background preloader

Social Change - Anonymous

Facebook Twitter

Cell Phone Guide for Occupy Wall Street Protesters (and Everyone Else) Occupy Wall Street has called for a global day of action on October 15, and protesters are mobilizing all over the world. In the United States, the Occupy Wall Street movement has already spawned sizeable protests in New York, Washington DC, Boston, Seattle, San Francisco, Oakland, Austin, and other cities. Several of these movements have faced opposition from their local police departments, including mass arrests. Protesters of all political persuasions are increasingly documenting their protests -- and encounters with the police -- using electronic devices like cameras and cell phones. The following tips apply to protesters in the United States who are concerned about protecting their electronic devices when questioned, detained, or arrested by police.

These are general guidelines; individuals with specific concerns should talk to an attorney. 1. Think carefully about what’s on your phone before bringing it to a protest. Password-protect your phone - and consider encryption options. Anonymous Takes Revenge On Security Firm For Trying To Sell Supporters’ Details To FBI - Parmy Olson - Disruptors.

Whaat. HBGary leaked emails. Type: Other > Other Files: Size: 4.71 GiB (5053424159 Bytes) Uploaded: By: Anonymous Seeders: Leechers: Comments Info Hash: (Problems with magnets links are fixed by upgrading your torrent client!) Greetings HBGary (a computer "security" company), Your recent claims of "infiltrating" Anonymous amuse us, and so do your attempts at using Anonymous as a means to garner press attention for yourself.

Anon pwns HBGary Federal UPDATED w/PRESS RELEASE. Like Barr's previous statements to FT, the entirety of his research is not only terrible, but in many cases less informative than is the public record. The entry on me, for instance, is entirely inaccurate despite the fact that I have not been a clandestine participant since coming out of the closet months ago. As noted by Bernard Keane, the situation is rather hilarious. More to the point, it should demonstrate that HBGary Federal is not only incapable of protecting its clients and informing on folks who were among the first to get involved in Tunisia and Egypt - it is incapable of protecting itself. Here are the 60,000 e-mails that were acquired today. Enjoy! NOTE: I'VE TAKEN DOWN THE LINK BECAUSE THOSE E-MAILS ALSO INCLUDE THOSE FROM HBGARY ITSELF, WHICH ONLY OWNS 15 PERCENT OF HBGARY FEDERAL.

I'll be posting additional updates and materials here over the next few minutes. In conclusion, lol. ANONYMOUS PRESS RELEASE For Immediate Distribution February 7th, 2011 We are Anonymous. FBI goes after Anonymous for pro-WikiLeaks DDoS attacks. The FBI has joined in the hunt for those who participated in the retaliation attacks against companies that cut off services to WikiLeaks, executing more than 40 search warrants across the United States on Thursday, the bureau announced. In what seem to be timed raids, British police arrested five men Thursday morning who allegedly participated in the Anonymous group’s denial of service attacks on Visa, Mastercard, Paypal and Amazon in mid-December.

Anonymous was seeking to bring attention to—and punish—the financial-service companies’ decisions to prohibit donations to Wikileaks. Amazon was targeted after it kicked Wikileaks off its Web-hosting service. The attacks caused no permanent damage, as they simply temporarily overloaded a website with more traffic than the server could handle. They were, for the most part, really nothing more than the cyber equivalent of a campus sit-in. But the FBI warned it did not see it that way. Listing image by Stian Elkeland. How one man tracked down Anonymous—and paid a heavy price. Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them.

But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code. In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project. "They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases! " But had he? "We are kind of pissed at him right now" Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. "At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail. Indeed, publicity was the plan.

"TWO *REAL* GUNS POINTED AT ME": how the FBI raided Anonymous. The FBI yesterday executed 40 search warrants around the US to gather evidence on the Anonymous distributed denial of service (DDoS) attacks in defense of WikiLeaks last year—attacks which targeted Visa, MasterCard, PayPal, and Amazon. And when the FBI comes a-knockin', the whole house starts a rockin'. Ars has seen posts from a private forum in which several targets of the FBI raids offer brief descriptions of the experience, along with the occasional photo of a beaten-in front door. We cannot guarantee the authenticity of these accounts, though we believe them to be genuine. A note of context: "LOIC" here refers to the Low Orbit Ion Cannon, a software tool used in the Anonymous DDoS attacks that can flood a network connection with data. I used LOIC during that whole Wikileaks fiasco. The FBI showed up at my door with a search warrant for any electronic devices that may have been used in the attack.

A second account showed a similar level of, err, enthusiasm on the part of the FBI.