31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

database <strong>of</strong> AnonOps chat logs from December 8, 2010, searchable here: http://blyon.com/Irc/.<br />

Content from <strong>the</strong> digital flyer that contains instructions for using LOIC was taken directly from <strong>the</strong> flyer, which is still available online.<br />

The LOIC message to PayPal servers was cited in <strong>the</strong> Ars Technica article “FBI Raids Texas Colocation Facility in 4chan DDoS<br />

Probe,” published in late 2010; <strong>the</strong> exact date is not shown on <strong>the</strong> online article, which cites log entries in a search request by <strong>the</strong> FBI.<br />

The notion that operators probably did not want public attention focused on botnets because it could lead to heat from <strong>the</strong> authorities<br />

comes from a conversation with academic and Anonymous expert Gabriella Coleman.<br />

Details about Ryan and <strong>the</strong> use <strong>of</strong> his botnet on OpItaly, and about <strong>the</strong> manipulation <strong>of</strong> numbers, come from testimony by Topiary.<br />

Information about <strong>the</strong> fourteen people arrested for using LOIC against PayPal comes from wide-ranging news reports, including <strong>the</strong><br />

Financial Times story “FBI Arrests 14 Suspects in PayPal Attack,” published on July 20, 2011. The detail about Ryan’s mental<br />

health was sourced from <strong>the</strong> testimony <strong>of</strong> his lawyer, Ben Cooper, who told a court hearing on June 25, 2011, that his client had been<br />

diagnosed with Asperger’s syndrome since his arrest.<br />

A note about lying to <strong>the</strong> press: did supporters <strong>of</strong> Anonymous lie to me in interviews? Sometimes, yes. Was I aw<strong>are</strong> this was going on?<br />

Yes, though admittedly not always to start with. Over time, if I was not sure about a key point, I would seek to corroborate it with<br />

o<strong>the</strong>rs. Such is <strong>the</strong> case with statements presented as fact in this book. My approach to Anons who were lying to me was to simply go<br />

along with <strong>the</strong>ir stories, acting as if I were impressed with what <strong>the</strong>y were saying in <strong>the</strong> hope <strong>of</strong> teasing out more information that I<br />

could later confirm. I have signposted certain anecdotes in this book with <strong>the</strong> word “claimed”—e.g., a person “claimed” that a story is<br />

true. Not everyone in Anonymous and LulzSec lied all <strong>the</strong> time, however, and <strong>the</strong>re were certain key sources who were more<br />

trustworthy than o<strong>the</strong>rs and whose testimony I tended to listen to more closely, chief among <strong>the</strong>m being Jake Davis.<br />

Tflow created <strong>the</strong> #reporter channel for AnonOps, according to Topiary. Some dialogue that refers to <strong>the</strong> #over9000 channel comes<br />

from <strong>the</strong> leaked #HQ logs.<br />

Chapter 8: <strong>We</strong>apons that Backfired<br />

Much <strong>of</strong> <strong>the</strong> detail in this chapter about <strong>the</strong> bugs inherent in LOIC comes from online and face-to-face interviews with a programmer<br />

and former supporter <strong>of</strong> Anonymous who does not want to be identified. Additional descriptions <strong>of</strong> IRC, such as <strong>the</strong> topics at <strong>the</strong> top<br />

<strong>of</strong> chat channels, come from my own observations when visiting <strong>the</strong> chat network and from rumors about “Feds” crawling <strong>the</strong><br />

network, which were mentioned by Topiary and o<strong>the</strong>r Anons that I occasionally chatted with, as well as from online articles about <strong>the</strong><br />

general usage <strong>of</strong> IRC and <strong>the</strong> role <strong>of</strong> operators, such as “The IRC Operators Guide” on irchelp.org. Some dialogue about <strong>the</strong> legalities<br />

<strong>of</strong> using LOIC comes from <strong>the</strong> online database <strong>of</strong> AnonOps chat logs, http://blyon.com/Irc/. Extra statistics about <strong>the</strong> numbers using<br />

LOIC and about AnonOps IRC can be found on Pastebin (http://pastebin.com/qQgxtKaj) and in <strong>the</strong> section about Operation Payback<br />

on <strong>the</strong> website opensecuritylab.org. Fur<strong>the</strong>r details come from <strong>the</strong> TorrentFreak article “Behind <strong>the</strong> Scenes at Anonymous’ Operation<br />

Payback,” published in late 2010 (<strong>the</strong> article does not give <strong>the</strong> exact date <strong>of</strong> publication).<br />

There was a wide range <strong>of</strong> news reports on <strong>the</strong> arrest <strong>of</strong> Martijn “Awinee” Gonlag, including “They’re Watching. And They Can Bring<br />

You Down,” published in <strong>the</strong> Financial Times on September 23, 2010.<br />

Regarding <strong>the</strong> sentence about using LOIC behind “anonymizing s<strong>of</strong>tw<strong>are</strong>”: users could not fire <strong>the</strong> tool from behind an http proxy<br />

because <strong>the</strong>ir “packets” would hit <strong>the</strong>ir own proxy, taking <strong>the</strong>m <strong>of</strong>fline; so it was VPN or nothing.<br />

Details <strong>of</strong> <strong>the</strong> FBI’s initial investigation into Operation Payback were sourced partly from an article on Wired’s ThreatLevel blog entitled<br />

“In ‘Anonymous’ Raids, Feds Work from List <strong>of</strong> Top 1,000 Protesters,” published on July 26, 2011. Additionally, details about <strong>the</strong><br />

initial contact between PayPal and <strong>the</strong> FBI agents, along with <strong>the</strong> passing over <strong>of</strong> one thousand IP addresses on a USB thumb drive,<br />

<strong>are</strong> sourced from an FBI arrest warrant filed on July 15, 2011, and available online.<br />

Owen’s quote “Switch is basically under a shoot on sight watch list” comes from screenshots <strong>of</strong> <strong>the</strong> #InternetFeds chat room made by<br />

freelance journalist Mat<strong>the</strong>w Keys, which were e-mailed to me by Keys in early 2011. Keys was invited to observe <strong>the</strong> goings-on in<br />

InternetFeds from December <strong>of</strong> 2010 to January <strong>of</strong> 2011. He used <strong>the</strong> nickname AESCracked.<br />

Details <strong>of</strong> <strong>the</strong> DDoS attacks on AnonOps IRC, and <strong>the</strong> details about Operation Leakspin and Operation Leakflood, come from<br />

testimonies by Anonymous supporters, including Topiary, as well as from various blog posts and news reports. The account <strong>of</strong><br />

splitting into operations, such as <strong>the</strong> DDoSes <strong>of</strong> Sarah Palin’s website and <strong>the</strong> Venezuelan government sites, comes from a variety <strong>of</strong><br />

news reports on websites such as Panda Security’s blog, ABCNews.go.com, and KnowYourMeme.com.<br />

Details about #InternetFeds gradually usurping #command as an organizational hub popular with Anonymous <strong>hacker</strong>s come from<br />

Topiary, Kayla, and two o<strong>the</strong>r <strong>hacker</strong>s who were in <strong>the</strong> channel. Fur<strong>the</strong>r description <strong>of</strong> dialogue and content from discussions in <strong>the</strong><br />

channel comes from scores <strong>of</strong> screenshots provided by Mat<strong>the</strong>w Keys.<br />

Chapter 9: The Revolutionary<br />

At least two people have corroborated that Tflow first invited Sabu into #InternetFeds; Sabu also claimed this. Details about Sabu’s<br />

views come from dozens <strong>of</strong> online interviews I held with him both before and after his arrest by <strong>the</strong> FBI on June 7, 2011. My phone<br />

interviews with Monsegur provided insights into his accent, his way <strong>of</strong> speaking, <strong>the</strong> background sounds I heard when I was<br />

speaking with him, and his skills for lying and manipulation. At times <strong>the</strong>y yielded little in <strong>the</strong> way <strong>of</strong> reliable insights since <strong>the</strong> phone<br />

interviews took place after he started working for <strong>the</strong> FBI and had been encouraged to feed misinformation to journalists. Fur<strong>the</strong>r<br />

details about his life, upbringing, and address come from a series <strong>of</strong> court documents that were unsealed after <strong>the</strong> FBI revealed that he<br />

had been acting as an informant since soon after June 7, 2011. Additionally, I have sourced some details from a three-part series <strong>of</strong><br />

Fox News stories about Monsegur published in March <strong>of</strong> 2012, one <strong>of</strong> which is entitled “Inside LulzSec, a Mastermind Turns on His<br />

Minions.” Ano<strong>the</strong>r helpful source for corroborating personal details on Monsegur was <strong>the</strong> New York Times story “Hacker, Informant

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!