Nieuw: Lulzsecquote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:Interview with Anonymous ( Anony_ops OR Anon_Central ) : The Hacker News ~ http://www.thehackernews.com/2011/06/interview-with-anonymous-anonyops-or.html
Anonymous is the political movement of change for the 21st century. Anonymous can and certainly will accomplish what many other political and peace movements of the past could not. When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur. We must understand that the Anonymous who strives for political change and world peace must be free to work without the mistrust and misdeeds of others who tarnish their good work. Anonymous is the gift we have been waiting for. Honest and trustworthy persons working hard on our behalf for the betterment of mankind.The Anonymous ,Need of 21st century,
Let’s Talk with Anony_ops ,Now known as Anon_Central on Twitter :
THN : Who is Ryan and what his matter with Anonymous.
Anony_ops : Ryan was a network administrator and unreliable like many others. Basically, we knew Ryan would explode one day. He was like the Yellowstone Caldera, he occasionally had little outbursts and some people who knew him from before warned us that he'd had massive eruptions in the past.
THN : Do you think there are more people like Ryan trying to break the Unity of Anonymous?
Anony_ops : Yes. We have had lots of guys like him in the past and I bet there are still some lurking. But they will not do what he did. In my opinion what he did was stupid and it didn't achieve anything.
THN : Is Anonymous or supporters of Anonymous behind the Sony Hacks?
Anony_ops : Anonymous IRC (AnonOps) is not involved in the Sony hacks although since being Anonymous, many people can create their own bases (cells) and work on their plans. So maybe Anonymous is involved in it or maybe not? We will never know. But I can tell you that they definitely took advantage of the whole OpSony situation. What I would suggest is that whenever Anonymous does something big, we brag about it. The fact that we denied it is a strong indicator that we didn't do it - if we had succeeded in breaking into their servers, we would have been gloating about it all over the internet.
It was quite clear that no one knew what was going on with Sony and Sony blamed us for their shitty security intrusion. Further, the people that actually participated in the intrusion saw that they could use Anonymous as a scapegoat but we would have kept the "Anonymous" tradition and not have left our motto in a single file, we would have left it in something along the lines of 9001 files. So to answer your question, we want a apology from Sony. They have no credible proof that the offenses were committed by "Anonymous" only what some copy cat left there causing confusion in the reports. Because of that we were subsequently harassed by a misguided and misinformed Sony who then started clogging up our servers.
Quote: <evil> some people will take advantage of it for their malicious shit.
THN : Tell us something about the Spanish Revolution
Anony_ops : You better ask this to Spanish Anons, I have no right to answer this because I'm not the right person. Sorry about that.
THN : What are the other operations recently born in various parts of world?
Anony_ops : There are over 9000 operations which are on-going right now. Some are #OpGreece, #OpSpain, #OpSpain, #OpMexico, #OpColombia etc.
Visit our IRC for more details.
THN : Is there any core team of Anonymous or is your every decision and action independent?
Anony_ops : There is no core team of Anonymous. If you are pointing towards Network Operators then well, there are just network operators and they manage all the tech stuff. They don't get involved in Anonymous' work and operations except to keep IRC channels free from trolls, spammers and bot attacks. Our decisions and actions are based upon people's will and teamwork. What we do in IRC is communicate with each other, form a plan and get as many people involved, of course anonymously, and we all vote on a specific action. Seems simple? It's NOT. lol So, our every action is a collective decision.
THN : Everyone knows that Anonymous is against injustice, corruption, and abuse of government power. How much are you satisfied with your own effort regarding this great responsibility?
Anony_ops : I am very much satisfied with what I am doing. What I do is carry the information and expose it to the public which otherwise would be very difficult for the public to get. You can call me a bastard Anon or whatever. I don't give a shit. We only do it for the Lulz. Anonymous is not a secret anymore, in times of pain and suffering, your ignored neighbor could be your helping hands and a light of hope. I think Anonymous represents hope for mankind because people have had enough with these criminal organizations, establishments and governments. They are fed up with their laws and wars. They've sacrificed enough. It's time for people to unite and act as one and what I'm doing is playing some part in that. So I'm very proud. I wish everyone could become Anonymous and serve their fellow brothers and sisters. Being an anon is being yourself first then sharing whatever you can.
THN : Anonymous are basically Activists. Are hackers also supporting you to make it Hacktivism?
Anony_ops : Yes. They work independently and sometimes under certain circumstances they work within the hive. As you well know, aside from the public rally's, Anonymous has also taken part in many online operations, most of which needed the use of hackers to accomplish what was needed. A great deal of Anon's submit themselves to the LOIC Hive, faxing and other methods but some websites, like the US Chamber, needed more then that, which is where the hackers have come in. The fact that they do this is to further our strength as Anonymous, and many of them, whether they have help from the Anon's or they do it single handed, will give full credit to Anonymous, because they feel the cause is just. So yes, to answer your question, hackers are supporting us and with every new operation it gives us a stronger grasp on the "Collective" that is Anonymous.
THN : What are the other issues on your list that may become the next Revolution?
Anony_ops : Operations are dependent upon their motives and their importance. Anyone's free to start any operation but valid ops with valid reasons are supported by all Anons and that's how they move forward.
THN : The issue with NATO and does Anonymous plan something against NATO ?
Anony_ops : In my opinion NATO is just following the footsteps of the Pentagon idiots and the IRC (people) are yet to decide the action to take against them. But we won't fire first!
THN : Major Security Breaches of 2011 are related with Anonymous. Is this diverting the style of Anons work?
Anony_ops : There are so many anonymous cells now that no one can keep track of them. But one thing is for sure, the smegma is out of the bottle... try stopping it. Anonymous is worldwide from every continent and every country. There are literally 100’s of IRCs which are now dedicated to anonymous. I really don't know what the future holds for Anonymous but what I can tell you for sure is I will be tweeting about them.
THN : Any message for the World from THN Platform?
Anony_ops : This is to all human beings on this planet: Share and keep information free because it is our only life line to the future. To the crooks in governments and corporations I can only say, you’re done. There are no more secrets. You can’t hide from Anonymous. We know what you are doing and we have made it our mission to expose you. People from time beginning have fought injustice but they haven’t had the right weapons. We do now. Remember this:
WE ARE ANONYMOUS
ANONYMOUS IS LEGION
WE DO NOT FORGET
WE DO NOT FORGIVE
EXPECT US
quote:Monetary Reform Videos:
Can We Pass on Debt? ...YES!
The Banksters | Our Real Enemy
The Economics of Private Banking
Oh Canada... Our Bought & Sold Land!!
Bill Still's Wizard of Oz Documentary
Private Banking = Financial Armageddon
The Government Can by Tim Hawkins
Support monetary reform and join the team by subscribing and commenting on the creatives you like.
quote:LulzSec posts new 'hotlines' for anonymous hacking requests
Hacker group LulzSec on Saturday (Manila time) posted new numbers for its “request line" where it accepts anonymous hack requests, after claiming that its initial numbers got suspended.
The group’s new numbers, posted on its Twitter account, indicated it may be getting calls from the United States and United Kingdom.
“Our numbers got suspended. Try our new numbers | UK +44 020 8133 9723 | USA (209) 690-7925 | lulz-killers don’t like the lizard talks," it said.
LulzSec, which claimed credit for attacks on Sony and the Central Intelligence Agency, initially set up a request line, featuring what appeared to be a phone number in Ohio.
Also, the group continued with its hacks "by request," claiming to take down tribalwars.net and hackforums.net. Both sites were online as of 1pm on Saturday, however.
"These are kind of lame targets, but we're just doing them from requests. Someone, somewhere, is getting their lulz fulfilled today!" LulzSec said.
Meanwhile, the group clarified that it is not at odds with hacktivist group Anonymous, which has also claimed credit for attacks on several government websites.
“To confirm, we aren’t going after Anonymous. 4chan isn’t Anonymous to begin with, and /b/ is certainly not the whole of 4chan. True story," it said.
Also, the group claimed its members “screw each other over for a jolt of satisfaction."
In a manifesto posted on its website, LulzSec admitted having enemies, but said these are mainly gamers. It also insisted its release of unencrypted usernames and passwords is “funny."
“This is the lulz lizard era, where we do things just because we find it entertaining. Watching someone’s Facebook picture turn into a penis and seeing their sister’s shocked response is priceless. Receiving angry emails from the man you just sent 10 dildos to because he can’t secure his Amazon password is priceless. You find it funny to watch havoc unfold, and we find it funny to cause it. We release personal data so that equally evil people can entertain us with what they do with it," it said.
“This is the Internet, where we screw each other over for a jolt of satisfaction. There are peons and lulz lizards; trolls and victims," it added. — TJD, GMA News
quote:anonops AnonOps
Attention #Media: about #Lulzsec and #Anonymous, we are not at war. We are bros of teh internetz. Also, /b/ != Anonymous.
17 Jun
Klik op de link voor het interview.quote:This is the first in a two-part interview with Aaron Barr, the former CEO of HBGary Federal
Each of us has made mistakes in our lives - woeful errors that we've been forced to learn from at great personal cost. Blessedly, those painful experiences are typically private affairs. Tears are spilled. Mea culpas are issued to those we've wronged, then we, the folks we hurt and the storm clouds move on.
For an unfortunate few, however, blunders go viral. Their mistakes fuel evening news segments and column inches in the pages of leading newspapers. Millions queue up to watch them on YouTube and they get turned over for laughs by late night comedians. Think about lonely Congressman Weiner or that poor woman who, distracted by her cell phone texting, flopped into the fountain at a Kentucky mall.
Aaron Barr, the former CEO of security firm HBGary Federal, is one of those unlucky few. No fountain-flopper, Barr is a respected authority on computer security whose mistake was to openly speculate on the identities of members of the online hacking group Anonymous, then watch as events spun gruesomely out of his control. Infuriated by what they interpreted as an attempt to out them, Anonymous hacked HBGary's servers and made off with tens of thousands of messages from the company's e-mail server, which the group then posted online. Anonymous's preemptive strike put the inner workings of HBGary up for public view. That begot countless other stories - not all of them accurate - as reporters poured over the contents of HBGary Federal's correspondence, Wikileaks style. Their digging turned up troubling communications about the company's plans to assist the U.S. government and various other Beltway interests with online reconnaissance. Before it was all over, no less than Comedy Central titan Stephen Colbert riffed on the controversy. And, not too long after that, Barr tendered his resignation from HBGary Federal.
Since then, Barr has kept his hand in the IT security game, but he's also kept a low profile. On the other side of the fence, Anonymous and related groups, like LulzSec, have become emboldened by their success in the HBGary Federal attack, launching similar attacks on Sony Corp. and Monsanto, the U.S. Senate, the U.S. Federal Bureau of Investigation, the Public Broadcasting System, the federal police in Spain, the government of Turkey and other targets. There have been some arrests, but the core leadership of both Anonymous and the closely related LulzSec remain free.
But the unfortunate events of this Spring haven't bowed the former CEO. And the events of the last four months have, if anything, made him seem prophetic. More than ever, Barr's call for the IT community to focus attention on the individuals behind cyber attacks - not just the technical details of the attacks - rings true. In one of the first interviews he's given since the hack of HBGary Federal in February, Barr talked, by phone, with Threatpost editor Paul Roberts about the hack of HBGary Federal, Anonymous, LulzSec and why most security investments are misplaced.
quote:Submitted by Commander X (not verified) on Sat, 06/18/2011 - 6:05pm.
Wow, where to start !
"You can't release 250,000 sensitive documents into the wild and think you're doing good for society. I don't think you can, because there's no way you can vet all 250,000 documents for whether there's a need to release a specific document and what the blow back to that doc might be."
Barr just doesn't get it. The "blowback", i.e. serious damage to the government being exposed, is THE POINT of the disclosure ! The whole idea is to seriously weaken these governments through disclosure as part of an over all shift of power FROM the governments and TO the people. Any State that fails to grasp this will be destroyed in this war.
And why is there no mention of the fact that his dox of Anonymous was 95% incorrect, thus exposing 100's of completely innocent people to being falsley accused of being associated with Anonymous ? Why is there no discussion of the morality of this idiot spying on private citizens and their online activities ?
This man is an amoral fool, he deserved what was done to him. This article can safely be ignored.
Commander X
Peoples Liberation Front
Nèèèèèèèèèèxt!?!quote:Ook Sega slachtoffer van hackers
AMSTERDAM - De online gamedienst Sega Pass is gehackt. Dat laat gameontwikkelaar Sega weten.
Van gebruikers zijn e-mailadressen, geboortedata en versleutelde wachtwoorden gestolen. De hackers hebben niet de hand kunnen leggen op betaalgegevens van gamers.
Sega weet niet hoeveel mensen de dupe zijn geworden. Het online systeem, waar gebruikers van Sega-games kunnen inloggen, is offline gehaald. De wachtwoorden van alle gebruikers zijn gereset.
Eerder werden Nintendo en Sony slachtoffer van een groep hackers. Gegevens van miljoenen gebruikers werden daarbij gestolen.
quote:cazlab will mockridge
"Incoming 614-@LULZSEC calls now redirect to #HBGary. You take care of the horde while we're gone @AaronBarr, thanks mate. Bye for now" #LOL
quote:trelayne Rojan Seth
To understand why #HBGary is being targeted by #Lulzsec : http://is.gd/8wC1eI
quote:LulzSec en Anonymous werken samen
Laatste update: 20 juni 2011 09:33 info AMSTERDAM – Hackergroep LulzSec gaat samenwerken met activistengroepering Anonymous. De operatie genaamd Operation Anti-Security richt zich op het openbaar maken van overheidsinformatie.
Foto: Thinkstock Dat blijkt uit een verklaring van LulzSec dat de afgelopen weken bekend werd door aanvallen op de servers van Fox, Sony, de CIA en tal van andere websites.
LulzSec wordt omschreven als een aftakking van Anonymous. De groep zou bestaan uit voormalig leden van de activistengroep die zich onder meer heeft bemoeid met de opstand in de Arabische wereld. Zo werden websites van de overheden Egypte en Tunesië aangevallen door Anonymous.
AntiSec
In de verklaring van LulzSec worden andere aanvallers opgeroepen zich aan te sluiten bij het initiatief. De groep vraagt zelfs om de term AntiSec middels graffiti in het straatbeeld te verspreiden.
Ook wil de groep de term op het internet bekendmaken.
Overheidsinformatie
“Het stelen en lekken van geheime overheidsinformatie heeft de prioriteit”, zo schrijft LulzSec. "Doelwitten zijn banken en andere hooggeplaatste sectoren. Als geprobeerd wordt onze actie te censureren, zullen we reageren met meer aanvallen.”
Onder de verklaring staat een viertal links waarvan Wikileaks er een is. Of de organisatie verbonden is aan de actie is echter niet bekend.
De operatie lijkt een overgang te zijn van het stelen en publiceren van gebruikersnamen en wachtwoorden naar het onthullen van gevoelige informatie die overheden liever geheimhouden.
quote:Salutations Lulz Lizards,
As we're aware, the government and whitehat security terrorists across the world continue to dominate and control our Internet ocean. Sitting pretty on cargo bays full of corrupt booty, they think it's acceptable to condition and enslave all vessels in sight. Our Lulz Lizard battle fleet is now declaring immediate and unremitting war on the freedom-snatching moderators of 2011.
Welcome to Operation Anti-Security (#AntiSec) - we encourage any vessel, large or small, to open fire on any government or agency that crosses their path. We fully endorse the flaunting of the word "AntiSec" on any government website defacement or physical graffiti art. We encourage you to spread the word of AntiSec far and wide, for it will be remembered. To increase efforts, we are now teaming up with the Anonymous collective and all affiliated battleships.
Whether you're sailing with us or against us, whether you hold past grudges or a burning desire to sink our lone ship, we invite you to join the rebellion. Together we can defend ourselves so that our privacy is not overrun by profiteering gluttons. Your hat can be white, gray or black, your skin and race are not important. If you're aware of the corruption, expose it now, in the name of Anti-Security.
Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood.
It's now or never. Come aboard, we're expecting you...
History begins today.
Lulz Security,
http://LulzSecurity.com/
Support: http://www.mithral.com/~beberg/manifesto.html
Support: http://www.youtube.com/user/thejuicemedia
Support: http://wikileaks.ch/
Support: http://anonyops.com/
Op de site staat een filmpje.quote:Hackers use Flag Day to protest Federal Reserve
SAN FRANCISCO (KGO) -- Hackers belonging to a group called "Anonymous" wanted to make a statement Tuesday about America's banking system. They pushed for protests in public spaces and online.
Wearing masks and holding signs, a small protest group answered an online call to make Flag Day a time to speak out against big banks.
The group is calling for Federal Reserve Chairman Ben Bernanke to step down, saying he is not doing enough to fix the federal government's ever-rising debt.
In fact, they want to dismantle the fed altogether and hand the authority to print money back to Congress.
"This is not what our forefathers intended for our currency system," one protester said.
"Anonymous" organized the demonstration with a widely circulated YouTube video narrated by a computerized voice.
The gathering it called for is just one of two prongs to this protest. Demonstrators would not talk about the other.
"I know nothing about the denial of service attacks on the website," a protester said.
The second prong of the protest is what experts at CNET compare to a digital sit-in. Instead of occupying a public space, protesters tried to occupy all the available bandwidth to the Fed's website in hopes of knocking it offline.
Tech writer Elinor Mills says in the past few years, so-called "hacktivists" have gathered enough volunteers to successfully bring down much bigger websites, including Visa, MasterCard and PayPal after those companies blocked donations to WikiLeaks.
"Any disruption or protest that they can -- online and offline; that's supposedly what they're after," Mills said.
By late afternoon, the Fed's website was still up -- but running slowly.
And though street demonstrators would not say if they took part in the online attack, one did say, "Maybe it's a good idea, I don't know."
quote:Anonymous announces "The Plan"
Anonymous has gone live with their war against the system called simply, "The Plan". This is a global movement and has three phases. We are just beginning phase one which is simple. PHASE 1: Better yourself. Spread the message. Be the message. Follow me below for more information.
"The Plan" 1 year. 3 phases. A world of change.
Share this message with everyone you can.
PHASE 1: Better yourself. Spread the message. Be the message.
*Educate yourself on the depths of the system, the functions put it place to inhibit true freedom as well as the mechanisms within the system that motivate the masses to subconsciously accept giving up those freedoms. The structures within the system that promote division within the people of the countries of this world and the injustices that are placed upon the people.
*Spread the message. Share this video and the website with everyone you can. Make your own videos, songs, art, graffiti etc... spreading the word that we are here, the movement is taking hold. Expect us.
*Learn ways that will allow you to break free from the system. Start small and implement them in your daily lives. This will be implemented as a focus of Phase 2 as well, escalating what you have learned.
*ANON hackers - begin supporting the movement. This is a calling to all of you for the aid of this movement. Low-priority targets are your engagement. Assist with the movement and spread the message of "The Plan".
The resistance is here.
Expect us.
I urge everyone to take the ten minutes to watch the movie and give it some thought. What we're doing now is not working. We are running out of time. Right now we have the entire world's momentum with us, let's not waste that. There is much work to be done and we need your help to make this planet a better place for everyone to live on. What we need is Solidarity. The people of Greece, Ireland, UK, Turkey, Egypt, Tunisia, Yemen, Spain, Italy, Syria, Bahrain have all decided they no longer can abide by the flagrant disregard the Oligarchy has for the workers of the planet. The time is now for Global Solidarity.
quote:http://www.volkskrant.nl/(...)-aanval-op-CIA.dhtml
Een 19-jarige jongen is gearresteerd op verdenking van het hacken van websites, door de Britse politie en de Amerikaanse FBI. De man zou verantwoordelijk zijn voor digitale aanvallen op onder meer de Amerikaanse inlichtingendienst CIA en de Amerikaanse Senaat.
Ook elektronicaconcern Sony zou tot het doelwit van de hacker behoren. Scotland Yard maakt vandaag bekend dat de man gisteravond in een woning in het zuidoosten van Engeland werd opgepakt. Hij wordt in Londen ondervraagd.
De man zou lid zijn van het hackerscollectief Lulz Security. Die groep eiste de digitale aanvallen van eerder dit jaar op. Volgens het collectief zijn de aanvallen bedoeld om aan te tonen dat de beveiliging van de websites niet afdoende is.
quote:YourAnonNews Anonymous
Ryan Cleary of #Wickford was the person arrested. Previously known for attempting to dox #Anonymous members. No real link to @Lulzsec.
quote:yvonneridley yvonneridley
BREAKING: Alleged computer hacker Ryan Cleary latest thetechherald.com/article.php/20… #anonymous #LulzSec
quote:Unconfirmed: Scotland Yard takes LulzSec member into custody (Update)
Update 3:
Via phone, we were told that the Metropolitan Police Service believes that this is a significant arrest.
When asked if the man in custody is connected to LulzSec or Anonymous, the person we spoke with said that his computer will be examined to determine if he is connected to any such group. Police will not release the man’s name, and had no other comments on the arrest.
Update 2:
The speculation continues. Talk online has named Ryan Cleary, as the 19-year-old arrested by the PCeU.
Earlier in June, Cleary was named in a Pastebin document as “a dissident hacker who attacked AnonOps and was subsequently ‘doxed’.” [Source] [Ryan’s alleged dox are here]
“After the Sony Fiasco led to a drop in support for Anonymous, LulzSec was likely invented to take credit for the hack ex post facto. LulzSec appears to be related to the Ryan Cleary incident, which has already been forgotten,” the document adds.
[ Note: AnonOps is the IRC network were those who associate with Anonymous will sometimes gather. Ryan was a network operator there.]
“Some accuse Cleary of hacking Sony. However, Cleary is not facing any criminal charges and there is no evidence that he exists. AnonOps hackers may have engineered a false flag attack against their own servers under the name of Ryan Cleary, in hopes that the Sony hack would be credited to him. LulzSec is simply the logical conclusion to this chain of events – a hacker group that breaks all the non-existent unwritten rules of Anonymous in order to regain traction after the failure of #OpSony.”
We were present for a chat that included Ryan, shortly after AnonOps was attacked.
Ryan claimed that OpSony and the attack on BMI were going nowhere until he added his support. This support came by way of 5-10,000 bots, out of an install base of 50,000 to pull from. In addition, he added that the use of LOIC to attack targets was just a scam for the public.
“During OpSony we had a maximum of 40 [LOIC canons],” Ryan told us. “The bot shit was kept secret because it'd be bad PR. If they knew it was bots instead of [LOIC], then what’s the point of the public coming in?”
The whole article can be seen here.
On Twitter, one of the names linked with LulzSec, Sabu, said that: "FYI all members of lulzsec are safe. ryan Clearly (sic) has little to do with lulzsec besides running irc.lulzsec.org."
A short time later, LulzSec's account posted: "Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here! Which poor bastard did they take down?"
Update:
A contact at the FBI says that he anticipates that they will have additional information for the press later this afternoon.
Original Article:
Earlier this morning, Metropolitan Police Service announced that they have arrested a 19-year-old man in a planned intelligence operation. The timing of the event has led many in the media to speculate that the man in question is a member of LulzSec.
The arrest comes days after LulzSec launched a DDoS attack against the Serious Organized Crime Agency (SOCA) and the CIA.
The full statement from a Scotland Yard spokesman is below:
Officers from the Metropolitan Police Central e-Crime Unit (PCeU) have arrested a 19-year-old man in a pre-planned intelligence-led operation.
The arrest follows an investigation into network intrusions and Distributed Denial of Service (DDoS) attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.
The teenager was arrested on suspicion of Computer Misuse Act, and Fraud Act offences and was taken to a central London police station, where he currently remains in custody for questioning.
Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material. These forensic examinations remain ongoing.
The PCeU was assisted by officers from Essex Police and have been working in co-operation with the FBI.
At this point, there is no confirmation that the person arrested is a member of LulzSec. However, as the statement said, he was arrested during a sting operation after attacks on intelligence agencies and international businesses.
This is why the media made an immediate jump to name LulzSec, as previously mentioned, they have hit both examples (Sony, FBI, CIA, SOCA) since they arrived in the public eye towards the end of May.
We’ll follow developments on this story and post more information as we get it.
quote:rj_gallagher Ryan Gallagher
Wow!!: #LulzSec hackers claim to have obtained 2011 UK census records of "every single citizen" + will release soon is.gd/1Qtb11
quote:http://pastebin.com/raw.php?i=K1nerhk0
RC: irc.lulzco.org (channel #LulzSec | port 6697 for SSL)
BitCoin donations: 176LRX4WRWD5LWDMbhr94ptb2MW9varCZP
Twitter: @LulzSec
Contact us: 614-LULZSEC
. /$$ /$$ /$$$$$$
.| $$ | $$ /$$__ $$
.| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$
.| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
.| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$
.| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$
.| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
.|________/ \______/ |__/|________/ \______/ \_______/ \_______/
//Laughing at your security since 2011!
Greetings Internets,
We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census
We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release)
Myself and the rest of my Lulz shipmates will then embark upon a trip to ThePirateBay with our beautiful records for your viewing pleasure!
Ahoy! Bwahahaha... >:]
Cap'n Pierre "Lulz" Dubois
LINKS:
http://thepiratebay.org/torrent/6467131/Bethesda_internal_data
BONUS ROUND! SENATE.GOV!
http://lulzsecurity.com/releases/senate.gov.txt
quote:Ross_Lawson Ross Lawson
It's outrageous that #LulzSec plan to release the census details online instead of through the official method: On a laptop left on a train.
twitter:LulzSec twitterde op dinsdag 21-06-2011 om 19:01:07People should keep releasing fake LulzSec stuff. It helps filter out the peon masses from the respectable, fact-checking media outlets. reageer retweet
Disinformation is a wonderfull thingquote:Op dinsdag 21 juni 2011 19:09 schreef PiRANiA het volgende:
twitter:LulzSec twitterde op dinsdag 21-06-2011 om 19:01:07People should keep releasing fake LulzSec stuff. It helps filter out the peon masses from the respectable, fact-checking media outlets. reageer retweet
for sure it isquote:Op dinsdag 21 juni 2011 19:26 schreef Papierversnipperaar het volgende:
[..]
Disinformation is a wonderfull thing
Zou jij moeten weten, iddquote:
yeh ik weet het dat is het punt,, maar jij ??? jij blijf er maar intrappen hequote:Op dinsdag 21 juni 2011 20:25 schreef Papierversnipperaar het volgende:
[..]
Zou jij moeten weten, idd
Ik hoorde dat C_N zijn foto's altijd in scène zetquote:Op dinsdag 21 juni 2011 20:25 schreef Papierversnipperaar het volgende:
[..]
Zou jij moeten weten, idd
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!quote:Op dinsdag 21 juni 2011 20:30 schreef Nibb-it het volgende:
[..]
Ik hoorde dat C_N zijn foto's altijd in scène zet
ow ik wist niet dat dit een gesloten club was, nou dan ga ik er maar snel vandoor ..quote:Op dinsdag 21 juni 2011 20:35 schreef Papierversnipperaar het volgende:
[..]
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!
Nee hoor, maar je bent off-topicquote:Op dinsdag 21 juni 2011 20:38 schreef C_N het volgende:
[..]
ow ik wist niet dat dit een gesloten club was,
quote:nou dan ga ik er maar snel vandoor ..![]()
Als je er toch bent, kan je meteen de OP doorspitten. Propaganda, treiteren, precies jouw ding.quote:maar wel leuk om de verschillende gezichten te zien .
Post er eens iemand anders hier is het weer niet goedquote:Op dinsdag 21 juni 2011 20:35 schreef Papierversnipperaar het volgende:
[..]
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!
quote:Op dinsdag 21 juni 2011 20:40 schreef Nibb-it het volgende:
[..]
Post er eens iemand anders hier is het weer niet goed
No commentquote:Op dinsdag 21 juni 2011 20:52 schreef David1979 het volgende:
Een fantopic voor zielige pubertjes die het leuk vinden om privegegevens online te gooien, tja
NOS Journaal: 1 van de meest gezochte hackers ter wereld!quote:
quote:BarrettBrownLOL Barrett Brown
Computer-assisted disinformation is the next big thing. tinyurl.com/3r8erpm #opmetalgear
quote:http://wiki.echelon2.org:8090/wiki/Cubic_Corporation
Cubic Corporation is a US Military/Defence contractor, with subsidiaries including Cubic Defense Applications Inc, and Cubic Cyber Solutions, Inc. They wholly own cybersecurity corporations Abraxas and Ntrepid. Ntrepid provides Persona Management services to the US government in fulfillment of the contracts issued as part of US CENTCOM Operation Earnest Voice.
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.quote:The hackers hacked: main Anonymous IRC servers invaded
War rages between competing factions within the hacker collective Anonymous after this weekend's drama-filled takeover of the main Anonymous IRC server network. That network, used by Anons to plan and conduct attacks, was taken over by one of its own, an IRC moderator known as "Ryan."
His attack has sparked a debate over the "leadership" of Anonymous.
Hacking the hackers
The main Internet chat servers used by Anonymous have been run by a group called "AnonOps," which provides communications platforms for the group. Pointing IRC clients at anonops.ru or anonops.net would connect anyone to the servers, where they could then join channels like "#OpSony" and participate in various Anon activities.
Though Anonymous is often described as leaderless, factions like AnonOps by necessity have a loose structure; servers must be paid for, domain names must be registered, chat channels must have at least some moderation. Ryan was one of those IRC mods, and this weekend he proceeded with an attack that seized control of the AnonOps servers away from the small cabal of leaders who ran it.
Those leaders include people with handles like "shitstorm," "Nerdo," "blergh," "Power2All," and "Owen"—and if you're paying attention, you'll remember that HBGary Federal's Aaron Barr had fingered Owen as one of three "leaders" of all Anons.
The most popular channel on the old IRC servers now says simply, "anonops dead go home." Ryan also put up a set of chat logs showing Owen and others reacting to the weekend's massive denial of service attacks against AnonOps that culminated in the server takeover. (In the transcript below, "doom" is one of the AnonOps servers.)
Owen -> SmilingDevil: we lost a numbe rof servers last night
SmilingDevil -> owen:we need some more security.
Owen -> SmilingDevil: dude
Owen -> SmilingDevil: it forcved level3 to stop announing a /24
Owen -> SmilingDevil: it was in the gbps range
Owen -> SmilingDevil: doom alone got hit with 1 gb
SmilingDevil -> owen: gigabit or gigabyte?
Owen -> SmilingDevil: all leafs went down
Owen -> SmilingDevil: add it all up
Owen -> SmilingDevil: yeah huge
SmilingDevil -> owen:we need a hidden irc server for the admins.
SmilingDevil -> owen: that only they know about
Owen -> SmilingDevil: um thats called the hub
Owen -> SmilingDevil:
SmilingDevil -> owen: did they take that too?
Owen -> SmilingDevil: but anyhow
Owen -> SmilingDevil: we suffered alot of damage
The "old" leaders released a statement this morning explaining what happened over the weekend and why IRC remained down:
We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named "Ryan". He decided that he didn't like the leaderless command structure that AnonOps Network Admins use. So he organized a coup d'etat, with his "friends" at skidsr.us . Using the networks service bot "Zalgo" he scavenged the IP's and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them (which is why the network has been unstable for the past week). Unfortunately he has control of the domain names AnonOps.ru (and possibly AnonOps.net, we don't know at this stage) so we are unable to continue using them.
Not everyone buys the explanation. One Anon pointed out that the Zalgo bot in question is controlled by a user named "E," not by Ryan.
Second, Zalgo can only see chan msgs and msgs to zalgo. The net staff is saying (pretty much) Ryan used Zalgo to steal server passwords (false, I know server protocol) which were tranfered in channels in plain text for the to see (true).
Third: Take everything AnonOps says with a grain of salt. They're putting out lies and not telling the whole story.
Others pointed out that E and Ryan are friends and that E was actually recommended as an op by Ryan.
However it happened, the end result was that Ryan redirected some of the AnonOps domain names he had control over, he led an attack on the IRC servers with denial of service data floods, and he grabbed (and then published) the non-obfuscated IP addresses of everyone connected to the IRC servers. Ryan apparently also gained root access to the Zalgo network services bot, which is presumably how he harvested the non-obfuscated IP addresses, though it's not clear exactly what Zalgo did or how much access it provided Ryan.
Clashing factions
Ryan is associated with 808chan, a 4chan splinter site and apparent home of the recent denial of service attacks on AnonOps. Ryan is "DDoSing everything that he doesn't own with his band of raiders from 808chan," says one Anon.
The 808 brigade apparently valued big botnets, and made users prove their abilities before letting them participate. AnonOps had a more democratic ethos; anyone could show up, configure the Low Orbit Ion Cannon attack tool, and start firing at Sony or others.
"It's an open network where everyone, mostly newfags can join and not have to prove they're able to wield a botnet and can just join a channel of their choosing, fire up LOIC and hit some organization for reasons they believe are right," said one Anon.
Ryan's control of AnonOps extends to some of the actual domain names, including AnonOps.ru. This wasn't a hack; he was actually given administrative control over the domains some time ago by AnonOps leaders.
One Anon explained the reason for this, saying: "As for the domains, they were transferred to Ryan after some of us got vanned so he can keep the network up. What he did certainly wasn't the plan." (Getting "vanned" refers to getting picked up by the police.)
According to another Anon, the current fight was precipitated when Ryan's IRC credential were revoked. "You morons don't realize Ryan IS LEGALLY THE OWNER OF DOMAINS," he wrote. "Nerdo and Owen removed Ryan's oper, Ryan took domains."
Smoky back rooms?
Among Anons arguing over what happened this weekend, the key debate involves the issue of leaders. Anonymous also said it was leaderless and memberless, but is it? The AnonOps statement above claims that Ryan was angry at the "leaderless" structure of the group and wanted to set himself up as king; again, though, not everyone is so sure.
Owen, for instance, helps to shape the conversation and planning in IRC. One Anon complained privately to me that Owen has booted him from the IRC servers—and thus from the place where all the real work against Sony was taking place several weeks ago. "Owen has not only told me that he doesn't really give a shit about freedom of speech, he's also moderately against the action that's being taken on Sony," this Anon said.
Owen and others conduct some of their work in private, invite-only channels, which leads some Anons to suspect that the really important operations and hack attempts are only discussed in a virtual back room. As one Anon put it yesterday:
"Have you ever been in one of their invite-only chats? This is no bullshit. EVERYTHING is decided on them, the eventual course of the operation, the hivemind's target, the channel's topic, everything. Why all this secrecy? These invite-only chats have NO reason to exist. You want to keep out trolls? Turn on mute, and give voice to a few. At least we can see what is being written."
Others were even angrier. A former AnonOps member wrote:
From the fucking beginning (during the hack at Aiplex which started Operation Payback) there has been an secret club, an aristocracy in AnonOps, deciding how operations will play out in invite-only channels.
It's obvious, for they control the topic, the hivemind, the guides, every single thing behind the scenes.
I don't know if the Owen's current bureaucracy is to be trusted, or Ryan's new delegation (from 808chan!) is.
What I do know is that AnonOps no longer has a good reason to exist. The insane amount of power the channel operators wield, and the reputations gained by their NAMES, causes them to become dictator-like, as "power corrupts".
Why did we leave the comforts of the womb of anonymous imageboards, and end up in name-fagging circlejerks controlled only by a few? Why?
Anonymous, this is bullshit. Neither side, neither Ryan's coalition of hackers nor Owen's bureaucracy can be trusted.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS—it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
On Twitter, some Anons began spreading the word that Ryan had "betrayed" Anonymous, and that he had done so "to mess up all after having stolen PSN credit cards." No evidence for this last assertion was provided.
As the old AnonOps team attempted to get a handle on what had happened—and after they switched to an Indian domain name—they expressed irritation with early media mentions ("fail reporting") of the attack.
"Some 'mainstream' media is calling this the 'insider threat,'" they wrote, "which isn't really a fair representation, AnonOps doesn't have any corporate secrets, its run by the people for the people on a basis of mutual trust. Drama happens almost 24/7, occasionally drama overspills the network.
"Also we must remind the press AnonOps DOES NOT EQUAL Anonymous, saying they are one and/or the same thing in a blog/article just makes you look stupid. AnonOps is just a IRC network and a few other services that ANYONE can use, its not the only place Anonymous gather, and unlikely to be the *last* (see Streisand effect)."
But will the AnonOps leaders ever gather on a forum they don't control? Ryan took great delight in posting the following alleged comment from Owen to another AnonOps leader: "yo odnt honestly think we're goign to some other irc where we have no control do you?"
Of course, Anonymous has always been about drama and "the lulz," so the current confusion may not even bother them that much; this is just par for the course. But it's certainly amusing to others.
"Lmao. You fucking twits can't even keep your shit safe," wrote someone watching the debacle. "This literally made me laugh out loud. Not lol, but laugh. You all are so stupid."
Further reading
Anons commenting on the news (anonnews.org)
Ryan's dump of AnonOps chats (sites.google.com)
quote:Overheid niet voorbereid op cyberaanval
De Nederlandse overheid is onvoldoende voorbereid op een cyberaanval van internationale omvang, die razendsnel een maatschappijontwrichtende crisis kan veroorzaken. Dat blijkt uit een grote oefening die de overheid zelf onlangs heeft gehouden.
Het AD schrijft vandaag dat uit de evaluatie van de oefening blijkt dat het de overheid vooral ontbreekt aan goede coördinatie. Ook lijkt zij slecht doordrongen van de ernstige gevolgen die een cyberaanval kan hebben. Zo kan zo'n aanval ertoe leiden dat hackers het betalingsverkeer platleggen. Maar ook vitale systemen als die van de luchtverkeersleiding op Schiphol of olieraffinaderijen in de Rotterdamse haven, zijn kwetsbaar.
Cybercrises
Bij de grote oefening Cyberstorm III werd nagebootst hoe in Nederland miljoenen computers in handen van hackers komen. Vandaag wordt de Tweede Kamer ingelicht over de resultaten.
Volgens wetenschappers waren de crisiscoördinatoren vooral aan het vergaderen en overleggen. Het ontbrak aan coördinatie en overzicht. 'Nederland is nog onbekend met cybercrises, dat was bij de oefening goed te merken,' zegt hoofdonderzoeker Marcel Quanjel in het AD.
Maatregelen
Staatssecretaris Fred Teeven schrijft de Tweede Kamer dat de overheid door de oefening is gewezen op de 'complexiteit van ict-crises'. Volgens hem zijn er al maatregelen getroffen. Zo komt volgend jaar het Nationaal Cyber Security Centrum in bedrijf. Ook wil Teeven meer oefeningen.
quote:Hunt for hackers of US government sites leads to Essex teenager's bedroom
Police believe Ryan Cleary, 19, had 'significant role' in hacker group LulzSec which is thought to have attacked CIA website
Investigators believe a teenager arrested at his family home in Essex may have been a "significant" figure in a computer hacking group alleged to have staged attacks against websites belonging to the US government, the electronics giant Sony, and an elite British crime unit.
Scotland Yard cybercrime detectives were questioning Ryan Cleary, 19, over the attacks carried out by the LulzSec group, which mostly targeted websites belonging to institutions and companies in the US.
The events leading to the arrest of Cleary involved an investigation by British police and the US Federal Bureau of Investigation. The FBI's involvement, plus the nature of the targets, raised the prospect that Washington may seek the teenager's extradition to the US, just as it did in the case of UFO obsessive Gary McKinnon, a saga that is still ongoing.
LulzSec have attacked the websites of the CIA, the US senate, US broadcasters and, on Monday, the day of Cleary's arrest, the hackers bought down the website of Britain's Serious and Organised Crime Agency (Soca).
LulzSec is believed to have established itself as a formidable splinter group to Anonymous, the hacking group embroiled in the WikiLeaks fallout, with high-profile attacks on the Gawker website in December last year and a devastating assault on the US security firm HBGary in February.
Members of Anonymous claimed in emails to the Guardian that Cleary, though involved, was not the "mastermind" behind any hacking group. "He owned the server which LulzSec used to communicate using IRC [internet relay chat, a bit like instant messenger]."
UK records show that a company called Arcusvoice, which held domain names used to host websites, was registered to Cleary's home address in Wickford, Essex.
"Ryan Cleary was not a mastermind hacker," the email continued. "He could not keep his own personal information safe. He simply provided the means of communication, just like if two people send letters to each other, FedEx/Royal Mail/DHL are the providers of communication."
Cleary's brother, 22-year-old Mitchell, said: "He's not the sort of person to do anything mad or go out and let his hair down or do anything violent. He stays in his room – you'll be lucky if he opens the blinds, but that's just family, isn't it? I barely see him – I'm more of a football person – he's more of an inside person."
Mitchell said his brother had fallen out with people over WikiLeaks: "He used to be part of WikiLeaks and he has upset someone from doing that and they have made a Facebook page having a go at him."
James Rounce, a neighbour of Cleary, said: "They moved in about 10 years ago and have been pleasant neighbours. I think he had been away at university and had come back for the holidays or because he had finished his exams. You could tell he was very bright just from the way he spoke and presented himself."
LulzSec staged two types of attacks. One was hacking into websites, the other was effectively blocking a website from being used, called a denial of service.
As recently as May, the group attacked websites belonging to broadcasters, including Fox and the US public service broadcaster, PBS. LulzSec also claimed credit for an attack on the US X Factor website, which experts believe indicates the relatively young average age of the group.
Earlier this month, LulzSec declared its intention to break into government websites and leak confidential documents. Yesterday it dismissed claims it had staged an attack on the British census.
According to security experts, it is a small and close-knit team – although they probably do not operate in the same country or even time zone. The security firm Imperva believes there are just eight members, including one who orchestrated the attack on the US security company HBGary, and another who can call on the resources of a "botnet" of virus-infected PCs to attack any website on the net.
Researcher Rik Ferguson of security software firm Trend Micro said "it seems to be a tight-knit group – they don't let people join them, they just take suggestions from people of what to target for a hack next."
quote:LulzSec rogue suspected of Bitcoin hack
More than $9m of online currency was stolen in weekend attack on Bitcoin currency exchange that could cost members of Anonymous and LulzSec thousands of dollars each
ore than 400,000 Bitcoins – 6% of all the virtual currency presently in circulation – for an initial price of $17.50 each, which would have netted $7m at a constant price.
But the attempt to sell such a large volume of coins at once drove the value of the currency down almost to zero, before trading on the site was suspended.
More than 60,000 users' details were compromised in the attack and have since been posted publicly in dozens of places across the internet. Trading on the MtGox site has still not been reinstated since the attack, leaving the future of the fledgling currency in doubt.
Bitcoins are produced without the involvement of any governments or banks; instead, they are generated by using software (also called Bitcoin). The idea was created in 2009 by a Japanese programmer.
Bitcoins are not issued by a central authority, but instead generated by a mathematical algorithm after computers complete a certain number of complex calculations.
Some of most experienced members of the Anonymous and LulzSec hacker collectives are believed to have botnets of more than 100,000 compromised computers.
If that many machines were set to work generating Bitcoins, they could create up to $7,500 worth a day for as long as Bitcoins trade at current levels – meaning members of the hacker collectives could be among the biggest losers if Bitcoins' value does not recover as and when MtGox reopens. In the hours before the hack, the total value of the currency in circulation was more than $150m.
Anonymity and security are the central propositions of the currency, which has attracted controversy after being used in sites selling drugs and pornography.
High-profile organisations accepting the coins include WikiLeaks and the US lobby group Electronic Frontiers Foundation, who have suspended their acceptance of Bitcoins in the wake of the hack.
MtGox says access to its site was gained after a financial auditor's computer was hacked, and insists its site was not compromised.
However, Amir Taaki, who runs the rival Bitcoin exchange Britcoin.co.uk, disputes this chain of events. Developers working on his site, which runs on much of the same software as MtGox, found a security hole several days before the hack was carried out. He says MtGox was notified publicly and privately of the issue.
"Due to the recent events at MTGox.com, we at Britcoin have decided to move our servers to a new location," read a Britcoin statement. "MTGox suffered an SQL injection [a form of hacking attack that creates direct access to databases and files] which means access to the site's funds were in the hands of the malicious hacker. As such, until we see evidence to the contrary, for security reasons we are assuming that MTGox has none of its clients' bitcoins."
Other senior coders in the Bitcoin community claim to have been offered the full database of MtGox users days before the hack was carried out. Though they had not verified whether the database was genuine, it came from the same intermediary who has been testing interest in selling or distributing details from the Sega Pass hack.
Members of Lulzsec, the hacker group whose alleged member Ryan Cleary was arrested in Essex on Tuesday, denied responsibility for the Sega Pass hack, as did several members of Anonymous.
The recent spate of hacks denied by both groups – neither of which usually seeks to hide from the limelight – raises the possibility of a third, as yet unnamed, group of hackers carrying out the attacks.
Lulzsec and Anonymous members stand to lose a significant amount of money if Bitcoins fail. Several members of both groups – speaking directly and through intermediaries – claim to know of others using thousands of hacked computers to generate Bitcoins.
quote:A sinister cyber-surveillance scheme exposed
Hacked emails from security contractor HBGary reveal a disturbing public-private partnership to spy on web users
When President Eisenhower left office in 1960, he provided the American people with a warning.
"In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry.
Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and its parent company HBGary.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Despite the details I have provided in the document – which is also now in the possession of several major news outlets and which may be published in whole or in part by any party that cares to do so – there remains a great deal that is unclear about Romas/COIN and the capabilities it comprises. The information with which I've worked consists almost entirely of email correspondence between executives of several firms that together sought to win the contract to provide the programme's technical requirements, and because many of the discussions occurred in meetings and phone conversations, the information remaining deals largely with prospective partners, the utility of one capability over another, and other clues spread out over hundreds of email exchanges between a large number of participants.
The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.
Altogether, the existence and nature of Romas/COIN should confirm what many had already come to realise over the past few years, in particular: the US and other states have no intention of allowing populations to conduct their affairs without scrutiny. Such states ought not complain when they find themselves subjected to similar scrutiny – as will increasingly become the case over the next several years.
Barrett Brown
guardian.co.uk, Wednesday 22 June 2011 19.39 BST
Article history
Ik heb een harde kern van 30 lurkers. En daarnaast gaat het om het principe: We're all Anonymous. Information is free.quote:Op donderdag 23 juni 2011 00:43 schreef Yuri_Boyka het volgende:
Eeh man ik begrijp iets niet, waarom al die moeite terwijl er niemand reageert?
Hoe weet je dat?quote:Op donderdag 23 juni 2011 00:49 schreef Papierversnipperaar het volgende:
[..]
Ik heb een harde kern van 30 lurkers.
quote:FBI takes down legit sites in search of LulzSec
It looks like the blundering efforts of the FBI to try to pin down the likes of LulzSec have caused a bunch of legitimate businesses to go offline.
Reports are emerging that the bungling snoops raided a datacentre in the US yesterday and wandered off with a collection of hardware. The datacentre was run by Swiss firm DigitalOne, which its itself now offline.
DigitalOne’s chief executive, Sergej Ostroumow, was forced to email clients explaining the shenanigans. “This problem is caused by the FBI, not our company," he wrote. "In the night FBI has taken 3 enclosures with equipment plugged into them, possibly including your server - we cannot check it.
“After FBI’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.”
According to the New York Times, the FBI has teamed up with the CIA an other 'law' enforcement agencies around the world in an increasingly frantic attempt to track down LulzSec and its cronies.
In their efforts they seem to be causing as much mayhem as the hackers themselves.
Read more: http://www.thinq.co.uk/20(...)zsec9/#ixzz1Q349eQ6X
Door het analyseren van de beschikbare data.quote:
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
Yep!quote:Op dinsdag 21 juni 2011 22:54 schreef Papierversnipperaar het volgende:
Even een flashback, 10 mei:
Anonops #6: Anonymous en de MO-revoluties
[..]
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.
quote:19 year old Brit arrested for hacking - Ryan Cleary - has been in hacker feuds before
The 19 year old Essex boy who has been arrested by the British police on the request of the FBI has been embroiled in hacker feuds before.
Ryan Cleary of Wickford Essex has been taken into a London police station for questioning about cyber crime. The police will want to talk about the huge hack of Sony earlier this year, attacks on the CIA and a possible though unconfirmed hack of UK Census data in past few days.
So far the group believed to be behind the attacks - LulzSec have denied that Cleary is anything to do with them. They said on their official Twitter:
"Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here!"
Other places, state that he is associated with them and helps to moderate message boards for them.
It could be that Cleary has been turned over to the police by a rival hacker for upsetting other people in the hacking community. Looks like he did that a lot. He was fingered out by Anonymous in May 2011 for bad behaviour, and his personal details were published on a webpage by Anonymous as punishment for trying to force a change in the group's direction. Something that it seems he had been guilty of before back in 2008 when he was only 16, for attempting a DDos attack on Fourchan, the hackers' message boards site.
Even if Cleary isn't directly connected to LulzSec or Anonymous, the group's philosophy encourages other people to take part. So it's possible he or someone else could have acted separately to these main groups...
LulzSec in partnership with Anonymous have declared a widespread operation against governments called #AntiSec. This statement was put in pastebin, and has been tweeted by the official LulzSec account so we believe it to be genuine:
"Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood."
This is going to be great.
Looks like Cleary, was already guilty of pissing off Anonymous - which led to the spill of his personal details onto the internet
quote:Lulzsec hackers take crucial step towards getting laid
Lulzsec computer hackers scored an important victory in their bid to achieve sexual congress with a fellow human being, it emerged last night.
The Brazilian government joined the CIA and the US Senate as the latest victim of the group’s online antics, raising their profile to the point where insecure and emotionally damaged teenage girls might start to think they’re a bit ‘cool’.
Suspected LulzSec hacker 19-year-old Ryan Cleary was arrested in the UK on Monday night following an investigation by Scotland Yard, who told reporters that a “significant amount of crusty material” had been recovered from his bedroom and would now be subjected to forensic examination by officers wearing special gloves.
Mr Cleary’s family expressed disbelief that the self-confessed computer ‘enthusiast’ had anything to do with hacking.
His mother Rita, 45, said her son ‘lives his life online’ but she thought he had spent his time frantically masturbating in his bedroom like any other normal teenage boy.
She added that, as he was led away by police, he told her “whatever you do don’t go in the draw of my bedside cabinet – and I’m only looking after it for a friend!”
Lulzsec arrests
Experts are warning that the stereotypical ‘bad boy’ to which girls are historically attracted might be changing, with a shift away from the truant hot-hatch driving hoodie, to the pasty teenager with a 50MB Internet connection.
Social Anthropologist Sheila Williams told us, “What we are seeing is a definite move towards a sexual relationship for many of these so-called hackers, particularly for those with access to teenage girls with very low self-esteem.”
“If the FBI really want this problem to go away, they should just drop their investigations and put a fraction of that money towards hiring a crack team of highly-skilled prostitutes.”
“Trust me, these guys will no longer be a threat to national security from the very second they realise what a real breast feels like.”
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?quote:
Bepaalde lichaamsvloeistoffenquote:Op donderdag 23 juni 2011 02:31 schreef Yuri_Boyka het volgende:
[..]
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?
Vloeibaar opgeslagen?quote:Op donderdag 23 juni 2011 02:46 schreef Papierversnipperaar het volgende:
[..]
Bepaalde lichaamsvloeistoffen
Ik zou het bericht niet al te serieus nemen.quote:Op donderdag 23 juni 2011 02:51 schreef Yuri_Boyka het volgende:
[..]
Vloeibaar opgeslagen?
En wat is er in dat bericht met onzekere.meisjes?
quote:Massive US-led spy operation on Arab world uncovered
A crowd sourced investigation dubbed Project PM has probed reams leaked emails involving US intelligence companies and uncovered a massive spy operation targeting social media and telecommunications in the Arab world.
The allegations, derived from 70,000 emails stolen from HBGary earlier this year, detailed a project dubbed Romas/COIN, to be proceeded by Odyssey, which could automatically analyse millions of conversations.
The following report has been republished with permission from Barrett Brown, Project PM.
quote:The new revelation provides for a disturbing picture, particularly when viewed in a wider context. Unprecedented surveillance capabilities are being produced by an industry that works in secret on applications that are nonetheless funded by the American public – and which in some cases are used against that very same public.
quote:Website NAVO doelwit van hackers
Een publiekswebsite van de NAVO is het doelwit geworden van onbekende hackers. De site die, geen gevoelige informatie bevat maar, onder meer een webwinkel voor digitale boeken herbergt, is inmiddels afgesloten.
Het bondgenootschap werd door de politie attent gemaakt op het potentiële gegevenslek. De NAVO sloeg de cyberaanval af door de website direct af te sluiten voor het publiek. Abonnees van de dienst zijn op de hoogte gebracht.
De verdediging tegen dit soort aanvallen staat hoog op de agenda bij de NAVO, en is aangewezen als ontwikkelingspunt. In de Estische hoofdstad Tallinn is een centrum ter verdediging tegen cyberaanvallen ingericht. Het centrum zorgt ook voor het herstel zodra hackers toeslaan.
quote:anonops_live Viral Revolution
#anonops : Your Anon News • Greetings, members of NATO. We are Anonymous.: youranonnews.tumblr.com... http://bit.ly/k53Zfc #anonymous
quote:Greetings, members of NATO. We are Anonymous.
In a recent publication, you have singled out Anonymous as a threat to “government and the people”. You have also alleged that secrecy is a ‘necessary evil’ and that transparency is not always the right way forward.
Anonymous would like to remind you that the government and the people are, contrary to the supposed foundations of “democracy”, distinct entities with often conflicting goals and desires. It is Anonymous’ position that when there is a conflict of interest between the government and the people, it is the people’s will which must take priority. The only threat transparency poses to government is to threaten government’s ability to act in a manner which the people would disagree with, without having to face democratic consequences and accountability for such behavior. Your own report cites a perfect example of this, the Anonymous attack on HBGary. Whether HBGary were acting in the cause of security or military gain is irrelevant - their actions were illegal and morally reprehensible. Anonymous does not accept that the government and/or the military has the right to be above the law and to use the phony cliche of “national security” to justify illegal and deceptive activities. If the government must break the rules, they must also be willing to accept the democratic consequences of this at the ballot box.We do not accept the current status quo whereby a government can tell one story to the people and another in private. Dishonesty and secrecy totally undermine the concept of self rule. How can the people judge for whom to vote unless they are fully aware of what policies said politicians are actually pursuing?
When a government is elected, it is said to “represent” the nation it governs. This essentially means that the actions of a government are not the actions of the people in government, but are actions taken on behalf of every citizen in that country. It is unacceptable to have a situation in which the people are, in many cases, totally and utterly unaware of what is being said and done on their behalf - behind closed doors.
Anonymous and WikiLeaks are distinct entities. The actions of Anonymous were not aided or even requested by WikiLeaks. However, Anonymous and WikiLeaks do share one common attribute: They are no threat to any organization - unless that organization is doing something wrong and attempting to get away with it.
We do not wish to threaten anybody’s way of life. We do not wish to dictate anything to anybody. We do not wish to terrorize any nation.
We merely wish to remove power from vested interests and return it to the people - who, in a democracy, it should never have been taken from in the first place.
The government makes the law. This does not give them the right to break it. If the government was doing nothing underhand or illegal, there would be nothing “embarrassing” about Wikileaks revelations, nor would there have been any scandal emanating from HBGary. The resulting scandals were not a result of Anonymous’ or Wikileaks’ revelations, they were the result of the CONTENT of those revelations. And responsibility for that content can be laid solely at the doorstep of policymakers who, like any corrupt entity, naively believed that they were above the law and that they would not be caught.
A lot of government and corporate comment has been dedicated to “how we can avoid a similar leak in the future”. Such advice ranges from better security, to lower levels of clearance, from harsher penalties for whistleblowers, to censorship of the press.
Our message is simple: Do not lie to the people and you won’t have to worry about your lies being exposed. Do not make corrupt deals and you won’t have to worry about your corruption being laid bare. Do not break the rules and you won’t have to worry about getting in trouble for it.
Do not attempt to repair your two faces by concealing one of them. Instead, try having only one face - an honest, open and democratic one.
You know you do not fear us because we are a threat to society. You fear us because we are a threat to the established hierarchy. Anonymous has proven over the last several years that a hierarchy is not necessary in order to achieve great progress - perhaps what you truly fear in us, is the realization of your own irrelevance in an age which has outgrown its reliance on you. Your true terror is not in a collective of activists, but in the fact that you and everything you stand for have, by the changing tides and the advancement of technology, are now surplus to requirements.
Finally, do not make the mistake of challenging Anonymous. Do not make the mistake of believing you can behead a headless snake. If you slice off one head of Hydra, ten more heads will grow in its place. If you cut down one Anon, ten more will join us purely out of anger at your trampling of dissent.
Your only chance of defeating the movement which binds all of us is to accept it. This is no longer your world. It is our world - the people’s world.
We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us…
quote:Dox everywhere: LulzSec under attack from hackers, law enforcement
Hacking group Lulz Security has found itself coming under attack from all angles, drawing unwanted attention from both law enforcement and other hackers groups. Though the group's antics have won it many fans who appreciate LulzSec's anti-establishment leanings, they've also earned plenty of enemies, and those enemies have started to fight back. So far, they've posted LulzSec's "dox"—the names, pictures, and addresses of the people claimed to be the ringleaders of the group.
Since LulzSec first gained prominence, pro-US hacker th3j35t3r ("The Jester") has worked to uncover their identities and embarrass them. th3j35t3r, who has made a name for himself by knocking pro-jihad Web sites offline, has butted heads with Anonymous in the past, opposing the faceless collective's support for WikiLeaks. He worked to disrupt the activities of the AnonOps faction—taking servers offline and revealing names of the participants. Since many of AnonOps' key players moving on to form LulzSec, th3j35t3r's focus has shifted accordingly.
th3j35t3r is staunchly pro-establishment, regarding the LulzSec Distributed Denial of Service attacks on the CIA Web site as terrorism, LulzSec members as bullies, and those who have suffered from LulzSec's antics as victims.
Another group claiming to side with LulzSec's victims and oppose LulzSec's campaign against security organizations are "Web Ninjas". Web Ninjas have posted chat logs and dox of a number of alleged LulzSec members.
LulzSec has also been taking heat from the anti-establishment side of the fence, represented by TeaMp0isoN_. TeaMp0isoN_ members don't care about the victims, don't deny their blackhat status, and don't like law enforcement or security companies. Instead, they're motivated by disdain for LulzSec's methods and public profile—they think that LulzSec are "scene fags." LulzSec's tools have been simple SQL injection and Local File Inclusion vulnerabilities, and botnet-powered Distributed Denial of Service attacks: in TeaMp0isoN_'s view, this is not enough to earn the label hacker.
Beyond publishing information about LulzSec team members, TeaMp0isoN_ defaced the Web site of LulzSec and AnonOps participant joepie91. joepie91's relationship with LulzSec and AnonOps has long been something of an oddity; he's open about his participation in the groups, but continues to argue that he does nothing more than talk, and takes no active role in these groups' illegal activities. Whether active or passive, TeaMp0isoN_ plainly regard him as fair game, and doxed him on Twitter.
Meanwhile, LulzSec has been doing some doxing of its own. In the immediate wake of the arrest of British teenager Ryan Cleary, LulzSec claimed he had nothing to do with their group, that position was later softened, with the acknowledgement that Cleary operated an IRC server that LulzSec uses. Claiming that "snitches get stitches", LulzSec then doxed a coupled of individuals whose leaks of private chat logs and other incriminating data apparently led to Cleary's arrest.
Law enforcement agencies aren't standing still, either. After his arrest on Monday night, British teenager Ryan Cleary has been charged by police with creating and operating a botnet and performing Distributed Denial of Service attacks against the Web sites of the Serious Organized Crime Agency (SOCA, the UK's closest counterpart to the FBI), the International Federation of the Phonographic Industry (IFPI), and the British Phonographic Industry (BPI). He faces a custody hearing tomorrow morning.
For the time being, LulzSec appears to be shrugging off the attacks, continuing to laugh, at least in public, at its accusers. The group promises that it will be publishing more stolen documents on Friday: the first fruit from its "Anti-Security" venture, in which it has sought to attack and embarrass computer security companies and law enforcement agencies.
quote:LulzSec claims attack on US police website
Hacker group says it broke into the computers of an Arizona law enforcement agency and planned to release more classified documents
The hacking collective LulzSec says it has hacked into the website and database of the Arizona Department of Public Safety (DPS) and released details of staff, emails and correspondence on public file-sharing sites.
A number of DPS officers told the Associated Press that they had been inundated with calls to their home and mobile phones from strangers on Thursday night, and that they were trying to change their numbers.
A DPS spokesman confirmed that the agency's computer system had been breached and was taking additional security safeguards that he wouldn't disclose.
The hackers said they had specifically targeted the department in that state because of its tough immigration law "and the racial profiling anti-immigrant police state that is Arizona". Arizona has introduced tough identification laws which have been criticised by President Obama and others. However, they have been frozen due to legal challenges.
But even as the details were being released, pressure was growing on the group from rival hackers unhappy about what they see as a lack of discretion in the choices of its targets. LulzSec has taken credit for hacking into Sony Pictures Europe, a number of games sites including Eve Online and Sega, defacing the PBS website and attacking the CIA website, the US Senate computer systems and the UK's Serious Organised Crime Agency.
The collective said on its website that it was releasing "hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement."
The LulzSec group also said it planned to release "more classified documents and embarrassing personal details of military and law enforcement" every week but it was unclear whether other Arizona agencies were targeted.
Meanwhile rival hackers, including one called The Jester – an ex-US military member – have been concentrating on tracking down the group's website and identifying its members. The Jester said on Twitter on Thursday that he had traced the Lulz Security website to an ISP in Malaysia, and provided a program for people to help track it down.
Other hackers are also trying to gather data about the group, which the Guardian understands was weakened earlier this month after some members worried about the outcome of attacking US government sites. In the UK one man, Ryan Cleary, has been arrested by the police and charged with offences under the Computer Misuse Act relating to attacks on a number of sites including Soca's.
The Maricopa County Sheriff's Office in Arizona was taking unspecified countermeasures to protect its computer system, officials there said on Thursday night.
Manuel Johnson, a spokesman for the FBI's Phoenix division, said the agency was aware of the situation but couldn't comment on whether the FBI was investigating it.
The Arizona Republic reported that experts worked Thursday evening to close external access to DPS' system.
quote:LulzSec IRC leak: the full record
Full text of the chatroom logs of discussions between the hackers involved in LulzSec, aka Lulz Security, reveal the tensions inside the group
quote:Inside LulzSec: Chatroom logs shine a light on the secretive hackers
Leaked IRC logs identify LulzSec members and show a disorganised group obsessed with its media coverage and suspicious of other hackers
It was a tight-knit and enigmatic group finding its feet in the febrile world of hacker collectives, where exposing and embarrassing your targets is just as important as protecting your own identity.
But leaked logs from LulzSec's private chatroom – seen, and published today, by the Guardian – provide for the first time a unique, fly-on-the-wall insight into a team of audacious young hackers whose inner workings have until now remained opaque.
LulzSec is not, despite its braggadocio, a large – or even coherent – organisation. The logs reveal how one hacker known as "Sabu", believed to be a 30-year-old security consultant, effectively controls the group of between six and eight people, keeping the others in line and warning them not to discuss what they have done with others; another, "Kayla", provides a large botnet – networks of infected computers controlled remotely – to bring down targeted websites with distributed denial of service (DDoS) attacks; while a third, "Topiary", manages the public image, including the LulzSec Twitter feed.
They turn out to be obsessed with their coverage in the media, especially in physical newspapers, sharing pictures of coverage they have received in the Wall Street Journal and other papers. They also engineered a misinformation campaign to make people think they are a US-government sponsored team.
They also express their enmity towards a rival called The Jester – an ex-US military hacker who usually attacks jihadist sites, but has become embroiled in a dispute with Anonymous, WikiLeaks and LulzSec over the leaked diplomatic cables and, more recently, LulzSec's attacks on US government websites, including those of the CIA and the US Senate.
In a further sign that the spotlight is beginning to engulf LulzSec, a lone-wolf hacker managed to temporarily cripple the group's website on Friday morning. Originally thought to be the work of The Jester, an activist, known as Oneiroi, later claimed responsibility for the attack but did not provide an explanation.
The group's ambitions went too far for some of its members: when the group hit an FBI-affiliated site on 3 June, two lost their nerve and quit, fearing reprisals from the US government. After revealing that the two, "recursion" and "devrandom" have quit, saying they were "not up for the heat", Sabu tells the remaining members: "You realise we smacked the FBI today. This means everyone in here must remain extremely secure."
Another member, "storm", then asks worriedly: "Sabu, did you wipe the PBS bd [board] logs?", referring to an attack by LulzSec on PBS on 29 May, when they planted a fake story that the dead rapper Tupac Shakur was alive. If traces remained there of the hackers' identities, that could lead the FBI to them.
"Yes," Sabu says. "All PBS logs are clean." Storm replies: "Then I'm game for some more." Sabu says: "We're good. We got a good team here."
Documenting a crucial five-day period in the group's early development from 31 May to 4 June, the logs – whose authenticity has been separately confirmed through comments made online by LulzSec's members – are believed to have been posted online by a former affiliate named "m_nerva". They contain detailed conversations between the group, who have in recent weeks perpetrated a series of audacious attacks on a range of high-profile targets, including Sony, the CIA, the US Senate, and the UK's Serious Organised Crime Agency (SOCA).
LulzSec threatened m_nerva on Tuesday in a tweet saying "Remember this tweet, m_nerva, for I know you'll read it: your cold jail cell will be haunted with our endless laughter. Game over, child." As an explanation, they said: "They leaked logs, we owned them [took over their computer], one of them literally started crying for mercy". The leaked logs are the ones seen by the Guardian.
The conversations confirm that LulzSec has links with – but is distinct from – the notorious hacker group Anonymous. Sabu, a knowledgeable hacker, emerges as a commanding figure who issues orders to the small, tight-knit team with striking authority.
Despite directing the LulzSec operation, Sabu does not appear to engage in the group's public activity, and warns others to be careful who and how they talk outside their private chatroom. "The people on [popular hacker site] 2600 are not your friends," Sabu warns them on 2 June. "95% are there to social engineer [trick] you, to analyse how you talk. I am just reminding you. Don't go off and befriend any of them."
But the difficulty of keeping their exploits and identities secret proves difficult: Kayla is accused of giving some stolen Amazon voucher codes to someone outside the group, which could lead back to one of their hacks. "If he's talking publicly, Kayla will talk to him," Sabu comments, bluntly.
Topiary, who manages the public image of LulzSec – which centres around its popular Twitter feed, with almost 260,000 followers – also acted previously as a spokesman for Anonymous, once going head-to-head in a live video with Shirley Phelps-Roper of the controversial Westboro Baptist Church, during which he hacked into the church's website mid-interview.
His creative use of language and sharp sense of humour earns praise from his fellow hackers in the chat logs, who tell him he should "write a fucking book". On one occasion, after a successful DDoS attack brings down a targeted web server, Topiary responds in characteristic fashion to the hacker responsible, Storm: "You're like our resident sniper sitting in the crow's nest with a goddamn deck-shattering electricity blast," he writes. "Enemy ships being riddled with holes."
But while LulzSec has a jovial exterior, and proclaims that its purpose is to hack "for the lulz" (internet slang for laughs and giggles), Sabu is unremittingly serious. Domineering and at times almost parental, he frequently reminds the other hackers of the dangers of being tracked by the authorities, who the logs reveal are often hot on their heels.
During one exchange, a hacker named Neuron starts an IAmA (Q and A) session for LulzSec on the website Reddit for "funzies" and to engage with the public. This immediately raises the ire of Sabu, who puts an angry and abrupt halt to it.
"You guys started an IAmA on reddit?" Sabu asks in disbelief. "I will go to your homes and kill you. If you really started an IAmA bro, you really don't understand what we are about here. I thought all this stuff was common knowledge ... no more public apperances [sic] without us organizing it."
He adds: "If you are not familiar with these hostile environments, don't partake in it."
The logs also reveal that the group began a campaign of disinformation around LulzSec. Their goal was to convince – and confuse – internet users into believing a conspiracy theory: that LulzSec is in fact a crack team of CIA agents working to expose the insecurities of the web, headed by Adrian Lamo, the hacker who reported the alleged WikiLeaks whistleblower Bradley Manning to the authorities.
"You guys are claiming that LulzSec is a CIA op ... that Anonymous is working to uncover LulzSec ... that Adrian Lamo is at the head of it all ... and people actually BELIEVE this shit?" writes joepie91, another member. "You just tell some bullshit story and people fill in the rest for you."
"I know, it's brilliant," replies Topiary. The attempts did pay off, with some bloggers passing comments such as: "I hypothesize that this is a government 'red team' or 'red cell' operation, aimed at building support for government intervention into internet security from both the public and private sectors."
The group monitors news reports closely, and appears to enjoy – even thrive – on the publicity its actions bring. But the logs show that the members are frustrated by the efforts of a self-professed "patriot-hacker" known as the Jester (or th3j35t3r), whose name is pejoratively referenced throughout.
The Jester is purportedly an ex-US military hacker, and was responsible for high-profile attacks on WikiLeaks prior to the release of US diplomatic cables in November. In recent weeks he has made LulzSec his principal target, describing them as "common bullies". Topiary in turn dismisses The Jester as a "pompous elitism-fuelling blogger" – but the group is always worried that The Jester or his associates are trying to track them down.
The Jester claims LulzSec are motivated by money and points to allegations that the group tried to extort money from Unveillance, a data security company. Similar accusations against LulzSec by two other groups, "Web Ninjas" and "TeaMp0isoN_". Web Ninjas say they want to see LulzSec "behind bars" for committing "insane acts ... in the name of publicity or financial gain or anti-govt agenda".
The logs do not reveal any discussion of extortion between the LulzSec inner circle; nor do they indicate any underlying political motivations for the attacks. But amid the often tense atmosphere depicted in the logs the hackers do occasionally find time to talk politics.
"One of these days we will have tanks on our homes," writes trollpoll, shortly after it emerged the US government was reclassifying hacking as a possible act of war. "Yea, no shit," responds Storm.
"Corporations should realize the internet isn't theirs," adds joepie91. "And I don't mean the physical tubes, but the actual internet ... the community, idea, concept."
"Yes, the utopia is to create a new internet," says trollpoll. "Corporation free."
On Monday 20 June, Sabu's worst fears may have been confirmed when a 19-year-old named Ryan Cleary was arrested in Wickford, Essex and later charged with a cyber attack in connection with a joint Scotland Yard and FBI probe in to a hacking group believed to be LulzSec.
Metropolitan Police Commissioner Sir Paul Stephenson described the arrest as "very significant", though LulzSec itself was quick to claim Cleary was not a member of the group and had only allowed it to host "legitimate chatrooms" on his server.
"Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us," the group tweeted.
An individual named "Ryan" is occasionally referenced by the hackers in the logs, though he himself does not feature and appears to have only a loose association with the group.
Scotland Yard confirmed on Thursday that it was continuing to work with "a range of agencies" as part of an "ongoing investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group".
In response to the leaked logs, LulzSec posted a statement on the website pastebin, claiming users named joepie91, Neuron, Storm and trollpoll were "not involved with LulzSec" and rather "just hang out with us".
They added: "Those logs are primarily from a channel called #pure-elite, which is /not/ the LulzSec core chatting channel. #pure-elite is where we gather potential backup/subcrew research and development battle fleet members – ie, we were using that channel only to recruit talent for side-operations."
The group has vowed to continue its actions undeterred. But they now face a determined pincer movement from the FBI, UK police, and other hackers – including The Jester, who has been relentless in his pursuit of them for more than a fortnight. If its members' real identities are revealed, LulzSec may vanish as quickly as it rose to prominence
quote:A sinister cyber-surveillance scheme exposed
Hacked emails from security contractor HBGary Federal reveal a disturbing public-private partnership to spy on web users
When President Eisenhower left office in 1960, he provided the American people with a warning.
"In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry.
Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and affiliated company HBGary.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Despite the details I have provided in the document – which is also now in the possession of several major news outlets and which may be published in whole or in part by any party that cares to do so – there remains a great deal that is unclear about Romas/COIN and the capabilities it comprises. The information with which I've worked consists almost entirely of email correspondence between executives of several firms that together sought to win the contract to provide the programme's technical requirements, and because many of the discussions occurred in meetings and phone conversations, the information remaining deals largely with prospective partners, the utility of one capability over another, and other clues spread out over hundreds of email exchanges between a large number of participants.
The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.
Altogether, the existence and nature of Romas/COIN should confirm what many had already come to realise over the past few years, in particular: the US and other states have no intention of allowing populations to conduct their affairs without scrutiny. Such states ought not complain when they find themselves subjected to similar scrutiny – as will increasingly become the case over the next several years.
• Editor's note: The headline and photo caption in this article originally alluded to HBGary. HBGary Federal is the company in question, which is a distinct entity from HBGary Inc. The article has been amended to make that clarification at 9am (BST) on 23 June 2011
Asperger, vrijspraak, next.quote:Hacking suspect Ryan Cleary suffers from austim, court told
Teenager accused of hacking offences during probe into LulzSec group has been diagnosed with Asperger's syndrome
The British teenager accused of bringing down the website of the Serious Organised Crime Agency (Soca) has been diagnosed with Asperger's syndrome, a court has heard.
Ryan Cleary, 19, of South Beech Avenue, Wickford, Essex, was arrested as part of a Scotland Yard and FBI probe into hacking group LulzSec.
His lawyer told City of Westminster magistrates court on Saturday that Cleary has the form of autism, along with agoraphobia.
District judge Nicholas Evans heard that Cleary's condition had been diagnosed by a psychologist.
Cleary did not enter any plea to the five offences under the Criminal Law and Computer Misuse Act with which he is charged.
He was granted bail but remains in custody after prosecutors objected. An appeal will be heard at Southwark crown court on Monday. The teenager spoke only to confirm his name and to say that he understood the proceedings.
He was arrested at his family home on Monday as part of a Scotland Yard and FBI probe into LulzSec, a group that claims responsibility for hacking attempts on Soca, the US Senate and the CIA.
He is charged with conspiring with other people on or before 20 June to create a remotely controlled network of zombie computers, known as a "botnet", to carry out distributed denial of service (DDoS) attacks, where websites are flooded with traffic to make them crash.
He is alleged to have carried out similar attacks against the British Phonographic Industry's website on 29 October last year and the International Federation of the Phonographic Industry's website on or before 20 June.
Cleary's case has parallels with that of Gary McKinnon, who has Asperger's and is fighting extradition to America over allegations of hacking into US military computers.
Het artikel gaat verder, veel verder....quote:LulzSec leaks Arizona law enforcement papers (Updated with excerpts)
LulzSec announced Thursday evening the publication at Pirate Bay of a trove of leaked material from Arizona law enforcement agencies. Arizona's Department of Public Safety confirmed shortly thereafter that it was hacked.
In the press release included with the dump, a LulzSec affiliate outlines a more activist agenda than is usually associated with the group.
We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.
The documents classified as "law enforcement sensitive", "not for public
distribution", and "for official use only" are primarily related to border
patrol and counter-terrorism operations and describe the use of informants to
infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest
movements.
Every week we plan on releasing more classified documents and embarassing
personal details of military and law enforcement in an effort not just to reveal
their racist and corrupt nature but to purposefully sabotage their efforts to
terrorize communities fighting an unjust "war on drugs".
Hackers of the world are uniting and taking direct action against our common
oppressors - the government, corporations, police, and militaries of the world.
See you again real soon! ;D
With more than 700 bulletins, email archives, images and other files, the 440MB package will keep readers busy for days. A few excerpts from the most obviously newsworthy documents follow.
Amid countless AZDPS emails covering subjects ranging from internal training, policies, events and goings-on in the criminal underground, this remarkable circular:
"BELOW ARE PICTURES TAKEN AFTER A RAID ON A DRUG DEALER'S HOUSE IN MEXICO. ARE YOU READY FOR THIS???AREN'T WE GLAD THAT WE HAVE AN OPEN BORDER POLICY BETWEEN US? JUST LOOK AT HOW WELL ITS PAYING OFF........ I THINK ALLOWING MEXICAN TRUCKERS IN THE U.S. IS A GREAT IDEA!!! JUST TAKE A LOOK AT THE MILLIONS OF REASONS WHY......... SEE HOW WELL THESE TRUCKERS ARE DOING? WHAT THE @#@%*@ ARE WE THINKING??? Notice that nearly 100% of this money is U.S. Currency!!! Do you now wonder why the cost of living has catapulted in our country??? I don't...... Some of the illegal aliens we're letting in can afford anything at any cost!!! And for the ones who cannot........ We'll give it to them anyway!!!AND WE HAVE TWO BORDER PATROL AGENTS IN PRISON FOR SHOOTING AND WOUNDING A WELL DOCUMENTED MEXICAN DRUG DEALER! WHO, BY THE WAY, WAS ARMED AND ALSO HAPPENS TO BE A CONVICTED (BY MEXICO) MURDERER . MAKES A LOT OF SENSE, DOESN'T IT??? AUTOMATICS, SILENCERS...... THEY'RE ALL HAVING A NICE LAUGH ABOUT THIS STUFF AT OUR EXPENSE!!! And we want to give ILLEGAL ALIENS amnesty and not build the border fence because of funding!?!?!? SEND THIS TO EVERYONE, INCLUDING YOUR LOCAL CONGRESS REPRESENTATIVE. Our country is bleeding from the outside in!!! Don't you think it's time we take back what WE have sacrificed for over 140 years for??? I do. Build the fence higher and deeper, tighten border control, and send EVERY illegal alien home!!!"
In another email, there's discussion of the Mexican government using recently-bought radio gear to intercept U.S. communications:
"The FBI asked the Mexican Government to sign an "Intercept Agreement" stating that they would not use these devices to listen to U.S. Government radio traffic, and the Mexican Government declined to sign the agreement. The implication is that obviously the Mexican Government intends to do a lot of listening."
quote:50 Days of Lulz
Friends around the globe,
We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us.
For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others - vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It's what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself.
While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn't that interesting to know? The mediocre painter turned supervillain liked cats more than we did.
Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve.
So with those last thoughts, it's time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.
Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon.
Let it flow...
Lulz Security - our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe
------------------------------------------------------------------------------------------------------
Our mayhem: http://lulzsecurity.com/releases/
Our chaos: http://thepiratebay.org/user/LulzSec/
Our final release: http://thepiratebay.org/torrent/6495523/50_Days_of_Lulz
Please make mirrors of material on the website, because we're not renewing the hosting. Goodbye. <3
Waarom post jij ze niet?quote:Op zondag 26 juni 2011 01:15 schreef David1979 het volgende:
Volgens mij ben je een paar artikelen vergeten, game over voor je vriendjes
quote:Cops’ Crackdown on LulzSec Motivated by Embarrassment, Not Danger
Out of all the computer hackers in the world, the cops are fixated on Lulzsec. Not because they’re the most dangerous but because they’re the most embarrassing. They are also the most helpful. Priorities?
So far the group has by its own admission hacked: Sony (who hasn’t?), the Central Intelligence Agency, the U.S. Senate, Nintendo, the U.K. Serious Organised Crime Agency and National Health Service, the online game Brink, the Brazilian government, PBS and Fox (a bipartisan organization). Some of these attacks have involved taking records, others have been denial of service attacks and still others have just messed with the appearance of websites. (My fave is the “Tupac lives” story on PBS.)
What it has not done - as best as can be determined - is used its skills or the information it has gathered for personal profit. LulzSec turned down a reward from the security firm Berg & Berg which offered $10,000 to anyone who could change a picture on its website. Once the picture was changed LulzSec left a message saying it was easy to do. “Keep your money, we do it for the lulz.” (In case you don’t know, lulz is cyber slang for laughs. Ask any teenager.)
All hackers are not created equal
Judging by its behavior LulzSec is acting in the manner of the classical definition of the word, “hack”: Committing clever pranks or practical jokes. The group’s activities all support its claim that it is mainly interested in demonstrating that most online security is laughable:
This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn’t released something publicly. We’re sitting on 200,000 Brink users right now that we never gave out. It might make you feel safe knowing we told you, so that Brink users may change their passwords. What if we hadn’t told you? No one would be aware of this theft, and we’d have a fresh 200,000 peons to abuse, completely unaware of a breach.
So why are the authorities so determined to get Lulz? Because they’ve been embarrassed, because so far they’ve failed to get the WikiLeak’s loving Anonymous group and because — as far as can be told — they’ve failed to get any of the groups or people who are clearly making money from stealing information, i.e. criminals. (Whether Anonymous belongs in that last category is open to debate.)
Yesterday British police arrested Ryan Cleary, 19, and alleged he was a “significant” figure in LulzSec. The group responded in a post on its Twitter feed alleging that Cleary was not a member but, “We house one of our many legitimate chatrooms on his IRC server.” Since then the media has been filled with reports that the arrest was part of an international crackdown on the group.*
Cleary is the sixth Brit arrested in connection with the recent hacking attacks. He joins five arrested in January on suspicion of being involved in Anonymous. None of them have been charged, which may indicate something about the strength of the government’s case.
If the authorities around the world are going after LulzSec it is a waste of time and resources. These are better used going after actual threats (like groups extorting money from corporations) or maybe even improving computer security.
Photo: WikiCommons
*Because these are exactly the things you would expect these groups to say under the circumstances, it would be wise to take all these allegations with a lot of salt — and some tequila. “It is hard to believe that a man is telling the truth when you know that you would lie if you were in his place.” - H.L. Mencken
Read more: http://www.bnet.com/blog/(...)er/685#ixzz1QKhDcETE
Je bent gewoon lui.quote:
Nog steeds lui, linkdumper. Maak er dan een artikel van.quote:Op zondag 26 juni 2011 01:25 schreef David1979 het volgende:
[..]
Liever lui dan moe, maar vooruit:
http://lulzsecexposed.blogspot.com/search/label/Lulzsec
Dat zei Aaron Barr ook tegen z'n moeder.quote:Op zondag 26 juni 2011 01:30 schreef David1979 het volgende:
ja dat zei ik toch, liever lui...
kwestie van tijd
We zullen zien.quote:
Email, passwords, usernames, etc.quote:Connexion's First Hack
Dear Internetz,
My name is Connexion. I have hacked your website, http://www.pchardware.ro because it needed
to have a checkup with the SecDoctor. I have found many errors with your website and agree to tell
them to you via twitter, @Connexion_Lulz. I also want everyone reading this to note that it was me
who hacked them, and not some random person who copied everything and said it was theirs. I want you
to know that a simple MySQli should be prevented.
*NOTE* If you are wondering this is the 1st website that I have hacked. */NOTE*
Yes, I do look up to @LulzSec and @LulzRaft and hope that someday I can say that I am part of their
group taking down the internet one crappy security at a time. To prove that I hacked your website,
I provided a table below of all the usernames, emails and hashed passwords. To decrypt the passwords
go to http://passcracking.com and decrypt it. Some passwords can't be decrypted at the moment and that's
all good (Get Cain & Abel for that). Now, I have taken the liberty to put aside all interessing users to the
right. One has a .gov email so maybe governement :S and also there are the MD5 Hash Passwords too. So you can
tell that they switched from MD5 to whatever they use now. Also there is adultwomenmasturbating@google.com
which makes me LULZ all the time.
*ALSO NOTE* That most people use the same password for everything so check facebook and send SS! */ALSO NOTE*
So that is all I have to say at the moment. Please enjoy and definently talk to me on Twitter.
Regards,
_____ ______ _____ _____ _______ \ / _______ ______ _____
| | | | | | | | \ / | | | | |
| | | | | | | |______ \/ | | | | |
| | | | | | | | /\ | | | | |
_____ ______ | | | | |______ / \ ___|___ ______ | |
*ALSO ALSO NOTE* That these are not all of the users. They have 9257 users and i just don't want to take that long editing it. */ALSO ALSO NOTE*
=====================User Data=====================
quote:Why arresting lulzsec won’t change anything
Federal law enforcement agencies from around the world have been working to arrest members of the group known as lulzsec. Love them or hate them lulzsec has changed how the public views hackers and hacking. It has brought more attention to the cyber world and the cultures that develop there, and they have changed how some hackers operate Instead of quietly hacking smaller websites or targets of personal interest, they hack or attempt to hack government targets and post about it on social network and public chat rooms. Lulzsec declared war on the US Government and others like them have answered the call to arms. By doing this lulzsec has ensured that even if they themselves are caught their cause will live on without them, in fact if caught this would only likely motivate their followers further.
These “daughter groups” seem based on their region , on twitter I have seen “lulzsec” based groups for brazil and there have been reports of graffiti tags showing the word “antisec” and lulzsec’s mascot image in San Diego, I do not know how many other groups such as this are out there, but considering lulzsec’s over 200,000 twitter followers the number could be significant. Considering law enforcement’s history with dealing with cell based groups if they seriously want to stop the antisec movement they are going to need a different approach than the one they are currently taking, fighting them directly is only going to expand the antisec movement and fuel its anger.
Right now lulzsec and its allies have the advantage because their operation is popular and costs very little to operate but does a significant amount of damage, while Government forces cost significant amounts of money to train and operate and do very little damage. Considering how slow that governments are to adopt change, even when it directly benefits them lulzsec and its allies will be at this for quite some time.
If the governments were truly serious about stopping this threat they would work to defuse the anger and outright hate people feel toward the government these days, they would take steps to show people that they are not the bad guys and stop taking such a hard approach. They would pay more attention to public perceptions and address the issues that people have in a honest and transparent manner, being answerable to the public when questions are asked. For example there may be a perfectly rational explaination as to why the FBI took servers that didn’t seem to have anything to do with lulzsec from DigitalOne, but the people will never know why because they won’t comment, and when they do people feel like what they are told does not really explain anything, so without answers from official sources right away, people will just draw logical conclusions based on the available evidence , and said evidence makes it look like the FBI has no idea what it is doing and they have good reason to believe that.
As of late the governments actions in public have been disastrous and it has gotten to the point where people feel compelled to act to stop it. People feel like their rights are being stripped away and that they have no control over their own private lives. They are afraid. So when someone comes along and is not afraid, and not only not afraid but willing and able to act against the target of their fears, they rally around them and support them, feeling less afraid to act themselves, and after enough time they lose all fear of any legal repercussions because they believe they are morally right. This is the point we are at right now, they have motivated and emboldened people that the government has alienated and ignored. Stopping lulzsec won’t stop antisec, in fact it will likely do the opposite. The game has been changed, and right now the only winning move is not to play.
quote:Web censorship moves West
While few may object to blocking access to child pornography, online restrictions set dangerous precedent.
For a long time, the dominant conversation around internet censorship has focused on two of the practice's giants: Iran and China.
Arguably owners of the most sophisticated filtering methods, the criticism levied against these two countries has been deserved. And yet, the focus on them has largely been at the exclusion of other countries that also censor the web to varying degrees - including an increasing number of democracies.
In recent weeks, Turkey, Tunisia, and Australia have all made headlines for their various plans to introduce new filtering schemes. Though each country's plan differs, they all have similar focus: curbing access to obscene content.
But while blocking obscenity may reflect the will of the people, such filters nonetheless have implications for freedom of expression.
Australian ISPs 'aim to curb child sexual abuse'
In Australia, after several failed attempts by the government to introduce a mandatory filtering scheme, several Australian ISPs have taken matters into their own hands, blocking access to a list of 500 sites.
The ISPs will base their blacklists on a list maintained by the Australian Communications and Media Authority (ACMA), as well as - according to News.com.au - "child abuse URLs that are provided by reputable international organisations".
In 2009, a copy of the ACMA's blacklist was published by WikiLeaks, and was found to include the website of a Queensland-based dentist, a handful of Christian sites, and some YouTube videos - as well as adult sites deemed to be legal in Australia.
Such errors raise questions amongst free expression advocates about the lack of transparency in the process of determining which sites will be banned. There is also concern that there appears to be no appeals process by which to challenge sites banned by the ISPs.
Tunisia blocked pornography by court order
For years, Tunisia stood along with China and Iran as one of the world's most strict online censors. Following the January 2011 popular revolt, however, internet filtering became obsolete for a time.
Shortly thereafter, a military tribunal moved to block a handful of sites, including all individual Facebook profiles or pages.
The latest measure to block sites in Tunisia comes after a group of conservative lawyers filed a legal case to "impose the blocking of pornographic content". The Tunisian Internet Agency at first refused to implement the order and sought a stay of the ruling, but on June 13, the motion was denied and the Agency was forced to comply with the order.
The decision was met with derision by many Tunisians, some of whom protested on the grounds of personal freedom or concern that filtering any type of content would open the doors to further censorship; while others felt that the debate distracted from more important issues in the fledgling democracy. Still, some others were in support of the ban.
Turkey's four-pronged approach
Turkey's proposed filtering scheme has raised ire across the country, with citizens marching in the streets against censorship.
Though the scheme is meant to offer four opt-in layers of filtering - from "standard" to "children" - Turkish citizens realise they have plenty to lose. After all, the government has blocked YouTube and WordPress, among various other sites, for containing content deemed insulting to "Turkishness".
Meanwhile, Turkey's Law on the Internet #5651 allows any party to petition a court to block content for a range of reasons - including alleged defamation. Some Turkish analysts believe that the law is easily abused.
Furthermore, a 2009 report from the Organisation for Security and Cooperation in Europe highlighted that 80 per cent of Turkey's banned sites had been blocked at the behest of administrative decisions, rather than court rulings.
Though the new system's "standard" option will come without new filtering, there is no word as to whether already-blocked sites will remain banned.
Filtering is futile
While filtering - when conducted in the home or other private space - can be a good thing, such as preventing children from inadvertently accessing obscene or other undesirable content, government-level filtering does more harm than good.
Not only is it probable - and quite common - for "benign" sites to get caught up in content filters, blocking a certain type of content does not necessarily mean that such content ceases to exist; and in the case of child pornography, blocking may simply force such content "underground", to peer to peer and other private networks where perpetrators are more difficult to catch.
Filtering at the government or ISP level is costly, yet can be easily circumvented with minimal tech savvy, using widely available proxy tools.
Most problematically, setting a precedent of blocking websites simply makes it that much easier for a government or ISP to extend filtering as they wish.
While few might object to blocking child pornography, what happens when the filters go after politically sensitive content? Will anyone object then?
quote:2011-06-25 WikiLeaks Notes: Latest News on #Cablegate Releases, #WikiLeaks & More
This is a "WikiLeaks News Update," constantly updated throughout each day. The blog tracks stories that are obviously related to WikiLeaks but also follows stories related to freedom of information, transparency, cybersecurity, freedom of expression, and sometimes the national security establishment of the United States because each issue/topic helps one further understand WikiLeaks and vice versa. All the times are GMT.
Daar zit wat in natuurlijk, maar doet me een beetje denken aan die andere 'cell based' groep waar ze op dit moment tegen vechten en waarvan ze recent de leider hebben doodgeschoten.quote:Op zondag 26 juni 2011 10:49 schreef Papierversnipperaar het volgende:
Lulzsec declared war on the US Government and others like them have answered the call to arms. By doing this lulzsec has ensured that even if they themselves are caught their cause will live on without them, in fact if caught this would only likely motivate their followers further.
< >
Considering law enforcement’s history with dealing with cell based groups if they seriously want to stop the antisec movement they are going to need a different approach than the one they are currently taking, fighting them directly is only going to expand the antisec movement and fuel its anger.
< >
If the governments were truly serious about stopping this threat they would work to defuse the anger and outright hate people feel toward the government these days, they would take steps to show people that they are not the bad guys and stop taking such a hard approach
Het is gebruikelijke propaganda om de weerstand tegen een regime (US, Ghaddafi) aan te grijpen als excuus om nog harder te onderdrukken.quote:Op zondag 26 juni 2011 11:16 schreef David1979 het volgende:
[..]
Daar zit wat in natuurlijk, maar doet me een beetje denken aan die andere 'cell based' groep waar ze op dit moment tegen vechten en waarvan ze recent de leider hebben doodgeschoten.
Waar ze ook van weten dat die leider weer gewoon wordt opgevolgd en al is opgevolgd. Maar ze passen ze hun beleid niet aan, sterker, ze gooien er nog een schepje bovenop.
Inderdaad, daarom geloof ik ook niet echt in de theorie van de artikel schrijver, hoewel hij zeker een punt heeft.quote:Op zondag 26 juni 2011 11:28 schreef Papierversnipperaar het volgende:
[..]
Het is gebruikelijke propaganda om de weerstand tegen een regime (US, Ghaddafi) aan te grijpen als excuus om nog harder te onderdrukken.
there is morequote:Lulzsec & The Jester Expose each other, Long Live Anonymous ! : The Hacker News ~
Lulz war ! Today Hacking group "Lulzsec" completed their 50th day and also announce the retirement of Lulz boat. What are the Reasons behind this ? Lulz Security's rise to prominence has been extraordinarily fast.The hacking group first emerged in May and in the past few weeks has attacked the websites of some of the world's leading corporations and governments. The group specialises in locating websites with poor security and then stealing information from them and posting it online via Twitter account, well They have 278,429 Followers]in 50days.
To understand who/what lulzsec is, you need to understand where they came from. Everything originates from the chan (4chan/711chan/etc.) culture. It's a culture built around the anonymity of the internet. If your anonymous no one can find you. No one can hurt you, so your invincable.
According to Anonymous "The problem with Lulzsec is that they lack the skills to keep it going. As such after SONY they couldn't get into anything. So they switched their focus to just releasing random crap that didn't mean anything. Then they started running out of things they could hack. So they put out requests for people to join them. That got them a few hits, and now they've switched their gears again to be ANTI-SEC".
Sabu (Leader of Lulzsec) and Topiary are the only two people updating the twitter and releasing stuff. The gn0sis kids are gone in hiding somewhere. So the team include :
Sabu, Topiary , Kayla , gn0sis , Uncommon, EEKDACAT.
LULZSEC skills : We have seen that Lulzsec mostly hack random targets which are vulnerable and easily available on net via google Dorks. Now just check the Defacement section of "The hacker news" , you will get so much talented hackers of world, Then why these guys not having millions of followers ? Why these Indian, Pakistani and Albanian hackers don't get attention of Big media ? Its all because their aim was not to get Fame, they are testing their own skills and Learning from real world or whatever the other Reasons of hacks. Even PBS (Public Broadcasting Service) & Writerspace Hacked Again by Warv0x (AKA Kaihoe) . According to Warv0x (AKA Kaihoe) "This wasn't done for fame or fun,just proving LulzSec aren't as goodas they think they are. I haven't rooted the box or been up to crack the hashes, I'm just proving that most of their attacks are very lame and basic (i'm pretty sure and automated) SQL injections and further privilege escalation, which is just matter of time." He also said "Support for WebNinjas & Jester, good job at exposing them.Sad to mention, but I really agree with th3j35t3r & WebNinjas - LulzSec are just a bunch of script kiddies..."
klik voor meer.quote:“Anonymous Anti-fascists” Hack Several White Supremacist Websites Including newp.org
Stuff like this just puts a smile on my face. It has comes to my attention that www.newp.org, the website for the “North East White Pride” organization, as well as other sites belonging to them have been hacked. Here is part of what the hackers, describing themselves as “Anonymous Antifascists”, defaced newp.org with:
The hackers defaced the websites with a statement. They also released home addresses, phone numbers, email addresses, usernames and passwords and email correspondences of the administrator of the site, Robert O’Donovan. Here is the statement from the antifascists in full:
“——————————————————————————–
FOR A WORLD WITHOUT BORDERS, PRISONS, AND RACIST HATRED – SMASH WHITE SUPREMACY!
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
#opblitzkrieg #anonops #lulzsec #operationpayback #totaldestroythursday
——————————————————————————–
FOR IMMEDIATE RELEASE
Anonymous Anti-Fascist Hackers Deface White Supremacist Websites, Drop Dox
A Mob of Anonymous Anti-fascist hooligans hacked into several white supremacist
websites belonging to North East White Pride(newp.org), Local 1488 Store
(local1488.com), Racist-Jokes.com, and more, defacing with anti-racist messages
and leaking private information. We’re dropping usernames, passwords, home
addresses and phone numbers of over 1000 active nazis in the US. We also spammed
35,000+ nazi emails with this message to make them sleep a little less easy at
night. We did this to expose and disrupt the racist scum who associate with
their white supremacist group and purchased items from their online Nazi store.
Just two weeks ago the webmaster Rob O’Donovan and his racist organization North
East White Pride attempted to hold a white supremacist gathering in the
Worchester Public Library but instead were greeted with a dozen antifa who burst
into their meeting black-clad-bandana’d-out and beat the nazis down with chairs
and u-locks. A week later, they obviously didn’t get the hint to cut the nazi
shit, so we had to own them hardstyle when a week later they attempted to hold
an anti-immigrant “Close The Border” rally.
Detailed private information about Rob was leaked including confidential emails,
online store transactions, phone and address information for him as well as the
thousands of nazis who purchased items from his store local1488.com. The leaked
emails revealed Rob was working with Detective Andrew Creed from the Boston
Police Intelligence Unit who regularly “made sure that your group was able to
get their message out in a safe manner” against “problems with ‘antis’ showing
up”. Rob also runs Tea Party websites regularly bringing other nazis to Tea
Party rallies further demonstrating the connections between “mainstreamized”
racists in the Tea Party and violent neo-nazi extremists.
We believe in militant direct action to smash white supremacy, expose them to
their communities, confront them at their jobs and homes, and disrupt their
organization’s ability to conduct meetings/rallies, distribute their hateful
propaganda, and communicate on the internet. Those who want us in the gas
chambers, who seek to take away our freedoms, deserve it not for themselves.
Just as we smash organized white supremacists, we also smash white-hat corporate
“hacker” sellouts who work for the government, military, law enforcement, and
the corporate security industry. You need us, but we don’t need you. Fuck the
FBI, Fuck NATO, and Fuck Ingragard. Props to real OG hackers who still break
into and destroy the systems of our enemies: lulzsec, anti-sec, hackbloc, zfo,
el8, h0no, project mayhem, phc, phrack, fox, #school4lulz and countless more.
The defaced websites are:
freedomhost.info, newp.org, local1488.com, patriotpages.us, teapartyflags.us,
darklordshop.com, racist-jokes.com, iussa.org, ascribewriting.com,
listen-n-post.com
The server formerly hosted the websites:
blackserialkillers.org, rockinghampatriots.info, ohiowhitepride.com,
boycotttheboycott.info, aryanvolkofmidgard.com, thefoundersplan.org”
While I’m sure more will come to light after all the leaked emails have been perused, one email from Detective Andrew Creed of the Boston Police Intelligence Unit to O’Donovan. In the email Creed seeks O’Donovan’s cooperation and offers his help to make sure the “antis” don’t cause a problem at NEWP’s event. The email:
Zichzelf opgeheven, las ik vandaag:quote:Op zondag 26 juni 2011 18:35 schreef PiRANiA het volgende:
http://pastebin.com/iVujX4TR
Hoppa, lulzsec leden ontmaskerd.
Ze zijn zelf gestopt ja. Alleen hun privéinfo hebben ze waarschijnlijk niet zelf opgegeven.quote:Op zondag 26 juni 2011 18:38 schreef Disana het volgende:
[..]
Zichzelf opgeheven, las ik vandaag:
http://gawker.com/5815589(...)ia+hyped-terror-ends
Alweer? Ze zijn nu al 3 x geDOXed, komen al die gegevens overeen?quote:Op zondag 26 juni 2011 18:35 schreef PiRANiA het volgende:
http://pastebin.com/iVujX4TR
Hoppa, lulzsec leden ontmaskerd.
Geen idee.quote:Op zondag 26 juni 2011 18:40 schreef Papierversnipperaar het volgende:
[..]
Alweer? Ze zijn nu al 3 x geDOXed, komen al die gegevens overeen?
Zie de paste op pastebin, daar staat e.e.a. vrij dudielijk in.quote:Op zondag 26 juni 2011 18:46 schreef Yuri_Boyka het volgende:
Hoe komen die mensen aan al hun gegevens?
Heb het door gelezen maar zou je misschien kort kunnen zeggen hoe?quote:Op zondag 26 juni 2011 18:46 schreef PiRANiA het volgende:
[..]
Zie de paste op pastebin, daar staat e.e.a. vrij dudielijk in.
IRC in de gaten houden en wachten tot ze wat persoonlijks zeggen. Die joepie91 (zit ook op FOK!) gooide zijn persoonlijke domein bijvoorbeeld online.quote:Op zondag 26 juni 2011 18:47 schreef Yuri_Boyka het volgende:
[..]
Heb het door gelezen maar zou je misschien kort kunnen zeggen hoe?
Maar het zou heel goed kunnen dat joepie geen OPs doet, dus daar heb je niks aan.quote:Op zondag 26 juni 2011 18:49 schreef PiRANiA het volgende:
[..]
IRC in de gaten houden en wachten tot ze wat persoonlijks zeggen. Die joepie91 (zit ook op FOK!) gooide zijn persoonlijke domein bijvoorbeeld online.
quote:"ThePiratebay deletes 50 Days Of Lulz"
By BSOD
2011-06-26
Thepiratebay just deleted the lulzsec torrent "50 days of lulz" , reason theres some virus in it. Thepiratebay does not allow files that are mislabeled, or contain virus/trojan's, or child pornography. Being as how this torrent was extremely popular, it may have infected 100's of thousands of people already. Lulzsec's account on thepiratebay was not banned so they are cleared to upload the same torrent again without the alleged "trojan".
source: moderator.
additional information:
http://tlan3y.tumblr.com/post/6938716877/
http://activepolitic.com:82/Outside_News/6057.html
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |