quote:http://pastebin.com/dE1bX4uN
birmingham SSN list: http://pastebin.com/T4M2xtGz
boston police password list: http://pastebin.com/HkxFzncy
full 550MB torrent coming soon!
*** view original defacement: http://zone-h.org/mirror/id/15679304
!!!!!!!!!!!!!!!!!!! SPECIAL #OCCUPYWALLSTREET EDITION !!!!!!!!!!!!!!!!!!
#ANTISEC SOLIDARITY WITH OCCUPATION MOVEMENT & ANTI-POLICE BRUTALITY PROTESTERS
quote:################################################################################
# INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE HACKED DURING 2011 CONFERENCE #
# ON OCTOBER 22ND INTERNATIONAL DAY OF ACTION AGAINST POLICE BRUTALITY #
################################################################################
_ _ __ .__
__| || |__ _____ _____/ |_|__| ______ ____ ____ #anonymous
\ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #antisec
| || | / __ \| | \ | | |\___ \\ ___/\ \___ #freeanons
/_ ~~ _\ (____ /___| /__| |__/____ >\___ >\___ > #occupywallstreet
|_||_| \/ \/ \/ \/ \/ #fuckfbifriday
################################################################################
# WHITE HATS, COP LOVERS, PLAYER HATERS AND MOVEMENT TRAITORS WATCH YOUR BACK! #
# WE ARE ANONYMOUS. WE DO NOT FORGIVE. WE DO NOT FORGET. EXPECT US! #
################################################################################
The IACP thought they could hold their 2011 annual conference in Chicago
unfettered by the clutches of insurrection. They must not have known their
conference starts on the Day of Action Against Police Brutality. They must not
have known that all over the world people are in the streets demonstrating
discontent with capitalism and the state. They also had no idea that for the
past few months black hat hackers have been owning their websites and databases.
They should have expected us.
In solidarity with the Occupation Movement and the International Day of Action
Against Police Brutality, allied #anonymous and #antisec vessels took aim at the
corrupt bootboys of the 1%: the police. We hacked, defaced, and destroyed
several law enforcement targets, leaking over 600MB of private information
including internal documents, membership rosters, addresses, passwords, social
security numbers, and other confidential data. According to the IACP's
development documents, their systems cost several hundred thousand dollars. We
are pleased to destroy it all for free, leaking their private info and defacing
their websites in one swift blow.
quote:The Pirate Bay Adds Domain to Bypass Court Order
Showing how futile Internet censorship can be, The Pirate Bay has registered a new domain name to allow Belgian users to access the site and bypass a recent court order. For just a few dollars, The Pirate Bay should now be fully accessible in the future, and the site has already started redirecting Belgian users to their new home.
Yesterday the Antwerp Court of Appeal ordered the Belgian ISPs Belgacom and Telenet to initiate DNS blockades of 11 domains connected to The Pirate Bay within 14 days or face fines.
The local anti-piracy movement applauded the verdict, which they see as a landmark case that will open the doors for further censorship attempts. However, it is questionable that it will have much of an effect.
Earlier today we already reported how the usenet indexing site Newzbin2 updated its anti-censorship client to allow Belgians to keep their access to The Pirate Bay. And a few hours later The Pirate Bay team delivered an even easier solution.
“The Judge obviously has no idea what he’s dealing with, because the verdict of this expensive court battle can be easily undone,” The Pirate Bay team told TorrentFreak.
“Just a few minutes ago we registered a new domain that’s not listed in the order. We have already started pointing users from Belgium to the new address, so they know where to go when their ISPs implement the DNS blockade.”
The new domain name is “depiraatbaai.be,” the literal translation of The Pirate Bay in Dutch. The new domain is already pointing to The Pirate Bay’s servers and people accessing the standard domain from a Belgian IP-address will be redirected to the new home.
“We have to admit that Belgian domain names are not cheap, but we have to make a stand here,” The Pirate Bay team told us.
The above is a clear example that the people judging on these issues don’t have the slightest idea what they’re dealing with. This is supported by the fact that the actual court order only lists the www domains of The Pirate Bay and not the bare addresses (www.thepiratebay.org vs. thepiratebay.org).
The ‘error’ above was pointed out by Maarten Schenk and soon picked up by the mainstream media in Belgium. They point out that if the verdict is taken literally, the ISPs don’t have to block the domains without the www. A massive failure.
“Let’s hope the ISPs are brave enough to put this theory to the test,” The Pirate Bay team notes.
The take home message is, as always, that there are plenty of options for users and site admins to bypass these and other censorship attempts. Or as John Gilmore once said: “The Net interprets censorship as damage and routes around it.”
For the time being the number of Belgian visitors to The Pirate Bay is only going up.
quote:http://fffff.at/occupy-the-internet/
Are you a “webmaster”, admin, blog owner or someone with access to index.html files? Are you interested in taking part in the recent global wave of revolution from the comfort of your home computer? Occupy the Internet!
quote:Researchers ID Skype Users Who Also Use BitTorrent
Entertainment companies seeking to trace people who are illegally file sharing may be interested in new research that could identify file-sharers through their Skype accounts. A research team has figured out how to link online Skype users to their activity on peer-to-peer networks, a correlation that could represent a major threat to users' privacy.
quote:A Skype user's IP address can be figured out even without their knowledge due to a major privacy vulnerability, the researchers wrote. Skype was notified in May -- the same month that it was announced Microsoft had acquired the company -- but the issue has not been fixed.
quote:Online political hacker group hits Boston police websites
A politically motivated computer hacker group attacked and brought down dozens of police websites around the country and said it posted e-mail information about nearly 1,000 Boston police officers Friday, claiming it was working in support of the Occupy protest movement.
Anonymous, the group taking credit for the computer intrusions, said in a statement, “In solidarity with the Occupation Movement and the International Day of Action Against Police Brutality, [we] aim at the corrupt bootboys of the 1 percent: the police.”
Specifically, the group said it attacked multiple Boston police websites. Most notably, Anonymous claimed to have hacked the Boston Police Patrolmen’s Association website and its web-based e-mail portal, posting the names, e-mail addresses, and passwords of Boston police officers on the Internet for all to see.
In the statement, Anonymous said it attacked BPD sites in response to “the unprovoked mass arrests and brutality experienced by those at Occupy Boston.”
“Let this be a warning to BPD and police everywhere: future acts of aggression against our movements will be met with a vengeance ... ,” the statement read.
Early on Oct. 11, Boston police moved in on some of the Occupy Boston protesters on the Rose Fitzgerald Kennedy Greenway and arrested 141 demonstrators.
Late Friday night, Boston police acknowledged the cyber attack, saying in a statement: “It has come to the attention of the Boston Police Department that various websites used by members of the BPD -- including the website belonging to the Boston Police Patrolmen’s Association -- have been hacked into and possibly compromised. In light of this information, the Boston Police Department is requiring all department personnel to secure their login information by resetting their passwords on the BPD network.”
The department recommended that police officers change their e-mail passwords and any other Internet, e-mail, and wireless device passwords.
A Boston police spokeswoman could not be reached for comment early this morning.
The group claimed that it “hacked, defaced, and destroyed several law enforcement targets, leaking over 600MB of private information including internal documents, membership rosters, addresses, passwords, Social Security numbers, and other confidential data.”
It claimed to take down at least 40 police-related websites.
The International Association of Chief of Police website was also targeted. The website was down and unreachable early this morning.
Anonymous also took aim at the website of Matrix Group International, which provides Internet services for government agencies. The Matrix website was down early this morning.
Anonymous also claimed to have hacked Birmingham/Jefferson County, Ala., police websites, releasing the names, addresses, and Social Security numbers of nearly 1,000 police officers.
Described as “e-Robin Hoods,” the Internet group Anonymous is known for its hacking skills and online activism.
In a video regarding the police clashes with occupiers on Wall Street, Anonymous said, “This event serves to remind us that we’re living in a police state with absolutely no respect for the right of the people to peacefully assemble and exercise their constitutional free speech. But we will not be scared away… This abuse of authority by the NYPD only serves to strengthen our resolve and reinforce our belief that corruption and injustice in America must be fought.”
“We are Anonymous,” said the masked, computerized voice. “We do not forgive. We do not forget. Expect us.”
quote:Anonymous hacktivists claim child porn takedown
Group may be doing more harm than good, critic warns
The internet hacktivist group Anonymous says it temporarily took down more than 40 child pornography sites on a hidden network and posted a list of more than 1,500 of the sites' usernames online.
Earlier in October, "Operation Darknet" used denial-of-service attacks to disable a server called Freedom Hosting that it identified as "the host of the largest collection of child pornography on the internet," Anonymous said in a statement posted on PasteBin, a text storage site used mainly by programmers.
A particularly large site called "Lolita City," that contained more than 100 gigabytes of child pornography, the group added. Denial-of-service attacks flood websites with traffic, making them unavailable. In this case, the Freedom Hosting sites were unavailable for 30 hours, Anonymous said.
The group then demanded that all child pornography be removed from the sites.
The sites, located on a hidden "darknet" on an anonymous network called Tor, refused and managed to restore their services, but Anonymous has been targeting them with other tools since then, the group said.
"We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography," it added in a statement.
The Tor network and a related site, I2P, were originally designed for and used by activists in countries with authoritarian governments, such as China and Iran.
'Unfortunately, a potentially benevolent resource has been corrupted by these sick and sadistic abominations of the world," Anonymous said in a statement posted on YouTube on Oct. 17.
Some internet users praised Anonymous's campaign as "awesome" and a "great job" in messages posted on YouTube, Twitter and other online forums.
Campaign may put more kids at risk: security blogger
However, the group also faces criticism for the attacks.
Graham Cluley, Vancouver-based senior technology consultant at internet security company Sophos, wrote on the company's Naked Security blog Monday that Anonymous's " intentions may have been good, but take-downs of illegal websites and sharing networks should be done by the authorities, not internet vigilantes."
He suggested that such "amateur" attacks could compromise investigations by police, preventing successful prosecutions.
"They may have inadvertently put more children at risk through their actions," he added.
He suggested that the right thing to do with online evidence of child abuse is to report it to "appropriate authorities."
He also suggested that people who use the child pornography sites were unlikely to use their own names as usernames, and releasing the names may therefore put innocent people at risk.
Anonymous is een idee, het idee dat je mensen informeert en dat er dan vanzelf iets gebeurd.quote:Op dinsdag 25 oktober 2011 15:48 schreef 3M1N3M het volgende:
Heeft Anonymous iets te maken met Illuminati?
quote:October 19, meeting, message from #freeanons:
Until a few months ago, Anonymous was doing some big operations with much importance but we also had lulz but some where reckless and got arrested. We are immensely proud, humbled to the core to be a part of the idea of anonymous, proud of what we can do and proud of our growing power and influence. We were and are still convinced that our action, methods were completely legal and cause no harm, despite the minimal economic damage that few companies we attacked claim.
These companies and states that protect them self have declared war against us, not because of the alleged damage, but mostly of the disgrace on there honour and the global conscience and awareness we helped to create. A hundred of our friends in several countries are now paying the unjust price of this unjust war. Their number is growing almost every day. This war will be long and we must win it.
The purpose of #freeanons is to anticipate the damage that this war will cause by creating an international solidarity structure. It is trough such a structure that we can organise and win our legal defence and show solidarity to our arrested friends…. WE can not, We must not abandon them, our motto is an anon = an anon.
Nix and horsefeet aka Nancy and David worked for months to offer us a legal and full transparent structure for the fund raising, “Freeanons Solidarity Inc.” is finally born, we celebrate this first victory with you tonight. See http://www.freeanons.org
Major causes attract great persons, a huge team joined us helping for all this operation needs; Website, flyers, posters, documentation, legal studies and fund raising
Every additional help is always welcome and needed!!
twitter:dherics twitterde op donderdag 27-10-2011 om 17:18:18RT @YourAnonNews Keep sending in links of police brutality, I need to get to them before google takes them down. #Anonymous #OWS #CabinCr3w reageer retweet
quote:Hacker leaks 90,000 passwords as a warning to 'naive' Swedes
Right-wing MP's Twitter account hijacked and popular portals and websites compromised in country's worst-ever online attack
Sweden has suffered its worst-ever data leak after an anonymous hacker hijacked the Twitter account of a prominent MP and released details of more than 90,000 private email accounts.
The hacker struck this week when he disclosed the passwords and email details of several Swedish political journalists. He tweeted them from the account of William Petzäll, a controversial 23-year-old far-right MP.
Petzäll denied having anything to do with the leak.
He pointed out that he has been receiving treatment for drug and alcohol addiction at a clinic in Sweden, after resigning last month from the anti-immigrant Sweden Democrats party.
The scandal deepened when it emerged the hacker had also raided the popular Swedish blog portal, Bloggtoppen.se.
He appears to have broken in several months ago – making off with more than 90,000 passwords and usernames.
These have also now been leaked, making it easy to hack the accounts of well-known politicians, editors and celebrities. The Aftonbladet newspaper also reported that another 57 websites have been compromised, potentially releasing the login details of up to 200,000 people.
The hacker's identity remains unknown. His online name is: sc3a5j.
In an interview with Expressen newspaper, he said he had masterminded the biggest internet breach in Sweden's history to remind people to change their passwords more often.
He said: "I dumped this information to let people know that they handle their information wrongly.
"Many web pages are not up to scratch. And consumers need to know they should never use the same [passwords] for different services on the web.
"This is how we got into Twitter accounts as well."
Expressen journalist Micke Ölander said on Thursday the affair wasn't an example of political skulduggery but was merely a wake-up call not to use the same password for all accounts.
"It's a story about the possible naivety of Swedish internet users who log into their bank account and the New York Times web pages using the same password," he said.
quote:Wanted: Oakland cop who injured Iraq War veteran - Anonymous offers bounty
$1,000 USD, this is the price to be paid - no questions asked - for the name of the Oakland Police officer who critically wounded an Iraq War veteran. The cash reward comes as the veteran, 24 year-old Scott Olsen, remains listed as in serious, but stable condition.
quote:Anonymous Response to the threat by the NYPD
Dear the members of the NYPD
We are Anonymous, we have recently read a statement that was released by an official in your department. We are quite amused, we are so amused we have decided to release this statement. We understand your loyalty to your partners of the New York Police Department, what we do NOT understand is your irresponsible propaganda that is being released by your partners. Every one of the demonstrators has been very peaceful, a few curse words and a few name calling rants is NOT violence nor is it considered a threat. What IS a threat is being told to disperse from an area or face consequences as severe as being admitted into Bellevue Hospital for psych evaluation, that IS a threat, not only is that a threat but it is a form of terrorism. How you ask? let me explain, locking someone up in a mental institution for practicing their right to assemble and their right to freedom of speech is a form of psychological terror. You have put countless amount of OUR brothers and sisters in the hospital and in lockup, sometimes blinded by pepper spray that YOUR partners in the WHITE shirts have used very irresponsibly.
WE the people have a RIGHT to defend ourselves, WE the people have a right to FREE speech, WE the people have a right to ASSEMBLE, and you have shown nothing but disregard for the constitution you were sworn into to protect. So now we will conclude this letter with a fair warning, IF ANY of our brothers and sisters are hurt in any way, WE will file complaints with the GRAND JURY against your partners that your protect in the WHITE shirts. Remember while you do not know who we are, we DO know who you are, and we have lots of PROOF of the terror that your partners are trying to unleash amongst peaceful assembling Americans who are in their right to do what they are currently doing. DO NOT threaten the safety of the people, and do not harm any of our brothers and sisters and believe your actions will not be seen nor addressed, and always remember, you are here to protect US.
We are Anonymous
We are Legion
We are the 99%
We do not forgive
We do not forget
Expect Us!
twitter:Op_ESR twitterde op vrijdag 28-10-2011 om 18:36:59#SFSD ESU Officer #Bergstresser = Officer Who Injured #ScottOlson ~ #OpESR #A99 #AntiSec #ProSec #InfoSec #OWS reageer retweet
quote:Anonymous Hackers Retaliate Against Oakland PD
The prolific and shadowy Anonymous hacking group has launched a full-scale online attack against the Oakland Police Department in retaliation for an instance of violence this week that has the city in an uproar.
The multi-pronged hacktivism campaign, called "OpUprise," is Anonymous' response to what is sees as the police department's gross mishandling of the Occupy Oakland protestors, in particular the incident surrounding Scott Olsen.
quote:
quote:Electronic Arts: Spiele-Gigant will Kunden ausspionieren
Der Spielehersteller Electronic Arts will mit "Battlefield 3" einen Bestseller landen - doch über eine mitgelieferte Spionage-Software kann der Konzern die Käufer ausspähen. Gamer und Juristen sind empört, Datenschützer ermitteln.
quote:Online hackers threaten to expose cartel's secrets
Group called Anonymous demands release of one of their own who was kidnapped
An international group of online hackers is warning a Mexican drug cartel to release one of its members, kidnapped from a street protest, or it will publish the identities and addresses of the syndicate's associates, from corrupt police to taxi drivers, as well as reveal the syndicates' businesses.
The vow is a bizarre cyber twist to Mexico's ongoing drug war, as a group that has no guns is squaring off against the Zetas, a cartel blamed for thousands of deaths as well as introducing beheadings and other frightening brutality.
"You made a huge mistake by taking one of us. Release him," says a masked man in a video posted online on behalf of the group, Anonymous.
"We cannot defend ourselves with a weapon … but we can do this with their cars, homes, bars, brothels and everything else in their possession," says the man, who is wearing a suit and tie.
"It won't be difficult; we all know who they are and where they are located," says the man, who underlines the group's international ties by speaking Spanish with the accent of a Spaniard while using Mexican slang.
He also implies that the group will expose mainstream journalists who are somehow in cahoots with the Zetas by writing negative articles about the military, the country's biggest fist in the drug war.
"We demand his release," says the Anonymous spokesman, who is wearing a mask like the one worn by the shadowy revolutionary character in the movie V for Vendetta, which came out in 2006. "If anything happens to him, you sons of (expletive) will always remember this upcoming November 5."
The person reportedly kidnapped is not named, and the video does not share information about the kidnapping other than that it occurred in the Mexican state of Veracruz during a street protest.
Anonymous draws its roots from an online forum dedicated to bringing sensitive government documents and other material to light.
If Anonymous can make good on its threats to publish names, it will "most certainly" lead to more deaths and could leave bloggers and others open to reprisal attacks by the cartel, contends Stratfor, an Austin-based global intelligence company.
"In this viral world on the Internet, it shows how much damage could be done with just one statement on the Web," said Fred Burton of Stratfor, which published a report Friday that probes the implications of the cartel drawing the activists' ire.
Mike Vigil, the retired head of international operations for the Drug Enforcement Administration, said the Zetas must take Anonymous seriously.
"It is a gutsy move," Vigil said. "By publishing the names, they identify them to rivals, and trust me, they will go after them."
Ik ben toch erg benieuwd hoe dit gaat aflopen. Het zou toch een enorme overwinning zijn als een geweldloze groepering iemand uit handen van de Zeta's weet te krijgen.quote:
twitter:YourAnonNews twitterde op zondag 30-10-2011 om 13:56:40Starting today #OpCartel begins. Heads up #Zetas! reageer retweet
quote:#OpDarknet Official Release -- 10/30/2011 - Pedo hunt trophies, Bear Rugs for Mike Perry
In our last battle against Pedo Fort aka Freedom Hosting, we scored a major victory against the army of child pornographers. We were able to use 'The Legion' and 'Chris Hansen' to level pedo fort for over about 30 hours. To our shock, the community of pedos were able to quickly regroup and rebuild Lolita City and Freedom Hosting within a week. While us Anons regrouped to plan a new strategy, the World suddenly became aware of our little war against child pornography.
Amiss the publicity, the pedos collaborated and dreamed of schemes for ways to disprove Operation Darknet. False stories were planted against the IT community about us Anons didn't "hack" Freedom Hosting and Lolita City. What the pedos didn't realize was that we actually took a secret treasure chest from their pedo fort. We worked silently for weeks to try and crack the lock containing this treasure that the pedo bear was diligently trying to protect.
At-last, we cracked the lock and found the true identity of the builder and architect of Freedom Hosting. What we found was truly shocking, it was the deeds to a California, USA 'shell' company for 12 Tor Exit Nodes named Formless Networking LLC.
quote:An Open Source Analysis of the Anonymous - Los Zetas Op
In order to gauge the potential impact of Anonymous' threat against Los Zetas (or any target), you need to assess the size of the attack surface. The larger the online footprint of the target, the greater the potential impact of the attack. Stratfor's Oct 28 analysis underestimates the Cartel's digital footprint and ignores Mexicos' indigenous hacker population: "The online media frequently used to organize Anonymous-labeled activities are far removed from the violent world of Mexican criminal cartels. This distance — along with the likely physical distance of many Anonymous members from Mexico — could limit the activists’ understanding of cartel activities."
For my analysis, I've examined two data sets: the size of the South American hacker population and the use of online tools by the Zetas and other Mexican crime syndicates and cartels. The asymmetrical nature of cyber conflict doesn't require large numbers of Anonymous members to be involved to be effective but there are certain parameters that will impact the measure of success of their op; one - the number of Anonymous members who speak the language and know the terrain and two - whether the Zetas or their associates use social networks enough for them to be vulnerable.
Mexican Hackers
Assuming that some of Anonymous members are hackers rather than script kiddies, Diosdelared.com might be a good starting point. Diosdelared.com is a large, popular South American hacker forum that has doubled in size since Taia Global analysts first reviewed it in April 2010. It now has 4524 members of which 1351 are from Mexico, 1201 from Argentina, 461 from Peru, 443 from Spain, 227 from Columbia, and 219 from Venezuela. There hasn't been any mention yet of OpCartel in their public postings but with over 1300 members who self-identify as Mexican, even a ten percent participation rate could have a significant impact on the Zetas' organization.
Mexican Drug Gangs
The use of online tools by drug gangs has been escalating. YouTube has been a popular medium to generate fear and recruit new members for several years. Facebook and Twitter were added to their toolkit in April, 2010, when a drug gang shuttered the Mexican town of Cuernavaca by spreading threats of violence via social networks to anyone who broke their curfew. The streets of Cuernavaca stayed empty for the designated period. In August, 2011 Mexican drug gangs learned how useful social networks can be for targeting victims. Also last summer, the head of the Beltran Leyva gang hired a computer technician to assist him in becoming "virtual". The specific degree of the Zetas online presence isn't known but they're clearly building a digital fingerprint if the history of their peers is any indication; a fingerprint that could be uncovered and exploited by a group like Anonymous.
Summary
If Anonymous makes good on their threat to release information on the Zetas' businesses and associates on November 5, their rivals and hopefully law enforcement would almost certainly exploit that information to hurt the Zetas. More importantly, if the OpCartel movement attracts broad Mexican and South American support, it could be the beginning of a movement that would lead to the overthrow the drug cartel's power and influence in Mexico. The fact that Mexico is about to begin one of its most important holidays - Dia de los Muertos (the Day of the Dead) - is highly significant. The combination of religion and patriotism is a potent mix, and the Anonymous movement is riding on a wave of successes that connect social media to revolutionary change in the Middle East, North Africa, and the global Occupy movement. Why not Mexico as well?
quote:Met police using surveillance system to monitor mobile phones
Civil liberties group raises concerns over Met police purchase of technology to track public handsets over a targeted area
Britain's largest police force is operating covert surveillance technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area.
The surveillance system has been procured by the Metropolitan police from Leeds-based company Datong plc, which counts the US Secret Service, the Ministry of Defence and regimes in the Middle East among its customers. Strictly classified under government protocol as "Listed X", it can emit a signal over an area of up to an estimated 10 sq km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person's movements in real time.
The disclosure has caused concern among lawyers and privacy groups that large numbers of innocent people could be unwittingly implicated in covert intelligence gathering. The Met has refused to confirm whether the system is used in public order situations, such as during large protests or demonstrations.
Nick Pickles, director of privacy and civil liberties campaign group Big Brother Watch, warned the technology could give police the ability to conduct "blanket and indiscriminate" monitoring: "It raises a number of serious civil liberties concerns and clarification is urgently needed on when and where this technology has been deployed, and what data has been gathered," he said. "Such invasive surveillance must be tightly regulated, authorised at the highest level and only used in the most serious of investigations. It should be absolutely clear that only data directly relating to targets of investigations is monitored or stored," he said.
Datong's website says its products are designed to provide law enforcement, military, security agencies and special forces with the means to "gather early intelligence in order to identify and anticipate threat and illegal activity before it can be deployed".
The company's systems, showcased at the DSEi arms fair in east London last month, allow authorities to intercept SMS messages and phone calls by secretly duping mobile phones within range into operating on a false network, where they can be subjected to "intelligent denial of service". This function is designed to cut off a phone used as a trigger for an explosive device.
A transceiver around the size of a suitcase can be placed in a vehicle or at another static location and operated remotely by officers wirelessly. Datong also offers clandestine portable transceivers with "covered antennae options available". Datong sells its products to nearly 40 countries around the world, including in Eastern Europe, South America, the Middle East and Asia Pacific. In 2009 it was refused an export licence to ship technology worth £0.8m to an unnamed Asia Pacific country, after the Department for Business, Innovation and Skills judged it could be used to commit human rights abuses.
A document seen by the Guardian shows the Metropolitan police paid £143,455 to Datong for "ICT hardware" in 2008/09. In 2010 the 37-year-old company, which has been publicly listed since October 2005, reported its pro forma revenue in the UK was £3.9m, and noted that "a good position is being established with new law enforcement customer groups". In February 2011 it was paid £8,373 by Hertfordshire Constabulary according to a transaction report released under freedom of information.
Between 2004 and 2009 Datong won over $1.6 (£1.03m) in contracts with US government agencies, including the Secret Service, Special Operations Command and the Bureau of Immigration and Customs Enforcement. In February 2010 the company won a £750,000 order to supply tracking and location technology to the US defence sector. Official records also show Datong entered into contracts worth more than £500,000 with the Ministry of Defence in 2009.
All covert surveillance is currently regulated under the Regulation of Investigatory Powers Act (Ripa), which states that to intercept communications a warrant must be personally authorised by the home secretary and be both necessary and proportionate. The terms of Ripa allow phone calls and SMS messages to be intercepted in the interests of national security, to prevent and detect serious crime, or to safeguard the UK's economic wellbeing.
Latest figures produced by the government-appointed interception of communications commissioner, Sir Paul Kennedy, show there were 1,682 interception warrants approved by the home secretary in 2010. Public authorities can request other communications data – such as the date, time and location a phone call was made – without the authority of the home secretary. In 2010, 552,550 such requests were made, averaging around 1,500 per day.
Barrister Jonathan Lennon, who specialises in cases involving covert intelligence and Ripa, said the Met's use of the Datong surveillance system raised significant legislative questions about proportionality and intrusion into privacy.
"How can a device which invades any number of people's privacy be proportionate?" he said. "There needs to be clarification on whether interception of multiple people's communications – when you can't even necessarily identify who the people are – is complaint with the act. It may be another case of the technology racing ahead of the legislation. Because if this technology now allows multiple tracking and intercept to take place at the same time, I would have thought that was not what parliament had in mind when it drafted Ripa."
Former detective superintendent Bob Helm, who had the authority to sign off Ripa requests for covert surveillance during 31 years of service with Lancashire Constabulary, said: "It's all very well placed in terms of legislation … when you can and can't do it. It's got to be legal and obviously proportionate and justified. If you can't do that, and the collateral implications far outweigh the evidence you're going to get, well then you just don't contemplate it."
In May the Guardian revealed the Met had purchased software used to map suspects' digital movements using data gathered from social networking sites, satnav equipment, mobile phones, financial transactions and IP network logs. The force said the software was being tested using "dummy data" to explore how it could be used to examine "police vehicle movements, crime patterns and telephone investigations."
The Met would not comment on its use of Datong technology or give details of where or when it had been used.
A spokesman said: "The MPS [Metropolitan police service] may employ surveillance technology as part of our continuing efforts to ensure the safety of Londoners and detect criminality. It can be a vital and highly effective investigative tool.
"Although we do not discuss specific technology or tactics, we can re-assure those who live and work in London that any activity we undertake is in compliance with legislation and codes of practice."
A spokesman for the Home Office said covert surveillance was kept under "constant review" by the chief surveillance commissioner, Sir Christopher Rose, who monitors the conduct of authorities and ensures they are complying with the appropriate legislation.
He added: "Law enforcement agencies are required to act in accordance with the law and with the appropriate levels of authorisation for their activity."
Datong declined to comment
quote:Anonymous cancels crackdown on Mexican Zetas drug cartel — Update 1 —
10/30/2011
Mexico City Anonymous group anounced it has cancelled reprisals against the Zetas cartel for being a very risky operation. It was informed through a press and social networks for different users.
After the disappearance of one of its members in Veracruz, one of the members announced reprisals against the drug cartel “Los Zetas” with “Operation Cartel.”
However, because of the great risks involved in leaking information and to safeguard the integrity of persons adhering to the collective group of hackers, they decided to cancel the whole operation.
“Destroying # OpCartel because the lives of people who are not participating can be put at risk,” was published in the first text of the cancellation of the operation, through Twitter account @ Sm0k34n0n.
Before this action the company of strategic intelligence analysis, Stratfor, published an article about the “serious risk” involving actions of leakage of information about members of Los Zetas.
“Last October 6 Anonymous posted to inform on those who are members of Los Zetas … if Anonymous carries out its threat, it will almost certainly lead to death of the persons named as members of the cartel, whether or not the information published is accurate, “says the article by Stratfor.
In an interview with Milenio, two members of Anonymous, Skill3r and GlynissParoubek were in contact to explain the circumstances:
Milenio – Why was it decided to cancel the operation?
Anonymous – We can not be reckless administrators to condemn to death those who participate, we have talked and discussed extensively by all and it was decided to remove it.
Milenio – So why issue threats?
Anonymous – It’s very easy to make a video on behalf of Anonymous and launch air threats, but to think, plan, and evaluate the pros and cons is another story,” they said.
Milenio – What’s next?
Anonymous – “There will be other operations, but for now we hope to make clear that the cartel operation is false.”
Anonymous released a statement where they reject any relation with pages publishing names of officials involved in the Los Zetas cartel.
“Dear followers and supporters of this page (Anonymous). I hereby disclaims Mexico Anonymous entirely the responsibility of the news of hacking a page that is linked to alleged Zetas cartel,” is detailed in the text circulated.
“Our struggle is not of this type and our ideals do not go with that operation. The article published by various electronic means is completely false. We ask for your support to spread this news” They ended denying the media who published the page.
Milenio
Previous posts related to this
http://neglectedwar.com/blog/archives/7775
http://neglectedwar.com/blog/archives/8485
http://neglectedwar.com/blog/archives/8516
http://neglectedwar.com/blog/archives/8590
——————————————————–
Update 1
OpCartel Anounced it will continue its fight against Zetas independently from Anonymous
quote:http://thepiratebay.org/t(...)d_Defense_Industries
For #FuckFBIFriday, we are releasing 1GB of private emails and documents
belonging to Vanguard Defense Industries(VDI), a defense contractor that sells
arms to law enforcement, military, and private corporations.
quote:Anonymous vs. Zetas: is #OpCartel a flop, hoax, or honeypot?
[Video Link] Over the last few days, word has spread of a purported #antisec operation by Anonymous against the most brutal of all Mexican drug cartels, Los Zetas. What was unusual about the way this story spread, however, was the speed at which it was amplified by credulous reports from larger media outlets. This op got lots of press, fast. Faster, in fact, than it got support from Anons.
Geraldine Juarez and Renata Avila were two of the earlier voices I read expressing doubt about the prevailing storyline—a report by Juarez is here. Some I spoke to within Mexico wondered if the Mexican government (no bastion of purity) might be involved.
At the New York Times, writer Damien Cave digs in here on why the story is important.
And over at Wired News, a must-read piece by Quinn Norton that cinches the deal for me (and in it, she references the aforementioned Global Voices item). Quinn's been covering Anonymous extensively for some time, and I trust her spidey sense on this one.
"Everyone, Anonymous and not, seems to agree that going after the Zetas, who are known for hanging people by their own intestines, would be a new level of ambitious, and might even be the point where Anonymous would bite off more than they could chew," Quinn writes. "But there’s some nagging problems with the video that proposes the op."
Read the rest at Wired.
quote:China a minimal cyber security threat: Paper
Despite having an Information warfare strategy since the mid '90s China's offensive cyber-warfare capabilities are fairly rudimentary
Despite growing concern about China’s cyber-warfare capabilities, Australia and other Western nations have little to worry about when it comes to their national security.
That’s the view of Desmond Ball, a professor in the Strategic and Defence Studies Centre at the Australian National University, who in a recent journal paper argues China's offensive capabilities are limited and its own Internet security has notable deficiencies and vulnerabilities.
According to Ball, China had carried out a number of high-profile and successful hacks, denial of service attacks and website defacements in recent years. However, its offensive cyber-warfare capabilities were fairly rudimentary.
[ With the increasing threat of cyber crimes, protect yourself and stay informed on the latest news with Computerworld's Security newsletter ]
[China has] evinced little proficiency with more sophisticated hacking techniques, the paper reads. The viruses and Trojan Horses they have used have been fairly easy to detect and remove before any damage has been done or data stolen. There is no evidence that Chinas cyber-warriors can penetrate highly secure networks or covertly steal or falsify critical data.
They would be unable to systematically cripple selected command and control, air defence and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.
According to Ball, the capability gap in anti-virus and network security applications between China and other nations was immense.
Chinas cyber-warfare authorities must despair at the breadth and depth of modern digital information and communications systems and technical expertise available to their adversaries, the paper reads.
In Balls view, and despite having an information warfare (IW) plan since 1995 and conducting cyber exercises since 1997, Chinas cyber-warfare capability was not expected to better rivals for several decades.
At best, [China] can employ asymmetric strategies designed to exploit the (perhaps relatively greater) dependence on IT by their potential adversaries the paper reads.
Chinas cyber-warfare capabilities are very destructive, but could not compete in extended scenarios of sophisticated IW operations. In other words, they function best when used pre-emptively, as the PLA now practices in its exercises. In sum, the extensive Chinese IW capabilities, and the possibilities for asymmetric strategies, are only potent if employed first.
In the Australian Security and Intelligence Organisations (ASIO) 2010-11 Annual Report, the agency noted that espionage by cyber means was emerging as a serious and widespread concern.
ASIO is seeing increasingly both foreign state and non-state actors taking advantage of the access, relative anonymity and global reach of the internet, the report reads. From the comfort of wherever their computer terminal may be, they probe Australian information systems and data holdings for vulnerabilities and mine for valuable commercial, diplomatic and military intelligence sometimes with success.
Despite the rise of espionage through cyber means, ASIO has not seen any reduction in the intensity of other, more traditional forms of espionage human spies are still being recruited and run and foreign intelligence agencies are still interfering covertly in the Australian community. Indeed, effective coordination between traditional, human-based espionage and computer network operations represents a potent threat to our most sensitive data and networks that are not connected to the Internet."
In July 2010, ASIO established a Cyber Espionage Branch to provide advice to government and business on the threat of cyber-espionage and to investigate increasingly sophisticated and frequent cyber-intrusions into computer networks.
For its part, Australia has worked during the past year to raise cyber security as a foreign policy issue on the international agenda and has moved to better secure its cyber borders.
In the Department of Foreign Affairs and Trades (DFAT) 2010/11 Annual Report, the department said it had worked with the Department of the Prime Minister and Cabinet and other agencies on a framework for Australias international engagement on cyber.
The department took the lead for Australia in contributing to the development of international cyber norms by under taking work on messaging, principles to underpin norms, and mapping international activity, the report reads.
The department also worked with the Department of Defence to strengthen cooperation with the US and the United Kingdom on cyber in AUSMIN and AUKMIN consultations and contributed to planning for the United Kingdoms London conference on international cyber norms, scheduled for November 2011."
In a sign of the growing government acceptance of cyber-attacks as genuine threats to national security, the Australian government said it June that it would develop its first Cyber White Paper.
quote:"The Night of Thousand Masks".
Message By Anonymous :
Good evening, London. Allow me first to apologize for this interruption. I do, like many of you, appreciate the comforts of every day routine- the security of the familiar, the tranquility of repetition. I enjoy them as much as any bloke. But in the spirit of commemoration, thereby those important events of the past usually associated with someone's death or the end of some awful bloody struggle, a celebration of a nice holiday, I thought we could mark this November the 5th, a day that is sadly no longer remembered, by taking some time out of our daily lives to sit down and have a little chat. There are of course those who do not want us to speak. I suspect even now, orders are being shouted into telephones, and men with guns will soon be on their way. Why? Because while the truncheon may be used in lieu of conversation, words will always retain their power. Words offer the means to meaning, and for those who will listen, the enunciation of truth. And the truth is, there is something terribly wrong with this country, isn't there? Cruelty and injustice, intolerance and oppression. And where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. How did this happen? Who's to blame? Well certainly there are those more responsible than others, and they will be held accountable, but again truth be told, if you're looking for the guilty, you need only look into a mirror. I know why you did it. I know you were afraid. Who wouldn't be? War, terror, disease. There were a myriad of problems which conspired to corrupt your reason and rob you of your common sense. Fear got the best of you, and in your panic you turned to the now high chancellor, Adam Sutler. He promised you order, he promised you peace, and all he demanded in return was your silent, obedient consent. Last night I sought to end that silence. Last night I destroyed the Old Bailey, to remind this country of what it has forgotten. More than four hundred years ago a great citizen wished to embed the fifth of November forever in our memory. His hope was to remind the world that fairness, justice, and freedom are more than words, they are perspectives. So if you've seen nothing, if the crimes of this government remain unknown to you then I would suggest you allow the fifth of November to pass unmarked. But if you see what I see, if you feel as I feel, and if you would seek as I seek, then I ask you to stand beside me one year from tonight, outside the gates of Parliament, and together we shall give them a fifth of November that shall never, ever be forgot. V for Vendetta.
quote:NY mayor criticises Occupy camp after sexual assaults
Published: 7:02PM Friday November 04, 2011 Source: Reuters
New York City Mayor Michael Bloomberg lashed out at anti-greed Occupy Wall Street protesters after reports of self-policing at their camp, showing his patience is wearing thin with the 7-week-old movement.
The mayor said there were sexual assaults and a possible rape at the protesters' gathering place in Zuccotti Park.
"There have been reports, which are equally as disturbing, that when people in Zuccotti Park become aware of crimes, instead of calling the police, they form a circle around the perpetrator, chastise him or her and chase him or her out into the rest of the city to do who knows what to who knows whom," the major said.
Bloomberg called that "despicable and... outrageous" behavior which makes "all of us less safe."
An Occupy Wall Street kitchen worker has been charged with sexually abusing an 18-year-old protester in her tent. Bloomberg said the same person was also a suspect in a rape at Zuccotti Park.
Protesters set up camp in the park in mid-September to protest a financial system they believe mostly benefits corporations and the wealthy. Similar protests against economic inequality have since sprouted globally.
There is a growing chorus of residents, politicians and newspapers pressing Bloomberg to clean up the park. They complain that the proliferation of tents has spurred crime, sexual assaults, drug dealing and mischief. And two polls showed support for the protests waning.
Police made three arrests yesterday at Zuccotti Park on charges of loitering and resisting arrest.
The New York Post ran a front page editorial under the headline "ENOUGH! Mr Mayor, it is time to reclaim Zuccotti Park - and New York City's dignity."
Advertisement
The Post urged Bloomberg to evict the protesters. The protesters cannot be removed unless the park owner complains.
Occupy Wall Street protesters dismissed the mayor's words.
"The mayor (has) made it clear that he wants to get us out of here," said protest spokesman Jeff Smith.
Protester Bill Dobbs said while Bloomberg as mayor wants to honor freedom of speech, "as a billionaire, he's under constant temptation to squelch protest."
Bloomberg's comments came after police in Oakland, California, clashed with protesters overnight.
A Quinnipiac University poll yesterday showed 39% of US voters have an unfavorable view of Occupy Wall Street and 30% favor it. The October 25-31 survey of 2294 registered voters had an error margin 2.1% points.
A Marist Poll found 50% of registered New York state voters oppose the protests and 44 percent support them. That survey of 1,030 people had a 3.5-point error margin.
Georgetown University history professor Michael Kazin, an expert on social movements, said Bloomberg might be prompted to end the encampment in Manhattan after the violence in Oakland, "if he is looking for an excuse."
But Kazin, who is co-editor of Dissent magazine, said it does not ultimately matter when the New York protests end because they have already "changed the conversation about economic inequality in the country."
Hackers on steroids!quote:Op vrijdag 4 november 2011 12:57 schreef deelnemer het volgende:
De tactiek van anonymous is die van terreur verstopt achter anonimiteit. Wat is dat voor een rare intimiderende beweging?
Deze beweging doet alsof zij de vanzelfsprekende bron van het goede zijn en denkt dat zij vanuit anonimiteit eigen rechter mogen spelen.quote:
Het staat je vrij een tegenbeweging te vormen, om deze vreselijke misstanden aan de kaak te stellen. Iets in me zegt alleen dat je niet zo bar veel bijval zal krijgen.quote:Op vrijdag 4 november 2011 14:03 schreef deelnemer het volgende:
[..]
Deze beweging doet alsof zij de vanzelfsprekende bron van het goede zijn en denkt dat zij vanuit anonimiteit eigen rechter mogen spelen.
Het ligt allang in de wetgeving vastgelegd dat dit soort praktijken niet mogen.quote:Op vrijdag 4 november 2011 14:15 schreef Yogaflame het volgende:
[..]
Het staat je vrij een tegenbeweging te vormen, om deze vreselijke misstanden aan de kaak te stellen.
Waarom geloof jij de mensen daar anders over denken?quote:Iets in me zegt alleen dat je niet zo bar veel bijval zal krijgen.
Nee, nee nee.quote:Op vrijdag 4 november 2011 12:57 schreef deelnemer het volgende:
De tactiek van anonymous is die van terreur verstopt achter anonimiteit. Wat is dat voor een rare intimiderende beweging?
http://boards.4chan.org/b/twitter:Anon_Central twitterde op vrijdag 04-11-2011 om 20:08:41Holy shit, /b/ has been occupied. lol reageer retweet
quote:THE OCCUPIED /b/
Dat is juist. Die rechter moeten ze ontslaan.quote:Op vrijdag 4 november 2011 15:47 schreef Papierversnipperaar het volgende:
[..]
Het is de rechter die terroriseert, en zijn dochter die daar iets tegen doet.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |