Anonymous Hackers Target Alleged WikiLeaker Bradley Manning's Jailers
Anonymous Hackers Target Alleged WikiLeaker Bradley Manning's Jailers
http://blogs.forbes.com/andygreenber...nings-jailers/
Quote:
Anonymous hackers name Department of Defense Press Secretary Geoff Morell and chief warrant officer Denise Barnes as targets and call on members to dig up personal information on both, including phone numbers, personal histories and home addresses. The goal of the operation, for now, is to “dox” the two officials, the typical Anonymous method of publishing personal information of victims and using it for mass harassment.
. . . doxing will likely include “ruin life tactics” such as “ordering them pizza, sending them thousands of boxes, reporting them to police for drug abuse, sex offenders list, tricking their ISPs into canceling the Internet, messing with their social security numbers, false flag, fax harassment, phone harassment, email bombing, subscriptions to magazines, diapers, tampons.”
Can DOD Information Assurance and Computer Network Defenders protect Morrell and Barnes, or will they be pwned?
If Anonymous is considered a virtual militia, is this a Paramilitary Information Opposition Operation?
Which Law Enforcement Agencies and What Actions?
Quote:
Originally Posted by
SteveMetz
But if this group does attack people as a result of their performance of official duties, it would seem that law enforcement would have a grounds to take a range of actions against them.
NCIS could sic McGee on 'em. The real NCIS will probably have some involvement. State of Virginia might take some interest. But most of this probably won't rise to the level of felonies so what actions might law enforcement bother to take?
Hacker group vows 'cyberwar' on US government, business
http://www.msnbc.msn.com/id/41972190...ence-security/
Quote:
“It’s a guerrilla cyberwar — that’s what I call it,” said Barrett Brown, 29, who calls himself a senior strategist and “propagandist” for Anonymous. He added: “It’s sort of an unconventional, asymmetrical act of warfare that we’ve involved in. And we didn’t necessarily start it. I mean, this fire has been burning.”
Quote:
“Our people break laws, just like all people break laws,” he added. “When we break laws, we do it in the service of civil disobedience. We do so ethically. We do it against targets that have asked for it.”
Quote:
Asked about the group’s capabilities, he said, “Well, they keep increasing, but I can tell you that our capabilities are such that, we can, for instance, go into the servers of a federal contracting company … take those servers down, delete backups, take all internal emails, take documents, shut down the websites of the owners of those companies, take everything from those websites, ruin the lives of people who have done it wrong … harass them, make sure they’ll never work again in this particular industry.
“We can expose people. We can go to the media with things, we can give them scoops. We can give them information about companies and their wrongdoing. We can organize protests —anywhere across the globe. We can get the attention of the national conversation if we need to.”
Brown is employing PSYOP and Morale Operations while claiming to be a propagandist and strategist of a group of Irregular Computer Network Attackers, seemingly confident that lawfare will protect him from any .gov attempts to prosecute him.
Hackers group says it will target Iran...
... on Sunday
Another monkey knife-fight.
Quote:
(CNN) -- The Internet hackers group Anonymous plans to hack Iran on Sunday, according to a press release published on their website. The group wants to use International Workers' Day, which commemorates the first national general strike in the United States, as an opportunity to reignite last year's protests in Iran.
Exactly how they intend to "attack" Iran remains to be seen. The sophistication of their previous attacks ranges from the denial-of-service overloading of web servers (this simply knocks a website out) to the exploitation of code and accessing of private data (more like the hacking seen in the movies).
http://www.cnn.com/2011/WORLD/meast/...ex.html?hpt=T2