IRL-Troll familie Westboro Baptist Church dacht ook mee te kunnen liften en daagde Anonymous uit.twitter:BarrettBrownLOL twitterde op maandag 03-09-2012 om 02:16:10And all this because man put in motion systems that returned to enslave him #ProjectPM reageer retweet
Anonymous en Occupy Wall Str.:quote:http://www.thinq.co.uk/20(...)persecute-anonymous/
NATO leaders have been warned that WikiLeaks-loving 'hacktivist' collective Anonymous could pose a threat to member states' security, following recent attacks on the US Chamber of Commerce and defence contractor HBGary - and promise to 'persecute' its members.
quote:From a single hashtag, a protest circled the world
(Reuters) - It all started innocuously enough with a July 13 blog post urging people to #OccupyWallStreet, as though such a thing (Twitter hashtag and all) were possible.
quote:Gabriella Coleman Assistant Professor of Media, Culture, and Communication
Trained as an anthropologist, Gabriella (Biella) Coleman examines the ethics of online collaboration/institutions as well as the role of the law and digital media in sustaining various forms of political activism. Between 2001-2003 she conducted ethnographic research on computer hackers primarily in San Francisco, the Netherlands, as well as those hackers who work on the largest free software project, Debian. Her first book, "Coding Freedom: The Aesthetics and the Ethics of Hacking" is forthcoming with Princeton University Press and she is currently working on a new book on Anonymous and digital activism. She is the recipient of numerous grants, fellowships, and awards, including ones from the National Science Foundation, the Woodrow Wilson Foundation, the Ford Foundation, the Social Science Research Council and the Institute for Advanced Study.
quote:
quote:Our Weirdness Is Free
The logic of Anonymous—online army, agent of chaos, and seeker of justice.
by Gabriella Coleman, [01.13.2012]
quote:
TIMELINE: The Evolution Of The 'Anonymous' Internet Hacktivist Groupquote:Anonymous And The War Over The Internet
This article is the first in a two-part series tracing the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
The Huffington Post, Saki Knafo. Posted: 1/30/12 12:20 PM ET | Updated: 2/1/12 07:36 PM ET
quote:
quote:Following attacks on U.S. government websites last weekend, Anonymous seems to have made a new "Operation Last Resort" .gov website strike Sunday night.
Anonymous appears to have published login and private information from over 4,000 American bank executive accounts in the name of its new Operation Last Resort campaign, demanding U.S. computer crime law reform.
A spreadsheet has been published on a .gov website allegedly containing login information and credentials, IP addresses, and contact information of American bank executives.
If true, it could be that Anonymous has released banker information that could be connected to Federal Reserve computers, including contact information and cell phone numbers for U.S. bank Presidents, Vice Presidents, COO's Branch Managers, VP's and more.
The website used in this attack belongs to the Alabama Criminal Justice Information Center (ACJIC). The page extension URL is titled, "oops-we-did-it-again."
het artikel gaat verdertwitter:OpLastResort twitterde op maandag 04-02-2013 om 04:16:07Now we have your attention America: Anonymous's Superbowl Commercial 4k banker d0x via the FED http://t.co/ABcGMj44 #opLastResort #Anonymous reageer retweet
quote:
quote:NBC News revealed an explosive Gov. white paper on the president’s drone deployment policy, seemingly scooped from a confidential government filing cabinet or in this case, a computer… What NBC news did not detail was exactly how they came across these documents, here’s one very plausible theory… Anonymous… And this is just the beginning folks…
quote:
quote:A confidential Justice Department memo concludes that the U.S. government can order the killing of American citizens if they are believed to be senior operational leaders of al-Qaida or an associated force -- even if there is no intelligence indicating they are engaged in an active plot to attack the U.S.
The 16-page memo, a copy of which was obtained by NBC News, provides new details about the legal reasoning behind one of the Obama administrations most secretive and controversial polices: its dramatically increased use of drone strikes against al-Qaida suspects abroad, including those aimed at American citizens, such as the September 2011 strike in Yemen that killed alleged al-Qaida operatives Anwar al-Awlaki and Samir Khan. Both were U.S. citizens who had never been indicted by the U.S. government nor charged with any crimes.
quote:Federal Reserve hacked
US central bank confirms intrusion after hacktivist group Anonymous was claimed to have stolen 4,000 bankers' details
The US Federal Reserve bank has confirmed one of its internal websites was broken into by hackers after the hacktivist group Anonymous was claimed to have stolen details of more than 4,000 bank executives.
"The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product," a spokeswoman for the US central bank said.
"Exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve system," the spokeswoman said, adding that all individuals affected by the breach had been contacted.
The admission follows a claim that hackers linked to Anonymous struck the bank on Sunday. The technology news site ZDNet separately reported that Anonymous appeared to have published information said to containing the login information, credentials, internet protocol addresses and contact information of more than 4,000 US bankers.
The claim was made via Twitter using an account registered to OpLastResort, which is linked to Anonymous, which has claimed responsibility for attacks on other government and corporate sites.
OpLastResort is a campaign some hackers linked to Anonymous have started to protest against government prosecution of the computer prodigy Aaron Swartz, who killed himself on 11 January.
The bank declined to identify which website had been hacked. But information it provided to bankers indicated that the site, which was not public, was a contact database for banks to use during a natural disaster.
A copy of the message sent by the bank to members of its Emergency Communication System (ECS) and obtained by Reuters warned that mailing address, business phone, mobile phone, business email and fax numbers had been published. "Some registrants also included optional information consisting of home phone and personal email. Despite claims to the contrary, passwords were not compromised," the bank said.
The website's purpose is to allow bank executives to update the Fed if their operations have been flooded or otherwise damaged in a storm or other disaster. That helps the bank assess the overall impact of the event on the banking system.
Hackers identifying themselves as Anonymous infiltrated the US sentencing commission website in late January to protest against the government's treatment of Swartz.
Swartz was charged with using the Massachusetts Institute of Technology's computer networks to steal more than 4m articles from Jstor, an online archive and journal distribution service. He faced a maximum sentence of 31 years if convicted.
quote:Westboro Baptist church key member Megan Phelps-Roper leaves
'We've done things that hurt people' says 27-year-old, who is leaving anti-gay organisation with her sister Grace
One of the most prominent members of the Westboro Baptist church has left it after spending her life as part of the fervently anti-gay movement.
Megan Phelps-Roper, who looked after social media for the church best known for its slogan "God hates fags", announced her departure in a post on the blogging platform Medium in which she also revealed her younger sister Grace, 19, was also leaving.
In the post, called Head Full of Doubt/Road Full of Promise, the 27-year-old explained how she had become disillusioned with the teaching of Westboro, which is widely considered one of the most detested church groups in America for its "God hates fags" campaign.
Phelps-Roper writes: "We know that we've done and said things that hurt people. Inflicting pain on others wasn't the goal, but it was one of the outcomes. We wish it weren't so, and regret that hurt.
"We know that we dearly love our family. They now consider us betrayers, and we are cut off from their lives, but we know they are well-intentioned. We will never not love them.
"We know that we can't undo our whole lives. We can't even say we'd want to if we could; we are who we are because of all the experiences that brought us to this point. What we can do is try to find a better way to live from here on. That's our focus."
The Westboro Baptist church gained notoriety for demonstrating at military funerals across the US, claiming the Iraq and Afghanistan wars are God's punishment on America for tolerating homosexuality.
The church has a small congregation, largely made up of the extended family of the Reverend Fred Phelps, the grandfather of Megan and Grace Phelps-Roper. Their mother, Shirley Lynn Phelps-Roper, is one of its most outspoken representatives. In 2007 the BBC broadcast a documentary on the church by Louis Theroux, which was billed as The Most Hated Family in America.
As well as picketing military funerals, the church also pickets sporting events, concerts and other occasions in the apparent hope of publicity. As well as being anti-gay, it is also anti-Jewish, anti-Catholic and anti-Chinese.
In an accompanying Medium piece, Damsel, Arise: A Westboro Scion Leaves Her Church, Jeff Chu describes what led Megan, who was named by the Kansas City Star as "the future leader" of the church, to leave in November.
Chu writes that her ephiphany over Westborough's hateful dogma began with a Twitter discussion with Jewish blog Jewlicious's David Abitbol. She came to realise the problems with condemning people to death, arbitrarily fixating on the "sin" of homosexuality and believing that the church had all the answers.
The church told the Topeka Capital Journal that it did not know the whereabouts of the two women.
twitter:Anon_Central twitterde op donderdag 07-02-2013 om 21:26:16Tango Down: http://lapdonline.org | because fuck #LAPD! reageer retweet
quote:Anonymous Plans To Hack Goldman Sachs, Days After Federal Reserve Hack
The hacking group Anonymous says it will attack Goldman Sachs (NYSE: GS) on Feb. 14.
According to Anonymous’ Twitter account, the hacktivist group wants to shut down Goldman Sachs’ Facebook and Twitter pages on Valentine's Day to express its disdain for the financial behemoth. The group tweeted out a request to its 869,000-plus Twitter followers on Thursday to join in the cyberattack.
Anonymous released several e-flyers in several languages from its various Twitter accounts. All the e-flyers say the attack will involve three steps: First, Anonymous is encouraging supporters to report the Goldman Sachs Facebook and Twitter accounts as spam. Then, the flyer provides a URL where users can fill out an abuse form on Twitter (you can do the same on Facebook), reporting Goldman Sachs for Twitter malfeasance. In the final step, Anonymous followers are asked to make "friendly" phone calls to Goldman Sachs' offices in London, Paris or Dublin, depending on which flyer they saw.“Operation Goldman Sachs" is being run through an official Tumblr page. "#OpGm" isn't the first time that Anonymous targeted Goldman Sachs. In 2011, Anonymous published the private personal information of a number of Goldman employees, including CEO Lloyd Blankfein. CNN wrote at the time that a Twitter user named CabinCr3w tweeted out that he had “doxxed,” or released, personal info of Goldman’s CEO, including Blankenfein’s age, education, recent addresses and legal cases he had been involved in. At the time, Goldman Sachs declined to comment on the leak.twitter:YourAnonNews twitterde op donderdag 07-02-2013 om 18:38:48Please help us to destroy twitter and facebook account of Goldman Sachs february 14 #OpGm | http://t.co/V4hJYYdJ reageer retweet
Reports also surfaced recently that Anonymous had hacked into the U.S. Federal Reserve. In an interview with ABC News, ex-Anonymous member Greg Housh said the hack was a result of the lack of prosecution of “big bankers that caused a lot of the problems we’ve had over the last few years.” Housh also said to expect more Anonymous attacks on governments in the future.
The hack into the Federal Reserve resulted in the leaking of personal information of more than 4,000 bankers. ABC News says the Federal Reserve hack may have been a part of "Operation Last Resort," which was started earlier this year after Reddit co-founder Aaron Swartz commited suicide over charges of wire fraud, computer fraud, unlawfully obtaining information from a protected computer and recklessly damaging a protected computer. Swartz, a hero and now a martyr to activists, faced as much as 35 years in prison if found guilty.
According to Insider Media Group, the planned "operation" is a reaction to a recent interview given by Huw Pill, a chief economist at Goldman. While talking to the Huffington Post, Pill suggested that France lower wages by approximately one-third in an effort to increase competition in the labor force. The Operation Goldman Sachs Tumblr page is written in French, and might be an indicator that French hackers linked to Anonymous got the idea for the attack on Goldman from those comments.
quote:Anonymous salutes Christopher Dorner, ex-cop wanted for killing spree
Is Anonymous about to get a new face?
Christopher Jordan Dorner, the former LAPD officer now on the run after allegedly shooting three people, is an unlikely inspiration. But then so was Guy Fawkes, Catholic revolutionary and would-be mass-murderer. What they have in common is a frustration unto fury with the Powers That Be, a desperation, and a belief that, as Dorner put it in his manifesto, "The only thing that changes policy and garners attention is death."
So far, all he has is our attention.
Dorner's manifesto claims that he was railroaded out of the force after reporting that a fellow officer kicked a mentally ill man in the face, and documents his numerous grievances with the LAPD, beginning with racism and name-calling and ending with the fact that they have, in him, produced the perfect weapon of their own destruction and rendered it inevitable. He gives the impression of a man of firm principles pushed to extremes, rogue cop, an archetypal American character usually played by Bruce Willis, up against the Alan Rickmans of the world. In the lengthy document he gives shout-outs to the Clintons, George H.W. Bush, Michelle Obama (he approves of the bangs), Charlie Sheen, The Chive, and … Anonymous.
"#Dorner is the #99%," tweeted OccupyTheMob.
YourAnonNews, the pre-eminent Anonymous news account, tweeted, "The FBI will try to use #Anonymous images on Dorner's FB and words in his manifeto [sic] to discredit us. We didn't create him. The LAPD did."
The LAPD has also shot two innocent people, including one woman in her seventies, in the hunt for Dorner.
Despite his apparent murders of three people, Dorner was adopted by many Anons as an avatar of the man of conscience pushed to the point of desperate action. As is typical in a hive as diverse and populous as Anonymous, there have been a spectrum of reactions, with the more prominent accounts carefully making the distinction between supporting Dorner's stated principles and outright murder.
As part of the actions against the police YAN announced an email bomb of the LAPD (which is simply a lot of emails, nothing explosive), although the list of email addresses targeted appears to have been simply scraped from all public emails on the LAPD site and includes such ephemera as the Royal Canadian Mounted Police Missing Children's email, and the email address of the public relations representative for the L.A. Dodgers.
YAN also tweeted the traditional "TANGO DOWN," claiming that Anonymous had taken the LAPD website offline, although I was unable to confirm any downtime and the site works fine at the time of posting. It generally takes longer than a few hours to organize an effective DDoS unless you have a botnet handy. As well, the account is tweeting updates on the pursuit of Dorner. Altogether, these are not actions which could in any way slow down the police pursuit or investigation, but once again, they are excellent optics for Anonymous.
Anonymous has an ongoing #FTP operation, a carry-over from FuckFBIFridays, and the current actions fit neatly under that umbrella and have been tweeted with that hashtag, as well as #OpLastResort. This was the action, formerly OpAngel, inspired by the suicide of Aaron Swartz, and is aimed at reforming the justice system. The OpAngel twitter account has enthusiastically taken up the cause, tweeting, "When people of conscience speak out, this happens: [link] Now you understand why we must exist & do what we do. #opLastResort"
Dorner's manifesto's subject line was: "Last Resort."
"The LAPD is doing illegal things to catch an ex-cop doing illegal things who was kicked off the force for exposing cops doing illegal things," said YAN, speaking the exact, literal truth.
Het artikel gaat verder.quote:Pirate Bay co-founder: “I can sit here and jerk off for 5 years. And I will.”
New film examines infamous BitTorrent site's people, evolution, and trial.
Say what you will about The Pirate Bay: if nothing else, its founders are resilient, defiant, and clever. Two out of its three co-founders have yet to be brought to justice, having been convicted of aiding copyright infringement—none of them have paid a single cent of the multi-million dollar fine ordered by a Swedish court in 2009, and all seem quite resolute on maintaining that position. (Still, each of the three claim to no longer have any involvement in the site.)
There’s not much new information about the founders in Simon Klose’s new film TPB AFK: The Pirate Bay Away From Keyboard, which debuted Friday at the Berlinale Film Festival in the German capital and is available freely online under a Creative Commons license. The non-narrated, largely Swedish-language film profiles the three co-founders during their prosecution by the Swedish government and doesn’t address—other than through filmed court testimony—the fourth co-defendant, businessman Carl Lundström. (Lundström did serve four months in Sweden under house arrest, but has since returned to living in Switzerland. He also declined to be profiled for the film.)
In February 2012, the Swedish Supreme Court declined to hear an appeal of the case against the co-founders, leaving the three with few, if any, legal options left at their disposal. After being deported late last year on a Cambodian visa violation, Gottfrid “anakata” Svartholm Warg remains in Swedish custody. Meanwhile, Fredrik “tiamo” Neij is still living in Laos with his wife and son.
In the closing minutes of the film (shot in November 26, 2010, on the day the first appeals decision was to be announced), Neij looks straight in the camera while taking a leisurely family lunch aboard a boat in Laos with co-founder Peter Sunde at his side. Neij flatly says: “I can serve a prison sentence. But why do it if I don’t have to?”
Later that day, just moments after the two of them find out that they’ve lost their appeal, Neij adds: “The statute of limitations is five years. They can’t issue an international warrant of arrest. I can sit here and jerk off for five years. And I will.”
The film also reminds us that Neij is wanted by Interpol, although his name does not turn up in Interpol’s online database. Meanwhile, Sunde remains a digital nomad, traveling seemingly freely about Europe and the rest of the world. He’s even answering a Reddit AMA on Saturday.
In other words, these guys seem very comfortable with ignoring Swedish justice.
Late last year, Håkan Roswall, the chief prosecutor in the Pirate Bay trial, told Ars that he has “no doubt whatsoever that every one of those four will serve their sentence.”
Het is een lang artikel.quote:Anonymous reveals ample Fed access, FBI opens criminal investigation
Anonymous' 'Operation Last Resort' has published a new document revealing that the hacking collective has had an astonishing amount of access to The Fed's internal files and servers.
The new attack is Anonymous' response to the information security community's anger at the Federal Reserve ("The Fed") for its dismissive attitude and lack of transparency around Sunday's emergency contact system hack.
Anonymous has compromised the Grand Banks Yachts Web site to host this new file—Grand Banks Yachts, Ltd.—which manufactures and sells luxury yachts worldwide.
The URL filename ominously reads, "dorner-is-a-symptom-not-the-syndrome."
The Anonymous 'Operation Last Resort' action last Sunday exposed over 4,600 bank executive credentials for The Fed's expanding nationwide program, the Emergency Communications System.
The FBI has now begin to respond—at least to the bank hack—by opening a fresh criminal investigation into Anonymous 'Operation Last Resort.'The new document essentially shows that Anonymous had access to several of The Fed's servers and internal documents.twitter:OpLastResort twitterde op vrijdag 08-02-2013 om 15:44:55People are concerned by the Fed's lack of transparency regarding recent compromise. We thought we'd help: http://www.grandbanks.com(...)not-the-syndrome.txt #opLastResort reageer retweet
Like everything we've seen so far in Anonymous' 'Operation Last Resort' actions, the details of the hack appear to be symbolic.
The new attack's filename refers to Christopher Dorner, an ex-LAPD police officer that killed three people, "declared war on the LAPD" and is currently the target of a California state-wide manhunt.
Dorner published a lengthy manifesto to Facebook stating that his murderous mission—to avenge corruption within the LAPD that ruined his life—was his only remaining path to justice.
Despite Dorner's public status as a fugitive and an alleged murderer, Dorner has been characterized by some Anons as "an avatar of the man of conscience pushed to the point of desperate action."
On Twitter, Anonymous' 'Operation Last Resort' directed the latest drop to Veracode chief technology officer and L0pht alum Chris Wysopal, in an apparently friendly acknowledgment of the Veracode CTO's analysis and comments about the technical details surrounding the recent Federal Reserve bank hack.
quote:The 'Operation Last Resort' video, posted Friday on the U.S. Sentencing Commission Web site, now has more than 1.38 million views at the time of writing. Still, two weeks after Anonymous took down the Web site, it remains "under construction."
We will update you with new developments as they become available.
quote:Brace Yourselves, CISPA is Back!
February 8, 2013 - Yesterday, U.S. congressmen Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) announced before the House that they are planning to revive the controversial Cyber Intelligence Sharing and Protect Act (CISPA) and work closely with the White House to ensure its passage sometime later this year. The unpopular legislative attempt at ramping up cybersecurity regulations was tabled indefinitely last year in August after it was shot down in a Senate vote, but some had raised the possibility that it could've been delayed by the lawmakers to avoid having to make a decision right before the elections.
Unlike SOPA, this bill does not focus on the online pirating of music or videos found on torrent websites, but it instead offers corporate protection against foreign hackers stealing codes, formulas and patented information.
The concept of CISPA revolves around a sense of developing a security community among large technology companies like Facebook and Google. Essentially, the bill promotes companies to share information on cyberattacks with each other and the government. With companies like Facebook and sites that have endless amounts of personal information, the fear is that this would be a new step toward a legalized government invasion of privacy.
If you’re still confused about what CISPA is, or what it could mean for you, this is what we wrote last year when the bill was proposed:
Here’s how it’s dangerous: The language in the bill (read it here) is maddeningly imprecise. It limits the shared data to “cyber threats” or “national security” items only, but lacks any specific definitions or examples. “The ambiguities of these terms render these limits completely meaningless,” says Digital Trends, which notes that email or Facebook messages would be up for grabs. “And nothing in the bill requires companies to strip shared information of personally identifiable details.”
It’s unclear when this will come up for a vote in the House. But keep your eye on the acronym, and pay attention to who’s supporting it.
quote:
Vreemde timing.quote:Egypte heeft videowebsite YouTube voor een maand in de ban gedaan omdat daar een voor moslims beledigende film te zien was. Dat hebben staatsmedia zaterdag gemeld.
quote:Software that tracks people on social media created by defence firm
Exclusive: Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups
A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social networking websites.
A video obtained by the Guardian reveals how an "extreme-scale analytics" system created by Raytheon, the world's fifth largest defence contractor, can gather vast amounts of information about people from websites including Facebook, Twitter and Foursquare.
Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients.
But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing "trillions of entities" from cyberspace.
The power of Riot to harness popular websites for surveillance offers a rare insight into controversial techniques that have attracted interest from intelligence and national security agencies, at the same time prompting civil liberties and online privacy concerns.
The sophisticated technology demonstrates how the same social networks that helped propel the Arab Spring revolutions can be transformed into a "Google for spies" and tapped as a means of monitoring and control.
Using Riot it is possible to gain an entire snapshot of a person's life – their friends, the places they visit charted on a map – in little more than a few clicks of a button.
In the video obtained by the Guardian, it is explained by Raytheon's "principal investigator" Brian Urch that photographs users post on social networks sometimes contain latitude and longitude details – automatically embedded by smartphones within so-called "exif header data."
Riot pulls out this information, showing not only the photographs posted onto social networks by individuals, but also the location at which the photographs were taken.
"We're going to track one of our own employees," Urch says in the video, before bringing up pictures of "Nick," a Raytheon staff member used as an example target. With information gathered from social networks, Riot quickly reveals Nick frequently visits Washington Nationals Park, where on one occasion he snapped a photograph of himself posing with a blonde haired woman.
"We know where Nick's going, we know what Nick looks like," Urch explains, "now we want to try to predict where he may be in the future."
Riot can display on a spider diagram the associations and relationships between individuals online by looking at who they have communicated with over Twitter. It can also mine data from Facebook and sift GPS location information from Foursquare, a mobile phone app used by more than 25 million people to alert friends of their whereabouts. The Foursquare data can be used to display, in graph form, the top 10 places visited by tracked individuals and the times at which they visited them.
The video shows that Nick, who posts his location regularly on Foursquare, visits a gym frequently at 6am early each week. Urch quips: "So if you ever did want to try to get hold of Nick, or maybe get hold of his laptop, you might want to visit the gym at 6am on a Monday."
Mining from public websites for law enforcement is considered legal in most countries. In February last year, for instance, the FBI requested help to develop a social-media mining application for monitoring "bad actors or groups".
However, Ginger McCall, an attorney at the Washington-based Electronic Privacy Information Centre, said the Raytheon technology raised concerns about how troves of user data could be covertly collected without oversight or regulation.
"Social networking sites are often not transparent about what information is shared and how it is shared," McCall said. "Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search."
Raytheon, which made sales worth an estimated $25bn (£16bn) in 2012, did not want its Riot demonstration video to be revealed on the grounds that it says it shows a "proof of concept" product that has not been sold to any clients.
Jared Adams, a spokesman for Raytheon's intelligence and information systems department, said in an email: "Riot is a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into useable information to help meet our nation's rapidly changing security needs.
"Its innovative privacy features are the most robust that we're aware of, enabling the sharing and analysis of data without personally identifiable information [such as social security numbers, bank or other financial account information] being disclosed."
In December, Riot was featured in a newly published patent Raytheon is pursuing for a system designed to gather data on people from social networks, blogs and other sources to identify whether they should be judged a security risk.
In April, Riot was scheduled to be showcased at a US government and industry national security conference for secretive, classified innovations, where it was listed under the category "big data – analytics, algorithms."
According to records published by the US government's trade controls department, the technology has been designated an "EAR99" item under export regulations, which means it "can be shipped without a licence to most destinations under most circumstances".
quote:Anonymous Targets LAPD Website, Hackers Unhappy About Chistopher Dorner Case
Anonymous hackers claim to have disrupted a website of the Los Angeles Police Department (LAPDonline.org) in response to the way authorities are handling the case of Chistopher Dorner, the alleged cop killer who’s currently on the run.
The hacktivists have announced attacking the site after the LA Times published reports about how police opened fire against innocent individuals whose vehicles matched the description of the one used by Dorner.
The individual behind the YourAnonNews Twitter account has posted some ironic messages in response to the incident:
“If #LAPD are monitoring this feed, I’d like them to know I am driving a grey 4-door sedan today & will not be Christopher #Dorner. KTHX.”
“Be careful if you're in LA, especially if you're Asian, white, female, male, or drive a truck of any make & color.”
In addition, Anonymous asks Dorner to contact them if he wants any information leaked.
“Dormer needs to be placed in custody without being killed. He also may have information he wants leaked; we will leak it if he desires,” the hackers wrote.
Currently, the LAPD website appears to be working properly.
quote:
quote:Recent events have highlighted the fact that hackers, coders, and geeks are behind a vibrant political culture.
By Gabriella Coleman on February 4, 2013
quote:A decade-plus of anthropological fieldwork among hackers and like-minded geeks has led me to the firm conviction that these people are building one of the most vibrant civil liberties movements we’ve ever seen. It is a culture committed to freeing information, insisting on privacy, and fighting censorship, which in turn propels wide-ranging political activity. In the last year alone, hackers have been behind some of the most powerful political currents out there.
quote:
quote:
quote:Hello, officers of the Los Angeles Police Department, we are anonymous.
As national headlines regarding the vigilante acts of former LAPD officer Christopher Jordan Dorner continue to intensify, we have decided amongst ourselves to pursue an appropriate recourse.
And so we watched with dread and utter hilarity as the LAPD began to pursue this man.
However the department has proven once more that it is incapable of serving the public, look no further than to the women who became LAPD’s most recent victims. The two were shot without warning and were not even given the chance to surrender simply because LAPD thinks they are above the law.
No one is above the law.
In coordination with federal authorities, the LAPD is now conducting a massive manhunt for The Dark Knight Christopher Dorner, so that they may effectively silence him forever without due process.
And now since the authorization of drones have been approved for the first time ever to pursue and execute an American citizen on United States Soil, the US Government will stage this event to set a new precedent from which it can assassinate American citizens for little to no reason at all.
But do not misinterpret us for we do not condone the vicious acts that Dorner has allegedly partaken in. Instead we sympathize and resonate with his struggle. Dorner was not born a killer he was a law abiding citizen that was tainted by the corrupt and inhumane practices of the Los Angeles Police Department who serve only themselves.
We however do not accept this fate, and call upon our brothers to raise arms against the LAPD, for justice and for the lulz we will rise to disrupt, dismantle and dissect all aspects of the manhunt whilst revealing the LAPD’s unwarranted hypocrisy.
We are hated, vilified, and like Dorner, considered to be enemies to the state. But there are those who whisper that we are culture and a necessity that bring truth to a cloaked world. In this spirit we will forge ahead and allow #OperationDorner to commence!
twitter:YourAnonNews twitterde op maandag 11-02-2013 om 10:36:35Update: Population of Kashmir denied internet access for 3 days. #KashmirBlackout reageer retweet
quote:Goldman Sachs targeted by hacker group
The "hacktivist" group Anonymous has declared war on Goldman Sachs, a potent symbol of capitalism to be sure. Specifically, the group says it will launch an online on February 14.
As noted by the International Business Times, "Anonymous released several e-flyers in several languages from its various Twitter accounts. All the e-flyers say the attack will involve three steps: First, Anonymous is encouraging supporters to report the Goldman Sachs Facebook and Twitter accounts as spam. Then, the flyer provides a URL where users can fill out an abuse form on Twitter (you can do the same on Facebook), reporting Goldman Sachs for Twitter malfeasance. In the final step, Anonymous followers are asked to make 'friendly' phone calls to Goldman Sachs' offices in London, Paris or Dublin, depending on which flyer they saw."
These sorts of threats are always a bit nebulous. There have been times when similar declarations against financial companies were publicized and then ostensibly retracted. But it's also fair to say that this isn't the first time that a hacker group has tangled with Goldman Sachs. In 2011, the group published personal information about CEO Lloyd Blankfein on the Internet as a protest.
Anonymous seems to be stepping up its activity. Not too long ago, the Fed was targeted in an attack that exposed information about various bankers. If its social media operations were impaired, it would not be the end of the world. Still, Goldman Sachs is no doubt taking this threat seriously.
For more:
- here's the article
quote:A Message From Anonymous to the President of the United States
Article II, Sector 3 of the US Constitution, says the President shall from time to time give to Congress information of the State of the Union and recommend to their Consideration such measures as he shall judge necessary and expedient.
At 9PM Eastern Standard Time, February 13, 2013 President Obama has planned to address a joint session of Congress to deliver the State of the Union Address.
The following day, President Obama will be introducing an executive order, purportedly aimed at bolstering U.S. cyber-security, after repeated failed attempts to pass legislation through Congress.
Anonymous has reached a verdict of NO CONFIDENCE in this executive order and the plans to reintroduce the CISPA bill to Congress on the same day. As such, President Obama and the State of the Union Address will be BANISHED from the Internet for the duration of live delivery.
So as not to infringe upon the Presidents free speech, subsequent broadcasts will be allowed to pass unhindered.
This action is being taken to underline a fact that appears to be sorely unrecognized by the Obama Administration that the Internet is a sovereign territory, and does not fall under the jurisdiction of any nation state.
We are the natives of this space, and its guardians, and we will fight until death to protect it as a neutral grounds for the unhindered interaction of all members of the human race, so long as they themselves act in harmony with this inviolable principle.
Our determination is that President Obama is acting in direct contravention of this principle, and his brief exclusion is an educational, rather than a punitive measure.
We hope that its lesson will be learned.
Punitive measures have not been ruled out.
-Anonymous
quote:Anonymous Tries, but Fails to Interrupt Obama’s State of the Union Address – Video
On Tuesday, Anonymous hackers revealed their intentions to make sure that there would be no State of the Union address on the web. They planned on blocking all the webcasts of US President Barack Obama’s speech.
“Tonight, the President of the United States will appear before a joint session of Congress to deliver the State of the Union Address and tomorrow he plans to sign an executive order for cybersecurity as the House Intelligence committee reintroduces the defeated CISPA act which turns private companies into government informants,” they said in a video statement.
“We reject the State of the Union. We reject the authority of the President to sign arbitrary orders and bring irresponsible and damaging controls to the Internet. The President of the United States of America, and the Joint Session of Congress will face an Army tonight.”
Some of the hacktivists were unhappy with the fact that the US president would not cover topics such as the NDAA, the killing of citizens by military drones, the Bradley Manning case, or secret interpretations of the law that allow for warrantless wiretapping and surveillance of US citizens.
Other Anonymous hackers gave a “verdict of no confidence” to the executive order aimed at protecting the country’s critical infrastructure. In addition, the protest was also aimed against the reintroduction of the controversial Cyber Intelligence Sharing and Protection Act (CISPA).
However, the hacktivists’ plans have failed. The White House live streams worked without a glitch during the president’s speech.
On the other hand, they don’t seem to be too discouraged. They highlight the fact that they’ve won the first three rounds by taking down sites of MIT, USSC and the Federal Reserve, so they “give round 4 to the sneaky gov.”
They warn that they’re in this for the “full 12 rounds.”
Here is the video in which Anonymous threatened the State of the Union address:
quote:Anonymous: ramping up OpSOTU for 24 hours
The 'Operation Last Resort' Twitter account has posted updates with increasing fervor over the last 24 hours, focusing on today's State Of The Union Address, as well as Congress' rushed re-introduction of cybersecurity bill, the Cyber Intelligence Sharing and Protection Act (CISPA).
These posts have included yesterday's publishing and distribution of a file containing detailed information about every security and surveillance camera in the Chicago area. Chicago has the largest surveillance program of any city in the United States.
Less than a day ago, 'Operation Last Resort' made public documents ("doxd") revealing sensitive information about Richard A. McFeely, the FBI executive assistant director of the Criminal, Cyber, Response, and Services Branch.
We heard he was after us so here you can go after him >> DOX on FBI Agent "Rick" Richard A. McFeely
McFeely was quoted in the media following the massive hack and defacement of the U.S. Sentencing Commission Web site which launched 'Operation Last Resort,' saying the FBI was "concerned" and would launch a criminal investigation into the matter.
Anonymous' tweets regarding the McFeely "dox" linked to several blogs posts that contained contact information for McFeely and the names of his family—though it should be noted that the information was less than could be obtained through a "people search" service, and the post was signed by #AntiSec.
quote:IJsland werkt aan censuur porno op internet
IJsland werkt als eerste westerse democratie aan een verbod op pornografie op internet. IJsland wil daarvoor mogelijk hetzelfde soort filters gebruiken als China voor het weren van politiek onwelgevallige inhoud.
De wet is bedoeld om jongeren te beschermen en de waardigheid van vrouwen niet aan te tasten. Pornografie op papier is in IJsland al verboden, maar door de opkomst van internet is een leemte in die wet ontstaan, aldus de Britse krant Daily Telegraph donderdag.
De regering in Reykjavik werkt aan wetgeving waarbij onder meer bepaalde websites kunnen worden geblokkeerd. Ook wil de minister van Binnenlandse Zaken een verbod om IJslandse creditcards te gebruiken voor de betaling van pornografie. Volgens prof. Gail Dines, een pornografiedeskundige, heeft IJsland een 'zeer progressieve benadering die door geen enkel ander democratisch land is uitgeprobeerd'.
quote:download NASA leak by Anonymous Squad No. 035 [PHOBOS]
https://mega.co.nz/#!6BwiHLJI!H_4oJXN...
facebook: http://www.facebook.com/AnonymousSqua...
email: anonymoussquadno035@gmail.com
twitter: https://twitter.com/AnonSquadNo035
youtube: https://www.youtube.com/user/Anonymou...
quote:‘Anonymous’ hacks 600,000 Israeli email accounts
In the latest action targeting Israel, the international computer hacking network known as ‘Anonymous’ has claimed credit for publishing the personal information, including encrypted passwords, of over 600,000 Israelis as part of its ‘Operation Israel (#OpIsrael) on Friday.
In November 2012, Anonymous published a video announcing the launch of a campaign called #opIsrael to hack Israeli websites and emails to try to bring an end to Israeli policies that it claimed were in violation of international law.
The campaign, according to Anonymous, is for the “children and families in Gaza that are suffering as a result of the policies of the Israeli government.” In addition to assaults on Israeli websites, the hacker group also provided Gazans with communications tools in the event their Intrnet connections were to be severed during the Israeli assault on Gaza in early December 2012.
As part of the campaign, hackers took down the Israeli military spokesperson’s website, and hacked into the Israeli Prime Minister’s site. The group managed to steal passwords, erase databases and deface websites of these and other Israeli government agencies as well as private groups.
The email provider that was hacked in Friday’s attack, Walla!, told Australia’s SC Magazine that they are working on “'hermetically' sealing off user details in Walla! Accounts”.
Ik bedank je ook nog even een keer PVquote:Op dinsdag 5 februari 2013 01:14 schreef picodealion het volgende:
Alvast weer even een bedankje voor je toegewijdheid, hebben we dat dit topic vast weer gehad.
Dank jullie wel, ook namens McDonalds Burger Kingquote:Op maandag 18 februari 2013 17:03 schreef Probably_on_pcp het volgende:
[..]
Ik bedank je ook nog even een keer PV
quote:Burger King Twitter Account Hacked
Hackers took over Burger King's Twitter account on Monday.
The cyber tricksters changed the fast food company's avatar and name to "McDonalds" and sent a McFlurry of questionable and offensive tweets. The Twitter mishap isn't all bad news for Burger King though — the account added 5,000 new followers in the first 30 minutes since the hackers took over.
Mashable has reached out to the company and will update this post with any response.
quote:Anonymous hacks U.S. State Department and investment firm, leaks data
Anonymous continues with its Operation Last Resort, and its latest targets were the websites of the U.S. Department of State (state.gov) and of investment firm George K. Baum and Company (gkbaum.com).
From the former they exfiltrated - and published - databases containing a treasure trove of personal information about their employees (names, birth dates, phone numbers, email addresses, home and work addresses, and so on).
"Our reasons for this attack are very simple. You've imprisoned or either censored our people. […] Basically, you tried to put an end to us and you got owned, there's nothing more you can say or do. You took away Topiary, Avunit, Neuron, Pwnsauce, lolspoon, Aaron Swartz shall we go on?" they wrote in a not accompanying the leak, reiterating that Operation Last Resort has been launched in memory of recently tragically deceased Internet activist Aaron Swartz.
George K. Baum and Company's website was defaced, and a link to a ZeroBin post containing details of their customers' accounts (names, email addresses, passwords and more) in clear text was published on it.
According to a post on the @OpLastResort Twitter account, the investment firm was hit because its Vice President Joshua Magden was a client of Stratfor (Strategic Forecasting Inc.), a US-based think-tank that Anonymous hacked in December 2011.
Operation Last Resort started with the DDoS attack on MIT's official website and the defacement of one of its subdomains, on which Anonymous called for a reform of "computer crime laws, and the overzealous prosecutors who use them", "reform of copyright and intellectual property law", "greater recognition of the oppression and injustices heaped daily by certain persons and institutions of authority upon anyone who dares to stand up and be counted for their beliefs, and for greater solidarity and mutual aid in response", and a "renewed and unwavering commitment to a free and unfettered internet, spared from censorship with equality of access and franchise for all."
Met gegevens van de Stratfor hack, is de laatste hack gepleegd. Dus het antwoord is ja.quote:Op dinsdag 19 februari 2013 20:29 schreef sp3c het volgende:
is er nu eigenlijk wat gebeurt met al die prive informatie die ze online gegooit hebben?
lezen mensen het uberhaupt nog?
ik krijg niet de indruk dat mensen er nog heel erg van onder de indruk rakenquote:databases containing a treasure trove of personal information about their employees (names, birth dates, phone numbers, email addresses, home and work addresses, and so on).
Dat is dan dom, want identiteits fraude is een groot probleem.quote:Op dinsdag 19 februari 2013 20:39 schreef sp3c het volgende:
nee ik bedoel dit soort dingen
[..]
ik krijg niet de indruk dat mensen er nog heel erg van onder de indruk raken
tuurlijk en de schending van de privacy van die mensen ookquote:Op dinsdag 19 februari 2013 20:48 schreef Papierversnipperaar het volgende:
[..]
Dat is dan dom, want identiteits fraude is een groot probleem.
http://www.reddit.com/r/a(...)nymous_oplastresort/quote:Op dinsdag 19 februari 2013 20:55 schreef sp3c het volgende:
[..]
tuurlijk en de schending van de privacy van die mensen ook
maar ja ... lekker belangrijk ofzo
En de Fed's hebben de Stratfor hack gefaciliteerd.quote:I'm not really sure. All that I can say is that according to Xero Flux, no one there knows who they are. I guess that doesn't mean I guess they aren't willing to dump the data for them though...
Other users on here have also questioned anonymousIRC's legitimacy as well. Idk.
All that can really be said about all this is that OpLastResort isn't making any sense. Why leak the personal information of innocent people that don't have anything to do with anything, and then turn around and demand cyber legislation reform? If they aren't the FEDs they are the most useful idiots I've ever seen.
quote:Aaron Swartz files reveal how FBI tracked internet activist
Firedoglake blogger Daniel Wright publishes once-classified FBI documents that show extent of agency's investigation into Swartz
A blogger has published once-classified FBI files that show how the agency tracked and collected information on internet activist Aaron Swartz.
Swartz, who killed himself in January aged 26, had previously requested his files and posted them on his blog, but some new documents and redactions are included in the files published by Firedoglake blogger Daniel Wright.
Wright was given 21 of 23 declassified documents, thanks to a rule that declassifies FBI files on the deceased. Wright said that he was told the other two pages of documents were not provided because of Freedom of Inorfamtion subsections concerning privacy, "sources and methods," and that can "put someone's life in danger."
The FBI's files concern Swartz's involvement in accessing the Public Access to Court Electronic Records (Pacer) documents. In pursuit of their investigation, the FBI had collected his personal information and was surveilling an Illinois address where he had his IP address registered.
quote:
quote:How did security firm Mandiant put names to two previously unknown Chinese hackers who, it says, steal American corporate secrets for the Chinese government? With a little inadvertent help from Anonymous.
Mandiant's 74-page report covers a particular hacking group referred to as "APT1" and contends that the group works for or under the direction of the Chinese government as part of the military's secretive "Unit 61398." The report ties a huge string of hacks over the last few years to Unit 61398 and goes on to show the building where the hacks might be hatched. The report is stuffed with detail uncommon in these types of stories; it even includes a translated Chinese document showing a local telecom company agreeing to Unit 61398's request for additional fiber optic connections in the name of state security.
The Mandiant researchers then tried to go one step further, putting at least a few real names to the coders involved. (BusinessWeek recently did something similar, with fascinating results.) Mandiant began with a malware coder who goes by the name "UglyGorilla"—a name which is left repeatedly in code tied to the APT1 group.
Back in 2007, for instance, Mandiant says that UglyGorilla "authored the first known sample of the MANITSME family of malware and, like a good artist, left his clearly identifiable signature in the code: 'v1.0 No Doubt to Hack You, Writed by UglyGorilla, 06/29/2007'[sic]." But despite all the uses of the name "UglyGorilla" buried in code samples, leads to the person's actual identity were hard to come by—until Anonymous hacked security firm HBGary Federal in early 2011.
quote:Pirate Party Threatened With Lawsuit for Hosting The Pirate Bay
For several years the Swedish Pirate Party has provided hosting services to The Pirate Bay. One of the main reasons for the BitTorrent site to team up with the political party was because it wouldn’t easily cave in to pressure from the entertainment industry. This promise will now be put to the test as the Swedish copyright watchdog “Rights Alliance” threatens to sue the Pirate Party next week if they refuse to pull the plug on TPB.
To serve its millions of daily visitors, The Pirate Bay uses a variety of hosting providers.
While the locations and providers of most cloud servers are unknown to the public, it is no secret that some of TPB’s traffic is routed through the Swedish Pirate Party.
TPB turned to the Pirate Party in 2010 after several major Hollywood movie studios obtained injunctions against its former hosting providers. The Pirate Party wanted to make a stand against the “bullying” tactics of the entertainment industry, and after three years this promise will now be put to its most serious test yet.
Today the Pirates announced that they have received a letter from the Swedish “Rights Alliance,” who are threatening legal action against the party and its representatives if they don’t stop servicing TPB within a week.
In the letter, which also targets bandwidth provider Serious Tubes, the group cites last year’s Supreme Court rejection of The Pirate Bay case as a precedent that hosting providers can be held liable for providing Internet services to file-sharing sites.
“With that decision, it was finally determined that not only those who operate illegal file sharing services, but also the Internet providers to such illegal services are committing a criminal act,” the Rights Alliance writes.
The Pirate Party clearly sees things differently and are convinced that they aren’t doing anything that’s against the law.
“The Pirate Party’s activity is legal and lawful activities should not be subjected to threats of this type. It is not illegal to provide the Pirate Bay with Internet access,” Pirate Party leader Anna Troberg says in a comment.
“There is no list of illegal sites which ISPs can not provide internet access to,” she adds.
The Pirate Party goes on to highlight that these type of “blackmail” campaigns are a way for the copyright holders to get what they want.
“Unfortunately, the kind of blackmail that the Pirate Party is now exposed to is not uncommon. Large and small Internet service providers are often subjected to similar pressure from the copyright industry lawyers,” Troberg notes.
“It is sad that they are allowed to continue this way, with both politicians and judicial blessing,” she adds.
While the Pirate Party doesn’t think they are breaking any laws, they are not sure whether the court will give them a fair hearing if the case goes to trial. Adding to that, the criminal conviction against the Pirate Bay founders and previous injunctions against TPB’s hosting providers will not be in their favor.
“Unfortunately, the fact that an activity is legal is not a guarantee that you will get a fair trial. This is precisely why the Pirate Party and is needed more than ever,” Troberg concludes.
The Pirate Party has until February 26 to decide how to respond to Rights Alliance’s threats.
quote:Jeremy Hammond on Aaron Swartz and the Criminalization of Digital Dissent.
A statement released today, Feb 20th, by Jeremy Hammonds lawyer. This is Jeremy Hammond in his own words. Written from solitary confinement.
Jeremy Hammond on Aaron Swartz and the Criminalization of Digital Dissent
The tragic death of internet freedom fighter Aaron Swartz reveals the government’s flawed “cyber security strategy” as well as its systematic corruption involving computer crime investigations, intellectual property law, and government/corporate transparency. In a society supposedly based on principles of democracy and due process, Aaron’s efforts to liberate the internet, including free distribution of JSTOR academic essays, access to public court records on PACER, stopping the passage of SOPA/PIPA, and developing the Creative Commons, make him a hero, not a criminal. It is not the “crimes” Aaron may have committed that made him a target of federal prosecution, but his ideas – elaborated in his “Guerrilla Open Access Manifesto” – that the government has found so dangerous. The United States Attorney’s aggressive prosecution, riddled with abuse and misconduct, is what led to the death of this hero. This sad and angering chapter should serve as a wake up call for all of us to acknowledge the danger inherent in our criminal justice system.
Aaron’s case is part of the recent aggressive, politically-motivated expansion of computer crime law where hackers and activists are increasingly criminalized because of alleged “cyber-terrorist” threats. The United States Attorney for the Southern District of New York, Preet Bharara, whose office is prosecuting me and my co-defendants in the Lulzsec indictment, has used alarmist rhetoric such as the threat of an imminent “Pearl Harbor like cyber attack” to justify these prosecutions. At the same time the government routinely trains and deploys their own hackers to launch sophisticated cyber attacks against the infrastructure of foreign countries, such as the Stuxnet and Flame viruses, without public knowledge, oversight, declarations of war, or consent from international authorities. DARPA, US Cyber Command, the NSA, and numerous federally-contracted private corporations openly recruit hackers to develop defensive and offensive capabilities and build Orwellian digital surveillance networks, designed not to enhance national security but to advance U.S. imperialism. They even attend and speak at hacker conferences, such as DEFCON, offer to bribe hackerspaces for their research, and created the insulting “National Civic Hacker Day” – efforts which should be boycotted or confronted every step of the way.
Aaron is a hero because he refused to play along with the government’s agenda, instead he used his brilliance and passion to create a more transparent society. Through the free software movement, open publishing and file sharing, and development of cryptography and anonymity technology, digital activists have revealed the poverty of neo-liberalism and intellectual property. Aaron opposed reducing everything to a commodity to be bought or sold for a profit.
The rise in effectiveness of, and public support for, movements like Anonymous and Wikileaks has led to an expansion of computer crime investigations – most importantly enhancements to 18 U.S.C § 1030, the Computer Fraud and Abuse Act (CFAA). Over the years the CFAA has been amended five times and has gone through a number of important court rulings that have greatly expanded what the act covers concerning “accessing a protected computer without authorization.” It is now difficult to determine exactly what conduct would be considered legal. The definition of a “protected computer” has been incrementally expanded to include any government or corporate computer in or outside the U.S. “Authorization,” not explicitly defined by the CFAA, has also been expanded to be so ambiguous that any use of a website, network, or PC that is outside of the interest, agenda, or contractual obligations of a private or government entity could be criminalized. In Aaron’s case and others the government has defined violating a service’s Acceptable Use Policy (AUP), Terms of Service (TOS), or End-User License Agreement (EULA) as illegal. Every time you sign up for a service like Gmail, Hotmail, or Facebook and click the “I agree” button that follows a long contract that no one ever reads, you could be prosecuted under the CFAA if you violate any of the terms.
The sheer number of everyday computer users who could be considered criminals under these broad and ambiguous definitions enables the politically motivated prosecution of anyone who voices dissent. The CFAA should be found unconstitutional under the void-for-vagueness doctrine of the due process clause. Instead, Congress proposed bills last year which would double the statutory maximum sentences and introduce mandatory minimum sentences, similar to the excessive sentences imposed in drug cases which have been widely opposed by many federal and state judges.
The “Operation Payback” case in San Jose, California is another miscarriage of justice where 16 suspected Anonymous members (including a 16 year old boy) allegedly participated in a denial-of-service action against PayPal in protest of it’s financial blockade of Wikileaks. Denial-of-service does not “exceed authorized access,” as it is virtually indistinguishable from standard web requests. It is more akin to an electronic sit-in protest, overloading the website’s servers making it incapable of serving legitimate traffic, than a criminal act involving stolen private information or destruction of servers. PayPal’s website was only slow or unavailable for a matter of hours, yet these digital activists face prison time of more that 10 years, $250,000 in fines, and felony convictions because the government wants to criminalize this form of internet protest and send a warning to would be Wikileaks supporters.
Another recent case is that of Andrew “Weev” Auernheimer, who last November was convicted under the CFAA. Andrew discovered that AT&T was publishing customer names and email addresses on it’s public-facing website, without password protection, encryption, or firewalls. Instead of acknowledging their own mistake in violating customer privacy, AT&T sought prison time for Andrew. Andrew has defended his actions saying, “We have not only a right as Americans to analyze things that corporations publish and make publicly accessible but perhaps a moral obligation to tell people about it.”
I am currently facing multiple computer hacking conspiracy charges due to my alleged involvement with Anonymous, LulzSec, andAntiSec, groups which have targeted and exposed corruption in government institutions and corporations such as Stratfor, The Arizona Department of Public Safety, and HB Gary Federal. My potential sentence is dramatically increased because the Patriot Act expanded the CFAA’s definition of “loss.” This allowed Stratfor to claim over 5 million dollars in damages, including the exorbitant cost of hiring outside credit protection agencies and “infosec” corporations, purchasing new servers, 1.6 million dollars in “lost potential revenue” for the time their website was down, and even the cost of a 1.3 million dollar settlement for a class action lawsuit filed against them. Coupled with use of “sophisticated means” and “affecting critical infrastructure” sentence enhancements, if convicted at trial I am facing a sentence of 30-years-to-life.
Dirty trial tactics and lengthy sentences are not anomalies but are part of a fundamentally flawed and corrupt two-tiered system of “justice” which seeks to reap profits from the mass incarceration of millions, especially people of color and the impoverished. The use of informants who cooperate in exchange for lighter sentences is not just utilized in the repressive prosecutions of protest movements and manufactured “terrorist” Islamophobic witch-hunts, but also in most drug cases, where defendants face some of the harshest sentences in the world.
For Aaron Swartz, himself facing 13 felony CFAA charges, it is likely that it was this intense pressure from relentless and uncompromising prosecutors, who, while being aware of Aaron’s psychological fragility, continued to demand prison time, that led to his untimely death.
Due to widespread public outrage, there is talk of congressional investigations into the CFAA. But since the same Congress had proposed increased penalties not even one year ago, any efforts at reform are unlikely to be more than symbolic. What is needed is not reform but total transformation; not amendments but abolition. Aaron is a hero to me because he did not wait for those in power to realize his vision and change their game, he sought to change the game himself, and he did so without fear of being labeled a criminal and imprisoned by a backwards system of justice.
We the people demand free and equal access to information and technology. We demand transparency and accountability from governments and big corporations, and privacy for the masses from invasive surveillance networks.
The government will never be forgiven. Aaron Swartz will never be forgotten.
quote:White House warns of dangers posed by WikiLeaks, LulzSec, other 'hacktivists'
New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct "economic espionage against U.S. companies."
The White House warned today of the threat posed by WikiLeaks, LulzSec, and other "hacktivist" groups that have the ability to target U.S. companies and expropriate confidential data.
A new administration-wide strategy (PDF) disclosed at a high-profile event in Washington that included Attorney General Eric Holder says the theft of trade secrets is on the rise and predicts such theft will undermine U.S. national security unless halted.
It's a "steadily increasing threat to America's economy and national security interests," Holder said at the event, which also featured officials from the State Department and the Office of the Director of National Intelligence.
"Disgruntled insiders [may leak] information about corporate trade secrets or critical U.S. technology to 'hacktivist' groups like WikiLeaks," the White House warns. Such groups could "develop customized malware or remote-access exploits to steal sensitive U.S. economic or technology information."
It's an unanticipated inclusion in a strategy that was expected to be focused on state-sponsored intrusions -- especially in the wake of disclosures this week about the Chinese military's involvement in penetrating the networks of U.S.-headquartered companies -- and signals that the government's interest in WikiLeaks has not abated. Vice President Joe Biden has called WikiLeaks editor Julian Assange a "high-tech terrorist," and a grand jury has been empaneled in Alexandria, Va., as part of a criminal investigation of the group.
While WikiLeaks is probably best known for disclosing sensitive U.S. government files, it has also released internal bank documents (and once promised to release more) and has been the subject of a controversial funds blockade by Mastercard, Visa, and PayPal. For its part, LulzSec successfully targeted News Corp., HBGary, and Sony in 2011, but has been far less active since, especially after it was infiltrated by the FBI.
The White House strategy views both organizations as part of a broader problem of nongovernment groups taking aim at U.S. companies' networks, and predicts:
. Some intelligence services with less developed cyberprograms already use relationships with nominally independent hackers to augment their capabilities to target political and military information or to carry out operations against regime enemies. For example, the Iranian Cyber Army, a hacker group with links to the Iranian Government, has used social engineering techniques to obtain control over Internet domains and disrupt the political opposition...
. Political or social activists also may use the tools of economic espionage against U.S. companies, agencies, or other entities. The self-styled whistle-blowing group WikiLeaks has already published computer files provided by corporate insiders indicating allegedly illegal or unethical behavior at a Swiss bank, a Netherlands-based commodities company, and an international pharmaceutical trade association. LulzSec -- another hacktivist group -- has exfiltrated data from several businesses that it posted for public viewing on its Web site.
In response to these threats, as well as to state-sponsored groups such as the ones Mandiant disclosed this week, the administration says it will increase "international law enforcement cooperation" and that the FBI and Justice Department will "prioritize these investigations and prosecutions."
WikiLeaks' Assange said in November in an appearance from Ecuador's London embassy that prosecutors want alleged source Bradley Manning, who's currently facing criminal charges inside the military justice system, to identify him as a party to the extraction and delivery of secret U.S. government files.
The Army wants, Assange said from his embassy room where he has sought refuge to avoid an extradition attempt, "to break him, to force him to testify against WikiLeaks and me" -- an apparent reference to the Justice Department's grand jury probe. If prosecutors allege conspiracy to commit computer crimes, they could avoid some of the free speech problems they'd face in an Espionage Act prosecution.
Wat een newspeakquote:Op donderdag 21 februari 2013 16:33 schreef Papierversnipperaar het volgende:
"New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct "economic espionage against U.S. companies."
twitter:YourAnonNews twitterde op zaterdag 23-02-2013 om 19:42:58Project PM has disappeared from the internet. If anyone has a copy of the site, contact us we will mirror with new TLD. PLF@riseup.net reageer retweet
twitter:AnonymousIRC twitterde op maandag 25-02-2013 om 14:01:20Bank Of America spy team working lurking on #Anonymous networks. [teaser #1] http://t.co/2EE6yOYhWW #Anonymous #OWS #Wikileaks reageer retweet
twitter:AnonymousIRC twitterde op maandag 25-02-2013 om 19:07:50the pastebins for the teasers all down? Why u so mad, Bank of America? #Anonymous #OWS #Wikileaks reageer retweet
quote:
quote:Bank of America went totally nuts and fucking mad cow
and censored all the previous releases, as we love so
much fingering prolapses after buttraeping. here we go
again.
so....
MEGA TEASEEEEEEEEEEEEEEEEERRRR
ALSO COCKS
\:D/
Summary of Information: By the way, if you asked Santa for a present
this #LulzXmas BE PATIENT. Santa has another week people. Questions?
Twitter @ DesructiveSec - Anontastic - Comment: This new information
suggests that we may not be seeing any �Big� releases from #LulzXmas
just yet, however it is advised that we not let our guards down as this
could be what they are hoping for. Ends.
Respectfully,
Jay Haak
Threat Analyst - 24/7 Early Warning Team
TEKsystems Contractor for Bank Of America
Cell: (281) 840-1822
Email: jay.haak@bankofamerica.com
BAML-EWT email.png
Subject: EWT - TACTO - Tracking Occupiers
-----------------------------------------
BAML-EWT logo.png
Source: RawStory.com / Twitter
Date / Time: Tweeted � 28 APR 12 @ 21:07EST / Story Posted � 28 APR 12 @
19:19EDT
Summary of Information: The following tweet was observed: �Banks
cooperating with police to track #Occupy protestors: goo.gl/tpvko #OWS #MAY1st
#MAYDAY @M1GS� � AnonInfoWarfare. The link is to a story that was written
by Andrew Jones of RawStory claiming that American banks and those overseas are
working with law enforcement officials in order to detect and deter the Occupy
Protestors attacks. Currently there are 20 comments from readers, 193
Recommendations to Facebook Users, and 27 Tweets About this Story have been
observed.
http://www.rawstory.com/r(...)-police-to-track-occ
upy-protesters/
Comment: Some comments that have been observed have been individuals claiming
their not surprised while others are outraged. By this story being spread
through the normal social media venues and #MAYDAY quickly approaching we could
see some changes in the way Occupy decides to get the word out to their fellow
protestors. EWT will continue to monitor for any developments regarding this
story, or any suggestions of alternate means of communication regarding protest
activities. Ends.
Respectfully,
Jay Haak
Threat Analyst - 24/7 Early Warning Team
TEKsystems Contractor for Bank Of America
Cell: (281) 840-1822
Email: jay.haak@bankofamerica.com
BAML-EWT email.png
quote:Bank of America (and their lackeys)
We have anchored at U.S. shores again to accept a consignment of a data package that probably belongs to our dear friends at Bank of America, though lots of contractors and subsidiaries (aka lackeys) are involved as usual.
It is a known fact that Bank of America is paying contractors to discredit journalist and sabotage their work as well as spying on the Occupy Movement and Anonymous ever since. It was to be expected that these efforts continue and it was also expected that their security remains - at best - lousy.
To start with, we present you about 320mb of internal reports and and emails assembled for Bank of America by a sub-contractor named TEKSystems (who in turn are a subsidiary of the Allegio Group whose founder also owns the Baltimore Ravens). These reports and emails assembled "intelligence" from sources like public channels on Anonymous and other IRC networks like Anonops, Voxanon and Cryto, as well as other social media.
We were geniously amused by the fact that there are actually paid analysts sitting somewhere, reading the vast amount garbage that scrolls by in large public channels like #anonops and #voxanon. Even more amusing is the keyword list that was found, containing trigger words like "Jihad" or "Homosexual".
Additionally about 6 Gigabyte of source code was looted, which is currently under assessment. We can tell so far that this software belongs to ClearForest, a company specializing on text and social network analysis. It is reasonable to assume that this code is the base system for what was used to categorize and store the acquired information. We will add the complete source code once we have finshied the initial assessment.
In the meantime, amuse yourself with the incredibly sensitive and important intelligence that BofA has gathered on Anonops and Voxanon (*smirk*). Please also note that the source has provided an accompanying release statement with the data.
quote:Pirate Bay abandons Sweden for Norway and Spain after legal threats
The Swedish Pirate Party has handed over hosting of the Pirate Bay to sister parties in Norway and Spain after the country’s copyright lobby sent a letter threatening criminal charges for hosting the controversial file-sharing website.
The Swedish Rights Alliance gave the party until Tuesday to cut all ties with the Pirate Bay following threats of serious legal consequences. In a letter sent directly to the party's board members, the Swedish Pirate Party was accused of violating copyright law by acting as an Internet service provider for the popular bittorrent site.
The alliance also charged that the Supreme Court of Sweden had “legally settled that not only those who operate an illegal file-sharing service, but also those who provide internet access to such an illegal service are committing a criminal act.”
The Rights Alliance said that such violations of copyright law could entail stiff fines for noncompliance, payment of damages and even potential prison terms. “These rules apply to legal entities, including non-profit organizations such as The Pirate Party and Serious Tubes, their board members, and other representatives of the organizations,” the letter continued.
The Pirate Bay’s decision to move its web-hosting services to Norway and Spain likely stems from legal precedents indicating more favorable climates for file-sharing sites.
In 2010, the International Federation of the Phonographic Industry (IFPI) and several movie studios were unable to force a Norwegian ISP to block the Pirate Bay. Spanish courts have so far failed to react to dozens of site closure requests from rightsholders, and threats from the United States that Spain will be put on a trade blacklist.
Swedish Pirate Party Leader Anna Troberg hailed the shift as a positive sign that despite legal pressure at home, the movement is continuing to become an international platform for reforming copyright laws and patents.
“Today, there are more than sixty different Pirate Parties all around the world. Every cut connection to The Pirate Bay will generate two new connections,” Torrent Freak quoted her as saying.
She further said that to take the Rights Alliance on at this time would not be prudent, despite the tenuous legal claims leveled at the Pirate Party.
“It would be crazy to enter a game where the rules are decided by the other team,” she said. “The Pirate Party’s mission is not to produce martyrs for the copyright industry. Our mission is to create longterm political change that ensures that the copyright industry in the future will not be allowed to threaten companies, organizations and individuals into silence with our common judicial system as a weapon.”
twitter:YourAnonNews twitterde op dinsdag 26-02-2013 om 21:32:41While we work with our ISP to register a new TLD, you can access Project PM at http://t.co/12CGG4C39c | We apologize for the inconvenience. reageer retweet
quote:Anti-protest: Bahrain bans import of plastic Guy Fawkes masks
The Kingdom of Bahrain’s Industry and Commerce Minister, Hassan Fakhro, issued an unusual decree this week: he banned the importation of a plastic face mask. Anyone caught importing the V for Vendetta Guy Fawkes mask now faces arrest, as anti-government protesters in the country have been using them to stay anonymous.
The stylised visage of Guy Fawkes became popular among protesters after the 2005 Hollywood film depicted thousands marching on Parliament wearing them.
Yet, while it has became an icon for protesters from members of the Occupy Wall Street movement to London demonstrators taking on the Church of Scientology, it has also been a key part of protests in the Arab Spring and Middle Eastern protests that have continued since the heady days of 2011.
Sadly, though, it is but a mask. And the thing about a masks is, you can print them, paint them or draw them yourself. Unless the minister plans to ban all such activity it seems an action as futile as the real Guy Fawkes’s.
quote:
quote:"[T]he data was not acquired by a hack but because it was stored on a misconfigured server and basically open for grabs. Even more alarming, the data was retrieved from an Israeli server in Tel Aviv."
quote:
quote:Having a team on staff to protect a corporation from potential cyber-threats is nothing new. This isn’t what caught the attention of Anonymous to begin with; it was the methods being employed by Bank of America to gather data. Each of the 500+ e-mails pilfered reads like a surveillance report, most of them reporting on the activities of online activists from Anonymous to Occupy Wall St.
quote:The stolen data was spread through various Anonymous accounts, but one group in particular took responsibility for its release. They’re called “Par:AnoIA,” and I had the opportunity to interview one of their members.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |