Showing posts with label Anonymous. Show all posts
Showing posts with label Anonymous. Show all posts

Monday, December 17, 2012

Anonymous announces plans to "destroy" Westboro Baptist, releases personal contact information for members

Hacktivist group Anonymous announced today the start of an attack on Westboro Baptist Church with the release of e-mail addresses, phone numbers, home addresses, and more for over fifty of the church's members. The announcement is in response to Westboro's announced plans to picket funerals in the wake of Friday's school shooting in Newtown, Connecticut.

In a video released along with the contact information, the group announced:
Since your one-dimensional thought protocol will conform not to any modern logic, we will not debate, argue, or attempt to reason with you. Instead, we have unanimously deemed your organization to be harmful to the population of The United States of America and have therefore decided to execute an agenda of action which will progressively dismantle your institution of deceitful pretext and extreme bias and cease when your zealotry runs dry. We recognize you as serious opponents and do not expect our campaign to terminate in a short period of time. Attrition is our weapon, and we will waste no time, money, effort, and enjoyment in tearing your resolve into pieces as with exposing the incongruity of your distorted faith.


What are your thoughts? Is Anonymous's release of personal contact information justified? Or should Westboro's free speech rights protect them from such privacy violations?

Monday, September 10, 2012

GoDaddy gets torpedoed - Anonymous claims responsibility

GoDaddy's website and sites that it hosts have gone down as the result of an alleged attack by Anonymous. It's a pretty significant Denial of Service (DOS) attack and this incident is surely going to result in an FBI investigation - remember what happened after the Paypal DOS - Feds Arrest 14 ‘Anonymous’ Suspects Over PayPal Attack, Raid Dozens More. Hopefully, if they do find, arrest, and prosecute the offenders, they will do a better job of handling the evidence than they did in the Paypal case - see my post about that here: In Paypal DDOS case, government reprimanded for failure to analyze and return data in a timely fashion.

Anonymous claimed responsibility via Twitter.

GoDaddy has confirmed, via twitter that it is experiencing issues - see their twitter account here: GoDaddy

A CBS news story regarding the incident can be read, here: GoDaddy goes down, Anonymous claims responsibility.

(As I post this, I see that Cybercrime Review is down - not sure if this is a part of the GoDaddy lulz.)

Update 1: As I mentioned on Twitter @Cybercrimerev, it appears the attack was not Anonymous collectively, but AnonymousOwn3r individually. This tweet here (NSFW), shows some dissension in the Anonymous ranks - an unsurprising development since the group has never congealed into a fully aligned faction.  In my opinion, that is the greatest strength of Anonymous - anyone can pick up the torch.

Friday, August 10, 2012

In Paypal DDOS case, government reprimanded for failure to analyze and return data in a timely fashion

If you recall, I wrote earlier about the E.D.N.Y holding that the government's failure to examine data after 15-months was a seizure under the Fourth Amendment - see: Federal court holds that 15-month delay in reviewing electronic evidence was an unlawful seizure. Well, it appears the government continues to have issues in this regard.

In United States v. Collins, 2012 U.S. Dist. LEXIS 111583 (N.D. Cal. Aug. 8, 2012), the government's motion to reconsider an order to return evidence was denied. The evidence was data that "fell outside the scope of the 27 warrants by which over 100 of the defendants'computers and other digital devices (including storage media) were seized."

The defendant, Collins, is part of a large group of people that were rounded up last year after the DDOS attack on Paypal. The attack was allegedly perpetrated by Anonymous, and used the Low Orbit Ion Cannon to achieve its goal. You can see the DOJ announcement, here: Prosecution of Internet Hacktivist Group "Anonymous," and some of the proceedings of the case, here (including a description of what allegedly occurred, and the criminal charges).

The facts are somewhat similar to Metter (the case my article above is on), in that in an extraordinary amount of time the government failed to deal with seized data. In the courts words:
almost a year and a half after presenting the warrants, the government has yet to take any meaningful steps to isolate non-targeted from targeted data
The government's arguments for reconsideration of the order on March 16, 2012 (nearly 5 months ago, and many months after the original seizure) are that:
(1) identifying non-targeted data might be difficult; (2) certain non-targeted data might be useful in understanding data that is clearly targeted; and (3) disaggregating non-targeted from targeted data might be unduly burdensome and expensive; (4) allowing only the defendants to keep a complete copy of the seized data might deprive the government the ability to challenge exculpatory non-targeted data and thus would be unfair.
The court was unconvinced by the governments justifications, and essentially chided the government for arguing a position that would essentially allow them to keep data they were not authorized to seize (possibly indefinitely) and which would nullify the government's pledge in search warrants to return such data. In the courts words:
If separating non-targeted data from targeted data and devices lawfully retained as criminal instrumentalities is too hard here, it presumably is too hard everywhere. In what case where a storage device is seized lawfully could a defendant or other subject of a search warrant ever secure return of data that the government had no right to take? Just about every storage device can be searched more easily with automated scripts than manually. Just about every storage device has non-targeted data that might prove useful to understanding the data that was targeted. Just about every storage device has deleted files in unallocated space. If the government's argument were accepted here, so that it need not return even one bit of data that is clearly outside the scope of the warrant, the court thus would render a nullity the government's pledge in just about every search warrant application it files in this district that it will return data that it simply has no right to seize. 
To me, it's hard not to wonder if there is a systemic problem going on with how the government is handling cybercrime cases and the plethora of evidence that they tend to produce - according to this transcript, there were at least 9 terabytes of data that had to be analyzed.  That is certainly a lot of data, but as the court in Metter stated, there has to be a line drawn somewhere when retention of data transforms from investigatory to a violation of the Fourth Amendment.

Wednesday, July 18, 2012

Anonymous launches plan to destroy all CP websites



Hacktivist group Anonymous has launched a campaign to "eradicate [child pornography] from the Internet." Anonymous plans to take down message boards and other websites that are "dedicated to pedophiles for chat and picture sharing."

They claim to have already invaded several sites, posting the users' IP addresses and e-mail addresses publicly on the Internet (such as here).

Wednesday, November 30, 2011

Cal. cybercrime investigator's e-mails exposed

Last week, hacker group Anonymous published the private e-mails, home address, and telephone number of the special agent supervisor for computer crime investigations in California's Department of Justice. They also accessed his voicemail, text messages, and Google Voice account.

Posts from the International Association of Computer Investigative Specialists's private discussion list were included in the 38,000 e-mails.

The release is a part of Operation Antisec, a joint effort between Anonymous and LulzSec, in response to investigations concerning Occupy Wall Street and general censorship of the Internet.

Shortly after the release, the group wrote, "You want to keep mass arresting and brutalizing the 99%? We'll have to keep owning your boxes and torrenting your mail spools, plastering your personal information all over teh internets [sic]."

Antisec also released a video, detailing their mission (note: contains some explicit language).

Thursday, November 3, 2011

Anonymous posts 190 IP addresses from child pornographers

This map shows the locations of those "caught" by Anonymous.
Anonymous, famous for their online protests and "hacktivism" has just released 190 IP addresses of child pornographers. The operation, called "Operation Paw Printing", was based around a Tor update released last week, and they knew that Tor users would want to immediately update their software. The group edited the code to allow them to track a user's online activity for 24 hours and posted the modified update on "Hard Candy", an underground child pornography forum on a website called The Hidden Wiki.

The administrator of "Hard Candy" added this note to the forum: "If you were stupid enough to install the recently linked Tor button 'update'... then your anonymity has no doubt been compromised. As a result you should consider running anti-virus/malware programs and/or fully wiping your hard drives."

Anonymous acknowledged their dedication to free speech, but noted: "Child Pornography is NOT FREE SPEECH.  We proved beyond doubt, that 70% of users to The Hidden Wiki access the HARD CANDY section, "a secret directory" used by the pedophiles to access sites like Lolita City and The Hurt Site, a site dedicated to trade of child rape."

The IP addresses and a more detailed explanation of Anonymous's operation can be found here.

RELATED NEWS: Anonymous has announced that they soon plan to release a list of at least 75 collaborators of a Mexican drug cartel after the group intercepted 25,000 e-mails from the Mexican government. According to a spokesperson, the list includes taxi drivers, public officials, and police officers.