31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The assertion that Anonymous was “starting to look like a joke” comes from my own observations as well as discussions with<br />

supporters.<br />

Chapter 16: Talking About a Revolution<br />

Most <strong>of</strong> <strong>the</strong> details and descriptions from this chapter were derived from interviews with Topiary and Sabu over <strong>the</strong> course <strong>of</strong> several<br />

months, including Internet Relay Chat interviews, discussions by phone, and face-to-face meetings.<br />

The point about New York mayor Rudy Giuliani increasing <strong>the</strong> city’s police force to 40,000 was corroborated by <strong>the</strong> April 11, 2000,<br />

Congressional Record for <strong>the</strong> House <strong>of</strong> Representatives and by press reports.<br />

The details about COINTELPRO were corroborated by information on <strong>the</strong> FBI’s own website, which states that <strong>the</strong> project was<br />

“rightly criticized by Congress and <strong>the</strong> American people for abridging first amendment rights and for o<strong>the</strong>r reasons.” See<br />

http://vault.fbi.gov/cointel-pro<br />

The point that Kayla, Tflow, and AVunit had been on “breaks” before <strong>the</strong> formation <strong>of</strong> LulzSec was corroborated by Sabu and at least<br />

one o<strong>the</strong>r LulzSec supporter.<br />

The quote “Most pr<strong>of</strong>essional and high-level hacks <strong>are</strong> never detected” comes from an interview with a <strong>hacker</strong> supporting Anonymous<br />

who did not wish to be named.<br />

Chapter 17: Lulz Security<br />

The majority <strong>of</strong> details in this chapter were sourced from interviews with Topiary, Sabu, and Kayla. Additional details, including<br />

dialogue from Pwnsauce, was derived from my observation <strong>of</strong> discussions among Topiary, Kayla, Tflow, AVunit, and Pwnsauce in<br />

<strong>the</strong> IRC channel #charmy, which was set up for discussions that I could repeat in this book. I also held interviews with some in <strong>the</strong><br />

group, such as Pwnsauce, in this channel.<br />

The assertion that it “took a week for Fox’s IT administrators to notice <strong>the</strong> breach” was derived from interviews in #charmy.<br />

Regarding <strong>the</strong> original Twitter feed for LulzSec, @LulzLeaks: <strong>the</strong> original account that contains that first tweet is still online.<br />

I corroborated that LulzSec had indeed posted a database <strong>of</strong> potential contestants for The X Factor by speaking to a spokesman from<br />

Fox about twenty-four hours after <strong>the</strong> hack was first announced. I also saw <strong>the</strong> published database on Pastebin.<br />

Chapter 18: The Resurrection <strong>of</strong> Topiary and Tupac<br />

Details about <strong>the</strong> PBS hack were sourced from interviews with <strong>the</strong> <strong>hacker</strong>s involved, as well as from a post that Topiary had put on<br />

Pastebin that gave details about what sort <strong>of</strong> tools, such as Havij, <strong>the</strong> group had used. According to a March 2012 article on<br />

darkreading.com, <strong>the</strong> tool “favored by hacktivists” was created by Iranian <strong>hacker</strong>s, and its name is derived from <strong>the</strong> Persian word for<br />

“carrot,” also a nickname for <strong>the</strong> male sexual organ.<br />

The statement that “people in <strong>the</strong> #anonleaks chat room on AnonOps IRC went into a frenzy” when Topiary posted something on<br />

Twitter from his personal account was sourced from interviews with Topiary after he visited <strong>the</strong> chat network.<br />

Chapter 19: Hacker War<br />

Regarding Pastebin’s boost in traffic, <strong>the</strong> website’s controllers would later show <strong>the</strong>ir appreciation for LulzSec by retweeting<br />

@LulzSec’s July 13, 2011, announcement that “If @pastebin reaches 75,000 followers we’ll engage in a mystery operation that will<br />

cause mayhem.” (This was one <strong>of</strong> <strong>the</strong> r<strong>are</strong> tweets from @LulzSec after <strong>the</strong> group <strong>of</strong>ficially disbanded.) Hours later, @Pastebin<br />

tweeted, “The # <strong>of</strong> followers @pastebin is growing very rapidly since @<strong>lulzse</strong>c is sending <strong>the</strong>ir love,” followed by “The twitter<br />

madness continues thanks to @<strong>lulzse</strong>c.” That same day, Topiary exchanged e-mails with Pastebin owner Jeroen Vader, a twentyeight-year-old<br />

Dutch entrepreneur, in which Topiary requested a “unique green crown” icon next to his personal “Topiary” account<br />

on Pastebin, which, when highlighted, would also say “CEO <strong>of</strong> consuming pie.” Vader agreed, saying, “I’ll be sure to fix you up<br />

with a very special crown. Many thanks for trusting Pastebin with your ‘special’ releases.” Pastebin statements from LulzSec and<br />

Anonymous rank among <strong>the</strong> top-trafficked posts on Pastebin, along with LulzSec’s final “50 Days <strong>of</strong> Lulz” release on June 25, 2011,<br />

which clocked 411,354 page views as <strong>of</strong> April 3, 2012. (Pastebin hosts ads on its site, so <strong>the</strong> extra traffic will have aided its bottom<br />

line.) Ironically, Vader said in early April <strong>of</strong> 2012 that he would hire more staff to help police “sensitive information” that got posted<br />

onto <strong>the</strong> site, according to BBC News.<br />

Details about The Jester’s hangout on 2600 and <strong>the</strong> o<strong>the</strong>r people who frequented it were sourced from LulzSec’s leaked #pure-elite chat<br />

logs, from interviews with Topiary, and from my own observations <strong>of</strong> <strong>the</strong> 2600 IRC network. The points about <strong>the</strong> origins <strong>of</strong> 2600:<br />

The Hacker Quarterly were sourced from various <strong>We</strong>b articles, including <strong>the</strong> PCWorld feature story “Hacking’s History,” published<br />

on April 10, 2001.<br />

The information about <strong>the</strong> creation <strong>of</strong> a secondary ring <strong>of</strong> LulzSec supporters was sourced from conversations with Topiary and Sabu.<br />

The detail about Antisec and its original adherents comprising “a few hundred skilled <strong>hacker</strong>s” was sourced from my conversations<br />

with Andrew “weev” Auernheimer, who was a <strong>hacker</strong> during <strong>the</strong> early days <strong>of</strong> <strong>the</strong> Antisec movement, and from various <strong>We</strong>b<br />

articles, including <strong>the</strong> 2002 Wired story “White-Hat Hate Crimes on <strong>the</strong> Rise.”<br />

The nicknames <strong>of</strong> “secondary crew members” <strong>of</strong> LulzSec, such as Neuron and M_nerva, were sourced from <strong>the</strong> #pure-elite chat logs<br />

that were first leaked online by Pastebin on June 5, 2011, in a post entitled “LulzSec Private Log.” The logs were republished by The

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!