Operation AntiSec – Wikipedia

not to be confused with Antisec Movement Series of cyberattacks conducted by Anonymous and LulzSec

An double that Anonymous has used to represent the process ; it contains elements of symbols used to represent both Anonymous and LulzSec

Operation Anti-Security, besides referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of the hacking group LulzSec and Anonymous, and others inspired by the announcement of the process. LulzSec performed the earliest attacks of the operation, with the beginning against the Serious Organised Crime Agency on 20 June 2011. soon after, the group released information taken from the servers of the Arizona Department of Public Safety ; Anonymous would subsequently release information from the same agency two more times. An outgrowth of the group calling themselves LulzSecBrazil launched attacks on numerous websites belonging to the Government of Brazil and the energy company Petrobras. LulzSec claimed to retire as a group, but on 18 July they reconvened to hack into the websites of british newspapers The Sun and The Times, posting a juke news fib of the death of the publication ‘s owner Rupert Murdoch. Anonymous released their first cache of the operation on 27 June 2011, taken from an anti- cyberterrorism program run by the United States Department of Homeland Security and Federal Emergency Management Agency. They continued attacks on the Arizona government. They besides launched attacks against the governments of Brazil, Zimbabwe, and Tunisia. Their most late attacks have been against boastfully corporations, NATO, and versatile United States police enforcement websites. Anonymous has used the stolen credit wag numbers of patrol officers to make unauthorized donations to versatile causes. Others have besides committed hacks in the name of the operation, including a hack into the Fox News Twitter account to post a false news program narrative about the assassination of President of the United States Barack Obama and attacks on the websites of government entities in diverse countries. The groups involved have published sensitive government and corporate information, angstrom good as the e-mail addresses, names, and social security numbers, and accredit batting order numbers of web site users. Law enforcement has launched investigations into many of the attacks committed as partially of Operation AntiSec. At least seven arrests have been made in connection to activities related to the operation, including the arrests of two aim LulzSec members, a man who provided LulzSec with security vulnerability information, and four alleged members of AntiSec NL, a group inspired by the operation .

background [edit ]

The LulzSec hacking group formed in May 2011 and came to external prominence after hacking the websites of the Public Broadcasting Service, Sony, and the United States Senate. [ 1 ] [ 2 ] Initially, the group claimed to hack “ for the lulz ” and to enjoy the chaos that follows their intrusions. [ 3 ] [ 4 ] however, on 20 June 2011, the group announced that they were teaming up with hacking collective Anonymous for a series of attacks they dubbed Operation Anti-Security or Operation AntiSec. The press dismissal accompanying the begin of the operation called for supporters to steal and publish classify government documents under the identify AntiSec. major banks and corporations were besides mentioned as electric potential targets. [ 5 ] Though LulzSec disbanded as a group on 26 June 2011, members have been reported to be continuing the operation from within Anonymous. [ 6 ] [ 7 ] The groups involved call that the operation aims to protest government censoring and monitoring of the internet. [ 8 ] LulzSec members besides mention ending what they believe are corrupt racial profile and copyright laws as a goal of the operation. [ 9 ] The War on Drugs has besides been given as a reason for especial hacks. [ 10 ] In contrast, USA Today described the process as cyberwarfare targeting governments and large corporations. [ 11 ]

LulzSec activities [edit ]

LulzSec launched the first attacks of the operation against the Serious Organised Crime Agency, the national law enforcement representation of the United Kingdom that handles cybercrime. The group launched a distributed denial-of-service assail against the agency ‘s web site on 20 June, taking it offline for lone a few minutes. [ 12 ] On the lapp day, they knocked the web site of the Jianhua District in Qiqihar, China, offline. [ 13 ] On 23 June, the group released a big cache of documents taken from the servers of the Arizona Department of Public Safety. The publish, titled “ chinga la migra ”, approximately translating to “ fuck the edge patrol “, including electronic mail addresses and passwords and hundreds of documents marked “ sensitive ” or “ for official use only ”. [ 14 ] The group claimed that they did thus in retaliation for the passage of Arizona SB 1070, a law they saw as leading to unjust racial profile. [ 15 ] Arizona complained that the spill of officer identities and the personal data of their families could put them and their families in risk and gave those uncover security protection. In reaction, they mobilized the Arizona Counter Terrorism Information Center and locked distant access of Department of Public Safety e-mail accounts. [ 16 ] On 25 June 2011, the group released what they described as their death dump of the operation. The release contained a boastfully come of information from varied sources. Included was information from numerous companies, including half a gigabyte of data from telecommunications company AT & T and IP addresses from Sony, Viacom, Disney, EMI, and NBC Universal. [ 17 ] [ 18 ] The AT & T helping included information refer to the free of the 4G LTE, 90,000 personal phones used by IBM, and the development of the iPad 3. [ 18 ] [ 19 ] It besides contained over 750,000 usernames and password combinations, including 200,000 from hackforums.net, 12,000 from the NATO on-line bookshop, 500,000 from the on-line television bet on Battlefield Heroes, 50,000 from versatile video bet on forums, and 29 from irish private probe company Priority Investigations. [ 18 ] Finally, an internal manual for AOL engineers and a screencapture of the United States Navy web site navy.mil after being vandalized. [ 18 ] On 22 June, an outgrowth of the group calling themselves LulzSecBrazil took down the web site of the Government of Brazil, brasil.gov.br, and the President of Brazil, presidencia.gov.br. [ 20 ] [ 21 ] They besides targeted the web site of brazilian energy company Petrobras. [ 22 ] On 24 June, they claimed to publish access codes and passwords to the Petrobras web site along with personnel profiles. however, the company denied that any information had been stolen, and the group removed the claim from their Twitter run a few hours late. [ 23 ] The group besides published the personal information of President of Brazil Dilma Rousseff and Mayor of São Paulo Gilberto Kassab. [ 24 ] Despite claiming to have retired, on 18 July LulzSec hacked into the web site of british newspaper The Sun. [ 25 ] The group redirected the newspaper ‘s web site to an also-hacked redesign web site of another newspaper The Times, altering the web site to resemble The Sun and posting a fake report claiming that Rupert Murdoch had died after ingesting a fatal dose of palladium. [ 26 ] They objected to the affair of News Corporation, the Murdoch-owned party that publishes The Sun and The Times, in a large earphone hacking scandal. The hack web site besides contained a webcomic depicting LulzSec deciding on and carrying out the attack. [ 25 ] [ 27 ] The group by and by redirected The Sun web site to their Twitter feed. News International released a affirmation regarding the attacks before having the page the argument appeared on besides redirected to the LulzSec Twitter page and finally taken offline. The group besides released the names and call numbers of a reporter for The Sun and two others associated with the newspaper and encouraged their supporters to call them. [ 28 ] The group further included an old electronic mail address and password of former News International executive Rebekah Brooks. [ 28 ] News Corporation took the websites offline as a precaution late in the day. [ 29 ]

anonymous activities [edit ]

June 2011 [edit ]

On 27 June 2011, Anonymous published data relating to the Cyberterrorism Defense Initiative ‘s Security and Network Training Initiative and National Education Laboratory broadcast, or Sentinel broadcast, an operation run by the United States Department of Homeland Security and Federal Emergency Management Agency. The cab included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of Federal Bureau of Investigation agency locations, details on counter-hacking tools, and form letters that police enforcement agencies used to obtain exploiter details from internet overhaul providers. [ 30 ] On 28 June, the group released the second base solicitation of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed “ Chinga la Migra Communique Dos ”, or “ Fuck the Border Patrol Message Two ”, the data charge contained the names, addresses, phone numbers, internet passwords, and social security numbers of a twelve Arizona police officers. It besides contained the emails, voicemails, chat logs of some of them ; in at least one exemplify it included sexually explicit photograph from one of the military officer ‘s girlfriends. [ 31 ] Anonymous besides claimed that the documents included officers forwarding racist chain emails, attest of K-9 unit officers using percocet, and a fraternal order of Police extremity who is besides a convicted sex wrongdoer. [ 31 ] Anonymous noted that their motivation stemmed from a hope to make patrol officers “ experience equitable a taste of the lapp kind of violence and terror they dish out on an every day footing. ” [ 31 ] On the same day, the group released information obtained from diverse government sources. Government data from Anguilla, passwords from servers belonging to the Government of Brazil, the users of zimbabwe government websites, and data from the Municipality of Mosman council were included. [ 32 ] The Mosman council dump included chiefly publicly available information from the web site vitamin a well as a not-publicly-available prototype interpretation of the web site that had not yet been launched. [ 33 ] They claimed to besides have access to all zimbabwean government websites ending in gov.zw. [ 32 ] Most of the information and command were given through SQL injection. Anonymous claimed they targeted Brazil for what they saw as data manipulation and Zimbabwe for the controversial 2008 Zimbabwean presidential election. [ 34 ] They besides gained control of a web site belong to the Government of Tunisia. They replaced the web page with a graphic representing anonymous with text reading “ The Internet is the last frontier and we will not let corrupt governments spoil it. We are anonymous, We are LulzSec, We are people from around the earth who are stepping in the appoint of freedom ”. [ 35 ] The release besides included a file containing inner map of Viacom servers equally well as passwords and data from umusic.com, a web site of Universal Music Group. [ 34 ] They besides released the names of 2,800 members of the Black Eagles paramilitary group. [ 36 ]

July 2011 [edit ]

On 1 July, Anonymous once again targeted Arizona jurisprudence enforcement by publishing a number of backdoors that could be used to access Arizona patrol servers to Pastebin. Arizona was forced to pull many websites offline for a time. [ 37 ] Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They besides claimed to have found “ anti- Muslim “ emails during the attack. [ 38 ] On 3 July, Anonymous hacked into the database of the Democratic Party of Orange County, Florida. They published a partial derivative membership number and a handbook for precinct committee members. The chop was besides considered depart of the group ‘s OpOrlando plan. [ 39 ] On 4 July, Anonymous released a text file containing 27 administrative usernames and passwords from an Apple Inc. system used to operate on-line technical accompaniment follow-up surveys. [ 40 ] [ 41 ] The code passwords were taken from an SQL database. [ 42 ] anonymous launched what it dubbed “ turkish Takedown Thursday ” on 6 July. They posted inner data from over one hundred .tr websites and brought down and replaced the subject of 74 of them. [ 43 ] The 74 sites had their normal pages replaced with an Antisec logo and a message denouncing supposed attempts at internet censoring by the turkish government. [ 44 ] Websites affected included that of a children ‘s hospital, but not of any key government agencies. [ 45 ] On the same day, the group released database dumps taken from 20 universities in Italy. Two days subsequently, italian patrol arrested 15 alleged members of anonymous ranging in age from 15 to 28. The group vowed revenge for the raids. [ 46 ] On 8 July, the group claimed duty for hacks against IRC Federal, an engineer firm that contracts with the Federal Bureau of Investigation and other agencies of the United States federal government. Internal database documents and personnel email were stolen during the attack. The group besides claimed to have vandalized the firm ‘s web site and forcing them to take it offline. The group says that in the documents procured, they found a proposal to the FBI for the firm to produce a “ particular Identities Modernization ( SIM ) project ” that would help identify those who might present a criminal or terrorist hazard in the future, fingerprinting contracts with the United States Department of Justice, and biometrics contracts with the military. [ 47 ] They besides claimed to have obtained information allowing them to log into assorted virtual individual networks and access panels belonging to the United States Department of Energy. They besides sent a message to company employees urging them to work against the politics rather than for it. [ 48 ] The hack was done with a dim-witted SQL injection. [ 49 ] On 11 July, Anonymous hacked into systems belonging to defense contractor Booz Allen Hamilton, breaking through barriers that the group described as having “ no security measures in place. ” They released what they said were 90,000 e-mail accounts and code passwords from United States Central Command, United States special Operations Command, the United States Marine Corps, the United States Air Force, the United States Department of Homeland Security, United States Department of State, and versatile individual sector contractors, calling the released “ military Meltdown Monday ”. [ 50 ] [ 51 ] They besides sarcastically posted an invoice charging the company for “ security system audit services rendered ”. [ 51 ] Despite Anonymous ‘ claims that 90,000 emails were released, the Associated Press counted lone 67,000 alone emails, of which lone 53,000 were military addresses. The remainder of the addresses came from educational institutions and defense contractors. [ 52 ] The Department of Defense said they were aware of the incident and were coordinating with other agencies for a reception. [ 53 ] Booz Allen confirmed the intrusion on 13 July, but contradicted Anonymous ‘ claims in saying that the attack never got past their own systems, meaning that information from the military should be guarantee. [ 54 ] On 12 July, the group attacked the web servers of agrarian biotechnology company Monsanto and released information on the company ‘s employees, including names, addresses, and e-mail addresses. The group claimed they performed the attack to protest the party ‘s lawsuits against farmers who manufacture organic milk in an campaign to stop them from stating on the pronounce that their milk does not contain artificial Bovine Growth Hormones. [ 55 ] Monsanto confirmed the attack but claimed that alone about ten-spot percentage of the information published came from current or former employees of the company. They said that the other ninety percentage were e-mail addresses and names of media contacts and employees of other agrarian companies. [ 56 ] On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. They claimed via Twitter to have obtained around one gigabyte of data that they would release portions of over the course of a few days. The group claimed that some of the data was so sensible that they felt it would be irresponsible to release, and therefore would only make a part of what was taken available. The first two documents released relate to outsourcing communication and information services ( CIS ) in Kosovo and the fund request for the stick out. [ 57 ] [ 58 ] The austrian branch of Anonymous hacked the web site of the austrian Gebühren Info Service, the television license agency run by the austrian national public service broadcaster, on 22 July. They accessed 214,000 records containing personal information and stole the banking data of 96,000 people from the waiter. The counter-terrorism chest of drawers of the nation launched an investigation and were preparing to file criminal complaints against those involved. [ 59 ] On 25 July, first posted confidential information that they claimed came from the italian Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche, translated as the National Anti-Crime Computer Center for Critical Infrastructure Protection, an representation tasked with protecting vital calculator systems for the nation. The Twitter account @ anonesc posted less than 100 megabytes of data, but they claimed to have taken over eight gigabytes. The datum related to vegetable oil, nuclear, and early firms deemed to be involved in “ critical infrastructure ”, angstrom well as politics agencies including the Department of Defence of Australia. [ 60 ] On 29 July, Anonymous hacked the FBI-contractor ManTech International. They posted a PDF of a résumé sent into the company as proof that they had infiltrated their systems. Anonymous claimed that the attack would be the first depart of a promised “ Fuck FBI Friday ”, or FFF, campaign as part of the larger Operation AntiSec. [ 61 ] They published 400 megabytes of message from the company later the same day. The inner documents generally concern contracts that ManTech has with NATO, the nature of which Anonymous claims shows a waste of taxpayer money. [ 62 ] The files besides include dealings with the United States Army and a number of employee emails. [ 63 ]

On 31 July, Anonymous attacked the websites of 77 different jurisprudence enforcement websites hosted on the same server. ampere a lot as 10 gigabytes of data was taken, including the personal information of patrol officers from numerous jurisdictions. Emails were besides taken, adenine well as the confidential information of inmates and confidential informants, though not released yet. Anonymous said that they would redact inpatient names but would release the names of all “ informants who had the false impression that they would be able to ‘anonymously ‘ fink in privacy. ” The release besides included a demand that all arrested members of anonymous be released immediately. [ 64 ] Some of the information released, however, was already publicly available. [ 65 ] They proceeded to release the social security numbers of over 100 police officers from the Missouri Sheriffs ‘ Association web site. [ 66 ] The follow Saturday, 6 August, they released a hoard of data from the websites title “ Shooting Sheriffs Saturday Release ” which included the information taken from law enforcement websites. bombastic amounts of personal information was included, with Anonymous stating, “ We have no sympathy for any of the officers or informants who may be endangered by the spill of their personal information. For excessively long they have been using and abusing our personal data. ” [ 67 ] Anonymous claimed that their motive was retaliation over the arrests of a number of participants in previous operations and of LulzSec and Anonymous extremity Topiary. They besides used stolen credit card numbers to make donations to the American Civil Liberties Union, Electronic Frontier Foundation, and the Chelsea Manning Support Network. [ 67 ]

August 2011 [edit ]

On 16 August, Anonymous gained access to the electronic mail history of Richard Garcia, erstwhile adjunct film director in care of the FBI field office in Los Angeles and senior frailty president of Vanguard Defense Industries, in the name of AntiSec. They claimed that the firm ‘s relationships with United States military and law enforcement organizations made it a legalize target as function of the mathematical process. They besides claimed to have breached the company ‘s web site, which was run on a WordPress platform, though the party says that their web site was never affected. [ 68 ] The group released 1 gigabyte of information three days later, all of it taken from Garcia ‘s personal electronic mail history ; it chiefly related to Garcia ‘s former role with InfraGard. [ 69 ]

September 2011 [edit ]

In retaliation for arrests of people who allegedly participated in Operation AntiSec, and specially Topiary, Anonymous attacked the web site of the Texas Police Chiefs Association. On 1 September, the group defaced the web site and released documents from it marked “ law enforcement sensitive ” and “ for official use lone ”. The release besides included patrol officeholder private e-mail. The same day, the group brought down the web site of the United States Court of Appeals for the Ninth Circuit for the justice arrangement ‘s word picture of anonymous activities as “ cyber-terrorism ”. [ 70 ]

October 2011 [edit ]

On 21 October, announced a dump of data related to law enforcement in subscribe of the Occupy Wall Street and Occupy drift. The deck including data taken from the International Association of Chiefs of Police, Boston Police Patrolmen ‘s Association, and the Sheriff ‘s agency of Baldwin County, Alabama. A total of police websites about hosted together besides had their subject replaced with an anti-police rap video. [ 71 ] The dump 600 megabytes of information including membership rosters, internal documents, and sociable security numbers from the International Association of Chiefs of Police ; closely 1000 names, ranks, addresses, call numbers, and social security numbers of patrol officers in Jefferson County, Alabama, and Birmingham, Alabama ; 1000 names and passwords of members of the Boston Police Patrolmen ‘s Association ; and the fiscal information and client list of web developer and marketing ship’s company Matrix Group, a clientele with several law enforcement clients. [ 71 ] [ 72 ] AntiSec claimed that at least 40 law enforcement related websites were included in the attack. [ 73 ]

November 2011 [edit ]

On 18 November 2011, Anonymous posted 38,000 e-mail messages from the Gmail report of Alfredo “ Fred ” Baclagan, a particular agent supervising calculator crime investigations with the California Department of Justice and the Computer and Technology Crime Hightech Response Team, to a site on Tor and to The Pirate Bay. [ 74 ] [ 75 ] They besides added what they claimed were Baclagan ‘s personal home address and telephone number. The group claimed the action as part of their approach on law enforcement in support of the Occupy movement and in protest for prosecution of calculator criminals in general. They besides claimed to have read his text messages, listened to his voice mail, and used his Google Voice account to call and text his friends and family. [ 74 ] They besides purchased a television camera using his Google Wallet. [ 75 ] The passing includes forensic experts discussing techniques for tracking cybercriminals and how different companies respond to law enforcement requests for information. [ 75 ]

September 2012 [edit ]

On 4 September 2012, 1 million singular device IDs for Apple products were published by a group associated with Anonymous. [ 76 ] The group claimed that the 1 million IDs were part of a dataset of 12.36 million records taken from an FBI laptop. [ 76 ] The FBI responded by saying they were not mindful of any unauthorized datum release. [ 77 ] According to an Ars Technica article published on 10 September :

A digital publish party named BlueToad has come forward to take responsibility for the leak of a million io alone device identifiers ( UDIDs ) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the company ‘s systems in orderliness to steal the charge. [ 78 ]

Actions by early groups and individuals [edit ]

The original announcement of Operation Anti-Security included a call from LulzSec to spread the appoint “ AntiSec ” through physical graffito. [ 11 ] A few days after, a number of locations in Mission Beach, San Diego, were vandalized with pieces of graffito reading the give voice. [ 79 ] [ 80 ]
On 4 July, a Fox News Twitter account ( @ foxnewspolitics ) was hacked and assumed tweets reporting that President of the United States Barack Obama has been shot three times and killed were sent from the score. [ 81 ] The Script Kiddies, a group with close ties to anonymous including two hackers with former membership in the group, claimed province for the attack and fraud. The group claimed that the legal action was in the diagnose of Operation Anti-Security and that they would continue looking to expose information on corporations “ to assist with antisec. ” [ 82 ] The United States Secret Service is investigating the incident as a menace on the President. [ 83 ] The group subsequently hacked into the Facebook page of pharmaceutical caller Pfizer, claiming they did so for “ moral reasons ” as function of AntiSec. [ 84 ] They posted numerous messages to the ship’s company ‘s Facebook wall mocking their security. [ 85 ]
On 4 July, person going by the name f1esc posted a file to The Pirate Bay containing 600 megabytes of information described as home “ AU election data ” and labelled with the chase # Antisec. In reality, the data concerned the 2011 New South Wales department of state election and was taken from a politics web site designed to provide election results where the datum was publicly available, and the data proved freely accessible information rather of a hack. [ 86 ]
In early July, the group RedHack hacked into and defaced over 1000 websites based in Turkey. They claimed to do then both to mark the anniversary of the Sivas slaughter and as depart of Operation Anti-Security. The websites belonged both to agencies of the Government of Turkey and Adnan Oktar, an Islamic creationist. The group vowed to continue contribution to the AntiSec operation. [ 87 ]
On 6 July, a hacker called p0keu released of around 2,658 usernames, passwords hidden behind hash functions, and email addresses from the blog TamilCanadian.com. He gave no reason for why he chose the web site to attack early than that he did thus under the AntiSec label. [ 88 ] On 14 July, he leaked part of the Stevens Institute of Technology web site database. At least 31 of the records in the database contained plain textbook files with electronic mail addresses, exploiter names, and passwords of locate users. p0keu posted the user information to Pastebin. [ 89 ] p0keu has continued hack, but has not labelled all of his releases with the AntiSec motto. [ 90 ]
In the Netherlands, a splinter group inspired by LulzSec formed, calling themselves AntiSec NL. The group hacked into the websites of on-line dating service pepper.nl and software ship’s company Nimbuzz. Four people believed by patrol to be members were later arrested. [ 91 ]
On 24 July, a group called BashCrew hacked the web site of the House of Representatives of the Philippines in the diagnose of AntiSec. The names, telephone numbers, and electronic mail addresses of members of the Filipino Congress were released via Pastebin, with the group claiming that they may besides release blood types and the private websites of some members. [ 92 ]
A hacker going by the appoint Thehacker12, a self-purported AntiSec patron but not a penis of Anonymous, released data stolen from consequence management company allianceforbiz.com on 24 August 2011 on Mediafire and Pastebin. The release contained a spreadsheet of usernames, electronic mail addresses, passwords, employers, and early information of around 20,000 people, many of them United States government employees or contractors. The constitution with the most employees compromised was the Small Business Administration. [ 93 ]

Law enforcement response [edit ]

Law enforcement agencies in respective countries have arrested or searched the property of alleged participants in Operation AntiSec. These suspects have come from different groups who carried out attacks as part of the operation. On 19 July 2011, the London Metropolitan Police announced the halt of potential core LulzSec member T-flow. A 16-year-old male was arrested in South London on charges of violating the Computer Misuse Act as contribution of an operation involving the arrest of several other hackers affiliated with Anonymous in the United States and United Kingdom. [ 94 ] [ 95 ] On the lapp day, the FBI arrested 21-year-old Lance Moore in Las Cruces, New Mexico. He was accused of stealing thousands of documents and applications from AT & T that LulzSec published as part of their alleged “ final release ” of the operation. LulzSec denied that any of their membership had been arrested, stating “ there are six of us, and we ‘re all still hera. ” [ 91 ] On 11 July, prosecutors in the Netherlands released details of the arrests of four suspects aged 17, 18, 25, and 35. All were located in different Dutch and cities and accused of being separate of the hacking group AntiSec NL, an operation participant inspired by LulzSec. The four, going by the on-line handles Ziaolin, Calimero, DutchD3V1L, and Time, were arrested on 19 July and their computers and electronic equipment confiscated as evidence. Prosecutors identified the suspects after computer security company Fox-IT helped them gain access to a old world chat channel thought to be used by the group. [ 91 ] The Police Central E-Crime Unit arrested an 18-year-old man from Shetland on 27 July 2011 suspected of being LulzSec member Topiary. They besides searched the sign of the zodiac of and interviewed a 17-year-old from Lincolnshire possibly connected to the probe. [ 96 ] Scotland Yard late identified the man arrested as Yell, Shetland resident Jake Davis. He was charged with unauthorized access of a computer under the Computer Misuse Act 1990, encouraging or assisting criminal activeness under the Serious Crime Act 2007, conspiracy to launch a denial-of-service attack against the Serious Organised Crime Unit reverse to the Criminal Law Act 1977, and criminal conspiracy besides under the Criminal Law Act 1977. [ 97 ] Police confiscated a Dell laptop and a 100-gigabyte hard drive that ran 16 different virtual machines. Details relating to an attack on Sony and hundreds of thousands of electronic mail addresses and passwords were found on the calculator. [ 98 ] A London court released Davis on bail under the conditions that he live under curfew with his parents and have no access to the internet. His lawyer Gideon Cammerman stated that, while his client did help publicize LulzSec and Anonymous attacks, he lacks the technical skills to have been anything but a sympathizer. [ 98 ] In early September 2011, Scotland Yard made two further arrests relating to LulzSec. Police arrested a 24-year-old male in Mexborough, South Yorkshire, and a 20-year-old male in Warminster, Wiltshire. The two are accused of conspiring to commit offenses under the Computer Misuse Act of 1990 ; police said that the arrests related to investigations into LulzSec penis Kayla. [ 99 ] On 6 March 2012, two men from Great Britain, one from the United States, and two from Ireland were charged in connection to their alleged affair with LulzSec. The FBI revealed that supposed LulzSec drawing card Hector Xavier Monsegur, who went by the username Sabu, had been aiding jurisprudence enforcement since pleading guilty to twelve counts, including conspiracy and calculator hack, on 15 August 2011 as part of a supplication deal. [ 100 ] In exchange for his cooperation, federal prosecutors agreed not to prosecute Monsegur for his computer hack, and besides not to prosecute him for two attempts to sell cannabis, possession of an illegal pistol, purchasing stolen property, charging $ 15,000 to his former employer ‘s credit card in a shell of identity larceny, and directing people to buy prescription drug drugs from illegal sources. He still faces a misdemeanor tear of impersonating a federal agentive role. [ 101 ] Five suspects were charged with conspiracy : Jake Davis, accused of being the hacker “ topiary ” ( who had been previously arrested ) ; Ryan Ackroyd of London, accused of being “ Kayla ” ; Darren Martyn of Ireland, accused of being “ pwnsauce ” ; Donncha O ’ Cearrbhail of Ireland, accused of being “ palladium ” ; and Jeremy Hammond of Chicago, accused of being “ Anarchaos ”. While not a penis of LulzSec, authorities suspect Hammond of being a penis of Anonymous and charged him with access device fraud and hack in relative to his supposed interest in the December 2011 assail on intelligence company Stratfor as separate of Operation AntiSec. [ 100 ]

References [edit ]

beginning : https://coinselected.com
category : crypto topics

Leave a Reply

Your email address will not be published.