Friday, March 18, 2011

HACKtivists Need Unity And Not Ego…

HACKtivists Need Unity And Not Ego…

Anonymous, the WikiLeaks-loving online hacktivist collective claims, the US military is developing a piece of software that can infiltrate Facebook and other social networks using an army of fake profiles, cross-referencing information to "track and identify" individuals.

Evidence of the software - code-named 'Metal Gear' by the group - was uncovered in leaked emails belonging to US security contractor HBGary, after the company was attacked by Anonymous for providing assistance to the FBI in unmasking its members.

In a press release issued late on Wednesday, Anonymous revealed a US patent application by IBM's research labs for software designed to recognize individuals by analyzing their linguistic traits and online behavior. The group also posted what it claims is an tender for 'persona management software' made last year by the US Air Force, which it claims was won by technology consultants Booz Allen Hamilton.

"This operation stems from a string of leaked HBGary emails wherein a company by the name of Booz Allen Hamilton, in direct contact with [HBGary chief] Aaron Barr, is believed to have bid on an successfully won the contract to develop an unnamed software from the US Air Force," the group explained.

"We believe Metal Gear involves an army of fake cyber personalities immersed in social networking websites... crawling information from major online communities (such as Facebook), and identifying anonymous personalities via correlating stored information from multiple sources to establish connections between separate online accounts, using this information to arrest dissidents and activists who work anonymously."

"It is sophisticated enough to develop a 'profile' for each puppet to add a level of 'realism' to each. In short, there would be no feasible way to distinguish between 100 people commenting on a subject, and 100 of these puppets doing the same," the press release claimed.

In a lengthy audio statement explaining their initial findings, members of Anonymous claimed an informant inside the US Air Force had confirmed the existence of the technology. One speaker explained its implications:

"Imagine losing your anonymity. Imagine creating an online account under one alias and, months later, creating another online account under another alias, completely splitting the two. Nobody knows your old one; nobody knows your new one. They're completely different," said the Anonymous spokesperson.

"Imagine software that can correlate every login time from both of these accounts, every piece of grammar you use, every nickname... this software automatically finding out who you are online."

If true, the allegations echo comments made by WikiLeaks founder Julian Assange earlier this week, when he claimed that the Internet - and particularly social networks - is being used by governments as the "greatest spying machine the world has ever seen".

phmsa022811.htm   Texting Prohibited for HazMat Transport Drivers-  February 28, 2011

libya-protest4.htm  Libya Protest Photos 4  -  February 26, 2011

frs-foia-docs.htm   Federal Reserve System Releases FOIA Documents-  February 26, 2011

DTM-09-026.pdf   DoD Responsible Use of the Internet-  February 26, 2011

ntia022511.htm    RFC on IANA Functions Contract -  February 25, 2011

usace022511.htm   Naval Surface Warfare Center Danger Zon e-  February 25, 2011

paypal-evil.htm  Evil PayPal Restores Service for Manning Support - February 24, 2011

gwf-father.htm    China's Great Firewall Father Speaks Out - February 24, 2011

libya-protest3.htm    Libya Protest Photos 3 - February 24, 2011

sealing-guide.pdf     Guide to Sealing Court Records and Proceedings -  February 24, 2011     Khalid Ali-M Aldawsari IED Threat Complaint -  February 24, 2011 (1.7MB)

se-assange.htm    Sweden on Surrender and Extradition of Assange -   February 24, 2011

uk-v-assange.pdf   United Kingdom Judgment to Surrender Assange -   February 24, 2011 (430KB)

fincen022411.htm   Reports of Foreign Financial Accounts -  February 24, 2011

fmc022411.htm     Maritime Commission Information Security -  February 24, 2011   Le Siécle French Elite Club Secret Member Data -  February 23, 2011 (9.6MB)  HBGary Stuxnet Raw Data - February 22, 2011 (7.5MB)

dod022211.htm   DoD Revises RFID Regulations  - February 22, 2011

libya-protest2.htm    Libya Protest Photos 2  -  February 22, 2011     Czechoslovakia Intelligence Methods 1963 -  February 21, 2011 (1.0MB)

raymond-davis.pdf     Who Is Raymond Davis? Updated -   February 21, 2011

libya-protest.htm     Libya Protest Photos 1 -   February 20, 2011     HBGary PDF Exploit Botnet Packet Analysis -  February 20, 2011 (3.9MB)  HBGary SAIC Reports on Botnets -  February 20, 2011 (3.4MB)  HBGary EndGames Systems DoD-Spying Capabilities -  February 20, 2011 (3.2MB)   HBGary End Games Russian Federation Infections -  February 20, 2011 (2.0MB)

RAMisKey.pdf   Extracting Disk Encryption Keys From RAM - February 19, 2011

wl-finances.pdf    Wikileaks Finances -    February 19, 2011 (2.0MB)

hts-assess.htm   Human Terrain System Assessment Withdrawn -  February 19, 2011   HBGary Foreign Activity of  - February 19, 2011 (1.7MB)  HBGary China Cyber Espionage  - February 19, 2011 (1.6MB)   HBGary Physical Memory Forensics for Intrusion - February 19, 2011 (2.3MB)

dodm-3020-45m-v3.pdf  Critical Infra Classification Security Manual -  February 19, 2011

wikileaks-stoned.htm  Wikileaks Stoned Again -   February 18, 2011

protest-fun.htm    Protest Fun Photos  - February 18, 2011

advocacy-guide.pdf   Practical Guide for Advocacy Campaigns -  February 18, 2011

pa-negre-ban.pdf    Spain Public TV Editor Bans Catalonia Language - February 18, 2011   HBGary Confidential Information Memorandum - February 18, 2011 (3.4MB)   HBGary Digital DNA Executable - February 18, 2011 (898KB)   HBGary Incident Response Proposal to L-3 - February 18, 2011 (868KB)     HBGary Terramark Report on QinetiQ North America - February 17, 2011 (798KB)

wh-missile.htm   White House Missile Battery -    February 17, 2011

bahrain-protest3.htm  Bahrain Protest Photos 3 -  February 17, 2011

anon-surpass-wl.htm   Anonymous Surpasses Wikileaks -  February 16, 2011

bahrain-protest2.htm  Bahrain Protest Photos 2 -  February 16, 2011

bahrain-protest.htm   Bahrain Protest Photos  -  February 14, 2011   HBGary Stuxnet   -   February 14, 2011 (832KB)  HBGary Anonymous and Wikileaks  -  February 13, 2011 (317KB)  HBGary Venezuela and Iran -  February 13, 2011 (697KB)   HBGary E-Crime and Advanced Persistent Threats  -  February 13, 2011 (554KB)   HBGary Secure Applied Physics Lab -  February 13, 2011 (874KB)

yemen-protest.htm   Yemen Protest Photos  -  February 13, 2011    HBGary National Security Agreements - February 13, 2011 (1.3MB)

HBG-TENPP.pdf      HBGary Targeting Exelon Nuclear Power Plant -  February 13, 2011   HBGary Corporate Information Spying Cell -  February 13, 2011 (288KB)   HBGary Threat Monitoring Center  -  February 13, 2011 (792KB)   HBGary Exploitation Assessment -  February 13, 2011 (712KB)

algeria-protest.htm   Algeria Protest Photos  -   February 13, 2011

ddb-book.htm   Excerpts of Daniel Domscheit-Berg's Book - February 12, 2011  HBGary Social Media Security Reset  - February 12, 2011 (5.5MB)     HBGary Emerging Threats and Trends 2011 - February 12, 2011 (4.2MB)

dodi-3305-01.pdf   National Intelligence University - February 12, 2011

dodd-5100-03.pdf     Support of Headquarters of Combatant Commands - February 12, 2011   HBGary Scoutvision Law Enforcement-Intel Cases - February 11, 2011 (6.7MB)   HBGary NSA Talk Social Media Exploitation - February 11, 2011 (6.1MB)   HBGary Advanced Persistent Threat - February 11, 2011 (3.0MB)   HBGary Mandiant Advanced Persistent Threat  -  February 11, 2011 (2.0MB)      HBGary McAfee Integration - February 11, 2011 (1.5MB)       HBGary Aurora Malware Report - February 11, 2011 (400KB)       HBGary Splunk Brief-IT Management Is Broken -  February 11, 2011 (3.2MB)        HBGary Topological Vulnerability Analysis - February 11, 2011 (2.4MB)

HBG-Fed-OA.pdf    HBGary Federal Operating Agreement -  February 11, 2011

wikileaks-dis2.htm    New York Times Again Disses-Distances Wikileaks -  February 11, 2011

nist021111.htm        NIST RFC on FIPS 180-4 Secure Hash Standard - February 11, 2011

dhs021111.htm         DHS Seeks Data for CyberSecurity Programs - February 11, 2011

ispab021111.htm       Info Security and Privacy Board Meet - February 11, 2011

eo13565.htm           Prez Sets Intellectural Property Advisory Panels - February 11, 2011

anonymous-barr.pdf    Report on Anonymous by Aaron Barr HBGary - February 9, 2011

screw-yourself.htm    Screw Yourself by Destroying Digital Evidence -  February 8, 2011

SP-800-144.pdf        Security and Privacy in Public Cloud Computing -  February 8, 2011 (516KB)

wikileaks-dupes.htm   Wikileaks Panoramic Dupery -February 7, 2011      Cuba Spy Holes -  February 6, 2011 (748KB)

egypt-fights6.htm     Egypt Protestors Fight Photos 6  - February 5, 2011

nsf020711.pdf         Cybersecurity Defense-in-Depth Workshop - February 5, 2011

dodd-5210-48.pdf      DoD Polygraph and Credibility Assessment -  February 5, 2011

wikileaks-dis-vid     Video: WL Dissed and Distanced by NYT-Guardian - February 4, 2011

wikileaks-dis.htm     Wikileaks Dissed and Distanced by NYT-Guardian [- February 4, 2011

egypt-fights5.htm     Egypt Protestors Fight Photos 5 -  February 3, 2011

doj020311.htm         National Standards on Prison Rape - February 3, 2011       SE Documents on Julian Assange Sex Allegations -  February 2, 2011 (3.8MB)

egypt-fights4.htm     Egypt Protestors Fight Photos 4 -  February 2, 2011

dod020211.htm         DoD Personnel Security Program  - February 2, 2011

egypt-fights3.htm     Egypt Protestors Fight Photos 3  -    February 1, 2011

compendium.pdf        Organized Crime Methods for Child Exploitation -February 1, 2011 (2.8MB)

O f f s i t e

ECR                   East Coast Rapist  -     February 28, 2011

NSA Neo           NSA Cryptologic Rebirth, 1981-1989 -  February 27, 2011

USLBA 1           US-Libya Business Association Twitter Erased -   February 27, 2011

USLBA 2          US-Libya Business Association Website Erased -   February 27, 2011

WL Farce          Wikileaks Churnalism - February 25, 2011

IED                   Saudi Arrested for Planning IED Attack in US - February 24, 2011

WL KP              Wikileaks Key Players  -  February 23, 2011

NSA Patent     Assessing security of information access system - February 22, 2011

NSA Patent     Device for and method of geolocation - February 22, 2011

NSA Patent      Identifying invalid digital signatures - February 22, 2011

WL Scum 2       Media Whore Rigs Scum Bucket for Assange Leaks -  February 21, 2011

HBG-ProjectC      HBGary Project C General Dynamics Back Doors -   February 20, 2011

HBG-TaskZ          HBGary Task Z General Dynamics Back Doors -  February 20, 2011

WL Scum 1         Wikileaks 3: The Internet's Greatest Con Men - February 20, 2011

GovCom Thugs    HBGary Black Operations - Febraury 19, 2011

Sourced                NYT Dipshits Domscheit-Berg As It Did Assange - February 18, 2011

VIP AP                 VoIP Abuse Project - February 18, 2011

EATF                    Eyeballing African Toll Fraud -  February 18, 2011

BR WL                 Brazil Wikileaks  - February 18, 2011

BMap                   Broadband Map Search -  February 18, 2011

JDM                    Judicial Disaster Manual -  February 18, 2011

HBG Mail           HBGary.Anonleaks.CH - New Domain -  February 17, 2011

Anon Hit            Anonymous: the inside story of the HBGary hack - February 16, 2011

Oil Kill                Planet Sludge Leaking Oil Gas Wells Disaster - February 15, 2011

PA PR                Prince Albert of Monaco Absurd Press Release - February 15, 2011

PAMA               Prince Albert of Monaco Admission = February 13, 2011

Holy Sows         NY Times Bares Military-Industrial Profit Rig -  February 12, 2011

Mad Al              Monaco Prince Albert Sues Robert Eringer -February 11, 2011

Culpa 2 (ok)      Berico Dumps HBGary for BoA Hit on WL Greenwald - February 11, 2011

Face Hit             Face to Facebook Attacked by Facebook -   February 11, 2011

Win 10               Journalist Wins 10-Year War Against Bank Cheats - February 11, 2011

HuffPuff             Adbusting Huffington Post Sale to AOL -  February 11, 2011

JA Enemies        Assange Fears Israel and US East Coast Israelis - February 10, 2011

Culpa 1               Palantir Apologizes for BoA Hit on WL Greenwald  February 10, 2011

WikiLim      Did Assange Play Lawyer? -  February 10, 2011

WL Warp     WikiLeaks, cables and obvious distortions - February 10, 2011

BoA Vile 2    BoA Full WL Attack Document via Wikileaks   -  February 9, 2011

BoA Vile 1     BoA Paid for Crime Against WL Greenwald et al -  February 9, 2011

Propint    Singing Propeller INT  -  February 7, 2011

Gnaw       High Food Costs Not Social Media Topple Govs -  February 7, 2011

CM            Crypto Museum -  February 6, 2011

Cop Docs  Richmond Police Documents Released in Error -  February 5, 2011

NPP           Nuclear Power Reactor Inspections 12/27/2010 -  February 4, 2011

DHS OS    DHS Daily Open Source Infrastructure Report -  February 4, 2011

DR NSA    Diane Roark and NSA Mismanagement- February 3, 2011

NTAS         National Terrorism Advisory System  - February 3, 2011

P2P            P2P Foundation  -   February 3, 2011

HTS           Shareable: How To Share - February 3, 2011

Wired Docs Link Dead  SE Documents on Assange Sex Allegations Leaked -  February 2, 2011

SE JA 1      Swedish Court Lists Events on Julian Assange -  February 2, 2011

AF1             A Brief Look Inside Air Force One  -  February 2, 2011

Tim             Tim Smith Tacomic Tacoma Action Figure - February 2, 2011

FEC             Francis E. Dec Apes CIA's James Jesus Angleton -   February 2, 2011

FTF             Face to Facebook - Stealing 1M Facebook Profiles - February 2, 2011

LF               Lovely Faces Dating Agency -    February 2, 2011

Hit Doc 1   Assassination in the United States - February 1, 1011

Hit Doc 2   Protective Intelligence and Threat Assessment -  February 1, 2011

Hit Doc 3   Preventing Targeted Violence Against Officials -  February 1, 2011

Hit Doc 4   Threat Assessment in Schools  -  February 1, 2011


Cryptout Recent Listings
Other Stuff Contact, Public Key

Cryptome Videos-                                     

Total: 71,800 emails

Want to search the database?
Protip: search for WikiLeaks, Anonymous, FBI, NASA, Stuxnet, etc.


The nameless revolution that calls itself Anonymous may be about to have its own, online civil war.
A hacker startup calling itself Backtrace Security–made up of individuals who formerly counted themselves as part of Anonymous’ loose digital collective–announced plans Friday to publish identifying information on a handful of active members of Anonymous. According to one source within the Backtrace group, it will release the names and instant messaging logs of dozens of Anonymous hackers who took part in attacks on PayPal, Mastercard, the security firm HBGary, Westboro Baptist Church, and the Marine officials responsible for the detainment of WikiLeaks source Bradley Manning.
That spokesman, who goes by the name Hubris and calls himself BackTrace’s “director of psychological operations,” tells me that the group (Backtrace calls itself a company, but Hubris says it’s still in the process of incorporating) aims to put an end to Anonymous “in its current form.” That form, Hubris argues, is a betrayal of its roots: Fun-loving, often destructive nihilism, not the political hacktivism Anonymous has focused on for much of the past year. “[Anonymous] has truly become moralfags,” says Hubris, using the term for hackers who focus on political and moral causes instead of amoral pranks. “Anonymous has never been about revolutions. It’s not about the betterment of mankind. It’s the Internet hate machine, or that’s what it’s supposed to be.”
Backtrace has posted  a triple-encrypted torrent file labeled “insurance”–a tip of the hat to WikiLeaks–on its website,, and says it’s posting hundreds of links to copies on file sharing sites. Early next week the group plans to release the keys to unlock that file, which contains the names, pseudonyms, chat logs and methods of the Anonymous hackers. It’s a tactic, Hubris says, designed to cause “maximum fear and distress” for the individuals Backtrace is outing.
Backtrace’s members largely haven’t been active in Anonymous for years–Hubris says he only participated in the anti-Scientology protests in 2009 and none of its more recent operations. But he and others with Backtrace gained access to Anonymous hackers’ information by infiltrating the group with false identities and other “social engineering” tricks that he says fooled members into revealing themselves. “The whole point of this is that we didn’t break any laws,” Hubris says. “All we did was hack peoples’ minds, because they’re fucking retarded.”
Backtrace hopes to turn those digital dark arts into a business. Hubris sent me a “mission statement” for the group that calls Backtrace “an information security provider” focusing on “psychological operations/social engineering and deep investigative research.”
“Backtrace Security assists our clients predict and neutralize emerging social threats,” the statement reads. “While other security companies specialize in hardware/software vulnerabilities and exploitation; Backtrace specializes in the human experience.”
And doesn’t the group fear the same retaliation from Anonymous that hit HBGary Federal, the last firm to claim it could identify Anonymous’ leaders? In that case, Anonymous spilled 71,000 of the company’s emails onto the Web, defaced the company’s website, and hijacked the Twitter account of Aaron Barr, its chief executive. After a variety of dirty tricks were revealed in the company’s hacked emails, including proposals to launch cyberattacks on WikiLeaks and threaten its supporters, Barr resigned from the company.
Hubris says he’s confident Backtrace won’t face the same fate. He calls the Anonymous hackers “script kiddies” and downplays their skills, arguing that the HBGary hack was based merely on the company’s reusing passwords and falling victim to social engineering. ”If you do enough damage to someone, you don’t have to fear retaliation.” says Hubris. “Once the world sees who these kids are and what they stand for, no one will follow them.”
Hubris hopes to launch Backtrace as a startup while also calling attention to what he sees as Anonymous’ hypocrisy. “They say they fight for free speech, but then they use fear and intimidation, like Scientology or Fox News,” he says. “That’s not freeodm of speech, and we won’t put up with that crap.”
And how would Hubris prefer Anonymous spend its time? “Making fun of stupid people on the Internet. Laughing at natural disasters. Like back to the good old days,” he says. “Not trying to overthrow governments.”

·         Anonymous Working Through New Info Related To U.S. GovernmentAnonymous, The Military And Fake Virtual Armies

Anonymous, The Military And Fake Virtual Armies - Official Wikileaks Page [,,] - Secure SSL Chat Page [] - Secure Document Submission Page [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site [] - Points to Official Site []

Real mirrors on different IP Addresses - Mirror hosted in Switzerland [] - Mirror hosted in Sweden [] - Mirror hosted in the United States []

Important Wikileaks Links - Official Wikileaks Twitter Page ipv6

No comments: