tagged w/ Cyberwar
BREAKING NEWS// In A Chatroom with Cyber Freedom Fighters: Anonymous Activists in a War Against Tyranny & Oppression and To Protecting Freedom of Speechhttp://sourceforge.net
By Marius Bosch and Georgina Prodhan
JOHANNESBURG/LONDON (Reuters) - If anyone needed proof that cyber activists can create havoc in the real world, the last few weeks have provided evidence in megabytes.
Rallying behind WikiLeaks, the thousands of internet activists who made headlines in December by bringing down the websites of MasterCard and Visa have been branching out.
Operating under the banner "Anonymous", their other forms of action have included hacker defacements of websites, real-life protests such as mass leafleting, and a role in Tunisia's "Jasmine Revolution".
Anonymous activists attacked and shut down several government websites before the ouster of former President Zine al Abedine Ben Ali. They have also targeted governments they see as enemies of free speech. Last month the website of Zimbabwe's finance ministry was hacked and the homepage replaced by a message from Anonymous.
A report by the Organisation for Economic Cooperation and Development (OECD) this week said such attacks on computer systems are unlikely to cause a global shock on their own, though could do if launched in the midst of a natural disaster such as a large solar flare that wipes out satellites and other key communications hardware.
But this misses the point. Global chaos is not Anonymous' aim. As the WikiLeaks and Tunisia cases show, the group targets specific institutions and its attacks are designed to temporarily delay more than destroy. Think of them not as acts of cyber war but as high-profile guerrilla strikes.
A look inside some of the main online forums suggests that those behind the WikiLeak-inspired attacks are patient, coordinate almost organically, and remain wary of outsiders. That all means that their next moves remain unpredictable.
In the Internet Relay Chat (IRC) channels -- chat rooms where up to 3,000 participants at a time can discuss strategy and plot attacks -- reporters are treated with suspicion. Over the past few weeks, though, a few Anons -- as activists refer to themselves online -- agreed to talk to Reuters.
There is anecdotal evidence that Anonymous is growing stronger. Several Anons told Reuters the arrest of Assange and the distributed denial of service (DDoS) attacks against Visa and Mastercard -- in which company websites were bombarded with so many requests they crashed -- inspired them to join the group.
"Saw it on a news article, joined the IRC, and things went on from there. 4 months ago," one Anon nicknamed "tflow" told Reuters in a private message on the IRC channel.
"I was angry at the arrest of Assange and how the credit card companies shut down WikiLeaks' accounts. Been here since," said another, going by the name of Noms9001, referring to the arrest of WikiLeaks founder Julian Assange in Britain.
"I'm not a rebel, I can say that. For me, it's been an issue of governments and corporations attempting to control what we say and hear online."
One said they had been involved with Anonymous since the group's Project Chanology protests against the Church of Scientology in 2008. Another blamed a failed late December attack on Bank of America on a splinter group of Anonymous, and said an expected drop by WikiLeaks of documents related to the bank could provide an opportunity for a renewed effort to bring down its site.
Targets are chosen by consensus and can be attacked by as many as 10,000 computers simultaneously. Communication is mainly through IRC but supporters also use micro-blogging site Twitter and video-sharing site YouTube to release information.
The activists claim to come from all over -- Europe, the United States, China and elsewhere in Asia -- and share an almost paranoid concern with covering the tracks left by the software they use.
During the attacks on Tunisian government websites over the past couple of weeks, activists warned Tunisian citizens in the OpTunisia IRC channel against joining an assault on local internet hosting organisation ATI.
"If you are Tunisian, do not participate in the DDoS attack. Chances are that you will get traced and arrested. Unless you have means to conceal your IP and know what you are doing, do NOT attack," warned one activist.
"Do NOT give out any personal information on this IRC network. This is a public chat and you can be sure that it is monitored," the activist added.
There's a good reason for the caution. Two Dutch teenagers were arrested in December in connection with cyber attacks by WikiLeaks supporters. Both have been released and are awaiting trial.
And the U.S. Federal Bureau of Investigation raided a Texas server-hosting company last month looking for evidence that Anonymous had used its servers to launch attacks on PayPal, according to an affidavit obtained by The Smoking Gun website.
Some activists hope their sheer numbers will prevent authorities from trying to trace them. "Imagine tracking 9,000 plus computers across the planet for an arrest," Calgarc said in the IRC channel in reply to a question on how an attacker can hide his tracks.
3> FIRE YOUR CANNON
All you need to wage cyber war is a fast-paced internet forum packed with hundreds of determined activists and a simple piece of software called a Low Orbit Ion Cannon. Activists download the LOIC -- initially developed to help internet security experts test website vulnerability to DDoS attacks -- and start firing packets of data at the targeted website.
If enough people join in, a DDoS attack prevents the overloaded server from responding to legitimate requests and slows the website to a crawl or shuts it down totally.
Attackers can even listen to a dedicated internet radio station, Radiopayback, during attacks.
A quarter of a million copies of the LOIC software have been downloaded from sourceforge.net so far, more than half of them since November when Web hosting and banking organisations began withdrawing support from WikiLeaks.
One in five downloads since the start of November was in the United States, with a few hundred in Tunisia, and a handful in bandwidth-deprived Zimbabwe.
Users of the software can be traced. A study by Dutch researchers found last year that the tool did not mask the host computer's internet protocol (IP) address.
Barrett Lyon, a security expert who specialises in protecting companies against denial of service attacks, said the LOIC program is fairly rudimentary but effective if used by thousands of people. "It doesn't have a lot of bells and whistles. It's not as focused as it could have been. If they got their software together in a more sophisticated kind of way, this kind of thing could have gotten easier with more violence."
Lyon said depending on the time of day there were 500-10,000 computers involved in the attacks.
"10,000 people have quite a bit of fire power," he added.
4> CREDIBLE COUNTERFORCE
TO GO TO NEXT PAGE CLICK BELOW :
http://www.enduringamerica.com/home/2011/1/6/tunisia-cyber-special-anonymous-takes-down-the-government.htmlhttp://sourceforge.net By Marius Bosch and Georgina Prodhan JOHANNESBURG/LONDON... more
How US/Israel teamwork disabled Iran's nuclear ambitions...by 5 years Continue reading on Examiner.com: How US/Israel teamwork disabled Iran's nuclear ambitions...by 5 yearsThe news that a cooperative effort between Israel and the US was behind the infamous Stuxnet Worm attack on Iran's nuclear operation computers came in a very matter-of-fact article written for the New York Times. Also remarkable was the nonchalant throwing of the term 'Dimona' coupled with 'nuclear' and 'Israel'. Until now, no US mainstream media platform dared to suggest that Israel possessed anything resembling nuclear weapons.
The collaboration had been ongoing since 2009 with the intent to sabotage Iran's nuclear installations.
Continuing with astonishing frankness, an article in a Franco-Israeli online news site, Israelinfos, titled its report 'Israël: le virus Stuxnet testé sur la centrale nucléaire de Dimona' (Israel: the Stuxnet virus tested in Dimona's nuclear center).In it, the article cites unknown military and intelligence services that claim Israel possessing centrifuges nearly identical to those used in Iran's Natanz complex.
Continue reading on Examiner.com: How US/Israel teamwork disabled Iran's nuclear ambitions...by 5 years - National Foreign Policy | Examiner.com http://www.examiner.com/foreign-policy-in-national/how-us-israel-teamwork-disabled-iran-s-nuclear-ambitions-by-5-years#ixzz1BLt0sPVxThe news that a cooperative effort between Israel and the US was behind the infamous... more
It was a year without parallel. Threat Level’s bread-and-butter themes of censorship, hacking, security, privacy, copyright and cyberwar were all represented in tug-of-war struggles with unprecedented outcomes.It was a year without parallel. Threat Level’s bread-and-butter themes of... more
The man behind WikiLeaks has won the most votes in this year's Person of the Year poll.
Readers voted a total of 1,249,425 times, and the favorite was clear. Julian Assange raked in 382,020 votes, giving him an easy first place. He was 148,383 votes over the silver medalist, Recep Tayyip Ergodan, Prime Minister of Turkey.
But Assange wasn't the winner in all aspects -- Lady Gaga trounced him on Facebook, receiving 65,417 "likes" on Facebook to Assange's 45,643. See the top 10 readers' choices below, and view the full poll here.
1. Julian Assange
2. Recep Tayyip Ergodan
3. Lady Gaga
4. Jon Stewart and Stephen Colbert
5. Glenn Beck
6. Barack Obama
7. Steve Jobs
8. The Chilean Miners
9. The Unemployed American
10. Mark ZuckerbergThe man behind WikiLeaks has won the most votes in this year's Person of the Year... more
Interactive Visual Timeline UP For Review! See Random Events matched against Virus Creation Dates and HacksIn a stream of RSS and Twitter feeds, news captions, headlines, water-cooler-talk and the occasional lunch crunch and nightly news reports, it's hard to visualize a snapshot of what's really going on in the world and how seemingly random data may or may not fit together with malicious attacks and how they transform. Take a look at this attempt to visually put some random events together. http://cyy.be/b3Qb07In a stream of RSS and Twitter feeds, news captions, headlines, water-cooler-talk and... more
A new perspective on Information Warfare, be it state-funded, corporate funded, or academia-related attacks (or all three!), taken into view at the holistic level should set the trajectory(ies) for guiding the U.S. forward in terms of predicting upcoming threat targets as well as the motives behind what there is to gain by hitting those targets. In fact, this approach should have always been leading the way.. www.cyber-uproar.comA new perspective on Information Warfare, be it state-funded, corporate funded, or... more
The economic and political implications of winning or losing the battle to be number one in this technology could cause a shift in global power.
http://cyber-uproar.com/2010/05/02/chinas-bio-and-nanotechnonationalism-just-a-mouseclick-away.aspxThe economic and political implications of winning or losing the battle to be number... more
Dr. Antony Sutton was a research scholar at Stanford University's Hoover Institution.
Through his scientific historical research he saw the bigger picture of how the secret US establishment (largely operating through the Skull & Bones secret society) uses the Hegelian dialectic (create thesis & antithesis to control synthesis) to create, manage and perpetuate conflict.Dr. Antony Sutton was a research scholar at Stanford University's Hoover... more
Dr. Antony Sutton was a research scholar at Stanford University's Hoover Institution.
Through his scientific historical research he saw the bigger picture of how the secret US establishment (largely operating through the Skull & Bones secret society) uses the Hegelian dialectic (create thesis & antithesis to control synthesis) to create, manage and perpetuate conflict.
PS. Video quality is bad, but it doesn't matter. 1 of the most powerful interviews ever.Dr. Antony Sutton was a research scholar at Stanford University's Hoover... more
Jordan does an excellent job showing how Christianity and many other religions, are a derivative of the Egyptian Mystery Schools. He will also shows you how it is an astrological depiction of the Suns movement across the heavens.Jordan does an excellent job showing how Christianity and many other religions, are a... more
Immanuel Velikovsky: The Bonds of the PastImmanuel Velikovsky proposed in his 1950's book "Worlds in Collision" that many myths and traditions of ancient peoples and cultures are based on actual events: worldwide global catastrophes of a celestial origin, which had a profound effect on the lives, beliefs and writings of early mankind. This is a documentary about Immanuel Velikovsky's discoveries by Henry Zemel. First telecast on February 22, 1972 by the Canadian Broadcasting Corporation.Immanuel Velikovsky: The Bonds of the PastImmanuel Velikovsky proposed in his... more
G Edward Griffin explains the FEDERAL RESERVE - a total money scam.
Witness US troops training with foreign troops and learning how to control and contain civilian populations in Operation Urban Warrior. You will see Special Forces, helicopter attacks on South Texas cities, concentration or "Freedom" camps, broad unconstitutional police actions, gun seizure training, snitch squads of children recruited to turn in family and neighbors, and more. This was filmed in 1999/2000 and foreshadows the rise of the police state and martial law that is creeping forward. Recall that even today, troops and mercenaries seized and confiscated honest law abiding citizens weapons down in New Orleans after the Hurricane Katrina. Foreign troops were called in to help rescue, troops from Denmark, and Mexico. The truth is stranger than fiction.Witness US troops training with foreign troops and learning how to control and contain... more
The United States government, at all levels has fallen under the control of the desperately wicked New World Order clan The events of Sept 11th mark the initiation of the final sick push of the illuminati to consolidate their one world order and transform earth into a prison planet. In over two and a half hours, Alex Jones chronicles in stunning detail the true character of the globalists. Learn the master plan of the blood-thirsty elite to financially, physically and spiritually imprison not only America but the world Other Search Word: ConspiracyThe United States government, at all levels has fallen under the control of the... more
THE ROAD TO TYRANNY EXPOSES:
*HOW DOZENS OF FBI AND DEFENSE INTELLIGENCE AGENTS WERE THREATENED WITH ARREST BY THE FEDERAL GOVERNMENT IF THEY GOT IN THE WAY OF AL-QAEDA OPERATIONS
*HOW THE CIA TRAINED, FUNDED AND PROTECTED BIN LADEN *THAT IMPEACHMENT LAWYER DAVID SCHIPPERS WARNED CONGRESS AND THE JUSTICE DEPARTMENT OF THE IMPENDING TERRORISTS ATTACKS . (THE FILM INCLUDES AN EXCLUSIVE INTERVIEW WITH SCHIPPERS ON THE ALEX JONES SHOW JUST 2 WEEKS AFTER THE ATTACKS. SCHIPPERS HAS SINCE BEEN THREATENED WITH ARREST IF HE CONTINUES TO SPEAK OUT, AND IS BEGGING THE MEDIA AND THE AMERICAN PEOPLE TO GET THIS STORY OUT)
* HOW THE RECENTLY DECLASSIFIED TOP-SECRET NORTHWOODS DOCUMENT WRITTEN BY THE JOINT CHIEFS OF STAFF LAID OUT PLANS TO BOMB WASHINGTON AND TO HIJACK AIRPLANES AS A PRETEXT FOR WAR *BILL CLINTON'S INVOLVEMENT IN THE OKLAHOMA CITY BOMBING AND HOW IT WAS CARRIED OUT BY INTELLIGENCE AGENCIES TO BE BLAMED ON THE RIGHT-WING
*HOW THE FBI ORDERED THEIR INFORMANTS TO COOK THE BOMB AND TRAIN THE DRIVERS IN THE FIRST WORLD TRADE CENTER ATTACK IN 1993 *FBI TRAINING MANUALS THAT ARE BEING GIVEN TO POLICE DEPARTMENTS THAT STATE THAT CHRISTIANS, GUN OWNERS, AND "THOSE WHO MAKE FREQUENT REFERENCES TO THE US CONSTITUTION" ARE TERRORISTS .....THIS IS ONE FILM YOU CANNOT AFFORD TO IGNORE. THE FUTURE OF FREE PEOPLE EVERYWHERE IS AT STAKE.THE ROAD TO TYRANNY EXPOSES: *HOW DOZENS OF FBI AND DEFENSE INTELLIGENCE AGENTS... more
A failed coup attempt…a British mercenary in a notorious African prison…a dictator suspicious of Western powers…and beneath it all, a spectacular underwater oil reserve that the world’s major powers would love to get their hands on.
It may sound like the latest John LeCarré bestseller, but in fact it’s the real-life intrigue of Once Upon a Coup, WIDE ANGLE’s penetrating look at the mysterious goings-on in Equatorial Guinea, a tiny West African nation newly rich with oil and infamous for corruption. The story begins in 2004, when a group of mercenaries, including a British ex-special forces officer named Simon Mann, is arrested in Zimbabwe. Equatorial Guinea’s president, Teodoro Obiang Nguema Mbasogo, accuses them of plotting a coup against him. When Mann is sentenced to 34 years in Equatorial Guinea’s notorious Black Beach prison, he claims to be only one piece of an international plot to control the country’s vast oil resources. Once Upon a Coup travels the globe to unravel that plot, which stretches from Africa to the U.K., from a prime minister’s son to Zimbabwean arms dealers, from South Africa to Spain.
But as this all plays out, another actor is bidding for a share of the oil: China. The Chinese government has showered the country with glittering new buildings and a new administrative capital. If President Obiang has grown skeptical of Western intentions, he has welcomed China as a new business partner. Starting with a small West African nation and stretching around the globe, Once Upon a Coup sheds light on the uncomfortable realities of oil politics in the 21st century.A failed coup attempt…a British mercenary in a notorious African... more
International bribery. It’s a trillion dollars a year, with corporations on one side, heads of state on the other. And it thrives in an invisible world.International bribery. It’s a trillion dollars a year, with corporations on one... more