31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“extreme version <strong>of</strong> Calvinism” and “extreme physical punishments and abuse.”<br />

The February 18 press release announcing that Anonymous was going to hit <strong>We</strong>stboro—<strong>the</strong> first such announcement—appe<strong>are</strong>d on<br />

AnonNews.org. The detail about an IRC operator running a search <strong>of</strong> <strong>the</strong> network’s chat channels to find <strong>the</strong> organizers was sourced<br />

from interviews with Topiary. IRC operators, both within AnonOps and in o<strong>the</strong>r networks, regularly ran searches to keep an abreast<br />

<strong>of</strong> any odd operations that no one knew about, such as conspiracies to take down <strong>the</strong> network or improper discussions about child<br />

porn. Sometimes trolls would create a child porn channel to try to make AnonOps look illegal. This was <strong>the</strong> only topic <strong>of</strong> discussion<br />

that was banned on AnonOps IRC; everything else was fair game. Similarly, talk <strong>of</strong> hacking was banned on o<strong>the</strong>r networks, which<br />

was why Tflow and <strong>the</strong> o<strong>the</strong>r supporters <strong>of</strong> Operation Payback migrated from networks like EFnet, Freenode, and Quakenode in late<br />

2010—<strong>the</strong>se IRC operators did not like <strong>the</strong> heat.<br />

The follow-up press release about attacking <strong>We</strong>stboro, written by five writers in #philosoraptors, originated when one person started<br />

writing it on his computer and <strong>the</strong>n uploaded it to Pirate Pad so o<strong>the</strong>rs could edit it. “Dear Phred Phelps and WBC Phriends,” it<br />

began. This release was much more in line with <strong>the</strong> irreverent, clownish tone <strong>of</strong> Anonymous. It went on to say, “Stay tuned, and<br />

we’ll come back to play ano<strong>the</strong>r day. <strong>We</strong> promise,” and added a reprimand: “To <strong>the</strong> Media: Just because it’s posted on AnonNews<br />

doesn’t mean every single Anon is in agreement.”<br />

Details about The David Pakman Show, Pakman himself, and <strong>the</strong> live <strong>We</strong>stboro hack <strong>are</strong> sourced from a phone interview with Pakman<br />

that took place on November 18, 2011, as well as from interviews with Topiary. Comments made by Shirley Phelps-Roper on<br />

Pakman’s show <strong>are</strong> sourced from YouTube videos. All dialogue from <strong>the</strong> show regarding <strong>the</strong> live <strong>We</strong>stboro hack was sourced from<br />

<strong>the</strong> main YouTube video <strong>of</strong> <strong>the</strong> program. Pakman’s and Topiary’s accounts differ about how much Pakman knew <strong>of</strong> what was going<br />

to happen to <strong>We</strong>stboro’s website during <strong>the</strong> show. Pakman denied ever knowing that Topiary or anyone else from Anonymous was<br />

going to hit <strong>the</strong> <strong>We</strong>stboro site in <strong>the</strong> middle <strong>of</strong> his show. “No. Absolutely no,” Pakman said in <strong>the</strong> phone interview, conducted about<br />

eight months after <strong>the</strong> event. “They basically said, ‘<strong>We</strong>’ll come on your show to talk about this.’ It was very vague. I said, ‘I’m<br />

interested. Would you be able to come on with Shirley?’ and <strong>the</strong>y said yes. I reached out to <strong>We</strong>stboro.…They both said yes. The<br />

timing worked out.” Today <strong>the</strong> number <strong>of</strong> hits on <strong>the</strong> video <strong>of</strong> <strong>the</strong> live <strong>We</strong>stboro hack has approached <strong>the</strong> two million mark and it is<br />

<strong>the</strong> most popular video ever posted for The David Pakman Show.<br />

Regarding Topiary’s deface messages: he wrote all <strong>of</strong> <strong>the</strong>m in a very simple text-editing program called Notepad++. Every PC has<br />

Notepad in its Accessories folder, but Notepad++ is a free program that one-upped <strong>the</strong> original Notepad by allowing users to organize<br />

<strong>the</strong>ir documents in tabs, enabling <strong>the</strong>m to have multiple open files. Topiary only had to hit <strong>the</strong> left arrow key on his laptop to get<br />

different text formats, a list <strong>of</strong> links to vulnerable websites, or o<strong>the</strong>r Anonymous press releases he hadn’t read yet. He would make all<br />

his deface messages compatible with <strong>the</strong> <strong>We</strong>b language HTML by converting <strong>the</strong>m at a website called Pastehtml.com. If Topiary<br />

copied and pasted a two-hundred-word message directly from Micros<strong>of</strong>t Word, it would likely show up in Pastehtml.com with <strong>the</strong><br />

Anonymous logo too far to <strong>the</strong> left, or with odd spaces within <strong>the</strong> text, which he’d have to <strong>the</strong>n tinker with in <strong>the</strong> so-called source<br />

code, <strong>the</strong> complicated programming commands behind <strong>the</strong> text. Writing it in Notepad++, on <strong>the</strong> o<strong>the</strong>r hand, meant it was<br />

automatically “cleaned up,” so that when it was converted into an HTML file it looked exactly <strong>the</strong> same online as it did <strong>of</strong>fline on his<br />

computer. No tweaking required. In total, Topiary produced approximately ten deface messages using this method for Anonymous,<br />

and helped o<strong>the</strong>rs to produce an additional ten. The use <strong>of</strong> a simple program, combined with Topiary’s basic knowledge <strong>of</strong> HTML,<br />

<strong>are</strong> <strong>the</strong> reasons that all his messages, which made up <strong>the</strong> majority <strong>of</strong> defacements reported by <strong>the</strong> news media in <strong>the</strong> spring <strong>of</strong> 2011,<br />

appe<strong>are</strong>d as plain text on a white background.<br />

Chapter 13: Conspiracy (Drives Us Toge<strong>the</strong>r)<br />

The opening paragraphs <strong>of</strong> this chapter <strong>are</strong> sourced from interviews at <strong>the</strong> time (and <strong>the</strong>n months afterward for hindsight) with Topiary.<br />

Sabu and Kayla had moved on from <strong>the</strong> HBGary attack and were not involved in reading through Barr’s e-mails. Both also claimed<br />

to have busy lives outside <strong>of</strong> Anonymous and <strong>the</strong> Internet. In my phone interviews with Sabu, for instance, he was <strong>of</strong>ten being<br />

interrupted by people in his household and by o<strong>the</strong>r phone calls.<br />

Details about Barrett Brown’s experience delving through <strong>the</strong> HBGary e-mails, forming a team <strong>of</strong> researchers, and his personal life <strong>are</strong><br />

derived from my phone interview with Brown, conducted on November 24, 2011. Fur<strong>the</strong>r details about his dealings with Topiary and<br />

o<strong>the</strong>r Anons have come from interviews with Topiary. I also sourced an audio recording <strong>of</strong> Brown’s phone interview with William<br />

Wansley, which he uploaded to <strong>the</strong> media-sharing site MediaFire.com. I had been alerted in advance to <strong>the</strong> Radio Payback<br />

appearance <strong>of</strong> Brown, Topiary, and WhiteKidney and was taking notes as it happened, before I downloaded <strong>the</strong> audio file itself. The<br />

description <strong>of</strong> <strong>the</strong> NBC Nightly News broadcast with Michael Isik<strong>of</strong>f was taken from my viewing <strong>of</strong> <strong>the</strong> video online. The note that<br />

Brown’s “bones ached” because <strong>of</strong> withdrawal from Suboxone, along with <strong>the</strong> point about his relapse in New York in April <strong>of</strong> 2011,<br />

were sourced from my phone interview with Brown. Some extra details about Operation Metal Gear and its research were sourced<br />

partly from Brown’s Project PM wiki, http://wiki.echelon2.org/; partly from <strong>the</strong> Metal Gear website, http://opmetalgear.zxq.net/,<br />

before it became disused; and partly from <strong>the</strong> Booz Allen Hamilton website.<br />

Descriptions <strong>of</strong> <strong>the</strong> general opinion among Anons toward Brown were sourced from discussions with a handful <strong>of</strong> Anons, including<br />

William, as well as from my observation <strong>of</strong> relevant comments on AnonOps IRC. Brown thought he saw a connection to HBGary’s<br />

interest in bidding for a contract to sell <strong>the</strong> U.S. military personnel management s<strong>of</strong>tw<strong>are</strong>, a technology that essentially allowed <strong>the</strong><br />

user to spy on o<strong>the</strong>rs over <strong>the</strong> Internet and social media.<br />

Details about <strong>the</strong> young man nicknamed OpLeakS and his <strong>of</strong>fer <strong>of</strong> app<strong>are</strong>ntly explosive information from Bank <strong>of</strong> America were<br />

sourced from interviews with Brown and Topiary, with fur<strong>the</strong>r details coming from <strong>the</strong> bank<strong>of</strong>americasuck.com website, OpLeakS’s<br />

Twitter feed, and a variety <strong>of</strong> news reports. E-mails posted on OpLeakS’s website clearly showed <strong>the</strong> name <strong>of</strong> <strong>the</strong> disgruntled Bank<br />

<strong>of</strong> America employee who was “leaking” information, Brian Penny.<br />

When he used <strong>the</strong> term “nerdy <strong>hacker</strong> group,” Topiary was referring to <strong>the</strong> <strong>hacker</strong> groups <strong>of</strong> <strong>the</strong> eighties and nineties, some <strong>of</strong> which<br />

used skull-and-crossbones imagery and generally took <strong>the</strong>mselves too seriously.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!