Author: digitalintifada

anti-sec , anonymous ,lulsec

32 israeilian websites Hacked by ANONYMOUS ARABE

32 israeilian websites Hacked
http://www.benefiber.co.il/files/
http://www.hillel11.com/files/
http://www.xn--7dbafna1c0a.com/files/
http://www.contex-products.com/files/
http://www.deshenir.co.il/files/
http://golfway.nirway.com/files/
http://www.alpa-cosmetics.co.il/files/
http://www.kmc-events.co.il/files/
http://www.mashkar.co.il/files/
http://www.bgf.co.il/files/
http://www.emeraldspa.co.il/files/
http://www.tefen.org.il/files/
http://www.sunhotel.co.il/files/
http://www.water-sport.co.il/files/
http://www.sharon-eiger.co.il/files/
http://www.ofirakunis.co.il/files/
http://www.nesskor.co.il/files/
http://www.drcrystal.co.il/files/
http://www.million-gift.co.il/files
http://www.sarid-ins.co.il/files/
http://www.sovev.co.il/files/
http://www.hamatmon.co.il/files/
http://amude-hashalom.co.il/index.shtml
http://www.mtisummit.co.il/files/
http://www.bniya-tama.co.il/files/
http://www.carmit-mrfix.com/files
http://www.fadlon.co.il/userfiles/

#OpSaveGaza FBI.GOV LEAKED BY Middle East Cyber Army (MECA)

| address | port | hostname |(scroll to bottom for subdomains)
+———————————–+
| 205.128.73.105 | 80 | |
| 205.128.73.105 | 443 | |
| 192.221.110.103 | 80 | |
| 192.221.110.103 | 443 | |
| 204.160.117.123 | 80 | |
| 204.160.117.123 | 443 | |
| 4.23.33.123 | 80 | |
| 4.23.33.123 | 443 | | Federal Bureau of Investigation Email & Password In Text (1,120 contacts)
Full DB upload soon, along with Sony and Microsoft! EXPECT MORE ON 11/07/2014

Dear F.B.I YOU ARE LEAKED BY Middle East Cyber Army (MECA) FOR OP_SAVEGAZA 11/07/2014 INCLUDING FINGERPRINTS !!!
James Comey – FBI Director
1762 Kirby Lane
McLean, VA 22101

Robert S. Mueller – former FBI Director
14443 Bromley Street
Orland Park, IL 60462-2808

[*] albany.fbi.gov => 8.27.247.103
[*] albany.fbi.gov => 205.128.73.105
[*] albuquerque.fbi.gov => 205.128.73.105
[*] albuquerque.fbi.gov => 8.27.247.103
[*] anchorage.fbi.gov => 8.27.247.103
[*] anchorage.fbi.gov => 205.128.73.105
[*] askcalea.fbi.gov => 205.128.73.105
[*] albany.fbi.gov
[*] albuquerque.fbi.gov
[*] anchorage.fbi.gov
[*] askcalea.fbi.gov
[*] atlanta.fbi.gov
[*] Bridget Matthews => bridget.matthews@fbi.gov
[*] Carlos Garcia-De-Quevedo => carlos.garcia-de-quevedo@fbi.gov
[*] Darrell Foxworth => darrell.foxworth@fbi.gov
[*] David Johnson => david.johnson@fbi.gov
[*] David Rose => david.rose@fbi.gov
[*] David Bigelow => david.bigelow@fbi.gov
[*] Diana Stark => diana.stark@fbi.gov
[*] Ernie Porter => ernie.porter@fbi.gov
[*] Garland Crosby => garland.crosby@fbi.gov
[*] Greg Parsons => greg.parsons@fbi.gov
[*] Hung Tran => hung.tran@fbi.gov
[*] Jane Domboski => jane.domboski@fbi.gov
[*] Angelique Thies (angelique.thies@fbi.gov)
[*] Kathleen McChesney (kmcchesney@fbi.gov)
[*] James D Barnett (cart1@fbi.gov)
[*] Bruce Barron (barron@fbi.gov)
[*] Stephen Schmidt (steve@fbi.gov)
[*] Jim Hegarty (jhegarty@fbi.gov)
[*] Norm Sanders (nsanders@fbi.gov)
[*] Sanjay Virmani (svirmani@fbi.gov)
[*] Newark (newark@fbi.gov)
[*] Sakura S. J. Okuri (sokuri@fbi.gov)
[*] Donald W. McArthur (dmcarthur@fbi.gov)
[*] Jerome Israel => jerome.israel@fbi.gov
[*] Jerry Pender => jerry.pender@fbi.gov
[*] John Williams => john.williams@fbi.gov
[*] Jon Sorenson => jon.sorenson@fbi.gov
[*] Kama Walcott => kama.walcott@fbi.gov
[*] Katharine Miller => katharine.miller@fbi.gov
[*] Kimberly Hawkins => kimberly.hawkins@fbi.gov
[*] Latricia Grace => latricia.grace@fbi.gov
[*] Linda Sharp => linda.sharp@fbi.gov
[*] Linda Bigsby => linda.bigsby@fbi.gov
[*] Lisa Andres => lisa.andres@fbi.gov
[*] Lori Sullivan => lori.sullivan@fbi.gov
[*] Marie Ryan => marie.ryan@fbi.gov
[*] Mariselda Garza => mariselda.garza@fbi.gov
[*] Mark Guido => mark.guido@fbi.gov
[*] Michael Hayden => michael.hayden@fbi.gov
[*] Mike Holley => mike.holley@fbi.gov
[*] Noel Due => noel.due@fbi.gov
[*] Patrick Hobson => patrick.hobson@fbi.gov
[*] Raymond Gawron => raymond.gawron@fbi.gov
[*] Roy Hoyns => roy.hoyns@fbi.gov
[*] Russell Reed => russell.reed@fbi.gov
[*] Thomas Motta => thomas.motta@fbi.gov
[*] Timothy W Russell => timothy w.russell@fbi.gov
[*] Angelique Thies (angelique.thies@fbi.gov)
[*] Kathleen McChesney (kmcchesney@fbi.gov)
[*] James D Barnett (cart1@fbi.gov)
[*] Bruce Barron (barron@fbi.gov)
[*] Stephen Schmidt (steve@fbi.gov)
[*] Jim Hegarty (jhegarty@fbi.gov)
[*] Norm Sanders (nsanders@fbi.gov)
[*] Sanjay Virmani (svirmani@fbi.gov)
[*] Newark (newark@fbi.gov)
[*] Sakura S. J. Okuri (sokuri@fbi.gov)
[*] Donald W. McArthur (dmcarthur@fbi.gov)
[*] Darla.Coleman@ic.fbi.gov => safe.
[*] Douglas.Guenther@ic.fbi.gov => safe.
[*] Efreitag@fbi.gov => safe.
[*] FuckThe@fbi.gov => safe.
[*] Justin.Goodin@ic.fbi.gov => safe.
[*] MIKE.MORRISON@fbi.gov => safe.
[*] Ryan.Parker@ic.fbi.gov => safe.
[*] Sam.Mobley@ic.fbi.gov => safe.
[*] Sandra.Cherep@ic.fbi.gov => safe.
[*] Starborn@fbi.gov => safe.
[*] Steven.Vatzlavick@ic.fbi.gov => safe.
[*] admin@fbi.gov => pwned! Seen 1 times as recent as 2013-01-13.
[*] agent.tek@fbi.gov => safe.
[*] alcorn@fbi.gov => safe.
[*] angelique.thies@fbi.gov => safe.
[*] christopher.belan@ic.fbi.gov => safe.
[*] chunt@fbi.gov => safe.
[*] cybercrime@fbi.gov => Seen 2 times as recent as 2013-11-11.
[*] david.johnson@fbi.gov => safe.

These are Passwords in text. Scroll down for the ones hashed that are working as of 2014.
jeffrey.mckinney@ic.fbi.gov – kin82896yugcqkj
amy.dasaro@ic.fbi.gov – kiniGq7geduac
michael.leverock@ic.fbi.gov – iohjwhia812
brian.chrostowski@ic.fbi.gov – n8Y2hkljzh88
Tamara.Meheux@ic.fbi.gov – i*(whdkjlasjd901
chrostowski@ic.fbi.gov – o9jaqh8hjGuws
david.beyer@ic.fbi.gov – mo9U92hjka6h
marybeth.king@ic.fbi.gov – NUi2gaksjdn
g.jones@ic.fbi.gov – ioN2hhjkjba
reed@ic.fbi.gov – opmabsyd761
SIOC@ic.fbi.gov – i(jhslb^HJ
robert.mueller@ic.fbi.gov – kHibbk2b
APPcampaign@ic.fbi.gov – ojpb1g72ygj
Shernita.morris@ic.fbi.gov – noiq2n4ksd1pasword
youngstown.cv@ic.fbi.gov – password404
Sims@ic.fbi.gov – 12080898hskl
James.Wynne@ic.fbi.gov – 08847891829
Vukin@ic.fbi.gov – jhOIobwup1uas
charlotte.public@ic.fbi.gov – ionOih892hakjs
Egan@ic.fbi.gov – uiwkjao29gUKd
gary.loeffert@ic.fbi.gov – klju189Gbvksasd=
vicki.anderson@ic.fbi.gov – GUDFx67jsklds
Onorato@ic.fbi.gov – I*Yx82ikjJTq
john.cotter@ic.fbi.gov – lKUGx9o1mnlsho
Fall2010_LanguageSpecialist@ic.fbi.gov – oiHHBNihbkajs
paul.daymond@ic.fbi.gov – 09172jksdf9812
http://www.fbi.dallas@ic.fbi.gov – PIOHolobhlf
gary.bumgardner@ic.fbi.gov – ponny.and.go
Daniel.Roberts@ic.fbi.gov – oiu2o9*&tgjks
VA@ic.fbi.gov – oIHwujrbisdu2u
Cook.5@ic.fbi.gov – kJipownkkjOIy1qh
Kim@ic.fbi.gov – iupj[ofoh9812h
john.ed@ic.fbi.gov - lIHqwiuobf92
athena.lien@ic.fbi.gov - P(0uphk2ebkl
public.affairs@ic.fbi.gov - LON0912hoskjdn
paul.vitchock@ic.fbi.gov - OIUhalsdkjh2IO
charles.ro@ic.fbi.gov - HuihhYU20
Shepherd@ic.fbi.gov - 082jkaskj
Erin.Sheridan@ic.fbi.gov - gat8aGHub
gregory.baker2@ic.fbi.gov - BybwnGtf29
finwhitey@ic.fbi gov - Buwkajsy
Tumbleson@ic.fbi.gov - passowrds1234567
david.ego@ic.fbi.gov - 987712iugack
kimberly.delgreco@ic.fbi.gov - 187289784

uid 卐 Kali was here 卐 (lel) <admin@fbi.gov>
sig sig3 37B4A081 2014-01-02 __________ __________ [selfsig]
sub 2048R/EF8DA33F 2014-01-02
sig sbind 37B4A081 2014-01-02 __________ __________ []
pub 2048R/B887551B 2014-01-02
Hash=**********************************************
Fingerprint=**************************************************

uid Michael Robinson CIA (CLASSIFIED) <admin@ic.fbi.gov>
sig sig3 B887551B 2014-01-02 __________ 2018-01-08 [selfsig]

sub 2048R/965B9F55 2014-01-02
sig sbind B887551B 2014-01-02 __________ __________ []
pub 2048R/9D7396A7 2013-12-23
Hash=03780DE22A2F17310174ECA9B2575E8F
Fingerprint=AFC9 52A3 993B 7813 FC97 CE6E DCA1 93F9 9D73 96A7

uid ryan plylar <ryan.plylar@ic.fbi.gov>
sig sig3 9D7396A7 2013-12-23 __________ __________ [selfsig]
pub 2048R/DB2EB34E 2013-08-11
Hash=EF07BF80F6D13AF19BAD53EDBD1A583B
Fingerprint=762F 84B1 52D4 5381 FA96 72F0 5A4A E8B6 DB2E B34E

uid Federal Bureau of Investigation <fbi@fbi.gov>
sig sig3 DB2EB34E 2013-08-11 __________ __________ [selfsig]

sub 2048R/AFE11A2D 2013-08-11
sig sbind DB2EB34E 2013-08-11 __________ __________ []
pub 2048R/BF33EA1E 2013-08-06
Hash=004AC1FEB8B81ED8D93F08DFD44C724A
Fingerprint=418F 5F51 2225 F506 D8B8 B46B 9AD6 F520 BF33 EA1E

uid Penguin <FuckThe@fbi.gov>
sig sig3 BF33EA1E 2013-08-06 __________ __________ [selfsig]

sub 2048R/78D72A5F 2013-08-06
sig sbind BF33EA1E 2013-08-06 __________ __________ []
pub 2048R/90F09C44 2013-07-10
Hash=F6491E45F8B81537E35F4E3E50396319
Fingerprint=D66B 097F 4181 373F D2CC 4F7C 101A E259 90F0 9C44

uid Rob Gladwin <robert.gladwin@ic.fbi.gov>
sig sig3 90F09C44 2013-07-10 __________ __________ [selfsig]
pub 2048R/A0C770E2 2013-06-05
Hash=FA3A50AD931BF853AE028C1E0B31D54C
Fingerprint=40CD B13D F7D6 248F 75B8 601E EF18 13E1 A0C7 70E2

uid Zachary Delecki <zachary.delecki@ic.fbi.gov>
sig sig3 A0C770E2 2013-06-05 __________ 2017-06-05 [selfsig]

sub 2048R/67B5AF88 2013-06-05
sig sbind A0C770E2 2013-06-05 __________ 2017-06-05 []
pub 2048R/5792493A 2013-03-23
Hash=A25E83BA3ECD829151732A4FA6A8D603
Fingerprint=86CC 0A89 5C69 0794 0F11 BDE2 0F0C 9A68 5792 493A
uid Christopher Lamb <Christopher.Lamb@ic.fbi.gov>
sig sig3 5792493A 2013-03-23 __________ __________ [selfsig]

sub 2048R/553625D3 2013-03-23
sig sbind 5792493A 2013-03-23 __________ __________ []
pub 2048R/D11FA80A 2013-01-29
Hash=6B17C2D8935FC1728A52829120852E3E
Fingerprint=F6A8 0C5D D7EC 1D18 7668 66AD 1CF1 EB54 D11F A80A

uid CARTAMiller <ariel.miller@ic.fbi.gov>
sig sig3 D11FA80A 2013-01-29 __________ 2017-01-29 [selfsig]

sub 2048R/4DD66F80 2013-01-29
sig sbind D11FA80A 2013-01-29 __________ 2017-01-29 []
pub 2048R/548EA332 2012-12-28
Hash=F8C6920A2E336FA426BF955C548E35E4
Fingerprint=E8C3 0E8B 7BFF 5F6B 511B CF8E BF4C 2B07 548E A332

uid Starborn (StarbornIsAGod) <Starborn@fbi.gov>
sig sig3 548EA332 2012-12-28 __________ __________ [selfsig]
pub 2048R/A40F07F9 2012-12-28
Hash=9C2FD40DC041906A62A5B2031F40B56D
Fingerprint=A101 23E9 376A 5542 63A1 C63C FA2C FA70 A40F 07F9

uid Starborn <Starborn@fbi.gov>
sig sig3 A40F07F9 2012-12-28 __________ __________ [selfsig]
pub 2048R/93D5D662 2012-09-19
Hash=D9CE432DCC80F0C367DABC9F713FB3EA
Fingerprint=E6BD 2B96 3956 E9C6 35D2 674D 6130 20AF 93D5 D662

uid Enoch Laudie <enoch@ops-trust.net>
sig sig3 93D5D662 2012-09-19 __________ __________ [selfsig]

uid Enoch Laudie <enoch.laudie@gmail.com>
sig sig3 93D5D662 2012-09-19 __________ __________ [selfsig]

uid Enoch Laudie <enoch.laudie@ic.fbi.gov>
sig sig3 93D5D662 2012-09-19 __________ __________ [selfsig]

sub 2048R/9343917D 2012-09-19
sig sbind 93D5D662 2012-09-19 __________ __________ []
pub 2048R/402E74D4 2012-09-05
Hash=4729A77DE1ADB779E96C847DC3778DF3
Fingerprint=FDC1 7C94 C86D 246F 41B9 3AC9 592A E3B0 402E 74D4

uid Brett Yeager (Work) <brett.yeager@ic.fbi.gov>
sig sig3 402E74D4 2012-09-05 __________ __________ [selfsig]
pub 2048R/A7599FA7 2012-07-24
Hash=19C49F24A49D815703534BCDD3066EC2
Fingerprint=E744 BF8A 4DD7 EEA1 F010 5585 4EF4 6187 A759 9FA7

uid Timothy Russell <timothy.russell@ic.fbi.gov>
sig sig3 A7599FA7 2012-07-24 __________ 2014-08-01 [selfsig]

sub 2048R/21F3832B 2012-07-24
sig sbind A7599FA7 2012-07-24 __________ 2014-08-01 []
pub 2048R/A719A6BD 2012-06-19
Hash=404A18BBD16A359269D293F83DB0B05B
Fingerprint=A50D 37D8 C78B E9E7 2137 81BA 400C D595 A719 A6BD

uid Delecki <zachary.delecki@ic.fbi.gov>
sig sig3 A719A6BD 2012-06-19 __________ 2016-06-19 [selfsig]

sub 2048R/1F8D6E3B 2012-06-19
sig sbind A719A6BD 2012-06-19 __________ 2016-06-19 []
pub 2048R/1FA53C6C 2012-04-25
Hash=DD6E858BC154ECBA88EF95187AB92E3E
Fingerprint=6EBA 2930 1351 634D 296D 4EB4 643A 234A 1FA5 3C6C

uid Brandon P Warhurst (Official Key) <Brandon.Warhurst@ic.fbi.gov>
sig sig3 1FA53C6C 2012-04-25 __________ 2016-04-25 [selfsig]

sub 2048R/D9A24D31 2012-04-25
sig sbind 1FA53C6C 2012-04-25 __________ 2016-04-25 []
pub 2048R/AC763791 2012-02-24
Hash=FC4D172E2E5865E5DF8D683D53DC34B2
Fingerprint=56E3 BFC7 4C5C FE13 1457 CF8B 8AFE 98AF AC76 3791

uid cointelbro (generated by Retroshare) <fakeaddress@fbi.gov>
sig sig3 AC763791 2012-02-24 __________ __________ [selfsig]
sig sig 0A84D1F7 2012-02-24 __________ __________ Germane Orangutan (generated by Retroshare) <kjdkdjksdkdj@ksdjkjsdjsdk.com>
pub 2048R/60D7ED63 2012-02-16
Hash=46062DDC0B606388560B3E93C60A352B
Fingerprint=70E0 436D 694A BE4A 1C55 BE50 E44C 81C6 60D7 ED63

uid Brandon Warhurst (home email) <roboknight@gmail.com>
sig sig3 60D7ED63 2012-02-16 __________ 2016-02-16 [selfsig]

uid Brandon Warhurst (Official US Govt Key) <Brandon.Warhurst@ic.fbi.gov>
sig sig3 60D7ED63 2012-02-16 __________ 2016-02-16 [selfsig]

uat [contents omitted]
sig sig3 60D7ED63 2012-02-16 __________ 2016-02-16 [selfsig]

sub 2048R/A5EAB1EB 2012-02-16
sig sbind 60D7ED63 2012-02-16 __________ 2016-02-16 []
pub 2048R/C3B932B2 2011-10-26
Hash=6DC6A4705138F118F650F68D3D41668F
Fingerprint=C6E5 A66D B659 A3AF D4CB 3536 C78E 1D09 C3B9 32B2

uid Betsy Bartko <betsy.bartko@ic.fbi.gov>
sig sig3 C3B932B2 2011-10-26 __________ __________ [selfsig]

sub 2048R/8EB9B0DE 2011-10-26
sig sbind C3B932B2 2011-10-26 __________ __________ []
pub 2048R/AB359732 2011-10-25
Hash=5C9D51CF0771BFEF975C6E12E98E05A2
Fingerprint=FFBC 1251 6AAF 0C47 C060 FB44 197C BEA1 AB35 9732

uid Kirk Oberlander <kirk.oberlander@ic.fbi.gov>
sig sig3 AB359732 2011-10-25 __________ __________ [selfsig]
pub 2048R/2702BD61 2011-09-13
Hash=1576B9665C5F21B0C36A4F30096F608C
Fingerprint=82DC B479 E826 0D0E 9A50 1539 FC73 3A83 2702 BD61

uid Douglas Klein <douglas.klein2@ic.fbi.gov>
sig sig3 2702BD61 2011-09-13 __________ __________ [selfsig]

sub 2048R/71506982 2011-09-13
sig sbind 2702BD61 2011-09-13 __________ __________ []
pub 2048R/216FF8F7 2011-04-28
Hash=89E6E33FE4BD16D101FE578CC766B3D4
Fingerprint=4497 B554 06FF 443D 5205 0C71 EBFB 9884 216F F8F7

uid James Burrell <james.burrell@ic.fbi.gov>
sig sig3 216FF8F7 2011-04-28 __________ 2012-04-28 [selfsig]

sub 2048R/B4E7EC3C 2011-04-28
sig sbind 216FF8F7 2011-04-28 __________ 2012-04-28 []
pub 2048R/E7A88400 2011-04-22
Hash=F050B8E0FE4A4EB44AEDF76AF3F35B83
Fingerprint=6FF6 AE1B 596B D271 5A9D 393F D1AA B6AB E7A8 8400

uid W. Mike Herrington <w.herrington@ic.fbi.gov>
sig sig3 E7A88400 2011-04-22 __________ __________ [selfsig]

sub 2048R/4B349740 2011-04-22
sig sbind E7A88400 2011-04-22 __________ __________ []
pub 1024D/FE7E7023 2011-04-22
Hash=5DBBD64C1B1CBF5DC9B00875EDDF2CC5
Fingerprint=E935 E2FB 70EB 7520 DAA7 9E5F 17C0 59D2 FE7E 7023

uid Robert Schuett <robert.schuett@ic.fbi.gov>
sig sig FE7E7023 2011-04-22 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2011-05-18 2011-06-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-01 2011-06-15 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-28 2011-07-12 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-11 2011-07-25 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-24 2011-08-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-06 2011-08-20 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-20 2011-09-03 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-09-16 2011-09-30 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-09-29 2011-10-13 __________ PGP Global Directory Verification Key

sub 2048g/00164077 2011-04-22
sig sbind FE7E7023 2011-04-22 __________ __________ []
pub 2048R/BEA155F1 2011-03-18
Hash=5BCFBBC5B58CDB69A59984FCDB7B5BED
Fingerprint=12F7 C331 04F9 9DB9 2E74 AD80 161D 9F23 BEA1 55F1

uid Charles Eckholdt <Charles.Eckholdt@ic.fbi.gov>
sig sig BEA155F1 2011-03-18 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2011-05-24 2011-06-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-07 2011-06-21 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-20 2011-07-04 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-04 2011-07-18 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-17 2011-07-31 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-31 2011-08-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-13 2011-08-27 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-27 2011-09-10 __________ PGP Global Directory Verification Key

sub 2048R/77D9A73A 2011-03-18
sig sbind BEA155F1 2011-03-18 __________ __________ []

sub 2048R/E21B08AE 2011-03-18
sig sbind BEA155F1 2011-03-18 __________ __________ []
pub 1024D/F20223F0 2010-10-20
Hash=BCEC6092CD0A97298A328B35DC633FED
Fingerprint=4779 74FE 25D6 AA09 A909 C3FD 90FD 41DB F202 23F0

uid Russell Handorf <russell.handorf@ic.fbi.gov>
sig sig3 F20223F0 2010-10-20 __________ __________ [selfsig]

sub 1024g/14E45438 2010-10-20
sig sbind F20223F0 2010-10-20 __________ __________ []
pub 2048R/080AE32A 2010-09-29
Hash=FDF74F741E6ABDC39F58246FE1E9C40F
Fingerprint=06F9 2465 27E1 2747 915A 2050 55ED 8103 080A E32A

uid Adam Malone <adam.malone@ic.fbi.gov>
sig exp CA57AD7C 2011-09-19 2011-10-03 __________ PGP Global Directory Verification Key
sig sig 080AE32A 2011-09-23 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2011-11-28 2011-12-12 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-12-24 2012-01-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2012-01-07 2012-01-21 __________ PGP Global Directory Verification Key

sub 2048R/45CD9C0C 2010-09-29
sig sbind 080AE32A 2010-09-29 __________ __________ []
pub 2048R/DE2C0943 2010-06-08
Hash=F96F7C90D4B7AFFE0D138789037C3CD2
Fingerprint=49F8 BCAD 133C 45E4 6CAF 6765 9B06 010D DE2C 0943

uid Matthew I. Braverman <matthew.braverman@ic.fbi.gov>
sig sig3 DE2C0943 2010-06-08 __________ __________ [selfsig]

sub 2048R/FA2FA875 2010-06-08
sig sbind DE2C0943 2010-06-08 __________ __________ []
pub 1024D/A914FF45 2010-04-01
Hash=F76F87FC1120DABB133C3DC575980228
Fingerprint=E7BA C12F 7D72 A1CB 7B4F 49B6 3988 B0F7 A914 FF45

uid C. J. Sperber (FBI, Boston, Cyber Crime Squad, telephone number 617-742-5533) <c.sperber@ic.fbi.gov>
sig sig3 A914FF45 2010-04-01 __________ 2011-04-01 [selfsig]

sub 4096g/F9B8D80B 2010-04-01
sig sbind A914FF45 2010-04-01 __________ 2011-04-01 []
pub 1024D/5CC03871 2009-11-24
Hash=62C7B3A823791CD4D43232056E85F0EC
Fingerprint=0DBD 84E8 2D4F 06D2 1653 C294 CBF1 5173 5CC0 3871

uid Darren Bennett <Darren.Bennett@ic.fbi.gov>
sig sig3 5CC03871 2010-10-05 __________ __________ [selfsig]

sub 2048g/E1CE8E53 2009-11-24
sig sbind 5CC03871 2010-10-05 __________ __________ []
pub 1024D/D7D0D8BC 2009-05-26
Hash=07E73D5E68C6750EB4D2A4EA7A3E395C
Fingerprint=D8D8 FC6A 4E81 E0F1 0E3B 1390 B6CD 3E0F D7D0 D8BC

uid Robert E. White II <robert.whiteii@ic.fbi.gov>
sig sig3 D7D0D8BC 2009-05-26 __________ __________ [selfsig]

sub 2048g/812731E6 2009-05-26
sig sbind D7D0D8BC 2009-05-26 __________ __________ []
pub 2048R/F7EEF12F 2008-08-21 __________
Hash=16642CA8A1AB711908E774097A559FF4
Fingerprint=79 7E 8B D9 0B BA 41 77 93 A6 8E E9 19 4E 64 E6

uid Clinton D. Baker <clinton.baker@ic.fbi.gov>
sig sig F7EEF12F 2008-08-21 __________ __________ [selfsig]
pub 1024D/5E9F3852 2008-07-07
Hash=EBC393A89E9274D9AD98106CC30656E6
Fingerprint=57BB 2ED6 5C09 AC88 EF88 3CCA E623 D5FA 5E9F 3852

uid Phillip B. McDonald <phillip.b.mcdonald@gmail.com>
sig sig 5E9F3852 2008-07-07 __________ __________ [selfsig]

uid SA Phillip B. McDonald <phillip.mcdonald@ic.fbi.gov>
sig sig 5E9F3852 2008-07-07 __________ __________ [selfsig]

sub 2048g/C6616557 2008-07-07
sig sbind 5E9F3852 2008-07-07 __________ __________ []
pub 2048R/009D0C91 2008-04-17
Hash=F43C15D1EFD6DC4908D4C6A55D464C39
Fingerprint=BA82 FF06 4A89 C5EA 4625 B9B1 F69E AAAE 009D 0C91

uid Norm Sanders <Norman.Sanders@ic.fbi.gov>
sig sig 009D0C91 2008-04-17 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Norm Sanders <nsanders@fbi.gov>
sig sig 009D0C91 2008-04-17 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid nsanders@leo.gov <nsanders@leo.gov>
sig sig 009D0C91 2009-08-21 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Norm Sanders <normsanders@gmail.com>
sig sig 009D0C91 2008-04-17 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid secyber@gmail.com <secyber@gmail.com>
sig sig 009D0C91 2009-08-21 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Norm Sanders <Norman.SandersJr@ic.fbi.gov>
sig sig 009D0C91 2008-06-17 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

sub 2048R/EC80D57A 2008-04-17
sig sbind 009D0C91 2008-04-17 __________ __________ []
pub 4096R/FA11E105 2007-09-19
Hash=532C3EA67B9D3728ED228ECC02C2C411
Fingerprint=6FA2 99E4 394C 84B5 71FB 38B2 6F1E D1DA FA11 E105

uid Chris Thompson <cwt94@yahoo.com>
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2007-09-19 2007-10-03 __________ PGP Global Directory Verification Key
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-04-30 2009-05-14 __________ PGP Global Directory Verification Key
sig sig FA11E105 2009-05-13 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-06-22 2009-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-05 2009-07-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-19 2009-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-28 2009-08-11 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-10 2009-08-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-23 2009-09-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-06 2009-09-20 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-19 2009-10-03 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-16 2009-10-30 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-30 2009-11-13 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-12 2009-11-26 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-25 2009-12-09 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-09 2009-12-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-22 2010-01-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-05 2010-01-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-15 2010-01-29 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-19 2010-02-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-02 2010-02-16 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-15 2010-03-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-28 2010-03-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-14 2010-03-28 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-27 2010-04-10 __________ PGP Global Directory Verification Key

uid Chris Thompson <cthomps2@leo.gov>
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-04-30 2009-05-14 __________ PGP Global Directory Verification Key
sig sig FA11E105 2009-05-13 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-06-22 2009-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-05 2009-07-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-19 2009-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-28 2009-08-11 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-10 2009-08-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-23 2009-09-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-06 2009-09-20 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-19 2009-10-03 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-16 2009-10-30 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-30 2009-11-13 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-12 2009-11-26 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-25 2009-12-09 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-09 2009-12-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-22 2010-01-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-05 2010-01-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-15 2010-01-29 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-19 2010-02-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-02 2010-02-16 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-15 2010-03-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-28 2010-03-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-14 2010-03-28 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-27 2010-04-10 __________ PGP Global Directory Verification Key

uid Chris Thompson <chris.thompson@fbi.gov>
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2007-09-19 2007-10-03 __________ PGP Global Directory Verification Key
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-04-30 2009-05-14 __________ PGP Global Directory Verification Key
sig sig FA11E105 2009-05-13 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-06-22 2009-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-05 2009-07-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-19 2009-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-28 2009-08-11 __________ PGP Global Directory Verification Key

uid Chris Thompson <chris.w.thompson@gmail.com>
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2007-09-19 2007-10-03 __________ PGP Global Directory Verification Key
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-04-30 2009-05-14 __________ PGP Global Directory Verification Key
sig sig FA11E105 2009-05-13 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-06-22 2009-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-05 2009-07-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-19 2009-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-28 2009-08-11 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-10 2009-08-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-23 2009-09-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-06 2009-09-20 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-09-19 2009-10-03 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-16 2009-10-30 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-10-30 2009-11-13 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-12 2009-11-26 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-11-25 2009-12-09 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-09 2009-12-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-12-22 2010-01-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-05 2010-01-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-15 2010-01-29 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-01-19 2010-02-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-02 2010-02-16 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-15 2010-03-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-02-28 2010-03-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-14 2010-03-28 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-03-27 2010-04-10 __________ PGP Global Directory Verification Key

uid Chris Thompson <christopher.thompson@ic.fbi.gov>
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2007-09-19 2007-10-03 __________ PGP Global Directory Verification Key
sig sig FA11E105 2007-09-19 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-04-30 2009-05-14 __________ PGP Global Directory Verification Key
sig sig FA11E105 2009-05-13 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig exp CA57AD7C 2009-06-22 2009-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-05 2009-07-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-19 2009-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-28 2009-08-11 __________ PGP Global Directory Verification Key

sub 4096R/86B89AA9 2007-09-19
sig sbind FA11E105 2007-09-19 __________ __________ []
pub 1024D/663E9397 2007-08-31
Hash=4CDE3C517DA01967C6CB4E734084156C
Fingerprint=8594 9093 CF9E 5E32 4107 B9D0 A6C4 5868 663E 9397

uid Mike Eubanks <me@cyber-justice.org>
sig sig 663E9397 2009-04-02 __________ __________ [selfsig]

uid Michael Eubanks <meubanks@ncfta.net>
sig sig 663E9397 2009-01-20 __________ __________ [selfsig]

uid Michael Eubanks <meubanks@cyber-response.org>
sig sig 663E9397 2009-04-01 __________ __________ [selfsig]

uid michael.eubanks@ic.fbi.gov <michael.eubanks@ic.fbi.gov>
sig sig 663E9397 2009-04-02 __________ __________ [selfsig]

sub 2048g/C60D6E8A 2007-08-31
sig sbind 663E9397 2007-08-31 __________ __________ []
pub 2047R/4174BEA4 2007-08-24
Hash=8455354E254175E31E4A9D6F08D8C429
Fingerprint=44C7 F017 CB5C 12C5 2174 A0EA 890E 50C7 4174 BEA4

uid Online I Am A Dog <onlinenooneknowsyouradog@gmail.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan.goodin@fbi.gov>
sig sig 4174BEA4 2007-08-25 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dang@well.sf.ca.us>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan.goodin@apple.com>
sig sig 4174BEA4 2007-08-25 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Online I Am A Dog <dang@cnet.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan.goodin@hsbc.co.uk>
sig sig 4174BEA4 2007-08-25 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan.goodin@us.hsbc.com>
sig sig 4174BEA4 2007-08-25 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan_goodin@infoworld.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Online I Am A Dog <dan.goodin@cnet.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Dan Goodin <dan.goodin@fake.whitehouse.gov>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Online I Am A Dog <dan.goodin@fake.hsbc.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

uid Online I Am A Dog <dan.goodin@theregister.com>
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig 4174BEA4 2007-08-24 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime

sub 2047R/AA672583 2007-08-24
sig sbind 4174BEA4 2007-08-24 __________ __________ []
pub 1024D/FC11E734 2007-06-18
Hash=CD067592C0F1351EF129CD7686FCDA99
Fingerprint=21FE 6AD5 4376 2945 4C07 40AC 64A7 614B FC11 E734

uid Michael J. Troutman <mtroutman@fbi.gov>
sig sig3 FC11E734 2007-06-18 __________ __________ [selfsig]

sub 2048g/DE2D1695 2007-06-18
sig sbind FC11E734 2007-06-18 __________ __________ []
pub 2048R/13E28B89 2007-06-14
Hash=C32E228C5BC62F81C470879D2ACFFE94
Fingerprint=2CF3 C460 5CD2 3B43 D278 4CBB 4DB0 D649 13E2 8B89

uid Kurt Pipal <Kurt.Pipal@ic.fbi.gov>
sig sig 13E28B89 2007-06-14 __________ __________ [selfsig]
Notation data: preferred-email-encoding@pgp.com pgpmime
sig sig3 77098D80 2008-12-14 __________ __________ Kevin Graham <grahammk@gmail.com>

sub 2048R/09EA01F1 2007-06-14
sig sbind 13E28B89 2007-06-14 __________ __________ []
pub 1024D/29CFF794 2007-05-22
Hash=C44CB844BC4AC177CC2640552316C650
Fingerprint=1F84 B1B5 AE93 CA1F 0FBC B07A 0CAD 2FD0 29CF F794

uid Margarita C. Brito <margarita.brito@ic.fbi.gov>
sig sig 29CFF794 2007-05-22 __________ __________ [selfsig]

sub 2048g/830E4778 2007-05-22
sig sbind 29CFF794 2007-05-22 __________ __________ []
pub 1024D/EB1B9EE6 2007-03-07
Hash=57E5810D30D654862B4EC4A166B26142
Fingerprint=AF4A 77F8 9558 DA79 0424 48A8 26CE 0A9D EB1B 9EE6

uid Margarita C. Brito <AGMCBRIT@ic.fbi.gov>
sig sig EB1B9EE6 2007-03-07 __________ __________ [selfsig]

sub 2048g/FD1B75E9 2007-03-07
sig sbind EB1B9EE6 2007-03-07 __________ __________ []
pub 1024D/67916ED9 2007-03-07
Hash=9EFFA730136CF84E40B9164C66854E0D
Fingerprint=5B73 4267 3FD3 4649 5EC7 9D74 D768 2702 6791 6ED9

uid Geoff Bickers <geoff.bickers@ic.fbi.gov>
sig sig3 67916ED9 2007-03-08 __________ 2009-10-04 [selfsig]

uid g <gbickers@gmail.com>
sig sig3 67916ED9 2007-03-07 __________ 2012-03-05 [selfsig]
sig sig3 67916ED9 2007-03-08 __________ 2009-10-04 [selfsig]

sub 2048g/DE97DA47 2007-03-07
sig sbind 67916ED9 2007-03-07 __________ 2012-03-05 []
pub 1024D/74757565 2006-12-05
Hash=0A7006690129487791B06C31442CD503
Fingerprint=E675 597E 1EAE E43F 1805 1D92 C1D2 FE88 7475 7565

uid Nicholas Nathans <Nicholas.Nathans@ic.fbi.gov>
sig sig3 74757565 2006-12-05 __________ 2008-12-04 [selfsig]
sig sig EEA118A5 2006-12-13 __________ __________ Nicholas Nathans <Nicholas.Nathans@ic.fbi.gov>

sub 2048g/6EDB7FA0 2006-12-05
sig sbind 74757565 2006-12-05 __________ 2008-12-04 []
pub 1024D/EEA118A5 2006-12-04
Hash=BCD3076C3720A85042337B016ECEDA7E
Fingerprint=50B1 BAC5 5DAE 3C60 0F4B 3CA7 779B 5F3B EEA1 18A5

uid Nicholas Nathans <Nicholas.Nathans@ic.fbi.gov>
sig sig3 EEA118A5 2006-12-05 __________ 2009-12-05 [selfsig]

uid Nicholas Nathans <nnathans@leo.gov>
sig sig3 EEA118A5 2006-12-13 __________ 2009-12-05 [selfsig]

uid Nicholas Nathans <nnathans.cart@fbi.gov>
sig sig3 EEA118A5 2006-12-04 __________ __________ [selfsig]
sig sig3 EEA118A5 2006-12-05 __________ 2009-12-05 [selfsig]

sub 2048g/C3A41AD7 2006-12-04
sig sbind EEA118A5 2006-12-04 __________ __________ []
pub 1024D/171BFF67 2006-07-26
Hash=5C07703B6589AE14B9DAA5D47D777202
Fingerprint=441B E28C E675 09C2 4BEA 68EE 747F C280 171B FF67

uid SA Jeff Edwards (FBI Cyber Squad – Detroit) <jedward5@leo.gov>
sig sig3 171BFF67 2006-07-26 __________ __________ [selfsig]

sub 1024g/6D0AEFC0 2006-07-26
sig sbind 171BFF67 2006-07-26 __________ __________ []
pub 1024D/5B73FC22 2006-06-23
Hash=A1F429373A07756913A8585D48F568BF
Fingerprint=903C 5CD7 4DE9 3A62 96AA 4ED5 1FF3 D543 5B73 FC22

uid James Burrell <james.burrell@ic.fbi.gov>
sig sig3 5B73FC22 2006-06-23 __________ 2007-05-23 [selfsig]
sig sig3 5B73FC22 2009-02-25 __________ 2011-02-25 [selfsig]

sub 2048g/F36140F6 2006-06-23
sig sbind 5B73FC22 2006-06-23 __________ 2007-05-23 []
pub 1024D/7CE602BE 2006-06-09
Hash=1462A6E2948AB51FB52D6946B62D4223
Fingerprint=0F44 8D96 00C4 D90F 0818 F4EE 7763 7782 7CE6 02BE

uid Jason Stroud <Jason.Stroud@ic.fbi.gov>
sig sig 7CE602BE 2006-06-09 __________ __________ [selfsig]

sub 2048g/74E2089F 2006-06-09
sig sbind 7CE602BE 2006-06-09 __________ __________ []
pub 1024D/B555E1BB 2006-05-31
Hash=F43717B6822EC9BC7B90EC9C5A7EDC1D
Fingerprint=5268 12E5 298E 0217 C75C EF99 567E 4E76 B555 E1BB

uid Eric Smithmier <eric.smithmier@ic.fbi.gov>
sig sig3 B555E1BB 2006-05-31 __________ __________ [selfsig]
sig sig 10507F8C 2006-05-31 __________ __________ esmithmier <eric.smithmier@ic.fbi.gov>

sub 1024g/08A2BF0A 2006-05-31
sig sbind B555E1BB 2006-05-31 __________ __________ []
pub 1024D/10507F8C 2006-05-31
Hash=58CC6296472F34181657AEBC7159B08D
Fingerprint=F6E3 A27D 226A 57FB 1272 3374 EEB7 B75D 1050 7F8C

uid esmithmier <eric.smithmier@ic.fbi.gov>
sig sig3 10507F8C 2006-05-31 __________ __________ [selfsig]

sub 1792g/C36011C9 2006-05-31
sig sbind 10507F8C 2006-05-31 __________ __________ []
pub 1024D/C8C63DC5 2006-05-25
Hash=77A430C3AD50DCEA0BD99558590602A9
Fingerprint=24B4 6441 ED2B 0D32 C8A6 57EA EDAF 2CAD C8C6 3DC5

uid SA Jeremy Morrissey <Jeremy.Morrissey@ic.fbi.gov>
sig sig C8C63DC5 2006-05-25 __________ __________ [selfsig]
sig sig EEA118A5 2006-12-13 __________ __________ Nicholas Nathans <Nicholas.Nathans@ic.fbi.gov>

sub 2048g/4DFEC516 2006-05-25
sig sbind C8C63DC5 2006-05-25 __________ 2007-05-23 []
pub 1024D/EAA73004 2006-05-25
Hash=953B618A2A0157C784C1E38470097954
Fingerprint=0BA9 5B4D 47AA 957E 502B 7EF5 1C80 64D7 EAA7 3004

uid SA C.J. Sperber <c.sperber@ic.fbi.gov>
sig sig3 EAA73004 2006-05-25 __________ 2007-05-22 [selfsig]

sub 2048g/2078E638 2006-05-25
sig sbind EAA73004 2006-05-25 __________ 2007-05-22 []
pub 1024D/E83322B4 2006-05-24
Hash=B3C84150D1E0548E8E6305718AB19F8F
Fingerprint=A2B7 948C 1FD9 50C3 320C CD3D D9AA DC11 E833 22B4

uid SA Doug Domin <doug.domin@ic.fbi.gov>
sig sig3 E83322B4 2006-05-24 __________ 2007-05-22 [selfsig]

sub 2048g/FFF63D99 2006-05-24
sig sbind E83322B4 2006-05-24 __________ 2007-05-22 []
pub 1024D/D1755A1C 2006-05-23
Hash=A111DC1213D79D09D6F01F09BB988992
Fingerprint=4780 32F1 8145 C56E F93E 1347 BEB0 7F29 D175 5A1C

uid FBI Cyber Northeast <northeast.cyber@ic.fbi.gov>
sig sig3 D1755A1C 2006-05-23 __________ 2007-05-23 [selfsig]
sig sig 9B091188 2006-05-23 __________ __________ Timothy Russell <timothy.russell@ic.fbi.gov>

sub 2048g/FEF77019 2006-05-23
sig sbind D1755A1C 2006-05-23 __________ 2007-05-23 []
pub 2048R/9BB8C123 2006-04-19
Hash=F2D8A540049B53332D827CDB7F9363A6
Fingerprint=4ECA 2809 D9A1 BE5C 3E01 7697 557A 51C7 9BB8 C123

uid Daniel Faith <daniel.faith@gmail.com>
sig sig3 9BB8C123 2006-04-19 __________ __________ [selfsig]

uid Daniel Faith <Daniel.Faith@ic.fbi.gov>
sig sig3 9BB8C123 2006-04-19 __________ __________ [selfsig]

uid Daniel Faith <DBFaith@capitol-college.edu>
sig sig3 9BB8C123 2006-04-19 __________ __________ [selfsig]
pub 1024D/AC365763 2006-02-23
Hash=F196349728E021B89C3D30938386165B
Fingerprint=408E 5B34 A9DE 6E50 2320 28D9 8886 DF75 AC36 5763

uid Luz Garcia <luz.garcia@ic.fbi.gov>
sig sig3 AC365763 2006-02-23 __________ __________ [selfsig]

sub 2048g/897FDB02 2006-02-23
sig sbind AC365763 2006-02-23 __________ __________ []
pub 1024D/D33A6A3B 2006-02-23
sig revok D33A6A3B 2006-02-23 __________ __________ [selfsig]
Hash=CF1B30BF548794A31F6270F5D73C9A84
Fingerprint=DE58 13D4 3A6D 9142 1D56 AEF2 A5BB 8330 D33A 6A3B

uid Luz Garcia <luz.garcia@ic.fbi.gov>
sig sig3 D33A6A3B 2006-02-23 __________ __________ [selfsig]
pub 1024D/9B091188 2006-01-20
Hash=4065EE654B31AD7C25D4C50B8BF0CBBC
Fingerprint=2799 CDD1 6C61 EB89 F159 C8C9 4F9E 3B88 9B09 1188

uid Timothy Russell <timothy.russell@ic.fbi.gov>
sig sig3 9B091188 2006-01-20 __________ 2007-01-20 [selfsig]
sig sig EEA118A5 2006-12-13 __________ __________ Nicholas Nathans <Nicholas.Nathans@ic.fbi.gov>

sub 2048g/01C8705E 2006-01-20
sig sbind 9B091188 2006-01-20 __________ 2007-01-20 []
pub 1024D/39CBB5EC 2005-10-27
Hash=FB156429DBC82A2101276DE9ABC9CB59
Fingerprint=EDCF 32E5 3BEA AD71 02F6 FE75 8244 3C67 39CB B5EC

uid Onofrio M. Minafo <onofrio.minafo@ic.fbi.gov>
sig sig 39CBB5EC 2005-10-27 __________ __________ [selfsig]

sub 2048g/7812C813 2005-10-27
sig sbind 39CBB5EC 2005-10-27 __________ __________ []
pub 1024D/82AB7C6A 2005-08-17
Hash=2A9239C97F95A9CB22429E9B772B9C76
Fingerprint=AC53 391E 8E37 F3CD D431 2965 427F 9988 82AB 7C6A

uid Sanjay Virmani <sanjay.virmani@ic.fbi.gov>
sig sig3 82AB7C6A 2005-08-17 __________ __________ [selfsig]

sub 2048g/D07724BB 2005-08-17
sig sbind 82AB7C6A 2005-08-17 __________ __________ []
pub 1024D/3285F42E 2005-08-16
Hash=9F33638243F1FB1F93498AE63C690918
Fingerprint=7F02 FC69 553E 1D73 D10D BC30 2C73 324C 3285 F42E

uid Corey M. Hubbert <corey.hubbert@ic.fbi.gov>
sig sig 3285F42E 2005-08-16 __________ __________ [selfsig]

sub 2048g/5002A46C 2005-08-16
sig sbind 3285F42E 2005-08-16 __________ __________ []
pub 1024D/308E08CE 2005-07-22
Hash=A0F0A407F6DE850EDBF0C39164C1BE26
Fingerprint=C716 06B1 E5F4 78AF C193 FFEA 9D1C 098F 308E 08CE

uid Brian Barrios <bbarrios@fbi.gov>
sig sig3 308E08CE 2005-09-08 __________ __________ [selfsig]

uid Brian Barrios <bbarrios@gmail.com>
sig sig3 308E08CE 2005-07-22 __________ __________ [selfsig]
sig sig3 308E08CE 2005-07-22 __________ __________ [selfsig]

sub 2048g/A1766F24 2005-07-22
sig sbind 308E08CE 2005-07-22 __________ __________ []
pub 1024D/42B5AC7B 2005-06-02
sig revok 42B5AC7B 2007-08-02 __________ __________ [selfsig]
Hash=FC1B4395FFF7110378F5EAA7566EB943
Fingerprint=86BF 84D1 AC1B 6953 0B23 FD09 0BC2 5D95 42B5 AC7B

uid E. Adrian Hawkins <adrian.hawkins@ic.fbi.gov>
sig sig 42B5AC7B 2005-06-02 __________ __________ [selfsig]

uid E. Adrian Hawkins <adrian.hawkins@gmail.com>
sig sig 42B5AC7B 2005-06-14 __________ __________ [selfsig]

sub 2048g/FB11BCF0 2005-06-02
sig sbind 42B5AC7B 2005-06-02 __________ __________ []
pub 1024D/BA5FE2E5 2005-05-30
Hash=600BE03C8618378068E6191D17B0516B
Fingerprint=C414 45ED 877C 68D2 3615 C3BE 4A0D 1726 BA5F E2E5

uid Leonard Carollo <leonard.carollo@ic.fbi.gov>
sig sig BA5FE2E5 2005-11-02 __________ __________ [selfsig]

uid Leonard Carollo <lcarollo@leo.gov>
sig sig BA5FE2E5 2005-11-02 __________ __________ [selfsig]

sub 2048g/AF422F5F 2005-05-30
sig sbind BA5FE2E5 2005-05-30 __________ __________ []
pub 1024D/57794E32 2005-05-09
Hash=85F0F7B166EB0707A0AA51D91320798F
Fingerprint=AE00 31AA C2EA E1B4 B155 D39D 1439 9158 5779 4E32

uid J. Keith Mularski <j.mularski@ic.fbi.gov>
sig exp CA57AD7C 2009-05-09 2009-05-23 __________ PGP Global Directory Verification Key
sig sig 57794E32 2011-10-03 __________ __________ [selfsig]

uid J Keith Mularski <jkmularski@ncfta.net>
sig sig 57794E32 2011-05-24 __________ __________ [selfsig]

uid J Keith Mularski <kmularski@ncfta.net>
sig sig 57794E32 2011-10-03 __________ __________ [selfsig]

uid Keith Mularski <keith.mularski@ugov.gov>
sig sig 57794E32 2009-04-13 __________ __________ [selfsig]
sig exp CA57AD7C 2009-05-09 2009-05-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-09-05 2010-09-19 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-09-18 2010-10-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-10-02 2010-10-16 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-10-15 2010-10-29 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-10-28 2010-11-11 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-11-10 2010-11-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-11-23 2010-12-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-12-07 2010-12-21 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-12-20 2011-01-03 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-01-03 2011-01-17 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-01-16 2011-01-30 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-01-30 2011-02-13 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-02-12 2011-02-26 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-02-23 2011-03-09 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-03-08 2011-03-22 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-03-22 2011-04-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-04-04 2011-04-18 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-04-17 2011-05-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-05-01 2011-05-15 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-05-14 2011-05-28 __________ PGP Global Directory Verification Key
sig sig 57794E32 2011-05-23 __________ __________ [selfsig]
sig exp CA57AD7C 2011-05-27 2011-06-10 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-09 2011-06-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-06-22 2011-07-06 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-06 2011-07-20 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-07-19 2011-08-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-02 2011-08-16 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2011-08-15 2011-08-29 __________ PGP Global Directory Verification Key

uid Keith Mularski <kmularski@cyber-response.org>
sig sig 57794E32 2009-04-02 __________ __________ [selfsig]
sig exp CA57AD7C 2009-05-09 2009-05-23 __________ PGP Global Directory Verification Key

sub 2048g/4AEC6425 2005-05-09
sig sbind 57794E32 2005-05-09 __________ __________ []
pub 1024D/22A81CF4 2005-03-08
Hash=E19FC2FA5564090E0EC208D7D2455A46
Fingerprint=B903 43B4 EBF1 4FEB 89D5 6598 1445 6CF8 22A8 1CF4

uid Eric Freitag <Eric.freitag@ic.fbi.gov>
sig sig 22A81CF4 2005-03-08 __________ __________ [selfsig]

sub 2048g/758654A9 2005-03-08
sig sbind 22A81CF4 2005-03-08 __________ __________ []
pub 1024D/B138424D 2005-02-01
Hash=CDA892B86B5174A2729A0D704CE8997D
Fingerprint=904F 0D61 FF58 16FC C71B 61FA F836 BE86 B138 424D

uid Brian White <bwhite@fbi.gov>
sig sig B138424D 2005-02-01 __________ __________ [selfsig]

sub 2048g/D54D9C95 2005-02-01
sig sbind B138424D 2005-02-01 __________ __________ []
pub 1024D/B9E790CE 2005-01-20
Hash=B6B9D35C048F9068A6AE4710A94C6A10
Fingerprint=14A3 D596 F82A 7A29 07C5 6AA1 99F0 3969 B9E7 90CE

uid Robert Cameron (none) <rjcameron@fbi.gov>
sig sig3 B9E790CE 2005-01-20 __________ 2010-01-19 [selfsig]

sub 2048g/769FF6A2 2005-01-20
sig sbind B9E790CE 2005-01-20 __________ 2010-01-19 []
pub 1024D/C4DEDFC0 2004-10-29
Hash=D4E2DA11C48E3625A9550CBDD8C4E763
Fingerprint=223B 1C99 431A DD46 053A A1FF 0D60 D5A5 C4DE DFC0

uid onofrio m. minafo <ominafo@fbi.gov>
sig sig C4DEDFC0 2004-10-29 __________ __________ [selfsig]

sub 2048g/9282A2AE 2004-10-29
sig sbind C4DEDFC0 2004-10-29 __________ __________ []
pub 1024D/85C939CD 2004-09-21
Hash=046C1070A49E4C11AC3C9A01F74D30AD
Fingerprint=1127 7F94 0FA1 ACD8 26A5 A195 FBB5 1D3A 85C9 39CD

uid Chad R. Hunt <chunt@fbi.gov>
sig sig 85C939CD 2004-09-21 __________ __________ [selfsig]

sub 2048g/BADD873E 2004-09-21
sig sbind 85C939CD 2004-09-21 __________ __________ []
pub 1024D/A6C631FE 2004-09-12
Hash=231D021C98212ABED15343657FCBB26A
Fingerprint=01BA 8D34 A294 6203 93F1 307B CFF1 D308 A6C6 31FE

uid Eric ‘Bill’ Freitag <Efreitag@fbi.gov>
sig sig A6C631FE 2004-09-12 __________ __________ [selfsig]

sub 2048g/497263D3 2004-09-12
sig sbind A6C631FE 2004-09-12 __________ __________ []
pub 1024D/947651CD 2004-08-11
Hash=C026B1CA0F6728F1B80710D9208CBE4C
Fingerprint=8782 8400 5B9E 287C 5979 4B4D 8708 ECD9 9476 51CD

uid Chad Hunt <chunt@fbi.gov>
sig sig 947651CD 2004-08-11 __________ __________ [selfsig]

sub 2048g/08349C9B 2004-08-11
sig sbind 947651CD 2004-08-11 __________ __________ []
pub 1024D/2F75A19F 2004-07-22
Hash=16C935605DDF233D662D10E6740ADBAD
Fingerprint=9528 4996 8CFF C43C C028 B5E5 EE5D BD9C 2F75 A19F

uid Jim Thompson (Special Agent, FBI) <jthomp14@leo.gov>
sig sig3 2F75A19F 2004-07-22 __________ __________ [selfsig]

sub 2048g/B39A982F 2004-07-22
sig sbind 2F75A19F 2004-07-22 __________ __________ []
pub 1024D/A19BDFA1 2004-04-06
Hash=1FE3679074077E03F2AF512779F8D3D7
Fingerprint=8C26 7417 42AE A526 FFCA 5096 E561 17A0 A19B DFA1

uid Scott Wanamaker <swana@fbi.gov>
sig sig A19BDFA1 2004-04-06 __________ __________ [selfsig]

sub 2048g/37603B60 2004-04-06
sig sbind A19BDFA1 2004-04-06 __________ __________ []
pub 1024D/3B6A6DC2 2004-01-28
Hash=BB4714E4B89C633332F987E9C1404F37
Fingerprint=76BC 8316 C926 C03D FCDB EF1A E287 44C9 3B6A 6DC2

uid Sanjay Virmani <svirmani@fbi.gov>
sig sig 3B6A6DC2 2004-01-28 __________ __________ [selfsig]

sub 2048g/2AE647F6 2004-01-28
sig sbind 3B6A6DC2 2004-01-28 __________ __________ []
pub 1024D/43975792 2004-01-20
Hash=7BFB52C242EDAED955F6F30EF1FD60B8
Fingerprint=F67C B11B FC23 027A 615B 2E5B 258A 3123 4397 5792

uid Edward Gibson FBI <edgibson@leo.gov>
sig sig 43975792 2004-01-20 __________ __________ [selfsig]
sig sig 04E3D0D7 2004-01-22 __________ __________ Simon Conant <sconant@microsoft.com>
sig sig EB722C4B 2004-01-22 __________ __________ Microsoft PSS Security Team <psssec@microsoft.com>
sig exp CA57AD7C 2004-12-31 2005-01-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-01-14 2005-01-28 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-01-27 2005-02-10 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-02-09 2005-02-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-02-19 2005-03-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-04-03 2005-04-17 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-04-17 2005-05-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-04-17 2005-05-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-05-01 2005-05-15 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-05-15 2005-05-29 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-05-17 2005-05-31 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-05-31 2005-06-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-06-20 2005-07-04 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-07-10 2005-07-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-07-10 2005-07-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-07-24 2005-08-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-07-31 2005-08-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-07-31 2005-08-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-08-19 2005-09-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-08-21 2005-09-04 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2005-12-26 2006-01-09 __________ PGP Global Directory Verification Key

sub 2048g/0B69DDB0 2004-01-20
sig sbind 43975792 2004-01-20 __________ __________ []
pub 1024D/AEAF3667 2003-09-19
Hash=4E62FBFCE80C8743A44E6817DCDACC26
Fingerprint=4752 821B 80EF 5E63 1D14 EF92 DB94 3D2C AEAF 3667

uid Michael D. Heiler (FBI Special Agent) <mheiler@fbi.gov>
sig sig3 AEAF3667 2003-09-19 __________ __________ [selfsig]
sig sig F2882606 2004-04-26 __________ __________ Derek Simmel <dsimmel@psc.edu>
sig sig B8C5BA02 2004-06-15 __________ __________ Brian Ho <chipho@cisco.com>

sub 1024g/AF6E999B 2003-09-19
sig sbind AEAF3667 2003-09-19 __________ __________ []
pub 1024D/B707B063 2003-08-25
Hash=2801950C3C1D7D08CB1DA56F5C7E2A33
Fingerprint=50A9 314E 4EAC D62F 6697 A615 E28A 6665 B707 B063

uid Sakura S. J. Okuri <sokuri@fbi.gov>
sig sig B707B063 2003-08-25 __________ __________ [selfsig]

sub 2048g/9648A79A 2003-08-25
sig sbind B707B063 2003-08-25 __________ __________ []
pub 1024D/ED5D0C32 2003-08-18
Hash=E603765A63B118C67A963D13CB3EA68D
Fingerprint=9608 CA12 B271 9ADE 2520 70F1 549E B09C ED5D 0C32

uid Miguel Clarke <mclarke@fbi.gov>
sig sig ED5D0C32 2003-08-18 __________ __________ [selfsig]

sub 2048g/2D5DD3AE 2003-08-18
sig sbind ED5D0C32 2003-08-18 __________ __________ []
pub 1024D/38D31849 2003-06-20
Hash=FD2403F55A63188F38FB4B0A45B2314B
Fingerprint=0C1B 52CE 93DC CD29 0261 0BF4 F4CE 78E2 38D3 1849

uid Bryant C. Jones <bcjones@fbi.gov>
sig sig 38D31849 2003-06-20 __________ __________ [selfsig]

sub 2048g/BAFD7562 2003-06-20
sig sbind 38D31849 2003-06-20 __________ __________ []
pub 1024D/696AAE45 2003-05-22
Hash=75C04EB2E96DE2FAFE7C55F61939FB55
Fingerprint=38B6 6BDB 53E5 F042 E082 C703 580E B458 696A AE45

uid Sakura Okuri <sokuri@fbi.gov>
sig sig 696AAE45 2003-05-22 __________ __________ [selfsig]
sig sig 45873728 2003-05-22 __________ __________ Strategic Reconnaissance Team (RECON Shared Key) <recon@snosoft.com>

sub 2048g/9352FF6B 2003-05-22
sig sbind 696AAE45 2003-05-22 __________ __________ []
pub 1024D/53479EC3 2003-02-21
Hash=D3E13D570D0816E2D3E7BC6467D44DB3
Fingerprint=8735 2D3C 95DC F77A 0390 5D73 243F DD67 5347 9EC3

uid William L. Alcorn, Jr. <alcorn@fbi.gov>
sig sig 53479EC3 2003-02-21 __________ __________ [selfsig]

sub 2048g/7AF52A4F 2003-02-21
sig sbind 53479EC3 2003-02-21 __________ __________ []
pub 1024D/A69B1530 2003-02-17
Hash=4A466C2FEC11E68827F5C6D65CF14992
Fingerprint=A5CC 3225 C944 7C81 2C5D 6701 F44D F4E6 A69B 1530

uid Donald W. McArthur (Secure!) <donmcarthur@nc.rr.com>
sig sig3 A69B1530 2003-02-17 __________ __________ [selfsig]
sig sig3 A69B1530 2003-02-17 __________ __________ [selfsig]
sig sig3 27D055DB 2004-05-27 __________ __________ Alan B. Clegg <alan@clegg.com>

uid Donald W. McArthur (Work email) <dmcarthur@fbi.gov>
sig sig3 A69B1530 2003-11-04 __________ __________ [selfsig]
sig sig3 27D055DB 2004-05-27 __________ __________ Alan B. Clegg <alan@clegg.com>

sub 2048g/61143E29 2003-02-17
sig sbind A69B1530 2003-02-17 __________ __________ []
pub 1024D/9C2D3BC0 2003-01-21
Hash=84F8CCA24F173ABDFAF1420F860199C2
Fingerprint=5A4C 64E1 08F4 B0A9 3E08 5AAD AFF4 FD20 9C2D 3BC0

uid Matthew B. Perry <cybercrime@fbi.gov>
sig sig 9C2D3BC0 2003-01-21 __________ __________ [selfsig]

uat [contents omitted]
sig sig 9C2D3BC0 2003-01-21 __________ __________ [selfsig]

sub 3072g/D40ED600 2003-01-21
sig sbind 9C2D3BC0 2003-01-21 __________ __________ []
pub 1024D/40EBAAFF 2002-12-10
Hash=ECBB69555327FCCEC39AB1C8207B8BCE
Fingerprint=5AE8 3C4C 9148 F241 6BE1 C61E 7977 7D2D 40EB AAFF

uid Victor Olesen <volesen@fbi.gov>
sig sig 40EBAAFF 2002-12-10 __________ __________ [selfsig]

sub 2048g/92F972F7 2002-12-10
sig sbind 40EBAAFF 2002-12-10 __________ __________ []
pub 1024D/A73A1AAD 2002-12-04
Hash=0D813D1D613F8058F95BA752CDBE205B
Fingerprint=BB83 A8B6 61A1 F4F2 E58A 35FA 1F72 4DC6 A73A 1AAD

uid The FBI <wanted10@fbi.gov>
sig sig3 A73A1AAD 2002-12-04 __________ 2007-12-03 [selfsig]

uid The FBI <warnings10@fbi.gov>
sig sig3 A73A1AAD 2002-12-04 __________ 2007-12-03 [selfsig]

uid The Federal Bureau of Investigation (The FBI, Washington) <warnings10@fbi.gov>
sig sig3 A73A1AAD 2002-12-04 __________ 2007-12-03 [selfsig]

sub 1024D/83EE7429 2002-12-04
sig sbind A73A1AAD 2002-12-04 __________ 2007-12-03 []

sub 2048g/7947678C 2002-12-04
sig sbind A73A1AAD 2002-12-04 __________ 2007-12-03 []
pub 1024D/1B30CB6C 2002-12-04
Hash=CFA18689FA46843F497B0C94DC606F17
Fingerprint=336D 6B1F 9B37 9A2C DD20 0036 B8F9 3B54 1B30 CB6C

uid The Federal Bureau of Investigation (The FBI Washington) <warnings10@fbi.gov>
sig sig3 1B30CB6C 2002-12-04 __________ 2005-12-03 [selfsig]

sub 2048g/E959B27D 2002-12-04
sig sbind 1B30CB6C 2002-12-04 __________ 2005-12-03 []
pub 1024D/E5447C9C 2002-10-29
Hash=C4F03F320A81508A958240A14E75F429
Fingerprint=3911 DD49 7CD5 FB33 D59A CF80 4960 C2D8 E544 7C9C

uid Gwen Dove <gdove.cart@fbi.gov>
sig sig E5447C9C 2002-10-29 __________ __________ [selfsig]

sub 2048g/4AE48F9F 2002-10-29
sig sbind E5447C9C 2002-10-29 __________ __________ []
pub 1024D/A982E990 2002-07-25
Hash=A63545FFF0A3A7FE35BAFAE43607CE8B
Fingerprint=C112 0899 DE00 6FA4 48BD 78A2 C8FE B8FA A982 E990

uid Tyrone Durham <tdurham@fbi.gov>
sig sig A982E990 2002-07-25 __________ __________ [selfsig]

sub 2048g/FFFFC723 2002-07-25
sig sbind A982E990 2002-07-25 __________ __________ []
pub 1024D/13F28757 2002-07-14
Hash=E6DFA60F26A5C64572C6B6E9551379B7
Fingerprint=B8D8 4F59 0FFE A829 2790 A1FC 4A3E E9C4 13F2 8757

uid Tyrone Durham <tdurham@fbi.gov>
sig sig 13F28757 2002-07-14 __________ __________ [selfsig]

sub 2048g/0B3B3649 2002-07-14
sig sbind 13F28757 2002-07-14 __________ __________ []
pub 1024D/39C773FA 2002-04-28
Hash=91E846FCA158056DE9FA044454A414B1
Fingerprint=A888 9243 F029 00D6 9D21 EC47 BCFB 3B4D 39C7 73FA

uid Sels Roger <root@gov-fbi.net>
sig sig3 39C773FA 2002-04-28 __________ __________ [selfsig]

sub 2048g/03833FC2 2002-04-28
sig sbind 39C773FA 2002-04-28 __________ __________ []
pub 1024D/FB553A0F 2002-04-27
Hash=77726EF455CBBF672EE3C2AE06FD6D96
Fingerprint=1DF1 6C64 4CFA 35DC 23D3 0807 8498 6294 FB55 3A0F

uid John Ashcroft <jashcroft@fbi.gov>
sig sig FB553A0F 2002-04-27 __________ __________ [selfsig]

sub 2048g/62595DA9 2002-04-27
sig sbind FB553A0F 2002-04-27 __________ __________ []
pub 1024D/B2E893E5 2002-02-10
Hash=4540751A4D0157590DF65A27E886A8CC
Fingerprint=AAAA F0A1 121A 1A48 52AB 11EC D762 F026 B2E8 93E5

uid Horner, Harley <hhorner@fbi.gov>
sig sig B2E893E5 2002-02-10 __________ __________ [selfsig]

sub 2048g/3ADC9276 2002-02-10
sig sbind B2E893E5 2002-02-10 __________ __________ []
pub 1024D/C8BAD9D9 2001-12-07
Hash=094E7EA661C8D2463914E88462726A15
Fingerprint=3C79 80E1 99C6 BB43 20AF AECF DB37 00A4 C8BA D9D9

uid Wolfenden, FBI, Tampa Divn, 813.253.1207 <lawrence.wolfenden@ic.fbi.gov>
sig sig C8BAD9D9 2006-04-27 __________ __________ [selfsig]
sig sig C8BAD9D9 2008-05-07 __________ __________ [selfsig]
sig exp CA57AD7C 2008-05-09 2008-05-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-04-23 2009-05-07 __________ PGP Global Directory Verification Key
sig sig C8BAD9D9 2009-05-04 __________ __________ [selfsig]
sig exp CA57AD7C 2009-06-13 2009-06-27 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-06-27 2009-07-11 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-10 2009-07-24 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-07-24 2009-08-07 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2009-08-06 2009-08-20 __________ PGP Global Directory Verification Key
sig sig C8BAD9D9 2010-04-24 __________ __________ [selfsig]
sig exp CA57AD7C 2010-04-24 2010-05-08 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-05-08 2010-05-22 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-05-21 2010-06-04 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-06-03 2010-06-17 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-06-17 2010-07-01 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-06-30 2010-07-14 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-07-13 2010-07-27 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-07-27 2010-08-10 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-08-09 2010-08-23 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-08-22 2010-09-05 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-09-04 2010-09-18 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-09-18 2010-10-02 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-10-01 2010-10-15 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2010-10-14 2010-10-28 __________ PGP Global Directory Verification Key

uid SA Lawrence A. Wolfenden <lwolfend@leo.gov>
sig sig C8BAD9D9 2006-04-27 __________ __________ [selfsig]

sub 4096g/599819E9 2001-12-07
sig sbind C8BAD9D9 2001-12-07 __________ __________ []
pub 1024D/E5AEE751 2001-12-03
Hash=A8EB98F51A7230989A4B72EE96E54246
Fingerprint=B35D 8A06 3485 F9F2 5C28 51C9 C3CB A884 E5AE E751

uid Jim Hegarty <jhegarty@fbi.gov>
sig sig E5AEE751 2001-12-03 __________ __________ [selfsig]

sub 2048g/4CFFC017 2001-12-03
sig sbind E5AEE751 2001-12-03 __________ __________ []
sig sbind E5AEE751 2001-12-03 __________ 2002-12-31 []

sub 2048g/D4F86CBD 2001-12-03
sig sbind E5AEE751 2001-12-03 __________ __________ []
pub 1024D/41A34D1D 2001-11-11
Hash=EE66749FF7F4B33283AFFAA38879BF48
Fingerprint=C997 8DE4 E2F7 2A47 6B02 7E76 D140 37D4 41A3 4D1D

uid Popadiyski Petko (az sam fbi admin) <admin@fbi.gov>
sig sig3 41A34D1D 2001-11-11 __________ __________ [selfsig]

sub 1024g/35E9D98F 2001-11-11
sig sbind 41A34D1D 2001-11-11 __________ __________ []
pub 1024D/4D6ACE07 2001-09-05
Hash=3EF82897A5093A15AE0849C2C82A0494
Fingerprint=3E2B 97C2 1854 158B 6F9D 7273 98AC 60AF 4D6A CE07

uid IBM T20 <jchesson@fbi.gov>
sig sig 4D6ACE07 2001-09-05 __________ __________ [selfsig]

uid John B. Chesson <jchesson@fbi.gov>
sig sig 4D6ACE07 2002-01-11 __________ __________ [selfsig]

sub 2048g/CF9D71A2 2001-09-05
sig sbind 4D6ACE07 2001-09-05 __________ __________ []
pub 1024D/482C3AA0 2001-08-20
Hash=4F5DD6BE3228D1C0499D605365B88C6C
Fingerprint=FCA7 4CCC FC41 00D4 2DEA E467 6D4C 0411 482C 3AA0

uid NIPC Watch & Warning Unit <nipc.watch@fbi.gov>
sig sig 482C3AA0 2001-08-20 __________ __________ [selfsig]
sig sig 2AD74EF4 2003-08-13 __________ __________ John A. Klein <secure@corptech.net>

sub 2048g/6A68044D 2001-08-20
sig sbind 482C3AA0 2001-08-20 __________ __________ []
pub 1024D/CA5A8E73 2001-08-20
Hash=52B7CDA55BFC0CE1E0CC463D259B20A5
Fingerprint=E9F2 8A37 98B2 F686 59D8 E170 BB58 905E CA5A 8E73

uid NIPC Watch & Warning Unit <nipc.watch@fbi.gov>
sig sig CA5A8E73 2001-08-20 __________ __________ [selfsig]

sub 2048g/3912B6AC 2001-08-20
sig sbind CA5A8E73 2001-08-20 __________ __________ []
pub 1024D/48CDB580 2001-06-26
Hash=AF2E7A091A07FB5B4D2DA99C136AEDCB
Fingerprint=5202 64DF 4A51 873D 461E E4F3 9717 E55E 48CD B580

uid James D Barnett <cart1@fbi.gov>
sig sig 48CDB580 2001-06-26 __________ __________ [selfsig]

sub 2048g/AD161D37 2001-06-26
sig sbind 48CDB580 2001-06-26 __________ __________ []
pub 1024D/D4C43B70 2001-06-11
Hash=945D4FB97FFE5B35C703432F1E631D8E
Fingerprint=2532 7E7B 4753 0CCD ADFE AF06 941C A55E D4C4 3B70

uid Agent Tekniqz <agent.tek@fbi.gov>
sig sig D4C43B70 2001-06-11 __________ __________ [selfsig]

sub 2048g/B8079486 2001-06-11
sig sbind D4C43B70 2001-06-11 __________ __________ []
pub 1024D/44539744 2001-05-17
Hash=72A67E8635FA412A7898E38C4675852A
Fingerprint=A716 D73C F368 C5CA 811D A32E B6EF 7E01 4453 9744

uid Jaime K. Carothers <jcarothers@fbi.gov>
sig sig 44539744 2001-05-17 __________ __________ [selfsig]

sub 2048g/B814342B 2001-05-17
sig sbind 44539744 2001-05-17 __________ __________ []
pub 1024D/359DCEF4 2001-05-17
Hash=8F89460F8286D85CADC8A11D2B5523C5
Fingerprint=AD7F FB1B A385 590B E686 75C8 9857 9AAB 359D CEF4

uid InfraGard <infragard-ce@fbi.gov>
sig sig 359DCEF4 2001-05-17 __________ __________ [selfsig]
sig sig 2AD74EF4 2003-08-13 __________ __________ John A. Klein <secure@corptech.net>

sub 2048g/80E295B6 2001-05-17
sig sbind 359DCEF4 2001-05-17 __________ __________ []
pub 1024D/ACC5AF73 2001-05-11
Hash=76F4691F397FBE93A33CD49D3F1984CB
Fingerprint=D385 B14F B204 7A68 D576 C4E2 2D96 A262 ACC5 AF73

uid NIPC Watch & Warning Unit <nipc.watch@fbi.gov>
sig sig ACC5AF73 2001-05-11 __________ __________ [selfsig]

sub 4096g/89419971 2001-05-11
sig sbind ACC5AF73 2001-05-11 __________ __________ []
pub 1024D/8E0526C5 2001-04-26
Hash=30B8A58632A26C4389D56E5891714499
Fingerprint=AB47 0895 4E77 C122 B6A8 576F BC70 5551 8E05 26C5

uid special agent scully <scully@fbi.gov>
sig sig 8E0526C5 2001-04-26 __________ __________ [selfsig]

sub 2048g/019E7544 2001-04-26
sig sbind 8E0526C5 2001-04-26 __________ __________ []
pub 2048R/0AEA78D3 2001-04-06 __________
Hash=CEBB502B4BDBB3B357A8A97D6C509DE0
Fingerprint=36 DE 73 98 C2 F1 04 B1 04 47 F2 7B 71 B0 22 44

uid SA Vanessa Bearden <vbearden@fbi.gov>
sig sig 0AEA78D3 2001-04-06 __________ __________ [selfsig]
pub 1024D/1B9DA05C 2001-03-13
Hash=A49E6213ECDE7758D6F566A51CDC0950
Fingerprint=BD63 0A73 91E7 D6EC 0EE6 168B 5037 8E54 1B9D A05C

uid Darren Mott <dmott@fbi.gov>
sig sig 1B9DA05C 2001-03-13 __________ __________ [selfsig]

sub 3072g/E91D11DC 2001-03-13
sig sbind 1B9DA05C 2001-03-13 __________ __________ []
pub 1024D/06314A29 2001-03-03
Hash=D6A0AA9F13514EE24D59EDAF5B42EBD9
Fingerprint=6BEE C3E6 38F8 AEA1 7B28 6CE1 099C 7D33 0631 4A29

uid Christopher F. Wilk <cfwilk@fbi.gov>
sig sig 06314A29 2001-03-03 __________ __________ [selfsig]

sub 2048g/8962C4AA 2001-03-03
sig sbind 06314A29 2001-03-03 __________ __________ []
pub 1024D/271D0A91 2001-03-02
Hash=50F54AEE5505A77E3ED863E81A78D77F
Fingerprint=47E0 D1B8 18E3 6055 CED9 3354 96C2 7B9F 271D 0A91

uid William P. Shore <billshore@fbi.gov>
sig sig 271D0A91 2001-03-02 __________ 2002-03-02 [selfsig]

sub 2048g/0E0FA37E 2001-03-02
sig sbind 271D0A91 2001-03-02 __________ 2002-03-02 []
pub 1024D/5386C2CE 2001-02-07
Hash=6711A868B0B4F58ED1D7FA418D29B1B8
Fingerprint=4F18 D610 58FA 0350 3346 2C5D 73B2 DC2B 5386 C2CE

uid Vincent Rowe <vrowe@fbi.gov>
sig sig 5386C2CE 2001-02-07 __________ __________ [selfsig]

sub 2048g/3E8077BF 2001-02-07
sig sbind 5386C2CE 2001-02-07 __________ __________ []
pub 1024D/A5C8E2B5 2001-02-07
Hash=E110C9FADEB2C9B73C2605D8FED340C7
Fingerprint=F905 833C E8FE 96D7 BE51 62EB A000 A0AE A5C8 E2B5

uid Jeffrey A. Tricoli <jtricoli@fbi.gov>
sig sig A5C8E2B5 2001-02-07 __________ __________ [selfsig]

sub 2048g/3CFF0B67 2001-02-07
sig sbind A5C8E2B5 2001-02-07 __________ __________ []
pub 1024D/F456F3A3 2000-10-02
Hash=2E37FED71319849682E704CC6FF00741
Fingerprint=F8E3 1E26 34F5 90D7 D9B9 2D8C 4F21 8E45 F456 F3A3

uid Roger Sels <root@gov-fbi.net>
sig sig F456F3A3 2000-10-02 __________ __________ [selfsig]

sub 3072g/A267CCD4 2000-10-02
sig sbind F456F3A3 2000-10-02 __________ __________ []
pub 1024D/D091E3A8 2000-06-23
Hash=6392672AE33BD6ABF25DC48318C58D5C
Fingerprint=F342 874C A27C 1B60 ED36 6600 6C58 EFE1 D091 E3A8

uid David P Morgan <dmorgan@fbi.gov>
sig sig D091E3A8 2000-06-23 __________ __________ [selfsig]

uid Thawte Freemail Member <dmorgan@fbi.gov>
sig sig DE46F54F 2000-06-23 __________ __________ Personal Freemail RSA 1999.9.16

sub 2048g/D693FCAD 2000-06-23
sig sbind D091E3A8 2000-06-23 __________ __________ []
pub 1024D/1160616D 2000-06-19
Hash=49108B55D222362A252F7FC3F3DB698F
Fingerprint=C2A3 F5C4 CDF3 314B 049F 1F8E 8431 787D 1160 616D

uid FBI Bomb Data Center <bdc@fbi.gov>
sig sig 1160616D 2000-06-19 __________ 2000-12-31 [selfsig]
sig exp BA292258 2000-06-20 2001-01-01 __________ Michael Fanning <mfanning@ix.netcom.com>

sub 2048g/B3F79122 2000-06-19
sig sbind 1160616D 2000-06-19 __________ 2000-12-31 []
pub 2048R/CB6C27D3 2000-05-23 __________
Hash=7DB41EA0AB061C5F6DE381936675AF1D
Fingerprint=8D 56 9F 52 D0 20 98 EF 71 B2 00 59 F4 97 61 CD

uid Stephen Schmidt <steve@fbi.gov>
sig sig CB6C27D3 2000-05-23 __________ __________ [selfsig]
pub 1024D/18D31133 2000-05-23
Hash=0F12827071D9E09B3E5EC886C279AB35
Fingerprint=0E49 B86C 571A 23E8 C792 BB50 52DC CF98 18D3 1133

uid Stephen Schmidt <steve@fbi.gov>
sig sig 18D31133 2000-05-23 __________ __________ [selfsig]

sub 4096g/FC2079FB 2000-05-23
sig sbind 18D31133 2000-05-23 __________ __________ []
pub 1024D/2367848D 2000-03-29
Hash=37AEEBA8E4AF67700995A9274DD583B7
Fingerprint=C4F2 0EBF B6CF A4B9 9514 1F8B DFCB 3A48 2367 848D

uid Angelique Thies <angelique.thies@fbi.gov>
sig sig 2367848D 2000-03-29 __________ __________ [selfsig]

sub 2048g/70371E3A 2000-03-29
sig sbind 2367848D 2000-03-29 __________ __________ []
pub 1024D/19A5EC48 2000-03-14
Hash=C2EF3E9574B1E73051A56170B3B6EDCD
Fingerprint=442C E47C EFE8 64BC F260 C160 4658 D9B3 19A5 EC48

uid J. Edgar Hoover <auntie@fbi.gov>
sig sig 19A5EC48 2000-03-14 __________ __________ [selfsig]

sub 1024g/EF7F4DF7 2000-03-14
sig sbind 19A5EC48 2000-03-14 __________ __________ []
pub 1024D/5ADD12C5 2000-02-28
Hash=DBF80015325A05EFC88D2C803602239C
Fingerprint=EB83 DBB2 1742 B143 E1A2 A608 DC10 22F9 5ADD 12C5

uid Thomas X. Grasso, Jr. <txgrasso@fbi.gov>
sig sig 5ADD12C5 2000-02-28 __________ __________ [selfsig]
sig sig 57794E32 2005-05-17 __________ __________ J. Keith Mularski <j.mularski@ic.fbi.gov>
sig sig 5ADD12C5 2007-09-06 __________ __________ [selfsig]
sig exp CA57AD7C 2008-02-24 2008-03-09 __________ PGP Global Directory Verification Key

uid Thomas X. Grasso, Jr. <tom@ncfta.net>
sig sig 5ADD12C5 2006-09-12 __________ __________ [selfsig]
sig sig 5ADD12C5 2007-09-06 __________ __________ [selfsig]
sig exp CA57AD7C 2008-08-23 2008-09-06 __________ PGP Global Directory Verification Key

uid Tom Grasso <thomas.x.grasso@ugov.gov>
sig sig 5ADD12C5 2009-04-14 __________ __________ [selfsig]

uid Thomas X. Grasso, Jr. <tgrasso@ncfta.net>
sig sig 5ADD12C5 2007-09-06 __________ __________ [selfsig]

uid Thomas X. Grasso, Jr. <tom@cyber-response.org>
sig sig 5ADD12C5 2006-02-02 __________ __________ [selfsig]
sig sig 5ADD12C5 2007-09-06 __________ __________ [selfsig]
sig exp CA57AD7C 2008-08-23 2008-09-06 __________ PGP Global Directory Verification Key

uid Thomas Grasso (Alias) <thomas.x.grasso@ugov.gov>
sig sig 5ADD12C5 2009-05-26 __________ __________ [selfsig]

uid Thomas X. Grasso, Jr. <thomas.grasso@ic.fbi.gov>
sig sig 5ADD12C5 2006-02-02 __________ __________ [selfsig]
sig sig 5ADD12C5 2007-09-06 __________ __________ [selfsig]
sig exp CA57AD7C 2008-02-24 2008-03-09 __________ PGP Global Directory Verification Key

uid Microsoft Office Outlook <thomas.x.grasso@ugov.gov>
sig sig 5ADD12C5 2009-06-17 __________ __________ [selfsig]

sub 2048g/8D049C62 2000-02-28
sig sbind 5ADD12C5 2000-02-28 __________ __________ []
pub 1024D/DC70B9C4 2000-02-16
Hash=C89F5325461AF5D1ABFC8A7E1A7212DB
Fingerprint=8BBE F254 C775 0451 7F86 19F8 2C14 8BDC DC70 B9C4

uid Special Agent Shane A. Sims <ssims@fbi.gov>
sig sig DC70B9C4 2000-02-16 __________ __________ [selfsig]

sub 2048g/D68FAB6B 2000-02-16
sig sbind DC70B9C4 2000-02-16 __________ __________ []
pub 1024D/EA619249 2000-01-19
Hash=FC5DD62D5AF0BE4625C9E0EE55182D28
Fingerprint=2E58 1633 7976 D3FD 309A D130 5286 EAE5 EA61 9249

uid William P. Shore <billshore@fbi.gov>
sig sig EA619249 2000-01-19 __________ __________ [selfsig]

sub 2048g/640E503D 2000-01-19
sig sbind EA619249 2000-01-19 __________ __________ []
pub 1024D/BB7B1AEA 2000-01-04
Hash=988415AEA491B0BF45CE8D920A9DDC30
Fingerprint=DF82 DF4C C8EC EDD9 9BC8 5111 3ACE AEAF BB7B 1AEA

uid Scott W Tousley <swtousley.nipc@fbi.gov>
sig sig BB7B1AEA 2000-01-04 __________ __________ [selfsig]

sub 2048g/4A9DE27E 2000-01-04
sig sbind BB7B1AEA 2000-01-04 __________ __________ []
pub 1024D/1B48B5FF 1999-12-23
Hash=A0C77D6192F5D929C8BF8E8967CAA5B8
Fingerprint=B33A 11D1 1DE7 9F1E 6201 AA92 B8BD A1DE 1B48 B5FF

uid lawrence robinson <fbi.gov>
sig sig 1B48B5FF 1999-12-23 __________ __________ [selfsig]

sub 2048g/75DDA15C 1999-12-23
sig sbind 1B48B5FF 1999-12-23 __________ __________ []
pub 1024D/47FF8CB2 1999-08-26
Hash=F1AE2D95015D275B52DA17BE04D74837
Fingerprint=0B50 739F DAFF 92F2 0B0F C9AF E4F8 A88B 47FF 8CB2

uid Bruce Barron <barron@fbi.gov>
sig sig 47FF8CB2 1999-08-26 __________ __________ [selfsig]

sub 2048g/13CEC945 1999-08-26
sig sbind 47FF8CB2 1999-08-26 __________ __________ []
pub 1024D/2EB44C97 1999-07-27
Hash=06D902F20E4134AFA4EB18253A826F67
Fingerprint=125C 49BC E7F0 61C8 B807 789D A36F 3A5F 2EB4 4C97

uid Robert S. Crisalli <rcrisalli@fbi.gov>
sig sig 2EB44C97 1999-07-27 __________ __________ [selfsig]

sub 2048g/9B3AB2BD 1999-07-27
sig sbind 2EB44C97 1999-07-27 __________ __________ []
pub 1024D/412B8092 1999-04-25
Hash=CACC20C2BB1BE5A335AB0EA1CDFC7AB9
Fingerprint=461E 0726 893F C800 381F 18FF CF86 6E81 412B 8092

uid Federal Bureau of Investigation <server@fbi.gov>
sig sig 412B8092 1999-04-25 __________ 2000-01-01 [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 4096g/705FACC1 1999-04-25
sig sbind 412B8092 1999-04-25 __________ 2000-01-01 []
pub 1024D/BF9A904C 1999-04-12
Hash=950A6973AAE1ACCB0DE14578F2E70B29
Fingerprint=A858 7986 7F31 55D4 9876 FE9C 7EDF DFDC BF9A 904C

uid Kenneth Grassi <kgrassi@fbi.gov>
sig sig BF9A904C 1999-04-12 __________ __________ [selfsig]

sub 2048g/3328A4AD 1999-04-12
sig sbind BF9A904C 1999-04-12 __________ __________ []
pub 1024D/8FF4DD32 1999-04-05
Hash=81FFB92AE7D57DBD0E7C7CD71E2CC940
Fingerprint=FD23 6E4F 542D E128 CB3C 5875 D29B E6B8 8FF4 DD32

uid NIPC Watch <nipc.watch@fbi.gov>
sig sig 8FF4DD32 1999-04-05 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>
sig sig 2AD74EF4 2003-08-13 __________ __________ John A. Klein <secure@corptech.net>

sub 2048g/6BD1E7F7 1999-04-05
sig sbind 8FF4DD32 1999-04-05 __________ __________ []
pub 1024D/86821EDD 1999-03-30
Hash=9B58D0CD9C2A83F67EA8B7F6091536BD
Fingerprint=475B 815F 3B51 4253 D4C6 7AE3 F182 BB3F 8682 1EDD

uid Scott W Tousley <swtousley.nipc@fbi.gov>
sig sig 86821EDD 1999-03-30 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/1E12C7BA 1999-03-30
sig sbind 86821EDD 1999-03-30 __________ __________ []
pub 1024D/71FEA7A4 1999-02-04
Hash=5CAABE9669A514E2C7B19E64A44349F1
Fingerprint=559B 2C17 9424 A192 B4B7 1CF0 AB22 FFD3 71FE A7A4

uid Lamoyne J. Farr <ljfarr.iitf@fbi.gov>
sig sig 71FEA7A4 1999-02-04 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/8C1887AE 1999-02-04
sig sbind 71FEA7A4 1999-02-04 __________ __________ []
pub 1024D/E7D576C1 1998-12-17
Hash=377470D1E0600D2E6487F17280468E1E
Fingerprint=0E19 96DF 6B77 31C9 705D 953D 70E1 9BF1 E7D5 76C1

uid Julius Caeser <informer@FBI.gov>
sig sig E7D576C1 1998-12-17 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/39E78453 1998-12-17
sig sbind E7D576C1 1998-12-17 __________ __________ []
pub 1024D/18175071 1998-12-13
Hash=75D86EC870CB7689E1ADE1DDDD5E950E
Fingerprint=1455 E711 6D0B E2B6 209F 1BF4 8DA3 CA3C 1817 5071

uid Joseph Bross <jbross@fbi.gov>
sig sig 18175071 1998-12-13 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/01AE8B49 1998-12-13
sig sbind 18175071 1998-12-13 __________ __________ []
pub 1024D/E322EFDC 1998-11-13
Hash=8D52528A50730C58B8CE33FCC4F33EDD
Fingerprint=0FAF 63FD D633 1572 1D16 FB71 2003 2D32 E322 EFDC

uid Kathleen McChesney <kmcchesney@fbi.gov>
sig sig E322EFDC 1998-11-13 __________ __________ [selfsig]

sub 2048g/E0BB899A 1998-11-13
sig sbind E322EFDC 1998-11-13 __________ __________ []
pub 1024D/8F10F2C2 1998-10-20
Hash=2960C2A6A5B407A69827E6886E6404F4
Fingerprint=79AF 5332 A9E3 049E C49D BF5C 1699 FC64 8F10 F2C2

uid Tim McKnight <sq9.ph@fbi.gov>
sig sig 8F10F2C2 1998-10-20 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 3072g/D3178C93 1998-10-20
sig sbind 8F10F2C2 1998-10-20 __________ __________ []
pub 1024D/09494326 1998-08-27
Hash=C3D99C755F3B430FC5623E7E67582836
Fingerprint=7ADF EA6C 0931 67AB 5553 86B0 1C65 FE4F 0949 4326

uid SA Kirk J. Striebich <kstriebich.iitf@fbi.gov>
sig sig 09494326 1998-08-27 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/30D8ABD4 1998-08-27
sig sbind 09494326 1998-08-27 __________ __________ []
pub 1024D/AB39E0EB 1998-08-03
Hash=057FE0808E81154FE1A0E8DA8DE97682
Fingerprint=4B83 881C 3A05 D564 777F F4E6 9A55 1F16 AB39 E0EB

uid David B Davies <labspu@fbi.gov>
sig sig AB39E0EB 1998-08-03 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/00A2C86E 1998-08-03
sig sbind AB39E0EB 1998-08-03 __________ __________ []
pub 1024D/FBBDDD2F 1998-04-29
Hash=4E62712B5679FA4189EFFEA5EDBE7B0C
Fingerprint=554C 8B44 6AB1 69D5 9DD2 3A1D BF19 2135 FBBD DD2F

uid Newark <newark@fbi.gov>
sig sig FBBDDD2F 1998-04-29 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 3072g/C3FE443E 1998-04-29
sig sbind FBBDDD2F 1998-04-29 __________ __________ []
pub 1024D/7E1ACABB 1998-04-20
Hash=0CA862FDCBD349D58F16DE28347819C1
Fingerprint=38C4 2564 01A5 AEEF 7168 2781 2B5C 39B0 7E1A CABB

uid FBI Newark Division <newark@fbi.gov>
sig sig 7E1ACABB 1998-04-20 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 3072g/D827ACE6 1998-04-20
sig sbind 7E1ACABB 1998-04-20 __________ __________ []
pub 1024D/A70B56BC 1998-04-19
Hash=1E0793B3CFB4D4987D064F792459195B
Fingerprint=7153 EFFC FEA6 043D FAE5 E191 06AE 6ACA A70B 56BC

uid Hoover <hoover@fbi.gov>
sig sig A70B56BC 1998-04-19 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/40CBAC3B 1998-04-19
sig sbind A70B56BC 1998-04-19 __________ __________ []
pub 1024D/73D54753 1998-04-01
Hash=A1D118C1A8986ED38432B6689DD69AF3
Fingerprint=AF3A 1649 AA90 E73C C080 8B03 36A4 29F6 73D5 4753

uid xzv <pimp@fbi.gov>
sig sig 73D54753 1998-04-01 __________ 1998-04-03 [selfsig]

sub 3072g/F84C7162 1998-04-01
sig sbind 73D54753 1998-04-01 __________ 1998-04-03 []
pub 1024D/422696D6 1998-02-07
Hash=4ACD01ECE3B04A09C84D202C3F6618BD
Fingerprint=27FC 96B1 2F3A 541D DAE5 089D 14CB 8BC5 4226 96D6

uid James Morrison <jmorrison@fbi.gov>
sig sig 422696D6 1998-02-07 __________ __________ [selfsig]

sub 2048g/EBB56B9A 1998-02-07
sig sbind 422696D6 1998-02-07 __________ __________ []
pub 1024D/209FA604 1998-01-20
Hash=334625694453A9AA8A6D5FBF8734074B
Fingerprint=99B8 C46F 71AD 90E6 09FE BB7F 058A 80E2 209F A604

uid Dennis V Hughes <dhughes@fbi.gov>
sig sig 209FA604 1998-01-20 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 2048g/BCD42301 1998-01-20
sig sbind 209FA604 1998-01-20 __________ __________ []
pub 1024D/E299B7D4 1997-11-09
Hash=024CA386DD69056953D04F47770185E4
Fingerprint=6438 B18B 7F97 CEAE 057A 384F C742 3B3B E299 B7D4

uid Government <newark@fbi.gov>
sig sig E299B7D4 1997-11-09 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 3072g/92EF6986 1997-11-09
sig sbind E299B7D4 1997-11-09 __________ __________ []
pub 1024D/BD113717 1997-09-19
Hash=FC0C614516FEBF9446920AB6AD3F1A8C
Fingerprint=3DA6 A0AC 6D58 FEC4 0233 5906 ACDB C937 BD11 3717

uid Paul W. Frields <stickster@gmail.com>
sig sig3 BD113717 2005-03-01 __________ __________ [selfsig]
sig sig3 BD113717 2005-04-08 __________ __________ [selfsig]
sig sig3 BD113717 2005-07-18 __________ __________ [selfsig]
sig sig3 92F0FC09 2007-02-03 __________ __________ Matt Domsch <matt@domsch.com>
sig sig D6995CFF 2007-02-11 __________ __________ Lukáš Petrovický <lukas@petrovicky.net>
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig F6296DEB 2007-02-20 __________ __________ Andy Grimm (Ingres Corporation) <andy.grimm@ingres.com>
sig sig 810CC15E 2007-02-24 __________ __________ Brian Pepple <bpepple@fedoraproject.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig 99B1F444 2008-01-13 __________ __________ G. Wolfe Woodbury <ggw@wolves.durham.nc.us>
sig sig B05A59F7 2008-01-13 __________ __________ Dennis Gilmore <dennis@ausil.us>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-08-31 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig3 BD113717 2008-10-18 __________ __________ [selfsig]
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig 8B670B7A 2009-01-10 __________ __________ Jared Smith <jaredsmith@jaredsmith.net>
sig sig 49BB5886 2009-01-11 __________ __________ Charles R. Anderson <cra@wpi.edu>
sig sig 8E00706D 2009-01-11 __________ __________ William D. Cattey (Bill the CATT…) <wdc@mit.edu>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 5B7CBD2B 2012-01-17 __________ __________ R P Herrold (herrold centos email key) <herrold@centos.org>
sig sig 31D9FC7A 2012-03-30 __________ __________ Jonathan Nalley <jnalley@jnalley.com>
sig sig 317B3662 2012-06-20 __________ __________ Jonathan Nalley <jnalley@jnalley.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <pfrields@fbi.gov>
sig sig BD113717 2001-11-30 __________ __________ [selfsig]
sig sig BD113717 2003-05-15 __________ __________ [selfsig]
sig sig BD113717 2005-04-08 __________ __________ [selfsig]
sig sig3 BD113717 2005-07-18 __________ __________ [selfsig]
sig sig3 92F0FC09 2007-02-03 __________ __________ Matt Domsch <matt@domsch.com>
sig sig3 92F0FC09 2007-02-03 __________ __________ Matt Domsch <matt@domsch.com>
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig F6296DEB 2007-02-20 __________ __________ Andy Grimm (Ingres Corporation) <andy.grimm@ingres.com>
sig sig 810CC15E 2007-02-24 __________ __________ Brian Pepple <bpepple@fedoraproject.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-08-31 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <paul@frields.com>
sig sig3 BD113717 2002-09-20 __________ __________ [selfsig]
sig sig3 BD113717 2002-09-20 __________ __________ [selfsig]
sig sig3 BD113717 2003-05-15 __________ __________ [selfsig]
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig3 BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-08-31 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <paul@frields.org>
sig sig3 BD113717 2003-08-12 __________ __________ [selfsig]
sig sig3 BD113717 2003-10-14 __________ __________ [selfsig]
sig sig3 BD113717 2005-03-03 __________ __________ [selfsig]
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig3 BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 5B7CBD2B 2012-01-17 __________ __________ R P Herrold (herrold centos email key) <herrold@centos.org>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <stickstr@cox.net>
sig sig BD113717 2002-05-24 __________ __________ [selfsig]
sig sig3 92F0FC09 2007-02-03 __________ __________ Matt Domsch <matt@domsch.com>
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig F6296DEB 2007-02-20 __________ __________ Andy Grimm (Ingres Corporation) <andy.grimm@ingres.com>
sig sig 810CC15E 2007-02-24 __________ __________ Brian Pepple <bpepple@fedoraproject.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig B05A59F7 2008-01-13 __________ __________ Dennis Gilmore <dennis@ausil.us>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <pfrields@redhat.com>
sig sig3 BD113717 2008-02-05 __________ __________ [selfsig]
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig3 BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig 9E27A196 2008-08-19 __________ __________ Norman Smith <bogwan@bellsouth.net>
sig sig3 5A17CF21 2008-08-27 __________ __________ Max Spevack <max@spevack.org>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 9B636B8C 2008-09-01 __________ __________ Scott Paul Robertson <spr@scottr.org>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig 62A2258E 2008-09-01 __________ __________ Clint Savage <herlo1@gmail.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig 8B670B7A 2008-10-18 __________ __________ Jared Smith <jaredsmith@jaredsmith.net>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 5B7CBD2B 2012-01-17 __________ __________ R P Herrold (herrold centos email key) <herrold@centos.org>
sig sig 317B3662 2012-06-20 __________ __________ Jonathan Nalley <jnalley@jnalley.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <stickstr5@hotmail.com>
sig sig BD113717 2001-11-30 __________ __________ [selfsig]
sig sig BD113717 2001-11-30 __________ __________ [selfsig]
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <pwfrields.cart@fbi.gov>
sig sig BD113717 2001-11-30 __________ __________ [selfsig]
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <Paul.Frields@ic.fbi.gov>
sig sig3 BD113717 2005-04-27 __________ __________ [selfsig]
sig sig3 92F0FC09 2007-02-03 __________ __________ Matt Domsch <matt@domsch.com>
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig F6296DEB 2007-02-20 __________ __________ Andy Grimm (Ingres Corporation) <andy.grimm@ingres.com>
sig sig 810CC15E 2007-02-24 __________ __________ Brian Pepple <bpepple@fedoraproject.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig3 BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <stickstr@cyberrealm.net>
sig sig BD113717 1997-09-19 __________ __________ [selfsig]
sig sig BD113717 1997-09-19 __________ __________ [selfsig]
sig sig 59678001 1997-09-19 __________ __________ Paul W. Frields <pfrields@fbi.gov>
sig sig 48A1D4A9 1997-09-22 __________ __________ Brent Tucker <BTucker@Teleport.com>
sig sig 59E3466A 1997-10-09 __________ __________ Christopher A. Suleske <room101@ix.netcom.com>
sig sig 80D4BBBB 1997-10-18 __________ __________ John J. Irvine <john@boo.net>
sig sig 7B5B705F 1998-09-23 __________ __________ Christopher A. Suleske <room101@erols.com>
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig 2BF483DA 2008-08-31 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <stickstr@novacoxmail.com>
sig sig BD113717 2001-04-12 __________ __________ [selfsig]
sig sig 5A17CF21 2007-02-15 __________ __________ Max Spevack <max@spevack.org>
sig sig2 434ECFE1 2007-03-02 __________ __________ Luya Tshimbalanga (Fedora Ambassador of Vancouver, BC, Canada) <luya@fedoraproject.org>
sig sig F33128B9 2008-01-27 __________ __________ Gerold Kassube <gerold@lugd.org>
sig sig 2E3F0935 2008-02-16 __________ __________ Yaakov Nemoy <loupgaroublond@gmail.com>
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig EF1C0078 2008-08-30 __________ __________ Jason Hall <jayce@lug-nut.com>
sig sig FF78DF62 2008-09-01 __________ __________ Trevor Sharpe (GPG Key) <tsharpe@xmission.com>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig2 0E8AE962 2008-11-25 __________ __________ []
sig sig2 E5ADA3BF 2008-11-25 __________ __________ Numien <numien@deathwyrm.com>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uid Paul W. Frields <pfrields@fedoraproject.org>
sig sig3 BD113717 2009-01-05 __________ __________ [selfsig]
sig sig3 92F0FC09 2009-01-11 __________ __________ Matt Domsch <matt@domsch.com>
sig sig 49BB5886 2009-01-11 __________ __________ Charles R. Anderson <cra@wpi.edu>
sig sig 8E00706D 2009-01-11 __________ __________ William D. Cattey (Bill the CATT…) <wdc@mit.edu>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 5B7CBD2B 2012-01-17 __________ __________ R P Herrold (herrold centos email key) <herrold@centos.org>
sig sig 31D9FC7A 2012-03-30 __________ __________ Jonathan Nalley <jnalley@jnalley.com>
sig sig 317B3662 2012-06-20 __________ __________ Jonathan Nalley <jnalley@jnalley.com>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

uat [contents omitted]
sig sig3 BD113717 2007-12-23 __________ __________ [selfsig]
sig sig3 E9BF653D 2008-03-26 __________ __________ Frank Ch. Eigler <fche@redhat.com>
sig sig3 BD113717 2008-04-04 __________ __________ [selfsig]
sig sig ECE16009 2008-06-19 __________ __________ George Hacker (GLS) <ghacker@redhat.com>
sig sig3 5A17CF21 2008-08-27 __________ __________ Max Spevack <max@spevack.org>
sig sig 2BF483DA 2008-09-06 __________ __________ William David Smith <undertakingyou@gmail.com>
sig sig3 92F0FC09 2009-01-11 __________ __________ Matt Domsch <matt@domsch.com>
sig sig 49BB5886 2009-01-11 __________ __________ Charles R. Anderson <cra@wpi.edu>
sig sig 8E00706D 2009-01-11 __________ __________ William D. Cattey (Bill the CATT…) <wdc@mit.edu>
sig sig BFA10974 2009-01-14 __________ __________ Susan Lauber <lauber_sm@mindspring.com>
sig sig B6724E04 2009-10-11 __________ __________ Christer Edwards <christer.edwards@gmail.com>
sig sig 5B7CBD2B 2012-01-17 __________ __________ R P Herrold (herrold centos email key) <herrold@centos.org>
sig sig 188C6D38 2013-01-20 __________ __________ Garrett Holmstrom <gholms@eucalyptus.com>
sig sig DF044293 2013-01-20 __________ __________ Garrett Holmstrom <garrett.holmstrom@gmail.com>
sig sig 110810E9 2013-03-06 __________ __________ Nicholas Edward Bebout
sig sig B2420431 2013-04-24 __________ __________ Chuck Frain <chuck@chuckfrain.net>

sub 4096g/46D87F1F 1997-09-19
sig sbind BD113717 1997-09-19 __________ __________ []
pub 1024D/100CFCAC 1997-09-19
Hash=E4B250FBC980534DD85CD510264D5F14
Fingerprint=EB0F 830F CC7A 8859 9BDE 86A2 962D 8E63 100C FCAC

uid Migel Gorbachev <migel@fbi.gov>
sig sig 100CFCAC 1997-09-19 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

sub 4096g/A59199DF 1997-09-19
sig sbind 100CFCAC 1997-09-19 __________ __________ []
pub 1024D/D615671E 1997-08-20
Hash=C7F6839C9C56EB6FF2C7FA0A29F0F3DA
Fingerprint=A891 013C E9AA EBCA FBB3 4F07 33B8 935B D615 671E

uid Dennis V. Hughes <dhugh@erols.com>
sig sig D615671E 1997-08-20 __________ __________ [selfsig]

uid Dennis V. Hughes <dhughes@fbi.gov>
sig sig D615671E 1997-08-20 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>

uid Dennis V. Hughes <DVHughes@aol.com>
sig sig D615671E 1997-08-20 __________ __________ [selfsig]

sub 2048g/2B622E2F 1997-08-20
sig sbind D615671E 1997-08-20 __________ __________ []
pub 512D/2453AE18 1997-07-24
Hash=642E3D7C1A02D326ADB17837257588E3
Fingerprint=BC1C 0BA5 D6EC 5F56 21A6 5584 D071 AD82 2453 AE18

uid Louis Freeh <freeh@fbi.gov>
sig sig 2453AE18 1997-07-24 __________ __________ [selfsig]
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>
sig sig BBBFB8E1 2003-02-20 __________ __________ Alex Chiang <alex@aki-dvd.com>

sub 512g/BCF46920 1997-07-24
sig sbind 2453AE18 1997-07-24 __________ __________ []
pub 2047R/2C0EF06F 1997-04-25 __________
sig revok 2C0EF06F 2001-03-28 __________ __________ [selfsig]
Hash=AA6CE098F1AA30516FF5E0893CD0F707
Fingerprint=F8 F7 82 5D C6 7B FF D7 7A 6D 8B 1B 00 B3 96 D2

uid Hector M. Pesquera <hmpesquera@fbi.gov>
sig sig 2C0EF06F 1997-04-25 __________ __________ [selfsig]

uid sDj
uYm7ZtuS12Vr2MsDOzEmY0iUuyvE7xgHU+
sig sig 2C0EF06F 1997-04-25 __________ __________ [selfsig]
pub 1024R/59678001 1996-09-27 __________
Hash=79FC162EE67D7DDC356F0E16E026878A
Fingerprint=11 4E 13 CD 5D 4B F8 F5 65 BB 6E 4C D9 33 2B AE

uid Paul W. Frields <pfrields@fbi.gov>
sig sig 59678001 2001-11-30 __________ __________ [selfsig]

uid Paul W. Frields <stickstr@cox.net>
sig sig 59678001 2002-05-24 __________ __________ [selfsig]

uid Paul W. Frields <stickstr5@hotmail.com>
sig sig 59678001 2001-04-12 __________ __________ [selfsig]

uid Paul W. Frields <pwfrields.cart@fbi.gov>
sig sig 59678001 2001-01-04 __________ __________ [selfsig]

uid Paul W. Frields <stickstr@ix.netcom.com>
sig sig BD113717 1997-11-19 __________ __________ Paul W. Frields <stickster@gmail.com>

uid Paul W. Frields <stickstr@cyberrealm.net>
sig sig BD113717 1997-11-19 __________ __________ Paul W. Frields <stickster@gmail.com>

uid Paul W. Frields <stickstr@novacoxmail.com>
sig sig 59678001 2001-04-12 __________ __________ [selfsig]
pub 1024R/BDFF049F 1996-04-16 __________
Hash=BDD58651ECAF518D898DA4B3808745BB
Fingerprint=79 25 74 51 03 6B 45 EA 2A 8E B1 48 08 94 C9 4F

uid FBI International Computer Crime Squad-San Francisco <nccs-sf@fbi.gov>
sig sig 9D56A855 1996-05-31 __________ __________ []
sig sig BDFF049F 1996-07-16 __________ __________ [selfsig]
sig sig 81CAEFED 1997-07-30 __________ __________ Thomas J. Talleur <thomas.talleur@hq.nasa.gov>
sig sig C2B1BE63 1998-10-14 __________ __________ Magus <humanoid@humanoid.net>
sig sig 6EBCB409 1999-06-01 __________ __________ dennis reardon <phoenix1952@erols.com>
sig sig A4EA9FC5 2000-03-06 __________ __________ Loren Brent Cobb <root@rangergumby.com>
sig sig 23972DE8 2000-06-14 __________ __________ Jsahrmann <Jsahrmann@distraught.com>
sig sig 2AD74EF4 2003-08-13 __________ __________ John A. Klein <secure@corptech.net>

Tuesday, July 8, 2014 Anonymous Message to Palestine

Sadly, we are following what’s happening in the Palestinian territories and all we see is aggression, bombing, killing and kidnapping of the Palestinian people. We also see complete silence from other Arab and foreign countries. Although this is nothing new to us, we refuse to stand by idly. Our response to these heinous crimes against humanity will be revealed shortly. Our operation will be synchronized with the movement of military resistance–in order to deliver a coordinated and powerful blow. Our message to the youth of Palestine: YOU are a symbol of freedom, resistance and hope. Never give up, never give in, NEVER! We are with you and will continue to defend you. Our message to the Zionist entities: As promised in previous attacks, we will continue to electronically attack, until the people of Palestine are free! As shown in previous attacks, we will continue to invade and attack your devices, websites and personal data.Sleep with one eye open as our attacks will come upon you like a thief in the night. All information gathered will be used in the aid of the resistance.

 

 

ISRAEL ITS TOO LATE  TO EXPECT US

more than 61 israelian websites hacked and there more … ‪#‎intifada_3‬ ANONYMOUS ARABE

more than 61 israelian websites hacked and there more … ‪#‎intifada_3‬
http://www.emeraldspa.co.il/files/
http://www.tefen.org.il/files/
http://www.sunhotel.co.il/files/
http://www.water-sport.co.il/files/
http://www.sharon-eiger.co.il/files/
http://www.ofirakunis.co.il/files/
http://www.nesskor.co.il/files/
http://www.drcrystal.co.il/files/
http://www.million-gift.co.il/files/
————————————-


http://adelevents.co.il/Anon
http://a-n-achzakot.co.il/Anon
http://a-shilat.co.il/Anon/
http://a-zohar.co.il/Anon
http://agalotcanada.co.il/Anon/
http://anmatahot.co.il/Anon/
http://liamdaniel.co.il/Anon/
http://advronen-law.co.il/anon/
http://morfium-events.co.il/Anon/
http://baby-kol.co.il/anon/
http://morfium-events.co.il/Anon/
http://gallery-door.co.il/Anon/
http://kinamonteva.co.il/Anon/
http://peer-car.co.il/Anon/
http://kinamonteva.co.il/Anon/
http://techno-eitan.co.il/Anon/
http://musaci-gamaro.co.il/Anon/index.php
http://advronen-law.co.il/anon/
http://techno-eitan.co.il/Anon/
http://wedding-style.co.il/Anon/
http://mosach-lin.co.il/Anon
——————————-
http://a-n-achzakot.co.il/Anon
http://a-shilat.co.il/Anon/
http://a-zohar.co.il/Anon
http://adelevents.co.il/Anon
http://advronen-law.co.il/Anon
http://agalotcanada.co.il/Anon/
http://liamdaniel.co.il/Anon/
http://anmatahot.co.il/Anon/
http://morfium-events.co.il/Anon/
http://gallery-door.co.il/Anon/
http://kinamonteva.co.il/Anon/
http://peer-car.co.il/Anon/
http://techno-eitan.co.il/Anon/
http://mosach-lin.co.il/Anon/
http://wedding-style.co.il/Anon/
http://samorai.co.il/Anon/
http://meyhaaretz.co.il/Anon/index.php
http://musaci-gamaro.co.il/Anon/index.php
http://scooters.co.il/Anon/index.php
http://www.dr-st.co.il/files/
http://www.minkowski.co.il/files/
http://liamdaniel.co.il/Anon/
http://advronen-law.co.il/anon/
http://morfium-events.co.il/Anon/
http://baby-kol.co.il/anon/
http://morfium-events.co.il/Anon/
http://gallery-door.co.il/Anon/
http://kinamonteva.co.il/Anon/
——————————-

The Ukrainian Cyber-hacker Berkut has managed to penetrate the computer systems that control the development of the elections, leaving the message: “the elections are controlled by the United States and are illegal.

A voice about the elections from Germany

THEY tell your to go and bring your vote! But in reality THEY give a fuck about your vote. The capitalist system does only need your vote – so that you think that you have a choice. It needs your vote, so that you can order yourself into one of the parties that THEY allow. It needs your vote, so that they see that your agree with their system. Or they might even see that you don’t agree with their system, but you are accepting their sy…stem, you are following their system, because you voted. So where is the change? There is no change by voting one of THEIR parties, voting in THEIR system, following THEIR calls to VOTE.

What is democracy?

Was it democracy when THEY forbade the Communist Party of Germany (KPD) in 1956? When THEY filed 200.000 lawsuits against German Communists. More than during the Nazi dictatorship. When they forced anti-fascists to go to jail – only because they tried to be active against the same fascists who already put them into jails during the Nazi dictatorship. Was it democracy when a Nazi judge who was member of the SA and NSDAP forbade the Communist Party of Germany in 1956 – in THEIR democracy?
NO! It was not democracy!

Was it democracy when they just told before a few days that the Syrian people don’t have the right to vote? Was it democracy when THEY said that the Syrian elections are illegitimate? Was it democracy when THEY refused the Syrian people on German soil to vote their own president?

NO! It was not democracy!

Was it democracy when THEY brought a fascist regime in Ukraine into power by a coup against a democratically elected president? Was it democracy when the fascist regime chased the communists? Was it democracy when the fascist government of Ukraine threw the communists out of the rada (Ukrainian parliament)? Was it democracy when the Nazis tried to kill Symonenko, the leader of the communist party and he now withdrew his candidacy in Ukraine?

NO! It was not democracy!

So fuck THEIR values! Fuck THEIR democracy!

We – the people – don’t need THEIR democracy! Because THEIR democracy means a democracy that allows fascist dictatorships – as long as they are serving THEM! Because THEIR democracy means democracy for everyone who follows THEIR system! Because THEIR democracy means – if a government won’t follow THEIR system then THEY have “the right” to stage a coup against it!

The only democracy we will accept is the dictatorship of the proletariat! Because THEIR democracy is nothing more than an attempt to break YOU! To break YOUR will for freedom! To break YOUR will for revolution!

There is no peace with THEIR democracy!

There is no equality with THEIR democracy!

There is no revolution with THEIR democracy!

There is no democracy with THEIR democracy!

There is no democracy without liberation of the working class!

Fuck THEIR EU! Fuck THEIR elections! Fuck THEIR system!

A voice about the elections from Germany

THEY tell your to go and bring your vote! But in reality THEY give a fuck about your vote. The capitalist system does only need your vote – so that you think that you have a choice. It needs your vote, so that you can order yourself into one of the parties that THEY allow. It needs your vote, so that they see that your agree with their system. Or they might even see that you don’t agree with their system, but you are accepting their system, you are following their system, because you voted. So where is the change? There is no change by voting one of THEIR parties, voting in THEIR system, following THEIR calls to VOTE.

What is democracy?

Was it democracy when THEY forbade the Communist Party of Germany (KPD) in 1956? When THEY filed 200.000 lawsuits against German Communists. More than during the Nazi dictatorship. When they forced anti-fascists to go to jail – only because they tried to be active against the same fascists who already put them into jails during the Nazi dictatorship. Was it democracy when a Nazi judge who was member of the SA and NSDAP forbade the Communist Party of Germany in 1956 – in THEIR democracy?
NO! It was not democracy!

Was it democracy when they just told before a few days that the Syrian people don’t have the right to vote? Was it democracy when THEY said that the Syrian elections are illegitimate? Was it democracy when THEY refused the Syrian people on German soil to vote their own president?

NO! It was not democracy!

Was it democracy when THEY brought a fascist regime in Ukraine into power by a coup against a democratically elected president? Was it democracy when the fascist regime chased the communists? Was it democracy when the fascist government of Ukraine threw the communists out of the rada (Ukrainian parliament)? Was it democracy when the Nazis tried to kill Symonenko, the leader of the communist party and he now withdrew his candidacy in Ukraine?

NO! It was not democracy!

So fuck THEIR values! Fuck THEIR democracy!

We – the people – don’t need THEIR democracy! Because THEIR democracy means a democracy that allows fascist dictatorships – as long as they are serving THEM! Because THEIR democracy means democracy for everyone who follows THEIR system! Because THEIR democracy means – if a government won’t follow THEIR system then THEY have “the right” to stage a coup against it!

The only democracy we will accept is the dictatorship of the proletariat! Because THEIR democracy is nothing more than an attempt to break YOU! To break YOUR will for freedom! To break YOUR will for revolution!

There is no peace with THEIR democracy!

There is no equality with THEIR democracy!

There is no revolution with THEIR democracy!

There is no democracy with THEIR democracy!

There is no democracy without liberation of the working class!

Fuck THEIR EU! Fuck THEIR elections! Fuck THEIR system!

SENTENCING SUBMISSION by USA as to Hector Xavier Monsegur – 1:11-cr-00666-LAP – Document 30

http://www.scribd.com/doc/225880109/SENTENCING-SUBMISSION-by-USA-as-to-Hector-Xavier-Monsegur-1-11-cr-00666-LAP-Document-30

 

 

UNITED STATES DISTRICT COURT 

SOUTHERN DISTRICT OF NEW YORK 

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – x 

     : 

UNITED STATES OF AMERICA       

     : 

     - v –             11 Cr. 666 (LAP)  

     :   

HECTOR XAVIER MONSEGUR,               

  a/k/a “Sabu,”           :   

                 

        Defendant.    :   

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – x 

 

 

 

 

 

 

 

 

 

 

 

GOVERNMENT’S NOTICE OF INTENT TO MOVE PURSUANT TO 

SECTION 5K1.1(A)(1)-(5) OF THE SENTENCING GUIDELINES  

AND PURSUANT TO TITLE 18, UNITED STATES CODE, SECTION 3553(e) 

 

 

 

 

 

 

 

 

 

PREET BHARARA 

United States Attorney for the 

Southern District of New York 

Attorney for the United States 

of America 

J AMES J . PASTORE, J R. 

Assistant United States Attorney 

- Of Counsel – 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 1 of 20

 

 

 

UNITED STATES DISTRICT COURT 

SOUTHERN DISTRICT OF NEW YORK 

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – x 

     : 

UNITED STATES OF AMERICA       

     : 

     - v –             11 Cr. 666 (LAP)  

     :    

HECTOR XAVIER MONSEGUR,               

  a/k/a “Sabu,”           :   

                 

        Defendant.    :   

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – x 

 

Preliminary Statement 

 

The Government respectfully submits this memorandum in connection with the 

sentencing of defendant Hector Xavier Monsegur, a/k/a “Sabu” (the “defendant” or 

“Monsegur”), which is currently scheduled for May 27, 2014 at 11:00 a.m.  In its Presentence 

Report (“PSR”), the United States Probation Office (“Probation”) correctly calculates that the 

defendant’s United States Sentencing Guidelines (“U.S.S.G.” or “Guidelines”) range is 259 to 

317 months’ imprisonment.  Probation recommends a sentence of time served.  As set forth in 

more detail below, Monsegur was an extremely valuable and productive cooperator.  Assuming 

that the defendant continues to comply with the terms of his cooperation agreement, and 

commits no additional crimes before sentencing, the Government intends to move at sentencing, 

pursuant to Section 5K1.1 of the United States Sentencing Guidelines (“Guidelines” or 

“U.S.S.G.”) and Section 3553(e) of Title 18, United States Code, that the Court sentence the 

defendant in light of the factors set forth in Section 5K1.1(a)(1)-(5) of the Guidelines, and 

without regard to the otherwise applicable mandatory minimum sentence in this case.     

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 2 of 20

 

Statement of Facts 

I.   Monsegur’s Involvement with Anonymous, LulzSec, and Major Cyber Intrusions 

Throughout 2011, hackers affiliated with the “Anonymous” movement targeted hundreds 

of computer systems around the world, hacking, disabling and at times exfiltrating data from 

those systems.  Victims included news media outlets, government agencies and contractors, and 

private entities.  In approximately May 2011, Monsegur and five other members of Anonymous 

formed Lulz Security, an elite hacking collective or “crew” commonly referred to as “LulzSec.”

1

  

Monsegur and the other core members of LulzSec typically worked as a team and had 

complementary, specialized skills that enabled them to gain unauthorized access to computer 

systems, damage and exploit those systems, and publicize their hacking activities.  This core 

group, among whom only Monsegur was identified prior to the time Monsegur began 

cooperating in the investigation, included:  

  Monsegur, a/k/a “Sabu,” who served primarily as a “rooter,”  analyzing 

code for vulnerabilities which could then be exploited;    

  “Kayla,” who specialized, among other things, in “social engineering” – 

that is, manipulating others into divulging personal information such as login credentials;   

  “T-Flow,” who served as an organizer, analyzing information provided by 

members of the group in order to direct other members what to do next;   

   “Topiary,” who  served from time to time as the public face of 

Anonymous and LulzSec, giving interviews to media outlets and writing public communications 

on LulzSec’s behalf;  

                                                          

1

   “Lulz” is shorthand for a common abbreviation used in Internet communications – LOL – 

or “laughing out loud.”  As explained on LulzSec’s website, LulzSec.com, the group’s unofficial 

motto was “Laughing at your security since 2011.” 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 3 of 20

 

  “AVUnit,” who provided computer infrastructure for the group such as 

servers; and   

  “Pwnsauce,” who performed some of the same work as Monsegur and 

Kayla. 

Monsegur and many of these core LulzSec members were also part of another 

Anonymous-affiliated group called Internet Feds which, like LulzSec, engaged in major criminal 

computer hacking activity.   

Throughout 2011, Monsegur, through LulzSec and Internet Feds, engaged in several 

major hacks into and thefts from the computer servers of United States and foreign corporations 

and other entities  including the following:   

  HB Gary.  Monsegur directly participated in the hack of the computer 

system of this internet security firm in response to the firm’s claim, through one of its 

investigators, that it had identified the members of Anonymous.  This hack involved the theft of 

emails and other company information.   

  Fox Television.  This hack resulted in the compromise of a database of 

contestants of a reality TV show called “X-Factor.”  Monsegur downloaded data from Fox that 

he was able to obtain through his co-conspirators’ unauthorized access to Fox’s computer 

systems.  

  Tribune Company.  A journalist provided his credentials to Internet Feds 

in the hopes he would be invited into private chats.  Monsegur used the credentials to login to the 

Tribune’s systems and confirmed that the credentials could be used to gain access to Tribune 

Company’s entire system. 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 4 of 20

 

  PBS.org.  Monsegur was a direct participant in this hack, which resulted in 

the compromise of PBS’s servers and the defacement of its website.  Monsegur helped identify a 

vulnerability and then installed multiple “back doors” on PBS’s system – that is, he installed 

programs that allowed others to later access the computer system.

2

 

  Sonypictures.com.  Monsegur was a direct participant in this hack, in 

which the personal identification information of customers was stolen from Sony.  

  Sony BMG sites in Belgium, Russia, and the Netherlands.  Monsegur 

accessed and downloaded data from the Belgium and Netherlands sites, including the release 

dates of records.  Monsegur passed information about a vulnerability for the Russian website to 

other members of LulzSec for exploitation. 

  Nintendo.  Monsegur participated in a hack into Nintendo’s computer 

systems, pursuant to which files regarding the structure of Nintendo’s computer systems were 

downloaded. 

  Senate.gov.  Monsegur had knowledge of, and conducted research for, this 

hack of the Senate’s website.

3

   

  Bethesda/Brink video game.  Monsegur helped hack into Bethesda’s 

system, and downloaded information including a database containing personal identification 

information. 

  Infragard/Unveillance.  Monsegur was a participant in a hack of an FBI 

affiliate in Atlanta, which resulted in the theft of confidential information.   

                                                          

2

   Following his arrest, Monsegur provided information that helped repair and remediate 

this hack. 

3

   Monsegur provided the FBI with information about the vulnerability, which allowed it to 

be repaired or “patched.” 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 5 of 20

 

In addition to Monsegur’s direct participation in the criminal hacking activity set forth 

above, Monsegur had contemporaneous knowledge of other major criminal hacking activity by 

his co-conspirators, including hacks into the computer servers of the Irish political party Fine 

Gael; a U.S. online media outlet,   a foreign law firm,  ; and the Sony 

Playstation Network. 

In addition to the six “core” members identified above, several individuals were loosely 

affiliated with Monsegur and LulzSec, including, significantly, Donncha O’Cearrbhail, a/k/a 

“palladium,” and J eremy Hammond, a/k/a “Anarchaos.”  Hammond, the FBI’s number one 

cybercriminal target at the time of his arrest in 2012, was a prolific and technically skilled hacker 

who launched cyber attacks against scores of governmental institutions, law enforcement 

organizations, and businesses during a nearly year-long rampage in which he broke into these 

victims’ computer systems, stole data, defaced websites, destroyed files and published online the 

sensitive personal and financial information of thousands of individuals – all with the object of 

creating, in Hammond’s words, maximum “mayhem.”   

The hacks identified above constitute only a portion of the significant criminal computer 

intrusions committed by Internet Feds, LulzSec, and their members, including Monsegur.  As the 

examples make clear, Monsegur and his co-conspirators indiscriminately targeted government 

agencies, private companies, and news media outlets.  In many instances, the harms inflicted on 

these entities were significant, ranging from defacements of their websites to the exfiltration of 

personal identification information of customers or employees of the entities; the costs associated 

with repairing these attacks ran into the tens of millions of dollars.  Monsegur was a key 

participant in these Anonymous hacking crews, providing his technical expertise to aid in many 

of the hacking operations.      

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 6 of 20

 

II.   The Complaint, Monsegur’s Guilty Plea and Subsequent Remand, and the 

Guidelines Calculation 

On or about J une 7, 2011, the FBI approached Monsegur in his home and questioned him 

about his online activities.  Monsegur admitted his criminal conduct and immediately agreed to 

cooperate with law enforcement.  That night, Monsegur reviewed his computer files with FBI 

agents and provided actionable information to law enforcement.  The next morning, Monsegur 

appeared in court on a criminal complaint charging him with credit card fraud and identity theft, 

and was released on bail, whereupon he immediately continued his cooperation with the 

Government, as described further below.  On or about August 15, 2011, Monsegur appeared 

before Your Honor and entered a guilty plea pursuant to a cooperation agreement with the 

Government.  Pursuant to the terms of that agreement, Monsegur pled guilty to a 12-count 

Superseding Information, S1 11 Cr. 666, charging him with nine counts related to computer 

hacking; one count related to credit card fraud; one count of conspiring to commit bank fraud; 

and one count of aggravated identity theft.  In addition to resolving the charges brought against 

him in the Southern District of New York, Monsegur’s guilty plea also resolved four cases filed 

against him in other districts (including the Eastern and Central Districts of California, the 

Northern District of Georgia, and the Eastern District of Virginia) which were transferred to the 

Court under docket numbers 11 Cr. 693-696, respectively. 

On or about May 24, 2012, the Government moved to revoke Monsegur’s bail because he 

made unauthorized online postings.  Monsegur was arrested and remanded to custody the 

following day.  He was released on a revised bail package on or about December 18, 2012, and 

has remained at liberty since that date.  Accordingly, Monsegur has served approximately 7 

months in prison in connection with this case.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 7 of 20

 

In the PSR, Probation correctly calculates that the defendant’s base offense level is 7 

pursuant to U.S.S.G. §2B1.1(a)(1) and correctly applies a 22-level enhancement in light of a loss 

amount between $20 million and $50 million

4

; a 6-level enhancement given that the offense 

involved more than 250 victims; a 2-level enhancement for sophisticated means; and a 4-level 

enhancement given that the defendant was convicted of violating Title 18, United States Code, 

Section 1030(a)(5)(A).  The defendant receives a three-level reduction for his acceptance of 

responsibility, resulting in a total adjusted offense level of 38.  (PSR ¶¶ 43-59.)  The defendant 

has zero criminal history points, and is therefore in Criminal History Category I.  (PSR ¶¶ 60-

66.)   

Based on an offense level of 38 and a Criminal History Category of I, the defendant’s 

advisory Guidelines Range is 235 to 293 months’ imprisonment.  (PSR ¶ 96.)  In addition, absent 

the Court granting the Government’s motion pursuant to Title 18, United States Code, Section 

3553(e), the defendant would face a mandatory consecutive term of two years’ imprisonment, 

resulting in a total advisory Guidelines range of 259 to 317 months’ imprisonment.               

III.  Monsegur’s Cooperation 

 Monsegur acknowledged his criminal conduct from the time he was first approached by 

agents, before he was charged in this case.  Monsegur admitted both to prior criminal conduct 

about which the Government had not developed evidence, as well as his role in both Internet 

Feds and LulzSec.  Monsegur subsequently and timely provided crucial, detailed information 

regarding computer intrusions committed by these groups, including how the attacks occurred, 

                                                          

4

   This loss figure includes damages caused not only by hacks in which Monsegur 

personally and directly participated, but also damages from hacks perpetrated by Monsegur’s co-

conspirators in which he did not directly participate.  Monsegur’s actions personally and directly 

caused between $1,000,000 and $2,500,000 in damages.  Had Monsegur not candidly 

acknowledged his affiliation with the groups that committed the other hacks, his advisory 

Guidelines range likely would have been substantially lower.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 8 of 20

 

which members were involved, and how the computer systems were exploited once breached.  

As set forth below, Monsegur’s consistent and corroborated historical information, coupled with 

his substantial proactive cooperation and other evidence developed in the case, contributed 

directly to the identification, prosecution and conviction of eight of his major co-conspirators, 

including Hammond, who at the time of his arrest was the FBI’s number one cybercriminal 

target in the world.  On top of that, Monsegur engaged in additional, substantial proactive 

cooperation that enabled the FBI to prevent a substantial number of planned cyber attacks, as set 

forth below. 

A.   Monsegur’s Acceptance of Responsibility 

To begin with, Monsegur immediately admitted his role in Internet Feds and LulzSec, 

including his role in the major cyber intrusions set forth in the first section of this memorandum. 

In addition, Monsegur admitted to playing a role in cyber attacks and intrusions with these 

groups that the Government had not previously known that he played.  For example, Monsegur 

admitted to participating in DDoS (Distributed Denial of Service)

5

 attacks against the computer 

systems of PayPal, MasterCard, and Visa, among other targets.   Monsegur also admitted to 

hacking certain government websites and taking government servers offline, to providing 

“security research” (that is, publicizing vulnerabilities in computer systems that others could 

exploit), and to using his “celebrity” hacker name – “Sabu” – in the hopes that it would inspire 

others to join certain criminal activities of these groups.   

 In addition to his admission to these crimes, Monsegur admitted to engaging in hacking 

activities about which the Government had not previously developed evidence.  According to 

Monsegur, between 1999, when he first began hacking computers, and late 2003/early 2004, 

                                                          

5

   DDoS attacks involve the use of several computers to bombard a victim’s computer 

system with connection requests, thereby overwhelming the victim’s system, often resulting in 

the temporary shutdown of the victim’s website.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 9 of 20

 

Monsegur hacked into thousands of computers.  For the next approximately two years, Monsegur 

identified vulnerabilities in perhaps 200 computer systems in an effort to grow a legitimate 

computer security firm.  Then, starting around 2006, Monsegur hacked into computer systems 

for personal financial gain, or as part of hacker groups that broke into systems for a variety of 

reasons, including so-called “hacktivism.”  Monsegur admitted that, before joining Anonymous 

hacking crews, he hacked into a variety of websites and computer systems including the websites 

of several businesses.  Through these hacks, Monsegur was able to steal credit card information, 

and then sold the credit card numbers, gave them away to family members and friends, and used 

them to pay his own bills.  On at least one occasion, Monsegur was hired to hack into a 

business’s computer system.  He also successfully hacked into a business’s website and had 

merchandise delivered to him free of charge. 

Finally, Monsegur acknowledged a variety of other criminal conduct including sales and 

attempted sales of small quantities of marijuana; personal marijuana use; illegally possessing an 

unlicensed firearm; and purchasing stolen goods including electronics and jewelry.   

B.   Monsegur Assists Law Enforcement in Identifying and Locating LulzSec 

Members and Affiliates 

Monsegur’s primary substantial assistance came in the form of his cooperation against 

significant cybercriminals affiliated with Anonymous, Internet Feds, and LulzSec.  He provided 

detailed historical information about the activities of Anonymous, contributing greatly to law 

enforcement’s understanding of how Anonymous operates.  Monsegur also provided crucial and 

detailed information about the formation, organization, hierarchy and membership of these 

hacking groups, as well as specific information about their planning and execution of many 

major cyber attacks, including the specific roles of his co-conspirators in committing those 

crimes.  He also provided historical information that helped resolve open investigations into 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 10 of 20

10 

 

several computer intrusions committed by members of Internet Feds and LulzSec, including the 

hacks identified above.   

In addition to this crucial historical information, Monsegur proactively cooperated with 

ongoing Government investigations.  Working sometimes literally around the clock, at the 

direction of law enforcement, Monsegur engaged his co-conspirators in online chats that were 

critical to confirming their identities and whereabouts.  During some of the online chats, at the 

direction of law enforcement, Monsegur convinced LulzSec members to provide him digital 

evidence of the hacking activities they claimed to have previously engaged in, such as logs 

regarding particular criminal hacks.  When law enforcement later searched the computers of 

particular LulzSec members, they discovered copies of the same electronic evidence on the 

individuals’ computers.  In this way, the online nicknames of LulzSec members were definitively 

linked to their true identities, providing powerful proof of their guilt.  Other times, at the 

direction of law enforcement, Monsegur asked seemingly innocuous questions designed to elicit 

information from his co-conspirators that, when coupled with other information obtained during 

the investigation, could be used to pinpoint their exact locations and identities.  Monsegur’s 

substantial proactive cooperation, as set forth more particularly below, contributed directly to the 

identification, prosecution, and conviction of eight of his co-conspirators, including Hammond. 

As disclosed in their communications, Hammond and certain other co-conspirators had 

learned how to exploit a particular software application vulnerability that enabled him to hack 

into many computer servers.  At law enforcement direction, Monsegur attempted to learn how 

these targets were able to exploit this vulnerability, but was unsuccessful.  At the same time, 

Monsegur was able to learn of many hacks, including hacks of foreign government computer 

servers, committed by these targets and other hackers, enabling the Government to notify the 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 11 of 20

11 

 

victims, wherever feasible, so the victims could engage in remediation efforts and prevent further 

damage or intrusions.   

Monsegur’s cooperation was complex and sophisticated, and the investigations in which 

he participated required close and precise coordination with law enforcement officers in several 

locations.  For instance, during the investigation of Hammond, Monsegur (who was then in New 

York) engaged in online chats with Hammond (who was then in Chicago), while coordinating 

with FBI agents in New York, physical surveillance teams deployed in Chicago, and an 

electronic surveillance unit in Washington, D.C.        

Monsegur also engaged in a significant undercover operation in an existing investigation 

through which, acting at the direction of law enforcement, Monsegur gathered evidence that 

exposed a particular subject’s role in soliciting cyber attacks on a foreign government.  The 

evidence he enabled the Government to obtain was extremely valuable, and the Government 

could not otherwise have obtained it without his assistance.  Although this cooperation has not 

resulted in any prosecutions to date, the Government believes his information, and the evidence 

he helped to obtain in this matter, is extremely significant.   

C.   Monsegur Assists Law Enforcement in Preventing Hacks 

Notably, during the period of his cooperation, Monsegur received communications from 

hackers about vulnerabilities in computer systems, as well as computer hacks that were being 

planned or carried out by them.  The FBI used this information, wherever feasible, to prevent or 

mitigate harm that otherwise would have occurred.  The FBI estimates that it was able to disrupt 

or prevent at least 300 separate computer hacks in this fashion.  The victims included divisions 

of the United States Government such as the United States Armed Forces (specifically,  

, the United States Congress, the United States Courts (specifically,   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 12 of 20

12 

 

), and NASA; international intergovernmental organizations 

(specifically,  ); and several private companies including a 

television network ( ), a security firm ( ), a video game manufacturer 

( ), and an electronics conglomerate ( ).  Although difficult to quantify, it is likely 

that Monsegur’s actions prevented at least millions of dollars in loss to these victims.      

Monsegur also provided information about vulnerabilities in critical infrastructure, 

including at a water utility for an American city, and a foreign energy company.  Law 

enforcement used the information Monsegur provided to secure the water utility, and the 

information about the energy company was shared with appropriate government personnel.  In 

addition, when Anonymous claimed to have hacked the electrical grid in the United States, 

Monsegur communicated with certain Anonymous members who revealed that the claims were a 

hoax.  This saved the Government the substantial time and resources that otherwise would have 

been deployed in responding to these bogus claims.      

Discussion 

I.   Applicable Law 

  The United States Sentencing Guidelines still provide strong guidance to the Court 

following United States v. Booker, 543 U.S. 220 (2005), and United States v. Crosby, 397 F.3d 

103 (2d Cir. 2005).  As the Supreme Court stated, “a district court should begin all sentencing 

proceedings by correctly calculating the applicable Guidelines range” — that “should be the 

starting point and the initial benchmark.”  Gall v. United States, 128 S. Ct. 586, 596 (2007).   

  After that calculation, however, a sentencing judge must consider seven factors outlined 

in Title 18, United States Code, Section 3553(a): “the nature and circumstances of the offense 

and the history and characteristics of the defendant,” 18 U.S.C. § 3553(a)(1); the four legitimate 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 13 of 20

13 

 

purposes of sentencing, seeid. § 3553(a)(2); “the kinds of sentences available,” id. § 3553(a)(3); 

the Guidelines range itself, seeid. § 3553(a)(4); any relevant policy statement by the Sentencing 

Commission, seeid. § 3553(a)(5); “the need to avoid unwarranted sentence disparities among 

defendants,” id. § 3553(a)(6); and “the need to provide restitution to any victims,” id. § 

3553(a)(7).  See Gall, 128 S. Ct. at 596 & n.6.   

II.   Evaluation of Defendant’s Cooperation 

Section 5K1.1 of the Guidelines sets forth five non-exclusive factors that sentencing 

courts are encouraged to consider in determining the appropriate sentencing reduction for a 

defendant who has rendered substantial assistance, including the significance and usefulness of 

the assistance; the truthfulness, completeness and reliability of the defendant’s information and 

testimony; the nature and extent of the assistance; any injury suffered, or any danger or risk of 

injury to the defendant or his family resulting from his assistance; and the timeliness of the 

assistance.     

As to the significance and usefulness of the defendant’s assistance, Monsegur’s 

cooperation was extraordinarily valuable and productive.  Monsegur provided unprecedented 

access to LulzSec – a tightly knit group of hackers who targeted and successfully breached a 

variety of computer systems operated by governments, businesses, and news media outlets.  

Through Monsegur’s historical information and substantial proactive cooperation, the FBI and 

international law enforcement were able to pierce the secrecy surrounding the group, identify and 

locate its core members, and successfully prosecute them.  In particular, when Monsegur first 

was arrested, he provided the FBI with information about the identities and whereabouts of core 

LulzSec members.  This information helped focus the investigations being conducted by the FBI 

and international law enforcement, allowing them to develop additional evidence against 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 14 of 20

14 

 

LulzSec members.  At the direction of law enforcement, Monsegur then engaged in online chats 

with various LulzSec members, convincing them to disclose details that confirmed their 

identities and whereabouts including, as noted above, digital evidence that later was matched to 

files stored on the LulzSec members’ computers.  Monsegur also provided in-depth information 

regarding many of the computer hacks that LulzSec had perpetrated.   

Monsegur’s efforts contributed directly in the identification, prosecution, and convictions 

of core members of LulzSec, including:  

  Ryan Ackroyd, a/k/a “Kayla.”  Ackroyd was arrested by authorities in the 

United Kingdom.  He pled guilty and was sentenced to 30 months’ imprisonment. 

  J ake Davis, a/k/a “Topiary.”  Davis was arrested by authorities in the 

United Kingdom.  He pled guilty and was sentenced to 24 months’ custody in a young offender 

institution.   

  Mustafa Al-Bassam, a/k/a “T-Flow.”  Al-Bassam was arrested by 

authorities in the United Kingdom.  He pled guilty and was sentenced to a 20 month term, which 

was suspended for two years, as well as 300 hours’ community service.  

  Darren Martyn, a/k/a “pwnsauce,” was arrested by authorities in Ireland.  

He subsequently pled guilty and received a sentence of probation and a fine.  

In addition to these core members of LulzSec, Monsegur’s cooperation led to the arrest 

and prosecution of others who contributed to LulzSec’s hacking efforts, including:  

  J eremy Hammond, a/k/a “Anarchaos.”  As the Court is aware, Hammond, 

the FBI’s most wanted cybercriminal in the world at the time of his arrest, was prosecuted in the 

Southern District of New York, pled guilty, and was sentenced by the Court principally to a term 

of imprisonment of 120 months.  

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 15 of 20

15 

 

  Ryan Cleary.  Cleary was arrested by authorities in the United Kingdom.  

He pled guilty and was sentenced to 32 months’ imprisonment.    

  Donncha O’Cearrbhail, a/k/a “palladium.”   O’Cearrbhail was arrested by 

authorities in Ireland, pled guilty, and was sentenced to probation and a fine.  

  Matthew Keys.  Keys is currently charged in the Eastern District of 

California in connection with his role in permitting unauthorized access to the Tribune 

Company’s computer systems.      

All of these prosecutions were extremely important to the Government.  As set forth 

above, these hackers engaged in significant cyber attacks against computer systems that 

belonged to government agencies and contractors, news media outlets, non-profit institutions, 

and private entities.  Some of the attacks defaced news media websites, others rendered 

government websites inaccessible, and still others resulted in the exfiltration of the personal 

identification information of victims.   

Yet the number of prosecutions to which Monsegur contributed only partially conveys 

the significance and utility of his cooperation.  On a daily basis throughout the summer of 2011, 

Monsegur provided, in real time, information about then-ongoing computer hacks and 

vulnerabilities in significant computer systems.  Through Monsegur’s cooperation, the FBI was 

able to thwart or mitigate at least 300 separate hacks.  The amount of loss prevented by 

Monsegur’s actions is difficult to fully quantify, but even a conservative estimate would yield a 

loss prevention figure in the millions of dollars.  Moreover, Monsegur provided information 

about actual and purported vulnerabilities in critical infrastructure, allowing law enforcement to 

respond appropriately.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 16 of 20

16 

 

Finally, as set forth above, Monsegur engaged in a significant undercover operation in 

which, acting at the direction of law enforcement, he helped to obtain evidence that exposed a 

subject’s role in soliciting cyber attacks on the computer systems of a foreign government.    

While it has not resulted in prosecutions to date, this evidence is significant and valuable to the 

Government. 

As to Monsegur’s truthfulness, completeness and reliability, he presented as fully candid, 

and admitted not only to crimes about which the Government had gathered evidence, but also 

crimes about which the Government had not previously gathered evidence.  Monsegur’s 

information was also consistently reliable and complete, corroborated by documents and 

electronic files, as well as by statements from other witnesses.   As noted above, while Monsegur 

made certain unauthorized online postings that resulted in the revocation of his bail and his 

incarceration for several months, following his release from custody in December 2012, 

Monsegur made no further unauthorized postings.   

As to the nature and extent of Monsegur’s cooperation, as noted above, Monsegur has 

been cooperating with law enforcement for approximately three years.  His cooperation entailed 

many multi-hour meetings with FBI agents that extended into the late evening and early morning 

hours.  Monsegur provided substantial historical cooperation, as well as substantial proactive 

cooperation, and he was prepared to testify if needed.  However, to date, every defendant against 

whom Monsegur has cooperated has pled guilty with the exception of Keys, who is awaiting 

trial.  Monsegur’s cooperation no doubt played a significant role in securing several of these 

guilty pleas in that, among other things, acting at the direction of law enforcement, Monsegur 

obtained incriminating online chats with most of the defendants that constituted strong proof of 

each defendant’s guilt.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 17 of 20

17 

 

The nature of Monsegur’s cooperation was also somewhat atypical in that his work as a 

cooperating witness was made public shortly after the arrest of the core LulzSec members.  This 

revelation in itself served an important deterrent effect throughout the hacking community.  At 

the same time, it resulted in significant scrutiny of Monsegur and his family members.     

As to the danger or risk associated with Monsegur’s cooperation, Monsegur faced 

hardships because of his cooperation.  During the course of his cooperation, the threat to 

Monsegur and his family became severe enough that the FBI relocated Monsegur and certain of 

his family members.  Monsegur repeatedly was approached on the street and threatened or 

menaced about his cooperation once it became publicly known.  Monsegur was also harassed by 

individuals who incorrectly concluded that he participated in the Government’s prosecution of 

the operators of the Silk Road website.   

Moreover, Monsegur has been vilified online by various groups affiliated with the 

Anonymous movement, which particularly affected him given the central role that his online 

activity played in his life prior to his cooperation with the Government.  Among other things, 

certain groups have sought to release Monsegur’s personal identification information (such as his 

exact address) as well as the personal identification information of certain of his family 

members.     

Members of Monsegur’s family have been threatened because of his cooperation, and one 

of those relatives was involved in a physical altercation regarding Monsegur’s cooperation.   

Monsegur’s family members have also repeatedly been approached by members of the media.  In 

one instance, a reporter was removed from the school of the children for whom Monsegur served 

as guardian after the reporter entered the school and attempted to interview the children.       

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 18 of 20

18 

 

As to the timeliness of Monsegur’s assistance, as noted above, he immediately 

cooperated with law enforcement.  J ust hours after being approached by law enforcement, he was 

back online cooperating proactively.  His timely decision to cooperate helped prevent or mitigate 

hundreds of hacks; allowed the Government to develop sufficient evidence to charge multiple 

individuals with serious computer crimes; and revealed a significant subject’s role in soliciting 

cyber attacks against a foreign government.  Had Monsegur delayed his decision to cooperate, 

his efforts would have been far less fruitful.  In fact, LulzSec had developed an action plan to 

destroy evidence and disband if the group determined that any of its members had been arrested, 

or were out of touch with the other group members for an extended period of time.  Accordingly, 

had Monsegur delayed his decision to cooperate and remained offline for an extended period of 

time, it is likely that much of the evidence regarding LulzSec’s activities would have been 

destroyed, and members of the group would have become much more difficult to locate.  

Monsegur’s immediate decision to cooperate was thus particularly important to the ultimate 

successes that stemmed from his cooperation.                 

Conclusion 

In light of the foregoing facts, the Government respectfully requests that, pursuant to 

Section 5K1.1 of the Guidelines, the Court grant the defendant a substantial downward departure 

at sentencing.  In addition, the Government respectfully moves, pursuant to Title 18, Section 

3553(e), for relief from the otherwise applicable mandatory minimum sentence in this case.  

Such a sentence will appropriately account for the defendant’s extraordinary cooperation, and be 

sufficient, but not greater than necessary, to serve the legitimate goals of sentencing.   

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 19 of 20

19 

 

Request to Seal 

The Government respectfully requests that it be permitted to file limited portions of this 

submission under seal to protect the identities of certain victims.   

Dated: New York, New York 

  May 23, 2014 

 

              Respectfully submitted, 

 

              PREET BHARARA 

              United States Attorney 

               

 

             By:    /S/         

              J ames J . Pastore, J r. 

              Assistant United States Attorney 

              Tel.: (212) 637-2418 

Case 1:11-cr-00666-LAP   Document 30   Filed 05/23/14   Page 20 of 20

 

 

Full List of +500 Israeil sites hacked by Anonymous Tunisia

#———————————————-# Anonymous Tunisia # ————————————————#

Full List of +500 Israeil sites hacked by Anonymous Tunisia

http://pastebin.com/KBH1xkfg , https://ghostbin.com/paste/add8v

Full List of +500 Israeil sites hacked by Anonymous Tunisia
#Greetz to :Lola – Nabster Junior – Vinux – 5orda – AnonRev – ANONXOXTN

#———————————————-# Anonymous Tunisia # ————————————————#
http://advronen-law.co.il/lola/anontn.html
http://afm.co.il/Lola/anontn.html
http://agalotcanada.co.il/lola/anontn.html
http://agam-itum.info/lola/anontn.html
http://agameng.info/lola/anontn.html
http://aharonhalelli.info/lola/anontn.html
http://aharoni-mazganim.info/lola/anontn.html
http://airconditioningsystems1.info/lola/anontn.html
http://akochav.com/lola/anontn.html
http://alef-shilat.com/lola/anontn.html
http://alefshilat.info/lola/anontn.html
http://alexandra-1.info/lola/anontn.html
http://alexandra-cosmetic.co.il/lola/anontn.html
http://alexsander-ovalot.info/lola/anontn.html
http://alisarosen.com/lola/anontn.html
http://alive-pro.info/lola/anontn.html
http://alldoors1.info/lola/anontn.html
http://almogflowers.info/lola/anontn.html
http://alon-naaman.co.il/lola/anontn.html
http://alon1.info/lola/anontn.html
http://aloneybar.co.il/lola/anontn.html
http://alosh.info/lola/anontn.html
http://altori.co.il/lola/anontn.html
http://alum-salvador.info/lola/anontn.html
http://alumsamara.co.il/lola/anontn.html
http://ami-instelator.info/lola/anontn.html
http://aminot.co.il/lola/anontn.html
http://amir-evenshaish.info/lola/anontn.html
http://amirahs.info/lola/anontn.html
http://amishalev.info/lola/anontn.html
http://amram-1.info/lola/anontn.html
http://amrani-law.info/lola/anontn.html
http://amrani-lawoffice.info/lola/anontn.html
http://amranilaw.info/lola/anontn.html
http://anat-boaron.co.il/lola/anontn.html
http://anatavivy.info/lola/anontn.html
http://anatsinai.com/lola/anontn.html
http://anatsinai.info/lola/anontn.html
http://anmatahot.co.il/lola/anontn.html
http://anmatahot1.info/lola/anontn.html
http://argovlaw.co.il/lola/anontn.html
http://argovlaw1.info/lola/anontn.html
http://argovlaw2.info/lola/anontn.html
http://ariel-fermon.info/lola/anontn.html
http://ariel-gagot.info/lola/anontn.html
http://arieligagot.co.il/lola/anontn.html
http://artframing.co.il/lola/anontn.html
http://www.asadobateva.co.il/lola/anontn.html
http://asaot-daka90.info/lola/anontn.html
http://ashalectria-ltd.info/lola/anontn.html
http://assaferuim.info/lola/anontn.html
http://atamiltd.info/lola/anontn.html
http://atiass.info/lola/anontn.html
http://avieruim.co.il/lola/anontn.html
http://avizip-fitness.info/lola/anontn.html
http://avneiarad.info/lola/anontn.html
http://avnerbi.co.il/lola/anontn.html
http://avnerbishmaut.info/lola/anontn.html
http://avodot-afar2.info/lola/anontn.html
http://ayub1.info/lola/anontn.html
http://azaria.org.il/lola/anontn.html
http://azraz.info/lola/anontn.html
http://b-ort.co.il/lola/anontn.html
http://baby-kol.info/lola/anontn.html
http://baby-kol.co.il/lola/anontn.html
http://badany.info/lola/anontn.html
http://badar.info/lola/anontn.html
http://baggy-basetah.info/lola/anontn.html
http://baldar-tours.info/lola/anontn.html
http://baractivi.info/lola/anontn.html
http://barak-kiror.info/lola/anontn.html
http://barakbuild.info/lola/anontn.html
http://barbahutz.co.il/lola/anontn.html
http://barbahutz.info/lola/anontn.html
http://barsystem.co.il/lola/anontn.html
http://baruch1.info/lola/anontn.html
http://batiabs.info/lola/anontn.html
http://bclean.org.il/lola/anontn.html
http://bclean1.info/lola/anontn.html
http://beit-avot.net/lola/anontn.html
http://beit-teva-alumot.info/lola/anontn.html
http://benigagot.co.il/lola/anontn.html
http://benistal.info/lola/anontn.html
http://benshoushan-metals.info/lola/anontn.html
http://bergmanlamps-hag1.info/lola/anontn.html
http://bertilax.info/lola/anontn.html
http://beton-mayko.info/lola/anontn.html
http://bigbrother-car.co.il/lola/anontn.html
http://biktotsher.info/lola/anontn.html
http://bodymindpsychology.info/lola/anontn.html
http://boee-kala.co.il/lola/anontn.html
http://bora-bora1.info/lola/anontn.html
http://bora-plumbing.info//lola/anontn.html
http://boutique-spa.info/lola/anontn.html
http://brazim-express.co.il/lola/anontn.html
http://btybioti.info/lola/anontn.html
http://bucuresti-restaurant.info/lola/anontn.html
http://burgatadogfarm.info/lola/anontn.html
http://c-bar.co.il/lola/anontn.html
http://c-azhilom.co.il/lola/anontn.html
http://cctv4u.info/lola/anontn.html
http://chenwindows.co.il/lola/anontn.html
http://chikohakosem.co.il/lola/anontn.html
http://clean24r.info/lola/anontn.html
http://clickfind.info/lola/anontn.html
http://cohen-haim.info/lola/anontn.html
http://concretespraying.info/lola/anontn.html
http://contour1.info/lola/anontn.html
http://d-l-k.interclick.co.il/lola/anontn.html
http://d-n-shipoozim.co.il/lola/anontn.html
http://d-n-shipoozim1.co.il/lola/anontn.html
http://d-pro.co.il/lola/anontn.html
http://dalitgrin.info/lola/anontn.html
http://dangallaw.co.il/lola/anontn.html
http://daniel-projects.info/lola/anontn.html
http://danielmesibot.info/lola/anontn.html
http://dc-lawyers.co.il/lola/anontn.html
http://dc-lawyers.info/lola/anontn.html
http://dc-lawyers.info/lola/anontn.html
http://dne5504.co.il/lola/anontn.html
http://dogi-sitter.info/lola/anontn.html
http://dorit-law.info/lola/anontn.html
http://dotanlaw.co.il/lola/anontn.html
http://dr-hamoud.info/lola/anontn.html
http://dr-jose.info/lola/anontn.html
http://dr-shrem-law.info/lola/anontn.html
http://dr-simon-s.info/lola/anontn.html
http://drbeen.info/lola/anontn.html
http://drds1.info/lola/anontn.html
http://drkormanron.co.il/lola/anontn.html
http://drshrem-law.info/lola/anontn.html
http://drwinter.info/lola/anontn.html
http://dvora2.com/lola/anontn.html
http://dx210w-bager.com/lola/anontn.html
http://ea-p.info/lola/anontn.html
http://easytop.co.il/lola/anontn.html
http://eco-vvork.info/lola/anontn.html
http://ehud-manulan.info/lola/anontn.html
http://einat-e.co.il/lola/anontn.html
http://einatlahav.info/lola/anontn.html
http://elbazmoveng.co.il/index/anontn.html
http://eldad1.info/lola/anontn.html
http://electrosecurity.co.il/lola/anontn.html
http://eliasehayev.info/lola/anontn.html
http://eliezercohen.info/lola/anontn.html
http://elilevy.co.il/index/anontn.html
http://elior-fish.info/home/anontn.html
http://elitelimo.info/index/anontn.html
http://eliwoods.co.il/lola/anontn.html
http://eliyahu-hasahot.info/home/anontn.html
http://emit-packsol.info/index/anontn.html
http://erezamigalaw.co.il/index/anontn.html
http://eshahar-law.com/home/anontn.html
http://estyboket.info/index/anontn.html
http://etzli.interclick.co.il/lola/anontn.html
http://evafrid.info/home/anontn.html
http://evenbgan.info/home/anontn.html
http://extreme-trip.co.il/home/anontn.html
http://eyal-zipuim-negishut.info/index/anontn.html
http://eyaloz-law1.info/lola/anontn.html
http://eyaloz-law2.info/index/anontn.html
http://eyaloz-law3.info/index/anontn.html
http://eyaloz-law4.info/index/anontn.html
http://eyaloz-law5.info/index/anontn.html
http://feyat-hamesibot.info/lola/anontn.html
http://figmoi.info/lola/anontn.html
http://fixnadlan.com/lola/anontn.html
http://florence-tavor.co.il/index/anontn.html
http://flowers-herzliya.info/home/anontn.html
http://frid-adv.co.il/home/anontn.html
http://frost1.info/lola/anontn.html
http://full-gas.info/lola/anontn.html
http://fun-djs.info/index/anontn.html
http://fux-mivnim.info/index/anontn.html
http://g-dalal.info/home/anontn.html
http://gabermplast.info/home/anontn.html
http://gabi-manofim.co.il/lola/anontn.html
http://gabrin1.info/lola/anontn.html
http://gadi-yon.info/lola/anontn.html
http://gadi-yon1.info/lola/anontn.html
http://galgalyatziv.co.il/lola/anontn.html
http://galgalyatziv.info/index/anontn.html
http://galimashdod.co.il/index/anontn.html
http://galitbash-law.co.il/lola/anontn.html
http://gallery-door.co.il/lola/anontn.html
http://gazitlaw.info/home/anontn.html
http://gether.co.il/home/anontn.html
http://gilad-barorlaw.co.il/home/anontn.html
http://giladbaror-law.co.il/home/anontn.html
http://giladbaror-lawoffice.co.il/home/anontn.html
http://giligates.info/lola/anontn.html
http://gishur-pitronim.info/home/anontn.html
http://gloriag.info/lola/anontn.html
http://golani-shibutz.info/home/anontn.html
http://green-field.info/home/anontn.html
http://green-leaf.co.il/home/anontn.html
http://grfit-ag.co.il/lola/anontn.html
http://group-orel.info/lola/anontn.html
http://gueta-yeruham.info/lola/anontn.html
http://gur-arimarble.info/index/anontn.html
http://gush80-4u.info/lola/anontn.html
http://guyroze-law.co.il/index/
http://guy-electrician.info/home
http://guy-instelator.info/home
http://guy-shoval.co.il/home/anontn.html
http://guyroze-law.co.il/home/
http://gymtogo.co.il/lola/anontn.html
http://h-m-z1.info/default/
http://hadar-kitchens.info/index/
http://hahim-rami.co.il/index/
http://hahnsec.info/index/
http://haim-drilling.co.il/index/
http://haim-naktivi.info/lola/anontn.html
http://hakim1.info/anontn/
http://hamamlaha.info/index/
http://hamdan-law.com/anontn/
http://hameruba.info/index/
http://hamias-hovalot.info/index/
http://hamode-s.info/index/
http://hanankamir.info/index/
http://hannah1.info/index/
http://hanota.info/index/
http://harel-project.co.il/index/
http://harel-project.info/index/
http://hashmalmeir.info/index/
http://havatganeden.info/index/
http://hawwai.co.il/index/anontn.html
http://hayadrori-law.co.il/index/
http://haybniya.co.il/index/
http://hdesigners.co.il/index/
http://helena-cate.co.il/index/
http://helenamouyal.info/index/
http://hennisur.com/index/
http://hinashelly.co.il/index/
http://homestyle4u.info/index/
http://hoshen-gagot.co.il/index/
http://house-ashdod.co.il/index/
http://hovalot-sg.info/index/
http://hovalotmeir.info/index/
http://i-tris.co.il/index/
http://idilia1.info/index/
http://ilana4u.info/index/
http://ilanazelig-1.info/index/
http://indoor32.co.il/index/
http://interclick.co.il/index/
http://iris-beauty.info/index/
http://irisbraun.info/info
http://irisloe.info/index/
http://isahar.co.il/index/anontn.html
http://isratrans.info/index/
http://itai-gal.info/index/
http://itumi-arik.info/index/
http://itumjerusalem.info/index/
http://itzhak-instalazia.info/index/
http://itzik-mashevot-myco.info/index/
http://itzuvhashelet.info/index/
http://ivchun-mushlam.info/index/
http://izikc-law.info/index/
http://izikzuri.info/index/
http://jambook.info/index/
http://jehalin.info/index/
http://jerby-art.info/index/
http://jtmarble.info/index/
http://judit.co.il/index/
http://juli-cosmetics.co.il/index/
http://junior-baby.co.il/index/
http://justmove.co.il/index/
http://kala-vilonot.info/index/
http://kama-towing.info/index/
http://karinhorev-law.co.il/index/
http://kav-migvan.info/index/
http://kazablan.info/index/
http://kesembahava.info/index/
http://kia4you.info/index/
http://kiduhey-hamdy.info/index/
http://kiduhim10.info/index/
http://kimtherapy.info/index/
http://kinamonteva.co.il/index/
http://king-metal.info/index/
http://kismon.info/index/
http://kitatoman.info/index/
http://kobicar.co.il/home/
http://kochavi.info/index/
http://kohome.info/index/
http://ktanot-law.info/index/
http://la-boem.info/index/
http://la-delivery.info/index/
http://lahavhydraulics.info/index/
http://law-justice.co.il/index/anontn.html
http://law-patent.info/index/
http://law14r.info/index/
http://le-car.info/index/
http://le-car1.info/index/
http://led4light.info/index/
http://ledpower23.co.il/index/
http://leon-signs.co.il/index/
http://lev-hashen.info/index/
http://levinsk-yhaktana.info/index/
http://liamdaniel.co.il/index/
http://liana-harlev.info/index/
http://liat-halfon.co.il/index/
http://lihigrinberg.info/index/
http://lilach-elasar.co.il/index/
http://limorkosmetics.info/index/
http://littlebags.co.il/index/
http://loans-in2.info/index/
http://loft-jade.info/index/
http://loft-tel-aviv.info/index/
http://lolo2.info/index/
http://luminaled.co.il/index/
http://m-h-g.co.il/index/
http://m-harahit.interclick.co.il/index/
http://m-iraqi-dent.info/index/
http://m-yahalom.co.il/index/
http://maabada39.info/index/
http://madlen-cosmetics.co.il/index/
http://maga-acher.info/index/
http://magahakesem.info/index/
http://maggi-law1.co.il/index/
http://malca-henna.info/index/
http://malisrael-law.co.il/home/
http://malisrael-law.info/index/
http://manofy-kalderon.info/index/
http://maor-electrical-work.co.il/index/
http://maor2.info/index/
http://marcus-botbol.co.il/index/
http://mario-k.co.il/index/
http://masgeriat-smama.co.il/index/anontn.html
http://wedding-style.info/index/
http://mashevot-deir-hanna.info/index/
http://mashkantacenter.info/index/
http://massage-c.info/home/
http://mastersushi.info/index/
http://mayashtern.info/index/
http://mazaie-lilach.co.il/index/anontn.html
http://mazevothasson.co.il/index/
http://mediclinic.org.il/index/
http://me-casa.co.il/index/index.aspx
http://me-co-sa.co.il/index/index.aspx
http://meholot-hasharon.info/index/
http://meir-hilutz-mahir.info/index/
http://meshek66.info/index/
http://metbahe-aoser.info/index/
http://meyhaaretz.co.il/index/index.aspx
http://mgdeliveries2000.info/index/
http://mhaim1.info/index/
http://mi-dan.info/index/
http://michal-law.info/index/
http://mifgash-karavan.co.il/index/
http://mifgash-karavan.interclick.co.il/index/
http://migun-system.co.il/index/index.aspx
http://mivdakey-rechev.info/index/
http://mnusboim-law.info/index/
http://moalemnatan.info/index/
http://molayam.co.il/index/
http://moran-eng.co.il/index/
http://morbniya.info/index/
http://moshe-atun.interclick.co.il/index/
http://motiti70.info/index/
http://ms-adv.co.il/index/index.aspx
http://ms-gidur.info/index/
http://mudaut.info/index/
http://musaci-gamaro.co.il/index/index.aspx
http://my-english.co.il/index/
http://www.myledds.com/index/
http://nachman52.info/index/
http://nagarut-ben-kova.co.il/home/
http://navalevy-feldenkaiz.info/home/
http://negev1.info/home/
http://negev2.info/home/
http://nesiahashai.info/index/
http://netanel-bobcat.info/index/
http://ngn-hadbara.info/index/
http://nihon-go1.info/index/
http://nimratherapy.info/index/
http://nira-ahzakot.info/index/
http://nirproyaktim.info/index/
http://noa-catering.co.il/index/
http://noa-coach.co.il/index/
http://nobelphysio.info/index/
http://nofmulhavadi.co.il/index/
http://oferalberg.info/index/
http://ofereini.co.il/index/
http://ofir-perel-law.co.il/index/
http://ofra4music.info/index/
http://olimpiyarishpon.co.il/home/index.php
http://omanbaor.co.il/index/
http://ora-law.co.il/index/
http://oritcosmetic.info/default/
http://osher-shiputzim.info/index/
http://osherhavrakot.co.il/default/
http://osheriitzhari.info/index/
http://oshri-b.info/index/
http://osnatreich.com/index/
http://ovalot-ruslan.info/index/
http://ozcpa.info/index/
http://pantaoz-hovalot.info/index/
http://peer-car.co.il/index/
http://peleflange.co.il/index/index.php
http://peleg-pt.co.il/index/
http://perez-t.co.il/home/
http://pharmacyhansi.co.il/index/
http://photomagnti.info/index/
http://pini-kvora.info/index/
http://pisga2.info/index/
http://pitronani.info/index/
http://pninat-hamizug.info/index/
http://pnisurim.info/index/
http://polish-crystals.info/index/
http://polish-monitin.info/index/
http://protecnica.co.il/index/
http://psagot-college.info/default/
http://psyaron.co.il/index/
http://puterman.info/index/
http://r-g.org.il/index/
http://radiator-tony.info/index/
http://rafaelteplove.co.il/index/
http://raguan.co.il/index/index.php
http://rahitey-sgula.info/index/
http://rainbow-laundry.info/index/
http://rallytour.info/index/
http://ramihovalot.info/index/
http://ramiroz.info/index/
http://ranscaravans.info/home/index.php
http://refael-grillbar.info/index/
http://refael-law.info/index/
http://reiki-1.info/index/
http://reiki-do1.info/index/
http://reki-do1.info/index/
http://rimon-delivery.co.il/index/
http://rimon-delivery.info/home/
http://rishon-center.co.il/home/
http://robopark.info/home/
http://robovac.info/index/
http://rome-modern.info/index/
http://ron-lechaim.info/index/
http://ron-sand.co.il/index/
http://ronihazan.info/index/
http://ronit-dover.info/index/anontn.html
http://ronlaosher.info/index/
http://ronlaosher.info/home/
http://rosally.info/index/
http://rossobar.info/home/default.aspx
http://royalevents.co.il/default/index.aspx
http://rozico1.info/index/
http://s-derech.info/default/
http://s-mehonot-tfira.info/home/
http://sadan-proektim.co.il/Anontn/index.aspx
http://salon-belisima.com/home/default.aspx
http://samorai.co.il/index/
http://saviona.info/home/
http://sby-fire.info/index/
http://scaffolding1r.info/index/
http://schorerlaw.info/index/
http://scooters.co.il/index/default.aspx
http://sefi-aragon.info/index/
http://sgaluminum.co.il/home/default.aspx
http://sh-print.info/index/
http://shadiitum.info/index/
http://shadv.info/index/
http://shahar-car.info/index/
http://shalev1.co.il/default/index.php
http://shamay-mekarkein.info/index/
http://sharon-hovalo.info/home/
http://shay.org.il/index/
http://shefalitush.co.il/index/
http://shipootsimnlo.info/index/
http://shiputzim-pem.info/index/
http://shiputzim1.info/index/
http://shirdan.co.il/index/
http://shirut365.info/index/
http://shlomoarad-law.info/index/
http://shnitzliya-qiryon.info/home/
http://shtevi.co.il/index/
http://shuali-law.co.il/index/
http://shulakesem-shiran.info/index/
http://simcha-evenchen.com/index/
http://sivis1.info/index/
http://skyguy.org.il/index/
http://smailecanvas.co.il/index/
http://smailemagnet.co.il/index/
http://snakecatcherjerusalem.info/index/
http://snirsecurity.info/index/
http://sos-uri.info/home/
http://spapinuk.info/index/
http://www.spectrum-energy.co.il/index/
http://sportmeir.co.il/index/
http://st-picme.co.il/index/
http://steeldesign.co.il/index/
http://steeldesign1.info/index/
http://steeldesign2.info/index/
http://studio-dvash.co.il/index/
http://sultanmanofim.info/index/
http://sun-dream.info/index/
http://t-shilut.co.il/index/default.aspx
http://t-ssystems.co.il/index/
http://taasiotnagarut.co.il/home/
http://taavura.info/index/
http://taherclean.info/index/
http://tal-f.info/index/
http://tal18.info/home/
http://talor.co.il/index/
http://tamir60.info/index/
http://techno-dudi.info/index/
http://techno-eitan.co.il/index/
http://technobrezintem.co.il/index/
http://tehory-law.co.il/home/default.aspx
http://thebestkalnoit.info/home/
http://thelet-770.co.il/index/
http://thelet-770.info/index/
http://thelet770.info/index/
http://tinkerbell1.info/index/
http://tm-lohot.info/index/
http://toar.info/default/
http://toar1.info/default/
http://tomer-mazganim.co.il/index/
http://tomer-newlook.info/index/
http://toxdna.co.il/index/
http://trisim-g.co.il/index/
http://trmokor.info/index/
http://tylb.info/home/
http://universalgaz1.info/index/
http://urimichaelis.info/index/
http://vahav-omer.info/index/
http://varditwigs.co.il/index/
http://varditwigs.info/index/
http://vered-chen.info/index/
http://veredpery-law.co.il/index/
http://veredpery-law.info/index/
http://vetspital.com/index/
http://viktor-trisim.info/index/
http://vilonot-hadar.co.il/index/
http://webweb13.info/index/
http://webweb14.info/index/
http://wedding-style.co.il/index/
http://wendesnurseries.info/index/
http://window-cleaner1.info/index/
http://wolfronit.info/index/
http://wood-wish.info/index/
http://y-p-g.info/index/
http://y-r-m.info/index/
http://y-rani.co.il/index/
http://ybngen.info/index/
http://yd-metals.info/index/
http://yefet15.info/index/
http://yoavashkenazi.co.il/index/
http://yochihenya.info/index/
http://yooda-shay.co.il/index/
http://yossi-adari.co.il/default/index.php
http://yossi-adari.info/default/
http://yossidangor.info/index/
http://yossiem.info/index/
http://yrhk.info/home/
http://ystzohar.info/index/
http://yurihovalot.info/index/
http://zamymor-law.info/index/
http://zaza1.info/home/
http://zehavayachin.info/index/
http://zevik.info/index/
http://zilber-a.co.il/index/
http://zilber-a.info/index/
http://zilber-a1.co.il/index/
http://ziondadon.info/index/
http://zmanahva.info/index/
http://zolbo-rahitim.info/index/
http://zoomdigital.co.il/index/
http://zoompic.co.il/home/
http://zorem-bazinor.info/index/
http://zug-o-pered.com/index/
http://zvika-galgalim.info/home/
http://zvinagler.com/default/

#———————————————-# Anonymous Tunisia # ————————————————#

II Part of Israel Sites (108) Hacked By Anonymous Tunisia

Anonymous Tunisia is back to fuck for the second time some Israel Site’s :) just 108 :3
we will never stop Fighting for Palestine
#Greetz to :Lola – Nabster Junior – Vinux – 5orda – AnonRev – ANONXOXTN
Wait us for Better and more .
#———————————————-# Anonymous Tunisia # ————————————————#
Second Part of Zionist Sites Fucked :
 
 
 
#———————————————-# Anonymous Tunisia # ————————————————#
 
Resistance for Ever … Anonymous Tunisia
 
#———————————————-# Anonymous Tunisia # ————————————————#
Wait Us for Better
#———————————————-# Anonymous Tunisia # ————————————————#

100 Israel Site’s Hacked By Anonymous Tunisia – Part I

100 Israel Site’s Hacked By Anonymous Tunisia – Part I

 
http://pastebin.com/xLQxP5PC
#———————————————-# Anonymous Tunisia # ————————————————#
 
Anonymous Tunisia is back to fuck some Israel Site’s :)
we will never stop Fighting for Palestine
#Greetz to :Lola – Nabster Junior – Vinux – 5orda – AnonRev – ANONXOXTN
 
#———————————————-# Anonymous Tunisia # ————————————————#
 
100 Israel Site’s Hacked Last Night by Anonymous Tunisia , it’s the first Part :
 
 
#———————————————-# Anonymous Tunisia # ————————————————#
 
Resistance for Ever … Anonymous Tunisia
 
#———————————————-# Anonymous Tunisia # ————————————————#

PROOF: Hacked U.S. State Dept. E-mail Shows U.S. Ordering Terrorist Attacks in Ukraine to “frame-up” Russia and provide excuse for War!

March 12, 2014 — (TRN) — Hackers from the group “Anonymous” have allegedly broken into the email account of a U.S. State Department attache’ from the US Army and publicly released PROOF the United States is conducting state-sponsored terrorism inside Ukraine.  The emails make clear this is being done to “frame-up” Russia and thereby provide an excuse for the US Military to intervene.  We analyze and report on the allegedly hacked e-mails, so you can draw your own conclusions!

 

The e-mail below was allegedly obtained by computer hackers and it provides what purports to be irrefutable, traceable, verifiable proof that the United States government, via official US State Department e-mail, is Ordering acts of state sponsored terrorism in the Ukraine.

 

The e-mail, allegedly from Lt. Col. Jason P. Gresh, a United States Army attache’ assigned to the State Department,  makes clear the U.S. is giving orders for attacks against transportation hubs in southeastern Ukraine, “to frame-up the neighbor”  (i.e. Russia) and provide an excuse for the United States military to intervene.  If this is true, it is clear poof the US Government is staging actual criminal terrorist attacks in a foreign country, Ukraine, with the intent of blaming such attacks on the Russians for the purposes of sending US troops to war!!!!!!

 

Below is how the hack was announced to the world by “Anonymous:” (We are NOT linking directly to the web site which claims to have committed a criminal act of computer hacking, but rather merely reporting what that site is claiming, as is our right under the freedom of the press guarantees of First Amendment to the United States Constitution as interpreted by the US Supreme Court in the case Florida Star v. B. J. F.491 U.S. 524(1989) .)

 

Anonymous Ukraine hack correspondence of US Army Attache Assistant in Kiev and discover a plot against Ukraine

Hello

We are Anonymous Ukraine

We have hacked e-mail correspondence of US Army Attache Assistant in Kiev Jason Gresh and a high ranking official from Ukrainian General Staff Igor Protsyk.

It appears that they are planning to conduct a series of attacks on Ukrainian military bases in order to destabilize the situation in Ukraine.

Particularly, Jason Gresh writes to Igor Protsyk that it’s time to implement a plan that implies “causing problems to the transport hubs in the south-east of Ukraine in order to frame-up the neighbor. It will create favorable conditions for Pentagon to act”, says Jason Gresh.

In his turn, Protsyk writes to some “Vasil” and tells him to arrange an attack on an airbase of 25 aviation brigade of Ukrainian air force stationed in Melitopol.

This “Vasil” is responsible for arranging the details of the attack, gathering of the gunmen and providing them with a map of sites that are chosen to be attacked.

We strongly recommend everyone to look through these documents. There you will find all the details.

 

(SNIP - Turner Radio Network will not directly reproduce the Hyper-Links to the 7.9 MB files full of allegedly stolen emails)

 

——————— END of Anonymous’ Announcement —————–

 

Behold, what is alleged to be one of the hacked e-mails, complete with IP addresses, e-mail addresses and full internet server routing information PROVING state-sponsored terrorism, perpetrated by the United States government, specifically designed to start a war with Russia:

 

From: “Gresh, Jason P” < GreshJP@state.gov>
To: igor.protsyk@gmail.comi.v.protsyk@mil.gov.ua
Subj: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200

Delivered-To: igor.protsyk@gmail.com
Received: by 10.220.4.2 with SMTP id 2csp62561vcp;
Sun, 9 Mar 2014 08:57:15 -0700 (PDT)
X-Received: by 10.224.51.74 with SMTP id c10mr35436450qag.33.1394380635325;
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Return-Path: < GreshJP@state.gov>
Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
for < igor.protsyk@gmail.com>
(version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of GreshJP@state.govdesignates 169.253.194.10 as permitted sender) client-ip=169.253.194.10;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of GreshJP@state.gov designates 169.253.194.10 as permitted sender) smtp.mail= GreshJP@state.gov
Received: from EEAPPSEREDG02.appservices.state.sbu ([10.47.98.102])
by haig2.state.gov with ESMTP id s29FgT0w013967-s29FgT0x013967;
Sun, 9 Mar 2014 11:42:29 -0400
Received: from EEAPPSEREX06.appservices.state.sbu (10.47.98.206) by
EEAPPSEREDG02.appservices.state.sbu (10.47.98.102) with Microsoft SMTP Server
(TLS) id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Received: from KIEVMB01.eur.state.sbu (10.168.34.7) by
EEAPPSEREX06.appservices.state.sbu (10.47.98.206) with Microsoft SMTP Server
id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable
X-MimeOLE: Produced By Microsoft Exchange V6.5
Subject: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Message-ID: < 71C9088C4C6F7A4582772808F54C25520349E214@KIEVMB01.eur.state.​sbu>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Peninsula
Thread-Index: Ac87sDqNfxCUW94zShqj0tXF8YAqGQ==
From: “Gresh, Jason P” < GreshJP@state.gov>
To: < igor.protsyk@gmail.com>, < i.v.protsyk@mil.gov.ua>
X-FEAS-SYSTEM-WL: 10.47.98.102

Ihor,

Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it’s time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.

Respectfully,
JP

Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 – 5444 | Fax (380-44) 521 – 5636

 

To members of the United States Military, we at Turner Radio Network ask “Is this what you signed-up for?”  For your own government to conduct terrorist attacks in other countries to create a phony reason to send YOU into war?  Phony reasons that get you shot at, blown-up or killed?  Is THIS why you joined the U.S. military?

 

Given that the IP addresses factually trace to the US State Department public IP address range as listed in ICANN and WHOIS, it appears this communication is legitimate.  That said, such an email would prove the federal government of the United States has become nothing more than an criminal terrorist organization.  Would anyone blame the US Military if all of them resigned?  Would anybody blame the US Military if it rose up and threw-off such a corrupt, dangerous, criminal administration which was caught red-handed, setting-up false terror attacks in a foreign country as an excuse to send them to war?

 

The Founding Fathers are watching.  The American people are watching.  Many are waiting to see what the US Military – which is sworn to defend the Constitution of the United States from all enemies, foreign and domestic– is prepared to do now that the Executive Branch of the government itself has become a domestic enemy by being caught red-handed being a state sponsor of terrorism.

 

UPDATE 12:31 AM EDT MARCH 13, 2014:

Further research on the alleged author of the email above indicates as follows:

 

LINKED-IN PROFILE:

 

Jason P. Gresh’s Summary

 

Currently serving as the Assistant Army Attache at the U.S. Embassy, Kyiv, Ukraine.

 

Advises the U.S. Ambassador to Ukraine, European Combatant Command, Headquarters U.S. Army, and the Joint Chiefs of Staff on Ground Force military issues pertaining to the country of Ukraine. Helps formulate and synthesize U.S. security strategy towards the greater Black Sea region.

 

A Foreign Area Officer with 16 plus years experience in the U.S. Army. Formerly commanded as an Armor Officer at the platoon and company level.

 

Jason P. Gresh’s Experience

 

Assistant Army Attache

U.S. Embassy, Kyiv, Ukraine

 

2011 – Present (3 years)

Assistant Army Attache

U.S. Embassy Kyiv

 

June 2011 – Present (2 years 10 months)

Graduate Research Assistant

Woodrow Wilson International Center for Scholars

 

Nonprofit; 51-200 employees; Think Tanks industry

 

June 2009 – August 2009 (3 months) Washington D.C. Metro Area

Assistant to the ODC

U.S. Embassy, Dushanbe

 

January 2008 – May 2008 (5 months)

Company Commander

1st Battalion, 63rd Armor

 

November 2004 – December 2005 (1 year 2 months) Vilseck, Germany

Platoon Leader

1st Squadron, 3rd ACR

 

1998 – 2001 (3 years)

Jason P. Gresh’s Languages

 

*

English

(Native or bilingual proficiency)

*

Russian

(Professional working proficiency)

*

Ukrainian

(Professional working proficiency)

 

Jason P. Gresh’s Skills & Expertise

 

1. Security Clearance

2. International Relations

3. National Security

4. Policy Analysis

5. Research

6. Government

7. Counterterrorism

 

 

Jason P. Gresh’s Education

 

Georgetown University

Master of Arts (M.A.), Russian, Central European, East European and Eurasian Studies

 

2008 – 2010

 

George C. Marshall Center

 

2007 – 2008

 

United States Military Academy at West Point

B.S., Civil Engineering

 

1993 – 1997

 

Activities and Societies: Chapel Ushers, Cadet Orienteering Team

 

UPDATE 1:43 AM EDT  MARCH 13, 2014

 

A map of an Melitopol.airport was attached to one of the allegedly hacked emails showing exactly what parts of an airport the U.S. wanted attacked by terrorists they were paying. According to one of the allegedly hacked emails, this airport was/is to be attacked on March 15.  That map, with Russian writing on the image, is shown below (Click image to enlarge):

 

 

For verification purposes, Melitopol’ Airport is, in fact, located in the southeastern part of Ukraine as shown on the Wikipedia Map below:

More information of this nature will be forthcoming right here from the Turner Radio Network. Check back often.