31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The group went on to spam <strong>the</strong> room with cryptic messages like: “Charlie is c85 on excess, rootlog <strong>the</strong> daisy chain and fuzz out dawn<br />

mode.”<br />

Lying was so common in Anonymous that people were r<strong>are</strong>ly surprised to hear different versions <strong>of</strong> events, or to find out that <strong>the</strong><br />

nickname <strong>the</strong>y thought <strong>the</strong>y were talking to was being hijacked by someone else. There was a constant suspension <strong>of</strong> disbelief and skepticism<br />

about almost everything. Even when people pr<strong>of</strong>essed genuine admiration for someone or for <strong>the</strong> ops that were taking place on PayPal and<br />

MasterCard, <strong>the</strong>ir opinions could change just days later. It wasn’t that people in Anonymous were shallow or that <strong>the</strong>re was little value to<br />

<strong>the</strong>ir experiences—it was just that events and relationships on <strong>the</strong> Internet moved far more quickly and dramatically than in real life. The data<br />

input for Anons could be overwhelming, and <strong>of</strong>ten <strong>the</strong> result was detachment—from emotions, from morals, and from aw<strong>are</strong>ness <strong>of</strong> what<br />

was really going on. But <strong>the</strong>re was one truth in particular that at least a dozen Anons would later regret ignoring. It was about LOIC. Not<br />

only was <strong>the</strong>ir all-important weapon useless against big targets like PayPal, it could lead <strong>the</strong> police straight to <strong>the</strong>ir doors.<br />

Chapter 8<br />

<strong>We</strong>apons that Backfired<br />

When nearly eight thousand people had rushed into <strong>the</strong> main AnonOps IRC channel on December 8, eager to avenge WikiLeaks, <strong>the</strong> dozen<br />

or so operators in #command were stunned and <strong>the</strong>n overwhelmed. Hundreds had been clamoring for direction, and <strong>the</strong> obvious one was to<br />

download and use LOIC. The operators made sure that at <strong>the</strong> top <strong>of</strong> <strong>the</strong> main chat channels <strong>the</strong>re was a link to downloading <strong>the</strong> program,<br />

along with a document explaining how to use it.<br />

But no one knew for sure if LOIC was safe. There were rumors that LOIC was tracking its users, that <strong>the</strong> feds were monitoring it, or that it<br />

carried a virus. More confusingly, <strong>the</strong> LOIC that Anons were downloading in droves during Operation Chanology three years ago was very<br />

different from <strong>the</strong> LOIC that <strong>the</strong>y were downloading now for Operation Payback. In <strong>the</strong> fast-moving <strong>world</strong> <strong>of</strong> open source s<strong>of</strong>tw<strong>are</strong>,<br />

developers were tweaking things all <strong>the</strong> time, and <strong>the</strong>re was no one deciding if <strong>the</strong>y should be helping or hindering Anonymous. One person<br />

who took a closer look at LOIC realized it was doing <strong>the</strong> latter.<br />

Around <strong>the</strong> same time that <strong>the</strong> PayPal attacks were getting under way, a highly skilled s<strong>of</strong>tw<strong>are</strong> developer hopped onto AnonOps IRC for<br />

<strong>the</strong> first time. The programmer, who did not want to reveal his nickname or real name, had worked with WikiLeaks in <strong>the</strong> past and was keen<br />

to help attack its detractors. When he downloaded LOIC from <strong>the</strong> link at <strong>the</strong> top <strong>of</strong> <strong>the</strong> main chat channels, he thought to look at <strong>the</strong><br />

program’s source code.<br />

“I took it apart,” he said, “and it looked like shit.”<br />

The big problem was that <strong>the</strong> application was sending junk traffic directly from users’ IP addresses. It did nothing to hide <strong>the</strong>ir computer in<br />

<strong>the</strong> network. This meant <strong>the</strong> people who used LOIC without also using anonymizing s<strong>of</strong>tw<strong>are</strong> or a proxy server were just asking to get<br />

arrested.<br />

The programmer quickly sent private messages to a few <strong>of</strong> <strong>the</strong> operators and let <strong>the</strong>m know his concerns, asking <strong>the</strong>m to remove <strong>the</strong> LOIC<br />

link at <strong>the</strong> top <strong>of</strong> <strong>the</strong> channel. About half <strong>of</strong> <strong>the</strong>m agreed—but <strong>the</strong> o<strong>the</strong>r half refused. According to <strong>the</strong> programmer, <strong>the</strong> operators who<br />

refused didn’t understand <strong>the</strong> technology behind LOIC. Making things more complicated was <strong>the</strong> range <strong>of</strong> operators, all <strong>of</strong>fering different<br />

interpretations <strong>of</strong> LOIC on <strong>the</strong> chat network. AnonOps had different levels <strong>of</strong> operators—network operators at <strong>the</strong> top, and channel operators<br />

below <strong>the</strong>m. The channel operators were like middle managers, with <strong>the</strong> ability to kick people out <strong>of</strong> channels with a few simple commands.<br />

One young female student who went by <strong>the</strong> nickname No managed to work her way up to channel operator by <strong>the</strong> time <strong>of</strong> <strong>the</strong> PayPal<br />

attacks, and she became known for banning people from <strong>the</strong> main #operationpayback channel if <strong>the</strong>y tried to tell o<strong>the</strong>rs not to use LOIC.<br />

(Ironically, police ended up tracking down No and arresting her a few months later because she had used LOIC.)<br />

New volunteers and operators alike also assumed <strong>the</strong>re was safety in numbers. Anonymous, as <strong>the</strong> saying went, was everyone and no one.<br />

“Can I get arrested for doing this?” a person called funoob asked in <strong>the</strong> #setup channel on December 8.<br />

“Nah, <strong>the</strong>y won’t arrest you,” answered someone called Arayerv. “Too many people. You can say you have spyw<strong>are</strong>. They can’t charge<br />

you.”<br />

Ano<strong>the</strong>r called whoc<strong>are</strong>s concurred: “If you get arrested just say you don’t know but it’s probably a virus.”<br />

“I hope in a way to get arrested,” one called isuse joked. “The trial would be hilarious.” (Those who did go to trial for using LOIC later on<br />

most likely don’t agree.)<br />

“They honestly believed that because <strong>of</strong> <strong>the</strong> amount <strong>of</strong> people it would be impossible to prosecute any single individual,” <strong>the</strong> programmer<br />

later remembered. “No one talked about prosecutions. They didn’t want to hear about your IP being exposed or anything like that.” And <strong>the</strong><br />

overwhelming sense <strong>of</strong> camaraderie and accomplishment dominated reasonable argument. The <strong>world</strong>’s media were paying attention to<br />

Anonymous and its extraordinary hive mind; <strong>the</strong> last thing <strong>the</strong>y needed was to start fiddling with <strong>the</strong> technology <strong>the</strong>y were relying on and<br />

slowing things down.<br />

Even when Dutch police swiftly arrested sixteen-year-old AnonOps IRC operator Jeroenz0r and nineteen-year-old Martijn “Awinee”<br />

Gonlag on December 8 and 11, 2010, people on AnonOps initially didn’t believe it.<br />

“BS, no one is getting arrested,” said a user called Blue when links to <strong>the</strong> arrest stories started getting passed around. Then, when more<br />

articles about <strong>the</strong> arrests started appearing online, a flood <strong>of</strong> new Dutch supporters poured into AnonOps. There were so many that a new<br />

channel was started to host <strong>the</strong>m all, called #dutch.<br />

Around December 13, a r<strong>are</strong> digital flyer was released warning anyone who had recently used LOIC that <strong>the</strong>y were at “high risk” <strong>of</strong> arrest<br />

and needed to delete all chat logs. The organizer shitstorm said: “Ridiculous. This is an obvious ploy to try and sc<strong>are</strong> people away.”<br />

“It’s a troll,” ano<strong>the</strong>r organizer told Panda Security’s Correll.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!