Results for "anonymous"
Anonymous: We Hacked Cybercops Email
Anonymous: We Hacked Cybercops Email

The Anonymous hacking collective's AntiSec group has launched a fresh assault on law enforcement agencies with the release of what they claim are personal emails stolen from a Californian cybercrime investigator.

The cache of emails – which according to AntiSec are from the account of Fred Baclagan, a retired special agent supervisor of the Californian Department of Justice – includes 30,000 emails detailing various computer forensic techniques and cybercrime investigation protocols.

The hacktivists claim to have hacked into Baclagan's Gmail account and to have accessed his voicemails and SMS message logs using unspecified techniques as part of their ongoing campaign against law enforcement officials and their "allies" in the computer security industry.

The email dump, released as a torrent last Friday in part of what has become the group's regular FuckFBIFriday release, is also said to contain personal information including Baclagan's home address and phone number.

"Possibly the most interesting content in his emails are the IACIS.com* internal email list archives (2005-2011), which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests," a member of Anonymous said on a statement accompanying the release, adding that knowledge of these techniques will help hacktivists to develop better tradecraft and anti-forensic techniques.

"There are discussions about using EnCase forensic software, attempts to crack TrueCrypt encrypted drives, sniffing wireless traffic in mobile surveillance vehicles, how to best prepare search warrants and subpoenas, and a whole lot of clueless people asking questions on how to use basic software like FTP. In the end, we rickrolled the entire IACIS list, causing the administrators to panic and shut their list and websites down.

But Baclagan told the Huffington Post that he was nobody special in the Justice Department ... which is what he would say, of course. He said that he had specialised in identity theft before he retired last year. "I'm really just a nobody," he told the Post, "just a local investigator, not involved in anything dynamic or dramatic. ®

Bootnote

*IACIS is the International Association of Computer investigative Specialists, an volunteer-led non-profit organisation made up of law enforcement pros and geared towards developing and etching best practice in computer forensics. (via)

takecy 11/28/2011
Anonymous talks about Anonymous
Anonymous talks about Anonymous

HACKTIVIST GROUP Anonymous, or at least one part of it, has visited Reddit to discuss who it is, where it is and where it's going.

The section of the group that runs the AnonymousIRC Twitter account started the Reddit conversation earlier today, and it discussed things like: its leader - there isn't one; its motives - they are varied; and its members - which are legion.

There might be some disinformation sprinkled around in the conversation, such as the late mention that 9,000 people operate the Twitter account, but otherwise the Reddit session seemed frank and forthcoming. For example, discussing the real numbers behind the account, the group explained that it was managed by "More than one person," adding, "It's impossible to shut down the twitter by arresting a single person."

These is no money behind the group and there are no obvious monetary agendas. Fortunately for the group its methods are cheap, and effective. "We run on a very low budget," said on poster, "but 20 bucks is enough to take on the filthy leaders, fortunately :)".

These cheap and effective methods could lend themselves to attacks on any kind of organisation, like the Opcartel plans to take on a Mexican drugs cartel. This controversial move was backed by some camps and opposed by others. AnonymousIRC said that these Anons were "bold".

"We support them with all our heart, And oops, we may have some data on them which would be preferred to be undisclosed, according to them," it said. "It'll all get out, tho. Why? We do not need to fear Govt's OR Cartels. We're Anonymous and we're mad as hell." It added later, "OpCartel are some ballsy guys. We love them <3".

The disparate nature of the group - and this is just one out of many social media accounts associated with Anonymous, remember - should suggest that there are many disagreements, but it seems that while different sectors may carry out their own initiatives or random attacks, this is fine within the greater Anonymous consciousness.

"We cannot control or limit what some individual anon may do or not do. Neither it is our interest. An example: If some cop finds it funny to mace innocent girls, Internet crowd will hate him. Which will include his family, if that information is public. Like it or not, it's just what happens," one poster said.

"There is no individual Anon. We might agree or not, it does not matter much, though. Anonymous strives because its base is covered every where: Pacifists as well as Anarchists. And while they despise each others methods they still can work together. Isn't it beautiful?"

What might not be so beautiful is the use of the Guy Fawkes or V for Vendettamask that has become the face of the organisation, and one respondent seemed to want to distance the group from its use, or at least its connotations.

"The Guy Fawkes mask became a traditional symbol of Anonymous. We find that troubling for a number of reasons," he or she wrote.

"It's all down to Hollywood. Nobody of us would know of him if it wasn't for the movie. Possibly there was an evil plan. Let's calculate with that - not only to push Time Warners' profits. Most of us don't want to burn down the Parliament. And most of us don't want to throw money into TW's throat. So let us meet halfway."

Other symbols of leadership, such as Topiary who was arrested in the UK, are also dimissed as leaders, but not as personalities. "It does not matter whether Anonymous has a spokesperson or not, even less who that might me. Once you understand you realize it does not matter," adds the poster.

"Barrett Brown is not a spokesperson. Neither is Topiary btw. Or me. Or Sabu. Or whoever. We just keep on pounding the establishment until there is no more."

Majority approval is not necessary for a movement to succeed, but there is a tipping point for action that depends on the mood of the group. This may explain why an operation like that against Facebook was ignored, for technical reasons, but an assault on the Zetas drug cartel was not.

"Nobody within Anonymous can approve or reject any idea. Nobody has that authority. What happens is: Someone suggests a plan. Or an idea. Or an operation. If it is sound, other Anons will support it. If it isn't, it will be ignored. It's a bit like democracy except that it can be taken literally and it is actually working," they said.

"[Facebook] is hosted and backed by Akamai and Amazon, the largest backbone providers you have. It still is possible to screw them but it would take skill and determination. However, those involved in [it] said [the] Op lacked both. You cannot kill [Facebook] with LOIC obviously. Needs different stuff..." µ

takecy 11/10/2011
#OccupyLondon : The Night of Thousand Masks
#OccupyLondon : The Night of Thousand Masks

thehackernews.com : Anonymous Mask = "A symbol that unites them behind one universal message" . Activists plan to protest on 5th November ,2011 at Saint Pauls Cathedral London 9:00pm - 11:00pm. This going to be "The Night of Thousand Masks".

Message By Anonymous :

Good evening, London. Allow me first to apologize for this interruption. I do, like many of you, appreciate the comforts of every day routine- the security of the familiar, the tranquility of repetition. I enjoy them as much as any bloke. But in the spirit of commemoration, thereby those important events of the past usually associated with someone's death or the end of some awful bloody struggle, a celebration of a nice holiday, I thought we could mark this November the 5th, a day that is sadly no longer remembered, by taking some time out of our daily lives to sit down and have a little chat. There are of course those who do not want us to speak. I suspect even now, orders are being shouted into telephones, and men with guns will soon be on their way. Why? Because while the truncheon may be used in lieu of conversation, words will always retain their power. Words offer the means to meaning, and for those who will listen, the enunciation of truth. And the truth is, there is something terribly wrong with this country, isn't there? Cruelty and injustice, intolerance and oppression. And where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. How did this happen? Who's to blame? Well certainly there are those more responsible than others, and they will be held accountable, but again truth be told, if you're looking for the guilty, you need only look into a mirror. I know why you did it. I know you were afraid. Who wouldn't be? War, terror, disease. There were a myriad of problems which conspired to corrupt your reason and rob you of your common sense. Fear got the best of you, and in your panic you turned to the now high chancellor, Adam Sutler. He promised you order, he promised you peace, and all he demanded in return was your silent, obedient consent. Last night I sought to end that silence. Last night I destroyed the Old Bailey, to remind this country of what it has forgotten. More than four hundred years ago a great citizen wished to embed the fifth of November forever in our memory. His hope was to remind the world that fairness, justice, and freedom are more than words, they are perspectives. So if you've seen nothing, if the crimes of this government remain unknown to you then I would suggest you allow the fifth of November to pass unmarked. But if you see what I see, if you feel as I feel, and if you would seek as I seek, then I ask you to stand beside me one year from tonight, outside the gates of Parliament, and together we shall give them a fifth of November that shall never, ever be forgot. V for Vendetta.

takecy 11/05/2011
Anonymous Take Down 40 Child Porn Websites
Anonymous has taken down more than 40 darknet-based child porn websites over the last week. Details of some of the hacks have been released via pastebin #OpDarknet, including personal details 1500 users of a site named 'Lolita City,' and DDoS tools that target Hidden Wiki and Freedom Hosting — alleged to be two of the biggest darknet sites hosting child porn.

News of the Anonymous campaign to actively target anyone hosting child porn sites comes from statements associated with Anonymous on Pastebin and two Anonymous YouTube video channels. AnonNews has yet to issue a press release.

The AnonMessage and BecomeAnonymous YouTube channels both posted videos with statements of intent to hunt, skin and kill pedobears everywhere, starting with Freedom Hosting.

Unknown 10/23/2011
Anonymous Hits Boston Police Websites
Anonymous Hits Boston Police Websites
A politically motivated computer hacker group attacked and brought down dozens of police websites around the country and said it posted e-mail information about nearly 1,000 Boston police officers Friday, claiming it was working in support of the Occupy protest movement.

Anonymous, the group taking credit for the computer intrusions, said in a statement, “In solidarity with the Occupation Movement and the International Day of Action Against Police Brutality, [we] aim at the corrupt bootboys of the 1 percent: the police.”

Specifically, the group said it attacked multiple Boston police websites. Most notably, Anonymous claimed to have hacked the Boston Police Patrolmen’s Association website and its web-based e-mail portal, posting the names, e-mail addresses, and passwords of Boston police officers on the Internet for all to see.

In the statement, Anonymous said it attacked BPD sites in response to “the unprovoked mass arrests and brutality experienced by those at Occupy Boston.”

“Let this be a warning to BPD and police everywhere: future acts of aggression against our movements will be met with a vengeance ... ,” the statement read.

Early on Oct. 11, Boston police moved in on some of the Occupy Boston protesters on the Rose Fitzgerald Kennedy Greenway and arrested 141 demonstrators.

Late Friday night, Boston police acknowledged the cyber attack, saying in a statement: “It has come to the attention of the Boston Police Department that various websites used by members of the BPD -- including the website belonging to the Boston Police Patrolmen’s Association -- have been hacked into and possibly compromised. In light of this information, the Boston Police Department is requiring all department personnel to secure their login information by resetting their passwords on the BPD network.”

The department recommended that police officers change their e-mail passwords and any other Internet, e-mail, and wireless device passwords.

A Boston police spokeswoman could not be reached for comment early this morning.

The group claimed that it “hacked, defaced, and destroyed several law enforcement targets, leaking over 600MB of private information including internal documents, membership rosters, addresses, passwords, Social Security numbers, and other confidential data.”

It claimed to take down at least 40 police-related websites.

The International Association of Chief of Police website was also targeted. The website was down and unreachable early this morning.

Anonymous also took aim at the website of Matrix Group International, which provides Internet services for government agencies. The Matrix website was down early this morning.

Anonymous also claimed to have hacked Birmingham/Jefferson County, Ala., police websites, releasing the names, addresses, and Social Security numbers of nearly 1,000 police officers.

Described as “e-Robin Hoods,” the Internet group Anonymous is known for its hacking skills and online activism. 
In a video regarding the police clashes with occupiers on Wall Street, Anonymous said, “This event serves to remind us that we’re living in a police state with absolutely no respect for the right of the people to peacefully assemble and exercise their constitutional free speech. But we will not be scared away… This abuse of authority by the NYPD only serves to strengthen our resolve and reinforce our belief that corruption and injustice in America must be fought.”

“We are Anonymous,” said the masked, computerized voice. “We do not forgive. We do not forget. Expect us.”Globe Correspondent Derek J. Anderson contributed to this report. (via)

Unknown
Celebrating 5th Birthday of Wikileaks
Celebrating 5th Birthday of Wikileaks

The wikileaks.org domain name was registered on 4 October 2006. The website was unveiled, and published its first document, in December 2006. The site claims to have been "founded by Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa".

The creators of WikiLeaks have not been formally identified. It has been represented in public since January 2007 by Julian Assange and others. Assange describes himself as a member of WikiLeaks' advisory board. News reports in The Australian have called Assange the "founder of WikiLeaks". According to Wired magazine, a volunteer said that Assange described himself in a private conversation as "the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest".

2006–08
WikiLeaks posted its first document in December 2006, a decision to assassinate government officials signed by Sheikh Hassan Dahir Aweys."] In August 2007, The Guardian published a story about corruption by the family of the former Kenyan leader Daniel arap Moi based on information provided via WikiLeaks. In November 2007, a March 2003 copy of Standard Operating Procedures for Camp Delta detailing the protocol of the U.S. Army at the Guantanamo Bay detention camp was released. The document revealed that some prisoners were off-limits to the International Committee of the Red Cross, something that the U.S. military had in the past repeatedly denied. In February 2008, WikiLeaks released allegations of illegal activities at the Cayman Islands branch of the Swiss Bank Julius Baer, which led to the bank suing WikiLeaks and obtaining an injunction which temporarily shut down wikileaks.org. The California judge had the service provider of WikiLeaks block the site's domain (wikileaks.org) on 18 February 2008, although the bank only wanted the documents to be removed but WikiLeaks had failed to name a contact. The site was instantly mirrored by supporters, and later that month the judge overturned his previous decision citing First Amendment concerns and questions about legal jurisdiction. In March 2008, WikiLeaks published what they referred to as "the collected secret 'bibles' of Scientology," and three days later received letters threatening to sue them for breach of copyright. In September 2008, during the 2008 United States presidential election campaigns, the contents of a Yahoo account belonging to Sarah Palin (the running mate of Republican presidential nominee John McCain) were posted on WikiLeaks after being hacked into by members of Anonymous. In November 2008, the membership list of the far-right British National Party was posted to WikiLeaks, after briefly appearing on a blog. A year later, on October 2009, another list of BNP members was leaked.

2009
In January 2009, WikiLeaks released 86 telephone intercept recordings of Peruvian politicians and businessmen involved in the 2008 Peru oil scandal. In February, WikiLeaks released 6,780 Congressional Research Service reports followed in March, by a list of contributors to the Norm Coleman senatorial campaign and a set of documents belonging to Barclays Bank that had been ordered removed from the website of The Guardian. In July, it released a report relating to a serious nuclear accident that had occurred at the Iranian Natanz nuclear facility in 2009. Later media reports have suggested that the accident was related to the Stuxnet computer worm. In September, internal documents from Kaupthing Bank were leaked, from shortly before the collapse of Iceland's banking sector, which led to the 2008–2010 Icelandic financial crisis. The document shows that suspiciously large sums of money were loaned to various owners of the bank, and large debts written off. In October, Joint Services Protocol 440, a British document advising the security services on how to avoid documents being leaked was published by WikiLeaks. Later that month, it announced that a super-injunction was being used by the commodities company Trafigura to gag The Guardian (London) from reporting on a leaked internal document regarding a toxic dumping incident in the Ivory Coast. In November, it hosted copies of e-mail correspondence between climate scientists, although they were not originally leaked to WikiLeaks. It also released 570,000 intercepts of pager messages sent on the day of the 11 September attacks. During 2008 and 2009, WikiLeaks published the alleged lists of forbidden or illegal web addresses for Australia, Denmark and Thailand. These were originally created to prevent access to child pornography and terrorism, but the leaks revealed that other sites covering unrelated subjects were also listed.

2010
In March 2010, WikiLeaks released a secret 32-page U.S. Department of Defense Counterintelligence Analysis Report written in March 2008 discussing the leaking of material by WikiLeaks and how it could be deterred. In April, a classified video of the 12 July 2007 Baghdad airstrike was released, showing two Reuters employees being fired at, after the pilots mistakenly thought the men were carrying weapons, which were in fact cameras. In the week following the release, "wikileaks" was the search term with the most significant growth worldwide in the last seven days as measured by Google Insights. In January 2010, WikiLeaks received the first test cable. A 22-year-old US Army intelligence analyst, PFC (formerly SPC) Bradley Manning, leaked a US embassy cable relating to IceSave, thereafter referred as "Reykjavik 13". In June 2010, he was arrested after alleged chat logs were turned in to the authorities by former hacker Adrian Lamo, in whom he had confided. Manning reportedly told Lamo he had leaked the "Collateral Murder" video, in addition to a video of the Granai airstrike and around 260,000 diplomatic cables, to WikiLeaks. In July, WikiLeaks released 92,000 documents related to the war in Afghanistan between 2004 and the end of 2009 to The Guardian, The New York Times and Der Spiegel. The documents detail individual incidents including friendly fire and civilian casualties. At the end of July, a 1.4 GB "insurance file" was added to the Afghan War Diary page, whose decryption details would be released if WikiLeaks or Assange were harmed. About 15,000 of the 92,000 documents have not yet been released on WikiLeaks, as the group is currently reviewing the documents to remove some of the sources of the information. WikiLeaks asked the Pentagon and human-rights groups to help remove names from the documents to reduce the potential harm caused by their release, but did not receive assistance. Following the Love Parade stampede in Duisburg, Germany, on 24 July 2010, a local resident published internal documents of the city administration regarding the planning of Love Parade. The city government reacted by securing a court order on 16 August forcing the removal of the documents from the site on which it was hosted. On 20 August 2010, WikiLeaks released a publication entitled Loveparade 2010 Duisburg planning documents, 2007–2010, which comprised 43 internal documents regarding the Love Parade 2010. Following on from the leak of information from the Afghan War, in October 2010, around 400,000 documents relating to the Iraq War were released in October. The BBC quoted The Pentagon referring to the Iraq War Logs as "the largest leak of classified documents in its history." Media coverage of the leaked documents focused on claims that the U.S. government had ignored reports of torture by the Iraqi authorities during the period after the 2003 war.

Diplomatic cables release
On 28 November 2010, WikiLeaks and five major newspapers from Spain (El País), France (Le Monde), Germany (Der Spiegel), the United Kingdom (The Guardian), and the United States (The New York Times) started to simultaneously publish the first 220 of 251,287 leaked confidential — but not top-secret — diplomatic cables from 274 US embassies around the world, dated from 28 December 1966 to 28 February 2010. WikiLeaks plans to release the entirety of the cables in phases over several months.

The contents of the diplomatic cables include numerous unguarded comments and revelations regarding: critiques and praises about the host countries of various US embassies; political manuvering regarding climate change; discussion and resolutions towards ending ongoing tension in the Middle East; efforts and resistance towards nuclear disarmament; actions in the War on Terror; assessments of other threats around the world; dealings between various countries; US intelligence and counterintelligence efforts; and other diplomatic actions. Reactions to the United States diplomatic cables leak include stark criticism, anticipation, commendation, and quiescence. Consequent reactions to the US government include ridicule, sympathy, bewilderment and dismay. On 14 December 2010 the United States Department of Justice issued a subpoena directing Twitter to provide information for accounts registered to or associated with WikiLeaks. Twitter decided to notify its users. The overthrow of the presidency in Tunisia has been attributed in part to reaction against the corruption revealed by leaked cables.

2011 : Guantanamo files
In late April 2011, files related to the Guantanamo prison were released.

Wow, for being only 5 years old they have done a remarkable and outstanding job of serving the people. The one thing most governments in the world have left off their agenda’s. Keep up the good work Wikileaks and we stand in support and behind you.
Support Wikileaks here

via

Unknown 10/04/2011
Lulzsec Member Blog Hacked by TeaMp0isoN
Lulzsec member blog hacked by TeaMp0isoN

Personal Blog http://sven-slootweg.nl/ of one of the Lulzsec Member get defaced by TeaMp0isoN . Get more details about TeaMp0isoN.


BREAKING NEWS: TEH LULZBOAT HAS OFFICALY SANK WITH 100S OF ANON MEMBERS ON BOARD!No matter how many bots you gather, no matter how much people you lie to, no matter how much pre-made tools you use, you will _NEVER_ represent the real hacking scene, we warned you, we told you we do not make empty threats, we gave u 48hrs to secure your ircs yet u failed to do so, instead u posted hashes from public forums and then claimed you doxed us and laughed at the fact that i was 17years old. stop telling yourself that u are hackers, putting a ip into a irc is NOT hacking nor is using pre-made tools and scripts to grab databases… you do not represent the anti-sec movement, u are not allowed to greet underground groups like zf0, ab, h0n0, el8 like your member “AnonSabu” was doing, you will never be apart of the underground scene, if anyone thinks you are underground and can actually hack they have no idea about what happens in the underground scene. oh and TeaMp0isoN Issue 2 is coming out VERY soon exposing lulzsec members (pictures, addresses, passwords, ips, phone numbers etc). . . . not so anonymous anymore are you? lets hope that you can swim because the lulzboat just got titanic’d…


Hacked Site Link : http://sven-slootweg.nl/index_defaced.html
 

Unknown 6/22/2011
Malaysian Govt Websites Hackeda
Malaysian Govt Websites Hacked

KUALA LUMPUR: At least 41 Malaysian government websites were hacked and defaced by a group protesting the authorities' move to shut down several free file-sharing websites in the country, officials said.

The attacks started at 11.30 p.m. Wednesday, Xinhua reported citing a statement from the Malaysian Communications and Multimedia Commission (MCMC), the country's internet regulator.

There was little impact on Malaysian users as a result of the attack. Many of the websites have already been restored and it would not take long for an overall recovery, it said.

The MCMC said its website was also hit.

A group of hackers that calls itself "Anonymous" sent a threat via the internet Tuesday saying it was plotting a hacking attack dubbed "Operation Malaysia" aimed at the country's government-related websites.

The attack was due to the government's decision to block a series of file-sharing websites in an attempt to fight against piracy.

"These acts of censorship are inexcusable and we fear that if you make further decisions to take away human freedom," Anonymous said in a statement.

Unknown 6/16/2011
CIA Website Hacked, LulzSec Takes Credit
CIA Website Hacked, LulzSec Takes Credit
The hacker group LulzSec claimed credit Wednesday for taking down the CIA’s Web site for a couple of hours, the latest in a string of embarrassing Web site disruptions the group has pulled off — apparently more to poke fun and highlight vulnerabilities than to cause real damage.

At 5:48 p.m., LulzSec, which dubs itself “the world’s leaders in high-quality entertainment at your expense,” posted an alert on Twitter: “Tango down — cia.gov — for the lulz.”

The site was back up by 8 p.m.

But the fact that the group could penetrate Web sites and harvest system administrators’ credentials underscores the risks of failing to secure sites, experts said.

“Web sites are the low-hanging fruit,” said Richard Stiennon, a cyber expert and author of “Surviving Cyberwar.” “But the Web sites are running on a server. Once you completely own the server that the Web site is on, you can watch the insiders log in and record their activity, and that can be a front door into the organization.”

In recent weeks, LulzSec has claimed credit for hacking or bringing down Web sites belonging to PBS, Sony, the U.S. Senate andthe Atlanta chapter of InfraGard, a public-private partnership between the FBI and the private sector dedicated to sharing information and intelligence to prevent hostile acts against the United States.

In the case of InfraGard, LulzSec stole and published 180 user names, passwords and e-mail addresses of members. When it hacked the Senate site, it published the user names and passwords of system administrators — enough to show that the group had done it.

LulzSec, Stiennon said, spun off from Anonymous, another hacker group that has claimed responsibility for Web site attacks against organizations that it perceived as hostile to WikiLeaks, an anti-secrecy Web site that has published massive amounts of leaked U.S. government documents.

Anonymous, in turn, he said, spun off from users of 4chan, a collection of uncensored online message boards — a site “for hackers and geeks to hang out.”

“LulzSec’s motivation appears to be to doing it for grins and giggles,” he said. “This is a very old hacker mentality, which is if you’re vulnerable, you’re stupid and deserve to be embarrassed and taken out.”

LulzSec, which also calls itself “The Lulz Boat,” has a somewhat “anarchistic” agenda, he said. “They’re against government control of information, much as they’re against media control of music and movies.”

Last month, after PBS’s “Frontline” ran a documentary on WikiLeaks that LulzSec perceived as unfair, the group hacked into PBS’s site and posted a fake article claiming that rapper Tupac Shakur was alive and living in New Zealand.

The assault on the CIA was by denial of service, or overloading the site’s server with requests for access.

CIA spokeswoman Marie Harf said the agency is “looking into these reports.”

Similar denial-of-service attacks were carried out against Sony gaming sites last week. LulzSec claims to have 1 million user names and passwords for subscribers to these sites, Stiennon said.

As opposed to being “uber hackers working for a foreign agency,” LulzSec basically publishes its findings for entertainment, he said. One sign it might be working, he said, is that the group has more than 158,000 followers on Twitter.

Just this week, it posted a hotline number on its Twitter feed to take suggestions for what sites to hack next.

Unknown
NIC Website Site Hacked By Anonymous In Response To Ramdev Action
Medianama : The Delhi Police’s action against Baba Ramdev’s anti corruption campaign appears to have irked one of the most feared online groups of hackers: Last night, Anonymous, a global, anarchic collective of online activists (rather, hacktivists), hacked the website of the National Informatics Centre (NIC) last night, according to reports on The Hacker News. When MediaNama checked the NIC website last night, it was down for maintenance, and the message published by Anonymous had been removed. The message, as reported by THN, stated

“Greetings!
.We exist without nationality.. We exist with humanity
.NIC took 3 ins,
.This time we talk to the government – On NIC Homepage and Sub-Domains.
.There is no use securing. There is no use of spending on forensic.
.Get this message clear Mr. Prime Minister and others.
.We do not like to talk much and Yes! IT is our world.
.Expect us.”

Defaced Site : http://informatics.nic.in/oldnewsonline/abc.html

http://informatics.nic.in/ is still under maintenance.

Anonymous announced their plans on Twitter yesterday, and invited participants for its Operation India Against Corruption. Some information on their actions, and the support, is available on their Facebook group, but the plans were hatched on IRC. A public document with the reasons behind their actions, and their demands, is being publicly edited here.

If three minutes is all it took Anonymous, it’s likely that no government website is safe. Remember that the websites for all Indian government departments are typically set up and run by the National Informatics Centre.

Anonymous has particularly come into the limelight over the past few months, after its repeated hacking of Sony’s Playstation Network, in response to Sony’s ‘offensive against free speech and internet freedom’, when it gained access to IP addresses of people who George Hotz’ blog via a lawsuit. Details at Wikipedia.

The Challenge With Anonymous

- Legally: Is one of how to find, and who to book: Anonymous is an anonymous collective. No one, apparently, knows anyone else, and they together hack sites without knowing who is fighting with them. So even if sections related to India’s IT Act of 2008 came into effect, it’s unlikely that NIC will know who to book. It is a leaderless collective.

- Ethically: (and this is a personal opinion) It is difficult for me to figure out where I stand on Anonymous – at one level, I identify with the concept of Internet Freedom and constantly worry about what governments and organizations are doing to try and control access in this space. India’s IT Department appears to be obsessed with the Troika of Paranoia (monitoring, identification and restriction), and are obviously trying to restrict Internet freedom. There is freedom in anonymity that many probably haven’t yet learned to cherish in India. While I agree with Anonymous’ reasons, I somehow cannot find myself supporting its acts of digital violence, whether against Sony or NIC.

Unknown 6/07/2011
Cyber Cops Stymied by Anonymous Hackers
Bloomberg : Hardly a month has gone by this year without a multinational company such as Google Inc. (GOOG), EMC Corp. or Sony Corp. (6758)disclosing it’s been hacked by cyber intruders who infiltrated networks or stole customer information. Yet no hacker has been publicly identified, charged or arrested.

If past enforcement efforts are an indication, most of the perpetrators will never be prosecuted or punished.

“I don’t have a high level of confidence that they will be brought to justice,” said Peter George, chief executive of Fidelis Security Systems Inc., a Bethesda, Maryland-based data protection consulting firm whose clients include International Business Machines Corp. (IBM), the U.S. Army and the Department of Commerce. “The government is doing what they can, but they need to do a lot more.”

In the U.S., the FBI, the Secret Service and other law enforcement agencies are confronting what amounts to a massive crime wave that’s highly organized and hard to combat with traditional methods. The hacker organizations are well-funded and global, eluding arrest except in the rarest of cases.

Attacks are coming from organized crime groups based in EasternEurope and Russia, from industrial spies in China and from groups such as LulzSec, whose members appear to reside mostly in the U.S. and Europe and seem more interested in publicity than in making a profit from their crimes.

LulzSec took credit for hacking into Nintendo Co.’s computers, an intrusion the Kyoto, Japan-based company disclosed June 5, describing it as unsuccessful. Last week it was Google, which revealed an attempted hack, originating in China, into the Gmail accounts of U.S. government officials, military personnel and journalists. Days before that, it was military contractor Lockheed Martin Corp. (LMT), which said its network had been penetrated by an unknown intruder.
InfraGard Attack

LulzSec said June 3 it also had attacked the Atlanta chapter of InfraGard, an information-sharing organization of companies that is affiliated with the Federal Bureau of Investigation to thwart cyber crime.

“We are facing a very innovative crime, and innovation has to be the response,” Gordon Snow, FBI assistant director of the cyber division, said in an interview at the agency’s Washington headquarters last week, before news of the InfraGard breach broke. “Given enough money, time and resources, an adversary will be able to access any system. Companies need to understand that.”

Pablo Martinez, who heads up cybercrime efforts at the Secret Service, compared the current challenge to early efforts the U.S. made to combat drug cartels in the 1980s.
Drug Tactics

“What the Secret Service has to do is take the successful model that we introduced in South America to defeat some of that stuff and incorporate it in what we do in cyber,” he said.

That would require substantial international law enforcement cooperation and intelligence sharing, said Martinez, whose agency has jurisdiction over bank cyber crime.

In the meantime, the attacks are taking a rising toll on companies and even government agencies, raising concerns about whether the FBI and other enforcement units can handle what appears to be an increasing surge of cyber-criminal conduct, dating back almost two years.

In late 2009, hackers breached the secure computer networks of Mountain View, California-based Google and at least 20 other major U.S. companies in what was dubbed Operation Aurora. They stole proprietary data and company secrets, according to Google and private cyber-security companies.

Hackers also broke into the databanks of BP Plc, Exxon Mobil Corp. (XOM), Royal Dutch Shell Plc (RDSA) and at least three other major energy companies over a two-year period ending this year. They stole millions of dollars of data on global oil reserves, according to McAfee Inc. and documentation in leaked e-mails of the cyber security firm HB Gary Inc.
‘Turning Points’

Cyber thieves stole the account data of 100 million global customers from Sony computer networks in April, the second- largest data breach in U.S. history, according to the Open Security Foundation.

“These are turning points we’re witnessing,” said Anup Ghosh, founder of the Fairfax, Virginia-based cyber security firm Invincea Inc. and a former Pentagon cyber scientist. “What you’re seeing is the loss of the U.S.’s competitive position on a global scale,” he said.

Law enforcement is hampered by the borderless nature of the Internet and by sophisticated methods used by attackers, cyber experts said.

“If you are looking at the Google systems that are being hacked from a country like China, there is no ability to track those activities back to individuals,” said Nicholas Percoco, head of Trustwave Corp.’s SpiderLabs.
Chinese Government

A spokesman for China’s foreign ministry said June 2 that blaming the country for the hacking of Google customer accounts is “unacceptable” and added that the Chinese government disapproves of and punishes Internet hacking.

“I can go into a Starbucks in Chicago, break into a system in Bulgaria, and use that system to launch an attack on Google so that it looks like it’s coming from there,” Percoco said.

Attackers deliberately base their operations in countries that provide limited law enforcement cooperation with the U.S. or where long-standing relationships between agencies don’t exist. Prominent examples include Ukraine, Romania, Russia and China, U.S. officials said.

“I can talk to the Ukraine all day and even identify who is responsible, but that doesn’t mean they are going to jail,” said E.J. Hilbert, a former FBI cyber investigator who is president of the New York City-based cyber-security firm Online Intelligence.
More Resources

The Justice Department, FBI and Secret Service say they have allocated more resources to the fight against cyber crime. Each can point to some successes. Last fall, the Justice Department announced the arrest of 39 individuals in Operation Trident Breach, a takedown of a $70 million international bank- fraud ring that used computer worms to steal account information.

U.S. agents only arrested the so-called money mules responsible for setting up bogus bank accounts designed to move stolen money abroad. They weren’t able to detain any of the kingpins they believed had organized the crime spree from the safety of eastern Europe.

One of the most successful U.S. prosecutions followed the indictment of Albert Gonzalez in August 2009 on charges related to the theft of 130 million credit card numbers from Heartland Payment Systems Inc. (HPY), the Princeton, New Jersey-based payment processor. Gonzalez, a Miami resident who worked as a federal informant and admitted that he led an international right, was later sentenced to 15 to 25 years in prison. Other members of his gang, believed to be located in Russia or Eastern Europe, haven’t been charged in the case, U.S. officials said.
Cyber Booty

Both Snow and Martinez pointed to successes that aren’t related to arrests, including hard-fought operations to take down web boards where cyber “booty” obtained from intrusions is exchanged or the disabling of infrastructure used by cyber thieves to commit crimes.

Snow cited the recent Justice Department dismantling of the Coreflood botnet, a network of more than 2 million infected computers that was used by Russian cyber thieves to steal financial information. The operation was the first time U.S. authorities had targeted command-and-control servers used to direct such botnets. Snow said it showed law enforcement is now taking some innovative approaches.

“I don’t think it’s right to conclude that because there are not a lot of arrests that law enforcement is not doing its job,” he said.
Brazen and Public

Cyber-security experts said hacking attacks haven’t necessarily increased in recent months. They’ve just become more brazen and public. A self-styled group of hacker-activists known as Anonymous began launching high-profile cyber attacks in December, announcing their efforts on websites and openly discussing details on web boards known as Internet relay chats or IRC’s. Such so-called hacktivists have said they are motivated by punishing activities they dislike.

Anonymous took credit for taking down the websites of Mastercard Inc. and Visa Inc. (V) in December as payback for the payment processors’ suspending use of their networks by WikiLeaks, an organization that publishes secret documents on its website.
Ransacked HB Gary

In February, Anonymous hackers ransacked the computer files of HB Gary, a Sacramento-based cyber-security firm, posting online 60,000 captured internal e-mails. Officials at Tokyo- based Sony said they found a folder named Anonymous inside their computer networks following the loss of account holder information, with a file that read “we are legion,” an Anonymous motto.

Hilbert said LulzSec appears to be loosely linked to Anonymous and has some of the same members. The group took responsibility for defacing the website of the nonprofit broadcast service PBS at the end of May, as well as for a later attack against Sony and another againstNews Corp. (NWSA)’s Fox television network.

Unlike Chinese or Eastern European-based hackers, members of Anonymous and LulzSec methods may be more vulnerable to arrest because of the methods they use and the way they are organized, according to cyber-security experts who track them. Leaders are based across several countries in Western Europe and in the U.S.

They often discuss illegal acts on web boards using pseudonyms that investigators may ultimately be able to link to real identities, the experts said, asking not to be identified because of fear of retaliation by the groups.

In December, the FBI seized evidence in the U.S., including server logs, computers and telephones from Anonymous leaders in multistate raids. Snow said that he couldn’t comment on a continuing investigation.

To contact the reporters on this story: Michael Riley in Washington atmichaelriley@bloomberg.net; Greg Farrell in New York at gregfarrell@bloomberg.net; Ann Woolner in Atlanta at awoolner@bloomberg.net

To contact the editor responsible for this story: Michael Hytha at mhytha@bloomberg.net

Unknown
Hackers got Hacked: One in Four Online Criminals in the U.S. 'is an FBI Informer'
One in four computer hackers is secretly working for the FBI and U.S. secret service to inform on their peers, it has been claimed.

By threatening long prison sentences, officers have managed successfully to infiltrate communities of the online criminals, recruiting a huge number of informants.

The moles, who are already embedded deep inside the hacking community, are then reporting back to the FBI about large-scale identity fraud in an attempt to earn themselves softer sentences.

Some major illegal forums where hackers sell stolen credit card details and forged identities are even being run by the FBI moles, it has been claimed.

The management of other sites have been taken over by FBI agents posing as ID theft specialists, or 'carders', where they can use the intelligence to land genuine hackers with lengthy jail sentences.

It is thought their work has already managed to put dozens of online criminals in jail - leaving the underground hacking world riddled with paranoia about infiltration.

Eric Corley, who publishes 2600, the hacker quarterly, told the Guardian that as many as a quarter of all hackers in the U.S. may have been recruited by authorities as moles.

'Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation, he said.

John Young, who runs Cryptome, a website similar to WikiLeaks that attempts to publish secret documents, added: 'It makes for very tense relationships. There are dozens and dozens of hackers who have been shopped by people they thought they trusted.'

Among many convictions is the extremely high-profile case of Bradley Manning, who is being held on suspicion of passing on documents to WikiLeaks.

He was shopped to authorities by Adrian Lamo, a convicted hacker turned informant.

Lamo, who is viewed in online communities as a 'Judas' and has been called 'the world's most hated hacker', has said: 'Obviously it's been much worse for him but it's certainly been no picnic for me. He followed his conscience, and I followed mine.

Barrett Brown, a spokesman for the 'hacktivist' group Anonymous, told the Guardian: 'The FBI are always there. They are always watching, always in the chatrooms. You don't know who is an informant and who isn't, and to that extent you are vulnerable.'

Kevin Poulsen, senior editor at Wired magazine, added: 'We have already begun to see Anonymous members attack each other and out each other's IP addresses.

'That's the first step towards being susceptible to the FBI.'

via | dailymail

Unknown
Anonymous Set to Target Iranian Sites

Online hacktivist collective Anonymous has announced OpIran, a new campaign set to coincide with International Workers' Day on 1 May and designed to launch denial of service attacks at Iranian web sites.

In a post on the AnonNews site, the group urged the Iranian people to join an "era of change" sweeping the world.

"We can see that Iran still suffers at the hands of those in power. Your former government has seized control, and tries to silence you," the statement read.

"People of Iran - your rights belong to you. You have the right to free speech and free press, the freedom to assemble and to be safe in your person. You have the right to live free and without fear."

Although no sites are mentioned by name, the group hinted heavily that the denial of service attacks are likely to be launched on the morning of 1 May.

"As International Worker's Day dawns - Anonymous stands with you," the statement concluded.

"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect Us."

It will not be the first time the group has sought to make a point by disrupting web sites. Most famously it was involved in launching denial of service attacks against firms such as Visa and PayPal which it accused of interfering with the work of whistle-blowing site Wikileaks.

Anonymous has also had long running disputes with Sony, the Egyptian government and radical Christian organisation the Westboro Baptist Church.


Unknown 5/02/2011
Anonymous Plans Sony Boycott on April 16
Katakanlah Anda seorang hacker mencoba untuk melumpuhkan sebuah perusahaan elektronik utama untuk menggugat pengguna sendiri: bagaimana Anda memulai cyberattack tanpa merugikan orang yang mencoba untuk Anda lindungi?

Dalam kasus, 'kelompok hactivist Anonymous yang telah menghabiskan minggu penargetan Sony untuk membalas tuntutan hukum yang sedang berlangsung terhadap pengubah Sony PlayStation 3.

Anonymous memulai sebuah pementasan 24 jam, boikot di toko Sony di seluruh dunia pada Sabtu, April 16. Sejauh ini lebih dari 1.000 orang lebih telah RSVP'd melalui Facebook.

Pada hari Senin, Anonymous meluncurkan serangan DDoS pada Sony yang membuat PlayStation Network (PSN) tidak dapat diakses karena hampir sepanjang hari (sementara sebuah cabang Anonymous yang menamakan dirinya "SonyRecon" menargetkan individu karyawan Sony ). Tapi setelah konsumen mengeluh bahwa pencopotan itu lebih banyak ruginya daripada baik untuk gamer, Anonymous terbalik hack dan mengambil menurunkan halaman Sony Careers. Sony tetap membisu tentang hack, hanya mengakui "kemungkinan" serangan untuk GameSpot.

"Anonymous tidak menyerang PSN saat ini Sony's official mengatakan bahwa PSN sedang maintenance. Kami menyadari bahwa menargetkan PSN bukan ide yang baiki. Oleh karena itu untuk sementara ditunda menunda kita, sampai metode ditemukan yang tidak akan berdmpak parah terhadap pelanggan Sony, "tulis Anonymous pada sebuah  posting  blog.

Apa yang Anonymous inginkan dari Sony? Sebagai permulaan, untuk memungkinkan pemilik PS3 untuk dapat memodifikasi konsol mereka sendiri dan berbagi temuan mereka secara online. Hal ini juga yang  Sony inginkan untuk berhenti mengejar tuntutan hukum terhadap beberapa hacker PS3 terkenal:

Pada bulan Januari, Sony menggugat 'Geohot' George 23 tahun Hotz untuk mengungkap root key untuk PS3, yang memungkinkan pengguna untuk mengembangkan dan bermain game homebrew. Kasusnya telah terdokumentasi dengan baik, sebagian karena penampilan Hotz 'talk show dan anti buatan sendiri-Sony rap video diposting di YouTube. Unphased oleh kemarahan konsumen, Sony baru-baru ini mendapat izin untuk memanggil PayPal untuk catatan Hotz '.

Sementara itu pada akhir Februari, polisi Jerman menggerebek rumah Egorenkov, orang yang paling dikenal untuk reverse-engineering PS3 dan celah keamanan meneliti di konsol. Sony kemudian menggugat Egorenkov untuk satu juta euro (US $ 1,4 juta) untuk menerbitkan temuan penelitian, yang dikenal sebagai "Hypervisor Bible," online.

Anonymous adalah koalisi dari hacker yang beroperasi dengan nama "Payback Operation" Ini telah diambil pada sasaran seperti Broadcast Musik Internasional , mantan CEO HBGary Harun Barr , Visa, Mastercard dan PayPal, Asosiasi Industri Rekaman Amerika, Kantor Hak Cipta AS , dan Motion Picture Association of America. and More again


Unknown 4/10/2011
Sony Attacked by Anonymous

Sony belum mendapatkan banyak penggemar dalam perang terhadap George Hotz, hacker yang berhasil jailbreak PS3. Namun, tampaknya reaksi negatif terhadap perilaku Sony telah mencapai puncaknya, sebagai perusahaan minggu ini menemukan dirinya menjadi target terbaru Anonymous Anonymous dan kelompok yang lebih agresif.

Anonymous dikatakan pagi ini meluncurkan serangkaian serangan distributed denial of service (DDoS) yang bertujuan untuk situs Sony PlayStation. setelah mereka berjanji untuk melakukan serangan. Menurut The Register, beberapa situs web Sony, termasuk toko PlayStation dan PlayStation.com tidak dapat diakses selama serangan.

Siaran pers diposting ke AnonNews.org menuduh Sony tela "menyalahgunakan sistem peradilan" dan menyatakan bahwa tindakan hukum baru-baru ini terhadap GeoHot dan Graf_Chokolo "telah dianggap suatu pelanggaran terhadap kebebasan berbicara dan kebebasan internet."

Namun, DDoS hanyalah awal serangan Anon melawan Sony. Menurut PlayStationLifestyle, sub-set dari kelompok OpSony telah mengambil hal-hal ke tingkat berikutnya. Menyebut diri mereka SonyRecon, diskusi di channel IRC detail OpSony bagaimana rencana kelompok untuk mengumpulkan informasi tentang orang-orang yang terlibat dalam gugatan Sony dan target individu-individu menggunakan iklan Craigslist  'layanan erotis' palsu, ketakutan STD dan banyak lagi. Bahkan presiden Howard Stringer tidak aman dari SonyRecon - "setiap info tentang anak-anak Stringer's" PlayStationLifestyle mencatat bahwa salah satu peserta di channel IRC mengeluh bahwa tidak ada yang ditemukan Randomtask, pengguna SonyRecon, Sony mengatakan, seluruh pengacara perusahaan dan hakim yang terlibat dalam kasus ini adalah seluruh "target yang valid."

Unknown 4/06/2011
Anonymous Targets Sony
Sony telah menjadi target terbaru Anonymous, kelompok 'hacktivist' the loose-knit yang tahun lalu meluncurkan 'Operasi Payback', serangkaian serangan terhadap kelompok anti-pembajakan termasuk badan industri rekaman AS, RIAA, dan koboi hukum pakaian ACS Law.

OpSony, keluaran terbaru untuk Operasi Payback diumumkan dalam sebuah pernyataan di situs AnonNews.org.

Raksasa elektronik konsumen sedang ditargetkan untuk mengejar atas GeoHot, hacker AS yang menerbitkan kunci pribadi yang dibutuhkan untuk mengembangkan firmware pihak ketiga untuk Sony PlayStation 3 game console, tanpa menggunakan dongle hardware.

GeoHot - bernama asli George Hotz - telah dipaksa oleh pengadilan di Amerika Serikat untuk menyerahkan peralatan komputer kepada pengacara Sony, yang juga berhasil mengamankan akses ke's PayPal account Hotz tersebut dalam upaya untuk membuktikan bahwa hacker telah menerima sumbangan untuk karyanya pada kunci pribadi PS3 hack.

Sony sekarang menuduh Hotz melarikan diri dari Amerika Serikat untuk melarikan diri dari penuntutan.

PS3 Fellow hacker Graf_Chokolo telah ditangkap oleh polisi Jerman pada bulan Februari sehubungan dengan kasus ini. Peralatan disita dalam sebuah serangan di rumah pemuda Jerman dan diserahkan kepada pengacara Sony mencari bukti terhadap GeoHot.

Menuduh bahwa Sony telah menjadi "korban" pelanggan sendiri, Anonymous mengancam "tindakan disipliner" terhadap situs web perusahaan.

Anonymous sebelumnya telah melakukan serangan Distributed Denial of Service (DDoS) terhadap  profil petinggi , membatasi atau menonaktifkan website Amazon, PayPal, Visa dan MasterCard, serta beberapa perusahaan besar AS, setelah perusahaan menarik layanan dari situs WikiLeaks.


source

Unknown 4/04/2011
Gadis 16 Tahun Anggota Anonymous
Kayla, 16, bekerja paruh waktu di salon, menghabiskan banyak waktunya bergaul dengan teman-teman dan berharap menjadi seorang guru. Tapi dia juga merupakan pendukung Anonymous, kelompok hacking yang membela WikiLeaks dan pemimpinnya, Julian Assange, membuat down situs web perusahaan kartu kredit utama dan sebuah perusahaan perangkat lunak keamanan.

Kayla meloncat di web dengan begitu rahasia identitas bahwa saya tidak dapat sepenuhnya memverifikasi usia atau jenis kelamin.

Namun, gadis yang dikenal di chat forum 'k sebagai, dan yang berbicara kepada saya melalui e-mail sebagai "Kayla," tidak hanya isapan jempol dari Internet. Dia membantu semua, tak terkecuali menghancurkan perusahaan. Ketika Harun Barr, yang sekarang-mantan CEO dari perangkat lunak keamanan perusahaan HBGary Federal, mengklaim dalam sebuah laporan pers bahwa ia dapat mengidentifikasi anggota kolektif Anonymous melalui media sosial , dia dan empat hacker lainnya masuk ke's perusahaan server nya untuk balas dendam, defacing Web situs, membersihkan data dan posting lebih dari 50.000 email nya online bagi dunia untuk melihat, semua dalam ruang dari 24 jam.

Kayla memainkan peran penting, menyamar sebagai Barr ke administrator TI untuk mendapatkan akses ke server perusahaan tersebut. Dalam kejadian tersebut, email Barr yang terungkap, HBGary telah mengusulkan kampanye trik kotor terhadap WikiLeaks untuk sebuah firma hukum yang mewakili Bank of America. perusahaan keamanan lain menjauhkan diri mereka sendiri. Kayla dan teman-temannya telah membuka sekaleng cacing.

Hari ini sementara HBGary merapikan potongan-potongan, Kayla masih menghabiskan beberapa jam malam di saluran chat Anonymous mencari sasaran berikutnya. Baru-baru ini pemerintah Libya, membantu mendapatkan informasi untuk warga negara Libya dalam pemadaman Internet.

source : Forbes .

Unknown 3/17/2011
'whos' and 'whats' of Anonymous
Apa Anonymous?

Kelompok hacker komputer dilaporkan dibentuk sekitar tahun 2003 sebagai sebuah perkembangan 4chan dari pengaruh internet, hacker dan gamer. Nama kelompok berasal dari hari-hari awal 4chan, ketika posting ke forum yang mana nama tidak diberikan penulis terdaftar sebagai "Anonymous." Seorang juru bicara untuk grup tersebut, yang diidentifikasi hanya sebagai "Coldblood" kata surat kabar Inggris Guardian pada Desember bahwa kelompok tersebut memiliki sekitar 1.000 anggota, sebagian besar dari mereka remaja. Ketika muncul dalam video web, anggota telah menyamar dengan topeng Guy Fawkes dipopulerkan oleh buku dan film "V for Vendetta."

Apa tujuannya?

"Coldblood" Anonymous digambarkan sebagai "yang lepas dari band orang yang memiliki jenis yang sama cita-cita" dan ingin menjadi kekuatan untuk "baik kacau." Seperti bisa diharapkan dari organisasi seperti itu, tujuannya agak samar. Secara umum, protes yang menangani isu-isu kebebasan berbicara dan menjaga keterbukaan internet.

Apa yang dilakukan Anonymous?

Sebagian besar telah menyerang situs-situs organisasi atau perusahaan yang telah menyinggung perasaan, termasuk Gereja Scientology, pemerintah Australia, Mesir, Iran dan Zimbabwe, anti-gay Westboro Baptist Church, dan MasterCard, PayPal dan perusahaan keuangan lainnya yang memutuskan hubungan dengan WikiLeaks berikut kontroversial publikasi dokumen-dokumen militer AS dan diplomatik bocor. Serangan DDoS membombardir situs target dengan data sampai mereka tidak bisa menanggapi, membuat mereka untuk sementara tidak dapat diakses. Pada bulan Februari, bagaimanapun, kelompok itu mengambil "hacktivism" nya ke tingkat yang baru, membobol komputer yang dioperasikan oleh HBGary, kontraktor pemerintah AS, dan mendatangkan segala macam malapetaka elektronik. Antara lain, para hacker mencuri ribuan karyawan e-mail, yang kemudian diterbitkan dalam bentuk pencarian di situs Web mirip dengan WikiLeaks.


Apakah serangan-serangan ilegal?

Dalam siaran pers 27 Januari - setelah pemerintah Inggris menangkap lima anggota Anonymous diduga setelah serangan kelompok DDoS pada perusahaan keuangan yang memutuskan hubungan untuk WikiLeaks. Cara baru untuk menyuarakan protes sipil" Anonymous dijelaskan serangan DDoS perusahaan sebagaimana didalilkan yang menangkap anggotanya untuk mengambil bagian dalam serangan tersebut mirip dengan "menangkap seseorang untuk menghadiri sebuah demonstrasi damai di kampung halaman mereka."

Bahkan, serangan DDoS jelas ilegal berdasarkan hukum Inggris. Hukum AS kurang jelas tentang masalah ini, memerlukan jaksa untuk menunjukkan bahwa para penyerang mendapatkan akses tidak sah ke komputer dan menyebabkan kerugian atau kerusakan, kata Mark Rasch, kepala privasi dengan Computer Services Corp dan mantan kepala Departemen Kehakima nunit kejahatan komputer. Tidak diragukan lagi, bagaimanapun, bahwa intrusi kelompok ke dalam sistem komputer HBGary's berlari bertabrakan dengan undang-undang kejahatan komputer federal, katanya.

Unknown 3/09/2011