Showing posts with label Anonymous. Show all posts
Showing posts with label Anonymous. Show all posts

10/28/2015

KKK Members Wearing Hoods Are About to Find Out They’re Not So Anonymous



Πηγή: IJ
By Parker Lee
28 Oct 2015

The international, loosely-associated group of “hacktivists” known asAnonymous has been credited with some significant online infiltration, including releasing classified data from the Thai government, hacking the CIA website, and declaring a digital war on terrorist group ISIS.

Following the death of Michael Brown, however, Anonymous set its sightson another group often known to operate under the protection of anonymity – the Ku Klux Klan.

The group launched Operation KKK in November last year, after reports arose that the white supremacist group had threatened to use “lethal force” against those protesting on Brown’s behalf.


Making good on a Twitter post from last week, it seems that Anonymous has now struck a major blow against the KKK.

A statement reportedly released by Anonymous sheds light on its specific motivation for targeting the hate group:


Ku Klux Klan, we never stopped watching you….After closely observing so many of you for so very long, we feel confident that applying transparency to your organizational cells is the right, just, appropriate and only course of action…
You are more than extremists. You are more than a hate group. You operate much more like terrorists and you should be recognized as such. You are terrorists that hide your identities beneath sheets and infiltrate society on every level.

In forcibly accessing and shutting down various KKK websites and Twitter accounts, it seems that Anonymous has learned the names of at least 1,000 Klan members, which it’s released to the public accompanied by photos and other personal details.


BREAKING NEWS: Anonymous Reveals KKK Members’ Identities - Read Here http://anonhq.com/anon-reveals-kkk-identities-opkkk/
While Anonymous does appear to back up many of the names on the list by providing racist social media comments made by the same individuals, others have pointed to the fact that the group had previously misidentified Michael Brown’s shooter as police dispatcher Bryan Willman, who in fact had never even been to Ferguson.

As a result, Willman reportedly received hundreds of death threats before Darren Wilson was officially revealed to be the involved police officer.

It’s believed that there are currently between 3,000-5,000 Klan members in the U.S., though recruitment efforts have reportedly been on the rise in the last year.



4/17/2012

Anonymous claims attacks on MI6, CIA and Department of Justice


Πηγή: Computing
By Stuart Sumner
April 16 2012

Hacktivist collective Anonymous has today claimed responsibility for cyber attacks on MI6 in the UK, and the CIA and Department of Justice in the US.

The group claimed the attack on the site of the UK spy agency MI6 today via its Twitter account @AnonCentral.

"Tango Down: http://www.mi6.gov.uk #Anonymous," stated the post.

At the time of writing the public-facing MI6 website was accessible, but MI6.gov.uk was not.

No reason was given for the attack and the group failed to respond when asked.

Earlier today the group also claimed that it was behind this morning's outages at the CIA's website, and that of the US Department of Justice. The message came from a different Twitter account, claiming to be based in Brazil.

These attacks were apparently perpetrated purely 'for the lulz [laughs]', as the Anonymous member later stated on the micro blogging site.

Being a loosely affiliated group where membership is seemingly unrestricted and unmoderated, the collective has struggled in the past to present a unified front, with internal disagreements over targets, motivations and ownership of attacks.

Earlier this month the group also attacked the Downing Street and Home Office websites. The group said the attacks were in protest against the government's "draconian" surveillance proposals, and also the UK's extradition treaty with the US.

Anonymous' preferred method of attack is Distributed Denial of Service (DDOS), where a number of computers fire a large volume of requests to a webserver over a short space of time. This uses all available bandwidth or processing power, meaning that legitimate requests to those sites are unable to be served.

The result is that the site appears offline.

Graham Cluley, senior technology consultant at security firm Sophos likens this attack to a flood of people attempting to use the same door.

"The Distributed Denial of Service (DDOS) attack isn't terribly sophisticated. It's like a whole bunch of fat guys trying to get through the same revolving doors. They bombard the website with requests until it can't cope and goes offline."

Anonymous makes a freeware tool available to its members to carry out these attacks, which it calls the Low Orbit Ion Cannon.








2/17/2012

Anonymous warns US government over ACTA


Πηγή: The Inquirer
By Dave Neal
Feb 17 2012


HACKTIVIST GROUP Anonymous has spent the night attacking, defacing and knocking over US government web sites.

This morning it announced that part of the FTC.gov web site is still down. According to a message from the group on Twitter it has been RM'd, slang for having its web servers wiped. That is just one of many sites hit by the hackers.

The hackers have a tradition of targeting government and law enforcement web sites on a Friday and this is no different. Here Twitter messages are tagged with references to Occupy Wall Street, the ongoing occupation of the US financial district and ACTA, the draconian anti-piracy treaty.

A cache of the defaced http://business.ftc.gov shows that hackers put up an ACTA parody video, which shows an over the top response to copyright infringement, and a stinging message.

"Congratuations! You got rooted and rm'd (AGAIN). U MAD!? Don't like it?... So, how's it feel when your entire site is jack-hammered off the internet? Do tell!" it says.

"Guess what? We're back for round 2. Well, with the doomsday clock ticking down on Internet freedom, Antisec has leapt into action. Again. Holy déjà vu hack Batman! Expect us yet?"

The message warns the government that if ACTA is signed the Antisec movement will react. It said that it would rain "torrential hellfire down on all enemies of free speech, privacy and internet" and "systematically knock all evil corporations and governments off of our internet".

As well as criticising the FTC over ACTA, the hacktivist group dumped a lot of information, and suggested that it should have intervened when Google announced changes to its privacy policies.


2/12/2012

CIA website offline, Anonymous takes credit

A man crosses the Central Intelligence Agency (CIA) logo in the lobby of CIA Headquarters in Langley, Virginia, in 2008. The website of the Central Intelligence Agency was unresponsive on Friday after the hacker group Anonymous claimed to have knocked it offline.

Πηγή: TerraNet
By AFP
Feb 12 2012

The website of the Central Intelligence Agency was unresponsive on Friday after the hacker group Anonymous claimed to have knocked it offline.

"CIA Tango down," a member of Anonymous said on @YourAnonNews, a Twitter feed used by the group. "Tango down" is an expression used by the US Special Forces when they have eliminated an enemy.

Attempts to access the CIA website at cia.gov were unsuccessful.

A CIA spokesman had no immediate comment.

Anonymous last month briefly knocked the websites of the US Justice Department and the Federal Bureau of Investigation offline.

Those attacks were in retaliation for the US shutdown of file-sharing site Megaupload.

There was no immediate explanation from Anonymous for the targeting of the CIA site.

Most Anonymous cyberattacks are distributed denial of service attacks in which a large number of computers are commanded to simultaneously visit a website, overwhelming its servers.



2/05/2012

Hackers claim to have intercepted call between FBI, Scotland Yard

A screenshot from a video posted by the Anonymous hacking group to YouTube purporting to be the recording of a conference call between FBI and Scotland Yard.


Πηγή: Fox news
Feb 3 2012

A sensitive conference call between the FBI and Scotland Yard was recorded and released online by the hackers in Anonymous, the group claimed Friday.

The group released a roughly 15-minute-long recording of what appears to be a Jan. 17 conference call devoted to tracking and prosecuting members of the loose-knit hacking group and its spinoff group LulzSec. There was no classified information on the call, FBI sources tell Fox News, noting that unsecure phones are not used for sensitive information.

"The information was intended for law enforcement," the source said, and those responsible will be held accountable.

The authenticity of the recording could not be immediately verified and it's unclear how the hacking group obtained it. Names of some of the suspects being discussed were apparently edited from the recording.

"The information was illegally obtained and a criminal investigation is underway," FBI spokesman Tim Flannelly told FoxNews.com. He did not provide any additional details.

If authentic, the discussion itself appears quite sensitive. Those on the call talk about what legal strategy to pursue in the cases of Ryan Cleary and Jake Davis -- two British suspects linked to Anonymous -- and discuss details of the evidence gathered against other suspects

"We've set back arrests of Kayla and T-flow until we know what's happening," one person notes.

The conversation focuses for a time on hacker who's named is mentioned by obscured in the recording.

"He goes by the moniker "Tehwonhgz." He is the face behind CSL Sec (Can't Stop Laughing Security), which is a Lulzsec corner group ... he's just a pain in the bum ... we have copy of his hard drive here," one of the British voices says.

"Did anyone join on late," one of the voices asks at the end of the call.

Anonymous also published an email purportedly sent by an FBI agent which gave details and a password for accessing the call.

"The FBI might be curious how we're able to continuously read their internal comms for some time now," the group gloated in a message posted to Twitter.

Amid the material published by Anonymous was a message purportedly sent by an FBI agent to international law enforcement agencies. It invites his foreign counterparts to join the call to "discuss the on-going investigations related to Anonymous ... and other associated splinter groups." The email contained a phone number and password for accessing the call.

The email is addressed to officials in the U.K., Ireland, the Netherlands, Sweden and France, but only American and British officials can be heard on the recording.

Graham Cluley, an expert with data security company Sophos, said that hackers had been able to eavesdrop on the call because they had compromised an investigator's emails.

"No doubt the police authorities will be appalled to realize that the very people that they are trying to apprehend, could have been tuning in to their internal conversations," he wrote in a blog post.

An email to the FBI agent who sent the email was not immediately returned, while one of the British investigators on the call referred questions to Scotland Yard's press office.

Karen Todner, a lawyer for Cleary, said that the recording could be "incredibly sensitive" and warned that such data breaches had the potential to derail the police's work.

"If they haven't secured their email it could potentially prejudice the investigation," she told The Associated Press.

Anonymous was believed to have also hacked into a website run by the Boston Police Department Friday morning. BPDNews.com, a public safety resource and community outreach site, was offline as technicians worked to get it up and running again.

“It is unfortunate that someone would go to this extent to compromise BPDNews.com,” Elaine Driscoll, director of communications for the Boston Police, said in a written statement. Driscoll declined to comment on whether the hack was the work of Anonymous, citing an ongoing investigation into the matter.

Anonymous is an amorphous collection of Internet enthusiasts, pranksters and activists whose targets have included the Church of Scientology, the music industry, and financial companies such as Visa and MasterCard.

Following a spate of arrests across the world, the group and its various offshoots have focused their attention on law enforcement in general and the FBI in particular.






1/09/2012

Anonymous Releases Details of US, UK and NATO Officials


Πηγή: ITProPortal
By Ravi Mandalia
Jan 9 2012

According to reports, after successfully hacking into a US intelligence analysis firm, Stratfor, during Christmas, ‘anonymous' hackers posted online details of US, British and NATO officials.

Details of around 242 NATO officials and 221 British military staff have been leaked online by members of the alleged anonymous group. The information disclosed include email addresses as well as encrypted passwords that belong to intelligence, defence and police officials of Britain besides politicians and NATO advisers.

According to an analysis by an expert in cyber security at US Cyber Consequences Unit, John Bumgarner, details that have been posted online include "details of hundreds of UK government officials, some of whom work in sensitive areas," reports The Guardian.

Personal details of former US vice-president Dan Quayle as well as former secretary of state Henry Kissinger along with details of 173 personals serving in Afghanistan have also been leaked. Almost 19,000 email addresses of US military personnel were hacked.

On the other hand, advisers of Britain's Joint Intelligence Organisation, sensitive information of Prime Minister David Cameron besides 221 military officials and 242 NATO staff became the victim of this hacking.

A spokesman for British government commented that, "At present, there is no indication of any threat to UK government systems."




12/10/2011

Mr. Washington Goes to Anonymous


Πηγή: The Atlantic
By Alexis Madrigal
Dec 9 2011

Welcome to one of the inner rings of The Establishment. We're near Dupont Circle, a short distance to the various centers of power in Washington, DC. The Capitol Building is not so far. The White House, too. The myriad National Associations dot the streets, and the K Street lobbyists and big law firms are a few blocks away.

Here we find The Brookings Institution, one of DC's oldest think tanks. When you think of people in suits coming up with policies that become laws, this is one of the places you're thinking about.

Today's order of business was a panel about Anonymous, about hacktivism, about... the lulz. "Radical online activism is a new public-policy challenge, with groups such as Anonymous being described as everything from terrorist organizations to freedom fighters," the Institution billed it.

The speaker charged with explaining Anonymous' idiosyncrasies was Biella Coleman, an anthropologist who has been studying the group and its affiliates for months and months. An hour before she went on stage, she asked her Twitter followers, "The question for today: do I dare say 'Ultra-Coordinated Motherfuckeray' to the D.C. establishment in one hour?" (She didn't, sadly.)

This is the challenge Anonymous poses to the establishment. For those who think it is risky to wear a skinny tie, the group's argot and traditions are so alien that it's difficult to parse what the the group is. I have long imagined some DC lawyers gathered around 4chan.org with looks of horror and disgust on their faces. Even Coleman, who has spent massive amounts of time embedded among Anonymous and 4chan users, noted that the latter site was "teeming with pornography" and that many of its members communicate "in a language that seems to reduce English to a string of epithets." Which would, of course, be the point. Outsiders aren't supposed to understand.

So, when Coleman came to the microphone before the Brookings-blue logos of the stage, I was curious to see how her presentation of the social dynamics of Anonymous might be perceived. She described the group's birth on 4chan and the turn that some groups within the larger mass took to engage in activist politics in 2008, changes that came in the process of griefing the Church of Scientology in Project Chanology. Through that experience, various Anons developed the digital and physical moves that they'd later use on other organizations.

She covered several other notable Anonymous and AnonOps (separate group) exploits. What was fascinating about her talk was the way that it gave the impression that -- much as people would like to -- it is very difficult to separate out the different kinds of activities that define Anonymous' do-ocracy. Anonymous, a bit like Occupy Wall Street, is as much a platform for action as anything else, and individual efforts are largely separate from any other effort. This massive decentralization of power makes it difficult for Anonymous to stand for any one thing or even to ask that question of itself as an institution. It wouldn't make sense to say, "What are Anonymous' politics?" even if it seems clear that, in inchoate, intuitive form, there are some.

Coleman also highlighted the way Anons follow a strictly enforced "no fame" policy in which those members who seek celebrity are shunned. But inside the group, individuality is encouraged. The whole enterprise is "evasive, shifty, and nomadic," but not necessarily in a bad way.

That style is also a strategy. As Richard Forno, the graduate program director of University of Maryland, Baltimore County's cybersecurity program, explained, for those trying to defend their organizations an Anonymous attack, the very fact that no one controls the operation makes it difficult to strike back. Beyond any technical resilience the hackers build into an operation, the anonymity and decentralization create a social resilience. There's no one person to apprehend, no organization to strike, nothing to hit.

The last speaker was Paul Rosenzweig. Rosenzweig has a classic Washington resume: University of Chicago JD, lecturer at George Washington Law School, visiting fellow at the conservative Heritage Foundation, various posts at the Department of Homeland Security, and a bow tie.

I have to admit that he did not strike me as likely to understand or feel much sympathy for Anonymous. But Rosenszweig did a fantastic job of framing the group's activities for the policy crowd. "I offer the comments with a great degree of uncertainty and trepidation," he began, and then used the nominal title of the panel, "Hacktivism, Vigilantism and Collective Action in a Digital Age," as a way of illuminating different aspects of Anonymous and how policymakers might respond to it. Far from the befuddled establishment lawyer that I expected, Rosenszweig's sensitivity to the multivalence of Anonymous impressed me. We can only hope that other people whispering into lawmakers' ears are as intellectually curious as he is.

"In some instances, [Anonymous' action] is hacktivism of a vicious sort or vigilantism of an even more vicious sort," Rosenszweig said. "And in some instances, it embodies collective action that has been a tradition and core part of what we in America think of as free speech and political activity."

These distinctions matter. If policymakers think of Anonymous as hacktivism, they may see it as a kind of insurgency that they would battle not solely with policing but also with a battle to win hearts-and-minds and rob the group of its moral standing. If they see the group as vigilantes, they might take a more crime-fighting approach. And if they see the group as embodying collective action, "that's a whole different kettle of fish."

"If it's a First Amendment sort of activity, the only thing that's legitimate is to police the margins and enforce the traditional First Amendment rules like preventing a heckler's veto, so one part of speech doesn't drown out another part," he said.

Rosenzweig tipped his hand a little as to how he sees the group, but with the utmost (and seemingly honest) humility.

"I tend to see predominant within Anonymous, the more adverse parts and more the criminality and the theft of private information," he concluded. "But I'm certainly willing to acknowledge that I might be wrong. And that kind of indeterminacy of the threat, if it is a threat at all, makes it very difficult, possibly impossible [to create] a coherent policy or a coherent legal approach."

All this to say that, given the yawning gulf between Anonymous and the DC establishment, I was shocked to discover that there are some among the elites that can be eminently reasonable about the kind of things that Anonymous does. Perhaps given the byzantine and bizarre ways that power flows in Washington, DC, it's easier to understand a strange group that has its own language and plays by its own rules.


10/24/2011

Anonymous and Antisec Attack Law Enforcement Websites


Πηγή: Wired
Oct 22 2011

Anonymous and Antisec factions dumped files on the net Friday detailing data from the computer systems of multiple law enforcement agencies and a law enforcement vendor, including the International Association of Chiefs of Police, Boston Police Patrolmen’s Association and the Baldwin County Sheriff’s office in Alabama.

Additionally, the groups took down a number of law enforcement domains hosted together. According to the notice, the site’s homepages were defaced, replaced with an anti-police rap video. At the time of publication, the domains simply failed to load, sending a “Bad Request (Invalid Hostname)” message.

The notice says the attack is in support of the so-called 99% movement, a reference to the Occupy Wall Street protests spreading around the world. The action is described as retaliation against law enforcement for mistreatment of #occupywallstreet, particularly in Boston.

The notice references a 600MB data dump which reportedly includes the IACP membership roster; 1000 names, ranks, addresses, phone numbers, and social security numbesr for police officers in Birmingham and Jefferson Counties; 1,000 names and cleartext passwords for the BPPA; and the client list and financials for Matrix Group, a DC-based web design and marketing firm with law enforcement customers.

The BPPA website has a notice under current events that reads: “* Please Note: Starting Monday October 17th 2011 all Users who access the secure section of the site will have to re-register for a NEW Username and Password.”

But the site doesn’t say why, or warn users that usernames and passwords, which users commonly re-use on other sites, may have been compromised.

The notice contains a details about the compromised servers, but Wired has not been able to locate a publicly available dump of the data, which may not have been released yet.

Matrix Networks, Boston Police Patrolmen’s Association, and Boston PD did not respond to requests for comment by press time.