Anonymous en Occupy Wall Str.:quote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:From a single hashtag, a protest circled the world
(Reuters) - It all started innocuously enough with a July 13 blog post urging people to #OccupyWallStreet, as though such a thing (Twitter hashtag and all) were possible.
quote:Gabriella Coleman Assistant Professor of Media, Culture, and Communication
Trained as an anthropologist, Gabriella (Biella) Coleman examines the ethics of online collaboration/institutions as well as the role of the law and digital media in sustaining various forms of political activism. Between 2001-2003 she conducted ethnographic research on computer hackers primarily in San Francisco, the Netherlands, as well as those hackers who work on the largest free software project, Debian. Her first book, "Coding Freedom: The Aesthetics and the Ethics of Hacking" is forthcoming with Princeton University Press and she is currently working on a new book on Anonymous and digital activism. She is the recipient of numerous grants, fellowships, and awards, including ones from the National Science Foundation, the Woodrow Wilson Foundation, the Ford Foundation, the Social Science Research Council and the Institute for Advanced Study.
quote:
quote:Our Weirdness Is Free
The logic of Anonymous—online army, agent of chaos, and seeker of justice.
by Gabriella Coleman, [01.13.2012]
TIMELINE: The Evolution Of The 'Anonymous' Internet Hacktivist Groupquote:Anonymous And The War Over The Internet
This article is the first in a two-part series tracing the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
The Huffington Post, Saki Knafo. Posted: 1/30/12 12:20 PM ET | Updated: 2/1/12 07:36 PM ET
quote:Anonymous 'hactivist' goes public on cyber protests
Peter Fein is a self-described "hacktivist" and member of the international hacker group Anonymous.
This loose collection of hackers has gained notoriety by aiming DDoS (distributed denial of service) attacks on government and corporate websites since 2010. The targets have ranged from the US Department of Justice to Sony and Visa.
As befits the name Anonymous, most members have chosen to keep their identities secret - especially after dozens of alleged hackers were arrested in a series of government crackdowns in the US and Europe.
Mr Fein, however, has decided to go public about his involvement. He insists he is not involved in anything illegal, claiming that he simply helps bring together activists who want to battle government surveillance and attempts to police the internet.
The activist from Chicago is also involved with another hacker group called Telecomix - an international network of people providing internet access to pro-democracy protesters in countries such as Egypt, Libya and Syria.
Mr Fein says he is not a spokesman for either group and that Telecomix's achievements are the result of countless hours of work from hundreds of members.
In an exclusive interview with the BBC's Matt Danzico he explains what he believes Anonymous is trying to achieve - and why he decided to go public.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Firefox security bug Tor Browser Bundle
A user has discovered a severe security bug in Firefox related to websockets bypassing the SOCKS proxy DNS configuration. This means when connecting to a websocket service, your Firefox will query your local DNS resolver, rather than only communicating through its proxy (Tor) as it is configured to do. This bug is present in current Tor Browser Bundles (2.2.35-9 on Windows; 2.2.35-10 on MacOS and Linux).
To fix this dns leak/security hole, follow these steps:
Type “about:config” (without the quotes) into the Firefox URL bar. Press Enter.
Type “websocket” (again, without the quotes) into the search bar that appears below "about:config".
Double-click on “network.websocket.enabled”. That line should now show “false” in the ‘Value’ column.
See Tor bug 5741 for more details. We are currently working on new bundles with a better fix.
quote:
quote:"We hebben recent gezien dat duizenden mensen bereid zijn te protesteren tegen regels waarvan ze denken dat die de openheid en innovatie van het internet beperken. Dit is een sterkte nieuwe politieke stem. En die strijd voor openheid verwelkom ik, zelfs al ben ik het niet eens met alles wat er over dit onderwerp gezegd wordt. () Waarschijnlijk zal de wereld het nu zonder SOPA en ACTA doen. Nu moeten we oplossingen vinden om het internet tot een plek van vrijheid, openheid en innovatie te maken voor alle burgers, niet alleen voor de techno avant-garde."
quote:
quote:You've heard of those hacktivists wearing Guy Fawkes masks and taking down Scientology websites and going to cyber-war with PayPal. But with the documentary We Are Legion, you finally learn about the motives and missions at the heart of Anonymous.
In a compelling and insightful documentary, a profile of the powerful Anonymous hacking collective shows a different side of the global force known for battling the Church of Scientology and opponents of WikiLeaks. Some may see Anonymous members as skilled but criminal hackers living in their parents' basements, but We Are Legion: The Story of the Hacktivists peels back the curtain to reveal a more human story: these are angry and passionate coders taking to their virtual street corner to protest for free speech and Internet freedom.
Brian Knappenberger's 90-minute film, debuting at Toronto's Hot Docs Film Festival, traces the history of hacktivism and online forums, telling us in great detail how pulling pranks online has long been a steadfast tradition that eventually evolved into a more serious form of dissidence. Born out of the 4chan community, Anonymous members first started trying to silence Neo-Nazi radio hosts and Church of Scientology groups. The latter fight gave Anonymous worldwide attention, partially thanks to their real-life protests at almost every Scientology building across the world. This was the hacker getting into the sunlight to finally meet colleagues they've known online for years.
A parade of experts and insiders layer the doc with insight into what motivates Anonymous hackers to go toe-to-toe with the likes of Mastercard or the Australian government: they want to combat Net censorship. Getting Anonymous members to discuss why they do what they do was a real coup for the filmmakers, because these hackers don't often speak so freely to media.
We learn a lot about their core beliefs: They believe in the right to spread information freely (WikiLeaks) and they help other groups spread the word about their own protests (Occupy Wall Street). They oppose governments such as Egypt who bar citizens from accessing the Web. But their hacking work comes with a price, We Are Legion tells us: 14 Anonymous members have been arrested for their alleged crimes, which include lobbing massive DDoS attacks against websites for Scientology, PayPal, MasterCard and more.
The film leaves us with an important question: As more protests are being organized and carried out online, should governments grant these netizens the right to conduct virtual sit-ins? If Occupy protesters can legally block a city intersection, why can't Anonymous members do the same online, shutting down the traffic of their targeted sites?
Whatever you think about hackers fighting for their voices to heard, We Are Legion is a newsworthy film documenting the Internet's first army, who will continue to be relevant in our wired world.
Read more: http://www.digitaljournal.com/article/324105#ixzz1tv3o5RFE
Het artikel gaat verder.quote:FBI: We need wiretap-ready Web sites - now
CNET learns the FBI is quietly pushing its plan to force surveillance backdoors on social networks, VoIP, and Web e-mail providers, and that the bureau is asking Internet companies not to oppose a law making those backdoors mandatory.
The FBI is asking Internet companies not to oppose a controversial proposal that would require firms, including Microsoft, Facebook, Yahoo, and Google, to build in backdoors for government surveillance.
In meetings with industry representatives, the White House, and U.S. senators, senior FBI officials argue the dramatic shift in communication from the telephone system to the Internet has made it far more difficult for agents to wiretap Americans suspected of illegal activities, CNET has learned.
The FBI general counsel's office has drafted a proposed law that the bureau claims is the best solution: requiring that social-networking Web sites and providers of VoIP, instant messaging, and Web e-mail alter their code to ensure their products are wiretap-friendly.
"If you create a service, product, or app that allows a user to communicate, you get the privilege of adding that extra coding," an industry representative who has reviewed the FBI's draft legislation told CNET. The requirements apply only if a threshold of a certain number of users is exceeded, according to a second industry representative briefed on it.
The FBI's proposal would amend a 1994 law, called the Communications Assistance for Law Enforcement Act, or CALEA, that currently applies only to telecommunications providers, not Web companies. The Federal Communications Commission extended CALEA in 2004 to apply to broadband networks.
quote:
quote:Major General Jonathan Shaw says 'it was a surprise to people quite how vulnerable we are'
quote:Computer hackers have managed to breach some of the top secret systems within the Ministry of Defence, the military's head of cyber-security has revealed.
Major General Jonathan Shaw told the Guardian the number of successful attacks was hard to quantify but they had added urgency to efforts to beef up protection around the MoD's networks.
"The number of serious incidents is quite small, but it is there," he said. "And those are the ones we know about. The likelihood is there are problems in there we don't know about."
Government computer systems come under daily attack, but though Shaw would not say how or by whom, this is the first admission that the MoD's own systems have been breached.
The Serious Organised Crime Agency, took its website offline on Wednesday night after becoming the target of a cyber-attack. A spokesman said the attack did not pose a security risk to the organisation.
Shaw, a veteran of the Falklands and Iraq wars, also said the MoD had to be prepared to embrace unconventional and "wacky" ideas if the military wanted to catch up with, and then stay ahead of, rivals in the cybersphere. Getting "kids on the street" to help the military was vital, he said.
"My generation … we are far too old for this; it is not what we have grown up with. Our natural recourse is to reach for a pen and paper. And although we can set up structures, we really need to be on listening mode for this one."
He added: "If we want to work the response, if we want to know really what is happening, we really have to listen to the young kids out in the street. They are telling us what is happening out there.
"That will pose a real challenge to us. This thing is moving too fast. The only people who spot what is happening are people at the coal face and that is the young kids. We have to listen to them and they have to talk to us."
A former director of UK special forces, Shaw, 54, said he thought the military could learn a trick or two from firms such as Facebook.
The company has a "white hat" programme in which hackers are paid rewards for informing them when they have found a security vulnerability.
Nine people in the UK have been paid a total of $11,000 (£6,785) for working with Facebook. Shaw said this was the kind of "waacky idea we need to bring in".
Shaw has spent the last year reviewing the MoD's approach to cyber-security, and the kind of cyber-capability the military will need in the future.
He says next year's MoD budget is expected to include new money for cyber-defence – an acknowledgment that even during a time of redundancies and squeezed budgets, this is now a priority.
The general said the MoD wasn't "doing badly … but we could do a hell of a lot better. We will get there, but we will have to do it fast. I think it was a surprise to people this year quite how vulnerable we are, which is why the measures have survived so long in the [budget] because people have become aware of the vulnerabilities and are taking them seriously."
China and Russia have been accused of being behind most of the sophisticated cyber-attacks, with state-sponsored hackers targeting military secrets from western governments, or intellectual property from British and American defence firms.
Shaw refused to point the finger at any nation, but admitted the UK was "trying to engage the Chinese on rules of the road in cyberspace", pressing the argument that new international treaties are not necessary to stop this kind of theft and espionage.
Shaw said the number of attacks was "still on an upward curve … and the pace of change is unrelenting".
In his last interview before retiring, Shaw said the UK had to develop an array of its own cyber-weapons because it was impossible to create entirely secure computer systems.
"It is quite right to say that pure defence, building firewalls, will not keep the enemy out. They might be inside already … there is no such thing as total security. You have to learn to live with certain insecurities.
"One needs to engage in internal defence and be quite aggressive about it. And if you are going to manoeuvre in cyberspace, that is something that obviously involves action across the spectrum."
Shaw said he intended to "mainstream" cyber-capabilities across the MoD by 2015. This included ensuring military commanders had a range of cyber-options to use from a "golf bag" of weapons systems.
But he thought cyber-weapons would complement rather than replace more conventional weapons.
"As new capabilities come on the block, you reassess whether you need the old ones, whether they are complimentary or duplicatory.
"People have asked me whether cyber-weapons will make conventional weapons redundant. Absolutely not. A hard bomb is actually quite a good cyber-weapon because it can take out a broadcasting station, take out a server."
The military top brass, he said, had been the "hardest to convince" about the cyber-threat, because high-ranking officers tend to be set in their ways. "We are the wrong guys to deal with this."
Shaw said it still surprised him that the MoD's headquarters in Whitehall "is the only building, main defence security establishment, where you don't leave your mobile phones and Ipad in a box outside your office … people's personal behaviours are not good enough. When we look at cyber-security in the MoD, we are looking at preserving intellectual property and our networks and stopping people spying on us.
"The real challenge is how we secure our supply chains. We are dependent on industry for our technological edge … and preserving that intellectual property is absolutely vital."
He added: "Cyber implies something technical. To the average person in the street, cyber means it is someone else's problem. But it is everyone's problem. We can't just leave it to the techies."
An MoD spokesman said: "The MoD takes all possible precautions to defend our system from attack from both unsolicited, for example 'spam' email, and targeted sources. It would be both misleading and naïve to assume that any system is 100% secure against all possible threats which is why we take additional steps to detect suspicious activity within our own systems.
"We also ensure that our most sensitive networks are not connected to the internet and have additional physical and technical measures in place to defend them."
quote:
quote:Members of the online hacktivist collective known as "Anonymous," are targeting Activision CEO Eric Hirshberg after the trailer for upcoming videogame "Call of Duty: Black Ops 2" implied that Anonymous hackers would be the game's enemy. Members of Anonymous have already found Hirshberg's personal information and published it online on text-sharing website AnonPaste.
The message begins by accusing Activision of opening itself up to attack from Anonymous: "So Activision Why you done goofed? We are not the enemy but, well you want it you got it. Eric Hirshberg DOX. #OpPirateAllActivision."
quote:A number of Anonymous members worried that the trailer and the upcoming game may be part of a larger smear campaign launched by the US government to portray Anonymous as a nefarious organization and a threat to the American people.
quote:
quote:Hacktivist members of the online collective called "Anonymous" targeted the websites of the United Kingdom Supreme Court and the CIA on Friday, responding to efforts by both governments to stifle internet freedom. Anonymous has named its new campaign to fight online censorship "Operation The Pirate Bay" (TPR) and "Operation Trial At Home."
On Friday afternoon both websites were knocked offline and inaccessible to the public, most likely with a DDoS attack. The cyber-attack comes just days after the British high court ruled that Internet service providers must block all access to The Pirate Bay, a popular file sharing website. Since the ban, traffic to the Pirate Bay has in fact increased by 12 million, while the website has defied the UK ban and offered users tips on how to get around the block.
In a video released by Anonymous promoting Operation TPR, an electronically voiced narrator equates the UK government's attempts to block The Pirate Bay to the US government's attack on Megaupload.com and the file-sharing website's founder Kim Dotcom.
The minute-long video ends with a play on Anonymous' typical send-off: "We do not forgive censorship. We do not forget the corrupted ways of our government."
This online skirmish between Anonymous and the US and UK governments comes in the midst of a much larger battle over the fate of internet privacy, While the controversial CICSPA bill, which would allow the government to monitor everyone's internet, is making its way through congress.
Meanwhile, according to Al Jazeera, an equally controversial plan promoted by British Prime Minister David Cameron, would allow his government to monitor every single text message and phone call made in the country. Internet providers would also be forced to install software allowing law enforcement to access every internet user's IP address, email address books, when and to whom every email is sent in real time. The bill would also force social media sites and other online services to comply with any and all date requests.
Anonymous members coordinated their attacks on Friday through Twitter, using specific hastags to organize their posts.
quote:
quote:When the Internet was created, decades ago, one thing was inevitable: the war today over how (or whether) to control it, and who should have that power. Battle lines have been drawn between repressive regimes and Western democracies, corporations and customers, hackers and law enforcement. Looking toward a year-end negotiation in Dubai, where 193 nations will gather to revise a U.N. treaty concerning the Internet, Michael Joseph Gross lays out the stakes in a conflict that could split the virtual world as we know it.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:
Interview op de site.quote:At long last, the great online music war – between record labels and copyright-holders on one side, and proponents of ‘free’ on the other – might just be hurtling towards some kind of endgame. This week, the High Court ordered internet service providers to block access to file-sharing site The Pirate Bay. Grooveshark’s days of cheerful copyright infringement appear to be numbered. In America, the legal case against Megaupload gathers pace.
Can legislation ever stamp out music piracy completely? Of course not. But dont be fooled by open web evangelists like this guy who claim its pointless to even try to tackle file-sharing. Forget the ISPs. If it wanted to, Google could cut the flow of traffic to the most high-profile offenders in a shot. They do it with editorial sites all the time, tweaking the pagerank levers, dispensing punishment or reward. Such a measure wouldnt eliminate piracy. But it would reduce it dramatically.
Google spent $5m lobbying the US government in 2011. Its in their commercial interest to bang the drum for free, because they can sell ads next to all those millions of searches for pirated MP3s. Just dont expect them to channel any of those profits back into content creation. Ditto Apple. Ditto Spotify, whose CEO is now supposedly worth £190m. In the tech world, money flows into the pockets of investors and shareholders, not musicians.
Indeed its one of the great puzzles of the digital age that gigantic technology companies have generally been portrayed as the good guys, on the side of the consumer, while record companies are regarded as greedy and rapacious. Labels invest huge amounts in A&R, taking gambles on new acts, often at ruinous expense. iTunes drove almost £1bn in revenue last year. Will Apple ever sign a new artist? Dont hold your breath.
So the battle rages on. The latest entrant into the melee is Anontune, a new and mysterious music site, basically the anti-Spotify, in that it draws music from a number of different sources on the web. It is nominally associated with the Anonymous movement. Anonymous is a loose affiliation of hacktivists, best known for initiating Operation Payback, a string of cyber-attacks on organisations that have publicly condemned music piracy, from Universal Music to RIAA.
Billing itself as a new and open social music platform, at first glance Anontune would appear to be the ultimate expression of freetard logic. Its mission statement is full of Up yours, The Man!-type bluster, intoned in a spooky-wooky, bad-guy-from-Saw voice: It has come to our attention that the state of online music has been sabotaged by the fat hands of corporate involvement.
NME Blogs - NME Blogs - NME Blogs
Inside Anontune - The Hacktivists' Answer To Spotify
By Luke Lewis
Posted on 04/05/12 at 07:00:55 pm
At long last, the great online music war between record labels and copyright-holders on one side, and proponents of free on the other might just be hurtling towards some kind of endgame. This week, the High Court ordered internet service providers to block access to file-sharing site The Pirate Bay. Groovesharks days of cheerful copyright infringement appear to be numbered. In America, the legal case against Megaupload gathers pace.
Can legislation ever stamp out music piracy completely? Of course not. But dont be fooled by open web evangelists like this guy who claim its pointless to even try to tackle file-sharing. Forget the ISPs. If it wanted to, Google could cut the flow of traffic to the most high-profile offenders in a shot. They do it with editorial sites all the time, tweaking the pagerank levers, dispensing punishment or reward. Such a measure wouldnt eliminate piracy. But it would reduce it dramatically.
Google spent $5m lobbying the US government in 2011. Its in their commercial interest to bang the drum for free, because they can sell ads next to all those millions of searches for pirated MP3s. Just dont expect them to channel any of those profits back into content creation. Ditto Apple. Ditto Spotify, whose CEO is now supposedly worth £190m. In the tech world, money flows into the pockets of investors and shareholders, not musicians.
Indeed its one of the great puzzles of the digital age that gigantic technology companies have generally been portrayed as the good guys, on the side of the consumer, while record companies are regarded as greedy and rapacious. Labels invest huge amounts in A&R, taking gambles on new acts, often at ruinous expense. iTunes drove almost £1bn in revenue last year. Will Apple ever sign a new artist? Dont hold your breath.
So the battle rages on. The latest entrant into the melee is Anontune, a new and mysterious music site, basically the anti-Spotify, in that it draws music from a number of different sources on the web. It is nominally associated with the Anonymous movement. Anonymous is a loose affiliation of hacktivists, best known for initiating Operation Payback, a string of cyber-attacks on organisations that have publicly condemned music piracy, from Universal Music to RIAA.
Billing itself as a new and open social music platform, at first glance Anontune would appear to be the ultimate expression of freetard logic. Its mission statement is full of Up yours, The Man!-type bluster, intoned in a spooky-wooky, bad-guy-from-Saw voice: It has come to our attention that the state of online music has been sabotaged by the fat hands of corporate involvement.
That kind of thing. I wanted to talk to the shadowy folk behind Anontune, to find out if they really thought the artistic world would be a better place without any copyright laws in place to ensure creative people get paid for their work. However, the answers I got surprised me. In this debate, reducing things to an emotionally charged dichotomy freetards in one corner, major label fatcats in the other helps nobody. And Anontunes aims are more reasoned and nuanced than you might think.
quote:
quote:There were vows, a kiss, and a crowd full of supportive friends. But there was very little else normal about the first couple married as part of Sweden's information and file-sharing religion.
Believers of Kopimism, which became an officially-recognized religion in Sweden earlier this year, think information sharing is a vital part of human existence—regardless of law. With more than 6,000 followers and branches in 18 countries, including the United States, perhaps a Kopimist wedding was inevitable.
[Learn More About the Tenets of Kopimism]
The couple—a Romanian woman and an Italian man—were married late last month at Belgrade's SHARE conference, a three day festival celebrating new Internet and media developments.
The presiding priest, or Kopimistic "Op" wore a Guy Fawkes mask as a computer read vows and some of Kopimism's central beliefs aloud.
"We are here to announce a new pair of noble peers. Copying of information is simply right. Dissemination of information is ethically right. Copying and remixing information communicated by another person is seen as an act of respect," it said. "Do you want to share your love, your knowledge, and your feelings with [the bride] as long as that information exists?"
The couple kissed and it became official under the Kopimist religion. In a statement on its official website, Isak Gerson, the 20-year-old founder of Kopimism, wrote that a Kopimist wedding was "unavoidable."
"Hopefully, they will copy and remix some DNA-cells and create a new human being," he wrote. "That is the spirit of Kopimism. Feel the love and share that information. Copy all of its holiness."
quote:
quote:De Eerste Kamer heeft vandaag de nieuwe Telecomwet aangenomen. Daarin is ondermeer netneutraliteit geregeld: providers mogen websites of diensten niet meer blokkeren of belemmeren. Daarnaast steunt de Kamer een wet die betere bescherming tegen cookies biedt.
Dat bleek vanavond na een lang debat over de Telecomwet. Een meerderheid van VVD, PvdA, CDA en D66 stemde voor de wet. Vorig jaar stemde de Tweede Kamer al in meerderheid voor de wet, maar de Eerste Kamer moest zich er nog over buigen.
Netneutraliteit
De discussie over netneutraliteit draait om de vraag of providers specifieke vormen van internetverkeer met voorrang mogen behandelen, en andere mogen wegfilteren. De christelijke partijen vinden dat filtering op ideologische gronden bij uitzondering mogelijk zou moeten zijn. Minister Maxime Verhagen zegde toe een nieuw wetsvoorstel in te dienen waarin een dergelijke mogelijkheid is opgenomen.
Na Chili is Nederland nu het tweede land ter wereld dat netneutraliteit wettelijk heeft vastgelegd. In Nederland laaide de discussie over netneutraliteit vorig jaar op, nadat provider KPN had laten weten geld te willen gaan vragen voor het gebruik van WhatsApp, een internetdienst waarmee gebruikers gratis kunnen sms'en. Met de nieuwe Telecomwet kan KPN dat niet meer doen.
Cookies
In de nieuwe Telecomwet is ook vastgelegd dat de privacy van internetters beter beschermd moet worden als het gaat om cookies. Dat zijn bundeltjes van gegevens over de gebruiker - zoals bijvoorbeeld het surfgedrag - die zonder dat de gebruiker het merkt worden verstuurd. Ze kunnen worden gebruikt om bijvoorbeeld wachtwoorden te onthouden, maar ook om de gebruikers gerichte advertenties voor te schotelen.
Dank je wel en graag gedaan.quote:Op dinsdag 8 mei 2012 01:36 schreef PKRChamp het volgende:
Even een veer in Papierversnipperaar zijn kont steken, goed bezig pik!
quote:Op dinsdag 8 mei 2012 01:36 schreef PKRChamp het volgende:
Even een veer in Papierversnipperaar zijn kont steken, goed bezig pik!
quote:
quote:Some hackers aim to free the flow of information, while others aim to stifle it. The Pirate Bay has taken a moment to remind the hacker group Anonymous of the difference.
Anonymous has been launching a series of distributed denial of service attacks that took down the website of Virgin Media Wednesday following a court order that British internet service providers like Virgin must block access to the PirateBay.org, one of the world’s most popular source of pirated downloads.
The Pirate Bay, unexpectedly, spoke out Wednesday afternoon against the Anonymous attacks on its behalf. “We’d like to be clear about our view on this: We do NOT encourage these actions,” the Pirate Bay’s administrators wrote on its Facebook page. “We believe in the open and free internets, where anyone can express their views. Even if we strongly disagree with them and even if they hate us. So don’t fight them using their ugly methods. DDOS and blocks are both forms of censorship.”
Since the order to block the Pirate Bay was announced, the site has been organizing a campaign of proxy servers it called “The Hydra Bay,” linking on its home page to instructions of how to create a proxy for the site that circumvents the British carriers’ block.
The Pirate Bay’s advice to Anonymous suggested they join that proxy effort or try something else more proactive, like supporting the artists who now advertise with the Pirate Bay under its “Promo Bay” project. ”If you want to help; start a tracker, arrange a manifestation, join or start a pirate party, teach your friends the art of bittorrent, set up a proxy, write your political representatives, develop a new p2p protocol, print some pro piracy posters and decorate your town with, support our promo bay artists or just be a nice person and give your mom a call to tell her you love her.”
One sub-group of Anonymous known as the People’s Liberation Front also attacked the branch of Anonymous attacking British ISPs, writing on that “We strongly condemn the attack on Virgin and UK ISPs as it violates the 2nd principle of Anonymous to NEVER attack infrastructure.”
A Twitter feed called Anonymous UK, which has been touting the attacks against Virgin and others, responded “Anonymous… Principles? What?”
“Virgin Media aren’t ideal targets, I agree,” the same feed wrote earlier in the day. “But I’m not the leader of Anonymous. Cry more.”
The Pirate Bay’s stance against Anonymous contrasts with that of WikiLeaks early last year, when Anonymous launched a series of website takedowns against Visa, Mastercard, Paypal, Amazon and others for their payment embargo against WikiLeaks and other actions in opposition to the secret-spilling group. “We neither condemn nor applaud these attacks,” spokesperson Kristinn Hrafnsson wrote at the time. “We believe they are a reflection of public opinion on the actions of the targets.”
quote:
quote:The battle over Occupy Wall Street protester Malcolm Harris's tweets is still going, but now he has Twitter on his side. Harris, who was arrested with hundreds of others on the Brooklyn Bridge last year, was told in April that he could not block a subpoena for his since-deleted messages, which prosecutors say show he was "well aware of the police instructions, and acted with the intent of obstructing traffic on the bridge," because they belong to the company. But Twitter is maintaining that Harris actually owns his content, so they should not be forced to turn it over. "Yesterday we filed a motion in NYC to defend a user's voice," Twitter's legal counsel tweeted yesterday. And so Big Brother must be trained to jump some hurdles, at least.
quote:
quote:Whether viewed as heroes or villains, much of what is stated about Anonymous is exaggeration.
quote:Gabriella Coleman is the Wolfe Chair in Scientific and Technological Literacy in the Department of Art History & Communication Studies at McGill University.
quote:While government officials and law enforcement are painting Anonymous as one of HL Mencken's "imaginary goblins" poised to menace the public, it's worth noting that national governments around the world have aspired to control the internet, and have been developing statutes that erode individual rights and privacies, long before this entity came to prominence. Anonymous is more a reaction to these trends than a cause. The brutal, depressing and dire fact of the matter is that an expansive surveillance state is not here to come but is already in our midst. The surveillance state is so well entrenched that if Anonymous were to vanish tomorrow, or never had happened in the first place, it is doubtful that the trajectory of the expansion of the surveillance state would be deterred. It seems misplaced, even disingenuous, at this juncture, to blame Anonymous' actions for increasing the rate at which governments and security companies seek to control the internet, private data, and online freedoms.
quote:Even if spectacle alone is insufficient to engender political change, it is hard to overstate its importance for publicising issues and clarifying political stakes. With Anonymous, it is not simply that their DDoS tactics dramatise specific issues, such as with their campaign in the winter of this year against the Anti-Counterfeiting Trade Agreement. It is that in their totality - as a masked entity bearing the name Anonymous - it relays an urgent message about anonymity to contemplate. Given the contemporary reality of a corporate and state controlled surveillance apparatus, Anonymous stands out, compels, and enchants for a very particular reason: it has provided a small but potent oasis of anonymity in the current expansive desert of surveillance, much like the one quite literally being built in the Utah desert right now by the NSA.
quote:
quote:The Russian branch of hacker group Anonymous is claiming credit for shutting down the websites of the Kremlin and Russian President Vladimir Putin using distributed denial-of-service (DDoS) attacks.
The websites were unavailable on May 9 due to DDoS attacks, according to news reports. In a tweet, the Russian branch of Anonymous proclaimed that the Kremlin’s website, kremlin.ru, was taken down.
Anonymous said in a Pastebin post that the attacks were to protest the inauguration of President Putin following allegations of vote tampering in the presidential elections.
According to RT.com, the Kremlin press service confirmed its websites were attacked by hackers: “We received threats from Anonymous several days ago but we can’t confirm it’s exactly this group that attacked the Kremlin.ru website. At the moment we can’t establish who’s behind the attack. Unfortunately we live at a time when technology security threats have mounted, but we have the means to resist them.”
Commenting on the attacks, Ash Patel, country manager for UK & Ireland for Stonesoft, said that “with a group such as Anonymous, one can never be certain as to who exactly is behind the cyberattack. For some time now, Anonymous has been attacking the sites of many government bodies and for that reason, there’s no denying that one motivation behind the attack on the Kremlin’s websites is political.”
quote:The House That Fox Built: Anonymous, Spectacle and Cycles of Amplification
This article focuses on 4chan’s /b/ board, a—if not the—pillar of online trolling activity. In addition to chronicling the history of the site, as well as the emergence of the nebulous collective known as Anonymous, the article considers the ways in which early media representations of and subsequent reactions to trolling behaviors on /b/ helped create and sustain an increasingly influential subculture. Echoing Stanley Cohen’s analysis of moral panics, the article goes on to postulate that trolls and mainstream media outlets, specifically Fox News, are locked in a cybernetic feedback loop predicted upon spectacle; each camp amplifies and builds upon the other’s reactions, thus entering into an unintended but highly synergistic congress.
quote:
Interview op de site.quote:Christopher Doyon, a.k.a. Commander X, sits atop a hillside in an undisclosed location in Canada, watching a reporter and photographer make their way along a narrow path to join him, away from the prying eyes of law enforcement.
It’s been a few weeks of encrypted emails back and forth, working out the security protocol to follow for interviewing Doyon, one of the brains behind Anonymous, now a fugitive from the FBI.
Doyon, who readily admits taking part in some of the highest-profile hacktivist attacks on websites last year — from Tunisia to Orlando, Sony to PayPal — was arrested in September for a comparatively minor assault on the county website of Santa Cruz, Calif., where he was living, in retaliation for the town forcibly removing a homeless encampment on the courthouse steps.
The “virtual sit-in” lasted half an hour. For that, Doyon is facing 15 years in jail.Or at least he was facing 15 years in jail, until he crossed the border into Canada in February to avoid prosecution, using what he calls the new “underground railroad” and a network of safe houses across the country.
Thanks to his indictment, Doyon is one of the few Anonymous members whose real name is now publicly known.
But as the leader of the People’s Liberation Front — a hacker group allied with Anonymous — and the second-most wanted information activist after WikiLeaks’ Julian Assange, he prefers not to show his face, and instead dons the ubiquitous Guy Fawkes mask, to wear with his Sunday best: a sweatshirt with the Anonymous calling card, “We do not forgive … We do not forget.”
Terrorists to some, heroes to others, the jury is still out on Anonymous’s true nature. Known for its robust defence of Internet freedom – and the right to remain anonymous — Anonymous came in first place in Time Magazine’s 2012 online poll on the most influential person in the world.
Fox News, on the other hand, has branded the hackers “domestic terrorists,” a role Anonymous has been cast to play in the latest Call of Duty Black Ops II, in which Anonymous appears as the enemy who takes control of unmanned drones in the not-too-distant future. (That creative decision may have put Activision, the creator of the video-game series, at the top of the Anonymous hit list.) For its part, much of what Anonymous does and says about itself, in the far reaches of the Internet, cannot be verified. Nor do all Anons agree on who they are as a group, and where they are going.
quote:Na Duits succes verwacht ook Nederlandse piratenpartij politieke doorbraak
De Piratenpartij heeft gisteren zeer goede zaken gedaan met de verkiezingen in Noord-Rijnland-Westfalen. Nu verwacht ook de Nederlandse Piratenpartij dit jaar door te breken in de politiek - wat in 2010 nog mislukte. 'We denken 2 tot 3 zetels te kunnen halen', zegt de woordvoerder van de Nederlandse piratenpartij Dirk Poot.
De piraten hebben het momentum. '2012 is internationaal het jaar dat veel mensen zich realiseren hoe belangrijk internetvrijheid is. Dat zag je met de Amerikaanse opstand tegen de strenge internetwetgeving onder de noemer SOPA en in Europa tegen ACTA. Als dit soort wetten nu niet worden tegengegaan, is het echt te laat en wordt internet een gesloten bastion.'
In Duitsland leefde dit sentiment en de Duitse piratenpartij bestormde de politiek. In Noord-Rijnland-Westfalen, de grootste deelstaat en de deelstaat met de meeste inwoners van Duitsland, won de partij 7 procent van de stemmen. Ook in andere landen, waaronder Oostenrijk, Tsjechië en Zweden hebben partijen van de piratenbeweging afgelopen tijd voet aan de grond gekregen in het politieke landschap.
De beweging van Piraten ontstond in Zweden, naar aanleiding van de sluiting van de downloadsite The Pirate Bay. Vijf jaar later is de kwestie nog steeds actueel: in Nederland oordeelde de rechter dat na Ziggo en XS4ALL ook UPC, KPN, T-Mobile en Tele2 de populaire maar omstreden downloadsite moeten blokkeren. Volgens de Piratenpartij schendt dit de internetvrijheid.
Kroegmeetings
De Piratenpartij gaat de komende maanden met kroegmeetings hun verkiezingsprogramma aan de man brengen. Een uitgebreid program is dit niet, en de versie voor 2012 is ook nog niet klaar, maar het komt erop neer dat de partij internetvrijheid wil garanderen en een verbod op downloaden tegen wil gaan. Ook wil de partij privacy op internet waarborgen. Volgens Poot zit er tevens een groot gat in de vorige week aangenomen netneutraliteitswet, die de partij, mits verkozen, zal proberen te dichten.
Twee jaar geleden was de kritiek nog dat de partij geen visie over andere problemen had. Dit jaar proberen ze hier naar Duits voorbeeld verandering in te brengen. Over hypotheekrenteaftrek en andere politieke kwesties zal de partij werken met een systeem van permanente ledeninspraak. Poot: 'Zo kunnen we ons partijprogramma aanpassen op de huidige situatie. Een in cement gegoten verkiezingsprogramma is vaak na een jaar alweer achterhaald.'
Of Nederland net als Duitsland klaar is voor een Piratenpartij, dat moeten de verkiezingen op 12 september uitwijzen.
quote:
quote:A hacker known for attacking jihadist websites, wikileaks, and feuding with various anonymous groups and individuals, appears to have had his real life identity compromised. There have been several previous attempts by numerous individuals, but it appears that one man does indeed know @th3j35t3r's identity.
@th3j35t3r, 'The Jester' in 'leet' hacker speak, was contacted on Twitter by another account named Smedley Manning (@cubespherical) who publicly tweeted that Jester should read the DM (direct message in Tweet speak) he sent or that he would live to regret it. Early this morning, a series of screenshots appeared to show the contents of the DMs that followed.
If this is genuine, the Jester knows he's been doxed as @cubespherical DMed Jester his real name (redacted in the screenshot), former Army assignment (partially redacted in the screenshot) which appears to be the 75th Ranger Regiment, and the type of vehicle Jester owned in 2003 (and, apparently, still owns - it a Chevy Silverado if you're curious). @cubespherical then told him that, as his name suggested, he was a Wikileaks supporter and that, some years ago, he knew Jester personally... and did not like him. They had had a previous run-in of some sort that had left a bad taste in @cubespherical's mouth. Jester, realizing he had been d0x'd (hacker speak for having your cover blown), asked what they could work out only to be informed that @cubespherical was going to post his real ID, resume, and other information, but not before raising a large donation for Wikileaks and himself. A recent tweet from @cubespherical reads "Jesters ( @th3j35t3r ) full creds as soon as BTC here:15JDgkwFVXvuxCt66eUQ434ty3jrvwPfGe hits 100K -". BTC refers to Bitcoin, an online currency in an amount equivalent to $100,000 (approx. 20,000 Bitcoin).
A source that has been in contact with @cubespherical states that he will donate 51% ($51,000) to Wikileaks and then disappear. This is deeply ironic as Jester has loudly criticized Wikileaks and claimed credit for a DDoS attack on Wikileak's site which drew the ire of some anons.
@cubespherical gave the source a small preview of who Jester is. Jester is, as he had himself previously claimed, former military. He was at Fort Benning in 2002 and, at some point in 2003, transferred to Fort Brag. He was known to disappear from time to to for 2 or 3 week periods. He left people guessing as to to where he'd been and what he'd done. He got a gig with SOCOM (Special Operations Command) and, according to Jester's own limited biography, he spent some time in Afghanistan. Currently, he works an a consultant in the information security industry. He has very recently deleted his real Facebook account. And he may be someone to take seriously. @cubespherical has indicated that he will use his 49% to "hide".
Jester has admitted to committing crimes but there's not yet any word on what charges could/would be brought against him. Jester has recently been a subject of controversy in the hacker scene as it has been alleged he has taken credit for attacks that never happened or for attacks that others have done. He also claimed to have launched an attack on a large numbers of iphones who snapped a photo of a new avatar he placed on his Twitter account. It was a QR Code that Jester claimed executed a multi layered attack. One of the people he targeted was a Rhode Island State Representative named Dan Gordon (R), a vocal supporter of the anonymous movement and Occupy Wall Street and a strong opponent of both SOPA and CIPSA. He ran afoul of Jester and, according to Jester, had his phone contacts, text messages, and emails sent to Jester's own server. He also engaged in a Twitter flamewar with Lulzsec that resulted in the CIA's website being crippled by a DDoS attack.
The @J35t3r account has been uncharacteristically quiet. His last tweet, dated May 10, reads "@cubespherical ummm dude. DM pls." I've been informed that there has been no further communication between the two since the last direct message shown here.
As for @cubespherical, he'll be tweeting updates on the donations total until the goal is reached and @th3j35t3r's true identity is revealed. There's been no word on how @cubespherical was able to idenitify Jester but he did have these final words, "I feel Wikileaks is advancing everyone to more open government, which ultimately cannnot be bad. Bradley needs to be released. #freebrad"
One of Jester's favorite phrases, when taunting anons that are being hunted by law enforcement, is "Tick Tock". But it appears that today, it's Jester who the clock is bearing down on.
UPDATES:
Update 1 05/14 9:30 a.m.: Jester is erasing posts on his blog: http://th3j35t3r.wordpress.com/
Update 2 05/14 3:12 p.m.: Jester has erased all Tweets from his Twitter account.
Update 2 05/14 3:24 p.m.: Jester has deleted his entire Twitter account.
Update 3 05/14 3:40 p.m.: @cubespherical has revealed to a source how he was able to uncover the Jester's identity.
Did he forget to remove exif (hidden datat embedded in a file) data from a photo he posted? Was he back-traced in an IRC chat? Was he tricked into downloading an exploit of some sort? These are the questions going through the minds of individuals familiar with the hacker scene.
According to @cubespherical, the explanation is, incredibly, low tech. Recently, @cubespherical bumped into a mutual acquaintance of @th3j35t3r's real life identity. When his name was brought up in conversation, the third party slipped up and linked this identity to Jester. Using this information, @cubespherical confronted Jester online with his real identity. This can be seen here.
There are many people in the hacker scene who feel that @cubespherical may himself be Jester and this may be an elaborate ruse to get his enemies to send him money (and will use a portion of the proceeds to donate to his charity of choice: The Wounded Warrior Project). Such conspiracy theories are common in the hacker game as elaborate ruses are common in Ops (operations - hacker planned and executed actions).
Others believe it to be genuine as, at this point, @th3j35ter has completely deleted his Twitter account which had tens of thousands of followers. Since @th3j35ter has revealed himself to have quite an ego, there are many who doubt he would go to these lengths for an operation with no goal other than raising money.
Update 4 05/14 3:56 p.m. A source has revealed that @cubespherical has stated he is a mercenary that works in PMAs (Personal Military Army). @cubespherical has indicated that the key for Jester to uncover HIS identity lays in his Twitter handle. He has also stated that, "I have the memory of an elephant." It seems one of those memories includes an incident, years prior, when Jester crossed @cubespherical. When asked if he wants Jester to know who he is he replied, "Payback wouldn't be the same without it."
Update 5 05/14 4:35 p.m. @cubespherical has revealed Jester's initials, R.D.C.
Update 6 05/15 1:46 a.m. A photo that was said to be from @th3j35t3r's true identity's Facebook has been found online. A reverse image lookup returns an image here shows the same photo. The used-car lot is 2.5 hours from Fort Brag, the place of the alleged incident that caused ill feelings. The photo was taken by the dealership in the dealer's lot. Some have have concluded this proves it's all a ruse led by @th3j35t3r and some compatriots. If it IS a ruse, what does @th3j35t3r plan to do with any money he raises? Conspiracies have been flying around the Twittersphere all day.
The website turned up another detail, the trucks VIN (vehicle identification number). The truck is listed as SOLD and a call to the dealership verified the fact. The manager declined to give further details as she said it would be illegal to do so. It is almost certain that an anon will gain access to DMV resources and run the VIN to pull up ownership records. As of yet, such documentation has not been released.
We are waiting on comment and further details from @cubespherical.
Author: @truelai
twitter:Anon_Central twitterde op woensdag 16-05-2012 om 00:29:29#Anonymous is hunting 4 black men for raping a 14 year old girl in the #Netherlands. http://t.co/qLsdeN69 | Primary suspects is @jay_baby_ reageer retweet
quote:
quote:The Pirate Bay came under a sustained attack on Tuesday and Wednesday, knocking the file-sharing service's website offline for around 24 hours.
Early theories had the distributed denial-of-service (DDoS) attack emanating from Anonymous, but the hacker collective denied responsibility. The Pirate Bay (TPB) also said on its Facebook page that it knew Anonymous was not behind the attack.
"We're under a quite big DDoS attack. We don't know who's behind it but we have our suspicions," TPB said in a separate post.
In yet another Facebook post, TPB also noted that Wikileaks.org was being targeted. The file-sharing outfit suggested that this confirmed its prediction in January that 2012 would be "the year of the storm".
At the time of writing on Thursday morning, TPB's website was back up and running, but Wikileaks' site was still down.
Theories abound as to the source of the anti-TPB broadside. Corero Network Security, which sells DDoS protection, told the BBC that "it could be the record labels, or a government somewhere that has had enough of not being able to catch The Pirate Bay, [or] it could be just one person who had rented some cloud power from Amazon and is sitting in a cafe, and is able to launch an attack."
The website TorrentFreak, which regularly covers file-sharing issues, suggested that there may be a link to the escalating legal attacks on TPB, the most recent of which has been a UK court order forcing ISPs here to blockade the service.
"Whoever is attacking The Pirate Bay has achieved what no copyright or governmental authority anywhere in the world has — an almost complete disruption of the site’s operations on a global basis with no court order required," TorrentFreak noted.
quote:Dear Citizens of the World
We at Anonymous fight for those who cannot speak for themselves. We fight for those whose voice has been stolen. We fight for the disenfranchised, and the left behind, the forgotten and the invisible.
Today we ask you to stand up for not just one lost forgotten child but hundreds like her around the world.
Many of you may have seen the hastag #oplithchild without really understanding what it means, let us explain.
Almost three years ago, a father found out his daughter was being sexually abused every time she visits her mother’s home on the weekends. As if that was not bad enough it turned out that this child was part of a larger conspiracy that no one could have predicted. Spanning countries and continents around the world; in recent months a custody battle was fought over the child, ending in her father’s death.
Drąsius Kedys died believing no one would stand up for his daughter. ABC News has reported that over thirty protesters were arrested trying to protect this child. Various videos can be seen floating around the internet showing the child being beaten by police as they try to rip her from the only safety net she has.
The Government has not intervened. Earlier this morning the child was taken from her grandparents’ home and thrown into the back of a van. There is fear the child may be murdered as she can name names and faces of government officials. We fight for her, we fight for Drasius Kedys, and we fight for your children.
We ask you to stand with us, hold the Lithuanian Government accountable for allowing this sexual abuse of our sister to continue. We ask you to help us protect her.
In a nutshell: A girl just three years old was pimped out by her own mother to three adult men; for 4,000 Euros per month. Those three men are high ranking members of the Lithuanian Government. Most of the key figures in this story are dead — murdered — with the exception of the mother, and the court is trying to force the child to live with her again — this child is the last breathing witness.
Freakoutnation.com
httpv://www.youtube.com/watch?feature=player_embedded&v=gtnrvLemx0E
After Kedys failed to get a court order protecting his daughter, he allegedly killed a judge and the mother’s sister, both of whom he accused of being part of the pedophile ring. Kedys then disappeared, only to be found dead near a reservoir in mysterious circumstances two years ago. His funeral was attended by thousands of Lithuanians who had come to regard him as a martyr who dared fight a corrupt justice system.
abcnews.go.com
httpv://youtu.be/eOOA2pbpYq4
Lutianian justice has rejected all the requests of the plaintiff. Algimantas Valantinas, the General Prosecutor of Lithuania did not find it appropriate to ask that the judge Furmanavičius be interrogated, but he did find appropriate to criticise Drąsius Kedys for having published on Internet, the videos and 200 letters sent to European Parliament members and Lithuanian authorities, where face hidden, Diemantele tells what has happened to her. Drasiaus plea letter in English is available here: A father fighting for his daughter
Veritasll
We Are Anonymous
We Do Not Forgive
We Do Not Forget
We Are Legion
Expect Us
Peace and Love,
#ATeam
twitter:AnonOpsSweden twitterde op donderdag 17-05-2012 om 19:22:32Right now #OpLithChild goes #OccupyLithuania, people pitched tents outside president palace, cops wanted to demolish, people defended!
) reageer retweet
Thomas Ryan?twitter:Reckz0r twitterde op donderdag 17-05-2012 om 19:14:30http://t.co/GKrESNrU - The Jester's True Identity (DoX) reageer retweet
quote:
quote:We have some news just breaking right now. ZeroPaid has learned who was behind the attack of Swedish BitTorrent website The Pirate Bay. The attacker goes by the name Anonymous Nyre – a defector of the online collective Anonymous. A comment was left on PasteBin explaining the attack:
quote:
quote:A day after the Indian government proposed a hyper watchdog to police the internet, the websites of the Supreme Court of India and the Congress mysteriously went offline on Thursday. This sparked off rumours that the hacker group Anonymous Central had taken down the two sites to protest the government's censorship plan.
The hacking was reportedly in response to the blocking of torrent site thepiratebay.com and vimeo.com.
While the Supreme Court of India website came back online after a little while, the Congress website was still offline at the time of filing of this report.
The Department of Telecommunications (DoT) website had also reportedly come under attack.
Earlier, tweeting about the government's plan, Anonymous Central had tweeted, "Namaste #India, your time has come to trash the current government and install a new one. Good luck."
The proposed plan for censorship pushes for a government-run 50-member body to control the web. The government's web takeover plan has already been placed before the United Nations (UN).
The UN is expected to discuss the proposal in the next 72 hours. The proposal would end "equal say" process for internet governance and push the civil society to the fringes.
The proposed Committee for Internet Related Polices (CIRP) would be 50-member body funded by the UN. It would meet once a year and would have the power to oversee all internet standards bodies.
If put into force, the move carries a huge potential of hurting India's image. The move has already been raising the hackles of some MPs. Headlines Today accessed letter of Rajya Sabha member Rajeev Chandrasekhar to Prime Minister Manmohan Singh objecting to the proposed watchdog.
"India's proposal, though cleverly worded, hurts its reputation. It hurts advancement of internet as a vehicle for openness, democracy. If accepted, it will be harmful to the interests of Indian citizens. India's position is closely associated with countries none of which is a sparkling example of democracy. Any attempt to expand government's power over internet should be turned back," Chandrasekhar wrote in his letter.
Meanwhile, reacting to the proposal for an internet watchdog, Gagandeep S Sapra, had tweeted, "Block The Internet, Ban the Cartoons, Change Text in Textbooks, Delay Justice, Forget the Citizen, Oh What a Beautiful Country #India"
Ashwin Siddaramaiah tweeted, "Not just TPB, but also vimeo, dailymotion, pastebin and many more sites are blocked. This Govt. Has been the worst I've seen."
Read more at: http://indiatoday.intoday(...)bsites/1/189182.html
quote:
quote:Dont worry about hackers illegally accessing government systems. It turns out government workers and civil servants who are trusted with private citizen data are more likely to access your data illegally.
The U.K. government is haemorrhaging data private and confidential citizen data from medical records to social security details, and even criminal records, according to figures obtained through Freedom of Information requests.
Just shy of 1,000 civil servants working at the Department for Work and Pensions (DWP), were disciplined for accessing personal social security records. The Department for Health (DoH), which operates the U.K.s National Health Service and more importantly all U.K. medical records, saw more than 150 breaches occur over a 13-month period.
And all this comes to light no more than a fortnight after the Queen formally announced the U.K. government will monitor all Web and email traffic, and log all landline, mobile phone, and Skype calls.
And its the privacy campaigners who are in the wrong to say that the data wont be illegally accessed or abused?
There is one, simple fact: from health records to criminal records, employment details and other personal data, government databases are not only open to abuse, but are actively being exploited by the very people we supposedly trust with our data.
Crunching the numbers: the DWP has a database of around 100 million people. More than 200,000 civil servants have to be vetted to extremely high standards before they can access this database.
Between April 2010 and March 2011, 513 civil servants were found to have made unauthorised disclosures of official, sensitive, private and/or personal information. The year continuing, between April 2011 and January 2012, more than 460 staff were disciplined.
The DoH on the other hand said it did not log each and every breach of unlawful access to U.K. medical records. It did say there were 158 recorded breaches in 2011. Only four years earlier, there were only 28 cases, representing a fivefold increase.
The FOI requests were made by Channel 4s investigative series, Dispatches.
Out of the hundreds of thousands of employees in both departments, the numbers represent only a fraction of the total staff. Having said that, it took only one person allegedly to leak more than 250,000 U.S. diplomatic cables to Wikileaks, the largest unauthorised release of classified data in the history of the United States.
Currently, under the Data Protection Act, it is a criminal offence to obtain or disclose personal data without permission or procure disclosure to other persons. The penalties for a criminal offence go up to £5,000 ($7,900) in a lower magistrates court, or an unlimited fine in a higher Crown court.
Some British politicians even called for some extreme data breaches to result in prison sentences something dismissed by other parliamentary committee members.
Rarely does the fine rise to five-figures, let alone six. Only recently, one Scottish local authority was fined £140,000 ($220,000) for five separate data breaches the highest fine imposed by the courts to date.
But as is often the case, the financial benefits from selling personal data are rarely outweighed by the fines or penalties imposed.
Under new legislation presented by Europe, if a data breach occurs, whether by an individual deliberately acting outside the law, or accidentally due to unforeseen events, the person for which that data relates to must be informed.
But those laws are at least two or three years away, and until then, companies and public sector organisations will face meagre fines compared to the ¤1 million flat-rate or 2 percent of their annual global turnover.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:
quote:The Chicago Police Department website is down, and “hactivists” from the group Anonymous are taking credit. It’s part of a protest in Chicago against the NATO summit, where U.S. President Barack Obama is meeting with world leaders.
Activists are protesting NATO’s policies, holding signs such as “War (equals) Debt,” and “NATO, Go Home.” Members of the hacker group Anonymous, calling themselves “AntiS3curityOPS,” posted a video on YouTube with an ominous message to the Chicago Police Department, but that video has since been made private. We added a full transcript of the video to the bottom of this post.
quote:
quote:CHICAGO - De bekende hackersgroep Anonymous zegt de website van de NAVO te hebben aangevallen.
De site was zondagavond uit de lucht.
Het militaire bondgenootschap komt zondag en maandag bijeen in de Amerikaanse stad Chicago.
Als reden noemen de hackers het politieoptreden tegen demonstranten rond de NAVO-top. ''Als jullie ons censureren, zullen wij uit noodzaak jullie censureren'', schrijft Anonymous op internet.
Een andere hackersgroep, AntiS3curityOPS, claimt de websites van de gemeente Chicago en van de lokale politie te hebben platgelegd.
quote:
quote:Een Amerikaanse student die in 2009 werd veroordeeld tot het betalen van 675 duizend dollar (bijna 530 duizend euro) voor het illegaal downloaden en online delen van 30 muzieknummers, moet die boete gewoon betalen. Het Amerikaanse Hooggerechtshof weigerde vandaag het hoger beroep dat de student had aangespannen, te behandelen.
De student Joel Tenenbaum was aangeklaagd door de Recording Industry Association of America (RIAA). Een jury legde hem de boete van 22 duizend dollar per nummer op, maar een federale rechtbank schrapte dat later omdat de boete excessief en niet in lijn met de grondwet zou zijn.
Maar een aantal grote platenmaatschappijen, waaronder Sony BMG Music Entertainment en Warner Brothers, deden hun beklag over het schappen van de boete. Een federaal hof van beroep stelde hen in het gelijk, en oordeelde dat Tenenbaum alsnog moest betalen. De student tekende hoger beroep aan, maar dat werd vandaag afgewezen. Het Hof heeft dat besluit niet nader toegelicht.
RIAA, dat een aantal van de grootste Amerikaanse platenlabels vertegenwoordigt, heeft in totaal ruim 12 duizen Amerikanen voor de rechter gesleept wegens het schenden van het auteursrecht. Tenenbaum verklaarde voor de rechter dat hij vindt dat individuele downloaders die muziek delen zonder daar geld aan te verdienen niet hetzelfde behandeld moeten worden als bedrijven die voor eigen gewin materiaal stelen dat auteursrechten bevat.
quote:supreme court will hear aclu case challenging warrantless wiretapping law
The Supreme Court has just agreed to consider whether plaintiffs represented by the ACLU have the right to challenge the constitutionality of a controversial law that authorizes the National Security Agency to conduct dragnet surveillance of Americans international emails and phone calls.
quote:Hollywood planning a second SOPA for 2013
If a few remarks by Chris Dodd are to be believed, the next version of the Stop Online Piracy Act, whatever that might look like, will likely come in early 2013.
Dodd, the CEO of the Motion Picture Association of AmericaHollywoods lobbying arm, as well as a major proponent and lobbying agent for SOPAwas quoted Saturday referencing his eagerness to directly lobby Congress for a new copyright bill on the MPAAs behalf.
"I can't say anything to them about this for another seven months, but I think my colleagues understand how important this is," he said in an interview with Variety.
Dodd has to wait until January to personally lobby members of Congress. For 30 years, until he assumed leadership of the MPAA in 2011, he was a U.S. Senator from Connecticut. Ethics regulations prohibit him from making deals with Washington until two years after his departure.
The only other hint Dodd left about the next SOPA is that the MPAA will no longer try and equate Web piracy with physical theft, a notion widely mocked online.
"We're going to have to be more subtle and consumer-oriented," he said. "We're on the wrong track if we describe this as thievery."
Its unclear if Dodd is interested in a much milder form of combating web piracy, or if hes interested in similar legislation that would simply be less likely to rile up the public.
He did, at least, note that he was caught off guard by the publics voracious opposition to SOPA and its sister bill, the Protect IP Act. "My learning curve about understanding this industry is still climbing," he said.
How much he meant to reveal about the MPAAs next legislative push is unclear. The organization refused to comment on this story.
quote:
quote:WASHINGTON, May 21 (Reuters) - One or more unauthorized
users gained access to the inner workings of a website run by
the U.S. Justice Department, a department spokeswoman said on
Monday after the hacker group Anonymous said they were behind
the incident.
The hackers accessed a server that operates the Bureau of
Justice Statistics' website, the spokeswoman said.
The bureau is responsible for collecting and analyzing data
about crime - including computer security incidents - from
throughout the United States.
The department spokeswoman declined to say when the alleged
unauthorized access occurred or what data the hackers might have
obtained. The department is looking into whether the
unauthorized users broke criminal laws, she said.
Online statements attributed to Anonymous said they were
responsible for the security breach and that the files they
obtained include emails.
Jij voegt lekker veel toe kerel, met dit soort domme one-liners.quote:Op woensdag 23 mei 2012 01:19 schreef boekenplank het volgende:
Vermaak je je een beetje met je zoveelste copy/paste topic?
quote:EXCLUSIVE: Hacker Adrian Lamo Who Betrayed Wikileaks' Manning Turns Fire on Anonymous
Adrian Lamo, dubbed the "world's most hated hacker" after he exposed the alleged Wikileaks source Bradley Manning to the US authorities, has poured scorn on the myth of Anonymous's power and influence, in an exclusive interview with the IBTimes UK.
The Boston-born Lamo, 31, who is now an outcast from the hacker underground, condemned Anonymous as "an illogical continuation of hacker activity" that needs to be de-escalated by the media.
The ex-hacker, who was once feted for his attacks on the servers at The New York Times, WorldCom and Microsoft, warns of media misrepresentations that make Anonymous appear almost unbeatable. According to the Colombian-American, Anonymous enjoys a rather big "PR success" among media organisations, and it is not being effectively questioned by journalists.
"There's a societal trend to make Anonymous appear rather larger than life, cheerleaded by Anonymous themselves, various security and threat analysis firms who benefit from the added stress on the market, and by the media itself which well knows the public is head-over-heels for a vaguely human villain," he told the IBTimes UK.
Taking for instance the latest attack on the US Department of Justice, in which Anonymous claimed to have stolen and posted 1.7 gigabytes of data, Lamo stresses that the collective hacked only "a sub-office in charge of compiling crime statistic".
"Nothing seriously classified, no major data breach, no 'DOJ [Department Of Justice] hack' as implied and no far-reaching consequences," he said.
"Yet, all too many outlets see 'DOJ' and 'hacked' in the same breath and go hog-wild."
"I don't want to minimise a significant hack, just to state the real value of the attack," he said.
Read more: http://www.ibtimes.co.uk/(...)ks.htm#ixzz1vnATbwU7
quote:Manning was 22 when arrested, the same age as Lamo when he was detained for computer intrusion after The New York Times hack. But Lamo is convinced he that he did the right thing.
"I never did harm, or demanded money, and offered to help my victims, free."
"Before I became a threat analyst for my current client, and before my myriad cooperation with the military to mitigate the less warm and fuzzy Wikileaks threat that most people don't see [...] I was a less morally evolved, prolific intruder," he told the IBTimes UK.
Read more: http://www.ibtimes.co.uk/(...)ks.htm#ixzz1vnBWr3xR
quote:
quote:This site hosts the peer-to-peer review of the in-progress manuscript The Piracy Crusade: How the Music Industry’s War on Sharing Destroys Markets and Erodes Civil Liberties by Aram Sinnreich. The project is currently under contract with University of Massachusetts Press, which has allowed me to post the pieces here for pre-publication and open-review. The draft manuscript with comments will continue to live online here, even after the book has been published. This entire text is available to access freely under a Creative Commons Attribution-NonCommercial-ShareAlike license.
quote:
quote:This news might come as a shock to many reliance users. Anonymous India Compromised intranet of Reliance Broadband. It seems that they hacked into the admin panel for the filtering server.
Below is their message when users tried to open any site.
quote:
quote:The Internet Defense League takes the tactic that killed SOPA & PIPA and turns it into a permanent force for defending the internet, and making it better. Think of it like the internet's Emergency Broadcast System, or its bat signal!
Zou zo de intro kunnen zijn van zo'n slechte Duitse pornofilmquote:Op zondag 27 mei 2012 19:04 schreef Papierversnipperaar het volgende:
Leaked presentation video for the EU's Project INDECT.
quote:
quote:Last week The Pirate Bay added a new IP-address which allows users to circumvent the many court-ordered blockades against the site. While this proved to be quite effective, the Hollywood backed anti-piracy group BREIN has already been to court to demand a block against this new address. But that won’t deter The Pirate Bay, who say they are fully prepared for an extended game of whac-a-mole using the hundreds of IP addresses they have available.
The Pirate Bay is arguably the most censored website on the Internet.
Courts all around the world have ordered Internet providers to block subscriber access to the torrent site, and the end is still not in sight.
Within a few days, a new deadline for five UK and five Dutch Internet providers passes. This means that millions more will be unable to access The Pirate Bay, at least, that is the plan.
Last week The Pirate Bay team responded to the blockades by adding a new IP-address. The new location was setup to make it easier for people to start their own dedicated proxy sites, but it also allows blocked Pirate Bay visitors to gain access to the site.
Instead of the normal address they simply go to 194.71.107.80, bypassing the court order – for the time being at least.
The new IP-address represents a new thorn in the side of Dutch anti-piracy group BREIN, who quickly asked ISPs to censor that too. Unfortunately for them the providers refused to do so, so the group had to go to court once again last week to get the added IP-address blocked as well.
Right before the weekend BREIN succeeded with the court ordering an ex-parte injunction for the new address. However, according to comments coming out of The Pirate Bay, this could just be the start of an extended game of whac-a-mole.
“Let me get the next IP-address lined up,” a Pirate Bay insider told TorrentFreak. “We have hundreds, so let’s see many times they will respond,” he added.
We were told that if the new IP-address is blocked again, they will simply add a new one. This means that BREIN would have to file for another ex-parte injunction, a process that may repeat itself hundreds of times.
The Pirate Bay insider did emphasize that the new IP wasn’t meant for people to bypass the blocks directly, but to make it easier and more safe to create proxy sites. In this regard, it is irrelevant whether the IP-address is blocked or not.
However, it’s well known that The Pirate Bay isn’t averse to a little dueling with anti-piracy outfits, so they’re going to play along.
“Now that I know it’s annoying to BREIN, of course we’ll add more IPs. Every time they get an order, we’ll add a new one, for the next year or so,” TorrentFreak was told.
The result is an almost endless IP-address whac-a-mole.
The Pirate Bay blockades are a good example of how hard it is to completely get a website offline. Even if all Pirate Bay domains and IP-addresses are blocked there are plenty of other ways to access the torrent site, including hundreds of proxy sites.
At the same time, the blockades make The Pirate Bay front page news. As we’ve seen before, this can result in a healthy traffic boost for the deviant torrent site. That begs the question of whether these censorship attempts aren’t doing more ‘harm’ than ‘good’ for copyright holders.
quote:
quote:Answers.usa.gov suffers from a cross site scripting vulnerability.
twitter:
quote:
quote:A New Zealand court granted Megaupload.com founder Kim Dotcom, accused of orchestrating the biggest copyright infringement conspiracy in U.S. history, access to FBI files that led to his arrest.
Judge David Harvey ruled yesterday that withholding the information could threaten Dotcom’s right to a fair trial, according to a copy of the ruling e-mailed to Bloomberg News. The U.S. government opposed the disclosure.
Dotcom, 38, was indicted in what U.S. prosecutors dubbed a “Mega Conspiracy,” accusing his file-sharing website of generating more than $175 million in criminal proceeds from the exchange of pirated film, music, book and software files. He faces as long as 20 years in prison for each of the racketeering and money-laundering charges in the indictment.
“A denial of the provision of information that could enable a proper adversarial hearing in my view would amount to a denial of the opportunity to contest,” Harvey said in the ruling. “That would effectively mean that the process is one- sided.”
Dotcom wasn’t given the right to all information that had been gathered on him, according to the ruling. Documents to be disclosed include those relating to allegations of copyright breaches, money laundering, racketeering and wire fraud.
In a separate court ruling yesterday, German-born Dotcom was also allowed to return to his leased luxury mansion in an Auckland suburb after his bail terms were relaxed. He was no longer deemed to be a flight risk, according to a report on the stuff.co.nz website.
Dotcom was arrested at his residence in late January and spent four weeks in jail before being released to await an extradition hearing, currently scheduled for Aug. 20.
To contact the reporter on this story: Chris Bourke in Wellington at cbourke4@bloomberg.net
To contact the editor responsible for this story: Douglas Wong at dwong19@bloomberg.net
quote:
quote:De militaire inlichtingendienst MIVD overtreedt soms de wet bij het verzamelen van informatie met behulp van internettaps. Dat erkende demissionair-minister Hillen (Defensie, CDA) vanmiddag in een Kamerdebat. Hij wil de wet aanpassen om de bevoegdheden van de dienst uit te breiden.
Twee EPcommissies hebben zijn ook tegen ACTA. Een derde stemming volgt vanmiddag.quote:Op dinsdag 29 mei 2012 19:55 schreef Papierversnipperaar het volgende:
Tweede Kamer verwerpt omstreden ACTA-verdrag
quote:
quote:De kans dat ACTA niet doorgaat, is vandaag een stuk groter geworden. Drie invloedrijke commissies binnen het Europees Parlement hebben vandaag tegen het omstreden anti-piraterijverdrag gestemd. Een vierde commissie zal over drie weken een oordeel vellen.
Bij de commissie Industrie, onderzoek en energie (ITRE) stemden 31 leden vóór en 12 leden tegen een voorstel dat het europarlement oproept om ACTA te verwerpen. Een lid onthield zich van stemming. Bij JURI, de juridische commissie van het europarlement, stemden tien leden vóór en 12 tegen. Twee leden onthielden zich van stemming, waardoor de tegenstanders van het verdrag alsnog aan het langste eind trokken. Bij de commissie voor Burgerrechten LIBE stemden 31 leden vóór, één lid tegen, en waren er 21 onthoudingen.
Handelscomité
Daarmee is het omstreden verdrag echter nog niet van de baan. Een vierde commissie zal op 21 juni haar oordeel over het verdrag geven. En laat dat nu net de meest invloedrijke club op dit gebied zijn: het internationale handelscomité INTA. De voorzitter van dat comité, die tevens ACTA-rapporteur voor het Europees Parlement is, heeft echter al afstand van het verdrag genomen.
Maar ook als INTA tegenstemt, is het finale oordeel van het Europees Parlement nog niet geveld. Dat moet gebeuren tijdens een plenaire bijeenkomst die begin juli wordt gehouden. Het europarlement is dan klaar, maar het allerlaatste woord is tenslotte aan de Raad van Ministers van de Europese Unie. Ondertussen heeft de Europese Commissie het verdrag ook nog voorgelegd aan het Europese Hof van Justitie, die moet toetsen of het verdrag zich aan de Europese burgerrechten houdt. Het oordeel kan wel jaren op zich laten wachten.
Somber
Maar dat het er somber uit ziet voor de voorstanders van ACTA, wordt wel steeds duidelijker. In veel Europese landen is hevig geprotesteerd tegen het verdrag.
In Nederland heeft de Tweede Kamer dinsdag een motie van D66 en de VVD aangenomen, die erop aandringt dat Nederland niet akkoord gaat met ACTA. Ook een PVV-motie hierover werd aangenomen. Het kabinet is echter van mening dat het ACTA-verdrag niet in strijd is met de Europese of Nederlandse grondrechten, en wil het oordeel van het Europees Hof van Justitie daarover eerst afwachten.
De Anti-Counterfeiting Trade Agreement (ACTA) is bedoeld om de internationale standaarden voor de bescherming van de rechten van producenten van muziek, films, farmaceutica, mode en tal van andere producten te harmoniseren. Het bestrijden van piraterij is een veelbesproken onderdeel van het verdrag. Tegenstanders noemen het ook wel de 'censuurwet', omdat het de internetvrijheid drastisch zou beperken.
twitter:_TigAnon_ twitterde op donderdag 31-05-2012 om 21:01:11#OpAap Targets: http://t.co/FaFnQtG4 http://t.co/TpTsqfgj http://t.co/djyWblOm FIRE #anonymous reageer retweet
quote:The Ethiopian Telecommunication Corporation, which happens to be the sole telecommunication service provider in Ethiopia, has deployed or begun testing Deep Packet Inspection (DPI) of all Internet traffic. We have previously analyzed the same kind of censorship in China, Iran, and Kazakhstan.
Reports show that Tor stopped working a week ago -- even with bridges configured. Websites such as https://gmail.com/, https://facebook.com/, https://twitter.com/, and even https://torproject.org/ continue to work. The graphs below show the effects of this deployment of censorship based on Deep Packet Inspection:
Beetje jammer weer, een democratisch land bedreigen omdat ze een nieuwe wet doorvoeren. Hadden ze ook acties bij landen waar de F1 werd gehouden die het niet zo nauw nemen met de mensenrechten?quote:Op donderdag 31 mei 2012 12:21 schreef Papierversnipperaar het volgende:
Anonymous dreigt met hack tijdens GP Canada
Yep, Bahrein bijvoorbeeld.quote:Op donderdag 31 mei 2012 21:21 schreef YazooW het volgende:
[..]
Beetje jammer weer, een democratisch land bedriegen omdat ze een nieuwe wet doorvoeren. Hadden ze ook acties bij landen waar de F1 werd gehouden die het niet zo nauw nemen met de mensenrechten?
WTF man. Hoeveel commissies en comités en bijeenkomsten zijn er wel niet?quote:Bij de commissie Industrie, onderzoek en energie (ITRE) stemden 31 leden vóór en 12 leden tegen een voorstel dat het europarlement oproept om ACTA te verwerpen. Een lid onthield zich van stemming. Bij JURI, de juridische commissie van het europarlement, stemden tien leden vóór en 12 tegen. Twee leden onthielden zich van stemming, waardoor de tegenstanders van het verdrag alsnog aan het langste eind trokken. Bij de commissie voor Burgerrechten LIBE stemden 31 leden vóór, één lid tegen, en waren er 21 onthoudingen.
Handelscomité
Daarmee is het omstreden verdrag echter nog niet van de baan. Een vierde commissie zal op 21 juni haar oordeel over het verdrag geven. En laat dat nu net de meest invloedrijke club op dit gebied zijn: het internationale handelscomité INTA. De voorzitter van dat comité, die tevens ACTA-rapporteur voor het Europees Parlement is, heeft echter al afstand van het verdrag genomen.
Maar ook als INTA tegenstemt, is het finale oordeel van het Europees Parlement nog niet geveld. Dat moet gebeuren tijdens een plenaire bijeenkomst die begin juli wordt gehouden. Het europarlement is dan klaar, maar het allerlaatste woord is tenslotte aan de Raad van Ministers van de Europese Unie. Ondertussen heeft de Europese Commissie het verdrag ook nog voorgelegd aan het Europese Hof van Justitie, die moet toetsen of het verdrag zich aan de Europese burgerrechten houdt. Het oordeel kan wel jaren op zich laten wachten.
Tuurlijk, maar dan is het aan het Canadese volk om bij de volgende verkiezingen niet meer op die partijen te stemmen die hun nu naaien door het schoolgeld te verhogen. Protest is ook helemaal niks mis mee, maar dreigen om de site te hacken en vervolgens creditcard gegevens van gewone mensen die gewoon even een weekendje F1 wilden kijken te publiceren vind ik te ver gaan.quote:Op donderdag 31 mei 2012 21:26 schreef Papierversnipperaar het volgende:
[..]
Yep, Bahrein bijvoorbeeld.
Maar ook democratische staten kunnen slechte wetten bedenken, ACTA bijvoorbeeld. Mag je daar dan niet tegen protesteren? Wat betekend democratie als je niet mag protesteren?
Dus ze mogen niet met potten en pannnen de straat op?quote:Op donderdag 31 mei 2012 21:33 schreef YazooW het volgende:
[..]
Tuurlijk, maar dan is het aan het Canadese volk om bij de volgende verkiezingen niet meer op die partijen te stemmen die hun nu naaien door het schoolgeld te verhogen.
Ik vind heel wat wetten ook veel te ver gaan.quote:Protest is ook helemaal niks mis mee, maar dreigen om de site te hacken en vervolgens creditcard gegevens van gewone mensen die gewoon even een weekendje F1 wilden kijken te publiceren vind ik te ver gaan.
1 zin later zeg ik: Protest is ook helemaal niks mis mee.quote:Op donderdag 31 mei 2012 21:36 schreef Papierversnipperaar het volgende:
[..]
Dus ze mogen niet met potten en pannnen de straat op?
[..]
Ik ook, maar ik ben slecht een individu, net zoals Anonymous maar een heeeeeeel klein groepje is. Wat geeft hun het recht zoveel te eisen van een regering?quote:Ik vind heel wat wetten ook veel te ver gaan.
Die overheden zijn ook maar hele kleine groepjes en hun legitimiteit staat dagelijks ter discussie.quote:Op donderdag 31 mei 2012 21:39 schreef YazooW het volgende:
[..]
1 zin later zeg ik: Protest is ook helemaal niks mis mee.
[..]
Ik ook, maar ik ben slecht een individu, net zoals Anonymous maar een heeeeeeel klein groepje is. Wat geeft hun het recht zoveel te eisen van een regering?
quote:
quote:Formula One boss Bernie Ecclestone said he isn't aware of any cyber threats against ticket holders for the upcoming Montreal Grand Prix race.
More than 130 people who bought F1 Montreal tickets received threatening emails warning them not to attend the race.
Their personal information was also leaked online, including names, phones numbers, email addresses and the prices they paid for their tickets.
International internet activist group Anonymous has claimed responsibility for the hacking attack.
When contacted by CBC News, Ecclestone said he wasn't aware of any internet security problems, and suggested people contact authorities.
"If someone is threatening them, they should report it to the police," he said Thursday, when reached on his cellphone. "I don't think it's a nice thing for people to do."
Threatening emails were sent to some of the people whose information was leaked.
CBC contacted several people on the list who confirmed all the information posted about them was correct.
Anonymous had threatened to go after the Montreal F1 race as part of its campaign against the Quebec government over Bill 78, the emergency legislation adopted May 18 to temper nearly 3½ months of student protests over tuition hikes.
quote:
quote:A related faction of Anonymous, TeamGhostShell, is targeting China with a vengeance in its newest operation, #ProjectDragonFly.
Their focus is set keenly on the Chinese government, its institutions, corporations and companies. As the leader of TeamGhostShell, @DeadMellox words it, “I’m declaring war on China’s cyberspace.”
quote:#ProjectDragonFly began by breaching every site in their way, including national and regional sites, giving as examples, Hong Kong (hk), Beijing (bj), Shanghai (sh), Macau (mo), Tianjin (tj), Anhui (ah), etc.Included in the leaks are usernames, passwords, addresses, phone numbers, passports, flight numbers, private messages, project descriptions, and much more.DeadMellox states, This is merely an introduction, after today the real fun will begin.
One of TeamGhostShells main members, Zoone, was arrested for being involved (ironically) with Anonymous work, in addition to another leader behind @AnonymousChinas account.
In their honor, DeadMellox states the arrests will not discourage his operation, in fact, quite the opposite, This made me reconsider my position and leak a bit more than just gov/edu/ac data, but also company information. While sitting on around 800k chinese accounts, ive decided to leak around 100k from different places. The police world-wide got the best of us this time, but now its time to strike back, therefore Im bringing to you all, a real cyberwar. Enjoy!
quote:In depth Interview with @DeadMellox , hacker who breached Chinese government
Few days ago, as most know by now @DeadMellox of TeamGhostShell had dropped a huge amount of accounts and information from many Chinese websites, mainly government based.
Last night we got the chance to interview them with the responses being very in depth.
Klik voor meer.quote:Anonymous hacker attack on Power Corp’s Desmarais family is absurd
Hacker collective Anonymous has sent Quebec’s political and media classes into a fit by posting a two-hour video on YouTube that shows the highlights of a swanky birthday party Power Corp. founder Paul Desmarais threw for his wife, Jacqueline.
In an instant, the Internet activists have served warning to Canada’s billionaires that their private lives are fair game for public consumption. But the only thing they’ve really proven is that their list of enemies is terribly indiscriminate. Hacking into the emails of Syrian dictator Bashar Assad to reveal how his wife shopped for luxury goods online while his army cracked down hard on protesters, as Anonymous did this year, is one thing. Exposing the intimate moments of a family whose only victims have been a few pheasants hunted for sport is quite another.
“I saw in this video a vulgar display of wealth,” lawyer and former Parti Québécois cabinet minister Richard Le Hir declared Thursday on Quebecor Inc.’s all-news station LCN. “It had something indecent and obscene about it. It’s bling-bling to death.”
Conservative commentator Eric Duhaime said he had no problem with Quebec Premier Jean Charest attending private events, as he did in this case as an invitee of Mr. Desmarais. “But it’s very difficult to say when it’s normal and at what point it becomes cronyism.”
The video is believed to have been shot at the Desmarais Sagard estate in Quebec’s Charlevoix region in August of 2008, on the occasion of Jacqueline Desmarais’ 80th birthday. It begins with a time-lapsed montage showing the assembly of a temporary concert hall for the event before showing guests arriving in their formal attire — women in long flowing gowns, men in white ties and tails with their various government-bestowed honour medals on display.
Among the guests seen are U.S. TV personality Charlie Rose, former U.S. President George H. Bush, former Prime Ministers Jean Chrétien and Brian Mulroney, former governor general Adrienne Clarkson and singer Robert Charlebois. A contingent from Montreal’s Orchestre Metropolitain, to which the family is a major benefactor, plays live music.
quote:30 Years of Political Hacking
The Chaos Computer Club, the celebrated and influential German hacker collective, turns 30 this autumn. OWNI meets Andy Müller-Maguhn, CCC board member and long-time spokesman, to discuss the challenges and successes of the last three decades.
Omdat het interessant is.quote:Op zondag 3 juni 2012 18:34 schreef Die_Hofstadtgruppe het volgende:
Waarom de neuk loopt dit linkdumptopic.nog???
quote:
Speciaal voor jou:quote:
quote:Megaupload has no rights? US broke its own rules by going after Internet giant
More than four months after federal agents shut-down the file-sharing service Megaupload and ordered a raid on the New Zealand mansion of its founder Kim Dotcom, attorneys are asking a US court to dismiss the case against the website.
Ira Rothken, the California-based attorney of both Megaupload.com and Dotcom, is calling for a US federal court in Virginia to dismiss the criminal case against the website. According to Rothken, the website’s Fifth Amendment rights were violated when the FBI ordered for Megaupload to be taken off the Internet earlier this year. As a result of the agency’s demands, Megaupload’s servers were seized and millions of files uploaded to the website — including those owned by paying subscribers — were made unavailable and are still inaccessible today. Now Rothken says that the prosecutors in the case failed to guarantee due process for his clients and is asking the court to dismiss the charges. Since Megaupload was hosted overseas, argues the site’s attorney, the Department of Justice has acted improperly in its attempts to prosecute.
“Both prongs of the procedural due process test are plainly met here. The Government has seized Megaupload’s property and domain name, ruined its reputation and destroyed its business pursuant to an indictment which is fatally flawed as a jurisdictional matter. Megaupload now finds itself in a state of abeyance, with no end in sight,” writes Rothken in a newly released statement.
“As a result of the Government’s inability to properly serve the summons on Megaupload, this Court lacks jurisdiction over the company. In the absence of effective service of process, criminal proceedings against Megaupload cannot commence, and as the Court has aptly noted, we ‘frankly don’t know that we are ever going to have a trial in this matter’.”
Indeed, those were the words US District Court Judge Liam O'Grady had for the case in April, when the proceedings against Megaupload were already three months old yet grossly underdeveloped. Rothken condemned the court system at the time for failing to properly play by the rules by opening a case against Megaupload and Dotcom over copyright infringement and other related crimes by seizing the website without first bringing charges against it. Last month Judge O’Grady even warned the FBI that the trial was in jeopardy because the Justice Department jumped the gun on the case.
In an interview with Radio New Zealand last week, Rothken added, "We're optimistic that the case against Megaupload will be dismissed” and called the entire federal witch-hunt “flawed.”
"Megaupload is a Hong Kong corporation, it does not have an office in the United States and we're just asking the US to play by the rules," said Rothken. "One would think that they'd have done more legal research before filing this type of indictment against a foreign corporation."
Speaking to AFP, Rothken added, "The rules in this instance didn't allow a foreign corporation to be served and indicted as it has not have a presence in the US. We believe the law is clear in that issue, and we're asking the court to dismiss the case."
Dotcom, a German national, is currently under house-arrest in New Zealand. American prosecutors are hoping to extradite him for charges relating to his involvement with Megaupload though have been unable to do as much so far. A court hearing scheduled for the matter is slated for this August. In the meantime, though, his attorney says that the shortcuts that the US government tried to take in the case might very well cost the court a victory.
"This case was flawed from the start, once this case gets dismissed it can't be fixed,” Rothken added to the radio network.
Dotcom previously told the website Torrent Freak that he predicts he will prevail over America’s attempt at prosecuting him but that the government has already made their point.
“We have already been served a death sentence without trial and even if we are found ‘not guilty’ which we will, the damage can never be repaired,” said Dotcom.
Rothken adds this week, “Megaupload is thus deprived of any procedure to clear its name or recoup its property, in clear violation of its due process rights.”
quote:#TwitterPedoRing: Anonymous launches attack on child predators
David’s Twitter profile is simple, and probably should be. After all, he is only in junior high.
“I’m 14 year [sic] old” is how he describes himself in his online bio. On his timeline, David tweets what you might expect: praise for professional wrestling, Family Guy excerpts and 140-character reviews of his afternoon pick-up games. Every now and again, however, David’s profile in punctuated by messages penned by elusive perverts stalking cyberspace for young boys just like him.
In an August 19 tweet, David writes, “Only one thing can control me and that’s you.” Angela, another young teen with a love for singer Mandy Moore and vlogging, is the only person that retweets David’s message, accompanied by an emoticon. Somewhere on the Web, though, a man nearly four times his senior sees David’s love tweet and offers an unprovoked response.
“I wld luv that,” writes John from Ohio. His Twitter profile is much more simple and to the point.
“52 yr gay love boys” is John self-description. For pages and pages, any user of Twitter can comb through his often one-sided correspondence with unsuspecting minors.
“I like the braces,” John tweets 9-year-old rap artist and Internet personality Matty B. last week, “but u probaly been weearing them awhile.” That same day, John sends a 13-year-old Twitter users named Pat, “can we talk?”
John — who uses the Twitter handle “@jjrjr_”— is an outlier, of course, among one of the world’s most celebrated social media sites that claims to have around 140 million registered users. That isn’t to say he’s alone, though. On Twitter, Facebook and elsewhere on the Web, grown men are patrolling for pre-teens and young boys and girls and are sending them sexually suggestive messages over the Internet.
That could all end soon, but not necessarily under the watch of the FBI or any local law enforcement agency. This week the profiles of John and dozens of other child predators were released to the Web by the same group that the government has linked to acts of terrorism.
The trove of Twitter accounts was leaked to the Web on Monday by the hacktivist collective Anonymous, and the group is looking to prove that they aren’t necessarily a club that’s hell bent on causing chaos without an agenda.
“This is a list of pedophiles that Twitter hasn't deemed important to remove despite their affiliations with each other, their posts of children participating in lewd acts, and their requests for this sort of material. We are releasing these names in hopes that Twitter will work together with LEA in order to catch and stop these scumbags,” an operative with the loose-knit hacktivist collective explains in a preface to the collective of user names. “You mess with our children, you mess with us.”
This is not the first time that Anonymous has taken on child predators that lurk on the Web, but given their ever-expanding notoriety, it might be the last time they’ll be left to take matters into their own hands. Last year the group released the results of #OpDarkNet, a mission its members engaged in to expose pedophiles who relied on encryption programs and masking technology such as the Tor Project — the same used by hacktivists to elude global censors — to swap pornographic material of children. In that instance, they published the IP addresses and online histories of 190 users linked to shady, underground sex sites frequented by fans of barely clad youngsters.
“The purpose of #OpDarknet was to collect evidence and prove that [one percent] of Tor users who use Tor for [Child Pornography] are the ones causing the problems for the rest of the Tor community, the 99%,” an operative with the group wrote at the time.
Back then, another operative told the website Gawker that it was necessary to make a move before the authorities did because “they’ll take forever.”
“Due process for some of these guys are so weak,” one Anon told Gawker. "The best way for Law Enforcement to react is for us to release it. They can chose to follow or not."
Should the FBI chose not to capitalize on Anonymous’ latest endeavor, they might be left with more than just a little explaining to do. In recent years, the online collective of international hacktivists have increasingly become the target of law enforcement agencies. This year’s highly-publicized arrest of Hector Xavier Monsegur, 28, a programmer that hacked for the Anonymous offshoot LulzSec under the handle “Sabu,” revealed that the FBI had infiltrated the group months earlier and had at least one mole working to rat out the rest of the group, with a membership believed to extend into the tens of thousands across all corners of the globe. According to a book released this week by Forbes’ Parmy Olson, WikiLeaks founder Julian Assange sought assistance with Anonymous and LulzSec last year and spoke directly with Sabu all while the hacker was working directly for the Federal Bureau of Investigation.
Authorities alleged that, before turning mole, Sabu was instrumental in Anonymous-led hacks of, among other firms, two agencies with governmental ties: Stratfor and HBGary Federal. In those instances, US agents charged Monsegur with compromising data from the company’s servers in an attempt to expose corruption within entities on Uncle Sam’s payroll; in the case of the Stratfor attack (which was released well after Sabu’s arrest), government-hired intel gatherers were linked to spying on Occupy Wall Street encampments.
After helping expose the government’s surveillance of peaceful protesters, Sabu stands to face life in prison. Pedophiles and predators, however, are tweeting en masse without seemingly any infiltration from law enforcement. More than 12 hours after Anonymous began posting the Twitter accounts of alleged predators, many of them are still active.
Immediately following the publishing of Sabu’s arrest in March, an FBI official close to the investigation told reporters that they were “chopping off the head of LulzSec” and said that the news would be “devastating” to the rest of Anonymous. Self-proclaimed Anons were quick to fire back, though, saying that it’s impossible to arrest and erode the meaning behind their message.
“We don't have a leader,” read one tweet from the YourAnonNews account. “A movement against authority without leaders drives authority insane; they can’t break down a movement by corrupting the leader,” they add.
Nearly three months later, Anonymous seems to be right. Judging by the recent hack of the US Department of Justice, the collective shows no sign of slowing down. It’s been seven months since Anonymous last tackled child predators and clearly that’s a battle still underway. Given their latest release, however, Anonymous might be better at policing the Web than any of the government agencies paid billions to protect children.
quote:'Leak it all!' Anonymous calls for Fight Club-style 'Project Mayhem-2012'
Anonymous are set to activate the dormant cells of a global 'Fight Club’ to battle corruption by calling on supporters to leak a massive cache of state and corporate secrets for the world to see.
“Imagine you purchase a USB drive. Imagine you take it to your work place. Imagine you collect evidence of illegality and corruption. Imagine together we expose all lies. Imagine we leak it all.”
Those ominous words scrolled across the crimson backdrop of a glowing Anonymous logo in a video released Tuesday by the hacktivist collective.
But instead of a Fight Club-inspired Project Mayhem bent on wiping the debt slate clean by bombing the credit card industry to the ground, Anonymous are set to disinfect the world one thumb drive at a time.
Fight Club was the 1999 film adaptation of the book of the same name. In it, disgruntled men engaged in bare-knuckle underground fights and anti-corporate sabotage to wage “spiritual war” against the modern era.
And while the first rule of Fight Club was not to “talk about Fight Club,” Anonymous hopes the "Leak it All" campaign will spread like wildfire.
During a 10 day period from 12-12-2012 to 12-21-2012, the collective says “the World will see an unprecedented amount of Corporate, Financial, Military and State leaks that will have been secretly gathered by millions of CONSCIENTIOUS citizens, vigilantes, whistle blowers and insiders worldwide.”
Due to the decentralized nature of the movement, it is difficult to tell exactly how much widespread support the campaign will gather over the next six months.
The Anonymous campaign could come as a response to the 2010 funding blockade against the whistleblower organization WikiLeaks. Last October, WikiLeaks founder Julian Assange said the banking blockade had destroyed 95% of WikiLeaks' revenues, forcing the organization to suspend operations.
However, despite its financial troubles, WikiLeaks began publishing The Global Intelligence Files – “more than five million emails from the Texas-headquartered 'global intelligence' company Stratfor” – this past February.
But with WikiLeaks on the rocks, the most recent Anonymous campaign could usher in a golden age of grassroots document disclosure and anti-corruption muckracking.
quote:“Hello, I Am Sabu ... ”
From a housing project on Avenue D, a hacker mastermind of Anonymous and LulzSec was out to upend many worlds. Including his own.
quote:Open Letter from Anonymous to Government of India
Anonymous writes an open letter to Government of India before nation wide protest on Saturday.
quote:Anonymous India
We are Anonymous, We are legion, We do not forgive, We do not forget, Expect us!
The Department of Telecom has ordered all internet service providers to block all file sharing websites, it's time for you to stand up and show that the corrupt government cannot stop you!
quote:Battle of the hacktivists: Anonymous vs. Telecomix
STOCKHOLM, Sweden — When a member of the hacker group Anonymous in February posted online the email addresses and passwords of Bashar al-Assad, the Syrian President, his wife Asma al-Assad, and countless other senior figures in the regime, it won plaudits worldwide.
But it didn’t much impress Telecomix, a rival "hacktivist" group that takes itself altogether more seriously.
“The Syrian battle had already gone from something that can be fought on the internet via hacked emails into a general civil war," says Martin Löwdin, a Telecomix activist. "Anonymous seem to think that we can still always fight all battles on the internet somehow.”
“There’s an ideological divide,” he shrugs. “We don’t really like the culture.”
I meet Löwdin late in the afternoon in a central Stockholm cafe he’s selected for its “awesome coffee.” In some ways he fits the hacker image. He goes by the code-name "mlowdi" online. He has a prominent tattoo of the infinity symbol. His netbook is plastered with hacker stickers. And he was up alone until 4 a.m. the previous night.
He shows me the chats streaming live from activists in Australia, the US and Europe on Telecomix’s message system, which he runs on a customized, Linux-based Nokia phone, loaded with open-source encryption technology.
“We’re not really that keen on nationality and real names and stuff like that,” he says of the group. “But there’s a core of maybe between 20 and 70 people pretty involved, some of them dropping out or dropping in depending on ordinary workload. And sometimes when there’s a lot of action, like when everything kicked off in Egypt, we had somewhere around 200 nicknames.
“We really had no plan, no agenda, no real organization. It’s just throwing things around and seeing what sticks. If people jump on a project, it’s a good project.”
Despite this anarchic approach, Telecomix is a fairly highbrow bunch, as interested in politics and philosophy as it is in programming.
Christopher Kullenberg, the group’s main founder, has just finished writing a PhD thesis on the theory of science. His 2010 book, "The Net Politics Manifesto," was reviewed in all Sweden’s serious newspapers.
Löwdin himself plans to soon start a PhD in rhetoric.
This perhaps explains the friction with Anonymous.
"There’s a lot of cross-over between Telcomix and Anonymous," says Löwdin. "A lot of us old-timers on the network, we get really pissed off when one of the chat servers that Anonymous uses goes down, because they sort of flood into our servers."
He cites the Tunisian uprising at the start of 2011 as an example of the difference in how the two groups work. Anonymous brought down the websites of the country’s prime minister and government. Telecomix instead disseminated encryption technology to Tunisian activists, helping them to communicate safely.
“Breaking into a system is one part, sure, but we don’t do that because we find it to be destructive, and it brings heat. If you want to help develop democracy and develop free speech you can’t just bring stuff down, you have to build stuff up, you have to create.”
Telecomix has won accolades that would embarrass Anonymous. Its co-founder Christopher Kullenberg was made Swede of the Year 2011 by Fokus Magazine, the Nordic country’s answer to Newsweek.
The magazine cited Telecomix’s work reopening the Egyptian internet for some 50 activists when the regime of Hosni Mubarak closed it down in January 2011.
It also commended the Telecomix operation last September, under which all internet users in Syria were redirected to an Arabic website instructing them on internet security.
“This is a deliberate, temporary Internet breakdown," read the message users were presented with. "Please read carefully and spread the following message. Your Internet activity is monitored.”
But it saved the most congratulations for what was arguably the group’s biggest coup: discovering that the Syrian regime was using internet-filtering equipment from Blue Coat Systems, a US vendor, to spy on — and then presumably arrest and torture — its dissident citizens.
Telecomix is still actively working with Syrian bloggers and activists, ensuring they can post and communicate safely, but the job is too time-consuming to cater to more than a handful of them.
“You can’t have tech support for 100 Syrians, because that would take 1,000 net activists to deal with it,” Kullenberg tells me over the phone from his home in Gothenburg. “It’s a continuous process, circumventing censorship is always a cat-and-mouse game, so if you find a method, this works for a few weeks, and then you have to find a new method.”
He’s conscious of the limits of online activism. “In Syria it’s actually very dangerous to use the internet, because they are actively looking for dissidents. Sometimes the advice is: ‘Don’t use the internet. It’s less optimal than some other forms of communication.’”
So Telecomix does more on the ground than Anonymous tends to.
Löwdin's father is a professor at Stockholm University’s computer science department, so he grew up knowing how to program.
Still, the night before I met him it turns out that he wasn’t hacking into the wee hours, but instead researching the laws of a country he’s visiting to teach political activists there how to secure their communications.
He wants to make absolutely sure he can’t be imprisoned for any of the encryption software he plans to bring.
“I’ve been teaching Belarusian dissidents as well, and Ukrainian democratic movement and people like that, going from place to place,” he says.
Telecomix dates its origins to a party at Kullenberg’s house in April 2009. Later that year, it had started helping activists protest a fixed Iranian election, and then in 2011 it got involved in the Arab Spring.
But that wasn't its original goal. It was set up initially to fight telecoms legislation proposed by the European Union. Kullenberg was one of a number of Swedish activists radicalized by the Swedish government’s crackdown on The Pirate Bay, a site that allowed users to share illegally ripped films and music.
“There was this new generation of net activists being shaped, and 2009, when there was the trial against the Pirate Bay, was perhaps the first time that this movement got together in a physical space because everybody went to the court house,” he explains.
Löwdin believes that with the upheaval of the Arab Spring now ebbing away, and Syria bogged down in revolution, the hacktivist mission has changed.
“The battle’s moved off the internet in many ways,” he says. “That’s why we’ve been focusing on pressuring corporations and pressuring governments into pressuring corporations.”
He believes that Telecomix should return to its roots as a campaign group against excessive government control and surveillance of the internet, both in the West and in the world’s dictatorships
Partly that means getting to the bottom of how Western surveillance technology gets into the hands of dictators. Blue Coat, for instance, is adamant it did not sell Syria any of the eight machines identified there. But it also means getting involved in fighting legislation in the European Parliament and US Congress.
Anonymous, meanwhile, continues to raise hackles. In mid-May, its activists hacked the US Department of Justice website and posted 1.7 gigabytes of its data online.
“We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us,” its activists wrote alongside the posting.
But it conceded that it had no idea what was in the data, or any focused goal in posting it beyond letting people “know the corruption in their government.” It’s exactly the kind of thing to make Telecomix try to keep its distance.
“Anomymous are kind of destructive,” says Löwdin. “We want to be more creative."
quote:Anon, but not alone: Anonymous helps its fallen brethren
Anonymous is an organization famous for its disorganization with no leaders or power structure. When it comes to helping those who are down, an outsider might expect that anons who fall behind are left behind. But when an anon is apprehended by the government for cybercrime, a support network springs up around him or her, thanks to the orchestrations of a subset of Anonymous called FreeAnons, the "Anonymous Solidarity Network." Members of FreeAnons help arrested anons in various ways, from sending them care packages while they're in jail to sending a volunteer to court to monitor their case.
The front-facing part of the FreeAnons networks consists of several sites dedicated to raising money for arrested or imprisoned anons like Topiary or Mercedes, as well as a general fund for smaller cases. The general fund, which has been accepting money since October, has collected only $3,780.88—a paltry sum considering the number of cases multiplied by the cost of bail and lawyers' fees (that amount represents "the majority of collected funds," Nancy Norelli, a Florida lawyer and the public face of FreeAnons told Ars). Norelli and Barton, an anonymous FreeAnons member (nick changed to protect the anon), told Ars that no one does much to promote the funds and solicit donations outside of the AnonOps IRC or a session on Radio AnonOps—the nature of the support cast doesn't exactly lend itself to a high-profile charity ball.
But time is a more frequent donation than money. Barton laid out a hypothetical case: "An anon gets into trouble and is arrested. We would gather information that would aid in their defense, might help them find an attorney. Work with said attorney in their fact gathering, [collecting] relevant information or evidence if needed, send our persecuted anon a care package, perhaps help them improve their quality of life by adding to their prison fund."
Norelli and Barton went on to explain that while "the government wants [the anon] to feel alone… we stand with our brothers all the way." FreeAnons has "a number of tools" to help them do all these things while remaining anonymous, Barton said. Having a public and authorized proxy like Norelli helps.
In addition to helping with fact-finding and legal cases, FreeAnons also keeps in contact with an arrested anon's friends and family. When the anon has court hearings, FreeAnons will send a volunteer to each one to provide "real-time reporting of what is happening" to AnonOps' IRC, someone who is either "public or willing to take a risk." Barton said the volunteer anon uses a "discreet" tool (presumably a cell phone) that sends updates via SMS.
Given the faceless, structureless sea that is Anonymous, it may be surprising to learn that outed members aren't tossed overboard and forgotten, that anyone might care about anyone else. "We are the public library… the Red Cross," Barton said. "There are those who would see a new weak spot and try to cut it out, but when you look at the totality of our missions, we are glue that helps bind everyone together in certain ways."
Of course, there may be a measure of self-defense to this approach: if compromised anons keep receiving support from their fellow anons, complete cooperation and submission to the government doesn't seem like the only option.
Norelli and Barton pointed out that the support network is fairly large. An educational bot on some of AnonOps' IRC channels delivers a tutorial on laws regarding computer activity, how to stay anonymous on the Internet, and similar lessons (educating anons on how to be anons is one of FreeAnons' four core aims). The bot has been run an average of 36 times every day in the last year, for a total of over 13,000 possible individuals educated in the ways of FreeAnons.
Even upon conviction, an anon lost to the legal system is not lost forever. When asked whether anons who have been compromised are welcomed back, Norelli and Barton said that it's not impossible for them to regain anonymity. "We see nicks here we know have had contact with law enforcement," said Norelli.
Barton adds, "becoming anonymous is something that can be reestablished… the Internet and technology are more our world than it is theirs. This is a place where, ultimately, ideology speaks louder than stated affinity… All people have value."
It must be the ideology ("freedom" and "liberty" were often repeated) keeping the FreeAnons network together; it's certainly not the funding. Norelli expressed more fondness for good sentiments than cash: "lots of people send in a $5 donation and a note, and those are awesome… the notes are really touching."
quote:
quote:Field Manual (FM) 3-05.301 describes the tactics, techniques, and procedures (TTP) for the implementation of United States (U.S.) Army Psychological Operations (PSYOP) doctrine presented in the higher-level publication, FM 3-05.30, Psychological Operations. FM 3-05.301 provides general guidance for commanders, staffs, and Soldiers who plan and conduct PSYOP across the range of military operations. The TTP in this manual are presented within the framework of the seven-phase PSYOP process, a mainstay for effective PSYOP executed at the tactical, operational, and strategic levels.
FM 3-05.301 is the principal reference for the PSYOP process. The contents of this manual supersede the discussion of the PSYOP process in FM 3-05.302, Tactical Psychological Operations Tactics, Techniques, and Procedures (28 October 2005). Any mention of the PSYOP process in other preceding doctrine or training literature should be validated by the contents of FM 3-05.301. This manual incorporates updated organizational structures, terminology, and capabilities to provide PSYOP Soldiers with the latest guidance to support a broad range of missions. This manual describes procedures and strategies derived from applied scientific and academic disciplines in an effort to improve the efficacy of the PSYOP process. These TTP are designed to facilitate the successful execution of each phase of the process: planning; target audience analysis; series development; product development and design; approval; production, distribution, and dissemination; and evaluation.
The PSYOP community, in general, is the intended audience for this manual. Members of the tactical, regional, and dissemination PSYOP battalions should find the information particularly useful. Written to give PSYOP officers, noncommissioned officers (NCOs), enlisted Soldiers, and civilians standardized PSYOP doctrine, FM 3-05.301 is a comprehensive how-to guide that focuses on critical PSYOP tasks, duties, and responsibilities.
quote:Anonymous takes down MTNL website
The hacker-group Anonymous has struck again in India. This time the victim is the MTNL website. The group posted on their website, saying, ”We are against Internet Cencorship. Instead of blocking few URLs the ISP blocked the whole domain of various file sharing websites. The HC Madras, DoT didn’t isssue any list of websites to be blocked still ISP supported internet censorship.”
MTNL's corporate website could not be accessed, following the attack since afternoon and officials said efforts were underway to restore it. MTNL Delhi, Deputy - GM (Internet), Deepak Sharma said it was not hacking but 'denial of service attack' under which the server is unable to provide services to the customers.
Anonymous has called for non-violent protests across several cities in India on June 9 to protest against what it alleges as ‘censorship’ of the internet. It accused the department of telecom of instructing the Internet Service Providers (ISPs) to block file-sharing websites unilaterally, while the courts had ordered blocking of certain websites.
As part of the protests, Anonymous has also asked all citizens to wear Anonymous’ (Fawkes) mask, dress completely in black and step out on the streets to protests.
This is the latest in a series of such attacks in the over the past month by the group, which has targeted the websites of the Internet Service Providers Association of India, the Trinamool Congress and Reliance Communications.
The government has so far refrained from making any comments on the concerted campaign by Anonymous over the last 15 days.
quote:
quote:Blue Cabinet is a working wiki project to document vendors and manufacturers of surveillance equipment that are used in dictatorships and democracies around the internets.
The purpose of this page is to create an overview and to share resources between Telecomix and other projects out there that have the same goal as us; to name, shame and expose those who profit on selling the surveillance equipment that enables the intimidation, harassment and killing of innocent people.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |