Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged hacktivism

Rss Feed Group items tagged

Weiye Loh

Electronic Civil Disobedience and the World Wide Web of Hacktivism: - 0 views

  •  
    Electronic Civil Disobedience and the World Wide Web of Hacktivism: A Mapping of Extraparliamentarian Direct Action Net Politics
Weiye Loh

Hacktivists as Gadflies - NYTimes.com - 0 views

  •  
    "Consider the case of Andrew Auernheimer, better known as "Weev." When Weev discovered in 2010 that AT&T had left private information about its customers vulnerable on the Internet, he and a colleague wrote a script to access it. Technically, he did not "hack" anything; he merely executed a simple version of what Google Web crawlers do every second of every day - sequentially walk through public URLs and extract the content. When he got the information (the e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff), Weev did not try to profit from it; he notified the blog Gawker of the security hole. For this service Weev might have asked for free dinners for life, but instead he was recently sentenced to 41 months in prison and ordered to pay a fine of more than $73,000 in damages to AT&T to cover the cost of notifying its customers of its own security failure. When the federal judge Susan Wigenton sentenced Weev on March 18, she described him with prose that could have been lifted from the prosecutor Meletus in Plato's "Apology." "You consider yourself a hero of sorts," she said, and noted that Weev's "special skills" in computer coding called for a more draconian sentence. I was reminded of a line from an essay written in 1986 by a hacker called the Mentor: "My crime is that of outsmarting you, something that you will never forgive me for." When offered the chance to speak, Weev, like Socrates, did not back down: "I don't come here today to ask for forgiveness. I'm here to tell this court, if it has any foresight at all, that it should be thinking about what it can do to make amends to me for the harm and the violence that has been inflicted upon my life." He then went on to heap scorn upon the law being used to put him away - the Computer Fraud and Abuse Act, the same law that prosecutors used to go after the 26-year-old Internet activist Aaron Swart
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • The attackers just needed a little bit more information: they needed a regular, non-root user account to log in with, because as a standard security procedure, direct ssh access with the root account is disabled. Armed with the two pieces of knowledge above, and with Greg's e-mail account in their control, the social engineers set about their task. The e-mail correspondence tells the whole story: From: Greg To: Jussi Subject: need to ssh into rootkit im in europe and need to ssh into the server. can you drop open up firewall and allow ssh through port 59022 or something vague? and is our root password still 88j4bb3rw0cky88 or did we change to 88Scr3am3r88 ? thanks
  • Thanks indeed. To be fair to Jussi, the fake Greg appeared to know the root password and, well, the e-mails were coming from Greg's own e-mail address. But over the course of a few e-mails it was clear that "Greg" had forgotten both his username and his password. And Jussi handed them to him on a platter. Later on, Jussi did appear to notice something was up: From: Jussi To: Greg Subject: Re: need to ssh into rootkit did you open something running on high port?
  • From: Jussi To: Greg Subject: Re: need to ssh into rootkit hi, do you have public ip? or should i just drop fw? and it is w0cky - tho no remote root access allowed
  • ...2 more annotations...
  • So there are clearly two lessons to be learned here. The first is that the standard advice is good advice. If all best practices had been followed then none of this would have happened. Even if the SQL injection error was still present, it wouldn't have caused the cascade of failures that followed.
  • The second lesson, however, is that the standard advice isn't good enough. Even recognized security experts who should know better won't follow it. What hope does that leave for the rest of us?
Weiye Loh

Anonymous speaks: the inside story of the HBGary hack - 0 views

  • It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.
  • When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
  • HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.
  • ...1 more annotation...
  • One might think that such an esteemed organization would prove an insurmountable challenge for a bunch of disaffected kids to hack. World-renowned, government-recognized experts against Anonymous? HBGary should be able to take their efforts in stride. Unfortunately for HBGary, neither the characterization of Anonymous nor the assumption of competence on the security company's part are accurate, as the story of how HBGary was hacked will make clear. Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. With that diversity in age and experience comes a diversity of expertise and ability.
Weiye Loh

God hates hackers: Anonymous warns Westboro Baptist Church, 'stop now, or else' - 0 views

  • Vigilante “hacktivist” group Anonymous has a new target: Westboro Baptist Church. In an open letter to the notorious Kansas-based church, Anonymous promises “vicious” retaliation against the organization if they do not “cease & desist” their protest activities.
  • Led by pastor Fred Phelps, Westboro Baptist has become infamous for picketing the funerals of US soldiers — events know as “Love Crusades” — and for their display of signs bearing inflammatory messages, like “God hates fags.” The church has long argued that their Constitutionally-protected right to freedom of speech allows them to continue their derogatory brand of social activism.
  • Anonymous also considers itself an “aggressive proponent” of free speech, having recently launched attacks on organizations they consider to be enemies of that right: Companies like PayPal, Visa and Master Card, who stopped processing donations to WikiLeaks after the anti-secrecy organization released a massive cache of US embassy cables; and the government of Egypt, which attempted to cut off its
  • ...1 more annotation...
  • Other Anonymous targets include the Church of Scientology and, most recently, cyber-security company HBGary, which attempted to infiltrate Anonymous. In response, the lose-knit hacker group released 71,800 HBGary emails, which revealed highly dubious activities by the company, almost instantaneously destroying HBGary’s reputation and potentially setting it on a path to financial ruin.
Weiye Loh

The Associated Press: British spies to terrorists: make cupcakes not war - 0 views

  • Extremists are increasingly turning to cyberspace to spread their message.Individuals who say they are affiliated with the Taliban in Afghanistan or Pakistan have started using Twitter. Several other Internet forums also operate in the UK for jihadist groups, such as Islamic Awakening. Many sites have been left alone so message traffic can be monitored.Governments around the world are now considering how cybercrimes can be prosecuted under existing international laws and whether a cyberattack could someday be considered an act of war.
  • "A recipe for cupcakes is better than a recipe for bombs, but it would been more productive if they had put up counter-arguments to al-Qaida," said James Brandon with the London-based Quilliam Foundation, an anti-extremist organization. "They could have also attacked Awlaki himself. It should be about discrediting these individuals."
1 - 7 of 7
Showing 20 items per page