31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

nude photos. Four years later, an eighteen-year-old <strong>hacker</strong> got <strong>the</strong> password credentials for President Obama’s <strong>of</strong>ficial Twitter account.<br />

Ano<strong>the</strong>r <strong>hacker</strong> got photos <strong>of</strong> Hannah Montana. The forum was a place where crackers could trade ever more ambitious bragging rights, a<br />

place where a person could get in touch with spammers (also known as Internet marketers) and sell a stolen database or two.<br />

YTCracker didn’t like Anonymous because he didn’t like <strong>the</strong> way innocent people got caught in <strong>the</strong> crossfire. It had happened to him. In<br />

March <strong>of</strong> 2011, a few <strong>hacker</strong>s on his forum, including one named Xyrix, attacked his site for no reason o<strong>the</strong>r than that he hosted some <strong>of</strong><br />

<strong>the</strong>ir enemies. To get his administrative access, <strong>the</strong>y called AT&T and reported YTCracker’s phone stolen, got a new phone and SIM card,<br />

and were able to grab his Gmail password. From that <strong>the</strong>y were able to hack into <strong>the</strong> Digital Gangsters forum, <strong>the</strong>n deface it with a message<br />

that said it had been “hacked by Kayla, a 16-year-old girl.”<br />

Here’s where Emick stumbled into a <strong>world</strong> <strong>of</strong> confusion. Kayla was described as a twenty-three-year-old on this site, but she had read an<br />

Encyclopedia Dramatica article saying that back in 2008, “Xyrix posed as a woman using <strong>the</strong> name ‘Kayla’ on <strong>the</strong> Partyvan network.” Xyrix<br />

was widely known to be a heavyset twenty-four-year-old man from New Jersey named Corey Barnhill. Emick thought, incorrectly, that this<br />

meant Kayla was Barnhill.<br />

Kayla had an explanation for why everyone thought she was Xyrix: back in 2008, she had hacked his main web account and pretended to<br />

be him to get information out <strong>of</strong> a Partyvan admin; <strong>the</strong> admin <strong>the</strong>n mistakenly thought that Xyrix and Kayla were <strong>the</strong> same person and added<br />

her into Xyrix’s Encyclopedia Dramatica page. The “hacked by Kayla, a 16-year-old girl” deface on YTCracker’s site may well have been<br />

Xyrix taking advantage <strong>of</strong> that misunderstanding to try to humiliate YTCracker.<br />

Emick was going down <strong>the</strong> wrong path with Kayla, but she still felt she was onto something. She started spending more time on <strong>the</strong>se<br />

forums, piecing toge<strong>the</strong>r nicknames, fake identities, and false information, being led down new trails. While many <strong>hacker</strong>s varied <strong>the</strong>ir<br />

nicknames, a lust for credibility compelled many more to stay with one name. In many cases, all Emick needed to do was plug a nickname<br />

into Google, search for it against forums like DG and Reddit, and <strong>the</strong>n talk to a few <strong>of</strong> that person’s friends on IRC. She used note-taking<br />

s<strong>of</strong>tw<strong>are</strong> to cross-reference everything.<br />

“You have to be anal retentive,” she later explained. Soon she had amassed gigabytes <strong>of</strong> data on her computer and had enough to put real<br />

names, even addresses, to a few Anons.<br />

Emick felt an urgency to turn her research into something that would better Barr’s faulty approach. Beating Barr at his own game became a<br />

personal challenge. Realizing she would need help, she began talking to an online friend from her old Chanology days about forming an anti-<br />

Anonymous tag team.<br />

Jin Soo Byun was a twenty-six-year-old security penetration tester who had once been an air force cryptologist but had retired when he<br />

was caught in an IED roadside bombing in Iraq. The accident left him with serious brain damage and memory loss, but he threw himself into<br />

<strong>the</strong> 2008 Chanology protests and built up a reputation for social engineering under <strong>the</strong> nicknames Mudsplatter and Hubris. He and Emick<br />

served as administrators on Laurelai’s website, and <strong>the</strong> pair developed a friendship via Skype, instant-message chats, and phone calls. Often<br />

<strong>the</strong>y would just gossip about <strong>the</strong> hacking scene, taking pleasure in trash-talking <strong>the</strong>ir enemies.<br />

Emick told Byun about her plan. Anonymous had become an almost unstoppable mob. “Someone needs to stop <strong>the</strong>m before something<br />

bad happens,” she told him. He was game. For a few years, Emick and Byun had talked about starting a digital security company that used<br />

Byun’s technology expertise and Emick’s investigative skills. Now <strong>the</strong>y had something to work with, what Emick was calling a<br />

“psychological operation.”<br />

Byun reached out to friends in <strong>the</strong> cyber security industry, ga<strong>the</strong>ring about six people who were willing to help <strong>the</strong>ir research. Among<br />

<strong>the</strong>m was Aaron Barr.<br />

“Right away after helping <strong>the</strong> [FBI] investigation I wanted to understand <strong>the</strong> group even more,” he later explained. “Especially <strong>the</strong> ones<br />

that attacked us.”<br />

They needed to act quickly. Anonymous was being riled up to attack Sony, and to make matters worse, HBGary had made <strong>the</strong>m feel <strong>the</strong>y<br />

were unstoppable.<br />

They decided to call <strong>the</strong>ir group Backtrace Security, a name that came straight out <strong>of</strong> <strong>the</strong> 4chan-meme machine. It referred to <strong>the</strong> Jessi<br />

Slaughter incident, when /b/ users had viciously trolled a young girl who had been posting videos <strong>of</strong> herself on YouTube, leading her<br />

mustachioed fa<strong>the</strong>r to launch a tirade into her webcam—which she <strong>the</strong>n uploaded. Choice quotes such as “I know who it’s coming from!<br />

Because I backtraced it!” along with “Ya done go<strong>of</strong>ed!” and <strong>the</strong> “cyber police” all became memes. Sarcastically using <strong>the</strong> word backtrace<br />

was meant to infuriate Anonymous because it was reclaiming one <strong>of</strong> <strong>the</strong>ir <strong>inside</strong> jokes.<br />

Emick got everyone connected to a spreadsheet that <strong>the</strong>y could all edit. A chat bar ran alongside it for discussing <strong>the</strong>ir work in real time.<br />

She provided a long list <strong>of</strong> nicknames from AnonOps IRC that <strong>the</strong>y would dox. Everyone picked nicknames at random, <strong>the</strong>n delved into<br />

finding <strong>the</strong>ir true identities. Sometimes someone in <strong>the</strong> group would get a tip-<strong>of</strong>f that would lead him to add a new name to <strong>the</strong> list. Barr<br />

joined in <strong>the</strong> online discussions too, sharing general information about Anonymous that he had gleaned from his research. The most timeconsuming<br />

task was sifting through <strong>the</strong> compiled data. Emick and <strong>the</strong> o<strong>the</strong>rs downloaded reams <strong>of</strong> information, but picking through it took<br />

days.<br />

Once her kids were out <strong>the</strong> door and on <strong>the</strong> school bus, Emick was rooted to her desk, sometimes for <strong>the</strong> next eighteen hours or until her<br />

concentration flagged. She skipped lunch and <strong>of</strong>ten got <strong>the</strong> kids to cook dinner. They ate a lot <strong>of</strong> pizza. Emick said her kids were supportive,<br />

though she didn’t let <strong>the</strong>m know what she was up to most <strong>of</strong> <strong>the</strong> time. She raised <strong>the</strong>m to be self-reliant. Emick was <strong>the</strong> oldest <strong>of</strong> five kids,<br />

and her fa<strong>the</strong>r and stepmo<strong>the</strong>r had been alcoholics who largely left her to cook, do laundry, and pay household bills. Although her dad<br />

sometimes cooked, her stepmom r<strong>are</strong>ly left <strong>the</strong> couch.<br />

Emick worked from a seven-foot-wide custom-built desk that was tucked in a corner <strong>of</strong> her divided living room. On it were her phone,<br />

notebooks, files, lamps, a box <strong>of</strong> Christmas cards from <strong>the</strong> last holiday season, and two computers. One was a laptop that ran on Linux, <strong>the</strong><br />

open-sourced operating system, which she used for chatting on IRC. She needed two PCs for when she was pretending to be two people in<br />

chat channels at <strong>the</strong> same time or tweeting on more than one Twitter account. Her main one was @FakeGreggHoush. When she snooped on<br />

AnonOps and tried to weed out information, eagle-eyed operators noticed her nickname and attempted to identify her IP address. Each<br />

computer worked <strong>of</strong>f a proxy server that put her in two different time zones to prevent <strong>the</strong>m from getting a location match.<br />

Many names on Emick’s list only took about ten or twenty minutes to track down. Some Anons were reusing <strong>the</strong>ir nicknames on sites like

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!