Anonymous en Occupy Wall Str.:quote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:From a single hashtag, a protest circled the world
(Reuters) - It all started innocuously enough with a July 13 blog post urging people to #OccupyWallStreet, as though such a thing (Twitter hashtag and all) were possible.
quote:Gabriella Coleman Assistant Professor of Media, Culture, and Communication
Trained as an anthropologist, Gabriella (Biella) Coleman examines the ethics of online collaboration/institutions as well as the role of the law and digital media in sustaining various forms of political activism. Between 2001-2003 she conducted ethnographic research on computer hackers primarily in San Francisco, the Netherlands, as well as those hackers who work on the largest free software project, Debian. Her first book, "Coding Freedom: The Aesthetics and the Ethics of Hacking" is forthcoming with Princeton University Press and she is currently working on a new book on Anonymous and digital activism. She is the recipient of numerous grants, fellowships, and awards, including ones from the National Science Foundation, the Woodrow Wilson Foundation, the Ford Foundation, the Social Science Research Council and the Institute for Advanced Study.
quote:
quote:Our Weirdness Is Free
The logic of Anonymous—online army, agent of chaos, and seeker of justice.
by Gabriella Coleman, [01.13.2012]
TIMELINE: The Evolution Of The 'Anonymous' Internet Hacktivist Groupquote:Anonymous And The War Over The Internet
This article is the first in a two-part series tracing the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
The Huffington Post, Saki Knafo. Posted: 1/30/12 12:20 PM ET | Updated: 2/1/12 07:36 PM ET
quote:Anonymous 'hactivist' goes public on cyber protests
Peter Fein is a self-described "hacktivist" and member of the international hacker group Anonymous.
This loose collection of hackers has gained notoriety by aiming DDoS (distributed denial of service) attacks on government and corporate websites since 2010. The targets have ranged from the US Department of Justice to Sony and Visa.
As befits the name Anonymous, most members have chosen to keep their identities secret - especially after dozens of alleged hackers were arrested in a series of government crackdowns in the US and Europe.
Mr Fein, however, has decided to go public about his involvement. He insists he is not involved in anything illegal, claiming that he simply helps bring together activists who want to battle government surveillance and attempts to police the internet.
The activist from Chicago is also involved with another hacker group called Telecomix - an international network of people providing internet access to pro-democracy protesters in countries such as Egypt, Libya and Syria.
Mr Fein says he is not a spokesman for either group and that Telecomix's achievements are the result of countless hours of work from hundreds of members.
In an exclusive interview with the BBC's Matt Danzico he explains what he believes Anonymous is trying to achieve - and why he decided to go public.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Firefox security bug Tor Browser Bundle
A user has discovered a severe security bug in Firefox related to websockets bypassing the SOCKS proxy DNS configuration. This means when connecting to a websocket service, your Firefox will query your local DNS resolver, rather than only communicating through its proxy (Tor) as it is configured to do. This bug is present in current Tor Browser Bundles (2.2.35-9 on Windows; 2.2.35-10 on MacOS and Linux).
To fix this dns leak/security hole, follow these steps:
Type “about:config” (without the quotes) into the Firefox URL bar. Press Enter.
Type “websocket” (again, without the quotes) into the search bar that appears below "about:config".
Double-click on “network.websocket.enabled”. That line should now show “false” in the ‘Value’ column.
See Tor bug 5741 for more details. We are currently working on new bundles with a better fix.
quote:
quote:"We hebben recent gezien dat duizenden mensen bereid zijn te protesteren tegen regels waarvan ze denken dat die de openheid en innovatie van het internet beperken. Dit is een sterkte nieuwe politieke stem. En die strijd voor openheid verwelkom ik, zelfs al ben ik het niet eens met alles wat er over dit onderwerp gezegd wordt. () Waarschijnlijk zal de wereld het nu zonder SOPA en ACTA doen. Nu moeten we oplossingen vinden om het internet tot een plek van vrijheid, openheid en innovatie te maken voor alle burgers, niet alleen voor de techno avant-garde."
quote:
quote:You've heard of those hacktivists wearing Guy Fawkes masks and taking down Scientology websites and going to cyber-war with PayPal. But with the documentary We Are Legion, you finally learn about the motives and missions at the heart of Anonymous.
In a compelling and insightful documentary, a profile of the powerful Anonymous hacking collective shows a different side of the global force known for battling the Church of Scientology and opponents of WikiLeaks. Some may see Anonymous members as skilled but criminal hackers living in their parents' basements, but We Are Legion: The Story of the Hacktivists peels back the curtain to reveal a more human story: these are angry and passionate coders taking to their virtual street corner to protest for free speech and Internet freedom.
Brian Knappenberger's 90-minute film, debuting at Toronto's Hot Docs Film Festival, traces the history of hacktivism and online forums, telling us in great detail how pulling pranks online has long been a steadfast tradition that eventually evolved into a more serious form of dissidence. Born out of the 4chan community, Anonymous members first started trying to silence Neo-Nazi radio hosts and Church of Scientology groups. The latter fight gave Anonymous worldwide attention, partially thanks to their real-life protests at almost every Scientology building across the world. This was the hacker getting into the sunlight to finally meet colleagues they've known online for years.
A parade of experts and insiders layer the doc with insight into what motivates Anonymous hackers to go toe-to-toe with the likes of Mastercard or the Australian government: they want to combat Net censorship. Getting Anonymous members to discuss why they do what they do was a real coup for the filmmakers, because these hackers don't often speak so freely to media.
We learn a lot about their core beliefs: They believe in the right to spread information freely (WikiLeaks) and they help other groups spread the word about their own protests (Occupy Wall Street). They oppose governments such as Egypt who bar citizens from accessing the Web. But their hacking work comes with a price, We Are Legion tells us: 14 Anonymous members have been arrested for their alleged crimes, which include lobbing massive DDoS attacks against websites for Scientology, PayPal, MasterCard and more.
The film leaves us with an important question: As more protests are being organized and carried out online, should governments grant these netizens the right to conduct virtual sit-ins? If Occupy protesters can legally block a city intersection, why can't Anonymous members do the same online, shutting down the traffic of their targeted sites?
Whatever you think about hackers fighting for their voices to heard, We Are Legion is a newsworthy film documenting the Internet's first army, who will continue to be relevant in our wired world.
Read more: http://www.digitaljournal.com/article/324105#ixzz1tv3o5RFE
Het artikel gaat verder.quote:FBI: We need wiretap-ready Web sites - now
CNET learns the FBI is quietly pushing its plan to force surveillance backdoors on social networks, VoIP, and Web e-mail providers, and that the bureau is asking Internet companies not to oppose a law making those backdoors mandatory.
The FBI is asking Internet companies not to oppose a controversial proposal that would require firms, including Microsoft, Facebook, Yahoo, and Google, to build in backdoors for government surveillance.
In meetings with industry representatives, the White House, and U.S. senators, senior FBI officials argue the dramatic shift in communication from the telephone system to the Internet has made it far more difficult for agents to wiretap Americans suspected of illegal activities, CNET has learned.
The FBI general counsel's office has drafted a proposed law that the bureau claims is the best solution: requiring that social-networking Web sites and providers of VoIP, instant messaging, and Web e-mail alter their code to ensure their products are wiretap-friendly.
"If you create a service, product, or app that allows a user to communicate, you get the privilege of adding that extra coding," an industry representative who has reviewed the FBI's draft legislation told CNET. The requirements apply only if a threshold of a certain number of users is exceeded, according to a second industry representative briefed on it.
The FBI's proposal would amend a 1994 law, called the Communications Assistance for Law Enforcement Act, or CALEA, that currently applies only to telecommunications providers, not Web companies. The Federal Communications Commission extended CALEA in 2004 to apply to broadband networks.
quote:
quote:Major General Jonathan Shaw says 'it was a surprise to people quite how vulnerable we are'
quote:Computer hackers have managed to breach some of the top secret systems within the Ministry of Defence, the military's head of cyber-security has revealed.
Major General Jonathan Shaw told the Guardian the number of successful attacks was hard to quantify but they had added urgency to efforts to beef up protection around the MoD's networks.
"The number of serious incidents is quite small, but it is there," he said. "And those are the ones we know about. The likelihood is there are problems in there we don't know about."
Government computer systems come under daily attack, but though Shaw would not say how or by whom, this is the first admission that the MoD's own systems have been breached.
The Serious Organised Crime Agency, took its website offline on Wednesday night after becoming the target of a cyber-attack. A spokesman said the attack did not pose a security risk to the organisation.
Shaw, a veteran of the Falklands and Iraq wars, also said the MoD had to be prepared to embrace unconventional and "wacky" ideas if the military wanted to catch up with, and then stay ahead of, rivals in the cybersphere. Getting "kids on the street" to help the military was vital, he said.
"My generation … we are far too old for this; it is not what we have grown up with. Our natural recourse is to reach for a pen and paper. And although we can set up structures, we really need to be on listening mode for this one."
He added: "If we want to work the response, if we want to know really what is happening, we really have to listen to the young kids out in the street. They are telling us what is happening out there.
"That will pose a real challenge to us. This thing is moving too fast. The only people who spot what is happening are people at the coal face and that is the young kids. We have to listen to them and they have to talk to us."
A former director of UK special forces, Shaw, 54, said he thought the military could learn a trick or two from firms such as Facebook.
The company has a "white hat" programme in which hackers are paid rewards for informing them when they have found a security vulnerability.
Nine people in the UK have been paid a total of $11,000 (£6,785) for working with Facebook. Shaw said this was the kind of "waacky idea we need to bring in".
Shaw has spent the last year reviewing the MoD's approach to cyber-security, and the kind of cyber-capability the military will need in the future.
He says next year's MoD budget is expected to include new money for cyber-defence – an acknowledgment that even during a time of redundancies and squeezed budgets, this is now a priority.
The general said the MoD wasn't "doing badly … but we could do a hell of a lot better. We will get there, but we will have to do it fast. I think it was a surprise to people this year quite how vulnerable we are, which is why the measures have survived so long in the [budget] because people have become aware of the vulnerabilities and are taking them seriously."
China and Russia have been accused of being behind most of the sophisticated cyber-attacks, with state-sponsored hackers targeting military secrets from western governments, or intellectual property from British and American defence firms.
Shaw refused to point the finger at any nation, but admitted the UK was "trying to engage the Chinese on rules of the road in cyberspace", pressing the argument that new international treaties are not necessary to stop this kind of theft and espionage.
Shaw said the number of attacks was "still on an upward curve … and the pace of change is unrelenting".
In his last interview before retiring, Shaw said the UK had to develop an array of its own cyber-weapons because it was impossible to create entirely secure computer systems.
"It is quite right to say that pure defence, building firewalls, will not keep the enemy out. They might be inside already … there is no such thing as total security. You have to learn to live with certain insecurities.
"One needs to engage in internal defence and be quite aggressive about it. And if you are going to manoeuvre in cyberspace, that is something that obviously involves action across the spectrum."
Shaw said he intended to "mainstream" cyber-capabilities across the MoD by 2015. This included ensuring military commanders had a range of cyber-options to use from a "golf bag" of weapons systems.
But he thought cyber-weapons would complement rather than replace more conventional weapons.
"As new capabilities come on the block, you reassess whether you need the old ones, whether they are complimentary or duplicatory.
"People have asked me whether cyber-weapons will make conventional weapons redundant. Absolutely not. A hard bomb is actually quite a good cyber-weapon because it can take out a broadcasting station, take out a server."
The military top brass, he said, had been the "hardest to convince" about the cyber-threat, because high-ranking officers tend to be set in their ways. "We are the wrong guys to deal with this."
Shaw said it still surprised him that the MoD's headquarters in Whitehall "is the only building, main defence security establishment, where you don't leave your mobile phones and Ipad in a box outside your office … people's personal behaviours are not good enough. When we look at cyber-security in the MoD, we are looking at preserving intellectual property and our networks and stopping people spying on us.
"The real challenge is how we secure our supply chains. We are dependent on industry for our technological edge … and preserving that intellectual property is absolutely vital."
He added: "Cyber implies something technical. To the average person in the street, cyber means it is someone else's problem. But it is everyone's problem. We can't just leave it to the techies."
An MoD spokesman said: "The MoD takes all possible precautions to defend our system from attack from both unsolicited, for example 'spam' email, and targeted sources. It would be both misleading and naïve to assume that any system is 100% secure against all possible threats which is why we take additional steps to detect suspicious activity within our own systems.
"We also ensure that our most sensitive networks are not connected to the internet and have additional physical and technical measures in place to defend them."
quote:
quote:Members of the online hacktivist collective known as "Anonymous," are targeting Activision CEO Eric Hirshberg after the trailer for upcoming videogame "Call of Duty: Black Ops 2" implied that Anonymous hackers would be the game's enemy. Members of Anonymous have already found Hirshberg's personal information and published it online on text-sharing website AnonPaste.
The message begins by accusing Activision of opening itself up to attack from Anonymous: "So Activision Why you done goofed? We are not the enemy but, well you want it you got it. Eric Hirshberg DOX. #OpPirateAllActivision."
quote:A number of Anonymous members worried that the trailer and the upcoming game may be part of a larger smear campaign launched by the US government to portray Anonymous as a nefarious organization and a threat to the American people.
quote:
quote:Hacktivist members of the online collective called "Anonymous" targeted the websites of the United Kingdom Supreme Court and the CIA on Friday, responding to efforts by both governments to stifle internet freedom. Anonymous has named its new campaign to fight online censorship "Operation The Pirate Bay" (TPR) and "Operation Trial At Home."
On Friday afternoon both websites were knocked offline and inaccessible to the public, most likely with a DDoS attack. The cyber-attack comes just days after the British high court ruled that Internet service providers must block all access to The Pirate Bay, a popular file sharing website. Since the ban, traffic to the Pirate Bay has in fact increased by 12 million, while the website has defied the UK ban and offered users tips on how to get around the block.
In a video released by Anonymous promoting Operation TPR, an electronically voiced narrator equates the UK government's attempts to block The Pirate Bay to the US government's attack on Megaupload.com and the file-sharing website's founder Kim Dotcom.
The minute-long video ends with a play on Anonymous' typical send-off: "We do not forgive censorship. We do not forget the corrupted ways of our government."
This online skirmish between Anonymous and the US and UK governments comes in the midst of a much larger battle over the fate of internet privacy, While the controversial CICSPA bill, which would allow the government to monitor everyone's internet, is making its way through congress.
Meanwhile, according to Al Jazeera, an equally controversial plan promoted by British Prime Minister David Cameron, would allow his government to monitor every single text message and phone call made in the country. Internet providers would also be forced to install software allowing law enforcement to access every internet user's IP address, email address books, when and to whom every email is sent in real time. The bill would also force social media sites and other online services to comply with any and all date requests.
Anonymous members coordinated their attacks on Friday through Twitter, using specific hastags to organize their posts.
quote:
quote:When the Internet was created, decades ago, one thing was inevitable: the war today over how (or whether) to control it, and who should have that power. Battle lines have been drawn between repressive regimes and Western democracies, corporations and customers, hackers and law enforcement. Looking toward a year-end negotiation in Dubai, where 193 nations will gather to revise a U.N. treaty concerning the Internet, Michael Joseph Gross lays out the stakes in a conflict that could split the virtual world as we know it.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:
Interview op de site.quote:At long last, the great online music war – between record labels and copyright-holders on one side, and proponents of ‘free’ on the other – might just be hurtling towards some kind of endgame. This week, the High Court ordered internet service providers to block access to file-sharing site The Pirate Bay. Grooveshark’s days of cheerful copyright infringement appear to be numbered. In America, the legal case against Megaupload gathers pace.
Can legislation ever stamp out music piracy completely? Of course not. But dont be fooled by open web evangelists like this guy who claim its pointless to even try to tackle file-sharing. Forget the ISPs. If it wanted to, Google could cut the flow of traffic to the most high-profile offenders in a shot. They do it with editorial sites all the time, tweaking the pagerank levers, dispensing punishment or reward. Such a measure wouldnt eliminate piracy. But it would reduce it dramatically.
Google spent $5m lobbying the US government in 2011. Its in their commercial interest to bang the drum for free, because they can sell ads next to all those millions of searches for pirated MP3s. Just dont expect them to channel any of those profits back into content creation. Ditto Apple. Ditto Spotify, whose CEO is now supposedly worth £190m. In the tech world, money flows into the pockets of investors and shareholders, not musicians.
Indeed its one of the great puzzles of the digital age that gigantic technology companies have generally been portrayed as the good guys, on the side of the consumer, while record companies are regarded as greedy and rapacious. Labels invest huge amounts in A&R, taking gambles on new acts, often at ruinous expense. iTunes drove almost £1bn in revenue last year. Will Apple ever sign a new artist? Dont hold your breath.
So the battle rages on. The latest entrant into the melee is Anontune, a new and mysterious music site, basically the anti-Spotify, in that it draws music from a number of different sources on the web. It is nominally associated with the Anonymous movement. Anonymous is a loose affiliation of hacktivists, best known for initiating Operation Payback, a string of cyber-attacks on organisations that have publicly condemned music piracy, from Universal Music to RIAA.
Billing itself as a new and open social music platform, at first glance Anontune would appear to be the ultimate expression of freetard logic. Its mission statement is full of Up yours, The Man!-type bluster, intoned in a spooky-wooky, bad-guy-from-Saw voice: It has come to our attention that the state of online music has been sabotaged by the fat hands of corporate involvement.
NME Blogs - NME Blogs - NME Blogs
Inside Anontune - The Hacktivists' Answer To Spotify
By Luke Lewis
Posted on 04/05/12 at 07:00:55 pm
At long last, the great online music war between record labels and copyright-holders on one side, and proponents of free on the other might just be hurtling towards some kind of endgame. This week, the High Court ordered internet service providers to block access to file-sharing site The Pirate Bay. Groovesharks days of cheerful copyright infringement appear to be numbered. In America, the legal case against Megaupload gathers pace.
Can legislation ever stamp out music piracy completely? Of course not. But dont be fooled by open web evangelists like this guy who claim its pointless to even try to tackle file-sharing. Forget the ISPs. If it wanted to, Google could cut the flow of traffic to the most high-profile offenders in a shot. They do it with editorial sites all the time, tweaking the pagerank levers, dispensing punishment or reward. Such a measure wouldnt eliminate piracy. But it would reduce it dramatically.
Google spent $5m lobbying the US government in 2011. Its in their commercial interest to bang the drum for free, because they can sell ads next to all those millions of searches for pirated MP3s. Just dont expect them to channel any of those profits back into content creation. Ditto Apple. Ditto Spotify, whose CEO is now supposedly worth £190m. In the tech world, money flows into the pockets of investors and shareholders, not musicians.
Indeed its one of the great puzzles of the digital age that gigantic technology companies have generally been portrayed as the good guys, on the side of the consumer, while record companies are regarded as greedy and rapacious. Labels invest huge amounts in A&R, taking gambles on new acts, often at ruinous expense. iTunes drove almost £1bn in revenue last year. Will Apple ever sign a new artist? Dont hold your breath.
So the battle rages on. The latest entrant into the melee is Anontune, a new and mysterious music site, basically the anti-Spotify, in that it draws music from a number of different sources on the web. It is nominally associated with the Anonymous movement. Anonymous is a loose affiliation of hacktivists, best known for initiating Operation Payback, a string of cyber-attacks on organisations that have publicly condemned music piracy, from Universal Music to RIAA.
Billing itself as a new and open social music platform, at first glance Anontune would appear to be the ultimate expression of freetard logic. Its mission statement is full of Up yours, The Man!-type bluster, intoned in a spooky-wooky, bad-guy-from-Saw voice: It has come to our attention that the state of online music has been sabotaged by the fat hands of corporate involvement.
That kind of thing. I wanted to talk to the shadowy folk behind Anontune, to find out if they really thought the artistic world would be a better place without any copyright laws in place to ensure creative people get paid for their work. However, the answers I got surprised me. In this debate, reducing things to an emotionally charged dichotomy freetards in one corner, major label fatcats in the other helps nobody. And Anontunes aims are more reasoned and nuanced than you might think.
quote:
quote:There were vows, a kiss, and a crowd full of supportive friends. But there was very little else normal about the first couple married as part of Sweden's information and file-sharing religion.
Believers of Kopimism, which became an officially-recognized religion in Sweden earlier this year, think information sharing is a vital part of human existence—regardless of law. With more than 6,000 followers and branches in 18 countries, including the United States, perhaps a Kopimist wedding was inevitable.
[Learn More About the Tenets of Kopimism]
The couple—a Romanian woman and an Italian man—were married late last month at Belgrade's SHARE conference, a three day festival celebrating new Internet and media developments.
The presiding priest, or Kopimistic "Op" wore a Guy Fawkes mask as a computer read vows and some of Kopimism's central beliefs aloud.
"We are here to announce a new pair of noble peers. Copying of information is simply right. Dissemination of information is ethically right. Copying and remixing information communicated by another person is seen as an act of respect," it said. "Do you want to share your love, your knowledge, and your feelings with [the bride] as long as that information exists?"
The couple kissed and it became official under the Kopimist religion. In a statement on its official website, Isak Gerson, the 20-year-old founder of Kopimism, wrote that a Kopimist wedding was "unavoidable."
"Hopefully, they will copy and remix some DNA-cells and create a new human being," he wrote. "That is the spirit of Kopimism. Feel the love and share that information. Copy all of its holiness."
quote:
quote:De Eerste Kamer heeft vandaag de nieuwe Telecomwet aangenomen. Daarin is ondermeer netneutraliteit geregeld: providers mogen websites of diensten niet meer blokkeren of belemmeren. Daarnaast steunt de Kamer een wet die betere bescherming tegen cookies biedt.
Dat bleek vanavond na een lang debat over de Telecomwet. Een meerderheid van VVD, PvdA, CDA en D66 stemde voor de wet. Vorig jaar stemde de Tweede Kamer al in meerderheid voor de wet, maar de Eerste Kamer moest zich er nog over buigen.
Netneutraliteit
De discussie over netneutraliteit draait om de vraag of providers specifieke vormen van internetverkeer met voorrang mogen behandelen, en andere mogen wegfilteren. De christelijke partijen vinden dat filtering op ideologische gronden bij uitzondering mogelijk zou moeten zijn. Minister Maxime Verhagen zegde toe een nieuw wetsvoorstel in te dienen waarin een dergelijke mogelijkheid is opgenomen.
Na Chili is Nederland nu het tweede land ter wereld dat netneutraliteit wettelijk heeft vastgelegd. In Nederland laaide de discussie over netneutraliteit vorig jaar op, nadat provider KPN had laten weten geld te willen gaan vragen voor het gebruik van WhatsApp, een internetdienst waarmee gebruikers gratis kunnen sms'en. Met de nieuwe Telecomwet kan KPN dat niet meer doen.
Cookies
In de nieuwe Telecomwet is ook vastgelegd dat de privacy van internetters beter beschermd moet worden als het gaat om cookies. Dat zijn bundeltjes van gegevens over de gebruiker - zoals bijvoorbeeld het surfgedrag - die zonder dat de gebruiker het merkt worden verstuurd. Ze kunnen worden gebruikt om bijvoorbeeld wachtwoorden te onthouden, maar ook om de gebruikers gerichte advertenties voor te schotelen.
Dank je wel en graag gedaan.quote:Op dinsdag 8 mei 2012 01:36 schreef PKRChamp het volgende:
Even een veer in Papierversnipperaar zijn kont steken, goed bezig pik!
quote:Op dinsdag 8 mei 2012 01:36 schreef PKRChamp het volgende:
Even een veer in Papierversnipperaar zijn kont steken, goed bezig pik!
quote:
quote:Some hackers aim to free the flow of information, while others aim to stifle it. The Pirate Bay has taken a moment to remind the hacker group Anonymous of the difference.
Anonymous has been launching a series of distributed denial of service attacks that took down the website of Virgin Media Wednesday following a court order that British internet service providers like Virgin must block access to the PirateBay.org, one of the world’s most popular source of pirated downloads.
The Pirate Bay, unexpectedly, spoke out Wednesday afternoon against the Anonymous attacks on its behalf. “We’d like to be clear about our view on this: We do NOT encourage these actions,” the Pirate Bay’s administrators wrote on its Facebook page. “We believe in the open and free internets, where anyone can express their views. Even if we strongly disagree with them and even if they hate us. So don’t fight them using their ugly methods. DDOS and blocks are both forms of censorship.”
Since the order to block the Pirate Bay was announced, the site has been organizing a campaign of proxy servers it called “The Hydra Bay,” linking on its home page to instructions of how to create a proxy for the site that circumvents the British carriers’ block.
The Pirate Bay’s advice to Anonymous suggested they join that proxy effort or try something else more proactive, like supporting the artists who now advertise with the Pirate Bay under its “Promo Bay” project. ”If you want to help; start a tracker, arrange a manifestation, join or start a pirate party, teach your friends the art of bittorrent, set up a proxy, write your political representatives, develop a new p2p protocol, print some pro piracy posters and decorate your town with, support our promo bay artists or just be a nice person and give your mom a call to tell her you love her.”
One sub-group of Anonymous known as the People’s Liberation Front also attacked the branch of Anonymous attacking British ISPs, writing on that “We strongly condemn the attack on Virgin and UK ISPs as it violates the 2nd principle of Anonymous to NEVER attack infrastructure.”
A Twitter feed called Anonymous UK, which has been touting the attacks against Virgin and others, responded “Anonymous… Principles? What?”
“Virgin Media aren’t ideal targets, I agree,” the same feed wrote earlier in the day. “But I’m not the leader of Anonymous. Cry more.”
The Pirate Bay’s stance against Anonymous contrasts with that of WikiLeaks early last year, when Anonymous launched a series of website takedowns against Visa, Mastercard, Paypal, Amazon and others for their payment embargo against WikiLeaks and other actions in opposition to the secret-spilling group. “We neither condemn nor applaud these attacks,” spokesperson Kristinn Hrafnsson wrote at the time. “We believe they are a reflection of public opinion on the actions of the targets.”
quote:
quote:The battle over Occupy Wall Street protester Malcolm Harris's tweets is still going, but now he has Twitter on his side. Harris, who was arrested with hundreds of others on the Brooklyn Bridge last year, was told in April that he could not block a subpoena for his since-deleted messages, which prosecutors say show he was "well aware of the police instructions, and acted with the intent of obstructing traffic on the bridge," because they belong to the company. But Twitter is maintaining that Harris actually owns his content, so they should not be forced to turn it over. "Yesterday we filed a motion in NYC to defend a user's voice," Twitter's legal counsel tweeted yesterday. And so Big Brother must be trained to jump some hurdles, at least.
quote:
quote:Whether viewed as heroes or villains, much of what is stated about Anonymous is exaggeration.
quote:Gabriella Coleman is the Wolfe Chair in Scientific and Technological Literacy in the Department of Art History & Communication Studies at McGill University.
quote:While government officials and law enforcement are painting Anonymous as one of HL Mencken's "imaginary goblins" poised to menace the public, it's worth noting that national governments around the world have aspired to control the internet, and have been developing statutes that erode individual rights and privacies, long before this entity came to prominence. Anonymous is more a reaction to these trends than a cause. The brutal, depressing and dire fact of the matter is that an expansive surveillance state is not here to come but is already in our midst. The surveillance state is so well entrenched that if Anonymous were to vanish tomorrow, or never had happened in the first place, it is doubtful that the trajectory of the expansion of the surveillance state would be deterred. It seems misplaced, even disingenuous, at this juncture, to blame Anonymous' actions for increasing the rate at which governments and security companies seek to control the internet, private data, and online freedoms.
quote:Even if spectacle alone is insufficient to engender political change, it is hard to overstate its importance for publicising issues and clarifying political stakes. With Anonymous, it is not simply that their DDoS tactics dramatise specific issues, such as with their campaign in the winter of this year against the Anti-Counterfeiting Trade Agreement. It is that in their totality - as a masked entity bearing the name Anonymous - it relays an urgent message about anonymity to contemplate. Given the contemporary reality of a corporate and state controlled surveillance apparatus, Anonymous stands out, compels, and enchants for a very particular reason: it has provided a small but potent oasis of anonymity in the current expansive desert of surveillance, much like the one quite literally being built in the Utah desert right now by the NSA.
quote:
quote:The Russian branch of hacker group Anonymous is claiming credit for shutting down the websites of the Kremlin and Russian President Vladimir Putin using distributed denial-of-service (DDoS) attacks.
The websites were unavailable on May 9 due to DDoS attacks, according to news reports. In a tweet, the Russian branch of Anonymous proclaimed that the Kremlin’s website, kremlin.ru, was taken down.
Anonymous said in a Pastebin post that the attacks were to protest the inauguration of President Putin following allegations of vote tampering in the presidential elections.
According to RT.com, the Kremlin press service confirmed its websites were attacked by hackers: “We received threats from Anonymous several days ago but we can’t confirm it’s exactly this group that attacked the Kremlin.ru website. At the moment we can’t establish who’s behind the attack. Unfortunately we live at a time when technology security threats have mounted, but we have the means to resist them.”
Commenting on the attacks, Ash Patel, country manager for UK & Ireland for Stonesoft, said that “with a group such as Anonymous, one can never be certain as to who exactly is behind the cyberattack. For some time now, Anonymous has been attacking the sites of many government bodies and for that reason, there’s no denying that one motivation behind the attack on the Kremlin’s websites is political.”
quote:The House That Fox Built: Anonymous, Spectacle and Cycles of Amplification
This article focuses on 4chan’s /b/ board, a—if not the—pillar of online trolling activity. In addition to chronicling the history of the site, as well as the emergence of the nebulous collective known as Anonymous, the article considers the ways in which early media representations of and subsequent reactions to trolling behaviors on /b/ helped create and sustain an increasingly influential subculture. Echoing Stanley Cohen’s analysis of moral panics, the article goes on to postulate that trolls and mainstream media outlets, specifically Fox News, are locked in a cybernetic feedback loop predicted upon spectacle; each camp amplifies and builds upon the other’s reactions, thus entering into an unintended but highly synergistic congress.
quote:
Interview op de site.quote:Christopher Doyon, a.k.a. Commander X, sits atop a hillside in an undisclosed location in Canada, watching a reporter and photographer make their way along a narrow path to join him, away from the prying eyes of law enforcement.
It’s been a few weeks of encrypted emails back and forth, working out the security protocol to follow for interviewing Doyon, one of the brains behind Anonymous, now a fugitive from the FBI.
Doyon, who readily admits taking part in some of the highest-profile hacktivist attacks on websites last year — from Tunisia to Orlando, Sony to PayPal — was arrested in September for a comparatively minor assault on the county website of Santa Cruz, Calif., where he was living, in retaliation for the town forcibly removing a homeless encampment on the courthouse steps.
The “virtual sit-in” lasted half an hour. For that, Doyon is facing 15 years in jail.Or at least he was facing 15 years in jail, until he crossed the border into Canada in February to avoid prosecution, using what he calls the new “underground railroad” and a network of safe houses across the country.
Thanks to his indictment, Doyon is one of the few Anonymous members whose real name is now publicly known.
But as the leader of the People’s Liberation Front — a hacker group allied with Anonymous — and the second-most wanted information activist after WikiLeaks’ Julian Assange, he prefers not to show his face, and instead dons the ubiquitous Guy Fawkes mask, to wear with his Sunday best: a sweatshirt with the Anonymous calling card, “We do not forgive … We do not forget.”
Terrorists to some, heroes to others, the jury is still out on Anonymous’s true nature. Known for its robust defence of Internet freedom – and the right to remain anonymous — Anonymous came in first place in Time Magazine’s 2012 online poll on the most influential person in the world.
Fox News, on the other hand, has branded the hackers “domestic terrorists,” a role Anonymous has been cast to play in the latest Call of Duty Black Ops II, in which Anonymous appears as the enemy who takes control of unmanned drones in the not-too-distant future. (That creative decision may have put Activision, the creator of the video-game series, at the top of the Anonymous hit list.) For its part, much of what Anonymous does and says about itself, in the far reaches of the Internet, cannot be verified. Nor do all Anons agree on who they are as a group, and where they are going.
quote:Na Duits succes verwacht ook Nederlandse piratenpartij politieke doorbraak
De Piratenpartij heeft gisteren zeer goede zaken gedaan met de verkiezingen in Noord-Rijnland-Westfalen. Nu verwacht ook de Nederlandse Piratenpartij dit jaar door te breken in de politiek - wat in 2010 nog mislukte. 'We denken 2 tot 3 zetels te kunnen halen', zegt de woordvoerder van de Nederlandse piratenpartij Dirk Poot.
De piraten hebben het momentum. '2012 is internationaal het jaar dat veel mensen zich realiseren hoe belangrijk internetvrijheid is. Dat zag je met de Amerikaanse opstand tegen de strenge internetwetgeving onder de noemer SOPA en in Europa tegen ACTA. Als dit soort wetten nu niet worden tegengegaan, is het echt te laat en wordt internet een gesloten bastion.'
In Duitsland leefde dit sentiment en de Duitse piratenpartij bestormde de politiek. In Noord-Rijnland-Westfalen, de grootste deelstaat en de deelstaat met de meeste inwoners van Duitsland, won de partij 7 procent van de stemmen. Ook in andere landen, waaronder Oostenrijk, Tsjechië en Zweden hebben partijen van de piratenbeweging afgelopen tijd voet aan de grond gekregen in het politieke landschap.
De beweging van Piraten ontstond in Zweden, naar aanleiding van de sluiting van de downloadsite The Pirate Bay. Vijf jaar later is de kwestie nog steeds actueel: in Nederland oordeelde de rechter dat na Ziggo en XS4ALL ook UPC, KPN, T-Mobile en Tele2 de populaire maar omstreden downloadsite moeten blokkeren. Volgens de Piratenpartij schendt dit de internetvrijheid.
Kroegmeetings
De Piratenpartij gaat de komende maanden met kroegmeetings hun verkiezingsprogramma aan de man brengen. Een uitgebreid program is dit niet, en de versie voor 2012 is ook nog niet klaar, maar het komt erop neer dat de partij internetvrijheid wil garanderen en een verbod op downloaden tegen wil gaan. Ook wil de partij privacy op internet waarborgen. Volgens Poot zit er tevens een groot gat in de vorige week aangenomen netneutraliteitswet, die de partij, mits verkozen, zal proberen te dichten.
Twee jaar geleden was de kritiek nog dat de partij geen visie over andere problemen had. Dit jaar proberen ze hier naar Duits voorbeeld verandering in te brengen. Over hypotheekrenteaftrek en andere politieke kwesties zal de partij werken met een systeem van permanente ledeninspraak. Poot: 'Zo kunnen we ons partijprogramma aanpassen op de huidige situatie. Een in cement gegoten verkiezingsprogramma is vaak na een jaar alweer achterhaald.'
Of Nederland net als Duitsland klaar is voor een Piratenpartij, dat moeten de verkiezingen op 12 september uitwijzen.
quote:
quote:A hacker known for attacking jihadist websites, wikileaks, and feuding with various anonymous groups and individuals, appears to have had his real life identity compromised. There have been several previous attempts by numerous individuals, but it appears that one man does indeed know @th3j35t3r's identity.
@th3j35t3r, 'The Jester' in 'leet' hacker speak, was contacted on Twitter by another account named Smedley Manning (@cubespherical) who publicly tweeted that Jester should read the DM (direct message in Tweet speak) he sent or that he would live to regret it. Early this morning, a series of screenshots appeared to show the contents of the DMs that followed.
If this is genuine, the Jester knows he's been doxed as @cubespherical DMed Jester his real name (redacted in the screenshot), former Army assignment (partially redacted in the screenshot) which appears to be the 75th Ranger Regiment, and the type of vehicle Jester owned in 2003 (and, apparently, still owns - it a Chevy Silverado if you're curious). @cubespherical then told him that, as his name suggested, he was a Wikileaks supporter and that, some years ago, he knew Jester personally... and did not like him. They had had a previous run-in of some sort that had left a bad taste in @cubespherical's mouth. Jester, realizing he had been d0x'd (hacker speak for having your cover blown), asked what they could work out only to be informed that @cubespherical was going to post his real ID, resume, and other information, but not before raising a large donation for Wikileaks and himself. A recent tweet from @cubespherical reads "Jesters ( @th3j35t3r ) full creds as soon as BTC here:15JDgkwFVXvuxCt66eUQ434ty3jrvwPfGe hits 100K -". BTC refers to Bitcoin, an online currency in an amount equivalent to $100,000 (approx. 20,000 Bitcoin).
A source that has been in contact with @cubespherical states that he will donate 51% ($51,000) to Wikileaks and then disappear. This is deeply ironic as Jester has loudly criticized Wikileaks and claimed credit for a DDoS attack on Wikileak's site which drew the ire of some anons.
@cubespherical gave the source a small preview of who Jester is. Jester is, as he had himself previously claimed, former military. He was at Fort Benning in 2002 and, at some point in 2003, transferred to Fort Brag. He was known to disappear from time to to for 2 or 3 week periods. He left people guessing as to to where he'd been and what he'd done. He got a gig with SOCOM (Special Operations Command) and, according to Jester's own limited biography, he spent some time in Afghanistan. Currently, he works an a consultant in the information security industry. He has very recently deleted his real Facebook account. And he may be someone to take seriously. @cubespherical has indicated that he will use his 49% to "hide".
Jester has admitted to committing crimes but there's not yet any word on what charges could/would be brought against him. Jester has recently been a subject of controversy in the hacker scene as it has been alleged he has taken credit for attacks that never happened or for attacks that others have done. He also claimed to have launched an attack on a large numbers of iphones who snapped a photo of a new avatar he placed on his Twitter account. It was a QR Code that Jester claimed executed a multi layered attack. One of the people he targeted was a Rhode Island State Representative named Dan Gordon (R), a vocal supporter of the anonymous movement and Occupy Wall Street and a strong opponent of both SOPA and CIPSA. He ran afoul of Jester and, according to Jester, had his phone contacts, text messages, and emails sent to Jester's own server. He also engaged in a Twitter flamewar with Lulzsec that resulted in the CIA's website being crippled by a DDoS attack.
The @J35t3r account has been uncharacteristically quiet. His last tweet, dated May 10, reads "@cubespherical ummm dude. DM pls." I've been informed that there has been no further communication between the two since the last direct message shown here.
As for @cubespherical, he'll be tweeting updates on the donations total until the goal is reached and @th3j35t3r's true identity is revealed. There's been no word on how @cubespherical was able to idenitify Jester but he did have these final words, "I feel Wikileaks is advancing everyone to more open government, which ultimately cannnot be bad. Bradley needs to be released. #freebrad"
One of Jester's favorite phrases, when taunting anons that are being hunted by law enforcement, is "Tick Tock". But it appears that today, it's Jester who the clock is bearing down on.
UPDATES:
Update 1 05/14 9:30 a.m.: Jester is erasing posts on his blog: http://th3j35t3r.wordpress.com/
Update 2 05/14 3:12 p.m.: Jester has erased all Tweets from his Twitter account.
Update 2 05/14 3:24 p.m.: Jester has deleted his entire Twitter account.
Update 3 05/14 3:40 p.m.: @cubespherical has revealed to a source how he was able to uncover the Jester's identity.
Did he forget to remove exif (hidden datat embedded in a file) data from a photo he posted? Was he back-traced in an IRC chat? Was he tricked into downloading an exploit of some sort? These are the questions going through the minds of individuals familiar with the hacker scene.
According to @cubespherical, the explanation is, incredibly, low tech. Recently, @cubespherical bumped into a mutual acquaintance of @th3j35t3r's real life identity. When his name was brought up in conversation, the third party slipped up and linked this identity to Jester. Using this information, @cubespherical confronted Jester online with his real identity. This can be seen here.
There are many people in the hacker scene who feel that @cubespherical may himself be Jester and this may be an elaborate ruse to get his enemies to send him money (and will use a portion of the proceeds to donate to his charity of choice: The Wounded Warrior Project). Such conspiracy theories are common in the hacker game as elaborate ruses are common in Ops (operations - hacker planned and executed actions).
Others believe it to be genuine as, at this point, @th3j35ter has completely deleted his Twitter account which had tens of thousands of followers. Since @th3j35ter has revealed himself to have quite an ego, there are many who doubt he would go to these lengths for an operation with no goal other than raising money.
Update 4 05/14 3:56 p.m. A source has revealed that @cubespherical has stated he is a mercenary that works in PMAs (Personal Military Army). @cubespherical has indicated that the key for Jester to uncover HIS identity lays in his Twitter handle. He has also stated that, "I have the memory of an elephant." It seems one of those memories includes an incident, years prior, when Jester crossed @cubespherical. When asked if he wants Jester to know who he is he replied, "Payback wouldn't be the same without it."
Update 5 05/14 4:35 p.m. @cubespherical has revealed Jester's initials, R.D.C.
Update 6 05/15 1:46 a.m. A photo that was said to be from @th3j35t3r's true identity's Facebook has been found online. A reverse image lookup returns an image here shows the same photo. The used-car lot is 2.5 hours from Fort Brag, the place of the alleged incident that caused ill feelings. The photo was taken by the dealership in the dealer's lot. Some have have concluded this proves it's all a ruse led by @th3j35t3r and some compatriots. If it IS a ruse, what does @th3j35t3r plan to do with any money he raises? Conspiracies have been flying around the Twittersphere all day.
The website turned up another detail, the trucks VIN (vehicle identification number). The truck is listed as SOLD and a call to the dealership verified the fact. The manager declined to give further details as she said it would be illegal to do so. It is almost certain that an anon will gain access to DMV resources and run the VIN to pull up ownership records. As of yet, such documentation has not been released.
We are waiting on comment and further details from @cubespherical.
Author: @truelai
twitter:Anon_Central twitterde op woensdag 16-05-2012 om 00:29:29#Anonymous is hunting 4 black men for raping a 14 year old girl in the #Netherlands. http://t.co/qLsdeN69 | Primary suspects is @jay_baby_ reageer retweet
quote:
quote:The Pirate Bay came under a sustained attack on Tuesday and Wednesday, knocking the file-sharing service's website offline for around 24 hours.
Early theories had the distributed denial-of-service (DDoS) attack emanating from Anonymous, but the hacker collective denied responsibility. The Pirate Bay (TPB) also said on its Facebook page that it knew Anonymous was not behind the attack.
"We're under a quite big DDoS attack. We don't know who's behind it but we have our suspicions," TPB said in a separate post.
In yet another Facebook post, TPB also noted that Wikileaks.org was being targeted. The file-sharing outfit suggested that this confirmed its prediction in January that 2012 would be "the year of the storm".
At the time of writing on Thursday morning, TPB's website was back up and running, but Wikileaks' site was still down.
Theories abound as to the source of the anti-TPB broadside. Corero Network Security, which sells DDoS protection, told the BBC that "it could be the record labels, or a government somewhere that has had enough of not being able to catch The Pirate Bay, [or] it could be just one person who had rented some cloud power from Amazon and is sitting in a cafe, and is able to launch an attack."
The website TorrentFreak, which regularly covers file-sharing issues, suggested that there may be a link to the escalating legal attacks on TPB, the most recent of which has been a UK court order forcing ISPs here to blockade the service.
"Whoever is attacking The Pirate Bay has achieved what no copyright or governmental authority anywhere in the world has — an almost complete disruption of the site’s operations on a global basis with no court order required," TorrentFreak noted.
quote:Dear Citizens of the World
We at Anonymous fight for those who cannot speak for themselves. We fight for those whose voice has been stolen. We fight for the disenfranchised, and the left behind, the forgotten and the invisible.
Today we ask you to stand up for not just one lost forgotten child but hundreds like her around the world.
Many of you may have seen the hastag #oplithchild without really understanding what it means, let us explain.
Almost three years ago, a father found out his daughter was being sexually abused every time she visits her mother’s home on the weekends. As if that was not bad enough it turned out that this child was part of a larger conspiracy that no one could have predicted. Spanning countries and continents around the world; in recent months a custody battle was fought over the child, ending in her father’s death.
Drąsius Kedys died believing no one would stand up for his daughter. ABC News has reported that over thirty protesters were arrested trying to protect this child. Various videos can be seen floating around the internet showing the child being beaten by police as they try to rip her from the only safety net she has.
The Government has not intervened. Earlier this morning the child was taken from her grandparents’ home and thrown into the back of a van. There is fear the child may be murdered as she can name names and faces of government officials. We fight for her, we fight for Drasius Kedys, and we fight for your children.
We ask you to stand with us, hold the Lithuanian Government accountable for allowing this sexual abuse of our sister to continue. We ask you to help us protect her.
In a nutshell: A girl just three years old was pimped out by her own mother to three adult men; for 4,000 Euros per month. Those three men are high ranking members of the Lithuanian Government. Most of the key figures in this story are dead — murdered — with the exception of the mother, and the court is trying to force the child to live with her again — this child is the last breathing witness.
Freakoutnation.com
httpv://www.youtube.com/watch?feature=player_embedded&v=gtnrvLemx0E
After Kedys failed to get a court order protecting his daughter, he allegedly killed a judge and the mother’s sister, both of whom he accused of being part of the pedophile ring. Kedys then disappeared, only to be found dead near a reservoir in mysterious circumstances two years ago. His funeral was attended by thousands of Lithuanians who had come to regard him as a martyr who dared fight a corrupt justice system.
abcnews.go.com
httpv://youtu.be/eOOA2pbpYq4
Lutianian justice has rejected all the requests of the plaintiff. Algimantas Valantinas, the General Prosecutor of Lithuania did not find it appropriate to ask that the judge Furmanavičius be interrogated, but he did find appropriate to criticise Drąsius Kedys for having published on Internet, the videos and 200 letters sent to European Parliament members and Lithuanian authorities, where face hidden, Diemantele tells what has happened to her. Drasiaus plea letter in English is available here: A father fighting for his daughter
Veritasll
We Are Anonymous
We Do Not Forgive
We Do Not Forget
We Are Legion
Expect Us
Peace and Love,
#ATeam
twitter:AnonOpsSweden twitterde op donderdag 17-05-2012 om 19:22:32Right now #OpLithChild goes #OccupyLithuania, people pitched tents outside president palace, cops wanted to demolish, people defended!
) reageer retweet
Thomas Ryan?twitter:Reckz0r twitterde op donderdag 17-05-2012 om 19:14:30http://t.co/GKrESNrU - The Jester's True Identity (DoX) reageer retweet
quote:
quote:We have some news just breaking right now. ZeroPaid has learned who was behind the attack of Swedish BitTorrent website The Pirate Bay. The attacker goes by the name Anonymous Nyre – a defector of the online collective Anonymous. A comment was left on PasteBin explaining the attack:
quote:
quote:A day after the Indian government proposed a hyper watchdog to police the internet, the websites of the Supreme Court of India and the Congress mysteriously went offline on Thursday. This sparked off rumours that the hacker group Anonymous Central had taken down the two sites to protest the government's censorship plan.
The hacking was reportedly in response to the blocking of torrent site thepiratebay.com and vimeo.com.
While the Supreme Court of India website came back online after a little while, the Congress website was still offline at the time of filing of this report.
The Department of Telecommunications (DoT) website had also reportedly come under attack.
Earlier, tweeting about the government's plan, Anonymous Central had tweeted, "Namaste #India, your time has come to trash the current government and install a new one. Good luck."
The proposed plan for censorship pushes for a government-run 50-member body to control the web. The government's web takeover plan has already been placed before the United Nations (UN).
The UN is expected to discuss the proposal in the next 72 hours. The proposal would end "equal say" process for internet governance and push the civil society to the fringes.
The proposed Committee for Internet Related Polices (CIRP) would be 50-member body funded by the UN. It would meet once a year and would have the power to oversee all internet standards bodies.
If put into force, the move carries a huge potential of hurting India's image. The move has already been raising the hackles of some MPs. Headlines Today accessed letter of Rajya Sabha member Rajeev Chandrasekhar to Prime Minister Manmohan Singh objecting to the proposed watchdog.
"India's proposal, though cleverly worded, hurts its reputation. It hurts advancement of internet as a vehicle for openness, democracy. If accepted, it will be harmful to the interests of Indian citizens. India's position is closely associated with countries none of which is a sparkling example of democracy. Any attempt to expand government's power over internet should be turned back," Chandrasekhar wrote in his letter.
Meanwhile, reacting to the proposal for an internet watchdog, Gagandeep S Sapra, had tweeted, "Block The Internet, Ban the Cartoons, Change Text in Textbooks, Delay Justice, Forget the Citizen, Oh What a Beautiful Country #India"
Ashwin Siddaramaiah tweeted, "Not just TPB, but also vimeo, dailymotion, pastebin and many more sites are blocked. This Govt. Has been the worst I've seen."
Read more at: http://indiatoday.intoday(...)bsites/1/189182.html
quote:
quote:Dont worry about hackers illegally accessing government systems. It turns out government workers and civil servants who are trusted with private citizen data are more likely to access your data illegally.
The U.K. government is haemorrhaging data private and confidential citizen data from medical records to social security details, and even criminal records, according to figures obtained through Freedom of Information requests.
Just shy of 1,000 civil servants working at the Department for Work and Pensions (DWP), were disciplined for accessing personal social security records. The Department for Health (DoH), which operates the U.K.s National Health Service and more importantly all U.K. medical records, saw more than 150 breaches occur over a 13-month period.
And all this comes to light no more than a fortnight after the Queen formally announced the U.K. government will monitor all Web and email traffic, and log all landline, mobile phone, and Skype calls.
And its the privacy campaigners who are in the wrong to say that the data wont be illegally accessed or abused?
There is one, simple fact: from health records to criminal records, employment details and other personal data, government databases are not only open to abuse, but are actively being exploited by the very people we supposedly trust with our data.
Crunching the numbers: the DWP has a database of around 100 million people. More than 200,000 civil servants have to be vetted to extremely high standards before they can access this database.
Between April 2010 and March 2011, 513 civil servants were found to have made unauthorised disclosures of official, sensitive, private and/or personal information. The year continuing, between April 2011 and January 2012, more than 460 staff were disciplined.
The DoH on the other hand said it did not log each and every breach of unlawful access to U.K. medical records. It did say there were 158 recorded breaches in 2011. Only four years earlier, there were only 28 cases, representing a fivefold increase.
The FOI requests were made by Channel 4s investigative series, Dispatches.
Out of the hundreds of thousands of employees in both departments, the numbers represent only a fraction of the total staff. Having said that, it took only one person allegedly to leak more than 250,000 U.S. diplomatic cables to Wikileaks, the largest unauthorised release of classified data in the history of the United States.
Currently, under the Data Protection Act, it is a criminal offence to obtain or disclose personal data without permission or procure disclosure to other persons. The penalties for a criminal offence go up to £5,000 ($7,900) in a lower magistrates court, or an unlimited fine in a higher Crown court.
Some British politicians even called for some extreme data breaches to result in prison sentences something dismissed by other parliamentary committee members.
Rarely does the fine rise to five-figures, let alone six. Only recently, one Scottish local authority was fined £140,000 ($220,000) for five separate data breaches the highest fine imposed by the courts to date.
But as is often the case, the financial benefits from selling personal data are rarely outweighed by the fines or penalties imposed.
Under new legislation presented by Europe, if a data breach occurs, whether by an individual deliberately acting outside the law, or accidentally due to unforeseen events, the person for which that data relates to must be informed.
But those laws are at least two or three years away, and until then, companies and public sector organisations will face meagre fines compared to the ¤1 million flat-rate or 2 percent of their annual global turnover.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:
quote:The Chicago Police Department website is down, and “hactivists” from the group Anonymous are taking credit. It’s part of a protest in Chicago against the NATO summit, where U.S. President Barack Obama is meeting with world leaders.
Activists are protesting NATO’s policies, holding signs such as “War (equals) Debt,” and “NATO, Go Home.” Members of the hacker group Anonymous, calling themselves “AntiS3curityOPS,” posted a video on YouTube with an ominous message to the Chicago Police Department, but that video has since been made private. We added a full transcript of the video to the bottom of this post.
quote:
quote:CHICAGO - De bekende hackersgroep Anonymous zegt de website van de NAVO te hebben aangevallen.
De site was zondagavond uit de lucht.
Het militaire bondgenootschap komt zondag en maandag bijeen in de Amerikaanse stad Chicago.
Als reden noemen de hackers het politieoptreden tegen demonstranten rond de NAVO-top. ''Als jullie ons censureren, zullen wij uit noodzaak jullie censureren'', schrijft Anonymous op internet.
Een andere hackersgroep, AntiS3curityOPS, claimt de websites van de gemeente Chicago en van de lokale politie te hebben platgelegd.
quote:
quote:Een Amerikaanse student die in 2009 werd veroordeeld tot het betalen van 675 duizend dollar (bijna 530 duizend euro) voor het illegaal downloaden en online delen van 30 muzieknummers, moet die boete gewoon betalen. Het Amerikaanse Hooggerechtshof weigerde vandaag het hoger beroep dat de student had aangespannen, te behandelen.
De student Joel Tenenbaum was aangeklaagd door de Recording Industry Association of America (RIAA). Een jury legde hem de boete van 22 duizend dollar per nummer op, maar een federale rechtbank schrapte dat later omdat de boete excessief en niet in lijn met de grondwet zou zijn.
Maar een aantal grote platenmaatschappijen, waaronder Sony BMG Music Entertainment en Warner Brothers, deden hun beklag over het schappen van de boete. Een federaal hof van beroep stelde hen in het gelijk, en oordeelde dat Tenenbaum alsnog moest betalen. De student tekende hoger beroep aan, maar dat werd vandaag afgewezen. Het Hof heeft dat besluit niet nader toegelicht.
RIAA, dat een aantal van de grootste Amerikaanse platenlabels vertegenwoordigt, heeft in totaal ruim 12 duizen Amerikanen voor de rechter gesleept wegens het schenden van het auteursrecht. Tenenbaum verklaarde voor de rechter dat hij vindt dat individuele downloaders die muziek delen zonder daar geld aan te verdienen niet hetzelfde behandeld moeten worden als bedrijven die voor eigen gewin materiaal stelen dat auteursrechten bevat.
quote:supreme court will hear aclu case challenging warrantless wiretapping law
The Supreme Court has just agreed to consider whether plaintiffs represented by the ACLU have the right to challenge the constitutionality of a controversial law that authorizes the National Security Agency to conduct dragnet surveillance of Americans international emails and phone calls.
quote:Hollywood planning a second SOPA for 2013
If a few remarks by Chris Dodd are to be believed, the next version of the Stop Online Piracy Act, whatever that might look like, will likely come in early 2013.
Dodd, the CEO of the Motion Picture Association of AmericaHollywoods lobbying arm, as well as a major proponent and lobbying agent for SOPAwas quoted Saturday referencing his eagerness to directly lobby Congress for a new copyright bill on the MPAAs behalf.
"I can't say anything to them about this for another seven months, but I think my colleagues understand how important this is," he said in an interview with Variety.
Dodd has to wait until January to personally lobby members of Congress. For 30 years, until he assumed leadership of the MPAA in 2011, he was a U.S. Senator from Connecticut. Ethics regulations prohibit him from making deals with Washington until two years after his departure.
The only other hint Dodd left about the next SOPA is that the MPAA will no longer try and equate Web piracy with physical theft, a notion widely mocked online.
"We're going to have to be more subtle and consumer-oriented," he said. "We're on the wrong track if we describe this as thievery."
Its unclear if Dodd is interested in a much milder form of combating web piracy, or if hes interested in similar legislation that would simply be less likely to rile up the public.
He did, at least, note that he was caught off guard by the publics voracious opposition to SOPA and its sister bill, the Protect IP Act. "My learning curve about understanding this industry is still climbing," he said.
How much he meant to reveal about the MPAAs next legislative push is unclear. The organization refused to comment on this story.
quote:
quote:WASHINGTON, May 21 (Reuters) - One or more unauthorized
users gained access to the inner workings of a website run by
the U.S. Justice Department, a department spokeswoman said on
Monday after the hacker group Anonymous said they were behind
the incident.
The hackers accessed a server that operates the Bureau of
Justice Statistics' website, the spokeswoman said.
The bureau is responsible for collecting and analyzing data
about crime - including computer security incidents - from
throughout the United States.
The department spokeswoman declined to say when the alleged
unauthorized access occurred or what data the hackers might have
obtained. The department is looking into whether the
unauthorized users broke criminal laws, she said.
Online statements attributed to Anonymous said they were
responsible for the security breach and that the files they
obtained include emails.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |