12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“CHAOTIC” BEGINNINGS: THE CHAOS COMPUTER CLUB, CCC69legions of Anons originated here (as well as those who later joined from other forums andIRCs) were often less-skilled hackers. Their activism is for the current select cause; their contributionis their computer power as they provide bandwidth <strong>to</strong> a larger DDoS attack. However,from this mass of supporters, IRC- and system administra<strong>to</strong>rs form an intermediatelevel in the Anonymous hierarchy. These people are knowledgeable with information technologyand often moonlight as hackers. In May 2011, the modera<strong>to</strong>r of an Anonymous IRCchannel <strong>to</strong>ok control of the servers that hosted the collective’s IRC network, redirected some“AnonOps” domain names, launched a denial of service attack against the IRC servers, andpublished the IP-addresses of everyone connected <strong>to</strong> those servers. 4 So far, a group of peopleemploying user names like “Owen,” “shits<strong>to</strong>rm,” “blergh,” “power2all,” and “Nerdo” hasmaintained the servers, paid the bills, registered the domain names, and moderated the IRCssomewhat. 5 Ryan stated his coup was motivated by his concerns over private decision makingon the part of “Owen” and the other leaders. Increasingly, it appeared that important operationswere decided upon and planned in invite-only chats. 6 Lastly, it can be fathomed thatAnonymous, like other social movements, has a considerable amount of sympathizers, whodo not spend much time on IRC channels, but share the proclaimed ideals. They may downloadthe LOIC (Low Orbit Ion Cannon) <strong>to</strong> aid in the DDoS attack against Tunisian governmentWeb sites only, but refrain from any further participation in the future.The rest of this chapter is organized as follows. After outlining the origins and the “membership”of the collective, we attempt <strong>to</strong> describe the motivations that drive Anons <strong>to</strong> act ona certain target as well as their most common modus operandi of a DDoS attack. In the casewhere self-professed members of the collective find it (for whatever reason) necessary <strong>to</strong> exposethe target or affiliated individuals, they conduct cyber-exploitation operations. These may employother <strong>to</strong>ols, such as SQL injection, <strong>to</strong> capture personal or confidential data in order <strong>to</strong> publishit later on Pastebin. Over time, the collective morphed from the boundary transgressinghive-mind of random ac<strong>to</strong>rs <strong>to</strong> an organization that collaborates with hacker groups worldwide—providedthey pursue a shared goal. During its his<strong>to</strong>ry, the Anonymous collective gavebirth <strong>to</strong> smaller entities that emphasize either certain aspects of the original Anonymous motivationor redefined its targets. Eventually, the collective s<strong>to</strong>od <strong>to</strong> absorb the remnants of thesespin offs as their smaller, more structured organization proved <strong>to</strong> be their weakest point. Thechapter will conclude with the account of select examples of Anonymous’ hacking activities,which help <strong>to</strong> illustrate the movement’s multifaceted, multifactional character. The study ofAnonymous and related groups is likely going <strong>to</strong> gain importance in the study of cyber warfare.The presence of politically motivated hacking groups with an apparent core of highly skilled ITpersonnel, in addition <strong>to</strong> their global distribution and ability <strong>to</strong> mass computing resources in anattack, make this kind of organization rather formidable. Further, the political motivations andwillingness <strong>to</strong> conduct operations against government and military-affiliated Web sites certainlydraws them in<strong>to</strong> the fray of cyber war.“CHAOTIC” BEGINNINGS: THE CHAOS COMPUTER CLUB, CCCAccording <strong>to</strong> a hacker known as Commander X, Anonymous’ direc<strong>to</strong>rate formed itself fromthe Chaos Computer Club (CCC). 7 The CCC looks back on a 25-year his<strong>to</strong>ry and is <strong>to</strong>day thelargest European hacker conglomerate with its main headquarters in Hamburg, Germany. 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!