In case some of you were duped into believing this was evidence that proved Russia hacked the US elections, John McAfee would like to remind you that you’re probably a high tier retard and would believe virtually anything your government told you.
Crazy, but brilliant, John said “if it looks like the Russians did it, then I can guarantee you it was not the Russians.” Continue reading »
After months of speculation whether the US would officially accuse Russia of being responsible for various intrusions and hacks, primarily involving the Democratic party, moments ago we finally got the long-anticipated confirmation when the US named Russia as the actor behind the hacking attempts on political organizations and, more importantly, state election systems and accused Putin of carrying out a wide-ranging campaign to interfere with the 2016 elections, including by hacking the computers of the Democratic National Committee and other political officials. Continue reading »
One month ago, Fred Ehrsam, co-founder of Coinbase in a sweeping, 2,500-word blog post, took aim at what he called a “stagnant” bitcoin community that he characterized as being outperformed by innovators working on the Ethereum network. In the post, Ehrsam sought to position Ethereum as a possible competitor to bitcoin, indicating his belief that the competing protocol could “blow past bitcoin entirely” (perhaps he was merely peeved at the lack of commission fees Coinbase was generating). In his post, Eshram said: “There is nothing that bitcoin can do which Ethereum can’t. While Ethereum is less battle tested, it is moving faster, has better leadership and has more developer mindshare. First mover advantage is challenging to overcome, but at current pace, it’s conceivable.” Continue reading »
COULD GUCCIFER’S DEAL HELP TAKE DOWN HILLARY?
Romanian hacker Guccifer struck a deal with prosecutors and pleaded guilty in Federal court recently. What does that mean for the FBI’s case on Hillary Clinton? And what information does Guccifer hold that allowed him to strike such a quick agreement?
At least two different sets of sealed documents were filed in the case against Romanian hacker Marcel Lehel Lazar, who goes by the moniker Guccifer.
You can’t make this up: Chinese hackers stole $100 million from the Bangladesh Central Bank’s account at the New York Fed and then laundered it through Philippine casinos.
Reports indicate that some of the stolen funds were traced to the Philippines, but given what we know about the “Cyber Axis of Evil,” we can only suspect it was Iranians, Chinese, or the criminal/military mastermind Kim Jong-Un who was behind the scam, but whatever the case, someone, somewhere, hacked into Bangladesh’s central bank on February 5.
According to Reuters, “some of the funds” have been recovered, but the bank didn’t initially say how much or how much was initially stolen. We suppose that theoretically it could have been a rather large sum, as the country has around $26 billion in FX reserves on hand:
But just moments ago we learned from the AFP that the amount lost was around $100 million. “Some of the money was then illegally transferred online to the Philippines and Sri Lanka, a central bank official told AFP on condition of anonymity.” Continue reading »
I’ve said before that I am not a friend of bitcoin.
I do not recommend bitcoin, because it is a virtual currency and once the system goes down all those bitcoins may just go “puff” and disappear in the ether, unlike physical gold and silver.
I also find it kind of suspicious that Bilderberg members are promoting it and that the alternative media is going so (positively) hysterical about it.
However, I may be proven to be completely wrong.
Paul Vernon, also known as Big Vern, is the founder of Cryptsy—the international cyber currency company (bitcoins). More than a year ago, Cryptsy was hacked by the developer of Lucky7Coin. During this time, the company was recovering it’s respect and reputation i.e. paying back money to user’s wallet.
How did the hacker (developer of Lucky7Coin) manage to access Cryptsy and steal bitcoins? The hacker injected Trojan malware into Cryptsy, which helps hackers gain access to the confidential data, allowing the hacker to grab the cyber currencies i.e. bitcoins. Continue reading »
– Russian Government Hacked White House Computer System, CNN Reports (ZeroHedge, April 7, 2015):
Update: even the White House appears embarrassed by this “report.” According to Bloomberg, the CNN report that Russia breached the White House computer system is “speculating on the attribution of the activity of concern on the unclassified” White House network that was “disclosed last year,” NSC spokesperson Mark Stroh says.”This report is not referring to a new incident.” Stroh says in e-mail statement.
* * * * *
A few months ago, Sony used a ridiculous “hacking” publicity stunt to generate some $40 million more in revenues for what would otherwise have been the latest Seth Rogen “comic” flop, in which the film agency blamed North Korea – which has about ten ultramodern 80386 computers in the entire country – for hacking its firewall, a hack which was subsequently revealed to be the result of disgruntled former employee. Fast forward to today, when moments ago CNN reported that Russian hackers which according to left “tell-tale codes and other markers that they believe point to hackers working for the Russian government”, had penetrated the White House computer system. Continue reading »
– Anonymous ‘knocks out’ Mossad website over Israel’s Gaza offensive (RT, July 31, 2014):
Hacker group Anonymous has reportedly taken down the website of the Israeli secret service Mossad in protest of Israel’s military incursion in Gaza. The ‘hacktivists’ have already targeted a number of organizations in their mission to stop the “genocide.”
Mossad’s website went offline at around 00:40 GMT and is still down at the time of writing. The Israeli government has yet to make any comment on the supposed hack attack. Continue reading »
– China summons US envoy over cyber-spying charges, vows retaliation (RT, May 20, 2014):
China has dismissed all US accusations of industrial cyber-espionage against five of its military officials and published proof that Washington is actually stealing data from China. Beijing also summoned the US ambassador for an explanation.
Beijing reacted to Washington’s recent round of industrial espionage accusations by publishing its latest data on US cyber-attacks against China.
China’s National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) reported that during just two months, from March 19 to May 18, the US directly controlled 1.18 million host computers in China using 2,077 Trojan horse networks or botnet servers. Continue reading »
– Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping (Ars Technica, March 4, 2014):
This GnuTLS bug is worse than the big Apple “goto fail” bug patched last week.
Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn’t be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.
The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates. The coding error, which may have been present in the code since 2005, causes critical verification checks to be terminated, drawing ironic parallels to the extremely critical “goto fail” flaw that for months put users of Apple’s iOS and OS X operating systems at risk of surreptitious eavesdropping attacks. Apple developers have since patched the bug.
– This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate (Forbes, Feb 5, 2014):
Auto makers have long downplayed the threat of hacker attacks on their cars and trucks, arguing that their vehicles’ increasingly-networked systems are protected from rogue wireless intrusion. Now two researchers plan to show that a few minutes alone with a car and a tiny, cheap device can give digital saboteurs all the wireless control they need.
– NSA seeks to build quantum computer that could crack most types of encryption (Washington Post, Jan 2, 2014):
In room-size metal boxes secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.
According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.“If you think you understand quantum mechanics, you don’t understand quantum mechanics,” said the late Nobel laureate Richard Feynman, widely regarded as the pioneer in quantum computing. The science video blog Vertiasium tries to help make sense of it.
– Feeding the Flame of Revolt (truthdig, Nov 17, 2013):
By Chris Hedges
NEW YORK—I was in federal court here Friday for the sentencing of Jeremy Hammond to 10 years in prison for hacking into the computers of a private security firm that works on behalf of the government, including the Department of Homeland Security, and corporations such as Dow Chemical. In 2011 Hammond, now 28, released to the website WikiLeaks and Rolling Stone and other publications some 3 million emails from the Texas-based company Strategic Forecasting Inc., or Stratfor.
The sentence was one of the longest in U.S. history for hacking and the maximum the judge could impose under a plea agreement in the case. It was wildly disproportionate to the crime—an act of nonviolent civil disobedience that championed the public good by exposing abuses of power by the government and a security firm. But the excessive sentence was the point. The corporate state, rapidly losing credibility and legitimacy, is lashing out like a wounded animal. It is frightened. It feels the heat from a rising flame of revolt. It is especially afraid of those such as Hammond who have the technical skills to break down electronic walls and expose the corrupt workings of power.
– Linus Torvalds Talks Linux Development at LinuxCon (eWeek, Sep 18, 2013):
Torvalds was also asked if he had ever been approached by the U.S. government to insert a backdoor into Linux. Torvalds responded “no” while nodding his head “yes,” as the audience broke into spontaneous laughter.
– Who rooted kernel.org servers two years ago, how did it happen, and why? (Ars Technica, Sep 24, 2013):
Maintainers of Linux still haven’t delivered promised autopsy of serious breach.
More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system kernel, officials still haven’t released a promised autopsy about what happened.
The compromise, which began no later than August 12, 2011, wasn’t detected for at least 16 days, a public e-mail and interviews immediately following the intrusion revealed. During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers.
– Syrian Electronic Army Hacks “Marines.com”; Calls Them “Brothers” In Arms (ZeroHedge, Sep 2, 2013):
Following President Obama’s decision to pass the blame buck to Congress (and its oh-so-great track record of making decisions), the Syrian Electronic Army has struck again. This time right at the heart of the matter – defacing the “Marines.com” website. As The Independent reports, the US Marines received a message calling for support from their “brothers, the Syrian army soldiers” – in the form of a web attack changing the homepage of the official Marines recruitment site to a page entitled ““Hacked by SEA.” The message also stated, “Obama is a traitor who wants to put your lives in danger to rescue al-Qaida insurgents,” which seems to fit with many of their perspectives as we have noted previously.
Full text and screenshot below…
“This is a message written by your brothers in the Syrian Army, who have been fighting al-Qaida for the last 3 years. We understand your patriotism and love for your country so please understand our love for ours. Obama is a traitor who wants to put your lives in danger to rescue al- Qaida insurgents.
Marines, please take a look at what your comrades think about Obama’s alliance with al-Qaida against Syria. Your officer in charge probably has no qualms about sending you to die against soldiers just like you, fighting a vile common enemy. The Syrian army should be your ally not your enemy.
– Former NSA Head, Michael Hayden, Aggressively Attacks the Entire Hacking Community (Liberty Blitzkrieg, Aug 8, 2013):
There’s an interesting trend happening in America today. A trend characterized by old, authoritarian, formerly “highly respected” figures in society becoming so confused and concerned that the zeitgeist of the nation is moving away from them, that they are overcome by dementia and publicly lash out like spoiled children in increasingly irrational manner. Two of my favorite examples of such behavior are Senator John McCain and NYC Mayor Michael Bloomberg. Now we can add another character to the list, former CIA and NSA head Michael Hayden.
Amongst other things, here is what he said about Snowden supporters:
Nihilists, anarchists, activists, Lulzsec, Anonymous, twenty-somethings who haven’t talked to the opposite sex in five or six years.
First of all, this is a typical response from a person who cannot win an argument. Appeal to emotion or engage in bizarre personal attacks. We saw Chris Christie desperately do this the other day when he attacked libertarians for “thinking,” in a pathetic attempt to create some perverted neocon buzz about himself ahead of 2016. However, even more hilariously, here is a picture of Michael Hayden. Continue reading »
– Monsanto website downed as Anonymous claims hack (RT, MAy 30, 2013):
Hackers from the Anonymous collective claimed to have infiltrated the website for the biotech giant Monsanto, which has been the subject of recent international protests.
The cyber-attack was carried out as part of #OpMonsanto, an attempt to demonstrate against Monsanto’s reach into every aspect of the food industry, from nature to farmers to consumers. The corporation’s main website, Monstanto.com, appeared to have been briefly disabled Wednesday night.
– A list of the U.S. weapons designs and technologies compromised by hackers (Washington Post, May 28, 2013):
Weapon designs and technologies compromised
The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
The charge by a defense panel comes a month visit by China’s president to Calif.
Chinese hackers have allegedly compromised the designs of top weapons systems, including the F-35 Joint Strike Fighter, The Washington Post reports. This photo from Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter.
– Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies (Washington Post, May 28, 2013):
Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.
And Seemingly Revealed That They Are Spying on Hacktivists
– Anonymous Hacked Bank of America (Vice, Feb 28, 2013):
You’ve probably already heard of Anonymous, the world’s most infamous group of cybertrolling hacktivists. They frequently make headlines for crashing websites and looting corporate and government servers. Usually these hacktivists come together in defense of others, such as Julian Assange, the people of Gaza, victims of police brutality, or even victims of rape. But now, Anonymous has turned its eyes on a personal rival. This enemy has its own cybersquad of secret spies who, according to Anonymous, spend the majority of their time in chat rooms collecting intelligence about them. With this latest release of stolen data, Anonymous has just pulled back the curtain on their foe: the Bank of America.
On February 25 @AnonymousIRC, an Anonymous Twitter account with over 280,000 followers, began posting “teasers” about a massive Bank of America data leak. The first post declared, “If you spy on us, we spy on you.” What followed was 14 gigabytes of private emails, spreadsheets, and a “text analysis and data mining” program called OneCalais. The emails in the release originated from “Cyber Threat Intelligence Analysts” who identified themselves as employees of a company called TEKsystems. The TEKsystems website appears to be nothing more than a staffing agency and seems wholesome enough. There’s definitely nothing that screams “we are cyberspies!” It’s safe to assume these analysts were hired by Bank of America, regardless of their TEKsystems titles, because according to the leaked emails that Anonymous released, each of them were using @bankofamerica.com email addresses while filing their reports.
– ‘Aaron was killed by the government’ – Robert Swartz on his son’s death (RT, Jan 16, 2013):
The father of information activist Aaron Swartz blames US prosecutors for his son’s death, RT’s Andrew Blake reports from an emotional Tuesday morning funeral outside of Chicago.
Aaron Swartz, 26, was found dead on Friday of a reported suicide. Swartz had been instrumental in designing software that aimed to make the Internet easy and open for everyone, and also co-founded both Reddit.com and Demand Progress — one of the most visited sites on the Web and an highly touted activism organization, respectively.
But while friends, family and loved ones recalled Swartz’ compassion for technology and his utter selflessness during Tuesday’s service, those in attendance did not shy away from acknowledging the tremendous legal trouble that plagued the activist in recent years.
In 2011, federal prosecutors charged Swartz with a series of counts under the Computer Fraud and Abuse Act, crimes that could have sent him away to prison for upwards of 35 years if convicted. Swartz, said the government, entered a building at the Massachusetts Institute of Technology and downloaded millions of academic and scholarly papers from the service JSTOR with presumably the intent of distributing them for free.
“Aaron did not commit suicide but was killed by the government,” Robert Swartz said during Tuesday’s service at the Central Avenue Synagogue in Highland Park, Illinois. “Someone who made the world a better place was pushed to his death by the government.”
– Anonymous leaks personal information of 5,000 Israeli officials (RT, Nov 18, 2012):
Internet hacktivist group Anonymous has declared cyberwar on Israel, posting personal data of five thousand Israeli officials online.
The group used their Anonpaste.me site to address a message to the Israeli government before linking to the page with names, ID numbers and personal emails of 5,000 officials.
The message said: “It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries.”
The group also said “Israeli Gov. this is/will turn into a cyberwar.”
Earlier, the group hacked over 700 hundred Israeli websites, including the Bank of Jerusalem, the Israeli Defence Ministry, the IDF blog, the President’s official website and many others.
Most of the sites remain down. Continue reading »
– Diebold voting machines can be hacked by remote control (Salon, Sep 27, 2012):
Exclusive: A laboratory shows how an e-voting machine used by a third of all voters can be easily manipulated
It could be one of the most disturbing e-voting machine hacks to date.Voting machines used by as many as a quarter of American voters heading to the polls in 2012 can be hacked with just $10.50 in parts and an 8th grade science education, according to computer science and security experts at the Vulnerability Assessment Team at Argonne National Laboratory in Illinois. The experts say the newly developed hack could change voting results while leaving absolutely no trace of the manipulation behind.
– Hacking Expert David Chalk Joins Urgent Call to Halt Smart Grid (Market Watch, April 12, 2012):
“100% certainty of catastrophic failure of energy grid within 3 years”
VANCOUVER, British Columbia, Apr 12, 2012 (BUSINESS WIRE) — The vulnerability of the energy industry’s new wireless smart grid will inevitably lead to lights out for everyone, according to leading cyber expert David Chalk. In an online interview for an upcoming documentary film entitled ‘Take Back Your Power’ ( www.ThePowerFilm.org ), Chalk says the entire power grid will be at risk to being taken down by cyber attack, and if installations continue it’s only a matter of time.
“We’re in a state of crisis,” said Chalk. “The front door is open and there is no lock to be had. There is not a power meter or device on the grid that is protected from hacking – if not already infected – with some sort of trojan horse that can cause the grid to be shut down or completely annihilated.”
“One of the most amazing things that has happened to mankind in the last 100 years is the Internet. It’s given us possibility beyond our wildest imagination. But we also know the vulnerabilities that exist inside of it. And then we have the backbone, the power grid that powers our nations. Those two are coming together. And it’s the smart meter on your home or business that’s now allowing that connectivity.”
Chalk also issued a challenge to governments, media and technology producers to show him one piece of digital technology that is hack-proof.
– LulzSec leader Sabu was working for us, says FBI (Guardian, Mar 7, 2012):
Hacker – real name Hector Xavier Monsegur – helped US authorities bring charges against five others
The world’s most notorious computer hacker has been working as an informer for the FBI for at least the last six months, it emerged on Tuesday, providing information that has helped contribute to the charging of five others, including two Britons, for computer hacking offences.
Hector Xavier Monsegur, an unemployed 28-year-old Puerto Rican living in New York, was unmasked as “Sabu”, the leader of the LulzSec hacking group that has been behind a wave of cyber raids against American corporations including Rupert Murdoch’s News Corporation, the intelligence consultancy Stratfor, British and American law enforcement bodies, and the Irish political party Fine Gael.
YouTube Added: 03.12.2011
Dear brothers and sisters. Now is the time to open your eyes!
In a stunning move that has civil libertarians stuttering with disbelief, the U.S. Senate has just passed a bill that effectively ends the Bill of Rights in America.
The National Defense Authorization Act is being called the most traitorous act ever witnessed in the Senate, and the language of the bill is cleverly designed to make you think it doesn’t apply to Americans, but toward the end of the bill, it essentially says it can apply to Americans “if we want it to.
Bill Summary & Status, 112th Congress (2011 — 2012) | S.1867 | Latest Title: National Defense Authorization Act for.
This bill, passed late last night in a 93-7 vote, declares the entire USA to be a “battleground” upon which U.S. military forces can operate with impunity, overriding Posse Comitatus and granting the military the unchecked power to arrest, detain, interrogate and even assassinate U.S. citizens with impunity.
Even WIRED magazine was outraged at this bill, reporting:
Tags: Anonymous, Barack Obama, Bill of Rights, Constitution, Dictatorship, Fascism, Global News, Government, hacking, Law, Military, New World Order, Obama administration, Police State, Politics, Senate, Treason, U.S.
YouTube Added: 01.11.2011
Anonymous (Group) is on a mission fighting for the civil rights of humanity. The injustice of the poor and the oppression of the needy. Anonymous has a purpose. Anonymous will not be stopped. This is coverage from earlier in the year. Anonymous Punks the FBI. Anonymous (Group) is here for the next generations future.
The elitists plan is to take away the internet from you.
Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.
For your information …
I clarify a few more things I may have forgot to mention or made a mistake during the first video. link: http://188.8.131.52/webdav/greenshell.php
Greetings citizens of the world, I am TheAnonMessage.
There’s been some con flict, as always. Many people refuse to accept that Operation Invade Wall Street is a reality. Some say it is a COINTELPRO agent tactic to set the map for a false flag operation.
I am here to say that I am the messenger. As the messenger, I cannot take sides. I am not supporting or opposing invade wall street, and it was wrong of me to say that the operation has been terminated.
Continue reading »
– Anonymous NYSE Hack Compromised, Group Says [Video] (Long Island Press, Oct. 7, 2011):
The hackers that claimed to be part of Anonymous are now saying that their plan to shut down the New York Stock Exchange Monday has been compromised.
TheAnonMessage had posted a video four days ago stating that the group was supporting the Occupy Wall Street protests by taking the NYSE down. Now, a message under the video reads:
BREAKING EMERGENCY UPDATE: Warning: The Operation #invadewallstreet HAS BEEN COMPROMISED. Do not participate. People may still hack NYSE. They will do it at their own risk.
This was after a tweet from AnonyOps said, “WARNING: To ALL people! DO NOT PARTICIPATE IN #invadewallstreet AGENT named hypotenuse has infiltrated AnonOps IRC.”
– Bank Not Responsible for Letting Hackers Steal $300K From Customer (Wired, June 7, 2011):
A judge in Maine has ruled that a bank that allowed hackers to steal more than $300,000 from a customer’s online account isn’t responsible for the lost money, saying the customer should have done more to protect the account credentials.
Magistrate Judge John Rich sided with Ocean Bank in recommending that the U.S. District Court in Maine grant the bank’s motions for a summary dismissal of a complaint filed by Patco Construction Company. The ruling was reported Monday by BankInfoSecurity.
The case raises questions about how much security banks and other financial institutions should be reasonably required to provide commercial customers and could set a precedent for liability in circumstances where customer systems are hacked and banking credentials are stolen. Small and medium-sized businesses around the U.S. have lost hundreds of millions of dollars in recent years to such activity, known as fraudulent ACH (Automated Clearing House) transfers.
🙂 1 in 4 US Hackers ‘Is An FBI Informer’ (Guardian) 🙂
Passwords stolen from 180 members of non-profit organisation InfraGard, including military users and cybersecurity companies
Hackers claim to have used an InfraGard password to steal nearly 1,000 work and personal emails from one chief executive. Photograph: Gregor Schuster/zefa/Corbis
A US private sector affiliate of the FBI has become the latest target of a hackers’ collective, which recently penetrated the online security defences of Nintendo and Sony.
Nearly 180 passwords belonging to members of the Atlanta chapter of InfraGard were stolen, according to the non-profit organisation, which connects businesses with law enforcement authorities.
Copies of the passwords – which appeared to include users from the US military, cybersecurity organisations and major communications companies – were posted online by the anonymous hacking collective, Lulz Security.
The FBI and US secret service have used the threat of prison to create an army of informers among online criminals
A quarter of hackers in the US have been recruited by federal authorities, according to Eric Corley, publisher of the hacker quarterly, 2600. Photograph: Getty Images
The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.
Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as “carders” – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.
– A99 Operation Empire State Rebellion: World’s Most (In)Famous Hacker Group ‘Anonymous’ Brings Peaceful Revolution To America To End Corrupt Two-Party System And Above All To Break Up Global Banking Cartel (Federal Reserve, IMF, BIS And World Bank)
– Anonymous strikes again: Iranian and UAE governments hacked (Independent, 3 June 2011):
Hackers have broken into the networks of both the Iranian and the Dubai governments, stealing more than 10,000 email messages as well as system usernames and passwords and releasing them online.
The Iranian Ministry of Foreign Affairs succumbed to a hacking attack perpetrated by Anonymous, which yielded the bulk of the email addresses. And, on Friday afternoon, a lone hacker – apparently with links to the group – struck the Dubai government’s system, releasing a “historic list of former gov.ae email passwords”, the domain used by the Arab Emirate.
While the first hack yielded around 10,000 emails, taken from the Iranian government and took control of some of its servers, the second was much smaller, including only around 100 usernames with passwords taken from the Dubai government, which are thought to be out-of-date. However, they serve to indicate the group’s reach just one day after another hacking group carried out an attack which yet again rocked Sony.
The hacktivist responsible for targeting Dubai said he had carried out the assault “because it’s time governments learn they have no power on the internet. This is our world”.
The world’s most (in)famous hacker group – Anonymous – known for effectively shutting down their hacking nemesis security firm (with clients such as Morgan Stanley and, unfortunately for them, Bank of America)- HBGary, advocating the cause of Wikileaks, and the threat made by one of its members that evidence of fraud by Bank of America will be released on Monday, has just launched communication #1 in its Operation “Empire State Rebellion.”
The goal – engage in “a relentless campaign of non-violent, peaceful, civil disobedience” until Ben Bernanke steps down and the “Primary Dealers within the Federal Reserve banking system be broken up and held accountable for rigging markets and destroying the global economy effective immediately.”
The Anonymous manifesto:
- We are a decentralized non-violent resistance movement, which seeks to restore the rule of law and fight back against the organized criminal class.
- One-tenth of one percent of the population has consolidated wealth in unprecedented fashion and launched an all-out economic war against 99.9% of the population.
- We are not affiliated with either wing of the two-party oligarchy. We seek an end to the corrupted two-party system by ending the campaign finance and lobbying racket.
- Above all, we aim to break up the global banking cartel centered at the Federal Reserve, International Monetary Fund, Bank of International Settlement and World Bank.
- We demand that the primary dealers within the Federal Reserve banking system be broken up and held accountable for rigging markets and destroying the global economy, effective immediately.
- As a first sign of good faith we demand Ben Bernanke step down as Federal Reserve chairman.
- Until our demands are met and a rule of law is restored, we will engage in a relentless campaign of non-violent, peaceful, civil disobedience.
- In our next communication we will announce Operation Empire State Rebellion.
Tags: Anonymous, Banking, Barack Obama, Ben Bernanke, BIS, Economy, Fed, Federal Reserve, Global News, Good News, Government, hacking, IMF, Obama administration, Operation Empire State Rebellion, Politics, Society, U.S., World Bank
The military has downplayed this study as an “academic exercise,” but its conclusions appear to match closely with a strong and growing focus by the Pentagon on what it calls “information warfare.”
Underlining this interest, this past January former Secretary of Defense Donald Rumsfeld resurfaced for the first time in over a year to address a conference on “Network Centric Warfare.” He complained that Islamic radicals are winning the propaganda battle against the United States and proposed a “21st-century agency for global communications” that would tell the American side of the story, using resources ranging “from blogs to online social-networking sites to talk radio.”
During the question session afterward, Rumsfeld suggested again that “a new agency has to be something that would take advantage of the wonderful opportunities that exist today. There are multiple channels for information . . . The Internet is there, blogs are there, talk radio is there, e-mails are there. There are all kinds of opportunities.”
Until recently, the popular concept of information warfare primarily involved hacking or denial of service attacks deployed against blogs and websites in order to convey a political statement.
For example, at the time of the invasion of Iraq in 2003, there were reports of widespread hacking of both military and commercial websites. According to ZDNet, “most notably, the US Navy Web site was hacked by an activist called Apocalypse. The message posted on the site read: ‘No War, U.S.A think they can tell the world what to do.'” A few months later, several NASA sites were similarly hacked by Brazilian anti-war protesters. Continue reading »