Cryptome – Anonymous Battles Media Gorgons

Anonymous Battles Media Gorgons, May 26, 2012

By John Young “Cryptome” (New York, NY)

This review is from: We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)

We Are Anonymous portrays the battle unfolding for control of the Internet era as insurgent skills and techniques for cyber and real world challenges are invented, shared and applied in a struggle with armies of governments, commerce and institutions accustomed to collusive domination.

Parmy Olson’s highly informative account based on extensive interviews, IRC chats, emails of celebrated nics of Anonymous, LulzSec and other subversive inititatives demonstrates that these well-publicized skirmishes are only a small part of a much greater conflict underway between agile, swarming, anarchic, proficient dissidents and heirarchical, sclerotic, bloated and inept authorities worldwide.

This is a amply resourced book to learn about a rapidly spreading under-culture undermining the over-culture, to enjoy its Encyclopedia Dramatica humor, to be infected by its gutsy courage, for appreciating its generous, bountiful, defiant lulz.

Above all, though, this rollicking narrative of misbehavior and disobedience can inspire opposition to the pretentious, ponderous, manipulative ideology of using the Internet to enforce knowledge consumption manufactured by gov, com, edu and org.

This volume shows that the prime force working both sides of the contest is opportunistic multi-headed media gorgon of journalism, film, documentaries, scholarship and personal data aggregating — social engineering, egging on, flattering, seducing, lying, betraying, cheating, double-crossing, promising fame, notoriety and gratification — deploying the traditional means and methods of uniquely privileged spies operating outside the rules of engagement, claiming the high ground above the battleground from their own protected overlook to broadcast beguiling events as they fabricate and churn opinion, news and knowledge.

Succumb to the allure of publicity gorgons and be packaged for sale to your enemies.

The gorgons are legion. Expect them to promote suspicion. This should make U mad.

__________

Apropos:

From a New York Times review of Buzz Bissinger’s latest book:

In a line that’s as slashing as anything in Janet Malcolm’s book “The Journalist and the Murderer,” he says: “All writers silently soak up despair for our own advantage; like dogs rolling in the guts of dead animals, the stink of others makes us giddy. We deny it but we lie in denying it.”

http://en.wikipedia.org/wiki/The_Journalist_and_the_Murderer

The Journalist and the Murderer is an examination of the professional choices that shape a work of non-fiction, as well as a rumination on the morality that underpins the journalistic enterprise. The journalist in question is the author Joe McGinniss; the murderer is the former Special Forces Captain Jeffery MacDonald, who became the subject of McGinniss’ 1983 book Fatal Vision.

When Malcolm’s work first appeared in March 1989, as a two-part serialization in The New Yorker magazine, it caused a sensation, becoming the occasion for wide-ranging debate within the news industry.

Malcolm’s thesis, and the most widely quoted passage from The Journalist and the Murderer, is presented in the book’s opening paragraph: “Every journalist who is not too stupid or too full of himself to notice what is going on knows that what he does is morally indefensible.” She continues:

He is a kind of confidence man, preying on people’s vanity, ignorance or loneliness, gaining their trust and betraying them without remorse. Like the credulous widow who wakes up one day to find the charming young man and all her savings gone, so the consenting subject of a piece of nonfiction learns—when the article or book appears—his hard lesson. Journalists justify their treachery in various ways according to their temperaments. The more pompous talk about freedom of speech and “the public’s right to know”; the least talented talk about Art; the seemliest murmur about earning a living.”Anonymous Battles Media Gorgons, May 26, 2012

By John Young “Cryptome” (New York, NY)

This review is from: We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency (Hardcover)

We Are Anonymous portrays the battle unfolding for control of the Internet era as insurgent skills and techniques for cyber and real world challenges are invented, shared and applied in a struggle with armies of governments, commerce and institutions accustomed to collusive domination.

Parmy Olson’s highly informative account based on extensive interviews, IRC chats, emails of celebrated nics of Anonymous, LulzSec and other subversive inititatives demonstrates that these well-publicized skirmishes are only a small part of a much greater conflict underway between agile, swarming, anarchic, proficient dissidents and heirarchical, sclerotic, bloated and inept authorities worldwide.

This is a amply resourced book to learn about a rapidly spreading under-culture undermining the over-culture, to enjoy its Encyclopedia Dramatica humor, to be infected by its gutsy courage, for appreciating its generous, bountiful, defiant lulz.

Above all, though, this rollicking narrative of misbehavior and disobedience can inspire opposition to the pretentious, ponderous, manipulative ideology of using the Internet to enforce knowledge consumption manufactured by gov, com, edu and org.

This volume shows that the prime force working both sides of the contest is opportunistic multi-headed media gorgon of journalism, film, documentaries, scholarship and personal data aggregating — social engineering, egging on, flattering, seducing, lying, betraying, cheating, double-crossing, promising fame, notoriety and gratification — deploying the traditional means and methods of uniquely privileged spies operating outside the rules of engagement, claiming the high ground above the battleground from their own protected overlook to broadcast beguiling events as they fabricate and churn opinion, news and knowledge.

Succumb to the allure of publicity gorgons and be packaged for sale to your enemies.

The gorgons are legion. Expect them to promote suspicion. This should make U mad.

__________

Apropos:

From a New York Times review of Buzz Bissinger’s latest book:

In a line that’s as slashing as anything in Janet Malcolm’s book “The Journalist and the Murderer,” he says: “All writers silently soak up despair for our own advantage; like dogs rolling in the guts of dead animals, the stink of others makes us giddy. We deny it but we lie in denying it.”

http://en.wikipedia.org/wiki/The_Journalist_and_the_Murderer

The Journalist and the Murderer is an examination of the professional choices that shape a work of non-fiction, as well as a rumination on the morality that underpins the journalistic enterprise. The journalist in question is the author Joe McGinniss; the murderer is the former Special Forces Captain Jeffery MacDonald, who became the subject of McGinniss’ 1983 book Fatal Vision.

When Malcolm’s work first appeared in March 1989, as a two-part serialization in The New Yorker magazine, it caused a sensation, becoming the occasion for wide-ranging debate within the news industry.

Malcolm’s thesis, and the most widely quoted passage from The Journalist and the Murderer, is presented in the book’s opening paragraph: “Every journalist who is not too stupid or too full of himself to notice what is going on knows that what he does is morally indefensible.” She continues:

He is a kind of confidence man, preying on people’s vanity, ignorance or loneliness, gaining their trust and betraying them without remorse. Like the credulous widow who wakes up one day to find the charming young man and all her savings gone, so the consenting subject of a piece of nonfiction learns—when the article or book appears—his hard lesson. Journalists justify their treachery in various ways according to their temperaments. The more pompous talk about freedom of speech and “the public’s right to know”; the least talented talk about Art; the seemliest murmur about earning a living.”

 

Cryptome – STRATFOR Hacked Update 7

Anonymous allegedly releases “5 million” (not substantiated) Stratfor emails through WikiLeaks:

http://wikileaks.org/the-gifiles.html

John Young @Cryptomeorg

@AnonymousIRC @wikileaks Great show! Will the full raw emails be released as promised by Anonymous to legitimate media-ized spoon-feeding?

 


Summary of releases of STRATFOR documents, subscribers’ firm names and personal information (including addresses, telephone numbers, credit card numbers and passwords), latest release at top:

STRATFOR Hacked Update 6

30 December 2011. A writes that five Pastebin posts of recovered STRATFOR passwords have been removed as indicated below. In addition, four files from sources have been removed from Rapid Share (1) and Wikisend (3).

29 December 2011.

Lulzxmas Dumps 860,000 STRATFOR Accounts:

http://pastebin.com/f7jYf5Wdhttp://www.megaupload.com/?d=O5P03RXK

28 December 2011.

Prepping for the Stratfor 5M Email Release

http://pastebin.com/Qsqpsr6thttp://piratenpad.de/Stratfor

27 December 2011.

http://pastebin.com/78MUAaeZ [Now removed]

These are 28517 of 53281 (54%) passwords from the list of STRATFOR customer accounts cracked.Part 1/3: http://pastebin.com/CdD92fJG [Now removed]

Part 2/3: http://pastebin.com/AcwQgHmF [Now removed]

Part 3/3: http://pastebin.com/78MUAaeZ [Now removed]

26 December 2011. Firms and personal first names beginning with “D” through “My” (~ 30,000).

http://pastebin.com/q5kXd7Fdhttps://rapidshare.com/#!download|44tl6|2444489251|STRATFOR_full_d_m.txt.gz|3255|
R~7B8842ED6343CEAE67A23C094E131679|0|0
[Now removed]

And 25,000 IT work tickets:

http://www.verzend.be/s8v8ccig12hp/it.tar.gz.html

26 December 2011. Sample Stratfor.com email:

http://pastebin.com/HmDs0EM4“just a small preview of the mayhem to come. 1 out of 2.7 million”

26 December 2011. STRATFOR leaked accounts (10257 passwords recovered)

http://pastebin.com/CdD92fJG [Now removed]

25 December 2011. Firms and personal miscellaneous names not in alphabetical order (~13,000):

http://pastebin.com/8v3768Bw[Now removed]http://wikisend.com/download/132838/stratfor_full_misc.txt.gz [Now removed]

25 December 2011. Firms and personal first names beginning with “B-By” through “C-Cz” (~4,000) :

http://pastebin.com/bUqkb9mqhttp://wikisend.com/download/597646/stratfor_full_b.txt.gz [Now removed]

25 December 2011. Firms and personal first names beginning with “A” through “Az” (~ 4,000).

http://pastebin.com/bQ2YHDdwhttp://wikisend.com/download/601776/stratfor_full_a.txt.gz [Now removed]

 


25 December 2011. A message allegedly to subscribers from George Friedman, Stratfor, was posted to Facebook and Pastebin (below).

25 December 2011. A paste today denying Anonymous role:

http://pastebin.com/8yrwyNkt

And, Stratfor’s A client list of passwords:

http://pastebin.com/5H33nPEK

 


24 December 2011

STRATFOR Hacked

Related:

http://pastebin.com/8MtFze0shttp://pastebin.com/CAWDEW8G

 


A sends:

Subject: Important Announcement from STRATFOR
Date: Sat, 24 Dec 2011 19:49:58 -0500
From: STRATFOR <mail[at]response.stratfor.com>

Dear Stratfor Member,

We have learned that Stratfor’s web site was hacked by an unauthorized party. As a result of this incident the operation of Stratfor’s servers and email have been suspended.

We have reason to believe that the names of our corporate subscribers have been posed [sic] on other web sites. We are diligently investigating the extent to which subscriber information may have been obtained.

Stratfor and I take this incident very seriously. Stratfor’s relationship with its members and, in particular, the confidentiality of their subscriber information, are very important to Stratfor and me. We are working closely with law enforcement in their investigation and will assist them with the identification of the individual(s) who are responsible.

Although we are still learning more and the law enforcement investigation is active and ongoing, we wanted to provide you with notice of this incident as quickly as possible. We will keep you updated regarding these matters.

Sincerely,

George Friedman

STRATFOR
221 W. 6th Street, Suite 400
Austin, TX 78701 US
www.stratfor.com

 


http://www.facebook.com/stratfor

http://pastebin.com/6a86QSMM

Dec 25th, 2011

On December 24th an unauthorized party disclosed personally identifiable information and related credit card data of some of our members. We have reason to believe that your personal and credit card data could have been included in the information that was illegally obtained and disclosed.

Also publicly released was a list of our members which the unauthorized party claimed to be Stratfor’s “private clients.” Contrary to this assertion the disclosure was merely a list of some of the members that have purchased our publications and does not comprise a list of individuals or entities that have a relationship with Stratfor beyond their purchase of our subscription-based publications.

We have also retained the services of a leading identity theft protection and monitoring service on behalf of the Stratfor members that have been impacted by these events. Details regarding the services to be provided will be forwarded in a subsequent email that is to be delivered to the impacted members no later than Wednesday, December 28th.

In the interim, precautions that can be taken by you to minimize and prevent the misuse of information which may have been disclosed include the following:

– contact your financial institution and inform them of this incident;

– if you see any unauthorized activity on your accounts promptly notify your financial institution;

– submit a complaint with the Federal Trade Commission (“FTC”) by calling 1-877-ID-THEFT (1-877- 438-4338) or online at https://www.ftccomplaintassistant.gov/; and

– contact the three U.S. credit reporting agencies: Equifax (http://www.equifax.com/ or (800) 685-1111), Experian (http://www.experian.com/ or (888) 397-3742), and TransUnion (http://www.transunion.com/ or (800) 888-4213), to obtain a free credit report from each.

Even if you do not find any suspicious activity on your initial credit reports, the FTC recommends that you check your credit reports periodically. Checking your credit reports can help you spot problems and address them quickly.

To ease any concerns you may have about your personal information going forward, we have also retained an experienced outside consultant that specializes in such security matters to bolster our existing efforts on these issues as we work to better serve you. We are on top of the situation and will continue to be vigilant in our implementation of the latest, and most comprehensive, data security measures.

We are also working to restore access to our website and continuing to work closely with law enforcement regarding these matters. We will continue to update you regarding the status of these matters.

Again, my sincerest apologies for this unfortunate incident.

Sincerely,

George Friedman

Video -The leaked FBI conversation hacked by Anonymous

Comment by supporters:

ANONYMOUS Intercept FBI & Scotland Yard Conference Call #FFF

Hacking network Anonymous has released a recording of a conference call between the FBI and UK police in which they discuss efforts against hacking.

The conversation covers the tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police.

Anonymous also published an email, apparently from the FBI, showing the email addresses of call participants.

The FBI confirmed the intercept and said it was hunting those responsible.

“The information was intended for law enforcement officers only and was illegally obtained. A criminal investigation is under way to identify and hold accountable those responsible,” it said in a statement.

British police at Scotland Yard said they were working on a statement.

A comment on one of the Twitter accounts linked to Anonymous, AnonymousIRC, said: “The FBI might be curious how we’re able to continuously read their internal comms for some time now.”

Correspondents say the release of the phone call and email addresses will be highly embarrassing for the authorities.

Listen along, and laugh out loud at the law enforcement agents bumbling away.
Pastebin :http://pastebin.com/8G4jLha8
Download mp3 – http://mir.cr/1SL3XXIR
Defacement:
http://zone-h.org/mirror/id/16859089
The Inquirer
http://www.theinquirer.net/inquirer/news/2143768/anonymous-releases-fbi-uk-co
Naked Security
http://nakedsecurity.sophos.com/2012/02/03/anonymous-fbi-pceu-hacking-confere

 

 

 

Media – Anonymous publishes FBI call on hacking

Internet activist group Anonymous published a recording on Friday of a confidential call between FBI agents and London detectives in which the law-enforcement agents discuss action they are taking against hacking.

British police said they were investigating reports of the illegally recorded call, and the FBI said a criminal investigation was under way into the incident.

Anonymous also published an email inviting participants to the call, with dial-in details, in which an FBI agent wrote that investigations relating to Anonymous, LulzSec, Antisec and associated splinter groups would be discussed on the call. (pastebin.com/8G4jLha8)

Anonymous and fellow group LulzSec have carried out a number of high-profile hacking actions against companies and institutions across the globe including the Central Intelligence Agency, Britain’s Serious Organized Crime Agency, Japan’s Sony Corp and Mexican government websites.

On the 16-minute-long call, one British detective is heard discussing an alleged 15-year-old hacker who they described as “a bit of an idiot” who was doing it for attention. (here)

He also tells his U.S. counterpart hosting the call that “we cocked things up in the past” when he is thanked for the help they are providing.

In other fairly unremarkable exchanges, they also discuss at length the merits of the northern English town of Sheffield where a cyber security conference was to be held.

Britons Ryan Cleary and Jake Davis, who have both been charged with hacking-related offences, are discussed on the call. The names of other alleged hackers are bleeped out.

Peter Donald, a spokesman for the FBI in New York, said on Friday: “The information obtained on the call was intended for law enforcement only. It was illegally obtained and a FBI criminal investigation is under way.”

An FBI official said the FBI’s systems were not hacked into, and the discussion did not include classified material.

The official said the conference call dial-in details were sent in an email to officials and someone forwarded it to a private, non-government email account which was compromised at some point.

London’s Metropolitan Police (MPS) said in a statement: “We are aware of the video, which relates to an FBI conference call involving a PCeU (Police Central e-crime Unit) representative.”

“The matter is being investigated by the FBI. At this stage no operational risks to the MPS have been identified; however, we continue to carry out a full assessment,” the MPS said.

An official involved in coordinating international efforts to crack down on cyber crime said that law enforcement agencies sometimes do not carefully authenticate the identity of people who dial in to participate on conference calls.

The email released by the hackers that appears to be the one the FBI sent out to organize the teleconference asked all participants to use a single code to gain entry to the call.

That official, who declined to be identified by name because he was not authorized to publicly comment on the matter, said that the call would have been more secure if attendees had each been assigned unique access codes and been required to identify themselves by name upon dialing in.

If a hacker had dialed in using somebody’s unique access code and somehow made it past initial screening, the organizers may have possibly identified a breach when it became clear that two parties were using the same dial-in credentials, said the official.

Revealed – Anonymous Hacks Public Intelligence in “Friendly Audit”

https://i2.wp.com/publicintelligence.net/wp-content/uploads/2012/01/publicint-1024x612.png

On January 16, 2012 an unauthorized party associated with the hacktivist collective Anonymous gained access to this site’s web server. The attacker gained root access and posted a number of versions of a photo of a naked man. These images were used to deface the front of the site in multiple locations and contained the message “WAS HERE WITH 0DAY, ONLY SHIT I FOUND BAD WAS U LOGGING IN FROM A DSL CONNECTION… THEN AGAIN U BOUGHT THIS SERVER WITH UR PERSONAL CARD SO U CAN BE DOX’D… LEFT U THESE COX AS A FRIENDLY REMINDER THAT YOUR BOX CAN BE PWNED AT ALL TIMES…” The attackers then manipulated configuration files for the server which caused an error message to appear to visitors of the site. This state persisted for approximately eight hours blocking access to the site before it was later fixed by the attacker, who left a longer explanation for the hack in the server’s root directory.

Though the hackers were fairly polite and we do not believe that there is any current threat to our users, we have disabled our submissions form and will not be accepting new information at the moment. We have also disabled some of the user features on the site, which were more a remnant of a previous phase of this site’s operation and served little practical value. If you, at any point, have had an account on this site with a password that is also used elsewhere, you should change it. The hackers claim that they did not look into our database to retrieve this information. However, you would be wise to protect against that possibility.

We feel that this action by Anonymous was misguided. While we understand their desire to demonstrate their ability to “penetrate” anything, their defacement of this platform was unnecessary. This site has functioned for several years now as a vital source of information that is concealed and restricted from the general public. Large amounts of people in all walks of life utilize its resources. At the time of the defacement, this site was serving several files as source material for articles in publications around the world, including information on the automated scanning of license plates and other forms of public surveillance in Germany, the Department of Defense’s Non-Lethal Weapons Reference Book which received a large amount of coverage in Russia and Eastern Europe after it was reported on by the BBC, and a particularly frank Marine Corps handbook that describes the CIA’s history of funding the Mujahideen via the Pakistani ISI. Because of the defacement, many people visiting the site were then confronted with pictures of naked men which may have dissuaded them from accessing the extremely important information contained in these documents.

We’ve never professed to be extremely adept technologically, nor have we ever claimed to be creating a massively secure system for the submission of high-profile leaks. In fact, we hate “leaks” in general and we try to avoid using the word as much as possible. Leaking implies an accident, like something that escaped through a crack or water passing through a sieve. How can you leak something that should never have been secret in the first place? We are simply average, humble people who are trying to inform ourselves and others about the world in which we live. Nearly every piece of information on this site is something that was obtained from a publicly-accessible source using means available to any member of the public. We have published this material using open-source software in an attempt to inform others and demonstrate the potential for public action in the sphere of intelligence and media.

And so, if we are to create anything lasting, we must work together towards a society where everyone can express themselves freely and share information openly. We must not attack one another, for this only undermines the legitimacy of our cause. If we are to live in a world where knowledge truly is free, we must act with the gravity that this freedom demands. Anarchy is not chaos, it is self-governance.

A message left by the hacker:

sorry for this but we consider u friendly so i just left a message and
wiped /var/log

there was nothing u could do against this breach, this was just to
remind you that we can breach anything and so can the enemy :)

be careful what u do, improve ur OPSEC

maybe buy the server/hosting with a temp card and access is via Tor

try and remove links from ur personal life from this service :)

keep up the good work and hope u enjoy the cox :D

cheers

#antisec

PS: i didnt steal any of ur credentials neither i even look into the mysql
db, i  dont know any of ur passwords though u should change them of course.
this was a direct root via a 0day we have :) it was not ur fault... i just
thought that i should leave u this message apart from the cox so u get a feel
what penetration looks like... our enemies dont leave messages ;)