Your Source for Leaks Around the World!

Posts Tagged ‘Video’

Video & Photos of Aftermath Inside Las Vegas Shooter’s Hotel Room Leaked

In Archive, Las Vegas Shooting, Stephen Paddock, Terrorism on October 3, 2017 at 7:22 PM

10/03/2017

New video and photos show the scene SWAT teams encountered after blowing the door off the Las Vegas shooter’s room and finding him dead inside – as authorities reveal Stephen Paddock set up cameras inside and outside the room to warn him of approaching authorities.

The video, released by BILD, shows one rifle, still on a bipod, just inside the demolished door to the suite. You can see the damage left after police blew up the door to get to Stephen Paddock, who had already killed himself by that point.

The first photos were obtained by Boston 25’s Jacqui Heinrich from police sources, showing 2 of the 23 weapons used by Paddock during his rampage. The images show the guns – one equipped with a 100 round extended magazine – on the floor of the Mandalay Bay hotel room, numerous rounds of ammunition, holographic sights and bipods. A hammer that was presumably used to break the windows of the room, which was on the 32nd floor, is also seen beside the gun.

Additional photos leaked later on Tuesday, showing a wider view of the hotel room, and uncensored images of a dead Stephen Paddock. One showing Paddock’s body on the floor of the suite surrounded by weapons and spent shell casings, the other a close-up of his face post-suicide with a revolver beside him. (Suicide photo at bottom of post due to graphic nature)

LeakSource has been unable to verify the source of these additional photos, but they may have originated on 4chan, and were first posted on Twitter by Sam Hyde.

h/t @Paulmd199 for research

LVMPD Undersheriff Kevin McMahill confirmed that the leaked photos were authentic at Tuesday night’s press conference. “I can confirm those are in fact photos from inside the room, they are in fact photos of our suspect, and as the Sheriff mentioned previously we have opened up an internal investigation to determine the source of the leaks of those photos to the public,” McMahill said.

Only the 64-year-old’s legs, torso and left arm are visible in the photo, wearing a brown long-sleeve t-shirt, black slacks, slip on loafers, and black gloves. On the floor next to him are two assault rifles, dozens of spent shells and a hammer.

One of the assault rifles has a ‘bump stock’ added to it – making it effectively fully automatic – allowing him to unleash hundreds of rounds per minute.  The branding on the gun indicates it was made by Daniel Defense, a Savannah-Georgia-based company which produces variants of the AR-15 rifle, based off the U.S. Army’s M16.

The photo also shows that Paddock may have left a suicide message. The police have repeatedly said investigations are ongoing and have yet to make public any details about his motivations.

UPDATE 10/04: Clark County Sheriff Joe Lombardo was asked about the note shown in the leaked photos, answering “it was not a suicide note, I’m comfortable in saying that.”

UPDATE 10/08: In an interview with 60 Minutes, three police officers who stormed Paddock’s hotel room said the note included hand-written calculations about where he needed to aim to maximize his accuracy and kill as many people as possible.

Officer David Newton from the Las Vegas Police Department’s K-9 unit said he noticed a note on the shooter’s nightstand once officers breached the room. “I could see on it he had written the distance, the elevation he was on, the drop of what his bullet was gonna be for the crowd,” Newton said. “So he had that written down and figured out so he would know where to shoot to hit his targets from there.”

Another photo shows how he pushed two sitting chairs together to form a cradle-like space to store at least two other rifles. Another AR-15-style rifle is seen at the foot of the chairs with an extended magazine.

Behind a nearby pillar, about 15 magazines are piled in neat stacks. It’s unclear if they are loaded or spent.

Composite image created by @Paulmd199

Police said Paddock set up cameras inside his hotel suite and in the hallway. Clark County Sheriff told reporters he thinks the shooter might have used them to watch for people approaching his room. The LVMPD Undersheriff clarified that there were 2 cameras located in the hallway on a room service cart, and another placed inside the hotel room door peephole. Police are not aware whether the devices were transmitting — the FBI is investigating their use.

UPDATE 10/04: At Wednesday’s press conference Clark County Sheriff said authorities had confirmed that the cameras – which Paddock was using a baby monitor to view – were not recording.

A SWAT team located Paddock in his room about 72 minutes after the beginning of the deadly attack – but cops estimate he only fired on the crowd for nine minutes, starting at 10:08pm.

Police say Paddock shot at officers as they breached the door, but by the time they made it into the suite, Paddock had committed suicide.

Appelbaum, Rusbridger, Schmid, Campbell @ LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens

In Appelbaum, Archive, GCHQ, LIBE, NSA on September 7, 2013 at 3:28 AM

09/05/2013

In its resolution of 4 July 2013 the European Parliament set the mandate of the LIBE Committee Inquiry:

Instructs its Committee on Civil Liberties, Justice and Home Affairs to conduct an in-depth inquiry into the matter in collaboration with national parliaments and the EU-US expert group set up by the Commission and to report back by the end of the year, by:

  • gathering all relevant information and evidence from both US and EU sources (fact-finding)
  • investigating the alleged surveillance activities of US authorities as well as any carried out by certain Member States (mapping of responsibilities)
  • assessing the impact of surveillance programmes as regards: the fundamental rights of EU citizens (in particular the right to respect for private life and communications, freedom of expression, the presumption of innocence and the right to an effective remedy); actual data protection both within the EU and for EU citizens outside the EU, focusing in particular on the effectiveness of EU law in respect of extraterritoriality mechanisms; the safety of the EU in the era of cloud computing; the added value and proportionality of such programmes with regard to the fight against terrorism; the external dimension of the area of freedom, security and justice (assessing the validity of adequacy decisions for EU transfers to third countries, such as those carried out under the Safe Harbour Agreement, international agreements and other legal instruments providing for legal assistance and cooperation) (damage and risk analysis)
  • exploring the most appropriate mechanisms for redress in the event of confirmed violations (administrative and judicial redress and compensation schemes)
  • putting forward recommendations aimed at preventing further violations, and ensuring credible, high-level protection of EU citizens’ personal data via adequate means, in particular the adoption of a fully-fledged data protection package (policy recommendations and lawmaking)
  • issuing recommendations aimed at strengthening IT security in the EU’s institutions, bodies and agencies by means of proper internal security rules for communication systems, in order to prevent and remedy unauthorised access and the disclosure or loss of information and personal data (remedying of security breaches)

So far the actors who seem to be best able to provide the Committee with adequate information, besides the US and EU Authorities which will be invited later, are the media which unveiled these facts and the participants of the EU-US expert groups.

Their testimony and intervention before the LIBE Committee will enable the LIBE Committee to identify those aspects that will deserve closer investigation and thus need clarification in the following meetings.

Given the obvious similarities with the investigation into the Echelon system the then Chair of the temporary committee, Mr Coelho, and its rapporteur, Mr Schmid, have been invited to share their experiences.

Schedule

Introductory remarks by Juan Fernando LÓPEZ AGUILAR, Chair of the LIBE Committee

Statements by:

  • Jacques FOLLOROU, Le Monde
  • Jacob APPELBAUM, investigative journalist, software developer and computer security researcher with the Tor Project

Presentations by:

  • Gerhard SCHMID (former MEP and Rapporteur of the ECHELON report 2001)
  • Carlos COELHO (MEP), former Chair of the Temporary Committee on the ECHELON Interception System
  • Duncan CAMPBELL, investigative journalist and author of the STOA report “Interception Capabilities 2000”

More LIBE Committee Mass Surveillance Inquiry Coverage

Edward Snowden’s Father FULL Interview w/ Eric Bolling – FOX News Exclusive

In LEAKSOURCE ORIGINAL NEWS on June 18, 2013 at 4:04 AM

06/17/2013

NSA Files: Verizon, PRISM, Boundless Informant, FISA 702, XKEYSCORE (+ Whistleblower Edward Snowden Interview)

In Archive, NSA, NSA Files, Snowden, Surveillance on June 13, 2013 at 1:08 AM

NSA COLLECTING PHONE RECORDS OF MILLIONS OF VERIZON CUSTOMERS DAILY

TOP SECRET COURT ORDER REQUIRING VERIZON TO HAND OVER ALL CALL DATA TO NSA (Story/Guardian)

NSA PRISM PROGRAM TAPS IN TO USER DATA OF APPLE, GOOGLE AND OTHERS

TOP SECRET NSA PRISM PROGRAM CLAIMS DIRECT ACCESS TO SERVERS OF FIRMS INCLUDING GOOGLE, APPLE AND FACEBOOK (Story/WashingtonPost/Guardian)

nsa-prism-extra

BOUNDLESS INFORMANT: THE NSA’S SECRET TOOL TO TRACK GLOBAL SURVEILLANCE DATA

3-PAGE BOUNDLESS INFORMANT EXPLANATION DOCUMENT, WHICH SHOWS THE NSA COLLECTED ALMOST 3 BILLION PIECES OF INTELLIGENCE FROM US COMPUTER NETWORKS OVER A 30-DAY PERIOD ENDING IN MARCH (Story/Guardian)

TOP SECRET NSA BOUNDLESS INFORMANT TOOL DETAILS AND MAPS BY COUNTRY THE VOLUMINOUS AMOUNT OF INFORMATION IT COLLECTS FROM COMPUTER AND TELEPHONE NETWORKS (Story/Guardian)

THE TOP SECRET RULES THAT ALLOW NSA TO USE US DATA WITHOUT A WARRANT

TOP-SECRET DOCUMENT SHOWS FISA JUDGES SIGNED OFF ON BROAD ORDERS ALLOWING NSA TO MAKE USE OF INFORMATION “INADVERTENTLY” COLLECTED FROM DOMESTIC US COMMUNICATIONS WITHOUT A WARRANT (Story/Guardian)

SECRET DOCUMENT DETAILS PROCEDURES THE NSA IS REQUIRED TO FOLLOW TO TARGET “NON-US PERSONS” UNDER ITS FOREIGN INTELLIGENCE POWERS – AND WHAT THE AGENCY DOES TO MINIMIZE DATA COLLECTED ON US CITIZENS AND RESIDENTS (Story/Guardian)

XKEYSCORE: NSA TOOL COLLECTS “NEARLY EVERYTHING A USER DOES ON THE INTERNET”

TOP SECRET TRAINING MATERIALS FOR THE XKEYSCORE PROGRAM DETAIL HOW ANALYSTS CAN USE IT AND OTHER SYSTEMS TO MINE ENORMOUS AGENCY DATABASES AND DEVELOP INTELLIGENCE FROM THE WEB (Story/Guardian)

EDWARD SNOWDEN: THE WHISTLEBLOWER BEHIND THE NSA SURVEILLANCE REVELATIONS

EDWARD SNOWDEN, THE SOURCE BEHIND THE GUARDIAN’S NSA FILES, TALKS TO GLENN GREENWALD IN HONG KONG ABOUT HIS MOTIVES FOR THE BIGGEST INTELLIGENCE LEAK IN A GENERATION (Story/Guardian)

We Steal Secrets: The Story of WikiLeaks (+ Annotated Transcript Released by WikiLeaks)

In Bradley Manning, Julian Assange, LEAKSOURCE ORIGINAL NEWS, WikiLeaks on June 10, 2013 at 4:19 AM

06/09/2013

WikiLeaks Annotated Transcript
%d bloggers like this: