31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Minions.” Ano<strong>the</strong>r helpful source for corroborating personal details on Monsegur was <strong>the</strong> New York Times story “Hacker, Informant<br />

and Party Boy <strong>of</strong> <strong>the</strong> Projects,” published on March 8, 2012, in which reporters spoke to Monsegur’s neighbors to piece toge<strong>the</strong>r a<br />

picture <strong>of</strong> <strong>the</strong> man. Interviews with sources close to Hector Monsegur and <strong>the</strong> FBI investigation also contributed to <strong>the</strong> information in<br />

this chapter.<br />

Details about <strong>the</strong> incident at Monsegur’s high school with <strong>the</strong> head <strong>of</strong> security were sourced from an essay purporting to be written by<br />

Sabu on August 14, 2001, and bearing all his usual stylistic and verbal hallmarks. It was published via Pastebin on June 7, 2011 (<strong>the</strong><br />

day <strong>of</strong> his arrest), and also sent to me via e-mail by a source. Full essay here: http://pastebin.com/TVnGwSmG.<br />

The details about Monsegur’s internships as a teenager were sourced from a web archive <strong>of</strong> <strong>the</strong> iMentor website from August 2002,<br />

which listed Monsegur as a member <strong>of</strong> <strong>the</strong> staff and provided a short biography that mentioned his stints at <strong>the</strong> NPowerNY<br />

Technology Service Corp and <strong>the</strong> Low-Income Networking and Communications Project (LINC) at <strong>the</strong> <strong>We</strong>lf<strong>are</strong> Law Center.<br />

Text for The Hacker Manifesto by <strong>the</strong> Mentor can be found here: http://www.mithral.com/~beberg/manifesto.html. I have exchanged emails<br />

with Lloyd “<strong>the</strong> Mentor” Blankenship to corroborate details about his writing <strong>of</strong> <strong>the</strong> 1986 essay.<br />

Sabu/Monsegur provided me with links that still showed <strong>the</strong> deface message he published on <strong>the</strong> Puerto Rican government websites.<br />

Fur<strong>the</strong>r details on <strong>the</strong> U.S.-China cyber war that Sabu involved himself in were corroborated by news reports such as Wired’s “It’s<br />

(Cyber) War: China vs. U.S.,” published in April <strong>of</strong> 2001, and CNN’s “China-U.S. Cyber War Escalates,” published on May 1,<br />

2001. Fur<strong>the</strong>r details about Monsegur and his attempts to start a group for local programmers in 2002 also come from a “dox” file<br />

posted by a security researcher nicknamed Le Researcher, who pasted a variety <strong>of</strong> screenshots <strong>of</strong> e-mails, deface messages, and forum<br />

posts on http://ceaxx.wordpress.com/uncovered/. Sabu’s message on AnonOps, in which he asks how to find Wired’s John Abell,<br />

came from <strong>the</strong> online database http://blyon.com/Irc/.<br />

Details about <strong>the</strong> anticorruption protests in Tunisia were widely reported in late December <strong>of</strong> 2010 and early January <strong>of</strong> 2011, and<br />

details <strong>of</strong> <strong>the</strong> government’s phishing campaign, aimed at spying on potential dissenters, were published by Al Jazeera and Ars<br />

Technica. Censored sites would typically say “Error 404: page not found.” An <strong>of</strong>ficially blocked site will usually say “Error 403,” so<br />

<strong>the</strong> use <strong>of</strong> 404 suggested un<strong>of</strong>ficial censorship. One journalist and blogger, S<strong>of</strong>iene Chourabi, had reportedly been blocked from<br />

accessing his Facebook account; his 4,200 friends were also hacked. O<strong>the</strong>r journalists claimed that <strong>the</strong>ir entire blogs were deleted <strong>of</strong><br />

content, and suspected <strong>the</strong> Tunisian Internet Agency was behind it. Many Tunisians also claimed <strong>the</strong>y were unable to change <strong>the</strong>ir<br />

Facebook passwords. The phishing operation was sophisticated, hitting several high-pr<strong>of</strong>ile targets in a single day, and was carried<br />

out by a malw<strong>are</strong> code, according to Al Jazeera, which cited “several sources.” The TechHerald’s Steve Ragan reported seeing<br />

examples <strong>of</strong> <strong>the</strong> embedded script and new source code injected in Gmail, Yahoo, and Facebook, confirming with four different<br />

experts that <strong>the</strong> embedded code was “siphoning <strong>of</strong>f login credentials” and that “code planting <strong>of</strong> this scale could only originate from<br />

an ISP (Internet Service Provider).”<br />

Details <strong>of</strong> <strong>the</strong> antiphishing script developed by Tflow <strong>are</strong> available on <strong>the</strong> script-sharing website http://userscripts.org, under <strong>the</strong> user<br />

name “internetfeds.” Sabu, Topiary, and one o<strong>the</strong>r senior figure in Anonymous said that Tflow originally wrote <strong>the</strong> script. Tflow had<br />

written a browser JavaScript plug-in that effectively stripped <strong>the</strong> government’s added Java code and redirected Tunisian Internet users<br />

away from its phishing servers (essentially fake Gmail, Yahoo, and Facebook sites) and back to <strong>the</strong> original, true hosts. Tunisian<br />

Internet users first had to install <strong>the</strong> Greasemonkey add-on for Firefox. Then it was just a matter <strong>of</strong> opening Firefox and going to<br />

Tools, <strong>the</strong>n to Greasemonkey and New User Script, to paste in <strong>the</strong> code. Having clicked “Okay,” Tunisians could within a minute or<br />

two access Facebook, Twitter, Blogger, Gmail, and Yahoo without exposing <strong>the</strong>ir login details.<br />

I have sourced <strong>the</strong> story about Sabu remotely controlling a Tunisian man’s computer to deface <strong>the</strong> website <strong>of</strong> <strong>the</strong> country’s prime<br />

minister from interviews with Sabu himself, conducted in April <strong>of</strong> 2011. It’s still not clear exactly how Sabu hit <strong>the</strong> Tunisian DNS,<br />

but one expert who knew him suggests he may have used a so-called smurf attack to bring down <strong>the</strong> domain servers <strong>of</strong> <strong>the</strong> Tunisian<br />

government. This refers to a unique type <strong>of</strong> denial <strong>of</strong> service (DoS, without <strong>the</strong> d for “distributed”) attack that can be carried out from<br />

a single computer. Instead <strong>of</strong> using a botnet, it uses servers with significant space and speed to transfer <strong>the</strong> junk data. A smurf attack,<br />

specifically, needs broadcast servers. It sends a ping request to one or more <strong>of</strong> <strong>the</strong> servers, communicating (falsely) that <strong>the</strong> return IP<br />

address is <strong>the</strong> target. In <strong>hacker</strong>speak, <strong>the</strong>y <strong>are</strong> sending “spo<strong>of</strong> packets.” The broadcast server <strong>the</strong>n tells its entire network to respond to<br />

<strong>the</strong> target machine. One computer by itself can send perhaps 500 megabytes worth <strong>of</strong> packets at most, but a smurf attack allowed<br />

Sabu to amplify 40 gigabytes worth. A screenshot <strong>of</strong> <strong>the</strong> deface message that was uploaded to Prime Minister Ghannouchi’s site is<br />

available online.<br />

Chapter 10: Meeting <strong>the</strong> Ninja<br />

Opening paragraphs <strong>of</strong> this chapter <strong>are</strong> sourced from online interviews with Topiary. His deface message on <strong>the</strong> government <strong>of</strong> Tunisia<br />

was until recently viewable here: http://pastehtml.com/view/1cw69sc.html. The point about cyber attacks on <strong>the</strong> governments <strong>of</strong><br />

Libya, Egypt, Zimbabwe, Jordan, and Bahrain came from testimony by Topiary and was corroborated with various online news<br />

reports. I saw <strong>the</strong> deface <strong>of</strong> <strong>the</strong> Fine Gael website myself and confirmed it on <strong>the</strong> phone with a press spokesman for <strong>the</strong> Irish political<br />

party.<br />

The description <strong>of</strong> Kayla’s style <strong>of</strong> writing, which includes “lol”s and smiley faces, is based on my own observations as well as those <strong>of</strong><br />

Anonymous members. Her view <strong>of</strong> hacking as an addiction comes from a later, online interview.<br />

The online poll by Johnny Anonymous was described to me in a Skype interview with Johnny Anonymous himself, conducted on<br />

March 7, 2011.<br />

Descriptions <strong>of</strong> Kayla’s obsessive attempts to keep her identity hidden <strong>are</strong> sourced from interviews with Kayla, conducted largely by email,<br />

in March <strong>of</strong> 2011. I was first introduced to Kayla (and Sabu, Tflow, and <strong>the</strong> o<strong>the</strong>rs who would later make up LulzSec) by<br />

Topiary. Details <strong>of</strong> Kayla’s life experiences and getting hacked by a man who “screamed” down <strong>the</strong> phone at her came from<br />

interviews also conducted in March <strong>of</strong> 2011. Kayla’s involvement in <strong>the</strong> Gawker hack, which has been reported by Gawker itself,<br />

was mentioned in an Internet Relay Chat interview with <strong>the</strong> <strong>hacker</strong> on May 23, 2011, in which she described in detail how she and a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!