31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Now it was clear: Sabu, Topiary, Kayla, Tflow, and Pwnsauce, five <strong>of</strong> <strong>the</strong> six core members <strong>of</strong> LulzSec (it is not known what happened to<br />

AVunit) had been arrested. It seemed almost impossible to become a hero in Anonymous and avoid handcuffs. But did that spell <strong>the</strong> end <strong>of</strong><br />

Anonymous? Jake’s final tweet as Topiary had been “You cannot arrest an idea,” and it rang true. In Anonymous, <strong>the</strong>re were no real leaders<br />

but symbols and smaller groups who occasionally worked toge<strong>the</strong>r. There were even different cultures: <strong>the</strong> old-school EFnet <strong>hacker</strong>s like<br />

Sabu who had embraced <strong>the</strong> vision <strong>of</strong> Antisec, <strong>the</strong> 4chan users like William who loved Anon because it helped him “waste a night.” And<br />

<strong>the</strong>re were those who fell somewhere in between, like Topiary, Kayla, and Tflow, who saw Anonymous as a broad means to find fulfillment,<br />

have new experiences, and make a difference in <strong>the</strong> <strong>world</strong> in a way that suited <strong>the</strong>ir enjoyment <strong>of</strong> computers and <strong>the</strong> Internet. Tying<br />

Anonymous all toge<strong>the</strong>r and destroying it was impossible.<br />

This was a phenomenon that came from <strong>the</strong> nascent <strong>world</strong> <strong>of</strong> memes, crowd sourcing, and social networks, things that had a viral-like<br />

quality that could not be predicted, controlled, or stopped. As some members were arrested, o<strong>the</strong>rs joined. The FBI said that <strong>the</strong>y were<br />

“chopping <strong>of</strong>f <strong>the</strong> head <strong>of</strong> LulzSec,” but by March <strong>of</strong> 2012, after LulzSec had been disbanded for more than nine months, o<strong>the</strong>r <strong>hacker</strong> cells<br />

were taking up <strong>the</strong> Antisec cause; in February <strong>of</strong> 2012 alone, supporters <strong>of</strong> Anonymous had taken credit for attacking <strong>the</strong> websites <strong>of</strong> <strong>the</strong><br />

CIA, Interpol, Citigroup, and a string <strong>of</strong> banks in Brazil, among o<strong>the</strong>r targets.<br />

Then <strong>the</strong>re was <strong>the</strong> growing international movement called “Occupy,” which emerged in September 2011 and saw tens <strong>of</strong> thousands take<br />

to <strong>the</strong> streets in major capitals to protest social and economic inequality, <strong>of</strong>ten using <strong>the</strong> slogan “<strong>We</strong> <strong>are</strong> <strong>the</strong> 99%.” Activist-style supporters <strong>of</strong><br />

Anonymous largely showed <strong>the</strong>ir support for Occupy, promoting it on Twitter and blogs and wearing <strong>the</strong> V for Vendetta masks at protests.<br />

Police had arrested more than 6,800 people in connection with <strong>the</strong> Occupy movement as <strong>of</strong> April 2012, by which time it had gone into<br />

hiatus. But as observers marveled at how this app<strong>are</strong>ntly leaderless global crowd could organize itself so extensively online and in physical<br />

demonstrations, <strong>the</strong>y only had to look at Anonymous to see it had already been done before.<br />

For <strong>the</strong> FBI, getting Sabu as an informant had been a coup, but chasing <strong>the</strong> day-to-day glut <strong>of</strong> bragging, secret discussions, conspiracies,<br />

and threats probably soon turned into a bureaucratic nightm<strong>are</strong>. Although <strong>the</strong>y had Sabu working for <strong>the</strong>m for eight months, it is not clear<br />

how instrumental he was in initially identifying any <strong>of</strong> <strong>the</strong> five <strong>hacker</strong>s that were charged on March 6—at most, he may have helped drum up<br />

charges.<br />

Sabu was outed, but Anonymous seemed to refuse to be destroyed. Later that evening on March 6, a group <strong>of</strong> <strong>hacker</strong>s announced that<br />

Anonymous had hacked into and defaced <strong>the</strong> website <strong>of</strong> Panda Securities, <strong>the</strong> same IT company that had observed <strong>the</strong> Anonymous DDoS<br />

attacks on PayPal in December <strong>of</strong> 2010. Their message: it isn’t over.<br />

Then, over <strong>the</strong> subsequent days, <strong>the</strong> <strong>hacker</strong>s who had worked with Sabu brainstormed about new ways to work toge<strong>the</strong>r.<br />

“Sabu’s shit makes things different now,” said one. “<strong>We</strong> mistrust a lot more.” By mid-March <strong>the</strong> <strong>hacker</strong>s were discussing o<strong>the</strong>r methods <strong>of</strong><br />

talking to one o<strong>the</strong>r besides IRC and how <strong>the</strong>y could raise standards for new people to join private discussions. Anonymous as an activist<br />

movement would stay public, but <strong>the</strong> hacking activities would go far<strong>the</strong>r underground. Anonymous had emerged from <strong>the</strong> shadows, <strong>the</strong><br />

<strong>hacker</strong> added, and it would go back into <strong>the</strong> dark for a while. “But don’t worry. <strong>We</strong> exist.”<br />

Anonymous had already been changing. The s<strong>of</strong>tw<strong>are</strong> tools its supporters used, for instance, were becoming easier to disseminate. When<br />

members <strong>of</strong> Anonymous launched DDoS attacks on several companies in January <strong>of</strong> 2012 to protest <strong>the</strong> shutdown <strong>of</strong> Megaupload, a videostreaming<br />

site, <strong>the</strong>y didn’t use <strong>the</strong> traditional LOIC program. There was no need to download anything. By <strong>the</strong>n, supporters could launch<br />

LOIC directly from a web browser. That meant that by posting a link on Twitter or Facebook, organizers tricked hundreds, perhaps<br />

thousands, <strong>of</strong> oblivious web surfers into joining <strong>the</strong> attack. The attack method, dubbed mobile LOIC by digital security company Imperva,<br />

was used as early as August <strong>of</strong> 2011 in <strong>the</strong> first <strong>of</strong> several DDoS attacks against <strong>the</strong> Vatican and became more popular over <strong>the</strong> following<br />

months.<br />

By early 2012, Anonymous attacks were no longer carried out by thousands <strong>of</strong> volunteers, as with <strong>the</strong> Payback attacks for WikiLeaks. Just<br />

like Chanology’s real-<strong>world</strong> protests, <strong>the</strong>y were a one-<strong>of</strong>f, as if Anonymous was learning what worked and what didn’t. Anonymous was<br />

shifting from mass ga<strong>the</strong>rings and DDoS attacks to small groups stealing data, like LulzSec. For this, more were using <strong>the</strong> web tool Havij.<br />

After LulzSec used it to collate data during <strong>the</strong> PBS heist, a splinter group called CabinCr3w used Havij (or something like it) to expose <strong>the</strong><br />

personal data <strong>of</strong> five hundred police <strong>of</strong>ficers in Utah, while o<strong>the</strong>r Anons used Havij to try to steal data from <strong>the</strong> Vatican in August 2011.<br />

Imperva’s studies showed that only a year after its creation by what <strong>are</strong> believed to be Iranian programmers, Havij had become, by <strong>the</strong><br />

summer <strong>of</strong> 2012, one <strong>of</strong> <strong>the</strong> most popular tools for SQL injection attacks. The program was so simple that one Imperva executive taught his<br />

eleven-year-old how to use it in fifteen minutes. The free-to-download tool performed SQLi automatically, even filtering data into helpful<br />

categories like “Passwords” and “Credit card numbers.” With <strong>the</strong> right free programs and just a few clicks, it seemed almost anyone could be<br />

a <strong>hacker</strong>.<br />

Of course, keeping <strong>the</strong> idea <strong>of</strong> Anonymous alive would be complicated. The media, police, and even <strong>the</strong> <strong>hacker</strong>s <strong>the</strong>mselves had <strong>the</strong>ir own<br />

concepts <strong>of</strong> what it really was: an idea, a movement, a criminal organization, and o<strong>the</strong>r things besides. By March <strong>of</strong> 2012, <strong>the</strong> public and<br />

parts <strong>of</strong> <strong>the</strong> media still seemed to think that Anonymous was a very large group that made plans and carried <strong>the</strong>m out in an orderly way.<br />

Though <strong>the</strong> notion was deeply misguided, it was understandable. A newfangled phenomenon like Anonymous, born <strong>of</strong> <strong>the</strong> Internet itself,<br />

was something society would struggle to make sense <strong>of</strong> at first. On top <strong>of</strong> that, <strong>the</strong> mystery surrounding what really happened <strong>inside</strong> <strong>the</strong> hivemind<br />

had left just enough room for <strong>the</strong> public to create its own versions <strong>of</strong> <strong>the</strong> Anonymous narrative, just as when Topiary had spun a vague<br />

tale about getting raided when he wanted to leave AnonOps. Anonymous wasn’t just a group or a process; it was also a story that people<br />

were telling <strong>the</strong>mselves about how <strong>the</strong> Internet was fighting back. Anons could grab headlines by simply tweeting a threat, which is why <strong>the</strong><br />

power <strong>of</strong> Anonymous spoke to <strong>the</strong> power <strong>of</strong> myth. Anonymous was ano<strong>the</strong>r example <strong>of</strong> social engineering, on a mass scale. It was not too<br />

dissimilar from Kayla herself.<br />

Over <strong>the</strong> past few years, <strong>the</strong> online entity Kayla had been telling her friends different stories about who she was in real life, tempting <strong>the</strong>m<br />

to try to piece toge<strong>the</strong>r a puzzle <strong>of</strong> her real identity. A teenage girl who hated her fa<strong>the</strong>r; a teenage girl who loved him. In <strong>the</strong> end, though, her<br />

<strong>hacker</strong> colleagues stopped being interested in <strong>the</strong> truth.<br />

“<strong>We</strong> told her we’d prefer her to lie to us,” one longtime friend remembered. “<strong>We</strong> all loved <strong>the</strong> story. I don’t think we c<strong>are</strong>d if it was true or<br />

not.” Like children wanting to keep <strong>the</strong> magic <strong>of</strong> Santa Claus alive a little longer after starting to doubt his existence, to her <strong>hacker</strong> friends,<br />

Kayla’s story had become more important than <strong>the</strong> truth itself.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!