31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>the</strong>m that he was back. Topiary at first didn’t c<strong>are</strong> that Sabu might have been lying—he was just glad to speak to him again. Not long after,<br />

Sabu changed his story and said that it had actually been <strong>the</strong> anniversary <strong>of</strong> his grandmo<strong>the</strong>r’s death. When <strong>the</strong>y had first spoken, Sabu had<br />

probably changed his voice deliberately to make his story sound more genuine. By <strong>the</strong>n, <strong>the</strong> FBI was logging everything that Sabu said<br />

online to LulzSec’s members, as well as everything he said on <strong>the</strong> phone to Topiary.<br />

Sabu would end up being <strong>of</strong>fline more than usual for <strong>the</strong> next few days as he began collaborating with <strong>the</strong> FBI, even working out <strong>of</strong> <strong>the</strong>ir<br />

<strong>of</strong>fice on a daily basis. Sabu occasionally kept his group abreast <strong>of</strong> o<strong>the</strong>r developments, but <strong>the</strong> still oblivious Topiary took more<br />

responsibility for <strong>the</strong> team.<br />

As a precaution, Topiary deleted more files, <strong>the</strong>n he redid all his passwords and encryptions to make <strong>the</strong>m ultra-protected. He kept all<br />

passwords in a file on an encrypted SD card, with one character in each swapped around. Only he knew which characters were swapped.<br />

Still, he couldn’t help constantly looking outside his window and jumping whenever a van drove past. For <strong>the</strong> first time, he started seriously<br />

wondering if a couple <strong>of</strong> men in police uniforms would splinter his door at dawn <strong>the</strong> next morning.<br />

A few days earlier when he had been out to buy some food, one <strong>of</strong> <strong>the</strong> local druggies had approached Topiary on his way home. “Hey,”<br />

<strong>the</strong> man had said, waving as Topiary took out his earbuds.<br />

“There were some police knocking on your door <strong>the</strong> o<strong>the</strong>r day,” <strong>the</strong> man said in a thick Scottish accent. Topiary’s heart had started to<br />

pound.<br />

“Really. What did <strong>the</strong>y do?”<br />

“They drove by in <strong>the</strong>ir car. Then a couple <strong>of</strong> <strong>the</strong>m came out and knocked on your door, but <strong>the</strong>re was no answer,” he said, shrugging.<br />

Topiary played it cool. The druggie might have been lying, but <strong>the</strong> police might also have stopped by while he was at his thinking spot,<br />

looking over <strong>the</strong> sea. And it was just as likely that <strong>the</strong>y were doing a drug sweep <strong>of</strong> <strong>the</strong> <strong>are</strong>a. Still, he resolved to wipe every shred <strong>of</strong> Topiary<br />

and Anonymous from his laptop, encrypt whatever he kept, and send it to all to himself in an e-mail via Hushmail. Eventually he would wipe<br />

his laptop completely.<br />

If <strong>the</strong> police came to his door, <strong>the</strong>y’d find a clean house with one r<strong>are</strong>ly used desktop computer and his innocuous-looking Dell laptop, a<br />

couple <strong>of</strong> extra monitors for watching films, and one phone line going over his living room with clips. None <strong>of</strong> <strong>the</strong> empty pizza boxes<br />

associated with basement-dwelling <strong>hacker</strong>s. Any documents <strong>the</strong> police might find about Anonymous on ei<strong>the</strong>r <strong>of</strong> his computers could be<br />

passed <strong>of</strong>f as research Topiary was doing for a book. They’d find some pirated music and a handful <strong>of</strong> databases holding a few hundred<br />

thousand names and passwords he had acquired from acquaintances or from his own scanning for LulzSec. Topiary called it his personal<br />

collection. Sometimes he used it for his own attempts at doxing people, but for <strong>the</strong> most part it was just nice to have.<br />

He tried not to think that his virtual private network provider, HideMyAss, would ever turn him in to <strong>the</strong> authorities. His logic was that if<br />

customers <strong>of</strong> HideMyAss ever found out <strong>the</strong> company had turned in one <strong>of</strong> its users, <strong>the</strong>y’d leave in droves, and HideMyAss would go out <strong>of</strong><br />

business. They would surely never give him up.<br />

As Sabu remained <strong>of</strong>fline on <strong>the</strong> pretext <strong>of</strong> dealing with family matters, a familiar face came back into <strong>the</strong> LulzSec fold: Ryan. It made little<br />

sense at first, considering Ryan’s temperamental behavior in <strong>the</strong> past and his cyber attacks on <strong>the</strong> LulzSec communication channels, but that<br />

was <strong>hacker</strong> life for you. Even <strong>the</strong> most explosive <strong>of</strong> disputes could be remedied when someone needed something. In this case Ryan needed<br />

some friends, and LulzSec could use Ryan’s mammoth botnet, which infected computers via a rogue Facebook app. Ryan was well<br />

connected in <strong>the</strong> underground <strong>hacker</strong> scene and served as an administrator <strong>of</strong> Pastebin, <strong>the</strong> text application tool that LulzSec used to publish<br />

all its leaks, and Encyclopedia Dramatica. Ryan was like <strong>the</strong> kid in school that people didn’t necessarily like but whom <strong>the</strong>y were compelled<br />

to befriend because he had a brand-new Hummer and a house with a pool. Ryan wasn’t rich in real life, but online he seemed loaded; he had<br />

spent years building up an impressive array <strong>of</strong> assets, from servers to his botnet. His servers helped host Encyclopedia Dramatica, and after he<br />

had reconnected with a member <strong>of</strong> <strong>the</strong> LulzSec crew in <strong>the</strong> previous week, <strong>the</strong>y also hosted LulzSec’s new IRC network, lulzco.org.<br />

After Topiary first reconnected with Ryan on IRC, he wanted to hear what <strong>the</strong> new ally sounded like in voice to better suss him out, so <strong>the</strong><br />

two became contacts on Skype. When Ryan’s voice came through, his English accent was so strong, he sounded almost Australian. Ryan<br />

spoke at a rapid-fire pace, openly bragging about his botnet, his hacking, and how he was making money on <strong>the</strong> underground; he littered his<br />

prose with swearwords <strong>the</strong>n described at great length a farmhouse-bread ham sandwich his mo<strong>the</strong>r had once made him. Ryan seemed pretty<br />

unhinged and insecure, but Topiary’s opinion <strong>of</strong> him s<strong>of</strong>tened when he explained why he’d leaked hundreds <strong>of</strong> names from AnonOps<br />

months before. The network operators had been hassling him, and <strong>the</strong>n someone else had ga<strong>the</strong>red all <strong>the</strong> data and given it to him to leak. It<br />

was water under <strong>the</strong> bridge. Oh, he added, and that dox <strong>of</strong> his full name, address, and phone number that had been posted online? That was<br />

based on fake information he had created four years ago. Ryan assured Topiary that he had made <strong>the</strong> false documents and spread <strong>the</strong>m<br />

everywhere so that his real information would remain hidden.<br />

Topiary figured he could tell when someone was bullshitting, especially when it was in voice. Ryan, he believed, was genuine. In fact,<br />

Topiary started to feel sorry for <strong>the</strong> guy. People on AnonOps had accused Ryan <strong>of</strong> being a perpetually angry cretin who logged and attacked<br />

everything. But he wasn’t really angry; he was just passionate. Perhaps he came across as rude, but he worked hard and got into things,<br />

Topiary thought. With Sabu gone, Topiary missed having someone passionate and a little crazy to talk to, to counteract his laid back<br />

personality.<br />

Ryan promised not to log any <strong>of</strong> <strong>the</strong> chats, and said he would give <strong>the</strong> LulzSec crew complete control over his logging ability. He also said<br />

<strong>the</strong> team could use his botnet any time <strong>the</strong>y wanted. He had used it in <strong>the</strong> past to prank DDoS sites <strong>of</strong> <strong>the</strong> U.S. Air Force and <strong>the</strong>n call <strong>the</strong>m<br />

afterward to mock <strong>the</strong>m. He could also make hundreds <strong>of</strong> dollars a day by subletting <strong>the</strong> botnet to o<strong>the</strong>rs who wanted to use it for nefarious<br />

purposes like extortion and <strong>hacker</strong> skirmishes. But LulzSec could use it for free. This was like fresh meat to a ravenous dog: with Ryan’s<br />

botnet, LulzSec could bring down almost any website it wanted at <strong>the</strong> drop <strong>of</strong> a hat.<br />

During one <strong>of</strong> Sabu’s occasional drop-ins on IRC, he mentioned to Topiary that he did not like having Ryan as a supporter. LulzSec was<br />

making too many contacts, he added. (It is unclear if this was <strong>the</strong> case, or why that might have concerned him now that he had started<br />

working as an FBI informant.) Topiary argued back that Sabu himself had been inviting his trusted associates into #pure-elite, including log<br />

leaker M_nerva. Topiary won <strong>the</strong> argument, and Ryan stayed. With Sabu mostly away now, Topiary was enjoying <strong>the</strong> funnier side <strong>of</strong> what<br />

LulzSec could do with its growing stable <strong>of</strong> Twitter followers. After he released <strong>the</strong> administrative passwords <strong>of</strong> fifty-five porn sites and<br />

twenty-six thousand porn passwords, he got replies from people on Twitter saying <strong>the</strong>y had used <strong>the</strong> data dump to hack into o<strong>the</strong>r people’s e-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!