background preloader

How one man tracked down Anonymous—and paid a heavy price

How one man tracked down Anonymous—and paid a heavy price
Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them. But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code. In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project. "They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" But had he? "We are kind of pissed at him right now" Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. "At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail. Indeed, publicity was the plan.

TASC - Echelon 2 TASC, Inc. describes itself as "a renowned provider of advanced systems engineering, integration and decision–support services across the intelligence, defense, homeland security and federal markets." It's also a major target of our investigation due to correspondence discovered between HBGary Federal CEO Aaron Barr and TASC executives Al Pisani and John Lovegrove regarding their collaborative pursuit of the Romas/COIN contract, which was then held by Northrop Grumman . Throughout 2010, Barr exchanged dozens of e-mails with TASC executives as the two parties collaborated on building a team capable of winning the Romas/COIN contract away from Northrop; to a lesser extent, Mantech CEO Robert Frisbie was also involved in this effort, mostly in communication with Barr. The full report on Romas/COIN may be found at its page; below is a sampling of e-mails from the period. From: Aaron Barr <aaron@hbgary.com> To: Pisani, Albert A. Al, I met with Bob Frisbie the other day to catch up. Peter A.

How Aaron Barr Infiltrated Anonymous, and Why He Decided to Do It Ars Technica's Nate Anderson has put together a long and fascinating report on the tumultuous recent history of Aaron Barr -- the security expert who successfully infiltrated Anonymous, and then got burned, after running to the FBI with his findings. Based on e-mails he sent before beginning his mission, it's clear that Barr's motives, from the very beginning, were profit-driven. A social media fanatic, Barr firmly believed that he could use data from sites like Facebook and LinkedIn to identify any hacker in the world, including members of Anonymous. "Hackers may not list the data, but hackers are people too so they associate with friends and family," Barr wrote in an e-mail to a colleague at HBGary Federal. Using several aliases, Barr began regularly dropping in on Anonymous' instant relay chat (IRC) forums, and, after setting up fake Facebook and Twitter accounts, attempted to unearth the members' true identities via social media.

Aaron Barr HBGary is subsidiary company of ManTech International, focused on technology security. In the past two distinct but affiliated firms had carried the HBGary name: HBGary Federal, which sold its products to the US Federal Government,[3] and HB Gary, Inc.[4] Its other clients included information assurance companies, computer emergency response teams, and computer forensic investigators.[5] On February 29, 2012, HBGary, Inc. announced it was acquired by IT services firm ManTech International.[6] At the same time, HBGary Federal has been reported to be closed.[6] History[edit] The company was founded by Greg Hoglund in 2003.[1] In 2008, it joined the McAfee Security Innovation Alliance.[5] The CEO made presentations at the Black Hat Briefings, the RSA Conference, and other computer security conferences.[7][8] HBGary also analyzed the GhostNet and Operation Aurora events.[3][7] As of 2010, it had offices in Sacramento, California, Washington, D.C., and Bethesda, Maryland.[2] Fallout[edit]

A sinister cyber-surveillance scheme exposed | Barrett Brown When President Eisenhower left office in 1960, he provided the American people with a warning. "In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist." Sixty years later, the military-industrial complex has been joined by another unprecedented centre of what has increasingly proven to be "misplaced power": the dozens of secretive firms known collectively as the intelligence contracting industry. Last February, three of these firms – HBGary Federal, Palantir and Berico, known collectively as Team Themis – were discovered to have conspired to hire out their information war capabilities to corporations which hoped to strike back at perceived enemies, including US activist groups, WikiLeaks and journalist Glenn Greenwald.

hbgary

Related: