31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

September <strong>of</strong> 2011 via e-mail and Internet Relay Chat. The rumor about stabbing her webcam with a knife came from an online<br />

interview with Topiary. Also throughout <strong>the</strong> book, details about Topiary come from online, phone, and face-to-face interviews with<br />

him (Jake Davis) between December <strong>of</strong> 2010 and <strong>the</strong> summer <strong>of</strong> 2012. Details about Tflow come from interviews with Topiary and<br />

Tflow himself; <strong>the</strong> information that Tflow had invited Sabu and Topiary into <strong>the</strong> secret IRC channel come from Topiary, one o<strong>the</strong>r<br />

<strong>hacker</strong> who wished to remain <strong>anonymous</strong>, and Sabu himself. Details <strong>of</strong> how <strong>the</strong> <strong>hacker</strong>s planned <strong>the</strong> HBGary attack, including how<br />

<strong>the</strong>y used <strong>the</strong> website HashKiller to crack <strong>the</strong> company’s passwords, came from interviews with Topiary conducted via IRC and<br />

Skype (voice only).<br />

Details <strong>of</strong> Barr’s research on Anonymous, including <strong>the</strong> “hasty notes like ‘Mmxanon—states…ghetto,’” came from his research notes,<br />

which were posted online by <strong>the</strong> <strong>hacker</strong>s.<br />

Dialogue between Barr and <strong>the</strong> <strong>hacker</strong>s, including with CommanderX, comes from chat logs that were published online—partly via <strong>the</strong><br />

<strong>We</strong>b tool Pastebin, and also on <strong>the</strong> Ars Technica article “(Virtually) Face to Face: How Aaron Barr Revealed Himself to<br />

Anonymous,” by Nate Anderson. The dialogue between Barr and Topiary, which ends “Die in a fire. You’re done” comes from a<br />

snippet <strong>of</strong> <strong>the</strong> chat log that was cut and pasted to a Skype conversation between me and Topiary a few days after <strong>the</strong> attack. Fur<strong>the</strong>r<br />

details about <strong>the</strong> attack came from interviews with Jake Davis, as well as online interviews with Sabu, Kayla, and o<strong>the</strong>r <strong>hacker</strong><br />

sources. Details <strong>of</strong> <strong>the</strong> February 2011 Super Bowl come from various news reports and from my viewing <strong>of</strong> <strong>the</strong> actual game while I<br />

was following online developments <strong>of</strong> <strong>the</strong> HBGary Federal attack. Although I had already been interviewing Topiary on a regular<br />

basis, <strong>the</strong> attack led to my being introduced to o<strong>the</strong>rs in <strong>the</strong> group—first Kayla, <strong>the</strong>n Sabu, <strong>the</strong>n Tflow.<br />

SQL reads like a stream <strong>of</strong> formulas. An example is: “Select creditcard from person where name=SMITH.” If someone were to perform<br />

an SQL injection attack, <strong>the</strong>y might inject code saying, “Select a from b where a=SMITH.”<br />

How did <strong>the</strong> <strong>hacker</strong>s know that Barr was CogAnon? Topiary later explained that, almost immediately after seeing <strong>the</strong> Financial Times<br />

story and breaking into <strong>the</strong> HBGary Federal network, one <strong>of</strong> <strong>the</strong>m had seen that his internal e-mail headers listed <strong>the</strong> IP address <strong>of</strong> his<br />

VPN (virtual private network). Barr had used this same VPN connection to log into an Internet Relay Chat network used by<br />

Anonymous, known as AnonOps. The <strong>hacker</strong>s only had to hand over <strong>the</strong> IP address to one <strong>of</strong> <strong>the</strong> chat network operators, who ran a<br />

quick search. Sure enough, <strong>the</strong> name CogAnon popped up.<br />

Chapter 2: William and <strong>the</strong> Roots <strong>of</strong> Anonymous<br />

Details about how Christopher Poole created 4chan come from an interview that Poole gave to <strong>the</strong> New York Times Bits blog. The<br />

article, entitled “One on One: Christopher Poole, Founder <strong>of</strong> 4chan,” was published on March 19, 2010.<br />

I sourced <strong>the</strong> information on Japan’s 2chan from <strong>the</strong> 2004 New York Times article “Japanese Find a Forum to Vent Most-Secret<br />

Feelings” and Wired’s May 2008 story “Meet Hiroyuki Nishimura, <strong>the</strong> Bad Boy <strong>of</strong> <strong>the</strong> Japanese Internet.”<br />

Fur<strong>the</strong>r details about <strong>the</strong> development <strong>of</strong> 4chan, such as its “TWO TIMES THE CHAN” announcement on Something Awful, come<br />

from an article on 4chan history by <strong>We</strong>b developer Jonathan Drain, on jonnydigital.com. Moot’s referral to /b/ as a “retard bin” comes<br />

from an announcement on <strong>the</strong> 4chan “news” page, 4chan.org/news?all, on October 2, 2003.<br />

Though <strong>the</strong> story <strong>of</strong> Shii’s enforcement <strong>of</strong> anonymity on 4chan is relatively well known among image board users, <strong>the</strong> details come<br />

from testimony provided on Shii’s website, shii.org.<br />

Details about <strong>the</strong> life, viewpoints, and exploits <strong>of</strong> <strong>the</strong> young man named in this book as William come from scores <strong>of</strong> e-mails and several<br />

face-to-face meetings, all taking place between February <strong>of</strong> 2011 and <strong>the</strong> summer <strong>of</strong> 2012. After telling me—in a meeting that took<br />

place in July <strong>of</strong> 2011—<strong>the</strong> story <strong>of</strong> hacking “Jen’s” (not her real name) PhotoBucket account, William e-mailed me photos <strong>of</strong> Jen and<br />

“Joshua Dean Scott.” I have <strong>the</strong> images on file. Scott’s photo, for instance, shows him holding a piece <strong>of</strong> paper reading “‘Jen’ owns<br />

my ass 3/2/11.” He wears a black baseball cap, a lip ring, and a black Converse shoe on top <strong>of</strong> his head, along with a slight smile. On<br />

several occasions William e-mailed me screenshots <strong>of</strong> <strong>the</strong> conversations he was having with <strong>the</strong> people he trolled on Facebook, as<br />

well as <strong>the</strong> raid threads he sometimes participated in on /b/, to corroborate his stories. The pranks and online intimidation <strong>of</strong><br />

individuals described in this book <strong>are</strong> only a small fraction <strong>of</strong> <strong>the</strong> many nightly exploits that William alerted me to.<br />

Fur<strong>the</strong>r details about /b/ and 4chan were sourced from <strong>the</strong> meme repositories Encyclopedia Dramatica (now redirecting to<br />

ohinternet.com) and KnowYourMeme.com, as well as interviews with Jake Davis.<br />

Chapter 3: Everybody Get In Here<br />

The vast majority <strong>of</strong> details about Topiary’s early childhood and life on Shetland come from online and face-to-face interviews with<br />

Topiary (Jake Davis) himself, with fur<strong>the</strong>r details and corroboration coming from discussions with his mo<strong>the</strong>r, Jennifer Davis, after<br />

his arrest. As <strong>of</strong> mid-April he was living in her home on bail, awaiting a plea and case management hearing at a British crown court<br />

on May 11, 2012. A few key details, such as <strong>the</strong> death <strong>of</strong> his stepfa<strong>the</strong>r, Alexander “Allie” Spence, were corroborated by newspaper<br />

reports. Descriptions <strong>of</strong> <strong>the</strong> scenery and lack <strong>of</strong> modern shops in Shetland come from my own one-day visit to Lerwick, where I first<br />

met Davis in late June 2011.<br />

Details <strong>of</strong> Davis’s frequent prank calls to <strong>the</strong> Applebee’s restaurant in San Antonio, Texas, <strong>are</strong> a result <strong>of</strong> interviews with Davis himself.<br />

Though he could not provide recordings <strong>of</strong> <strong>the</strong> Applebee’s calls, he did provide audio files <strong>of</strong> o<strong>the</strong>r similar prank calls.<br />

A common feature <strong>of</strong> /b/ raids was a “surge” <strong>of</strong> users against an online target, <strong>the</strong> idea usually being to overwhelm <strong>the</strong>m. Among <strong>the</strong><br />

examples provided <strong>are</strong> spamming shock photos on a forum; this is a common tactic <strong>of</strong> /b/ users, and was most recently perpetrated on<br />

<strong>the</strong> comedy site 9gag. The raid in which /b/ warped <strong>the</strong> votes for Time Magazine’s “Person <strong>of</strong> <strong>the</strong> Year” took place in 2009, when<br />

4chan users famously teamed toge<strong>the</strong>r to program a bot that would crank out fake votes that put Christopher “moot” Poole at <strong>the</strong> top<br />

<strong>of</strong> Time’s ranking. As well as giving him an unfeasible sixteen million votes, <strong>the</strong>y gamed <strong>the</strong> system so that <strong>the</strong> first letters <strong>of</strong> <strong>the</strong><br />

following twenty names in <strong>the</strong> ranking spelled out <strong>the</strong> words “Marblecake also <strong>the</strong> game.” This was thought to be a reference to <strong>the</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!