Anonymous
Inventing Anonymity -
David Chaum
the father of online anonymity
. Chaum's quest for a shield against Internet surveillance began
before most of the world was even aware of the Internet at all.
His inventions include the first-ever cryptocurrency, a 1990s
venture known as DigiCash, and DC Nets, a scheme he invented in
the early '80s to allow theoretically perfect anonymity within a
group of computers. But perhaps the most influential of Chaum's
privacy ideas was an earlier, simpler scheme he called a “mix
network,” a term he coined in 1979.
PrivaTegrity is designed to allow fully secret, anonymous
communications that no eavesdropper can crack, whether a hacker or
an intelligence agency. It is meant to be both more secure than
existing online anonymity systems like Tor or I2P and also more
efficient; he claims it will be fast enough to work as a
smartphone app with no perceptible delay.In future versions, Chaum
and his collaborators plan to add features like larger file
sharing for photos and video, the ability to follow Twitter-like
feeds, and even financial transactions, all under the cover of
strong anonymity with untraceable pseudonyms. Chaum is also
building into PrivaTegrity another feature that's sure to be far
more controversial: a carefully controlled backdoor that allows
anyone doing something “generally recognized as evil” to have
their anonymity and privacy stripped altogether.
Whoever controls that backdoor within PrivaTegrity would have the
power to decide who counts as “evil”—too much power, Chaum
recognizes, for any single company or government. So he's given
the task to a sort of council system. When PrivaTegrity's setup is
complete, nine server administrators in nine different countries
would all need to cooperate to trace criminals within the network
and decrypt their communications.
Anonymous the Modern Day American Folk Hero
Anonymous is a decentralized, online community of individuals around the world who protect the defenseless.
Grassroots Protesters ~ The Internet as Our Homeland
US defence department funded #CarnegieMellon research to break #Tor
Deanonymization Made Simple
by
c0rdis
Reading articles of deanonymization of hidden services by
controlling certain nodes or conducting correlation attacks, I
came to an idea that in certain cases it might be much easier to
break anonymity. Just by having the same vulnerabilities as in
“clearnet”, applications can expose sensitive information and let
an attacker gather data from the system and deanonymize the
target, with certain “darknet” specifics in the approach.
How to create anonymous real-time chat accounts
and how to chat over those accounts using an encryption protocol called Off-the-Record Messaging, or OTR. Use Tails for private conversations. Jabber is an open protocol for real-time chat - it's not a specific service in the way that Signal, WhatsApp, or Facebook is. It's a decentralized and federated service, kind of like email. HipChat is powered by Jabber under the hood, and its competitor Slack offers a Jabber gateway. Both Romeo and Juliet, in our example — use the same server for their Jabber accounts, they'll leak less metadata about their conversations. Messages will stay within in the same server rather than getting sent over the internet.
1975 THE IRON FIST AND THE VELVET GLOVE
an analysis of the U.S. Police by the Center for Research on
Criminal Justice.
This book is dedicated to the people of the United States and
throughout the world fighting against exploitation and oppression
and struggling for socialism. indybay.org
Collectively written by: Susie Bernstein, Lynn Cooper, Elliott
Currie, jon Frappier, Sidney Marring, Tony Piatt, Pat Poyner,
Gerda Ray, Joy Scruggs, Larry Trujillo With contributions by:
Bill Bigelow, Michael Klare, Nancy Stein, and Millie Thayer.
Most spending on criminal justice still comes from the local level but the share of the states and especially of the Federal government is rising fast. Federal spending on criminal justice shot up by 62 percent between 1971-1974, and on police in particular by about 52 percent. For the first time in U.S. history, the Federal government has become deeply involved in the police system, mainly through the creation of the massive Federal Law Enforcement Assistance Administration (LEAA), devoted primarily to standardizing and centralizing the police and other criminal justice agencies, and to funding the development of new and increasingly sophisticated police strategies. At the same time, the 1960's saw the rise of a whole "police-industrial complex," a rapidly growing industry that took technical developments originally created for overseas warfare or for the space program and, backed by government funds, applied them to the problems of domestic "order" in the United States.
2015 EFF privacy report gives and Dropbox a clean bill of health Good news too for Apple and Yahoo, but big bad boos for WhatsApp.
How Imperialism Works
How the World is divided between the rich, who get richer, and the
poor, who get poorer, and the rich get richer on the backs of the
poor. That division hasn't changed for about 500 years, but there
are new, deceptive ways of shoring it up and ensuring that most of
the world's resources are concentrated in as few hands as
possible. What is different today is there is a worldwide movement
that understands this deception and is gaining strength,
especially among the young, many of whom are far better educated
about the chameleon nature of capitalism than those in the 1960s.
Moreover, if the intensity of Establishment propaganda is a guide,
at times bordering on institutional panic, then the new movement
is already succeeding."
John Pilger - The .01% New Rulers Of The World [2001] - video
25:43
what happened to Greece by World bank IMF
agents
http://ow.ly/P5BEF
The dark side of .io:
How the U.K. is making web domain profits from a shady Cold War
land deal
"The rights for selling .io domains are held by a British company
called Internet Computer Bureau (ICB), [...] The British
government granted these rights to ICB chief Paul Kane back in the
1990s. ICB gets to run .io “more or less indefinitely, unless we
make a technical mistake,” Kane told me. (ICB has so far run a
stable .io namespace. It should be noted that Kane is a respected
veteran of the infrastructure scene, and has been entrusted by
ICANN with one of the 7 so-called “keys to the internet”.)"
Government is supposed to be there to do simple things to make people happy, and that's all . "Anonymous isn't an army, or a group, per se. There aren't members. Anyone who uses the loic is Anonymous, which means that anybody at any time in their lives can become Anonymous.
Gregg Housh Explains:
Chanology gave people the impression that "a thousand malcontent nerds can change the world by going out and yelling something."
Emory University has archived the Occupy Wall Street tweets . “Emory Libraries' Digital Scholarship Commons (DiSC) has collected more than 10 million tweets about the Occupy Wall Street movement and shaped them into visualizations, like word clouds and heat maps.”
Hacktivist's Advocate: Meet the Lawyer Who Defends Anonymous
- Oct 3, 2012
As a lawyer not particularly immersed in the technology world, Jay
Leiderman first became interested in the hacker collective
Anonymous around December 2010. That was when Anonymous activists
launched distributed denial of service attacks (DDoS) against
Mastercard and PayPal, who stopped processing donations to
WikiLeaks.
Since then, he has represented a number of high-profile hackers,
including Commander X, who is on the run from the FBI for a DDoS
attack on a county website in Santa Cruz, California, to protest a
ban on public sleeping, and Raynaldo Rivera, a suspected hacker
from LulzSec who is accused of stealing information from Sony
computer systems. Both Commander X and Rivera could face up to 15
years in prison.
Leiderman, who represents many of his hacker clients pro bono,
argues that the law should be changed on DDoS. In an interview I
conducted with Leiderman recently, he told me why slapping
teenaged hackers with harsh prison sentences is counterproductive.
How did you first become involved with representing Anonymous?
The politics of it spoke to me and the fact that it was a newly
emerging area of law really spoke to me. My partner and I do a lot
of medical marijuana law. Primary among the reasons that we do
that are that it's new and emerging so we can help shape the way
that the law ultimately its society. And because we believe in the
politics behind it. And it's the exact same with Anonymous.
We have an opportunity here to make the courts, as these cases
wind their way up, understand privacy issues, emerging tech
issues, against the backdrop of civil rights and through the prism
of free information. And that was something that was just an
amazing opportunity for me and something that still engages me as
I continue to take on these cases. [...]
WHISTLE BLOWERS / JOURNALISTS / PROTESTORS
The National Union of Journalists
issued a Freedom of Information Act request to investigate
possible federal involvement with law enforcement practices that
appeared to
target journalists
. The New York Times reported that "New York cops have arrested,
punched, whacked, shoved to the ground and tossed a barrier at
reporters and photographers" covering protests.
Reporters were asked by NYPD to raise their hands to prove they
had credentials: when many dutifully did so, they were taken, upon
threat of arrest, away from the story they were covering, and
penned far from the site in which the news was unfolding.
see:
Mass Media Information Center
and
Robert Waterman McChesney
and
Tom Foremski
Other reporters
wearing press passes were arrested and roughed up by cops, after
being - falsely - informed by police that "It is illegal to take
pictures on the sidewalk."
In New York, a state supreme court justice and a New York City
council member were beaten up; in Berkeley, California, one of our
greatest national poets, Robert Hass, was beaten with batons.
Our system of government prohibits the creation of a federalized
police force, and forbids federal or militarized involvement in
municipal peacekeeping.
The Mayor of Oakland acknowledged that the Department of
Homeland Security had participated in an
18-city mayor conference call advising mayors on "how to
suppress" Occupy protests
.
Britain is sleepwalking in a march toward total email
surveillance, even as the US brings forward new proposals to
punish whistle blowers by extending the Espionage Act. In an
electronic world, evidence of these crimes lasts forever - if
people get their hands on the books.
The
Department of Homeland Security coordinated a violent
crackdown
. The DHS cannot on its own initiative go after anonymous
protesters
. Rather, DHS is answerable up a chain of command: first, to New
York Representative Peter King, head of the House homeland
security subcommittee, who naturally is influenced by his fellow
congressmen and women's wishes and interests. And the DHS answers
directly, above King, to the president.
In other words, for the DHS to be on a call with mayors, the logic
of its chain of command and accountability implies that
congressional overseers, with the blessing of the White House,
told the DHS to authorize mayors to order their police forces -
pumped up with millions of dollars of hardware and training from
the DHS - to make war on peaceful citizens. Members of Congress,
with the collusion of the American president, sent violent,
organized suppression against the people they are supposed to
represent. Occupy has touched the third rail: personal
congressional profits streams.<
more
>
WikiLeaks
The news media in the United States often fails to inform Americans about the uglier actions of our own government. We therefore have been deeply grateful for the accomplishments of WikiLeaks, and applaud Ecuador's decision to grant diplomatic asylum to its founder, Julian Assange, who is now living in the Ecuadorean Embassy in London. 8/21/2012
the rolE of art
The financial sector's corruption must be recognized as systemic.
" The Bank of England , as the institution that is responsible for the stability of the system and has the expertise and visibility across the entire market, I mean, their views are extremely relevant here," del Missier said. The false rates reported at this time were only part of the investigation. Investigators also found that individual traders at Barclays had persuaded colleagues to submit false rates in the hope of manipulating LIBOR to their advantage.
In the LIBOR case , notably, a major crime has not been greeted by much demand at the top for criminal prosecutions. That asymmetry is one of the insurance policies of power . Another is to crack down on citizens' protest.
The No 1 agenda item:
get the money out of politics. Most often cited was legislation to
blunt the effect of the Citizens United ruling, which lets
boundless sums enter the campaign process.
No 2: reform the banking system to prevent fraud and manipulation, with the most frequent item being to restore the Glass-Steagall Act - the Depression-era law, done away with by President Clinton in 1999, that separates investment banks from commercial banks. This law would correct the conditions for the recent crisis, as investment banks could not take risks for profit that create fake derivatives out of thin air, and wipe out the commercial and savings banks.
No 3 draft laws against the little-known loophole that currently allows members of Congress to pass legislation affecting Delaware-based corporations in which they themselves are investors .
EVEN THOUGH The Senate voted 96 to 3 to pass a watered-down
STOCK Act, which would bar members of Congress, their staff and
some federal workers from profiting from non-public information
obtained through their jobs.
4/2012 Obama signs Stop Trading on Congressional Knowledge Act law
banning insider trading by Congress and for all executive branch
employees who currently are required to file financial disclosure
statements.
The bill also requires members of Congress, their senior staff and
top-level executive branch officials to disclose the terms of
their mortgages every year.
The final bill dropped a provision in the Senate's original bill
that would have required “political intelligence” operatives to
register as lobbyists. These are folks who prowl the halls of
Capitol Hill for information that might be useful to hedge funds
and other investors.
Mark Zuckerberg's vision of the world is that you should be comfortable sharing as your real self on the Internet. He thinks that anonymity represents a lack of authenticity, almost a cowardice.
Thomas Jefferson: Whenever the people are well-informed, they can be trusted with their own governmentAnonymous Anonymous is not a hierarchical organization with it's leader at the top. Anonymous is you Anonymous is all of us. Anonymous is everyone and no one. Anonymous has been often been told and that it has no leaders, but in truth Anonymous has no followers. Anonymous is an ocean of leaders.
Let's try an analogy.
17th century pirates liked to steal booty. They sailed the high seas and pillaged. They had a common flag. But they WERE NOT A GROUP. Sure, there were groups of pirates that sailed on ships together. There was a common outlook -- that plundering booty was a worthwhile activity, ho ho and a bottle of rum, all of that. But they were not a group. There were pirate hangouts like pirate taverns, so there was congregation, but no leadership. Pirates were not a collective. So let's clear it all up. The anons are the pirates, IRC channels and imageboards like 4chan are their pirate taverns, and the various Anonymous outfits like @AnonymousIRC and @AnonOPS are pirate ships with multiple pirates aboard. They're groups of pirates! Simple! So when the American, French, Spanish, Turkish, British or "key members" of Anonymous are arrested the media is deliberately misleading the public and their masters.
The mask may be empowering, in the defense of their information rights which not everyone might be able to muster on his or her own. As a collective identity, Anonymous is also about the right of wearing a mask, to make use of a speaking position that would otherwise not be available, both online and in physical space.
Billionaire noted that in the early days of the demonstrations,
the established media paid scant attention to the protesters. By
contrast, Anonymous ensured that news of the scene in Zuccotti
Park went viral. He claimed that Anons had been studying "the
astroturfing that is being done in the name of conservative
politics,” referring to allegations of conservative political
groups attempting to pass off events they organize as evidence of
a grassroots movement. Anonymous had used similar tactics to
promote Occupy Wall Street, he suggested. "We had teams of people
seeding links all over the news comments, YouTube, FB, etc, and
making lists of interested FB groups, etc., and then telling them
all to come.” In essence, Billionaire was saying that Anonymous
had done for Occupy Wall Street what they previously did for funny
pictures of cats. They had used their expertise in spreading memes
to help turn the actions of a few protesters into a national
movement. "I am always interested in giving a meme a chance," said
Billionaire. "This one far outperformed our expectations."
http://www.huffingtonpost.com/2011/10/20/occupy-wall-street-anonymous-connection_n_1021665.html
Hollywood refuses to release movies for streaming online at the same time as DVDs. For example, of the top 100 movies of 2011 (in revenue) , only about 2/3 are available. Even crazier is that broadcast TV (which itself is generally free to consumers as it is underwritten by advertisers) isn't in a much better shape. Piracy will always exist but it seems that the movie and TV industry are intent on feeding it by creating artificial scarcity of content due to their holding back their fares from legal outlets.
Liberate the Data Then Gives It to the Clueless Public.
When people can only find content chosen for them by those in
government and instead have to useful web content censored, they
suffer and, inevitably, some die as a result.
Those in power, with their superior access, means that secrecy
kept us from using the power of the parallel distributed
intelligence' the supercomputer of social mind. The
decentralization of power works best as the muscle to the bone of
centralization - the two work best hand in hand, parallel
distributed intelligence is very dumb without leaders and without
those who give us tools of thought, new ideas, new perspectives,
and new action plans. Governments who determine that they must
control what people can see, in order to attempt to control what
they think, censor what people can find on the internet.
In the case of tyrants
, the goal is always to dupe people into becoming willing slaves.
Naturally, when people are most free to choose what information
they see, they are best able to determine for themselves what to
accept, what to doubt, what to act upon, what to disbelieve, and
what to ignore.
THE DREAD DISEASE OPPRESSION
Who controls access to knowledge the informational content on
the Internet. Is it the person seeking information or the
governmental authorities seeking to limit access?
The limits of oppression are set by the rebellion of the
oppressed.
To search anonymously you must first understand what information
you are giving away.
Use a free
Anonymous Surfing
test to find out.
VPN Virtual Private Network
A VPN, or virtual private network, creates your own private,
encrypted channel that runs alongside the normal Internet. From
within any country, a VPN connects you with an Internet server
somewhere else. You pass your browsing and downloading requests to
that American or Finnish or Japanese server, and it finds and
sends back what you're looking for. It can't read the encrypted
messages you're sending. Every foreign business operating in any
country uses such a network. VPNs are freely advertised in China,
so individuals can sign up, too. Every bank, every foreign
manufacturing company, every retailer, every software vendor needs
a VPN to exist. This also will Encrypt your e-mail.
Download and use Firefox extension from the EFF foundation to encrypt your searches.
PROTESTS ARE FOR THE VOICELESS
John McCain Threatens Anti-Kissinger Protesters With Arrest, Calls
Them "Low-Life Scum"
He's a thug, and a crook, and a liar, and a pseudo-intellectual and a murderer. Ok? Those things are factually verifiable.
- From the late Christopher Hitchens' outstanding interview: Christopher Hitchens' Polemic Against Henry Kissinger
OPPRESSION by its very nature creates the power that crushes it. A Champion arises - a Champion of the oppressed - whether it be a Cromwell or someone unrecorded, he will be there. He is born. Then out of the mystery of the unknown appeared a masked rider who rode up and down the great internet Hwy punishing and protecting and leaving upon the great oppressor the mark of ZORRO aka ANONYMOUS.
OPPRESSORS EXPLOITS
EXPOSED BY ANONYMOUS
This is not about Federalist, Republican, Democrat, Libertarian, Progressive, Communist, Socialist, Populist, Reform, Christian, Freedom, Green, Labor, Union, Marxist, Leninist, Unity, Pirate or any other party - in every country of the world.
Us vs. Them
This is only about the Citizens of the world vs. the Power of the Church, Throne, Oligarchy, Fraternity and the Pirate Merchants, with the power to oppress people in the pursuit of wealth and power.
real drug smuggling pirates
Scull and Bones Yale 1832
William H. Russell (Scull & Bones; co-founder-1832) cousin Samuel Russell formally established Russell & Co. on January 1, 1824 for the purpose of acquiring opium and smuggling it to China.
Russell & Co
. merged with the number one US trader, the J. & T. H. Perkins
"
Boston Concern
" in 1829. THE BIGGEST OPIUM SMUGGLER IN THE U.S.
By the mid-1830s the opium trade had become "the largest commerce
of its time in any single commodity, anywhere in the world."
Russell & Co. and the Scotch firm Jardine-Matheson, then the
world's largest opium dealer working together were known as the "
Combination
."
George HW Bush(S&B 1948)
was born in Milton, Massachusetts not far from the historic home
of Robert Bennett Forbes, a Russell partner. Many great American,
European and Chinese family fortunes were built on the
"China"(opium) trade. Yes, they sold porcelain, tea, silks and
other items at home in the US, but they "needed" the trade in
opium for silver to pay for the desired goods and—opium smuggling
returned "handsome" profits.
PIRATES: The Opium Trade using the skull-and-crossbones flag at the masthead of a clipper ship.
christies.com $2,125 Price includes buyer's premium Skull and
Bones, Yale University's secret society, was founded in 1832. The
organization's annual membership roster lists Henry Lear as a
member in 1869.
Unknown - Skull and Bones Yearbook, 322, VI., c. 1869;
Medium: albumen prints; Dimensions: each
PHOTOGRAPHER UNKNOWN
Skull and Bones Yearbook
, 322, VI., c. 1869
20 albumen prints, bound in a small 4 to volume; each
approximately 3 3/8 x 2 1/8in. (8.5 x 5.2cm.) (arched); stamped
'Henry Lear' cover); stamped '322' (on the back cover)
2012 PasteHTML.com , a free HTML code-hosting site, which in turn executed some JavaScript to fire LOIC at Anonymous-designated targets. Many of those messages said nothing about LOIC or that clicking the link shanghaied the user into the DDoS attack, Cluley said, noting several Twitter messages as examples.
Delta Kappa Epsilon
Yale University in 1900 Delta Kappa Epsilon , an exclusive fraternity whose members have included Presidents George Bush, Jr. and Sr., Vice-President Dan Quayle, banker J.P. Morgan, newspaper magnate William R. Hearst, chewing-gum millionaire William Wrigley and motel man, Howard Johnson.
American Liberty League
Changed it's Name to the TEA PARTY MOVEMENT
Key Financiers, Organizers and Groups
linked to the American Liberty League:
One of Russell and Company's Chief of Operations in Canton was Warren Delano, Jr., grandfather of Franklin Roosevelt, who would have known the truth about Skull and Bones Piracy and gave Franklin the information he needed to help the citizens of the U.S. understand how they were being exploited.
FDR on the The American Liberty League
On Jan. 3, 1936, in an unprecedented joint session of Congress,
when President Roosevelt announced a ban on military exports to
fascist Italy, he blasted the
American Liberty League
:
"They steal the livery of great national ideals to serve discredited special interests…. This minority in business and industry... engage in vast propaganda to spread fear and discord among the people. They would gang up against the people's liberties…. They seek the restoration of their selfish power.….
Our resplendent economic aristocracy does not want to return to that individualism of which they prate, even though the advantages under that system went to the ruthless and the strong. They realize that in 34 months we have built up new instruments of public power. In the hands of a people's government this power is wholesome and proper. But in the hands of political puppets of an economic aristocracy, such power would provide shackles for the liberties of the people. Give them their way and they will take the course of every aristocracy of the past - power for themselves, enslavement for the public."
John F. Kennedy On Secrecy And Censorship vs. Wikileaks
http://www.techdirt.com/articles/20101206/01134912143/jfk-secrecy-censorship.shtml
Glyn Moody points us to a blog post that has a video/audio clip of
a John F. Kennedy speech to the press about secrecy and
censorship, which is getting some attention for the contrast to
the way our government is responding to the Wikileaks controversy.
The key paragraph is the one that opens the video:
The very word "secrecy" is repugnant in a free and open society;
and we are as a people inherently and historically opposed to
secret societies, to secret oaths and to secret proceedings. We
decided long ago that the dangers of excessive and unwarranted
concealment of pertinent facts far outweighed the dangers which
are cited to justify it. Even today, there is little value in
opposing the threat of a closed society by imitating its arbitrary
restrictions. Even today, there is little value in insuring the
survival of our nation if our traditions do not survive with it.
And there is very grave danger that an announced need for
increased security will be seized upon by those anxious to expand
its meaning to the very limits of official censorship and
concealment. That I do not intend to permit to the extent that it
is in my control. And no official of my Administration, whether
his rank is high or low, civilian or military, should interpret my
words here tonight as an excuse to censor the news, to stifle
dissent, to cover up our mistakes or to withhold from the press
and the public the facts they deserve to know. Compare that to the
way our government has been responding -- demanding that US
companies block access to Wikileaks and other such moves.
Of course, if you read the full speech from JFK (which was given
to the American Newspaper Publishers Association), it's really
quite nuanced. JFK argues forcefully against censorship from the
government -- but actually is suggesting that the press consider
self-censoring itself, taking into account the impact that it
could have if it publishes certain information. However, he does
try to make it clear that he does not want criticism or errors to
be shielded from the public -- just that he hopes the press will
decide for themselves to avoid publishing info that directly
reveals vital points to enemies of the country. In the end, I
actually think these two paragraphs may be even more powerful than
the one that most people are talking about:
I not only could not stifle controversy among your readers--I welcome it. This Administration intends to be candid about its errors; for as a wise man once said: "An error does not become a mistake until you refuse to correct it." We intend to accept full responsibility for our errors; and we expect you to point them out when we miss them.
Without debate, without criticism, no Administration and no country can succeed--and no republic can survive. That is why the Athenian lawmaker Solon decreed it a crime for any citizen to shrink from controversy. And that is why our press was protected by the First Amendment-- the only business in America specifically protected by the Constitution- -not primarily to amuse and entertain, not to emphasize the trivial and the sentimental, not to simply "give the public what it wants"--but to inform, to arouse, to reflect, to state our dangers and our opportunities, to indicate our crises and our choices, to lead, mold, educate and sometimes even anger public opinion. Too bad we're not hearing much of that from our politicians today.
40 Years after Leak, Pentagon Papers Coming Out by Calvin Woodward and Richard Lardner - WIKILEAKS OF IT'S TIMEWASHINGTON — Forty years after the explosive leak of the Pentagon Papers , a secret government study chronicling deception and misadventure in U.S. conduct of the Vietnam War, the report is coming out in its entirety on Monday.
WHO ARE THE
KOCH BROTHERS
#Operation Payback.
When you lose your fear you will be willing to stand up and fight using your Non Violent Strategy proves all Tyrants and other regimes crumble!!
Anonymous is a zealous defender of freedom of information; the free exchange of information; the right to be irreverent; and the necessity of calling out gross abuses of power.
Dear Citizens of the United States of America,
It has come to our attention that the brothers, David and Charles Koch -- the billionaire owners of Koch Industries- -have long attempted to usurp American Democracy. Their actions to undermine the legitimate political process in Wisconsin are the final straw. Starting today we fight back.
In a world where corporate money has become the lifeblood of political influence, the labor unions are one of the few ways citizens have to fight against corporate greed.
Anonymous hears the voice of the downtrodden American people, whose rights and liberties are being systematically removed one by one, even when their own government refuses to listen or worse - is complicit in these attacks.
U.S. BOYCOTT KOCH PRODUCT LIST
Vanity Fair, Quilted Northern, Angel Soft,
Sparkle, Brawny, Mardi Gras Dixie
Download Encrypted VPN Virtual Private Network
BEWARE OF WIKILEAKS WEBSITE SECURITY AND YOUR OWN EXPOSURE ~ John Young of Cryptome
Sep 27, 2011 LulzSec Anonymous Arrested:
With multiple arrests worldwide this year of LulzSec and Anonymous
members, the number of at-large hackers in both hackers groups is
rapidlydwindling. LulzSec's non-fingerprinted membership, in fact,
could be down to two. According to a recent tweet by LulzSec /
Anonymous leader
Sabu
, only he and one other member of LulzSec have not been arrested.
Last week, the FBI arrested alleged LulzSec member Cody Kretsinger
and alleged People's Liberation Front members Christopher Doyon
and Joshua Covelli. Both groups are associated with the hacking
group Anonymous.
ANONYMOUS MEETS ON 4chan
Wikileaks The First Information War
Defended by Anonymous Seahawks around the worl'
where everybody sets sail on Channel four . . . <KE>
MasterCard, according to Anonymous, was processing payments to the Ku Klux Klan but not to WikiLeaks, which Anonymous considers not just a kindred spirit but a legitimate journalistic enterprise. In fact, Housh has said that Anonymous launches DDoS attacks in some cases with the sole aim of spurring the press to ask questions, thereby giving Anonymous a forum in which to discuss its agenda.
In 2003 , a 15-year-old named Christopher Poole creates a chat forum called 4chan. There is one rule on the site: No child porn. Reports suggest that even that rule is lightly enforced. People used the site to recruit armies of tricksters for elaborate online pranks, and because the site offers them the option of posting anonymously, they begin to call themselves Anonymous. An internet war culture is born. ( Scientology )
The deadliest
sea hawk was
Sir Francis Drake
Oppression breeds the very cure - someone who is oppressed will step up to overthrow the oppressors.
Anonymous we appoint you Knights of the Realm.
Rise Sir and My Lady Anonymous.
Accept the homage of your county folk, the gratitude of your country's people. A grave duty confronts us all. To prepare our nations for war that none of us wants. We have tried by all means in our power to overt this war. But when the ruthless ambition of a few men, and their families, threaten to engulf the world it becomes the solemn obligation of all free people to affirm that the earth belongs NOT to anyone one man, one family, the Church, the Bank, the Corporation, Stock Holders, or Government, BUT to all people and the that freedom is indeed entitled to the soil and sea to which it exists. Firm in this fate be ready to meet the government that will be sent against you.
Just like the Folk Hero Zorro -- We Have Anonymous and the sword of technology will leave it's mark.
Zero's and Ones their bytes are cut out for all see.
Republicans and Corporatists have always hated Unions.
They hated them in FDR's day, and they hate them today. They hate
them because unions stand in the way of gross exploitation and
obscene profit maximization. If there are no unions around and no
government regulation, employers can treat their workers as
shabbily as they want and pay them as poorly as they want, and
we'd be back to the Grapes of Wrath.
Download Encrypted VPN Virtual Private Network
Prosecuting WikiLeaks founder Julian Assange
Legal experts and good-government advocates say taking a
hard-line approach to leaks has a chilling effect on whistle
blowers, who fear harsh legal reprisals if they dare to speak
up. It is not a crime to shine a light on the inner workings of
government especially when there are measures that could protect
the nation's interests without hauling journalists into court
and government officials off to jail. Government Accountability
demands that Freedom of the Press deals with leaks that
embarrass the government ie: U.S. intelligence.
Double Standard Power Trip
Top White House and administration officials give unauthorized information to Washington reporters almost daily, So why do these same authorities bully rank and file employees who get caught doing the same thing. Top officials frequently leak classified information and nothing happens to them.
Daniel Ellsberg, a true patriot handed the Pentagon's top-secret assessment of the Vietnam War to New York Times reporters 40 years ago, and supports Julian Assange as we all should.
No one investigated classified leaks to Washington Post reporter Bob Woodward for the books he has written on war policy under both recent White Houses. POLITICO reported last year that Woodward sometimes arrived for official interviews carrying classified maps. If you don't support Army Private Bradley Manning, National Security Agency official Thomas Drake, Central Intelligence Agency officer Jeffrey Sterling, and mainstream journalists like Times reporter James Risen, YOU MIGHT BE THE NEXT TARGET FOR PROSECUTION.
the deeds of the
NON VIOLENT
CIVIL DISOBEDIENT
ONLINE SOCIAL hacktivist anonymous MOVEMENT
What is the power of hacktivism?
The decentralization of communication and media that's what!
Anonymous is in fact an "online living consciousness, comprised of different individuals with, at times, coinciding ideals and goals." ~ Coldblood
- "Join our party on IRC,” Topiary, an Anonymous “supporter” posted on Twitter.
- AnonNewsSite “At least we destroyed him in anonymous style,” wrote one commenter.
-
Support AnonNews
Paypal jamsoftgamedev@gmail.com Reference: AnonNews Donation Press can contact anonnews.org or email press@anonnews.org. -
AnonNews Radio
!
- Twitter: @AnonymousIRC & @anonnews_org
Want to help AnonLeaks out?
Donate UKash or PaySafeCard @ donate@
anonleaks.in
Support Anonymous
#anonleaks contact@anonleaks.ch
PGP
:
#operationpayback 272 users [+ntrCTfj]
Join
OperationPayback :: Copywrong must be set right! ::
Feds gtfo (of) Token :: NEXT TARGET: (todo; good arguments pl0x)
Warning : these chats are NOT mirrors.
They are on different IRC networks, with different people and
different customs.
- #Wikileaks channel on EFnet (http://irc.lc/efnet/wikileaks)
- #Wikileaks channel on QuakeNet (http://irc.lc/quakenet/wikileaks)
- #Wikileaks channel on freenode (http://irc.lc/freenode/wikileaks)
RULES
you can make any irc.lc url with that syntax :
http://IRC.LC/ < NETWORK | SERVER > / < CHANNEL> / < Default_Nick_@@@ >
-
IRC LC v2
Connect
The code was entirely revisited !
You can now use irc:// urls on your browser (firefox).
You can post reports , or supply a new network / webchat available.
You can view the list of IRC networks configured. -
Initial Rules of the Chans & How To Ask a Question in
IRC
Ask a question - Anonymous Chat
The real problem is that the Feds refuse to enforce the laws. Why do states enforce some Federal laws and not others?
HISTORY OF ANONYMOUS
The adoption of the V for Vendetta mask as a multipurpose icon
by the emerging global protest movements and the rise of
Anonymous.
Back at the crack of the 17th century, Rushton Triangular Lodge
was a strange architectural folly constructed to represent the
Holy Trinity by an increasingly eccentric Sir Thomas Tresham
while he endured decades of house-arrest for his outspoken
Catholicism.
It was also one of the two locations, both owned by Tresham and
both in Northamptonshire, at which the Gunpowder Plot of 1605
was formulated by a group of dissident Catholics that included
Tresham's son Francis. By the early sixteen-hundreds, the
bonfires traditionally lit around the start of November had been
co-opted as trappings for a sort of national anti-Catholic day
at which effigies of the Pope would be incinerated. As
mastermind behind the terrorist outrage du jour, however, the
plot's nominal leader Guido Fawkes rapidly replaced the pontiff
as hate-mascot of choice on these occasions.
When parents explained to their offspring about Guy Fawkes and
his attempt to blow up Parliament, there always seemed to be an
undertone of admiration in their voices, or at least there did
in Northampton. While that era's children perhaps didn't see
Fawkes as a hero, they certainly didn't see him as the
villainous scapegoat he'd originally been intended as.
At the start of the 1980s when the ideas that would coalesce
into V for Vendetta were springing up from a summer of
anti-Thatcher riots across the UK coupled with a worrying surge
from the far-right National Front, Guy Fawkes' status as a
potential revolutionary hero seemed to be oddly confirmed by
circumstances surrounding the comic strip's creation: it was the
strip's artist, David Lloyd, who had initially suggested using
the Guy Fawkes mask as an emblem for our
one-man-against-a-fascist-state lead character.
When this notion was enthusiastically received, he decided to
buy one of the commonplace cardboard Guy Fawkes masks that were
always readily available from mid-autumn, just to use as
convenient reference. To our great surprise, it turned out that
this was the year (perhaps understandably after such an
incendiary summer) when the Guy Fawkes mask was to be phased out
in favour of green plastic Frankenstein monsters geared to the
incoming celebration of an American Halloween. It was also the
year in which the term "Guy Fawkes Night" seemingly disappeared
from common usage, to be replaced by the less provocative
'bonfire night'.
http://www.bbc.co.uk/news/technology-16968689?print=true
Background on Assange's rage against the state &
Cypherpunks
http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10710269
The world's best-known
'cypherpunk' (ethics)
has long been on a mission to stop governments watching our
every move. It is said to be the key to understanding
WikiLeaks.
The cypherpunks emerged from a meeting of minds in late 1992 in
the Bay Area of San Francisco.
Its founders were Eric Hughes, a brilliant Berkeley mathematician; Timothy C. May, an already wealthy former chief scientist at Intel who had retired at the age of 34; and John Gilmore, another already retired and wealthy computer scientist - once number five at Sun Microsystems - who had co-founded an organization to advance the cause of cyberspace freedom, the Electronic Frontier Foundation.
They created a small group, which met monthly in Gilmore's
office. At one of the early meetings of the group, an editor at
Mondo 2000, Jude Milhon, jokingly called them cypherpunks, a
play on cyberpunk, the "high-tech, low-life" science-fiction
genre. The name stuck.
Many cypherpunks were optimistic that the individual would
ultimately triumph. Their optimism was based on developments in
intellectual history and computer software: the invention in the
mid-1970s of public-key cryptography by
Whitfield Diffie
and Martin Hellman, and the creation by Phil Zimmerman in the
early 1990s of a program known as
PGP, "Pretty Good Privacy"
. PGP democratised their invention and provided individuals,
free of cost, access to public-key cryptography - and thus the
capacity to communicate with others in near-perfect privacy.
The most authoritative political voice among the majority
libertarian cypherpunks was Tim May, who, in 1994, composed a
vast, truly remarkable document,
Cyphernomicon
. May thought the state to be the source of evil in history.
Assange joined the cypherpunks email list in late 1995. There
were many reasons he was likely to be attracted to them. Even
before his arrest (for alleged hacking) he had feared the
intrusion into his life of the totalitarian surveillance state.
HISTORY OF
Hacktivism
"The Internet views censorship as a network failure, and
routes around it." ~ John Gilmore
You have suffered flagrant violations of personal privacy and
autonomy, the extinction of both your right to travel within the
country and your right to leave it without official permission
-- and you barely even noticed. Secret blacklists, unaccountable
goons making up the rules and imposing them without oversight,
quisling judges who can't see anything totalitarian even when
officially told they aren't allowed to know or reveal what the
law says, technology that literally strips you naked, "border"
searches at any lonely spot in any road. Innocent people
arrested without cause, or fired from their jobs, because a
bureaucrat put them on a secret list. Detailed dossiers kept of
every person's travel, friendships, finances, and
communications.
IMPERIAL PRESIDENTIAL POWER RESTORED
(Not to mention torture of the accused, thousands thrown in
prison due to their religion, "the president can imprison
anybody he likes, forever, without charges". Two presidents have
now claimed that power. But that's off the topic of TSA and DHS
-- and besides, they'd never do that to YOU.) And you just don't
care. You keep submitting to these airport Gestapo, over and
over! You never sue them over it, you never complain to your
legislators to overturn these totalitarian intrusions into your
lives. You never change your travel plans to avoid the
intrusions. You never challenge them at the checkpoints. Your
crazies never head over to the airport to shoot a dozen of the
layabouts manning the checkpoints. If even 5% of you made a fuss
at the front of the line, the whole stinking farce would break
down, but you never do. If ten friends agreed to run right
through a checkpoint at the same time in ten different airports,
idiotic TSA rules would shut down travel in the whole country,
but nobody ever does that. If a hundred people just got it into
their heads to run through checkpoints, without coordinating at
all with each other, the same thing would happen. Your activists
focus on attacking businesses or attacking homosexuals while
everyone appluads the growth of intrusive government and the
patient strangling of personal freedom. The whole idea of
refusing or resisting or rebelling never even occurs to you.
More than half of you think the whole "security" regime is a
good idea, even when the precondition for moving around in your
own country is that you have to choose whether they grope your
crotch or snap and save naked photos of you! So get used to it.
Your chickens are coming home to roost. You
John Gilmore
PS: The next intrusion your puppet masters dream up will be even
more fun for you to ineffectively whine about.
2009 From
John Gilmore
gnu@toad.com, gnu@eff.org
pgp
to Dave Farber
Congratulations, Dave!
It's not too often that the
CSNET
piece of history gets publicly remembered. Indeed I learned more
about it from your email than I knew at the time. Being a
non-academic, it never really touched me; I went straight from
mainframe APL time-sharing, to a Tourist account at MIT-AI
(accessed via a secret hookup at BBN between Telenet and
ARPAnet), to microcomputer BBS's, to workstation Ethernets at
Sun with UUCP/Usenet wide area connectivity, to UUNET's uucp
service and then to Alternet and building my own regional
cooperative ISP. From that perspective, CSNET seemed like a
niche, sort of like BITnet; one of those odd kinds of addresses
you'd sometimes see in emails, but not something you'd ever want
to (or be allowed to) join.
It's kind of a backhanded compliment to say that CSNET was
influential because it convinced a government agency to fund
NSFNET.
Kinda puts it on par with those
railroad moguls who spent $75,000 in the 1800's to
convince Congress to give them millions in free
rights-of-way.
More to the point, the social and economic and technical process
of making CSNET educated a lot of people in the traditional
Computer Science community (1) what value peer to peer networks
created, (2) why that value made it worth paying for it
yourself, and (3) how to create such a network yourself. And
THAT would have led to the Internet, whether or not NSF ever
bought T1 lines to enable teenage hackers to explore.
Mainstream media doesn't do it's job so now Anonymous Will
-
Fourth Amendment? What Fourth Amendment?
offered at cost by a" Spaf Security Visionary ~ USA TODAY" -
ETHICS FREEDOM FIRST:
Unethical Companies and or Products that restrict freedom. - Sites Like Twitter Absent From Free Speech Pact
- Human rights activists - How Usenet invented online activism
Occupy songs
Folk Song Army by Tom Lehrer
We are the Folk Song Army.
Everyone of us cares.
We all hate poverty, war, and injustice,
Unlike the rest of you squares.
There are innocuous folk songs.
Yeah, but we regard 'em with scorn.
The folks who sing 'em have no social conscience.
Why they don't even care if
Jimmy Crack Corn
.
If you feel dissatisfaction,
Strum your frustrations away.
Some people may prefer action,
But give me a folk song any old day.
The tune don't have to be clever,
And it don't matter if you put a coupla extra syllables into a
line.
It sounds more ethnic if it ain't good English,
And it don't even gotta rhyme--excuse me--rhyne.
Remember the war against Franco?
That's the kind where each of us belongs.
Though he may have won all the battles,
We had all the good songs.
So join in the Folk Song Army,
Guitars are the weapons we bring
To the fight against poverty, war, and injustice.
Ready! Aim! Sing!
http://www.youtube.com/watch?v=KsykM6fu2lg
Several thousand people moved several million dollars
to small banks and credit unions.
To the tune of “Take Me Out To The Ball Game”
~ Betsy Rose, 2011
Take me out of the big banks
Take me out of their game
The credit union will get my dough
I'll cut up my credit cards, pay as I go
And it's root, root, root for the small banks
Give them our business and thanks
And its 1,2,3 million more and we'll close big banks
Let's go occupy Wall Street
In every city and town
We'll occupy houses the banks foreclosed
Make sure that no one's left out in the cold
And it's root, root, root for the new world
We're building right here today
And its 1,2,3 billion more ! It's a new ball game.
A march headed from NYU to the Occupy demonstration site. The
column could be heard for blocks since many marchers were
playing drums. Clearly the charivari, the sound of mass
disapproval, was the key sonic marker.
Charvari Folk custome know in the U.S. as
Shivaree
The main purposes of the charivari in Europe were to facilitate
change in the current social structure and to act as a form of
censorship within the community. The goal was to enforce social
standards and rid the community of socially unacceptable
relationships that threatened the stability of the whole. In
contrast to punitive charivari in small villages in Europe,
meant to ostracize and isolate the evildoers, North American
charivaris were used as "unifying rituals" in which those in the
wrong were brought back into the community after what might
amount to a minor hazing. A depiction of a shivaree in the
American South occurs in the episode "The Shivaree" of The
Waltons (season 3, episode 69).
I was arrested for first degree inciting to riot
in Columbus, Ohio on the oval-the student green-protesting
against the American War on Vietnam. I daily had a Gibson RB-175
Long neck Pete Seeger style banjo, a Gibson J-45 12-string
guitar and a Martin D-28 with me on the oval. We were gassed and
in direct physical
confrontation with the "D" riot squad daily. Of course it's hard
to plan an event when at any moment you can be raided----that's
the point---you can't plan a protest event---it's gorilla
theatre===you just DO IT
And PA system---I didn't have any PA system----we stood on a
wooden stage that was make-shift and we sang as loud as we could
and the crowd sang along
so loud 1-2-3 What are fightin for""" Don't ask me we don't give
a damn---next stop is Vietnam....."
We didn't plan events---we just took the friggin streets
We didn't no PA system---we sang our hearts out with conviction
amidst the tear gas and beatings----
A little education in how my generation---our generation--- did
things---our protests were not Sunday socials---they were not
"planned" they just happened and we sang like Hell to make it
happen PA or no PA.
We had gumption and conviction and a cause ~
david@FOLKSCHOOL.ORG David Brose
Miranda, Article 31 and Constitutional Advisements
The best time to advise a suspect of his constitutional rights.
There are both legal and psychological considerations in
answering this question. Legally, Miranda rights must be
administered prior to questioning a suspect who is in custody.
Therefore, the investigator must have probable cause to arrest a
suspect, and actually place the suspect in custody before the
Miranda rights are required. The legal concept of custody exists
when a suspect perceives that he is not free to leave an
immediate area. The legal test, however, is different in the
U.S. Military and in Canada. In those jurisdictions, a focus of
suspicion prompts the necessity of obtaining a waiver of article
31 rights (military) or Constitutional Advisement (Canada). A
focus of suspicion is a much broader concept than custody. It
exists when the investigator forms a reasonable expectation of a
suspect's possible involvement in an offense.
Deeds and Actions of Anonymous
Anonymous Deeds Fight the Oppressor and Saves World
Anonymous Deeds Fight the Oppressor and Saves World
About Anonymous and the
History of the Modern Day Folk Hero
THE DREAD DISEASE OPPRESSION
Who controls access to knowledge the informational content
on the Internet?
Is it the person seeking information or the governmental
authorities seeking to limit access?
The limits of oppression are set by the rebellion of the
oppressed.
OPPRESSION by its very nature creates the power that crushes it. A Champion arises - a Champion of the oppressed - whether it be a Cromwell or someone unrecorded, he will be there. He is born. Then out of the mystery of the unknown appeared a masked rider who rode up and down the great internet Hiway punishing and protecting and leaving upon the great oppressor the mark of ZORRO aka ANONYMOUS.
honorable DEEDS
Free Network Foundation . FNF , a non-profit, peer-to-peer communications initiative striving to liberate the global Internet from corporate and governmental interference. Isaac Wilder and Tyrone Greenfield, communications director for the Free Network Foundation. A Global revolution, which comes in the form of nine-foot-tall Freedom Towers that beam out free, secure Wi-Fi to occupied sites and underserviced communities allows people to talk to one another online through no middle man.
The Global Intelligence Files - List of Releases re: Stratfor
Highlights, according to Wikileaks: their deals would also include
the use of privileged information to make money in financial
markets. The Global Intelligence Files exposes how Stratfor has
recruited a global network of informants who are paid via Swiss
banks accounts and pre-paid credit cards. Government and
diplomatic sources from around the world give Stratfor advance
knowledge of global politics and events in exchange for money.
Stratfor has a mix of covert and overt informants, which includes
government employees, embassy staff and journalists around the
world.
Wikileaks has published five million emails from
Stratfor, an intelligence company based in Texas that, looking
at their practices, appears to be
America's very own privately run CIA
.
Stratfor CEO,
George Friedman
has tendered (or intends to tender) his resignation effective
immediately From Pastebin ~
@AnonymousIRC
2/21/12
Attack on Vatican Web Site
Operation Pharisee in a reference to the sect that Jesus called
hypocrites & draw attention to child sexual abuse by priests,
and the church's World Youth Day among other issues.
Though Imperva declined to identify the target of the attack and
kept any mention of the Vatican out of its report, two people
briefed on the investigation confirmed that it had been the
target. Imperva had a unique window into the situation because it
had been hired by the Vatican's security team as a subcontractor
to block and record the DDoS attack.
A new age of Transparency Activism
WikiLeaks is a problematic system for acquiring and publishing
leaks. It's vulnerable to attacks from many sides: “patriotic”
rival hackers and terrorists, legal attacks from governments,
militaries and corporations. The value WikiLeaks provided to
Manning was legal defense. And has it
failed epically
on that front.Unless a journalist is willing to deeply embed
themself into the underground culture of Anonymous (a process that
would take months of serious research and relationship building),
she really has no way of confirming the validity of any Anonymous
attack until it's been reported by the victim. Anonymous has the
opportunity to become a powerful publicity machine for activist
causes, simply because the media is hungry to cover legitimate
attacks. The group is perhaps more adept at “hacking” the media,
generating a ton of interest around a specific issue, than pulling
off actual network intrusions. Which is why Anonymous's latest
“partnership” with WikiLeaks makes so much sense. Anonymous can
get the goods for WikiLeaks because, cloaked by anonymity, it is
willing and able to operate outside the law. Meanwhile, WikiLeaks
provides Anonymous with a powerful P.R. channel. The media trusts
WikiLeaks. It has a mailing address and an official spokesman.
It's able to add a layer of credibility to any leak it publishes
because it employs a paid staff. WikiLeaks and Anonymous could
prove to be powerful allies in their shared war against government
and corporate corruption.
Anonymous hacks Infragard again
2/27/12
Greetings Pirates! Another #FuckFBIFriday is here and once again
we emerge from the hacker underground to wreak havoc upon the 1%'s
institutions of repression"
DOS Denial of Service Jan. 19, the U.S. Department of Justice
website vanished from the Internet.
Anyone attempting to visit it to report a crime or submit a
complaint received a message saying the site was unable to load.
More websites disappeared in rapid succession. The Recording
Industry Association of America. The Motion Picture Association of
America. Universal Music. Warner Brothers. The FBI. By nightfall,
most of the sites had come back online, but the people responsible
for the outages had made their point.
By clicking on a link, they could launch a page that asked them to
identify a target. Thousands typed in the address of the Justice
Department site and clicked enter, bombarding it with a fusillade
of meaningless commands. Overwhelmed, the site froze and dropped
offline. In the chat network where Anonymous coordinated the
attacks, the virtual warriors declared victory with a military
phrase: "TANGO DOWN." The software used to fire these Internet
missiles was the Low Orbit Ion Cannon, a name lifted from the
video game "Command & Conquer." Yet the consequences of firing
it were real -- a major law enforcement agency's web site was
temporarily crippled, leaving the agency to observe that there had
been a "degradation in service."
August 19, 2011 The politically oriented hacking group,
Anonymous
, has released 1GB of what is says are private e-mails and
documents from an executive of a U.S. defense company that sells
unmanned aerial vehicles to police and the U.S. military. The
documents were publicized in a post on Pastebin, with links
leading to the actual material on another website. The material
purportedly belongs to Richard Garcia, a senior vice president at
Vanguard who was a U.S. Federal Bureau of Investigation (FBI)
special agent for 25 years.
Anonymous took special delight in the breach, as Garcia is
director of InfraGard, an organization that liaises between
private sector companies and the FBI. A group affiliated with
Anonymous called LulzSecurity, or LulzSec, breached and defaced
one of InfraGard's websites belonging to its Atlanta chapter in
June.
Is the SEC Covering Up Wall Street Crimes?
Wall Street Aristocracy Got $1.2 Trillion in Federal Secret Loans
WHO GOT THE MONEY - The Feds Secret Liquidity Lifelines.
S&P and the Bildenbergers All Part of the Plan "The Treasury Department revealed that S&P's decision was initially based on a $2 trillion error in accounting. However, even after this enormous error was corrected, S&P went ahead with the downgrade. This suggests that S&P had made the decision to down grade independent of the evidence. S&P CEO Deven Sharma was a key contributor at the 2009 Bilderberg Summit that organized 120 of the world's richest men and women to push for an end to the dollar as the global reserve currency.
FANTASTIC! Operation Empire State Rebellion: Anonymous says it plans to target the NY FEDERAL RESERVE BANK
designed to shut down the agency's Web site starting 6/15/11. The group is calling for public protests until Federal Reserve Board Chairman Ben Bernanke steps down. The campaign, is timed to coincide with Flag Day in the U.S., which is June 14 and commemorates the adoption of the national flag in 1777.
LulzSec disbanded 6/25/2011 “We like to clarify again: All LulzSec members are accounted for, nobody is hiding. Only a name was abandoned for the greater glory #AntiSec,” says a tweet from @AnonymousIRC .
LulzSec
, known for recently attacking the websites of NPR and Sony
Pictures, claimed to have hacked 55 porn websites and
published
administrator emails and
passwords
. LulzSec also said they had hacked Pron.com and posted 26,000
user passwords and emails. Among the email addresses discovered in
the Pron cache, LulzSec made special mention of those belonging to
government and military employees. It was all "just for mild fun!"
according to the group's Twitter feed.
[via
Forbes
]
LulzSec have become Hacker Folk Heroes - http://uleak.it/?3ew practically overnight. Who is really to blame here? The companies that don't keep their customer's data secure or the hackers that expose it? LulzSec said that many of their previous high profile hacks used EASY exploits and well known software vulnerabilities. This means other hackers could have easily accessed, stolen and compromised the data as well, they just didn't advertise it to the world. The companies being hit either have 1) incompetent data security people; or 2) their data security people have made recommendations and management wouldn't fund it; or 3) they outsource all the data processing to outside companies who are NOT doing an inadequate job. As these hacks are more thoroughly investigated and reported, it will be interesting to see who really was responsible for the lapses. The Internet will eventually be a safer, better place because of these incursions.
Dear Internets: All Your Base Are Belong To Us!
Jun 5, 2011
Dear Internets, It has come to our unfortunate attention that NATO
and our good friend Barrack Osama-Llama 24th-century Obama have
recently upped the stakes with regard to hacking. They now treat
hacking as an act of war. So, we just hacked an FBI affiliated
website (Infragard, specifically the Atlanta chapter) and leaked
its user base. We also took complete control over the site and
defaced it, check it out if it's still up:
http://infragardatlanta.org/ While not very many logins (around
180), we'd like to take the time to point out that all of them are
affiliated with the FBI in some way. Most of them reuse their
passwords in other places, which is heavily frowned upon in the
FBI/Infragard handbook and generally everywhere else too. One of
them, Karim Hijazi, used his Infragard password for his personal
gmail, and the gmail of the company he owns. "Unveillance", a
whitehat company that specializes in data breaches and botnets,
was compromised because of Karim's incompetence. We stole all of
his personal emails and his company emails. We also briefly took
over, among other things, their servers and their botnet control
panel. After doing so, we contacted Karim and told him what we
did. After a few discussions, he offered to pay us to eliminate
his competitors through illegal hacking means in return for our
silence. Karim, a member of an FBI-related website, was willing to
give us money and inside info in order to destroy his opponents in
the whitehat world. We even discussed plans for him to give us
insider botnet information. Naturally we were just stringing him
along to further expose the corruption of whitehats. Please find
enclosed Karim's full contact details and a log of him talking to
us through IRC. Also, enjoy 924 of his internal company emails -
we have his personal gmail too, unreleased. We call upon
journalists and other writers to delve through the emails
carefully, as we have uncovered an operation orchestrated by
Unveillance and others to control and assess Libyan cyberspace
through malicious means: the U.S. government is funding the CSFI
to attack Libya's cyber infrastructure. You will find the emails
of all 23 people involved in the emails. Unveillance was also
involved in a scheme where they paid an Indian registrar $2000 to
receive 100 domains a month that may be deemed as botnet C&Cs.
Shameful ploys by supposed "whitehats". We accept your threats,
NATO. Game on, losers. Now we are all sons of bitches, Lulz
Security
2011 Anonymous reveals passwords for hundreds of Middle East
government email accounts
Anonymous has been hard at work. After
hacking into Iran's government servers
and getting away with over 10,000 email messages, they have
launched yet another attack, this time targeting Middle Eastern
government officials, in what the collective calls support for the
Arab revolutions.
As reported on Twitter
, a document was released on PasteBin, a
site that already bears the reputation as a hangout for hackers
, revealing the log-in details of hundreds of government officials
from Bahrain, Egypt, Morocco and Jordan.
March 14, 2011 OperationLeakS continues to
tweet out
links to mirrors of the files. Gawker's Adrien Chen, who has
sources within Anonymous, suggest there's something real to the
leaks.
#BlackMonday Ex-Bank of America Employee Can Prove Mortgage
Fraud Part 1
Bank of America employees' alleged orders to remove the Document
Tracking Numbers (DTNs) which are standard across all office
documentation from incriminating documents, deliberately making
them immensely difficult to track down.
We believe that the evidence that is supposed to be so damning is a series of emails showing that employees of Balboa asked for certain loan identifying numbers to be deleted, and they were.
Anonymous said late Sunday evening, however, “this is part 1 of the Emails.” So perhaps more incriminating correspondence is to come. And to be honest, these messages could be incredibly damaging, but we're not mortgage specialists and don't know if this is or isn't common in the field.
How is Balboa able to charge such inflated premiums and get away
with it?
It's all very simple. First, when you call in to customer service,
for say, GMAC, you're not actually speaking to a GMAC employee.
You're actually speaking to a Bank of America associate working
for Balboa Insurance who is required by their business to business
contract with GMAC to state that they are, in fact, an employee of
GMAC. The reasoning is that if you do not realize you're speaking
to a Bank of America/Balboa Insurance employee, you have no reason
to question the validity of the information you are receiving from
them. If you call your insurance agent and ask them for the
lienholder information for your GMAC/Wells Fargo/etc lien (home or
auto) you will be provided with their name, but the mailing
address will be a PO Box at one of Balboa's 3 main tracking
locations (Moon Township/Coreaopolis, PA, Dallas/Ft Worth, TX, or
Phoenix/Chandler, AZ) Tells me Boa is knowingly hiding Foreclosure
information from Feds…
March 7 2011 Wikileaks Bank Of America Fraud And Corruption Documents. make them pay #MakeWallstPay 600 homeowners have shut down DC Bank of America branch
Hacker Collective Anonymous To Release Documents Proving Bank Of
America Committed Fraud This Monday 3/14/11 By Tyler Durden
After Julian Assange crashed and burned in his threat to release
documents that expose fraud at Bank of America, many thought he
had been only bluffing, and that BofA is actually clean. Not so
fast. A member of the hacker collective Anonymous, which single
handedly destroyed "hacker defense" firm HB Gary [1], who goes
under the handle OperationLeakS [2]"is claiming to be have emails
and documents which prove "fraud" was committed by Bank of America
employees, and the group says it'll release them on Monday"
reports Gawker [3]. As to the contents of the possible disclosure:
""He Just told me he have GMAC emails showing BoA order to mix
loan numbers to not match it's Documents. to foreclose on
Americans.. Shame." If indeed this makes the case against BofA'
foreclosure practices stronger, it certainly explains why the
banking consortium is scrambling to arrange a settlement, and also
why Bank of America recently split off its $2 trillion in
mortgages [4]into "good bank" and "bad bank" entities.
As a "teaser", the Anonymous member released a November 1, 2010
email between two Balboa Insurance (a BAC subsidiary) employees,
which while not proving any fraud, indicates he/she does indeed
have access. The timeline on the email makes sense as it is a few
weeks prior to the original disclosure [5]that Wikileaks would
expose BofA. Perhaps the Assange team merely handed off its
materials to Anonymous, which has previously demonstrated its
solidarity with the Australian on various occasions.
The full letter is below.
[6]
Gawker with more on why Brian Moynihan may not sleep too soundly
overnight:
OperationLeaks, which runs the anti-Bank of America site
BankofAmericasuck.com [7], says the employee contacted the group
to blow the whistle on Bank of America's shady business practices.
"I seen some of the emails… I can tell you Grade A Fraud in its
purest form…" read one tweet. "He Just told me he have GMAC emails
showing BoA order to mix loan numbers to not match it's
Documents.. to foreclose on Americans.. Shame."
An Anonymous insider told us he believes the leak is real. "From
what I know and have been told, it's legit," he said. "Should be a
round of emails, then some files, possible some more emails to
follow that." The documents should be released Monday on
Anonleaks.ch [8], the same site where Anonymous posted [9]
thousands of internal emails from hacked security company HBGary
last month. That leak exposed [10] a legally-questionable plot to
attack Wikileaks and ultimately led to the resignation [11] of
HBGary CEO Aaron Barr.
It is unclear whether this will be yet another climax-free build
up, but Anonymous has certainly proven their mettle by putting
HBGary effectively out of business with one masterful hack.
Those I've spoken to in Anonymous are convinced there's something
to this. Anonymous has a proven track record with leaks, and Bank
of America has been in their crosshairs since they cut off [12]
payments to Wikileaks in December. If it's real, it could be big.
Keep your eye on anonleaks.ch: It should hit Monday.
We urge readers to check into
http://hbgary.anonleaks.ch/
[13] first thing Monday - after all this is the portal that
released the original damning HBGary evidence, and brought down
the firm within weeks. If it can do the same with Bank of America,
Monday may just soon be a national holiday.
h/t MM
BAC Bad Bank Bank of America GMAC
Source URL:
http://www.zerohedge.com/article/hacker-collective-anonymous-release-documents-proving-bank-america-committed-fraud-monday
Links:
[1]
http://www.businessweek.com/magazine/content/11_12/b4220066790741.htm
[2]
twitter operationleaks
[3]
what does anonymous have on bank of america
[4]
bofa segregates almost half its mortgages into bad bank under
laughlin
[5]
wikileaks next target big us bank
[6]
Balboa pic
[7]
bank of america suck
[8]
http://anonleaks.ch/
[9]
anonymous hackers launch wikileaks for normal people
[10]
12 hackers
[11]
hbgary federals aaron barr resigns after anonymous hack
scandal
[12]
bank of america cuts off wikileaks
[13]
http://hbgary.anonleaks.ch/
Spy games: Inside the convoluted plot to bring down WikiLeaks
Prosecuting WikiLeaks founder Julian Assange
Operation Leakspin, Operation Payback and Operation Avenge Assange -- each outlining different tactics to demonstrate their support. Anonymous is a by-product of the political freedoms we often take for granted.
Legal experts and good-government advocates say taking a hard-line
approach to leaks has a chilling effect on whistleblowers, who
fear harsh legal reprisals if they dare to speak up. It is not a
crime to shine a light on the inner workings of government
especially when there are measures that could protect the nation's
interests without hauling journalists into court and government
officials off to jail. Government Accountability demands that
Freedom of the Press deals with leaks that embarrass the
government ie: U.S. intelligence.
Double Standard Power Trip
Top White House and administration officials give unauthorized
information to Washington reporters almost daily, So why do these
same authorities bully rank-and-file employees who get caught
doing the same thing. Top officials frequently leak classified
information and nothing happens to them. Daniel Ellsberg, a true
patriot handed the Pentagon's top-secret assessment of the Vietnam
War to New York Times reporters 40 years ago, and supports Julian
Assange as we all should. No one investigated classified leaks to
Washington Post reporter Bob Woodward for the books he has written
on war policy under both recent White Houses. POLITICO reported
last year that Woodward sometimes arrived for official interviews
carrying classified maps. If you don't support Army Private
Bradley Manning, National Security Agency official Thomas Drake,
Central Intelligence Agency officer Jeffrey Sterling, and
mainstream journalists like Times reporter James Risen, YOU MIGHT
BE THE NEXT TARGET FOR PROSECUTION.
Interesting look at Anonymous
http://www.guardian.co.uk/technology/2011/may/11/anonymous-behind-the-mask
Another interesting look:
http://encyclopediadramatica.ch/The_Chanology_Experiments
WikiLeaks Threatens Its Own Leakers With $20 Million Penalty
<
http://www.wired.com/threatlevel/2011/05/nda-wikileaks/
>
WikiLeaks founder Julian Assange now makes his associates sign a
draconian nondisclosure agreement that, among other things,
asserts that the organizations huge trove of leaked material is
solely the property of WikiLeaks, according to a report Wednesday.
You accept and agree that the information disclosed, or to be
disclosed to you pursuant to this agreement is, by its nature,
valuable proprietary commercial information, the agreement reads,
the misuse or unauthorized disclosure of which would be likely to
cause us considerable damage.
The confidentiality agreement (.pdf), revealed by the New
Statesman, imposes a penalty of 12 million British pounds nearly
$20 million on anyone responsible for a significant leak of the
organizations unpublished material. The figure is based on a
typical open-market valuation of WikiLeaks collection, the
agreement claims.
Interestingly, the agreement warns that any breach is likely to
cause WikiLeaks to lose the opportunity to sell the information to
other news broadcasters and publishers.
WikiLeaks is not known to have sold any of its leaked material,
though Assange has discussed the possibility in the past. The
organization announced in 2008 that it was auctioning off early
access to thousands of e-mails belonging to a top aide to
Venezuelan president Hugo Chavez, but the auction ultimately fell
apart.
Also protected by the agreement is the fact and content of this
agreement and all newsworthy information relating to the workings
of WikiLeaks. The New Statesmans copy is unsigned, so whoever
leaked it might be safe from legal action by WikiLeaks.
Confirmation that John Young saw the rotten core of WikiLeaks
early on...
WHO ARE THE
BASTARD
KOCh BROTHERS
#
Operation Payback.
When you lose your fear you will be willing to stand up and fight using your Non Violent Strategy. History proves this is when all Tyrants like the Koch Brothers and other Regimes Crumble!!
HBGARY, MORGAN STANLEY, KOCH BROTHERS, BANK OF AMERICA
Anonymous' Operation Payback.
Some ideas are better than others. Whacking a hornet's nest isn't.
Youtube
Morgan Stanley was hit by a “very sensitive” breach to its network
by the same attackers who penetrated computer systems maintained
by Google and dozens of other companies, according to leaked
emails reviewed by Bloomberg News.
The
emails came from California-based HBGary
, which suffered a major compromise of its own at the hands of
hackers from
Anonymous
. After being hired by Morgan Stanley in 2010, HBGary members
found that the world's top merger adviser fell prey to the
so-called Aurora hacks, which siphoned source code and other
sensitive data from the victim companies over a period of many
months.
"They were hit hard by the real Aurora attacks (not the crap in
the news)," Phil Wallisch, a senior security engineer at HBGary,
wrote in one email.
In a May 10 email to HBGary President Penny Leavy-Hoglund,
Wallisch wrote: "They have given me access to a very sensitive
report on their Aurora experience. I will honor their wishes about
not sharing the info with anyone, but the good news is that I have
some great ideas for our
final reports." [...]
Dan Goodin in San Francisco 1st March 2011
http://www.theregister.co.uk/2011/03/01/morgan_stanley_aurora_attacks
The RSA security conference took place February 14-18 in San
Francisco, and malware response company HBGary planned on a big
announcement.
Fri Feb 25, 2011
http://arstechnica.com/staff/2011/02/our-anonymous-hbgary-coverage-on-colbert-report.ar
The firm was about to unveil a new appliance called "
Razor,
" a specialized computer plugged into corporate networks that
could scan company computers for viruses, rootkits, and custom
malware even malicious code that had never been seen before.
Razor "captures all executable code within the Windows operating
system and running programs that can be found in physical memory,"
said HBGary, and it then "'detonates' these captured files within
a virtual machine and performs extremely low level tracing of all
instructions." Certain behaviorsrather than confirmed
signatureswould suggest the presence of malware inside the
company.
The HBGary team headed over early to the RSA venue at the Moscone
Center in order to set up their booth on the exhibition floor.
Nerves were on edge. A week before, HBGary and related company
HBGary Federal were both infiltrated by members of the hacker
collective
Anonymous
, which was upset that HBGary Federal CEO Aaron Barr had compiled
a dossier of their alleged real names. In the wake of the attack,
huge batches of sensitive company e-mail had been splashed across
the 'Net. HBGary employees spent days cleaning up the electronic
mess and mending fences with customers.
On the RSA floor, a team put together the HBGary booth and
prepared for the Razor announcement. CEO Greg Hoglund prepped his
RSA talk, called "Follow the Digital Trail."
At RSA: "Anon: In it 4 the lulz..."
The HBGary team left for the night. When they returned the next
morning, the opening day of the conference, they found a sign in
their booth. It was from
Anonymous.
"We had a lot to think about," HBGary's Vice President of
Services, Jim Butterworth, told Ars. "We had just spent the
previous week trying to clean things up and get ourselves back to
normal, harden our systems, [and we] continued to hear the
telephone calls and the threatsand I will add, these are very
serious threats."
Now, with the appearance of the note in their RSA booth, the team
felt not just electronically exposed; they felt physically
threatened and stalked. "They decided to follow us to a public
place where we were to do business and make a public mockery of
our company," Butterworth said. "Our position was that we
respected RSA and our fellow vendors too much to allow this
spectacle to occur."
Instead, HBgary Inc. pulled out
of the conference. ZDNet journalist Ryan Naraine snapped a photo
from the show floor:
HBGary's withdrawal note
ZDNet The attacks continue
On Sunday, February 6, the electronic assault had begun in
earnest. As America sat down to watch the Super Bowl kickoff, five
"members" of
Anonymous
infiltrated the website of security firm HBGary Federal. They had
been probing HBGary Federal and related firm HBGary Inc. since
Saturday, but on Sunday they struck gold with an SQL injection
attack on HBGary Federal's content management system.
They quickly grabbed and decrypted user passwords from the
website, which they used to move into HBGary Federal's hosted
Google e-mail.
By the time the attack was through,
the hackTIVISTS had compromised
HBGary Federal's website
deleted its backup data
took over Greg Hoglund's rootkit.com site
and locked both companies out of their e-mail accounts by
changing the passwords.
The HBGary saga:
Anonymous
to security firm working with FBI:
"You've angered the hive"
How one security firm tracked down
Anonymous
and paid a heavy price
(Virtually) face to face: how Aaron Barr revealed himself to
Anonymous
How one security firm tracked down Anonymous—and paid a heavy price
Spy games: Inside the convoluted plot to bring down WikiLeaks
Anonymous speaks: the inside story of the HBGary hack
Black ops: How HBGary wrote backdoors for the government
The exact URL used to break into hbgaryfederal.com
Anonymous vs. HBGary: the aftermath
Anonymous speaks: the inside story of the HBGary hack
Black ops: How HBGary wrote backdoors for the government
While HBGary Federal was truly "hacked," HBGary Inc. was not;
attackers simply used existing usernames and passwords to access
key systems.
HBGary had in fact hardened its Web defenses, fully patching them
on the Thursday before the attack began in anticipation of some
unpleasantness. Butterworth told Ars that the company was able to
bring down its compromised offsite Web servers within 42 minutes
of the attack's beginning. (He also confirmed the accuracy of our
earlier exclusive report on how Anonymous penetrated the two
companies.)
Over the last week, this part of the story became well known. What
was not visible outside the hallways of HBGary's Sacramento
offices, however, was just how long the attacks continued. Indeed,
although the electronic assault stopped soon after it began, the
harassment has yet to end.
Butterworth sounded tired as he recounted the days for us when we
spoke, 17 had passed since the initial attack. Since then, HBGary
has been flooded with phone calls and voicemails of the "you
should be ashamed of yourself" type and worse; the fax machines
have been overwhelmed with Anonymous outpourings; people have been
"directly threatening our employees with extortion"; threats have
been made.
Then came RSA.
Butterworth, with a long career in military signals intelligence
and private security firms, is no stranger to the dark world of
cyberattacks, but he's used to adversaries who retreat after an
electronic strike.
Instead, he believes that
Anonymous
has "decided to continue their antics. They're in it for the
laughs this is a real funny game for them." Not content with the
damage they have inflicted, they "harass a company that's trying
to get back to work." Each time a new story about the company
appears in the press, Butterworth said that these attacks spike
again.
"Millions in damages"
Anonymous IRC channel #ophbgary
The fallout from the whole debacle endures. In the wake of the
attack, HBGary's Penny Leavy and Greg Hoglund (they are married)
entered the Anonymous IRC channel #ophbgary to plead in vain for
Greg's e-mails to stay private. (Several less relevant remarks
have been removed from the transcript for easier reading.)
<+greg> so you got my email spool too then
<&Sabu> yes greg.
<@`k> greg we got everything
<+Agamemnon> Greg, I'm curious to know if you understand
what we are about? Do you understand why we do what we do?
<+greg> you realize that releasing my email spool will cause
millions in damages to HBGary?
<@`k> yes
<+c0s> greg: another reason its not out yet.
<+Agamemnon> yes we do greg
<@`k>
greg is will be end of you :) and your company
Asked if HBGary has in fact seen a financial impact from the
Anonymous
attack, Butterworth would only say, "Time will tell." He did admit
that the hack had an impact on the company "the tainting of a
brand name, a company that has a very good product" and that
"we've received indications that folks are having second thoughts"
about working with the firm.
anonymous uses
Tor software and proxy servers
Anonymous, stumbled on a cache of e-mails involving dirty
tricks against WikiLeaks and using intelligence assets against
pro-union websites.
Without those revelations, the hack and e-mail release might have
looked far more self-interested. Anonymous protecting its mask.
Why have the attacks on HBGary Inc. continued? We spoke to people
with knowledge of the initial Anonymous hack. All have denied the
existence of continuing operations against HBGary and note that
the IRC channel used for coordination, #ophbgary, has been
shuttered
Subject: Security Problem
hope your strategy wont work and ppl of this planet will become free without beeing surpressed or monitored.
shame on you for your "business" - it is ppl like you who try to stop human revelation all in the name of allmighty america.
nice to see you failing hard and getting exposed yourself. how does it feel, suckers ?
i am looking forward to see your next fail.
greets
one of your monitored sheep that actually dont like to be monitored.
ps: please do us (the human race that is not trying to be nazis like
you) a favor and get aids and die slow and painfull,
thanks in advance.
The real impact of the attacks on Anonymous may not be felt for
months, or even years. HBGary says it is working with the
authorities on the case, and one presumes that the FBI is
interested in busting those responsible. The FBI has previously
arrested those associated with mere denial of service attacks, and
it recently executed 40 search warrants in connection with
Anonymous' Operation Payback.
In a press release regarding the search warrants, the FBI reminded
Anonymous
that "facilitating or conducting a DDoS [Distributed denial of
service] attack is illegal, punishable by up to 10 years in
prison, as well as exposing participants to significant civil
liability."
Butterworth, who touted his own (lengthy) list of advanced
security credentials during our call, told us that based on his
investigation so far, the Anonymous "operational security was not
that good they're pretty dirty." If he's right, the Anonymous
attack, so far free of consequences, might end with some serious
ones indeed.
FBI should invesitgate
Aaron Barr
, Palantir,
Berico, and HBGary Federal, Hunton & Williams
Palantir
The company was part of "
Team Themis," a group comprised of Palantir, Berico, and HBGary
Federal, which got involved with the DC law firm Hunton &
Williams. Hunton & Williams was looking for ways to help the
US Chamber of Commerce, and later a major US bank, deal with
troublesome opponents (pro-union websites and WikiLeaks,
respectively.)
As a member of Team Themis, Palantir became part of Aaron Barr's
plans to go after WikiLeaks, put pressure on commentators like
Salon.com's Glenn Greenwald, and set up a surveillance cell for
the Chamber of Commerce. No one in the e-mails that we saw
objected to any of the proposed ideas.
Palantir adopting Barr's ideas about WikiLeaks
When news of the proposals came out, Palantir said it was
horrified. Dr. Alex Karp, the company's CEO, issued a statement:
"We make data integration software that is as useful for fighting
food borne illness as it is to fighting fraud and terrorism.
Palantir does not make software that has the capability to carry
out the offensive tactics proposed by HBGary. Palantir never has
and never will condone the sort of activities recommended by
HBGary. As we have previously stated, Palantir has severed all
ties with HBGary going forward."
As we noted in our initial report on the situation, several of the
key ideas had come from
Aaron Barr
but they were quickly adopted by other team members, including
Palantir.
I asked the company for more information on why Barr's ideas had
shown up in Palantir-branded material. The company's general
counsel, Matt Long, supplied the following answer:
We did make a mistake one of a fast growing company with lots
of decentralized decision making authority. Initial results of
our ongoing internal diagnostic show that a junior engineer
allowed offensive material authored by HBGary to end up on a
slide deck with Palantir's logo. The stolen emails
conclusively show that Aaron Barr from HBGary authored the
content which was collated well past midnight for an early
morning presentation the next day.
This doesn't excuse the incident, but hopefully it brings much
needed context to a context-less email dump. That junior engineer,
a 26-year-old, has been put on leave while his actions are being
reviewed. "We should have cut ties with HBGary sooner and raised
internal concerns about this sooner," Long told me. "This is a
huge mistake for sure; we aren't making excuses. But our company
never approved hacking or carrying out dirty tricks on anyone."
As for the engineer's e-mail in which he said that the
Team Themis
project "got approval from Dr. Karp and the Board" on a new
revenue sharing plan, Long said that it was simply "classic
salesmanship ('I need to get my manager's permission for that. I
really argued hard for you and got you this deal').
In our case we don't have sales people so it is very
transparent/obvious coming from a 26-year-old engineer. Dr. Karp
and the Board did not know about the specifics of the proposal
including pricing."
Berico, one of the three companies involved with Team Themis,
initially promised a response to our questions about its handling
of the situation. The company later changed its mind and declined
to comment.
Berico
did issue one public statement back on February 11, saying that it
"does not condone or support any effort that proactively targets
American firms, organizations or individuals. We find such actions
reprehensible and are deeply committed to partnering with the best
companies in our industry that share our core values. Therefore,
we have discontinued all ties with HBGary Federal."
The company added that it was "conducting a thorough internal
investigation to better understand the details of how this
situation unfolded and we will take the appropriate actions within
our company."
Aaron Barr
HBGary Federal was in the process of selling itself after the
company couldn't meet revenue projections and had difficulty
paying taxes and salaries. On January 19, Penny Leavy (the largest
single investor in HBGary Federal) suggested in an e-mail to Aaron
Barr that he give the two companies considering a purchase a set
of deadlines. Under her projected scenario, the two firms would
bid on February 4 and HBGary Federal would make a final decision
on February 7.
On February 6, Anonymous attacked.
What happened to Barr?
Anonymous loudly and angrily demanded that Penny Leavy fire him,
since his list of Anonymous names could allegedly have gotten
"innocent people" into serious trouble. Leavy made clear that
HBGary Federal was a separate company from HBGary, one in which
she owned only a 15 percent stake, and that she couldn't simply
"fire" the CEO.
Barr, too, had a stake in HBGary Federal. He couldn't just be
fired but he told Ars that
he has taken a leave of absence from the company
in order to focus on some other things.
When he finally regained control of his Twitter account last week,
Barr's first new message since the attack said just about all
there was left to say: "My deepest personal apology to all those
that were negatively affected by the release of my e-mail into the
public."
RSS
- Anonymous to security firm working with FBI: "You've angered the hive"
- How one security firm tracked down Anonymous—and paid a heavy price
- Spy games: Inside the convoluted plot to bring down WikiLeaks
- Anonymous speaks: the inside story of the HBGary hack
- Black ops: How HBGary wrote backdoors for the government
- The exact URL used to break into hbgaryfederal.com
- Anonymous vs. HBGary: the aftermath
Aaron Barr Quits Thanks to Anonymous
The embattled CEO of HBGary Federal has resigned his post three
weeks after Anonmyous hacked into the company's network and
liberated thousands of e-mail messages. The ease with which
Anonymous conducted the attack left the company that provides
security services to the federal government looking like the
pathetic loser he is.
WIKILEAKS
VS. THE
SURVEILLANCE STATE
and THE government
information control puppets:
Amazon, PayPal, Visa, MasterCard, facebook, twitter
TERMS OF SERVICE:
they gave themselves the right to cancel you as soon as you
were *accused* of something ! ! !
If our government is going to continue to represent the people,
that we must have openness. Those in government must have checks
and balances on their conduct IE: REGULATIONS
This applies to corporations who have no oversight and have been
deregulated is driving government's poor conduct who want to
neutralize Wikileaks before their dirty deeds are exposed. Bank of
America is probably a big player in this, their history speaks for
itself.
Governments security is a joke and that they want to deflect
attention from their gross incompetence. Assange is not alone in
being fed up with the way our government conducts itself.
Hacking of DuPont, J&J, GE Were Google-Type Attacks That Weren't Disclosed .
Secrecy may be a reason why the dangers of the intrusions are
“underappreciated” by investors and regulators, Whitehouse said in
an interview. The FBI broke the news to executives at DuPont Co.
late last year that hackers had cracked the company's computer
networks for the second time in 12 months, according to a
confidential Dec. 9, 2010, e-mail discussing the investigation.
About a year earlier, DuPont had been hit by the same China- based
hackers who struck Google Inc. (GOOG) and unlike Google, DuPont
kept the intrusion secret, internal e-mails from cyber-security
firm
HBGary Inc
. show. As DuPont probed the incidents, executives concluded they
were the target of a campaign of industrial spying, the e-mails
show. The attacks on DuPont and on more than a dozen other
companies are discussed in about
60,000 confidential e-mails that HBGary
, hired by some of the targeted businesses, said were stolen from
it on Feb. 6 and posted on the Internet by a group of
hacker-activists known as Anonymous
. The companies attacked include Walt Disney Co. (DIS), Sony Corp.
(6758), Johnson & Johnson, and General Electric Co., the
e-mails show. “We are on the losing end of the biggest transfer of
wealth through theft and piracy in the history of the planet,”
said Democratic Senator Sheldon Whitehouse of Rhode Island, who
chaired a U.S. Senate Select Committee on Intelligence task force
on U.S. cyber security in 2010. Its classified report addressed
weaknesses in network security. A previous review of HBGary
e-mails by Bloomberg News showed hackers also stole proprietary
data from Exxon Mobil Corp., Royal Dutch Shell Plc, BP Plc,
ConocoPhillips (COP), and Marathon Oil Corp, as well as Morgan
Stanley. Atlanta-based King & Spalding LLP, the 38th biggest
law firm in the country in 2010, according to the National Law
Journal. The e-mails don't indicate what information the hackers
targeted. Among King & Spalding's practice specialties is
corporate espionage, according to the firm's website.