Mar 19, 2015 | Anonymous, Whistleblowers & Dissidents
Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article). Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local...
Mar 13, 2015 | Events & Assassinations, Whistleblowers & Dissidents
Aaron Swartz was a computer programmer and Internet activist who is often referred to as the third founder of Reddit. “”I don’t think I have any particular technical skills. I just got a really large head start.”” -Aaron Swartz Early Years Aaron...
Feb 25, 2015 | Black Technology, WAR: By Design
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit...
Feb 25, 2015 | Leaks, News
AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents...
Dec 11, 2014 | 2020 Relevant, Leaks, Whistleblowers & Dissidents
Barrett Brown is an American journalist, essayist and satirist. He is often referred to as an unofficial spokesperson for the hacktivist collective Anonymous, a label he disputes. He is credited with the creation of Project PM, a research outfit and information...
Dec 9, 2014 | Activism
Bryce Case, Jr., otherwise known as YTCracker, is a “former” cracker most known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in private industry at the age of 17. Bryce Case, Jr.,...
Dec 9, 2014 | Anonymous, Whistleblowers & Dissidents
Christopher Doyon Chris Doyon (alias “Commander X”), a self-described leader ‘within’ Anonymous, was arrested in September 2011 for a cyberattack on the website of Santa Cruz County, California. He jumped bail in February 2012 and fled across...
Dec 9, 2014 | Extra-Dimensional, Whistleblowers & Dissidents
Gary McKinnon (born 10 February 1966) is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the “biggest military computer hack of all time,”[2] although McKinnon himself – who has a diagnosis of Asperger’s Syndrome –...
Nov 13, 2014 | 2020 Relevant, Anonymous, News
Statement of Purpose I have been observing the hacker and hacktivist communities, at times very closely, for many years. The exact definition of “hacker” and “hacktivist” varies from author to author, so I shall make my interpretation of these words very clear. Let us...
Aug 15, 2014 | 2020 Relevant, Black Technology, Leaks
–[ 1 ]– Introduction I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out...
Oct 18, 2013 | Abuses of Power, Black Technology, News
Hackers Chris Valasek and Charlie Miller have demonstrated from the backseat of a Toyota Prius that all you need is a Macbook and a USB cable in order to hack into a computer-controlled car. Valasek is the director of security intelligence for IOActive and Miller is a...
Nov 21, 2012 | DCMX Radio, News
Anonymous statements on Gaza / Israel Conflict & Ceasefire Security researcher Andrew Aurenheimer found guilty of conspiracy and identity fraud in ‘hackless’ AT&T iPad breach Ex-navy SEAL & War Criminal Erik Prince sets trail for Chinese &...
Oct 31, 2012 | Activism
Are aliens real? One hacker who broke into US Military computers says yes, claiming that he found evidence of extraterrestrial life in the computer networks he broke into. Now, the United States is seeking extradition for breaching both military and NASA computer...
Oct 3, 2012 | DCMX Radio, News
DCMX Sound Effects Update~ Tribute to K-Rino with ‘Grand Deception’ National Detention Authorization Act (NDAA) Appeals Court Update Discussion Viruses, Hacking, Stuxnet & Flame – ZeroDay Exploits, Who is Building Them? Patriot Act Being Used to...
Oct 3, 2012 | News
Exploit sellers arm governments and businesses, but are they harming security for everyone else? Remember the final battle scene in Star Wars: A New Hope? Remember how Luke Skywalker slotted a bomb from his X-Wing down the Death Star’s exhaust port to blow the...
Sep 28, 2012 | Anonymous, Government Agenda
It is hard for me to express how much I appreciate your letter, which is the first I have received here, along with the support I’ve reportedly gotten from others so far. Before I forget, let me request that you also send a tweet of support to Jenna, @ElviraXMontana...
Sep 4, 2012 | Anonymous, Leaks, News
Anonymous has a way of releasing massive collections of information that raise many more questions than they answer. Case in point: On Monday night, the segment of the hacker group that calls itself Antisec announced that it had dumped 1,000,001 unique device...
Aug 23, 2012 | Black Technology, News
In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly...
Aug 14, 2012 | Activism, Video
EFF activists Trevor Timm and Parker Higgins explain how widespread drones are becoming, how they’ve already been hacked, and how the situation may get a lot worse before it gets better. ...
Aug 14, 2012 | Abuses of Power, Government Agenda
Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named...
Jul 11, 2012 | Anonymous
VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works. An SSH tunnel is often referred to as...
Jun 7, 2012 | Anonymous
UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently: I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this...
Jun 6, 2012 | Globalist Corporations, Government Agenda
Careless mistake reveals subversion of Windows by NSA? A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every...
May 28, 2012 | Anonymous, Leaks
You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency. Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that...
May 23, 2012 | Anonymous
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let’s...