The first global cyber war has begun

Moderators: Elvis, DrVolin, Jeff

Re: The first global cyber war has begun

Postby vanlose kid » Mon Jun 13, 2011 7:00 pm

LulzSec Hacks Senate Server, Asks Rhetorically "Is This An Act Of War, Gentlemen?"
Submitted by Tyler Durden on 06/13/2011 17:39 -0400

After a major hack of the IMF's website over the weekend promptly scrambled the FBI, just as Operation Empire State Rebellion announced it was taking its attack of the Fed Chairman to the next level (we have yet to see anything here more than just rhetoric), today, the competing hacker group, the one implicated in numerous Sony breakins as well as a recent defacing of an FBI-affiliate, LulzSec, has proven it broke into the Senate's SPARC server and exposed everything that admin chris_vontz@saa.senate.gov apparently was unable to hid sufficiently well. On its website, LulzSecurity left the following preface to the several hundred thousand code-long data dump of everything located in the Senate server: "We don't like the US government very much. Their boats are weak, their lulz are low, and their sites aren't very secure. In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more! This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem? - Lulz Security." And what is completely not surprising, following a Dow Jones inquiry, "a Senate representative said she was unaware of any breach of the body's web site." Well it has been breached- anyone curious what is contained in the server can do so here. A cursory investigation does not reveal the exposition of any sensitive data.... This time. Yet one thing LulzSec most certainly acquired was the user/pass combinations of all individuals affiliated with the Senate, and are likely currently actively downloading all their emails. We continue to wonder just how safe the Fed's email server is...

The hacking of the Senate appears to have been a "bonus round" to what LulzSec was actually targetting, which seems to have been Bethesda Softworks. Below is how the hacker group describes their action:
Greetings Internets,

This is a story all about how we made Bethesda Softworks, ZeniMax
Media, and everything they own, our bitch for life.

As you should know, The Lulz Boat stores vast amounts of booty;
much of this booty we don't release as it's simply too shiny and/or
delicious. As of late, certain inferior sailing boats have discovered
flaws in Brink (brinkthegame.com), thinking themselves exciting and new.

Too late. The Lulz Boat controls this ocean, chumps.

Some weeks ago, we smashed into Brink with our heavy artillery Lulz
Cannons and decided to switch to ninja mode. From our LFI entry point,
we acquired command execution via local file inclusion of enemy fleet
Apache vessel. We then found that the HTTPD had SSH auth keys, which
let our ship SSH into other servers. See where this is going?

We then switched to root ammunition rounds.
And we rooted... and rooted... and rooted...

After mapping their internal network and thoroughly pillaging all of
their servers, we grabbed all their source code and database passwords,
which we proceeded to shift silently back to our storage deck.

Please find enclosed everything we took, excluding one thing -
200,000+ Brink users. We actually like this company and would
like for them to speed up the production of Skyrim, so we'll
give them one less thing to worry about. You're welcome! :D

Please keep making awesome games, guys, and you should
totally add an official LulzSec top hat to new releases.

But anyway, bwahahaha... >:]


LINKS:
http://thepiratebay.org/torrent/6467131 ... ernal_data


http://www.zerohedge.com/article/lulzse ... -gentlemen


:fawked:

*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby vanlose kid » Tue Jun 14, 2011 5:33 pm

*

heads up.

In his opening remarks, Panetta said the U.S. has moved from the Cold War to face a “blizzard of threats.”

Citing Iran, he said he would address Iran’s nuclear activities in closed session. Still, “there’s no question they continue to try to develop some kind of nuclear capability,” he said.

Next Pearl Harbor’

In terms of new threats, the U.S. faces the “real possibility” of a surprise cyber attack, he said.

The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems,”
Panetta told the panel.

“This is a real possibility in today’s world,” he said. “As a result, I think we have to aggressively be able to counter that. It is going to take both defensive measures as well as aggressive measures to deal with it.”

http://www.businessweek.com/news/2011-0 ... ents-.html


*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Wombaticus Rex » Tue Jun 14, 2011 5:49 pm

Boy, good thing that new Die Hard movie already totally explained this next false flag attack to Americans.

That will save Popular Mechanics a lot of overtime.
User avatar
Wombaticus Rex
 
Posts: 10896
Joined: Wed Nov 08, 2006 6:33 pm
Location: Vermontistan
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby StarmanSkye » Tue Jun 14, 2011 6:51 pm

^^^^
I couldn't help but think the exact same thing. It's unlikely to a 99.9999 nth degree that the professional political/corporate-securitat div. franchise laison dept. WOULDN'T have consolidated resources and made extensive plans to keep the counter-intel 'defense' racket going far, far into the future's vanishing-point event-horizon w/ ever-more-clever, sophisticated ploys to revamp and 'improve' w/ all possible end-run-around elective public expenditure authorization intent to provoke/incite increasingly lucrative software & communication security 'fixes' and patches -- a variation on the standard War-without-end-AmEN Pentagon/MIC pork-barrel feeding-lot gravy-train. Just imagination the salivating jowels at the thought of all those hundreds of $Billion$ in future-debt obligations to keep the Ship-of-State's economy from foundering on the shoals of balanced budgets and fickle voters who might resent how the exponential inflation of carry-forward 'loans' are reducing their pensions and middle-class net-worth.

The old Mafia Dons never imagined such a novel evolutionary perfected twist on the tried-and-true protection and extortion rackets. This even takes the streetwise long-con play to a whole 'nother level.

And yet, with the advantage of hindsight its almost kind of inevitable.

While the FBI and CIA are rooting-around in harddrive ROMs and dumpster-diving basement memories looking for adolescent confessions, deciphering hidden plots in long-forgotton IRS records and cell-phone logs, or reconstituting juvenile creative-writing fairytales from within semi-anonymous facebook postings, they never even dreamed about examining the election-frauds of 2000 and 2004.

The biggest frauds like dogshit brought indoors is usually found underfoot, on the soles we walk around on.
StarmanSkye
 
Posts: 2670
Joined: Thu Nov 03, 2005 11:32 pm
Location: State of Jefferson
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby vanlose kid » Tue Jun 14, 2011 6:55 pm

Wombaticus Rex wrote:Boy, good thing that new Die Hard movie already totally explained this next false flag attack to Americans.

That will save Popular Mechanics a lot of overtime.


all about control of the narrative. pre-emptive marketing.

make it believable.

given the outline the mind fills in the details.

edit: Americans are big on fate, destiny and tragedy and meaty fascist pageants and music.

*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby hanshan » Tue Jun 14, 2011 7:01 pm

vanlose kid wrote:
LulzSec Hacks Senate Server, Asks Rhetorically "Is This An Act Of War, Gentlemen?"
Submitted by Tyler Durden on 06/13/2011 17:39 -0400

After a major hack of the IMF's website over the weekend promptly scrambled the FBI, just as Operation Empire State Rebellion announced it was taking its attack of the Fed Chairman to the next level (we have yet to see anything here more than just rhetoric), today, the competing hacker group, the one implicated in numerous Sony breakins as well as a recent defacing of an FBI-affiliate, LulzSec, has proven it broke into the Senate's SPARC server and exposed everything that admin chris_vontz@saa.senate.gov apparently was unable to hid sufficiently well. On its website, LulzSecurity left the following preface to the several hundred thousand code-long data dump of everything located in the Senate server: "We don't like the US government very much. Their boats are weak, their lulz are low, and their sites aren't very secure. In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more! This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem? - Lulz Security." And what is completely not surprising, following a Dow Jones inquiry, "a Senate representative said she was unaware of any breach of the body's web site." Well it has been breached- anyone curious what is contained in the server can do so here. A cursory investigation does not reveal the exposition of any sensitive data.... This time. Yet one thing LulzSec most certainly acquired was the user/pass combinations of all individuals affiliated with the Senate, and are likely currently actively downloading all their emails. We continue to wonder just how safe the Fed's email server is...

The hacking of the Senate appears to have been a "bonus round" to what LulzSec was actually targetting, which seems to have been Bethesda Softworks. Below is how the hacker group describes their action:
Greetings Internets,

This is a story all about how we made Bethesda Softworks, ZeniMax
Media, and everything they own, our bitch for life.

As you should know, The Lulz Boat stores vast amounts of booty;
much of this booty we don't release as it's simply too shiny and/or
delicious. As of late, certain inferior sailing boats have discovered
flaws in Brink (brinkthegame.com), thinking themselves exciting and new.

Too late. The Lulz Boat controls this ocean, chumps.

Some weeks ago, we smashed into Brink with our heavy artillery Lulz
Cannons and decided to switch to ninja mode. From our LFI entry point,
we acquired command execution via local file inclusion of enemy fleet
Apache vessel. We then found that the HTTPD had SSH auth keys, which
let our ship SSH into other servers. See where this is going?

We then switched to root ammunition rounds.
And we rooted... and rooted... and rooted...

After mapping their internal network and thoroughly pillaging all of
their servers, we grabbed all their source code and database passwords,
which we proceeded to shift silently back to our storage deck.

Please find enclosed everything we took, excluding one thing -
200,000+ Brink users. We actually like this company and would
like for them to speed up the production of Skyrim, so we'll
give them one less thing to worry about. You're welcome! :D

Please keep making awesome games, guys, and you should
totally add an official LulzSec top hat to new releases.

But anyway, bwahahaha... >:]


LINKS:
http://thepiratebay.org/torrent/6467131 ... ernal_data


http://www.zerohedge.com/article/lulzse ... -gentlemen


:fawked:

*



:rofl:

Wombaticus Rex wrote:Boy, good thing that new Die Hard movie already totally explained this next false flag attack to Americans.

That will save Popular Mechanics a lot of overtime.


Second that :rofl:

vanlose kid:

Re: The first global cyber war has begun
*

heads up.


Next Pearl Harbor’

In terms of new threats, the U.S. faces the “real possibility” of a surprise cyber attack, he said.

“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems,” Panetta told the panel.

“This is a real possibility in today’s world,” he said. “As a result, I think we have to aggressively be able to counter that. It is going to take both defensive measures as well as aggressive measures to deal with it.”

http://www.businessweek.com/news/2011-0 ... ents-.html



war is a drug more powerful & addicting than opium, heroin, crack, meth...etc
once a warslave, death & destruction forever...


...
hanshan
 
Posts: 1673
Joined: Fri Apr 22, 2005 5:04 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby KeenInsight » Tue Jun 14, 2011 8:22 pm

For teh lulz

Titanic Takeover Tuesday: LulzSec's busy day of hacking escapades

By Peter Bright

Image

Lulz Security, the hacking group apparently motivated by nothing more than their desire to laugh at the mayhem they cause, has had a busy day in an event they called Titanic Takeover Tuesday. Taking a break from their dumps of user data and server break-ins, today saw the group perform a bunch of distributed denial of service attacks against a range of targets.

First up—and still only intermittently available at the time of writing—was gaming magazine The Escapist, with no apparent reason for the attack. LulzSec boasted that taking down the site required just 0.4 percent of its DDoS capacity.

Next in line were the login servers for the game EVE Online. The effect of this attack was to bring down the EVE Online website at the same time, though LulzSec insists that this was not the actual target. In response to the DDoS, CCP Games, makers of EVE, have taken all their systems offline, for fear that they might be hacked. The company has also issued a statement to assure customers that their personal information remains secure.

The third target—and the only one for which the group has offered a rationale beyond "lulz"—is an IT security company named Finfisher. Their site was taken down, briefly, because "apparently they sell monitoring software to the government or some shit like that."

Gamers were once more in the crosshairs with the fourth target; more login servers, this time for Minecraft. Just as with EVE Online, going after the login servers also took out the game's website.

The pattern was repeated for the fifth target; login servers for the game League of Legends were knocked offline, a move which also brought down the game's website.

The result of all this? Lot of enraged gamers complaining about the downtime, and hence, many lulz for Lulz Security. Going after gaming targets hasn't made the group universally popular; posters on 4chan's /b/ forum, who might normally be sympathetic to lulz-motivated shenanigans, attempted to hunt LulzSec down. LulzSec dismissed the "/b/tards" as "damn furries," saying that they were the cream of the /b/ crop from 2005, distancing themselves from the /b/tards of today.

http://arstechnica.com/tech-policy/news ... apades.ars



Damn, my one true joy in the world. I kind of had lulz, but still annoying since I play these games :rofl2 But, seriously some of these lulsec people hide behind kids that do lametard, script-kiddie bullshit. Then again, I guess that's the point, since they'll never really catch any of the skilled ones that actually tunnel into networks rather than hitting the outer shell as the newbs do.
User avatar
KeenInsight
 
Posts: 663
Joined: Sun Jul 09, 2006 4:17 am
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Tue Jun 21, 2011 11:21 pm

Image
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby hanshan » Wed Jun 22, 2011 8:34 am

KeenInsight wrote:For teh lulz

Titanic Takeover Tuesday: LulzSec's busy day of hacking escapades

By Peter Bright

Image

Lulz Security, the hacking group apparently motivated by nothing more than their desire to laugh at the mayhem they cause, has had a busy day in an event they called Titanic Takeover Tuesday. Taking a break from their dumps of user data and server break-ins, today saw the group perform a bunch of distributed denial of service attacks against a range of targets.

First up—and still only intermittently available at the time of writing—was gaming magazine The Escapist, with no apparent reason for the attack. LulzSec boasted that taking down the site required just 0.4 percent of its DDoS capacity.

Next in line were the login servers for the game EVE Online. The effect of this attack was to bring down the EVE Online website at the same time, though LulzSec insists that this was not the actual target. In response to the DDoS, CCP Games, makers of EVE, have taken all their systems offline, for fear that they might be hacked. The company has also issued a statement to assure customers that their personal information remains secure.

The third target—and the only one for which the group has offered a rationale beyond "lulz"—is an IT security company named Finfisher. Their site was taken down, briefly, because "apparently they sell monitoring software to the government or some shit like that."

Gamers were once more in the crosshairs with the fourth target; more login servers, this time for Minecraft. Just as with EVE Online, going after the login servers also took out the game's website.

The pattern was repeated for the fifth target; login servers for the game League of Legends were knocked offline, a move which also brought down the game's website.

The result of all this? Lot of enraged gamers complaining about the downtime, and hence, many lulz for Lulz Security. Going after gaming targets hasn't made the group universally popular; posters on 4chan's /b/ forum, who might normally be sympathetic to lulz-motivated shenanigans, attempted to hunt LulzSec down. LulzSec dismissed the "/b/tards" as "damn furries," saying that they were the cream of the /b/ crop from 2005, distancing themselves from the /b/tards of today.

http://arstechnica.com/tech-policy/news ... apades.ars



Damn, my one true joy in the world. I kind of had lulz, but still annoying since I play these games :rofl2 But, seriously some of these lulsec people hide behind kids that do lametard, script-kiddie bullshit. Then again, I guess that's the point, since they'll never really catch any of the skilled ones that actually tunnel into networks rather than hitting the outer shell as the newbs do.


gotta save for later

...
hanshan
 
Posts: 1673
Joined: Fri Apr 22, 2005 5:04 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby JackRiddler » Wed Jun 22, 2011 4:26 pm

Hey Plutonia what the hell is that moustache thing? Very funny.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Wed Jun 22, 2011 5:30 pm

The last pair - Watchmaker/Rich - is LulzSec's avatar.

The moustache meme is a longstanding one in the chans

Image

Image
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby Plutonia » Thu Jun 23, 2011 12:55 am

Breaking today:

Massive US-led spy operation on Arab world uncovered
By Barrett Brown on Jun 23, 2011 12:02 PM

Apple, Google, Disney implicated in a US-led mass surveillance apparatus designed to spy and mine data from social media sources in the Arab world.


A crowd sourced investigation dubbed Project PM has probed reams leaked emails involving US intelligence companies and uncovered a massive spy operation targeting social media and telecommunications in the Arab world.

The allegations, derived from 70,000 emails stolen from HBGary earlier this year, detailed a project dubbed Romas/COIN, to be proceeded by Odyssey, which could automatically analyse millions of conversations.

The following report has been republished with permission from Barrett Brown, Project PM.

COIN

For at least two years, the US has been conducting a secretive and immensely sophisticated campaign of mass surveillance and data mining against the Arab world, allowing the intelligence community to monitor the habits, conversations, and activity of millions of individuals at once.

And with an upgrade scheduled for later this year, the top contender to win the federal contract and thus take over the program is a team of about a dozen companies which were brought together in large part by Aaron Barr - the same disgraced CEO who resigned from his own firm earlier this year after he was discovered to have planned a full-scale information war against political activists at the behest of corporate clients.

The new revelation provides for a disturbing picture, particularly when viewed in a wider context. Unprecedented surveillance capabilities are being produced by an industry that works in secret on applications that are nonetheless funded by the American public – and which in some cases are used against that very same public.

Their products are developed on demand for an intelligence community that is not subject to Congressional oversight and which has been repeatedly shown to have misused its existing powers in ways that violate US law as well as American ideals.

And with expanded intelligence capabilities by which to monitor Arab populations in ways that would have previously been impossible, those same intelligence agencies now have improved means by which to provide information on dissidents to those regional dictators viewed by the US as strategic allies.

The nature and extent of the operation, which was known as Romas/COIN and which is scheduled for replacement sometime this year by a similar program known as Odyssey, may be determined in part by a close reading of hundreds of e-mails among the 70,000 that were stolen in February from the contracting firm HBGary Federal and its parent company HBGary.

Other details may be gleaned by an examination of the various other firms and individuals that are discussed as being potential partners.

Of course, there are many in the US that would prefer that such details not be revealed at all; such people tend to cite the amorphous and much-abused concept of “national security” as sufficient reason for the citizenry to stand idly by as an ever-expanding coalition of government agencies and semi-private corporations gain greater influence over US foreign policy.

That the last decade of foreign policy as practiced by such individuals has been an absolute disaster even by the admission of many of those who put it into place will not phase those who nonetheless believe that the citizenry should be prevented from knowing what is being done in its name and with its tax dollars.

To the extent that the actions of a government are divorced from the informed consent of those who pay for such actions, such a government is illegitimate. To the extent that power is concentrated in the hands of small groups of men who wield such power behind the scenes, there is no assurance that such power will be used in a manner that is compatible with the actual interests of that citizenry, or populations elsewhere.

The known history of the US intelligence community is comprised in large part of murder, assassinations, disinformation, the topping of democratic governments, the abuse of the rights of US citizens, and a great number of other things that cannot even be defended on “national security” grounds insomuch as that many such actions have quite correctly turned entire populations against the US government.

This is not only my opinion, but also the opinion of countless individuals who once served in the intelligence community and have since come to criticize it and even unveil many of its secrets in an effort to alert the citizenry to what has been unleashed against the world in the name of “security.”

Likewise, I will here provide as much information as I can on Romas/COIN and its upcoming replacement.

Although the relatively well-known military contractor Northrop Grumman had long held the contract for Romas/COIN, such contracts are subject to regular recompetes by which other companies, or several working in tandem, can apply to take over.

In early February, HBGary Federal CEO Aaron Barr wrote the following email to Al Pisani, an executive at the much larger federal contractor TASC, a company which until recently had been owned by Northrop and which was now looking to compete with it for lucrative contracts:

"I met with [Mantech CEO] Bob Frisbie the other day to catch up. He is looking to expand a capability in IO related to the COIN re-compete but more for DoD. He told me he has a few acquisitions in the works that will increase his capability in this area.So just a thought that it might be worth a phone call to see if there is any synergy and strength between TASC and

ManTech in this area. I think forming a team and response to compete against SAIC will be tough but doable."

IO in this context stands for 'information operations', while COIN itself, as noted in an NDA attached to one of the e-mails, stands for 'counter intelligence'. SAIC is a larger intelligence contractor that was expected to pursue the recompete as well.

Pisani agreed to the idea, and in conjunction with Barr and fellow TASC exec John Lovegrove, the growing party spent much of the next year working to create a partnership of firms capable of providing the 'client' - a US agency that is never specified in the hundreds of emails that follow – with capabilities that would outmatch those being provided by Northrop, SAIC, or other competitors.

Several emails in particular provide a great deal of material by which to determine the scope and intent of Romas/COIN.

One that Barr wrote to his own email account, likely for the purpose of adding to other documents later, is entitled “Notes on COIN.” It begins with a list of entries for various facets of the program, all of which are blank and were presumably filled out later: “ISP, Operations, Language/Culture, Media Development, Marketing and Advertising, Security, MOE.”

Afterwards, another list consists of the following: “Capabilities, Mobile Development, Challenges, MOE, Infrastructure, Security.” Finally, a list of the following websites is composed, many of which represent various small companies that provide niche marketing services pursuant to mobile phones.

More helpful is a later e-mail from Lovegrove to Barr and some of his colleagues at TASC in which he announces the following:

"Our team consists of: - TASC (PMO, creative services) - HB Gary (Strategy, planning, PMO) - Akamai (infrastructure) - Archimedes Global (Specialized linguistics, strategy, planning) - Acclaim Technical Services (specialized linguistics) - Mission Essential Personnel (linguistic services) - Cipher (strategy, planning operations) - PointAbout (rapid mobile application development, list of strategic partners) - Google (strategy, mobile application and platform development - long list of strategic partners) - Apple (mobile and desktop platform, application assistance -long list of strategic partners) We are trying to schedule an interview with ATT plus some other small app developers."

From these and dozens of other clues and references, the following may be determined about the nature of Romas/COIN:


1. Mobile phone software and applications constitute a major component of the program.

2. There's a discussion of bringing in a “gaming developer,” apparently at the behest of Barr, who mentions that the team could make good use of “a social gaming company maybe like Zynga, Gameloft, etc.” Lovegrove elsewhere notes: “I know a couple of small gaming companies at MIT that might fit the bill.”

3. Apple and Google were active team partners, and AT&T may have been as well. The latter is known to have provided the NSA free reign over customer communications (and was in turn protected by a bill granting them retroactive immunity from lawsuits). Google itself is the only company to have received a “Hostile to Privacy” rating from Privacy International. Apple is currently being investigated by Congress after the iPhone was revealed to compile user location data in a way that differs from other mobile phones; the company has claimed this to have been a “bug.”

4. The program makes use of several providers of “linguistic services.” At one point, the team discusses hiring a military-trained Arabic linguist. Elsewhere, Barr writes: “I feel confident I can get you a ringer for Farsi if they are still interested in Farsi (we need to find that out). These linguists are not only going to be developing new content but also meeting with folks, so they have to have native or near native proficiency and have to have the cultural relevance as well.”

5. Alterion and SocialEyez are listed as “businesses to contact.” The former specializes in “social media monitoring tools.” The latter uses “sophisticated natural language processing methodology” in order to “process tens of millions of multi-lingual conversations daily” while also employing “researchers and media analysts on the ground;” its website also notes that “Millions of people around the globe are now networked as never before - exchanging information and ideas, forming opinions, and speaking their minds about everything from politics to products.”

6. At one point, TASC exec Chris Clair asks Aaron and others, “Can we name COIN Saif? Saif is the sword an Arab executioner uses when they decapitate criminals. I can think of a few cool brands for this.”

7. A diagram attached to one of Barr's e-mails to the group depicts Magpii as interacting in some unspecified manner with “Foreign Mobile” and “Foreign Web.” Magpii is a project of Barr's own creation which stands for “Magnify Personal Identifying Information,” involves social networking, and is designed for the purpose of storing personal information on users. Although details are difficult to determine from references in Barr's emails, he discusses the project almost exclusively with members of military intelligence to which he was pitching the idea.

8. There are sporadic references such things as “semantic analysis,” “Latent Semantic Indexing,” “specialized linguistics,” and OPS, a programming language designed for solving problems using expert systems.

9. Barr asks the team's partner at Apple, Andy Kemp (whose signature lists him as being from the company's Homeland Defence/National Programs division), to provide him “a contact at Pixar/Disney.”


Odyssey
Altogether, a successful bid for the relevant contract was seen to require the combined capabilities of perhaps a dozen firms – capabilities whereby millions of conversations can be monitored and automatically analysed, whereby a wide range of personal data can be obtained and stored in secret, and whereby some unknown degree of information can be released to a given population through a variety of means and without any hint that the actual source is US military intelligence.

All this is merely in addition to whichever additional capabilities are not evident from the limited description available, with the program as a whole presumably being operated in conjunction with other surveillance and propaganda assets controlled by the US and its partners.

Whatever the exact nature and scope of COIN, the firms that had been assembled for the purpose by Barr and TASC never got a chance to bid on the program's recompete.

In late September, Lovegrove noted to Barr and others that he'd spoken to the “CO [contracting officer] for COIN.”

“The current procurement approach is cancelled, she cited changed requirements,” he reported. “They will be coming out with some documents in a month or two, most likely an updated RFI [request for information]. There will be a procurement following soon after. We are on the list to receive all information."


On 18 January this year, Lovegrove provided an update:

“I just spoke to the group chief on the contracts side (Doug K). COIN has been replaced by a procurement called Odyssey. He says that it is in the formative stages and that something should be released this year. The contracting officer is Kim R. He believes that Jason is the COTR [contracting officer's technical representative].” Another clue is provided in the ensuing discussion when a TASC executive asks, “Does Odyssey combine the Technology and Content pieces of the work?”

The unexpected change-up didn't seem to phase the corporate partnership, which was still a top contender to compete for the upcoming Odyssey procurement.

Later emails indicate a meeting between key members of the group and the contracting officer for Odyssey at a location noted as “HQ,” apparently for a briefing on requirements for the new program, on 3 February. But two days after that meeting, the servers of HBGary and HBGary Federal were hacked by a small team of Anonymous operatives in retaliation for Barr's boasts to Financial Times that he had identified the movement's “leadership;” 70,000 emails were thereafter released onto the internet. Barr resigned a few weeks later.

Along with clues as to the nature of COIN and its scheduled replacement, a close study of the HBGary emails also provide reasons to be concerned with the fact that such things are being developed and deployed in the way that they are.

In addition to being the driving force behind the COIN recompete, Barr was also at the center of a series of conspiracies by which his own company and two others hired out their collective capabilities for use by corporations that sought to destroy their political enemies by clandestine and dishonest means, some of which appear to be illegal.

None of the companies involved have been investigated; a proposed Congressional inquiry was denied by the committee chair, noting that it was the Justice Department's decision as to whether to investigate, even though it was the Justice Department itself that made the initial introductions. Those in the intelligence contracting industry who believe themselves above the law are entirely correct.

That such firms will continue to target the public with advanced information warfare capabilities on behalf of major corporations is by itself an extraordinary danger to mankind, particularly insomuch as that such capabilities are becoming more effective while remaining largely unknown outside of the intelligence industry.

But a far greater danger is posed by the practice of arming small and unaccountable groups of state and military personnel with a set of tools by which to achieve better and better “situational awareness” on entire populations, while also being able to manipulate the information flow in such a way as to deceive those same populations.

The idea that such power can be wielded without being misused is contradicted by even a brief review of history.

It is inevitable, then, that such capabilities as form the backbone of Romas/COIN and its replacement Odyssey will be deployed against a growing segment of the world's population.

The powerful institutions that wield them will grow all the more powerful as they are provided better methods by which to monitor, deceive, and manipulate. The informed electorate upon which liberty depends will be increasingly misinformed.

No tactical advantage conferred by the use of these programs can outweigh the damage that will be done to mankind in the process of creating them.

http://www.scmagazine.com.au/News/26151 ... vered.aspx


And here's an email from Disney to HBGary requesting a meeting "to discuss your technology and how it may assist us with certain matters.": http://hbgary.anonleaks.ch/greg_hbgary_com/26795.html

Thanks Project PM! :evilgrin
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby JackRiddler » Thu Jun 23, 2011 2:30 am

.

Thanks P! I was going to post essentially the same text, from Brown's diary at

http://www.dailykos.com/story/2011/06/2 ... log_481394

Here's the graphic he linked to from the text:
Image
7. A diagram attached to one of Barr's e-mails to the group (http://imageshack.us/...) depicts Magpii as interacting in some unspecified manner with “Foreign Mobile” and “Foreign Web.” Magpii is a project of Barr's own creation which stands for “Magnify Personal Identifying Information,” involves social networking, and is designed for the purpose of storing personal information on users. Although details are difficult to determine from references in Barr's e-mails, he discusses the project almost exclusively with members of military intelligence to which he was pitching the idea.


What I read into all this as the obvious unnamed agency is NSA at the center of a spider's web of all-media surveillance and control inter-agency fusion programs, of which we're only seeing a small part described here. The NSA spying program initiated under Bush (prior to 9/11, but officially right after) and revealed by the NY Times in 2005 was most likely an umbrella order for many different initiatives toward a broad-based multi-platform comprehensive surveillance of everything and everyone. This is TIA, this is building a hundred panopticons, but requiring of each that they should tend toward full integration down the line and allow control functions.

Hm, should this be cross-posted on a dozen other threads? (Top Secret America, Threats to Internet Freedoms, How the Spooks Will Get You, etc. etc.)

.

Oh yeah: Fucking A. Motherfuckers.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The first global cyber war has begun

Postby crikkett » Thu Jun 23, 2011 10:56 am

:mad2

JUNE 22, 2011 5:27 PM PDT
Exclusive: Top ISPs poised to adopt graduated response to piracy
by Greg Sandoval

Some of the country's largest Internet service providers are poised to leap into the antipiracy fight in a significant way.

After years of negotiations, a group of bandwidth providers that includes AT&T, Comcast, and Verizon are closer than ever to striking a deal with media and entertainment companies that would call for them to establish new and tougher punishments for customers who refuse to stop using their networks to pirate films, music and other intellectual property, multiple sources told CNET.

The sources cautioned that a final agreement has yet to be signed and that the partnership could still unravel but added that at this point a deal is within reach and is on track to be unveiled sometime next month.

This has been in the works a long time. The Recording Industry Association of America (RIAA) and Motion Picture Association of America (MPAA), the respective trade groups for the four major record companies and six top Hollywood film studios, have labored for years to persuade ISPs to take a tougher antipiracy position. Under the proposed plan, participating bandwidth providers would adopt a "graduated response" to subscribers who repeatedly infringe copyrights. ISPs would first issue written warnings, called Copyright Alerts, to customers accused by content creators of downloading materials illegally via peer-to-peer sites, the sources said. Should a subscriber fail to heed the warning, an ISP could choose to send numerous follow-up notices. The plan, however, requires ISPs to eventually take more serious action.

Participating ISPs are given plenty of choices on how to respond to the toughest cases. They can select from a "menu" of responses outlined in the plan, such as throttling down an accused customer's bandwidth speed or limit their access to the Web. For example, a suspected pirate may be allowed to visit only the top 200 Web sites until the illegal file sharing stops. The subscriber may also be required to participate in a program that educates them on copyright law and the rights of content creators. In the past, a graduated response was also supposed to lead to a complete termination of service for chronic file sharers. Kicking someone off a network is not required under the proposed agreement, the sources said. As for who pays for all this, the ISPs and copyright owners will share the costs of operating the program, sources said.


The proposal appears to have the potential to become one of the most potent antipiracy strategies ever implemented. The ISPs involved provide Internet access to a large percentage of the U.S. population and because they are among the Web's most important gatekeepers, the network providers are in a unique position to act as copyright enforcers.Critics have argued that a graduated response doesn't allow for due process. They reject the notion that an ISP should penalize a customer based solely on accusations made by copyright owners.

White House helps shepherd deal

But enlisting the assistance of some of the top ISPs represents a major victory for the film and music industries and certainly, they had plenty of help. For starters, the National Cable and Telecommunications Industry has been involved in brokering the deal, the sources said. Some of the NCTA's members include Time Warner Cable, CableVision, Charter Communications, Comcast, and Qwest Communications, although not all members are participating in the agreement with the media companies, according to the sources.

Spokespeople for the NCTA, RIAA, and MPAA declined to comment. Representatives from some of the known participating ISPs, such as AT&T and Comcast, couldn't immediately be reached for comment.

In addition to the NCTA, the White House was also instrumental in encouraging the parties to reach an agreement, the sources confirmed. President Obama has said intellectual property is important to the country's economy and has vowed to step up the fight against piracy and counterfeiting. His administration has lobbied Congress the past several years to pass new pro-copyright legislation while instructing federal law enforcement to make antipiracy a priority.

As a result of those efforts, it's tough to deny that most of the momentum in the online copyright wars appears to be with content creators. In the past year, a federal court ruled that the top music file-sharing service LimeWire induced copyright infringed and ordered the network be shut down. In recent months, the U.S. Immigrations and Customs Enforcement (ICE) agency has seized domain names from dozens of sites accused of trafficking in pirated content or counterfeit goods. In the U.S. Senate, lawmakers are expected to pass legislation that would enable the government to block U.S. Internet users from accessing alleged pirates sites based overseas.

When it comes to the proposed agreement on graduated response, the term was sometimes referred to as a three-strikes plan. The sources who spoke to CNET said this isn't an accurate description of what the latest plan calls for, as an ISP gets to choose how many times to notify a customer before interrupting service.

If the term graduated response sounds familiar it's likely because of the RIAA. The trade group claimed in December 2008 that several ISPs, which were never identified, had agreed to adopt graduated-response programs to help the top record labels fight illegal file sharing. Up to that point, the RIAA's antipiracy strategy was built around filing lawsuits against individuals accused of piracy. After the RIAA abandoned the litigation campaign it did see several ISPs begin booting small numbers of people off their networks. In the years since, however, no major bandwidth provider openly acknowledged adopting a graduated response.

Sources in the music and film sectors said that their antipiracy measures, coupled with the emergence of popular legal services, such as Netflix and Amazon, which provide inexpensive content that is also easy to access, has put them in the best possible position to compete with Web piracy.

Read more: http://news.cnet.com/8301-31001_3-20073 ... z1Q6vt5a6f
crikkett
 
Posts: 2206
Joined: Sun Sep 09, 2007 12:03 pm
Blog: View Blog (5)

Re: The first global cyber war has begun

Postby Plutonia » Thu Jun 23, 2011 8:34 pm

At this point, agents of the state are pulling their hair out. Soon they will be jumping off of buildings. This thread should be re-named "cyber-geek-counter-intelligence war" cause it's all about information control, technology and skillz.

First the FBI: in a raid intended to nab Lulzsec's server, disrupts more than 100 businesses "making them more dangerous to the public in their pursuit of LulzSec than LulzSec has been in its entire existence."

FBI LulzSec server takedown fails

The FBI launched a raid against ISP company DigitalOne's servers Tuesday morning in an attempt to catch LulzSec. Digital One had already complied with these agencies in identifying which servers hosted the IP address they were after. The raiders took several enclosures of servers, rather than the servers. The confusion apparently came from DigitalOne's use of a blade system, in which multiple servers are stored on a single Chasis. Even accounting for this confusion, the question remains: why confiscate the server?

If the FBI wanted to prevent its usage, they've failed. The server could be copied and replaced overnight with no harm. If the FBI wanted the data on the server, they could have asked for a copy. If the FBI wanted to monitor traffic, they could have inserted any number of digital surveilance programs. Instead, they decide to take the server. Is this a new bugdet-cutting initiative?

And all of this nonsensical action in order to catch LulzSec. As the New York Times reports:

A government official who declined to be named said earlier in the day that the F.B.I. was actively investigating the Lulz Security group and any affiliated hackers. The official said the F.B.I. had teamed up with other agencies in this effort, including the Central Intelligence Agency and cybercrime bureaus in Europe.

So the CIA, the FBI, and some European cybercrime bureaus walk into a bar at 1am. They confiscate the fine wine that LulzSec sipped a week ago, along with all of the wine in the bar, putting it out of business for three days because LulzSec may or may not have been there.

This is what Sun Tzu calls Supreme Excellence.

And before assuming 'necessary evil,' readers should note that the collateral from the FBI's actions has affected over 100 companies, making them more dangerous to the public in their pursuit of LulzSec than LulzSec has been in its entire existence.

http://www.examiner.com/anonymous-in-na ... down-fails


Second: HBGary was in the running to supply NATO's InfoSec needs - just weeks before the Aaron Barr hack bwahahaha:

From: Bob Slapnik [mailto:bob@hbgary.com]
Tue, 9 Nov 2010 12:35:40 -0500
To: Torrente Sabina [Internet]
"'Phil Wallisch'" <phil@hbgary.com>,"'Penny Leavy'" <penny@hbgary.com>,<sam@hbgary.com>,<butter@hbgary.com>
Subject: NATO POC

Team,

NATO wants the onsite eval to happen on Jan 10-11, 2011. Is everybody OK with these dates? Want me to push for a third day?

I like the idea of sending Phil and Jim. Given their extensive history with EE and Jim knowing many of these people, it makes sense to send Jim with Phil. Besides the revenue we can get from NATO, they would be a showcase account for all of Europe.

Thoughts?

Bob

cont.

http://hbgary.anonleaks.ch/phil_hbgary_com/9950h.html


(Aside: Recent puff-piece interview with "respected authority on computer security" lol Barr: http://threatpost.com/en_us/blogs/barr- ... sec-061511)

Last; LulzSec continues to rule the internets:

Breaking: LulzSec leaks Arizona law enforcement papers

Rob Beschizza at 3:56 PM Thursday, Jun 23, 2011

LulzSec just now announced a trove of leaked material from Arizona law enforcement agencies, made available as a 446MB torrent. [link at bb]

"We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.

The documents classified as "law enforcement sensitive", "not for public
distribution", and "for official use only" are primarily related to border
patrol and counter-terrorism operations and describe the use of informants to
infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest
movements.

Every week we plan on releasing more classified documents and embarassing
personal details of military and law enforcement in an effort not just to reveal
their racist and corrupt nature but to purposefully sabotage their efforts to
terrorize communities fighting an unjust "war on drugs".

Hackers of the world are uniting and taking direct action against our common
oppressors - the government, corporations, police, and militaries of the world.
See you again real soon! ;D"


http://www.boingboing.net/2011/06/23/br ... c-lea.html


Some thoughts:

-Right now, NO ONE trusts their InfoSec.

-Law enforcement haven't a clue. All they've got right now is a 19 kid who was doxed (publicly ID'd) by LulzSec 'cause he was going to snitch.

-Being unable to protect their information right now, this minute, conspiratorial organizations are going to be internally focused, racing to track down, limit access to, move, and hide their databases without any way to tell who to trust to do it effectively, save simply unplugging.

Ergo, Assange's theory of governance/conspiracy is now no longer just theory:

An authoritarian conspiracy that cannot think is powerless to preserve itself against the opponents it induces
When we look at an authoritarian conspiracy as a whole, we see a system of interacting organs, a beast with arteries and veins whose blood may be thickened and slowed until it falls, stupefied; unable to sufficiently comprehend and control the forces in its environment.
Later we will see how new technology and insights into the psychological motivations of conspirators can give us practical methods for preventing or reducing important communication between authoritarian conspirators, foment strong resistance to authoritarian planning and create powerful incentives for more humane forms of governance.

http://www.mara-stream.org/think-tank/j ... overnance/
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 162 guests