BREAKING: at least six men that provided security for Roger Stone entered the #Capitol during the siege, per a @nytimes visual investigation.

All six are associated with the far-right #OathKeepers militia.

THREAD 1/

Story: https://t.co/abZlcVyaR6

2/ On January 5th, Stone appeared at the Supreme Court, glad-handing and being driven in a go-kart. Later he attended a rally near the White House.

As the @nytimes team shows, his security entourage featured a host of #OathKeepers...
3/ In the morning of the 6th, Stone stood outside the Willard InterContinental hotel, again flanked by men associated with the #OathKeepers.

Some of them, like Rob Minuta, have been named in prior reporting.
https://t.co/69gkZesR3k

4/ Interesting detail: while scrutinizing the video of Roger Stone I spotted Rudy Giuliani exiting the same hotel.

Giuliani is accompanied by a man wearing the same outfit as Trump supporter John Eastman & other not-yet ID'd people.

Video source: https://t.co/Rure8TiQTp
5/ Now to the #Capitol: We see a several of Roger Stone's #OathKeeper guards amidst a larger group yelling at police. Video surfaced by the @CTExposers team.👇👇

https://t.co/NWsONDz0OA
6/ KEY EVIDENCE: here are the six men linked to the #OathKeepers that guarded Roger Stone... now inside the #Capitol, participating in the insurrection.
7/ Here's Roger Stone's latest statement, as quoted by the @nytimes.

Important to remember. Stone also claimed that he never left his hotel room on the 6th. Then video emerged showing that he had...

See below tweet👇

https://t.co/eaYuXelsS3
8/ The @nytimes visual investigations team (@trbrtc @btdecker @dwtkns @arielle_designs @_stella_cooper) did an amazing job! They worked through & validated an enormous volume of visual materials to present this story.
9/ Please also join me in recognizing...some of the helpers: the tireless
@CTExposers team seriously assisted several reporting teams, including the @nytimes dig into this case.

The outpouring of volunteer effort around the #Capitol siege is outstanding. Much more to come.
10/ Also check out this excellent thread on the #OathKeepers around Roger Stone that went inside the #Capitol by @trbrtc of the @nytimes with lots of additional context 👇👇
https://t.co/WAVlcIbGJ7
11/ KEY for future investigation: @trbrtc points out that after exiting the #Capitol all six of these men associated with the #OathKeepers gathered around leader Elmer Stuart Rhodes.

https://t.co/Banj6dRZ7y

More from Legal

1/

In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.

Thread starts:


2/

Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of


3/

https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly

4/

hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus


5/

There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through

You May Also Like

1/ Some initial thoughts on personal moats:

Like company moats, your personal moat should be a competitive advantage that is not only durable—it should also compound over time.

Characteristics of a personal moat below:


2/ Like a company moat, you want to build career capital while you sleep.

As Andrew Chen noted:


3/ You don’t want to build a competitive advantage that is fleeting or that will get commoditized

Things that might get commoditized over time (some longer than


4/ Before the arrival of recorded music, what used to be scarce was the actual music itself — required an in-person artist.

After recorded music, the music itself became abundant and what became scarce was curation, distribution, and self space.

5/ Similarly, in careers, what used to be (more) scarce were things like ideas, money, and exclusive relationships.

In the internet economy, what has become scarce are things like specific knowledge, rare & valuable skills, and great reputations.
Recently, the @CNIL issued a decision regarding the GDPR compliance of an unknown French adtech company named "Vectaury". It may seem like small fry, but the decision has potential wide-ranging impacts for Google, the IAB framework, and today's adtech. It's thread time! 👇

It's all in French, but if you're up for it you can read:
• Their blog post (lacks the most interesting details):
https://t.co/PHkDcOT1hy
• Their high-level legal decision: https://t.co/hwpiEvjodt
• The full notification: https://t.co/QQB7rfynha

I've read it so you needn't!

Vectaury was collecting geolocation data in order to create profiles (eg. people who often go to this or that type of shop) so as to power ad targeting. They operate through embedded SDKs and ad bidding, making them invisible to users.

The @CNIL notes that profiling based off of geolocation presents particular risks since it reveals people's movements and habits. As risky, the processing requires consent — this will be the heart of their assessment.

Interesting point: they justify the decision in part because of how many people COULD be targeted in this way (rather than how many have — though they note that too). Because it's on a phone, and many have phones, it is considered large-scale processing no matter what.