“Deconstructing Syria: A new strategy for America’s most hopeless war”, Michael E. O’Hanlon, Brookings Institute)&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;This is the basic plan: To seize major cities and large parts of the countryside,  disrupt supply-lines and destroy vital civilian infrastructure, and to progressively undermine Assad’s ability to govern the country.&lt;/p&gt;
&lt;p&gt;The ultimate goal is to break the state into a million disconnected enclaves ruled by armed mercenaries, al Qaida-linked affiliates, and local warlords. This is Washington’s diabolical plan for Syria.&lt;/p&gt;
&lt;p&gt;It is strikingly similar to the Zionist plan to “effect the division of the whole area into small states by the dissolution of all existing Arab states.” (“The Zionist Plan for the Middle East”, Israel Shahak) In fact, it is virtually identical.&lt;/p&gt;
&lt;p&gt;It’s clear that Obama is emboldened by the Incirlik deal and believes that, with Turkey’s help, he can achieve US imperial ambitions in Syria. But it’s not going to happen.  Russia, Iran and Hezbollah are prepared to defend their ally Assad and stop Washington dead-in-its-tracks.&lt;/p&gt;
&lt;p&gt;Obama will have succeeded in destroying another sovereign nation and scattering its people across the Middle East and Europe. But the US mission will fall short of its original objectives. There will be no regime change in Syria. Putin, Nasrallah and Khamenei will make sure of it.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p class=&quot;author_description&quot;&gt;&lt;strong&gt;&lt;em&gt;MIKE WHITNEY&lt;/em&gt; &lt;/strong&gt;&lt;em&gt;lives in Washington state. He is a contributor to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/exec/obidos/ASIN/1849351104/counterpunchmaga&quot;&gt;Hopeless: Barack Obama and the Politics of Illusion&lt;/a&gt; (AK Press). Hopeless is also available in a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.amazon.com/exec/obidos/ASIN/B007X497NM/counterpunchmaga&quot;&gt;Kindle edition&lt;/a&gt;. He can be reached at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;mailto:fergiewhitney@msn.com&quot;&gt;fergiewhitney@msn.com&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;author_description&quot;&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.counterpunch.org/2015/09/17/putins-line-in-the-sand-no-regime-change-in-syria/&quot;&gt;http://www.counterpunch.org/2015/09/17/putins-line-in-the-sand-no-regime-change-in-syria/&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28660/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28660/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28660&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>4thAnon</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28660</guid>
         <pubDate>Sat, 19 Sep 2015 14:12:58 +0000</pubDate>
      </item>
      <item>
         <title>Secret Ecuador Docs Reveal Assange&amp;#8217;s Embassy Life: Fight w/ Security Guard, Health Concerns, Escape Plans &amp;#038; More</title>
         <link>http://leaksource.info/2015/09/03/secret-ecuador-docs-reveal-assanges-embassy-life-fight-w-security-guard-health-concerns-escape-plans-more/</link>
         <description>&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-ecuador-embassy.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28650&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-ecuador-embassy.jpg?w=604&amp;#038;h=403&quot; alt=&quot;assange-ecuador-embassy&quot; width=&quot;604&quot; height=&quot;403&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;em&gt;09/01/2015&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/jamesrbuk&quot;&gt;James Ball&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/PaulHamilos&quot;&gt;Paul Hamilos&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.buzzfeed.com/jamesball/mr-white-and-mr-blue&quot;&gt;BuzzFeed&lt;/a&gt;:&lt;/p&gt;
&lt;div id=&quot;superlist_4009452_6761374&quot; class=&quot;buzz_superlist_item buzz-superlist-item buzz_superlist_item_text buzz-superlist-item-text buzz_superlist_item_wide &quot;&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;strong&gt;Staff and security guards at the Ecuadorian embassy are keeping minute-by-minute records and filing daily official reports on the activities of their long-term guest Julian Assange. The documents, marked “secret”, reveal the occasionally fraught relationship between the WikiLeaks chief and his hosts, laying out details of clashes with embassy staff, concerns over Assange’s psychological health, and potential escape plans.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The details are contained in a series of internal documents of the Ecuadorian government seen by BuzzFeed News and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://translate.google.ca/translate?sl=auto&amp;amp;tl=en&amp;amp;js=y&amp;amp;prev=_t&amp;amp;hl=en&amp;amp;ie=UTF-8&amp;amp;u=http%3A%2F%2Ffocusecuador.net%2F2015%2F08%2F17%2Fassange-espiado-por-la-inteligencia-de-ecuador%2F&amp;amp;edit-text=&amp;amp;act=url&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;initially reported&lt;/span&gt;&lt;/a&gt; on by the journalist &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/fevillavicencio&quot;&gt;Fernando Villavicencio&lt;/a&gt;. BuzzFeed News has independently corroborated several details from within the documents.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Assange has been unable to leave the embassy, a small flat in Kensington, since seeking asylum there in June 2012. The WikiLeaks editor-in-chief &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://justice4assange.com/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;faced extradition to Sweden&lt;/span&gt;&lt;/a&gt; for questioning over allegations of rape and sexual assault, although he &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/09/02/assange-affidavit-detailing-ongoing-attempts-by-us-authorities-to-interfere-with-wikileaks-activities/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;cited&lt;/span&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/03/27/department-of-justice-spokesman-for-eastern-district-of-virginia-confirms-grand-jury-investigation-into-wikileaks-ongoing/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;potential&lt;/span&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/12/31/google-informs-wikileaks-of-us-search-warrants-staffs-gmail-metadata-seized-by-government/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;U.S.&lt;/span&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/06/20/unsealed-court-docs-reveal-how-us-secretly-forced-google-to-hand-over-email-data-of-journalist-jacob-appelbaum-as-part-of-wikileaks-investigation/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;prosecution&lt;/span&gt;&lt;/a&gt; over the publication of leaked documents from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/xychelsea&quot;&gt;Chelsea Manning&lt;/a&gt; as his reason for flight.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;The documents seen by BuzzFeed News detail two particular flare-ups in the embassy’s tight confines. The &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-incident-report-09-06-2012.pdf&quot;&gt;first&lt;/a&gt; (PDF) took place in September 2012, just three months after Assange first took up residency.&lt;/p&gt;
&lt;p&gt;A security guard was on duty at around 8:30pm on 6 September, when Assange was in the embassy with two associates. Around this time, the guard discovered that Assange had made his way into the embassy’s secure control room – a room strictly off-limits to him – and started tampering with the security equipment. This led to a scuffle between Assange and the guard that caused damage to the embassy’s equipment.&lt;/p&gt;
&lt;div id=&quot;superlist_4009452_6761381&quot; class=&quot;buzz_superlist_item buzz-superlist-item buzz_superlist_item_text buzz-superlist-item-text buzz_superlist_item_wide &quot;&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;The report then details conflicting accounts of what happened. According to the security guard’s account, Assange was asked to stop messing with the embassy’s systems and to leave the secure room, which he initially refused to do.&lt;/p&gt;
&lt;p&gt;The guard alleges that Assange then punched over a computer monitor before grabbing him by the shirt. This led, according to the guard, to an altercation for a number of minutes that spilled out into the corridor.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-control-room.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28628&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-control-room.jpg?w=604&amp;#038;h=435&quot; alt=&quot;assange-control-room&quot; width=&quot;604&quot; height=&quot;435&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Assange’s account lays the blame on the security guard, who he claimed had accosted him.&lt;/p&gt;
&lt;p&gt;A filmmaker who was present for the incident, the report notes, told embassy staff he did not see the beginning of the scuffle, but that Assange was “out of control” and very upset, and clearly wanted to be verbally offensive and to provoke a reaction.&lt;/p&gt;
&lt;p&gt;Embassy staff, including the ambassador and two security officials described only as “Mr White” and “Mr Blue”, had a meeting to discuss the incident the following day. In sections of the report marked as analysis and recommendations, the author notes that Assange — described as “Mr Guest” — knows “what the limits of his movements are inside the embassy”.&lt;/p&gt;
&lt;p&gt;The section continues by noting that “we cannot allow these incidents to be repeated, nor any further attacks against personnel who work for the embassy”. The report acknowledges the stress Assange was under, due to both his confinement and the presence of “more than 20 British agents posted outside the building”, and recommends further psychological support.&lt;/p&gt;
&lt;p&gt;However, just a few months later a separate &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-incident-report-01-04-2013.pdf&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;report&lt;/span&gt;&lt;/a&gt; (PDF) notes a similar incident of seemingly erratic behaviour from the WikiLeaks chief shortly before dawn on 4 January 2013.&lt;/p&gt;
&lt;p&gt;The report painstakingly notes Assange’s movements from minute to minute – further evidence of how closely the Ecuadorians monitored “Mr Guest” – reporting that he seemed to wake at 6:05 that morning. Then, just five minutes later, the security guard heard a loud crash from Assange’s room.&lt;/p&gt;
&lt;p&gt;Assange came to the door, assuring the on-duty guard that everything was fine, but (according to the guard’s account) seeming to try to block his view of the room’s interior. A few minutes later, Assange left the room carrying his laptop into a nearby room designated as his bathroom, where he remained for a period of hours.&lt;/p&gt;
&lt;p&gt;During this time, the memo continues, the guard was able to see inside Assange’s bedroom, where a large, smashed bookshelf was strewn across the room. The guard took photographs of the room’s condition.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-bookshelf.jpg&quot;&gt;&lt;img class=&quot;aligncenter wp-image-28627 size-full&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-bookshelf.jpg?w=604&amp;#038;h=541&quot; alt=&quot;assange-bookshelf&quot; width=&quot;604&quot; height=&quot;541&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The room visible in the photos from the secret Ecuadorian report clearly matches the one in an &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.youtube.com/watch?v=QWU6tVxzO1I&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;August 2013 Juice Rap News video&lt;/span&gt;&lt;/a&gt; featuring Assange during his bid to run for the Australian senate (Assange’s embassy room is visible in the video between 3:42 and 4:16).&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot; style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-rapnews.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28629&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-rapnews.jpg?w=604&amp;#038;h=325&quot; alt=&quot;assange-rapnews&quot; width=&quot;604&quot; height=&quot;325&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot; style=&quot;text-align:center;&quot;&gt;&lt;em&gt;Additonal photo of room:&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-bookshelf-2.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28649&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-bookshelf-2.jpg?w=604&amp;#038;h=379&quot; alt=&quot;assange-bookshelf-2&quot; width=&quot;604&quot; height=&quot;379&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;Assange later told embassy staff that the bookshelf had fallen over of its own accord, according to the same memo, but this seemingly did little to assuage their concerns about the wellbeing of Assange or those around him. As before, the incident was passed up the embassy’s chain of command – reference is made to a daily report on his activities – including, once again, “Mr White” and “Mr Blue”.&lt;/p&gt;
&lt;p&gt;The report notes with concern a regular comment in “internal daily reports” on Assange recording his tendency to “shout and talk incoherently” at night, attributed to night terrors.&lt;/p&gt;
&lt;p&gt;It then goes on to note: “This episode is nothing more than the result of the stress that Mr Assange could be feeling as a result of his isolation.&lt;/p&gt;
&lt;p&gt;“If it’s clear that his situation could result in psychological harm because of the circumstances in which he finds himself, it’s equally clear that there is no protocol that might help avoid or minimise this.”&lt;/p&gt;
&lt;p&gt;The report continues in quite a critical manner as to Assange’s intrinsic “nature”, independent of his stressful situation, stating that his “evident anger” and “feelings of superiority” could cause stress to those around him — “especially the personnel who work in the embassy, mainly women”.&lt;/p&gt;
&lt;p&gt;It adds that the stress on those personnel also stems from media pressure, police, and “most worryingly, the hard core of people who are either for or against Mr Assange’s cause”, risking the embassy’s capacity to function as usual.&lt;/p&gt;
&lt;p&gt;The report contains multiple recommendations to improve the situation, including a proposal from “Mr Blue” for regular assessments of Assange’s physical and mental health, regular meetings with Assange’s confidantes to assess his demeanour and state of mind, and efforts to prevent Assange becoming isolated.&lt;/p&gt;
&lt;p&gt;The report also notes a need to “control access to alcohol”.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;Other documents set out the external security challenges faced by the Ecuadorians through the activities of the Metropolitan police, who at one point had up to 50 officers in and around the building containing the embassy.&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;UK&amp;#39;s national security siege against &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/Assange?src=hash&quot;&gt;#Assange&lt;/a&gt; has now hit £12.1 million &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/8b8Pyk3tZS&quot;&gt;http://t.co/8b8Pyk3tZS&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/wcgh5xYX6k&quot;&gt;pic.twitter.com/wcgh5xYX6k&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/638784318786138112&quot;&gt;September 1, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;A 2012 presentation shows handwritten instructions to officers at the scene – embarrassingly caught by a photographer’s long lens and made public – instructing them on what to do if Assange emerged from the embassy.&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-police-notes-zoom.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28630&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-police-notes.jpg?w=604&amp;#038;h=453&quot; alt=&quot;assange-police-notes&quot; width=&quot;604&quot; height=&quot;453&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-police-notes-zoom.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28636&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-police-notes-zoom.jpg?w=604&amp;#038;h=452&quot; alt=&quot;assange-police-notes-zoom&quot; width=&quot;604&quot; height=&quot;452&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;“Action required – Assange to be arrested under all circumstances,” it states. “He comes out with dip[lomatic] immunity, as dip bag, in dip bag (risk to life) in dip vehicle. ARRESTED.”&lt;/p&gt;
&lt;div id=&quot;superlist_4009452_6761398&quot; class=&quot;buzz_superlist_item buzz-superlist-item buzz_superlist_item_text buzz-superlist-item-text buzz_superlist_item_wide &quot;&gt;
&lt;p&gt;Asked whether the Metropolitan police would violate diplomatic immunity to arrest Assange, a Met spokesperson said: “Our objective is to arrest Julian Assange for breach of bail. Under no circumstances would an arrest be made in breach of diplomatic immunity.”&lt;/p&gt;
&lt;p&gt;In the Ecuadorian slides, the police orders are translated into Spanish and given a short analysis before a later slide sets out a series of options of ways to get Assange out of the UK.&lt;/p&gt;
&lt;/div&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/assange-escape.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28631&quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/assange-escape.jpg?w=604&amp;#038;h=453&quot; alt=&quot;assange-escape&quot; width=&quot;604&quot; height=&quot;453&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;The first option considered was to obtain diplomatic immunity for Assange by making him Ecuador’s representative to the UN. While there was a risk that the UN General Assembly could revoke this status, the report notes that this would take some time, which could be exploited to get Assange on to Ecuadorian territory.&lt;/p&gt;
&lt;div id=&quot;superlist_4009452_6761406&quot; class=&quot;buzz_superlist_item buzz-superlist-item buzz_superlist_item_text buzz-superlist-item-text buzz_superlist_item_wide &quot;&gt;
&lt;p&gt;A second consideration was to attempt to smuggle Assange out in an inviolable diplomatic car. However, the officials concluded that this would probably be impossible as Scotland Yard had even placed officers inside the embassy building, which was shared with other tenants.&lt;/p&gt;
&lt;p&gt;“Police are located in the hall, on the stairs, and the exits of the lifts,” it states. “The British police can be found in all the routes that would allow Assange to take a diplomatic car.”&lt;/p&gt;
&lt;p&gt;Elsewhere the document notes that officers had come still closer: “Last night (28/08/2012), security at the Ecuadorian embassy had to remove a policeman who entered without permission, in the department above the embassy.”&lt;/p&gt;
&lt;p&gt;A spokesperson for the Metropolitan police declined to respond to a query on the incident.&lt;/p&gt;
&lt;p&gt;Another option for exfiltrating Assange considered by embassy staff was to put him in a diplomatic bag, considered inviolable by treaty, but only if they solely contain documents relating to the normal practice of an embassy.&lt;/p&gt;
&lt;p&gt;Officials dismissed this plan as they knew police outside the embassy had “advanced technology that can detect body heat”. Elsewhere, embassy staff had noted a police van across the road from the embassy was “bombarding” the building with microwaves, and was capable in the view of staff of collecting most if not all signals from within.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/police-surveillance-truck-1.jpg&quot;&gt;&lt;img class=&quot;alignnone wp-image-28633 &quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/police-surveillance-truck-1.jpg?w=374&amp;#038;h=280&quot; alt=&quot;police-surveillance-truck-1&quot; width=&quot;374&quot; height=&quot;280&quot;/&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/police-surveillance-truck-2.jpg&quot;&gt;&lt;img class=&quot;alignnone wp-image-28634 &quot; src=&quot;https://leaksource.files.wordpress.com/2015/09/police-surveillance-truck-2.jpg?w=210&amp;#038;h=280&quot; alt=&quot;police-surveillance-truck-2&quot; width=&quot;210&quot; height=&quot;280&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p class=&quot;content__headline js-score&quot;&gt;&lt;em&gt;Related: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.theguardian.com/world/2013/jul/04/ecuador-names-embassy-bug-surveillance&quot;&gt;Ecuador Says London Embassy Bug Hidden in Socket&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;sub_buzz_desc&quot;&gt;The final plan contemplated on the slide was that of a “discreet exit”.&lt;/p&gt;
&lt;p&gt;“Assange could leave in fancy dress,” the document suggests, “or try to escape across the rooftops towards a nearby helipad, or get lost among the people in Harrods.”&lt;/p&gt;
&lt;p&gt;In the event, it seems none of the plans were followed through. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://justice4assange.com/3-Years-in-Embassy.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Three years later, Assange remains in the embassy&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Operation Hotel &amp;amp; SENAIN&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/fevillavicencio&quot;&gt;Fernando Villavicencio&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://focusecuador.net/2015/08/17/assange-espiado-por-la-inteligencia-de-ecuador/&quot;&gt;FocusEcuador&lt;/a&gt; (Translation via &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wikileaks-forum.com/-wikileaks-related-news/23/the-ecuador-intelligence-agency-spied-on-assange/34275/&quot;&gt;WikiLeaksForum&lt;/a&gt;):&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/09/operation-hotel.pdf&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Operation Hotel&lt;/span&gt;&lt;/a&gt; (PDF) was designed in three phases by the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/National_Intelligence_Secretariat_%28Ecuador%29&quot;&gt;Ecuadorian intelligence agency (SENAIN)&lt;/a&gt; with three specific objectives: to generate adequate living conditions for the &amp;#8220;guest&amp;#8221;, to resume full activities at the Embassy to avoid possible information leakage and to optimise the security processes in the diplomatic home quarters.&lt;/p&gt;
&lt;p&gt;Phase I sought to guarantee the conditions under which Assange was staying at the Embassy and prepare a plan for a possible attack which could force the &amp;#8220;guest&amp;#8221; and his security team to evacuate in case of a deliberate fire and the ensuing smoke ; it even prepared for a situation in which the opposing force could use hidden chemical agents obliging the &amp;#8220;guest&amp;#8221; to go outside for lack of oxygen.&lt;/p&gt;
&lt;p&gt;At this stage the technical adjustments to the site, such as installing a shower in the bathroom, carpentry and painting services in areas that would be available to Assange were also made. In addition, a meticulous record of all the people working in every area of the Embassy was kept, especially of those who were close to him.&lt;/p&gt;
&lt;p&gt;&amp;#8220;We understand that Mr. Guest is used to interact with the Embassy staff, especially those with whom he has a lot of contacts and a friendly relationship&amp;#8221;, stated the SENAIN report. There was so much control around him that part of the Operation Hotel strategy was to limit the contacts he had with the embassy employees. It was even determined that it was very important that those who provided security inside the embassy should speak Spanish, to ensure they would be able to communicate without any problems and thus ensuring a basic communication only with the &amp;#8220;guest.&amp;#8221;&lt;/p&gt;
&lt;p&gt;In some instances, the &amp;#8220;guest&amp;#8221; requested that he be able to chose his own Security Service inside the embassy, suggesting the use of Russians. For the SENAIN agents, such choice would have meant, among other problems, the loss of control of the Embassy itself leaving the &amp;#8220;guest&amp;#8221; free access to control and manage the flow of information. The report even asserts that it would have been the equivalent of &amp;#8220;a coup in the embassy.&amp;#8221;&lt;/p&gt;
&lt;p&gt;During Phase II of this surveillance operation, the aim would be to strengthen measures, protocols and security systems designed to match the level of sensitivity of the situation in which the Embassy and its occupants found themselves, and also to visually and technically improve the safety measures as well as the screening of the staff and the detection of leaks.&lt;/p&gt;
&lt;p&gt;The report stresses that &amp;#8220;From a tactical point of view , the use of viewing and listening devices, as well as monitoring and surveillance tools created a containment situation with the opposing forces&amp;#8221;&lt;/p&gt;
&lt;p&gt;In Phase II, not only recording video and audio systems would be implemented but also the freedom of the guest&amp;#8217;s movements would be restricted, especially the way he used to come in and out as well as his nocturnal activities in the offices and annexes, such as the ambassador&amp;#8217;s and consul&amp;#8217;s offices, because the risks meant a serious lack of security concerning the possibility of leaks of confidential or proprietary information to which Assange could have access to and which should be restricted.&lt;/p&gt;
&lt;p&gt;These measures, which were as part of Operation Hotel, are an indication of the level of distrust that the regime of Rafael Correa had for Julian Assange. The following is an excerpt from the report: &amp;#8220;Mr. Guest is a host at the Embassy, he is not a member of the staff and should not participate or interfere in the activities of the Embassy, so he must be kept away from activities that are the exclusive responsibility of the management of the diplomatic mission of Ecuador in London. &amp;#8221;&lt;/p&gt;
&lt;p&gt;Some of the public activities around the presence of Assange in the Embassy of Ecuador in London were entrusted to the American/Venezuelan lawyer and journalist &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/evagolinger&quot;&gt;Eva Golinger&lt;/a&gt;, through a contract of service signed with the Ministry.&lt;/p&gt;
&lt;p&gt;The Embassy staff had been really worried about the activities of the refugee, because in one of the paragraphs it is mentioned a need &amp;#8220;to regain control and manage the necessary protocols to create the state of security needed to allow and redirect the actions in a positive and correct fashion. &amp;#8221;&lt;/p&gt;
&lt;p&gt;Inside the Ecuadorian Embassy in London there is an hostile environment and concern, together with the fact that the day to day activities are constantly interrupted. The report also reveals that the personality of Julian constantly clashes with the security agents who have to execute the orders and implement the processes.&lt;/p&gt;
&lt;p&gt;The report shows that the monitoring levels applied to the &amp;#8220;guest&amp;#8221;&amp;#8216;s circle of people were very high, this was also the case for one of the painters who worked on the conversion of the apartments during Phase I of this operation. Rafael Paez had previously worked on the carpentry, masonry and other fixtures for Phase II of Operation Hotel.&lt;/p&gt;
&lt;p&gt;The bizarre thing is that there was a second person with the same job. The following is an excerpt from the report that reveals the painstaking surveillance process concerning Assange. &amp;#8220;The other person is an acquaintance of Silvia Almeida&amp;#8217;s, the accountant, (they attend the same church, apparently he is quite religious. The Seguridad Diplomática guards believe he is a bit fanatical and spends all day singing religious songs and talking about God). The peculiar thing is that he said that he once belonged to the guerrillas in El Salvador and had lost three children to the war. It is worth finding out a bit more about Silvia Almeida&amp;#8217;s religious connections. &amp;#8221;&lt;/p&gt;
&lt;p&gt;Another person mentioned in this report is José María Guijarro (Txema), Under-Secretary for Africa, Asia and Oceania, who has commented that the &amp;#8220;guest &amp;#8220;had problems with his vision because his field of vision was limited to the dimensions of his room or his computer screen. It was recommended to let him go to the ambassador&amp;#8217;s office at night so he could look out the window to alleviate his vision problem.&lt;/p&gt;
&lt;p&gt;The report describes in detail that the cameras and systems used for the development of Phase II were exceptional first-generation equipment for the &amp;#8220;control and supervision&amp;#8221; of this diplomatic mission.&lt;/p&gt;
&lt;p&gt;One of the paragraphs in the report directly refers to Julian Assange&amp;#8217;s surveillance within the Ecuadorian Embassy. &amp;#8220;If the Government of Ecuador finally decided the realization of such actions (obtaining information directly, espionage) they should be part of other operational parameters to avoid potential repercussions towards the Embassy once it was realised that such actions were taking place from inside the embassy itself. &amp;#8221;&lt;/p&gt;
&lt;p&gt;Both the WikiLeaks team and the people trusted by Assange were subjected to the restriction of movements and controlled by the staff. According to this document, the intelligence inside the Embassy identified one &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/Ben_Griffin_%28British_Army_soldier%29&quot;&gt;Benjamin Griffin&lt;/a&gt;, British, former British Army soldier and a member of the SAS Special Forces as Assange&amp;#8217;s personal trainer. The SENAIN assumed that &amp;#8220;he is a potential threat in terms of the information he could have access to and/or provide to third parties because we do not have complete assurance that he does not have any more links to the British military establishment. &amp;#8221;&lt;/p&gt;
&lt;p&gt;Given all these constraints, the &amp;#8220;guest&amp;#8221; had requested that the security installations be audited; the said auditor would have been part of Assange&amp;#8217;s team, and at this stage, SENAIN voiced their disagreement on the grounds that such action would involve the transfer of all the keys as well as the systems&amp;#8217; configurations. &amp;#8220;This would be another serious violation of the security protocol because neither Mr Guest nor his team can guarantee that the information obtained would not end up in the hands of third parties or used against the interests of Ecuador&amp;#8221; says SENAIN.&lt;/p&gt;
&lt;p&gt;&amp;#8220;This audit requested by Mr Guest would represent a high operational risk, as well as a risk for the ambassador, since the agency in Salamanca would not be able to monitor and control the video surveillance and recording systems, in as much as it would enable the uncontrolled distribution of images which could potentially be counter-productive in regards of Ecuador&amp;#8217;s political actions (although initially they could advance Mr. Guest&amp;#8217;s cause) &amp;#8221; the report said.&lt;/p&gt;
&lt;p&gt;As an example of the recommendations made by Assange, there is one which is particularly striking. He asked for his personal boxing trainer Ben Grifin to take part in supervising the installation of the security system.&lt;/p&gt;
&lt;p&gt;It is estimated that at the beginning, Assange&amp;#8217;s fame and the global impact of the asylum request itself created a special preferential context for the &amp;#8220;guest&amp;#8221;, a situation which changed when certain excesses were curtailed and a code of internal living standards was implemented. &amp;#8221;&lt;/p&gt;
&lt;p&gt;&amp;#8220;We understand that Mr. Guest is used to interact with the Embassy staff, especially those with whom he gets on well.&lt;/p&gt;
&lt;p&gt;Understandably, he is also looking to establish similar relationships with the security agents, but this falls outside of the mission&amp;#8217;s parameters which are set to maintain a strict protocol of interaction with all the people from outside the Embassy (mainly him and his guests), and up to then everybody enjoyed full freedom of movements inside (without any restrictions) but in some instances, non standard behaviour was witnessed in the building (consumption of alcoholic beverages in the lobby of the Embassy during working hours, walking barefoot through the Embassy during business hours, festive gatherings, inappropriate dress code, etc) and these actions could have had dire consequences in terms of the image of the Diplomatic Delegation and its mission in London and the same could be said of Mr Guest and his cause, &amp;#8221; it reads.&lt;/p&gt;
&lt;p&gt;In August 2012, former ambassador Ana Alban implemented a special protocol to regulate the &amp;#8220;Guest&amp;#8221;&amp;#8216;s activities:&lt;/p&gt;
&lt;ul class=&quot;bbc_list&quot;&gt;
&lt;li&gt;Visiting hours will be between 08H00 and 19H00.&lt;/li&gt;
&lt;li&gt;Visitors need to show the diplomatic security agents some kind of photo ID.&lt;/li&gt;
&lt;li&gt;The Red Permit visitors will have to go though all the Diplomatic Security electronic systems for the duration of their visit at the Embassy.&lt;/li&gt;
&lt;li&gt;The &amp;#8220;Guest&amp;#8221;&amp;#8216;s visitors are his responsibility and his team&amp;#8217;s and they must ensure that the visitors comply with the Embassy rules and regulations at all times.&lt;/li&gt;
&lt;li&gt;The consumption of alcoholic beverages is prohibited inside the Embassy. It is allowed with moderation in the &amp;#8220;Guest&amp;#8217;s room&amp;#8221; as long as no one leaves the room carrying a drink and as long as their behaviour is professional and suitable for an Embassy environment.&lt;/li&gt;
&lt;li&gt;Recordings within the Embassy are prohibited without the Ambassador&amp;#8217;s or the National Secretary of Communications&amp;#8217; prior permission.&lt;/li&gt;
&lt;li&gt;Under no circumstances should anyone be allowed inside the control room of the Embassy apart from the Ambassador and the diplomatic security team, this room is where privileged information, the secret files of the Embassy and the security systems, are kept.&lt;/li&gt;
&lt;li&gt;Visitors will have to stay inside the Guest&amp;#8217;s quarters, they can only go out if they need the bathroom or leave the Embassy premises.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;And obviously, there was also the distrust of the Ecuadorian government with respect to the specific interests of Assange and WikiLeaks; &amp;#8220;We take note that Ecuador&amp;#8217;s and Mr Guest&amp;#8217;s agendas and interests maybe be aligned, but sometimes they may not converge and they may also be inconsistent with the policy of Ecuador,&amp;#8221; said one of the documents.&lt;/p&gt;
&lt;p&gt;There is very little information regarding Phase III apart from the fact that &amp;#8220;it will be implemented taking into account other solutions, to strengthen the security of the site and its users&amp;#8217;.&amp;#8221;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;An anecdote in the reports dated early September 4th 2012, records the moment when the Scotland Yard guards were changing shifts, they were in the alley facing the guest&amp;#8217;s window where two police vans used to transport the guards are parked.&lt;/p&gt;
&lt;p&gt;During the change over, the officers were in a festive mood and joking amongst themselves about the &amp;#8220;guest&amp;#8221;&amp;#8216;s situation when suddenly one of them reached into his pocket, took a coin and threw it at the guest&amp;#8217;s window, hitting one of the panes. According to the report, this incident upset the guest, who wanted to use the pictures and publish them on the net to illustrate Scotland Yard&amp;#8217;s aggression. The lawyer recommended that the Embassy should not complain, as it could be used against the Embassy by highlighting the use of special cameras and video equipment to monitor the London police.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;The documents published here are part of a comprehensive report in the possession of Ecuadorian National Assembly member &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/cynthiaviteri6&quot;&gt;Cynthia Viteri&lt;/a&gt;, regarding surveillance activities carried out by SENAIN at the Embassy in London.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p&gt;The Ecuadorian embassy did not respond to requests for comment or clarification on any aspect of the documents, although the spokesperson for Scotland Yard said the embassy had been in contact with them about the enquiry. WikiLeaks did not respond to a request for comment.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;p class=&quot;copy-paste-block&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.9news.com.au/world/2015/09/03/04/42/assange-slams-false-attack-over-leak&quot;&gt;AAP&lt;/a&gt;:&lt;/p&gt;
&lt;div class=&quot;copy-paste-block&quot;&gt;
&lt;p class=&quot;copy-paste-block&quot;&gt;Assange responded to the media reports in a brief one-line statement on Wednesday, saying: &amp;#8220;Yet another predictably false attack in the media during the run-up to the launch next week of our new book on the US-UK relationship &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.versobooks.com/books/1931-the-wikileaks-files&quot;&gt;The WikiLeaks Files&lt;/a&gt;&lt;/span&gt;.&amp;#8221;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Assange &amp;quot;escape&amp;quot; claim made from Aug 2012 media. Proof: 1) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/ADrh9vqoK4&quot;&gt;https://t.co/ADrh9vqoK4&lt;/a&gt; 2) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/KkYkFvvJBE&quot;&gt;https://t.co/KkYkFvvJBE&lt;/a&gt; 3) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/EC4KB38sr9&quot;&gt;http://t.co/EC4KB38sr9&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/639028376188006400&quot;&gt;September 2, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Fascinating to see crypto-sexism trying to make Assange seem weaker through the use of feminising language &amp;amp; imagery. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/X5oEDVIIQ6&quot;&gt;http://t.co/X5oEDVIIQ6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/638831894335918080&quot;&gt;September 1, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;copy-paste-block&quot;&gt;
&lt;p class=&quot;copy-paste-block&quot;&gt;&lt;blockquote class='twitter-tweet' lang='en'&gt;&lt;p&gt;.@&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/a_greenberg&quot;&gt;a_greenberg&lt;/a&gt; @&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/BuzzFeed&quot;&gt;BuzzFeed&lt;/a&gt; other source: @&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks_forum&quot;&gt;wikileaks_forum&lt;/a&gt;&amp;#039;s &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://twitter.com/search?q=%23Siggi&quot; title=&quot;#Siggi&quot;&gt;#Siggi&lt;/a&gt; jailed last wk for child abuse &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://icelandreview.com/news/2015/08/28/siggi-hacker-confesses-child-abuse&quot;&gt; icelandreview.com/news/2015/08/2…&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/QVC2GClfAz&quot;&gt;http://t.co/QVC2GClfAz&lt;/a&gt;&lt;/p&gt;&amp;mdash; &lt;br /&gt;Bella Magnani (@BellaMagnani) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href='http://twitter.com/#!/BellaMagnani/status/638784749880889344'&gt;September 01, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p class=&quot;copy-paste-block&quot;&gt;Fernando Villavicencio, who initially reported on Assange’s embassy stay in Spanish for Ecuador Focus, has &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wikileaks-forum.com/fernando-villavicencio/666/rafael-correas-persecution-of-journalist-fernando-villavicencio-submitted-to-un/34298/#.VeMMmQ1499s.twitter&quot;&gt;recently submitted allegations of persecution against him by Ecuador’s government&lt;/a&gt;&lt;/span&gt; to the UN.&lt;/p&gt;
&lt;p class=&quot;copy-paste-block&quot;&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8211;&lt;/p&gt;
&lt;/div&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Double rainbow in London this afternoon over Assange embassy siege &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/8b8Pyk3tZS&quot;&gt;http://t.co/8b8Pyk3tZS&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/RicardoPatinoEC&quot;&gt;@RicardoPatinoEC&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/ecuador?src=hash&quot;&gt;#ecuador&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/BQrDaiLl42&quot;&gt;pic.twitter.com/BQrDaiLl42&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/638803270664888320&quot;&gt;September 1, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28622/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28622/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28622&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28622</guid>
         <pubDate>Thu, 03 Sep 2015 08:00:17 +0000</pubDate>
      </item>
      <item>
         <title>Video Shows Moment El Chapo Escapes Mexico &amp;#8220;Maximum Security&amp;#8221; Prison Cell (+ Tunnel Footage)</title>
         <link>http://leaksource.info/2015/07/15/video-shows-moment-el-chapo-escapes-mexico-maximum-security-prison-cell-tunnel-footage/</link>
         <description>&lt;span class='embed-youtube' style='text-align:center;display:block;'&gt;&lt;/span&gt;
&lt;p&gt;&lt;em&gt;07/15/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/mexico-releases-footage-of-chapo-escape-but-will-public-believe-it&quot;&gt;VICE&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;As the government&amp;#8217;s story goes, on Jan 19, 2001, Joaquin &amp;#8220;El Chapo&amp;#8221; Guzman snuck out of a maximum-security prison in Mexico the first time around by hiding in a laundry cart. It was a cartoonishly sounding escape for a drug cartel leader considered one of the most dangerous men in the world.&lt;/p&gt;
&lt;p&gt;But what most likely happened, experts on the subject say, is that Guzman&amp;#8217;s first major prison break occurred through the front, dressed as a police officer. It happened with the total backing of the prison itself, from &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/el-chapos-son-may-have-hinted-on-twitter-that-escape-was-coming&quot;&gt;the warden on down&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;On Tuesday night, Mexico released video footage of the moment that Chapo made his second implausible escape. In it, a man dressed in sweatpants and a sweatshirt is seen pacing in a cell, then putting on shoes, then ducking below a waist-high barrier of the shower stall in his cell. The time stamp on the video reads 8:52. After that, the man is not seen again.&lt;/p&gt;
&lt;p&gt;Although Guzman is well-know for his cartel&amp;#8217;s &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dallasnews.com/news/nationworld/mexico/20150713-mexican-drug-lord-joaquin-el-chapo-guzman-tunnels-out-of-prison.ece&quot;&gt;use tunnels to traffic drugs across&lt;/a&gt;&lt;/span&gt; the US-Mexico border, questions and doubts about the tunnel escape have bubbled up since almost the moment the jailbreak became news.&lt;/p&gt;
&lt;p&gt;Some people are still saying they don&amp;#8217;t entirely believe the government&amp;#8217;s story: &amp;#8220;El Chapo&amp;#8221; had workers build a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/mexican-drug-lord-el-chapo-escapes-prison-through-elaborate-tunnel-with-motorcycle&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;secret tunnel more than 30 feet deep and rode a motorcycle&lt;/span&gt;&lt;/a&gt; on a one-mile track while smashing lightbulbs in his wake to blind any chasers.&lt;/p&gt;
&lt;p&gt;The tunnel may have been &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/the-dea-knew-chapo-posed-a-flight-risk-but-mexicos-government-ignored-warnings&quot;&gt;under construction from the time&lt;/a&gt; that Chapo was jailed at Altiplano, but it would have been impossible not to notice the approximately 3.2 tons of dirt and rock required to dig out without being noticed, engineers who made the calculation told newspapers here.&lt;/p&gt;
&lt;p&gt;Plus, the escape house sits between the Altiplano prison and a Mexican army base — both of which have security towers — and near a State of Mexico police academy. At the time, a constant additional security perimeter composed of federal police and soldiers should have also noticed Guzman fleeing.&lt;/p&gt;
&lt;p&gt;Still others noted that Chapo is shown with his head shaved in an undated headshot the government released of him, while the closed-circuit footage shows  the man escaping with a full head of hair.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/el-chapo-headshot.jpg&quot;&gt;&lt;img class=&quot;aligncenter  wp-image-28598&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/el-chapo-headshot.jpg?w=400&amp;#038;h=459&quot; alt=&quot;el-chapo-headshot&quot; width=&quot;400&quot; height=&quot;459&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Three days since the jailbreak, authorities have admitted that Chapo and his allies probably bought off guards and prison officials at Altiplano. But Mexicans swapping rumors and theories on social media say they believe the corruption rooted in Guzman&amp;#8217;s vast drug empire of influence must have reached higher levels in Mexico&amp;#8217;s government.&lt;/p&gt;
&lt;p&gt;In that sense, &amp;#8220;El Chapo&amp;#8221; — although he was captured again in February 2014, taken in handcuffs, and put behind bars — &amp;#8220;was never in really in custody,&amp;#8221; investigative reporter Anabel Hernandez declared on Radio Formula in Mexico on Tuesday.&lt;/p&gt;
&lt;p&gt;Given how it really went down in 2001, others argue, the Guzman tunnel story could be all just a charade.&lt;/p&gt;
&lt;p&gt;According to Hernandez&amp;#8217;s book &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.vice.com/read/anabel-hernandez-says-the-mexican-government-is-the-worlds-largest-drugs-cartel&quot;&gt;&lt;em&gt;Narcoland&lt;/em&gt;&lt;/a&gt;, Guzman&amp;#8217;s body inside a laundry cart would have triggered heat sensors at the security checkpoints inside the Puente Grande prison in Jalisco. He escaped through the gates dressed as a police agent, she writes, after gathering testimony and examining Guzman&amp;#8217;s case file.&lt;/p&gt;
&lt;p&gt;&amp;#8220;This prison has sensors everywhere, and automatic doors. It wasn&amp;#8217;t possible,&amp;#8221; Hernandez told &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.vice.com/read/anabel-hernandez-says-the-mexican-government-is-the-worlds-largest-drugs-cartel&quot;&gt;VICE in a 2013 interview&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This time, the public shouldn&amp;#8217;t discount the possibility that Guzman escaped &amp;#8220;through the front&amp;#8221; and that &amp;#8220;one person or more helped him,&amp;#8221; journalist and author Jesus Lemus told VICE News.&lt;/p&gt;
&lt;p&gt;Lemus is a reporter &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.excelsior.com.mx/nacional/2015/07/13/1034412&quot;&gt;who served time&lt;/a&gt; in Puente Grande between 2008 and 2011 on false charges of criminal association, but got released after authorities realized they had the wrong suspect. During his time behind bars, Lemus interviewed prisoners and guards about Chapo&amp;#8217;s first escape, years earlier.&lt;/p&gt;
&lt;p&gt;&amp;#8220;He escaped through the front door, he left disguised as a federal policeman. The prisoners that stayed behind identified him for his eyes and height, and also because he had paid them some favors,&amp;#8221; Lemus told VICE News.&lt;/p&gt;
&lt;p&gt;&amp;#8220;El Chapo is a person that bought loyalties and who knows how to create them. I don&amp;#8217;t believe that he escaped through a tunnel. It would be like disregarding his criminal capacity, and he likes to innovate,&amp;#8221; the author said. &amp;#8220;I&amp;#8217;ve been in those prisons and they have at least two meters of reinforced concrete underneath.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Authorities on Tuesday permitted news photographers to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.youtube.com/watch?v=Fwm0VWVKLXA&quot;&gt;enter the house&lt;/a&gt; where the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/we-visited-the-end-of-the-tunnel-where-el-chapo-made-his-brazen-jailbreak&quot;&gt;prison tunnel ended&lt;/a&gt;&lt;/span&gt; and film just above the opening to a deep shaft where authorities say Guzman used a motorcycle to ride the one mile from the Altiplano prison.&lt;/p&gt;
&lt;p&gt;News cameras also filmed inside cell 20. Along with the release of the footage inside Guzman&amp;#8217;s cell, Mexican authorities are attempting to silence any further uproar over Chapo&amp;#8217;s escape.&lt;/p&gt;
&lt;p&gt;Interior Minister Miguel Osorio Chong defended the government&amp;#8217;s handling of the case so far on Monday night, saying that Mexico&amp;#8217;s federal penitentiaries have equal security standards to those of the United States.&lt;/p&gt;
&lt;p&gt;&amp;#8220;The prison has perimeter barriers, pedestrian and vehicle checkpoints, internal and external security towers, in addition to 26 security filters,&amp;#8221; Osorio Chong said. &amp;#8220;For more than a year a half, there has been an additional surveillance operation by the federal police and the army at the exterior of this prison.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Three prison officials including the warden have been fired. At least 53 others have been questioned in connection to the Chapo jailbreak, including prison employees, inmates, and two of Guzman&amp;#8217;s lawyers.&lt;/p&gt;
&lt;p&gt;Osorio Chong said any government employees who are proven to have aided Chapo&amp;#8217;s escape were &amp;#8220;disloyal&amp;#8221; and committed &amp;#8220;betrayal&amp;#8221; against the security forces that captured Guzman in Mazatlan last year, &amp;#8220;risking their lives.&amp;#8221;&lt;/p&gt;
&lt;p&gt;But Mexico got a warning. United States anti-drug agents reportedly told Mexican officials that they had gathered murmurs of Chapo seeking an escape from Altiplano as soon as one month after his arrest. Drug Enforcement Administration agents in Los Angeles and Houston said a prison break was probably in the works, an &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://bigstory.ap.org/article/5be409c3c0104295a3285b5ae1aeb08b/dea-documents-show-el-chapo-began-escape-plots-2014&quot;&gt;AP report said&lt;/a&gt;&lt;/span&gt;. Osorio Chong denied the Mexican government had any such knowledge.&lt;/p&gt;
&lt;p&gt;&amp;#8220;My colleagues at the DEA received a report in which various plans for an escape were detailed, but that was months ago, and we thought that they were doing something about it,&amp;#8221; an ex-DEA agent, Gilberto Gonzalez, told VICE News in an interview this week. &amp;#8220;But now we see they didn&amp;#8217;t.&amp;#8221;&lt;/p&gt;
&lt;p&gt;&amp;#8220;It&amp;#8217;s very disappointing for my colleagues who participated in his arrest, because they feel they risked their lives for nothing,&amp;#8221; Gonzalez added.&lt;/p&gt;
&lt;p&gt;Jose Luis Montenegro, author of &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://aristeguinoticias.com/1705/lomasdestacado/jose-luis-montenegro-descubre-a-los-narcojuniors-primeroscapitulos/&quot;&gt;a recent book on Chapo&amp;#8217;s sons&lt;/a&gt;&lt;/span&gt; called &amp;#8220;Narcojuniors,&amp;#8221; pointed out that attorneys have &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.animalpolitico.com/2015/01/dan-un-amparo-al-chapo-guzman-contra-la-extradicion-eu/&quot;&gt;filed appeals to prevent any extradition&lt;/a&gt;&lt;/span&gt; of Chapo to the US from going forward. While on the inside, Guzman and other inmates &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.excelsior.com.mx/nacional/2015/02/27/1010607&quot;&gt;complained of prison conditions&lt;/a&gt;&lt;/span&gt; to the national human rights commission, sparking an investigation that turned up nothing.&lt;/p&gt;
&lt;p&gt;All of this may have worked to stall for time so that Chapo&amp;#8217;s tunnel could be built — for actual use or not, Montenegro told VICE News.&lt;/p&gt;
&lt;p&gt;&amp;#8220;This looks more like complicity than a government omission,&amp;#8221; he said. &amp;#8220;Just like in 2001, you co-opt the authorities, through bribes and threats, and then use your own people, like now.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Montenegro monitors social-media accounts linked to several of Chapo&amp;#8217;s sons and associates. Those accounts are not unverified. They&amp;#8217;ve also remained largely silent since Chapo escaped.&lt;/p&gt;
&lt;p&gt;The author said geo-localization and links between the accounts themselves give him confidence it was Ivan Archivaldo Guzman Salazar, one of three sons from Chapo&amp;#8217;s first marriage, who tweeted on July 6: &amp;#8220;&lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://news.vice.com/article/el-chapos-son-may-have-hinted-on-twitter-that-escape-was-coming&quot;&gt;Everything comes to those who know how to wait&lt;/a&gt;&lt;/span&gt;.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Five days later, his father broke free from prison.&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28596/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28596/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28596&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28596</guid>
         <pubDate>Wed, 15 Jul 2015 19:05:47 +0000</pubDate>
      </item>
      <item>
         <title>Leaked Video Shows Making of Islamic State &amp;#8220;Execution&amp;#8221; in Studio — via CyberBerkut Hack of Sen. McCain Staffer</title>
         <link>http://leaksource.info/2015/07/12/leaked-video-shows-making-of-islamic-state-execution-in-studio-via-cyberberkut-hack-of-sen-mccain-staffer/</link>
         <description>&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/islamic-state-studio.png&quot;&gt;&lt;img class=&quot;aligncenter  wp-image-28555&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/islamic-state-studio.png?w=550&amp;#038;h=308&quot; alt=&quot;islamic-state-studio&quot; width=&quot;550&quot; height=&quot;308&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;07/11/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://translate.google.ca/translate?sl=auto&amp;amp;tl=en&amp;amp;js=y&amp;amp;prev=_t&amp;amp;hl=en&amp;amp;ie=UTF-8&amp;amp;u=http%3A%2F%2Fwww.cyber-berkut.ru%2Fmain%2F20150710_00.php&amp;amp;edit-text=&amp;amp;act=url&quot;&gt;CyberBerkut&lt;/a&gt; (Google Translation):&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;span class=&quot;notranslate&quot;&gt;We &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/CyberBerkut&quot;&gt;CyberBerkut&lt;/a&gt; received at the disposal of the file whose value can not be overstated!&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class=&quot;notranslate&quot;&gt;Dear &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/SenJohnMcCain&quot;&gt;Senator McCain&lt;/a&gt;!&lt;/span&gt; &lt;span class=&quot;notranslate&quot;&gt; We recommend you next time in foreign travel, and especially on the territory of Ukraine, not to take confidential documents.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class=&quot;notranslate&quot;&gt;On one of the devices of your colleagues, we found a lot of interesting things.&lt;/span&gt; &lt;span class=&quot;notranslate&quot;&gt; Something we decided to put: this video should become the property of the international community!&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;The 3 &lt;span class=&quot;st&quot;&gt;½&lt;/span&gt; minute silent video appears to show infamous Islamic State executioner &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/02/26/islamic-states-jihadi-john-identified-as-mohammed-emwazi-from-london-26-year-old-well-off-westminster-grad-alleged-mi5-recruit-attempt-in-2009/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Jihadi John (aka Mohammed Emwazi)&lt;/span&gt;&lt;/a&gt; in front of a giant green screen, standing beside a kneeling hostage wearing an orange jumpsuit and a green screen hood. They are inside a lit studio with a production crew and can be seen rehearsing an &amp;#8220;execution&amp;#8221;. The desert scene of the set, complete with wind machine, are similar to that shown in the beheading videos of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/08/19/graphic-video-islamic-state-beheads-american-journalist-james-foley/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;James Foley&lt;/span&gt;&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/09/02/graphic-video-islamic-state-beheads-american-journalist-steven-sotloff/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Steven Sotloff&lt;/span&gt;&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/09/13/graphic-video-islamic-state-beheads-british-aid-worker-david-haines/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;David Haines&lt;/span&gt;&lt;/a&gt;, and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/10/03/graphic-video-islamic-state-beheads-british-aid-worker-alan-henning/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Alan Henning&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;div id=&quot;v-DVmHJVfr-1&quot; class=&quot;video-player&quot; style=&quot;width:604px;height:452px;&quot;&gt;
&lt;embed id=&quot;v-DVmHJVfr-1-video&quot; src=&quot;http://s0.videopress.com/player.swf?v=1.04&amp;amp;guid=DVmHJVfr&amp;amp;isDynamicSeeking=true&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;604&quot; height=&quot;452&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;Here is an example someone put together showing the similarities between the leaked studio video and the Foley beheading video. This is not implying the person in the leaked video is Foley, it may be anyone. Though they are not identical, it gives a good comparison:&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-foley-comparison.gif&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28569&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-foley-comparison.gif?w=604&quot; alt=&quot;islamic-state-studio-foley-comparison&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;British forensic experts &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.telegraph.co.uk/journalists/bill-gardner/11054488/Foley-murder-video-may-have-been-staged.html&quot;&gt;concluded&lt;/a&gt;&lt;/span&gt; that the James Foley video was likely staged using “camera trickery and slick post-production techniques.”&lt;/p&gt;
&lt;p&gt;Terrorism research expert &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.trackingterrorism.org/profile/veryan-khan&quot;&gt;Veryan Khan&lt;/a&gt; &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://nypost.com/2015/01/23/was-the-new-isis-hostage-video-shot-indoors/&quot;&gt;said&lt;/a&gt;&lt;/span&gt; the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/01/20/islamic-states-jihadi-john-in-new-hostage-video-demands-200-million-ransom-for-2-japanese-citizens-within-72-hours/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;video&lt;/span&gt;&lt;/a&gt; of Japanese hostages Kenji Goto and Haruna Yukawa looks like it was completed in an indoor studio with a false backdrop, pointing to the light source on the men that appears to be coming from two different directions — as opposed to one bright sun.&lt;/p&gt;
&lt;p&gt;Hollywood horror film director &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/Mary_Lambert&quot;&gt;Mary Lambert&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.foxnews.com/world/2015/02/21/isis-army-7-footers-experts-say-video-copt-beheadings-manipulated/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;said&lt;/span&gt;&lt;/a&gt; of the Islamic State &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://vimeo.com/119705104&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;video&lt;/span&gt;&lt;/a&gt; showing the killing of 21 Egyptian Coptic Christians on a Libyan beach, that &amp;#8220;in the opening shot all the figures might be animated. They never had more than six men on the beach &amp;#8230; The close-ups of jihadists on the beach are most likely green screen &amp;#8230; The sea turning red is obviously FX.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Journalist &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/ThomasWictor&quot;&gt;Thomas Wictor&lt;/a&gt; has &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.thomaswictor.com/the-jordanian-pilot-was-not-burned-alive/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;claimed&lt;/span&gt;&lt;/a&gt; that the Islamic State &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/02/04/jordanian-pilot-kaseasbeh-burned-alive-by-islamic-state-jordan-executes-is-requested-prisoner-rishawi-in-response/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;video&lt;/span&gt;&lt;/a&gt; showing Jordanian pilot &lt;span id=&quot;articleText&quot;&gt;&lt;span class=&quot;focusParagraph&quot;&gt;Mu’ath al-Kaseasbeh&lt;/span&gt;&lt;/span&gt; burned alive was actually fake, pointing to evidence of CGI flames and video glitches.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;LeakSource cannot confirm the video&amp;#8217;s authenticity. If it&amp;#8217;s a hoax, it&amp;#8217;s a pretty elaborate and expensive one. Is it legit? If so, was it done by an Islamic State production crew (unlikely with a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/islamic-state-studio-woman.jpg&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;female PA on set&lt;/span&gt;&lt;/a&gt;) , or someone else (ie. intelligence agency). And why was it found on a device of Senator John McCain&amp;#8217;s staffer?&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;Steve Watson/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/former-cia-officials-admit-to-faking-bin-laden-video.html&quot;&gt;PrisonPlanet&lt;/a&gt; (05/25/2010) &amp;amp; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/MikaelThalen&quot;&gt;Mikael Thalen&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.infowars.com/flashback-cia-admits-to-staging-fake-jihadist-videos/&quot;&gt;Infowars&lt;/a&gt; (09/03/2014):&lt;/p&gt;
&lt;p&gt;A 2010 Washington Post &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://voices.washingtonpost.com/spy-talk/2010/05/cia_group_had_wacky_ideas_to_d.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;article&lt;/span&gt;&lt;/a&gt; authored by former Army Intelligence Officer Jeff Stein features a detailed account of how the CIA admittedly filmed a fake Bin Laden video during the run up to the 2003 Iraq war.&lt;/p&gt;
&lt;p&gt;The article, which includes comments from multiple sources within the CIA’s Iraq Operations Group, explains how the agency had planned to “flood Iraq with the videos” depicting several controversial scenarios.&lt;/p&gt;
&lt;p&gt;“The agency actually did make a video purporting to show Osama bin Laden and his cronies sitting around a campfire swigging bottles of liquor and savoring their conquests with boys, one of the former CIA officers recalled, chuckling at the memory,” the article states. “The actors were drawn from ‘some of us darker-skinned employees.’”&lt;/p&gt;
&lt;p&gt;Other CIA officials admitted to planning several fake videos featuring former Iraqi President Saddam Hussein, one of which would depict the leader engaged in sexual acts with a teenage boy.&lt;/p&gt;
&lt;p&gt;“It would look like it was taken by a hidden camera,” said one of the former officials. “Very grainy, like it was a secret videotaping of a sex session.”&lt;/p&gt;
&lt;p&gt;Another idea was to interrupt Iraqi television programming with a fake special news bulletin. An actor playing Hussein would announce that he was stepping down in favor of his (much-reviled) son Uday.&lt;/p&gt;
&lt;p&gt;“I’m sure you will throw your support behind His Excellency Uday,” the fake Hussein would intone.&lt;/p&gt;
&lt;p&gt;According to one official, the video ideas were eventually scrapped due to the CIA officers, who spent their careers in Latin America and East Asia, not understanding “the cultural nuances of the region.”&lt;/p&gt;
&lt;p&gt;The former officials told Stein that the project was taken over by the military after it ground to a halt:&lt;/p&gt;
&lt;p&gt;The reality, the former officials said, was that the agency really didn’t have enough money and expertise to carry out the projects.&lt;/p&gt;
&lt;p&gt;“The military took them over,” said one. “They had assets in psy-war down at Ft. Bragg,” at the army’s special warfare center.&lt;/p&gt;
&lt;p&gt;This latest revelation bolsters evidence that the intelligence agencies, and perhaps more significantly, the military have been engaged in creating fake Bin Laden videos in the past.&lt;/p&gt;
&lt;p&gt;As we have &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://infowars.net/articles/October2006/051006Rumsfeld.htm&quot;&gt;exhaustively documented&lt;/a&gt;&lt;/span&gt;, Intelcenter, the U.S. monitoring group that routinely releases Bin Laden video and audio, much of which have been proven to be either &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/120903binladentape.htm&quot;&gt;rehashed old footage&lt;/a&gt;&lt;/span&gt; or &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/bin_laden_tape_a_fake_swiss_lab_says.htm&quot;&gt;outright fakes&lt;/a&gt;, is an offshoot of IDEFENSE, a web security company that monitors intelligence from the middle east.&lt;/p&gt;
&lt;p&gt;IDEFENSE is heavily populated by long serving ex military intelligence officials, such as senior military psy-op intelligence officer Jim Melnick, who served 16 years in the US army and the Defense Intelligence Agency (DIA) in psychological operations. Melnick has also worked directly for former Defense Secretary Donald Rumsfeld.&lt;/p&gt;
&lt;p&gt;Intelcenter notoriously &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/articles/october2006/051006redhanded.htm&quot;&gt;released the “laughing hijackers” tape&lt;/a&gt;&lt;/span&gt; and claimed it was an Al-Qaeda video, despite the fact that the footage was obtained by a “security agency” at a 2000 Bin Laden speech.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/articles/august2007/020807tapesdoctored.htm&quot;&gt;IntelCenter was also caught adding its logo&lt;/a&gt;&lt;/span&gt; to a tape at the same time as Al-Qaeda’s so-called media arm As-Sahab added its logo, proving the two organizations were one and the same.&lt;/p&gt;
&lt;p&gt;Could the CIA group of “dark skinned actors” have been behind the infamous December 2001 &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://infowars.net/articles/february2007/190207Osama_tape.htm&quot;&gt;“Fat nosed” Bin Laden video&lt;/a&gt;&lt;/span&gt;, that was magically &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/articles/january2006/found%20in%20a%20house%20in%20Jalalabad%20after%20anti-Taliban%20forces%20moved%20in.&quot;&gt;found in a house&lt;/a&gt;&lt;/span&gt; in Jalalabad after anti-Taliban forces moved in?&lt;/p&gt;
&lt;p&gt;The tape featured a fat Osama laughing and joking about how he’d carried out 9/11. The video was also &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://dc.indymedia.org/newswire/display/16801&quot;&gt;mistranslated&lt;/a&gt;&lt;/span&gt; in order to manipulate viewer opinion and featured “Bin Laden” praising two of the hijackers, only he got their names wrong. This Osama also used the wrong hand to write with and wore gold rings, a practice totally in opposition to the Muslim faith.&lt;/p&gt;
&lt;p&gt;Despite the fact that the man in the video looks nothing like Bin Laden, the CIA stood by it and declared it to be the official “9/11 confession video”.&lt;/p&gt;
&lt;p&gt;The latest revelations also shed light on another past Bin Laden release – a tape in which he ludicrously &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/another_dubious_bin_laden_tape_comes_when_the_us_needed_it_the_most.htm&quot;&gt;declared himself in league with Saddam Hussein&lt;/a&gt;&lt;/span&gt; in the weeks before the invasion of Iraq.&lt;/p&gt;
&lt;p&gt;The notion that the CIA project was taken over and drastically improved by the Pentagon at some point after 2003 jives with the improvement in quality of Bin Laden videos in later years. Most notably the video that was released immediately &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.prisonplanet.com/articles/february2006/280206binladenshelp.htm&quot;&gt;ahead of the 2004 election&lt;/a&gt;&lt;/span&gt;, and it’s digitally manipulated &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://infowars.net/articles/september2007/100907BinLaden.htm&quot;&gt;duplicate from 2007&lt;/a&gt;&lt;/span&gt;, in which Bin Laden appeared to have a dyed beard.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;John McCain&amp;#8217;s &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://news.yahoo.com/us-senator-mccain-slams-european-stance-ukraine-172844262.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;last&lt;/span&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.washingtonpost.com/posttv/national/mccain-calls-for-arms-for-ukraine/2015/06/20/4f9e7a20-176a-11e5-8457-4b431bf7ed4c_video.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;visit&lt;/span&gt;&lt;/a&gt; to Ukraine was June 19th, 2015. If this is when the hack occurred is unclear. He was also &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/SenJohnMcCain/status/611988255307919361&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;accompanied&lt;/span&gt;&lt;/a&gt; by Senators &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/SenTomCotton&quot;&gt;Tom Cotton&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/SenJohnBarrasso&quot;&gt;John Barrasso&lt;/a&gt;. They were welcomed by U.S. Ambassador to Ukraine &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/geoffpyatt&quot;&gt;Geoffrey Pyatt&lt;/a&gt;, and met with senior Ukrainian officials, including President &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/poroshenko&quot;&gt;Petro Poroshenko&lt;/a&gt;, after visiting troops and volunteers working on the front line. Since McCain is referenced by CyberBerkut, it is most likely that one of his staffers was hacked and not the other senators. Someone needs to FOIA which staffers accompanied McCain on his trip and if any have lost their jobs unceremoniously.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;1st they doctored pics to say I met w/ &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/ISIS?src=hash&quot;&gt;#ISIS&lt;/a&gt;. Now &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/Russian?src=hash&quot;&gt;#Russian&lt;/a&gt; Internet trolls say I staged ISIS executions. Proud to be their #1 adversary!&lt;/p&gt;
&lt;p&gt;&amp;mdash; John McCain (@SenJohnMcCain) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/SenJohnMcCain/status/620618834387537920&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;*LeakSource has requested a comment directly from CyberBerkut to confirm the hack and provide more information. This post will be updated with their response when it becomes available along with any other details as they emerge.&lt;/em&gt;&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28552/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28552/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28552&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;&lt;div&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/07/12/leaked-video-shows-making-of-islamic-state-execution-in-studio-via-cyberberkut-hack-of-sen-mccain-staffer/&quot;&gt;&lt;img alt=&quot;islamic-state-studio&quot; src=&quot;http://videos.videopress.com/DVmHJVfr/islamic-state-studio_std.original.jpg&quot; width=&quot;160&quot; height=&quot;120&quot;/&gt;&lt;/a&gt;&lt;/div&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28552</guid>
         <pubDate>Sun, 12 Jul 2015 19:56:15 +0000</pubDate>
      </item>
      <item>
         <title>Hacking Team Hacked: 400GB Data Dump of Internal Documents/Emails/Source Code from Notorious Spyware Dealer</title>
         <link>http://leaksource.info/2015/07/07/hacking-team-hacked-400gb-data-dump-of-internal-documents-emails-source-code-from-notorious-spyware-dealer/</link>
         <description>&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/hacked-team.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28513&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/hacked-team.jpg?w=604&amp;#038;h=101&quot; alt=&quot;hacked-team&quot; width=&quot;604&quot; height=&quot;101&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;07/05-09/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The controversial Italian surveillance company &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/Hacking_Team&quot;&gt;Hacking Team&lt;/a&gt;&lt;/span&gt;, which &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;sells spyware to governments all around the world&lt;/span&gt;&lt;/a&gt;, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://motherboard.vice.com/read/the-dea-has-been-secretly-buying-hacking-tools-from-an-italian-company&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;US Drug Enforcement Administration&lt;/span&gt;&lt;/a&gt;, has been seriously hacked.&lt;/p&gt;
&lt;p&gt;Hackers have made 400GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download.&lt;/p&gt;
&lt;p&gt;What’s more, the unknown hackers &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://archive.is/n0om8&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;announced their feat through Hacking Team’s own Twitter account&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/hacked-team.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28509&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/hacked-team.png?w=604&quot; alt=&quot;hacked-team&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;Torrent Links:&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://mega.nz/#!Xx1lhChT!rbB-LQQyRypxd5bcQnqu-IMZN20ygW_lWfdHdqpKH3E&quot;&gt;https://mega.nz/#!Xx1lhChT!rbB-LQQyRypxd5bcQnqu-IMZN20ygW_lWfdHdqpKH3E&lt;/a&gt;&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://infotomb.com/eyyxo.torrent&quot;&gt;http://infotomb.com/eyyxo.torrent&lt;/a&gt;&lt;br /&gt;
Mirror:&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://ht.transparencytoolkit.org/&quot;&gt;https://ht.transparencytoolkit.org/&lt;/a&gt;&lt;br /&gt;
Source Codes:&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://github.com/hackedteam?tab=repositories&quot;&gt;https://github.com/hackedteam?tab=repositories&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;RELEASE: Over one million searchable emails from spyware contractor  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/qMYMnmh0ZM&quot;&gt;https://t.co/qMYMnmh0ZM&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/XkiFsOZPVQ&quot;&gt;pic.twitter.com/XkiFsOZPVQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/619153595494191104&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;Last year, a hacker who only went by the name &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/08/09/hack-back-a-diy-guide-for-those-without-the-patience-to-wait-for-whistleblowers/&quot;&gt;&amp;#8220;PhineasFisher&amp;#8221; hacked&lt;/a&gt;&lt;/span&gt; the controversial surveillance tech company &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/FinFisher&quot;&gt;Gamma International&lt;/a&gt;&lt;/span&gt;, a British-German surveillance company that sells the spyware software FinFisher. He then went on to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/08/06/gamma-finfisher-hack-40gb-of-internal-docs-source-code-from-top-govt-spyware-company-leaked/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;leak more than 40GB of internal data from the company&lt;/span&gt;&lt;/a&gt;, which has been long criticized for selling to repressive governments.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/hacking-team-finfisher-hack.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28512&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/hacking-team-finfisher-hack.png?w=604&amp;#038;h=517&quot; alt=&quot;hacking-team-finfisher-hack&quot; width=&quot;604&quot; height=&quot;517&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;That same hacker has now claimed responsibility for the breach of Hacking Team, that sells a similar product called Remote Control System Galileo.&lt;/p&gt;
&lt;div class=&quot;embed-vimeo&quot;&gt;&lt;/div&gt; 
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzofb&quot;&gt;Lorenzo Franceschi-Bicchierai&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://motherboard.vice.com/read/hacker-claims-responsibility-for-the-hit-on-hacking-team&quot;&gt;Motherboard&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;On Sunday night, I reached out to the hacker while he was in control of Hacking Team’s Twitter account via a direct message to &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam&quot;&gt;@hackingteam&lt;/a&gt;&lt;/span&gt;. Initially, PhineasFisher responded with sarcasm, saying he was willing to chat because “we got such good publicity from your last story!” referring to a recent &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://motherboard.vice.com/read/hacking-team-founder-hey-fbi-we-can-help-you-crack-the-dark-web&quot;&gt;story&lt;/a&gt;&lt;/span&gt; I wrote about the company’s CEO claiming to be able to crack the dark web.&lt;/p&gt;
&lt;p&gt;Afterwards, however, he also claimed that he was PhineasFisher. To prove it, he told me he would use the parody account he used last year to promote the FinFisher hack to claim responsibility.&lt;/p&gt;
&lt;p&gt;“I am the same person behind that hack,” he told me before coming out publicly.&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;gamma and HT down, a few more to go &lt;span class='wp-smiley wp-emoji wp-emoji-smile' title=':)'&gt;:)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Phineas Fisher (@GammaGroupPR) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/GammaGroupPR/status/617937092497178624&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;The hacker, however, declined to answer to any further questions.&lt;/p&gt;
&lt;p&gt;The leak of 400GB of internal files contains “everything,” according to a person close to the company, who only spoke on condition of anonymity. The files contain internal emails between employees; a list of customers, including some, such as the FBI, that were previously unknown; and allegedly even the source code of Hacking Team’s software, its crown jewels.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;HIGHLIGHTS:&lt;br /&gt;
&lt;/strong&gt;&lt;/p&gt;
&lt;blockquote class='twitter-tweet'&gt;&lt;p&gt;A few weeks ago Hacking Team&amp;#039;s co-founder joked in emails about how bad a leak would be for his company. Oh dear&amp;#8230; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/AIdOJK3ArG&quot;&gt;http://t.co/AIdOJK3ArG&lt;/a&gt;&amp;mdash; &lt;br /&gt;Ryan Gallagher (@rj_gallagher) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href='http://twitter.com/#!/rj_gallagher/status/618158437130702848'&gt;July 06, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://docs.google.com/spreadsheets/d/16hcG3kzn5UYXGqpN2iAaSsy6kG85RYDeJNh5V5k8Ydo/pub?output=xlsx&quot;&gt;Download Spreadsheet&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://docs.google.com/spreadsheets/d/1xBcnB8mPYrDh062XNtSjlPe_t7Agjdjpk_pnpz0sJgc/pub?output=xlsx&quot;&gt;Download Spreadsheet&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; planning major moves into the United States, pursuing contracts with ATF, DOJ, Navy, RCMP, local police. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/owBOLoLfpx&quot;&gt;pic.twitter.com/owBOLoLfpx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Collin Anderson (@CDA) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/CDA/status/618089403681009664&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;br /&gt;
&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://docs.google.com/spreadsheets/d/1bVKBjNkGp60qjzGYO9n9RGWLb0ZPKQNHfwUXPPpicQs/pub?output=xlsx&quot;&gt;Download Spreadsheet&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;So turns out the FBI has spent $775,000 on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; tools since 2011. My dig in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/WIRED&quot;&gt;@WIRED&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/DURVelF4fk&quot;&gt;http://t.co/DURVelF4fk&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/1L1lUS9KBY&quot;&gt;pic.twitter.com/1L1lUS9KBY&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Joseph Cox (@josephfcox) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/josephfcox/status/618138577357139968&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking team provided FBI with zero-day exploits. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/KLlyCNybf5&quot;&gt;https://t.co/KLlyCNybf5&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/IEecyXDeln&quot;&gt;pic.twitter.com/IEecyXDeln&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/619192152665538561&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Details on US agencies buying Hacking Teams software: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/e8HeHpwUHk&quot;&gt;https://t.co/e8HeHpwUHk&lt;/a&gt; Code names for FBI and DEA are &amp;quot;Phoebe&amp;quot; and &amp;quot;Katie&amp;quot;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Cora Currier (@coracurrier) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/coracurrier/status/618104369079316480&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Very interesting Hacking Team email on US DEA using spy tech &amp;quot;that will receive all the traffic for Columbian ISPs&amp;quot;: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/HBJG70Ymaj&quot;&gt;pic.twitter.com/HBJG70Ymaj&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Ryan Gallagher (@rj_gallagher) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/rj_gallagher/status/618176144106500096&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team, surveillance vendor to FBI, DEA, and U.S. Army (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/SuT0z3uzZb&quot;&gt;http://t.co/SuT0z3uzZb&lt;/a&gt;) made a secret recording of ME &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/cIlcZodHiU&quot;&gt;pic.twitter.com/cIlcZodHiU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Morgan Marquis-Boire (@headhntr) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/headhntr/status/618209604246175744&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;Screenshot shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://citizenlab.org/tag/hacking-team/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;numerous cases&lt;/span&gt;&lt;/a&gt; of abuse from Hacking Team’s clients.&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/hacking-team-citizen-lab.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28511&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/hacking-team-citizen-lab.png?w=604&quot; alt=&quot;hacking-team-citizen-lab&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Hacking Team has never revealed a list of its clients, and &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/qEW59NdYuy&quot;&gt;has always and repeatedly denied&lt;/a&gt;&lt;/span&gt; selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.&lt;/p&gt;
&lt;p&gt;The email about Citizen Lab is filed in a folder called “Anti HT activists.”&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;The activist groups on Hacking Team&amp;#39;s enemies list: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/AEJnQcA7rM&quot;&gt;pic.twitter.com/AEJnQcA7rM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Ryan Gallagher (@rj_gallagher) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/rj_gallagher/status/618552975095668736&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking team employee jokes about assassinating ACLU technologist &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/dCmA0U6GKz&quot;&gt;https://t.co/dCmA0U6GKz&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Micah Lee (@micahflee) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/micahflee/status/619297366080761856&quot;&gt;July 10, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team CEO on learning WikiLeaks was tracking his mobile phones all over the world: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/k7QiDTMD2T&quot;&gt;https://t.co/k7QiDTMD2T&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/QNchvJ2KGM&quot;&gt;pic.twitter.com/QNchvJ2KGM&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; WikiLeaks (@wikileaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks/status/619206030501789696&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;I almost feel like this should be my new twitter bio: &amp;quot;this asinine activist looks like a very smart man&amp;quot; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/JFiM53HhKw&quot;&gt;https://t.co/JFiM53HhKw&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Jacob Appelbaum (@ioerror) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/ioerror/status/619211048080547840&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;My piece on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam&quot;&gt;@hackingteam&lt;/a&gt; emails &amp;#8211; exposing proposed &amp;#39;death squad&amp;#39; deal, secret UK sales push, &amp;amp; much more: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/shCObgce5L&quot;&gt;https://t.co/shCObgce5L&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Ryan Gallagher (@rj_gallagher) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/rj_gallagher/status/618926230813978624&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&amp;quot;Hacking Team&amp;quot; partnered w/prominent defense contractor to sell UAE spyware used to target activists &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/UikaoigwJ0&quot;&gt;http://t.co/UikaoigwJ0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Lee Fang (@lhfang) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lhfang/status/618467089334996992&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; sold spy software to blacklisted &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/Sudan?src=hash&quot;&gt;#Sudan&lt;/a&gt; and &amp;#39;stonewalled &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/UN?src=hash&quot;&gt;#UN&lt;/a&gt; investigation&amp;#39; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/WmM6hU6vxq&quot;&gt;http://t.co/WmM6hU6vxq&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Gianluca Mezzofiore (@GianlucaMezzo) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/GianlucaMezzo/status/617967400684793856&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; brainstorming how to reassure Sudan after our &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/citizenlab&quot;&gt;@citizenlab&lt;/a&gt; report in March 2014 &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/x513uPrXrE&quot;&gt;https://t.co/x513uPrXrE&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Claudio (@botherder) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/botherder/status/620738303948652548&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;creepy surveillance company may have violated EU sanctions by selling tech to russia… me+&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/maxseddon&quot;&gt;@maxseddon&lt;/a&gt; team up at last &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/GEROUskJQq&quot;&gt;http://t.co/GEROUskJQq&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Joe Bernstein (@Bernstein) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Bernstein/status/618111776358563840&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Congrats to the government of Chile, which in 2014 signed the largest &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam&quot;&gt;@hackingteam&lt;/a&gt; contract to date: 2.85 mil USD. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/MuRc6DVecl&quot;&gt;pic.twitter.com/MuRc6DVecl&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/617886958774317056&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Who says selling surveillance tech to govs that spy on journalists doesn&amp;#39;t pay well? $1 mil from Ethiopia. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/I3HCxdl3Gl&quot;&gt;pic.twitter.com/I3HCxdl3Gl&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/617879757733134336&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;After &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/citizenlab&quot;&gt;@citizenlab&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hrw&quot;&gt;@hrw&lt;/a&gt; outed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;&amp;#39;s Ethiopia campaign, their provider took down control infrastructure. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/bH07Ywe2f0&quot;&gt;pic.twitter.com/bH07Ywe2f0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Collin Anderson (@CDA) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/CDA/status/618239715867820032&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team&amp;#39;s snoopware &amp;#39;spied on anti-communist activists in Vietnam&amp;#39; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/1BqVt5thkm&quot;&gt;http://t.co/1BqVt5thkm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; The Register (@TheRegister) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/TheRegister/status/620616360364769280&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Want to sell surveillance software to Azerbaijan? Best to sell through a shadowy front company in Nevada. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/uItb2HoSYn&quot;&gt;pic.twitter.com/uItb2HoSYn&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/617997481390047232&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Selling an exploit portal to Egypt in 2012? Seems legit. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/XuoqpfeiJC&quot;&gt;pic.twitter.com/XuoqpfeiJC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/617877508403384320&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;&amp;#39;s CEO seems to spend hours each week writing emails to their customer list encouraging bombing of Iran. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/XF5FrF54jr&quot;&gt;pic.twitter.com/XF5FrF54jr&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Collin Anderson (@CDA) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/CDA/status/618372537458774016&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&amp;quot;Not our responsibility to vet clients&amp;quot; says Hacking Team US sales consultant. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/8u4hLG1dri&quot;&gt;pic.twitter.com/8u4hLG1dri&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Eric King (@e3i5) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/e3i5/status/618122073379086336&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;For Arab human rights defenders &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/hackingteam?src=hash&quot;&gt;#hackingteam&lt;/a&gt; files confirm suspicions of state surveillance &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/opHaeuiD5d&quot;&gt;http://t.co/opHaeuiD5d&lt;/a&gt; My latest for &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Advox&quot;&gt;@Advox&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Abir Ghattas (@AbirGhattas) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/AbirGhattas/status/618835746645012480&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;A detailed look at Hacking Team&amp;#39;s emails about clients with dubious human rights records &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/Hl5LskfMnZ&quot;&gt;http://t.co/Hl5LskfMnZ&lt;/a&gt; by &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/coracurrier&quot;&gt;@coracurrier&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/headhntr&quot;&gt;@headhntr&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Morgan Marquis-Boire (@headhntr) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/headhntr/status/618489592795172864&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;SCOOP: Hacking Team demoed its spy software for Calgary, Vancouver Police and Ottawa RCMP: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/8liQ3nyPNI&quot;&gt;http://t.co/8liQ3nyPNI&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/motherboard&quot;&gt;@motherboard&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; matthew braga (@mattbraga) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/mattbraga/status/618489154553401345&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Exclusive: German company bought &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/spyware?src=hash&quot;&gt;#spyware&lt;/a&gt; from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;. Who are their clients? &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/welt&quot;&gt;@welt&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/Sdzhk3aenX&quot;&gt;http://t.co/Sdzhk3aenX&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/P7DRHOOneG&quot;&gt;pic.twitter.com/P7DRHOOneG&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Florian Flade (@FlorianFlade) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/FlorianFlade/status/619201601379639297&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;The Mayor of Quito was one of Hacking Team&amp;#39;s Ecuador targets &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/RZeL0d4HT9&quot;&gt;http://t.co/RZeL0d4HT9&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeamTransparencyReport?src=hash&quot;&gt;#HackingTeamTransparencyReport&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Bethany Horne (@bbhorne) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/bbhorne/status/619123863868338177&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Ecuadorian Websites Report on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;, Get Taken Down &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/20mZZIJSqt&quot;&gt;http://t.co/20mZZIJSqt&lt;/a&gt; by &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/RebecaMorla&quot;&gt;@RebecaMorla&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/Ecuador?src=hash&quot;&gt;#Ecuador&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/yfFDtBwyuQ&quot;&gt;pic.twitter.com/yfFDtBwyuQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; PanAm Post (@PanAmPost) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/PanAmPost/status/620594311646810113&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;EXCLUSIVE: Irish Defence Forces involved with hacked security company &amp;quot;Hacker Team&amp;quot; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; &amp;#10;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/qXsU0kE3Jh&quot;&gt;https://t.co/qXsU0kE3Jh&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; BeYourOwnReason (@beyourownreason) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/beyourownreason/status/618079358603931648&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Intelligence Service chief steps down &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/6FyYwFu5uI&quot;&gt;http://t.co/6FyYwFu5uI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; The Cyprus Weekly (@TheCyprusWeekly) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/TheCyprusWeekly/status/619813874875953152&quot;&gt;July 11, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;From the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; files: big banks worked with the controversial surveillance company &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/McvUwFCSJo&quot;&gt;http://t.co/McvUwFCSJo&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/OwW19tHqIU&quot;&gt;pic.twitter.com/OwW19tHqIU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Joseph Cox (@josephfcox) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/josephfcox/status/618067121281568768&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team: Our exploit portal always has at least 3 zero-day exploits, but please try to use non-zero days first. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/flJpIR8hkc&quot;&gt;https://t.co/flJpIR8hkc&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618084502431121408&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team: Having trouble getting onto a sophisticated target&amp;#39;s device? We offer consultancy services too. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/oaahc24wET&quot;&gt;http://t.co/oaahc24wET&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618085654677860352&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Three 0day brokers accused of dealing with &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; deny any wrongdoing &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/tccKSLGjz5&quot;&gt;http://t.co/tccKSLGjz5&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/L0Pbvux26w&quot;&gt;pic.twitter.com/L0Pbvux26w&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Joseph Cox (@josephfcox) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/josephfcox/status/620596895640064000&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;fr&quot; dir=&quot;ltr&quot;&gt;Microsoft Internet Exploitable  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/Gi0dzGRqES&quot;&gt;https://t.co/Gi0dzGRqES&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Matthew Keys (@MatthewKeysLive) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/MatthewKeysLive/status/619229048393195520&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team leak releases potent Flash 0day into the wild &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/TcQmgzguTz&quot;&gt;http://t.co/TcQmgzguTz&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Dan Goodin (@dangoodin001) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/dangoodin001/status/618481229826932736&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;How a Russian hacker made $45,000 selling a zero-day Flash exploit to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/OTjLxhQmpE&quot;&gt;http://t.co/OTjLxhQmpE&lt;/a&gt; cc &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzoFB&quot;&gt;@lorenzoFB&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/doctorow&quot;&gt;@doctorow&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Cyrus Farivar (@cfarivar) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/cfarivar/status/619513384585703424&quot;&gt;July 10, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Third Hacking Team Flash Zero-Day Found &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/kCnds2PDW0&quot;&gt;http://t.co/kCnds2PDW0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; KrebsSecurity (@KrebsSecurity) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/KrebsSecurity/status/620691558505918464&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Pro-tip: Don&amp;#39;t want &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam&quot;&gt;@HackingTeam&lt;/a&gt;&amp;#39;s clients to spy on you? Don&amp;#39;t jailbreak your iPhone. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/fJHgICpXPl&quot;&gt;https://t.co/fJHgICpXPl&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/HhrgmDxhI3&quot;&gt;pic.twitter.com/HhrgmDxhI3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618102701025574912&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team&amp;#39;s inability to develop iOS malware for non-jailbroken iPhones likely explains why FBI director Comey is foaming at the mouth.&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618125764970565632&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;via &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/iblametom&quot;&gt;Thomas Fox-Brewster&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.forbes.com/sites/thomasbrewster/2015/07/06/us-gov-likes-hacking-team/&quot;&gt;Forbes&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://ht.musalbas.com/rcs-dev%5cshare/QA/Reports/9.6/Android/&quot;&gt;In-depth notes on the level of exploitation across a number of Android devices&lt;/a&gt;&lt;/span&gt;, from the likes of Samsung, HTC and Huawei. It appears the exploits weren’t always successful in accessing voice or texts on phones.&lt;/p&gt;
&lt;p&gt;Hacking Team operations manager Daniele Milan&amp;#8217;s email from January indicated some imminent features in Hacking Team’s tools included “physical infection of BitLocker protected disks”, thereby bypassing the much-used Microsoft disk encryption technology, as well as “extraction of information from pictures posted on Facebook and Twitter”. It will also soon be able to “capture of documents edited using Google Docs or Office 365”, the roadmap suggested.&lt;/p&gt;
&lt;p&gt;Another email from Milan, dated 15 May, indicated the security-focused messaging application Wickr was on the target list too, thanks to a request from the US government. “I had a call this morning with an agent from Homeland Security Investigations [a body within the Department of Homeland Security], and he told me he got some requests to intercept suspects using this application, Wickr… we may want to keep an eye on it and eventually evaluate to add support.”&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team&amp;#39;s $175,000 Apple Store And Google Play Surveillance Apps Flirt With Illegality &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Forbes&quot;&gt;@Forbes&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/ZRVzUcUtvA&quot;&gt;http://t.co/ZRVzUcUtvA&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Thomas Fox-Brewster (@iblametom) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/iblametom/status/618825782622707713&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Post-Hacking Team breach, Google says it&amp;#39;s improved its app scanning processes for Play (see update at bottom): &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/9VuNU1I19B&quot;&gt;http://t.co/9VuNU1I19B&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Thomas Fox-Brewster (@iblametom) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/iblametom/status/620624352019505153&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/thegrugq&quot;&gt;@thegrugq&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/_ejvm&quot;&gt;@_ejvm&lt;/a&gt; seems that &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/hackingteam?src=hash&quot;&gt;#hackingteam&lt;/a&gt; software is also capable of stealing bitcoins accounts&amp;#8230;. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/unacceptable?src=hash&quot;&gt;#unacceptable&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/OQ1ecJkAYh&quot;&gt;pic.twitter.com/OQ1ecJkAYh&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Aaron Mizrachi (@unmanarc) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/unmanarc/status/618102286854717440&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;via &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/dangoodin001&quot;&gt;Dan Goodin&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/&quot;&gt;ArsTechnica&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Another document boasts of Hacking Team&amp;#8217;s ability to bypass &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.imperialviolet.org/2011/05/04/pinning.html&quot;&gt;certificate pinning &lt;/a&gt;&lt;/span&gt; and the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security&quot;&gt;HTTP strict transport security&lt;/a&gt;&lt;/span&gt; mechanisms that are designed to make HTTPS website encryption more reliable and secure. &amp;#8220;Our solution is the only way to intercept TOR traffic at the moment,&amp;#8221; the undated PowerPoint presentation went on to say.&lt;/p&gt;
&lt;p&gt;Elsewhere, the document stated: &amp;#8220;HTTPS Everywhere enforces https and could send rogue certificates to the EFF SSL Observatory.&amp;#8221; HTTPS Everywhere is a browser extension developed by the Electronic Frontier Foundation that ensures end users use HTTPS when connecting to a preset list of websites. The statement appears to be a warning that any fraudulent certificates Galileo relies on could become public if used against HTTPS Everywhere users when they have selected an option to &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.eff.org/deeplinks/2012/02/https-everywhere-decentralized-ssl-observatory&quot;&gt;send anonymous copies of HTTPS certificates to EFF&amp;#8217;s SSL Observatory database&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;&amp;#39;s &amp;quot;Project X&amp;quot; is a work-in-progress method for getting around Tor &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/lF3DV3ubJq&quot;&gt;http://t.co/lF3DV3ubJq&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/9joQREy8oe&quot;&gt;pic.twitter.com/9joQREy8oe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Joseph Cox (@josephfcox) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/josephfcox/status/620607857243877376&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;Renowned cryptographer &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.schneier.com/blog/archives/2015/07/hacking_team_is.html&quot;&gt;Bruce Schneier&lt;/a&gt;&lt;/span&gt;: &amp;#8220;The Hacking Team CEO, David Vincenzetti, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.forbes.com/sites/thomasbrewster/2015/07/06/us-gov-likes-hacking-team/&quot;&gt;doesn&amp;#8217;t like me&lt;/a&gt;&lt;/span&gt;:&amp;#8221;&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;In another [e-mail], the Hacking Team CEO on 15 May claimed renowned cryptographer Bruce Schneier was &amp;#8220;exploiting the Big Brother is Watching You FUD (Fear, Uncertainty and Doubt) phenomenon in order to sell his books, write quite self-promoting essays, give interviews, do consulting etc. and earn his hefty money.&amp;#8221;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;New Analysis Shows Hacking Team Used Spammer Tricks to Resurrect Wayward Spy Network &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/GAPffQ92WA&quot;&gt;http://t.co/GAPffQ92WA&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; briankrebs (@briankrebs) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/briankrebs/status/620457552334204928&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team orchestrated brazen BGP hack to hijack IPs it didn’t own &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/krO8cyRIEE&quot;&gt;http://t.co/krO8cyRIEE&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Dan Goodin (@dangoodin001) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/dangoodin001/status/620366357591257088&quot;&gt;July 12, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Ex-Hacking Team employee developed counter surveillance software thatcould detect HT. HT not very happy.&amp;#10;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/ou2eLnrZe6&quot;&gt;https://t.co/ou2eLnrZe6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618122379047378945&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;trying to stop me from leaving HT, the CEO asked the help of Italian Gov to harass and threaten me &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/s2cbuGoE1D&quot;&gt;https://t.co/s2cbuGoE1D&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Guido Landi (@k_sOSe) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/k_sOSe/status/619174572668100612&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;I worked at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;, my email were leaked to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/wikileaks&quot;&gt;@wikileaks&lt;/a&gt;, and I&amp;#39;m OK with that &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/HXug57QrCg&quot;&gt;https://t.co/HXug57QrCg&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Claudio Agosti (@sniffjoke) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/sniffjoke/status/620662926924476416&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;wow. the attackers were in hackingteams infrastructure since january 2015. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/8HhoWdrdpv&quot;&gt;https://t.co/8HhoWdrdpv&lt;/a&gt;&amp;#10;&amp;#10;Lots of youtube/games during working hrs&lt;/p&gt;
&lt;p&gt;&amp;mdash; Dan Tentler (@Viss) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Viss/status/618153223862423552&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Holee crap. This appears to be intercepted audio from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/hackingteam?src=hash&quot;&gt;#hackingteam&lt;/a&gt; targets. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/cITQAYFo8j&quot;&gt;https://t.co/cITQAYFo8j&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Paul D (@Paulmd199) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Paulmd199/status/618139742941491201&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Not just audio. But also some smartphone videos. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/cITQAYFo8j&quot;&gt;https://t.co/cITQAYFo8j&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Paul D (@Paulmd199) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Paulmd199/status/618142296593186816&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;ALL HIS PASSWORDS ARE PASSWORD.&amp;#10;&amp;#10;This is *DEFINITELY* &amp;quot;good enough for government work&amp;quot;. Hooooly craaaaap &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/eshIurqky2&quot;&gt;pic.twitter.com/eshIurqky2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Dan Tentler (@Viss) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Viss/status/617950211239837696&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Here&amp;#39;s the TLS secret key for &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/O96KnDR2o0&quot;&gt;http://t.co/O96KnDR2o0&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/hackingteam?src=hash&quot;&gt;#hackingteam&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/8BhNiKG3Ub&quot;&gt;pic.twitter.com/8BhNiKG3Ub&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Micah Lee (@micahflee) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/micahflee/status/618166439820685312&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;We all got access to C. Pozzi&amp;#39;s GPG key! &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/OUitG4eaJ2&quot;&gt;https://t.co/OUitG4eaJ2&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/hackedteam?src=hash&quot;&gt;#hackedteam&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Jurre van Bergen (@DrWhax) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/DrWhax/status/618034229407023104&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Some say that infosec credentials are worthless. Not always. Photoshop in your name and become a Hacking Team expert. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/f3xYtFp4zk&quot;&gt;pic.twitter.com/f3xYtFp4zk&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618090082155761664&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Making millions selling surveillance software, but still pirating security research tools? Classy. (h/t &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/sb101sb&quot;&gt;@sb101sb&lt;/a&gt;) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/Cl8GeBpJD9&quot;&gt;pic.twitter.com/Cl8GeBpJD9&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Christopher Soghoian (@csoghoian) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian/status/618041812108857344&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Despite &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;&amp;#39;s poor opsec, CEO came from early days of PGP &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/FiL7zhEx0x&quot;&gt;http://t.co/FiL7zhEx0x&lt;/a&gt; cc &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/onthemedia&quot;&gt;@onthemedia&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzoFB&quot;&gt;@lorenzoFB&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Cyrus Farivar (@cfarivar) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/cfarivar/status/618813698023424001&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzofb&quot;&gt;Lorenzo Franceschi-Bicchierai&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://motherboard.vice.com/read/hacking-team-asks-customers-to-stop-using-its-software-after-hack&quot;&gt;Motherboard&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;After suffering a massive hack, the controversial surveillance tech company Hacking Team is scrambling to limit the damage as well as trying to figure out exactly how the attackers hacked their systems.&lt;/p&gt;
&lt;p&gt;But the hack hasn’t just ruined the day for Hacking Team’s employees. The company has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned.&lt;/p&gt;
&lt;p&gt;“They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.&lt;/p&gt;
&lt;p&gt;Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said.&lt;/p&gt;
&lt;p&gt;A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data.&lt;/p&gt;
&lt;p&gt;It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source.&lt;/p&gt;
&lt;p&gt;In a &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://archive.is/Ca8Kz&quot;&gt;series of tweets&lt;/a&gt;&lt;/span&gt; on Monday morning, which have been since deleted, Pozzi said that Hacking Team was working closely with the police, and warned everyone who was downloading the files and commenting on them.&lt;/p&gt;
&lt;p&gt;“Be warned that the torrent file the attackers claim is clean has a virus,” he wrote. “Stop seeding and spreading false info.”&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Accurate. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/NgntYctdcV&quot;&gt;pic.twitter.com/NgntYctdcV&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Matthew Green (@matthew_d_green) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/matthew_d_green/status/617982986303205376&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/0xabad1dea&quot;&gt;@0xabad1dea&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/matthew_d_green&quot;&gt;@matthew_d_green&lt;/a&gt; but, epic lulz happened first: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/SFrDCKpexZ&quot;&gt;pic.twitter.com/SFrDCKpexZ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Andreⓐ (@puellavulnerata) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/puellavulnerata/status/618094012143153153&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;The future of the company, at this point, it’s uncertain.&lt;/p&gt;
&lt;p&gt;Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard.&lt;/p&gt;
&lt;p&gt;It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts.&lt;/p&gt;
&lt;p&gt;Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely.&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Well, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam&quot;&gt;@hackingteam&lt;/a&gt; can start following its &amp;quot;crisis procedure&amp;quot; any minute now. Perhaps when they wake up. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/HPVSEG8vex&quot;&gt;pic.twitter.com/HPVSEG8vex&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Eva (@evacide) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/evacide/status/617951954308718593&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about.&lt;/p&gt;
&lt;p&gt;To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.&lt;/p&gt;
&lt;p&gt;Hacking Team did not answer to repeated requests for comment, both to its US spokesperson Eric Rabe as well as directly to its office in Milan, Italy.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team: “Data leak shows we have broken no laws and acted completely ethically” &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/EPQhS73Vlf&quot;&gt;http://t.co/EPQhS73Vlf&lt;/a&gt; cc &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/YourAnonNews&quot;&gt;@YourAnonNews&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; David Gilbert (@daithaigilbert) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/daithaigilbert/status/618429810369560576&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;blockquote&gt;&lt;p&gt;When asked about the identity of the person or group who carried out the attack, Rabe indicated that he believed the attack was the work of a nation state or a criminal gang, and not &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; title=&quot;Who hacked Hacking Team? Gamma Group hacker holds their hand up&quot; target=&quot;_blank&quot; href=&quot;http://www.ibtimes.co.uk/who-hacked-hacking-team-gamma-group-hacker-holds-their-hand-1509662&quot;&gt;the work of an activist as many have speculated&lt;/a&gt;&lt;/span&gt;:&lt;/p&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;block1&quot;&gt;&lt;p&gt;&amp;#8220;Doing our own forensics here, we think this was a very sophisticated attack, and certainly not the work of an amateur. The press seems to take the view that this was some sort of human rights activist but I think that is far from certain and it could easily have been criminal activity or some government activity,&amp;#8221; adding that &amp;#8220;this is almost certainly an international crime&amp;#8221;.&lt;/p&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;p&gt;When it was pointed out that if a government or criminal group was behind the attack then posting all the information online seems a strange move, Rabe said: &amp;#8220;I am not sure why anybody would do that, but part of the effort here was to disrupt our operations as much as possible so I think that would be a motive for many different people.&amp;#8221;&lt;/p&gt;
&lt;p&gt;When asked if this could be the work of one of Hacking Team&amp;#8217;s competitors such as UK-based Gamma International or Israeli NSO Group, Rabe said: &amp;#8220;I think that is unlikely&amp;#8221; though he admitted that just like everyone else he was speculating.&lt;/p&gt;
&lt;p&gt;While some media reports have suggested the company is working with the Italian police to investigate the attack, Rabe says that all he will say is that the company is &amp;#8220;working with law enforcement&amp;#8221; reiterating that this was an international attack.&lt;/p&gt;&lt;/blockquote&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Days after &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; breach, nobody fired, no customers lost &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/xFaWipaNUG&quot;&gt;http://t.co/xFaWipaNUG&lt;/a&gt; cc &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/doctorow&quot;&gt;@doctorow&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/ioerror&quot;&gt;@ioerror&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/onthemedia&quot;&gt;@onthemedia&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Cyrus Farivar (@cfarivar) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/cfarivar/status/618695355719221248&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;It has been a busy few days!  But we are posting updates on this feed and at &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/wmgPz9IX8R&quot;&gt;http://t.co/wmgPz9IX8R&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; HackingTeam (@hackingteam) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hackingteam/status/618843399924371456&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Hacking Team says &amp;quot;terrorists&amp;quot; can now use its leaked spyware, but experts are skeptical of the company&amp;#39;s claims. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/KZbL5plQyZ&quot;&gt;http://t.co/KZbL5plQyZ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Lorenzo Franceschi B (@lorenzoFB) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzoFB/status/618826121338089472&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;I asked Hacking Team’s spokesperson if they were working with companies to patch 0days. Here’s what he said &amp;#8211; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/hsNFbxABt8&quot;&gt;http://t.co/hsNFbxABt8&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Matthew Keys (@MatthewKeysLive) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/MatthewKeysLive/status/619227088390877184&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; touts new spyware suite, calls leaks now “obsolete” &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/59fUy9oIj5&quot;&gt;http://t.co/59fUy9oIj5&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Cyrus Farivar (@cfarivar) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/cfarivar/status/620661669207781377&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;So &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; tells the press that the leak of the source code is a danger to everybody, but tells the opposite to its customers?&lt;/p&gt;
&lt;p&gt;&amp;mdash; Claudio (@botherder) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/botherder/status/620647108710912001&quot;&gt;July 13, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;I&amp;#39;ll writeup how hacking team got hacked once they&amp;#39;ve had some time to fail at figuring out what happened and go out of business&lt;/p&gt;
&lt;p&gt;&amp;mdash; Phineas Fisher (@GammaGroupPR) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/GammaGroupPR/status/618250515198181376&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/lorenzoFB&quot;&gt;@lorenzofb&lt;/a&gt; I wonder did &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/GammaGroupPR&quot;&gt;@GammaGroupPR&lt;/a&gt; use the same approach? Cant wait to see the write up. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/1SNygZO7N1&quot;&gt;http://t.co/1SNygZO7N1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Richard Tynan (@richietynan) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/richietynan/status/618072177838030848&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Italy Should Investigate &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;, European Parliament Member Says &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/IS2gQXizho&quot;&gt;http://t.co/IS2gQXizho&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Marietje Schaake (@MarietjeSchaake) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/MarietjeSchaake/status/618496766955102208&quot;&gt;July 7, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; CEO links to LeakSource post on NSA hacking tools catalog in &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackedTeam?src=hash&quot;&gt;#HackedTeam&lt;/a&gt; emails. &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/p9515j44Xo&quot;&gt;https://t.co/p9515j44Xo&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/qcN0ALjA6I&quot;&gt;pic.twitter.com/qcN0ALjA6I&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; LeakSource (@LeakSourceInfo) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/LeakSourceInfo/status/619228721204043776&quot;&gt;July 9, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Correction: they might not be a client, I don&amp;#39;t see them in the documents. Might just be some pro-Hacking Team people.&lt;/p&gt;
&lt;p&gt;&amp;mdash; Mustafa Al-Bassam (@musalbas) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/musalbas/status/618181893364805632&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Mozilla security promises bug bounty to the first person to file bugs for any vulnerabilities from &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt;: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/z3Xw9EMGfZ&quot;&gt;https://t.co/z3Xw9EMGfZ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Runa A. Sandvik (@runasand) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/runasand/status/618042368898531328&quot;&gt;July 6, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;unless i missed it, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/nytimes&quot;&gt;@nytimes&lt;/a&gt; hasn&amp;#39;t independently addressed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/HackingTeam?src=hash&quot;&gt;#HackingTeam&lt;/a&gt; hack. major story on surveillance industry. why no coverage?&lt;/p&gt;
&lt;p&gt;&amp;mdash; David Kaye (@davidakaye) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/davidakaye/status/618824223339884544&quot;&gt;July 8, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;*This post will be continuously updated as there is much more new information emerging. Post anything you find in the comments below and I will add them to the article. LAST UPDATE: 07/13/2015 @ 8PM EST&lt;br /&gt;
&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Related Links:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/spyfiles/list/company-name/hackingteam.html&quot;&gt;WikiLeaks SpyFiles on HackingTeam&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;row-title&quot; title=&quot;Edit &amp;#x00201c;To Protect and Infect: The Militarization of the Internet &amp;#x002013; Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3&amp;#x00201d;&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/12/30/to-protect-and-infect-the-militarization-of-the-internet-claudio-guarnieri-morgan-marquis-boire-jacob-appelbaum-30c3/&quot;&gt;To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;title&quot;&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://firstlook.org/theintercept/2014/10/30/hacking-team/&quot;&gt;Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28508/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28508/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28508&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28508</guid>
         <pubDate>Tue, 07 Jul 2015 14:07:14 +0000</pubDate>
      </item>
      <item>
         <title>Leaked Trade in Services Agreement (TiSA) Documents; Largest &amp;#8220;Trade Deal&amp;#8221; in History &amp;#8211; WikiLeaks</title>
         <link>http://leaksource.info/2015/07/05/leaked-trade-in-services-agreement-tisa-documents-largest-trade-deal-in-history-wikileaks/</link>
         <description>&lt;p class=&quot;text-justify&quot; style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/tisa-secret.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28500&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/tisa-secret.jpg?w=604&amp;#038;h=302&quot; alt=&quot;tisa-secret&quot; width=&quot;604&quot; height=&quot;302&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;text-justify&quot; style=&quot;text-align:center;&quot;&gt;&lt;strong&gt;DOWNLOAD ALL TRADE IN SERVICES AGREEMENT (TISA) DOCUMENTS PUBLISHED BY WIKILEAKS &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://mega.nz/#!egcSCB4I!WLvrobQrp37CEFXVguOcLTUE5wxbFRS9J7v-RdfkK68&quot;&gt;HERE&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;UPDATED 07/02/2015 (44 PDFs &amp;amp; 1 PNG/RAR/16MB)&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;CONTENTS:&lt;/strong&gt;&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-06-19-2014.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28502&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-06-19-2014.png?w=604&amp;#038;h=65&quot; alt=&quot;wikileaks-tisa-06-19-2014&quot; width=&quot;604&quot; height=&quot;65&quot;/&gt;&lt;/a&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-06-03-2015.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28501&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-06-03-2015.png?w=604&amp;#038;h=297&quot; alt=&quot;wikileaks-tisa-06-03-2015&quot; width=&quot;604&quot; height=&quot;297&quot;/&gt;&lt;/a&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-07-01-2015.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28503&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-07-01-2015.png?w=604&amp;#038;h=160&quot; alt=&quot;wikileaks-tisa-07-01-2015&quot; width=&quot;604&quot; height=&quot;160&quot;/&gt;&lt;/a&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/press.html&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28504&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/wikileaks-tisa-07-02-2015.png?w=604&amp;#038;h=128&quot; alt=&quot;wikileaks-tisa-07-02-2015&quot; width=&quot;604&quot; height=&quot;128&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/press.html&quot;&gt;WikiLeaks Press Releases&lt;/a&gt;:&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;&lt;em&gt;06/19/2014&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TiSA) Financial Services Annex, which covers 50 countries and 68.2%&lt;sup&gt;&lt;a rel=&quot;nofollow&quot; id=&quot;ft1&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/press.html#f1&quot;&gt;1&lt;/a&gt;&lt;/sup&gt; of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TiSA enters into force.&lt;/p&gt;
&lt;p&gt;Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures&lt;sup&gt;&lt;a rel=&quot;nofollow&quot; id=&quot;ft2&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/press.html#f2&quot;&gt;2&lt;/a&gt;&lt;/sup&gt;, proponents of TiSA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals – mainly headquartered in New York, London, Paris and Frankfurt – into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data.&lt;/p&gt;
&lt;p&gt;TiSA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TiSA will weaken their position in future services negotiations.&lt;/p&gt;
&lt;p&gt;The draft text comes from the April 2014 negotiation round &amp;#8211; the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland.&lt;/p&gt;
&lt;p&gt;Current WTO parties negotiating TISA are: Australia, Canada, Chile, Chinese Taipei (Taiwan), Colombia, Costa Rica, Hong Kong, Iceland, Israel, Japan, Liechtenstein, Mexico, New Zealand, Norway, Pakistan, Panama, Paraguay, Peru, South Korea, Switzerland, Turkey, the United States, and the European Union, which includes its 28 member states Austria, Belgium, Bulgaria, Cyprus, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the United Kingdom.&lt;/p&gt;
&lt;p&gt;China and Uruguay have expressed interest in joining the negotiations but so far are not included.&lt;/p&gt;
&lt;p&gt;[&lt;a rel=&quot;nofollow&quot; id=&quot;f1&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/press.html#ft1&quot;&gt;1&lt;/a&gt;] Swiss National Center for Competence in Research: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wti.org/fileadmin/user_upload/nccr-trade.ch/wp2/publications/TISA_P_Sauve.pdf&quot;&gt;A Plurilateral Agenda for Services?: Assessing the Case for a Trade in Services Agreement&lt;/a&gt;, Working Paper No. 2013/29, May 2013, p. 10.&lt;/p&gt;
&lt;p&gt;[&lt;a rel=&quot;nofollow&quot; id=&quot;f2&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/press.html#ft2&quot;&gt;2&lt;/a&gt;] For example, in June 2012 Ecuador &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.citizen.org/documents/fact-sheet-ecuador-june-2012-proposal.pdf&quot;&gt;tabled a discussion&lt;/a&gt; on re-thinking regulation and GATS rules; in September 2009 the Commission of Experts on Reforms of the International Monetary and Financial System, convened by the President of the United Nations and chaired by Joseph Stiglitz, released its &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.un.org/ga/econcrisissummit/docs/FinalReport_CoE.pdf&quot;&gt;final report&lt;/a&gt;, stating that &amp;#8220;All trade agreements need to be reviewed to ensure that they are consistent with the need for an inclusive and comprehensive international regulatory framework which is conducive to crisis prevention and management, counter-cyclical and prudential safeguards, development, and inclusive finance.&amp;#8221;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/&quot;&gt;Read the Secret Trade in Services Agreement (TISA) &amp;#8211; Financial Services Annex&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa-financial/analysis.html&quot;&gt;Read the Analysis Article &amp;#8211; Secret Trade in Services Agreement (TISA) &amp;#8211; Financial Services Annex&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Recommended reading:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://opinionator.blogs.nytimes.com/2014/03/15/on-the-wrong-side-of-globalization/?_php=true&amp;amp;_type=blogs&amp;amp;_r=0&quot;&gt;On the Wrong Side of Globalization&lt;/a&gt;&lt;/em&gt;, by Joseph E. Stiglitz, March 15, 2014.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.fas.org/sgp/crs/misc/R43291.pdf&quot;&gt;U.S. Foreign Trade in Services: Trends and Policy Challenges&lt;/a&gt;&lt;/em&gt;, by the Congressional Research Service, May 15, 2014.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.world-psi.org/sites/default/files/documents/research/en_tisaresearchpaper_hqp_internal.pdf&quot;&gt;TiSA versus Public Services&lt;/a&gt;&lt;/em&gt;, a Public Services International study by Scott Sinclair and Hadrian Mertins-Kirkwood, April 28, 2014.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.citizen.org/documents/FinanceReregulationFactSheetFINAL.pdf&quot;&gt;Public Citizen&amp;#8217;s Finance Regulation Factsheet&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.ourworldisnotforsale.org/en/article/international-trade-services-agreement-tisa-why-proposed-free-trade-agreement-fta-services-d&quot;&gt;Our World is Not for Sale Factsheet on TiSA&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;&lt;em&gt;06/03/2015&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;WikiLeaks releases today 17 secret documents from the ongoing TiSA (Trade In Services Agreement) negotiations which cover the United States, the European Union and 23 other countries including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan &amp;amp; Israel &amp;#8212; which together comprise two-thirds of global GDP. &amp;#8220;Services&amp;#8221; now account for nearly 80 per cent of the US and EU economies and even in developing countries like Pakistan account for 53 per cent of the economy. While the proposed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/11/13/leaked-trans-pacific-partnership-tpp-documents-wikileaks-raising-100000-reward-for-missing-chapters/&quot;&gt;Trans-Pacific Partnership (TPP)&lt;/a&gt; has become well known in recent months in the United States, the TiSA is the larger component of the strategic TPP-TISA-&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/03/02/eu-us-transatlantic-trade-and-investment-partnership-ttip-draft-leaked/&quot;&gt;TTIP&lt;/a&gt; &amp;#8216;T-treaty trinity&amp;#8217;. All parts of the trinity notably exclude the &amp;#8216;BRICS&amp;#8217; countries of Brazil, Russia, India, China and South Africa.&lt;/p&gt;
&lt;p&gt;The release coincides with TiSA meetings at the ministerial level at the OECD in Paris today (3–5 June). The &amp;#8216;T-treaty trinity&amp;#8217; of TPP-TISA-TTIP is also under consideration for collective &amp;#8216;Fast-Track&amp;#8217; authority in Congress this month. (UPDATE 06/29/2015 &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://rt.com/usa/270517-obama-fast-track-trade/&quot;&gt;Obama Signs Bill Giving Himself Fast-Track Powers for Trade Deals&lt;/a&gt;)&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;The TiSA release today follows the WikiLeaks publication of the secret draft financial services annex of the TISA negotiations on 19 June 2014 showing the aim to further deregulate the financial sector, despite widespread consensus that lack of oversight and regulation was the main cause of the last global financial crisis of 2008. Today&amp;#8217;s release confirms the ongoing determination to deregulate. Furthermore, standstill clauses will tie the hands of future governments to implement changes in response to changing environment.&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;Today&amp;#8217;s release is the largest on secret TiSA documents and covers numerous previously undisclosed areas. It contains drafts and annexes on issues such as air traffic, maritime, professional services, e-commerce, delivery services, transparency, domestic regulation, as well as several document on the positions of negotiating parties. WikiLeaks has also published detailed expert analysis of the topics covered in today&amp;#8217;s release.&lt;/p&gt;
&lt;p class=&quot;text-justify&quot;&gt;Browse the TiSA documents published by WikiLeaks &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Read more:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/public-services-statement.html&quot;&gt;Public Services International Statement on WikiLeaks TiSA publication&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/owinfs-statement.html&quot;&gt;Our World Is Not For Sale (OWINFS) network Statement on WikiLeaks TiSA publication&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/workers-statement.html&quot;&gt;Communications Workers of America Statement on WikiLeaks TiSA publication&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;07/01/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Today, 1500 CEST Wednesday, 1 July 2015, WikiLeaks releases a modern journalistic holy grail: the secret &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/core/&quot;&gt;Core Text&lt;/a&gt; for the largest &amp;#8216;trade deal&amp;#8217; in history, the TiSA (Trade In Services Agreement), whose 52 nations together comprise two-thirds of global GDP. The negotiating parties are the United States, the 28 members of the European Union and 23 other countries, including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan and Israel.&lt;/p&gt;
&lt;p&gt;Today&amp;#8217;s publication happens the week before the next TiSA negotiating round that begins on Monday, 6 July. WikiLeaks is also today publishing the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/agenda-july/&quot;&gt;full agenda&lt;/a&gt; for next week&amp;#8217;s negotiations, which shows that discussions will focus on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/financial/04-2015/&quot;&gt;Financial Services&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/telecommunication/04-2015&quot;&gt;Telecommunications&lt;/a&gt; and the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/natural-persons/04-2015/&quot;&gt;Movement of Natural Persons&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;WikiLeaks is also publishing a previously unpublished Annex text – the secret TiSA Annex on &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/procurement/&quot;&gt;Government Procurement&lt;/a&gt;. The draft Annex aims to reduce procurement regulation to ensure that TiSA governments will not favour local services over services supplied by foreign multinationals.&lt;/p&gt;
&lt;p&gt;WikiLeaks is also publishing the new negotiating texts for three highly controversial TiSA annexes: the annexes on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/natural-persons/04-2015/&quot;&gt;Movement of Natural Persons&lt;/a&gt;, the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/domestic/04-2015/&quot;&gt;Domestic Regulation Annex&lt;/a&gt; and the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/transparency/04-2015&quot;&gt;Transparency Annex&lt;/a&gt;. All three texts include negotiating positions of each of the participant countries in the TiSA negotiations, and illustrate developments from previous versions of the TiSA annexes, also published by WikiLeaks.&lt;/p&gt;
&lt;p&gt;WikiLeaks has also &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/core/#a&quot;&gt;released 36 pages of our own expert analysis.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;While the proposed &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/11/13/leaked-trans-pacific-partnership-tpp-documents-wikileaks-raising-100000-reward-for-missing-chapters/&quot;&gt;Trans-Pacific Partnership (TPP)&lt;/a&gt; and the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/03/02/eu-us-transatlantic-trade-and-investment-partnership-ttip-draft-leaked/&quot;&gt;Transatlantic Trade and Investment Pact (TTIP)&lt;/a&gt; have become well known in recent months, the TiSA is the largest component of the United States&amp;#8217; strategic neoliberal &amp;#8216;trade&amp;#8217; treaty triumvirate. Together, the three treaties form not only a new legal order shaped for transnational corporations, but a new economic &amp;#8220;grand enclosure&amp;#8221;, which excludes China and all other BRICS countries.&lt;/p&gt;
&lt;p&gt;According to &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.nytimes.com/2015/04/07/us/politics/defense-secretary-supports-trade-deal-with-asia.html&quot;&gt;statements made in April by US Secretary of Defense Ashton Carter&lt;/a&gt;, parts of the triumvirate are &amp;#8220;as important&amp;#8221; to the US engagement with Asia as &amp;#8220;another aircraft carrier&amp;#8221;. All three treaties have been subject to stringent criticism for the lack of transparency and public consultation in their negotiation processes. TiSA drafts are classified for a period of five years after the completion of the treaty.&lt;/p&gt;
&lt;p&gt;According to NSA interceptions of French treasurer Jean-Francois Boittin &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/06/30/wikileaks-nsa-docs-surveillance-of-france-presidents-economic-espionage-investigation-underway-for-new-whistleblower/&quot;&gt;published by WikiLeaks on Tuesday&lt;/a&gt; &amp;#8220;Washington is negotiating with every nation that borders China&amp;#8230; so as to &amp;#8216;confront Beijing&amp;#8217;.&amp;#8221;&lt;/p&gt;
&lt;p&gt;The TiSA &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/core/&quot;&gt;Core Text&lt;/a&gt; shows how this negotiation aims at going beyond the GATS agreement, substantially further restricting what governments can do in services. There are far more extensive criteria for commercial firms, including foreign ones, to force governments to protect their corporate interests. Changes to scheduling bring more services than GATS under two main rules regarding commercial businesses working in foreign jurisdictions: non-discrimination in favour of local companies and market access abilities to not limit the size and shape of foreign companies in the market.&lt;/p&gt;
&lt;p&gt;The text also shows TiSA expanding the GATS agreement to include new &amp;#8220;disciplines&amp;#8221; such as those on domestic regulation, transparency and eCommerce. TiSA is also of great worry to developing countries, a number of whom will be bound by this agreement, as it does not give any of the GATS provisions for them, but instead gives greater protections for foreign growth into the countries, with protections for national services far lesser than GATS&amp;#8217;.&lt;/p&gt;
&lt;p&gt;Today&amp;#8217;s publication of the TiSA Core Text adds to WikiLeaks&amp;#8217; prior publications of numerous secret TiSA annexes. The text reveals the ideological and legal underpinnings of the TiSA, and provides the overarching context for each of the TiSA annexes.&lt;/p&gt;
&lt;p&gt;According to World Bank figures, &amp;#8220;services&amp;#8221; comprise 75% of the EU economy and 80% of the US economy. For a typical developing country like Pakistan, services comprise 53% of its economy. The TiSA covers the majority of the global economy.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Julian Assange&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;07/02/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Today, Wednesday July 2, 2015 at 1500 CEST, WikiLeaks continues publishing documents from the secret ongoing TiSA (Trade in Services Agremeent) negotiations, with four Chapters in key areas ahead of the next negotiating round on Monday: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/ecommerce/05-2015/&quot;&gt;Electronic Commerce&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/telecommunication/04-2015/&quot;&gt;Telecommunications Services&lt;/a&gt;, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/financial/04-2015/&quot;&gt;Financial Services&lt;/a&gt; and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/tisa/maritime/04-2015/&quot;&gt;Maritime Transport Services&lt;/a&gt;. All four texts include the confidential negotiating positions for each of the TiSA participating countries. Today WikiLeaks is also publishing detailed analyses on each of these Chapters, totalling 26 pages, explaining how they have changed since previous rounds, also published by WikiLeaks.&lt;/p&gt;
&lt;p&gt;The Annexes show a concerted attempt to place restrictions on the ability of participating governments to regulate services sectors, even where regulations are necessary to protect the privacy of domestic populations, the natural environment or the integrity of public services. Today&amp;#8217;s TiSA documents follow WikiLeaks publication yesterday of five TiSA negotiating texts including the Core Text, and brings WikiLeaks&amp;#8217; overall total of published secret TiSA texts to 28.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Related Links:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/11/13/leaked-trans-pacific-partnership-tpp-documents-wikileaks-raising-100000-reward-for-missing-chapters/&quot;&gt;Leaked Trans-Pacific Partnership (TPP) Documents; WikiLeaks Raising $100,000 Reward for Missing Chapters&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; class=&quot;row-title&quot; title=&quot;Edit &amp;#x00201c;EU/US Transatlantic Trade and Investment Partnership (TTIP) Draft Leaked&amp;#x00201d;&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2014/03/02/eu-us-transatlantic-trade-and-investment-partnership-ttip-draft-leaked/&quot;&gt;EU/US Transatlantic Trade and Investment Partnership (TTIP) Draft Leaked&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28499/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28499/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28499&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28499</guid>
         <pubDate>Sun, 05 Jul 2015 16:35:51 +0000</pubDate>
      </item>
      <item>
         <title>Jihad vs Jihad: Islamic State &amp;#038; Syrian Rebel Group Army of Islam Release Videos Executing Each Other&amp;#8217;s Fighters</title>
         <link>http://leaksource.info/2015/07/01/jihad-vs-jihad-islamic-state-syrian-rebel-group-army-of-islam-release-videos-executing-each-others-fighters/</link>
         <description>&lt;p class=&quot;author-name&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/is-06-25-2015.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28479&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/is-06-25-2015.png?w=604&amp;#038;h=257&quot; alt=&quot;is-06-25-2015&quot; width=&quot;604&quot; height=&quot;257&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;author-name&quot;&gt;&lt;em&gt;06/25/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Islamic State in Syria has released a video showing the brutal beheading 12 men accused of fighting for the terrorist group&amp;#8217;s Al Qaeda and Army of Islam (Jaysh al-Islam) rivals. The video &amp;#8211; titled &amp;#8216;Repent Before We Apprehend You&amp;#8217;, was released by the lesser known Damascus branch of IS. Filmed close to Syrian capital and regime stronghold Damascus, the footage shows the terrified men being interviewed and paraded in front of the camera before their execution. After &amp;#8216;confessing&amp;#8217; to the crime of opposing Islamic State and failing to declare allegiance to the terrorist group&amp;#8217;s leader Abu Bakr al-Baghdadi, the men are led out into a desert clearing where they are forced to their knees and each man executed by a different masked member of the IS.&lt;/strong&gt;&lt;/p&gt;
&lt;div id=&quot;v-77IXL3ij-1&quot; class=&quot;video-player&quot; style=&quot;min-width:604px;min-height:256px;&quot;&gt;
&lt;embed id=&quot;v-77IXL3ij-1-video&quot; src=&quot;http://s0.videopress.com/player.swf?v=1.04&amp;amp;guid=77IXL3ij&amp;amp;isDynamicSeeking=true&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;604&quot; height=&quot;256&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p&gt;Hollywood-style graphics begin the clip and show the 12 victims hunched over as they are dragged through a remote stretch of desert to the site where they will be murdered. The men walk uncomfortably due to the way their arms are bound, each forced to wear bright orange jumpsuits, and led by heavily armed men wearing full battle fatigues but with their faces exposed. The victims are then handed over to executioners, who cover their faces.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;The footage momentarily rewinds and fades into a montage of Al Qaeda and Army of Islam fighters battling Islamic State, a reminder that the three jihadi groups remain &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.newsweek.com/al-qaeda-vs-isis-battle-soul-jihad-317414&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;fierce&lt;/span&gt;&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.theguardian.com/world/2015/jun/10/how-isis-crippled-al-qaida&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;rivals&lt;/span&gt;&lt;/a&gt; despite having a common enemy in Syrian president Bashar al-Assad.&lt;/p&gt;
&lt;div&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;Over the next few segments, the 12 prisoners are interviewed about the so-called crimes and are forced to confess that they wish they had joined Islamic State before it was too late. The overall theme of the video is along the same lines, and sends a clear signal to other rebel groups fighting in Syria that they must declare allegiance to IS &amp;#8216;before being overcome&amp;#8217;.&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;While speaking directly into the camera, the men appear clean-shaven &amp;#8211; a rarity for jihadis and something likely to have been intended to humiliate the men before they are killed. Seconds later the clip cuts back to the victims wearing orange jumpsuits being led to their deaths.&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;After being marched to the execution site, the armed jihadis take a step back and another group &amp;#8211; all of them masked and a wearing different style of combat gear &amp;#8211; step forward to carry out the beheadings.&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;span id=&quot;ext-gen110&quot;&gt;One fighter whose face is slightly more exposed than the others speaks in Arabic and issues another warning that other jihadi groups must accept &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/Abu_Bakr_al-Baghdadi&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Abu Bakr al-Baghdadi&lt;/span&gt;&lt;/a&gt; as their leader or otherwise face certain death.&lt;/span&gt;&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;Over the following three minutes, the video follows the same format as &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/category/islamic-state/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;other Islamic State murder videos released over the past year&lt;/span&gt;&lt;/a&gt;. Once the lead executioner finishes speaking, the militants begin to execute the victims, pushing their fingers into the men&amp;#8217;s eyes while cutting their throats with small knives. The men wince in agony before dying, at which point the camera cuts to the altogether too familiar site of the victims&amp;#8217; heads being placed on their backs as a final act of humiliation.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/07/ji-07-01-2015.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28480&quot; src=&quot;https://leaksource.files.wordpress.com/2015/07/ji-07-01-2015.png?w=604&amp;#038;h=288&quot; alt=&quot;ji-07-01-2015&quot; width=&quot;604&quot; height=&quot;288&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;em&gt;07/01/2015&lt;/em&gt;&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;strong&gt;A terrorist group battling Islamic State in Syria has turned the tables on its enemies by capturing and slaughtering 18 IS soldiers on camera. Dressed in orange jumpsuits &amp;#8211; attire usually worn by Islamic State&amp;#8217;s victims &amp;#8211; Army of Islam (Jaysh al-Islam) soldiers lead the shackled jihadis to their deaths. Islamic State&amp;#8217;s captured soldiers are forced to kneel as a commander announces: &amp;#8216;Allah did not make a disease without appointing a remedy to it.&amp;#8217; The jihadis &amp;#8211; dressed entirely in black &amp;#8211; are then given something to drink before each of their faces are clearly shown in the 19 minute-long video. They are then shot in the back of the head at point blank range with shotguns.&lt;/strong&gt;&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;div id=&quot;v-3iILdD8U-1&quot; class=&quot;video-player&quot; style=&quot;min-width:604px;min-height:338px;&quot;&gt;
&lt;embed id=&quot;v-3iILdD8U-1-video&quot; src=&quot;http://s0.videopress.com/player.swf?v=1.04&amp;amp;guid=3iILdD8U&amp;amp;isDynamicSeeking=true&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;604&quot; height=&quot;338&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;Before the Islamic State fighters are killed, an Army of Islam militant says: &amp;#8216;The most serious calamity for our jihad today is a group of people who grow at a time of division among Muslims. &lt;span id=&quot;ext-gen109&quot;&gt;This group claimed to be the mother state and made Takfir [accused of apostasy] on other Muslims, shed their blood and looted their properties and dignities. They worsened&amp;#8230; the ordeal of Muslims by corrupting their religion and livelihood and killing the jihadi leaders who did their best to help our stricken nation. They wreaked havoc on our people in liberated areas and cut the supply route of jihadis. They left&amp;#8230; Tehran intact and instead they attacked our mosques.&lt;/span&gt; This is the penalty for what they have committed. We also call on their fellows to repent.&amp;#8217;&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;Also in the video, Army of Islam claims that through investigation and confessions, they have allegedly uncovered collaboration between senior Islamic State commanders and high-ranking officers of Syrian intelligence in Damascus, regarding destroying rebel factions in Eastern Ghouta and the government ceding the area to IS to establish an emirate there. Bear in mind that this is coming from Islamic State prisoners under duress, and from Army of Islam, who&amp;#8217;s goal is to overthrow Syrian p&lt;span id=&quot;ext-gen106&quot;&gt;resident Bashar al-Assad&lt;/span&gt;. So this information, though newsworthy, should be met with skepticism.&lt;/p&gt;
&lt;p class=&quot;mol-para-with-font&quot;&gt;&lt;span id=&quot;ext-gen106&quot;&gt;Led by &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://en.wikipedia.org/wiki/Zahran_Alloush&quot;&gt;Zahran Alloush&lt;/a&gt;&lt;/span&gt;, Army of Islam reportedly commands as many as 25,000 fighters. It was created in 2011 when Saudi Arabia allegedly engineered the merger of over 50 rebel factions after growing alarmed at the rise of al-Qaeda and Islamic State in Syria. Saudi Arabia has reportedly sent millions of dollars to arm and train their fighters, who operate in the war-ravaged Syrian city of Damascus, in their ongoing battle against President Bashar al-Assad. &lt;span id=&quot;ext-gen106&quot;&gt;In April this year, the group released a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dailymail.co.uk/news/article-3062247/The-Army-Islam-Militant-group-battling-ISIS-Syrian-regime-graduation-ceremony-featuring-1-700-soldiers-fleet-armoured-tanks.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;striking video&lt;/span&gt;&lt;/a&gt; showing off 1,700 troops, a fleet of armoured tanks and special forces soldiers in an impressive military parade.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;h/t DailyMail (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dailymail.co.uk/news/article-3139194/12-victims-12-masked-executioners-ISIS-beheads-dozen-men-accused-fighting-Al-Qaeda-new-sickening-video.html&quot;&gt;1&lt;/a&gt;) (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.dailymail.co.uk/news/article-3145562/Rival-Syrian-terror-group-turns-tables-ISIS-fighters-releasing-slick-execution-video-executing-jihadis-dressed-orange-jumpsuits.html&quot;&gt;2&lt;/a&gt;)&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28476/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28476/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28476&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;&lt;div&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/07/01/jihad-vs-jihad-islamic-state-syrian-rebel-group-army-of-islam-release-videos-executing-each-others-fighters/&quot;&gt;&lt;img alt=&quot;is-06-25-2015&quot; src=&quot;http://videos.videopress.com/77IXL3ij/is-06-25-2015_std.original.jpg&quot; width=&quot;160&quot; height=&quot;120&quot;/&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/07/01/jihad-vs-jihad-islamic-state-syrian-rebel-group-army-of-islam-release-videos-executing-each-others-fighters/&quot;&gt;&lt;img alt=&quot;ji-07-01-2015&quot; src=&quot;http://videos.videopress.com/3iILdD8U/ji-07-01-2015_std.original.jpg&quot; width=&quot;160&quot; height=&quot;120&quot;/&gt;&lt;/a&gt;&lt;/div&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28476</guid>
         <pubDate>Wed, 01 Jul 2015 11:29:41 +0000</pubDate>
      </item>
      <item>
         <title>WikiLeaks NSA Docs: Surveillance of France Presidents &amp;#038; Economic Espionage; Investigation Underway for New Whistleblower</title>
         <link>http://leaksource.info/2015/06/30/wikileaks-nsa-docs-surveillance-of-france-presidents-economic-espionage-investigation-underway-for-new-whistleblower/</link>
         <description>&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikielaks-nsa-spying-france-presidents.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28465&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/wikielaks-nsa-spying-france-presidents.png?w=604&amp;#038;h=424&quot; alt=&quot;wikielaks-nsa-spying-france-presidents&quot; width=&quot;604&quot; height=&quot;424&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;06/23/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/&quot;&gt;WikiLeaks&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Today, 23 June 2015, WikiLeaks began publishing &amp;#8220;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Espionnage Élysée&lt;/span&gt;&lt;/a&gt;&amp;#8220;, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/&quot;&gt;intercepts&lt;/a&gt; of the communications of high-level officials from successive French governments over the last ten years.&lt;/p&gt;
&lt;p&gt;The top secret documents derive from directly targeted NSA surveillance of the communications of French Presidents &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept3&quot;&gt;Francois Hollande (2012–present)&lt;/a&gt;&lt;/span&gt;, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept4&quot;&gt;Nicolas Sarkozy (2007–2012)&lt;/a&gt;&lt;/span&gt;, and &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept2&quot;&gt;Jacques Chirac (1995–2007)&lt;/a&gt;&lt;/span&gt;, as well as French cabinet ministers and the French Ambassador to the United States. (&lt;em&gt;Related: &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/10/23/snowden-document-reveals-nsa-programs-used-to-spy-on-france-embassies-in-us/&quot;&gt;Snowden Document Reveals NSA Programs Used to Spy on France Embassies in US&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;The documents also contain the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/selectors.html&quot;&gt;&amp;#8220;selectors&amp;#8221; from the target list&lt;/a&gt;&lt;/span&gt;, detailing the cell phone numbers of numerous officials in the Elysee up to and including the direct cell phone of the President.&lt;/p&gt;
&lt;p&gt;Prominent within the top secret cache of documents are intelligence summaries of conversations between French government officials concerning some of the most pressing issues facing France and the international community, including the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept5&quot;&gt;global financial crisis&lt;/a&gt;&lt;/span&gt;, the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept3&quot;&gt;Greek debt crisis&lt;/a&gt;&lt;/span&gt;, the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept5&quot;&gt;leadership and future of the European Union&lt;/a&gt;&lt;/span&gt;, the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept3&quot;&gt;relationship between the Hollande administration and the German government of Angela Merkel&lt;/a&gt;&lt;/span&gt;, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept2&quot;&gt;French efforts to determine the make-up of the executive staff of the United Nations&lt;/a&gt;&lt;/span&gt;, French involvement in the conflict in Palestine and a &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept1&quot;&gt;dispute between the French and US governments over US spying on France&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;A founding member state of the European Union and one of the five permanent members of the UN Security Council, France is formally a close ally of the United States, and plays a key role in a number of US-associated international institutions, including the Group of 7 (G7), the North Atlantic Treaty Organization (NATO) and the World Trade Organization (WTO).&lt;/p&gt;
&lt;p&gt;The revelation of the extent of US spying against French leaders and diplomats echoes a previous disclosure in the German press concerning US spying on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/10/26/nsa-eavesdropping-on-merkels-phone-since-2002-through-illegal-spying-branch-in-berlin-us-embassy-80-similar-locations-in-other-countries/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;communications&lt;/span&gt;&lt;/a&gt; of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/10/29/bild-obama-aware-of-merkel-spying-since-2010-latimes-white-house-okd-spying-on-allies-spiegel-presidentially-approved/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;German Chancellor Angela Merkel&lt;/span&gt;&lt;/a&gt; and other German officials. That disclosure provoked a political scandal in Germany, eventuating in an official inquiry into German intelligence co-operation with the United States, which is still ongoing.&lt;/p&gt;
&lt;p&gt;While the German disclosures focused on the isolated fact that senior officials were targeted by US intelligence, WikiLeaks&amp;#8217; publication today provides much greater insight into US spying on its allies, including the actual content of intelligence products deriving from the intercepts, showing how the US spies on the phone calls of French leaders and ministers for political, economic and diplomatic intelligence.&lt;/p&gt;
&lt;p&gt;WikiLeaks founder Julian Assange said: &amp;#8220;The French people have a right to know that their elected government is subject to hostile surveillance from a supposed ally. We are proud of our work with leading French publishers Liberation and Mediapart to bring this story to light. French readers can expect more timely and important revelations in the near future.&amp;#8221;&lt;/p&gt;
&lt;p&gt;Documents Released 06/23/2015:&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-target-list-selectors.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28467&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-global-sigint-highlights.png?w=604&amp;#038;h=99&quot; alt=&quot;wikileaks-nsa-france-global-sigint-highlights&quot; width=&quot;604&quot; height=&quot;99&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-target-list-selectors.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28460&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-target-list-selectors.png?w=604&amp;#038;h=718&quot; alt=&quot;wikileaks-nsa-france-target-list-selectors&quot; width=&quot;604&quot; height=&quot;718&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
 
&lt;div style=&quot;font-size:10px;text-align:center;width:100%;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.scribd.com/doc/270064813&quot;&gt;View this document on Scribd&lt;/a&gt;&lt;/div&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-espionnage-elysee-06-23-2015.pdf&quot;&gt;PDF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;06/24/2015&lt;/em&gt;&lt;/p&gt;
&lt;div class=&quot;embed-dailymotion&quot;&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;06/24/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;RT (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://rt.com/news/269335-france-nsa-spying-scandal/&quot;&gt;1&lt;/a&gt;) (&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://rt.com/usa/269500-obama-hollande-spying-conversation/&quot;&gt;2&lt;/a&gt;):&lt;/p&gt;
&lt;p&gt;French President Francois Hollande has described reports from WikiLeaks that Washington spied on three French presidents as “unacceptable.” The French Foreign Ministry is summoning the US ambassador to shed light on the allegations.&lt;/p&gt;
&lt;p&gt;Hollande released the statement following an emergency meeting with key heads of intelligence and ministers at the Elysee Palace in the French capital.&lt;/p&gt;
&lt;p&gt;&amp;#8220;France will not tolerate actions that threaten its security and the protection of its interests,&amp;#8221; the president&amp;#8217;s office said, adding that allegations of spying on French interests had been made in the past.&lt;/p&gt;
&lt;p&gt;&amp;#8220;Commitments were made by the US authorities. They need to be recalled and strictly respected,” Reuters reported.&lt;/p&gt;
&lt;p&gt;A French government spokesman said Paris will send a senior intelligence official to the US to discuss the spying reports.&lt;/p&gt;
&lt;p&gt;French Foreign Minister Laurent Fabius has also summoned the US ambassador to France, Jane Hartley, to explain reports from WikiLeaks.&lt;/p&gt;
&lt;p&gt;Before the hastily scheduled conference, Stephane Le Foll, a politician with the Socialist Party, lashed out at Washington.&lt;/p&gt;
&lt;p&gt;&amp;#8220;It is difficult to accept that between allies&amp;#8230; there can be this kind of activity, particularly related to wiretapping linked to the president of the Republic,&amp;#8221; Le Foll told iTele.&lt;/p&gt;
&lt;p&gt;&amp;#8220;When we are fighting terrorism, one has trouble imagining or understanding what would motivate an ally to spy on his allies,&amp;#8221; he added. &amp;#8220;There are enough dangerous crises in the world today.&amp;#8221;&lt;/p&gt;
&lt;p&gt;US President Barack Obama has assured his French counterpart Francois Hollande that Washington was not tapping his communications, the White House says.&lt;/p&gt;
&lt;p&gt;In the phone call, Obama“reiterated that we have abided by the commitment we made to our French counterparts in late 2013 that we are not targeting and will not target the communications of the French president,” the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://www.whitehouse.gov/the-press-office/2015/06/24/readout-president%E2%80%99s-call-french-president-hollande&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;White House said in a statement&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Nothing was said about the period beween 2006 and 2012, wwhich was mentioned by Wikileaks, though.&lt;/p&gt;
&lt;p&gt;The statement released by Hollande&amp;#8217;s office after the conversation, said in turn that “President Obama reiterated unequivocally his firm commitment &amp;#8230; to end the practices that may have happened in the past and that are considered unacceptable among allies.”&lt;/p&gt;
&lt;p&gt;Despite the surveillance scandal, the statement then said that French intelligence officials will soon go to Washington to &amp;#8220;strengthen cooperation.&amp;#8221;&lt;/p&gt;
&lt;p&gt;US media cited a statement from the NSA saying it was not targeting and would not target Hollande’s communications. The statement did not deny spying had taken place in the past.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;06/24/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Mark Hosenball/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.reuters.com/article/2015/06/24/us-france-wikileaks-investigation-idUSKBN0P421V20150624&quot;&gt;Reuters&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;U.S. and European security authorities are investigating whether a previously unknown leaker provided sensitive intelligence documents to WikiLeaks about alleged U.S. spying on French politicians, according to sources familiar with the matter.&lt;/p&gt;
&lt;p&gt;U.S. and European security sources said the United States and allied governments were actively considering the possibility that someone other than former NSA contractor Edward Snowden provided the latest documents to WikiLeaks and its founder, Julian Assange.&lt;/p&gt;
&lt;p&gt;Two people familiar with documentation which Snowden acquired when he worked as an NSA contractor and later supplied to media outlets said that they do not recall seeing these kind of reports among those materials.&lt;/p&gt;
&lt;p&gt;But some sources familiar with the investigations said it was still possible that these documents originated with Snowden.&lt;/p&gt;
&lt;p&gt;The U.S. and European sources cautioned that they did not know for sure that Assange had developed a source other than Snowden inside U.S. intelligence. Assange has been in contact with associates of Snowden and &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/01/24/snowdens-great-escape/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;helped arrange for him to flee from Hong Kong to Russia&lt;/span&gt;&lt;/a&gt;, where he was later granted asylum.&lt;/p&gt;
&lt;p&gt;But until now, Assange, who three years ago took refuge in Ecuador&amp;#8217;s Embassy in London, has published few if any documents directly attributed to either Snowden&amp;#8217;s leaks or to the NSA.&lt;/p&gt;
&lt;p&gt;Associates of Snowden have said that they believe he deliberately avoided giving sensitive U.S. documents to Assange.&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;French editorial: We should give Snowden asylum, US &amp;quot;contempt&amp;quot; for allies has gone too far: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/aSt9MpXj0x&quot;&gt;https://t.co/aSt9MpXj0x&lt;/a&gt; by me&lt;/p&gt;
&lt;p&gt;&amp;mdash; Jenna McLaughlin (@JennaMC_Laugh) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/JennaMC_Laugh/status/614103583299125248&quot;&gt;June 25, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;An update on my first story today: French Justice minister wouldn’t be surprised if France gave Snowden asylum: &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/Fb0sM8ACYV&quot;&gt;https://t.co/Fb0sM8ACYV&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Jenna McLaughlin (@JennaMC_Laugh) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/JennaMC_Laugh/status/614176631951884288&quot;&gt;June 25, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;US a surveillance superpower spying on foes &amp;amp; allies alike – Assange &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/HfigHhpuUV&quot;&gt;http://t.co/HfigHhpuUV&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://t.co/GbnGyJ0cnq&quot;&gt;pic.twitter.com/GbnGyJ0cnq&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; RT (@RT_com) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/RT_com/status/615174804187017216&quot;&gt;June 28, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt; 
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-economic-espionage.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28466&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-nsa-france-economic-espionage.png?w=604&quot; alt=&quot;wikileaks-nsa-france-economic-espionage&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;06/29/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/&quot;&gt;WikiLeaks&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Today, 29 June 2015, WikiLeaks continues &amp;#8220;Espionnage Élysée&amp;#8221;, our ongoing publication of a collection of TOP SECRET documents from United States surveillance operations against France.&lt;/p&gt;
&lt;p&gt;Today&amp;#8217;s publication comprises seven top secret documents detailing how the US has had a decade- long policy of economic espionage against France, including the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/spyorder/#spyorder2&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;interception of all French corporate contracts and negotiations valued at more than $200 million&lt;/span&gt;&lt;/a&gt;. The documents demonstrate that the US National Security Agency, far from being a rogue organisation, is carrying out an economic espionage policy created by the US Director of National Intelligence. The documents detail the intelligence process, from the tasking of the NSA with collection of desired economic information to the production of developed intelligence reports, which are sent to &amp;#8220;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/spyorder/#spyorder1&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Supported Elements&lt;/span&gt;&lt;/a&gt;&amp;#8221; of the US government, including the US Department of Commerce, the US Trade Represenative, the US Treasury and the Central Intelligence Agency.&lt;/p&gt;
&lt;p&gt;Central within the cache of documents are &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/spyorder/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;two long-term spying orders&lt;/span&gt;&lt;/a&gt; (&amp;#8220;collection requirements&amp;#8221;) which define the kinds of intelligence the NSA is tasked with collecting in its surveillance operations against France.&lt;/p&gt;
&lt;p&gt;The documents make clear that the NSA has been tasked with obtaining intelligence on all aspects of the French economy, from government policy, diplomacy, banking and participation in international bodies to infrastructural development, business practices and trade activities. The documents establish that the US economic intelligence operations against France have &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/spyorder/#spyorder1&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;run for more than a decade and started as early as 2002&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Some of the documents are authorised for sharing with the &amp;#8220;Five Eyes&amp;#8221; partners – the group of Anglophone countries in close intelligence co-operation with the United States: Canada, New Zealand, Australia and France&amp;#8217;s fellow member state of the European Union, the United Kingdom, strongly suggesting that the United Kingdom has also benefited from the United States&amp;#8217; economic espionage activities against France.&lt;/p&gt;
&lt;p&gt;The cache also includes five TOP SECRET intelligence summaries from US spying on the conversations and communications of French officials. The documents show US spying on the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept7&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;French Finance Minister&lt;/span&gt;&lt;/a&gt;, a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept7&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;French Senator&lt;/span&gt;&lt;/a&gt;, officials within the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept9&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Treasury and Economic Policy Directorate&lt;/span&gt;&lt;/a&gt;, the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept6&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;French ambassador to the United States&lt;/span&gt;&lt;/a&gt;, and officials with direct responsibility for EU trade policy. The intercepts reveal internal French deliberation and policy on the&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept9&quot;&gt; &lt;span style=&quot;text-decoration:underline;&quot;&gt;World Trade Organization&lt;/span&gt;&lt;/a&gt;, the &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept10&quot;&gt;Trans-Pacific Partnership Agreement&lt;/a&gt;&lt;/span&gt;, the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept8&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;G7 and the G20&lt;/span&gt;&lt;/a&gt;, the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept7&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;2013 French budget&lt;/span&gt;&lt;/a&gt;, the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept7&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;decline of the automotive industry in France&lt;/span&gt;&lt;/a&gt;, and the &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://wikileaks.org/nsa-france/intercepts/#intercept6&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;involvement of French companies in the Oil for Food programme in Iraq during the 1990s&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;WikiLeaks founder Julian Assange said: &amp;#8220;The United States has been conducting economic espionage against France for more than a decade. Not only has it spied on the French Finance Minister, it has ordered the interception of every French company contract or negotiation valued at more than $200 million. That covers not only all of France&amp;#8217;s major companies, from BNP Paribas, AXA and Credit Agricole to Peugeot and Renault, Total and Orange, but it also affects the major French farming associations. $200 million is roughly 3,000 French jobs. Hundreds of such contracts are signed every year. The United States not only uses the results of this spying itself, but swaps these intercepts with the United Kingdom. Do French citizens deserve to know that their country is being taken to the cleaners by the spies of supposedly allied countries? Mais oui!&amp;#8221;&lt;/p&gt;
&lt;p&gt;Documents Released 06/29/2015:&lt;/p&gt;
 
&lt;div style=&quot;font-size:10px;text-align:center;width:100%;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.scribd.com/doc/270064817&quot;&gt;View this document on Scribd&lt;/a&gt;&lt;/div&gt;
&lt;p style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/wikileaks-espionnage-elysee-06-29-2015.pdf&quot;&gt;PDF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;&amp;#8212;-&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Related Links:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/10/22/nsa-spying-on-france-70-3-million-phone-calls-intercepted-in-30-days-average-of-3-million-data-intercepts-per-day/&quot;&gt;NSA Spying on France: 70.3 Million Phone Calls Intercepted in 30 Days; Average of 3 Million Data Intercepts Per Day&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2013/10/26/nsa-document-2012-flame-cyberattack-on-france-presidential-computer-network-us-denies-involvement-israel-may-be-culprit/&quot;&gt;NSA Document: 2012 “Flame” Cyberattack on France Presidential Computer Network; US Denies Involvement, Israel May Be Culprit&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28458/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28458/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28458&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28458</guid>
         <pubDate>Tue, 30 Jun 2015 08:17:06 +0000</pubDate>
      </item>
      <item>
         <title>AQIM Video Shows South African/Swedish Hostages in Mali, Unveils Al-Qaeda&amp;#8217;s Own &amp;#8220;Jihadi John&amp;#8221; with British Accent</title>
         <link>http://leaksource.info/2015/06/23/aqim-video-shows-south-african-swedish-hostages-in-mali-unveils-al-qaedas-own-jihadi-john-with-british-accent/</link>
         <description>&lt;div class='embed-archiveorg-video' style='text-align:center;'&gt;&lt;/div&gt;
&lt;p&gt;&lt;em&gt;06/23/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Weissenberg7&quot;&gt;Caleb Weiss&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.longwarjournal.org/archives/2015/06/aqim-sahara-branch-releases-videos-showing-last-two-hostages-in-mali.php&quot;&gt;LongWarJournal&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/EliasGroll&quot;&gt;Elias Groll&lt;/a&gt;/&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://foreignpolicy.com/2015/06/23/is-aqim-parroting-the-islamic-state-in-its-latest-hostage-video/&quot;&gt;ForeignPolicy&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;There’s the British-accented jihadi defiantly addressing the camera, the attempts at slick cuts between desert scenes, and the Western hostages in chains. But this isn’t an Islamic State video; it’s a dispatch from the Sahara branch of al Qaeda in the Islamic Maghreb (AQIM), the group’s Mali affiliate. It’s the latest example of how radical Islamist groups are appropriating the visual language of the Islamic State and attempting to imitate its strikingly successful propaganda efforts.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;AQIM&amp;#8217;s new video shows the last two Western hostages held in Mali, Swede Johan Gustofsson and South African Stephen McGowan, pleading to their respective governments in the video produced by the Saharan branch of AQIM’s media wing, Al Andalus.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/aqim-jihadi-john.png&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-28453&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/aqim-jihadi-john.png?w=604&amp;#038;h=340&quot; alt=&quot;aqim-jihadi-john&quot; width=&quot;604&quot; height=&quot;340&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The video opens with a man addressing the camera and speaking in tones made famous by “&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/category/jihadi-john/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Jihadi John&lt;/span&gt;&lt;/a&gt;,” the fighter who gained infamy for beheading Western hostages on tape. “Welcome to the world’s largest prison, a prison that has no boundaries, a prison that has no walls, no cells, no bars. A prison with a fear, where prison break is nonexistent,” the masked AQIM fighter says. “This is the mujahideen’s prison — the Sahara.” The jihadist then points out that the area is part of the “new territory controlled by the mujahideen.” It is unclear what area the captor is referring to, although it may be in central Mali.&lt;/p&gt;
&lt;p&gt;The video was likely recorded in late 2014, as the jihadist in the video explains that the two were captured “three years ago.”&lt;/p&gt;
&lt;p&gt;The two hostages are then seen having their handcuffs removed (above) before being taken to a wooded area where questioning commences between them and the jihadists. A narrator explains to the viewer that the two have been held for over 1000 days after being captured in Timbuktu in 2011 by a “special unit” of AQIM.&lt;/p&gt;
&lt;p&gt;The two hostages are then seen asking a series of questions about the status of negotiations for their release. Their captor tells them that “The French government is impeding the negotiations.” The figure says that the French and Malian governments are trying to buy time so that they “do not have to submit to the demands of the mujahideen.”&lt;/p&gt;
&lt;p&gt;“They are making it very difficult for your governments and the mujahideen to come to an agreement,” he continues. The jihadist then shows the two a video of former French hostage Serge Lazarevic being released. Lazarevic was seized in 2011 in Mali by AQIM forces there. He was kidnapped along with another French national, Philippe Verdon, who was &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.bbc.com/news/world-africa-27687684&quot;&gt;killed&lt;/a&gt;&lt;/span&gt; in 2013 by AQIM in Mali. Lazarevic &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.bbc.com/news/world-africa-30450092&quot;&gt;was released&lt;/a&gt;&lt;/span&gt; late last year in exchange for four AQIM militants. However, the jihadist in the video says that seven AQIM fighters were released, including two that were involved in the kidnapping of Lazarevic.&lt;/p&gt;
&lt;p&gt;After expressing shock that they were not included in those negotiations, McGowan speaks directly to the camera. In a statement directed at the South African government, he says that he hopes it “continues to assist” in his release. “I hope something can be done,” he continues, “I hope a negotiation can be brokered.”&lt;/p&gt;
&lt;p&gt;McGowan then speaks to his family saying that he loves them and that he is thankful for their support. To his wife, he says he hopes they can still pursue the plans they had before his capture. Gustofsson then makes a statement expressing his sadness for putting his family through the difficulties of his captivity.&lt;/p&gt;
&lt;p&gt;Gustofsson then pleads to the Swedish government to “help in giving information and support to my family.” To his family, he also expresses his love and tells them to continue to live their lives. “I don’t know how this is going to end,” he says, “but our time together till now has been wonderful.” He then speaks to the French government saying that “France has a big responsibility” to help in their release.&lt;/p&gt;
&lt;p&gt;McGowan and Gustofsson were kidnapped in Timbuktu in 2011, along with Dutch citizen Sjaak Rijke. A German national was also with them, but he died in the assault. Rijke appeared in an AQIM video released in November alongside Serge Lazarevic, in which both spoke to their respective governments for their release. Rijke was freed in April after a French raid on AQIM militants in northern Mali. &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.bbc.com/news/world-africa-32195723&quot;&gt;According to the BBC&lt;/a&gt;&lt;/span&gt;, his presence caught the French special operators by surprise; it was only after the fighting was over when they realized the militants were holding the Dutch hostage. (For more information, see &lt;em&gt;LWJ&lt;/em&gt; reports, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; title=&quot;Permanent Link to Al Qaeda in the Islamic Maghreb video features French, Dutch hostages&quot; target=&quot;_blank&quot; href=&quot;http://www.longwarjournal.org/archives/2014/11/al_qaeda_in_the_isla_1.php&quot;&gt;Al Qaeda in the Islamic Maghreb video features French, Dutch hostages&lt;/a&gt;&lt;/span&gt; and &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; title=&quot;Permanent Link to French forces free Dutch hostage in Mali&quot; target=&quot;_blank&quot; href=&quot;http://www.longwarjournal.org/archives/2015/04/french-forces-free-dutch-hostage-in-mali-2.php&quot;&gt;French forces free Dutch hostage in Mali&lt;/a&gt;&lt;/span&gt;.)&lt;/p&gt;
&lt;p&gt;AQIM has a history of taking Western hostages. In 2010, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.longwarjournal.org/threat-matrix/archives/2010/07/french_hostage_possibly_killed.php&quot;&gt;Michel Germaneau&lt;/a&gt;&lt;/span&gt;, a French hostage held by AQIM, died while in captivity. And in 2013, four French hostages &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.english.rfi.fr/africa/20131030-millions-paid-free-french-aqim-hostages-report&quot;&gt;were released by AQIM&lt;/a&gt;&lt;/span&gt; after being held for three years; it is speculated that a ransom of 20 million Euros was paid to free them.&lt;/p&gt;
&lt;p&gt;Before that, AQIM was &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.globalsecurity.org/military/world/para/gspc.htm&quot;&gt;responsible&lt;/a&gt;&lt;/span&gt; for the kidnapping of Spanish nationals in Mauritania and an Italian and French national in Mali in 2009, as well as many more abductions throughout North Africa. The al Qaeda branch’s prolific kidnappings have even led senior al Qaeda leaders to tighten their control over the hostage-taking operations.&lt;/p&gt;
&lt;p&gt;In November 2010, AQIM emir Abdelmalek Droukdel made a surprising claim in a video that was aired on Al Jazeera. Droukdel said that France would have to negotiate with Osama bin Laden himself to secure the release of several French hostages. [See &lt;em&gt;LWJ&lt;/em&gt; report, &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.longwarjournal.org/archives/2013/01/analysis_al_qaeda_ce.php&quot;&gt;Analysis: Al Qaeda central tightened control over hostage operations&lt;/a&gt;&lt;/span&gt;.]&lt;/p&gt;
&lt;p&gt;As a statement, the video is more an homage to the style of the Islamic State than a replication of their efforts. The captives aren’t seen wearing orange jumpsuits, and no threats are issued against the hostages’ lives. The AQIM video isn’t nearly as slick as those produced by the Islamic State. The audio quality is lower. The lighting is worse. It includes several cartoonish, melodramatic moments, in which fighters try to impress the viewer and come across looking somewhat buffoonish. But in comparison to their previous video showcasing Western hostages, the latest AQIM video marks a step-up in production quality.&lt;/p&gt;
&lt;p&gt;The attempt to imitate the Islamic State comes amid a reported split within AQIM as to whether it should pledge allegiance to the group that has established what it calls a caliphate in parts of Syria and Iraq. In December, AQIM’s judicial authority &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://ent.siteintelgroup.com/Statements/aqim-argues-is-caliphate-lacks-shariah-requirements-for-establishment.html&quot;&gt;said&lt;/a&gt;&lt;/span&gt; that the Islamic State had not met the requirements in Islamic law to establish a caliphate. Then in March, two AQIM divisions reportedly &lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://ent.siteintelgroup.com/Statements/aqim-divisions-allegedly-offer-support-to-the-is.html&quot;&gt;pledged allegiance&lt;/a&gt;&lt;/span&gt; to the Islamic State.&lt;/p&gt;
&lt;p class=&quot;last&quot;&gt;Monday’s hostage video contains no reference to the Islamic State and AQIM’s relationship to it. But within the context of the sophisticated public relations campaigns waged by AQIM and similar groups, it’s difficult not to interpret this visual homage to its brutal Syrian cousin as a slight tacking toward that group.&lt;/p&gt;
&lt;p&gt;MI5 and MI6 are believed to be investigating the video and the apparent Briton, &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.telegraph.co.uk/news/worldnews/al-qaeda/11693716/New-British-front-man-for-jihadist-videos-revealed.html&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;according to the Telegraph&lt;/span&gt;&lt;/a&gt;. A senior Whitehall source agreed that al-Qaeda was trying to mimic the Jihadi John persona and style of video.&lt;/p&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28439/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28439/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28439&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28439</guid>
         <pubDate>Wed, 24 Jun 2015 03:32:44 +0000</pubDate>
      </item>
      <item>
         <title>Islamic State Death Cult Finds Gruesome New Ways to Murder &amp;#8220;Spies&amp;#8221;: RPG&amp;#8217;d in Car, Drowned in Cage, Explosive Collars</title>
         <link>http://leaksource.info/2015/06/23/islamic-state-death-cult-finds-gruesome-new-ways-to-murder-spies-rpgd-in-car-drowned-in-cage-explosive-collars/</link>
         <description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*Disclaimer: LeakSource in no way supports the actions of Islamic State. We are a news site dedicated to covering things that the mainstream media should but won&amp;#8217;t. We believe that on top of &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://firstlook.org/theintercept/2015/03/17/whats-scarier-terrorism-governments-unilaterally-blocking-websites-name/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;using terrorism fears to restrict free speech&lt;/span&gt;&lt;/a&gt;, censoring of these videos &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://mrbrianhughes.wordpress.com/2015/02/01/filtering-extremist-content-only-massages-the-process-of-radicalization/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;only helps the process of radicalization&lt;/span&gt;&lt;/a&gt;. People need to see the barbarity of this group and realize it is nothing but a death cult, and does not represent the majority of peaceful Muslims in the world.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-1.png&quot;&gt;&lt;img class=&quot;aligncenter  wp-image-28441&quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-1.png?w=501&amp;#038;h=282&quot; alt=&quot;is-06-23-2015-1&quot; width=&quot;501&quot; height=&quot;282&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div id=&quot;v-iH3gstfZ-1&quot; class=&quot;video-player&quot; style=&quot;min-width:604px;min-height:338px;&quot;&gt;
&lt;embed id=&quot;v-iH3gstfZ-1-video&quot; src=&quot;http://s0.videopress.com/player.swf?v=1.04&amp;amp;guid=iH3gstfZ&amp;amp;isDynamicSeeking=true&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;604&quot; height=&quot;338&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p&gt;&lt;em&gt;06/23/2015&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://www.wsj.com/articles/islamic-state-video-claims-to-show-15-iraqi-men-killed-for-espionage-1435069332&quot;&gt;WSJ&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;Islamic State militants on Tuesday released a video purporting to show 15 Iraqi men accused of espionage being blown up or drowned. The video, titled “But If You Return, We Shall Return,” was released by the Sunni extremist group’s affiliate in Iraq’s northern Nineveh province.&lt;/p&gt;
&lt;p&gt;The video shows the accused men, who each confesses to the camera that he committed espionage against Islamic State. The video shows one man confessing that an officer called “Lieutenant Bassem,” from Iraq’s police commando unit had asked them to form a battalion to kill Islamic State leaders. In another recorded confession, an accused spy named Ahmed Othman addresses the Lieutenant Bassam directly. “All that you are doing is useless, and all that you are doing is hurting innocent people,” he says. “Islamic State is fighting against 60 countries, now you want to fight Islamic State alone.”&lt;/p&gt;
&lt;p&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-2.png&quot;&gt;&lt;img class=&quot;alignnone wp-image-28442 &quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-2.png?w=200&amp;#038;h=112&quot; alt=&quot;is-06-23-2015-2&quot; width=&quot;200&quot; height=&quot;112&quot;/&gt;&lt;/a&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-3.png&quot;&gt;&lt;img class=&quot;alignnone wp-image-28443 &quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-3.png?w=200&amp;#038;h=112&quot; alt=&quot;is-06-23-2015-3&quot; width=&quot;200&quot; height=&quot;112&quot;/&gt;&lt;/a&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-4.png&quot;&gt;&lt;img class=&quot;alignnone wp-image-28444 &quot; src=&quot;https://leaksource.files.wordpress.com/2015/06/is-06-23-2015-4.png?w=200&amp;#038;h=112&quot; alt=&quot;is-06-23-2015-4&quot; width=&quot;200&quot; height=&quot;112&quot;/&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The men are then shown executed in three groups. In the first, three men sit together in a car that is blown up by a rocket-propelled grenade fired by a masked militant. In the next sequence, five men are placed in large a cage that is then lowered into a pool of water. In the final execution, seven men are made to kneel and then shown tied together with an explosive cord around each of their necks. The cord is then detonated, severing their heads. After each set of killings, the camera slowly pans over the corpses.&lt;/p&gt;
&lt;p&gt;An unidentified narrator says the deaths are the result of airstrikes carried out by the U.S.-led coalition on Mosul, Islamic State’s stronghold in Iraq. He says a child was among the injured victims of the airstrikes. The narrator says the men shown being executed in the video had given the pilots the coordinates at which to strike.&lt;/p&gt;
&lt;p&gt;The video is among the most graphic released by Islamic State, which has cultivated a reputation for staging gruesome execution videos as part of propaganda aimed at discouraging espionage against the group and recruiting impressionable potential fighters. Tuesday’s video is unique for its use of multiple executions. A previous video released last month showed a suspected spy crucified on a cross and dismembered by a sword-wielding militant. Another video released early this year showed a &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/02/04/jordanian-pilot-kaseasbeh-burned-alive-by-islamic-state-jordan-executes-is-requested-prisoner-rishawi-in-response/&quot;&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;captured Jordanian pilot being burned alive in a cage&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;div class=&quot;embed-twitter&quot;&gt;
&lt;blockquote class=&quot;twitter-tweet&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;New Islamic State video and CIA torture &amp;#8230; photos of actions and outcomes look rather similar&amp;#8230; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://t.co/CPw5XlUxgm&quot;&gt;https://t.co/CPw5XlUxgm&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/ISIS?src=hash&quot;&gt;#ISIS&lt;/a&gt; &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/hashtag/CIA?src=hash&quot;&gt;#CIA&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;mdash; Carol Anne Grayson (@Quickieleaks) &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;https://twitter.com/Quickieleaks/status/613445400360538113&quot;&gt;June 23, 2015&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;/div&gt;&lt;br /&gt;  &lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://feeds.wordpress.com/1.0/gocomments/leaksource.wordpress.com/28438/&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://feeds.wordpress.com/1.0/comments/leaksource.wordpress.com/28438/&quot;/&gt;&lt;/a&gt; &lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://pixel.wp.com/b.gif?host=leaksource.info&amp;#038;blog=19403989&amp;#038;post=28438&amp;#038;subd=leaksource&amp;#038;ref=&amp;#038;feed=1&quot; width=&quot;1&quot; height=&quot;1&quot;/&gt;&lt;div&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://leaksource.info/2015/06/23/islamic-state-death-cult-finds-gruesome-new-ways-to-murder-spies-rpgd-in-car-drowned-in-cage-explosive-collars/&quot;&gt;&lt;img alt=&quot;is-06-23-2015&quot; src=&quot;http://videos.videopress.com/iH3gstfZ/is-06-23-2015_std.original.jpg&quot; width=&quot;160&quot; height=&quot;120&quot;/&gt;&lt;/a&gt;&lt;/div&gt;</description>
         <author>LeakSource</author>
         <guid isPermaLink="false">http://leaksource.info/?p=28438</guid>
         <pubDate>Wed, 24 Jun 2015 03:06:52 +0000</pubDate>
      </item>
   </channel>
</rss>
<!-- fe7.yql.bf1.yahoo.com compressed/chunked Thu Oct  1 23:16:21 UTC 2015 -->
