Online Humint Effects Operations

Total Page:16

File Type:pdf, Size:1020Kb

Online Humint Effects Operations Hacktivism: Online Covert Action Hacktivist groups Online Humint Effects Operations TOP SEC RETYCOMENTNREL TO USA_ AUS. CAN. GBIR, NZL Hacktivist groups They are diverse and often have nnultip[e, varied aims Anonymous LulzSec A-Team Syrian Cyber Army Targets include: Corporations, banks, governments, copyright associations, political parties Techniques: DDoS, data theft — SQLi, social engineering Aims: TOP SEC RETI1COMINTAREL TO LISA_ AUS_ CAN GBR Online HUMINT -CHIS 2 Examples from Anonymous IRC Channels: Gzero POke TOP SECRETHCOMINTMEL TO USA. AUS. CAN. GBR. NZL Gzero Asking for traffic Engaged with target Discovered Botnet with rnalware analysis & SiGINT Outcome: Charges, arrest, conviction TOP SECRET/COM INTYIREL TO USA. AUS. CAN_ GBR. N7L gaper at iorPa balk [11:26] Anyone here have access to a welbsite with atleast 10,000+ unique traffic per day [11:27] <CRIS> adain access to it? [11:27] FTP accessiciPanel yes_ Private Messages [11:28] SCHISu maybe, what do you want it for [11:28] What's the traffic rate? [11:28] It'll help the op [11:29] <CHtS3 mine got 27k per day yesterday {gran) [11:29] Love it [11:29] Using TPG's? [11:30] <CITIS it's here [11:32] Pretty each it's a crypted 'frame which will attempt to attack all PC's heading to that wensite. [11:22] if they have vuln software they're added to a net that is used for OP Paybacks D005 artillery 01[11:32] <CPIS> so you will use exploit or some javascript thing? [11:32] If they are not voin then nothing happens [11:32] Yes [11:13] The frame is obfuscated 15 TOP SECRET#COMINTRREL TO USA. AUS. CAM. GBIR. Na GZero [15:16] (6Zero, yo [15:16] c62eno) works with me [15:16] <G2ero> i need traffic [15:16] <CRIS> hey. Infrastructure [15:17] (CHIS› what for? 115:171 <G2eros exploit pack WHO'S: gzero [15:12] c62ero› will pay you if traffic is [15:17] caZero> v wanna talk? [15:19] (62aro) http://alpha_bax.sidhits.txt - 'Feed to make this bigger ;) [15:19] (Hero> http://pastebin.conall= - 15 for iframe [15:19] cGaror http://alpha.bOx.soficlitcomog.php Live URL 1 ,, Stage implant: [15:19] (Gam> U haae traffic? Lead to 2r" stage & WARPIG [15:21] (MIS> so what is at that page anyway? botnet, SpyEye malware [15:21] c62ero) several exploits [15:21] <COIS> yeah I've got traffic. got 92k hits yesterday. [15:22] (aZera› ok [15:22] <Gam> lets talk :p TOP SECRETAICOMINTUREL TO USA. AUS. CAN. GBR. NZL Online Humint - Gzero JTRIG & SIGINT reporting lead to identification, arrest Sentenced for 2 years — April 2012 Backer jailed for stealing 8 million identities 31d rumen,: Ecs be-rc s,..5r.sard ra -NS re alr.%-qi, eroag-xoaarz ; • . nomrs. &au 36-0:Arrapag.3rs 1 • 23.,ear-dd Ed&rd Nam, sped r. as tsgo Ideried. trEeind bars for es hagasp sLeee. Tee soetema, ten omaw N ee ruda Mae me sO eadd ham tee haie amr...rfi ei prim -des Tice Er3i5h NKker used dw bnaM Solve- Tra.ss: rd 1312.g CLIF dial Fez ilk-nkLara betray. Jarzatr 1.2010. Si August 30. 301 from an uldsda,ad ware. 0.0 ,-s dies. pa.ce ku,d 20G. OW 1,17,1n radal eaur 0.701 Cal. ,.- tr .as As, :7.914 rime, G ies brrd, and reRierKs teehtds NaFad •,- 4,4412 A.m. Pr, Mi e l it zeta fa 67.5:9 3,ee-siS20 paw accacd-ry k aL..tharids. TOP SECRET/FOOL' INTHRIEL TO LISA. AUS. CAN. GBR 1,121 pOke Discussing a database table labelled 'MI', in Anon Ops IRC Engaged with target — exploiting US Government website, US company website 7,0perationPayback ;19:40] s&pOke> Topiary: I has list of email:phonenumber:nane of 100 fBI -lands [19:40] (U.Bkes :P [19:41] (Topiarp what about passwords? :19:41] <P,ceke> It was dumped from another giro lb, Topiary :19:41] (13Aiker I table natied fbi [19:42] a Topiary> ah, like an FBI affiliated contact userbase? [19:42] sarrOke> that was all it contained 13: TOP SECRETACOMINTUREL TO USA. AUS. CAN. GBE. NZL poke Private messages pa:e4j 11= sG what was the site?! [29:04] if its special j) [29794] rpeke5 usda.gov [29 :88] :C. did you get past the site db tho? [Mee] ( eke> Yep [20:13] so u had a poke around on the network? lol [20:13] (peke> web a lil [20:13] <peke, hause.gov [20:13) (peke> PIAK:11111M [email protected] [ 29 23] < pek e > VISA: Illtegineil.af -mil TOP SECIRIETVCOMMWREL TO USA. AUS. CAN. GB:R. NA POke Identification UMW' NEWS r.ECHNOLOGY VA. ktres the Foe k tiles Is, Private messages It' [21:67] oh btw have you seen this [21:08] [21:89] cool hub? [21:11] <peke) Ya ...Enabled POke: Name: Facebook, email accounts TOP SECREIMOMINTAREL TO USA. AIDS, CAN. GBIR. NZL Effects on Hacktivisim Op WEALTH — Summer 2011 Intel support to Law Enforcement — identification of top targets 6' Denial of Service on Key Communications outlets 0 Information Operations TOP SECRE1TCOMINTMELTO USA. AUS. CAN. GBR. Na DDoS ROLLING THUNDER • RT initial trial info [15:40] <srewder> hello, was there any problem with the irc network? i wasnt able to -connect the past 30 hours. [15:42) <speakeasy> yeah [1.5:42] <speakeasy> were being hit by a syn flood [16744] <speakeasy> i didn't know whether to -quit last night, because of the ddos anon_anons ■ Ei - : anocns.'s i Larigo clovm ( anon_anonz 20ptiba0nefeetton morice the typo) en YouTube anon _anon on ,...7itter nickname etude as 2110111 anonops li beat* ariorop5 TOP SECRETY/COMINTEREL TO USA_ AUS, CAN. GBR. 10 Outcome CH IS with 80% of those messaged where not in the IRC channels 1 month later TOP SECRETICOMINTUREL TO LISA. AUS. CAN_ GE R. NZL Conclusion Team working —SIGENT, JTRIG, CDO, ll\10C— was key to success Online Covert Action techniques can aid cyber threat awareness Effects can influence the target space - OP SECRETPCOMINDIREL TO LISA. AUS. CAN. GBR. NZL .
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Sample Iis Publication Page
    https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited.
    [Show full text]
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Masked Avengers: How Anonymous Incited Online
    A REPORTER AT LARGE | SEPTEMBER 8, 2014 ISSUE The Masked Avengers How Anonymous incited online vigilantism from Tunisia to Ferguson. BY DAVID KUSHNER Anyone can join Anonymous simply by claiming affiliation. An anthropologist says that participants “remain subordinate to a focus on the epic win—and, especially, the lulz.” n the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent Ihours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self- selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Doyon found solace, and a sense of purpose, in the CB-radio community. He and his friends took turns monitoring the local emergency channel. One friend’s father bought a bubble light and affixed it to the roof of his car; when the boys heard a distress call from a stranded motorist, he’d drive them to the side of the highway. There wasn’t much they could do beyond offering to call 911, but the adventure made them feel heroic. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels.
    [Show full text]
  • Superseding Indictment
    _.1{:~~")li~~lti:f~{ FilED ~'Y.:{fs;v, ~,;;rin>---- f-:V' . .. mOPEN COURT .. .1 ''· ··\wi IN THE UNITED STATES DISTRICT COURT F ~~ ffHE f 'f.i 2 EASTERN DISTRICT OF VIRGINIA I?_! ~ 'iJII~ J .·· CLEHI\ U.S. DISTRICT COURT Alexandria Division illgi\NDRIA, VIRGIN!~--~~-' UNITED STATES OF AMERICA Criminal No. 1:18-cr-111 (CMH) v. Count 1: 18 U.S.C. § 793(g) Conspiracy To Obtain and Disclose National JULIAN PAUL ASSANGE, Defense Information Defendant. Count 2: 18 U.S.C. § 371 Conspiracy to Commit Computer Intrusions Counts 3, 4: 18: 18 U.S.C §§ 793(b) and2 Obtaining National Defense Infmmation Counts 5-8: 18 U.S.C. §§ 793(c) and 2 Obtaining National Defense Information Counts 9-11: 18 U.S.C. §§ 793(d) and2 Disclosure ofNational Defense Infmmation Counts 12-14: 18 U.S.C. §§ 793(e) and 2 Disclosure ofNational Defense Information Counts 15-17: 18 U.S.C. § 793(e) Disclosure ofNational Defense Information SECOND SUPERSEDING INDICTMENT June 2020 Term- at Alexandria, Virginia . THE GRAND JURY CHARGES THAT: GENERAL ALLEGATIONS A. ASSANGE and WikiLeaks 1. From at least 2007,1 JULIAN PAUL ASSANGE ("ASSANGE"} was the public 1 When the Grand Jury alleges in this Superseding Indictment that an event occurred on a particular date, the Grand Jury means to convey that the event occmTed "on or about" that date. face of"WikiLeaks," a website he founded with others as an "intelligence agency ofthe people." To obtain information to release on the WikiLeaks website, ASSANGE recruited sources and predicated the success of WikiLeaks in pmi upon the recruitment of sources to (i) illegally circumvent legal safeguards on infonnation, including classification restrictions and computer and network access restrictions; (ii) provide that illegally obtained information to WikiLeaks for public dissemination; and (iii) continue the pattern of illegally procuring and providing classified and hacked information to WikiLeaks for distribution to the public.
    [Show full text]
  • Timeline of ANTISEC As Created and Operated Under FBI Supervision
    TIMELINE 4 June 2011 - First passing mention of ANTISEC in relation to Anonymous is made on LulzSec twitter (http://goo.gl/cwO2G) 7 June 2011 - SABU visited by FBI and arrested quietly 8 June 2011 - By 10AM this day, SABU was fully cooperating with feds 19 June 2011 - AFTER arrest, SABU resumes tweeting after a prolonged break (last recorded tweets being random in March and May of 2011 -- http://goo.gl/frJpR). His first tweet is to announce the formation of ANTISEC (http:// goo.gl/725mr). He announces ANTISEC as "The biggest, unified operation amongst hackers in history." <-- Does "unified" = conspiracy? Original ANTISEC Release Statement - http://pastebin.com/ 9KyA0E5v 20 June 2011 - LulzSec announces Tango Down of site for UK's Serious Organised Crime Agency (SOCA.gov.uk) "in the name of #ANTISEC" (http://goo.gl/RdbnM) <-- Note, Topiary would later be arrested and charged with DDOS attack on SOCA website 22 June 2011 - LulzSec tweets "ofcial ANTISEC theme song" (http:// goo.gl/dfTiw). 23 June 2011 - LulzSec releases Chinga La Migra on AZ law enforcement in protest of AZ SB1070 (http://goo.gl/9s2dG). Both release and tweeted announcement referenced #ANTISEC (http:// goo.gl/f558l) 23 June 2011 - SABU tweets "Friday will be beginning of #ANTISEC dumps. Big ups to all hackers involved in this massive project!" http://goo.gl/6IJAI 24 June 2011 - Logs from IRC channel #pe are leaked publicly. SABU appears as an authority figure. Are they leaked with a purpose of establishing him even more in the Anonymous community as a leader? http://gu.com/p/3v5c5 24 June 2011 - ANTISEC releases a call to arms video (http:// www.youtube.com/watch?v=dNaAaPvyYqI).
    [Show full text]
  • Hacktivisten
    HACKTIVISTEN Abschlussbericht zum Projektteil der Hellfeldbeforschung Bundeskriminalamt Kriminalistisches Institut Forschungs- und Beratungsstelle Cybercrime KI 16 0 Wendy Füllgraf KI 16 Forschungs- und Beratungsstelle Cybercrime Bundeskriminalamt 65173 Wiesbaden [email protected] 1 0 Abbildungsverzeichnis __________________________________________________ IV 1 Einleitung _____________________________________________________________ 1 2 Projektbeschreibung _____________________________________________________ 3 2.1 Hintergrund ____________________________________________________________ 3 2.2 Projektziele _____________________________________________________________ 3 3 Methoden _____________________________________________________________ 5 3.1 Angemessenheit der Methode am Forschungsgegenstand _______________________ 5 3.2 Sekundäranalyse ________________________________________________________ 6 3.2.1 Materialerhebung _____________________________________________________________ 6 3.2.2 Auswertung __________________________________________________________________ 8 3.3 Fallanalyse _____________________________________________________________ 9 3.3.1 Datenerhebung _______________________________________________________________ 9 3.3.2 Auswertung _________________________________________________________________ 12 3.4 Expertenarbeitstreffen___________________________________________________ 13 3.4.1 Inhalte und Ablauf ____________________________________________________________ 13 3.4.2 Phänomenbezug der Teilnehmer _________________________________________________
    [Show full text]
  • And You Thought It Could Not Get Worse
    And You Thought It Could Not Get Worse Joe Vigorito/Director, Mobility & Security Annese & Associates, Inc. Sad State of Security “Many cyberattacks can be mitigated by relatively simple measures. Unfortunately, some people fail to take what appear to be basic precautions–such as using strong passwords, applying patches, and running a security solution. In many cases, breaking into a company’s network is easier than it sounds.” Costin Raiu Director, Global Research & Analysis Team Kaspersky Lab “I could teach a third-grader to do it.” Darren Martyn aka “PwnSauce” LulzSec After hacking senate.gov in 2011 The Current State of Cybersecurity is Not Nearly Good Enough, and is getting worse all the time! Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked • Mark Zuckerberg Hack – OurMine Group. His Pinterest and Twitter accounts were hacked multiple times because he used the password ‘dadada’ Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked • Mark Zuckerberg Hack – OurMine Group. His Pinterest and Twitter accounts were hacked multiple times because he used the password ‘dadada’ • Oracle Micros Hack – Russian hacking group known for hacking banks compromised Oracle’s POS system code on one of the top 3 payment card systems globally Not getting worse? Lets look… • Yahoo! – Perpetrator unknown.
    [Show full text]
  • Why “Hacktivism” Can and Should Influence Cybersecurity Reform
    INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ........................................................................................ 1664 I. CYBERCRIME, HACKTIVISM, AND THE LAW ......................... 1671 A. The Current State of Cybercrime ............................................... 1671 B. Defining Hacktivism and Anonymous’s Place Within the Movement .................................................................................. 1676 1. Hacking and Hacktivism ..................................................... 1676 2. Anonymous ......................................................................... 1678 C. Current Cybersecurity Law ....................................................... 1683 1. Federal Statutes ................................................................... 1683 2. National Defense Systems ................................................... 1684 3. State Monitoring Systems .................................................... 1685 4. International Coalitions ....................................................... 1686 II. CURRENT REFORM PROPOSALS ............................................... 1687 A. Obama Proposal ........................................................................ 1687 B. Republican Task Force Proposal .............................................. 1689 III. THE CYBERSECURITY REFORM SOLUTION ........................... 1692 A. Similarities in the Reform Models ............................................
    [Show full text]
  • Hacktivism in Europe
    Merve Dikme Hacktivism in Europe: Renewals in social movements in the digital age Bachelor Thesis Author: Merve Dikme, S1136615 1st Supervisor: Mr. Ossewaarde 2nd Supervisor: Ann Morissens University of Twente, Enschede, NL 1 Merve Dikme Table of contents 1. Abstract 3 2. Introduction 3 3. Theorizing Hacktivism 5 4. Methodology 8 5. Analysis 12 5.1. Analyzing a hacktivist group: LulzSec 12 5.1.1. Sabu the later FBI agent and Topiary the ‘cool’ hacker 12 5.1.2. Hacktivism: a typical and new social movement 13 5.2. Analyzing a hacktivist group: Anonymous 18 5.2.1. William the younger hacker and Anon groups 18 5.2.2. Hacktivism: a typical and new social movement 18 5.3. Comparing both groups 22 7. Conclusion 23 9. References 26 10. Appendix 28 2 Merve Dikme 1. Abstract The goal of this paper is to bring clarity and further the hacktivism research by finding out what the similarities between hacktivism and social movements are. Hacktivism is a movement in itself and sometimes it is compared with social movements. There has not been a common ground on this field. Many authors give their idea and definitions of hacktivism as well as the similarities and differences to social movements. With a dialectic approach this work aims coming to a common ground and understanding all perspectives. The debate includes a lot of different characteristics and factors that are underlined in other works. Hacktivism is a newly arising movement that has brought a lot of media attention. Especially for the European Union, the global character of hacktivism has been important for cross-border cooperation.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]