31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

was mentioned in an Internet Relay Chat interview with <strong>the</strong> <strong>hacker</strong> on May 23, 2011, in which she described in detail how she and a<br />

group <strong>of</strong> online friends in <strong>the</strong> IRC channel #gnosis carried out <strong>the</strong>ir hack over <strong>the</strong> course <strong>of</strong> several months. Confirmation <strong>of</strong> <strong>the</strong><br />

existence <strong>of</strong> Kayla’s “tr0ll” IRC network came from archived web pages and Pastebin posts that mention <strong>the</strong> network, and a source<br />

who did not wish to be named. In addition to telling me about <strong>the</strong> “vulnerability in <strong>the</strong> servers hosting Gawker.com,” Kayla explained<br />

that she and <strong>the</strong> o<strong>the</strong>r <strong>hacker</strong>s managed to obtain user and password details for <strong>the</strong> site’s root, MySQL. These <strong>are</strong> key features that<br />

gave <strong>the</strong>m almost unfettered access to <strong>the</strong> website’s database.<br />

The vulnerability that Kayla found in <strong>the</strong> United Nations website was shown to me in an IRC chat with Kayla in <strong>the</strong> summer <strong>of</strong> 2011.<br />

Dialogue from #InternetFeds came from screenshots <strong>of</strong> <strong>the</strong> private IRC channel e-mailed to me by Mat<strong>the</strong>w Keys.<br />

Regarding <strong>the</strong> WikiLeaks IRC network, where Kayla first met q, anyone could access it via a browser at chat.wikileaks.org. Several<br />

sources close to WikiLeaks confirm q (real name known but not disclosed here) had habitually lied to supporters, and that he and<br />

Assange were close, like a “stepson to Assange,” according to one.<br />

Chapter 11: The Aftermath<br />

The opening paragraphs <strong>of</strong> this chapter <strong>are</strong> sourced primarily from phone interviews with Aaron Barr. I have seen <strong>the</strong> comment about<br />

Barr’s children that prompted him and his wife to temporarily flee <strong>the</strong>ir home on Reddit.<br />

Details about HBGary Inc.’s hiring <strong>of</strong> law firm Zwillinger & Genetski <strong>are</strong> sourced from phone interviews with lawyers Marc Zwillinger<br />

and Jennifer Granick. The detail about Ted Vera’s and Greg Hoglund’s passwords came from interviews with Topiary.<br />

The subsequent quotes from Aaron Barr <strong>are</strong> sourced from a phone interview with Barr that took place early that Monday morning, just<br />

hours after <strong>the</strong> Super Bowl Sunday attack. HBGary's open letter was until recently viewable here: http://www.hbgary.com/openletter-from-hbgary.<br />

The <strong>hacker</strong>s stored <strong>the</strong> social security numbers <strong>of</strong> HBGary employees and o<strong>the</strong>r data on a private <strong>We</strong>b text application called Pirate Pad,<br />

which anyone from <strong>the</strong> group could edit. The online document was later deleted. Stolen data like this <strong>of</strong>ten wound up ga<strong>the</strong>ring dust<br />

somewhere in <strong>the</strong> cloud, or on someone’s computer—forgotten until an arrest turned it into evidence.<br />

The account <strong>of</strong> Kayla informing Laurelai Bailey <strong>of</strong> <strong>the</strong> HBGary attack and <strong>the</strong>n inviting her into <strong>the</strong> private IRC channel for <strong>the</strong><br />

company’s attackers, #HQ, is sourced from interviews with Bailey. Those interviews were also <strong>the</strong> source for details about Barr’s<br />

controversial proposals to Hunton & Williams. In order to stumble upon Barr’s all-important WikiLeaks connection, Laurelai had to<br />

first port Barr’s published e-mails onto an e-mail client called Thunderbird, <strong>the</strong>n transfer <strong>the</strong>m to Gmail. This allowed her to search<br />

through <strong>the</strong> e-mails using key words like “WikiLeaks.”<br />

The notion that Topiary, Sabu, and Kayla didn’t know about <strong>the</strong> anti-WikiLeaks proposals in <strong>the</strong> days immediately after <strong>the</strong> attack were<br />

conveyed to me by Topiary, who I was interviewing at <strong>the</strong> time. I had also been following developments after <strong>the</strong> attack and noticing<br />

that his small group was trawling through Barr’s e-mails, looking for something controversial, before Laurelai spotted <strong>the</strong> mo<strong>the</strong>rlode.<br />

Dialogue between <strong>the</strong> group in <strong>the</strong> #HQ room comes from logs that were eventually leaked by Laurelai to Jennifer Emick (see chapter<br />

14). Details about <strong>the</strong> publication <strong>of</strong> <strong>the</strong> HBGary e-mails and snippets <strong>of</strong> content were sourced from <strong>the</strong> HBGary viewer itself,<br />

http://hbgary.anonleaks.ru (now <strong>of</strong>fline).<br />

Details about <strong>the</strong> investigation into HBGary, its partners, and <strong>the</strong>ir military contracts by U.S. congressman Hank Johnson were<br />

confirmed in a phone interview with Johnson on March 23, 2011. I first heard about <strong>the</strong> investigation on March 17, when, late that<br />

evening, Topiary saw a Wired story saying that Congressman Johnson had started investigating <strong>the</strong> U.S. military’s contracts with<br />

HBGary Federal, Palantir Technologies, and Berico Technologies. Soon after, at least ten Democrats from <strong>the</strong> House <strong>of</strong><br />

Representatives had signed a petition to launch an investigation into Hunton & Williams and <strong>the</strong> three security firms.<br />

The “growing sense <strong>of</strong> unease” among <strong>the</strong> <strong>hacker</strong>s comes from observations <strong>of</strong> <strong>the</strong>ir sometimes paranoid conversations in #HQ as well<br />

as from testimony by Topiary, who was also <strong>the</strong> source for <strong>the</strong> information about <strong>the</strong> regular phone calls with Sabu and <strong>the</strong> coded<br />

greeting “This is David Davidson.” Sabu’s mistrust <strong>of</strong> Laurelai is clear from his comments in #HQ, but was also corroborated by<br />

testimony from Topiary.<br />

Jennifer Emick has confirmed that she was behind <strong>the</strong> Twitter handle @FakeGreggHoush; this has been an open secret in Anonymous<br />

since Backtrace was doxed in <strong>the</strong> early summer <strong>of</strong> 2011. I relied on interviews with both Emick and Bailey to piece toge<strong>the</strong>r how and<br />

why Bailey ended up passing her <strong>the</strong> #HQ logs.<br />

Part 2<br />

Chapter 12: Finding a Voice<br />

The opening paragraph, describing Topiary’s popularity on AnonOps, including details such as <strong>the</strong> number <strong>of</strong> private messages he was<br />

regularly receiving, <strong>are</strong> sourced from interviews with Topiary as well as from observations <strong>of</strong> chat logs, IRC conversations, and<br />

statistics showing <strong>the</strong> number <strong>of</strong> times people were reaching out to him through Twitter. The detail about requests to hit various<br />

targets, such as Facebook, also comes from those interviews. According to Topiary, people sometimes directly e-mailed supporters in<br />

AnonOps or sent messages to certain representative blogs. It was difficult to track <strong>the</strong> way Anonymous chose its targets, since it was<br />

<strong>of</strong>ten done chaotically, spontaneously, and behind <strong>the</strong> scenes. However, for <strong>the</strong> most part, target requests that came from outside<br />

Anonymous were r<strong>are</strong>ly pursued.<br />

Details about <strong>We</strong>stboro Baptist Church <strong>are</strong> sourced from various news reports as well as from Louis Theroux’s engrossing BBC<br />

documentary The Most Hated Family in America, first aired in 2007. The detail that Nate Phelps had accused his fa<strong>the</strong>r, Fred, <strong>of</strong><br />

abuse is sourced from a number <strong>of</strong> press reports including Nate Phelps’s <strong>of</strong>ficial website, which in its “Bio” page refers to his fa<strong>the</strong>r’s<br />

“extreme version <strong>of</strong> Calvinism” and “extreme physical punishments and abuse.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!