31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“The government <strong>of</strong> Tunisia’s main sites <strong>are</strong> going to be hacked,” Tflow told Topiary. “Can you design <strong>the</strong> deface message?” Topiary felt<br />

an instant buzz. This was <strong>the</strong> first time anyone had trusted him with <strong>the</strong> knowledge that a hack was about to happen. Eager to help, he and<br />

Tflow discussed <strong>the</strong> timing <strong>of</strong> what <strong>the</strong>y referred to as <strong>the</strong> deface, and <strong>the</strong>n Topiary wrote his usual ominous message to <strong>the</strong> repressive<br />

Tunisian government.<br />

As <strong>the</strong> hack was happening and <strong>the</strong> deface message being uploaded, Topiary and Tflow went into <strong>the</strong> main AnonOps chat rooms and<br />

gave a running commentary <strong>of</strong> <strong>the</strong> attack, to inspire <strong>the</strong> troops a little.<br />

When it was all over, Tflow surprised Topiary again by inviting him into #InternetFeds. He was effectively trusting Topiary to collaborate<br />

and sh<strong>are</strong> ideas with some <strong>of</strong> <strong>the</strong> most highly skilled <strong>hacker</strong>s working with Anonymous. Topiary had been a stranger to <strong>the</strong>se people, but<br />

gradually he was getting <strong>the</strong>ir attention.<br />

Over <strong>the</strong> next month, much <strong>of</strong> Sabu’s hacking and Topiary’s writing would be at <strong>the</strong> forefront <strong>of</strong> Anonymous cyber attacks on <strong>the</strong><br />

governments <strong>of</strong> Libya, Egypt, Zimbabwe, Jordan, and Bahrain. Anonymous was not only defacing sites but releasing government e-mail<br />

addresses and passwords. Attacks also continued in o<strong>the</strong>r parts <strong>of</strong> <strong>the</strong> <strong>world</strong> in <strong>the</strong> name <strong>of</strong> Anonymous; two Irish <strong>hacker</strong>s defaced <strong>the</strong><br />

website <strong>of</strong> Ireland’s main opposition party, Fine Gael. It was a flurry <strong>of</strong> revolutionary activity that made Anonymous suddenly look less like a<br />

bunch <strong>of</strong> bored pranksters and more like real activists.<br />

Then on February 5, Tflow sent Topiary ano<strong>the</strong>r private message on AnonOps IRC, this time inviting him into an even more secret IRC<br />

channel that would include just a handful <strong>of</strong> core people from #InternetFeds. When Topiary entered <strong>the</strong> exclusive chat room, he forgot he had<br />

(as a joke) set a programming script to run on his IRC client that would kick anyone out <strong>of</strong> <strong>the</strong> room who didn’t use at least 80 percent capital<br />

letters. His first interaction with Sabu involved kicking him out <strong>of</strong> <strong>the</strong> chat room. Embarrassed, Topiary apologized and quickly turned <strong>of</strong>f <strong>the</strong><br />

script. But Sabu took it well, and <strong>the</strong> group <strong>of</strong> five—Topiary, Sabu, Kayla, Tflow, and Q—quickly got to talking. The topic was HBGary<br />

and Aaron Barr’s article in <strong>the</strong> Financial Times.<br />

Topiary couldn’t get his head around who or what Kayla was. He vaguely remembered seeing <strong>the</strong> name Kayla on his old MSN chat list, a<br />

2008 4chan flood, and articles about her on Encyclopedia Dramatica. In between lots <strong>of</strong> smiley faces and lols, she talked about hacking like it<br />

was an addiction. She couldn’t look at a website without checking to see if <strong>the</strong>re were holes in <strong>the</strong> source code that she could exploit, perhaps<br />

allowing her to steal a database or two. She was a conundrum: She seemed to be <strong>the</strong> chattiest, most happy-go-lucky person in <strong>the</strong> group, but<br />

she was also paranoid and app<strong>are</strong>ntly dangerous. She had developed a cast-iron protection for her real identity, and <strong>the</strong> bold admission that<br />

she was sixteen, along with <strong>the</strong> overwhelming number <strong>of</strong> emoticons and hearts (

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!