tag:blogger.com,1999:blog-4973736620786974062024-03-13T09:13:10.937-07:00CafuNonymous NewsWe are Anonymous. We are legion. We do not forgive. We do not forget. Expect Us.Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.comBlogger87125tag:blogger.com,1999:blog-497373662078697406.post-10091918931362697712013-02-07T07:57:00.000-08:002013-02-07T07:59:20.439-08:00Anonymous Hits Federal Reserve in Hack Attack<iframe height="221" id="kaltura_player_1360252639" src="http://cdnapi.kaltura.com/index.php/kwidget/wid/1_5l7j4k5w/uiconf_id/3775332/st_cache/53196?referer=http://abcnews.go.com/WNT/video/hacker-group-anonymous-hits-federal-reserve-18424607&autoPlay=false&addThis.playerSize=392x221&freeWheel.siteSectionId=nws_offsite&closedCaptionActive=true&" style="border: 0px solid #ffffff;" width="392">Unfortunately your browser does not support IFrames.</iframe>
<div style="font-size: x-small; margin-top: 0; text-align: left;">
<br /></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">As officials in Washington continue to discuss and warn about cyber-attacks, members of Anonymous claimed to have breached a computer system that the Federal Reserve uses to communicate with bankers in emergencies such as natural disasters and potential acts of terrorism.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">On Super Bowl Sunday, members of the group tweeted that they had compromised 4,000 bankers’ credentials from the Federal Reserve.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">“Now we have your attention America: Anonymous’s [sic] Superbowl Commercial 4k banker d0x via the FED,” the group tweeted, using the @OpLastResort handle on Twitter.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">“The Federal Reserve System is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product,” A Federal Reserve spokesman said in a statement.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">“The exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve System,” the spokesman said.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">According to officials, the user data from the Emergency Communications System was compromised, but no financial or monetary policy information was on the system that was breached.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">According to federal law enforcement officials, the FBI has opened an investigation into the incident. An FBI spokesperson declined to comment.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">Recent activity from Anonymous and the reference to Operation Last Resort concern the death of Aaron Swartz, an Internet developer and activist who started the website Reddit. Swartz was indicted by the Justice Department in July 2011 on charges of wire fraud, computer fraud, unlawfully obtaining information from a protected computer and recklessly damaging a protected computer.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">Swartz allegedly had downloaded vast information from JSTOR, an online library of academic and scholarly journals and articles that are available for a fee. Swartz believed the articles in JSTOR should be disseminated free of charge. Swartz committed suicide on Jan. 11, 2013 as he believed he was going to be facing a lengthy prison term – possibly as much as 35 years.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">Last month, Anonymous hacked the website of the United States Sentencing Commission, also in response to Swartz’s death.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">The case has garnered the attention of Congress, with members of the House Oversight and Government Reform Committee writing to Attorney General Eric Holder about how the Justice Department handled the case.</span></span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 14px; font: inherit; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 15px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white;">The Justice Department has agreed to brief the committee on the Swartz prosecution, but no date has been set on the briefing, according to a Justice official.</span></span></div>
Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-53983566548948001042013-02-07T07:55:00.000-08:002013-02-07T07:55:03.830-08:00Anonymous Indonesia defaces Myanmar tourism site<span class="Apple-style-span" style="color: #252525; font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 18px;"></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Anonymous Indonesia has breached a Myanmar tourism site in retailiation against the government's treatment of the Rohingya people.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The hacktivist group announced late-Wednesday in a Twitter post it had defaced the tourism site, mm.myanmar.net, which provides travel and location information, lodging and sights. <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">A message left in the defacement said the site's data was safe and that the message was meant for the Myanmar government.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">"We call on the government of Myanmar to stop the violence and the expulsion against Rohingya based on humanitarian," the message read.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The defacement also contained a link to a news report by The Nation on how the Myanmar government considered the Rohingya race as illegal immigrants and had refused to grant them citizenship rights.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
In a Twitter reply to ZDNet Asia on Thursday, Anonymous Indonesia apologized for the defacement and explained it merely wanted to inform the Myanmar government not to expel and oppress the Rohingya race. "They are also part of the people of Myanmar who have long settled in Myanmar," the post read.</div>
<figure style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; font-size: 12px; font: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><img alt="anonymousmyanmare " height="426" src="http://cdn-static.zdnet.com/i/r/story/70/00/010962/anonymousmyanmar-620x426.jpg?hash=AJVlZmp5Lz&upscale=1" style="border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; display: block; font-size: 12px; font: inherit; height: auto; margin-bottom: 15px; margin-left: auto; margin-right: auto; margin-top: 0px; max-width: 100%; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: top; width: auto;" title="anonymousmyanmare " width="620" /><figcaption style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; font-size: 12px; font: italic normal normal 12px/1.5 Georgia, serif; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: -10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;">Visitors to mm.myanmar.net on Wednesday evening were greeted with the following message from Anonymous Indonesia.</figcaption></figure><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The Web site was restored when ZDNet Asia accessed it at 2pm Singapore time.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Anonymous Indonesia also launched a series of attacks on Indonesian government sites last week which affected, among others, the Law and Human Rights Ministry, the Social Affairs Ministry, <span style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">the Business Competition Supervisory Commission,and the Central Statistics Agency</span>, a separate report by <a href="http://www.thejakartapost.com/news/2013/01/31/govt-websites-targeted-online-attacks.html" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #005399; cursor: pointer; font-size: 12px; font: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_self">The Jarkata Post</a> noted.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; font: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The hacktivist group said these cyberattacks were in retailiation against the arrest of Wildan Yani Ashari, who had been accused of hacking President's Susilo Bambang Yudhoyono's personal Web site.</div>
Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-81927105803385115652013-02-06T08:11:00.000-08:002013-02-06T08:11:03.885-08:00Anonymous Claims Wall Street Data Dump<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-MJyt4A-7geY/URKAj03u6DI/AAAAAAAAALM/OXOxMSDeGZA/s1600/Open-Anonymous-Bank-Account.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="http://2.bp.blogspot.com/-MJyt4A-7geY/URKAj03u6DI/AAAAAAAAALM/OXOxMSDeGZA/s640/Open-Anonymous-Bank-Account.jpg" width="640" /></a></div>
The hacktivist collective Anonymous said that it's published a document dump that targets executives at financial services firms. <br /><br /> "Now we have your attention America: Anonymous's Superbowl Commercial 4k banker d0x via the FED," said a Sunday tweet from Operation Last Resort. A followup tweet from the same Twitter channel said, "Yes we posted over 4000 U.S. bank executive credentials."<br />
<br />
Operation Last Resort is the name for an Anonymous campaign that seeks "reform of computer crime laws, and the overzealous prosecutors," and which was launched after Internet activist Aaron Swartz committed suicide. Although Swartz had long battled depression, numerous people have come forward to criticize the Department of Justice's handling of his case, including prosecutors' apparent strong-arm tactics.<br /><br /> The Sunday dox – a.k.a. data dump -- appears to contain about 4,600 records, including people's names, email addresses, institutions, IP addresses and login IDs, as well as their salted and hashed password, including the salt that was used. The records stretch to nearly 700 pages, and per the Anonymous tweet, appear to have been obtained from the Federal Reserve System. <br /><br /> The "bankd0x" -- as Anonymous has dubbed it -- initially was published on Pastebin, as well as to the Alabama Criminal Justice Information Center website in an HTML file titled "oops-we-did-it-again.html." After the Alabama state government removed the page, Anonymous reposted it on what appeared to be a Chinese government website. <br /><br /> Is the data legitimate? A small, random sample of the published information revealed names and email addresses that do appear to be real. Other people who investigated the data also suggested that it was legitimate. "OK, I called a few of them," said one Reddit user. "What must be so problematic for the Federal Reserve is not the information so much as this file was stolen from their computers at all. The ramifications of that kind of loss of control is severe." <br /><br /> The timing of the financial data dump appears to have been designed to call attention to a Jan. 28 letter sent to Attorney General Eric Holder by two key members of the House Oversight and Government Reform Committee. Signed by committee chairman Darrell Issa (R-Calif.) and ranking member Elijah Cummings (D-Md.), the letter demands answers to seven questions related to the Swartz case, as well as prosecutors' use in general of the Computer Fraud and Abuse Act (CFAA), and their practice of issuing superseding indictments. The legislators gave Holder a deadline of Monday to schedule a related briefing with them. <br /><br /> The bankd0x isn't the first attack launched by Anonymous as part of Operation Last Resort. Last week, the group hacked the website of the U.S. Sentencing Commission, which establishes sentencing policies and practices for the federal courts, to add a hidden Asteroids game. The group also distributed an encrypted file "warhead," for which it promised to later distribute the decryption keys, unless its CFAA reform demands were met. <br /><br /> At press time, the U.S. Sentencing Commission's website resolved to a single page that said the website "is currently under construction," and that listed a handful of links and contact phone numbers. <br /><br /> Also last month, Anonymous defaced a Massachusetts Institute of Technology website, denouncing the charges that had been filed against Swartz, demanding that the CFAA be reformed, and calling for more open access to information.Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-91794812375961574642013-02-05T22:21:00.003-08:002013-02-05T22:21:48.228-08:00Federal Reserve Confirms Security Breach, Calls Anonymous Hack Claim 'Overstated'<span style="background-color: black;"><br /></span>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">A Federal Reserve spokesperson confirmed a temporary security breach of its computers to The Huffington Post on Tuesday morning.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">"Information was obtained by exploiting a temporary vulnerability in a website vendor product," the spokesperson told HuffPost in a phone interview, adding that the problem was "fixed after discovery and is no longer an issue."</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">According to the spokesperson, who asked not to be identified by name, the breach "did not affect critical operations."</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">The confirmation comes in the wake of a claim by hacker group Anonymous on Sunday that it had <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">stolen sensitive information on 4,000 American bank executives</span>from Federal Reserve computers.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">Although the security breach has now been confirmed, the spokesperson called Anonymous' claim "overstated," and would not comment on the nature of the data obtained other than to confirm that contact information was taken.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">Earlier this week, ZDNet reported that "login information ... credentials, IP addresses, and contact information of American bank executives" were <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">listed in a spreadsheet posted to a government site</span> that Anonymous had hacked.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">Even if the breach might not have been as serious as publicized by Anonymous, it is the first actual leak of information achieved by the group's Operation Last Resort. Launched in January, <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">OpLastResort</span> is the Anonymous response to the suicide of Internet activist <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">Aaron Swartz</span>. The group demands "reform of computer crime laws" and investigation of "overzealous prosecutors."</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">Federal Reserve computers have been hacked before. In 2010, a <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">Malaysian man was arrested in a credit card scheme</span> after managing to hack into and damage 10 computers associated with a Federal Reserve training system, Bloomberg News reported at the time. However, no data or information was accessed or compromised in that attack, a spokeswoman told Bloomberg.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">In 2011, Federal Reserve developers discovered a cross-scripting bug in Adobe ColdFusion software, which is used by some Federal Reserve Bank websites. Such cross-site scripting allows an attacker to gain high-level access privileges to sensitive information by way of injecting malicious client-side scripts.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">"Web developers working for the Federal Reserve Bank of Atlanta discovered the<span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">cross-site scripting vulnerability</span> as part of an internal development project," ThreatPost, an Internet security blog, reported at the time.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">In December 2011, Adobe released a patch for ColdFusion that fixed weaknesses it said could be <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">exploited in "a cross-site scripting attack."</span></span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">In an e-mail to HuffPost, Adobe senior communications manager Wiebke Lips wrote that the company could not comment on the specific breach confirmed Tuesday by the Federal Reserve. According to Lips, a patch released Jan. 15 by Adobe "addressed four vulnerabilities" that had been observed in active attacks against ColdFusion customers.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">"These types of attacks are often referred to as 'zero-days' because a fix is not available at the time of the attack," Lips wrote. "As soon as these vulnerabilities were reported to Adobe, we immediately addressed them in the software and provided the fix."</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">According to an Adobe security bulletin, <span style="cursor: pointer; list-style-image: initial; list-style-position: initial;">the recent patch for ColdFusion</span> fixed loopholes that could have enabled a hacker to "circumvent authentication controls, potentially allowing the attacker to take control of the affected server ... could result in information disclosure from a compromised server."</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">Although it is unclear whether hackers used the recently patched vulnerabilities as a vector for attack, if a third party gained access to sensitive information through ColdFusion, it would follow that computers belonging to the Federal Reserve may have been compromised because their software was not up-to-date.</span></div>
<div style="border: none; font-family: Georgia, Century, Times, serif; font-size: 15px; line-height: 21px; list-style: none; margin-bottom: 15px; padding: 0px;">
<span style="background-color: black; color: white;">The Federal Reserve spokesperson would not elaborate on its security systems other than to say that measures against attacks were "absolutely" in place.</span><br />
<span style="background-color: black; color: white;"><br /></span></div>
<div style='text-align:center'>
<script type='text/javascript' src='http://pshared.5min.com/Scripts/PlayerSeed.js?sid=281&width=560&height=345&playList=517664272'></script>
<br/>
</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-11320111565904684292013-01-26T13:14:00.000-08:002013-01-26T13:23:40.751-08:00TOPTRENDINGNOW- TopTrendingNow is here to bring you all of the latest trending news. Whether it is Entertainment, Business, Tech, Life, TTNews team is dedicated<div class="separator" style="clear: both; text-align: center;">
<a href="http://toptrendingnow.blogspot.com/" target="_blank"><img border="0" height="433" src="http://4.bp.blogspot.com/-xfiW7Me-HKM/UQRGqjoYqzI/AAAAAAAAAK8/IJhZM3YLhuM/s640/TOPTRENDINGNOW.BLOGSPOT.COM.jpg" width="640" /></a></div>
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #fff9e7; color: #222222; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><br /></span>
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #fff9e7; color: #222222; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><br /></span>
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #fff9e7; color: #222222; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">TopTrendingNow is here to bring you all of the latest trending news. Whether it is Entertainment, Business, Tech, Life, TTNews team is dedicated.</span><br />
<br />
<h2>
<span style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: #fff9e7; color: #222222; display: inline !important; float: none; font-family: Arial, Helvetica, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">VISIT US AT<span style="color: white;"> <span style="color: black;"><span style="background-color: white;"><span style="font-size: small;"><b><a href="http://toptrendingnow.blogspot.com/">TOPTRENDINGNOW.BLOGSPOT.COM</a> </b></span></span></span></span></span></h2>
<h2>
<span style="background-color: white;"><span style="font-size: small;"><b><span style="display: inline ! important; float: none; font-family: Arial, Helvetica, sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><br /></span></b></span></span>
<span style="background-color: white;"><span style="font-size: small;"><b><span style="display: inline ! important; float: none; font-family: Arial, Helvetica, sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">[<a href="http://toptrendingnow.blogspot.com/" target="_blank">SOURCE</a>]</span></b></span></span></h2>
Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-57667995030050557362012-03-15T19:38:00.003-07:002012-03-15T19:38:39.341-07:00Hacker threatens to expose Anonymous members, Al Qaeda supporters<a href="http://www.zdnet.com/blog/security/hacker-threatens-to-expose-anonymous-members-al-qaeda-supporters/10782" target="_blank">By Emil Protaniski</a><br />
<br />
<br />
<span class="Apple-style-span" style="color: #252525; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 21px;"><span class="c-1 heavy" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #961515; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Summary: </span>The Jester has detailed a sophisticated attack he put together last week that stole personal data stored on smartphones belonging to various individuals on his very own “shit-list.”</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-s9DmTDGV3B0/T2KnjRUb1KI/AAAAAAAAAKI/23Yruq69CaE/s1600/thejester.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="288" src="http://4.bp.blogspot.com/-s9DmTDGV3B0/T2KnjRUb1KI/AAAAAAAAAKI/23Yruq69CaE/s640/thejester.jpg" width="640" /></a></div>
<span class="Apple-style-span" style="color: #252525; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 21px;"><br /></span><br />
<span class="Apple-style-span" style="color: #252525; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 21px;"><span class="Apple-style-span" style="font-family: Verdana, sans-serif; font-size: 12px; font-style: normal; line-height: 18px;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The Jester, a hacker who has caused trouble for other hackers before, claims to have exploited smartphones belonging to Islamist extremists, Al Qaeda supporters, Anonymous members, and LulzSec/AntiSec members. He says he elevated his privileges on each exploited device, extracted data, and stole address books, call logs, text message logs, and e-mails from targeted victims.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The Jester used his <a href="https://twitter.com/#!/th3j35t3r" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #005399; cursor: pointer; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Twitter</a> account (first picture above) to compromise hundreds of smartphones by changing his profile picture to a QR code over a five day period last week. When users scanned the QR code with their smartphone, a link opened in their browser, where an image of The Jester and the text “BOO!” appeared, according to <a href="http://th3j35t3r.wordpress.com/2012/03/09/curiosity-pwned-the-cat/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #005399; cursor: pointer; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Jester’s Court</a>.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
In the background, The Jester exploited a vulnerability in the WebKit engine that powers browsers in Android and iOS. The Jester says he compromised the phones of 500 out of 1,200 individuals who scanned the code via a crafted webpage. He then stole personal data from a significant number of activists.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The security hole he claims to have used, <a href="http://packetstormsecurity.org/files/cve/CVE-2010-1807" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #005399; cursor: pointer; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">CVE-2010-1807</a>, has been in the public domain since November 2010 and has since been fixed in most browsers. Still, The Jester says he modified the exploit code slightly and still managed to see a 40 percent success rate, presumably on unpatched browsers.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The malicious code he wrote for the attack stole the compromised users’ Twitter credentials via a netcat command. The Jester claims he checked these credentials against a list of known targets before stealing any data. He had a list of enemies:</div>
<blockquote style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #68737f; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 15px; margin-right: 15px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; quotes: '', ''; vertical-align: baseline;">
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Here’s a very SMALL sample of the much longer list: @alemarahweb,@HSMPress @AnonymousIRC, @wikileaks, @anonyops, @barretbrownlol, @DiscordiAnon etc etc etc</div>
</blockquote>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
He noted anyone on his “shit-list” was left unscathed:</div>
<blockquote style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #68737f; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 15px; margin-right: 15px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; quotes: '', ''; vertical-align: baseline;">
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
EVERYONE else without exception was left totally ‘untouched’ so to speak. This was a Proof of Concept QR-Code based operation against known bad guys, the same bad guys that leak YOUR information, steal YOUR CC nums, and engage in terror plots around the world. I do not feel sorry for them. In the interests of convenience I will be taking the liberty of uploading the captured bad-guy data in a signed PGP encrypted file to a suitable location very soon. How’s that for ‘lulz’?</div>
</blockquote>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
The Jester this week posted a 143.08 MB text file, which he refers to as the “resulting raw dump of the verbose output log from this exercise,” on <a href="http://www.mediafire.com/?25e53h3qxey4r6q" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #005399; cursor: pointer; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">MediaFire</a>. It’s encrypted with his PGP Public key, so there’s no way of telling if the contents are what he claims they are, or if he’s just trolling.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Rhode Island State Representative Dan Gordon was supposedly one of the victims. Gordon made it onto The Jester’s “shit-list” for a tweet that reference Anonymous, which The Jester interpreted as approving of the hacktivist group. Gordon reacted angrily to The Jester’s jeers on Twitter. He threatened to report the hacker to authorities for offences ranging from threatening a state official to hacking the mobile phone of an elected politician. Later though, Gordon said he had not scanned the QR code and thus could not possibly have been hacked.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Here are some tweets from The Jester’s account in regards to this particular attack:</div>
<blockquote style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #68737f; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 15px; margin-right: 15px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; quotes: '', ''; vertical-align: baseline;">
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
Curiosity Pwned the Cat: ‘Curiosity is lying in wait for every secret’. – Ralph Waldo Emerson At the beginning … http://t.co/IuLZUb0w<br />Received reports that my latest blog post triggered AVG, I have removed the exploit source & used screen dumps instead https://t.co/36QVViTP<br />RT @swordandsalt: @th3j35t3r “Never interrupt your enemy when he is making a mistake.” - Napoleon https://t.co/36QVViTP<br />So @repdangordon WAS on ’shit list’ & scanned QR. Why’s he on the list: http://storify.com/dailydot/state-rep-reps-anonymous & he’s friends w/this guy: http://th3j35t3r.wordpress.com/2011/08/21/if-ya-cant-beat-em-make-some-shit-up-lmao/#dick<br />@repdangordon so you & some anon are trying to find me? Man, you are not gonna come out of this looking good Dan http://t.co/87UO8JPd<br />@RepDanGordon @FBIPressOffice I merely stated u were on the list, u seem awful jittery. U need to calm down >> ;-) http://t.co/87UO8JPd<br />@RepDanGordon Go away Dan, I’m sick of helping u embarrass urself. I merely said u were on the list. Hey>> http://www.cbsnews.com/2100-250_162-20111212.html #stolenvalor<br />@repdangordon be advised, when u file ur complaint to feds, they ARE going need ur cell for forensics to determine IF I hacked u at all ;-(<br />@repdangordon >> http://www.blogtalkradio.com/johntiessen/2012/02/23/the-strait-truth-with-your-host-john-tiessen-1/scrub/0 << chatting about #anonymous with his friend @johntiessen << remember him? >> http://th3j35t3r.wordpress.com/2011/08/21/if-ya-cant-beat-em-make-some-shit-up-lmao/#dick<br />@repdangordon - I told you before, all I stated was that your name was on the list. You have since proved why. http://pastebin.com/et1LnCAL<br />@repdangordon creates a new twitter under @Rep_gordon in fail attempt to back pedal, however we all know who you are >><br />#Checkmate >>> https://twitter.com/#!/th3j35t3r/status/179661949087399937 <<< I'll make you famous >>> https://www.youtube.com/watch?v=mOzOdj7JmfE #anonymous</div>
</blockquote>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
It’s unclear whether the clever attack actually worked. Maybe The Jester is just trying to rile up his enemies (it certainly worked for Gordon). We won’t know until he releases the password to the aforementioned file, if ever.</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-74998408791020884172012-03-15T19:35:00.000-07:002012-03-15T19:35:36.604-07:00Is there a link between Vikileaks and Anonymous attacks?<a href="http://www.lfpress.com/news/canada/2012/03/15/19509186.html" target="_blank"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-weight: bold;">By</span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-weight: bold;"> </span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-weight: bold;"><span style="text-transform: uppercase;">MARK DUNN</span></span></a><br />
<br />
<br />
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
OTTAWA - A parliamentary committee will invite foreign experts in tracing Internet hackers to find the people behind attempts to blackmail Public Safety Minister Vic Toews, QMI Agency has learned.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The House and procedural affairs committee began hearings Thursday to investigate threatening YouTube videos by a group purporting to be the political hacker group Anonymous.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Conservative MP Tom Lukiwski said the scope of the committee's investigation could broaden if another Commons committee uncovers any links between blasts against Toews from the Twitter account vikileaks and the Anonymous video postings.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"If they find any kind of a link then I think in the committee report they may be able to ask Parliament to consider a point of privilege based on what they uncover in their examination," he said about the ethics committee.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Ethics is investigating Liberal Adam Carroll and his use of an anonymous Twitter account to spread details of Toews' messy 2007 divorce to protest Bill C-30, an Internet crime bill that would give police and government agencies powers to snoop without warrants.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
No laws were broken when he used computers at the Liberal research bureau to set up the @vikileaks30 account.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
He has since resigned.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Carroll has so far refused to appear because of what his lawyer says are health issues.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The committee Lukiwski sits on is only permitted to investigate the Anonymous threats.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"But if ancillary information comes out, which kind of links it to vikileaks, then yes, I think we've got the ability to expand our examination."</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The MP said the committee will ask Canadian and international experts to assist.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"We certainly will and we have the ability to ask them specifics as to how can you trace and how did you find, for example, certain members of the Anonymous organization south of the border," he said about recent arrests.</div>
<div style="font-family: Arial, Helvetica, sans-serif; font-size: 1.1em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The Anonymous videos said if Toews did not resign and kill Bill C-30, it would post naughty divorce details and other personal matters - which it did.</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-16957138527657591732012-03-15T19:32:00.002-07:002012-03-15T19:32:35.127-07:00Anonymous members speak out at surreal SXSW panel<span class="Apple-style-span" style="font-family: arial, serif; font-size: 14px; line-height: 18px;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-oFPeHkPmmJI/T2KmGzo3BQI/AAAAAAAAAKA/UarPvoFaBS8/s1600/anonymous-mask-protest-march-2012-story-body.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/-oFPeHkPmmJI/T2KmGzo3BQI/AAAAAAAAAKA/UarPvoFaBS8/s1600/anonymous-mask-protest-march-2012-story-body.jpg" /></a></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 14px; font-weight: normal; line-height: 1.35; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">
When it's revealed that a prominent member of a clandestine movement has been giving information to the FBI for months, you'd think it would intimidate others in the group into backing off.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 14px; font-weight: normal; line-height: 1.35; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">
And that may have been the case when it was discovered that "Sabu," real name Hector Xavier Monsegur, had been arrested in June and provided information that helped lead to the arrest of five other alleged members of the "hacktivist" collective, Anonymous.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 14px; font-weight: normal; line-height: 1.35; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">
For a few minutes, anyway.</div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 14px; font-weight: normal; line-height: 1.35; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">
"That night, after everyone found out, it was a bit chilling," said Gregg Housh, one of the few people associated with Anonymous who speaks publicly using his real identity.</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com1tag:blogger.com,1999:blog-497373662078697406.post-27479235553186179922012-03-15T19:30:00.001-07:002012-03-15T19:42:35.740-07:00Hunting Anonymous could be 'waste of time,' parliamentarians told<span class="Apple-style-span" style="font-family: arial; font-size: 11px; font-weight: bold; text-transform: uppercase;"><a href="http://www.montrealgazette.com/news/Hunting+Anonymous+could+waste+time+parliamentarians+told/6307705/story.html" target="_blank">BY JORDAN PRESS</a></span><br />
<span class="Apple-style-span" style="font-family: arial; font-size: 11px; font-weight: bold; text-transform: uppercase;"><br /></span><br />
<span class="Apple-style-span" style="font-family: arial; font-size: 11px; font-weight: bold; text-transform: uppercase;"><br /></span><br />
<span class="Apple-style-span" style="font-family: arial; font-size: 11px; font-weight: bold; text-transform: uppercase;"><span class="Apple-style-span" style="font-family: arial, verdana, 'Lucida Grande', sans-serif; font-weight: normal; text-transform: none;"></span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-XCULaBHs3iE/T2Klyb4FNLI/AAAAAAAAAJ4/kRyXB3_QV0k/s1600/common-probe.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="206" src="http://2.bp.blogspot.com/-XCULaBHs3iE/T2Klyb4FNLI/AAAAAAAAAJ4/kRyXB3_QV0k/s320/common-probe.jpg" width="320" /></a></div>
OTTAWA — Parliamentarians tasked with investigating what has been deemed intimidating online videos against Public Safety Minister Vic Toews were warned Thursday that a hunt for the culprit — or culprits — could be a waste to time and resources.<br />
<br />
MPs on the procedure and House affairs committee were told that trying to track down anyone using the online handle of Anonymous would be difficult, if not impossible to find.<br />
<br />
House of Commons security staff have already checked and found that the YouTube videos weren't uploaded from a Parliament Hill account, and have stepped up their online security sweeps in the wake of the messages.<br />
<br />
MPs on the committee reviewing whether Toews had his privilege as a parliamentarian breached when Anonymous put up the threatening videos will have to decide whether to attempt to track down the person or people behind the videos. That could involve calling in the RCMP or the intelligence unit responsible for cybersecurity.<br />
<br />
"I really don't see how you will be able to figure out who uttered these threats against the minister," said Audrey O'Brien, clerk of the House of Commons.<br />
<br />
She told the committee that a search for the Anonymous poster could be "a giant waste of time."<br />
<br />
That message from the Commons staff responsible for securing MPs on and off Parliament Hill was received well by some members of the committee, but at least one Conservative wanted the search to commence.<br />
<br />
Conservative MP Laurie Hawn said someone needed to be held responsible for the videos attacking Toews and demanding he withdraw the government's controversial online surveillance bill, and be held up as an example for others who would consider doing the same thing.<br />
<br />
"Anonymous is a coward," Hawn said, adding he "had nothing but contempt" for anyone who would abuse free speech.<br />
<br />
"They're like the Taliban. We're never going to run out of them."<br />
<br />
Anonymous is a loosely knit group of online hackers with no central organization, meaning that anyone can claim to be part of the collective and disputes about tactics arise regularly.<br />
<br />
The group is responsible for attacks against several high profile websites, including Visa, MasterCard, PayPal and, in Canada, the website for the Ontario Association of Chiefs of Police.<br />
<br />
Members of the group have been tracked down around the world in recent weeks, with Interpol saying 25 suspected members of the collective were arrested in Latin America as authorities in Europe and the United States charged six more after they were outed by one of their own.<br />
<br />
The ad hoc nature of the group means that someone calling themselves a member could have uploaded the videos to YouTube targeting Toews. The YouTube account has been silent since March 1 when the last video was uploaded.<br />
<br />
Parliamentarians were told Commons staff monitor the Internet for hacking threats, and meet daily to discuss how to keep the network and MPs safe.<br />
<br />
"Security is evolving everyday," said chief information officer Louis Bard. "They're always something new to discover. The strength we have is the ability to react and I think we've proven that."<br />
<br />
Meanwhile, House of Commons Speaker Andrew Scheer ruled that there may be a case that MPs had their privileges breached during a recent visit from Israel's prime minister.<br />
<br />
Security on Parliament Hill was heightened for the visit by Prime Minister Benjamin Netanyahu, so much so that parliamentarians were blocked at times from walking around the Centre Block of the Parliament buildings. New Democrat MP Pat Martin filed a complaint with the Speaker's office and on Thursday, Scheer said there may be a "prima facie" case that Martin and other MPs had their privileges violated.<br />
<br />
"Security measures cannot override the right of members to unfettered access . . . free from obstruction or interference" Scheer said in his ruling.<br />
<br />
That matter will now be referred to the House affairs committee for review.<br />
<br />Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-30915971601124242012012-03-15T19:28:00.001-07:002012-03-15T19:28:39.091-07:00Anonymous operating system prompts security warnings<span class="Apple-style-span" style="color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 14px; font-weight: bold; line-height: 18px;"><a href="http://www.bbc.co.uk/news/technology-17381214" target="_blank">BBC News</a></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 14px; font-weight: bold; line-height: 18px;"><br /></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 14px; font-weight: bold; line-height: 18px;">More than 26,000 people have downloaded an operating system which members of the Anonymous hacker group claim to have created.</span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 14px; font-weight: bold; line-height: 18px;"><br /></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helmet, Freesans, sans-serif; font-size: 14px; font-weight: bold; line-height: 18px;"><span class="Apple-style-span" style="font-size: 13px; font-weight: normal; line-height: 16px;"></span></span><br />
<div class="separator" style="clear: both; color: #505050; text-align: center;">
<a href="http://4.bp.blogspot.com/-S7QcgRa2_Y4/T2KlAxBR-pI/AAAAAAAAAJw/t3HzSvglBE0/s1600/_59090859_.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-S7QcgRa2_Y4/T2KlAxBR-pI/AAAAAAAAAJw/t3HzSvglBE0/s1600/_59090859_.jpg" /></a></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;">The software is based on a version of the open-source operating system Linux and comes outfitted with lots of website sniffing and security tools.</span></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;">The "official" Anonymous group has distanced itself from the software.</span></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;"><a href="https://twitter.com/#!/anonops/status/180092538395443201" style="font-family: Arial, Helmet, Freesans, sans-serif; font-weight: bold; line-height: 16px; text-decoration: none;">In a widely circulated tweet</a>, AnonOps claimed the operating system was riddled with viruses.</span></div>
<span class="cross-head" style="display: block; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.231em; font-weight: bold; line-height: 16px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-rendering: optimizelegibility;"><span class="Apple-style-span" style="background-color: black; color: white;">Tool box</span></span><div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;"><a href="http://sourceforge.net/projects/anonymous-os/" style="font-family: Arial, Helmet, Freesans, sans-serif; font-weight: bold; line-height: 16px; text-decoration: none;">The operating system is available via the Source Forge website</a> - a well-known repository for many custom code projects.</span></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;">The 1.5GB download is based on Ubuntu - one of the most popular versions of the Linux operating system. The software's creators say they put it together for "education purposes to checking the security of web pages (sic)".</span></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;">It asked people not to use it to destroy webpages.</span></div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
<span class="Apple-style-span" style="background-color: black; color: white;">Soon after the operating system became available, the AnonOps account on Twitter posted a message saying it was fake and "wrapped in trojans".</span></div>
<span class="Apple-style-span" style="background-color: black; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="color: white;"><div id="story_continues_2" style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
The creators of the OS denied it was infected with viruses adding that, in the world of open-source software, "there were no viruses".</div>
<span class="cross-head" style="display: block; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.231em; font-weight: bold; line-height: 16px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-rendering: optimizelegibility;">Code check</span><div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
After downloading and running the software, Rik Ferguson, director of Trend Micro's European security research efforts, said it was "a functional OS with a bunch of pre-installed tools that can be used for things like looking for [database] vulnerabilities or password cracking".</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
It also included tools such as Tor that can mask a person's online activities. In many ways, he said, it was a pale imitation of a version of Linux known as Back Track that also comes with many security tools already installed.</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
Mr Ferguson said he was starting work to find out if there were any viruses or booby-traps buried in the code.</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
Graham Cluley, senior researcher at hi-tech security firm Sophos, wondered who would be tempted to use it.</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
"Who would want to put their trust in a piece of unknown software written by unknown people on a webpage that they don't know is safe or not?" he asked.</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
He warned people to be very wary, adding that some hacktivists keen to support the work of Anonymous had been tricked earlier in the year into installing a booby-trapped attack tool.</div>
<div style="clear: left; font-family: Arial, Helmet, Freesans, sans-serif; font-size: 1.077em; line-height: 18px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-rendering: auto;">
"Folks would be wise to be very cautious," he said.</div>
</span></span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-29729813618573492852012-03-13T20:35:00.001-07:002012-03-13T20:35:50.633-07:00Ron Paul Openly Calls GOP Election Fraud<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/X_LWRc5dRM8?fs=1" width="480"></iframe><br />
<br />
<span class="Apple-style-span" style="color: #333333; font-family: arial, sans-serif; font-size: 13px; line-height: 18px;">The whole sorry criminal saga goes on and on and at last Ron Paul calls it for what it is.</span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com2tag:blogger.com,1999:blog-497373662078697406.post-7664527067287621342012-03-13T05:55:00.001-07:002012-03-13T05:56:55.738-07:00Post-Sabu, Anonymous says arrest was "a favor" and vows to continue hacking.<br />
<div style="color: #434343; font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<a href="http://thenextweb.com/insider/2012/03/13/post-sabu-anonymous-says-arrest-was-a-favor-and-vows-to-continue-hacking/" target="_blank">by Matt Brian</a></div>
<div style="color: #434343; font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-p4rObkYnED0/T19DuomQWxI/AAAAAAAAAJo/2po6r-UfhnM/s1600/postsabu.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="187" src="http://4.bp.blogspot.com/-p4rObkYnED0/T19DuomQWxI/AAAAAAAAAJo/2po6r-UfhnM/s400/postsabu.jpeg" width="400" /></a></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Following the revelation last week that LulzSec’s so-called leader Hector Xavier Monsegur (Sabu) had <a href="http://thenextweb.com/insider/2012/03/06/lulzsec-leader-sabu-reportedly-worked-with-the-fbi-to-turn-in-other-members/" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">been working with the FBI</a> for a number of months to turn in other top-ranking members of the hacking collective, Anonymous has moved to distance itself from the disgraced former member, calling the FBI arrest “a favor” and vowing to continue its campaign of hacking.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">The activist group has come in for heavy criticism in the past for its raids on media and government websites but found itself further in the spotlight after it emerged the loosely associated member had been apprehended by the FBI last June and then worked with agents to not only identify but also apprehend his former colleagues.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">In a pure display of grandstanding, Anonymous took to <a href="https://twitter.com/#!/AnonymousIRC" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">one of its ‘official’ Twitter accounts</a>, telling its followers to “be evasive,” whilst laying down a warning to the authorities that seek to apprehend them:</span></div>
<blockquote class="twitter-tweet" style="border-left-color: rgb(226, 226, 226); border-left-style: solid; border-left-width: 6px; color: #5b5b5b; font-family: Georgia, serif; font-size: 12px; font-style: normal; line-height: 22px; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 1em; padding-bottom: 0px; padding-left: 30px; padding-right: 20px; padding-top: 0px;">
<div style="color: #999999; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Not rocket science. Really. Hacks will continue and so will the anger of the people. Arresting Sabu is not a win for the FBI it was a favor.</div>
<div style="color: #999999; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
— AnonymousIRC (@AnonymousIRC) <a data-datetime="2012-03-13T07:59:05+00:00" href="https://twitter.com/AnonymousIRC/status/179476662449221634" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; color: #0982df; text-decoration: none;">March 13, 2012</a></div>
</blockquote>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Anonymous says that it is not a hierarchical organization, meaning we are unable to ascertain whether the person tweeting from that account has much influence or not.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Last week, the FBI — with the help of police forces around the world – apprehended five top-ranking members of LulzSec, working on information reportedly provided by Sabu. The Bureau named the LulzSec members involved as Ryan Ackroyd (Kayla); Jake Davis (Topiary); Darren Martyn (Pwnsauce); Donncha O’Cearrbhail (Palladium) and Jeremy Hammond (Anarchos).</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">An FBI official said the arrest would be “devastating to the organization,” adding that they were “chopping off the head of LulzSec.”</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Anonymous responded to reports of LulzSec arrests by <a href="http://www.zdnet.com/blog/security/anonymous-hacks-panda-security-in-response-to-lulzsec-arrests/10542" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">attacking security firm Panda Security</a>, posting e-mail addresses and passwords of its 114 employees and a message on Monsegur’s transformation from LulzSec hacker to FBI snitch:</span></div>
<blockquote style="border-left-color: rgb(226, 226, 226); border-left-style: solid; border-left-width: 6px; color: #5b5b5b; font-family: Georgia, serif; font-size: 12px; font-style: normal; line-height: 22px; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 1em; padding-bottom: 0px; padding-left: 30px; padding-right: 20px; padding-top: 0px;">
<div style="color: #999999; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
#AntiSec is back once again knocking snitches doors cause traison is something we dont forgive</div>
<div style="color: #999999; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Yeah yeah<br />
We know…<br />
Sabu snitched on us<br />
As usually happens FBI menaced him to take his sons away<br />
We understand, but we were your family too (remember what you liked to say?)</div>
<div style="color: #999999; font-family: Georgia, serif; font-size: 14px; font-style: italic; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
It’s sad and we cant imagine how it feels having to look at the mirror each morning and see there the guy who shopped their friends to Police.</div>
</blockquote>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Whilst Anonymous and LulzSec operated independently of each other for the most part, the <a href="http://thenextweb.com/insider/2011/06/20/lulzsec-teams-up-with-anonymous-for-operation-anti-security/" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">two groups joined forces</a> for ‘Operation Anti-Security’ or AntiSec in June 2011 (around the time of Sabu’s arrest), which resulted in a number of high-profile hacks on government, private contractor and police websites — including the<a href="http://thenextweb.com/insider/2012/02/03/anonymous-hacked-police-emails-intercepted-fbiscotland-yard-telephone-call/" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">interception of a confidential phone call</a> between the FBI and Scotland Yard.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Monsegur was also said to be the mouthpiece of Anonymous before LulzSec was formed.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;"><a href="http://www.sci-tech-today.com/news/Sabu-s-Shady-Past-Comes-to-Light/story.xhtml?story_id=030003O0K4Y0&full_skip=1" style="border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-bottom-width: 1px; text-decoration: none;">Sci-Tech Today reports</a> that Monsegur’s criminal past includes “gun possession, purchasing stolen jewelry and electronics, running up $15,000 on a former employer’s credit card and referring people seeking prescription pain pills to illegal drug suppliers,” crimes that he will be punished for following its compliance with the FBI. His agreement with the agency may also see him enter witness protection and assume a new identity, should he escape a a long jail sentence.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Today’s gesturing appears to be a move by Anonymous to distance itself from events past, boasting that “the Establishment will lose” and that “the anger of the people” will motivate it to continue its hacking campaigns.</span></div>
<div style="font-family: 'Segoe UI', 'Proxima Nova', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">With 280,000 followers on Twitter alone, Anonymous still garners an impressive amount of support. However, with identities revealed and confidence in its members well and truly smashed, some members may start believing it’s a matter of when, not if, their acts will catch up with them.</span></div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-87385010829215589352012-03-13T05:48:00.002-07:002012-03-13T05:48:27.457-07:00Vatican confirms second Anonymous hack<span class="Apple-style-span" style="color: #7f8e95; font-family: Georgia; font-size: 14px; font-style: italic; line-height: 20px;">By <a href="http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/vatican-confirms-second-anonymous-hack-10025615/" target="_blank">Tom Espiner</a></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-kfSJ-36_788/T19B7gE3HgI/AAAAAAAAAJg/dJuCK-oaMNc/s1600/Vatican+Website+bringdown.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="213" src="http://3.bp.blogspot.com/-kfSJ-36_788/T19B7gE3HgI/AAAAAAAAAJg/dJuCK-oaMNc/s320/Vatican+Website+bringdown.jpeg" width="320" /></a></div>
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;">The Vatican has confirmed a second attack against its website by the Anonymous hacking group, and an infiltration of its radio database.</span><br />
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;"><br /></span><br />
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;">A Vatican spokesman on Tuesday downplayed the impact of the hack on the Vatican Radio database, saying the hackers had gained access to an old server.<br /><br />"There was a second attack we are aware of directed against the [Vatican IP] address," said the spokesman. "[Concerning] Vatican Radio, a database on an old server was accessed. Thirty percent of the information on the server was so outdated it was of no use."<br /><br />Anonymous claimed to have hacked Vatican Radio in protest against the Vatican Radio allegedly using "repeaters with power transmission largely outside the bounds of the law" in <a href="http://pastebin.com/r4khdyvj" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">a Pastebin post on Monday</a>.<br /><br />AnonOps Communications, a recognised mouthpiece of the hacktivist collective, <a href="http://anonops.blogspot.com/2012/03/anonymous-hacks-vatican-web-site-again.html" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">published a link to the Pastebin post</a> on Tuesday. Comments on the post called for <a href="http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/lulzsec-leader-sabu-was-fbi-informant-10025568/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">alleged LulzSec members arrested last week</a> by the FBI and international law enforcement to be freed.<br /><br />"Almost any protest which bares the request 'free the LulzSec team' is a honourable cause [sic]," said the comment.<br /><br />Anonymous first took down the Vatican website last Wednesday, in protest against the Roman Catholic Church, which Anonymous accused of actions <a href="http://anon-news.blogspot.com/2012/03/vaticanva-tango-down.html" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">including the molestation of children by priests</a>.<br /><br />The first successful Vatican hack was made a day after the LulzSec arrests which saw prominent LulzSec hacker 'Sabu' — Hector Xavier Monsegur — <a href="http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/lulzsec-leader-sabu-was-fbi-informant-10025568/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">exposed as an FBI informant</a>.<br /><br />The AnonymousIRC Twitter channel said on Tuesday that the FBI had done Anonymous "a favour" by arresting Sabu.<br /><br />"Not rocket science," <a href="https://twitter.com/#!/AnonymousIRC/status/179476662449221634" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">said the Tweet</a>. "Really. Hacks will continue and so will the anger of the people. Arresting Sabu is not a win for the FBI it was a favour [sic]."<br /><br /><b>Norton Antivirus source code</b><br /><br />LulzSec and Anonymous appear to have continued operations since the arrests. On Friday, Anonymous released Norton Antivirus 2006 source code, which the collective had <a href="http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/anonymous-hacker-fails-to-act-on-norton-code-threat-10025377/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">threatened to do</a> in February, after the <a href="http://www.zdnet.co.uk/news/security-threats/2012/02/07/anonymous-activists-release-pcanywhere-source-code-40094993/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">release of Symantec PCAnywhere source code</a>. The source code was stolen in 2006, according to Symantec.<br /></span><br />
<blockquote class="quote-left" style="border-bottom-color: rgb(230, 234, 237); border-bottom-style: solid; border-bottom-width: 0px; border-color: initial; border-left-color: rgb(230, 234, 237); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(230, 234, 237); border-right-style: solid; border-right-width: 5px; border-style: initial; border-top-color: rgb(230, 234, 237); border-top-style: solid; border-top-width: 0px; float: left; font-family: Georgia; font-size: 16px; font-style: italic; font-weight: inherit; line-height: 24px; margin-bottom: 20px; margin-left: 0px; margin-right: 20px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 15px; padding-top: 0px; quotes: '', ''; vertical-align: baseline; width: 200px;">
<div class="quote" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Georgia; font-size: 16px; font-style: italic; font-weight: inherit; line-height: 24px; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<img src="http://www.zdnet.co.uk/i/base/quote-left.gif" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: inline; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 3px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: top;" /> Symantec can confirm that the source code for 2006 versions of Norton Antivirus posted by Anonymous is authentic. <img src="http://www.zdnet.co.uk/i/base/quote-right.gif" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: inline; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 3px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: top;" /></div>
– Symantec</blockquote>
The source code <a href="https://thepiratebay.se/torrent/7087027/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">was released to the Pirate Bay</a> file-sharing site, with a quote attributed to Jeremy Hammond, one of the alleged LulzSec hackers arrested the FBI last week. Hammond is alleged to be the hacker 'sup_g'.<br /><br />"Our civilization is facing a radical, imminent mass change," said the quote. "The alternative to the hierarchical power structure is based on mutual aid and group consensus."<br /><br />Symantec <a href="http://www.symantec.com/theme.jsp?themeid=anonymous-code-claims" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">downplayed the release of the code</a> on Friday, but confirmed the code was bona fide.<br /><br />"Symantec can confirm that the source code for 2006 versions of Norton Antivirus posted by Anonymous is authentic," the company said in a statement. "The exposure of this code poses no increased risk to Norton or Symantec customers. This code is part of the original cache of code for 2006 versions of the products that Anonymous has claimed to possess over the last few weeks."<br /><br />The code was "so old that current out-of-the-box security settings will suffice against any possible threats that might materialize as a result of this incident", said Symantec, which added that it expected Anonymous to release source code for 2006 versions of Norton Internet Security.<br />Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-30719712804125486022012-03-12T19:50:00.000-07:002012-03-12T19:53:16.555-07:00Anonymous Documentary We Are Legion The Story Of The Hacktivists Premieres At SXSW<a href="http://www.deathandtaxesmag.com/180170/anonymous-documentary-we-are-legion-the-story-of-the-hacktivists-premieres-at-sxsw/" target="_blank">By DJ Pangburn</a><br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/gn9-80ObGA8?fs=1" width="480"></iframe><br />
<br />
<span class="Apple-style-span" style="background-color: black; color: white;"><span class="Apple-style-span" style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px;">Last night, “</span><span class="Apple-style-span" style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px;"><a href="http://wearelegionthedocumentary.com/" style="text-decoration: none;">We Are Legion: The Story of the Hacktivists</a></span><span class="Apple-style-span" style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px;">,” a documentary covering the hacking collective Anonymous, premiered at SXSW.</span></span><br />
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">I’ve spent a great deal of my time here at Death and Taxes attempting to examine the symbolic context by which Anonymous operates on political, social and economic levels. While I freely acknowledge that hacking of credit cards is a criminal act, I am quite convinced that DDoS attacks are a legitimate form of digital protest.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Additionally, I believe that in a country and a world in which power structures operate behind the veil of state secrecy and national security, that if information—whether it reveals bankrupt ethics, corruption, or otherwise bad behavior—finds its way into the hands of WikiLeaks or other publishers by way of hacking, then so be it. I believe that such a force can simultaneously fight alongside Arab Spring protesters, but also on American shores against banks and investors who crashed the economy in 2008; and that the latter is not crime on the order of Al Qaeda or Timothy McVeigh’s violent theatrics. Greedy, unethical bankers and corporate lobbyists are as illegitimate as dictators: the former often operate in the shadows, while the other exerts power openly. Both act without compunction.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">If governments were more open with their people and didn’t act irresponsibly, or weren’t so easily and efficiently corrupted by business interests, then the hacking would not be necessary. If a man is bound against his will, he is liable to gnash his teeth at his captor—so it is with Anonymous.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">I first encountered Anonymous while living in Los Angeles, where they initially donned the Guy Fawkes masks in opposition to Scientology. Naturally, I was supportive, not only because the visuals were humorous, but because it was an effective means of protesting an ethically corrupt cult.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">In the summer of 2010, I encountered an individual who foresaw that Anonymous was about to evolve from merely causing The Church of Scientology and Sony grief into a mechanism for fighting political, social and economic injustice. This was several months before Operation Avenge Assange, when I couldn’t possibly have comprehended the full import of Anonymous’ next move.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">A lot has been said about Anonymous by the federal government, the private sector, and journalists, and many of their points are valid within the context of current federal cybercrime laws. As with any power structure, though, its power is to be preserved not through its integrity, but in how well it can distort the atmosphere of dissident opinion and action, and feed the lies to the masses. It should come as no surprise then that the US government is <a href="http://www.deathandtaxesmag.com/180060/the-us-government-will-paint-anonymous-and-hacktivists-as-terrorists/" style="text-decoration: none;">attempting to define Anonymous</a> as “terrorists.”</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Hopefully, “We Are Legion: The Story of the Hacktivists,” directed by Brian Knappenberger, will go some way in checking the distortion from the federal politicians and their benefactors on Wall Street.</span></div>
</div>
<div style="font-family: Georgia, sans-serif; font-size: 15px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Appearing in the documentary is Gabriella Coleman, an anthropologist who researches hacktivism. You can read my interview with her <a href="http://www.deathandtaxesmag.com/157192/digital-activism-from-anonymous-to-occupy-wall-street-a-conversation-with-gabriella-coleman/" style="text-decoration: none;">here</a>.</span><br />
<div class="separator" style="clear: both; color: #2f2f2f; text-align: center;">
<a href="http://1.bp.blogspot.com/-HkFVubQHScU/T162G-vCarI/AAAAAAAAAJY/LEaQxY47UYs/s1600/anon-documentar.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="272" src="http://1.bp.blogspot.com/-HkFVubQHScU/T162G-vCarI/AAAAAAAAAJY/LEaQxY47UYs/s400/anon-documentar.png" width="400" /></a></div>
<div style="color: #2f2f2f;">
<br /></div>
</div>
</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com1tag:blogger.com,1999:blog-497373662078697406.post-9065946890584483732012-03-12T19:39:00.003-07:002012-03-12T19:40:51.282-07:00Anonymous Affiliate Steals 40,000 Credit Card Numbers<span class="Apple-style-span" style="font-family: arial, verdana, helvetica; font-size: 12px; line-height: 15px;"><a href="http://www.cio-today.com/news/Porn-Site-Credit-Card-Info-Hacked/story.xhtml?story_id=030001192DCC&full_skip=1" target="_blank">By Jennifer LeClaire</a></span><br />
<span class="Apple-style-span" style="font-family: arial, verdana, helvetica; font-size: 12px; line-height: 15px;"><br /></span><br />
<span class="Apple-style-span" style="font-family: arial, verdana, helvetica; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="font-size: 13px; font-weight: bold; line-height: 16px;">For its first major hack job, The Consortium stole about 40,000 financial details, spanning names, credit card numbers, CCV numbers and expiration dates. In a message, The Consortium claimed it had access to DigitalPlayground.com for a while before it decided to strike. The Consortium also made available more than 50 porn movies in its hack.</span></span><br />
<span class="Apple-style-span" style="font-family: arial, verdana, helvetica; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="font-size: 13px; font-weight: bold; line-height: 16px;"><br /></span></span><br />
<span class="Apple-style-span" style="font-family: arial, verdana, helvetica; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="font-size: 13px; font-weight: bold; line-height: 16px;"><br /></span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-i8NR7IxmRIc/T16zRDUEsvI/AAAAAAAAAJQ/gaTEIOjegVY/s1600/KEY.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="230" src="http://3.bp.blogspot.com/-i8NR7IxmRIc/T16zRDUEsvI/AAAAAAAAAJQ/gaTEIOjegVY/s320/KEY.jpg" width="320" /></a></div>
<span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: verdana, arial, helvetica; font-size: 13px; line-height: 17px;">It's not Anonymous, but it's an emerging group of hackers that claims affiliation with the infamous "hacktivist" group. Its name: The Consortium.</span><br />
The Consortium is making headlines today for allegedly stealing the credit card records and other personal identifying <a href="http://www.cio-today.com/accuserve/accuserve-go.php?c=11923">information</a> in a hack on porn site Digital Playground. The Consortium claims to have stolen information from more than 70,000 users of the Internet porn site.<br />
"By and large, groups of hackers including Anonymous and the Consortium are putting large and small organizations on notice that they need to be far more prudent in securing their <a href="http://www.cio-today.com/accuserve/accuserve-go.php?c=12814">data</a>," said Jonathan Spira, chief analyst at Basex and author of Overload! How Too Much Information is Hazardous To Your Organization.<br />
"Today, individuals and organizations have far more information to manage than ever before, and it's critical to ensure that the appropriate measures and safeguards are in place to keep information safe and <a href="http://www.cio-today.com/accuserve/accuserve-go.php?c=12839">secure</a>," Spira said.<br />
<span class="subhead" style="color: #9e0b0e; font-family: arial, helvetica; font-size: 13px; font-weight: bold;">Friendly Hackers?</span><br />
Indeed, for its first major hack job, The Consortium stole about 40,000 financial details, spanning names, credit card numbers, CCV numbers and expiration dates. In a message, The Consortium claimed it has had access to DigitalPlayground.com for a while before it decided to strike.<br />
"This company has security, that if we didn't know it was a real <a href="http://www.cio-today.com/accuserve/accuserve-go.php?c=12820">business</a>, we would have thought to be a joke -- a joke that we found much more amusing than they will," The Consortium said.<br />
"These credit cards are all plaintext but we will not be releasing or using as we do this for the love of the game, not for profit, and these people's only crime was wanting some porn. We cannot justify releasing these people's credit card info, but remember it is DP that allowed this to happen, this could have been a different group. And perhaps they may have done far worse when given this information."<br />
The Consortium also made available more than 50 porn movies in its hack. Digital Playground is up and running, but as of the time this article was penned the porn site was not registering new members.<br />
<span class="subhead" style="color: #9e0b0e; font-family: arial, helvetica; font-size: 13px; font-weight: bold;">Stop Using the Same Password</span><br />
"So, what are the lessons that consumers can learn from this? At the very least, you should use different passwords for different services. If you give a password to, say, a pornographic Web site, make sure that you are not using the same password on other Web sites too -- as malicious hackers might use it to unlock your other accounts," said Graham Cluley, a senior security analyst at Sophos.<br />
"Unfortunately there's not much you can do about whether the Web site you are using is properly protected against vulnerabilities, and securely encrypting your personal information, other than explore whether they have had security issues in the past and vote with your feet if you feel they are doing a poor job."Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-51333566325632362612012-03-12T19:30:00.000-07:002012-03-12T19:31:37.988-07:00Anonymous made fraudulent charges worth $700K in Stratfor attackMeghan Kelly<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-rH3kF9hoiWA/T16w2zw9goI/AAAAAAAAAJI/Ss4WOm5vaaE/s1600/shutterstock_anonymous.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="231" src="http://3.bp.blogspot.com/-rH3kF9hoiWA/T16w2zw9goI/AAAAAAAAAJI/Ss4WOm5vaaE/s400/shutterstock_anonymous.jpg" width="400" /></a></div>
<br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">The FBI has revealed that there were $700,000 worth of fraudulent credit card charges after hacktivist group Anonymous stole nearly 200 gigabytes of data, including credit card numbers, from security firm <a href="http://www.stratfor.com/" style="text-decoration: none;" target="_blank" title="Stratfor">Stratfor</a>.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">“At least $700,000 worth of unauthorized charges were made to credit card accounts that were among those stolen during the Stratfor Hack,” said Mahil Patel of the FBI to a judge overseeing the Stratfor case.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">Stratfor, which has a number of high-profile clients including the Department of Defense, Lockheed Martin, and Bank of America, <a href="http://venturebeat.com/2011/12/28/anonymous-stratfor-hack-10-things-to-know/" style="text-decoration: none;" target="_blank" title="10 things you need to know about Anonymous’ Stratfor hack">was breached in December</a>. Soon thereafter hacker Jeremy Hammond was arrested for leading the attack.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">Anonymous stole a large amount of user names and passwords, in addition to some 60,000 credit card records, after exploiting vulnerabilities to reach Stratfor’s servers. At the time, Anonymous said it would use the credit cards to make charitable donations — money that would obviously never see the hands of the needy. One VentureBeat tipster claimed Anonymous actually charged $300 worth of hooded sweatshirts to an account.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">The damages may still be growing, however. The FBI explained that the $700,000 figure did not include any charges on credit card records that have not yet been reviewed. The number Patel offered the judge only referenced records reviewed between December 6 and early February.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">In addition to the credit card numbers and other personally identifiable information, Anonymous also stole emails from Stratfor executives, including chief executive George Friedman. These emails were subsequently fed to Wikileaks which, with participation from a number of publications around the world, began <a href="http://venturebeat.com/2012/02/27/stratfor-wikileaks-emails/" style="text-decoration: none;" target="_blank" title="WikiLeaks to publish Stratfor hack e-mails, the firm responds">publishing the emails in late February</a>. Some emails held what Wikileaks considered damning information, including odd nicknames such as “Hizzies” for members of Hezbollah and “Adogg” for referencing Iran president Mahmoud Ahmadinejad.</span></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; font-style: italic; font: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="background-color: black; color: white;">via <a href="http://venturebeat.com/2012/03/12/anonymous-stratfor-credit-card/www.securityweek.com/stratfor-breach-leads-over-700k-fraudulent-transactions" style="text-decoration: none;" target="_blank" title="Stratfor Breach Leads to Over $700k In Fraudulent Transactions">SecurityWeek</a></span></em></div>
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: georgia, serif; font-size: 13px; font: inherit; line-height: 19px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="color: white; font-size: 13px;"><em style="background-color: black; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 13px; font-style: italic; font: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.shutterstock.com/pic-86909384/stock-photo-the-hague-october-two-masked-members-of-anonymous-demonstrating-during-the-occupy-protest.html" style="text-decoration: none;" target="_blank" title="Anonymous Image">Anonymous image</a> via <a href="http://www.shutterstock.com/" style="text-decoration: none;" target="_blank" title="Shutterstock">Shutterstock</a></em></span></div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-65907259472499839142012-03-12T08:13:00.003-07:002012-03-12T08:13:28.765-07:00'Anonymous' abortion service hacker pleads guilty<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;"><span class="Apple-style-span" style="color: #7f8e95; font-family: Georgia; font-size: 14px; font-style: italic;">By <a href="http://www.zdnet.co.uk/member-profile/2000331761/" rel="author" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 14px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">David Meyer</a></span></span><br />
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;"><br /></span><br />
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;">A West Midlands man who hacked into and defaced the website of the UK's largest abortion service has pleaded guilty to two offences under the Computer Misuse Act.<br /><br />James Jeffery, who used the handle 'Pablo Escobar', <a href="http://www.zdnet.co.uk/blogs/communication-breakdown-10000030/man-arrested-over-hacking-of-abortion-provider-site-10025592/" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">hacked the British Pregnancy Advisory Service (BPAS)</a> on Thursday. He defaced the front page with an anti-abortion message and the Anonymous logo, and took details of people who had visited the site looking for advice.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/--BdXDIk1IlU/T14Sb5aodKI/AAAAAAAAAJA/pDhiHJqr3Hw/s1600/bpas-anonymous.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://1.bp.blogspot.com/--BdXDIk1IlU/T14Sb5aodKI/AAAAAAAAAJA/pDhiHJqr3Hw/s1600/bpas-anonymous.jpg" /></a></div>
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;"><br /></span><br />
<span class="Apple-style-span" style="font-family: Verdana; font-size: 12px; line-height: 20px;"></span><br />
<div class="center" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline; width: 610px;">
<div class="credit" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 20px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<strong>The defaced BPAS website, shown in an image uploaded by the hacker</strong></div>
</div>
The 27-year-old pleaded guilty to two counts at Westminster Magistrates' Court on Saturday — one count related to hacking the BPAS web server, and the other to taking the personal data from a contacts database.<br /><br />According to <a href="http://www.guardian.co.uk/world/2012/mar/11/abortion-website-hacker-caught" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #004d99; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">a report</a> in <i>The Guardian</i>, Jeffery took around 10,000 records of women who had registered with the site. He had boasted on Twitter that he would publish the records, but told the court that he changed his mind as doing so would be "wrong".<br /><br />It appears the records included names and email addresses, but BPAS said that the identity of women receiving treatment remained safe.<br /><br />Jeffery also identified vulnerabilities in the websites of the FBI, CIA and houses of parliament, the report stated.<br /><br />The hacker claimed affiliation with Anonymous, but there has so far been no suggestion that anyone else from the collective had anything to do with the BPAS hack.<br /><br />Jeffery will be sentenced at a later date.Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com1tag:blogger.com,1999:blog-497373662078697406.post-43520491536731220292012-03-12T08:08:00.003-07:002012-03-12T08:09:43.961-07:00Rome- Hacker gang Anonymous targets Vatican again<span class="Apple-style-span" style="background-color: black; font-family: Arial, 'Trebuchet MS', sans-serif; font-size: 13px; line-height: 17px;"><span class="Apple-style-span" style="color: white;"><a href="http://www.agi.it/english-version/italy/elenco-notizie/201203121503-cro-ren1056-rome_hacker_gang_anonymous_targets_vatican_again" target="_blank">Credits to </a></span></span><br />
<span class="Apple-style-span" style="background-color: black; font-family: Arial, 'Trebuchet MS', sans-serif; font-size: 13px; line-height: 17px;"><span class="Apple-style-span" style="color: white;"><br /></span></span><br />
<span class="Apple-style-span" style="background-color: black; font-family: Arial, 'Trebuchet MS', sans-serif; font-size: 13px; line-height: 17px;"><span class="Apple-style-span" style="color: white;"><br /></span></span><br />
<span class="Apple-style-span" style="background-color: black; font-family: Arial, 'Trebuchet MS', sans-serif; font-size: 13px; line-height: 17px;"><span class="Apple-style-span" style="color: white;">(AGI) Rome- The Holy See is being targeted by hackers from the gang Anonymous once again. Just days after a first attack which generated several problems for the official website, the hackers are back on the rampage. "It pains us to tell you that your systems are less safe than you would like to believe because, while the media furore focused on the vatican.va blackout, we took the liberty of penetrating your system a little". The main target of the new strike is Vatican Radio: "it is now a renowned fact that you use equipment whose transmission strength exceeds legal limits by far, and the correlation between exposure to high-intensity electromagnetic emissions and serious illnesses such as leukemia, cancer and others is also a sad and proven fact. Many citizens unlucky enough to live within range of your repeaters have tried to undertake legal proceedings in light of their declining health conditions. Anonymous cannot tolerate these crimes, which continue to go unpunished, and would like to remind you that you are 'guests' on Italian soil." In the past days there has been a surge in attacks at the hands of the group, often targeting the websites of the police, carabinieri, Interior Ministry, government, Trenitalia and, yesterday, Equitalia. . .</span></span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-52744032350145051872012-03-12T08:07:00.003-07:002012-03-12T08:14:37.128-07:00Symantec is unmoved by Norton Anti Virus source release<br />
<div class="article_summary" style="color: #333333; font-family: Verdana; font-size: 1.4em;">
<span class="Apple-style-span" style="color: black; font-size: 12px;"><a href="http://www.theinquirer.net/inquirer/news/2158654/symantec-unmoved-norton-anti-virus-source-release" target="_blank">by Dave neal</a></span></div>
<div class="article_summary" style="color: #333333; font-family: Verdana; font-size: 1.4em;">
<span class="Apple-style-span" style="color: black; font-size: 12px;"><strong><br /></strong></span></div>
<div class="article_summary" style="color: #333333; font-family: Verdana; font-size: 1.4em;">
<span class="Apple-style-span" style="color: black; font-size: 12px;"><strong><br /></strong></span></div>
<div class="article_summary" style="font-family: Verdana; font-size: 1.4em;">
<span class="Apple-style-span" style="background-color: black; color: white; font-size: 12px;"><strong>SECURITY FIRM</strong> Symantec was expecting hacker <a class="kLink" href="http://www.theinquirer.net/inquirer/news/2158654/symantec-unmoved-norton-anti-virus-source-release#" id="KonaLink0" style="background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; border-bottom-color: transparent !important; border-bottom-style: none !important; border-bottom-width: 0px !important; border-left-color: transparent !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: transparent !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: transparent !important; border-top-style: none !important; border-top-width: 0px !important; bottom: 0px; cursor: pointer; display: inline !important; font-family: inherit !important; font-size: inherit !important; font-variant: normal; font-weight: inherit !important; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; right: 0px; text-decoration: underline !important; text-transform: none !important; top: 0px;"><span style="font-family: inherit; font-size: inherit !important; font-weight: inherit !important; position: static;"><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: initial; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">group </span><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: initial; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Anonymous</span></span></a> to release the source code for its 2006 Norton Anti Virus product.</span></div>
<div class="article_author_name" style="font-family: Verdana; font-size: 1.1em; margin-top: 5px;">
<span class="Apple-style-span" style="background-color: black;"><span class="Apple-style-span" style="color: white; font-size: 12px;"></span></span><br />
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white; font-size: 12px;">The hackers had already leaked code from Symantec when the firm told us that it was <a href="http://www.theinquirer.net/inquirer/news/2158170/anonymous-leaks-symantec-source-code" style="text-decoration: none;" target="_blank" title="Anonymous leaks Symantec source code">expecting a further release from the group</a>.</span></div>
<span class="Apple-style-span" style="font-size: 12px;"><span class="Apple-style-span" style="background-color: black; color: white;">
</span><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">"Symantec is aware of the claims made by Anonymous that it has recently posted source code for the 2006 version of Norton Antivirus. We are still in the process of analyzing the code to confirm its authenticity," it told the INQUIRER late Friday.</span></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">"We anticipate that at some point, Anonymous will also post the code for the 2006 version of Norton <a class="kLink" href="http://www.theinquirer.net/inquirer/news/2158654/symantec-unmoved-norton-anti-virus-source-release#" id="KonaLink1" style="background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; border-bottom-color: transparent !important; border-bottom-style: none !important; border-bottom-width: 0px !important; border-left-color: transparent !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: transparent !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: transparent !important; border-top-style: none !important; border-top-width: 0px !important; bottom: 0px; cursor: pointer; display: inline !important; font-family: inherit !important; font-size: inherit !important; font-variant: normal; font-weight: inherit !important; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; right: 0px; text-decoration: underline !important; text-transform: none !important; top: 0px;"><span style="font-family: inherit; font-size: inherit !important; font-weight: inherit !important; position: static;"><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: initial; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Internet </span><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: initial; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Security</span></span></a>, which they also claim to possess. As we have already stated publicly, this is old code, and Symantec and Norton customers will not be at an increased risk as a result of any further disclosure related to these 2006 products."</span></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Shortly afterwards code from <a class="kLink" href="http://www.theinquirer.net/inquirer/news/2158654/symantec-unmoved-norton-anti-virus-source-release#" id="KonaLink2" style="background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; border-bottom-color: transparent !important; border-bottom-style: none !important; border-bottom-width: 0px !important; border-left-color: transparent !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: transparent !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: transparent !important; border-top-style: none !important; border-top-width: 0px !important; bottom: 0px; cursor: pointer; display: inline !important; font-family: inherit !important; font-size: inherit !important; font-variant: normal; font-weight: inherit !important; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; right: 0px; text-decoration: underline !important; text-transform: none !important; top: 0px;"><span style="font-family: inherit; font-size: inherit !important; font-weight: inherit !important; position: static;"><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Norton </span><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Anti </span><span class="kLink" style="background-attachment: initial; background-clip: initial; background-image: none; background-origin: initial; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; border-left-color: initial !important; border-left-style: none !important; border-left-width: 0px !important; border-right-color: initial !important; border-right-style: none !important; border-right-width: 0px !important; border-top-color: initial !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit; font-size: inherit !important; font-weight: inherit !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static; width: auto !important;">Virus</span></span></a> appeared online, an event that was celebrated by the hacktivists but batted away by the security firm.</span></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">"Everyone's known Norton/Symantec's been a complete joke for.. well forever but LOL @Symantec u mad?", <a href="https://twitter.com/#!/AnonPress/status/178149422851571712" style="text-decoration: none;" title="Youranonnews Twitter">said the @Anonpress Twitter account</a>. "This past week #Anonymous released Symantec src, defaced police & security firm sites, and took down the Vatican. Who said it was weakened?" added @Youranonnews.</span></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">Symantec quickly responded to the leak on Twitter, confirming that the release was its code, but adding that it would not affect its users.</span></div>
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<span class="Apple-style-span" style="background-color: black; color: white;">"Source code for 2006 versions of NAV posted by Anonymous is authentic but poses no increased risk to our users," it said.</span></div>
</span><div style="color: #464646;">
</div>
</div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-54843105702732462352012-03-12T08:04:00.003-07:002012-03-12T08:14:16.210-07:00Tunisia: Anonymous Hacks Islamist Party's Facebook Page<br />
<h2 style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #939393; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 18px; font-weight: normal; line-height: 18px; margin-bottom: 4px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<a href="http://www.tunisia-live.net/" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; color: #10579f; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Tunisia Live</a> (Tunis)</h2>
<br />
<br />
<br />
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">The Facebook page of Hizb Ettahrir, an Islamist political party that is legally unrecognized in Tunisia, was hacked last night by a Tunisian group claiming affiliation with the international cyber activist collective Anonymous.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">A representative of the Tunisian Anonymous group, calling himself "CaliforniaKB," said that the attack was motivated by the activity of the Tunisian hacking group Fellaga, who he accused of working for Hizb Ettahrir, and last Wednesday's desecration of the national flag by an Islamist protester at Manouba University.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">The representative said that the group did not have an ideological orientation, but was simply defending the "people's freedom."</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">"We are not liberals, we do not represent any political party. We are for the people, we are the people. We fight fire with fire, we were watching and doing nothing until we saw the Tunisian flag getting down in Manouba University," CaliforniaKB explained.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">CaliforniaKB also stated that the group is not against Islamism. "We are not against Hizb Ettahrir. Personally, I am a Muslim; we are against any extremist idea whether from left, right or center," he asserted.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">Ridha Belhaj, spokesperson of Hizb Ettahrir, expressed that the party was undaunted by the attack. "This is a cowardly thing to do; instead of confronting us, they resorted to these methods. This will not put us down, we will always be here," Belhaj said.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">Belhaj also declared that Hizb Ettahrir was not involved in the flag incident that occurred in Manouba university. "We had nothing to do with it. We are against violence - these are Hizb Ettahrir principles," said Belhaj.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">The representative of Anonymous in Tunisia threatened future attacks against the Tunisian government if they do not, "achieve the aims of the revolution," and claimed to have access to incriminating e-mails and "financial documents" about the government.</span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: Arial, 'Liberation Sans', sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 16px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">
<span class="Apple-style-span" style="background-color: black; color: white;">"We do have access to many secret files. We are waiting for the good moment to take you down unless you finish the revolution in the right way," said CaliforniaKB.</span></div>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-81179497210023184492012-03-11T18:14:00.001-07:002012-03-11T18:14:48.230-07:00ANONYMOUS Revolution 2012 New Message What we are capable of!<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/V9ykKgKWb8g?fs=1" width="480"></iframe>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-68724453375227839792012-03-11T15:54:00.001-07:002012-03-11T15:55:57.472-07:00Anonymous Members Arrested - FBI Fear Mongering?<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/YXi-oDoMQhc?fs=1" width="480"></iframe><br />
<br />
<span class="Apple-style-span" style="background-color: black; color: white; font-family: arial, sans-serif; font-size: 13px; line-height: 18px;">25 members of the global hacker group Anonymous were arrested in Europe by Interpol. In America the FBI is fear mongering and talking about cyber 'terrorism'. Are comparisons to terrorists relevant? The Young Turks host Cenk Uygur on document leaks and how our corrupt government is protecting the interests of private corporations over the interests of the American people.</span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-24286301156440248322012-03-11T15:41:00.000-07:002012-03-11T15:41:44.353-07:00'Anonymous' Member Admits Hacking UK Abortion Site<span class="Apple-style-span" style="color: #666666; font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;">by</span><span class="Apple-style-span" style="color: #666666; font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;"> </span><span class="Apple-style-span" style="color: #666666; font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;"><span class="group" style="font-weight: bold;">Naharnet Newsdesk</span></span><br />
<span class="Apple-style-span" style="color: #666666; font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif;"><span class="Apple-style-span" style="font-size: 12px;"><b><br /></b></span></span><br />
<br />
<div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
<img border="0" height="206" src="http://4.bp.blogspot.com/-bPW5trP8maY/T10pUVIfJbI/AAAAAAAAAI4/23YvbKeDdjM/s320/987.jpg" width="320" /></div>
<span class="Apple-style-span" style="font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;"><span class="group" style="background-color: black; font-weight: bold;"><span class="Apple-style-span" style="color: white;"></span></span></span><br />
<div class="desc">
<span class="Apple-style-span" style="font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;"><span class="group" style="background-color: black; font-weight: bold;"><span class="Apple-style-span" style="color: white;">A member of the international computer hacking group Anonymous pleaded guilty in court in Britain on Saturday to breaking into and defacing the website of an abortion service.</span></span></span></div>
<span class="Apple-style-span" style="font-family: 'Lucida Grande', 'Lucida Sans', Verdana, Arial, sans-serif; font-size: 12px;"><span class="group" style="background-color: black; font-weight: bold;"><span class="Apple-style-span" style="color: white;">
<div class="desc">
James Jeffery, 27, said he targeted the site because he disagreed with his sister's decision to terminate her pregnancy, Westminster Magistrates Court in central London heard.</div>
<div class="desc">
He stole around 10,000 records with the details of women who had registered with the site, and replaced the logo of the British Pregnancy Advisory Service with the Anonymous symbol.</div>
<div class="desc">
Jeffrey then boasted about the attack on Twitter, using the alias "Pablo Escobar" after the Colombian drug lord who died in 1993 and printing the name and log-on details of a BPAS administrator.</div>
<div class="desc">
Police arrested him on Friday at his home in Wednesbury, central England, after the abortion service raised the alarm.</div>
<div class="desc">
Jeffrey admitted one charge of gaining unauthorized access to data and another of gaining unauthorized access to a computer with the intention of impairing its operation.</div>
<div class="desc">
Judge Daphne Wickham described him as a "zealot with an anti-abortion campaign".</div>
<div class="desc">
She refused to grant him bail, saying that he was an "able hacker" who could target other organizations and ordering that he should be held in custody until sentencing at a later date.</div>
<div class="desc">
On Tuesday two Britons with alleged ties to Anonymous were among five people charged in the United States in in high-profile cyber attacks after a leader of the group became an FBI informant.</div>
<div class="desc">
Ryan Ackroyd, 23, of Doncaster, and Jake Davis, 29, of Lerwick, Shetland Islands, were both arrested last year in Britain</div>
</span></span></span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-37497226797020831502012-03-10T22:09:00.001-08:002012-03-10T22:11:16.745-08:00Anonymous in Paris: Anti-ACTA protest video<iframe allowfullscreen="" frameborder="0" height="344" src="http://www.youtube.com/embed/TlReOl6Lqbo?fs=1" width="459"></iframe><br />
<br />
<span class="Apple-style-span" style="background-color: black; color: white; font-family: arial, sans-serif; font-size: 13px; line-height: 18px;">Supporters of the Anonymous hacker group, which is calling to halt moves by governments to tighten control over the internet, gathered near the Pompidou Center in Paris on Saturday. The group says it is trying to attract ordinary citizens' attention to the violation of rights and freedoms. In particular, the group is protesting against the controversial Anti-Counterfeiting Trade Agreement (ACTA), which promotes the creation of criminal sanctions against internet providers and users who do not comply with the legality of content saved or uploaded. The group gained fame because of its attacks on the websites of various organizations and institutions.</span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com0tag:blogger.com,1999:blog-497373662078697406.post-32968580437989797542012-03-10T21:51:00.001-08:002012-03-10T21:54:55.567-08:00Op-Ed: Latest release by Anonymous ― What are we capable of? 2.0 - Revolution 2012<a href="http://www.digitaljournal.com/article/320975">By Anne Sewell</a><br />
<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/V9ykKgKWb8g?fs=1" width="480"></iframe><br />
<br />
<span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">Anonymous has released a new video, telling the world exactly what they are capable of. Not simply hackers, Anonymous is a worldwide collective protest.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">Since early 2011, there have been many protests worldwide. Globally peaceful protesters have been shot with rubber bullets and in some countries real bullets, sprayed with tear gas and pepper spray and brutally beaten by police officers.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">People are sick of the constant wars, allegedly on "terror". They have had enough of the corruption of governments and financial institutions. The threat of internet censorship hovers around us constantly. New bills give the government the right to detain and even kill American citizens, both in the USA and overseas, without charge.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">They say "enough is enough".</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">In the video Anonymous advises that it is now declaring war on the United States. Life will get very interesting in 2012.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">The following is a statement made on 7 March 2012 by the collective Anonymous:</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">"Each of us has our own path, but each of us share the same goal, a free humanity - together we stand.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">People all around our world have made the choice to rise against this corrupted system.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">The resistance continues. 2011 will forever be remembered as a year of global uprising. 2012, the whispers of revolution blow in the wind.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">We are anonymous.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">We continue to support the people as we "occupy" because we truly believe another world is possible, a world where choices are made from the heart, a world free of fear.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">As humanity continues to connect at an accelerating rate, we continue to cross all borders. With knowledge comes understanding, with understanding we can overcome our issues, we must live in a world free of censorship.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">As you watch this video governments around the world continue to arrest Anons and beat peaceful protesters.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">They fear us because we are evolving faster than they can control. We can no longer exist in their world of fear. It is time to make our own change.</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">Now is the time to make our stand. There is no ONE right answer, our resistance must be as colourful as the spectrum. You can only disturb the hive so much before you get stung!</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">The people will only take so much!</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">You can no longer contain us!</span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"> </span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"><br /></span><span class="Apple-style-span" style="color: white; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;">We are just getting warmed up!"</span>Anonymoushttp://www.blogger.com/profile/12898400549807576151noreply@blogger.com3