Get flash to fully experience Pearltrees
The background from LulzSec's Twitter page. Leaked IRC logs show the group's inner workings. Photograph: AP
Kyle Natale, 16, a member of the Xpoliters, the Harford Technical… (Kim Hairston, Baltimore…) October 22, 2011 | By Candus Thomson, The Baltimore Sun Like skilled cat burglars, teams of college-age hackers slithered past defenses to probe the soft underbelly of a sophisticated computer system. Their mission: to steal secrets and leave an electronic calling card.
I just happened to be around when a bunch of Anonymous pushed out a document which has the potential to be rather important in the future. I'm republishing it here because (a) I've already seen people here ask about it and (b) the original was published as a PDF on a file sharing site which doesn't have a search engine. (Update 22JAN2013: @sept31st notified me that the original URL 404ed . PDF link updated.) Running under the title " What is #AntiShock?
Editor’s note: Contributor Mouna El Mokhtari is a French journalist and editor in chief of Webdorado . Below is her translation of an exclusive interview she conducted with Tunisian hacktivist K3vin Mitchnik . You can follow her @mooouna
The Tor anonymity network is most commonly used by individuals who want to use the Internet with privacy, including political activists in nations without free speech protections. But it can also be used to serve content, so no one can easily find the Web servers. This is called the "darknet." And some of those servers provide illegal content, such as child pornography.
(The Nation) In late September, deep in bucolic Oxfordshire, an eclectic group of spooks, soldiers, civil servants, academics and geeks gathered in surroundings eerily reminiscent of Downton Abbey. They took tea on the veranda, looked out onto a herd of docile cows and obediently trooped in to dinner when an austere-looking butler banged the gong. Their focus, however, could hardly have been further from the subtle class divisions that began to rend the fabric of British society in the early twentieth century. They were mulling over how governments should respond to the growing threats facing networked computer systems. Most of those in attendance were well accustomed to the task of trying to stop bad stuff from overwhelming the Internet, but the tone of the discussions was somber.
<img class="aligncenter size-full wp-image-59501" title="Predator cockpit_s" src="http://www.wired.com/images_blogs/dangerroom/2011/10/Predator-cockpit_s.jpg" alt="" width="600" height="400" /> A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones. The virus, first detected nearly two weeks ago by the military’s Host-Based Security System , has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say.
Los que se afanaron a tildar al colectivo de Anonymous como malvados terroristas enemigos de la sociedad , están de mala suerte. Miembros del movimiento anónimo han reclamado la autoría de una acción que ha terminado con 40 webs dedicadas a la pornografía infantil, y el filtrado de los nombres de más de 1500 miembros de una de ellas. La acción de Anonymous empezó el pasado 14 de Octubre, cuando se encontraron los enlaces al grupo de páginas, ‘escondidos’ en una guía del Internet ‘underground’. Allá encontraron la web Lolita City, de la que consiguieron recopilar los nombres de sus 1589 usuarios, filtrándolos, como suele ser usual, a Pastebin el día 18. Los Anonymous decidieron empezar su Operación Darknet cuando, en la guía Hidden Wiki, descubrieron otra web, de nombre “Hard Candy”, en la que había una lista de enlaces a otras webs con contenido pornográfico que usaban los pedófilos.
The story of Stuxnet reads like a cross between a work of cyberpunk fiction and an international spy novel. In 2009 the world community was intensely debating the immediacy of Iran’s nuclear weapon program readiness. Meanwhile, a clandestine software project, sponsored by a cyber superpower with vast resources, was engaged in coding the first known malware rootkit to monitor and subvert the programmable logic controllers of an industrial system, allegedly the Iranian Natanz uranium enrichment facility. Since the outbreak of the worm, security researchers have studied Stuxnet intensely to determine its origin, mechanism, and target. While the suspected aim was to disrupt Iran’s nuclear program, official confirmation only came late last year, as “Iranian President Mahmoud Ahmadinejad said [in November 2010] that malicious computer code launched by “enemies” of the state had sabotaged centrifuges used in Iran’s nuclear-enrichment program.”
HideMyAss.com, the anonymous VPN service, has admitted that it handed over the details of one of the alleged Lulzsec hackers who attacked systems belonging to Sony Picture Entertainment . The HideMyAss service is based in the UK and provides a free proxy that tell users they can “surf anonymously online, hide your IP address, secure your internet connection, hide your internet history, and protect your online identity.” Last week the alleged Lulzsec hacker known as ‘Recursion’, aka Cody Andrew Kretsinger, 23, of Phoenix, Arizona , was arrested by the FBI . Court Order HideMyAss explained that it had complied with a court order to disclose Kretsinger’s IP address that he had used to log into the HideMyAss service. Kretsinger had allegedly used HideMyAss.com’s web proxy service to disguise his IP (internet protocol) address whilst he was supposedly hacking into Sony Picture Entertainment servers.
LulzSec didn't invent hacktivism, let alone hacking. But the small crew of publicity-hungry digital pirates may have ushered in a new era for both as they merrily sailed the cyber-seas for 50 days of mayhem that became perhaps the biggest tech story of the first half of 2011. LulzSec now says that it's put the Lulz Boat in permanent dry dock . Taking the group at its word, what did these six individuals (the membership number LulzSec now cops to) accomplish in their brief but explosive time in the spotlight? Brand Name Hacktivism More important than the digital scalps LulzSec took—Sony, PBS, Infragard, the CIA, Arizona's Department of Public Saftey, to name a few—was the group's canny use of social media and clever manipulation of a pliant press that may have redefined hacktivism forever.
Anonymous Warns of 'Day of Vengeance' Saturday | Cybercrime & Cybercriminals | Online Attacks & Internet CrimeA manifesto posted online says the "hacktivist" group Anonymous will hold a "Day of Vengence" (sic) this Saturday (Sept. 24), a coordinated, multistate protest that will include cyberattacks against Wall Street and the New York Police Department. The letter appeared on Pastebin last night (Sept. 21), announcing that Saturday's protests and cyberattacks will target not only Wall Street and the NYPD, but several targets including so-called "Corrupt Banking Institutions." It did not say in which cities the physical protests will take place, but the main thrust behind the "day of vengeance" concerns recent demonstrations on Wall Street that, according to the letter, highlighted a serious injustice on the part of the NYPD.
By chronicle.SU , on March 9th, 2011 Cuthbert, GA-Early this morning, Kilgore Trout announced that the hacktivist group formerly known as Anonymous is dead. Because of the inevitable progression and definition of ideology that makes up the body politic of the group formerly known as Anonymous, expert analysts believe the rise of a leader became a necessity.
Presstorm is an incredibly large, online news source favorited by lovers of freedom and diaectic. Their twitter account has over 3,000 folowers, they claim 10Million hits per month (when their website isn't under attack), and they employ anyone and everyone. Unfortunately, they also look, smell, or, sound like terrorists to a self-prolaimed "Ethical Hacker." Mr.
It never ends. www.blackbergsecurity.us/ , owned and operated by Joe Black , has been taken down by online activists. The claim for the kill goes to twitter user @abhaxas , who promises a data dump soon. Mr.