It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
We were hacked on last Wednesday, Thursday from our e-mails hosted on a public commercial webhosting domain. Some of the material online is accurate, but unfortunately the hacker went on upon himself to create a number – we’ve seen three now – of completely spurious e-mails – normally two-liners, very inflammatory, talking about chemical weapons, Syria, Qatar, Saudi, Washington – very simplistic in their format, because I can’t imagine in what sort of world would have two-liners with such a combination of words, leading to an obvious conclusion, “God, what on Earth is this all about?” So, they were completely spurious and our company isn’t involved in the defense world at all. We do commercial risk management for oil and gas companies in areas around the world. I can confirm those e-mails are completely spurious.
OK. Here we go again. Faked emails! Lawsuit! Russians! Dead children! Belly up to the buffet. Careful promenading around this one as there are so many rabbit holes one is libel to twist a proverbial ankle.
Originally posted by Cataka
Sure is a big "coincidence" that this fake email predicted exactly what we are seeing months later. Except, of course, that Assad used chemical weapons, and its not a ploy to attack Syria. Everything else this devious hoaxer said was correct.
Like its a coincidence that 3 towers crumbled to dust on 9/11 and not one skyscraper has done that before or since.
Like the coincidence that the black boxes were not recovered from the planes, and that hadn't happened before.
Like the coincidence that weeks before 9/11, the elevator shafts were being renovated, and its just a coincidence that to drop a building in its footprint requires explosive wiring of the center of a building. (Which reminds me: why haven't demolition companies started using jet fuel to take down buildings now? Instead of weeks of planning and wiring, they could just dump some jet fuel and have it done way cheaper and it only takes hours instead of weeks!)
And its a coincidence that the company renovating the elevator shaft had ties to the Bush family.
And like the coincidence that the owner of the towers took out very specific terrorist insurance weeks before 9/11.
This email junk is just another silly coincidence, people! Anything to do with war, money, politics, and the global stage is always, always, always coincidence! When will you crazies stop looking and just blindly, faithfully accept what you are TOLD is the truth! Never mind these coincidences, because Walking Dead will be back on soon! Go post about that, because that is at least productive!
Also, with wikileaks and Anonymous hacking and releasing emails, does anyone have any links showing how the emails they released were as violently attacked as this one? Including lawsuits?
If not, I'm sure its just a coincidence that this was the only one to be discredited so vehemently.
Originally posted by Kurius
1. So they acknowledged that they had been hacked, but denied the emails were real. Which to believe when it's difficult for readers to prove one way or another? At least we know the story was at least half true...they were hacked.
2. Maybe they had a bad lawyer, but these days, £110,000 settlement is probably only enough to cover the lawyer's fees. This amount sounds too small when such a firm's reputation is at stake.
3. Why wouldn't Britam Defence Limited file lawsuits against all other sites that have published the same story?
4. Daily Mail Online seems to be paying an unusual amount of "damages" for "false" stories. Is there a backroom dealing going on - "we will clear your name by publicly apologizing and 'settling' at the right price" ? Seriously, how are they making money otherwise? How much an ad click on their website pays anyhow? At this rate, they should be bankrupt.
On their site alone now:
Daily Mail in £100,000-plus payout over Syrian chemical weapons story
Daily Mail pays damages to Ugandan prime minister over aid theft claim
I think we ought to be suspicious. Never jump into a conclusion just seeing they "settled". It didn't even seem like the suit was won and damages were awarded. Even then, it can all be staged.
edit on 26-8-2013 by Kurius because: (no reason given)
'Frankly, I don’t think it’s a good idea but the sums proposed are enormous. Your opinion?
'Kind regards, David.'
X-Account-Key: account3
X-UIDL: UID79847-1270795545
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
S1PoWhEpLx22v.netdns.net
X-Spam-Level:
X-Spam-Status: No, score=-102.6 required=4.0 tests=AWL,BAYES_00,HTML_MESSAGE,
USER_IN_WHITELIST autolearn=ham version=3.2.5
Received: (qmail 14074 invoked from network); 16 Oct 2012 23:57:29 +0800
Received: from titanium.netdns.net (123.100.248.206)
by neon.netdns.net with SMTP; 16 Oct 2012 23:57:29 +0800
Received: from localhost (unknown [127.0.0.1])
by titanium.netdns.net (Postfix) with ESMTP id 82BB4523A84
for ; Thu, 16 Oct 2012 15:57:18 +0000 (UTC)
X-Virus-Scanned: amavisd-new at S1AvWhNnLx31v.netdns.net
Received: from titanium.netdns.net ([127.0.0.1])
by localhost (titanium.netdns.net [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id nWRHL2NRVdAP for ;
Thu, 16 Oct 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ; Thu, 16 Oct 2012 23:57:18 +0800 (SGT)
Received: (qmail 18137 invoked from network); 16 Oct 2012 15:57:27 -0000
Received: from unknown (HELO Britam00323) ([email protected]@81.156.163.12)
by 0 with ESMTPA; 16 Oct 2012 15:57:27 -0000
From: "David Goulding"
To: "'Phillip Doughty'"
Subject: Iranian Issue
Date: Thu, 16 Oct 2012 15:57:16 -0000
Message-ID:
MIME-Version: 1.0
Content-Type: multipart/related;
boundary="----=_NextPart_000_0019_01CDD3CA.5F0833C0"
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Ac3Tyl1ftodBRb97SdKw0WL06iCi8A==
Content-Language: en-gb
This is a multi-part message in MIME format.
------=_NextPart_000_0019_01CDD3CA.5F0833C0
Content-Type: multipart/alternative;
boundary="----=_NextPart_001_001A_01CDD3CA.5F0833C0"
------=_NextPart_001_001A_01CDD3CA.5F0833C0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Account-Key: account3
X-UIDL: UID79847-1270795545
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
X-Mozilla-Keys:
X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on
S1PoWhEpLx22v.netdns.net
X-Spam-Level:
X-Spam-Status: No, score=-102.6 required=4.0 tests=AWL,BAYES_00,HTML_MESSAGE,
USER_IN_WHITELIST autolearn=ham version=3.2.5
Received: (qmail 14074 invoked from network); 24 Dec 2012 23:57:29 +0800
Received: from titanium.netdns.net (123.100.248.206)
by neon.netdns.net with SMTP; 24 Dec 2012 23:57:29 +0800
Received: from localhost (unknown [127.0.0.1])
by titanium.netdns.net (Postfix) with ESMTP id 82BB4523A84
for ; Mon, 24 Dec 2012 15:57:18 +0000 (UTC)
X-Virus-Scanned: amavisd-new at S1AvWhNnLx31v.netdns.net
Received: from titanium.netdns.net ([127.0.0.1])
by localhost (titanium.netdns.net [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id nWRHL2NRVdAP for ;
Mon, 24 Dec 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ; Mon, 24 Dec 2012 23:57:18 +0800 (SGT)
Received: (qmail 18137 invoked from network); 24 Dec 2012 15:57:27 -0000
Received: from unknown (HELO Britam00323) ([email protected]@81.156.163.12)
by 0 with ESMTPA; 24 Dec 2012 15:57:27 -0000
From: "David Goulding"
To: "'Phillip Doughty'"
Subject: Syrian Issue
Date: Mon, 24 Dec 2012 15:57:16 -0000
Message-ID:
MIME-Version: 1.0
Content-Type: multipart/related;
boundary="----=_NextPart_000_0019_01CDD3CA.5F0833C0"
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Ac3Tyl1ftodBRb97SdKw0WL06iCi8A==
Content-Language: en-gb
This is a multi-part message in MIME format.
------=_NextPart_000_0019_01CDD3CA.5F0833C0
Content-Type: multipart/alternative;
boundary="----=_NextPart_001_001A_01CDD3CA.5F0833C0"
------=_NextPart_001_001A_01CDD3CA.5F0833C0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit