Evaluating Steve Scully’s Twitter melodrama and hacking claim, one can’t but recall the immortal words of the 4th century Roman poet Brittania Spearus. In her lyric masterpiece “Oops!…I Did It Again” she wrote:
Yeah yeah yeah yeah yeah
Yeah yeah yeah yeah yeah yeah
You see my problem is this
I’m dreaming away
Wishing that heroes, they truly exist
I cry, watching the days
Can’t you see I’m a fool in so many ways
But to lose all my senses
That is just so typically me
Oh baby, oh
Yes, it does seem that life imitates art and Scully, just as in the poem, suffers from multiple reoccurring problems. Beyond his chronic narcissism and pathological dishonesty, he:
- Doesn’t understand the fine nuances of Twitter’s DMs vs. public posts
- Has an established pattern of posting inflammatory content and then attributing it to hackers
- Fails to grasp even the basics of what hacking is and how it’s done
- doesn’t understand that each tweet is traceable to the device posting it: the device’s IP address, it’s carrier, its MAC address, its IMEI and MEID #, and its phone number
Image 1: Typical social media comments on Steve Scully’s postings: “What are you eating? You’re looking younger by the minute.”, “He doesn’t age.”, “Looking sharp”, “You’re so handsome.”, “Dorian Gray!”
Scully’s assertion that his Twitter account was hacked doesn’t jibe with any of the evidence. For someone else to have tweeted from his phone would have been exceedingly difficult because such an exploit would have kicked him off his device and he’d likely notice it. Furthermore, to hack his phone and control it remotely would require significant resources, skills, and risk, and it would be easy to trace. The attacker would first have to bypass the device login security, gain full interactive control over the phone, launch the Twitter app, log in, compose the message, and tweet it.
Why go through all of this trouble when it’s faster/safer to just post the tweet from the alleged attacker’s own device? In typical phone hacks, the attackers look to conduct surveillance on the device (voice/video) and/or retrieve files and information such as an address book, images, and texts. Hence, a hacker taking over Scully’s device for the sole purpose of an ‘ambiguous’ tweet is by far the poorest return on hacking investment in recorded history.
Scully’s past pattern of behavior is consistent with a few other Twitter ‘work accidents’ and his excuses of having been hacked. Twice before, in 2012 and 2013, Scully claimed that his Twitter account was broken into; each incident occurred after he posted ‘regrettable’ tweets.
The fact that he deleted his Twitter account, then reactivated it, then went private, then deleted the post in question are also strong indicators that Scully is, as Brittania Spearus observed in her poem is a “a fool in so many ways”.
If Scully really wanted to, he could quickly put this debate to rest by asking Twitter to publish the event logs for his account activity. But he won’t, because these logs will unequivocally show that the source IP addresses, device type, and date/time of the logins to his Twitter account matched his iPhone. The cell phone logs in turn, will further validate that he was using his iPhone before during, and after the post was tweeted.
For those who are still trying to figure out if Scully is an unbiased reporter, a quick examination of his linkages shows that he is connected professionally and socially to a large number of hard core anti-Trumpers. One such friend is Mark Zaid, the attorney for Eric Ciaramella from the Ukrainian impeachment drama.
References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification
*** Update 10/15/2020 ***
“…Out of frustration, I sent a brief tweet addressed to Anthony Scaramucci. The next morning when I saw that this tweet had created a controversy, I falsely claimed that my Twitter account had been hacked. These were both errors in judgment for which I am totally responsible. I apologize,”
Copyright 2020 Yaacov Apelbaum, All Rights Reserved.