Saturday, February 22, 2014

Leaked Files: Proof Washington Sending Chemical Weapons to Terrorists

Leaked Files: Proof Washington Sending Chemical Weapons to Terrorists

A British Defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline.Its also clear that Britam does not practice data security very well as they have been storing user credentials, network information in unencrypted formats.
The files that interest us are the ones about Syria, which confirm that chemical weapons being smuggled into Syria and backed by the US.

Syria Folder:

288 KB 
2 PDF files and 1 email file.
File name: CV P Doughty CV2 091.pdf
CV for Philip doughty who is the dynamic director and founder of Britam Defence, currently resides in UAE according to his CV.
File name: Phil Doughty PP1 7200830372.pdf
PDF copy of current English, Irish passport for Philip Doughty.
File name: Sirian Issue.eml
Email between David Goulding who is the Business Development Director and Philip regarding a new offer about an operation in syria.
Phil
We’ve got a new offer. It’s about Syria again. Qataris propose an attractive deal and swear that the idea is approved by Washington.
We’ll have to deliver a CW to Homs, a Soviet origin g-shell from Libya similar to those that Assad should have.
They want us to deploy our Ukrainian personnel that should speak Russian and make a video record.
Frankly, I don’t think it’s a good idea but the sums proposed are enormous. Your opinion?
Kind regards
David
Its also clear that Britam does not practice data security very well as they have been storing user credentials, network information in unencrypted formats.
In the hackers release note they made it clear they got the data from a Malaysian based server and from a chart found within this data its shocking to see that Britam is using the security of McAfee but is not implementing this on the said server which is listed as a mail server. (see pic to below)
network
Continue reading more

Share this:

No comments:

Post a Comment