background preloader

HBGARY

Facebook Twitter

YouTube? Why Do Bahrain and Saudi Protest Videos Come With Warning Labels? Reviewing the news from Bahrain today, I came across a link to one that local activists are circulating as a prime example of what they are facing every day. That video is the one to the left – and while quite disturbing, it does not contain any footage that would merit the warning label slapped on it by YouTube: The following content has been identified by the YouTube community as being potentially offensive or inappropriate. Viewer discretion is advised. As I’ve noted before, the same has been done for even videos of completely peaceful marches in Saudi Arabia. You really have to wonder just who is able to mark such reports as “potentially offensive”?

What you see is the beating of three young, unarmed men by “security” forces – likely Bahraini though some reports say that the ones wearing masks may also be Saudi. This treatment has become all too common in the streets of Bahrain as the government – with American nods and winks – continues it’s brutal crackdown.

You invade Bahrain. ‘Paranoia Meter’: HBGary’s Plot to Find the Pentagon’s Next WikiLeaker | Danger Room. Just because you’re paranoid doesn’t mean that HBGary won’t create a rootkit to record your keystrokes, read your e-mail and track where you move your mouse. Most (in)famous for proposing a wide-ranging plan to discredit the defenders of WikiLeaks, the security company HBGary Federal recently pitched the Pentagon’s premiere research branch on a Paranoia Meter to hunt down the next Bradley Manning.

The proposal was valuable enough to the company that CEO Aaron Barr wrote it himself. Barr resigned in the wake of the firm’s WikiLeaks scandal. Last August, as Danger Room reported, blue-sky research firm Darpa asked software engineers to design a system to sift through Defense Department e-mail, web and network usage for “anomalous missions” indicating that a user might intend to siphon sensitive information to unauthorized entities. The program is called CINDER, short for the Cyber Insider Threat Program. “[Y]ou can create way too many false positives,” Barr’s proposal concedes.

SOCKMONKEY

The Colbert Report. Anonymous speaks: the inside story. It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year. When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced.

As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published. Anonymous: more than kids HBGary and HBGary Federal position themselves as experts in computer security. Time for an injection. Aaron Barr Steps Down.

Barr resigns over Anon hack. High performance access to file storage HBGary Federal chief exec Aaron Barr has resigned in a bid to allow the firm to draw a line under the continuing revelations from the Anonymous hack attack. Barr was the prime mover in plans to out senior members of Anonymous at the B-Sides security conference last month. But hunter became hunted after the more skilled members of Anonymous hacked into HBGary Federal's computer network before publishing its email database. The emails included the revelation that Morgan Stanley, a HBGary client, was hit by the Operation Aurora attacks of late 2009, as well as messages that purported to show HBGary was planning a dirty tricks campaign against WikiLeaks. HBGary, while admitting it was hacked and not denying the authenticity of any particular message, has said that the notorious mischief maker at Anonymous had plenty of opportunity to alter the published emails.

BoA Fraud & Corruption Docs.

E-MAILS

Anon... In it 4 the lulz (RSA) Anonymous retaliates. HBGary working on secret rootkit. Tracking, Intimidating WLs’ Donors. HBG tries 2 protect us from anon. PRESS. Anonymous Press Release. Anonymous Concedes Defeat - Press Release - 06/02/2011 Anonymous Concedes Defeat A recent article in the Financial Times (click to read) cites a certain Aaron Barr of the “security services” firm HBGay Federal (amirite?) As claiming to have discovered the identities of Anonymous’ operating leadership and founder, with this having been accomplished in large part by an infiltration of our entirely secret IRC server anonops.ru and in particular our ultra-clasified channels #opegypt, #optunisia, and, of course, #reporters, which itself is the most secret of all. The following message was relayed to all Anons possessing at least 30 degrees of initiate status (17 in Scotland) or their equivalent in reddit karma, and is being leaked to the laity in an effort to gain their useless sympathy: Mr.

As Mr. At this point, it is safe to assume that the underground server sites at the North Pole have been compromised as well. All Hail Xenu, -Anonymous. Penny on IRC. A letter from Anon.