background preloader

How one man tracked down Anonymous

How one man tracked down Anonymous
Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them. But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code. In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project. "They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" But had he? "We are kind of pissed at him right now" Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. "At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail. Indeed, publicity was the plan. Related:  Anonymous & LulzSec

Anonymous speaks: the inside story of the HBGary hack It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year. When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. Over the last week, I've talked to some of those who participated in the HBGary hack to learn in detail how they penetrated HBGary's defenses and gave the company such a stunning black eye—and what the HBGary example means for the rest of us mere mortals who use the Internet. Anonymous: more than kids HBGary and HBGary Federal position themselves as experts in computer security. Time for an injection

Everything Anonymous Open Letter to Al Jazeera To Whom It May Concern: Thank you, Al Jazeera, for your outstanding coverage in the streets of Egypt. Your constant reporting and unbiased journalism has helped unite the revolutionaries, and the world. We stand with the people, waiting for Hosni Mubarak to relinquish the presidency and restore power to the people of Egypt. It is vital in this struggle that media outlets, do not become influenced by any Government or organization. As the protests escalated, so did the amount of people across the world watching Al Jazeera. The ideals of freedom and human rights are sought after throughout the globe. This has been an open letter from ANONYMOUS31 January, 2011 We do not forget,We do not forgive,We love you, Expect Us All content on this website is automatically licensed under a Creative Commons Attribution license.

Indian hacker group kicked-out by Facebook The Indian arm of a hacker group 'Anonymous' - called Anonymous Operation India - has been removed from Facebook and Twitter. Both the 'Operation India' Facebook page and '@operationindia' Twitter handle are no more accessible.'Anonymous' is a 'hacktivist' group that has been linked to the recent attack on Sony as well as against the governments of Iran, Spain, New Zealand and Colombia. Their operations started in India recently and came into the limelight when they claimed to have hacked the National Informatics Centre website and the Indian Army website last week . The NIC site on the URL was defaced with graffiti that said: "We exist without nationality.

In ‘Anonymous’ Raids, Feds Work From List of Top 1,000 Protesters | Threat Level It turns out there’s a method behind the FBI’s raids of suspected Anonymous members around the country. The bureau is working from a list, provided by PayPal, of the 1,000 internet IP addresses responsible for the most protest traffic during Anonymous’ DDoS attacks against PayPal last December. FBI agents served 40 search warrants in January on people suspected of hosing down PayPal during ”Operation Payback” — Anonymous’ retaliatory attack against companies who blacklisted WikiLeaks. An FBI affidavit first published Tuesday by an NBC affiliate in Dallas lays out how the FBI decided on its targets, and suggests the bureau may have plenty more. According to the affidavit, by FBI agent Chris Thompson, PayPal security officials were in close contact with the bureau beginning on December 6, two days after PayPal froze WikiLeaks’ donation account and the first day it began receiving serious denial-of-service traffic. The full affidavit is below. (Photo courtesy gaelx) Anonymous Affidavit

LulzSec hacking suspect ‘Topiary’ arrested in the Shetland Islands An 18-year old man has been arrested by British police in Shetland, UK, under suspicion of launching hacking attacks against a number of websites. Officers from the Metropolitan Police Service's Police Central e-Crime Unit (PCeU) arrested the man as part of an international investigation into the activities of the Anonymous and LulzSec hacktivist groups. The man, who was arrested at a residential address in Shetland, is said to have used the online nickname "Topiary" and acted as a spokesperson for the groups via forums such as Twitter. The suspected hacker is currently being transported to a central London police station, and a search is taking place at his home. "Topiary" has been identified in the past as having a leading role in hactivist attacks launched by the LulzSec and Anonymous groups. In recent months the LulzSec gang have hacked and launched denial-of-service attacks against a number of high profile websites including The Sun , the CIA , SOCA , Sony , PBS and the US Senate .

Exclusive: British Police Duped by LulzSec Into Arresting the Wrong Guy It appears UK police have been deceived by LulzSec. (Source: Warner Brothers) The man they believed to be a member of LulzSec was reportedly a famous internet troll, whom a LulzSec member "stole" the name of. This could prove the latest embarasment for UK police. LulzSec has a proud history of trickery. One blog claims this man to be the "real" LulzSec Topiary, as seen in an Anonymous press interview. Chat logs, video evidence indicate that the arrest was the result of misdirection Earlier today the blogosphere lit up with news that "Topiary" a key hacker from Anonymous and LulzSec was arrested. I. If the arrested man was indeed LulzSec's Topiary, he couldn't have picked a much more perfect lair. Police transported the 19-year-old suspect to central-London, for interrogation. Police characterized the arrest as a "pre-planned, intelligence-led operation". Topiary's Twitter account fell silent about a week ago, and many posts were deleted from it. II. They write: III. IV.

Infamous international hacking group LulzSec brought down by own leader Hector Xavier Monsegur is “Sabu,” the unemployed, 28-year-old father of two who allegedly commanded the loosely organized international hacker team LulzSec. Hector Xavier Monsegur is “Sabu,” the unemployed, 28-year-old father of two who allegedly commanded the loosely organized international hacker team LulzSec. Hector Xavier Monsegur is “Sabu,” the unemployed, 28-year-old father of two who allegedly commanded the loosely organized international hacker team LulzSec. Hector Xavier Monsegur is “Sabu,” the unemployed, 28-year-old father of two who allegedly commanded the loosely organized international hacker team LulzSec. EXCLUSIVE: Law enforcement agents on two continents swooped in on top members of the infamous computer hacking group LulzSec early this morning, and acting largely on evidence gathered by the organization’s brazen leader -- who sources say has been secretly working for the government for months -- arrested three and charged two more with conspiracy.

Stratfor Hassan Chakrani, Yazan al-Saadi In his most recent op-ed in the New York Times, Nicholas D. Kristof called talk about a military strike on Iran a consensus rather than a debate,... Read more | An Israeli intelligence agent said that contrary to common belief, Israel's renowned secret service, Mossad, was "not assassinating people that easy... Read more | US government officials requested that an American private security firm contact Syrian opposition figures in Turkey to see “how they can help in... Read more | Stratfor emails which are part of the Global Intelligence Files release by WikiLeaks imply that the Israeli intelligence agency Mossad has... Read more Top Google execs, including the company’s CEO and one of Barack Obama’s major presidential campaign donors Eric Schmidt, informed the intelligence... Read more | The emails, dated 2 May 2007, show discussions between Fred Burton, Stratfor’s vice-president of counter-terrorism, and analysts in regards to the... Read more | Read more |

Mossad Doing Business with Saudi Arabia: Stratfor Source The emails, dated 2 May 2007, show discussions between Fred Burton, Stratfor’s vice-president of counter-terrorism, and analysts in regards to the alleged secret Saudi-Israeli intelligence alliance. The email exchange also shows that Stratfor execs considered pursuing their own business relationship with the Saudi monarchy or, as Burton called them, “sleezy arsehole ragheads.” Burton forwarded a short message to the general analyst email list which recounted HUMINT (human intelligence) on the alleged secret deal. Additionally, the source advised Burton that the Saudis “are playing both sides of the fence – with the jihadists and the Israelis – for fear that the US does not have a handle on either.” The message by Burton was additionally shared with another list that included Stratfor’s president and Chief Financial Officer Don Kuykendall. Burton inquired, “Have we got the Saudi Foreign Ministry or intel[ligence] services as sub clients?

Stratfor: Inside the World of a Private CIA The leak of over five million emails from the US-based intelligence firm Stratfor, including information about credit card details, passwords, and the identities of sources, sheds new light on the rapidly changing world of intelligence gathering and exposes those behind it. Al-Akhbar gained access to the data obtained and published by WikiLeaks, including sensitive material pertaining to the Middle East. ◙ Browse through emails referenced in this article The Strategic Forecasting Inc., commonly known as Stratfor, is a private firm dealing in the lucrative business of intelligence gathering and assessment. Founded in 1996, the company gained global prominence during the NATO bombing of Kosovo in 1999 when its seemingly cutting-edge analysis was publicized by various news agencies. Until recently, much of the inner workings of Stratfor had been shrouded in mystery. What is Stratfor? Friedman's wife, Meredith, is actively involved in the operations of the think tank. Behind Stratfor's Hype

Inside the hacking of Stratfor: the FBI's case against Antisec member Anarchaos On December 6, 2011, a hacker using the handle "sup_g" private-messaged Hector Xavier Monsegur, otherwise known as "Sabu," on Anonymous's IRC server to tell him of a server he had gained access to. But "sup_g"—alleged by the government to be Jeremy Hammond—didn't know that the whole conversation was being logged by the FBI, and that Monsegur had turned confidential informant. "Yo, you round? working on this new target." The target was the server of Stratfor, the Austin-based global intelligence company that would soon become synonymous with the hacker phrase, "pwned." Over the course of the Anonymous cell Antisec's hacking and exploiting of the company's IT infrastructure, the group of hackers would expose credit card and other personal information of over 60,000 Stratfor customers and a vast archive of e-mail correspondence between the company's employees and customers in the private and government sectors. Getting nailed Listing image by Photograph by chris riebschlager

Doxed: how Sabu was outed by former Anons long before his arrest When the FBI arrested LulzSec leader Hector "Sabu" Monsegur, they did so in a hurry—hours before the arrest, Sabu was doxed, his identity posted to the Internet. With his name public, federal agents feared that he would start destroying evidence to protect himself, so they ended their covert surveillance and moved in, according to Fox News. Efforts to name and shame the LulzSec crew during its 50-day rampage were common. Many of these doxings were inaccurate, a result of faulty inferences or deliberate attempts to mislead on the part of the LulzSec hackers. But not all were wrong. In fact, the game of doxing Sabu was over before it had even started. This first doxing happened after a group of former Anonymous members, displeased at the moralizing direction that Anonymous had taken and at Sabu's leadership role, decided to take action. Backtrace then decided to out Sabu again. Doxings continued even after Sabu's arrest and eventual co-operation with the FBI.

Exclusive: FBI Escalates War On Anonymous “The cutting edge of cybercrime”—Lulzsec hackers get up to 32 months in jail LONDON, UK—The four British Lulzsec hackers—Mustafa "tflow" al-Bassam, Ryan "kayla" Ackroyd, Jake "topiary" Davis, and Ryan "ViraL" Cleary—were sentenced today to between 20 and 32 months in jail for crimes committed during Lulzsec's 50 day hacking spree in 2011. Prosecutors described the men as being at the "cutting edge of contemporary and emerging criminal offending known as cybercrime" and as "latter-day pirates." At previous hearings, al-Bassam, 18, of Peckham, London, and Davis, 20, of the Shetland Islands, entered guilty pleas to charges of conspiracy to commit DDoS attacks against targets including Westboro Baptist Church, Sony, Bethesda, and EVE Online. They also pled to conspiracy to hack targets including Nintendo, Sony (again), PBS, and HBGary. Ackroyd, 26, of Yorkshire, pled guilty only to the hacking charge. For these crimes, al-Bassam was sentenced to 20 months, suspended for two years and received 300 hours of community service. A history of lulz Caught Difficult childhoods