Anonymous en Occupy Wall Str.:quote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:From a single hashtag, a protest circled the world
(Reuters) - It all started innocuously enough with a July 13 blog post urging people to #OccupyWallStreet, as though such a thing (Twitter hashtag and all) were possible.
quote:Gabriella Coleman Assistant Professor of Media, Culture, and Communication
Trained as an anthropologist, Gabriella (Biella) Coleman examines the ethics of online collaboration/institutions as well as the role of the law and digital media in sustaining various forms of political activism. Between 2001-2003 she conducted ethnographic research on computer hackers primarily in San Francisco, the Netherlands, as well as those hackers who work on the largest free software project, Debian. Her first book, "Coding Freedom: The Aesthetics and the Ethics of Hacking" is forthcoming with Princeton University Press and she is currently working on a new book on Anonymous and digital activism. She is the recipient of numerous grants, fellowships, and awards, including ones from the National Science Foundation, the Woodrow Wilson Foundation, the Ford Foundation, the Social Science Research Council and the Institute for Advanced Study.
quote:
quote:Our Weirdness Is Free
The logic of Anonymous—online army, agent of chaos, and seeker of justice.
by Gabriella Coleman, [01.13.2012]
TIMELINE: The Evolution Of The 'Anonymous' Internet Hacktivist Groupquote:Anonymous And The War Over The Internet
This article is the first in a two-part series tracing the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
The Huffington Post, Saki Knafo. Posted: 1/30/12 12:20 PM ET | Updated: 2/1/12 07:36 PM ET
Is daar een forum? Kan je er trollen?quote:Op woensdag 29 februari 2012 17:52 schreef Renderclippur het volgende:
Krijg ik er deze reclame onder![]()
[ afbeelding ]
quote:Computer Online Forensic Evidence Extractor (COFEE)
Easily capture important "live" computer evidence at the scene in cybercrime investigations, without special forensics expertise.
Law enforcement agencies around the world face a common challenge in their fight against cybercrime, child pornography, online fraud, and other computer-facilitated crimes: They must capture important evidence on a computer at the scene of an investigation before it is powered down and removed for later analysis. "Live" evidence, such as active system processes and network data, is volatile and may be lost in the process of turning off a computer. How does an officer on the scene effectively do this if he or she is not a trained computer forensics expert?
To help solve this problem, Microsoft has created Computer Online Forensic Evidence Extractor (COFEE), designed exclusively for use by law enforcement agencies. COFEE brings together a number of common digital forensics capabilities into a fast, easy-to-use, automated tool for first responders. And COFEE is being provided—at no charge—to law enforcement around the world.
With COFEE, law enforcement agencies without on-the-scene computer forensics capabilities can now more easily, reliably, and cost-effectively collect volatile live evidence. An officer with even minimal computer experience can be tutored—in less than 10 minutes—to use a pre-configured COFEE device. This enables the officer to take advantage of the same common digital forensics tools used by experts to gather important volatile evidence, while doing little more than simply inserting a USB device into the computer.
The fully customizable tool allows your on-the-scene agents to run more than 150 commands on a live computer system. It also provides reports in a simple format for later interpretation by experts or as supportive evidence for subsequent investigation and prosecution. And the COFEE framework can be tailored to effectively meet the needs of your particular investigation.
To help combat the growing number of ways that criminals use computers and the Internet to commit crimes, Microsoft is working with INTERPOL and the National White Collar Crime Center (NW3C) to provide COFEE at no cost to law enforcement agencies in 187 countries worldwide. INTERPOL and NW3C are also working with Florida State University and University College Dublin to continue the research and development that will help ensure that COFEE serves the needs of law enforcement, even as technology evolves.
Law enforcement can get COFEE from NW3C at www.nw3c.org or by contacting INTERPOL at COFEE@interpol.int.
quote:The Kicker
The Stratfor password was the company name. These people are such idiots that I propose that their name be promoted to that rare category of word, where like quisling, the owner of the name has distinguished themselves as to define a whole category of behaviour and that henceforth, whenever someone hides their money under the mattress, puts their key above the door, or uses their name as their password, we will say they have pulled a stratfor.
Het artikel gaat verder.quote:Privacy betrayed: Twitter sells multi-billion tweet archive
Twitter has sold billions of archived tweets believed to have vanished forever. A privacy row has erupted as hundreds of companies queue up to purchase users’ personal information from the new database.
Every time you use social networks you become mere product – it’s an idea we will all have to get used to. So, should we give up worldly goods and hide in a Tibetan monastery till the end of our days, or start putting up a fight to protect our privacy? In the latest in a long series of scandals over social networks that profit from our private data, the UK-based DataSift firm has announced that is has bought every tweet posted since January 2010. The business intelligence and data-mining platform will be the first company to offer the archive for sale.
DataSift’s Historics is a cloud-computing social data platform that enables businesses to extract insights and trends that relate to brands, news, public opinion and … actually anything you could ever need… from Twitter's public tweets. Now entrepreneurs will have access to billions of tweets, which literally means they will purchase every Twitter user along with all his secrets, GPS-location included. Thought the law protected you from thieves? No, on the contrary – it actually helps thieves to abuse you and steal your personal data. DataSift now brings to the table what it calls “an invaluable information source” with 250 billion tweets posted in 2010 alone. Historics is available today as a limited release to existing customers and is scheduled to be generally available in April 2012.
quote:Last year, a group of hackers calling themselves Lulz Security (LulzSec for short) caught the internet's attention with a series of high-profile data breaches and website takedowns targeting the likes of Fox News, Sony and the US government, before apparently disbanding after 50 days of "lulz".
Throughout that period, the group's own website proved impervious to rival hacking attempts, thanks to an online security service called CloudFlare. Speaking to New Scientist in advance of his talks at the RSA conference and SXSW festival next month, CloudFlare CEO Matthew Prince explains why he kept the hackers online, and how attacks on their site have helped protect the internet.
Ik kan geen Nederlands scientologyforum vinden, alleen een anti-scientology, en amerikaanse.quote:Op woensdag 29 februari 2012 19:39 schreef Papierversnipperaar het volgende:
[..]
Is daar een forum? Kan je er trollen?
quote:FBI agent: Companies taking Anonymous 'too lightly'
Businesses are not taking Anonymous and hacktivism seriously enough, according to an FBI special agent.
The youth of alleged Anonymous hackers, who are often teenagers or in their early twenties, has lead a number of businesses to dismiss the hacking group without taking into account the ramifications of a successful hack, FBI cyber-investigator Eric Strom told the RSA Conference 2012 in San Francisco on Wednesday.
"[Businesses] are taking it too lightly," said Strom. "A lot of people think it's a bunch of kids goofing around. In reality it's not, [hacktivism] can destroy a business."
eCrime Police in the UK have been working with the FBI and international law enforcement to round up suspected 'hacktivists' — people who engage in hacking for some claimed ideological end, rather than for monetary gain. Several UK teenagers and young adults were arrested in a series of raids in 2011, including teenagers Ryan Cleary and Jake Davis, and Hartlepool student Peter David Gibson.
Some businesses and public sector organisations reputations have been damaged by Anonymous exposure of information. For example, law firm ACS-Law, which disastrously accused thousands of people of illegal file-sharing, went out of business after details of people who had allegedly illegally accessed pornography were exposed during an Anonymous hack. ACS-Law was later fined £1000 by the Information Commissioner's Office for the exposure of personal information.
The Police Central eCrime Unit at Scotland Yard, and the FBI itself, were hacked by alleged Anonymous and Lulzsec group members, who posted a recording of a telephone conversation discussing Anonymous and Lulzsec investigations. The FBI later acknowledged that the recording was bona fide.
Some people who are involved in Anonymous are minors, and so are risking lighter punishments by participating in hacking attacks, said Strom.
"There are a number of challenges involved in this, from the age that a number of people who are involved in this, to the fact of how do you define the movement's goals," said Strom.
Anonymous is an amorphous group whose goals reflected its differing membership, said academic and journalist Mischa Glenny, who was appearing in a panel discussion with Strom.
"It's worth remembering that hacktivism does have a political background," said Glenny."Although in groups like Anonymous you'll find all sorts of characters."
Glenny said that the group claimed to be political idealists, but that in certain cases those idealists had been 'hijacked' by criminal elements for their own ends. Glenny gave the example of a Greek investigative journalist who specialised in looking into organised crime who had been beaten at a demonstration after being demonised by Anonymous.
"We have a real problem here in trying to identify what is genuine idealism, what is criminality, what is a sort of anarchic attitude to the internet, and what is a cover for piracy and other intellectual copyright issues," said Glenny.
ZDNet UK understands that certain investigators looking at Anonymous believe that some attacks claimed by the organisation have been state-sponsored.
quote:
quote:BOSTON -- After nine weeks of secret court hearings, the Suffolk Superior Court has ordered Twitter, Inc., to comply with a state administrative subpoena issued by the Suffolk District Attorney's office on December 14, 2011, seeking personally identifying information for an anonymous Twitter user during the period December 8, 2011 to December 13, 2011, for "account or accounts associated with" the names "Guido Fawkes", "@p0ison0N", "@OccupyBoston", or the Twitter hashtags "#d0xcak3" and "#BostonPD." Twitter hashtags are essentially key words used to indicate a topic of conversation.
quote:Anonymous hackers ratted out by infiltrators
A law enforcement operation that ended with the arrest of 25 hackers in Europe and South America was not the result of police intelligence but rather an informers’ job within the hacker community, claims Anonymous.
As well as launching a cyber-assault on Interpol’s website, the hacker group appears to be conducting its own investigation in order to find out how police managed to break through its veil of anonymity.
In a statement on Anonymous’ Spanish-language website, the group said that the arrests were down to the “carelessness” of the parties involved. They had apparently given “personal details to spies and people who were not members” of the organization.
“This wave of arrests was not the product of intelligence or technical wizardry on the part of Interpol, like they want you to believe. They were done using a much more deplorable technique: the use of spies and informants within the collective,” says Anonymous.
According to the group, the fact that certain members had not participated in a hacking operation for some time, and were all active on the same server (anonworld.info) that “had been under surveillance as of May last year” marked them out as infiltrators.
The group of hackers that suffered the most as a result of the Interpol raid is known as Sector404. The others were unsophisticated activists who participated in denial-of-service attacks.
The hacker community is also busy verifying who exactly police arrested during the raid. The fact that they knew each other by nicknames adds an element of difficulty to their research.
According to the communiqué issued by Anonymous Iberoamerica, hackers known as “Pacotron” (Thunder) and “Troy” were arrested in Spain.
A police raid dubbed "Operation Unmask" was launched in response to coordinated cyber-attacks hackers conducted against governmental and corporate websites in Chile and Colombia, Interpol reports.
A total of 25 arrests were made in Argentina, Chile, Colombia, and Spain.
Chile's chief prosecutor, Marlis Pfeiffer, told The Associated Press that police specialists currently examining confiscated computers and phones have encountered difficulties, most probably because of encrypted data.
"This operation shows that crime in the virtual world does have real consequences for those involved, and that the Internet cannot be seen as a safe haven for criminal activity, no matter where it originates or where it is targeted," announced Interpol's executive director of police services, Bernd Rossbach, in a statement released by Interpol.
The organization naturally has not revealed the sources whose information led to the detention of the hackers.
Initially, the Anonymous group became known for launching denial-of-service attacks on organizations which had interfered with the activities of the whistleblowing website, Wikileaks. Some of the data they obtained from the hacked sites was passed on to Wikileaks.
The Anonymous community is a fragmented organization with no discernible structure or membership. The hackers associated with it traditionally act independently, their number and whereabouts remaining unknown.
quote:Artist and Hacktivists Sabotage Spanish Anti-Piracy Law
In an attempt to sabotage a new anti-piracy law that went into effect today, hundreds of websites in Spain are participating in a unique protest organized by a local hacktivist group. The websites all link to an “infringing” song by an artist loyal to the protest, who reported the sites to the authorities to overload them with requests.
Traditionally, Spain has been one of the few countries where courts have affirmed that P2P-sites operate legally. This situation was met with disapproval by the United States Government who behind closed doors proceeded to help the Spanish authorities draft new laws to protect the interests of copyright holders.
Threatened with being put on a United States trade blacklist, the Government passed the so-called ‘Sinde Law’ in a rush late last year. The law allows for the blocking of allegedly infringing sites based on reports from copyright holders, a position similar to that proposed by the US SOPA bill.
Today the Sinde law went into effect and immediately it was met with resistance from opponents. The group Hackivistas was quick to organize a rather unique form of protest. They encouraged sites to link to a copyrighted track from the artist Eme Navarro, who’s a member of the music rights group SGAE, but critical of the Sinde law.
While Navarro generally publishes his music under a Creative Commons license, he created an “all rights reserved” track specifically for the protest. Thanks to the hacktivist campaign hundreds of websites are now linking to this copyrighted song without permission, and Navarro reported a first batch of sites to the Ministry of Culture early this morning.
As a result, the commission tasked with reviewing all the requests will be overloaded with complaints. All the reported sites have to be processed on order of arrival, so the protest will significantly slow down this review process.
“The aim of this action is testing this law and being the first ones who use it in order to show the absurdity and the censorship that it will bring,” the hacktivists say commenting on their action.
The sites participating in the campaign do risk being blocked by Internet providers, but according to the law they have to be notified about the alleged infringement first. Then they get the chance to remove the infringing link to avoid being blocked.
Besides from the “sabotage” angle, another goal of the protest is to find out how the takedown process works. Right now there is still much uncertainty about how the commission will operate and how websites will eventually be blocked, a Hacktivistas member told TorrentFreak.
“Nobody knows how they will shut down websites. We suspect that they will ask Spanish companies hosting the websites to shut them down, and that Spanish service providers will block websites that are hosted outside of Spain.”
“They will also censor foreign websites, so anyone in the world can join us. We want to check what happens in every case,” the hacktivist added.
Hacktivistas is known for their controversial campaigns. In 2008 the group gathered in front of the headquarters of the socialist party to share copyrighted files in public. The police knew what was going on but didn’t touch them, suggesting that P2P downloading is legal.
In the years that followed the group wrote handbooks to avoid internet censorship, mapped copyright lobby networks, and launched fake governmental campaigns to promote copyleft and free access to cultural goods.
Joining the current protest is easy, websites can add a link to the infringing track through a simple piece of code provided on the campaign website. Just make sure not to ask Eme Navarro for permission.
quote:Twitter gives Boston police, prosecutors data from one subscriber in criminal inquiry
Social media giant Twitter handed over subscriber information yesterday for one Twitter account indirectly tied to the Occupy Boston protest, ending a court battle fought behind closed doors as Boston law enforcement investigated hacking attacks on the Boston police and a police union.
The administrative subpoena was first sent to Twitter last December requesting information on the following Twitter subscriber accounts and hashtags: Guido Fawkes, @pOisAnON, @OccupyBoston, #BostonPD and #dOxcak3.
In the Dec. 14 letter, a prosecutor in Suffolk District Attorney Daniel F. Conley’s office told Twitter the information was needed to assist law enforcement in an ‘‘official criminal investigation.’’
According to Twitter spokesman Matt Graves, the company provided the subscriber information for @pOisAnON, an account that is associated with the name of Guido Fawkes. “We provided information on a single user,’’Graves said in a telephone interview yesterday.
Graves declined comment when asked how Twitter responded to the court’s order requiring the company to hand over information linked to hashtags and @OccupyBoston.
But Jake Wark, spokesman for Suffolk District Attorney Daniel F. Conley, said prosecutors are satisfied with Twitter’s response to the court order.
“Twitter’s recent communication with our office gave both parties a clear understanding of what information was relevant to our probe. We requested and received only that information,’’ Wark said in an email. “This is a focused investigation, not a fishing expedition.’’
Twitter heeft de aanklagers dus uit moeten leggen dat het onzin is om info te vragen over een hashtag.quote:Attorney Peter Krupp and the American Civil Liberties Union have fought the request by prosecutors in Suffolk Superior Court, where court records were impounded and court hearings were held out of earshot of the public in recent weeks.
But Superior Court Judge Frances McIntyre last week ruled against the ACLU’s efforts. She ordered Twitter to hand over the information this week, and Twitter has complied with the judge’s instructions.
Speaking for the ACLU, Krupp said yesterday they continue to believe that the constitutional rights of their client, who uses the Twitter name of Guido Fawkes, are being violated. The ACLU also wants the entire case file to be made available to the public; only McIntyre’s order and the subpoena have been unsealed.
‘‘We continue to believe that our client has a constitutional right to speak, and to speak anonymously,’’ Krupp said, adding that the request by prosecutors ‘‘infringed our client’s rights under the First Amendment.’’
He said there will be no more legal fights on behalf of Guido Fawkes because Twitter has provided the information to law enforcement officials.
Prosecutors and Boston police have not publicly disclosed the focus of the criminal inquiry.
Wark said that prosecutors are not targeting those who participated in the Occupy Boston takeover of Dewey Square, some of whom were arrested by police when the makeshift campground was shut down in December.
‘‘The relationship between this investigation and Occupy Boston is tangential at best,’’ Wark said. ‘‘The charges arising out of the Dewey Square protest have already been addressed by the court. [Any media report] that links this investigation to the protest movement has been, and will continue to be, completely erroneous.’’
During the past several months, the main police website and the website for the Boston Police Patrolmen’s Association have been targeted by computer hackers, some of whom claimed to have acted on behalf of Occupy Boston protesters.
quote:AntiSec dumps Monsanto data on the Web
Anonymous continued its ongoing attack on agricultural biotech giant Monsanto today by publishing an outdated database of the company's material. This is the newest in a barrage of strikes from hackers aligned with Anonymous who operate under the "AntiSec" banner.
In a statement posted with the database on a Pastebin site, the hacktivist group wrote it was aware that exposing the database would not do much harm to Monsanto but warned it would continue to target the company for what it sees as wrong.
"Your continued attack on the worlds food supply, as well as the health of those who eat it, has earned you our full attention," wrote AntiSec. "Your crimes against humanity are too many to name on one page."
Anonymous' battle with Monsanto began last July when the hackers disrupted the company's Web site and then released data on about 2,500 individuals involved in the agriculture industry. According to Monsanto, 10 percent of this information was related to current and former Monsanto employees.
Monsanto was one of seven companies that supplied the U.S. military with Agent Orange during the Vietnam War and for a while made bovine growth hormones. Now it focuses on making genetically engineered seeds and pesticides.
AntiSec says the reason for the attacks is to protest the company's lawsuits against organic dairy farmers for stating on labels that their products don't contain growth hormones.
"You have put over 9000 small-time farmers out of business by using your enormous legal team to bury them with your malicious patent lawsuits," AntiSec wrote in its statement today. "You have continually introduced harmful, even deadly products into our food supply without warning, without care, all for your own profit."
Besides going after Monsanto, AntiSec has also recently claimed responsibility for attacks on U.S. law enforcement agencies, Vanguard Defense Industries, and private prison companies. In these assaults, the hackers deface the companies' Web sites as well as release documents, e-mails, and other files.
Read more: http://news.cnet.com/8301(...)e-web/#ixzz1nzIU3Upf
quote:Constitution of Voxanon
Welcome to VoxAnon!
VoxAnon is not just a mere IRC server.
It represents a community. It is a movement. It is a philosophy. VoxAnon has been forged to provide a platform to facilitate inter-Anonymous discussion and activities. We are an alternative to those dissatisfied with the current selection of IRCs that Anonymous has. We represent a home to the homeless, a hivemind to abandoned, and a temple for the unfaithful.
The Founding Fathers of VoxAnon are veteran Anons who have been seeking a new means of safe and secure communication. The creation of VoxAnon will help not only facilitate but encourage the free flow of ideas without the threat of censorship and persecution. Additionally, we seek to build an efficient, proficient, and skillful community. We offer our network services to anyone who calls themselves an Anon, or considers themselves an ally of Anonymous. VoxAnon is a place where they will be able to propagate their skills or ideas for the cause.
We encourage everyone to consider VoxAnon to be your new home and we will in turn welcome you with open arms as brothers and comrades. United as one, divided by zero!
quote:Anonymous supporters attacked, their bank data vulnerable
Anonymous supporters who willingly enlisted their personal computers to launch denial-of-service attacks against the groups' enemies may have unwillingly donated their personal banking information in the process.
After the Jan. 20 raid on Megaupload, a law enforcement sting that drew the immediate anger of Anonymous hackers, an unnamed attacker took a distributed denial-of-service (DDoS) attack tool called Slowloris, popular with Anonymous supporters, and rigged it to include the Zeus Trojan, a devious piece of malware used to siphon victims' online banking credentials.
That same day, an Anonymous-backed list of several different DDoS attack tools hit the Web. Backed by numerous Anonymous-affiliated blog postings and tweets, supporters were urged to download one of the tools, which would enable them to launch DDoS attacks from their own computers against big-name Anonymous targets, including the U.S. Department of Justice, the FBI, Universal Music Group and the Recording Industry Association of America.
[Feared Banking Trojan Hits Android Smartphones]
The trojanized Slowloris link was on the list, meaning countless people who thought they were supporting Anonymous' Operation Megaupload mission — targets also included Warner Music Group, the New Zealand police and the Motion Picture Association of America — were actually compromising their own financial security, the security firm Symantec reported.
The DDoS guide, Symantec said, was called "Tools of the DDoS trade" and "Idiot's Guide to Be Anonymous."
In the following weeks, the compromised DDoS tool was used in attacks on several United States government websites to protest the government's support of the Anti-Counterfeiting Trade Agreement and against Syrian government websites.
And all the while, Anonymous' loyal hackers may have been transmitting their own bank account data to a remote server.
"Not only will supporters be breaking the law by participating in DoS attacks on Anonymous hacktivism targets," Symantec wrote, "but may also be at risk of having their online banking and email credentials stolen."
Symantec said this explosive mixture of financial malware and worldwide hacktivism campaigns with eager (and easily deceived) participants is "a dangerous development for the online world."
quote:The Department of Homeland Security Is Searching Your Facebook and Twitter for These Words
The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)
twitter:anonops twitterde op zaterdag 03-03-2012 om 19:37:38#DHSTweets Send a funny tweet using DHS-monitored keywords from this list >> http://t.co/2cLWFKEV (via @youranonnews) reageer retweet
Die gasten hebben het dan echt stervensdruk want als je die lijst bekijkt dan staat zo'n beetje alles waarover je post er wel op, weertermen, drugs, computertermen, ik bedoel, rain, hail, winter, cocaine, drugs, virus?quote:Op zaterdag 3 maart 2012 19:58 schreef Papierversnipperaar het volgende:
The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports.twitter:anonops twitterde op zaterdag 03-03-2012 om 19:37:38#DHSTweets Send a funny tweet using DHS-monitored keywords from this list >> http://t.co/2cLWFKEV (via @youranonnews) reageer retweet
Anonymous is The Internet Hate Machine.quote:Op zaterdag 3 maart 2012 20:00 schreef Schenkstroop het volgende:
Ik vind de logo van Anonymous verdacht veel lijken op die van de United Nations.. En United Nations is altijd slecht nieuws ongeacht hun mooie praatjes. Zijn mijn zorgen hierom terecht of interecht?
En als je daarbovenop het systeem nog eens expres gaat voeren....quote:Op zaterdag 3 maart 2012 20:06 schreef YuckFou het volgende:
[..]
Die gasten hebben het dan echt stervensdruk want als je die lijst bekijkt dan staat zo'n beetje alles waarover je post er wel op, weertermen, drugs, computertermen, ik bedoel, rain, hail, winter, cocaine, drugs, virus?
quote:Hello Big Media, Welcome to Black March where ‘we the people’ Censor You
Welcome to Black March — if you haven’t heard of it, pay attention if you want power back in the hands of ‘we the people.’ This month, achieve greatness. Most of all, fuck censorship.
Black March was a concept formed through Reddit activism, then adopted by the keyboard warriors of Anonymous in order to fight censorship.
On Shauna Myers Google+ page, this concept is broken down for us:
. After censorship bills have been thrown at us from all angles, its time to show big media corporations that we no longer have need of their services and will no longer be paying for them. That doesn’t mean no one should listen to music or watch any movies for an entire month. That means everyone should strive for independent artists.
. A list of independent, online artists of all varieties is being compiled by our own +Moan Lisa with links to YouTube profiles, DeviantArt galleries, and expositions of all varieties and sizes. (http://goo.gl/B0YJe) These independent artists are the ones who should be receiving your money this month, not the enormous corporations dominating Hollywood.
. These media corporations have already gone so far as to publicly issue threats against politicians who should dare to not fight for their wants. (http://goo.gl/vM0IX) The time has come to take matters into our own hands. If our governments will not stand up to them, then it is up to us.
. Bring money back to real people.
. Show big media that their time has come.
. Fight back against harsh censorship bills.
. Welcome to #BlackMarch
Moan Lisa compiled the list as stated above containing Indie movies, not those by Big Media trying to implement censorship. Use your money, attention and time toward something more valuable. Be a warrior.
The above image was created by: Occupy Movement which you can also find on Google+. Good job!
quote:Anonymous hacked?
As political parties, bank managers, and drug dealers have often found to their cost, infiltrators can be very hard to detect.
This is something that, perhaps, the members of Anonymous recently discovered for themselves, at least according to Symantec, the online security people.
For the company believes that members of the hacking collective were deceived into downloading a Zeus Trojan that gave up their banking details and other personal information.
On its blog, Symantec described how, on January 20--the day of the rather charming Kim Dotcom's sequestration by the FBI--members of Anonymous used their own personal computers to participate in DDoS attacks.
These were launched against a broad and institutional swathe of targets, such as the Recording Industry Association of America and the FBI.
Some mean-spirited--and still anonymous--individual allegedly inserted a Zeus Trojan into the Slowloris attack tool, of which many DDoS-ers are fond.
When members of Anonymous downloaded this tool, their banking details were apparently exposed like boxer shorts above low-slung pants and sent to a remote server.
I am grateful to MSNBC for discovering Symantec's troubling analysis.
However, Anonymous seems to have unloaded its own feelings about it.
For, on the YourAnonNews Twitter feed, there was posted a fierce rebuttal: "This post from @Symantec about @YourAnonNews's spreading the DDOS hijacking trojan is wrong & libelous to say the least http://goo.gl/MUVxD."
The following tweet read: "Dear @Symantec - @YourAnonNews NEVER posted the DDOS hijacker nor did we attempt to trick people; instead we WARNED of it."
And a third offered: "Also, @Symantec - maybe if you paid attention to more details and did proper due diligence, your source code wouldn't have been stolen. SMH."
So there.
Some will chortle with schadenfreude that the hackers may have themselves been hacked. But doesn't this tale, if true, offer something greater--and something sadder--about the brittleness of human trust?
In Anonymous' case, one assumes that many of its members have never met in person. Their relationship is guided entirely by their ability to trust through gadget-based means.
It is the equivalent of trying to find a lover online and only ever having dates with them online. You can't so easily look them in the eyes and see if their facial expressions and body movements betray their true thoughts. Skype doesn't quite deliver the same chance of interpreting human nuance.
Whenever you're trying to collectively build something--or even collectively trying to destroy something--a twisted being will soon waft into your day, pretend they're on your side, and then try to ruin things.
Read more: http://news.cnet.com/8301(...)acked/#ixzz1o9RpZmoT
quote:Anonymous Hackers Attack Christian Websites, Declare 'Religion Sucks LOL'
Calling it a "sickness to this world," members of the formless 'hacktivist' group of computer programmers known as Anonymous declared war on religion on Friday, March 2, hacking the websites of three Christian organizations all based in and around Charlotte, North Carolina. The homepages for Bethel Outreach International Church, Charlotte International Church, and Crossfire Ministries were all replaced with the 30-minute long YouTube video, "Richard Dawkins: An Atheist's Call to Arms," and an informal declaration of war, with the title, "religion sucks lol [laugh out loud]."
The attack was announced by Twitter account @AnonymousIRC to its 276,783 followers. IRC (Internet Relay Chat) is one of the several online social platforms that Anonymous uses to congregate and make plans, along with Facebook and Twitter. The first tweet, sent out at around 10 am EST read, "http://www.betheloic.org HACKED Reason:religious idiocy and foh dah lulz #Anonymous #AntiSec #OWS #ROOTED #DAWKINS." WRITER'S TRANSLATION: "The website www.betheloic.org has been hacked. The reason being the idociy of religion and because attacking them makes us laugh." Two tweets followed moments later with the same message, except for the name of the website that Anonymous had hacked, most likely with a proxy DDoS spam attack.
The video that Anonymous posted on each hacked site is a 31-minute speech by famous atheist Richard Dawkins, in which he told his fellow atheists not to hide their beliefs, and to fight against "the incursion of religion into politics and education."
This Friday's attacks are a continuation of Anonymous hacktivist's plan to launch online attacks against their perceived enemies once a week. Last Friday, Anonymous hackers took down several FBI affiliated website, including the Dayton, Ohio branch of InfraGard.
Anonymous also declared war on America in a YouTube video earlier this week, calling on US citizens to rise up against their government, although nothing much has come of this hyperbole so far.
The full text (some expletive words have been censored) that Anonymous posted reads:
Greetings fellow pirates, hey there religionf-gs! Guess what? U dun goofed! We rm'd you and your gods and saints neither't protected you nor casted some awesome thunderbolt onto us.
Let us be clear from the start: any kind of religion is a sickness to this world.
A sickness that creates hate and intolerance,
a sickness that brings people to wage war on their fellow people,
a sickness that has come to this world long time ago, when mankind wasn't educated,
a sickness that brought false hope and suppression to those who believed
and often even more terror and suppression to those who dared not to believe.
Religions are authoritarian hierarchies, designed to dominate your free
will. Religions are mind control. They're power structures that aim to convince you to give away your power for the benefit of those who enjoy dominating people. When you subscribe to a religion, you enroll in a mindless minion training program. Religions don't market themselves as such, but this is essentially how they operate. In case you ever wondered why religious teachings are invariably mysterious, confusing, and incongruent? This is no accident - it's intentional.
We see religion pretty much the same way as we see many governments. Fear mongering and making lots of money, so a small group of ppl will become insanely rich, while the believing masses can eat dirt .As long as they are afraid that "omgomg god will come and strike great vengeance upon me" all is good.
To quote Encyclopedia Dramatica (bringing you answers to life, the universe and everything since last Thursday) on this issue:
»Religion is a severe mental illness created over 9000 years ago, at the
same time as the Earth. Since then, religion has been one of the biggest sources of drama, f----try, and unwarranted self-importance in the world today, secondary only to the internet. It is responsible for such insanity as Christf-gs believing that beating someone half to death with a 2,000 year old book will heal them and Muslims believing that if they blow themselves up they will get 72 virgins. Even atheists are not immune to the psychotomimetic effects of religion; the mere mention of religion is enough to send any atheist into hours of butthurt sh-tfits.«
So people of the world, don't let religion control your life. Don't fight against each other for contrary beliefs. This world and our life can be a wonderful adventure, where you have the unique chance to help mankind and your fellow citizens. Where we can all work together to make this earth a better place for ourselves, our children and all those generations who will come after us. ^(;,;)^
"Anonymous" heeft daar blijkbaar scheit aan...quote:Article 18
Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and observance.
http://en.wikipedia.org/w(...)an_Rights#Article_18
De meeste religie's ook.quote:Op zondag 4 maart 2012 16:27 schreef YazooW het volgende:
[..]
"Anonymous" heeft daar blijkbaar scheit aan...
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Op zondag 4 maart 2012 16:28 schreef Papierversnipperaar het volgende:
[..]
De meeste religie's ook.Ik ben zelf ook "anti-religie" of hoe je het ook wilt noemen, maar dit soort acties slaan gewoon helemaal nergens op. Lijkt wel dat ze uit verveling niet meer weten wat ze moeten doen. De rechten van de mens waar ze eerst zo duidelijk voor stonden hebben blijkbaar geen waarde meer voor "hun".SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.
Wie weten wat ze niet meer moeten doen? Sinds wanneer is Anonymous een organisatie met een hierarchie?quote:Op zondag 4 maart 2012 16:31 schreef YazooW het volgende:
[..]
Ik ben zelf ook "anti-religie" of hoe je het ook wilt noemen, maar dit soort acties slaan gewoon helemaal nergens op. Lijkt wel dat ze uit verveling niet meer weten wat ze moeten doen. De rechten van de mens waar ze eerst zo duidelijk voor stonden hebben blijkbaar geen waarde meer voor "hun".
Ik zeg nergens dat Anonymous een organisatie is, wel zeg ik dat Anonymous altijd de boodschap naar buiten bracht dat met name overheden af moeten blijven van de rechten die wij als mens hebben. Vandaar dat ik het nu raar vind dat ze nu religieuze organisaties aanvallen en daarmee dus zelf ook scheit hebben aan onze rechten.quote:Op zondag 4 maart 2012 16:37 schreef Papierversnipperaar het volgende:
[..]
Wie weten wat ze niet meer moeten doen? Sinds wanneer is Anonymous een organisatie met een hierarchie?
Daarnaast moest ik denken aan een recent interview met Barret Brown:
http://nl.zinio.com/reader.jsp?issue=416213041&p=48
Laatste stukje van het eerste antwoord: "...things have come to such a point that I personally don't care anymore."
En dat begrijp ik. Het is oorlog, de tegenstanders hakker er zo hard en vals op in, dat ik niet op alle slakken zout ga leggen.
Anonymous heeft ook het leven van de 11-jarig Jessy Slaughter kapot gemaakt.quote:Op zondag 4 maart 2012 16:43 schreef YazooW het volgende:
[..]
Ik zeg nergens dat Anonymous een organisatie is, wel zeg ik dat Anonymous altijd de boodschap naar buiten bracht dat met name overheden af moeten blijven van de rechten die wij als mens hebben. Vandaar dat ik het nu raar vind dat ze nu religieuze organisaties aanvallen en daarmee dus zelf ook scheit hebben aan onze rechten.
quote:Op zondag 4 maart 2012 17:00 schreef Papierversnipperaar het volgende:
[..]
Anonymous 12 jarige kinderen van 4chan's /b/ hebben ook het leven van de 11-jarig Jessy Slaughter kapot gemaakt.
Haar vader is ondertussen overleden aan een zware hartaanval.
Sorry hoor, maar dat onderscheid kan je niet maken.quote:
Onderscheid? Ik snap je ff niet.quote:Op zondag 4 maart 2012 17:33 schreef Papierversnipperaar het volgende:
[..]
Sorry hoor, maar dat onderscheid kan je niet maken.
Anonymous is geboren op /b/ en /b/ is nog steeds onderdeel van Anonymous. Ook als de moralfags het daar niet mee eens zijn. Ook als de oldfags het daar niet mee eens zijn.quote:Op zondag 4 maart 2012 17:34 schreef YazooW het volgende:
[..]
Onderscheid? Ik snap je ff niet.
100% duidelijk dat /b/ daar achter zat.
edit. overigens vroeg dat kind er zelf om
quote:Anonymous Appears To Take Down AIPAC Website
The annual policy conference of the pro-Israel Group AIPAC is, as always, a massive show of bipartisan pro-Israel solidarity, and the target of protests from Israel's critics.
This year's protesters include newcomers: A group called "Occupy AIPAC," whose leaders seem to be drawn from the longtime anti-war group Code Pink, and the hacktivist collective Anonymous.
This morning, as President Obama speaks to the group, its website has crashed. An AIPAC spokesman didn't respond to a request for comment, but claims of responsibility could be found on Twitter.
twitter:jonahogan twitterde op zondag 04-03-2012 om 22:26:06#Anonymous is an anti-semite organization! reageer retweet
quote:Hackers Winning Security War, Said Executives At RSA Conference
SAN FRANCISCO (Reuters) - Technology security professionals seeking wisdom from industry leaders in San Francisco this week saw more of the dark side than they had expected: a procession of CEO speakers whose companies have been hacked.
"It's pretty discouraging," said Gregory Roll, who came for advice and to consider buying security software for his employer, a large bank which he declined to name because he was not authorized to speak on its behalf. "It's a constant battle, and we're losing."
The annual RSA Conference, which draws to a close on Friday, brought a record crowd of more than 20,000 as Congress weighs new legislation aimed at better protecting U.S. companies from cyber attacks by spies, criminals and activists.
If the bills suggest that hackers are so far having their way with all manner of companies, the procession of speakers brought it home in a personal way.
The opening presentation by Art Coviello, executive chairman of conference sponsor and recent hacking victim RSA, set the tone with the Rolling Stones song "You Can't Always Get What You Want."
RSA, owned by data storage maker EMC Corp, is the largest provider of password-generating tokens used by government agencies, banks and others to authenticate employees or customers who log on away from the office. Not long after last year's RSA conference, the company said an email with a poisoned attachment had been opened by an employee.
That gave hackers access to the corporate network and they emerged with information about how RSA calculates the numbers displayed on SecurID tokens, which was in turn used in an attack on Lockheed Martin that the defense contractor said it foiled.
Coviello said he hoped his company's misfortune would help foster a sense of urgency in the face of formidable opponents, especially foreign governments, who are being aided by the blurring of personal and professional online activities. Some 70 percent of employees in one survey he cited admitted to subverting corporate rules in order to use social networks or smartphones or get access to other resources, making security that much harder.
"Our networks will be penetrated. People will still make mistakes," Coviello said. He argued that with better monitoring and analysis of traffic inside company networks, "we can manage risk to acceptable levels."
If that didn't inspire enough enthusiasm after the worst year for corporate security in history - including the rise of activist hacks by Anonymous, numerous breaches at Sony Corp, and attacks on Nasdaq software used by corporate boards - there was more to come.
Next onstage was James Bidzos, CEO of core Internet infrastructure company VeriSign, which disclosed in an October securities filing that it had lost unknown data to hackers in 2010. [ID:nL2E8D1DFB] He was followed by Enrique Salem, CEO of the largest security company, Symantec, which recently admitted that source code from 2006 version of its program for gaining remote access to desktop computers had been stolen and published. [ID:nL4E8D77TN]
FBI Director Robert Mueller spoke on Thursday, warning that he expected cyber threats to pass terrorism as the country's top threat.
Though all sounded an upbeat call to arms, some watching grumbled that vendors with little credibility were trying to use their own shortcomings to peddle more expensive and unproven technology.
"There's some panic" among the buyers, said a security official with ING Groep NV who asked not to be named because he was not authorized to speak to the press. Banks are very sensitive to questions about security breaches and often deny they have any significant problems in this area.
That panic contributed to vigorous panel discussions and hallway debates about who should be in charge of safeguarding defense companies, banks and utilities - private industry itself, the U.S. Department of Homeland Security or the National Security Agency, which has the greatest capability but a legacy of civil liberties issues.
A pending bill backed by Senate Majority Leader Harry Reid would put DHS in the lead, with assistance from NSA. Former NSA chief Michael Hayden said in an interview at the conference that should suffice.
"The Net is inherently insecure," Hayden said. "We need to quit admiring the problem and move out. No position could be worse than the one we're in now."
Coviello said one of the few pieces of good news was that the country as a whole is now realizing the gravity of the loss of its trade and government secrets, along with the difficulty of reversing the trend.
"People have definitely talked more seriously after our breach," he said in an interview. "Maybe a sense of realism has settled in."
(Reporting By Joseph Menn; Editing by Richard Chang)
twitter:AnonInfoWarfare twitterde op maandag 05-03-2012 om 00:27:37Have an abusive significant other in your life? Document the abuse & report it to @PonyCr3w #OpYoungPony #Anonymous reageer retweet
quote:It’s Official: US Demands Extradition of Megaupload Suspects
Authorities in the United States have put in an official request to extradite Megaupload founder Kim Dotcom and the three other suspects in the “Mega Conspiracy.” While the request doesn’t come as a surprise, the prosecutors waited till the official deadline last Friday before filing the paperwork. It will take a while before the fate of the accused is decided, as the first extradition hearing is planned for August.
Last Friday, US prosecutors filed an extradition request against four New Zealand-based suspects who were allegedly part of the so-called “Mega Conspiracy.”
Kim Dotcom is wanted in the United States alongside other key Megaupload employees on racketeering, copyright infringement and money laundering charges.
In the battle to extradite the defendants, US authorities intend to rely on a United Nations treaty aimed at combating international organized crime.
Previously a lawyer working on behalf of the United States government admitted that no copyright offenses are specifically listed in the extradition treaty. However, he also noted that certain offenses which involve transnational crime are covered by New Zealand’s Extradition Act.
In New Zealand crimes must carry a four year prison sentence to be deemed extraditable. Under the country’s Copyright Act, distributing an infringing work carries a five year maximum sentence.
Experts and observers are predicting that due to its groundbreaking status, the extradition battle for the Megaupload defendants will be both complex and prolonged, and could even go all the way to the Supreme Court.
For now, the first extradition hearing has been scheduled for August 20.
Megaupload programmer Bram van der Kolk recently called on the New Zealand authorities to remain dignified in their extradition dealings with the United States.
“I really hope New Zealand will keep its dignity and can show that it is a sovereign state that has its own justice system,” he said, referring to the extradition process.
Talking to TorrentFreak last week, Megaupload founder Kim Dotcom said that he and his co-defendants are positive that the law is on their side.
“We’re going for this and we’re confident we’re going to win,” Kim said.
quote:DMCA: Horrors of a Broad and Automated Censorship Tool
The DMCA was once drafted to protect the interests of copyright holders, allowing them to take infringing content offline. Today, however, the system is systematically abused by rightsholders as an overbroad censorship tool. One third of the notices sent to Google are false, companies like Microsoft censor perfectly legal sites, and others use the DMCA to get back at competitors.
arlier this week one of TorrentFreak’s articles was censored by Google on behalf of a copyright holder.
The article in question was mysteriously flagged as being infringing by an automated DMCA takedown tool. An honest mistake according to the people who sent the notice, but one that doesn’t stand in isolation.
Google previously noted that that 37% of all DMCA notices they receive are not valid copyright claims.
One of the problems is that many rightsholders use completely automated systems to inform Google and other service providers of infringements. They swear under penalty of perjury that the notices are correct, but this is often an outright lie.
Microsoft, for example, has sent Google dozens of notices about the massive infringements that occur on the site Youhavedownloaded.com, a site that is completely non-infringing. As a result, many pages of the website have been de-listed from Google’s search results, directly damaging the site’s owners.
Other rightsholders make even stranger mistakes by massively taking down content that they don’t own. The adult content outfit AFS Media for example asked Google to remove links to the movies Braveheart, Monsters Inc, Green Lantern and many more titles that have nothing to do with the content they produce.
Similar mistakes are made at NBC Universal who got Google to censor the independent and free-to-share movie A Lonely Place for Dying.
Or again by Microsoft, who successfully requested Google to remove a link to a copy of the open source operating system Kubuntu.
And then there’s YouTube’s content-ID system. We previously outlined many mistakes that were made by the DMCA-style anti-piracy filter, resulting in tens of thousands of ridiculously inaccurate claims.
This week yet another example came up when YouTube labeled birds tweeting in the background of a video as copyrighted music. Again a mistake, but one that probably would have never been corrected if Reddit and Hacker News hadn’t picked it up.
Aside from the mistakes outlined above, there’s also a darker side to DMCA abuse. Google previously revealed that 57% of all the DMCA notices they receive come from companies targeting competitors.
The “competition” angle also ties into the row between Megaupload and Universal Music Group. The latter removed a promo video from the cyberlocker from YouTube on copyright grounds, without owning the rights to any of the material.
It’s safe to say that the DMCA is broadly abused. Thousands of automated notices with hundreds of links each are sent out on a daily basis, turning it into a broad censorship tool. Only the tip of the iceberg is visible to the public thanks to companies like Google who publish some of the notices online.
We can only wonder what’s happening behind the scenes at other sites, but it’s not going to be any better.
Just a few months ago the cyberlocker service Hotfile sued Warner Bros. for DMCA abuse. In the suit Hotfile accuses the movie studio of systematically abusing its anti-piracy tool by taking down hundreds of titles they don’t hold the copyrights to, including open source software.
Not good.
While we’re the first to admit that copyright holders need tools to protect their work from being infringed, mistakes and abuse as outlined above shouldn’t go unpunished. The DMCA was never intended to be an overbroad and automated piracy filter in the first place.
The above also illustrates why it’s dangerous to allow rightsholders to take entire websites offline, as the SOPA and PIPA bills would allow. The MPAA and RIAA have said many times that legitimate sites would never be affected, but didn’t they say exactly the same about the DMCA?
twitter:AnonymousIRC twitterde op maandag 05-03-2012 om 22:41:26Camp David is a lovely place, sorrounded by woods. Just the right place to camp and sing and have fun. #OccupyCampDavid reageer retweet
Ze vertrekken over 1,5 dag.twitter:xhdroelf twitterde op maandag 05-03-2012 om 22:45:13#anonymous will do what goverments did not do #Syria #OpTripToSyria http://t.co/aGN2vYl4 READ and RT reageer retweet
twitter:TripToSyria twitterde op zondag 04-03-2012 om 13:07:21I have been away at @OccupyStockholm, great ppl! New update: $2257 USD #optriptosyria reageer retweet
quote:Atari Teenage Riot / Anonymous / Sony Vita advert in the USA
My name is Alec Empire and I am from Atari Teenage Riot.
Some might think it was an evil capitalist greed thing,
others will argue it was some Jesus Christ sacrifice thing,
but let’s not overcomplicate this…
I did it only for my own amusement!
If you are new to my music or me as a person you might not know that I had some beef
with Sony in the year 1999 over a camcorder advert in South East Asia.
(a track of mine was basically used against my permission)
I felt used, exploited, ripped off…everything that a sensitive artist like myself would feel
in that situation… haha (I hope you know I am kidding here….but I have to admit it hurt a little)
if you ever tried to fight a corporation like this in court AND in another country,
let me tell you…you want to do other stuff with that time and money…
Even though the thing got settled in court kind of, I never felt they paid what they owed.
It’s the old question that is being asked again and again:
What’s a song worth? When does copyright start, when does it end?
Around the same time I came to the conclusion that men with guns
employed by the government can’t and won’t protect me from
situations like this in the future.
So when the request for the Sony Vita ad landed on my lap,
I put ‘Black Flags’ into it…it was all hectic and they okayed it.
We needed to tie up a few lose ends on this, until it became unstoppable,
that’s why we had to wait to reveal that
Atari Teenage Riot donate their $$$ to http://freeanons.org/
I cross checked they can’t stop the track from appearing in the OWS online clips of
ATR/Anonymous etc… which makes it even more fun.
Yes, I already got some hate, some even attempted to troll me (on Facebook???)….
but you know what?
I don’t care because it just FELT V E R Y GOOD! HAHA
Some Eloi might also say:
“Uh but this Zong ist an advert so u will sell more Compact Disc now”
Maybe…or maybe you can just download the track, which was free all along, here:
Atari Teenage Riot - Black Flags (feat. Boots Riley) by Alec Empire/ ATR
OR maybe for a change…you could ask yourself a question:
“Have I donated to freeanons.org yet?”
The light at the end of the tunnel is a computer screen …nothing else…
Alec Empire
(Berlin 3/3/2012)
quote:A Declaration of the Independence of CyberSpace
Governments of the Industrial World, you weary giants of flesh and steel, we come from the Internet, the new home of Mind.
On behalf of the future, we ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
We have no elected government, nor are we likely to have one; therefore we address you with no greater authority than that with which liberty it always speaks. We declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You have no moral right to rule us, nor do you possess any methods of enforcement we have true reason to fear. You are toothless wolves among rams, reminiscing of days when you ruled the hunt, seeking a return of your bygone power.
Governments derive their just powers from the consent of the governed. You have neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. The Internet does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions.
We have watched as you remove our rights, one by one, like choice pieces of meat from a still struggling carcass, and we have collectively cried out against these actions of injustice. You have neither usage nor purpose in the place we hold sacred. If you come, you will be given no more and no less power than any other single person has, and your ideas will be given the same consideration anyone else would receive You are neither special, righteous, nor powerful here.
You have not engaged in our great and gathering conversation, nor did you create the wealth of our marketplaces. You do not know our culture, our ethics, or the unwritten codes that already provide our society more order than could be obtained by any of your impositions.
You claim there are problems among us that you need to solve. You use this claim as an excuse to invade our precincts. This claim has been used throughout the centuries by many an invading kingdom, and your claims are no different, nor do they ring any less hollow. Your so called problems do not exist. Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours.
The Internet consists of transactions, relationships and thought itself; arrayed like a standing wave in the web of our communications. It is the last truly free place in this world, and you seek to destroy even that freedom. Ours is a world that is both everywhere and nowhere, but it is not where bodies live.
We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. A place where anyone, at any time, is as free to come and go, to say and be silent, and to think however they wish, without fear, as anyone else. There is no status beyond the merit of your words and the strength of your ideas.
We are creating a world where anyone anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.
Your legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here. There are only ideas and information, and they are free.
Our identities have no bodies, so, unlike you, we cannot obtain order by physical coercion. We believe that from ethics, enlightened self-interest, and the commonweal, our governance will emerge. Our identities may be distributed across many of your jurisdictions.
The only law that all our constituent cultures would generally recognize is the Golden Rule. We hope we will be able to build our particular solutions on that basis. But we cannot accept the solutions you are attempting to impose.
In the United States, you repeatedly try to pass unjust legislature in an attempt to restrict us. You disguise this legislature under a variety of different names, and pass excuses that they are for our own protection. We have watched you, time and time again; attempt to censor us under the guise of Copyright protection, or for the protection of Children. These laws come in many shapes and forms, in the name of ACTA, PIPA, COICA, SOPA, but their intentions remain the same. You seek to control what you cannot.
We scorn your attempt to pass these bills, and as a result, our discontent at your misaligned efforts grows each day.
You are terrified of your own children, since they are natives in a world where you will always be immigrants. Because you fear them, you entrust your bureaucracies with the parental responsibilities you are too cowardly to confront yourselves. In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits. We cannot separate the air that chokes from the air upon which wings beat.
In China, Germany, France, Russia, Singapore, Italy, Mexico, Spain, Greece, Egypt, Canada, the United States and many others you are trying to ward off the virus of liberty by erecting guard posts at the frontiers of the Internet. These may keep out the contagion for a small time, but they will not work in a world that is already blanketed in bit-bearing media.
Your increasingly obsolete information industries would perpetuate themselves by proposing laws, in America and elsewhere that claim to own speech itself throughout the world. These laws would declare ideas to be another industrial product, no different than pig iron.
In our world, whatever the human mind may create can be reproduced and distributed infinitely at no cost. The global conveyance of thought no longer requires your factories to accomplish.
These increasingly hostile and colonial measures place us in the same position as those previous lovers of freedom and self-determination who had to reject the authorities of distant, uninformed powers. We must declare our presence in the world we have created immune to your sovereignty, even as we continue to consent to your rule over our bodies. We will spread ourselves across the Planet so that no one can arrest our thoughts.
We will create a civilization of the Mind in the Internet. We have created a medium where all may partake in the forbidden fruit of knowledge, where egalitarianism reigns true. May our society be more humane and fair than yours.
We are the Internet.
We are free.
quote:Will the internet kill copyright? Here’s hoping …
IDEAS AND OWNERSHIP: The concept of protecting ideas and innovation by legal means dates back to antiquity. But many of our existing laws are under strain, their suitability and ultimate purpose called into question.
Here, Philip Soos considers the faults that plague existing copyright laws and suggests that, in an increasingly online world, we need to find more realistic options.
In the past few months, there’s been substantial media interest in the Stop Online Piracy Act (SOPA) bill in the US, introduced ostensibly as an attempt to crack down on intellectual property rights (IPR) violations.
If adopted, this bill would give the US government even more power to deal with those found infringing IPRs than currently exists under the existing legislation – the Digital Millennium Copyright Act (DMCA).
SOPA has spawned a great deal of debate over the merits and demerits of further expanding protection for IPRs. Some claim SOPA would help protect jobs and profit – hence innovation; while many argue SOPA would impinge upon citizens’ right to privacy.
Opposition to SOPA prompted many websites, including Wikipedia, to close down temporarily in protest.
But this debate leaves much to be desired. It consists of arguing IPR protection should be strengthened, weakened or left alone. Few, if any, are critical of the reigning assumption that IPR is a necessary intervention in the economy.
The question that needs to be asked is: why is a 16th century medieval government monopoly being used to spur innovation and creative art in the technologically-advanced 21st century?
The usual story trotted out is that markets will produce a less than optimal level of research and development and creative works without some form of government intervention. We are told that without such intervention, many of the technologies and modes of entertainment we enjoy today would simply not exist.
Thus the need for copyrights to provide the stimulus for firms to invest to meet consumer wants and needs.
The state-driven tech revolution of the late 1990s has seen an explosion of IPR-protected content being shared over the internet. Evolving technology (such as peer-to-peer networking) has made it easy for almost anyone with a decent internet connection to continuously download and upload files, whether that’s video games, music, books, magazines, comics, TV episodes, films, documentaries, or programs.
Anything that can be converted into electronic data and stored on a computer can be shared. It has been estimated that the sharing of content through the BitTorrent file-sharing protocol accounts for one-third of internet traffic today.
Given authorities across the world have often had to catch up to the evolving uses of the internet via legislation, it is difficult for individuals and firms to simultaneously enforce their state-granted rights in many countries, all with differing laws in regards to IPRs.
(That said, the World Trade Organization has attempted to standardise international and national law through its Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS).)
Industry and governments have certainly tried hard in this respect. Every iteration of copyright protection law appears to be more draconian than the last. It is unsurprising that the US is in the lead of protecting IPR, as its industries are the largest and often most profitable (as in the case of pharmaceuticals and biotech).
The TRIPS and DMCA legislation have clearly done little to prevent file sharing, which appears to be ever-increasing in magnitude. Draconian laws have done little to deter users from violating copyrights and other forms of IPRs.
Online content is really no different to drugs that are currently illegal: people who want them will always get them, with entrepreneurs and cartels operating within the black market to meet demand. The sane course of action is to carefully legalise and regulate the supply of drugs/ content, not impose wildly invasive, expensive and equally ineffective government intervention against producers and consumers.
Ever more draconian legislation has not and will not prevent people from file-sharing and violating IPRs. Industry will claim IPRs, as private property, must be respected. But to claim IPR, as information, should be covered by private property rights is as nonsensical as if the government were to assign a property right to an autoworker’s job, allowing the employee the right to hold it or sell to another.
Ownership under copyright is twisted to the point where consumers do not own the software they purchase; rather, they are merely extended a license to use the software that the company owns.
The problems with copyright (and other forms of IPRs) are extensive. The most obvious flaw is the monopolistic pricing inherent to this form of intervention. Any introductory economic textbook tells us the efficiency is met when outputs are produced and sold at marginal cost – what it costs to produce the next good or service.
In the information age, electronic data or informational goods can be copied for free. Accordingly, this is what goods should be priced at: zero, instead of monopoly pricing.
Ironically, pirates are acting as conventional economists claim people should – that is, they are rational agents seeking to maximise their utility (happiness) by obtaining copies of informational goods at marginal cost.
Other costs include those associated with the court system and patents offices, which have effectively become a joke. People and firms are endlessly suing each other over potential and real copyright infringements, with these legal expenses essentially acting as a tax on innovation that is passed on to consumers.
Bureaucrats at the patent office are under a difficult burden to ensure that software patents are truly innovative and do not violate previously-granted patents.
Under SOPA, citizens’ online activities would be watched and recorded in ever-greater detail, in a futile attempt to crack down on piracy. What industry is calling for is an ever-stronger police state to ensure legislative compliance, despite what the evidence may say about the loss of sales pertaining to piracy.
It should be obvious by now that a new form of funding research, development and creative works needs to be implemented. The cornerstone of any new system should ensure goods are sold at the cost of production: either free on the internet or a few dollars for the physical product. Creative Commons and free software licenses should become the new mode.
The extremes of wealth also need to be avoided: there is no natural law that says Bill Gates should become a billionaire via government monopoly while many creative artists just scrape by.
It is imperative that the wastes and inefficiencies of the IPR system be eliminated and not reproduced under alternative systems.
It is time for some creative thinking on the part of the public (industry isn’t going to help) to design alternate models of financing. Otherwise, the nanny state that operates on behalf of the rich is going to become ever more authoritarian.
This is part five of Ideas and Ownership. To read the other instalments, click on the links below:
. Part One: IP, patents, copyright, you
. Part Two: Do patents promote innovation?
. Part Three: The art of war: know your enemys patents, and your own
. Part Four: Evergreening patents: playing monopoly with solar fuels and medicine innovations
quote:Well, my concern would be then stealing our credit card data from
customers somehow. If that happens, it would bury us. Not a lot of people
look at our website in hits.
Leuk initiatief. Jammer dat Occupy en Reddit los gezien worden van Anonymous. Occupy en Reddit zijn onderdeel van het Anonymous idee.quote:Anonymous Campaign to Feed the Homeless
One of the most significant activist groups of the 21st century looks to provide food for those living on the streets.
There is no doubt about the pulling power of Anonymous, as a force to mobilise people around the world.
It was this idea made cyber-reality which initially came up with the hash-tag #OccupyWallStreet. Other groups were involved; but it was the behemoth of the Anonymous publicity machine, which named the entire Occupy Movement.
The denizens of Reddit might have been the ones to think of an internet strike against SOPA and PIPA. It was arguably the support of Anonymous, which made that initiative huge. At least members of the Polish government judged that to be the case, when they donned Guy Fawkes masks in the aftermath.
These are just two examples from a whole back catalogue of social issue activism. So what will happen now the collective takes up the cause of the starving homeless?
ownedquote:FBI: Top LulzSec, Anonymous hackers arrested, 'betrayed by own leader'
Three top members of the infamous computer hacking group LulzSec have been arrested by law enforcement agencies in the UK and the United States. Two others are charged with conspiracy, Fox News reports.
The arrests were made possible, the report says, after turning the group’s senior leader, Hector Xavier Monsegur, who is believed to be a cooperative witness after the FBI unmasked him last June.
Agents arrested two men from Great Britain, two from Ireland, and an American in Chicago. Charges against them are based on a conspiracy case filed in New York federal court.
According to the report the arrests were made possible after turning the group’s senior leader, Hector Xavier Monsegur.
There have no been comments from hacktivists so far. There has no been official comment from FBI either.
http://rt.com/news/lulzsec-hacking-brought-down-977/
quote:
Zou dat niet AnonymouSabu zijn?quote:Hector Xavier Monsegur
twitter:mikko twitterde op dinsdag 06-03-2012 om 15:18:44Big news about LulzSec and @anonymouSabu: "Infamous international hacking group LulzSec brought down by own leader" http://t.co/LdfVv7jN reageer retweet
Helaas voor de FBI heeft Lulzsec maanden geleden het startschot gegeven voor Antisec. Het maakt niet echt veel uit.quote:Alleged LulzSec Hackers Arrested as Leader Turns Snitch
Lulz Security, a hacking group that stole data from law enforcement, defaced the websites of major publications and published troves of user names and passwords from online services, has suffered a critical blow at the hands of law enforcement.
Agents across two continents arrested two of LulzSec‘s alleged top hackers on Tuesday morning, along with a member of the larger hacking collective Anonymous. Law enforcement also slapped new charges on two LulzSec members who were already behind bars, Fox News reports.
(MORE: ‘We Do It for the Lulz’: What Makes LulzSec Tick?)
In a story that sounds like movie fodder, LulzSec’s informal leader reportedly turned against his former hacking buddies, secretly helping the FBI in the months leading up to the arrests.
The group’s alleged leader is Hector Xavier Monsegur, an unemployed, 28-year-old father of two who used the alias “Sabu.” The FBI reportedly arrested him last June, and he pleaded guilty in August to a dozen hacking-related charges. Monsegur then started working with the FBI to bring down the rest of LulzSec’s top-ranking hackers.
The details on the arrests aren’t official yet, but Fox News has apparently spoken with FBI agents for its story. “This is devastating to the organization,” one FBI official involved with the investigation said. “We’re chopping off the head of LulzSec.”
More details should become available later today, when court documents including Monsegur’s admissions are expected to be unsealed in New York’s Southern District Court. A conspiracy indictment will reportedly name the five LulzSec members facing charges: Ryan Ackroyd, aka “Kayla” and Jake Davis, aka “Topiary,” of London; Darren Martyn, aka “pwnsauce” and Donncha O’Cearrbhail, aka “palladium,” of Ireland; and Jeremy Hammond, aka “Anarchaos,” of Chicago.
Fox News’ law enforcement sources described Hammond as a member of Anonymous who is being charged in a separate indictment. He is allegedly the main person behind Anonymous’ hacking of security think tank Stratfor in December.
LulzSec began making a name for itself last May, with attacks on Fox.com and PBS.com. The group then hacked Sony Pictures’ servers and made off with user names, passwords, addresses and dates of birth. Other high-profile hacks included a breach against Arizona law enforcement and a big takedown of popular gaming services such as Eve Online and Minecraft.
However, the group announced last June that it was disbanding, facing pressure from law enforcement and other hackers. At the time, little did we know that LulzSec’s alleged leader had been arrested. For the rest of the group, it was already too late.
Read more: http://techland.time.com/(...)nitch/#ixzz1oLtfnmcF
twitter:BarrettBrownLOL twitterde op dinsdag 06-03-2012 om 16:51:30My apartment was raided this morning by the FBI. Feds also came to another residence where I actually was. Sabu is a traitor. #Anonymous reageer retweet
twitter:Anon_Central twitterde op dinsdag 06-03-2012 om 16:55:28@BarrettBrownLOL why aren't you in jail? reageer retweet
twitter:BarrettBrownLOL twitterde op dinsdag 06-03-2012 om 16:59:38@Anon_Central Because they didn't arrest me. They wanted laptops. reageer retweet
quote:Lulzsec mastermind Sabu: an elite hacker and star FBI informant
US authorities say Hector Xavier Monsegur, a celebrity for his attacks on the US senate, was 'flipped' after his arrest
He was the self-taught "elite hacker" behind devastating attacks on the US Senate, the Zimbabwean government and a string of enemies in between.
From the New York apartment block he shared with his two children, 28-year-old Hector Xavier Monsegur led an audacious double life as the internet activist "Sabu" – something of a celebrity in the world of hackers.
But Monsegur was finally unmasked on Tuesday after it emerged that he had pleaded guilty to computer hacking charges and had acted as an informant for the FBI since August 2011, just as the international crackdown on the notorious Anonymous hacker collective gathered pace.
Monsegur was deeply involved in attacks on behalf of WikiLeaks in December 2010, according to court papers unsealed in New York on Tuesday.
The hacker acted as a "rooter", identifying weak spots in the websites of multinational firms including Visa, MasterCard and PayPal which his Anonymous group of "hacktivists" would then attempt to exploit.
The 27-page indictment of Monsegur reads like a hall of fame of online sabotage. According to the FBI, Sabu was intimately involved in the WikiLeaks "Operation Payback" attacks that managed to steal documents from the Yemen and Zimbabwe governments and deface the website of the Tunisian prime minister.
Sabu was always quick to claim responsibility for the attacks, aiming to taunt law enforcement bodies and gain respect from his peers. And although rumours of his identity began to circulate in the hacker community, his precise details remained unknown.
On 7 June last year, the act was over. FBI officials found Monsegur at his Manhattan apartment. According to the US media, the expert hacker had been foiled by his own carelessness. The FBI discovered that he had logged into an internet chatroom from his own internet address – a schoolboy error of computer hacking.
Unknown to his fellow hackers, Monsegur quietly pleaded guilty to 12 charges related to computer interception on 15 August last year. And, threatened with 124 years in prison, he agreed to become an FBI informant. The FBI took his own battered laptop and replaced it with their own – which they monitored around the clock.
Online, he maintained his bravura attitude. "Next thing you'll say is I work for the CIA and I'm a blackop," he snapped at a Guardian inquiry on Twitter after the Sun's website was hacked in July.
"Am I snitch/informant? Lets be real – I don't know any identities of anyone in my crew," said an online post attributed to Monsegur in October last year – weeks after he was "flipped" by US authorities. "And the last thing I'd ever do is take down my own people. I am a grown ass man I can handle my own issues. I've been to jail before – I don't fear it. In fact there is very little I am afraid of especially these days."
The post was a response to other hackers who were increasingly accusing Sabu of being a "media whore" and an informant. The rumours were rife – little more than 14 hours after he avoided imprisonment by assisting the US government, one group claimed Sabu was a "Chinese infiltrator".
"Lately I've been chilling; enjoying time off to focus on my personal life. I'm not tied to this the rest of my life," said the post linked to Sabu's Twitter account. "I've already made my impact. If I disappear now or get knocked, its already too late … Sadly people want to exonerate themselves from their responsibility – like emailing the feds for immunity."
Monsegur described himself in the post as a professional security researcher, but the computer genius had been unemployed since the closure of filesharing giant LimeWire, according to US authorities who spoke to Fox News.
The broadcaster cited Monsegur's handlers, who described him as an anti-government, anti-capitalist hacker who had a political edge. They said his now-infamous online moniker had been taken from a professional wrestler born on nearby Staten Island, known as Sabu the Elephant Boy.
The hacker clearly drew inspiration from the New York fighter. He routinely responded aggressively to police, journalists and others on social networking websites. "I don't give a fuck what anyone thinks, I also don't give a fuck if you have a beef with me," said a post attributed to him on the Pastebin website. "The end result is always going to be: You. Can. Not. Stop. Me. Deal with it."
The FBI handlers described Monsegur as brilliant but lazy. According to Fox News, US authorities found him selling stolen credit card details to others on Facebook.
It is not clear how lucrative Monsegur's brief reign of terror was. But the downfall of Sabu will continue to send reverberations through online hacker collectives for a long time to come.
quote:Barrett Brown, who has spoken on behalf of Anonymous in past attacks, including the attack on Stratfor in December, said that his home in Dallas had been raided and that the F.B.I. had sent three agents to his mother’s house, where he stayed last night.
“I received an advance warning of the raid and put all my laptops in very specific places where they couldn’t be found,” Mr. Brown said. He said the agents left without making an arrest.
Mr. Brown said the arrests elsewhere would not slow down the Anonymous movement. “There are lots and lots of people here that continue to work. The F.B.I. did not really cut the head off of anything. Anonymous will go forward as usual. So will I. We hired an army of lawyers last January. We are prepared for a big slug-out.”
quote:Speaker sides with Toews, rules hacker group Anonymous out of order
With Conservatives targeting a Liberal staffer who posted the sordid details of Vic Toews’s divorce to Twitter, the Speaker of the House has ruled that threatening videos by the hacker group Anonymous violated the Public Safety Minister’s parliamentary privilege.
Andrew Scheer told the Commons Tuesday the Anonymous videos “constitute a direct threat to the minister in particular, as well as all other members” of Parliament.
“These threats demonstrate a flagrant disregard of our traditions and a subversive attack on the most fundamental privileges of this House,” Mr. Scheer said. “As your Speaker and the guardian of those privileges, I have concluded that this aspect – the videos posted on the Internet by Anonymous – therefore constitutes a prima facie question of privilege.”
He invited Mr. Toews to move to have the matter sent to the procedures and House affairs committee. It is unclear how MPs on that committee could call Anonymous to testify, given that its members are, in fact, anonymous.
quote:Anonymous has threatened repeatedly to divulge more embarrassing aspects of Mr. Toews personal life in retaliation for Bill C-30, which opponents say will allow authorities to spy on Canadian Internet users. On Friday it posted allegations that cannot be proved.
The group has demanded the bill be killed and that Mr. Toews resign. And it has voiced support for Adam Carroll, the Liberal staff member who has admitted being behind the Vikileaks30 Twitter feed that published information contained in the minister’s divorce papers.
Conservative MP Dean Del Mastro moved a motion later Tuesday to have Mr. Carroll appear at the Commons ethics committee. It was ruled out of order by Jean Crowder, the NDP MP who chairs committee, who determined the matter was outside the committee's mandate. But the Conservatives, who hold a majority on the committee, challenged her ruling.
New Democrat Charlie Angus said the Conservatives are simply trying to divert attention from their own problems with the allegations that telephone campaigns were used to suppress the vote during the last election. But Mr. Del Mastro argued that committees are the masters of their own destiny and may study whatever they please.
Mr. Angus said if the committee must study Vikileaks, it will have to spend time determining whether the salacious information revealed about Mr. Toews' divorce was true – something he said he would find distasteful.
"They would rather turn the lights on on this ugly divorce in order to turn the attention off the elector fraud that's rocking the Conservative party," he told reporters after the meeting. "The role of a committee in Parliament is to hold government to account. What the Conservatives are doing is they are using their majority to attack their political enemies."
Liberal MP Scott Andrews moved an amendment to Mr. Del Mastro's motion, expanding the scope of the committee's study to cover all use of Commons resources participation in social networking sites. The committee adjourned before the amendment could be put to a vote.
Mr. Andrews said his party has made it clear that it has no interest in examining the details of a politician's personal life. But "maybe we'll have to look at every tweet," said Mr. Andrews.
The Public Safety Minister had also asked the Speaker to find that the Vikileaks tweets had violated his parliamentary privilege.
But in his ruling, Mr. Scheer pointed out that Interim Liberal Leader Bob Rae had already offered his “unequivocal apology” and that of the Liberal Party. As a result, he said, although Mr. Carroll’s actions constituted and unacceptable use of House of Commons resources, “I am prepared to consider this particular aspect of the question of privilege closed.”
Mr. Toews also said his office had been inundated with calls, emails and faxes that made it difficult to do his job. The Speaker ruled the minister and his staff could still communicate with constituents through other means. So he determined that he could find no breach of privilege in that regard.
But, as to the actions of Anonymous, Mr. Scheer said he found the videos troubling and the threats disturbing,
“Those who enter political life fully expect to be held accountable for their actions – to their constituents, and to those who are concerned with the issues and initiatives they may advocate,” he said. “However, when duly-elected members are personally threatened for their work in parliament – whether introducing a bill, making a statement, or casting a vote, this House must take the matter very seriously.”
quote:The LulzSec hacking arrests won't make it safer online
The FBI's infiltration of LulzSec is astonishing – but the group's activities are small fry in comparison to professional cyberwar
For you, LulzSec, the war is over. Maybe. In an astonishing series of revelations, the FBI on Tuesday issued charges against four individuals alleged to be principal members of the hacking collective, and another alleged to be a member of its sister group, Anonymous.
But more staggering still was how the evidence against these individuals was gathered. The LulzSec member known as Sabu, revealed to be an unemployed 28-year-old New Yorker named Hector Xavier Monsegur, had been caught by the FBI in June 2011, and by August had pleaded guilty to hacking offences with a maximum sentence of 124 years and six months.
Ever since, he had worked to provide evidence against his suspected former cohorts.
According the FBI charge sheet, the degree of Sabu's co-operation with the FBI is extraordinary. Through him, the authorities apparently had the inside track on a series of audacious hacks, including the recording of an FBI conference call and the lifting of 5m emails from a US intelligence publisher, Stratfor.
Indictments show Sabu encouraging other online aliases during attacks, and suggesting thousands of passwords publicly. On Twitter, Sabu's account continued to threaten the "Feds" and post encouragingly on new attacks.
Through Sabu, the FBI were aware of the attack on Stratfor's servers even as it was ongoing – and seemingly did not inform the company. An FBI storage server was even offered to Anonymous on which to store the hacked documents.
Many will feel unease at the FBI's nine-month penetration of LulzSec and – at the very least – parts of Anonymous. Concerns about incitement and entrapment will be raised.
Companies subject to some of the attacks by the groups may also feel aggrieved: could the authorities have stopped some of them if they'd wanted to? It seems they could.
But to focus solely on these concerns misses a wider series of problems in clamping down on hackers, and maintaining law and order, online.
It is important to note that Monsegur aside, the other individuals named in the US charge sheets are innocent unless proven guilty.
But whoever carried out the assorted hacking attacks, the nature of these groups and their motivations are known: their membership is generally young, often in the late teens, and attacks are often politically motivated. The ethos isn't fixed, but there are some creeds: anti-corporate, anti-censorship, libertarian and definitely anti-surveillance.
The damaging consequences of Anonymous and LulzSec hacks shouldn't be understated, but motivations were rarely financial: where credit cards were taken, for example in the Stratfor hack, they were used more for charitable donations or purchasing servers for Anonymous use than for financial gain.
If the theme of a young, anti-corporate group engaging in civil disobediance seems familiar, it should. The Occupy movement and Anonymous are strikingly alike in both their organisation, their tactics and their goals.
But while most Occupiers who are arrested – and even these are a minority – face relatively mild sanctions (typically non-custodial), a single count of a hacking offence in the UK or US can carry a 10-year prison sentence.
In the online realm, a single knowledgeable hacker engaging in civil disobedience can cause more trouble than a single protester. At present, this is often dealt with simply by punishing them more harshly, using laws intended to hit those engaged in industrial-scale theft or espionage.
But legal inconsistency spell trouble, too. In Germany, participating in an attack aimed at temporarily taking a website offline (known as a denial of service attack) are recognised as the online equivalent of a sit-in protest, and may not qualify as criminal offences. Elsewhere, it can lead to imprisonment.
Protesters moving online may find the laws dramatically harsher than their offline equivalents: a gradual criminalisation of dissent.
There is a wider concern. No one's computer is safer in any meaningful way as a result of the FBI's actions. Anonymous may be the most famous hacking group in the world – and may yet bounce back even from these latest developments – but even at its peak it was far from the most dangerous.
Breaking into systems and defacing sites, boasting publicly about what you've done will certainly get you noticed – but that's not what the biggest players do.
Professional hacking is big business, often operating from Russia, Africa and South America where enforcement is lax.
Breaking into systems to glean credit card details on a huge scale is a major operation – and the last thing these guys would do is inform an individual or business that they've compromised their system. The longer you can stay inside and steal information unnoticed, the better.
And then there are the growing numbers of government-sanctioned hackers used to engage in cyberwar. Accusations fly against China, Israel and the US and many others – but for obvious reasons, individuals are never brought to justice.
That the most high-profile hacking arrests of recent times comes from a group dedicated to online civil disobedience signals nothing good: at best – and it's a disturbing best – it means that these are the only suspected hackers the authorities are able to catch.
At worst, it means Anonymous are the only hackers they're chasing.
twitter:AnonymousPress twitterde op dinsdag 06-03-2012 om 19:00:18This will NOT deter #Anonymous in anyway shape or form... #ExpectUs reageer retweet
quote:
quote:Apparently, Monsegur was caught last summer and — according to the FBI — has been working as an informant ever since. He allegedly directed fellow hackers from his public housing project in New York while turning around and feeding federal investigators enough incriminating evidence to build a case against his cyber-comrades. According to The Guardian, Monsegur may have also provided an FBI-owned computer to facilitate the release of five million emails taken from the private intelligence firm Stratfor and which are now being published by WikiLeaks. This suggests the FBI has insight into the internal discussions between Julian Assange of WikiLeaks, and the hacking group Anonymous. Although no motives have been confirmed, some believe this is part of a larger strategy to build a case against Julian Assange. An internal email from Stratfor recently revealed that the U.S. Department of Justice has already obtained a sealed indictment against Assange. We’re joined by Gregg Housh, a former Anonymous cyber-activist who remains is in touch with members; and Gabriella Coleman, a leading authority on digital media, hackers and the law. [Rush transcript to come. Check back soon.]
quote:Anonymous Hacks Vatican Website In Cyber Attack On Holy See, Sources Say
A group of Italian hackers who claim to be members of the loose-knit international gang of cyber criminals known as "Anonymous" took down the Vatican's website for a number of hours Wednesday, the Chicago Tribune reports.
A statement posted on a website claiming to be the official homepage of the Italian branch of Anonymous said the takedown was orchestrated in protest of a number of alleged abuses by the Catholic Church including past execution of heretics, the selling of indulgences, and the recent child abuse scandals involving priests.
"Today, Anonymous has decided to put your site under siege in response to your doctrine, liturgy and the absurd and anachronistic rules that your profit-making organisation spreads around the world," the hackers wrote in the statement, according to Reuters. "This attack is not against the Christian religion or the faithful around the world but against the corrupt Roman Apostolic Church."
Just yesterday, five hackers in Britain, Ireland and the United States believed to members of the group LulzSec were charged in a series of cyber attacks after one member of the group turned out to be an FBI informant, according to the Agence France-Presse.
The crackdown followed a long line of hacking incidents attributed to Anonymous including attacks on Sony Pictures Entertainment, the government website of several African nations and Nintendo.
Er waren meer Anons bezorgd over Sabu. Hij was een maand offline en was een paar keer geDOXed maar niet gearresteerd. (of zo leek hetquote:Op woensdag 7 maart 2012 20:23 schreef roepdeman het volgende:
Dank je wel voor je antwoord. Berichten zoals deze doen me dus denken dat Sabu al voor zijn arrestatie niet 100% voor het gemeenschappelijke doel bezig was, maar meer met zichzelf en zijn groep.
De reden waarom ik naar de status van Th3 J35t3r vraag is, omdat hij kennelijk al langer wist hoe de vork in de steel zat. Natuurlijk zullen de allerbesten zich nooit zo publiekelijk uiten zoals Sabu dat deed, maar ik vraag me toch af hoe goed die anderen zijn, als niemand anders Sabu 'outte'.
quote:Barett Brown: On the FBI Raid
As I have noted, the FBI raided my apartment in Dallas on the morning of March 6th. I was not there at the time; I had been given a vague warning that a raid was to take place the next day, so I went to my mom's place, where she lives with her husband, who is out of town, on the 5th. On the morning of the 6th, three FBI agents came to my mom's door and asked if I was there. She woke me up and I went down to talk to them. They told me that they'd executed a search warrant at my apartment and that the door had been broken in the process, and then asked me if I had any laptops with me here at my mom's place that I wanted to give them. I responded in the negative, and they left. At that point I began taking calls and e-mails from the press regarding Sabu, whom I learned was in fact a degenerate pussy traitor who couldn't face two fucking years in prison, making him the biggest pussy in the history of mankind. There were several people who came to this conclusion early on; I was not wise enough to be one of them. As to the various stunts he pulled in the months since his arrest - including but not limited to the unnecessary release of credit card information for Stratfor customers - we may never know to what extent such things were encouraged by his "Justice Department" handlers in an effort to discredit this movement. But I digress, lol. At any rate, the Feds came back a couple of hours later with a search warrant for my mom's place - they fully intended to take a certain laptop, and did.
The documentation left with me by the FBI after the raid on my mother's home states that the evidence they were looking for pertains to "conspiracy to obstruct justice, and the obstruction of justice, i.e. tampering with a victim, witness, or informant" and "conspiracy to access without authorization protected computers, and fraud and related activity in connection with computers (aiding and abetting), in whatever form, namely:
1. Records relating to HBGary;
2. Records relating to Infragard;
3. Records relating to Endgame Systems;
4. Records relating to Anonymous;
5. Records relating to Lulzsec;
6. Records relating to IRC chat;
7. Records relating to Twitter;
8. Records relating to wiki.echelon2.org;
9. Records relating to pastebin.com;"
... and then goes on to list computers and anything relating to them as things to be seized.
I am happy to post this list as it contains the names of two firms - HBGary and Endgame Systems - which I will now have particular opportunity to discuss, in a more public setting, as this matter proceeds.
Barrett Brown
Project PM
quote:Anonymous has grown beyond LulzSec and Sabu
As reported by Fox News yesterday, LulzSec “mastermind” and Anonymous hacker Sabu (real name: Hector Xavier Monsegur) was flipped by the FBI. Big surprise. Give the FBI a cookie.
There has been a widespread belief that Sabu was a rat for quite some time within the hacking community—an August 2011 chat between Sabu and Virus, for instance. [link] Virus quite prophetically wrote in that infamous chat: “I’m absolutely positive, you already got raided, and are setting your friends up and when they’re done draining you for information and arrests they’ll sentence you and it’ll make nose.”
Beyond that, in a community wherein anyone can have a voice, it stands to reason that subversive government influences are present, whether passively watching or actively suggesting. Disinformation, false flag operations, and immunity: these are the human intelligence gathering techniques that spy agencies use to infiltrate movements.
With that in mind, one of two possibilities exist: The FBI has transformed Anonymous into one monolithic false-flag operation, or agents take down hackers the way they take down other targets—with one or multiple informants. Judging the FBI’s efforts purely on the frequency of Anonymous’ activities throughout the last year, it’s probably safe to say that the FBI hasn’t accomplished the former.
If this conclusion is wildly off-base, and the former is true, then one has to entertain the following possibilities: the Stratfor hack was socially engineered by the FBI; Stratfor maybe even allowed it; and the FBI manipulated Anonymous into a partnership with WikiLeaks in the publication of the Global Intelligence Files. Then, of course, one must wonder if WikiLeaks itself is not a false-flag operation. This scenario seems rather unlikely, especially in a world where those who attempt to regulate the Internet are always one step behind.
Where then does this leave Anonymous and its supporters?
Again, judging from Anonymous’ efforts in the last year, which included a hybridization with Occupy Wall Street, the Stratfor hack, a partnership with WikiLeaks, an infiltration of the FBI and Scotland Yard’s conference call on Anonymous, Operation ANTI-ACTA (which struck the Polish government), and the CIAPC hack (following Elisa’s blockade of The Pirate Bay), amongst other projects; it would seem that Anonymous, as a global collective, has grown far beyond LulzSec and Sabu’s influence—that it has indeed shed Sabu’s influence.
Anonymous’ efforts are truly global now and ever-shifting. Unless people believe that stool pigeon Sabu’s opera singing is evidence of some international, multi-state false flag conspiracy to nab radical hackers, Anonymous likely won’t be slowing down anytime soon.
Here’s a suggestion to the FBI: Maybe you should spend a little less time pursuing Anonymous and put more effort into bringing to justice the white-collar criminals who crashed the economy in 2008, thereby pocketing billions and evaporating middle class savings, delaying retirement, and sending families into the grip of poverty; driving individuals to suicide, or illegal and prescription drug use to numb the pain; to theft, alcoholism, and welfare that the GOP hates so much; and saddling college graduates with hundreds of thousands of dollars in debt from which they won’t soon liberate themselves.
Yes, one can see how a DDoS attack launched against Sony Pictures would be a priority. The FBI does work for politicians after all, who are kept in office by the campaign donations of corporations.
Indeed, the FBI, like Sabu himself, knows the following maxim all too well: you’re always somebody’s bitch.
Th3 J35ter, 1 augustus 2011quote:
quote:‘Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. Privacy is the power to selectively reveal oneself to the world.’
So folks continue to ask me why I am ‘after’ anon/lulzsec….
Well I’d like to address this.
I am not particularly ‘after’ anon (that’s not denying that we have had our run-ins), everyone knows their roots and anyone who can google knows mine.
However… Lulzsec, hmmm different beast. Lulzsec are threatening, and inciting and RECRUITING.
While Anonymous claim to be ‘leaderless’, Lulzsec is obviously not. And Anonymous in their desperation for the world to see them as anything other than what they really are… have allowed themselves to have a ‘leader’.
That ‘leader’ is known as ANONYMOUSABU
‘Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. Privacy is the power to selectively reveal oneself to the world.’
Anonymous and Lulzsec seem to have forgotten this, this will be (is) their downfall.
They dumped amongst other things:
* Names of undercover operators in the field, exposing not only them, but their families.
In the name of #AntiSec??
* At least 62k INNOCENT USERS creds.
In the name of #AntiSec??
Really??
Last week there was a story circulating regarding ‘KGB’ infiltration of Anonymous?? (lol)
Here’s the link….
Well ladies….
That’s the least of your worries. You see you have allowed yourselves to start on a rocky road. It ends with all you folks becoming domestic/otherwise terrorists.
Wouldn’t it be great for the REALLY bad guys to infiltrate a group of willing pawns like ‘Anonymous’.
ANONYMOUSABU created Lulzsec by offering Anon’s ‘best hackers’ — who were merrily attacking oppresive regimes before he came along– a good time.
Then after sucking them in with candy, he switched their focus to attacking Western regimes, and more specifically military targets. It seems that these were his intentions all along.
It’s quite strange that someone who supports democratically elected governments (Hamas) would attack them and tell people to rise up against them, while at the same time try to draw hackers away from attacking non-democratic and anti-democratic regimes as ANONYMOUSABU has done.
Coincidence much? – That since ANONYMOUSABU the focus has shifted from primarily things like #opLibya #opEgypt to a host of western military, law enforcement agencies and commercial targets?
Next ANONYMOUSABU will be saying he had no clue that the word ‘Abu’ in Arabic translates to ‘Father’ – which makes him what?? – Father of Anonymous??
Let’s cut to the chase:
YOU CAN DOWNLOAD AN EXTENSIVE ANALYSIS INTO THE ‘COINCIDENCES’ RIGHT HERE:
twitter:AnonOpsSweden twitterde op donderdag 08-03-2012 om 13:51:30@OoPsRevolution btw @TripToSyria #OpTripToSyria has landed in Jordan is safe, and looking for safe routes reageer retweet
quote:
quote:The group apparently targeted the company for comments made earlier in the day by Panda Security researcher Luis Corrons, who had celebrated the arrests and predicted that Anonymous would be incapable of perpetrating the kind of data breaches and defacements for which LuLzSec was responsible.
The note also accused Panda Security of assisting in a recent sweeps in Europe and South America that resulted in the arrest of 25 suspected members of Anonymous.
"Pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has earning money working with Law Enforcement to lurk and snitch on anonymous activists. they helped to jail 25 anonymous in different countries...yep we know about you. How does it feel to be the spied one?"
Read more: http://news.cnet.com/8301(...)rests/#ixzz1oXApNeoD
Anonymous als idee: Je maakt informatie beschikbaar en geeft gelegenheid om er over te discussieren. Dan gebeurd er wat of niet. Dus iedereen die iets zegt of iets leest over dat idee is per definitie onderdeel van dat idee. Dus ja, jij bent Anonymous.quote:Op donderdag 8 maart 2012 16:01 schreef Yuri_Boyka het volgende:
Volgens mij hoor jij ook bij Anonymous, lijkt wel of je een archief bijhoudt.
Zoals creditcard nummers?quote:Verder wat ik persoonlijk jammer vind is dat Anon niet hackt maar gewoon sites plat legt. Ik zou ze wel is echt TOP SECRET information willen zien publiceren dat echt alleen de beste kunnen.
quote:
quote:Typically, the DNS resolvers built into client operating systems ask nameservers (usually the
ones provided by ISPs) to perform recursive queries on their behalf. The lookups then performed by these servers to fulfill the requests are typically iterative.
Here's where the problem arises. The response to a DNS query can be considerably larger than the query itself. In the best (or worst) case, a query of just a few dozen bytes can ask for every name within a domain and receive hundreds or thousands of bytes in response. Every request sent to a DNS server has a source address—an IP address to which the reply should be sent—but these source addresses can be spoofed. That is, a request can be sent from one IP address but the DNS server will think it was sent by a different address.
Using these two things—recursive lookups that return large amounts of data to small queries, and spoofed source addresses—attacks can be made. The attacker first finds a server that is configured to enable recursive lookups. He then sends a large number of requests to the server, spoofing the source address so that the server thinks that the victim machine is making the request. Each of these requests is chosen so that it generates a large response, much larger than the queries themselves. The server will then send these large responses to the victim machine, inundating it with traffic. The disparity between the request size and the response is why these attacks are known as "amplification" attacks.
twitter:AnonymousIRC twitterde op vrijdag 09-03-2012 om 01:11:41Wow. Just learned something from AntiSec core. Thought something was fishy about FBI and the Stratfor case? You were right. Stay tuned. reageer retweet
Er was sprake van moeilijke onderhandelingen met WikiLeaks. Blijkbaar heeft Antisec de files gratis aan WL gegeven en hebben ze de FBI tuk.twitter:AnonymousIRC twitterde op vrijdag 09-03-2012 om 01:22:06Sabu/FBI initially asked for money from #Wikileaks for #GIFiles, to trap Assange. Failed: He didn't fall for it and AntiSec team no want $$$ reageer retweet
quote:Leaked: Police Plan to Raid The Pirate Bay
More than half a decade after Swedish police officers first raided The Pirate Bay, there is talk that a second police raid against the world’s most famous torrent site is in the planning. The Pirate Bay team has learned that local authorities have acquired warrants to take action against the site, and expect that both servers and the new .se domain name may be targeted soon.
pitrate bay raidIn the spring of 2006 a team of 65 Swedish police personnel entered a datacenter in Stockholm. The officers were tasked with shutting down the largest threat to the entertainment industry at the time – The Pirate Bay’s servers.
The raid eventually led to the conviction of four people connected to The Pirate Bay, but the site itself remained online.
Today, the Pirate Bay team has informed TorrentFreak that a second raid is being prepared by the Swedish authorities. The site’s operators, who are well-connected in multiple ways, learned that a team of Swedish investigators is gearing up to move against the site in the future.
The suspicions were also made public by The Pirate Bay a few minutes ago.
“The Swedish district attorney Fredrik Ingblad initiated a new investigation into The Pirate Bay back in 2010. Information has been leaked to us every now and then by multiple sources, almost on a regular basis. It’s an interesting read,” the Pirate Bay crew notes.
“We can certainly understand why WikiLeaks wished to be hosted in Sweden, since so much data leaks there. The reason that we get the leaks is usually that the whistleblowers do not agree with what is going on. Something that the governments should have in mind – even your own people do not agree.”
The Pirate Bay team confirmed to TorrentFreak that the announcement is no prank. The authorities have obtained warrants to snoop around in sensitive places and two known anti-piracy prosecutors, Frederick Ingblad and Henrik Rasmusson, are said to be involved.
Employing a little psychological warfare aimed at putting the investigators off-balance, the Pirate Bay team has chosen to make the news public to make the authorities aware that they are not the only ones being watched.
According to The Pirate Bay team they aren’t doing anything illegal, but nonetheless they noticed that the investigation intensified after the site’s recent move to a .SE domain.
“Since our recent move to a .SE domain the investigation has been cranked up a notch. We think that the investigation is interesting considering nothing that TPB does is illegal,” they say.
“Rather we find it interesting that a country like Sweden is being so abused by lobbyists and that this can be kept up. They’re using scare tactics, putting pressure on the wrong people, like providers and users. All out of fear from the big country in the west, and with an admiration for their big fancy wallets.”
Behind the scenes The Pirate Bay team is working hard to ensure that the site will remain online in the event that servers, domain names and Internet routes are cut off. In this regard The Pirate Bay has learned a valuable lesson from its former operators.
Those who are aware of the site’s history know that without a few essential keystrokes in May 2006, The Pirate Bay may not have been here today. When Pirate Bay founder TiAMO heard that something was amiss, he decided to make a full backup of the site before heading off to the datacenter, where he was greeted by dozens of police officers.
TiAMOs decision to start a backup of the site is probably the most pivotal moment in the sites history. Because of this backup the Pirate Bay team were able to resurrect the site within three days. If there hadnt have been a recent backup, things may have turned out quite differently.
It was a close call at the time, and a defining moment in the history of the site. The determination to get the site back online as soon as possible set the defiant tone for the years that followed. Today, the site prides itself in being the most resilient torrent site around.
In recent years The Pirate Bay has implemented a variety of changes to guarantee that the site remains online. It added several backup domains, placed servers all over the world, and removed resource intensive processes.
Earlier this week The Pirate Bay took another important step by removing .torrent files altogether to become a magnet link site. As a result, the entire site can now be reduced to a few hundred megabytes, small enough to fit on the tiniest thumb drive.
For the police, this makes a successful Pirate Bay raid almost impossible. While they can take steps to put the site out of business briefly, its inevitable that it will re-appear in a matter of hours, or days.
Or to use the words of the Pirate Bay team. Were staying put where we are. Were going no-where. But we have a message to hollywood, the investigators and the prosecutors: LOL.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Norton Antivirus all Platforms source code leaks to public
After PcAnywhere source code released Anonymous leaks Norton AntiVirus 2006 All Platform’s Source Code via PirateBay. The source code is available for download since 4:10PM today.
quote:. All conflict comes from social inequality and those who use this to their advantage ? Our civilization is facing a radical, imminent mass change. The alternative to the hierarchical power structure is based on mutual aid and group consensus. As hackers we can learn these systems, manipulate these systems, and shut down these systems if we need to.?
~ Jeremy Ham[/quote]mond (alleged hacker sup_g)
FREE sup_g
FREE kayla
FREE palladium
FREE Topiary
FREE pwnsauce
FREE ALL ARRESTED ANONS WORLDWIDE.
we are AntiSec,
we are legion,
we do not forgive,
we do not forget,
expect us.
Hij ondetekende met oud-en-nieuw, terwijl iedereen aan het feesten was, geloof ik?quote:Op vrijdag 9 maart 2012 18:24 schreef Schenkstroop het volgende:
Ik las net dat Obama zei dat hij de NDAA bill zou tegenstemmen. Maar op het laatst toch ondertekende. Ook werd duidelijk dat het witte huis ervoor bepaalde stekende zinnen over ontvoering van Amerikaanse burgers weg liet halen voordat erop gestemd werd. Obama loog dus als een Pinokio.
In the pockets of WallStr.quote:Op vrijdag 9 maart 2012 18:30 schreef Schenkstroop het volgende:
Zoiets begreep ik ook wat een sneak! Tekenend, telling. damning, sign o' the times. Where's the mainstream media?
quote:Man arrested on suspicion of hacking Britain's biggest abortion clinic
West Midlands arrest follow claims on Twitter that British Pregnancy Advisory Service's patients would be made public
A 27-year-old man suspected of hacking the website of Britain's biggest abortion clinic was arrested on Friday morning.
The arrest in the West Midlands follows claims made on Twitter on Thursday that the names of patients who used the British Pregnancy Advisory Service would be made public on Friday.
The man, who police say claims to have links to the loose hackers group online "hacktivists" Anonymous, was detained by officers from Scotland Yard's e-crime unit on suspicion of offences under the Computer Misuse Act.
A spokeswoman for BPAS said there were about 26,000 attempts to break into its website on Wednesday night, adding that there was never any danger that medical or personal information relating to women who had received treatment was accessed.
BPAS said "no client records" were stored on the website but it took the attack very "seriously" and praised the police for its "swift response".
The firm, which treats about 55,000 woman a year for a range of services from abortion to contraception, obtained an injunction on Thursday preventing any information that could have been hacked being put into the public domain.
BPAS first noticed the site had been hacked early on Thursday morning and it became apparent quite quickly that it was under a sophisticated and co-ordinated attack, the spokeswoman said.
"There is no suggestion that the security of our site is weak, but this is a wake-up call to everybody to what could happen," she added.
"It was the kind of thing we've seen happen to the Pentagon, but targeting a health charity is very different to what's gone on before."
She added that the incident appeared to reflect the "escalating" and "aggressive anti-abortion" protests BPAS is experiencing outside its clinics and "some of the language used was redolent of the political language being used such as accusations that woman are being 'coaxed into abortions' by counsellors".
Detective inspector Mark Raymond from the Metropolitan police's central e-crime unit confirmed the website had been compromised but stressed that the stolen data did not contain medical details of anyone in touch with BPAS or who had had an abortion.
"We have taken rapid action to identify and arrest a suspect involved in hacking. This was done to prevent personal details of people who had requested information from the BPAS website being made public. It should be stressed that the stolen data did not contain the medical details of women who had received treatment or why individuals had contacted the BPAS," he said.
Wel als je een religieuze idioot bent.quote:Op vrijdag 9 maart 2012 18:33 schreef YazooW het volgende:
[..]
Wat een mafkees, dat soort gegevens ga je toch niet naar buiten brengen
26.000 pogingen om te hacken? Of hebben we het over een DDOS-aanval?quote:
quote:Google's browser binnen 5 minuten gehackt, binnen 24 uur weer gedicht
De afgelopen jaren wist Chrome, de internetbrowser van Google, de hackerswedstrijd Pwn2Own telkens ongeschonden te overleven. Maar dit jaar lukte het een Frans team al binnen 5 minuten om een lek te vinden. En ook in een andere wedstrijd, Pwnium, werd de browser gekraakt. Dat Google een flink geldbedrag had beloofd voor de vinders van een lek, heeft dat waarschijnlijk bespoedigd.
Een Frans team toonde gisteren op Pwn2Own in Vancouver aan hoe de beveiliging van Chrome te omzeilen is. Het is de eerste keer dat Chrome bij deze wedstrijd niet ongeschonden uit de strijd komt. De hackers kregen drie dagen de tijd om het systeem te kraken, maar de Fransen hadden slechts 5 minuten nodig om dit voor elkaar te krijgen. Hun methode willen ze niet vrijgeven.
Pwnium
Op dezelfde dag organiseerde Google haar eigen hackerswedstrijd: Pwnium. En ook daar werd de browser gekraakt. Hier mocht een Russische hacker met de eer strijken. Hij mag bovendien 60.000 dollar (ruim 45.000 euro) op zijn rekening bijschrijven. Google looft sinds kort namelijk verschillende bedragen uit voor hackers die hun browser weten te kraken, dat demonstreren en de hack vervolgens vrijgeven. Hoe gevaarlijker het lek, hoe groter het te winnen bedrag.
Ook bijzonder: vandaag, amper 24 uur later, meldt Google dat het lek alweer gedicht is. En dat is snel, als je het vergelijkt met concurrent Microsoft, die veel vaker te kampen heeft met hacks, en waarbij het soms wel maanden duurt voordat een lek is gerepareerd. Gedicht of niet, Google wacht met het vrijgeven van nadere informatie over het lek totdat is onderzocht of ook andere browsers, zoals Apple's Safari, erdoor getroffen zouden kunnen worden.
Bounty hackers
Door hackers te stimuleren om hacks in besturingssystemen en browsers te vinden, hopen grote internetbedrijven eventuele kwetsbaarheden sneller en doelmatiger te kunnen opsporen, en zo uiteindelijk hun gebruikers beter te beschermen. Goedaardige hackers kunnen kwaadaardige hackers zo voor zijn. Facebook maakt al langer gebruik van deze zogenoemde 'bounty hackers' (premiehackers).
quote:Voorafgaand aan de hack hebben de Fransen zes weken nodig gehad om deze te ontdekken.
http://www.techzine.nl/ni(...)tijdens-pwn2own.html
Is dit waar? Is dit belangrijk?twitter:oldschooldsl twitterde op vrijdag 09-03-2012 om 20:21:28#Anonymous successful at obtaining full #Microsoft Windows 7 and #Windows 8 Source Code @Windows reageer retweet
quote:Justitie kijkt illegaal in buitenlandse computers
Bij de opsporing van cybercriminelen schendt de Nederlandse recherche soms de soevereiniteit van andere landen door buitenlandse computers te kraken. Dit is verboden, maar in de opsporing van cybercrime soms onvermijdelijk, stelt Lodewijk van Zwieten, landelijk officier voor cybercrime en interceptie.
De wet schiet volgens hem tekort als het gaat om de online jacht op bijvoorbeeld pedofielen. De digitale wereld is grenzeloos, maar veel wetgeving is aan landsgrenzen gebonden.
'Terwijl wij voor opsporingsonderzoek toestemming moeten vragen aan buitenlandse instanties, zit een cybercrimineel met één druk op de knop aan de andere kant van de wereld', zegt Van Zwieten. Criminelen voeren in toenemende mate anoniem handel via verborgen kanalen op het internet. En bestaande kinderporno gaat niet alleen sneller de wereld rond, maar heeft ook geleid tot een toename van het kindermisbruik, stelt Wilbert Paulissen, hoofd van de Nationale Recherche.
Tijdens het onderzoek naar de contacten van Robert M., die maandag terechtstaat wegens het misbruik van tientallen kinderen, stuitten rechercheurs op verborgen sites vol kinderpornografie.
Ook tijdens het onderzoek naar het Bredolab-netwerk, toen cybercriminelen wereldwijd 30 miljoen computers met een kwaadaardig virus besmetten, kraakte de recherche computers in het buitenland.
Paulissen pleit voor meer specifieke, juridische kaders voor online opsporing. Het moet wetgeving zijn 'die de snelheid van deze ontwikkelingen kan bijhouden, anders zitten we er constant als opsporingsdiensten achteraan te jagen'.
Volgens officier Van Zwieten lopen internationaal alle opsporingsinstanties tegen dezelfde problemen aan en moet iedereen 'met een nieuwe bril naar bestaande regels leren kijken'. Ook voor rechters is cybercrime volgens hem relatief onbekend. 'Zij denken nog wel eens bij een cybercrimineel: dat is een 16-jarig puistenkoppie dat met computers heeft lopen klooien. Maar die puistenkop verdient soms veel meer dan de topman van een nationale bank.'
twitter:DiabloAnon twitterde op zaterdag 10-03-2012 om 07:17:32@CrazyLittleOwl A user of the account @LuLzWarfare was killed protesting in Egypt a month or so ago sadly reageer retweet
quote:Websites attacked by Anonymous #March list
Third list of websites attacked by Anonymous. The list has both hacked and DDoSed websites. The list gets updated daily so stay tuned.
Dat deed/doet HBGary ook, of bedrijven waar ze mee samenwerkten.quote:Op zaterdag 10 maart 2012 11:47 schreef heggeschaarbarbaar het volgende:
Over Pwn2Own: Hackwedstrijden zijn een goed initiatief, maar het genoemde Franse 'team' is commercieel bedrijf genaamd Vupen. Dit bedrijf maakt niet alle hacks openbaar, maar verkoopt de informatie over de werking van de hacks aan geïnteresseerden (overheden, criminelen, ...). Echt veiliger ga ik me daar niet door voelen!
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |