FRESH BREACH ***FULL DATA DUMP*** RAPTOR SUPPLIES (100M+) MIL/GOV/CIV CONTRACTORS
by FulcrumSec - 16-12-25, 05:51 AM
#41
lets check the data and rockkk
Reply
#42
WowThanks
Reply
#43
cool stuff, thx man
Reply
#44
(16-12-25, 05:51 AM)FulcrumSec Wrote:
thanksUPDATE:  Our patience has run out. Here's the full leaked data set: 



[b]We'll keep adding to this post on a daily basis leading up until the full leak.


---

More dataset stats (and we are still finding more good stuff daily):

  Total Size: 450GB+ (JSON/SQL/CSV)

[/b]
  •   Identities Exposed: 298,425 Unique email addresses + associated data
  •   2,811 Military/Government contacts (20+ countries) + associated data
  •   Deal Records: 428,531 with complete procurement history
  •   Financial Records: Transaction data, payment methods, billing addresses
  •   Google Ads: Full advertising strategy, transaction history, campaign performance
  •   Zoho CRM: MILLIONS of CASES, ORDERS, REFUNDS, CONTACTS, etc.
  •   Outlook email backup: 68 MILLION email messages, complete conversations with customers, issues with equipment (INCLUDING MILITARY ORDERS), troubleshooting, customer PASSPORTS, customer IBANs + OTHER BANKING data.
  •   Gmail: 13.3 MILLION emails, also with the above data and attachments
  •   Order Tracking: Granular order tracking through UPS, Ship24, FedEx (their API key is still active, incredibly) for MILLIONS of order (including to military bases)

As you can see, Raptor's negligence exposed active duty military personnel, diplomatic corps, and critical defense supply chains.

  •   US Air Force: More than 100 Air Force emails, military base addresses, procurement, supply line, etc.
  •   US Navy: Logistics data for USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + base shipping data, supply line, phone numbers, ip addresses, invoices
  •   UK Ministry of Defence: Procurement contacts (Anthony.Furnival235@mod.gov.uk).
  •   Australian Defence Force: Invoices for DSTG and RAAF Base Amberley, ip addresses, addresses.
  •   NATO: Confirmed orders linked to natopart.com.
  •   US Dept. of State: 50+ email addresses, ips, addresses, payment info, at least one PASSPORT SCAN.
As well as civilian gov agencies in those countries + Singapore and elsewhere.

All will be posted here and on our onion site if Raptor doesn't pay up within a week.

[b]To Raptor Supplies: Do the right thing for your customers and NEGOTIATE. Otherwise you'll be forcing our hand.


Currently, we're using reappropriated SMTP accounts to notify their clients of the breach and give them a chance to remove their data from the final leak package IF they send us a screenshot of them contacting Raptor to tell them to PAY UP and/or notify regulators in their country of Raptor's extraordinary incompetence. 

We also are deleting the data of any concerned gov/military/NGO or other such org even if they do not send a screenshot, because the only mistake they made was trusting Raptor, and frankly, we might care more about protecting their data than Raptor does.

For those who are not gov/mil and don't contact Raptor on our behalf, we are going to continue to spam them, again, and again, and again, because we have more than a THOUSAND SendGrid, MailChimp, Brevo, and other mass mailing accounts in our armoury (thanks React2Shell!). And of course, we will eventually leak all of their company's data if Raptor does not comply.

Here's a sample of the gov/mil accounts whose communications, payment data, ip and physical addresses Raptor decided to leave loose on the internet. Just a tiny sample of the NEARLY 3K OF THEM THEY EXPOSED:

claudette.fricot@defence.gov.au
claudia.lawrence@health.nsw.gov.au
clayton.petrie@us.af.mil
clayton.whitehead@infrastructure.gov.au
clement.groepies@capetown.gov.za
cliff.brown@blackburn.gov.uk
clive.williams160@mod.gov.uk
clive.williams@deca.mod.uk
clive.zhu@transport.nsw.gov.au
coco_chew@bca.gov.sg
colin.esnouf@sa.gov.au
con.skrepetos@health.tas.gov.au
connor.marshall1@defence.gov.au
connor.moran@infrastructure.gov.au
connor@deeca.vic.gov.au
connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy
[/b]
Reply
#45
i like it
Reply
#46
you are NOT kidding!!!!!!!!!! good job fr
Reply
#47
(16-12-25, 05:51 AM)FulcrumSec Wrote: UPDATE:  Our patience has run out. Here's the full leaked data set: 


[b]We'll keep adding to this post on a daily basis leading up until the full leak.


---

More dataset stats (and we are still finding more good stuff daily):

  Total Size: 450GB+ (JSON/SQL/CSV)

[/b]
  •   Identities Exposed: 298,425 Unique email addresses + associated data
  •   2,811 Military/Government contacts (20+ countries) + associated data
  •   Deal Records: 428,531 with complete procurement history
  •   Financial Records: Transaction data, payment methods, billing addresses
  •   Google Ads: Full advertising strategy, transaction history, campaign performance
  •   Zoho CRM: MILLIONS of CASES, ORDERS, REFUNDS, CONTACTS, etc.
  •   Outlook email backup: 68 MILLION email messages, complete conversations with customers, issues with equipment (INCLUDING MILITARY ORDERS), troubleshooting, customer PASSPORTS, customer IBANs + OTHER BANKING data.
  •   Gmail: 13.3 MILLION emails, also with the above data and attachments
  •   Order Tracking: Granular order tracking through UPS, Ship24, FedEx (their API key is still active, incredibly) for MILLIONS of order (including to military bases)

As you can see, Raptor's negligence exposed active duty military personnel, diplomatic corps, and critical defense supply chains.

  •   US Air Force: More than 100 Air Force emails, military base addresses, procurement, supply line, etc.
  •   US Navy: Logistics data for USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + base shipping data, supply line, phone numbers, ip addresses, invoices
  •   UK Ministry of Defence: Procurement contacts (Anthony.Furnival235@mod.gov.uk).
  •   Australian Defence Force: Invoices for DSTG and RAAF Base Amberley, ip addresses, addresses.
  •   NATO: Confirmed orders linked to natopart.com.
  •   US Dept. of State: 50+ email addresses, ips, addresses, payment info, at least one PASSPORT SCAN.
As well as civilian gov agencies in those countries + Singapore and elsewhere.

All will be posted here and on our onion site if Raptor doesn't pay up within a week.

[b]To Raptor Supplies: Do the right thing for your customers and NEGOTIATE. Otherwise you'll be forcing our hand.


Currently, we're using reappropriated SMTP accounts to notify their clients of the breach and give them a chance to remove their data from the final leak package IF they send us a screenshot of them contacting Raptor to tell them to PAY UP and/or notify regulators in their country of Raptor's extraordinary incompetence. 

We also are deleting the data of any concerned gov/military/NGO or other such org even if they do not send a screenshot, because the only mistake they made was trusting Raptor, and frankly, we might care more about protecting their data than Raptor does.

For those who are not gov/mil and don't contact Raptor on our behalf, we are going to continue to spam them, again, and again, and again, because we have more than a THOUSAND SendGrid, MailChimp, Brevo, and other mass mailing accounts in our armoury (thanks React2Shell!). And of course, we will eventually leak all of their company's data if Raptor does not comply.

Here's a sample of the gov/mil accounts whose communications, payment data, ip and physical addresses Raptor decided to leave loose on the internet. Just a tiny sample of the NEARLY 3K OF THEM THEY EXPOSED:

claudette.fricot@defence.gov.au
claudia.lawrence@health.nsw.gov.au
clayton.petrie@us.af.mil
clayton.whitehead@infrastructure.gov.au
clement.groepies@capetown.gov.za
cliff.brown@blackburn.gov.uk
clive.williams160@mod.gov.uk
clive.williams@deca.mod.uk
clive.zhu@transport.nsw.gov.au
coco_chew@bca.gov.sg
colin.esnouf@sa.gov.au
con.skrepetos@health.tas.gov.au
connor.marshall1@defence.gov.au
connor.moran@infrastructure.gov.au
connor@deeca.vic.gov.au
connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy
[/b]

thanks boss
Reply
#48
(16-12-25, 05:51 AM)FulcrumSec Wrote: UPDATE:  Our patience has run out. Here's the full leaked data set: 


[b]We'll keep adding to this post on a daily basis leading up until the full leak.


---

More dataset stats (and we are still finding more good stuff daily):

  Total Size: 450GB+ (JSON/SQL/CSV)

[/b]
  •   Identities Exposed: 298,425 Unique email addresses + associated data
  •   2,811 Military/Government contacts (20+ countries) + associated data
  •   Deal Records: 428,531 with complete procurement history
  •   Financial Records: Transaction data, payment methods, billing addresses
  •   Google Ads: Full advertising strategy, transaction history, campaign performance
  •   Zoho CRM: MILLIONS of CASES, ORDERS, REFUNDS, CONTACTS, etc.
  •   Outlook email backup: 68 MILLION email messages, complete conversations with customers, issues with equipment (INCLUDING MILITARY ORDERS), troubleshooting, customer PASSPORTS, customer IBANs + OTHER BANKING data.
  •   Gmail: 13.3 MILLION emails, also with the above data and attachments
  •   Order Tracking: Granular order tracking through UPS, Ship24, FedEx (their API key is still active, incredibly) for MILLIONS of order (including to military bases)

As you can see, Raptor's negligence exposed active duty military personnel, diplomatic corps, and critical defense supply chains.

  •   US Air Force: More than 100 Air Force emails, military base addresses, procurement, supply line, etc.
  •   US Navy: Logistics data for USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + base shipping data, supply line, phone numbers, ip addresses, invoices
  •   UK Ministry of Defence: Procurement contacts (Anthony.Furnival235@mod.gov.uk).
  •   Australian Defence Force: Invoices for DSTG and RAAF Base Amberley, ip addresses, addresses.
  •   NATO: Confirmed orders linked to natopart.com.
  •   US Dept. of State: 50+ email addresses, ips, addresses, payment info, at least one PASSPORT SCAN.
As well as civilian gov agencies in those countries + Singapore and elsewhere.

All will be posted here and on our onion site if Raptor doesn't pay up within a week.

[b]To Raptor Supplies: Do the right thing for your customers and NEGOTIATE. Otherwise you'll be forcing our hand.


Currently, we're using reappropriated SMTP accounts to notify their clients of the breach and give them a chance to remove their data from the final leak package IF they send us a screenshot of them contacting Raptor to tell them to PAY UP and/or notify regulators in their country of Raptor's extraordinary incompetence. 

We also are deleting the data of any concerned gov/military/NGO or other such org even if they do not send a screenshot, because the only mistake they made was trusting Raptor, and frankly, we might care more about protecting their data than Raptor does.

For those who are not gov/mil and don't contact Raptor on our behalf, we are going to continue to spam them, again, and again, and again, because we have more than a THOUSAND SendGrid, MailChimp, Brevo, and other mass mailing accounts in our armoury (thanks React2Shell!). And of course, we will eventually leak all of their company's data if Raptor does not comply.

Here's a sample of the gov/mil accounts whose communications, payment data, ip and physical addresses Raptor decided to leave loose on the internet. Just a tiny sample of the NEARLY 3K OF THEM THEY EXPOSED:

claudette.fricot@defence.gov.au
claudia.lawrence@health.nsw.gov.au
clayton.petrie@us.af.mil
clayton.whitehead@infrastructure.gov.au
clement.groepies@capetown.gov.za
cliff.brown@blackburn.gov.uk
clive.williams160@mod.gov.uk
clive.williams@deca.mod.uk
clive.zhu@transport.nsw.gov.au
coco_chew@bca.gov.sg
colin.esnouf@sa.gov.au
con.skrepetos@health.tas.gov.au
connor.marshall1@defence.gov.au
connor.moran@infrastructure.gov.au
connor@deeca.vic.gov.au
connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy
[/b]

crazy nigga
Reply
#49
(16-12-25, 05:51 AM)FulcrumSec Wrote: UPDATE:  Our patience has run out. Here's the full leaked data set: 


[b]We'll keep adding to this post on a daily basis leading up until the full leak.


---

More dataset stats (and we are still finding more good stuff daily):

  Total Size: 450GB+ (JSON/SQL/CSV)

[/b]
  •   Identities Exposed: 298,425 Unique email addresses + associated data
  •   2,811 Military/Government contacts (20+ countries) + associated data
  •   Deal Records: 428,531 with complete procurement history
  •   Financial Records: Transaction data, payment methods, billing addresses
  •   Google Ads: Full advertising strategy, transaction history, campaign performance
  •   Zoho CRM: MILLIONS of CASES, ORDERS, REFUNDS, CONTACTS, etc.
  •   Outlook email backup: 68 MILLION email messages, complete conversations with customers, issues with equipment (INCLUDING MILITARY ORDERS), troubleshooting, customer PASSPORTS, customer IBANs + OTHER BANKING data.
  •   Gmail: 13.3 MILLION emails, also with the above data and attachments
  •   Order Tracking: Granular order tracking through UPS, Ship24, FedEx (their API key is still active, incredibly) for MILLIONS of order (including to military bases)

As you can see, Raptor's negligence exposed active duty military personnel, diplomatic corps, and critical defense supply chains.

  •   US Air Force: More than 100 Air Force emails, military base addresses, procurement, supply line, etc.
  •   US Navy: Logistics data for USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + base shipping data, supply line, phone numbers, ip addresses, invoices
  •   UK Ministry of Defence: Procurement contacts (Anthony.Furnival235@mod.gov.uk).
  •   Australian Defence Force: Invoices for DSTG and RAAF Base Amberley, ip addresses, addresses.
  •   NATO: Confirmed orders linked to natopart.com.
  •   US Dept. of State: 50+ email addresses, ips, addresses, payment info, at least one PASSPORT SCAN.
As well as civilian gov agencies in those countries + Singapore and elsewhere.

All will be posted here and on our onion site if Raptor doesn't pay up within a week.

[b]To Raptor Supplies: Do the right thing for your customers and NEGOTIATE. Otherwise you'll be forcing our hand.


Currently, we're using reappropriated SMTP accounts to notify their clients of the breach and give them a chance to remove their data from the final leak package IF they send us a screenshot of them contacting Raptor to tell them to PAY UP and/or notify regulators in their country of Raptor's extraordinary incompetence. 

We also are deleting the data of any concerned gov/military/NGO or other such org even if they do not send a screenshot, because the only mistake they made was trusting Raptor, and frankly, we might care more about protecting their data than Raptor does.

For those who are not gov/mil and don't contact Raptor on our behalf, we are going to continue to spam them, again, and again, and again, because we have more than a THOUSAND SendGrid, MailChimp, Brevo, and other mass mailing accounts in our armoury (thanks React2Shell!). And of course, we will eventually leak all of their company's data if Raptor does not comply.

Here's a sample of the gov/mil accounts whose communications, payment data, ip and physical addresses Raptor decided to leave loose on the internet. Just a tiny sample of the NEARLY 3K OF THEM THEY EXPOSED:

claudette.fricot@defence.gov.au
claudia.lawrence@health.nsw.gov.au
clayton.petrie@us.af.mil
clayton.whitehead@infrastructure.gov.au
clement.groepies@capetown.gov.za
cliff.brown@blackburn.gov.uk
clive.williams160@mod.gov.uk
clive.williams@deca.mod.uk
clive.zhu@transport.nsw.gov.au
coco_chew@bca.gov.sg
colin.esnouf@sa.gov.au
con.skrepetos@health.tas.gov.au
connor.marshall1@defence.gov.au
connor.moran@infrastructure.gov.au
connor@deeca.vic.gov.au
connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy
[/b]
Reply
#50
(16-12-25, 05:51 AM)FulcrumSec Wrote: MISE À JOUR : Notre patience a atteint ses limites. Voici l’intégralité des données divulguées : 


[b]nous mettrons à jour cet article quotidiennement jusqu’à la publication de l’ensemble des données.


---

Statistiques supplémentaires sur les données (et nous découvrons encore chaque jour de nouvelles informations intéressantes) :

  Taille totale : plus de 450 Go (JSON/SQL/CSV)

[/b]
  •   Identités exposées : 298 425 adresses électroniques uniques et données associées
  •   2 811 contacts militaires/gouvernementaux (plus de 20 pays) + données associées
  •   Enregistrements de transactions : 428 531 avec historique complet des achats
  •   Données financières : données de transaction, modes de paiement, adresses de facturation
  •   Google Ads : Stratégie publicitaire complète, historique des transactions, performances des campagnes
  •   Zoho CRM : DES MILLIONS DE DOSSIERS, COMMANDES, REMBOURSEMENTS, CONTACTS, etc.
  •   Sauvegarde des e-mails Outlook : 68 MILLIONS de messages, conversations complètes avec les clients, problèmes liés au matériel (Y COMPRIS LES ORDRES MILITAIRES), dépannage, PASSEPORTS des clients, IBAN des clients + AUTRES données bancaires.
  •   Gmail : 13,3 MILLIONS d’e-mails, contenant également les données et pièces jointes mentionnées ci-dessus.
  •   Suivi des commandes : Suivi précis des commandes via UPS, Ship24 et FedEx (leur clé API est toujours active, chose incroyable) pour des MILLIONS de commandes (y compris vers des bases militaires).

Comme vous pouvez le constater, la négligence de Raptor a exposé du personnel militaire en service actif, du corps diplomatique et des chaînes d'approvisionnement essentielles à la défense.

  •   Armée de l'air américaine : Plus de 100 adresses électroniques, adresses de bases militaires, approvisionnement, chaîne logistique, etc.
  •   Marine américaine : Données logistiques pour l’USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + données d’expédition de la base, chaîne d’approvisionnement, numéros de téléphone, adresses IP, factures
  •   Ministère de la Défense du Royaume-Uni : Contacts pour les achats (Anthony.Furnival235@mod.gov.uk).
  •   Forces de défense australiennes : factures pour DSTG et la base RAAF d’Amberley, adresses IP, adresses.
  •   OTAN : Commandes confirmées liées à natopart.com.
  •   Département d'État américain : plus de 50 adresses e-mail, adresses IP, adresses postales, informations de paiement, au moins une numérisation de passeport.
Ainsi que les agences gouvernementales civiles de ces pays, de Singapour et d'ailleurs.

Tout sera publié ici et sur notre site Onion si Raptor ne règle pas la dette sous une semaine.

[b]À Raptor Supplies : agissez dans l'intérêt de vos clients et NÉGOCIEZ. Sinon, vous nous forcerez à agir.


Actuellement, nous utilisons des comptes SMTP détournés pour informer leurs clients de la fuite et leur donner la possibilité de supprimer leurs données du paquet final divulgué, à condition qu'ils nous envoient une capture d'écran de leur conversation avec Raptor pour exiger le PAIEMENT et/ou signaler l'incompétence flagrante de Raptor aux autorités compétentes de leur pays. 

Nous supprimons également les données de toute organisation gouvernementale, militaire, ONG ou autre concernée, même sans capture d'écran, car leur seule erreur a été de faire confiance à Raptor et, franchement, nous accordons peut-être plus d'importance à la protection de leurs données que Raptor.

Pour ceux qui ne travaillent pas pour le gouvernement ou l'armée et qui ne contactent pas Raptor en notre nom, nous allons continuer à les spammer sans relâche, car nous disposons de plus de mille comptes SendGrid, MailChimp, Brevo et autres services d'envoi en masse (merci React2Shell !). Et bien sûr, nous finirons par divulguer toutes les données de leur entreprise si Raptor ne coopère pas.

Voici un exemple de comptes gouvernementaux ou militaires dont Raptor a laissé circuler librement sur Internet les communications, les données de paiement, les adresses IP et les adresses postales. Voici un petit échantillon des près de 3 000 personnes qu'ils ont dénoncées :

claudette.fricot@defence.gov.au ,
claudia.lawrence@health.nsw.gov.au ,
clayton.petrie@us.af.mil ,
clayton.whitehead@infrastructure.gov.au ,
clement.groepies@capetown.gov.za ,
cliff.brown@blackburn.gov.uk ,
clive.williams160@mod.gov.uk
, clive.williams@deca.mod.uk ,
clive.zhu@transport.nsw.gov.au
, coco_chew@bca.gov.sg ,
colin.esnouf@sa.gov.au
, con.skrepetos@health.tas.gov.au ,
connor.marshall1@defence.gov.au
, connor.moran@infrastructure.gov.au
, connor@deeca.vic.gov.au
, connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy
[/b]
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)