Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Jeremy-Hammond

Rss Feed Group items tagged

Paul Merrell

Jeremy Hammond Sentenced To 10 Years In Prison - 0 views

  • NEW YORK -- Convicted hacker Jeremy Hammond was sentenced Friday to 10 years in prison for stealing internal emails from the global intelligence firm Stratfor.
  • Hammond, 28, has a lengthy criminal record for his protests both online and off against targets like the 2004 Republican National Convention and pro-Iraq War activists. But stealing Stratfor files as part of the online hacking collective Anonymous gave him a new level of notoriety. In May, he pleaded guilty to one conspiracy charge for hacking the Texas-based private intelligence firm Strategic Forecasting, or Stratfor. The security breach resulted in the theft of employee emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. Although Hammond did not use the credit cards himself, he urged supporters to use them to make donations to charities. The resulting fraudulent charges led to headaches for nonprofits and for the private individuals who had their phone numbers and email addresses exposed. The government charges originally added up to 30 years in prison, but Hammond took a plea deal for violating the Computer Fraud and Abuse Act, a federal anti-hacking law also used to prosecute internet freedom activist Aaron Swartz. He admitted to hacking several other websites, including the Arizona Department of Public Safety, Special Forces Gear, the Boston Police Patrolmen's Association, and the sheriff's office in Jefferson County, Ala.
  • Nearly 5 million emails obtained in the Stratfor hack were turned over to WikiLeaks by Hammond and published as the “Global Intelligence Files.” They revealed domestic spying on activists, including Occupy Wall Street. The resulting media publicity led some, including 4,000 online petition backers and Pentagon Papers leaker Daniel Ellsberg, to hail him as a whistleblower. But to the federal government, he was little more than a common thief. “While he billed himself as fighting for an anarchist cause, in reality, Jeremy Hammond caused personal and financial chaos for individuals whose identities and money he took and for companies whose businesses he decided he didn’t like," United States Attorney Preet Bharara said in a May statement. On Friday, Hammond, who has been in detention for 20 months, struck back. While apologizing to the innocent people who had their personal information exposed as a result of his leaks, he lashed out at the FBI, and Hector Xavier Monsegur, an informant widely known by his online name "Sabu." For months, Hammond claimed, Sabu guided him as he hacked the Stratfor website and thousands more around the world.
  • ...1 more annotation...
  • Before being cut off by U.S. District Court Judge Loretta Preska, Hammond claimed that foreign government targets included Turkey, Brazil and Iran. Preska had already imposed a protective order preventing the release of the countries' names, which were in Hammond's statement as well as in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering that their names be redacted. She cut Hammond off in court Friday before he was able to list all of the countries in violation of the order.
  •  
    Jeremy Hammond draws the maximum 10-year sentence. 
Paul Merrell

The FBI could have stopped the Stratfor leak at any point - Sue Crabtree - News - World... - 0 views

  • The persecution of Jeremy Hammond is largely being ignored by the US mass media but the case of the young man  accused of being involved in the passing of the Stratfor E-Mails to WikiLeaks is full of contradictions and serious reasons to question the motives of the judge and the entire prosecution, including the FBI which, it has been revealed, not only orchestrated the hack through an FBI informant known by the code name "Sabu", but could have stopped the leak of the files anytime had they wanted. The FBI were in fact storing the "Stratfor Files" on their own servers for two weeks before they were released to WikiLeaks. According to Sue Crabtree, a close friend of Jeremy and the mother of the family who took Jeremy in and whose children considered him a brother, the FBI may have been interested in the activities of Stratfor which may explain why they held the material on their servers for so long. Mrs. Crabtree also believes that the FBI was interested in selling the material to WikiLeaks so that charges of espionage could be brought.
  •  
    Way interesting! Seems that Jeremy Hammond was the unwitting sock puppet of the FBI and that the Stratfor files he filched at the FBI's request were even stored on FBI-controlled servers before being turned over to Wikileaks, with the FBI's knowledge. I wish that I could automatically reject such allegations as preposterous, but given the way our government has been behaving lately ... 
Paul Merrell

F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com - 0 views

  • An informant working for the F.B.I. coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of Iran, Syria, Brazil and Pakistan, according to documents and interviews with people involved in the attacks.Exploiting a vulnerability in a popular web hosting software, the informant directed at least one hacker to extract vast amounts of data — from bank records to login information — from the government servers of a number of countries and upload it to a server monitored by the F.B.I., according to court statements.
  • The attacks were coordinated by Hector Xavier Monsegur, who used the Internet alias Sabu and became a prominent hacker within Anonymous for a string of attacks on high-profile targets, including PayPal and MasterCard. By early 2012, Mr. Monsegur of New York had been arrested by the F.B.I. and had already spent months working to help the bureau identify other members of Anonymous, according to previously disclosed court papers.One of them was Jeremy Hammond, then 27, who, like Mr. Monsegur, had joined a splinter hacking group from Anonymous called Antisec. The two men had worked together in December 2011 to sabotage the computer servers of Stratfor Global Intelligence, a private intelligence firm based in Austin, Tex.
  • Shortly after the Stratfor incident, Mr. Monsegur, 30, began supplying Mr. Hammond with lists of foreign websites that might be vulnerable to sabotage, according to Mr. Hammond, in an interview, and chat logs between the two men. The New York Times petitioned the court last year to have those documents unredacted, and they were submitted to the court last week with some of the redactions removed.Continue reading the main story “After Stratfor, it was pretty much out of control in terms of targets we had access to,” Mr. Hammond said during an interview this month at a federal prison in Kentucky, where he is serving a 10-year sentence after pleading guilty to the Stratfor operation and other computer attacks inside the United States. He has not been charged with any crimes in connection with the hacks against foreign countries.
  • ...2 more annotations...
  • according to an uncensored version of a court statement by Mr. Hammond, leaked online the day of his sentencing in November, the target list was extensive and included more than 2,000 Internet domains. The document said Mr. Monsegur had directed Mr. Hammond to hack government websites in Iran, Nigeria, Pakistan, Turkey and Brazil and other government sites, like those of the Polish Embassy in Britain and the Ministry of Electricity in Iraq.
  • The hacking campaign appears to offer further evidence that the American government has exploited major flaws in Internet security — so-called zero-day vulnerabilities like the recent Heartbleed bug — for intelligence purposes. Recently, the Obama administration decided it would be more forthcoming in revealing the flaws to industry, rather than stockpiling them until the day they are useful for surveillance or cyberattacks. But it carved a broad exception for national security and law enforcement operations.
  •  
    Has no one in government ever heard of the concept of leadership by example? Or the Golden Rule?
1 - 3 of 3
Showing 20 items per page