Matt DeHart – Military, Programmer, Activist

Matt DeHart – Military, Programmer, Activist

The case of Matt DeHart, a former U.S. drone pilot turned hacktivist, is as strange as it is disturbing. The 29-year-old was recently denied asylum in Canada, having fled there with his family after — he claims — he was drugged and tortured by agents of the FBI, who accused him of espionage and child pornography.

Prosecutors have shown they’re willing to say anything to convict a hacktivist, even if it means lying

Last week the Canadian Border Services Agency said he will be deported to the U.S. to stand trial “in very short order,” after a Canadian Immigration and Refugee Board ruling earlier this month denying his request for refugee status. He is being denied access to two thumb drives that he says contain evidence of illegal acts perpetrated by a U.S. government agency. Now after three unsuccessful attempts to gain political asylum, he fears that he and the files will be delivered to the very government he sought to escape.

“I cannot imagine any life in a country which has already tortured me,” Matt DeHart told reporter Adrian Humphreys, whose astonishing five-part series in Canada’s National Post documents the bizarre case. “Am I now to be given into the hands of my torturers?”

It’s tempting to dismiss DeHart’s claims based on their sheer outlandishness and his equally outlandish attempts to defect to Russia and Venezuela, which he now says he regrets. But given President Barack Obama’s administration’s penchant for punishing hacktivists and whistleblowers, a disturbing decades-long trend of prosecutorial misconduct and the now established fact that the U.S. has, as Obama put it, “tortured some folks,” it’s clear that the U.S. government’s claims in this case warrant even more skepticism.

Matt DeHart

According to government documents, Matt DeHart admitted during an interrogation to becoming involved with a spy ring during his time as a drone pilot, agreeing to broker the sale of military secrets for up to $100,000 per month through a Russian agent in Canada. But he claims he was being drugged and tortured and simply made the story up.

“I would have told them anything,” he told The National Post of his encounter with the FBI agents, during which he was denied a lawyer. “Information that is derived from torture — to use it against somebody is ridiculous. It’s garbage. I already said it’s not true.”

He testified that the agents admitted the child porn charges were fabricated — a ruse to enable investigation into his involvement with the nebulous hacktivist collective Anonymous. He says the investigation stems from a file he uploaded twice to a hidden website, hosted on the anonymous Tor network from a server in his parents’ house. DeHart claims it contained evidence of government wrongdoing, “an FBI investigation into the [CIA’s] practices.” Screen shots of the WikiLeaks website found on his computer suggest he intended to send the file to the whistleblowing organization.

After the asylum ruling earlier this month, three courts — two in the U.S. and one in Canada — have expressed strong doubts about the child pornography charges that triggered a search warrant onMatt DeHart’s parents’ home in the U.S. Those accusations date to 2008 and stemmed from his association with two teenagers while playing the online game “World of Warcraft,” one of whom was also involved with Anonymous; the charges were ultimately not proved.

After DeHart was arrested while crossing from Canada to the U.S. in 2010, a judge in Bangor, Maine, found it odd that prosecutors were suddenly citing the two-year-old porn accusations and that police hadn’t analyzed Matt DeHart computers for illicit files seven months after they were seized. A judge in Tennessee, where Matt DeHart ‘s family lived before moving to Canada, admitted that “the weight of the evidence is not as firm as I thought it was.” And most recently, the Canadian Immigration and Refugee Board concluded there was “no credible or trustworthy evidence” that DeHart had solicited child porn.

Prosecutorial misconduct helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

To be sure, Matt DeHart strange behavior throughout this ordeal doesn’t place him in a particularly flattering light. But it’s worth noting that these kinds of serious accusations are often made in cases against hacktivists and whistleblowers, helping place them in the government’s crosshairs and paint them as nefarious even when the accusations are easily disproved.

Barrett Brown, a journalist who investigated links between the U.S. government and private intelligence contractors, had all manner of ridiculous false accusations thrown at him before being sentenced last month to five and a half years in prison. He was initially charged for the innocuous act of copying and pasting a hyperlink to a public file stolen by Anonymous from one chat room into another. The charge was dropped, but the linking was still used to increase the length of his sentence, despite the fact that prosecutors had no evidence Brown had looked at the file or even known what was in it.

At one point, prosecutors claimed that Brown conspired with members of Anonymous to overthrow the U.S. government. They also accused him of participating in “SWATting,” the practice of making fake 911 calls to harass people in their homes, and even of plotting with another journalist to hack the Bahraini government. Not one of these claims was supported by the voluminous collection of chat logs that the government provided as evidence. Nor did additional logs obtained by The Daily Dot, which the prosecution had withheld under seal.

Brown was not entirely without fault in the case, having obstructed a search warrant and posted a YouTube video threatening an FBI agent in response to the seizure of his laptops. But in retrospect, it seems clear the impetus for the case was that the government saw Brown’s investigations as a threat and would say anything to guarantee his conviction, even if that meant knowingly making false statements. As Brown put it during his allocution, “This is not the rule of law … It is the rule of law enforcement.”

Close scrutiny

What can we expect from the Matt DeHart case if this is the prosecutorial legacy it follows?

As The New York Times editorial board recently noted, defendants have no recourse when police and prosecutors lie, cheat and conceal evidence in the courtroom, leading to what one federal judge has described (PDF) as a national epidemic of prosecutorial misconduct. Sometimes it leads to wrongful convictions. Other times, as in Brown’s case, it helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.

Remember Aaron Swartz, an information activist who prosecutors pursued vigorously for the act of downloading too many academic articles from an MIT library? Much like in Brown’s case, prosecutors were accused of withholding evidence and coercing Swartz into taking a guilty plea. Swartz committed suicide in 2013 amid mounting legal costs and the possibility of up to 35 years in prison, triggering the DeHarts’ decision to flee the country.

“Aaron Swartz had very similar psychological makeup, similar age, same circumstances as Matt DeHart,” DeHart’s father, Paul DeHart, a retired U.S. Air Force major, told The National Post. “I do not want to wake up one day and find my son hanging from a rope in the garage of our house. And I have noplace to go to bring this to anyone’s attention.”

With Matt DeHart’s attempted defections and other erratic behavior, it’s admittedly difficult to determine where his true intentions lie. But the government’s actions against him have been just as sketchy, if not more so. His claims must be taken seriously, and his case should be closely scrutinized, lest another potential whistleblower fall prey to the state’s merciless war on leaks.

by Joshua Kopstein, a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.

 

Jake Davis – Hacker

Jake Davis – Hacker

Jake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. Jake Davis He has worked with AnonyJake-DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake DavisJake Davis Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups.Topiary, real name Jake Leslie Davis, born October 27, 1992, is a former hacker. He has worked with Anonymous, LulzSec, and similar hacktivist groups. Jake Davis

Jeremy Hammond – Hacker, Activst

Jeremy Hammond – Hacker, Activst

Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.Jeremy-HammondJeremy Hammond is a political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks. political activist and computer hacker from Chicago. He was convicted and sentenced in November 2013 to 10 years in US Federal Prison for hacking the private intelligence firm Stratfor and releasing the leaks through the whistleblowing website WikiLeaks.

No Place to Hide: #PayPal14, Glenn Greenwald, PayPal Billionaire

No Place to Hide: #PayPal14, Glenn Greenwald, PayPal Billionaire

guillermo_jimenez-stanley_cohen

* Use the hashtag #PayPal14. Respond to tweets from @Pierre and @ggreenwald. Don’t forget Greenwald’s Facebook page: https://www.facebook.com/glenn.greenwald.5

PRESS RELEASE

The PayPal14 were arrested nearly three years ago on the front lines of the digital information war, helping put the hacktivist movement and specifically Anonymous on the map. Now the whistleblower/hacktivist culture they helped launch into the global spotlight is being co-opted by journalists and “tech bros” all over to advance their careers, most notably journalist Glenn Greenwald’s.

As Greenwald gets a book tour, the PayPal14 get sentencing hearings. He is traveling the world to promote his book about Snowden’s NSA leaks, and the 14 are struggling to raise more than $80,000 in court-ordered restitution for eBay/PayPal, companies ultimately overseen by Greenwald’s billionaire backer, Pierre Omidyar. The brand that popularized Pierre-Greenwald’s Snowden leaks is only so “edgy” and “cool” because heroes like the PayPal14 took direct action.

paypal-14

 

When PayPal, part of Pierre’s eBay, blocked donations to WikiLeaks, the 14 and many others saw that the company wasn’t just a means of transferring money. It was also a means of control. PayPal’s blockade attacked our ability to vote with our dollars. Bank of America, VISA, MasterCard, and Western Union also participated in the financial blockade, a blatant corporate attempt at silencing dissent and suppressing information. The blockade destroyed 95% of WikiLeaks’ revenue.

The 14 along with countless others bravely launched DDOS attacks, the digital equivalent of sit-ins, against PayPal to protest the unjust blockade. They shut down PayPal’s public website briefly without interfering with backend financial transactions or causing lasting harm, contrary to Department of “Justice” claims in court. After having their lives disrupted for years, 11 of the PayPal14 still face federal charges. Greenwald faces applause.

Sure, Greenwald and Pierre occasionally express tepid “support” for the PayPal14. But where’s the $80,000? That’s lunch money to Greenwald or Pierre. For the PayPal14, it’s a crushing financial burden. Pierre, according to Forbes, rakes in $7.8 billion per year while the PayPal14 struggle to stay afloat. Pierre started off First Look, Greenwald’s news media outlet, with $50 million in funding–tens of millions more than $80,000.

Greenwald and Pierre aren’t just riding the hacktivist movement–they’re watering it down. As a consequence, most of Snowden’s NSA leaks go unpublished. What is published is heavily redacted, preventing more aggressive, non-celebrity journalists from finding answers and pro-freedom hackers from building better defenses.

Ask yourself, Why isn’t Greenwald facing charges? Why isn’t he asking countries for asylum?

The PayPal14 put themselves on the front lines for something genuinely revolutionary. They grabbed the mainstream media’s attention and helped establish the “digital information war” culture that boosts this new kind of journalism. But the mainstream media has finished enjoying the spectacle of the PayPal14’s arrests. Now they’re watching Greenwald sign books, while the PayPal14, largely forgotten, sign plea deals.

Some rising players in the digital information war have confided that they believe we should make noise for the
PayPal14 at Greenwald’s book tour stops. But they’ve also confessed that doing so would put their financial interests in jeopardy. The tentacles of Greenwald/Pierre/First Look are spreading and snatching up people right and left. Thanks to Jeremy Hammond’s Stratfor leak, we better understand how corporate interests isolate radicals who try to create change. The “Duchin formula,” continued by the private intelligence firm Stratfor, states that opportunists “by definition … take the opportunity to side with the powerful for career gain” and bring the realists and idealists along with them, leaving the radicals exposed and unsupported.

We ask you to support the radicals and not the careerists. Your worst enemy is not the person in opposition to you. It is the person occupying the spot you would be fighting from and doing nothing.

The goal is to raise that $80,000. If we do that, we win this battle. For now, everything else is secondary. Supporting the PayPal14 doesn’t just mean one tweet and you’re done. It means constant effort.

Specifically, attend Greenwald’s book tour stops listed below. If they’re sold out–and most are NOT–still go and make noise outside (or get inside anyway!). For sold-out events, there are often stand-by lines in case extra seats become available. Take the steps below, inside or outside the event–or both!

1. This is crucial: Make sure people are equipped to record videos of the protest, including Greenwald’s responses, and upload them as soon as possible. Share them with the hashtag #PayPal14. If possible, videos should include the donation link – http://www.gofundme.com/PayPal14 – and text accompanying the video should include the link also.

2. Explain why you’re protesting the book tour, by mic-checking, passing out fliers, waving signs, or any other useful method. Get creative! “Pay Back the PayPal14” and “Obey eBay” and “Glenn Greenbacks” would make good slogans. Above all, make sure people get the donation link: http://www.gofundme.com/PayPal14 This can be done online, but it is critical that it be done in person at the book tour stops as well, making as much noise as possible. Occupy the book tour stops!

3. When are Greenwald and Pierre donating? You find out!

BOOK TOUR STOPS AND LINKS FOR ADDITIONAL INFORMATION ON THE PAYPAL14:

1. New York City, Tuesday May 13. 7:00-8:30 pm

Cooper Union’s Great Hall, in the Foundation Building
7 East 7th Street, between Third and Fourth Avenues
East Village in Manhattan
May 13, 2014 7:00 pm
Admission is free and open the public on a first-come first-served basis.
http://www.cooper.edu/events-and-exhibitions/events/authors-talk-glenn-greenwald-edward-snowden-and-nsa

2. Washington DC, Wednesday May 14. Doors at 6 pm, event at 7 pm.

Politics & Prose Bookstore
5015 Connecticut Ave. NW
Washington, DC 20008
May 14, 2014 7:00 pm
Doors and Will-call open at 6pm
1 General Admission Ticket: $17.00
http://www.brownpapertickets.com/event/639084

3. Boston, Thursday May 15. 7 pm.

First Parish Church
1446 Massachusetts Avenu
Cambridge, MA 02138
May 15, 2014 7:00 pm
Ticket costs $5, stand-by only
http://www.harvard.com/event/glenn_greenwald2/
http://www.harvard.com/about/sold_out_event_faq/

4. Amsterdam, Tuesday May 20. 20:00-21:30
Stadsschouwburg Amsterdam – Rabozaal
Leidseplein 26
1017 PT Amsterdam
May 20, 2014 20:00 – 21:30
http://www.ssba.nl/page.ocl?pageid=3&ev=56684
https://shop.ticketscript.com/channel/web2/get-dates/rid/CC235T4A/eid/210218/language/nl/format/html
Tickets range from € 18,27 to € 26,27

5. Seattle, Los Angeles, San Fransisco, and San Diego: Mid-June. (No information available yet.)

* Updated book tour information may become available here https://twitter.com/ggreenwald here https://www.facebook.com/glenn.greenwald.5 or here https://www.facebook.com/glenn.greenwald.5/posts/10152804684159112

MOST IMPORTANTLY, ask people to donate to the PayPal14 by going here:
http://www.gofundme.com/PayPal14

PayPal 14 Homepage (in progress):
http://thepaypal14.com/support.htm

Microfinancing by Pierre’s Omidyar Network is loan-sharking the world’s most vulnerable:
https://www.nsfwcorp.com/dispatch/extraordinary-pierre-omidyar/

News articles about the PayPal14:
https://medium.com/quinn-norton/66077450917e
http://www.thedailybeast.com/articles/2013/12/05/inside-the-paypal-14-trial.html

Pierre Omidyar profile on Forbes:
http://www.forbes.com/profile/pierre-omidyar/

The “Duchin formula” and Stratfor:

How To Win The Media War Against Grassroots Activists: Stratfor’s Strategies

WikiLeaks on the financial blockade:
https://wikileaks.org/Banking-Blockade.html

Pierre started off First Look with $50 million in funding:
http://omidyargroup.com/firstlookmedia/pierre-omidyar-provides-initial-funding-of-50m-to-establish-first-look-media/

SPECIAL NOTE: This press release is intended to make sure people’s voices are heard in a way that educates the public.

November 30, 2012 – Decrypted Matrix Radio: Anonymous Bulks Up, NSA Decieves Congress Praises, Body Scanners, CypherPunks, Brain Weapons, TSA Criminial, Jerusalem Segregation

November 30, 2012 – Decrypted Matrix Radio: Anonymous Bulks Up, NSA Decieves Congress Praises, Body Scanners, CypherPunks, Brain Weapons, TSA Criminial, Jerusalem Segregation

 Anonymous Hacktivists: ‘Bigger and Stronger Than Ever’

NSA’s Marching Orders to Congress: Deceive the Public, Praise NSA Effusively

Next generation of airport scanners will scan every single molecule in your body

Review: Cypherpunks: Freedom and the Future of the Internet
by Julian Assange with Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. OR Books, New York, 2012, 186 pages, Paper.

Sentry System Combines a Human Brain with Computer Vision

TSA chief will be a ‘no show’ at congressional hearing

West Bank and East Jerusalem buses are already segregated

11-30

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Inside Par-AnoIA: The Anonymous Intelligence Agency

Inside Par-AnoIA: The Anonymous Intelligence Agency

Paranoia is reputed to destroy you. But if you’re a whistleblower in search of a safe, neutral outlet, it just might save you instead.

Par:AnoIA, short for Potentially Alarming Research: Anonymous Intelligence Agency, is a website designed to collect leaks, allow project participants to work on them, and release them in a way that draws the attention of the public. The Releases section of the site, for example, currently features 1.9 gigs of information from American intel corporation Innodata.

The leaks site developed in part by necessity. WikiLeaks’ touted anonymous submission system has been offline for a year. OpenLeaks never materialized. And Cryptome is… Cryptome, meaning it neither edits nor markets its documents to the public at large.

Simply put, if WikiLeaks is a PR agency for documents and Cryptome is a leak dissemination site, Par:AnoIA aims to have the best of both. Launched in March after a year and a half of development, the site picks up where Anonleaks.ch, an earlier Anonymous leaks site, left off—literally. (Par:AnoIA currently hosts HBGary documents, which were inherited from Anonleaks.ch.) Following a July profile in Wired’s Threat Level blog, it’s suddenly the hottest disclosure site still up and running. More recently, Par:AnoIA published the private information of 3,900 members of the International Pharmaceutical Federation, and a pile of documents related to the Cambodian government, a move dubbed Operation The Pirate Bay.

The Daily Dot reached out on Twitter and, after some back-and-forth that included the stipulation that all chat and Twitter handles would be disguised, sat down for a Web chat with half a dozen key members of Par:AnoIA. We’ve given them letters of the alphabet instead of usernames.

Let’s establish the tone with this excerpt from their front-page manifesto:

Thou hath interrupted our tea moment and hath made us stand up with our backs against thine wall. But hear us; we shall fight back for it is the only choice we hath left. With our whole hearts we shall support this cause. We shan’t enjoy the fight but it is our only option to protect the ones that are not protected, the ones we love and for thine fairness. It is known to us thou doth not fear damage of the collateral kind and thou loveth to contain and restrict innocent peasants.

As Cryptome founder John Young pointed out, Par:AnoIA, being Anonymous, at least has a sense of humor, which differentiates it from the rest of the serious disclosure industry. As you can see from our introduction to the Web chat:

raincoaster has joined #paranoia
<raincoaster> Well, I’m in.

<A> lol
<A> in
<A> out
<A> left
<A> right
<A> up down left right right left down up a b a b a x y

So far, so typical. Anonymous may be trying to make the world a better place, but the hacktivist collective has always been in it for the lulz, too.

“[W]e’re not as srs,” C wrote in regards to Anonymous.

B wanted one thing clarified. “Let it be known that paranoia is not a hacker group.” They are a publishing group, meaning they won’t go out and create their own leaks.

The leak/disclosure community considers itself collegial, although no one else does. Quite the contrary, it can be competitive and even petty. There were no tears at WikiLeaks when rival site OpenLeaks failed to materialize. Cryptome founder John Young has taken pains to distance himself from WikiLeaks, on whose board he originally served. And, of course, whistleblowers and hackers alike are paranoid all the time, for obvious reasons.

For example, on July 12, a WikiLeaks supporter called Par:AnoIA out on Twitter for their choice of top-level domain registrar, Neustar, which Buzzfeed has called “the Keyzer Söze of surveillance,” the law enforcement’s data surveillance provider of choice. @Par:AnoIA, who at that point had fewer than 2,000 followers, said the whole thing was just another pointless flame war that distracted from the issue at hand.

One member explained, “To be honest, we are indifferent to WikiLeaks. They just should not start trying to tell people we host honeypots for feds.” In other words, WikiLeaks accused Par:AnoIA of being a front for the FBI, a sensitive subject given the arrest of former hacker turned informant Hector “Sabu” Monsegur.

“We don’t strive to be unique; why should we?” C asked.

“We just do what we think is good and right, and i think we can do it with minimal efforts, at least in a financial sense. we are not here for competition. We don’t strive to be the best. We just want to offer the best we can.”

Unlike most Anonymous projects, Par:AnoIA does ask for donations in the form of Bitcoins, an international online currency that’s difficult to trace and favored by hackers. They told us publicly that the money goes for server costs. John Young of Cryptome estimates his own server costs at around $100 per month, and he has relatively high traffic, so it’s logical to estimate their costs at less than half that.

They volunteer their time, and they volunteer a lot of it: They read each and every document that comes in. They do not edit the documents in any way, although they will not guarantee publication of every document. Archivists are philosophically split on whether their duty is owed to the documents or to the users, and Par:AnoIA clearly comes down on the side of the documents, as does Cryptome. Its redaction policy means WikiLeaks is on the other side of this prickly, barbed-wire fence.

What does that mean day-to-day? Would they refuse to release a document because it could change the world in a way they didn’t like? According to the Web chat consensus, the only leak they’d withhold would be nuclear launch codes. C explained that, “Public information is better than information in secret hands. We make spies obsolete.”

They’re not relying on the general public for the leaks but rather on people within their existing networks. B said they would never run out of sources. “You always make new connections.” C added, “Our connections extend daily.”

You don’t need an engraved invitation, though, or even a Guy Fawkes mask; the site can accept submissions from anyone. The Anons dismissed the idea of accepting links via email only, for security, context, and philosophical reasons. The point is not simply to take information in, but to take it in in the original form and to also post it in a form the public can access without going through some interstitial person or process.

“You need to have a nice working site where people can just click and read and even see a summary, see evidence that this whole shit is corrupted like fuck,” C said. “Research is another vector. We do that already on a limited basis.”

The first project Par:AnoIA tackled was the Arrest Tracker, correlating all the arrests of Anons worldwide by Anon name. You’d think this would be for PR or media purposes. You’d be wrong. The Arrest Tracker is an old-school wiki (fans of Wikipedia will recognize the aesthetics) that’s thoroughly annotated, with links to newspaper reports of court appearances and schedules. C explained: “We actually started that for ourselves so we can check wtf was going on. Real names are only mentioned if disclosed in media, of course. Everything has a source. It’s no foo, it’s facts. I hate foo.”

The members of Par:AnoIA claimed to not have plans to monetize their content, nor did they desire to market their materials like WikiLeaks does, making media partnerships and controlling the flow of information.

“We do shit when we have time, interest .. and .. meh,” C replied. “All media are the same, 14 reader blog or Fox News. I hate the idea of elitism. Eure, some initial attention is nice.. but in the end…it’s our releases that will speak.”

“I’d like see Bush & Co at the Hague…and…. something that would set Manning free,” B added, referring to alleged WikiLeaks cooperative Bradley Manning.

Knocking out private security and intel corporations like HBGary also remains a priority for the future.

C put it best, in typical chat humor: “I would like to have that document that really buttfucks the whole establishment in a bad way.

“I know it’s out there, on some server, somewhere, hand us enough leaks and we will find it!”

Photo via Par:AnoIA

via DailyDot

The Federal Reserve Plans To Identify “Key Bloggers”

The Federal Reserve Plans To Identify “Key Bloggers”

Conversations About The Fed On Facebook, Twitter, Forums And Blogs

Big brotherThe Federal Reserve wants to know what you are saying about it.  In fact, the Federal Reserve has announced plans to identify “key bloggers” and to monitor “billions of conversations” about the Fed on Facebook, Twitter, forums and blogs.  This is yet another sign that the alternative media is having a dramatic impact.  As first reported on Zero Hedge, the Federal Reserve Bank of New York has issued a “Request for Proposal” to suppliers who may be interested in participating in the development of a “Sentiment Analysis And Social Media Monitoring Solution”.  In other words, the Federal Reserve wants to develop a highly sophisticated system that will gather everything that you and I say about the Federal Reserve on the Internet and that will analyze what our feelings about the Fed are.  Obviously, any “positive” feelings about the Fed would not be a problem.  What they really want to do is to gather information on everyone that views the Federal Reserve negatively.  It is unclear how they plan to use this information once they have it, but considering how many alternative media sources have been shut down lately, this is obviously a very troubling sign.

You can read this “Request for Proposal” right here.  Posted below are some of the key quotes from the document (in bold) with some of my own commentary in between the quotes….

“The intent is to establish a fair and equitable partnership with a market leader who will who gather data from various social media outlets and news sources and provide applicable reporting to FRBNY. This Request for Proposal (“RFP”) was created in an effort to support FRBNY’s Social Media Listening Platforms initiative.”

(more…)

Statement from Jeremy Hammond, alleged Anonymous hacker, July 23 2012

Statement from Jeremy Hammond, alleged Anonymous hacker, July 23 2012

23 July 2012 – Statement from Jeremy Hammond, alleged Anonymous hacker – read in Foley Square, NYC

Thanks for everybody coming out in support! It is so good to know folks on the street got my back. Special thanks to those who have been sending books and letters, and to my amazing lawyers.

I remember maybe a few months before I was locked up I went to a few noise demonstrations a the federal jail MCC Chicago in support of all those locked up there. Prisoners moved in front of the windows, turned the lights on and off, and dropped playing cards through the cracks in the windows. I had no idea I would soon be in that same jail facing multiple trumped up computer hacking “conspiracies.”

Now at New York MCC, the other day I was playing chess when another prisoner excitedly cam e up as was like, “Yo, there are like 50 people outside the window and they are carrying banners with your name!” Sure enough, there you all were with lights, banners, and bucket drums just below our 11th floor window. Though you may not have been able to here us or see us, over one hundred of us in this unit saw you all and wanted to know who those people were, what they were about, rejuvenated knowing people on the outside got there back.

As prisoners in this police state – over 2.5 million of us – we are silenced, marginalized, exploited, forgotten, and dehumanized. First we are judged and sentenced by the “justice” system, then treated as second class citizens by mainstream society. But even the warden of MCC New York has in surprising honesty admitted that “the only difference between us officers here and you prisoners is we just haven’t been caught.”

The call us robbers and fraudsters when the big banks get billion dollar bailouts and kick us out of our homes.

They call us gun runners and drug dealers when pharmaceutical corporations and defense contractors profit from trafficking armaments and drugs on a far greater scale.

They call us “terrorists” when NATO and the US military murder millions of innocents around the world and employ drones and torture tactics.

And they call us cyber criminals when they themselves develop viruses to spy on and wage war against infrastructure and populations in other countries.

Yes, I am one of several dozen around the world accused of Anonymous-affiliated computer hacking charges.

One of many here at MCC New York facing trumped up “conspiracy” charges based on the cooperation of government informants who will say anything and sell out anyone to save themselves.

And this jail is one of several thousand other jails, prisons, and immigrant detention centers – lockups which one day will be reduced to rubble and grass will grow between the cracks of the concrete.

So don’t let fear of imprisonment deter you from speaking up and fighting back. Silencing our movement is exactly what they hope to accomplish with these targeted, politically motivated prosecutions. They can try to stop a few of us but they can never stop us all.

Thanks again for coming out.

Keep bringing the ruckus!

 

——-
You can write to Jeremy in prison here:

 

Jeremy Hammond    18729-424
Metropolitan Correctional Center
150 Park Row
New York, New York, 10007
original paste

 

Barrett Brown – Communiqué from Prison 9/20/12

Barrett Brown – Communiqué from Prison 9/20/12

It is hard for me to express how much I appreciate your letter, which is the first I have received here, along with the support I’ve reportedly gotten from others so far. Before I forget, let me request that you also send a tweet of support to Jenna, @ElviraXMontana on Twitter; as my girlfriend, she had to watch as the FBI crushed my ribs (which I believe will be healed in time even if I’ve had trouble acquiring medical attention due to me under Geneva; put in formal request for X-ray last night here at Mansfield, whereas last week at Lew Sterrett I was sent to medic by an officer Tamer before being instead re-directed to what is intended as a temporary holding cell for those about to be released on bond, this change of plan being instigated by an officer Roeun (sic?) whom I have since reported to the proper authorities. Despite my having explained her mistake politely twice over the course of the next seven hours, and despite my condition having been serious enough to have prompted other inmates to suggest I check for internal bleeding, I was screamed at and then later simply ordered to lay down, all of which was witnessed by two other inmates, one of whom promised to inform Tim Rogers of D Magazine that I was potentially dying and needed intervention ASAP as soon as he himself was released a few minutes hence (again, this was the temporary outgoing holding cell, not meant for housing inmates for anything longer than an hour or so as their bond is processed; as such, I was not fed, either, much less given my medication, suboxone. Note that none of the treatment I received at Lou Sterrit had anything to do with who I am or what I am accused of, – it is simply the natural result of the inhumane and degenerate mentality found within the Texas “corrections” system, something I first described in a 2005 article for Towards Freedom. It is something we will have to address more firmly over the coming years, just as we have addressed North Africa and the intelligence contracting industry since late 2010. And I note all of this not merely to complain—although to complain is among the few vices I have been left aside from bragging to my fellow inmates – but to illustrate the fundamental problem that so many of us have sacrificed or risked to combat. This problem, which even Richard Nixon recognized and spoke about on that famed evening at the Lincoln Memorial, is that a republic built with the blood of giants has since become a “wild animal.” – one that now feeds upon us all.
 
I try to avoid metaphors, which can illuminate but in practice are too often used to obscure. Like many aspects of language, the false metaphor kills and enslaves. And at any rate, there will be time to discuss these broader issues later. For now, I must ask you to publish this on pastebin, Anonpaste, piratepad.de, and all other available venues, and that you also send it to some of the journalists that have been kind enough to follow my work as well as the consequences thereof, particularly my friend Michael Hastings, Barry Eisler, Michael Riley (Bloomberg), Ryan Gallagher (Guardian), and Josh at Daily Caller (forgot his last name) – plus the former editor of The Yemen Times who’s now at Global Times or some such and who, along with a certain Washington Times correspondent known to Gregg Housh, plus one or two others that I know of, who are now looking into Romas/COIN due in part to my release of the NYT e-mails earlier this month. Along with others in both the mainstream and independent media, these are most likely to report accurately on this matter. Having been mischaracterized at least a hundred times by “professional” journalists since I first appeared on Fox News in January 2009 to denounce Obama’s association with the goofy fascist Rick Warren – and was introduced as being spokesman for the non-existent “American Atheist Society” rather than GAMPAC. This would be a good time to note, particularly for the benefit of certain journalists, that I am not and never have been the spokesman for Anonymous, nor its “public face” or, worse, “self-proclaimed” “face” or “spokesperson” or “leader” (as the CIA-funded Radio Free Europe called me last year when I felt compelled to “quit” the non-group that I’d never technically joined in the first place, but rather gradually attached myself to as Wikileaks and Tunisia went down in December of 2010). Anyone who cares to learn what happens to a person who decides to help deal with such issues at the request and with the knowledge of active Anons can search my name in conjunction with those terms, and then see the article “Barrett Brown is Anonymous” from April 2011 in which I explain clearly, as I have countless times since, that no one has the authority to designate me as such. It is known to some of those who worked out of Anonops or were otherwise particularly active in the beginning of 2011 that I wrote or edited a number of the press releases of that time, and that the al-Jazeera article written in the first few days of January and which appeared later that month under the title “Anonymous and the Global Correction” was also my work – something I revealed privately to the brilliant cyberpunk essayist Bruce Sterling after he openly speculated as to the author’s background in Wired, noting the sentiments to be that of a true revolutionary. Among those who now agree with him are the FBI, which has since responded accordingly – and unethically.
 
Contrary to the countless claims to the effect that I hold some official role in Anonymous, I can think of only one occasion in which any Anon has come close to actually deeming me as such, that being the day on which HBGary was hacked in retaliation for HBGary Federal CEO Aaron Baar’s claim – shown to be entirely false – that he had identified Anon’s “lieutenants” and “co-founder” and that he had been contacted by the FBI about this. In fact, he had conflated three different people including a professional gardener and, as shown in the notes Anon released along with the e-mails taken from HBGary Federal, had made a huge number of additional mistakes – something since confirmed by everyone concerned including Barr himself. (That the Financial Times writer who had bought Barr’s self-promotion would again essay to write about Anonymous months later, this time taking the claims of a Dutch kid at face value in the course of “reporting” various negative things about how the movement operates, is only one of numerous bizarre and depressing twists to this story; I myself would later encounter him on Canada television as a panelist during a discussion in which he accused Anon of being particularly anti-“American interest”, to which I responded that it is difficult to avoid stepping on the empire’s toes when one assists North Africans in fighting off dictatorships that the US has supported for years.) (Oh snap!) On that day, as recorded on pastebin from the discussion on the #OPHBGary channel at Anonops, I was referred to in passing as “our public face” to a journalist. I was on the phone to HBGary President Penny Hoglund at the time, apologizing that HBGary’s e-mails had been seized by Sabu in addition to HBGary Federal’s, instructing her on how to get on IRC in order to make her case directly to the hackers, and promising to remove the link I had put up to the 70,000 e-mails acquired in the operation, a link I had placed upon a Daily Kos post put up to explain the situation to the great many who would miss the “makeover” done to HBGary.com. Had I known that Penny was lying to me about what she and husband Greg Hoglund had known about Barr’s irresponsible attempt to save his own career at the expense of the innocent and heroic alike, I would have simply hung up. Instead, I was polite – but I recorded the call, just as I recorded the next call with Barr, the next call with HBGary exec Jim Butterworth, and finally the drunken call I received months later from Greg Hoglund himself. “Trust but verify,” as Reagan said in the context of a different set of villains.
 
With the exception of the ten minute convo I released between myself and Aaron Barr, all of the other recordings – and plenty of others – are in the possession of the FBI, which raided my apartment as well as my mother’s home on March 6th. For more on those events, as well as the criminal conspiracy to which I have been subjected by elements of the FBI, HBGary, and paid informant/contractor Jennifer Emick (among other parties both known and undiscovered), please see the last 3 videos I uploaded to my YouTube account, as well as documents I linked to on my Twitter account @BarrettBrownLOL in the final days before my most recent (and dramatic!) arrest. Not everything is released; I was interrupted by armed, mediocre federal agents and DPD officers (“No complicity in assassination of a chief executive since 1963!”) before I could finish making my case, which was to be done over several days before the entirety would be sent to the FBI and the judge who signed my March search warrant. This was to be followed by the instigation of a civil suit against HBGary and other parties to be named in the next 2 months. My plan has been disrupted – plans often are, as history tells us – but it has not been rendered obsolete. It will evolve, just as ProjectPM itself has evolved steadily since 2009, when this war became evident to me, when I first realized that my future as a political satirist would have to be abandoned in favor of this dirty, grueling struggle.
But why was I arrested this time? I would love to tell you. But the prosecution wouldn’t like that. I, and everyone else in the court room, were ordered to refrain from discussing the complaint, affidavits, and warrant, all of which are sealed at the request of the author, one FBI special agent whom I shall not name lest I give him cause for fright (or pretend fright – I am allegedly a danger to one especially skittish special agent whom I shall be careful not to name again until such time as I am prepared to list him in the civil suit I’ve been preparing for weeks now). Frankly, I do not blame this other special agent for requesting that the document be sealed – if I had written something of such low quality and demonstrable untruth, I would burn it and ask forgiveness of every deity invented by man and the higher apes/dolphins/whales. Likewise, if I were the US attorney who signed the Motion for Detention dated September 13 2012 – the document that, after having been approved by Judge Paul D. Stickney, ensured I would not only be prevented from discussing what I’m being accused of but also made a prisoner of the state until such time as a trial or some such can be concocted out of the jurisprudential magick I struggle to follow, in my innocence. Apparently I am not just a danger to the fragile FBI agents who have taken to threatening my mother and fracturing my ribs in the course of heavily-armed raids on my uptown Dallas apartment, but must be prevented from explaining to my associates, followers, and even enemies why I have again been subjected to violence and indignity.
 
I explained the first raid against me (March 6th, 6:30 a.m. CST) and the second against my mother (about six hours later) in several pastebin messages at that time. It was not until 2 months ago that I learned how a judge had been tricked into permitting this raid on me – how the disgraced contracting firm HBGary hired the paid FBI informant Jennifer Emick to, in their words, “find something to get [me] picked up on,” even as this bizarre former Anon made public accusations against me under both her real name and her adopted contractor persona: “FakeGreggHoush” on Twitter (now “AsherahResearch”) and Asherah on IRC – particularly the 2600 server where she frequented the #jester channel alongside various ex-military men and current “security’ contractors who all found themselves inclined to associate with the admitted criminal hacker th3J35T3R, one of several parties who have taken credit for DoS attacks on Wikileaks. I should not have to remind anyone that 40 U.S. homes were raided in January 2011 due to a similar but less effective series of DDoS attacks on Visa, MasterCard, PayPal, and Amazon which were clearly an act of protest against an unprecedented economic blockade ordered by the U.S. regime. 14 of the “criminals” in question are being charged such that they face up to 15 years in prison. Thanks largely to Jay Leiderman the California attorney and John Penley the NYC activist and veteran, many of them are being represented for free. Likewise, I will seek and accept only pro bono assistance from this point on, though with the stipulation that I will pay any such lawyers what I can from the defense funds that have been set up for me thus far by well-wishers. As of this writing I dismiss Tom Mills, whom I retained for $3,500 after receiving bad advice from a well-meaning person. I will also expect that money returned within 60 days of the publication of this missive online (ProjectPM participants, please ensure that he receives this message, which I have also delivered through my mother – whom he falsely claimed to be representing on the matter of the FBI threats against her despite having been paid by me, not her). And as I had noted both publicly and privately earlier this month, I am still seeking additional attorneys with skill in civil litigation to pursue at least two suits I’ll be filing by the end of the year. Those interested may write to me at my new home, Some Jail in Texas. I am able to arrange for phone conversations with any applicants (or anyone else who is either especially interesting or who is able to accept a collect call or contribute $5 to my commissary/phone fund, that being the cost of a 15-minute call instigated by me). Anyone who writes me without us having been formerly introduced, I will guarantee a response if you send self-addressed stamped envelope. Also I believe that only mail with a return address will be delivered to me, though I’m not sure.
 
I hate that I have spent so much time in conflict over the past two years, and that so much of this has involved my fellow American citizens rather than the Middle Eastern dictators that I got involved in this to combat. I feel sorrow at the lost opportunities, and as for the way it has changed me as a person… I like to think that I am wiser and less naïve than I was, but I know too well how foolish and unsophisticated I was to begin with. I cannot excuse the mistakes I myself have made on both the strategic and tactical levels in my short career. I shudder when I look back on some of the things I wrote or said when I got my first real taste of power at the dawn of 2011, and I continue to bring shame upon myself and upon my family and work by some of the things I say even lately. In particular I have made comments about the U.S. military that I do not mean and which are obviously not entirely accurate. Along with other nonsense I have said, felt, written throughout my life, many of these things originate from my own fears and weaknesses. I am humiliated at not being able to protect my own mother from the FBI, or to shield my own girlfriend from watching heavily-armed men step on my spine as I scream in pain. I cannot forget how my mom cried on March 6th after the FBI had left with my equipment and hers, and how she whispered through tears that she wanted to be able to protect me from prison but couldn’t; I will never forget the look on Jenna’s face as the federal thugs swept through my efficiency apartment with guns drawn and safeties off, in search of hidden assailants and non-existent weapons. That these things are unjust and increasingly insane does not change the fact that they are the result of my own behavior, my own miscalculations, my own choices.
 
Having said that, I regret nothing. For the last week I was denied opiates and thus forced to feel not just rage, hatred, all the primal things, but forced to endure them while sicker than most humans can imagine and in a jail that is overcrowded and filled with common criminals. I have gained something extraordinary in that process, which ended this morning when I was given the first of 30 days of suboxone. I will personally thank everyone on the outside who has helped me and this movement particularly at this critical time, when I have regained the freedom that I did nothing to lose. For now, and until that time, it is war, on paper as always, but war.
 
Barrett Brown
Founder
ProjectPM
Prisoner #35047177
Mansfield Law Enforcement Center
1601 Heritage Parkway
Mansfield, TX 76063
 
Postscript-
[redacted], if you are able to relay this message to the Anons, my ProjectPM people, journalists, etc, you will have done me a finer deed than most men ever have occasion to do for another. I am transmitting a copy of this to another individual to ensure that the FBI does not manage to silence me on this (incidentally, the local jail here in Mansfield has proven to be run by honorable, trustworthy, even friendly people, but it is nonetheless subject to the Yankee boot (no offense)). Tell journalists, etc that they may contact [redacted]. My future and that of ProjectPM depends on you and a handful of others. Thank you for your loyalty at this time. Finally, please include this PS when forwarding and ask people to see my original search warrant as published on Buzzfeed a few months back. Echelon2.org is part of the key to this affair, but not all. More to be revealed when all is prepared. Good luck to you.

Activist Barrett Brown Raided by FBI During Online Video Chat

Activist Barrett Brown Raided by FBI During Online Video Chat

http://youtu.be/eky-q9CE_co

For the second time this year, self-proclaimed Anonymous spokesman Barrett Brown was raided by the FBI.

The latest dramatic incident occurred late Wednesday evening while Brown and another woman identified by some as his girlfriend were participating in an online chat on TinyChat with other individuals.

Two minutes into the recorded chat session, loud voices could be heard in the background of Brown’s residence in Texas while the woman in the room with him was in front of the computer screen. She quickly closed the computer screen, but the audio continued to capture events in the room as the FBI appeared to strong-arm Brown to put handcuffs on him. Brown could be heard yelling in the background.

A spokeswoman in the Dallas County sherriff’s office confirmed to Wired that Brown was raided last night and was booked into the county jail around 11 p.m. She said the FBI removed him from the jail this morning to take him to a different facility, but she did not know where he was headed.

California attorney Jay Leiderman, a member of Brown’s legal team, told Wired that Brown was scheduled to be arraigned today in Texas on making threats to a federal agent.

Asked if the FBI agents were aware that Brown was online at the time of their raid, Leiderman said, “They problaby would have preferred to raid him when he was not online.” He noted that the audio from the raid was “certainly less than flattering when they’re marching through these doors dropping F-bombs…. I imagine they would not want to have that captured if they could help it.”

A transcript of the TinyChat session has been posted online. Just moments before the arrest, there were jokes about whether one of the chat participants was real or just an animated GIF. Moments later, the chat participants faced a different conundrum: trying to figure out whether they’d just witnessed an FBI raid.

A voice that appeared to come from one of the arresting agents was heard saying something to the effect: “You’re going down! Get your hands down!”

Right as the noise began, another participant in the chat room showed up in a video window with a white handkerchief covering his lower face. “Is Barrett Browm getting fuckin’ raided by the FBI?” he appeared to say. “Holy shit!”

Brown’s latest raid came after he posted a long and rambling YouTube video in which he talked about taking drugs (though not today, he noted) and about retaliating against an FBI Agent named Robert Smith after he learned that his mother might be hit with obstruction of justice charges. The threat of charges was apparently related to a laptop of Brown’s that he apparently hid.

“So that’s why Robert Smith’s life is over,” Brown said in the video (beginning around minute 9:40). “When I say his life is over, I’m not saying I’m going to kill him, but I am going to ruin his life and look into his fucking kids. Because Aaron Barr did the same thing and he didn’t get raided for it. How do you like them apples?” he said, smiling.

The video, titled “Why I’m Going to Destroy FBI Agent Robert Smith Part Three: Revenge of the Lithe” was accompanied by a note apparently posted by Brown that reads: “Send all info on Agent Robert Smith to [email protected] so FBI can watch me look up his kids. It’s all legal, folks, Palantir chief counsel Matt Long already signed off on it when Themis planned worse.”

Brown also talked about being a target of the Zeta drug cartel and mentioned that he was heavily armed and was concerned that the cartel would come after him posed as federal officers.

“Any armed official of the U.S. government, particularly the FBI, will be regarded as potential Zeta assassin squads,” he said in the video. “As FBI knows … they know that I’m armed and I come from a military family and I was taught to shoot by a Vietnam veteran … and I will shoot all of them and kill them if they come and do anything…. I have reason to fear for my life.”

He signed off the video saying: “Frankly, it was pretty obvious I was going to be dead before I was 40 or so, so I wouldn’t mind going out with two FBI sidearms like a fucking Egyptian pharaoh. Adios.”

Asked about Brown’s comments, Leiderman said that he hadn’t seen the full video and wasn’t aware of everything Brown had said, but he noted that his client had a reputation for hyperbole and joking around, and that things he said might appear to be a threat when they weren’t really intended to be that way.

“It’s hard to understand the context [of what he said], Leiderman said. “But this is speech, so ordinarily we go to a First Amendment defense, but obviously there are lines that can be crossed where you can lose your First Amendment protection.”

An FBI spokeswoman had no comment to make on Brown’s arrest.

 

 

SOURCE: Wired.com

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

The New York City Police Department (NYPD) really has gone rogue; at least that’s what a high-level FBI official believes.

Among the 5 million emails the group Anonymous hacked from the servers of private intelligence firm Stratfor in February, one seems to not only confirm the controversial NYPD surveillance activities uncovered by the Associated Press, but hints at even worse civil liberties violations not yet disclosed. Anonymous later turned the emails over to WikiLeaks, with which Truthout has entered into an investigative partnership.

I keep telling you, you and I are going to laugh and raise a beer one day, when everything Intel (NYPD’s Intelligence Division) has been involved in during the last 10 years comes out – it always eventually comes out. They are going to make [former FBI Director J. Edgar] Hoover, COINTEL, Red Squads, etc look like rank amatures [sic] compared to some of the damn right felonious activity, and violations of US citizen’s rights they have been engaged in.

The description of alleged NYPD excesses was leveled by an unnamed FBI “senior official” in late November 2011, in an email sent to Fred Burton, vice president for intelligence at the Austin, Texas-based Stratfor and former deputy chief of the counterterrorism division at the State Department. Burton  then sent the official’s email to what appears to be a listserv known as the “Alpha List.”

Burton did not identify the senior FBI official in the email he sent to the listserv. He describes him as a “close personal friend,” and claims he “taught him everything that he knows.” He also instructs members of the listserv not to publish the contents of the email and to use it only for background.

Stratfor, in a statement released after some of the emails were made public, said some of the emails “may be forged or altered to include inaccuracies; some may be authentic” but “having had our property stolen, we will not be victimized twice by submitting to questioning about them.”

What’s particularly stunning about the FBI senior official’s description of NYPD Intelligence Division activities, is how he connects them to previous instances when his own agency bent and broke the law in pursuit of intelligence on perceived enemies of the state throughout the 20th century – and concludes the NYPD Intelligence Division’s violations are worse. As Pulitzer Prize-winning author and former New York Times reporter Tim Weiner writes in his new book, “Enemies: A History of the FBI,” the Bureau has been “America’s closest counterpart” to a secret police.

In the email, Burton queried the FBI official to gain a better understanding of why the FBI declined to get involved with a case involving an alleged “lone wolf” terrorist and al-Qaeda sympathizer named Jose Pimentel, a 27-year-old American of Dominican descent, accused of trying to build three pipe bombs to detonate in New York City.

The FBI official responded by describing some turf and relationship issues between NYPD intelligence officials and NYPD and FBI investigators on New York City’s Joint Terrorism Task Force. It appears the FBI senior official was responding to a news story about Pimentel’s arrest published by the far-right leaning Newsmax, headlined “FBI- NYPD Tensions Highlighted in Terror Case,” which was attached to an email Stratfor analysts had sent around the office.

 There are two issues with this case (off the record of course).

One is the source (confidential informant) was a nightmare and was completely driving the investigation. The only money, planning, materials etc the bad guy got was from … the source. The source was such a maron [sic], he smoked dope with the bad guy while wearing an NYPD body recorder – I heard in open source [sic] yesterday btw [by the way], he is going to be charged with drug possession based on the tape. Ought to go over very nicely when he testifies against the bad guy, don’t you think?

Issue two is that the real rub is between NYPD Intel, [Intelligence Division] and NYPD – JTTF [Joint Terrorism Task Force], not the FBI per se. The NYPD JTTF guys are in total sync with the Bureau and the rest of the partners who make up the JTTF – I understand there are something like 100 NYPD dics [detectives] assigned to the JTTF. NYPD Intel (Cohen, et al) on the other hand, are completely running their own pass patterns. They hate their brother NYPD dics on the JTTF and are trying to undermine them at every turn. They are also listening to [former CIA official David] Cohen [the head of NYPD’s Intelligence Division] who, near as anybody can tell, never had to make a criminal case or testify in court.

Joint Terrorism Task Forces are FBI-led counterterrorism investigative units that combine federal, state and local law enforcement in an effort to detect and investigate terrorist activity and prevent attacks before they occur. Originally created in the 1980s, the creation of JTTFs nationwide was accelerated after 9-11. Currently, 104 JTTFs operate nationwide and are considered one of the most important assets in the federal government’s muscular counterterrorism architecture.

After reviewing the Stratfor email thread for Truthout, Michael German, senior policy counsel at the American Civil Liberties Union’s Washington Legislative Office and a former FBI agent who infiltrated white supremacist terrorist organizations, described the FBI official’s criticism of the NYPD’s intelligence as “doubly ironic.”

“The FBI has engaged in widespread spying on the Muslim American community as well, including counting mosques and mapping Muslim neighborhoods, infiltrating mosques with informants, and using the guise of community outreach to spy on Muslim religious and advocacy organizations,” German told Truthout. “But more critically, because the FBI is charged with enforcing the civil rights laws in this country, including violations under color of law.

“This agent suggests the FBI knew the NYPD Intelligence agents were involved in widespread ‘felonious’ activity in violation of Americans’ civil rights, yet the FBI does not appear to have opened a civil rights investigation or done anything to stop this illegal activity.  Our laws are designed to apply equally to protect all of us, including to protect us from illegal police activity. When the FBI abdicates this responsibility, all Americans suffer.”

Responding to the background information from the FBI senior official, Sean Noonan, a “tactical analyst” with Stratfor, wrote in an email sent to the “Alpha List,” “The point that the divide is within NYPD is contradictory to how they would like present it. [sic]. The way the pro-NYPD stories cover it is that NYPD CT/Intel [counterterrorism/intelligence] has successfully gained influence within the JTTF, almost to the point of having infiltrated it.”

German, however, tells Truthout that the rift between the NYPD’s intelligence analysts and NYPD investigators assigned to the FBI’s JTTF, as revealed by the senior FBI official’s email, is consistent with his experience.

“Criminal investigators, like those assigned to the JTTFs, typically find information produced by these intelligence analysts to be useless, whether they’re NYPD intelligence or FBI intelligence,” he said.

And no matter how bad the mutual acrimony between NYPD intelligence analysts and New York City’s JTTF has gotten, German isn’t surprised that the FBI has declined to investigate allegations of the NYPD Intelligence Division breaking the law.

“The FBI didn’t open investigations when it discovered other government agencies engaging in torture and illegal wiretapping either,” he said.

But eventually, the senior FBI official predicts in his email to Burton, the extent of NYPD’s alleged crimes will be revealed.

“As Rush Limbaugh likes to say, ‘don’t doubt me on this,'” he wrote at the end of his correspondence.

 

Matthew Harwood

Matthew Harwood is a journalist in Washington, DC, and a frequent contributor to the Guardian’s Comment is Free. His writing has appeared in The Washington Monthly, Progress Magazine (U.K.) as well as online at Columbia Journalism Review, CommonDreams, and Alternet. He is currently working on a book about evangelical Christian rhetoric and aggressive US foreign policy. You can follow Matt on Twitter @mharwood31.

Jason Leopold

Jason Leopold is lead investigative reporter of Truthout. He is the author of the Los Angeles Times bestseller, News Junkie, a memoir. Visit jasonleopold.com for a preview. His most recent investigative report, “From Hopeful Immigrant to FBI Informant: The Inside Story of the Other Abu Zubaidah,” is now available as an ebook. Follow Jason on Twitter: @JasonLeopold.

 

SOURCE: TruthOut

Make it Happen 2012 – Anonymous Transmission

Make it Happen 2012 – Anonymous Transmission

Protesting, Police Violence, Transparency, Global Government, all being manipulated against Humanity’s interests.  2012 is the year we take back our FREEDOMS.

We do not forgive

We do not forget

We are legion

Expect us

 

 

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently:

I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated if his attacks appear to come from so many exit nodes? Just block all Tor exit nodes? I dnt wanna to. :(
“I have no idea how XerXeS or any other DDoS tool actually works, all I know is that the person or people running the character known as The Jester have been doing it successfully for many years with absolutely zero discrepancies, arrests or suspensions. I think that’s it’s incredibly impressive that The Jester has stuck to the courage of his/her/their convictions for such a large period of time, even though I disagree with some of the political views expressed. I’m a big fan of facilitating alternative realities and The Jester brings us into another world with many sophisticated layers that often make us forget that it’s just a twitter account and a blog, which is a talent few people have. I find the construction of the persona at a granular level far more admirable than the hacking itself, which I obviously don’t approve of. ”    -via  http://ask.fm/DoubleJake

 

>DecryptedMatrix gives voice to PiraX

 

th3j35t3r_Tom_Ryan_BlogHello there, th3j35t3r.  We would also like to welcome our fellow Anons, bloggers, and those simply interested in a cyber-culture controversy spanning over two years. We are sure you know why we have called you here. Your recent online behavior has been rather strange, to say the least. We are here for one reason: We want to end you.

We would like to start first by making you comfortable. No more quasi-anonymous pseudonym mumbo-jumbo. Your name is Thomas so we will call you by the name you were given by your mother. We know your name because it was confirmed over a month ago with the following Pastebin paste:   http://pastebin.com/A5iiTAJS  (PiraX Dox continued after paste)
________________________________________________________________________

Q: Are Thomas Ryan and th3j35t3r one and the same person?

tl;dr: Yes. You fucking bet they are. In the words of Oscar Wilde, however, ‘The truth is rarely pure and never simple.’ Thus, if you want the full, uncensored dox on th3j35t3r, you’re going to have to bear with me for the next ten minutes as I tear apart his tissue of lies and disinformation.

Now concentrate, cos here comes the proof…

Warning: Long dox is looooooooong. I trust it will prove to be an enlightening read however, not least for Mr Thomas Ryan of 86 Amber Street, Staten Island NY.


SEE TOM RYAN AS JESTER at DEFCON 19

Filmed at Defcon after observing Tom Ryan post and photograph a note outside the vendor room signed “J.” This photo was tweeted from @th3j35t3r twitter within moments, as was the following: https://i.imgur.com/axth3.jpg
Note the “Black cell paintball” logo on the shirt. BCP is the name of Tom’s Paintball team. Tom hangs on PBnation.com with a kid called j35t3r, which is the likely source for the name, and the first of many plagiarisms.  NOT SUSPICIOUS AT ALL, folks. Nor is it suspicious that the ridiculous attempts to smear me as a secret blackhat/anon/whatever over the last year all come from the same group of six people connected to Tom. The other partner is tentatively identified, but that’s a story for later.

**********

Among the 9,000 names to have been linked with @th3j35t3r, one that keeps cropping up is that of @TomRyanBlog. The dox has been denied by th3j35t3r, but then Sabu repeatedly denied that he was Hector Monsegur, and we all know how that one ended up…

While many Anons have been focused on reverse DNS lookups, port scanning and conventional doxing methods to unmask Jester, no one seems to have tried a simpler technique: writing analysis.

If Tom Ryan (TR) and Jester (J) are one and the same person, it should be easy to tell. They’ve written 3,000 tweets between them. Even the l33t3st of the l33t would struggle to convincingly maintain two separate writing styles over the course of thousands of tweets and numerous blog posts.

For those who are new to the party, here’s an overview of what we know about TR and J:

Both are conservative, right-wing and love their precious military. Both hate #OWS, Wikileaks, Manning and are obsessed with unmasking Anons. Both are fixated with Sabu (still!), Team Pois0n and Cabin Cr3w. Both enjoy love-ins with @AsherahResearch, @AnonymousDown and all the usual trolls.  In short, they’re both neo-con faggots. But are they one and the same faggot, or are they separate fags who happen to be pursuing identical vendettas?

Before we get bogged down in analyzing their writing styles, here’s some lighter tit-bits to get things kick-started:

1. Last year, TR and J both attended Hacker Halted in Miami and DEFCON in Nevada. Based on what we know of the pair’s political leanings and infosec knowledge, that alone automatically narrows them down to less than 5,000 possible suspects.

2. TR and J both like sushi (a trifling detail, but one that helps build a picture of their personalities). TR: “@p0isAn0N not going to the right Pizzaria. If you are in Boston you should be going to BoLoCo for Burritos anyway. And Duozo for Sushi.”
J: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

3. Tom Ryan has form for assuming false identities – such as ‘Robin Sage’. See here for the full story:
http://www.darkreading.com/insider-threat/167801100/security/privacy/225702468/index.html

INTERESTING FACT: @RobinSage joined Twitter on 26th December 2009 – exactly one week after @th3j35t3r joined.

The connection between Tom Ryan, Robin Sage and Jester was first brought to my attention by this tweet from @LulzKitten on 29th March 2012:

“Okay, let’s cut the crap, hello @Th3J35t3r aka@TomRyanBlog aka robinsage. Game over. Was fun, at least sometimes. Next nemesis, plox!”
(Note: Direct links to all tweets quoted in this dox can be found cited in the conclusion.) After reading LulzKitten’s tweet, I cast a casual glance over the Twitter feeds of Tom Ryan and Jester, and instantly noticed some similarities between the pair.

The most damning evidence linking TR and J – the smoking gun – will be presented towards the end of this dox, if you can wait that long, but first, let’s perform some writing analysis. After all, if TR and J are the same person, there ought to be some similarities in their writing styles, surely? You betcha. Here we go then:

Anyone who’s followed J on Twitter and read his blog may have noticed that he has a very distinctive writing style. Let’s pick through some of Jester’s trademark phrases, and then see if we can spot them recurring in TR’s tweets:

4. ‘Hmmmm’. Jester likes to say ‘Hmmm’ ‘Errr’ and ‘Ahemmm’ a lot. In fact he likes to say them so much that he even uses these filler phrases in his blog titles, as well as littering his tweets with them. Here’s some examples:

5th April: “@deftpunkz – umm holy shit. I dont know what to say guys, errrr thanks, i think? -”

4th April: “Al-Qaida ‘blacked out’ on the internet (effectively switched off) >>>http://timesofindia.indiatimes.com/tech/news/internet/Al-Qaida-blacked-out-on-internet/articleshow/12529550.cms #infosec#saladin #ahemm”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

27th Feb: “#Wikileaks & #anonymous dump 5 million#strafor internal emails obtained by #anonymouslast Dec..umm this right here…”

21st March: “Anti-Anonymous hacker threatens to expose them (via MSNBC) http://www.msnbc.com/id/46716942<<< ummm too late. #military #cyber #security#infosec #DoD”

15th Nov, WordPress blog title: “Occupy Wall Street?? 99%?? Ummm.”

Hmmm, I wonder if Tom Ryan also likes to say ‘Hmmm’? Let’s take a look:

10th April: “How To Prevent Data Leaks From Happening To Your Organization http://zite.to/HCucc8hmmm…how do you prevent the carbon factor from leaking?”

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

15th March: “CSI tonight has a scent of Anonymous. Anthropology professor teaching about Hactivism. Hmmm who came it be?”

11th March: “@kennethlipp hhhmmmm do you think any anons donated money to his reelection campaign?”

7th March: “@CryptKper @v0ld4m0rt you are spot on! Who could that have been? Hmmmmm”

16th Feb: “@agentdarkapple Interesting! Hmmm! I can see why you think I would be L and you would be N. L doesn’t smile like me”

OK, that’s enough Hmming – on to point #5: ‘Tick tock’. Jester loves to say ‘Tick tock’ – it’s one of his favorite phrases. Look:

6th March: “From 3.5 months ago:https://th3j35t3r.wordpress.com/2011/11/19/if-i-am-wrong-ill-say-im-wrong-heres-my-apology/…… from 1 hour ago ….http://www.foxnews.com/scitech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement/ tick tock toldya.”

3rd August: “’RT @anonymousabu: @hjjrc @SparkyBlaze Your problem is with a ghost. Someone you can neither find nor stop.’ << you have same problem. #tick”

27th July: “@anonymousabu tick tock.”

24th July: “TICK TOCK. #toldyac2dc37a7d9d3238877a127f2d5171c9d”

21st June: “Tickety Tock…..”

25th June blog entitled LulzSec’s Cloudflare Configuration: “Tickety Tock Tock.”

Why, isn’t that a quirky little phrase? I wonder if Captain Hook – sorry, Tom Ryan – also uses the same terminology. Oh, what’s this we have here from 27th Feb?

“#Anonymous I am working on my big release. Hmmmm who should it goto? Tick Tock”

There’s even a ‘Hmmmm’ thrown in for good measure. How Jester-esque!

With a nudge and a wink, we move onto #6: Jester loves nothing more than to sign off his tweets with a sly wink. Just like so:

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

26th March: “Al-Qaida forums crippled in suspected cyber intervention http://j.mp/GSd8ih << bad things happen to bad people, apparently ;-) #infosec”

11th March: “@RepDanGordon @FBIPressOffice I merely stated u were on the list, u seem awful jittery. U need to calm down >> ;-)”

2nd Oct: “RT: @mach2600 @th3j35t3r It’s wobbling … up, down, up, down… <<< gotta love NGINX – always somethin huh ;-)”

16th June: “standby for supporting clarification onhttp://th3j35t3r.wordpress.com/2011/06/16/quick-n-dirty-just-for-clarification/?utm_source=Jesters+Court+Blog&utm_medium=twitter – close ya eyes if ya already saw it yesterday. ;-)”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s TR’s turn to have a sly wink:

5th April: “The beauty of data-mining in a social world, I don’t need to be connected to you, so you can’t block me. You just need to be on my radar ;-)”

5th April: “@x_ryujin_x @render64 @bitchiest @kalyptonetthink of what full dox did for Sabu ;-)”

4th April: “@LauraWalkerKC @BobbyCarbon@NavySEALsORG @Packetknife @HonorThemYou should record it ;-)”

14th March: “To Geeks & Nerds 3/14 is known as Pi Dayhttp://www.youtube.com/watch?v=JTZtuMdkUksTo Horny Men it’s known as Steak & Blow Job Day! The GF reminded me ;-)”

13th March: “@JackalAnon warned #Anonymous 2 Days Ago about OAuth and Apps. We’ve warned you about TOR. ;-)”

14th Feb: “Why I’m Glad My Boyfriend Isn’t On Facebook – Forbes http://j.mp/z9XNrP by @kashhill | Leaving Facebook made me never want to go back ;-)”

Next up, it’s similarity #7 – ‘Stay Frosty’. This, Jester’s catchiest of catch-phrases, crops up all over his tweets:

2nd April: “http://www.cbsnews.com/2100-202_162-20075647.html <<< still going on about this? Stay frosty and have a Cupcake??”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

26th Oct: “#hackerhalted left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what’s there. #stayfrosty”

25th Oct: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

Now let’s see what Monsieur Ryan has to say for himself:

10th April: “Iran plans to unplug the Internet, launch its own “clean” alternative http://zite.to/Iqm1Ba#anonymous @CabinCr3w Stay Frosty ;-)”

16th March: “@testeux1 Class on Strategy? I can teach one at The Spy Museum in DC @wikileaks @revmagdalen@AnonymousIRC @YourAnonNews Stay Frosty ;-)”

13th March: “#Anonymous in your time of fear those of you that have used delete.twitlan / tweeteraser / twitwipe A Special Thank You!!! Stay Frosty! ;-)”

13th March: “@jackie_singh @krypt3ia I was promoted today to Brigadier General Packet of The Cyber Brigade@th3j35t3r now reports to me! Stay Frosty ;-)”

12th March: “Finch + Reese = ;-) …. Stay Frosty & Watch Your 6!”

Hang on a sec, isn’t it a bit, well, *obvious* for Tom Ryan to be liberally dropping Jester’s favorite catchphrase into his tweets? Yep, you’re right – it’s very obvious. But here’s the thing: the AntiSec dox that named Jester as Tom Ryan landed in Pastebin on 11th March. Notice how TR deliberately goes out of his way to play up to the ‘Stay Frosty’ caricature in the ensuing days? That’s because he realizes that the more he pretends to be Jester, the more people will be inclined to write him off as just another Jester wannabe. For another example of this tactic, here’s how J tweets every time he downs a Muslim extremist website:

1st March: “http://www.rjfront.info – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of jihadist terror cells via web.”

1st March: “http://www.atahadi.com – TANGO DOWN. Temporarily. For online incitement to cause young muslims to carry out acts of violent jihad.”

Exactly one month later, on 1st April, TR tweets the following:

“www.ic3 .gov – TANGO DOWN. Temporarily. For not doing your job, & not arresting #Anonymous”

And: “www.fbi .gov – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of#Anonymous via web.”

At this point, obvious troll is obvious – within days of LulzKitten’s tweet linking Tom Ryan and Jester, TR goes out of his way to tweet ‘Stay Frostys’, Jester winks and ‘TANGO DOWN’s. To give him credit, it’s a pretty smart way to make people think you’re nothing more than a Jester fanboy. Sadly for Thomas, it’s too late; the evidence linking Tom Ryan to Jester began from the moment TR began tweeting in January 2012. Prior to AntiSec dropping Jester’s dox on 11th March, Tom Ryan had only tweeted ‘Stay Frosty’ twice in three months. Immediately afterward, he tweets it five times in four days – complete with the Jester’s trademark wink.

So does that mean that all of the foregoing information is is part of an elaborate ploy, cooked up by Tom Ryan and Jester, to obfuscate the identity of the real Jester? In the case of the ‘Stay Frostys’ and the ‘TANGO DOWN’s, yes, it probably is. Thankfully, there are dozens of other textual similarities between the pair – similarities that are too subtle to be part of a pre-planned disinformation campaign.

Which leads nicely on to point #8: ‘Much’. Note the phrase that appears in the following tweets from Jester:

18th June: “http://www.techhomethebacon.com/news/hacking-infosec/th3j35t3r-links-nakomis-to-lulzsec-group-cover-up-ensues.html – backpeddaling much? Hacked? lol. -”

18th June: “Back-pedalling much?https://twitter.com/#!/Anonakomis/status/81862870664609792 #js”

August 21st WordPress blog entitled If ya can’t beat em, make some shit up??? LMAO!: “coincidence much?” “projection much??”

I wonder if TR ever lets slip a similar phrase? Oh, what’s this?:
14th March: “@kaepora Nadim, delete much? You’re in the snitch crew ?https://twitter.com/#!/realytcracker/status/143411708369715201 of @Anonymousabu & @ioerror”

Coincidence much?

#9: Jester loves to leave trailing dots in his tweets:

9th April: “<<< drums fingers on desk….”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

22nd November: “AFK…….”

He also uses trailing dots when he’s typing live into Notepad in this YouTube video: http://www.youtube.com/watch?v=WeO44IWlkfU

More of Jester’s ‘trailing dots’ tweets are cited at the end of this dox. Now it’s TR’s turn to deploy this tactic:

6th April: “@kennethlipp that’s how it went down with Barrett Brown too. Remember they ended up going to every address for him….according to him”

5th April: “@Bitchiest @KalyptoNet @TomRyanBlog The Secretary disavows this tweet and everybody in it…”

4th April: “#Anonymous ever wonder why certain high ups in your collective are never V& …. Look at cases that never went to court & who has relocated”

Again, more examples of this idiosyncrasy can be found cited at the end of this dox, as well as liberally scattered throughout Tom Ryan’s Twitter feed.

#10: Arrows. Jester loves to use arrows to break up words in his tweets, <<just like this>>:

9th April: “”@VizFoSho: @th3j35t3r dun goofedhttp://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG@RepDan_Gordon” <<< Shit ya got me! What am I to do? Btw now I am near north pole.”

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

Now TR:

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

13th March: “Don’t know whether to laugh or feel bad but come on: (compatible;+MSIE+6.0;+Windows+98;+Win+9×4.90) << In This Day An Age??”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Glance through their tweets and you’ll see that J and TR use <<arrows>> all the time.

#10: UPPER CASE. Compare the tweets of J and TR and you’ll notice that they both love to highlight single words in capitals. Jester first:

9th April: “WARNING: Tweeps in mirror are closer than they appear.”

18th March: “I’m still asked WHY I hit #wikileaks, skip to 28mins 12secs & Major TJ O’Connor abt sums it uphttp://www.youtube.com/watch?v=buY3I4PkK98<<worth watching it all.”

11th March: “@repdangordon be advised, when u file ur complaint to feds, they ARE going need ur cell for forensics to determine IF I hacked u at all ;-( ”

Tom Ryan’s turn:

5th April: “INTERESTING: What is this ugly brown stain on a Key Member of Anonymous’ back? I need to do my cropping for the new site launch. Peace!”

5th April: “#Anonymous why so many military and sovereign citizen connections? GOD I aam glad I took 2 weeks to lay low.”

4th April: “@MaxVenator Too cold and windy for the Hamptons BUT you gave me a good idea. Maybe we can turn Plum Island into a resort for#Anonymous”

Jester and Tom Ryan both use this technique DOZENS of times in their tweets.

#11 features a more subtle similarity between our Jester and our Clown:

Jester, 21st August: “If ya can’t beat em, make some shit up??? LMAO! -”

TR, 16th March: “@exiledsurfer ROFLMAO! Reminds me of being in Bahrain & Abu Dhabi hearing Garth Brooks “Friends in Low Places””

Jester and Thomas don’t always laugh their asses off, but when they do, you can bet it’s in upper case with an exclamation mark at the end. (More examples, as always, are cited in the conclusion of this dox.)

#12: J and TR aren’t very good at spelling. They struggle especially with words such as ‘its’ and ‘it’s’. Jester’s tweets aren’t usually too bad for typos, as he doesn’t rush them (because he knows they will be analyzed by a wide range of foes who might otherwise have cause to mock him for his poor grammar). He also has the autocorrect on his Android phone to help him. He still struggles with those pesky apostrophes that autocorrect can’t pick up however, especially when he tweets from his desktop:

6th March: “WTF is Wikileaks gonna do now it’s source of illegally obtained private info (anon/lulz) has had it’s head & skillset removed? #2birds1Stone”

21st June: “Seems almost as if ‘somebody’ doesn’t want you to see my last link – here’s a pastebin of it’s content.”

In his WordPress blog however, Jester often mixes up his apostrophes, especially in words such as ‘its’:

“With Netcat listening at the other end for incoming connections, you can configure it to execute it’s own script when it receives a connection for example to send a Message of the Day to the connecting device, you would run netcat like this on your server”

Watch his two YouTube videos (links cited at the end) in which he types directly into Notepad and you’ll see he also fails to put apostrophes into words such as  ‘lets’, ‘its’ and ‘Thats’. 2:20 into his XerXes DoS Attack video and you’ll see that the text displayed on Jester’s self-designed software also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle, while at 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also makes the same error when typing into Notepad.

Does Tom Ryan fare any better in the spelling stakes? No. In fact he’s even worse when it comes to tweeting typos. That’s because Thomas tweets ten times as frequently as Jester, tweets more hastily (lots of rushed replies to his Twitter buddies) and because he writes the tweets on his Mac, which doesn’t autocorrect his mistakes. Look:

4th April: “@AdrianChen surprised your not all over the@Anonw0rmer arrest and shortly after the disappearance of @itskahuna”

5th April: “To those I owe something too, It’s on it’s way!”

30th March: “RED ALERT: tomorrow is #NoClick31 just as a precaution. Rumor has it #Anonymous is using it’s Porn Bots for #opBlackout click to DDOS attack”

Wanna see more? Just read his tweets.

OK, we’ve almost reached the really juicy stuff linking Jester and Thomas, but first there are a couple more writing similarities to rattle through:

#13: J and TR write numbers numerically rather than alphabetically – even when composing short tweets.

Jester, 28th Feb: “4 more Anons V&’ed http://tinyurl.com/8a2g5k5#anonymous”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

27th November: “#saladin (XerXes bro)- ‘the best weapon is the one u never have 2 fire…I prefer the weapon u only need 2 fire once.’”

20th July: “Never saw a wild thing sorry 4 itself. Small bird drop frozen dead from bough without ever having felt sorry 4 itself.”

TR – yep, you’ve guessed it – does exactly the same:

5th April: “@ohmylulz will with 2 False Positives.@missarahnicole @AsherahResearch”

4th April: “Ruh roh! A certain key #Anonymous member disappears for 4 days then reappears. We know what that means.”

3rd April: “@Ihazcandy I should start digging into them. Since I have 2 weeks of downtime.”

OK, moving on (we’re nearly done, I promise) to #14: Hashtags. If you go to tweetstats.com and enter TR and J’s twitter names into separate windows, a series of pretty graphs will be generated that will allow you to compare their tweeting patterns. You’ll notice that they tweet from separate devices, to eliminate the possibility of accidentally tweeting to the wrong account – Tom Ryan likes to keep his iPhone in one pocket and his Android in the other for when he’s playing Jester. Click on the Tweet Cloud tab at the top of the page and you’ll be able to view the most frequent hashtags used by both parties. Not too surprisingly, given their obsession with all things masked, it’s #anonymous. There are also three other hashtags that the pair use prominently however – #fail, #justsayin and #infosec. The latter one is understandable, but the other two? Interesting. Let’s see some #fail and #justsayin in action, starting with Jester:

3rd November: “#opcartel #anonymous You should really listen to what this man has to say. Remember your track record is full of #fail”

15th August: “@anonymousabu U R #fail. U hurt who u claim to fight for (lol), u have agenda < http://reg.cx/1Qps& the agenda is >”

14th August: “So @landrytom u finally got ur mention. Damn u zeroed my ‘xchat’? Please all check out his timeline. Then ask him where is the pwnage? #fail”

29th July: “1st up: My doxing. That’s a #fail. (again) I have never been Ryan Berg, John Willander, Robin Jackson, Anthony Freed, Beau Colvin. #opFrosty”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s Tom Ryan’s turn to #Fail (#Justsayin):

5th April: “@agentdarkapple @AsherahResearch she’s definitely is no @elizadushku , Mila Kunis or Megan Ackerman. So she’s a #Fail”

2nd April: “@subverzo TY for verifying 2 alternate personas yours & @CrappyTires . FYI, Everyone in the CT world knows Shumukh al-Islam Forum. #FAIL”

9th March: “@AnonymousIRC you do know they rig cases to#FAIL inorder to capture bigger FISH ….. Right?@atopiary @lolspoon @AnonymouSabu”

9th Feb: “Dangerous Tweets: Arrested, fined in 140 characters or less http://j.mp/yWAV4G << What ever happened to contextual analysis? another#Fail” (Note the classic Jester-style arrows used in this tweet as well.)”

10th March: “#anonymous remember threatening people or family members can lead to several crimes. If they are harmed it becomes much worse. #justsayin”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Plenty more examples, as always, can be found cited in the footnotes at the end of this dox.

OK, here endeth the writing analysis lesson. Thank you for your patience :) It would be fair to say we’ve established that Jester and Tom Ryan tweet in an uncannily similar manner, but that’s not all. Now we get on to the really good shit…

#15: Tweet times. Using tweetstats.com, it’s possible to compare the times at which J and TR tweet. A quick glance at their respective Tweet Density graphs reveals a similar pattern:  neither of them tweets between 3am and 7am EST: they’re both East coast bitches. Interesting.

#16: A few days ago, @VizFoSho tweeted the following image:

http://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG

It depicts two Jester tweets from 7th April, both geo-stamped with Atlantic City, NJ on them. Atlantic city is within 150 miles of NY, where Tom Ryan lives. On 26th March, Jester also posted a single tweet from New York: https://twitter.com/#!/th3j35t3r/status/184333789697282048

Normally, Jester’s tweets don’t reveal his location. Up until April 2012, there had only been four instances in which Jester’s tweets revealed his location – and two of those occurred when he was at DEFCON Nevada and Hacker Halted in Miami, occasions when he was undoubtedly eager to reveal his location in order to prove he was in attendance. Were the New York and Atlantic City revelations accidental (Tor for Android not working properly perhaps?) or was Jester trying to provide more misinformation?

After @VizFoSho pointed out the NJ link (the NY slip-up had gone unnoticed), Jester went out of his way to post two tweets from ridiculously exotic locations – Cape Town on 9th April and then Hawaii on 10th April:

https://twitter.com/#!/th3j35t3r/status/189464600318722049
https://twitter.com/#!/th3j35t3r/status/189464600318722049 “The octopus here is amazing. Dontcha think :-)”

Jester has never previously switched his location to a far-flung location purely for the lulz. Why should he suddenly be trying so hard now that he’s been identified as an East coast slacker? If he’s not Tom Ryan, why should be bothered if people think he’s from NJ or NY?

On 4th April, Jester made the second of his two Atlantic City tweets at 4:03pm. 11 minutes earlier, Tom Ryan had also posted a tweet. For the next 48 hours, neither account tweeted – a rare occurrence, especially for TR who averages over 30 tweets a day. Enjoying a couple of days in Atlantic City playing the slots, perhaps?

Here are the 4th April tweets from both parties:

https://twitter.com/#!/th3j35t3r/status/187610604314431488

https://twitter.com/#!/th3j35t3r/status/187616455762784257

https://twitter.com/#!/TomRyanBlog/status/187612824187584512

Curiouser and curiouser. But that’s not all. On 23rd March, TR tweets:

“Headed to South Beach to enjoy this great weather! Later Tweeps!”

https://twitter.com/#!/TomRyanBlog/status/183199880922148864

For the next 48 hours, Jester and Tom Ryan are both absent from Twitter.

A month earlier, on 17th February, the same thing happens after TR tweets:

“Off the Grid for a few days ! Have a great 3 day weekend!”

https://twitter.com/#%21/TomRyanBlog/status/170321854723129344

For the next four days, neither party tweets. The first person to break the Twitter silence is Jester, and it’s another rare instance of him revealing his location – Arlington VA.
https://twitter.com/#!/th3j35t3r/status/172077181051219968
Enjoy your three-day weekend, Thomas?

I stated earlier that until April Jester had never previously switched his location to a far-flung country, but I lied – there IS actually one occasion when Jester appeared to be out of the country. On 25th January, he posted the following tweet:

“To all who have DM’ed asking after my whereabouts & welfare…am safe & limbering up. It’s a brave new year. TY 4 support. Stay Frosty.”
https://twitter.com/#!/th3j35t3r/status/162261098035298304

His alleged location? Brescia, Italy. What about Thomas Ryan – what was he up to around this time? Well here’s the thing: between 23rd and 26th January, TR (a man who likes to tweet all day, erryday) doesn’t post a single tweet. Too busy enjoying the bruschetta, washed down with a bottle of Barolo perhaps?

A final word on correlating Twitter times before we move onto our final two points: take a look at the timeline for Jester and Tom Ryan’s tweets. Notice how they often tweet at almost exactly the same time as one another? For example, take Tuesday 10th April. After two hours without activity from either account, Thomas posts the following at 15:30pm:
“Now I feel really special. Someone created a hidden stream about me and monitors it.”
One minute later, at 15:31, Jester tweets “@alemarahweb‏ – ‎http://www.alemara1.com‏ – TANGO DOWN – أنا كنت”
Observe any two Twitter accounts for long enough and you’ll find timing coincidences of course. However, compare Jester and Tom Ryan’s accounts on any given day and you’ll spot a predictable pattern: they always broadly correlate i.e. there is a short burst of tweets, followed by a 45 minute break while Jester/Ryan goes for a wank or to chow down some beef jerky.

Right, two more points to raise and then I’ll leave you in peace:

#17: When LulzKitten tweeted Jester’s dox on 29th March, how did Tom Ryan – the man with the military wallpaper on his Twitter page – respond? “@J_P_Holloway @lulzkitten @YourAnonNewsyou guys really suck at DOXing thinking I am@th3j35t3r everyone knows I was never in the Army #fail”
https://twitter.com/#!/TomRyanBlog/status/185189598677319680

Two things stand out here: firstly, we have no way of knowing that Jester was in the army. Yes, he has an interest in all things military, but the rumor that he actively served in the army is widely believed to be false.

On 13th March however, TR tweeted the following: “When I was in the military, Greenpeace would try to board Aircraft Carriers. Some things aren’t smart & never thought of till it’s too late.”
https://twitter.com/#!/TomRyanBlog/status/179637065154170880

Military, shmilitary; does anyone see a connection here? Thought so. Without further ado, let’s proceed to our final, fateful tweet of interest. On 10th February, Thomas Ryan tweeted the following:

“I wonder if operating Multiple Personas has ever given anyone Multiple Personality Disorder.”

I don’t know Jester, you tell me ;) Tick tock. No response? Oh well, Stay Frosty…

**********

POSTSCRIPT: Could it be that Tom Ryan is such an attention-whore that he’s trolling us all in the hope of being mistaken for the Jester? I guess it’s technically possible, but if so, it’s the most elaborate and painstaking trolling campaign ever conceived – and one that would have to involve the collusion of both parties. If, by some miracle, Thomas Ryan is not Jester, he knows exactly who Jester is – to the extent where he probably even vacations with him. When you review all the evidence however, there can only be one logical conclusion to draw: they are one and the same person.

On 13th March, Tom Ryan posted the following poignant message: “@ArtByAlida although Anonymous doesn’t like@th3j35t3r I do. It’s safer that certain people are never doxed.”
https://twitter.com/#!/TomRyanBlog/status/179636120710152192

You’re right Tom – it would be safer, but the truth always comes out in the wash, don’t you find? I hope you’ve got a few passports lying around, cos you’re gonna need them. Remember those Muslim extremists whose websites you downed and whose threats you retweeted? Oh, they mad. They real mad.

One last thought before I shovel the dirt over Jester’s shriveled corpse: I notice that your Twitter nick is Boondock Saint, in tribute to The Boondock Saints, a movie about two Irish vigilantes. Just out of interest, I wonder what The Internet Surname Database would make of Thomas Ryan’s moniker?

http://www.surnamedb.com/Surname/Ryan

Why, they appear to believe that Ryan is an Irish surname. To quote from my favorite hacktivist for good, ‘Coincidence much?’

Congratulations Thomas; you just got pwned by an amateur who doesn’t even have the skills to label himself a skid, never mind a hacker. Butthurt much?

In the words of your nemesis, @anonymouSabu, “Nigga, troll harder.”

pwned by @spoolfiend

**********

Citations:

LulzKitten tweet linking TR and J: https://twitter.com/?utm_medium=twitter&utm_source=twitterfeed#!/YourAnonNews/statuses/185150794079809536

Check when th3j35t3r and RobinSage joined Twitter: http://www.whendidyoujointwitter.com/

TR’s LinkedIn (where you’ll see proof that he attended Hacker Halted and DEFCON last year): http://www.linkedin.com/in/tommyryan

TR and J professing their love of sushi:
https://twitter.com/#!/TomRyanBlog/status/178202424056610817
https://twitter.com/#!/th3j35t3r/status/128849629939892224

Tom Ryan dox by AntiSec: http://pastebin.com/ZAxBWKi8

J likes to say ‘Hmmm’ a lot:

https://twitter.com/#!/th3j35t3r/status/187996120180457472

Occupy Wall Street?? 99%?? Ummm.

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/174163673940631552

https://twitter.com/#!/th3j35t3r/status/182268058168082432

https://twitter.com/#!/th3j35t3r/status/187535767843778560

TR also likes to say ‘Hmmm’:

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/180117386291195906

https://twitter.com/#!/TomRyanBlog/status/178896960546287617

https://twitter.com/#!/TomRyanBlog/status/177482894443417600

https://twitter.com/#!/TomRyanBlog/status/170195932388925441

https://twitter.com/#!/TomRyanBlog/status/189680060863754241

J goes ‘Tick tock’:

https://twitter.com/#!/th3j35t3r/status/96268183723450369

https://twitter.com/#!/th3j35t3r/status/177033974324002816

https://twitter.com/#!/th3j35t3r/status/83145887307677696

https://twitter.com/#!/th3j35t3r/status/95195869921554433

https://twitter.com/#!/th3j35t3r/status/98828156663889920

Lulzsec’s CloudFlare Configuration

TR goes ‘Tick tock’:

https://twitter.com/#!/TomRyanBlog/status/174132025215811585

J ‘Stay frosty’:

https://twitter.com/#!/th3j35t3r/status/186923663734489088

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/129246959021203456

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/81862725638160385

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TR ‘Stay frosty’:

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179298552680415232

https://twitter.com/#!/TomRyanBlog/status/178571536691765249

https://twitter.com/#!/TomRyanBlog/status/178529239052730368

https://twitter.com/#!/TomRyanBlog/status/178336251240382464

https://twitter.com/#!/TomRyanBlog/status/179622057305317376

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

J likes to wink:

https://twitter.com/#!/th3j35t3r/status/184373769958211584

https://twitter.com/#!/th3j35t3r/status/120271829377097728

https://twitter.com/#!/th3j35t3r/status/76373640832225282

https://twitter.com/#!/th3j35t3r/status/185019516793786370

https://twitter.com/#!/th3j35t3r/status/81477469135319040

https://twitter.com/#!/th3j35t3r/status/178878010961833986

TR likes to wink:

https://twitter.com/#!/TomRyanBlog/status/187885131976024064

https://twitter.com/#!/TomRyanBlog/status/187372927946211328

https://twitter.com/#!/TomRyanBlog/status/179932280809197568

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/169492746871119873

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

https://twitter.com/#!/TomRyanBlog/status/179669923163938816

https://twitter.com/#!/TomRyanBlog/status/187914228810784769

J ‘much?’:

https://twitter.com/#!/th3j35t3r/status/82200919365787648

https://twitter.com/#!/th3j35t3r/status/81871769832665088

If ya can’t beat em, make some shit up??? LMAO!

TR ‘much?’:

https://twitter.com/#!/TomRyanBlog/status/179927195022659584

J ‘…’:

https://twitter.com/#!/th3j35t3r/status/189139338796351492

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/186749312166932483

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/138951576789331968

https://twitter.com/#!/th3j35t3r/status/168769540598145025

https://twitter.com/#!/th3j35t3r/status/179233292682407937

https://twitter.com/#!/th3j35t3r/status/184321677092597760

TR ‘…’:

https://twitter.com/#!/TomRyanBlog/status/188088227704487936

https://twitter.com/#!/TomRyanBlog/status/187342615648272384

https://twitter.com/#!/TomRyanBlog/status/188829946439929856

https://twitter.com/#!/TomRyanBlog/status/189449964219400194

https://twitter.com/#!/providesecurity/status/187253830315016192

https://twitter.com/#!/TomRyanBlog/status/189757038778269696

https://twitter.com/#!/Render64/status/187912159655772161

J ‘<<arrows>>’:

https://twitter.com/#!/th3j35t3r/status/189463655811780609

https://twitter.com/#!/th3j35t3r/status/185019516793786370

TR ‘<<arrows>>’:

https://twitter.com/#!/TomRyanBlog/status/179683104972210176

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/178555495806803968

https://twitter.com/#!/TomRyanBlog/status/179321093897723904

J using UPPER case:

https://twitter.com/#!/th3j35t3r/status/189165520556277761

https://twitter.com/#!/th3j35t3r/status/178895612723478531

https://twitter.com/#!/th3j35t3r/status/181438361511280640

https://twitter.com/#!/th3j35t3r/status/82538803188862976

https://twitter.com/#!/th3j35t3r/status/98386681836736512

https://twitter.com/#!/th3j35t3r/status/177544329458491392

https://twitter.com/#!/th3j35t3r/status/135438221483048960

https://twitter.com/#!/th3j35t3r/status/177568887334903808

https://twitter.com/#!/th3j35t3r/status/110676313366462464

https://twitter.com/#!/th3j35t3r/status/127396730621788160

https://twitter.com/#!/th3j35t3r/status/100282273072549890

https://twitter.com/#!/th3j35t3r/status/178566407909412866

https://twitter.com/#!/th3j35t3r/status/132173511874711552

https://twitter.com/#!/th3j35t3r/status/94485325744848896

https://twitter.com/#!/th3j35t3r/status/97333572955947008

https://twitter.com/#!/th3j35t3r/status/91970882095943680

https://twitter.com/#!/th3j35t3r/status/141002481260961792

TR using UPPER case:

https://twitter.com/#!/TomRyanBlog/status/187908914417893379

https://twitter.com/#!/TomRyanBlog/status/188461215348031489

https://twitter.com/#!/TomRyanBlog/status/187018163567853568

https://twitter.com/#!/TomRyanBlog/status/185423913197637633

https://twitter.com/#!/TomRyanBlog/status/187240901574266881

https://twitter.com/#!/TomRyanBlog/status/180380942614016001

https://twitter.com/#!/TomRyanBlog/status/187903623693467648

https://twitter.com/#!/TomRyanBlog/status/187361681452699649

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187322975383588864

https://twitter.com/#!/TomRyanBlog/status/187309018623127552

https://twitter.com/#!/TomRyanBlog/status/187558445036216320

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187656738818899968

https://twitter.com/#!/TomRyanBlog/status/187261297669308416

https://twitter.com/#!/TomRyanBlog/status/187530160134828032

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

Jester ‘LMAO!’:

https://twitter.com/#!/th3j35t3r/status/105305979733815296

TR ‘ROFLMAO!’:

https://twitter.com/#!/TomRyanBlog/status/180709354624925696

https://twitter.com/#!/TomRyanBlog/status/179773457943371776

https://twitter.com/#!/TomRyanBlog/status/187709243087003650

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

https://twitter.com/#!/TomRyanBlog/status/187272732147322880

https://twitter.com/#!/TomRyanBlog/status/187583747154132992

J struggles with apostrophes:

https://twitter.com/#!/th3j35t3r/status/83239272504770560

https://twitter.com/#!/th3j35t3r/status/177080046597578752

https://twitter.com/#!/th3j35t3r/status/186749312166932483

(See his blog for heaps more examples.)

http://www.youtube.com/watch?v=WeO44IWlkfU (Skip to 5:07); ‘lets’, ‘its’ and ‘Thats’ should all have apostrophes.

http://www.youtube.com/watch?v=yJTvzErKHWE Look at the Notepad he’s typing into: ‘lets’ should have an apostrophe and ‘peak’ should have two ‘e’s in it. Skip to 2:20: the text on Jester’s self-designed Xerxes machine also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle. At 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also types the same misspelt word into Notepad.

TR also struggles with apostrophes:

https://twitter.com/#!/TomRyanBlog/status/187920367845781504

https://twitter.com/#!/TomRyanBlog/status/187710784690855936

https://twitter.com/#!/TomRyanBlog/status/180432605680902144

https://twitter.com/#!/TomRyanBlog/status/187645320442822656

https://twitter.com/#!/TomRyanBlog/status/187531807598714880

https://twitter.com/#!/TomRyanBlog/status/187917710498336769

https://twitter.com/#!/TomRyanBlog/status/185737304290234368

https://twitter.com/#!/TomRyanBlog/status/178485680899502081

J tweets ‘TANGO DOWN’:

https://twitter.com/#!/th3j35t3r/status/175040242477318144

https://twitter.com/#!/th3j35t3r/status/175029005718794240

TR tweets ‘TANGO DOWN’:

https://twitter.com/#!/TomRyanBlog/status/186482996352778240

https://twitter.com/#!/TomRyanBlog/status/186482690797744128

J always writes numbers numerically:

https://twitter.com/#!/th3j35t3r/status/174540542724669441

https://twitter.com/#!/th3j35t3r/status/93771304607563776

https://twitter.com/#!/th3j35t3r/status/114830590452310016

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/140925221090758656

https://twitter.com/#!/TomRyanBlog/status/185576329712910336

TRB always writes numbers numerically:

https://twitter.com/#!/TomRyanBlog/status/187211721365139456

https://twitter.com/#!/TomRyanBlog/status/187712594373648384

https://twitter.com/#!/TomRyanBlog/status/178965908696481793

https://twitter.com/#!/TomRyanBlog/status/187680293984022529

https://twitter.com/#!/TomRyanBlog/status/187539614876176384

Compare TR and J’s tweet patterns, in particular the time of day they tweet at and the hashtags they use: http://tweetstats.com (Open two separate windows and enter their Twitter names).

J using #Fail:

https://twitter.com/#!/th3j35t3r/status/132152349639720960

https://twitter.com/#!/th3j35t3r/status/103200916156588032

https://twitter.com/#!/th3j35t3r/status/102784136015646722

https://twitter.com/#!/th3j35t3r/status/97030633330716674

https://twitter.com/#!/th3j35t3r/status/178966110694150144

J using #Fail:

https://twitter.com/#!/TomRyanBlog/status/187708057344671744

https://twitter.com/#!/TomRyanBlog/status/167697098047889411

https://twitter.com/#!/TomRyanBlog/status/177978089203175424

https://twitter.com/#!/TomRyanBlog/status/178269119316107264

https://twitter.com/#!/TomRyanBlog/status/186927307544477697

https://twitter.com/#!/TomRyanBlog/status/178573080438898689

https://twitter.com/#!/TomRyanBlog/status/178982123959619585

https://twitter.com/#!/TomRyanBlog/status/185189598677319680

https://twitter.com/#!/TomRyanBlog/status/186930868273676288

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

J using #Justsayin:

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TRB using #Justsayin:
https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/179578215411630080

https://twitter.com/#!/TomRyanBlog/status/178518183525888000

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

https://twitter.com/#!/TomRyanBlog/status/184270112361168898

_________________________________________________________________________

PIRAX DOXING CONTINUED…  (The ‘smedley manning’ debacle)
You took this DOX’ing really well, to be honest. You shook it off as a mere fancification numerous times, and continued forward head-strong, apparently unmoved by those watching from the outside. But you knew deep-down that you had to eradicate this DOX from the minds of the enemies you have procured over the years. You know that a lot of people would like to see you gone. So, you came up with a plan.

The plan went something like this:
On May 10th, you registered the Twitter account @cubespherical and labeled it as “Smedley Manning”, as an obvious satirical homage to the now imprisoned Bradley Manning, a REAL soldier who fought for truth. You then exchanged a few messages with @th3j35t3r to make it look like a legitimate conversation, and began to “leak” information about yourself. We both know that this information is false, and was only created to distract others from the real DOX, located above. We know you are somewhat intelligent. However, there will always be those who will outsmart you. Consider yourself outsmarted.

Here is the analysis, broken down:
After you took down both your Twitter and WordPress blog, the mainstream blogosphere was certain you had finally been figured out. They assumed this was your acknowledgement of your own defeat and were positive you had been successfully DOX’d by @cubespherical. You were finally giving up. You knew they would react this way… It was all a part of your master plan. But, in reality, you ARE @cubespherical. Yes, @th3j35t3r and @cubespherical are the same person. Nicely done, Tom. You fooled almost everyone. But, like all good things (“good” meaning something along the lines of “idiotic” in this case), you must come to an end.

So how can we justify this claim? Where is our proof? Simple: You gave us everything.

Red-Flag #1: You have been a pretty regular user of Twitter until very recently, after the above DOX was published.

Red-Flag #2: An entirely new DOX is now being teased, even while the above DOX is as sure-fire as they come. Who would believe that a DOX coming from @cubespherical, an entirely new one at that, would be legitimate?

Red-Flag #3: You sat idle on Twitter while @cubespherical AKA Smedley Manning openly talked shit about you, only responding once things became heated on InfoSecIsland. This will take some psychological investigation, but it is damning nonetheless. Your article here is the most revealing bit of all:

http://www.infosecisland.com/blogview/21348-Not-Totally-Sure-What-Just-Happened.html

You started off with the following line, paraphrased: “I thought Smedley was my friend at first [you used the word ‘supporter’] hurr durr, but he then started threatening me hurr durr.” That doesn’t even sound realistic. But it *is* a subtle way to garner sympathy. I applaud you for you effort.

Red-Flag #4: Next up is your subtle jab at Anonymous. You changed @cubespherical’s avatar to a picture of a Guy Fawkes mask and deleted the Bitcoin address in exchange for the “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.” motto.

In your article, you say “Even if this was a common troll, he just demonstrated that any fool can speak for and ‘as’ Anonymous.”

It is clear that you did this for one reason: to throw spears at Anonymous while appearing to be a victim of cyber-bullying on a much grander scale.

Red-Flag #5: You are subconsciously promoting @cubespherical’s efforts for Bitcoin donations.
While appearing to mock @cubespherical, while still somehow conveying him as a threat, you still manage to forget to *NOT* post his Bitcoin address. Our thoughts: You WANT @cubespherical to make some money off of some Bitcoin donations. You yourself use Bitcoin pretty regularly and accept it for donations on your blog. How do we know you aren’t just promoting @cubspherical’s Bitcoin address so that YOU can profit? Here are your words, directly lifted form your blog post:

“So here’s the throwdown. ‘Smeddles’ drop my dox. Do it. You have proved and shown nothing. Only that you are completely failing. You have no bitcoins donated, you have shown 2 things to me, Anonymous have too many chiefs and not enough indians, and that your numbers, at least 9000 allegedly, combined have  0.00000001 bitcoins between them. Here is what you have so far. lol.

https://blockexplorer.com/address/15JDgkwFVXvuxCt66eUQ434ty3jrvwPfGe

Either that or they were clever enough to realize you were full of it from the get go. As I have demonstrated and stated many times before, I will never ask the public for any money.”

WHY WOULD YOU EVEN NEED TO REMIND PEOPLE THAT YOU DON’T ASK FOR DONATIONS IF THIS ISN’T EVEN YOUR BITCOIN ADDRESS? Simple. Because it actually is.

It is also worth noting that both Smedley Manning and th3j35t3r favor Ubuntu 11.xx releases. They like using GNOME, too:
http://3.bp.blogspot.com/-9LpW_-t2lkU/TpmnnnPHn6I/AAAAAAAABMA/AKBOIZUm4sM/s1600/Opera-Next-Ubuntu-Oneric.png
http://4.bp.blogspot.com/_FJH0hYZmVtc/TF59PLnLUJI/AAAAAAAAJNE/IoVU8sTFyUo/s1600/Opera+Mobile+for+Linux+(1440×797)_023.png

To conclude this talk, Tom, we would like to take this privilege to give to you a formal FUCK YOU. You have been DOX’d and your master plan to avoid the inevitable by creating a new nemesis and a new DOX while asking fools to send you money for this bogus DOX has been foiled. You are over. No one cares about the small sites you take down with your shitty XerXes tool and everyone knows you didn’t actually DDoS WikiLeaks, or even have the ability to do so. You are a fame-whoring idiot that has finally been pulled so low, you serve no purpose for ever standing up again. Goodbye.

XOXO,
PiraX <3

@TheRealPiraX
http://pirax.de
Donate Bitcoin: 17gMaYgUsx7dj532s3ezXmfMrVhJ1BfRC1
We would also like to give a shout-out to our home on VoxAnon IRC. Much love to #voxanon _________________________________________________________________________

 

BUT THATS NOT IT – DON’T FORGET THIS LITTLE GEM…

 

Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the group’s plans to authorities and corporations targeted by protesters.

Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he’s done contract work for the U.S. Army and he brags on his blog that he leads “a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers’ social media accounts, and hanging out with protesters in Lower Manhattan.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDAs part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.

What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI’s New York-based cyber security team.

 

Oh, and what do real PATRIOT VETERANS think … ?


VETERAN: We didn’t “serve our country”; We serve the interests of Capital

“I’ve seen a ton on the facebooks about “thanking veterans for their service.” As a veteran let me just be very straightforward and honest with you. We didn’t “serve our country”; we don’t actually serve our brothers/sisters or our neighbors. We serve the interests of Capital. We never risked our lives or spent months on deployment away from our family and friends so they can have this abstract concept called “freedom”. We served big oil; big coal; Coca-Cola; Kellogg, Brown, and Root and all the other big Capital interests who don’t know a fucking thing about sacrifice. These people will never have to deal with the loss of a loved one or the physical and/or psychological scars that those who “serve”, and their families, have to deal with for the rest of their lives. The most patriotic thing someone can do is to tell truth to power and dedicate yourself to building power to overthrow these sociopathic assholes. I served with some of the most real and genuine people I’ve ever met. You’ll never see solidarity like the kind of solidarity you experience when your life depends on the person next to you. But most of us didn’t join for that; we joined because we were fucking poor and didn’t have many other options.”       -Anonymous

 

IN CONCLUSION:  An obvious desperate grab to stay relevant – Does anyone care?

 

ANSWER: jester who?  Now back projects that create positive change in the world, instead of discussing individuals who support & enable the Military Industrial Complex of death, destruction, and global enslavement of Humanity.

 

OH AND FOR THOSE WHO FORGOT, A REMINDER:

cia-owns-al-qaeda

 

Is Anonymous The Internet’s Most Powerful Mirage?

Is Anonymous The Internet’s Most Powerful Mirage?

You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.

Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny things such as internal emails and the entire database dump.” They branded the heist as “Monday Mail Mayhem,” said it could help people “know the corruption in their government.” They posted it on Pirate Bay as a torrent, for anyone to see — and 1.7 GB was just the size of the zipped file.

Not many people bothered to check what was actually in the huge file.

Step in Identity Finder, a software security firm.  Privacy officer Aaron Titus downloaded the payload last week and sifted through it all, checking out the veracity of the claims by Anonymous.

Turned out they were overhyped.

The zipped file contained 6.5 GB of web server files and “does not appear to contain any sensitive personal information, internal documents, or internal emails,” according to Titus. A folder named “Mail” was mostly empty, though it contained two administrative email addresses. There were also no personal details (social security numbers or credit card numbers), and the worst the breach had done was reveal the site’s web server file, which could be leveraged by other hackers for future attacks.

It looked like the breach had done more to grab attention from the media and the Department of Justice than do any real damage.

Surprised? You shouldn’t be. This was another illustration of the power of Anonymous as a continuing online insurgency: not in hacking per se, but its constant ability to grab eyeballs, project power, and give followers a voice and sense of purpose unlike any they’ve experienced before. What’s important for companies and policy makers (the typical targets) to note is that it’s oftentimes more a tease than anything else.

Other examples:

1) Earlier this month Fox News reported that an online group called TheWikiBoat, aligned with Anonymous, planned to bring down the websites of 46 major companies on Friday May 25. TheWikiBoat said in a public statement that it had “no motives other then [sic] doing it for the lulz,” (ie. for shits and giggles). The FBI’s Cyber Division was concerned enough to send an email to the likes of Apple Computer, McDonald’s and ExxonMobile warning them of a potential attack — which didn’t happen.

2) Around this time last year, a single supporter of Anonymous managed to grab global headlines when he tweeted that he had a cache of bank of America emails. What he eventually released was an e-mail exchange between himself and a BofA ex-staffer who made (what admittedly looked like valid) complaints about the bank’s management. But it did nothing to the bank’s stock price, and the news agenda quickly moved on.

3) In December 2010 Anonymous claimed responsibility for taking down the websites of PayPal, MasterCard and Visa after these firms nixed online donations to WikiLeaks. How? Supporters implied it was thanks to thousands of volunteers who had become part of an cyber army by downloading a software tool called LOIC. What really happened: a couple of supporters with botnets temporarily took the sites down — but the notion that Anonymous was an international “army” of hacktivists was left floating around the Internet.

Time and again, online supporters have laid claim to the brand power of Anonymous, invoking its name, imagery such as the Guy Fawkes logo and headless, suited man surrounded by olive leaves, along with the tag line, “We are Anonymous… Expect us.” The result: news outlets and policy makers sit up and listen, more so than they would if those supporters used their real names, or were literally anonymous. The power of Anonymous is propagated by the continued use of a name wrapped in hype and disinformation, more than the occasional real hacks.

The Anonymous “brand” gets street cred from cyber attacks carried out by a minority of hackers who know how to use SQL injection techniques or who know people who control botnets. The additional hype comes from the impassioned, sometimes-threatening rhetoric of less-skilled-but-enthusiastic followers on Twitter or the imageboard 4chan.

Why do these supporters join in? Everyone has their own reasons — something to do, the engaging community of people to talk to, the thrill of being part of a secret crowd. Sources in Anonymous that I have spoken to over the last year often speak to a sense of purpose they get from Anonymous, and sometimes the justification to do the subversive, often-illegal things online that they would not otherwise do. It’s mob mentality with a twist — the activist element of protest, twinned with the culture of trolling and exaggeration that runs through image boards like 4chan.

For law enforcement, who happen to chase anarchists with particular zeal in the United States, there isn’t so much a criminal organization to rope in as the mirage of one. No system with leaders and rules, but a culture and etiquette that is changing all the time. Many of the figureheads who organized the Anonymous attacks against Scientology in 2008 have left the community to focus on college or full-time jobs, many happy to break away from the frenetic pace of operations and the constant paranoia about getting doxxed. Those who’ve been arrested are upheld as martyrs within the network, and there are many more who are joining, and who think they can do a better job of hiding from the police.

Anonymous will continue to exist for some time, taking new followers, changing tactics, and often staying one spontaneously-placed step ahead of the police. They’ll fight for the right to their anonymity, to expose other people’s information, or anything they want, and they’ll come and go from the headlines. But these chaotic actors will stick around, and their greatest power will continue to be not their skills or abilities, but the very name that they can invoke.

For more details on how Anonymous works and the real, human stories behind it, check out my forthcoming book, “We Are Anonymous: Inside the Hacker World Of LulzSec, Anonymous and the Global Cyber Insurgency.”

Or follow me on Twitter: @parmy

SOURCE: http://www.forbes.com/sites/parmyolson/2012/05/30/is-anonymous-the-internets-most-powerful-mirage/

How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ :

=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===

Table of Contents:

  1.   Obtaining Tor Browser
  2.   Using and Testing Tor Browser for the first time
  3.   Securing Your Hard Drive
  4.   Setting up TrueCrypt, Encrypted Hidden Volumes
  5.   Testing TrueCrypt Volumes
  6.   Securing your Hard Disk
  7.   Temporarily Securing Your Disk, Shredding Free Space
  8.   Installing VirtualBox
  9.   Installing a Firewall
  10.   Firewall Configuration
  11.   Installing Ubuntu
  12.   Ubuntu Initial Setup
  13.   Installing Guest Additions
  14.   Installing IRC (Optional)
  15.   Installing Torchat (Optional)
  16.   Creating TOR-Only Internet Environment
  17.   General Daily Usage

By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. No one not even your ISP or a government agent will be able to see what you are doing online. If privacy and anonymity is important to you, then you owe it to yourself to follow the instructions that are presented here.

In order to prepare this guide for you, I have used a computer that is running Windows Vista. This guide will work equally well for other versions of Windows. If you use a different operating system, you may need to have someone fluent in that operating system guide you through this process. However, most parts of the process are easily duplicated in other operating systems.

I have written this guide to be as newbie friendly as possible. Every step is fully detailed and explained. I have tried to keep instructions explicit as possible. This way, so long as you patiently follow each step, you will be just fine.

In this guide from time to time you will be instructed to go to certain URLs to download files. You do NOT need TOR to get these files, and using TOR (while possible) will make these downloads very slow.

This guide may appear overwhelming. Every single step is explained thoroughly and it is just a matter of following along until you are done. Once you are finished, you will have a very secure setup and it will be well worth the effort. Even though the guide appears huge, this whole process should take at the most a few hours. You can finish it in phases over the course of several days.

It is highly recommended that you close *ALL* applications running on your computer before starting.

SOURCE:
http://www.cyberguerrilla.org/?p=3322

Opinion: Why we need Anonymous 2.0

Opinion: Why we need Anonymous 2.0

by Lisa Vaas on April 24, 2012

A few thoughts on the “hacktivist” group Anonymous that came out of Josh Corman and Brian “Jericho” Martin’s keynote at theSOURCE security conference in Boston last week:

  1. Hacktivist is a sloppy term. A small percentage of those who claim affiliation with the ideology, or movement, or brand, or whatever we wind up calling it, are hackers or activists (5 to 10 percent are skilled hackers or activists, while the lowest common denominators “don’t do much” and are “glorified cheerleaders, at best”, they said).
  2. We need a better, more efficient Anonymous.

Before we explore their rationale for Anonymous 2.0, it’s worthwhile to know why Corman – director of Security Intelligence for Akamai – and Jericho – a “hacker turned security mouthpiece” – care, and why they think we all should.

Here’s how Jericho explained it:

"Most problems on the Internet don't affect us. With Anonymous—and we're using Anonymous as an example for this presentation, but it could be anybody: Anonymous or a splinter group [such as LulzSec] or the next [group] that comes along—almost everyone is involved. Vigilantes, 'good guys,' analysts ... with civilians stuck in the middle. Those whose information is doxed, those people are getting affected more than anyone. If you're affected, you're involved. … Look at [Anonymous's] influence. From analysts, to law enforcement, to former members, to the media, to organized crime, to foreign nation states. "

Nobody in technology, nor in business, for that matter, can get away from fighting Anonymous or other similar groups, whether the fight transpires in media or anywhere else, he said.

So that’s why they care, and why we must. Beyond our own, personal involvement, a broader concern is that much of what we lay at the Anonymous doorstep may be branded as such merely as a smokescreen.

As Corman noted, this amorphous thing we call “Anonymous” has become the perfect scape goat. Anonymous members continually drop in and out of affiliation with, or actions taken on behalf of, the group.

Any attack can be labelled with the Anonymous brand, regardless of whether it was sincerely done under activist principles or is simply branded that way to cover the tracks of, say, a nation state (sound familiar? “Suspicious attack. Must be China!”).

For all the mayhem they’ve caused, much of what “Anonymous” has “done” (I use quotes because there’s often [usually?] no way to determine actual perpetrators) is to simply exploit low-hanging fruit, Jericho said, thus erecting worthwhile signposts to cyber security flaws.

As Corman put it:

"Anonymous has held up a mirror to our defects. [They've done] nothing really hard. They've just showed us how insecure we are [with regards to] basic Internet hygiene. If they turned up the heat, it would be even worse."

In a nutshell, if we can’t deal with the worst the Anonymous-affiliated have to offer, “we’re f*cked,” Jericho said. If that word offends you, “you have to get out of the industry,” because sooner or later, in one fashion or another, you’ll likely have to deal with Anonymous.

Which leads to why we we should wish for, or even need, a better, more efficient Anonymous.

As it is, Jericho said, Anonymous are “a crude, blunt weapon”. Why not a better Anonymous? One that’s more efficient and that gets stuff done with less collateral damage? One that doesn’t dox the personal information of innocent people and put them and their families at risk?

The pair have concocted a three-step plan for Anonymous 2.0. It’s fully laid out in part 5 of their “Building a Better Anonymous” series.

The steps for creating what they call a “a straw man of ‘organized chaos'”:

 

  • Statement of belief, values, objectives, and first principles – i.e. WHY you have come together
  • Code of conduct and operational parameters – i.e. HOW you conduct your pursuit of your common goals
  • A plan for streamlining success, increasing potency, and mitigating risks – i.e. WHAT will make you more successful

 

Would such codification cause the group to splinter? Hopefully. The group needs to specialize, Corman and Jericho said. An Anonymous splinter devoted to free-speech issues would be a boon if it could devote itself to the task at hand, for example.

Does Anonymous agree with the proposals? Anonymous has no unified voice, the keynoters said, so it’s a moot question — it is, after all, a composite, rather than a singular, monolithic group, and there are any number of levels of allegiance and reasons for participating.

But some regular actors in the movement have agreed with the tenets – one plus of a codified Anonymous is the ability to disavow a given action that goes against the stated objectives of the group.

Jericho pointed to the recently announced MalSec (Malicious Security) group as an example of how new splinter groups might codify their beliefs. From their YouTube video:

"For many years we have watched as more unconstitutional laws are proposed and passed and as censorship, disinformation, and corruption have become the norm."

"In an attempt to bring these acts to a halt, we are targeting the very people that have attempted to do us harm. We do, however, fervently believe in free speech. Everyone should be able to express themselves freely, even if others disapprove. As such, we have decided never to remove the original data, when a website of an enemy is defaced."

That’s a start. That’s a statement of a belief – free speech – and a practice – refraining from removing original data. Thus the group can disavow fraudulently labelled MalSec actions.

Now, regarding the term hacktivist: I’ve used it. Lots of journalists have used it. I’m not going to use it anymore.

When Corman and Jericho polled the audience to ask how many thought that the law was winning in its fight against Anonymous, only one hand went up.

That only shows that Anonymous has won the media, Jericho said, whereas the law has failed to engage our attention.

The keynoters’ research has shown that some 184 Anonymous actors have been arrested and charged in 14 countries. Only one in three Anonymous-branded actions make the news, one in five make the news on tech sites, and only one in 30 make the mainstream news.

These are guestimates. The point is, law enforcement is making busts. They need to rattle their sabers more, and we journalists need to pay attention.

We also need a better term than hacktivist, which embodies the romantic type of Robin Hood image that Hollywood, journalists and the public adore.

“The Anonymous affiliated” is kludgy. But perhaps we won’t be able to come up with a better term until Anonymous itself draws its boundaries, making it possible for a given action to be rightfully branded or justifiably disavowed.

If you can think of a better term to use in the meantime, please share it in the comments section.

And kudos to Corman and Jericho for opening up such a thoughtful discussion about a topic that’s too easily simplified and romanticized.

Source: http://nakedsecurity.sophos.com/2012/04/24/opinion-why-we-need-anonymous-2-0/

Hacks of Valor: Why Anonymous Is Not A Threat to National Security

Hacks of Valor: Why Anonymous Is Not A Threat to National Security

Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security. According to The Wall Street Journal, Keith Alexander, the general in charge of the U.S. Cyber Command and the director of the National Security Agency, warned earlier this year that “the hacking group Anonymous could have the ability within the next year or two to bring about a limited power outage through a cyberattack.” His disclosure followed the U.S. Department of Homeland Security’s release of several bulletins over the course of 2011 warning about Anonymous. Media coverage has often similarly framed Anonymous as a threat, likening it to a terrorist organization. Articles regularly refer to the Anonymous offshoot LulzSec as a “splinter group,” and a recent Fox News report uncritically quoted an FBI source lauding a series of arrests that would “[chop] off the head of LulzSec.”

This is the wrong approach. Seeing Anonymous primarily as a cybersecurity threat is like analyzing the breadth of the antiwar movement and 1960s counterculture by focusing only on the Weathermen. Anonymous is not an organization. It is an idea, a zeitgeist, coupled with a set of social and technical practices. Diffuse and leaderless, its driving force is “lulz” — irreverence, playfulness, and spectacle. It is also a protest movement, inspiring action both on and off the Internet, that seeks to contest the abuse of power by governments and corporations and promote transparency in politics and business. Just as the antiwar movement had its bomb-throwing radicals, online hacktivists organizing under the banner of Anonymous sometimes cross the boundaries of legitimate protest. But a fearful overreaction to Anonymous poses a greater threat to freedom of expression, creativity, and innovation than any threat posed by the disruptions themselves.

Hackers inserted a prank article on the PBS Web site declaring that the deceased rapper Tupac Shakur was “alive and well” in New Zealand.

No single image better captured the way that Anonymous has come to signify the Internet’s irreverent democratic culture than when, in the middle of a Polish parliamentary session in February 2012, well-dressed legislators donned Guy Fawkes masks — Anonymous’ symbol — to protest their government’s plan to sign the Anti-Counterfeiting Trade Agreement (ACTA). The treaty, designed to expand intellectual-property protection, involved years of negotiation among the United States, Japan, and the European Union, which are all like-minded on copyright law. It had the support of well-organized and well-funded companies, particularly in Hollywood and the recording industry. Although originally negotiated in secret, its contents were exposed by WikiLeaks in 2008. As a result, public pressure caused the treaty’s negotiators to water down many of its controversial provisions. But the final version still mimicked the least balanced aspects of U.S. copyright law, including its aggressive approach to asset seizure and damages. And so a last-minute protest campaign across Europe, using the symbolism of Anonymous, set out to stop the agreement from coming into force. So far, it has succeeded; no signatory has ratified it.

That is power — a species of soft power that allows millions of people, often in different countries, each of whom is individually weak, to surge in opposition to a given program or project enough to shape the outcome. In this sense, Anonymous has become a potent symbol of popular dissatisfaction with the concentration of political and corporate power in fewer and fewer hands.

It is only in this context of protest that one can begin to assess Anonymous’ hacking actions on the Internet. Over the last several years, the list of Anonymous’ cyber targets has expanded from more-or-less random Web sites, chosen for humor’s sake, to those with political or social meaning. In 2010, Anonymous activists launched a distributed denial of service (DDoS) attack — an action that prevents access to a Web site for several hours — against Web sites of the Motion Picture Association of America and the International Federation of the Phonographic Industry, the major trade groups for the film and music industries. The action came in response to revelations that several Indian movie studios had used an Indian company called Aiplex to mount vigilante DDoS attacks against illegal file-sharing sites.

SOURCE:
http://www.foreignaffairs.com/articles/137382/yochai-benkler/hacks-of-valor

By: Yochai Benkler, April 4, 2012

Beast1333: Templars of Hip Hop Present – Anonymous

http://www.youtube.com/watch?v=1XFSAeLo65Q

Distributed denial of Service
the Barbs are Stacheldrat
When DOS attacks
Suits without a Head
Get scared and shit they Slacks
See what we lacks A Sense of Compassion
our Justice must be Swift
Hal Turner hurting the pockets
of White Supremacists
These Nemesises
Never This Vicious
We Troll the Net for Missions
If evils your position
Your files gonna come up Missing

(more…)

Intro: Whistleblowers, Researchers & Activists

Humanists, Autobots, Scholoars, Monks, Patriots and those playing for the Good Guys. Plenty of men and women have traveled this road before us.  These secrets are not secrets anymore, and  thanks to them, we have information available that would otherwise never see the light of day.  Look closely at what these have to share, and you will see they are each telling a very small piece of the same overall story.

Short Version:  There are other events in play on this planet, that you are not being told about. Those things would completely change the way you view yourself, and the world, if known. This is all just a dream, and reality is whatever you decide.  Still hungry? Keep reading.

Disclaimer: We will be the first to admit.. a few of these could easily be ‘wolves’ disguised well, in ‘whistleblower’ clothing.   but who… and why..?

This is intended to evolve into a quick and efficient resource/database/archive.  Check back frequently for updates….

(more…)