Sunday, October 9, 2011

"Green" River of Occupy X Data

Between mainstream media outlets and following hashtags on Twitter, it's hard to get a real grasp on the scope and true current events of the Occupy Movement, objective or otherwise.

Dave Winer has solved that problem by creating a massive link blog, what he likes to call a "river of data," with digestible RSS feeds for each major movement. is the perfect spot to get an at-a-glance update of the entire movement, or find a feed for your localization to stay on top of your occupation! OccupyWeb even aggregates photos of the demonstrations: protesters, protest signs, and even the WikiLeaks truck seem to be frequenting the Occupy Photo Stream.

Sunday, September 18, 2011

#OccupyWallSt Interview With Michele Moore

Michele Moore, former employee of SunTrust, has been participating in Operation Occupy Wall Street in hope of raising awareness about the situation of bank whistleblowers today and the dire consequences they face for uncovering scandal. Michele Moore herself received threats and became victim to theft and hacking for several years after going to the Securities and Exchange Commision about major accounting irregulatites. You can find out more about her ongoing campaign at the Reporting Wrong Doing website.

WikiLeaks Truck Flagged, No Probable Cause

During Anonymous operation #OccupyWallStreet there has begun to be some obvious profiling by law enforcement. Video poster removed audio from recording due to his (failed) heckling of the NYPD.

Sunday, September 11, 2011

Iranian Hacker Compromises 300,000 Users

Comodohacker, who has claimed responsibility for breaching security at Comodo, DigiNotar, and GlobalSign, has come forth in an interview with the New York Times shedding a little light on his attacks and the data he managed to pilfer.

The fruits of his labor are believed to have been used to tap into the online communications of as many as 300,000 unsuspecting Iranians this summer. What’s more, he punched a hole in an online security mechanism that is trusted by millions of Internet users all over the world. [...] He gained control of the server in about 10 days and generated 531 fake certificates, including some for well-known sites like Google, Skype and Facebook, along with a few foreign intelligence sites. He shared them with a person or organization believed to have had control over dozens of Internet service providers and university networks in Iran — perhaps the government itself.

Comodohacker has released several public statements and answers to press, fans and haters on his Pastebin account: You can also find his proof of concept / proof of hack txts there as well.

Friday, August 19, 2011

/b/ Steals €500,000, Buys 20,000 Wario Games

In what might be the most hilarious methods of harassing the US government Anonymous has employed yet, a still-unknown Anonymous member gained unauthorized access to a European bank account and absconded with €522,233.25 in seconds. What did he do with the motley sum of money? He ordered 20,000 copies of Wario, and 1 unicycle, to the White House!

Saturday, August 13, 2011

Barrett Brown Tied to LulzSec, Topiary & Sabu

Older video released months ago, figured I'd post it for posterity's sake.

Sunday, July 10, 2011

LulzSec & Anonymous: AntiSec - The Movie

Did a 16-year-old girl help take down HBGary?

According to Forbes, one of hacktivist group Anonymous' active members claims to be 16-years-old and female, bucking the stereotypical hacker profile.

She played a “crucial role” in the HBGary hack:
Kayla played a crucial role, posing as HBGary CEO Greg Hoglund to an IT administrator (who happened to be Nokia security specialist Jussi Jaakonaho) to gain access to the company’s servers. Read their email correspondence here and here. In the fallout, Barr’s emails revealed HBGary had proposed a dirty tricks campaign against WikiLeaks to a law firm representing Bank of America.

She learned to be a hacker from her software engineer dad:
“My dad encouraged it at first,” she says. “He thought it was awesome I was so in to what he did.” Dad allegedly showed her how to find bugs in C source code and exploit them.

She is extremely secretive online:
With just half a dozen close friends online, she has a strict regimen to remain invisible on the web. Each night she wipes every one of her web accounts and deletes every email in her inbox. She has no physical hard drive and boots her computer from a microSD card. “I could hide this card anywhere or chew into a million pieces in a few seconds,” she says by e-mail. She keeps her operating system on a USB stick and uses a virtual machine (VM) to carry out her online shenanigans.

She once hacked 4chan, the site from which Anonymous originated:
In December 2008, she wrought havoc on one of the most famous forums of all, 4chan’s notorious /b/ channel, finding and exploited an SQL injection bug on its content management system, hacking in and causing mayhem on the forum for a few hours.

Her dad has a good sense of humor:
These days Kayla’s dad is aware of her activities with Anonymous, and while he is concerned about the legal implications–she lives in a country where she could be tried as an adult–she says he finds the whole thing “hilarious.”

She doesn’t really spend much time online:
[Kayla] refuses to be chained to her computer, limiting herself to a few hours a night online. She rarely visits online forums–they’re “boring”–and a few days a week takes a course in college to further her goal of being a teacher. She lives in an English-speaking country–not the U.K.–but won’t say more about it.