Nieuw: Lulzsecquote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:Interview with Anonymous ( Anony_ops OR Anon_Central ) : The Hacker News ~ http://www.thehackernews.com/2011/06/interview-with-anonymous-anonyops-or.html
Anonymous is the political movement of change for the 21st century. Anonymous can and certainly will accomplish what many other political and peace movements of the past could not. When corruption, destruction and mayhem strikes from governments or corporations it is the goal of anonymous to awaken that entity and the public that a change must occur. We must understand that the Anonymous who strives for political change and world peace must be free to work without the mistrust and misdeeds of others who tarnish their good work. Anonymous is the gift we have been waiting for. Honest and trustworthy persons working hard on our behalf for the betterment of mankind.The Anonymous ,Need of 21st century,
Let’s Talk with Anony_ops ,Now known as Anon_Central on Twitter :
THN : Who is Ryan and what his matter with Anonymous.
Anony_ops : Ryan was a network administrator and unreliable like many others. Basically, we knew Ryan would explode one day. He was like the Yellowstone Caldera, he occasionally had little outbursts and some people who knew him from before warned us that he'd had massive eruptions in the past.
THN : Do you think there are more people like Ryan trying to break the Unity of Anonymous?
Anony_ops : Yes. We have had lots of guys like him in the past and I bet there are still some lurking. But they will not do what he did. In my opinion what he did was stupid and it didn't achieve anything.
THN : Is Anonymous or supporters of Anonymous behind the Sony Hacks?
Anony_ops : Anonymous IRC (AnonOps) is not involved in the Sony hacks although since being Anonymous, many people can create their own bases (cells) and work on their plans. So maybe Anonymous is involved in it or maybe not? We will never know. But I can tell you that they definitely took advantage of the whole OpSony situation. What I would suggest is that whenever Anonymous does something big, we brag about it. The fact that we denied it is a strong indicator that we didn't do it - if we had succeeded in breaking into their servers, we would have been gloating about it all over the internet.
It was quite clear that no one knew what was going on with Sony and Sony blamed us for their shitty security intrusion. Further, the people that actually participated in the intrusion saw that they could use Anonymous as a scapegoat but we would have kept the "Anonymous" tradition and not have left our motto in a single file, we would have left it in something along the lines of 9001 files. So to answer your question, we want a apology from Sony. They have no credible proof that the offenses were committed by "Anonymous" only what some copy cat left there causing confusion in the reports. Because of that we were subsequently harassed by a misguided and misinformed Sony who then started clogging up our servers.
Quote: <evil> some people will take advantage of it for their malicious shit.
THN : Tell us something about the Spanish Revolution
Anony_ops : You better ask this to Spanish Anons, I have no right to answer this because I'm not the right person. Sorry about that.
THN : What are the other operations recently born in various parts of world?
Anony_ops : There are over 9000 operations which are on-going right now. Some are #OpGreece, #OpSpain, #OpSpain, #OpMexico, #OpColombia etc.
Visit our IRC for more details.
THN : Is there any core team of Anonymous or is your every decision and action independent?
Anony_ops : There is no core team of Anonymous. If you are pointing towards Network Operators then well, there are just network operators and they manage all the tech stuff. They don't get involved in Anonymous' work and operations except to keep IRC channels free from trolls, spammers and bot attacks. Our decisions and actions are based upon people's will and teamwork. What we do in IRC is communicate with each other, form a plan and get as many people involved, of course anonymously, and we all vote on a specific action. Seems simple? It's NOT. lol So, our every action is a collective decision.
THN : Everyone knows that Anonymous is against injustice, corruption, and abuse of government power. How much are you satisfied with your own effort regarding this great responsibility?
Anony_ops : I am very much satisfied with what I am doing. What I do is carry the information and expose it to the public which otherwise would be very difficult for the public to get. You can call me a bastard Anon or whatever. I don't give a shit. We only do it for the Lulz. Anonymous is not a secret anymore, in times of pain and suffering, your ignored neighbor could be your helping hands and a light of hope. I think Anonymous represents hope for mankind because people have had enough with these criminal organizations, establishments and governments. They are fed up with their laws and wars. They've sacrificed enough. It's time for people to unite and act as one and what I'm doing is playing some part in that. So I'm very proud. I wish everyone could become Anonymous and serve their fellow brothers and sisters. Being an anon is being yourself first then sharing whatever you can.
THN : Anonymous are basically Activists. Are hackers also supporting you to make it Hacktivism?
Anony_ops : Yes. They work independently and sometimes under certain circumstances they work within the hive. As you well know, aside from the public rally's, Anonymous has also taken part in many online operations, most of which needed the use of hackers to accomplish what was needed. A great deal of Anon's submit themselves to the LOIC Hive, faxing and other methods but some websites, like the US Chamber, needed more then that, which is where the hackers have come in. The fact that they do this is to further our strength as Anonymous, and many of them, whether they have help from the Anon's or they do it single handed, will give full credit to Anonymous, because they feel the cause is just. So yes, to answer your question, hackers are supporting us and with every new operation it gives us a stronger grasp on the "Collective" that is Anonymous.
THN : What are the other issues on your list that may become the next Revolution?
Anony_ops : Operations are dependent upon their motives and their importance. Anyone's free to start any operation but valid ops with valid reasons are supported by all Anons and that's how they move forward.
THN : The issue with NATO and does Anonymous plan something against NATO ?
Anony_ops : In my opinion NATO is just following the footsteps of the Pentagon idiots and the IRC (people) are yet to decide the action to take against them. But we won't fire first!
THN : Major Security Breaches of 2011 are related with Anonymous. Is this diverting the style of Anons work?
Anony_ops : There are so many anonymous cells now that no one can keep track of them. But one thing is for sure, the smegma is out of the bottle... try stopping it. Anonymous is worldwide from every continent and every country. There are literally 100’s of IRCs which are now dedicated to anonymous. I really don't know what the future holds for Anonymous but what I can tell you for sure is I will be tweeting about them.
THN : Any message for the World from THN Platform?
Anony_ops : This is to all human beings on this planet: Share and keep information free because it is our only life line to the future. To the crooks in governments and corporations I can only say, you’re done. There are no more secrets. You can’t hide from Anonymous. We know what you are doing and we have made it our mission to expose you. People from time beginning have fought injustice but they haven’t had the right weapons. We do now. Remember this:
WE ARE ANONYMOUS
ANONYMOUS IS LEGION
WE DO NOT FORGET
WE DO NOT FORGIVE
EXPECT US
quote:Monetary Reform Videos:
Can We Pass on Debt? ...YES!
The Banksters | Our Real Enemy
The Economics of Private Banking
Oh Canada... Our Bought & Sold Land!!
Bill Still's Wizard of Oz Documentary
Private Banking = Financial Armageddon
The Government Can by Tim Hawkins
Support monetary reform and join the team by subscribing and commenting on the creatives you like.
quote:LulzSec posts new 'hotlines' for anonymous hacking requests
Hacker group LulzSec on Saturday (Manila time) posted new numbers for its “request line" where it accepts anonymous hack requests, after claiming that its initial numbers got suspended.
The group’s new numbers, posted on its Twitter account, indicated it may be getting calls from the United States and United Kingdom.
“Our numbers got suspended. Try our new numbers | UK +44 020 8133 9723 | USA (209) 690-7925 | lulz-killers don’t like the lizard talks," it said.
LulzSec, which claimed credit for attacks on Sony and the Central Intelligence Agency, initially set up a request line, featuring what appeared to be a phone number in Ohio.
Also, the group continued with its hacks "by request," claiming to take down tribalwars.net and hackforums.net. Both sites were online as of 1pm on Saturday, however.
"These are kind of lame targets, but we're just doing them from requests. Someone, somewhere, is getting their lulz fulfilled today!" LulzSec said.
Meanwhile, the group clarified that it is not at odds with hacktivist group Anonymous, which has also claimed credit for attacks on several government websites.
“To confirm, we aren’t going after Anonymous. 4chan isn’t Anonymous to begin with, and /b/ is certainly not the whole of 4chan. True story," it said.
Also, the group claimed its members “screw each other over for a jolt of satisfaction."
In a manifesto posted on its website, LulzSec admitted having enemies, but said these are mainly gamers. It also insisted its release of unencrypted usernames and passwords is “funny."
“This is the lulz lizard era, where we do things just because we find it entertaining. Watching someone’s Facebook picture turn into a penis and seeing their sister’s shocked response is priceless. Receiving angry emails from the man you just sent 10 dildos to because he can’t secure his Amazon password is priceless. You find it funny to watch havoc unfold, and we find it funny to cause it. We release personal data so that equally evil people can entertain us with what they do with it," it said.
“This is the Internet, where we screw each other over for a jolt of satisfaction. There are peons and lulz lizards; trolls and victims," it added. — TJD, GMA News
quote:anonops AnonOps
Attention #Media: about #Lulzsec and #Anonymous, we are not at war. We are bros of teh internetz. Also, /b/ != Anonymous.
17 Jun
Klik op de link voor het interview.quote:This is the first in a two-part interview with Aaron Barr, the former CEO of HBGary Federal
Each of us has made mistakes in our lives - woeful errors that we've been forced to learn from at great personal cost. Blessedly, those painful experiences are typically private affairs. Tears are spilled. Mea culpas are issued to those we've wronged, then we, the folks we hurt and the storm clouds move on.
For an unfortunate few, however, blunders go viral. Their mistakes fuel evening news segments and column inches in the pages of leading newspapers. Millions queue up to watch them on YouTube and they get turned over for laughs by late night comedians. Think about lonely Congressman Weiner or that poor woman who, distracted by her cell phone texting, flopped into the fountain at a Kentucky mall.
Aaron Barr, the former CEO of security firm HBGary Federal, is one of those unlucky few. No fountain-flopper, Barr is a respected authority on computer security whose mistake was to openly speculate on the identities of members of the online hacking group Anonymous, then watch as events spun gruesomely out of his control. Infuriated by what they interpreted as an attempt to out them, Anonymous hacked HBGary's servers and made off with tens of thousands of messages from the company's e-mail server, which the group then posted online. Anonymous's preemptive strike put the inner workings of HBGary up for public view. That begot countless other stories - not all of them accurate - as reporters poured over the contents of HBGary Federal's correspondence, Wikileaks style. Their digging turned up troubling communications about the company's plans to assist the U.S. government and various other Beltway interests with online reconnaissance. Before it was all over, no less than Comedy Central titan Stephen Colbert riffed on the controversy. And, not too long after that, Barr tendered his resignation from HBGary Federal.
Since then, Barr has kept his hand in the IT security game, but he's also kept a low profile. On the other side of the fence, Anonymous and related groups, like LulzSec, have become emboldened by their success in the HBGary Federal attack, launching similar attacks on Sony Corp. and Monsanto, the U.S. Senate, the U.S. Federal Bureau of Investigation, the Public Broadcasting System, the federal police in Spain, the government of Turkey and other targets. There have been some arrests, but the core leadership of both Anonymous and the closely related LulzSec remain free.
But the unfortunate events of this Spring haven't bowed the former CEO. And the events of the last four months have, if anything, made him seem prophetic. More than ever, Barr's call for the IT community to focus attention on the individuals behind cyber attacks - not just the technical details of the attacks - rings true. In one of the first interviews he's given since the hack of HBGary Federal in February, Barr talked, by phone, with Threatpost editor Paul Roberts about the hack of HBGary Federal, Anonymous, LulzSec and why most security investments are misplaced.
quote:Submitted by Commander X (not verified) on Sat, 06/18/2011 - 6:05pm.
Wow, where to start !
"You can't release 250,000 sensitive documents into the wild and think you're doing good for society. I don't think you can, because there's no way you can vet all 250,000 documents for whether there's a need to release a specific document and what the blow back to that doc might be."
Barr just doesn't get it. The "blowback", i.e. serious damage to the government being exposed, is THE POINT of the disclosure ! The whole idea is to seriously weaken these governments through disclosure as part of an over all shift of power FROM the governments and TO the people. Any State that fails to grasp this will be destroyed in this war.
And why is there no mention of the fact that his dox of Anonymous was 95% incorrect, thus exposing 100's of completely innocent people to being falsley accused of being associated with Anonymous ? Why is there no discussion of the morality of this idiot spying on private citizens and their online activities ?
This man is an amoral fool, he deserved what was done to him. This article can safely be ignored.
Commander X
Peoples Liberation Front
Nèèèèèèèèèèxt!?!quote:Ook Sega slachtoffer van hackers
AMSTERDAM - De online gamedienst Sega Pass is gehackt. Dat laat gameontwikkelaar Sega weten.
Van gebruikers zijn e-mailadressen, geboortedata en versleutelde wachtwoorden gestolen. De hackers hebben niet de hand kunnen leggen op betaalgegevens van gamers.
Sega weet niet hoeveel mensen de dupe zijn geworden. Het online systeem, waar gebruikers van Sega-games kunnen inloggen, is offline gehaald. De wachtwoorden van alle gebruikers zijn gereset.
Eerder werden Nintendo en Sony slachtoffer van een groep hackers. Gegevens van miljoenen gebruikers werden daarbij gestolen.
quote:cazlab will mockridge
"Incoming 614-@LULZSEC calls now redirect to #HBGary. You take care of the horde while we're gone @AaronBarr, thanks mate. Bye for now" #LOL
quote:trelayne Rojan Seth
To understand why #HBGary is being targeted by #Lulzsec : http://is.gd/8wC1eI
quote:LulzSec en Anonymous werken samen
Laatste update: 20 juni 2011 09:33 info AMSTERDAM – Hackergroep LulzSec gaat samenwerken met activistengroepering Anonymous. De operatie genaamd Operation Anti-Security richt zich op het openbaar maken van overheidsinformatie.
Foto: Thinkstock Dat blijkt uit een verklaring van LulzSec dat de afgelopen weken bekend werd door aanvallen op de servers van Fox, Sony, de CIA en tal van andere websites.
LulzSec wordt omschreven als een aftakking van Anonymous. De groep zou bestaan uit voormalig leden van de activistengroep die zich onder meer heeft bemoeid met de opstand in de Arabische wereld. Zo werden websites van de overheden Egypte en Tunesië aangevallen door Anonymous.
AntiSec
In de verklaring van LulzSec worden andere aanvallers opgeroepen zich aan te sluiten bij het initiatief. De groep vraagt zelfs om de term AntiSec middels graffiti in het straatbeeld te verspreiden.
Ook wil de groep de term op het internet bekendmaken.
Overheidsinformatie
“Het stelen en lekken van geheime overheidsinformatie heeft de prioriteit”, zo schrijft LulzSec. "Doelwitten zijn banken en andere hooggeplaatste sectoren. Als geprobeerd wordt onze actie te censureren, zullen we reageren met meer aanvallen.”
Onder de verklaring staat een viertal links waarvan Wikileaks er een is. Of de organisatie verbonden is aan de actie is echter niet bekend.
De operatie lijkt een overgang te zijn van het stelen en publiceren van gebruikersnamen en wachtwoorden naar het onthullen van gevoelige informatie die overheden liever geheimhouden.
quote:Salutations Lulz Lizards,
As we're aware, the government and whitehat security terrorists across the world continue to dominate and control our Internet ocean. Sitting pretty on cargo bays full of corrupt booty, they think it's acceptable to condition and enslave all vessels in sight. Our Lulz Lizard battle fleet is now declaring immediate and unremitting war on the freedom-snatching moderators of 2011.
Welcome to Operation Anti-Security (#AntiSec) - we encourage any vessel, large or small, to open fire on any government or agency that crosses their path. We fully endorse the flaunting of the word "AntiSec" on any government website defacement or physical graffiti art. We encourage you to spread the word of AntiSec far and wide, for it will be remembered. To increase efforts, we are now teaming up with the Anonymous collective and all affiliated battleships.
Whether you're sailing with us or against us, whether you hold past grudges or a burning desire to sink our lone ship, we invite you to join the rebellion. Together we can defend ourselves so that our privacy is not overrun by profiteering gluttons. Your hat can be white, gray or black, your skin and race are not important. If you're aware of the corruption, expose it now, in the name of Anti-Security.
Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood.
It's now or never. Come aboard, we're expecting you...
History begins today.
Lulz Security,
http://LulzSecurity.com/
Support: http://www.mithral.com/~beberg/manifesto.html
Support: http://www.youtube.com/user/thejuicemedia
Support: http://wikileaks.ch/
Support: http://anonyops.com/
Op de site staat een filmpje.quote:Hackers use Flag Day to protest Federal Reserve
SAN FRANCISCO (KGO) -- Hackers belonging to a group called "Anonymous" wanted to make a statement Tuesday about America's banking system. They pushed for protests in public spaces and online.
Wearing masks and holding signs, a small protest group answered an online call to make Flag Day a time to speak out against big banks.
The group is calling for Federal Reserve Chairman Ben Bernanke to step down, saying he is not doing enough to fix the federal government's ever-rising debt.
In fact, they want to dismantle the fed altogether and hand the authority to print money back to Congress.
"This is not what our forefathers intended for our currency system," one protester said.
"Anonymous" organized the demonstration with a widely circulated YouTube video narrated by a computerized voice.
The gathering it called for is just one of two prongs to this protest. Demonstrators would not talk about the other.
"I know nothing about the denial of service attacks on the website," a protester said.
The second prong of the protest is what experts at CNET compare to a digital sit-in. Instead of occupying a public space, protesters tried to occupy all the available bandwidth to the Fed's website in hopes of knocking it offline.
Tech writer Elinor Mills says in the past few years, so-called "hacktivists" have gathered enough volunteers to successfully bring down much bigger websites, including Visa, MasterCard and PayPal after those companies blocked donations to WikiLeaks.
"Any disruption or protest that they can -- online and offline; that's supposedly what they're after," Mills said.
By late afternoon, the Fed's website was still up -- but running slowly.
And though street demonstrators would not say if they took part in the online attack, one did say, "Maybe it's a good idea, I don't know."
quote:Anonymous announces "The Plan"
Anonymous has gone live with their war against the system called simply, "The Plan". This is a global movement and has three phases. We are just beginning phase one which is simple. PHASE 1: Better yourself. Spread the message. Be the message. Follow me below for more information.
"The Plan" 1 year. 3 phases. A world of change.
Share this message with everyone you can.
PHASE 1: Better yourself. Spread the message. Be the message.
*Educate yourself on the depths of the system, the functions put it place to inhibit true freedom as well as the mechanisms within the system that motivate the masses to subconsciously accept giving up those freedoms. The structures within the system that promote division within the people of the countries of this world and the injustices that are placed upon the people.
*Spread the message. Share this video and the website with everyone you can. Make your own videos, songs, art, graffiti etc... spreading the word that we are here, the movement is taking hold. Expect us.
*Learn ways that will allow you to break free from the system. Start small and implement them in your daily lives. This will be implemented as a focus of Phase 2 as well, escalating what you have learned.
*ANON hackers - begin supporting the movement. This is a calling to all of you for the aid of this movement. Low-priority targets are your engagement. Assist with the movement and spread the message of "The Plan".
The resistance is here.
Expect us.
I urge everyone to take the ten minutes to watch the movie and give it some thought. What we're doing now is not working. We are running out of time. Right now we have the entire world's momentum with us, let's not waste that. There is much work to be done and we need your help to make this planet a better place for everyone to live on. What we need is Solidarity. The people of Greece, Ireland, UK, Turkey, Egypt, Tunisia, Yemen, Spain, Italy, Syria, Bahrain have all decided they no longer can abide by the flagrant disregard the Oligarchy has for the workers of the planet. The time is now for Global Solidarity.
quote:http://www.volkskrant.nl/(...)-aanval-op-CIA.dhtml
Een 19-jarige jongen is gearresteerd op verdenking van het hacken van websites, door de Britse politie en de Amerikaanse FBI. De man zou verantwoordelijk zijn voor digitale aanvallen op onder meer de Amerikaanse inlichtingendienst CIA en de Amerikaanse Senaat.
Ook elektronicaconcern Sony zou tot het doelwit van de hacker behoren. Scotland Yard maakt vandaag bekend dat de man gisteravond in een woning in het zuidoosten van Engeland werd opgepakt. Hij wordt in Londen ondervraagd.
De man zou lid zijn van het hackerscollectief Lulz Security. Die groep eiste de digitale aanvallen van eerder dit jaar op. Volgens het collectief zijn de aanvallen bedoeld om aan te tonen dat de beveiliging van de websites niet afdoende is.
quote:YourAnonNews Anonymous
Ryan Cleary of #Wickford was the person arrested. Previously known for attempting to dox #Anonymous members. No real link to @Lulzsec.
quote:yvonneridley yvonneridley
BREAKING: Alleged computer hacker Ryan Cleary latest thetechherald.com/article.php/20… #anonymous #LulzSec
quote:Unconfirmed: Scotland Yard takes LulzSec member into custody (Update)
Update 3:
Via phone, we were told that the Metropolitan Police Service believes that this is a significant arrest.
When asked if the man in custody is connected to LulzSec or Anonymous, the person we spoke with said that his computer will be examined to determine if he is connected to any such group. Police will not release the man’s name, and had no other comments on the arrest.
Update 2:
The speculation continues. Talk online has named Ryan Cleary, as the 19-year-old arrested by the PCeU.
Earlier in June, Cleary was named in a Pastebin document as “a dissident hacker who attacked AnonOps and was subsequently ‘doxed’.” [Source] [Ryan’s alleged dox are here]
“After the Sony Fiasco led to a drop in support for Anonymous, LulzSec was likely invented to take credit for the hack ex post facto. LulzSec appears to be related to the Ryan Cleary incident, which has already been forgotten,” the document adds.
[ Note: AnonOps is the IRC network were those who associate with Anonymous will sometimes gather. Ryan was a network operator there.]
“Some accuse Cleary of hacking Sony. However, Cleary is not facing any criminal charges and there is no evidence that he exists. AnonOps hackers may have engineered a false flag attack against their own servers under the name of Ryan Cleary, in hopes that the Sony hack would be credited to him. LulzSec is simply the logical conclusion to this chain of events – a hacker group that breaks all the non-existent unwritten rules of Anonymous in order to regain traction after the failure of #OpSony.”
We were present for a chat that included Ryan, shortly after AnonOps was attacked.
Ryan claimed that OpSony and the attack on BMI were going nowhere until he added his support. This support came by way of 5-10,000 bots, out of an install base of 50,000 to pull from. In addition, he added that the use of LOIC to attack targets was just a scam for the public.
“During OpSony we had a maximum of 40 [LOIC canons],” Ryan told us. “The bot shit was kept secret because it'd be bad PR. If they knew it was bots instead of [LOIC], then what’s the point of the public coming in?”
The whole article can be seen here.
On Twitter, one of the names linked with LulzSec, Sabu, said that: "FYI all members of lulzsec are safe. ryan Clearly (sic) has little to do with lulzsec besides running irc.lulzsec.org."
A short time later, LulzSec's account posted: "Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here! Which poor bastard did they take down?"
Update:
A contact at the FBI says that he anticipates that they will have additional information for the press later this afternoon.
Original Article:
Earlier this morning, Metropolitan Police Service announced that they have arrested a 19-year-old man in a planned intelligence operation. The timing of the event has led many in the media to speculate that the man in question is a member of LulzSec.
The arrest comes days after LulzSec launched a DDoS attack against the Serious Organized Crime Agency (SOCA) and the CIA.
The full statement from a Scotland Yard spokesman is below:
Officers from the Metropolitan Police Central e-Crime Unit (PCeU) have arrested a 19-year-old man in a pre-planned intelligence-led operation.
The arrest follows an investigation into network intrusions and Distributed Denial of Service (DDoS) attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.
The teenager was arrested on suspicion of Computer Misuse Act, and Fraud Act offences and was taken to a central London police station, where he currently remains in custody for questioning.
Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material. These forensic examinations remain ongoing.
The PCeU was assisted by officers from Essex Police and have been working in co-operation with the FBI.
At this point, there is no confirmation that the person arrested is a member of LulzSec. However, as the statement said, he was arrested during a sting operation after attacks on intelligence agencies and international businesses.
This is why the media made an immediate jump to name LulzSec, as previously mentioned, they have hit both examples (Sony, FBI, CIA, SOCA) since they arrived in the public eye towards the end of May.
We’ll follow developments on this story and post more information as we get it.
quote:rj_gallagher Ryan Gallagher
Wow!!: #LulzSec hackers claim to have obtained 2011 UK census records of "every single citizen" + will release soon is.gd/1Qtb11
quote:http://pastebin.com/raw.php?i=K1nerhk0
RC: irc.lulzco.org (channel #LulzSec | port 6697 for SSL)
BitCoin donations: 176LRX4WRWD5LWDMbhr94ptb2MW9varCZP
Twitter: @LulzSec
Contact us: 614-LULZSEC
. /$$ /$$ /$$$$$$
.| $$ | $$ /$$__ $$
.| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$
.| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
.| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$
.| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$
.| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
.|________/ \______/ |__/|________/ \______/ \_______/ \_______/
//Laughing at your security since 2011!
Greetings Internets,
We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census
We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release)
Myself and the rest of my Lulz shipmates will then embark upon a trip to ThePirateBay with our beautiful records for your viewing pleasure!
Ahoy! Bwahahaha... >:]
Cap'n Pierre "Lulz" Dubois
LINKS:
http://thepiratebay.org/torrent/6467131/Bethesda_internal_data
BONUS ROUND! SENATE.GOV!
http://lulzsecurity.com/releases/senate.gov.txt
quote:Ross_Lawson Ross Lawson
It's outrageous that #LulzSec plan to release the census details online instead of through the official method: On a laptop left on a train.
twitter:LulzSec twitterde op dinsdag 21-06-2011 om 19:01:07People should keep releasing fake LulzSec stuff. It helps filter out the peon masses from the respectable, fact-checking media outlets. reageer retweet
Disinformation is a wonderfull thingquote:Op dinsdag 21 juni 2011 19:09 schreef PiRANiA het volgende:
twitter:LulzSec twitterde op dinsdag 21-06-2011 om 19:01:07People should keep releasing fake LulzSec stuff. It helps filter out the peon masses from the respectable, fact-checking media outlets. reageer retweet
for sure it isquote:Op dinsdag 21 juni 2011 19:26 schreef Papierversnipperaar het volgende:
[..]
Disinformation is a wonderfull thing
Zou jij moeten weten, iddquote:
yeh ik weet het dat is het punt,, maar jij ??? jij blijf er maar intrappen hequote:Op dinsdag 21 juni 2011 20:25 schreef Papierversnipperaar het volgende:
[..]
Zou jij moeten weten, idd
Ik hoorde dat C_N zijn foto's altijd in scène zetquote:Op dinsdag 21 juni 2011 20:25 schreef Papierversnipperaar het volgende:
[..]
Zou jij moeten weten, idd
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!quote:Op dinsdag 21 juni 2011 20:30 schreef Nibb-it het volgende:
[..]
Ik hoorde dat C_N zijn foto's altijd in scène zet
ow ik wist niet dat dit een gesloten club was, nou dan ga ik er maar snel vandoor ..quote:Op dinsdag 21 juni 2011 20:35 schreef Papierversnipperaar het volgende:
[..]
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!
Nee hoor, maar je bent off-topicquote:Op dinsdag 21 juni 2011 20:38 schreef C_N het volgende:
[..]
ow ik wist niet dat dit een gesloten club was,
quote:nou dan ga ik er maar snel vandoor ..![]()
Als je er toch bent, kan je meteen de OP doorspitten. Propaganda, treiteren, precies jouw ding.quote:maar wel leuk om de verschillende gezichten te zien .
Post er eens iemand anders hier is het weer niet goedquote:Op dinsdag 21 juni 2011 20:35 schreef Papierversnipperaar het volgende:
[..]
Ik hoor dat C_N sommige users door allerlei topics achterna jaagt!
quote:Op dinsdag 21 juni 2011 20:40 schreef Nibb-it het volgende:
[..]
Post er eens iemand anders hier is het weer niet goed
No commentquote:Op dinsdag 21 juni 2011 20:52 schreef David1979 het volgende:
Een fantopic voor zielige pubertjes die het leuk vinden om privegegevens online te gooien, tja
NOS Journaal: 1 van de meest gezochte hackers ter wereld!quote:
quote:BarrettBrownLOL Barrett Brown
Computer-assisted disinformation is the next big thing. tinyurl.com/3r8erpm #opmetalgear
quote:http://wiki.echelon2.org:8090/wiki/Cubic_Corporation
Cubic Corporation is a US Military/Defence contractor, with subsidiaries including Cubic Defense Applications Inc, and Cubic Cyber Solutions, Inc. They wholly own cybersecurity corporations Abraxas and Ntrepid. Ntrepid provides Persona Management services to the US government in fulfillment of the contracts issued as part of US CENTCOM Operation Earnest Voice.
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.quote:The hackers hacked: main Anonymous IRC servers invaded
War rages between competing factions within the hacker collective Anonymous after this weekend's drama-filled takeover of the main Anonymous IRC server network. That network, used by Anons to plan and conduct attacks, was taken over by one of its own, an IRC moderator known as "Ryan."
His attack has sparked a debate over the "leadership" of Anonymous.
Hacking the hackers
The main Internet chat servers used by Anonymous have been run by a group called "AnonOps," which provides communications platforms for the group. Pointing IRC clients at anonops.ru or anonops.net would connect anyone to the servers, where they could then join channels like "#OpSony" and participate in various Anon activities.
Though Anonymous is often described as leaderless, factions like AnonOps by necessity have a loose structure; servers must be paid for, domain names must be registered, chat channels must have at least some moderation. Ryan was one of those IRC mods, and this weekend he proceeded with an attack that seized control of the AnonOps servers away from the small cabal of leaders who ran it.
Those leaders include people with handles like "shitstorm," "Nerdo," "blergh," "Power2All," and "Owen"—and if you're paying attention, you'll remember that HBGary Federal's Aaron Barr had fingered Owen as one of three "leaders" of all Anons.
The most popular channel on the old IRC servers now says simply, "anonops dead go home." Ryan also put up a set of chat logs showing Owen and others reacting to the weekend's massive denial of service attacks against AnonOps that culminated in the server takeover. (In the transcript below, "doom" is one of the AnonOps servers.)
Owen -> SmilingDevil: we lost a numbe rof servers last night
SmilingDevil -> owen:we need some more security.
Owen -> SmilingDevil: dude
Owen -> SmilingDevil: it forcved level3 to stop announing a /24
Owen -> SmilingDevil: it was in the gbps range
Owen -> SmilingDevil: doom alone got hit with 1 gb
SmilingDevil -> owen: gigabit or gigabyte?
Owen -> SmilingDevil: all leafs went down
Owen -> SmilingDevil: add it all up
Owen -> SmilingDevil: yeah huge
SmilingDevil -> owen:we need a hidden irc server for the admins.
SmilingDevil -> owen: that only they know about
Owen -> SmilingDevil: um thats called the hub
Owen -> SmilingDevil:
SmilingDevil -> owen: did they take that too?
Owen -> SmilingDevil: but anyhow
Owen -> SmilingDevil: we suffered alot of damage
The "old" leaders released a statement this morning explaining what happened over the weekend and why IRC remained down:
We regret to inform you today that our network has been compromised by a former IRC-operator and fellow helper named "Ryan". He decided that he didn't like the leaderless command structure that AnonOps Network Admins use. So he organized a coup d'etat, with his "friends" at skidsr.us . Using the networks service bot "Zalgo" he scavenged the IP's and passwords of all the network servers (including the hub) and then systematically aimed denial of service attacks at them (which is why the network has been unstable for the past week). Unfortunately he has control of the domain names AnonOps.ru (and possibly AnonOps.net, we don't know at this stage) so we are unable to continue using them.
Not everyone buys the explanation. One Anon pointed out that the Zalgo bot in question is controlled by a user named "E," not by Ryan.
Second, Zalgo can only see chan msgs and msgs to zalgo. The net staff is saying (pretty much) Ryan used Zalgo to steal server passwords (false, I know server protocol) which were tranfered in channels in plain text for the to see (true).
Third: Take everything AnonOps says with a grain of salt. They're putting out lies and not telling the whole story.
Others pointed out that E and Ryan are friends and that E was actually recommended as an op by Ryan.
However it happened, the end result was that Ryan redirected some of the AnonOps domain names he had control over, he led an attack on the IRC servers with denial of service data floods, and he grabbed (and then published) the non-obfuscated IP addresses of everyone connected to the IRC servers. Ryan apparently also gained root access to the Zalgo network services bot, which is presumably how he harvested the non-obfuscated IP addresses, though it's not clear exactly what Zalgo did or how much access it provided Ryan.
Clashing factions
Ryan is associated with 808chan, a 4chan splinter site and apparent home of the recent denial of service attacks on AnonOps. Ryan is "DDoSing everything that he doesn't own with his band of raiders from 808chan," says one Anon.
The 808 brigade apparently valued big botnets, and made users prove their abilities before letting them participate. AnonOps had a more democratic ethos; anyone could show up, configure the Low Orbit Ion Cannon attack tool, and start firing at Sony or others.
"It's an open network where everyone, mostly newfags can join and not have to prove they're able to wield a botnet and can just join a channel of their choosing, fire up LOIC and hit some organization for reasons they believe are right," said one Anon.
Ryan's control of AnonOps extends to some of the actual domain names, including AnonOps.ru. This wasn't a hack; he was actually given administrative control over the domains some time ago by AnonOps leaders.
One Anon explained the reason for this, saying: "As for the domains, they were transferred to Ryan after some of us got vanned so he can keep the network up. What he did certainly wasn't the plan." (Getting "vanned" refers to getting picked up by the police.)
According to another Anon, the current fight was precipitated when Ryan's IRC credential were revoked. "You morons don't realize Ryan IS LEGALLY THE OWNER OF DOMAINS," he wrote. "Nerdo and Owen removed Ryan's oper, Ryan took domains."
Smoky back rooms?
Among Anons arguing over what happened this weekend, the key debate involves the issue of leaders. Anonymous also said it was leaderless and memberless, but is it? The AnonOps statement above claims that Ryan was angry at the "leaderless" structure of the group and wanted to set himself up as king; again, though, not everyone is so sure.
Owen, for instance, helps to shape the conversation and planning in IRC. One Anon complained privately to me that Owen has booted him from the IRC servers—and thus from the place where all the real work against Sony was taking place several weeks ago. "Owen has not only told me that he doesn't really give a shit about freedom of speech, he's also moderately against the action that's being taken on Sony," this Anon said.
Owen and others conduct some of their work in private, invite-only channels, which leads some Anons to suspect that the really important operations and hack attempts are only discussed in a virtual back room. As one Anon put it yesterday:
"Have you ever been in one of their invite-only chats? This is no bullshit. EVERYTHING is decided on them, the eventual course of the operation, the hivemind's target, the channel's topic, everything. Why all this secrecy? These invite-only chats have NO reason to exist. You want to keep out trolls? Turn on mute, and give voice to a few. At least we can see what is being written."
Others were even angrier. A former AnonOps member wrote:
From the fucking beginning (during the hack at Aiplex which started Operation Payback) there has been an secret club, an aristocracy in AnonOps, deciding how operations will play out in invite-only channels.
It's obvious, for they control the topic, the hivemind, the guides, every single thing behind the scenes.
I don't know if the Owen's current bureaucracy is to be trusted, or Ryan's new delegation (from 808chan!) is.
What I do know is that AnonOps no longer has a good reason to exist. The insane amount of power the channel operators wield, and the reputations gained by their NAMES, causes them to become dictator-like, as "power corrupts".
Why did we leave the comforts of the womb of anonymous imageboards, and end up in name-fagging circlejerks controlled only by a few? Why?
Anonymous, this is bullshit. Neither side, neither Ryan's coalition of hackers nor Owen's bureaucracy can be trusted.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS—it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
On Twitter, some Anons began spreading the word that Ryan had "betrayed" Anonymous, and that he had done so "to mess up all after having stolen PSN credit cards." No evidence for this last assertion was provided.
As the old AnonOps team attempted to get a handle on what had happened—and after they switched to an Indian domain name—they expressed irritation with early media mentions ("fail reporting") of the attack.
"Some 'mainstream' media is calling this the 'insider threat,'" they wrote, "which isn't really a fair representation, AnonOps doesn't have any corporate secrets, its run by the people for the people on a basis of mutual trust. Drama happens almost 24/7, occasionally drama overspills the network.
"Also we must remind the press AnonOps DOES NOT EQUAL Anonymous, saying they are one and/or the same thing in a blog/article just makes you look stupid. AnonOps is just a IRC network and a few other services that ANYONE can use, its not the only place Anonymous gather, and unlikely to be the *last* (see Streisand effect)."
But will the AnonOps leaders ever gather on a forum they don't control? Ryan took great delight in posting the following alleged comment from Owen to another AnonOps leader: "yo odnt honestly think we're goign to some other irc where we have no control do you?"
Of course, Anonymous has always been about drama and "the lulz," so the current confusion may not even bother them that much; this is just par for the course. But it's certainly amusing to others.
"Lmao. You fucking twits can't even keep your shit safe," wrote someone watching the debacle. "This literally made me laugh out loud. Not lol, but laugh. You all are so stupid."
Further reading
Anons commenting on the news (anonnews.org)
Ryan's dump of AnonOps chats (sites.google.com)
quote:Overheid niet voorbereid op cyberaanval
De Nederlandse overheid is onvoldoende voorbereid op een cyberaanval van internationale omvang, die razendsnel een maatschappijontwrichtende crisis kan veroorzaken. Dat blijkt uit een grote oefening die de overheid zelf onlangs heeft gehouden.
Het AD schrijft vandaag dat uit de evaluatie van de oefening blijkt dat het de overheid vooral ontbreekt aan goede coördinatie. Ook lijkt zij slecht doordrongen van de ernstige gevolgen die een cyberaanval kan hebben. Zo kan zo'n aanval ertoe leiden dat hackers het betalingsverkeer platleggen. Maar ook vitale systemen als die van de luchtverkeersleiding op Schiphol of olieraffinaderijen in de Rotterdamse haven, zijn kwetsbaar.
Cybercrises
Bij de grote oefening Cyberstorm III werd nagebootst hoe in Nederland miljoenen computers in handen van hackers komen. Vandaag wordt de Tweede Kamer ingelicht over de resultaten.
Volgens wetenschappers waren de crisiscoördinatoren vooral aan het vergaderen en overleggen. Het ontbrak aan coördinatie en overzicht. 'Nederland is nog onbekend met cybercrises, dat was bij de oefening goed te merken,' zegt hoofdonderzoeker Marcel Quanjel in het AD.
Maatregelen
Staatssecretaris Fred Teeven schrijft de Tweede Kamer dat de overheid door de oefening is gewezen op de 'complexiteit van ict-crises'. Volgens hem zijn er al maatregelen getroffen. Zo komt volgend jaar het Nationaal Cyber Security Centrum in bedrijf. Ook wil Teeven meer oefeningen.
quote:Hunt for hackers of US government sites leads to Essex teenager's bedroom
Police believe Ryan Cleary, 19, had 'significant role' in hacker group LulzSec which is thought to have attacked CIA website
Investigators believe a teenager arrested at his family home in Essex may have been a "significant" figure in a computer hacking group alleged to have staged attacks against websites belonging to the US government, the electronics giant Sony, and an elite British crime unit.
Scotland Yard cybercrime detectives were questioning Ryan Cleary, 19, over the attacks carried out by the LulzSec group, which mostly targeted websites belonging to institutions and companies in the US.
The events leading to the arrest of Cleary involved an investigation by British police and the US Federal Bureau of Investigation. The FBI's involvement, plus the nature of the targets, raised the prospect that Washington may seek the teenager's extradition to the US, just as it did in the case of UFO obsessive Gary McKinnon, a saga that is still ongoing.
LulzSec have attacked the websites of the CIA, the US senate, US broadcasters and, on Monday, the day of Cleary's arrest, the hackers bought down the website of Britain's Serious and Organised Crime Agency (Soca).
LulzSec is believed to have established itself as a formidable splinter group to Anonymous, the hacking group embroiled in the WikiLeaks fallout, with high-profile attacks on the Gawker website in December last year and a devastating assault on the US security firm HBGary in February.
Members of Anonymous claimed in emails to the Guardian that Cleary, though involved, was not the "mastermind" behind any hacking group. "He owned the server which LulzSec used to communicate using IRC [internet relay chat, a bit like instant messenger]."
UK records show that a company called Arcusvoice, which held domain names used to host websites, was registered to Cleary's home address in Wickford, Essex.
"Ryan Cleary was not a mastermind hacker," the email continued. "He could not keep his own personal information safe. He simply provided the means of communication, just like if two people send letters to each other, FedEx/Royal Mail/DHL are the providers of communication."
Cleary's brother, 22-year-old Mitchell, said: "He's not the sort of person to do anything mad or go out and let his hair down or do anything violent. He stays in his room – you'll be lucky if he opens the blinds, but that's just family, isn't it? I barely see him – I'm more of a football person – he's more of an inside person."
Mitchell said his brother had fallen out with people over WikiLeaks: "He used to be part of WikiLeaks and he has upset someone from doing that and they have made a Facebook page having a go at him."
James Rounce, a neighbour of Cleary, said: "They moved in about 10 years ago and have been pleasant neighbours. I think he had been away at university and had come back for the holidays or because he had finished his exams. You could tell he was very bright just from the way he spoke and presented himself."
LulzSec staged two types of attacks. One was hacking into websites, the other was effectively blocking a website from being used, called a denial of service.
As recently as May, the group attacked websites belonging to broadcasters, including Fox and the US public service broadcaster, PBS. LulzSec also claimed credit for an attack on the US X Factor website, which experts believe indicates the relatively young average age of the group.
Earlier this month, LulzSec declared its intention to break into government websites and leak confidential documents. Yesterday it dismissed claims it had staged an attack on the British census.
According to security experts, it is a small and close-knit team – although they probably do not operate in the same country or even time zone. The security firm Imperva believes there are just eight members, including one who orchestrated the attack on the US security company HBGary, and another who can call on the resources of a "botnet" of virus-infected PCs to attack any website on the net.
Researcher Rik Ferguson of security software firm Trend Micro said "it seems to be a tight-knit group – they don't let people join them, they just take suggestions from people of what to target for a hack next."
quote:LulzSec rogue suspected of Bitcoin hack
More than $9m of online currency was stolen in weekend attack on Bitcoin currency exchange that could cost members of Anonymous and LulzSec thousands of dollars each
ore than 400,000 Bitcoins – 6% of all the virtual currency presently in circulation – for an initial price of $17.50 each, which would have netted $7m at a constant price.
But the attempt to sell such a large volume of coins at once drove the value of the currency down almost to zero, before trading on the site was suspended.
More than 60,000 users' details were compromised in the attack and have since been posted publicly in dozens of places across the internet. Trading on the MtGox site has still not been reinstated since the attack, leaving the future of the fledgling currency in doubt.
Bitcoins are produced without the involvement of any governments or banks; instead, they are generated by using software (also called Bitcoin). The idea was created in 2009 by a Japanese programmer.
Bitcoins are not issued by a central authority, but instead generated by a mathematical algorithm after computers complete a certain number of complex calculations.
Some of most experienced members of the Anonymous and LulzSec hacker collectives are believed to have botnets of more than 100,000 compromised computers.
If that many machines were set to work generating Bitcoins, they could create up to $7,500 worth a day for as long as Bitcoins trade at current levels – meaning members of the hacker collectives could be among the biggest losers if Bitcoins' value does not recover as and when MtGox reopens. In the hours before the hack, the total value of the currency in circulation was more than $150m.
Anonymity and security are the central propositions of the currency, which has attracted controversy after being used in sites selling drugs and pornography.
High-profile organisations accepting the coins include WikiLeaks and the US lobby group Electronic Frontiers Foundation, who have suspended their acceptance of Bitcoins in the wake of the hack.
MtGox says access to its site was gained after a financial auditor's computer was hacked, and insists its site was not compromised.
However, Amir Taaki, who runs the rival Bitcoin exchange Britcoin.co.uk, disputes this chain of events. Developers working on his site, which runs on much of the same software as MtGox, found a security hole several days before the hack was carried out. He says MtGox was notified publicly and privately of the issue.
"Due to the recent events at MTGox.com, we at Britcoin have decided to move our servers to a new location," read a Britcoin statement. "MTGox suffered an SQL injection [a form of hacking attack that creates direct access to databases and files] which means access to the site's funds were in the hands of the malicious hacker. As such, until we see evidence to the contrary, for security reasons we are assuming that MTGox has none of its clients' bitcoins."
Other senior coders in the Bitcoin community claim to have been offered the full database of MtGox users days before the hack was carried out. Though they had not verified whether the database was genuine, it came from the same intermediary who has been testing interest in selling or distributing details from the Sega Pass hack.
Members of Lulzsec, the hacker group whose alleged member Ryan Cleary was arrested in Essex on Tuesday, denied responsibility for the Sega Pass hack, as did several members of Anonymous.
The recent spate of hacks denied by both groups – neither of which usually seeks to hide from the limelight – raises the possibility of a third, as yet unnamed, group of hackers carrying out the attacks.
Lulzsec and Anonymous members stand to lose a significant amount of money if Bitcoins fail. Several members of both groups – speaking directly and through intermediaries – claim to know of others using thousands of hacked computers to generate Bitcoins.
quote:A sinister cyber-surveillance scheme exposed
Hacked emails from security contractor HBGary reveal a disturbing public-private partnership to spy on web users
When President Eisenhower left office in 1960, he provided the American people with a warning.
"In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry.
Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and its parent company HBGary.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Despite the details I have provided in the document – which is also now in the possession of several major news outlets and which may be published in whole or in part by any party that cares to do so – there remains a great deal that is unclear about Romas/COIN and the capabilities it comprises. The information with which I've worked consists almost entirely of email correspondence between executives of several firms that together sought to win the contract to provide the programme's technical requirements, and because many of the discussions occurred in meetings and phone conversations, the information remaining deals largely with prospective partners, the utility of one capability over another, and other clues spread out over hundreds of email exchanges between a large number of participants.
The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.
Altogether, the existence and nature of Romas/COIN should confirm what many had already come to realise over the past few years, in particular: the US and other states have no intention of allowing populations to conduct their affairs without scrutiny. Such states ought not complain when they find themselves subjected to similar scrutiny – as will increasingly become the case over the next several years.
Barrett Brown
guardian.co.uk, Wednesday 22 June 2011 19.39 BST
Article history
Ik heb een harde kern van 30 lurkers. En daarnaast gaat het om het principe: We're all Anonymous. Information is free.quote:Op donderdag 23 juni 2011 00:43 schreef Yuri_Boyka het volgende:
Eeh man ik begrijp iets niet, waarom al die moeite terwijl er niemand reageert?
Hoe weet je dat?quote:Op donderdag 23 juni 2011 00:49 schreef Papierversnipperaar het volgende:
[..]
Ik heb een harde kern van 30 lurkers.
quote:FBI takes down legit sites in search of LulzSec
It looks like the blundering efforts of the FBI to try to pin down the likes of LulzSec have caused a bunch of legitimate businesses to go offline.
Reports are emerging that the bungling snoops raided a datacentre in the US yesterday and wandered off with a collection of hardware. The datacentre was run by Swiss firm DigitalOne, which its itself now offline.
DigitalOne’s chief executive, Sergej Ostroumow, was forced to email clients explaining the shenanigans. “This problem is caused by the FBI, not our company," he wrote. "In the night FBI has taken 3 enclosures with equipment plugged into them, possibly including your server - we cannot check it.
“After FBI’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.”
According to the New York Times, the FBI has teamed up with the CIA an other 'law' enforcement agencies around the world in an increasingly frantic attempt to track down LulzSec and its cronies.
In their efforts they seem to be causing as much mayhem as the hackers themselves.
Read more: http://www.thinq.co.uk/20(...)zsec9/#ixzz1Q349eQ6X
Door het analyseren van de beschikbare data.quote:
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
Yep!quote:Op dinsdag 21 juni 2011 22:54 schreef Papierversnipperaar het volgende:
Even een flashback, 10 mei:
Anonops #6: Anonymous en de MO-revoluties
[..]
Een Ryan neemt een IRC over, en nu is een Ryan gearresteerd.
quote:19 year old Brit arrested for hacking - Ryan Cleary - has been in hacker feuds before
The 19 year old Essex boy who has been arrested by the British police on the request of the FBI has been embroiled in hacker feuds before.
Ryan Cleary of Wickford Essex has been taken into a London police station for questioning about cyber crime. The police will want to talk about the huge hack of Sony earlier this year, attacks on the CIA and a possible though unconfirmed hack of UK Census data in past few days.
So far the group believed to be behind the attacks - LulzSec have denied that Cleary is anything to do with them. They said on their official Twitter:
"Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here!"
Other places, state that he is associated with them and helps to moderate message boards for them.
It could be that Cleary has been turned over to the police by a rival hacker for upsetting other people in the hacking community. Looks like he did that a lot. He was fingered out by Anonymous in May 2011 for bad behaviour, and his personal details were published on a webpage by Anonymous as punishment for trying to force a change in the group's direction. Something that it seems he had been guilty of before back in 2008 when he was only 16, for attempting a DDos attack on Fourchan, the hackers' message boards site.
Even if Cleary isn't directly connected to LulzSec or Anonymous, the group's philosophy encourages other people to take part. So it's possible he or someone else could have acted separately to these main groups...
LulzSec in partnership with Anonymous have declared a widespread operation against governments called #AntiSec. This statement was put in pastebin, and has been tweeted by the official LulzSec account so we believe it to be genuine:
"Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood."
This is going to be great.
Looks like Cleary, was already guilty of pissing off Anonymous - which led to the spill of his personal details onto the internet
quote:Lulzsec hackers take crucial step towards getting laid
Lulzsec computer hackers scored an important victory in their bid to achieve sexual congress with a fellow human being, it emerged last night.
The Brazilian government joined the CIA and the US Senate as the latest victim of the group’s online antics, raising their profile to the point where insecure and emotionally damaged teenage girls might start to think they’re a bit ‘cool’.
Suspected LulzSec hacker 19-year-old Ryan Cleary was arrested in the UK on Monday night following an investigation by Scotland Yard, who told reporters that a “significant amount of crusty material” had been recovered from his bedroom and would now be subjected to forensic examination by officers wearing special gloves.
Mr Cleary’s family expressed disbelief that the self-confessed computer ‘enthusiast’ had anything to do with hacking.
His mother Rita, 45, said her son ‘lives his life online’ but she thought he had spent his time frantically masturbating in his bedroom like any other normal teenage boy.
She added that, as he was led away by police, he told her “whatever you do don’t go in the draw of my bedside cabinet – and I’m only looking after it for a friend!”
Lulzsec arrests
Experts are warning that the stereotypical ‘bad boy’ to which girls are historically attracted might be changing, with a shift away from the truant hot-hatch driving hoodie, to the pasty teenager with a 50MB Internet connection.
Social Anthropologist Sheila Williams told us, “What we are seeing is a definite move towards a sexual relationship for many of these so-called hackers, particularly for those with access to teenage girls with very low self-esteem.”
“If the FBI really want this problem to go away, they should just drop their investigations and put a fraction of that money towards hiring a crack team of highly-skilled prostitutes.”
“Trust me, these guys will no longer be a threat to national security from the very second they realise what a real breast feels like.”
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?quote:
Bepaalde lichaamsvloeistoffenquote:Op donderdag 23 juni 2011 02:31 schreef Yuri_Boyka het volgende:
[..]
Snap niks van het bericht. Wat moet er nou in zijn bed la gelegen hebben?
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |