Anonymous on the ropes This blog set to diaplay 20 days of posts. Sorry Blogspot only shows 3 days, waiting for a Google fix, G Prologue: Anonymous has no idea of the shit storm headed their way. Good Luck Guys G The Post Wikileaks and Anonymous current cyber war is doomed. It is not a fight for free speech, They are not publishing material wrong doings, they are publishing everything, just to violate privacy. This act against WWW privacy will have deep and long reaching effects on Anonymous and Wilileaks. Very negative impacts. Wikileaks and Anonymous fight against privacy is EVIL. Wikileaks primary motive seems to be profit $$$, just like the Wall St Banks, without morals. They are at risk in this fight, because their cause is BAD. Even Gov.s have a right to privacy, now I'm not talking about releasing reports on US wrong doing, that they might be able to get away with. private or "Secret" is going to cause a huge backwash. And both groups will find it very expensive. You don't take a willow switch to a sleeping Lion. Gerald
TASC - Echelon 2 TASC, Inc. describes itself as "a renowned provider of advanced systems engineering, integration and decision–support services across the intelligence, defense, homeland security and federal markets." It's also a major target of our investigation due to correspondence discovered between HBGary Federal CEO Aaron Barr and TASC executives Al Pisani and John Lovegrove regarding their collaborative pursuit of the Romas/COIN contract, which was then held by Northrop Grumman . Throughout 2010, Barr exchanged dozens of e-mails with TASC executives as the two parties collaborated on building a team capable of winning the Romas/COIN contract away from Northrop; to a lesser extent, Mantech CEO Robert Frisbie was also involved in this effort, mostly in communication with Barr. The full report on Romas/COIN may be found at its page; below is a sampling of e-mails from the period. From: Aaron Barr <firstname.lastname@example.org> To: Pisani, Albert A. Al, I met with Bob Frisbie the other day to catch up. Peter A.
"TWO *REAL* GUNS POINTED AT ME": how the FBI raided Anonymous The FBI yesterday executed 40 search warrants around the US to gather evidence on the Anonymous distributed denial of service (DDoS) attacks in defense of WikiLeaks last year—attacks which targeted Visa, MasterCard, PayPal, and Amazon. And when the FBI comes a-knockin', the whole house starts a rockin'. Ars has seen posts from a private forum in which several targets of the FBI raids offer brief descriptions of the experience, along with the occasional photo of a beaten-in front door. A note of context: "LOIC" here refers to the Low Orbit Ion Cannon, a software tool used in the Anonymous DDoS attacks that can flood a network connection with data. I used LOIC during that whole Wikileaks fiasco. A second account showed a similar level of, err, enthusiasm on the part of the FBI. 6am, door busted down (NOT KIDDING), "FBI FBI FBI POLICE FBI GET YOUR ARMS UP AND DONT MOVE THEM. On sites like Reddit, hearsay was the norm. They started it! Photo by OperationPaperStorm
Home Of Happy Wheels - Happy Wheels Full Version Hello pals. I'd like to continue hosting the flash version of Happy Wheels as long as possible. With the loss of certain ad networks, I'm going to try out a few different ad formats on this site as I continue to attempt to regain some of the revenue that went missing. I'll be making a few minor changes here and there to see whatever works best. Nothing should be annoying. The discord server, which is now official at has been very helpful to me and the game. Though I would prefer to be silent, I feel obligated to say that I am still working full time on the sequel, and it's still reeeeeaally time consuming.
What Makes a Lasting Twitter Message? Sometimes, an idea sweeps Twitter, touching the conversation of millions of people. Many other times, ideas disappear almost as soon as they appear. Researchers at the social computing lab at HP Labs in Palo Alto and Stanford University recently wrote a paper analyzing what makes gives a topic on Twitter lasting popularity. Twitter tracks these subjects of conversation in a “trending topics” list, and the researchers collected this data every 20 minutes for 40 days. They also collected tweets mentioning these topics every 20 minutes. Most trending topics disappear again fairly quickly, the researchers found, fizzling out within 20 to 40 minutes. The researchers write: When we considered the impact of the users of the network, we discovered that the number of followers and tweet-rate of users are not the attributes that cause trends. According to the researchers:
Anonymous Hacks Security Company HBGary, Dumps 50,000 Emails Online A security company that's been working with the government to track down the cyber-activists involved with Anonymous has now become the target of that very group. HBGary's website has been defaced and its CEO Aaron Barr has had his social media accounts hijacked and his personal information leaked online - all in retribution for his claims that he had infiltrated Anonymous, the loosely-affiliated collective of hacktivists. The actions by Anonymous follow a recent story in The Financial Times in which Barr claimed that he had "penetrated Anonymous as part of a project to demonstrate the security risks to organisations from social media and networking." In the article, Barr identified people he said were key members of the Anonymous "hierarchy," including a co-founder in the U.S. and leaders in Britain, Germany, the Netherlands, Italy and Australia. Barr claimed he had discovered these individuals' identities via Facebook and Internet Relay Chat (IRC).
How Aaron Barr Infiltrated Anonymous, and Why He Decided to Do It Ars Technica's Nate Anderson has put together a long and fascinating report on the tumultuous recent history of Aaron Barr -- the security expert who successfully infiltrated Anonymous, and then got burned, after running to the FBI with his findings. Based on e-mails he sent before beginning his mission, it's clear that Barr's motives, from the very beginning, were profit-driven. A social media fanatic, Barr firmly believed that he could use data from sites like Facebook and LinkedIn to identify any hacker in the world, including members of Anonymous. "Hackers may not list the data, but hackers are people too so they associate with friends and family," Barr wrote in an e-mail to a colleague at HBGary Federal. Using several aliases, Barr began regularly dropping in on Anonymous' instant relay chat (IRC) forums, and, after setting up fake Facebook and Twitter accounts, attempted to unearth the members' true identities via social media.
FBI goes after Anonymous for pro-WikiLeaks DDoS attacks The FBI has joined in the hunt for those who participated in the retaliation attacks against companies that cut off services to WikiLeaks, executing more than 40 search warrants across the United States on Thursday, the bureau announced. In what seem to be timed raids, British police arrested five men Thursday morning who allegedly participated in the Anonymous group’s denial of service attacks on Visa, Mastercard, Paypal and Amazon in mid-December. Anonymous was seeking to bring attention to—and punish—the financial-service companies’ decisions to prohibit donations to Wikileaks. The attacks caused no permanent damage, as they simply temporarily overloaded a website with more traffic than the server could handle. But the FBI warned it did not see it that way. The attacks were conducted by the loosely organized ‘Anonymous’ group to show displeasure with the financial-service companies that cut off donations to Wikileaks. Listing image by Stian Elkeland
the simple image sharer Map it Out I hate when I’m trying to rebel against something and it ends up being the right way to do it. Does that happen to you? You think, “When I’m in charge, I’m not going to do it that way, and you’ll see!” Process. Franchising is a Map Do you know what a franchise is? The trick of such businesses is that they map everything out for you. Map It Out There are two parts to mapping out your business processes: the frame and the paths. Process Name – Maps should all be named, so that everyone’s referring to the same process.Goal – Spell out the most important goal/goals of the process at the VERY TOP.Success – It’s great when you can spell out what success looks like. Maps Fit Into the Frame That’s a simple map. There are Variations on the Theme There are other ways to do this. However, every very successful business has a process and frame system. What do YOUR maps look like? ChrisBrogan.com runs on the Genesis Framework Become a StudioPress Affiliate
Anonymous: US security firms 'planned to attack WikiLeaks' | Media The hacker collective Anonymous claims to have unearthed proposals by a consortium of US security firms to attack WikiLeaks, ahead of reportedly planned disclosures about the Bank of America. Leaked emails apparently suggest that three private security firms – HBGary Federal, Palantir Technologies and Berico Technologies – pitched a plan to undermine the whistleblowers' site to a law firm which has represented the Bank of America. BoA, the largest US bank, is thought to be the next target of WikiLeaks releases. Anonymous began releasing tens of thousands of emails sent by HBGary Federal late last week, after the loose-knit "hacktivist" group attacked the security firm's computer systems. Aaron Barr, the company's chief executive, was targeted by Anonymous following a newspaper interview in which he claimed to be able to expose senior members of the shadowy internet collective. "Anonymous should be regarded as the criminal group it is," Leavy told a security conference in San Francisco.
Aaron Barr HBGary is subsidiary company of ManTech International, focused on technology security. In the past two distinct but affiliated firms had carried the HBGary name: HBGary Federal, which sold its products to the US Federal Government, and HB Gary, Inc. Its other clients included information assurance companies, computer emergency response teams, and computer forensic investigators. On February 29, 2012, HBGary, Inc. announced it was acquired by IT services firm ManTech International. At the same time, HBGary Federal has been reported to be closed. History The company was founded by Greg Hoglund in 2003. In 2008, it joined the McAfee Security Innovation Alliance. The CEO made presentations at the Black Hat Briefings, the RSA Conference, and other computer security conferences. HBGary also analyzed the GhostNet and Operation Aurora events. As of 2010, it had offices in Sacramento, California, Washington, D.C., and Bethesda, Maryland. Fallout
Anon pwns HBGary Federal UPDATED w/PRESS RELEASE Like Barr's previous statements to FT, the entirety of his research is not only terrible, but in many cases less informative than is the public record. The entry on me, for instance, is entirely inaccurate despite the fact that I have not been a clandestine participant since coming out of the closet months ago. As noted by Bernard Keane, the situation is rather hilarious. Here are the 60,000 e-mails that were acquired today. I'll be posting additional updates and materials here over the next few minutes. In conclusion, lol. ANONYMOUS PRESS RELEASE For Immediate Distribution February 7th, 2011 Recently, the head of internet security firm HBGary Federal, Aaron Barr, sought to elevate his investigation of the Anonymous movement by providing the Financial Times with what he claimed to be accurate and useful information about those who allegedly drive our activities. Within hours of learning this, Anonymous infiltrated HBGary Federal's network and websites. Anonymous does not have leaders.
It's finally possible!