31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

to websites that showed <strong>the</strong> steps one needs to take to “SWAT” someone.<br />

Details <strong>of</strong> Laurelai’s first online meeting with Kayla come primarily from interviews with Bailey. The extra context on transgender<br />

<strong>hacker</strong>s comes from e-mails I exchanged with Christina Dunbar-Hester, PhD, Affiliated Faculty, Women’s & Gender Studies, at<br />

Rutgers, <strong>the</strong> State University <strong>of</strong> New Jersey.<br />

Chapter 7: FIRE FIRE FIRE FIRE<br />

The introductory paragraph, which suggests that Anonymous went quiet between Chanology in 2008 and WikiLeaks in late 2010,<br />

comes from interviews with various key players, including Jake Davis, Jennifer Emick, Laurelai Bailey, and conversations with o<strong>the</strong>r<br />

Anons, along with my own observance <strong>of</strong> a drop in news coverage about Anonymous between those dates.<br />

The interview with Girish Kumar from Aiplex that is referred to at <strong>the</strong> start <strong>of</strong> this chapter is sourced from <strong>the</strong> September 8, 2010, article<br />

“Film Industry Hires Cyber Hitmen to Take Down Internet Pirates” in <strong>the</strong> Sydney Morning Herald. Kumar was quoted as saying<br />

similar things in <strong>the</strong> TorrentFreak.com article “Anti-Piracy Outfit Threatens To DoS Uncooperative Torrent Sites,” published on<br />

September 5, 2010. It is unclear if Kumar or Aiplex were ever prosecuted for launching DDoS attacks; <strong>the</strong>re <strong>are</strong> no press reports<br />

since that suggest <strong>the</strong> company was.<br />

Details <strong>of</strong> <strong>the</strong> discussion <strong>of</strong> Aiplex on /b/ and <strong>the</strong>n <strong>the</strong> creation <strong>of</strong> an IRC channel to coordinate a raid were sourced from an online<br />

interview with <strong>the</strong> <strong>hacker</strong> Tflow in April <strong>of</strong> 2011, and from <strong>the</strong> TorrentFreak.com article “4chan DDoS Takes Down MPAA and<br />

Anti-Piracy <strong>We</strong>bsites.” I gleaned some context on <strong>the</strong> attacks from a timeline <strong>of</strong> events that was posted on <strong>the</strong> Partyvan.info website.<br />

The story that Anonymous supporters were herded between IRC networks, along with <strong>the</strong> names <strong>of</strong> <strong>the</strong> main IRC channels, was also<br />

sourced from <strong>the</strong> interview with Tflow. Extra details about Aiplex and MPAA attacks come from o<strong>the</strong>r online articles, such as<br />

TechCrunch’s “RIAA Goes Offline, Joins MPAA As Latest Victim <strong>of</strong> Successful DDoS Attacks,” from September <strong>of</strong> 2010, and a<br />

blog post by IT security firm Panda Labs entitled “4chan Users Organize Surgical Strike Against MPAA,” published on September<br />

17, 2010.<br />

Details about Tflow’s alleged real age and location come from <strong>the</strong> later announcement (in July <strong>of</strong> 2011) <strong>of</strong> his arrest by <strong>the</strong> U.K.’s<br />

Metropolitan Police. The description that he was quiet and “never talked about his age or background” comes from discussions with<br />

o<strong>the</strong>r <strong>hacker</strong>s as well as from my own observations <strong>of</strong> Tflow in interviews, in chat rooms with o<strong>the</strong>rs, and in leaked chat logs. Details<br />

<strong>of</strong> <strong>the</strong> way Tflow approached people in IRC channels with more technical knowledge than he, and <strong>the</strong> way that group turned<br />

Copyright Alliance into a repository for pirated material, come from an interview with Tflow as well as from a September 2010 news<br />

article entitled “Wave <strong>of</strong> <strong>We</strong>bsite Attacks Continues—Copyright Alliance Targeted” on Skyck.com. Details <strong>of</strong> <strong>the</strong> attacks on Gene<br />

Simmons and o<strong>the</strong>r DDoS attacks come from various online news reports, while <strong>the</strong> notion that <strong>the</strong> campaign “went into hiatus”<br />

comes from testimony by Tflow and Topiary. Tflow claimed that <strong>the</strong> SQL injection attack on copyrightalliance.org was <strong>the</strong> first <strong>of</strong> its<br />

kind under <strong>the</strong> banner <strong>of</strong> Anonymous, though it is possible that similar attacks were carried out during Chanology.<br />

Among <strong>the</strong> technical remarks that Tflow saw in <strong>the</strong> #save<strong>the</strong>pb channel that led him to collaborate with more skilled individuals was,<br />

verbatim, “LOIC does not overwhelm its targets with packets. It’s a matter <strong>of</strong> flooding port 80. Most web servers can not handle a<br />

vast amount <strong>of</strong> open connections.”<br />

The account <strong>of</strong> <strong>the</strong> creation <strong>of</strong> <strong>the</strong> AnonOps IRC network comes from interviews with Jake Davis, Tflow, and one o<strong>the</strong>r key organizer<br />

<strong>of</strong> AnonOps, as well as from <strong>the</strong> “History” page on <strong>the</strong> AnonOps website: AnonOps.pro/network/history.html. There, organizers<br />

describe <strong>the</strong> original “cunning plan” <strong>of</strong> late 2010, adding that <strong>the</strong>y had wondered, “How about a ship for Anons, by Anons?”<br />

Testimony from Topiary about first “checking out” Operation Payback, and <strong>the</strong>n hearing about <strong>the</strong> suicide <strong>of</strong> his fa<strong>the</strong>r, come from<br />

interviews with Topiary himself.<br />

References to WikiLeaks and <strong>the</strong> leaking <strong>of</strong> 250,000 diplomatic cables come from a wealth <strong>of</strong> mainstream news reports that were<br />

published in November and December <strong>of</strong> 2010, such as a November 28 article in <strong>the</strong> Guardian entitled “How 25,000 U.S. Embassy<br />

Cables <strong>We</strong>re Leaked,” as well as <strong>the</strong> New York Magazine story “Bradley Manning’s Army <strong>of</strong> One,” published on July 3, 2011. The<br />

assertion that State Department staff were barred from visiting <strong>the</strong> WikiLeaks website came from my discussions with an <strong>anonymous</strong><br />

State Department source. The description <strong>of</strong> <strong>the</strong> attack by The Jester on WikiLeaks comes from various news reports, such as “The<br />

Jester Hits WikiLeaks Site with XerXeS DoS Attack,” by Infosec Island, published on November 29, 2010, as well as from<br />

testimony by Topiary and references in leaked chat logs. The account <strong>of</strong> <strong>the</strong> subsequent nixing <strong>of</strong> funding services by PayPal,<br />

MasterCard, and Visa to WikiLeaks comes from a range <strong>of</strong> mainstream news reports.<br />

Details throughout this chapter about <strong>the</strong> discussions that took place in <strong>the</strong> #command channel on AnonOps—e.g., first going after<br />

PayPal to stoke up publicity; operator names like Nerdo, Owen, and Token; or <strong>the</strong> collaboration with botmasters Civil and Switch—<br />

were originally sourced from Topiary, who had been invited into <strong>the</strong> channel and was friends with several AnonOps IRC operators.<br />

Much <strong>of</strong> this information was corroborated by news reports as well as by blog posts written by Panda Securities researcher Sean-Paul<br />

Correll, who closely tracked <strong>the</strong> PayPal attacks. Though Correll has been on sick leave from Panda Securities for much <strong>of</strong> 2011 and<br />

was unavailable for interviews, one <strong>of</strong> his colleagues e-mailed me additional, never-before-published details <strong>of</strong> his conversations with<br />

<strong>the</strong> botmaster Switch on IRC. The operator names Nerdo, Token, and Fennic were associated with real names and faces when <strong>the</strong><br />

four young men accused <strong>of</strong> cyber crimes under <strong>the</strong>se names appe<strong>are</strong>d in <strong>We</strong>stminster Magistrates Court on September 7, 2011: Peter<br />

David Gibson (accused <strong>of</strong> computer <strong>of</strong>fenses under <strong>the</strong> nickname Peter), Christopher <strong>We</strong>a<strong>the</strong>rhead (accused <strong>of</strong> <strong>of</strong>fenses under <strong>the</strong><br />

name Nerdo), and Ashley Rhodes (Nikon_elite). Because he was a minor, <strong>the</strong> real name <strong>of</strong> <strong>the</strong> seventeen-year-old known as Fennic<br />

could not be revealed for legal reasons. Fur<strong>the</strong>r details, such as <strong>the</strong> nickname BillOReilly, came from screenshots <strong>of</strong> AnonOps IRC<br />

published on Encyclopedia Dramatica.<br />

Details about <strong>the</strong> numbers <strong>of</strong> people piling into AnonOps IRC during <strong>the</strong> PayPal and MasterCard attacks were sourced from Sean-Paul<br />

Correll’s research as well as from testimony by Topiary in <strong>the</strong> month or two after <strong>the</strong> attacks.<br />

Dialogue from <strong>the</strong> public #OperationPayback IRC channel, such as “Do you think this is <strong>the</strong> start <strong>of</strong> something big?” came via an online<br />

database <strong>of</strong> AnonOps chat logs from December 8, 2010, searchable here: http://blyon.com/Irc/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!