quote:A sinister cyber-surveillance scheme exposed
Hacked emails from security contractor HBGary Federal reveal a disturbing public-private partnership to spy on web users
When President Eisenhower left office in 1960, he provided the American people with a warning.
"In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist."
Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry.
Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a raid by hackers associated with the Anonymous collective, resulting in the dissemination of more than 70,000 emails to and from executives at HBGary Federal and affiliated company HBGary.
After having spent several months studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey. The programme appears to allow for the large-scale monitoring of social networks by way of such things as natural language processing, semantic analysis, latent semantic indexing and IT intrusion. At the same time, it also entails the dissemination of some unknown degree of information to a given population through a variety of means – without any hint that the actual source is US intelligence. Scattered discussions of Arab translation services may indicate that the programme targets the Middle East.
Despite the details I have provided in the document – which is also now in the possession of several major news outlets and which may be published in whole or in part by any party that cares to do so – there remains a great deal that is unclear about Romas/COIN and the capabilities it comprises. The information with which I've worked consists almost entirely of email correspondence between executives of several firms that together sought to win the contract to provide the programme's technical requirements, and because many of the discussions occurred in meetings and phone conversations, the information remaining deals largely with prospective partners, the utility of one capability over another, and other clues spread out over hundreds of email exchanges between a large number of participants.
The significance of this programme to the public is not limited to its potential for abuse by facets of the US intelligence community, which has long been proverbial for misusing other of its capabilities. Perhaps the most astonishing aspect is the fact that the partnership of contracting firms and other corporate entities that worked to obtain the contract was put into motion in large part by Aaron Barr, the disgraced former CEO of HBGary Federal who was at the centre of Team Themis's conspiracy to put high-end intelligence capabilities at the disposal of private institutions. As I explain further in the linked report, this fact alone should prompt increased investigation into the manner in which this industry operates and the threats it represents to democratic institutions.
Altogether, the existence and nature of Romas/COIN should confirm what many had already come to realise over the past few years, in particular: the US and other states have no intention of allowing populations to conduct their affairs without scrutiny. Such states ought not complain when they find themselves subjected to similar scrutiny – as will increasingly become the case over the next several years.
• Editor's note: The headline and photo caption in this article originally alluded to HBGary. HBGary Federal is the company in question, which is a distinct entity from HBGary Inc. The article has been amended to make that clarification at 9am (BST) on 23 June 2011
Asperger, vrijspraak, next.quote:Hacking suspect Ryan Cleary suffers from austim, court told
Teenager accused of hacking offences during probe into LulzSec group has been diagnosed with Asperger's syndrome
The British teenager accused of bringing down the website of the Serious Organised Crime Agency (Soca) has been diagnosed with Asperger's syndrome, a court has heard.
Ryan Cleary, 19, of South Beech Avenue, Wickford, Essex, was arrested as part of a Scotland Yard and FBI probe into hacking group LulzSec.
His lawyer told City of Westminster magistrates court on Saturday that Cleary has the form of autism, along with agoraphobia.
District judge Nicholas Evans heard that Cleary's condition had been diagnosed by a psychologist.
Cleary did not enter any plea to the five offences under the Criminal Law and Computer Misuse Act with which he is charged.
He was granted bail but remains in custody after prosecutors objected. An appeal will be heard at Southwark crown court on Monday. The teenager spoke only to confirm his name and to say that he understood the proceedings.
He was arrested at his family home on Monday as part of a Scotland Yard and FBI probe into LulzSec, a group that claims responsibility for hacking attempts on Soca, the US Senate and the CIA.
He is charged with conspiring with other people on or before 20 June to create a remotely controlled network of zombie computers, known as a "botnet", to carry out distributed denial of service (DDoS) attacks, where websites are flooded with traffic to make them crash.
He is alleged to have carried out similar attacks against the British Phonographic Industry's website on 29 October last year and the International Federation of the Phonographic Industry's website on or before 20 June.
Cleary's case has parallels with that of Gary McKinnon, who has Asperger's and is fighting extradition to America over allegations of hacking into US military computers.
Het artikel gaat verder, veel verder....quote:LulzSec leaks Arizona law enforcement papers (Updated with excerpts)
LulzSec announced Thursday evening the publication at Pirate Bay of a trove of leaked material from Arizona law enforcement agencies. Arizona's Department of Public Safety confirmed shortly thereafter that it was hacked.
In the press release included with the dump, a LulzSec affiliate outlines a more activist agenda than is usually associated with the group.
We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.
The documents classified as "law enforcement sensitive", "not for public
distribution", and "for official use only" are primarily related to border
patrol and counter-terrorism operations and describe the use of informants to
infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest
movements.
Every week we plan on releasing more classified documents and embarassing
personal details of military and law enforcement in an effort not just to reveal
their racist and corrupt nature but to purposefully sabotage their efforts to
terrorize communities fighting an unjust "war on drugs".
Hackers of the world are uniting and taking direct action against our common
oppressors - the government, corporations, police, and militaries of the world.
See you again real soon! ;D
With more than 700 bulletins, email archives, images and other files, the 440MB package will keep readers busy for days. A few excerpts from the most obviously newsworthy documents follow.
Amid countless AZDPS emails covering subjects ranging from internal training, policies, events and goings-on in the criminal underground, this remarkable circular:
"BELOW ARE PICTURES TAKEN AFTER A RAID ON A DRUG DEALER'S HOUSE IN MEXICO. ARE YOU READY FOR THIS???AREN'T WE GLAD THAT WE HAVE AN OPEN BORDER POLICY BETWEEN US? JUST LOOK AT HOW WELL ITS PAYING OFF........ I THINK ALLOWING MEXICAN TRUCKERS IN THE U.S. IS A GREAT IDEA!!! JUST TAKE A LOOK AT THE MILLIONS OF REASONS WHY......... SEE HOW WELL THESE TRUCKERS ARE DOING? WHAT THE @#@%*@ ARE WE THINKING??? Notice that nearly 100% of this money is U.S. Currency!!! Do you now wonder why the cost of living has catapulted in our country??? I don't...... Some of the illegal aliens we're letting in can afford anything at any cost!!! And for the ones who cannot........ We'll give it to them anyway!!!AND WE HAVE TWO BORDER PATROL AGENTS IN PRISON FOR SHOOTING AND WOUNDING A WELL DOCUMENTED MEXICAN DRUG DEALER! WHO, BY THE WAY, WAS ARMED AND ALSO HAPPENS TO BE A CONVICTED (BY MEXICO) MURDERER . MAKES A LOT OF SENSE, DOESN'T IT??? AUTOMATICS, SILENCERS...... THEY'RE ALL HAVING A NICE LAUGH ABOUT THIS STUFF AT OUR EXPENSE!!! And we want to give ILLEGAL ALIENS amnesty and not build the border fence because of funding!?!?!? SEND THIS TO EVERYONE, INCLUDING YOUR LOCAL CONGRESS REPRESENTATIVE. Our country is bleeding from the outside in!!! Don't you think it's time we take back what WE have sacrificed for over 140 years for??? I do. Build the fence higher and deeper, tighten border control, and send EVERY illegal alien home!!!"
In another email, there's discussion of the Mexican government using recently-bought radio gear to intercept U.S. communications:
"The FBI asked the Mexican Government to sign an "Intercept Agreement" stating that they would not use these devices to listen to U.S. Government radio traffic, and the Mexican Government declined to sign the agreement. The implication is that obviously the Mexican Government intends to do a lot of listening."
quote:50 Days of Lulz
Friends around the globe,
We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us.
For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others - vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It's what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself.
While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn't that interesting to know? The mediocre painter turned supervillain liked cats more than we did.
Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve.
So with those last thoughts, it's time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.
Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon.
Let it flow...
Lulz Security - our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe
------------------------------------------------------------------------------------------------------
Our mayhem: http://lulzsecurity.com/releases/
Our chaos: http://thepiratebay.org/user/LulzSec/
Our final release: http://thepiratebay.org/torrent/6495523/50_Days_of_Lulz
Please make mirrors of material on the website, because we're not renewing the hosting. Goodbye. <3
Waarom post jij ze niet?quote:Op zondag 26 juni 2011 01:15 schreef David1979 het volgende:
Volgens mij ben je een paar artikelen vergeten, game over voor je vriendjes
quote:Cops’ Crackdown on LulzSec Motivated by Embarrassment, Not Danger
Out of all the computer hackers in the world, the cops are fixated on Lulzsec. Not because they’re the most dangerous but because they’re the most embarrassing. They are also the most helpful. Priorities?
So far the group has by its own admission hacked: Sony (who hasn’t?), the Central Intelligence Agency, the U.S. Senate, Nintendo, the U.K. Serious Organised Crime Agency and National Health Service, the online game Brink, the Brazilian government, PBS and Fox (a bipartisan organization). Some of these attacks have involved taking records, others have been denial of service attacks and still others have just messed with the appearance of websites. (My fave is the “Tupac lives” story on PBS.)
What it has not done - as best as can be determined - is used its skills or the information it has gathered for personal profit. LulzSec turned down a reward from the security firm Berg & Berg which offered $10,000 to anyone who could change a picture on its website. Once the picture was changed LulzSec left a message saying it was easy to do. “Keep your money, we do it for the lulz.” (In case you don’t know, lulz is cyber slang for laughs. Ask any teenager.)
All hackers are not created equal
Judging by its behavior LulzSec is acting in the manner of the classical definition of the word, “hack”: Committing clever pranks or practical jokes. The group’s activities all support its claim that it is mainly interested in demonstrating that most online security is laughable:
This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn’t released something publicly. We’re sitting on 200,000 Brink users right now that we never gave out. It might make you feel safe knowing we told you, so that Brink users may change their passwords. What if we hadn’t told you? No one would be aware of this theft, and we’d have a fresh 200,000 peons to abuse, completely unaware of a breach.
So why are the authorities so determined to get Lulz? Because they’ve been embarrassed, because so far they’ve failed to get the WikiLeak’s loving Anonymous group and because — as far as can be told — they’ve failed to get any of the groups or people who are clearly making money from stealing information, i.e. criminals. (Whether Anonymous belongs in that last category is open to debate.)
Yesterday British police arrested Ryan Cleary, 19, and alleged he was a “significant” figure in LulzSec. The group responded in a post on its Twitter feed alleging that Cleary was not a member but, “We house one of our many legitimate chatrooms on his IRC server.” Since then the media has been filled with reports that the arrest was part of an international crackdown on the group.*
Cleary is the sixth Brit arrested in connection with the recent hacking attacks. He joins five arrested in January on suspicion of being involved in Anonymous. None of them have been charged, which may indicate something about the strength of the government’s case.
If the authorities around the world are going after LulzSec it is a waste of time and resources. These are better used going after actual threats (like groups extorting money from corporations) or maybe even improving computer security.
Photo: WikiCommons
*Because these are exactly the things you would expect these groups to say under the circumstances, it would be wise to take all these allegations with a lot of salt — and some tequila. “It is hard to believe that a man is telling the truth when you know that you would lie if you were in his place.” - H.L. Mencken
Read more: http://www.bnet.com/blog/(...)er/685#ixzz1QKhDcETE
Je bent gewoon lui.quote:
Nog steeds lui, linkdumper. Maak er dan een artikel van.quote:Op zondag 26 juni 2011 01:25 schreef David1979 het volgende:
[..]
Liever lui dan moe, maar vooruit:
http://lulzsecexposed.blogspot.com/search/label/Lulzsec
Dat zei Aaron Barr ook tegen z'n moeder.quote:Op zondag 26 juni 2011 01:30 schreef David1979 het volgende:
ja dat zei ik toch, liever lui...
kwestie van tijd
We zullen zien.quote:
Email, passwords, usernames, etc.quote:Connexion's First Hack
Dear Internetz,
My name is Connexion. I have hacked your website, http://www.pchardware.ro because it needed
to have a checkup with the SecDoctor. I have found many errors with your website and agree to tell
them to you via twitter, @Connexion_Lulz. I also want everyone reading this to note that it was me
who hacked them, and not some random person who copied everything and said it was theirs. I want you
to know that a simple MySQli should be prevented.
*NOTE* If you are wondering this is the 1st website that I have hacked. */NOTE*
Yes, I do look up to @LulzSec and @LulzRaft and hope that someday I can say that I am part of their
group taking down the internet one crappy security at a time. To prove that I hacked your website,
I provided a table below of all the usernames, emails and hashed passwords. To decrypt the passwords
go to http://passcracking.com and decrypt it. Some passwords can't be decrypted at the moment and that's
all good (Get Cain & Abel for that). Now, I have taken the liberty to put aside all interessing users to the
right. One has a .gov email so maybe governement :S and also there are the MD5 Hash Passwords too. So you can
tell that they switched from MD5 to whatever they use now. Also there is adultwomenmasturbating@google.com
which makes me LULZ all the time.
*ALSO NOTE* That most people use the same password for everything so check facebook and send SS! */ALSO NOTE*
So that is all I have to say at the moment. Please enjoy and definently talk to me on Twitter.
Regards,
_____ ______ _____ _____ _______ \ / _______ ______ _____
| | | | | | | | \ / | | | | |
| | | | | | | |______ \/ | | | | |
| | | | | | | | /\ | | | | |
_____ ______ | | | | |______ / \ ___|___ ______ | |
*ALSO ALSO NOTE* That these are not all of the users. They have 9257 users and i just don't want to take that long editing it. */ALSO ALSO NOTE*
=====================User Data=====================
quote:Why arresting lulzsec won’t change anything
Federal law enforcement agencies from around the world have been working to arrest members of the group known as lulzsec. Love them or hate them lulzsec has changed how the public views hackers and hacking. It has brought more attention to the cyber world and the cultures that develop there, and they have changed how some hackers operate Instead of quietly hacking smaller websites or targets of personal interest, they hack or attempt to hack government targets and post about it on social network and public chat rooms. Lulzsec declared war on the US Government and others like them have answered the call to arms. By doing this lulzsec has ensured that even if they themselves are caught their cause will live on without them, in fact if caught this would only likely motivate their followers further.
These “daughter groups” seem based on their region , on twitter I have seen “lulzsec” based groups for brazil and there have been reports of graffiti tags showing the word “antisec” and lulzsec’s mascot image in San Diego, I do not know how many other groups such as this are out there, but considering lulzsec’s over 200,000 twitter followers the number could be significant. Considering law enforcement’s history with dealing with cell based groups if they seriously want to stop the antisec movement they are going to need a different approach than the one they are currently taking, fighting them directly is only going to expand the antisec movement and fuel its anger.
Right now lulzsec and its allies have the advantage because their operation is popular and costs very little to operate but does a significant amount of damage, while Government forces cost significant amounts of money to train and operate and do very little damage. Considering how slow that governments are to adopt change, even when it directly benefits them lulzsec and its allies will be at this for quite some time.
If the governments were truly serious about stopping this threat they would work to defuse the anger and outright hate people feel toward the government these days, they would take steps to show people that they are not the bad guys and stop taking such a hard approach. They would pay more attention to public perceptions and address the issues that people have in a honest and transparent manner, being answerable to the public when questions are asked. For example there may be a perfectly rational explaination as to why the FBI took servers that didn’t seem to have anything to do with lulzsec from DigitalOne, but the people will never know why because they won’t comment, and when they do people feel like what they are told does not really explain anything, so without answers from official sources right away, people will just draw logical conclusions based on the available evidence , and said evidence makes it look like the FBI has no idea what it is doing and they have good reason to believe that.
As of late the governments actions in public have been disastrous and it has gotten to the point where people feel compelled to act to stop it. People feel like their rights are being stripped away and that they have no control over their own private lives. They are afraid. So when someone comes along and is not afraid, and not only not afraid but willing and able to act against the target of their fears, they rally around them and support them, feeling less afraid to act themselves, and after enough time they lose all fear of any legal repercussions because they believe they are morally right. This is the point we are at right now, they have motivated and emboldened people that the government has alienated and ignored. Stopping lulzsec won’t stop antisec, in fact it will likely do the opposite. The game has been changed, and right now the only winning move is not to play.
quote:Web censorship moves West
While few may object to blocking access to child pornography, online restrictions set dangerous precedent.
For a long time, the dominant conversation around internet censorship has focused on two of the practice's giants: Iran and China.
Arguably owners of the most sophisticated filtering methods, the criticism levied against these two countries has been deserved. And yet, the focus on them has largely been at the exclusion of other countries that also censor the web to varying degrees - including an increasing number of democracies.
In recent weeks, Turkey, Tunisia, and Australia have all made headlines for their various plans to introduce new filtering schemes. Though each country's plan differs, they all have similar focus: curbing access to obscene content.
But while blocking obscenity may reflect the will of the people, such filters nonetheless have implications for freedom of expression.
Australian ISPs 'aim to curb child sexual abuse'
In Australia, after several failed attempts by the government to introduce a mandatory filtering scheme, several Australian ISPs have taken matters into their own hands, blocking access to a list of 500 sites.
The ISPs will base their blacklists on a list maintained by the Australian Communications and Media Authority (ACMA), as well as - according to News.com.au - "child abuse URLs that are provided by reputable international organisations".
In 2009, a copy of the ACMA's blacklist was published by WikiLeaks, and was found to include the website of a Queensland-based dentist, a handful of Christian sites, and some YouTube videos - as well as adult sites deemed to be legal in Australia.
Such errors raise questions amongst free expression advocates about the lack of transparency in the process of determining which sites will be banned. There is also concern that there appears to be no appeals process by which to challenge sites banned by the ISPs.
Tunisia blocked pornography by court order
For years, Tunisia stood along with China and Iran as one of the world's most strict online censors. Following the January 2011 popular revolt, however, internet filtering became obsolete for a time.
Shortly thereafter, a military tribunal moved to block a handful of sites, including all individual Facebook profiles or pages.
The latest measure to block sites in Tunisia comes after a group of conservative lawyers filed a legal case to "impose the blocking of pornographic content". The Tunisian Internet Agency at first refused to implement the order and sought a stay of the ruling, but on June 13, the motion was denied and the Agency was forced to comply with the order.
The decision was met with derision by many Tunisians, some of whom protested on the grounds of personal freedom or concern that filtering any type of content would open the doors to further censorship; while others felt that the debate distracted from more important issues in the fledgling democracy. Still, some others were in support of the ban.
Turkey's four-pronged approach
Turkey's proposed filtering scheme has raised ire across the country, with citizens marching in the streets against censorship.
Though the scheme is meant to offer four opt-in layers of filtering - from "standard" to "children" - Turkish citizens realise they have plenty to lose. After all, the government has blocked YouTube and WordPress, among various other sites, for containing content deemed insulting to "Turkishness".
Meanwhile, Turkey's Law on the Internet #5651 allows any party to petition a court to block content for a range of reasons - including alleged defamation. Some Turkish analysts believe that the law is easily abused.
Furthermore, a 2009 report from the Organisation for Security and Cooperation in Europe highlighted that 80 per cent of Turkey's banned sites had been blocked at the behest of administrative decisions, rather than court rulings.
Though the new system's "standard" option will come without new filtering, there is no word as to whether already-blocked sites will remain banned.
Filtering is futile
While filtering - when conducted in the home or other private space - can be a good thing, such as preventing children from inadvertently accessing obscene or other undesirable content, government-level filtering does more harm than good.
Not only is it probable - and quite common - for "benign" sites to get caught up in content filters, blocking a certain type of content does not necessarily mean that such content ceases to exist; and in the case of child pornography, blocking may simply force such content "underground", to peer to peer and other private networks where perpetrators are more difficult to catch.
Filtering at the government or ISP level is costly, yet can be easily circumvented with minimal tech savvy, using widely available proxy tools.
Most problematically, setting a precedent of blocking websites simply makes it that much easier for a government or ISP to extend filtering as they wish.
While few might object to blocking child pornography, what happens when the filters go after politically sensitive content? Will anyone object then?
quote:2011-06-25 WikiLeaks Notes: Latest News on #Cablegate Releases, #WikiLeaks & More
This is a "WikiLeaks News Update," constantly updated throughout each day. The blog tracks stories that are obviously related to WikiLeaks but also follows stories related to freedom of information, transparency, cybersecurity, freedom of expression, and sometimes the national security establishment of the United States because each issue/topic helps one further understand WikiLeaks and vice versa. All the times are GMT.
Daar zit wat in natuurlijk, maar doet me een beetje denken aan die andere 'cell based' groep waar ze op dit moment tegen vechten en waarvan ze recent de leider hebben doodgeschoten.quote:Op zondag 26 juni 2011 10:49 schreef Papierversnipperaar het volgende:
Lulzsec declared war on the US Government and others like them have answered the call to arms. By doing this lulzsec has ensured that even if they themselves are caught their cause will live on without them, in fact if caught this would only likely motivate their followers further.
< >
Considering law enforcement’s history with dealing with cell based groups if they seriously want to stop the antisec movement they are going to need a different approach than the one they are currently taking, fighting them directly is only going to expand the antisec movement and fuel its anger.
< >
If the governments were truly serious about stopping this threat they would work to defuse the anger and outright hate people feel toward the government these days, they would take steps to show people that they are not the bad guys and stop taking such a hard approach
Het is gebruikelijke propaganda om de weerstand tegen een regime (US, Ghaddafi) aan te grijpen als excuus om nog harder te onderdrukken.quote:Op zondag 26 juni 2011 11:16 schreef David1979 het volgende:
[..]
Daar zit wat in natuurlijk, maar doet me een beetje denken aan die andere 'cell based' groep waar ze op dit moment tegen vechten en waarvan ze recent de leider hebben doodgeschoten.
Waar ze ook van weten dat die leider weer gewoon wordt opgevolgd en al is opgevolgd. Maar ze passen ze hun beleid niet aan, sterker, ze gooien er nog een schepje bovenop.
Inderdaad, daarom geloof ik ook niet echt in de theorie van de artikel schrijver, hoewel hij zeker een punt heeft.quote:Op zondag 26 juni 2011 11:28 schreef Papierversnipperaar het volgende:
[..]
Het is gebruikelijke propaganda om de weerstand tegen een regime (US, Ghaddafi) aan te grijpen als excuus om nog harder te onderdrukken.
there is morequote:Lulzsec & The Jester Expose each other, Long Live Anonymous ! : The Hacker News ~
Lulz war ! Today Hacking group "Lulzsec" completed their 50th day and also announce the retirement of Lulz boat. What are the Reasons behind this ? Lulz Security's rise to prominence has been extraordinarily fast.The hacking group first emerged in May and in the past few weeks has attacked the websites of some of the world's leading corporations and governments. The group specialises in locating websites with poor security and then stealing information from them and posting it online via Twitter account, well They have 278,429 Followers]in 50days.
To understand who/what lulzsec is, you need to understand where they came from. Everything originates from the chan (4chan/711chan/etc.) culture. It's a culture built around the anonymity of the internet. If your anonymous no one can find you. No one can hurt you, so your invincable.
According to Anonymous "The problem with Lulzsec is that they lack the skills to keep it going. As such after SONY they couldn't get into anything. So they switched their focus to just releasing random crap that didn't mean anything. Then they started running out of things they could hack. So they put out requests for people to join them. That got them a few hits, and now they've switched their gears again to be ANTI-SEC".
Sabu (Leader of Lulzsec) and Topiary are the only two people updating the twitter and releasing stuff. The gn0sis kids are gone in hiding somewhere. So the team include :
Sabu, Topiary , Kayla , gn0sis , Uncommon, EEKDACAT.
LULZSEC skills : We have seen that Lulzsec mostly hack random targets which are vulnerable and easily available on net via google Dorks. Now just check the Defacement section of "The hacker news" , you will get so much talented hackers of world, Then why these guys not having millions of followers ? Why these Indian, Pakistani and Albanian hackers don't get attention of Big media ? Its all because their aim was not to get Fame, they are testing their own skills and Learning from real world or whatever the other Reasons of hacks. Even PBS (Public Broadcasting Service) & Writerspace Hacked Again by Warv0x (AKA Kaihoe) . According to Warv0x (AKA Kaihoe) "This wasn't done for fame or fun,just proving LulzSec aren't as goodas they think they are. I haven't rooted the box or been up to crack the hashes, I'm just proving that most of their attacks are very lame and basic (i'm pretty sure and automated) SQL injections and further privilege escalation, which is just matter of time." He also said "Support for WebNinjas & Jester, good job at exposing them.Sad to mention, but I really agree with th3j35t3r & WebNinjas - LulzSec are just a bunch of script kiddies..."
klik voor meer.quote:“Anonymous Anti-fascists” Hack Several White Supremacist Websites Including newp.org
Stuff like this just puts a smile on my face. It has comes to my attention that www.newp.org, the website for the “North East White Pride” organization, as well as other sites belonging to them have been hacked. Here is part of what the hackers, describing themselves as “Anonymous Antifascists”, defaced newp.org with:
The hackers defaced the websites with a statement. They also released home addresses, phone numbers, email addresses, usernames and passwords and email correspondences of the administrator of the site, Robert O’Donovan. Here is the statement from the antifascists in full:
“——————————————————————————–
FOR A WORLD WITHOUT BORDERS, PRISONS, AND RACIST HATRED – SMASH WHITE SUPREMACY!
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
#opblitzkrieg #anonops #lulzsec #operationpayback #totaldestroythursday
——————————————————————————–
FOR IMMEDIATE RELEASE
Anonymous Anti-Fascist Hackers Deface White Supremacist Websites, Drop Dox
A Mob of Anonymous Anti-fascist hooligans hacked into several white supremacist
websites belonging to North East White Pride(newp.org), Local 1488 Store
(local1488.com), Racist-Jokes.com, and more, defacing with anti-racist messages
and leaking private information. We’re dropping usernames, passwords, home
addresses and phone numbers of over 1000 active nazis in the US. We also spammed
35,000+ nazi emails with this message to make them sleep a little less easy at
night. We did this to expose and disrupt the racist scum who associate with
their white supremacist group and purchased items from their online Nazi store.
Just two weeks ago the webmaster Rob O’Donovan and his racist organization North
East White Pride attempted to hold a white supremacist gathering in the
Worchester Public Library but instead were greeted with a dozen antifa who burst
into their meeting black-clad-bandana’d-out and beat the nazis down with chairs
and u-locks. A week later, they obviously didn’t get the hint to cut the nazi
shit, so we had to own them hardstyle when a week later they attempted to hold
an anti-immigrant “Close The Border” rally.
Detailed private information about Rob was leaked including confidential emails,
online store transactions, phone and address information for him as well as the
thousands of nazis who purchased items from his store local1488.com. The leaked
emails revealed Rob was working with Detective Andrew Creed from the Boston
Police Intelligence Unit who regularly “made sure that your group was able to
get their message out in a safe manner” against “problems with ‘antis’ showing
up”. Rob also runs Tea Party websites regularly bringing other nazis to Tea
Party rallies further demonstrating the connections between “mainstreamized”
racists in the Tea Party and violent neo-nazi extremists.
We believe in militant direct action to smash white supremacy, expose them to
their communities, confront them at their jobs and homes, and disrupt their
organization’s ability to conduct meetings/rallies, distribute their hateful
propaganda, and communicate on the internet. Those who want us in the gas
chambers, who seek to take away our freedoms, deserve it not for themselves.
Just as we smash organized white supremacists, we also smash white-hat corporate
“hacker” sellouts who work for the government, military, law enforcement, and
the corporate security industry. You need us, but we don’t need you. Fuck the
FBI, Fuck NATO, and Fuck Ingragard. Props to real OG hackers who still break
into and destroy the systems of our enemies: lulzsec, anti-sec, hackbloc, zfo,
el8, h0no, project mayhem, phc, phrack, fox, #school4lulz and countless more.
The defaced websites are:
freedomhost.info, newp.org, local1488.com, patriotpages.us, teapartyflags.us,
darklordshop.com, racist-jokes.com, iussa.org, ascribewriting.com,
listen-n-post.com
The server formerly hosted the websites:
blackserialkillers.org, rockinghampatriots.info, ohiowhitepride.com,
boycotttheboycott.info, aryanvolkofmidgard.com, thefoundersplan.org”
While I’m sure more will come to light after all the leaked emails have been perused, one email from Detective Andrew Creed of the Boston Police Intelligence Unit to O’Donovan. In the email Creed seeks O’Donovan’s cooperation and offers his help to make sure the “antis” don’t cause a problem at NEWP’s event. The email:
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |