Interview with Operation:Payback (II)

Total Page:16

File Type:pdf, Size:1020Kb

Interview with Operation:Payback (II) Interview with Operation:Payback (II) REFERENCE: http://www.thetechherald.com/article.php/201045/6396/ Anonymous-plans-to-slow-DDoS-attacks-outlines-patent-and-copyright- reform Q: What is the incentive for the various government regulators and lawmakers to work with Anonymous? You attacked them, justified or not, that is how they see it. Future threats will do little to get them to act. How will Anonymous address this? A: Our primary objective is to raise public awareness; these attacks and threats publish better than peaceful protests. With the attention, people will at least gain insight in the facts as they are presented, and the facts how they really are. This is not about artists being paid, but industries getting their actual profit from suing people. That is a reversed world. People only complain about the situation. We raise the awareness that something can actually be done about it. We may be known as "evil DDoSers", but we did put "scammy" firms like ACS:Law out of business for sending people unfounded law threats/bills. We achieved the fact that ISPs are now more careful about handing over their customers' IPs; the Ministry of Sound even dropped their legal case against BT [URL: http:// www.slyck.com/ story2115_BT_Deletes_Records_of_20000_Suspected_Filesharers_Minis try_of_Sound_Pissed] because of that. We are not against entertainment or their industries; we are against the way that copyright and patent systems are abused. While we have little or no experience with communicating with lawmakers, other people might have, and those people can decide to help us with what we started. Q: Some people I have spoken to don't agree with piracy, but do agree with copyright reform. Do you feel that your pro-piracy views will distract people from supporting your law reform proposals? A: The cause of piracy is because the current copyright laws were written in the past and do not take modern inventions like the Internet into account. The current copyright system is abused and is in dire need of reformation. While we are pro-piracy, we do not state that piracy should become legal. A music/film fan may still want original CD/DVDs, while other people may care only about new content. We can only hope that people who agree with copyright reform are also well-versed in piracy and what it stands for. Q: You mentioned that "We will print posters, we will send emails, we will send letters. We will broadcast our manifestos and intentions. We will involve people who do not know nor care. We will involve everybody. Whether they want it or not." How will you do this? Anonymous as a whole isn't an organized group, more of a hive mentality with some well meaning intentions for the most part. This suggests a level of organization that has been previously unseen. How do you intend to do this? A: Eventually, people will decide for themselves whether or not they want to be involved. We are just a small group, representing the interests of a larger group of people. While a lot of people think "that's the law, we can't change it", we need only to make them aware that laws can change when we all stand together. When they are made aware, they can either chose to ignore or join us, in any form of protest. Even sending a simple letter politely asking for copyright reformation would help. Q: How will the grassroots efforts tie into the meeting of the minds with regard to reform? Do you plan to use the wide information campaign to draw public support? Do you plan to join forces with The Pirate Party? A: Operation Payback is not the best choice for a political campaign. This operation is generally associated with violence and attacks. We merely presented people with political resources a number of propositions they can use, maybe even in their run at future elections. We can also choose to start our own political party. Obviously, that would be with a different name. Our actions are our own and not related to the Pirate Parties in any way. The Pirate Party of Canada finally got its first federal candidate in the Winnipeg North by-election. The Pirate Party in the United States can sure use some support as well [url:http://en.wikipedia.org/wiki/ United_States_Pirate_Party]. We do not have specific plans, but joining the PP is an idea worth pursuing. One thing is sure: Operation Payback's violent nature will not be part of it. Q: In two years there will be another national election in the US. Will you plan to make IP (Intellectual property) and copyright reform into a political issue by spreading information, forcing the politicians to talk about it? If so, how? Why not form a lobby with public support? A: Politics are slow and dragging. By that time, we hope to have the attention already. Our actions are merely a way to force the issue into the center of attention. Depending on the results of this operation and its derivatives, our American participants can choose whether they want to pursue political activities, or to do whatever they feel right to address this problem. Q: With the level of reform targeted, there are some sweeping plans. Do you think asking copyright and patents to last less than a year is reasonable? A: That depends on the future. Our aim is to open discussion. If [they] show some willingness to go along with copyright reform, we can adapt our proposals as well. It also depends on the visions we have. Some of us believe that copyright is a limiting the innovations others could make with that specific --copyrighted-- idea. Maybe a year is now considered unreasonable, but maybe in five years even considered long. Q: What about stopping at five years? Why is medical patent and copyright listed as a medium term, when clearly this is a hot topic now. Why not use that as leverage to kick-start the momentum now? A: This operation focuses on copyright as seen in the entertainment industries. People with political resources are of course free to order priorities as they see fit. Everybody has loved ones who could have been saved if patents were not restricting new innovations in medicine. But when copyright changes, patents may well be next. Q: Operation Payback was one of the first major collaborative DDoS attacks on the Internet. It leveraged social media as a tool of recruitment, IRC for communication/planning, and software developed to carry out the attacks in an automated fashion. Thousands of supporters from around the world joined in, but despite the overwhelming support, the campaign was almost under constant attack. You sustained several counter DDoS attacks and Organizer/Channel/ Network takeovers. What do you attribute these counter-attacks to and what have you learned from them? A: Well, we think most of the spam and network attacks that we received can be attributed to trolls looking for attention. There's no evidence to prove that any of our targets ever retaliated in kind with our attacks. On the contrary, we have indications that we just have malicious members who just wanted to annoy other people, without any motive or actual reasoning. Unfortunately, these people happened to have resources that we could have used for the good of the Operation. The most important thing that was learned from this Operation is that the distribution of power/authority/access needs to be carefully monitored and minimalized. There were two such related events in which certain members used their access on the server and IRC network to try to takeover the Operation. Fortunately, Anonymous is a resilient bunch and managed to recover both times within 24 hours. We had to migrate to different servers several times due to takedown notices as well. Our first two hosts — Tieve and Leetbaka — were forcefully shut down by requests from authorities. Tieve.tk was eventually removed by the dotTK group as well. We also learned that power will corrupt people with time. As soon as some people joined the core group, they felt that they could actually lead Anonymous as a personal army. Thankfully, Anonymous is not a group that can be controlled, but rather coordinated. This proves however, that there should be no such thing as absolute power in an environment like this, but rather a chairperson or a board of members that doesn't influence a discussion, but acts as an intermediary to find a collective solution via methods such as majority voting and taking in continuous feedback from every participant instead of once every two or four years. ===== U.S. Pirate Party ===== Q: What is the U.S. Pirate Party and what does it stand for? A: the US Pirate Party is a political party, formed in 2006, and based on the pirate party philisophy. It stands for INcreased Government Transparency and accountability, increased personal privacy, and reform of copyright/ patent/trademark laws. Q: What is the current state of the USPP? What is being done to change the legal landscape? A: The current state is that with the new cycle starting again over the next few weeks, we're going to try a push, again, to gain ballott access in some states. New York, Florida, oklahoma, and Oregon key amongst them Q: The word "Pirate" can be confusing to the general public. Does the Pirate Party advocate piracy? A: It doesn't 'advocate' it, as much as attempt to take a term which we have all been labeled by certain industries, and give it a new meaning.
Recommended publications
  • Romanian Political Science Review Vol. XXI, No. 1 2021
    Romanian Political Science Review vol. XXI, no. 1 2021 The end of the Cold War, and the extinction of communism both as an ideology and a practice of government, not only have made possible an unparalleled experiment in building a democratic order in Central and Eastern Europe, but have opened up a most extraordinary intellectual opportunity: to understand, compare and eventually appraise what had previously been neither understandable nor comparable. Studia Politica. Romanian Political Science Review was established in the realization that the problems and concerns of both new and old democracies are beginning to converge. The journal fosters the work of the first generations of Romanian political scientists permeated by a sense of critical engagement with European and American intellectual and political traditions that inspired and explained the modern notions of democracy, pluralism, political liberty, individual freedom, and civil rights. Believing that ideas do matter, the Editors share a common commitment as intellectuals and scholars to try to shed light on the major political problems facing Romania, a country that has recently undergone unprecedented political and social changes. They think of Studia Politica. Romanian Political Science Review as a challenge and a mandate to be involved in scholarly issues of fundamental importance, related not only to the democratization of Romanian polity and politics, to the “great transformation” that is taking place in Central and Eastern Europe, but also to the make-over of the assumptions and prospects of their discipline. They hope to be joined in by those scholars in other countries who feel that the demise of communism calls for a new political science able to reassess the very foundations of democratic ideals and procedures.
    [Show full text]
  • “Hacktivists” Strike Back
    SECUrITY AGENCE FRANCE-PRESSE Supporters of Wikileaks founder Julian Assange “Hacktivists” Strike Back wear Guy Fawkes masks Cyber attacks on financial institutions serve as they demonstrate against his arrest in as a warning sign Amsterdam in December 2010. The “Hacktivist” in december 2010, the websites of international financial services gi- group “Anonymous” has ants Visa, Mastercard and PayPal were temporarily shut down, victims adopted the Guy Fawkes of a coordinated cyber attack dubbed Operation Payback by its per- image as its public face. petrators. “Hacktivists” who support wikileaks and its founder Julian assange attacked after the companies terminated service and disabled donations to the website. The economic impact of the attack remains unclear and the tar- geted companies denied suffering consequential losses. but the attackers, using the names “anon” and “anonymous,” demonstrated the ability of cyber attacks to infiltrate and damage businesses and government agencies. A modern form of protest Amazon, the online retailer that hosted Anonymous didn’t protest by chanting slogans Wikileaks on its servers, was the first to pull out. or waving signs — it struck against Wikileaks’ Visa, MasterCard and PayPal soon followed, perceived enemies in the spirit of the virtual essentially crippling Wikileaks’ ability to accept world they share. Wikileaks, whose raison d'être is donations that support publishing efforts. The exposing classified or confidential government cyber attacks started soon after. or corporate information, is under pressure When Anonymous staged its attack in the vir- from the United States and other governments tual world, it used a favorite weapon of the cyber after leaking more than 250,000 U.S.
    [Show full text]
  • List of Targets of Arrested Computer Hackers 6 March 2012
    List of targets of arrested computer hackers 6 March 2012 The five computer hackers charged in New York Tribune and Los Angeles Times, using on Tuesday and a sixth who pleaded guilty are misappropriated login credentials. accused of involvement in some of the most notorious hacking incidents of the past 18 months. -- February 2011: A cyberattack on private computer security firm HBGary that involved the The following are some of the cyberattacks in theft of 60,000 emails from HBGary employees and which the two Britons, two Irishmen and two the HBGary chief executive, as well as defacing his Americans allegedly played a role as members of Twitter account. Anonymous, Lulz Security or associated groups: -- April-May 2011: A cyberattack on a Fox -- December 2010: Operation Payback. Distributed Broadcasting Company website that involved the denial of service (DDoS) attacks by members of theft of names, dates of birth, telephone numbers, Anonymous on the websites of MasterCard, email and residential addresses for more than PayPal and Visa in retaliation for their refusal to 70,000 potential contestants on the Fox television accept donations for WikiLeaks. In a DDoS attack, show the "X-Factor." a website is bombarded with traffic, slowing it down or knocking it offline completely. -- May 2011: A cyberattack on Sony Pictures Entertainment that revealed the passwords, email -- January 2011: Defacing a website of the Irish addresses, home addresses and dates of birth of political party Fine Gael after accessing computer 100,000 users of the www.sonypictures.com servers in Arizona used to maintain the website, website and a subsequent online attack against www.finegael2011.com.
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • The Masked Avengers: How Anonymous Incited Online
    A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels.
    [Show full text]
  • Data Thieves: the Motivations of Cyber Threat Actors and Their Use
    Testimony Data Thieves The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data Lillian Ablon CT-490 Testimony presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance, on March 15, 2018. For more information on this publication, visit www.rand.org/pubs/testimonies/CT490.html Testimonies RAND testimonies record testimony presented or submitted by RAND associates to federal, state, or local legislative committees; government-appointed commissions and panels; and private review and oversight bodies. Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. www.rand.org Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data Testimony of Lillian Ablon1 The RAND Corporation2 Before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives March 15, 2018 ood afternoon, Chairman Pearce, Ranking Member Perlmutter, and distinguished members of the subcommittee. Thank you for the invitation to testify at this important G hearing, “After the Breach: the Monetization and Illicit Use of Stolen Data.” Cybersecurity is a constant and growing challenge.
    [Show full text]
  • Library Genesis in Numbers: Mapping the Underground Flow of Knowledge
    UvA-DARE (Digital Academic Repository) Library Genesis in Numbers: Mapping the Underground Flow of Knowledge Bodó, B. Publication date 2018 Document Version Final published version Published in Shadow Libraries Link to publication Citation for published version (APA): Bodó, B. (2018). Library Genesis in Numbers: Mapping the Underground Flow of Knowledge. In J. Karaganis (Ed.), Shadow Libraries: Access to Knowledge in Global Higher Education (pp. 53-77). MIT Press. https://www.ivir.nl/publicaties/download/library_genesis_numbers.pdf General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:27 Sep 2021 3 Library Genesis in Numbers: Mapping the Underground Flow of Knowledge Balázs Bodó Library Genesis in Numbers Balázs Bodó Chapter 2 documented the largely Russian social history of pirate book sites.
    [Show full text]
  • Pirate Party Australia
    Submission to the Australian Productivity Commission on the Right to Repair Miles Whiticker John August 1 February 2021 1 Contents 1 Information Request 1: Defining a right to repair 3 1.1 Information Request 1: Defining a right to repair in an Australian context ..................................... 5 1.2 Technical decomposition and overlap with the issue of copyright .. 6 2 Information Request 2 7 3 Information Request 3 8 4 Information Request 4 8 5 Information Request 5 8 6 Information Request 6 9 7 Information Request 7 9 8 Information Request 8: Policy reforms to support a right to repair in Australia 9 9 Information Request 8: International policy proposals 11 2 Introduction We thank the Commission for the opportunity to make a submission on this issue, as it is something which is part of our core platform. We believe that a permissive attitude towards intellectual property (construed broadly) has the dual benefits of increased economic activity and improved public good, making it a rare example of public policy which meets two often competing goals. The Commission may note we have made submissions on prior occasions, and that our submissions typically align with the recommendations of the Commis- sion1 or other such expert groups. With disappointment we have frequently ob- served our and the Commission’s recommendations to be sidelined or disregarded by government. 2 3 We are grateful for the opportunity to provide input and wish to highlight a core principle of our party is to adopt evidence based policies, in line with the recom- mendations of expert groups. About Pirate Party Australia Pirate Party Australia is a political party based around the core tenets of freedom of information and culture, civil and digital liberties, privacy and anonymity, gov- ernment transparency, and participatory democracy.
    [Show full text]
  • 2011 Global Application & Network Security Report
    & Network Security Report 2011 Global Application 20 11 Global Application & Network Security Report Radware 2012 Annual Security Report Smart Network. Smart Business. Table of Contents 01 02 03 Executive Summary Introduction Hacktivism and the » Most important findings » Scope of the Report Rise of Anonymous » Anonymous Projects » Radware Security Survey » Anonymous Power » The ERT Survey » Anonymous Opens Fire » Case Study: Attack on Turkish Government » Anonymous Modify Attack Vectors » A Post-LOIC Attack – Case Study 04 05 06 Attack Sizes DoS Attack Nature The Internet Server Varies Dramatically Becomes More is not Necessarily the APT Oriented First to Fall » General Description » What Happens When a Firewall is Not Protected - Case Study 07 08 09 More Organizations are Attack Tool Trends Mitigation Now Under DoS Threat » LOIC Techniques » Overview » Mobile LOIC » Mitigation Technologies » R.U.D.Y. (R-U-Dead Yet) » Rate Limit and » THC-SSL-DoS Bandwidth Management » Behavioral-Based Protection » Challenges » Stateful Inspection » Geographical-Based Protection » ACL and RTBH » Signatures (Including Flowspec) » The Most Common DoS Mitigation Technologies 10 11 » Technology Efficiency Counter Attacks Summary » Recommendations for the Network and Security Community Smart Network. Smart Business. 01 Executive Summary 2011 was the year in which DoS / DDoS attacks turned from its niche corner and became a mainstream security threat. The single most important reason for this is the Anonymous phenomena. This loosely organized group brought virtual social protests to the forefront with attacks on large and well-known organizations. Their major campaign, Operation Payback, during the WikiLeaks saga in December 2010 against those supporting the US government was the turning point that shaped the security scene in 2011.
    [Show full text]
  • Reading Clubs for Everyone
    ImagineNews, Events and Freethat... Programs @ the Camden County Library System Fall 2011 Whether you’re a kid, Reading Clubs teen or adult, you’ll find the book club for you at one of our branches see pages 4 & 5 Dream Batty for Bats Programs - page 2 Explore Vogelson Fall Book Sale page 9 for everyone... Imagine Consumer Credit Counseling - page 3 Library System Branch Events Bellmawr .... page 8 • Gloucester Township .... page 11 • Haddon Township .... page 12 Merchantville .... page 14 • Riletta L. Cream Ferry Avenue .... page 10 South County .... page 15 • Vogelson .... page 17 From the Director Batty for Bats If you are looking for a job or transitioning to a new career, the Ages 6-12 Camden County Library System can help you towards fulfilling that dream. Holy smokes, Batman The web resources on the Library’s website include the Learning Express Job - this mammal can fly! and Career Accelerator, which includes local and national job listings, Gale Career Transitions, which guides you through a job search process from start to finish, and more. Visit our website at camdencountylibrary.org for more resources. There’s no better place than the Library to learn new skills and brush up on old ones to help you achieve whatever your goal for the future may be. Take a free computer class, check out a book, prepare your resume in one of our computer centers, or find a place to study or network with others in your community. The staff of the Camden County Library System strives to provide you the help that you need during these Audubon Rancocas Nature Center.
    [Show full text]