Fr0m Th3 Cyb3r Battle L1nes: Who Should Lead the Charge?
Quote:
IPT News
January 14, 2010
In the ever-changing conflict between the West and Islamist radicals, one front – the Internet – has emerged as a major battlefield. And, while in many areas of this frontier the Islamists strut about unchecked, one man, code-name th3j35t3r ("The Jester"), has made it his point to strike back with (cyber) force. As first reported by the security blog ThreatChaos, "The Jester" made a different kind of New Year's resolution than most: to wage war on jihadist and pro-Islamist websites and forums by systematically disrupting their servers via denial-of-service (DoS) attacks.
Also unlike most, he has made good on his promise thus far – and there is no sign that he will let up.
. . . Wherever one may stand on the issue of cyber-vigilantism – independent citizens taking matters into their own hands without the requisite knowledge of ongoing investigations utilizing that open-source data – it is clear that matters are shaping up just as Dorothy Denning predicted in an August 2008 article in Scientific American: "Soon, every interstate conflict, however minor, may be accompanied by some form of hacker war that is beyond the control of ruling governments."
Read more at:
http://www.investigativeproject.org/...ho-should-lead
Is The Jester a Virtual Militia of One, or is he the Public Affairs/Psychological Operations face of a much larger Information Operation?
The Jester Counters Anonymous Propaganda
http://th3j35t3r.wordpress.com/2011/...medium=twitter
Before he came to Anonymous' attention he mostly applied Restrictive Measures to jihadi propaganda sites.
In the chatroom with the cyber guerrillas
http://www.reuters.com/assets/print?...70I2DW20110119
Quote:
FIRE YOUR CANNON
All you need to wage cyber war is a fast-paced internet forum packed with hundreds of determined activists and a simple piece of software called a Low Orbit Ion Cannon. Activists download the LOIC -- initially developed to help internet security experts test website vulnerability to DDoS attacks -- and start firing packets of data at the targeted website.
If enough people join in, a DDoS attack prevents the overloaded server from responding to legitimate requests and slows the website to a crawl or shuts it down totally.
Attackers can even listen to a dedicated internet radio station, Radiopayback, during attacks.
A quarter of a million copies of the LOIC software have been downloaded from sourceforge.net so far, more than half of them since November when Web hosting and banking organizations began withdrawing support from WikiLeaks.
LOIC is a volunteer botnet and psychological operation that gives large numbers of unsophisticated wannabe hackers the feeling that they're Information Operators, too.
Meanwhile, an individual or group calling himself or themselves th3j35t3r has been doing Cyber COIN and counterpropaganda.
Estonia to lend cyber-expertise to Belarus exiles
http://www.google.com/hostednews/afp...8fa452bb99.451
Quote:
TALLINN — Estonia said Friday it plans to lend its IT expertise to help exiled Belarussians who have taken to cyber-space to oppose their homeland's President Alexander Lukashenko.
"Estonia is planning IT training for members of the Belarussian opposition, teaching them how to manage their websites and protect them from cyber-attacks," foreign ministry spokeswoman Mariann Sudakov told AFP.
"We have also offered scholarship programmes in Estonian universities for Belarussian students whose have been kicked out of Belarussian universities for political reasons," she added.
Quote:
Pavel Morozau, an anti-Lukashenko campaigner exiled in Estonia since 2006, said the Internet was a crucial tool.
"Activists from the Belarussian community in Estonia have created and managed websites in Estonia and elsewhere to support our friends in the Belarussian opposition and promote democracy in our fatherland," Morozau told AFP.
Virtual Militia Recruiting Poster
http://i.imgur.com/LfLhN.png
Using Civilian Irregular PSYOP to encourage Civilian Irregular CNA, this time against the Mubarak regime.
For discussion purposes only.
Notice the .ru
Anonymous speaks: the inside story of the HBGary hack
http://arstechnica.com/tech-policy/n...ary-hack.ars/3
Anonymous is a virtual militia.
HBGaryFederal is a DOD Contractor.
Information Assurance & Computer Network Attack/Defense cautionary tale.
Hacktivist for good CNA's KaDaffy's official site
Civilian Irregular Information Operator / cybervigilante known as th3j35t3r attacks Libyan dictator's website.
http://a3.twimg.com/profile_images/582808122/jester.jpg
Quote:
www.algathafi.org - TANGO DOWN. Temporarily. For using military force on protesters. Kudos 3 AWOL pilots. #chatta #libya
12 minutes ago via XerXeS Attack Platform V3.17
An Irregular's Denial of Service attack on the personal website of the acknowledged leader of a sovereign Westphalian nation-state combines Computer Network Attack with Psychological Operations and Irregular Warfare.
Would Military Information Support Operations conducted by non-military entities be properly referred to as Paramilitary Information Support Operations?