31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The deleting code rm -rf/* is well known among <strong>We</strong>b trolls, who at one time made a practice <strong>of</strong> telling Mac and Linux users to type <strong>the</strong><br />

code into <strong>the</strong>ir copy <strong>of</strong> Terminal, <strong>the</strong> application that allows users to engage with <strong>the</strong>ir computers using a command-line interface.<br />

This can lead users to inadvertently wipe out <strong>the</strong>ir hard drives. According to KnowYourMeme.com, <strong>the</strong> trolling scheme against PC<br />

users has been around since <strong>the</strong> early 2000s, but became popular through its promulgation on 4chan around 2006. Users <strong>of</strong> /b/ would<br />

post digital flyers or start discussion threads saying, for example, that Micros<strong>of</strong>t had included a folder called system32 on all PCs and<br />

that this folder held 32 gigabytes <strong>of</strong> “worthless crap.” They added that <strong>the</strong> company did this to sell more system-cleaning s<strong>of</strong>tw<strong>are</strong>,<br />

and that <strong>the</strong> way to get back at money-hungry Micros<strong>of</strong>t was to delete <strong>the</strong> file. This was, <strong>of</strong> course, completely untrue.<br />

Here is a translation <strong>of</strong> <strong>the</strong> UNIX code rm -rf/* itself: “rm” is <strong>the</strong> command short for remove; a blank space <strong>the</strong>n indicates <strong>the</strong> end <strong>of</strong> <strong>the</strong><br />

command. The “-” begins <strong>the</strong> options, with “r” meaning “recursively delete all directories” and “f” meaning “override file<br />

permissions.” “/*” means that everything after <strong>the</strong> root <strong>of</strong> <strong>the</strong> tree (“/”) is to be affected. The entire command means “remove<br />

everything forcefully.”<br />

The assertion that “many news outlets bought this line”—i.e., <strong>the</strong> line that LulzSec had hacked InfraGard in response to <strong>the</strong> Pentagon<br />

announcement—was sourced from a number <strong>of</strong> news reports. Among <strong>the</strong>m is <strong>the</strong> digitaltrends.com story “LulzSec Hacks FBI<br />

Affiliate, Infragard.”<br />

Details about <strong>the</strong> arrest <strong>of</strong> Sabu were sourced partly from Fox News reports, including <strong>the</strong> one entitled “Infamous International Hacking<br />

Group LulzSec Brought Down by Own Leader,” and partly from an interview with an <strong>anonymous</strong> source who had knowledge <strong>of</strong> <strong>the</strong><br />

arrest and FBI investigation. Fur<strong>the</strong>r details about Sabu’s arrest and his later appearance in a secret court hearing <strong>are</strong> laid out in<br />

chapter 26.<br />

Details about Cisco’s promotional tweet appearing on Twitter searches for LulzSec were sourced by my own observations and were<br />

corroborated by Cisco spokesman John Earnhardt, who said that LulzSec was a “term <strong>of</strong> interest” in <strong>the</strong> security industry. The day<br />

after I wrote a blog post on <strong>the</strong> promotion for Forbes, entitled “How Cisco Is Capitalizing on LulzSec Hackers’ Popularity” and<br />

published on June 15, 2011, <strong>the</strong> promotion disappe<strong>are</strong>d.<br />

Joseph K. Black, founder <strong>of</strong> <strong>the</strong> Black & Berg IT security company, most likely faked <strong>the</strong> attack on his own website. This assertion is<br />

based on interviews with Topiary, who said that no one in <strong>the</strong> group had hit or had planned to hit Black & Berg, and on interviews<br />

with Jennifer Emick, who spent some time investigating Black. I also base this conclusion on my opinion that Black is not a credible<br />

source. Cyber security and antivirus expert Rob Rosenberger wrote a column for SecurityCritics.org on February 15, 2011, in which<br />

he referred to Black as a “charlatan” whose activities until that point already “qualified as ‘unethical behavior’ done for shameless<br />

self-promotion.” The cyber security site attrition.org later wrote a damning indictment <strong>of</strong> Black on February 28, 2011, in an article<br />

entitled “Joseph K. Black: Social Media Experiment Gone Horribly Wrong,” which <strong>of</strong>fered <strong>the</strong> prediction that Black would never<br />

obtain his pr<strong>of</strong>essed dream job <strong>of</strong> “National Cybersecurity Advisor.” It posted screenshots <strong>of</strong> his Twitter feed from January <strong>of</strong> 2011,<br />

including tweets such as “I just did my 2nd line <strong>of</strong> coke and it’s only 4.15; WOW!” Ano<strong>the</strong>r tweet, directed toward Attrition itself,<br />

said, “Your [sic] just jealous that <strong>the</strong> Feds haven’t taken you <strong>of</strong>f <strong>the</strong> grid yet. Sucker.Im untouchable.I got <strong>the</strong> Feds in my pocket.Im<br />

comfy.” In October <strong>of</strong> 2011, Black was pursued by police in a thirty-five-minute car chase over four U.S. counties, after which he got<br />

out <strong>of</strong> his car holding a small dog and pointed his finger at <strong>the</strong> police, making shooting noises. He was promptly Tasered (source:<br />

“Omaha Man Caught after Early Morning Pursuit,” <strong>the</strong> North Platte Bulletin, October 31, 2011). By early 2012, Black & Berg had<br />

folded and Black had posted a photo <strong>of</strong> himself on an about.me <strong>We</strong>b page, where he listed himself as “Advisor to Anonymous and<br />

#Antisec operations.” In <strong>the</strong> photo, Black was standing in front <strong>of</strong> a mirror, wearing a hoodie, sunglasses, and a gold chain necklace.<br />

Black did not respond to a question e-mailed to him on <strong>the</strong> matter <strong>of</strong> his website’s defacement, or to an interview request. Ironically,<br />

in spite <strong>of</strong> <strong>the</strong> overwhelming evidence that <strong>the</strong> deface on Joseph K. Black’s website had been self-inflicted for publicity purposes,<br />

British prosecutors would later list an attack on Black & Berg among <strong>the</strong> charges against Jake Davis and three o<strong>the</strong>r young men<br />

associated with LulzSec.<br />

Details about o<strong>the</strong>r copycat <strong>hacker</strong> groups, such as LulzSec Brazil and LulzRaft, were sourced from <strong>the</strong> groups’ own Twitter feeds,<br />

announcements, and press reports, and from interviews with LulzSec members.<br />

Topiary’s statement “I’m starting to get quite worried some arrests might actually happen” was made in an interview with me.<br />

Chapter 22: The Return <strong>of</strong> Ryan, <strong>the</strong> End <strong>of</strong> Reason<br />

Details in this chapter about activities within LulzSec, dialogue about <strong>the</strong> disappearance <strong>of</strong> Sabu, and descriptions <strong>of</strong> Ryan were sourced<br />

from interviews with LulzSec’s founding members. Details about Topiary’s first call with Sabu were sourced from interviews with<br />

Topiary.<br />

The name David Davidson comes from <strong>the</strong> widely panned 2000 comedy film Freddy Got Fingered, starring Tom Green. It has <strong>of</strong>ten<br />

been used online as a joke name, but perhaps not enough to be considered an outright Internet meme.<br />

Ryan first rekindled his relationship with LulzSec’s members by <strong>of</strong>fering to let <strong>the</strong> group house its IRC network on his servers. This was<br />

a welcome <strong>of</strong>fer, although eventually <strong>the</strong> crew would be hopping between servers owned by AnonOps and <strong>the</strong> public IRC networks<br />

provided by EFnet, Rizon, and 2600.<br />

Topiary did not believe that <strong>the</strong> dox released for Ryan earlier that year by Evo was real. He also believed that <strong>the</strong> real Ryan was<br />

relatively safe, since Ryan claimed, for instance, to have his neighbor receive all his packages, which were addressed to a fake name<br />

anyway, before passing <strong>the</strong>m over to him, so that he never had to give out his real address.<br />

The Skype number 1-614-LULZSEC was <strong>of</strong>f at all times and redirected to ano<strong>the</strong>r Google number, which was also <strong>of</strong>fline and<br />

redirected instantly to <strong>the</strong> main Skype account that Topiary and Ryan were using. This account had been registered via a fake Gmail<br />

account on a random IP address.<br />

I have sourced <strong>the</strong> assertion that Assange was “chuckling” to himself from interviews with Topiary, who said that when he was first<br />

talking to Assange on IRC, Assange claimed that he and o<strong>the</strong>rs in WikiLeaks had “laughed” when <strong>the</strong>y heard about <strong>the</strong> DDoS attack<br />

on <strong>the</strong> CIA.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!