
More from Legal
THREAD: Okay. I'm about to get SUPER space beans tin foil hat on you, so stop reading if you're not into that. Based on what we're learning from public reporting, the pentagon curtailed the response to the trump coup. 1/
We also know from video and public reporting that there were two groups that stormed the capitol. 1) weird-ass bystanders and 2) possibly armed ex-military members with tactical gear and flex cuffs 2/
We also know there was a failed coup attempt in Venezuela orchestrated by Giuliani and former members of Blackwater, an Erik Prince joint. 3/
We also know that Giuliani met with Brian Benczkowski and Bill Barr to lobby for for help to go easy on his Venezuelan pal. Benczkowski is a former Alfa Bank rep. 4/
Further, we know that Erik Prince is the brother of Betsy DeVos (who JUST resigned) and the former head of Blackwater. We also know that the day before the insurrection, a memo was sent out to knee-cap the federal police in DC. 5/
We also know from video and public reporting that there were two groups that stormed the capitol. 1) weird-ass bystanders and 2) possibly armed ex-military members with tactical gear and flex cuffs 2/
After reviewing a lot of footage there seem to be 2 types of ppl at the #capitolbreach.
— John Scott-Railton (@jsrailton) January 7, 2021
Group 1: Selfies. Unsure what to do once inside #CapitolBuilding
Group 2: Purposeful. men who know each other & head for senate floor w/tactical gear & backpacks. https://t.co/3vAdxdlNZh
We also know there was a failed coup attempt in Venezuela orchestrated by Giuliani and former members of Blackwater, an Erik Prince joint. 3/
We also know that Giuliani met with Brian Benczkowski and Bill Barr to lobby for for help to go easy on his Venezuelan pal. Benczkowski is a former Alfa Bank rep. 4/
Further, we know that Erik Prince is the brother of Betsy DeVos (who JUST resigned) and the former head of Blackwater. We also know that the day before the insurrection, a memo was sent out to knee-cap the federal police in DC. 5/
1/
In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.
Thread starts:
2/
Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of
3/
https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly
4/
hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus
5/
There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through
In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.
Thread starts:

2/
Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of

3/
https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly
4/
hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus

5/
There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through