31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Descriptions <strong>of</strong> Ryan Mark Ackroyd were sourced from my observations <strong>of</strong> Ackroyd at his first court appearance, on March 16, 2012.<br />

Details about his younger sister, Kayleigh, were sourced from a directory search on Ryan Ackroyd’s name, which revealed <strong>the</strong> names<br />

<strong>of</strong> Ackroyd’s p<strong>are</strong>nts and siblings; <strong>the</strong> physical description <strong>of</strong> Kayleigh was sourced from her public Facebook account, as were <strong>the</strong><br />

comments she posted on her bro<strong>the</strong>r Keiron’s Facebook wall.<br />

The dates and basic details about <strong>the</strong> first and second arrests <strong>of</strong> Ryan Ackroyd were sourced from Metropolitan Police press releases for<br />

both incidents. Interview requests with <strong>the</strong> Metropolitan Police for fur<strong>the</strong>r details about Ryan Ackroyd and <strong>the</strong> Met investigation into<br />

Anonymous generally were denied.<br />

Details about <strong>the</strong> reaction in <strong>the</strong> Anonymous community to news that Sabu had been an informant for eight months were sourced from<br />

interviews with academic Gabriella Coleman, Jake Davis, and a handful <strong>of</strong> Anons, along with my observation <strong>of</strong> various Twitter<br />

feeds, blog posts, and comments on IRC channels frequented by Anonymous supporters.<br />

Glossary<br />

4chan: A popular online image board frequented by 22 million unique users a month. Originally billed as a place to discuss Japanese<br />

anime, it morphed into a meeting ground for <strong>the</strong> discussion <strong>of</strong> all manner <strong>of</strong> topics, including online pranks, or “raids,” against o<strong>the</strong>r<br />

websites or individuals (see chapters 2 and 3). A key feature is <strong>the</strong> forced anonymity <strong>of</strong> its users, who <strong>are</strong> thus able to post freely,<br />

fearing nei<strong>the</strong>r inhibition nor accountability.<br />

Anonymous: A name that refers to groups <strong>of</strong> people who disrupt <strong>the</strong> Internet to play pranks or as a means <strong>of</strong> protest. Derived from <strong>the</strong><br />

forced anonymity <strong>of</strong> users <strong>of</strong> <strong>the</strong> image board 4chan, it has evolved over <strong>the</strong> last five years to become associated with high-pr<strong>of</strong>ile<br />

cyber attacks on companies and government agencies. With no clear leadership structure or rules <strong>of</strong> membership, it exists as a fluid<br />

collective <strong>of</strong> people who follow a loose set <strong>of</strong> principles derived from <strong>the</strong> 47 Rules <strong>of</strong> <strong>the</strong> Internet. The wider collective takes on<br />

various guises, depending on whoever happens to be endorsing <strong>the</strong> name at <strong>the</strong> time—e.g., <strong>the</strong> Chanology organizers <strong>of</strong> 2008 (see<br />

chapter 5) and <strong>the</strong> LulzSec <strong>hacker</strong>s <strong>of</strong> 2011 (see chapter 17).<br />

Antisec (Anti Security): A cyber movement started in <strong>the</strong> early 2000s in which black hat <strong>hacker</strong>s campaigned to end <strong>the</strong> system <strong>of</strong> “full<br />

disclosure” among IT security pr<strong>of</strong>essionals, <strong>of</strong>ten by attacking those same white hat pr<strong>of</strong>essionals. LulzSec revived <strong>the</strong> movement in<br />

<strong>the</strong> summer <strong>of</strong> 2011, with <strong>the</strong> vague goal <strong>of</strong> attacking government agencies and figures <strong>of</strong> authority in a sometimes superficial effort<br />

to expose corruption.<br />

/b/: The most popular board on 4chan, visited by about a third <strong>of</strong> <strong>the</strong> site’s users. /b/ was originally billed as <strong>the</strong> site’s “random” board<br />

by 4chan creator Christopher “moot” Poole. It ended up serving as a blank slate on which a host <strong>of</strong> creative Internet memes, such as<br />

Lolcats, were born, and is widely considered to be <strong>the</strong> birthplace <strong>of</strong> <strong>the</strong> Anonymous “hive-mind.” Many Anonymous supporters say<br />

<strong>the</strong>y first found Anonymous through /b/. It is infamous for its lack <strong>of</strong> moderators.<br />

Black hat: Someone who uses knowledge <strong>of</strong> s<strong>of</strong>tw<strong>are</strong> programming for malicious means, such as defacing a website or stealing<br />

databases <strong>of</strong> personal information for <strong>the</strong> purpose <strong>of</strong> selling it to o<strong>the</strong>rs. A black hat is also referred to as a “cracker.”<br />

Botnet: A network <strong>of</strong> so-called zombie computers that have been brought toge<strong>the</strong>r by spreading a virus or links to bogus s<strong>of</strong>tw<strong>are</strong><br />

updates. Botnets can be controlled by one person, who can order thousands, sometimes millions, <strong>of</strong> computers to carry out <strong>We</strong>bbased<br />

commands en masse.<br />

Chanology: Also known as Project Chanology, this is <strong>the</strong> series <strong>of</strong> cyber attacks, protests, and pranks conducted by supporters <strong>of</strong><br />

Anonymous throughout most <strong>of</strong> 2008 against <strong>the</strong> Church <strong>of</strong> Scientology, <strong>the</strong> name being a portmanteau <strong>of</strong> “4chan” and<br />

“Scientology.”<br />

DDoS (Distributed Denial <strong>of</strong> Service): An attack on a website or o<strong>the</strong>r network resource carried out by a network <strong>of</strong> computers that<br />

temporarily knocks <strong>the</strong> site <strong>of</strong>fline by overwhelming it with junk traffic. The attack can be carried out by a network <strong>of</strong> volunteers<br />

behind each computer (see “LOIC”) or a network whose computers have been hijacked to become part <strong>of</strong> a botnet.<br />

Deface: When used as a noun, this term refers to <strong>the</strong> image and text that is published on a site that has been hacked, announcing that it is<br />

a target and <strong>the</strong> reason it has been attacked. When used as a verb, it means to vandalize a website.<br />

Dox: When used as a verb, this term refers to <strong>the</strong> act <strong>of</strong> unearthing personal details, such as real names, phone numbers, and home<br />

addresses, usually through Google or social engineering. The resultant information is a person’s “dox.” Doxing is <strong>of</strong>ten thrown<br />

around as a threat in Anonymous and among <strong>hacker</strong> communities, which <strong>are</strong> inhabited by online personalities who use nicknames<br />

and almost never reveal <strong>the</strong>ir true identities.<br />

Encyclopedia Dramatica: A website that chronicles much <strong>of</strong> <strong>the</strong> goings-on in Anonymous, including Internet memes, 4chan language,<br />

and online discussions among <strong>the</strong> more popular users <strong>of</strong> various blogs and IRC networks. The site is almost a parody <strong>of</strong> Wikipedia; it<br />

has <strong>the</strong> same look and is also edited by users, but its style is irreverent, pr<strong>of</strong>ane, and occasionally nonsensical, filled with in jokes and<br />

links to o<strong>the</strong>r ED entries that only <strong>inside</strong>rs can understand.<br />

Hacker: A loosely defined term that, in <strong>the</strong> context <strong>of</strong> Anonymous, refers to someone who has <strong>the</strong> technical skills to break into a<br />

computer network (see “black hat” and “white hat”). Generally speaking, <strong>the</strong> term can refer to a computer programming enthusiast or<br />

hobbyist who enjoys tinkering with internal systems and creating shortcuts and new systems.<br />

Hacktivist: A portmanteau derived from “<strong>hacker</strong>” and “activist,” it refers to someone who uses digital tools to help spread a political or<br />

sociological message. Among <strong>the</strong> more illegal methods used <strong>are</strong> DDoS attacks, website defacements, and <strong>the</strong> leaking <strong>of</strong> confidential<br />

data.<br />

Image board: An online discussion forum with loose guidelines in which users <strong>of</strong>ten attach images to help illustrate <strong>the</strong>ir comments.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!