SlideShare a Scribd company logo
1 of 119
1.What is Hacktivism
Well it’s a portmanteau of…
1.What is Hacktivism
Well it’s a portmanteau of…
Hacking…
1.What is Hacktivism
Well it’s a portmanteau of…
Hacking…
and activism.
So what is hacking?
NotThis.
What is Hacking?
 OK, so there is a humor element…
What is Hacking?
 OK, so there is a humor element…
But what else?
What is Hacking?
 OK, so there is a humor element…
But what else?
New Hacker’s Dictionary (1998):
1) A person who enjoys exploring the details of
programmable systems and how to stretch their
capabilities, as opposed to most users, who prefer to learn
only the minimum necessary.
What is Hacking?
 OK, so there is a humor element…
But what else?
New Hacker’s Dictionary (1998):
6) An expert or enthusiast of any kind. One might be an
astronomy hacker, for example.
What is Hacking?
 OK, so there is a humor element…
But what else?
New Hacker’s Dictionary (1998):
7) One who enjoys the intellectual challenge of creatively
overcoming or circumventing limitations.
What is Hacking?
 OK, so there is a humor element…
But what else?
MIT Jargon File (2000):
1) An appropriate application of ingenuity
What is Hacking?
 OK, so there is a humor element…
But what else?
MIT Jargon File (2000):
1) An appropriate application of ingenuity
What is Hacking?
 OK, so there is a humor element…
But what else?
In short: the reapplication of technology for uses not
originally intended.
Example
What is Hacking?
Repurposing technology: The phonograph (0riginally
intended as message recording tool)
Hacking the phonograph
But this includes…
But this includes…
A respect for traditional technologies
It also includes:
Learning and Sharing the Knowledge
Learning and Sharing the
Knowledge
Information wants to be free!
So Hacking is…
1. Repurposing technology
So Hacking is…
1. Repurposing technology
2. Understanding technology and how it works
So Hacking is…
1. Repurposing technology
2. Understanding technology and how it works
3. Sharing the knowledge
So Hacking is…
1. Repurposing technology
2. Understanding technology and how it works
3. Sharing the knowledge
4. Some lulz
Hacking + Activism =
Hacking + Activism =
Visiting DDB
Expecting this…
Daniel and Anke in garden
Anke knit hacking
So what is hacktivism?
Involves…
1. Repurposing ofTechnology
So what is hacktivism?
Involves…
1. Repurposing ofTechnology
2. Better understanding of technology (including traditional
technologies)
So what is hacktivism?
Involves…
1. Repurposing ofTechnology
2. Better understanding of technology (including traditional
technologies)
3. Promoting education of these technologies (they should
not be foreign to us).
So what is hacktivism?
Involves…
1. Repurposing ofTechnology
2. Better understanding of technology (including traditional
technologies)
3. Promoting education of these technologies (they should
not be foreign to us).
4. Possibly with a sense of whimsy
So what is hacktivism?
Involves…
1. Repurposing ofTechnology
2. Better understanding of technology (including traditional
technologies)
3. Promoting education of these technologies (they should
not be foreign to us).
4. Possibly with a sense of whimsy
5. Done for a social cause.
The Rise of Hacktivism
The Mentor
The Mentor: Conscience of a
Hacker (1986)
Another one got caught today, it's all over the papers.
"Teenager Arrested in Computer Crime Scandal", "Hacker
Arrested after BankTampering"...
Damn kids. They're all alike.
The Mentor 2
But did you, in your three-piece psychology and 1950's
technobrain, ever take a look behind the eyes of the
hacker? Did you ever wonder what made him tick, what
forces shaped him, what may have molded him?
I am a hacker, enter my world...
The Mentor 3
Mine is a world that begins with school... I'm smarter than
most of the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
The Mentor 4
I made a discovery today. I found a computer. Wait a second,
this is cool. It does what I want it to. If it makes a mistake,
it's because I screwed it up. Not because it doesn't like
me... Or feels threatened by me...Or thinks I'm a smart
ass... Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
The Mentor 6
You bet your ass we're all alike... we've been spoon-fed baby
food at school when we hungered for steak... the bits of
meat that you did let slip through were pre-chewed and
tasteless. We've been dominated by sadists, or ignored by
the apathetic. The few that had something to teach found
us willing pupils, but those few are like drops of water in
the desert.
The Mentor 7
We explore... and you call us criminals. We seek after
knowledge... and you call us criminals. We exist without
skin color, without nationality, without religious bias... and
you call us criminals.You build atomic bombs, you wage
wars, you murder, cheat, and lie to us and try to make us
believe it's for our own good, yet we're the criminals.
The Mentor 8
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not
what they look like. My crime is that of outsmarting you,
something that you will never forgive me for. I am a
hacker, and this is my manifesto. You may stop this
individual, but you can't stop us all... after all, we're all
alike.
The Mentor 8
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not
what they look like. My crime is that of outsmarting you,
something that you will never forgive me for. I am a
hacker, and this is my manifesto. You may stop this
individual, but you can't stop us all... after all, we're all
alike.
That year…
Julian Assange get’s his first computer
The Mentor 8
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not
what they look like. My crime is that of outsmarting you,
something that you will never forgive me for. I am a
hacker, and this is my manifesto. You may stop this
individual, but you can't stop us all... after all, we're all
alike.
That year…
Julian Assange get’s his first computer
Jeremy Hammond is Born
The Mentor 8
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not
what they look like. My crime is that of outsmarting you,
something that you will never forgive me for. I am a
hacker, and this is my manifesto. You may stop this
individual, but you can't stop us all... after all, we're all
alike.
That year…
Julian Assange get’s his first computer
Jeremy Hammond is Born
Meanwhile…
WANKWorm
 According to Julian Assange, theWANK worm is the first
instance of hacktivism. On Oct. 16, 1989, during the ColdWar
when nuclear war was an immediate possibility, hackers hit the
NASA computers with the WANK Worm.Two days prior to the
launch of the plutonium-fueled Galileo space probe from the
Kennedy Space Station, NASA employees logged on to see a
humorous yet frightening welcome screen: "Your computer has
been officially WANKed.You talk of times of peace for all, and
then prepare for war," and "Remember, even if you win the rat
race, you're still a rat."The machines of the U.S. Department of
Energy and NASA worldwide had been penetrated by the anti-
nuclearWANK (WORMS AGAINST NUCLEAR KILLERS) worm.
Electronic DisturbanceTheater
Electronic DisturbanceTheater
In 1998, Electronic DisturbanceTheater (EDT) developed
and utilized a tool called Floodnet to target the Pentagon,
theWhite House, the School of the Americas, the office of
Mexico’s president, the Mexican Stock Exchange and the
Frankfurt Stock Exchange, all in support of the Zapatista
guerrilla movement in Mexico.
Electronic DisturbanceTheater
method. Floodnet, which has subsequently been released as
part of EDT’s “Disturbance Developer Kit,” allowed users
to participate in a sit-in attack on these sites by a simple
click on an icon on EDT's Web site.The Floodnet software
then directed the participating computers to continually
attack the target Web sites. It has been estimated that
10,000 people accessed Floodnet in this two-day action
resulting in targeted servers being hit at a rate of 600,000
hits per minute.
The Electrohippies
FloodNet has subsequently been deployed by a group called
The Electrohippies who used it to target the WorldTrade
Organization and various e-commerce websites,
defending their actions in Biblical terms: "As Jesus
ransacked the temple in Jerusalem because it had become
a house of merchandise, so the recent attacks on e-
commerce web sites are a protest against the manner of
it's [sic] recent development."
More about Electrohippies
Electrohippiesrecognized that DDOS attacks did have the
result of denying speech to the target, but came up with a
formula for determining when such action was justified:
1. the acts or views perpetrated by the targets of a [D]DoS
action must be reprehensible to many in society at large,
and not just to a small group.
2. the attack should show proportionality, -- it should focus
on a single issue, and not the organization as a whole.
More about Electrohippies
 The theoryis that the attacks should be counterpoints that
allow alternative points of view to become visible; the goal
is not to silence the targeted group but to restore
informational balance.
More about Electrohippies
 The Electrohippies also distinguished between server side
attacks and client-side attacks, where a client-side attack
is coming from multiple individuals (using Floodnet, for
example), the though being that such action is more
democratic.
Oxblood Ruffin objects
 "Denial of Service attacks are a violation of the First
Amendment, and of the freedoms of expression and
assembly. No rationale, even in the service of the highest
ideals, makes them anything other than what they are--
illegal, unethical, and uncivil.”

3. Hong Kong Blondes
 The Hong Kong Blondes was an underground network of
Chinese students spread across at least three continents.
It was started by Blondie Wong, who had reportedly
witnessed his father being stoned to death during the
1966-'76 Cultural Revolution. Group primarily protested
censorship and the violations of human rights that
occurred in China.
3. Hong Kong Blondes
method.The group launched cyberattacks against the "Great
Wall" -- a series of firewalls put in place to block access to
Western Internet sites. With members operating inside
and outside of China, the group claimed to have found
significant security holes within Chinese government
computer networks and claimed to have defaced
governmentWeb sites, torn down firewalls and even
disabled Chinese communication satellites.They worked
to forewarn political dissidents of imminent arrests.
PROJECT CHANOLOGY
 Project Chanology (also called Operation Chanology) was
a protest movement against the practices of the Church of
Scientology by Anonymous, a loosely unorganized
Internet-based group that emerged from the 4chan
message boards.The project was started as a “mental
warfare” response to the Church of Scientology's attempts
to prevent the online sharing of a video interview with
actor/ScientologistTom Cruise.
PROJECT CHANOLOGY
 Method.The project was publicly launched with a video
posted toYouTube, "Message to Scientology," on January
21, 2008.The project's goals were to "take down all
ScientologyWeb sites as an immediate act of retaliatory
censorship, counteract Scientology's attempts to suppress
the videos (and other cult materials) by constantly
reposting them, and publicize the cult's well-documented
history of employing suppressive and violent tactics to
mask its illegal or immoral activities."The initial cyber
attack, which came in the form of a distributed denial of
service attack, was followed by black faxes, prank calls,
and other activities intended to disrupt the Church of
Scientology's operations.
Wikileaks
 Leaking site Developed by Julian Assange
 Background as a hacker
 Endorses hacktivist ethic: information wants to be free.
22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk
Wikileaks
Bradley Mannings Data Dump ignites the Arab Spring.
the revolution seemed to have jelled days days after
Wikileaks released a secret cable, written in 2008 by
Ambassador Robert F. Godec that seemed to make it vivid
that the external world saw his corruption as clearly as the
Tunisians did.
Arab Spring
 As Godec put it in the leaked cable, “...beyond the stories
of the First Family's shady dealings,Tunisians report
encountering low-level corruption as well in interactions
with the police, customs, and a variety of government
ministries… With those at the top believed to be the worst
offenders, and likely to remain in power, there are no
checks in the system.”TheTunisian Government, the
Ambassador wrote, seemed to believe that “what’s yours
is mine”.
The HBGary hack
Colbert breaks it down.
https://www.youtube.com/watch?v=wLNFOJQZdwM
Internet Feds LulzSec
What the HBGary hack yields
Bank of America goes to the Department of Justice
What the HBGary hack yields
Bank of America goes to the Department of Justice
Department of Justice directs them to Hunton andWilliams
What the HBGary hack yields
Bank of America goes to the Department of Justice
Department of Justice directs them to Hunton andWilliams
Hunton andWilliams introduces them toThemis
TeamThemis
HBGary,
PalantirTechnologies
BericoTechnologies
Endgame Systems
All work on underminingAssange
Barrett Brown
Barrett and Project PM
 Crowdsource the leaks.
What they found
a plan by HBGary to undermine the credibility of the journalist
Glenn Greenwald and thereby neutralize his defense of
WikiLeaks.
a disinformation campaign against critics of the Chamber of
Commerce.
There were also plans for data mining and disinformation
campaigns targeting social organizations and advocacy groups.
“persona management” system, a program, developed at the
request of the US government, that allowed one user to control
multiple online identities (i.e. “sock puppets”) for commenting
in social media spaces, thus giving the appearance of grass
roots support.
Sabu
Jeremy Hammond
Born 1985: They yearThe Mentor wrote his manifesto
Glendale East High School
Stratfor
Barrett and Project PM
 Crowdsource the Stratfor leaks.
What they found this time
admissions of
Proposals for renditions
plans to discredit theYes Men on behalf of Union Carbide.
the Coca-Cola company was asking Stratfor for intelligence
on PETA, and the StratforVice President for Intelligence
remarked in a leaked email that “The FBI has a classified
investigation on PETA operatives. I'll see what I can
uncover.” Suggesting, of course, that not only did Stratfor
have access to the classified material, but that it would be
provided to Coca-Cola.
Barret’s conclusion:
The FBI had been turned into a private dick for corporate
America.
Barret’s conclusion:
The FBI had been turned into a private dick for corporate
America.
And then it got worse
Endgame Systems
"Please let HBgary know we don't ever want to see our name
tin a press release."
Endgame Systems
"Please let HBgary know we don't ever want to see our name
tin a press release."
Their principle product, available for a 2.5 million dollar
annual subscription, gave their customers access to “zero-
day exploits” – security vulnerabilities unknown to
software companies – for computer systems all over the
world (including the US).
Endgame Systems
"Please let HBgary know we don't ever want to see our name
tin a press release."
Their principle product, available for a 2.5 million dollar
annual subscription, gave their customers access to “zero-
day exploits” – security vulnerabilities unknown to
software companies – for computer systems all over the
world (including the US).
http://www.blackhat.com/presentations/bh-usa-
09/DAIZOVI/BHUSA09-Daizovi-AdvOSXRootkits-
SLIDES.pdf
Endgame Systems
"Please let HBgary know we don't ever want to see our name
tin a press release."
Their principle product, available for a 2.5 million dollar
annual subscription, gave their customers access to “zero-
day exploits” – security vulnerabilities unknown to
software companies – for computer systems all over the
world (including the US).
Brown speculated that they were selling these exploits to
foreign actors. In other words they were committing
treason.
Then the hammer drops
The DoJ took advantage of the fact that the Stratfor data had
a number of unencrypted credit card numbers and
validation codes. This would be the pretext for charging
that Brown was engaged in credit card fraud when he
shared that link with the editorial board of ProjectPM.
Specifically the FBI charged him withTraffic in Stolen
Authentication Features, Access Device Fraud,Aggravated
IdentityTheft. Add to this an Obstruction of Justice
charge (for being at his mother’s when the initial warrant
was served) and the charges relating to the “threat”
against the FBI agent, and Brown is looking at century of
jail time. He has been denied bail.
https://www.youtube.com/watch?v=6LGL_W9sixA
Actually its worse than that
Not only isThe FBI the private dick for large corporations…
But they are going to make sure you don’t even *embarrass*
those corporations…
weev
(andrewauernheimer)
Embarrassed AT&T
Found that AT&T left web pages for Ipad users unprotected
Embarrassed AT&T
Found that AT&T left web pages foriPadusers unprotected
Each page could be accessed by simply adding 1 to a URL
Embarrassed AT&T
Found that AT&T left web pages for Ipad users unprotected
Each page could be accessed by simply adding 1 to a URL
Harvested e-mail addresses of 114,000 iPad users, including
Mayor Michael Bloomberg and Rahm Emanuel, then the
White House chief of staff)
Embarrassed AT&T
Found that AT&T left web pages for Ipad users unprotected
Each page could be accessed by simply adding 1 to a URL
Harvested e-mail addresses of 114,000 iPad users, including
Mayor Michael Bloomberg and Rahm Emanuel, then the
White House chief of staff)
Weev did not try to profit from it; he notified the blog Gawker
of the security hole.
Embarrassed AT&T
Found that AT&T left web pages for Ipad users unprotected
Each page could be accessed by simply adding 1 to a URL
Harvested e-mail addresses of 114,000 iPad users, including
Mayor Michael Bloomberg and Rahm Emanuel, then the
White House chief of staff)
Weev did not try to profit from it; he notified the blog Gawker
of the security hole.
Sentenced to 41 months in jail and $73,000 to cover the cost
of notifying customers of THEIR security hole!
The judge at sentencing
“You consider yourself a hero of sorts,” she said, and noted
thatWeev’s “special skills” in computer coding called for a
more draconian sentence.
The judge at sentencing
“You consider yourself a hero of sorts,” she said, and noted
thatWeev’s “special skills” in computer coding called for a
more draconian sentence.
Flashback from 1985: “My crime is that of outsmarting you,
something that you will never forgive me for.”
Meanwhile: Aaron Swartz
 1:50http://www.kickstarter.com/projects/26788492/aaron-
swartz-documentary-the-internets-own-boy-0
CFAA
Computer Fraud and Abuse Act
CFAA
Computer Fraud and Abuse Act
Makes unauthorized use of a computer system a felony.
Justice Dept. interprets this to mean violation of a terms
of service agreement.
CFAA
Computer Fraud and Abuse Act
Makes unauthorized use of a computer system a felony.
Justice Dept. interprets this to mean violation of a terms
of service agreement.
So… Don’t lie on OK Cupid.
But it was illegal entry…
Abelson Report: Not clear there
was unauthorized access.
Abelson Report: Not clear there
was unauthorized access.
Ultimate Conclusion: MIT Community needs to
examine itself. Why didn’t it care? Reflects
community ignorance of the dangers facing every
MIT student and faculty member.
Questions
 What sources of information - blogs,
alternate media etc we could follow to
get informed about the intelligence
activities of these privateintel
companies?
To follow private intel companies
 http://timshorrock.com/
 @TimothyS
 @anoncorpwatch
 @youranonknews
 Threatpost.com
 http://www.wired.com/threatlevel/
 http://wiki.project-pm.org/wiki/Main_Page
Questions
 What can Individuals and corporations
do to maintain their privacy?
Questions
 What can Individuals and corporations
do to maintain their privacy?
Hire a professional.
Questions
 How can we influence policy decisions
on surveillance & protest our invasion
of privacy?
Questions
 How can we influence policy decisions
on surveillance & protest our invasion
of privacy?
Abelson’s point: First we have to educate
our peers.
Questions
 How can we influence policy decisions
on surveillance & protest our invasion
of privacy?
Abelson’s point: First we have to educate
our peers.
KeepTalking. Spread the word.

More Related Content

Similar to Hacktivists in trouble

Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Ethics Essay AssignmentDue 15 November 2016 – please upload to.docx
Ethics Essay AssignmentDue  15 November 2016 – please upload to.docxEthics Essay AssignmentDue  15 November 2016 – please upload to.docx
Ethics Essay AssignmentDue 15 November 2016 – please upload to.docxSANSKAR20
 
Fall Writing Paper For Kindergarten Encourage C
Fall Writing Paper For Kindergarten  Encourage CFall Writing Paper For Kindergarten  Encourage C
Fall Writing Paper For Kindergarten Encourage CMaureen Nonweiler
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
CityLIS talk, Feb 1st 2016
CityLIS talk, Feb 1st 2016CityLIS talk, Feb 1st 2016
CityLIS talk, Feb 1st 2016benosteen
 
National 5 Example Critical Essay Questions
National 5 Example Critical Essay QuestionsNational 5 Example Critical Essay Questions
National 5 Example Critical Essay QuestionsHeather Hughes
 
Synthesis Journal Example. How To
Synthesis Journal Example. How ToSynthesis Journal Example. How To
Synthesis Journal Example. How ToCheryl Brown
 
Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Cola Gigli
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaMathias Klang
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Dina Strasser Keynote Speaking Notes, 2011 THV Summer Institute
Dina Strasser Keynote Speaking Notes, 2011 THV Summer InstituteDina Strasser Keynote Speaking Notes, 2011 THV Summer Institute
Dina Strasser Keynote Speaking Notes, 2011 THV Summer InstituteTeaching the Hudson Valley
 
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdf
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdfAnswerTuring TestCoined by computing pioneer Alan Turing in .pdf
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdfnareshsonyericcson
 

Similar to Hacktivists in trouble (13)

Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Ethics Essay AssignmentDue 15 November 2016 – please upload to.docx
Ethics Essay AssignmentDue  15 November 2016 – please upload to.docxEthics Essay AssignmentDue  15 November 2016 – please upload to.docx
Ethics Essay AssignmentDue 15 November 2016 – please upload to.docx
 
Fall Writing Paper For Kindergarten Encourage C
Fall Writing Paper For Kindergarten  Encourage CFall Writing Paper For Kindergarten  Encourage C
Fall Writing Paper For Kindergarten Encourage C
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Osatv
OsatvOsatv
Osatv
 
CityLIS talk, Feb 1st 2016
CityLIS talk, Feb 1st 2016CityLIS talk, Feb 1st 2016
CityLIS talk, Feb 1st 2016
 
National 5 Example Critical Essay Questions
National 5 Example Critical Essay QuestionsNational 5 Example Critical Essay Questions
National 5 Example Critical Essay Questions
 
Synthesis Journal Example. How To
Synthesis Journal Example. How ToSynthesis Journal Example. How To
Synthesis Journal Example. How To
 
Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social Media
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Dina Strasser Keynote Speaking Notes, 2011 THV Summer Institute
Dina Strasser Keynote Speaking Notes, 2011 THV Summer InstituteDina Strasser Keynote Speaking Notes, 2011 THV Summer Institute
Dina Strasser Keynote Speaking Notes, 2011 THV Summer Institute
 
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdf
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdfAnswerTuring TestCoined by computing pioneer Alan Turing in .pdf
AnswerTuring TestCoined by computing pioneer Alan Turing in .pdf
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative GuidancePeter Ludlow
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and ConspiracyPeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.Peter Ludlow
 

More from Peter Ludlow (9)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative Guidance
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and Conspiracy
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Hacktivists in trouble

  • 1.
  • 2.
  • 3.
  • 4. 1.What is Hacktivism Well it’s a portmanteau of…
  • 5. 1.What is Hacktivism Well it’s a portmanteau of… Hacking…
  • 6. 1.What is Hacktivism Well it’s a portmanteau of… Hacking… and activism.
  • 7. So what is hacking?
  • 9.
  • 10.
  • 11. What is Hacking?  OK, so there is a humor element…
  • 12. What is Hacking?  OK, so there is a humor element… But what else?
  • 13. What is Hacking?  OK, so there is a humor element… But what else? New Hacker’s Dictionary (1998): 1) A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
  • 14. What is Hacking?  OK, so there is a humor element… But what else? New Hacker’s Dictionary (1998): 6) An expert or enthusiast of any kind. One might be an astronomy hacker, for example.
  • 15. What is Hacking?  OK, so there is a humor element… But what else? New Hacker’s Dictionary (1998): 7) One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
  • 16. What is Hacking?  OK, so there is a humor element… But what else? MIT Jargon File (2000): 1) An appropriate application of ingenuity
  • 17. What is Hacking?  OK, so there is a humor element… But what else? MIT Jargon File (2000): 1) An appropriate application of ingenuity
  • 18. What is Hacking?  OK, so there is a humor element… But what else? In short: the reapplication of technology for uses not originally intended.
  • 20. What is Hacking? Repurposing technology: The phonograph (0riginally intended as message recording tool)
  • 22.
  • 23.
  • 25. But this includes… A respect for traditional technologies
  • 26. It also includes: Learning and Sharing the Knowledge
  • 27. Learning and Sharing the Knowledge Information wants to be free!
  • 28.
  • 29.
  • 30.
  • 31. So Hacking is… 1. Repurposing technology
  • 32. So Hacking is… 1. Repurposing technology 2. Understanding technology and how it works
  • 33. So Hacking is… 1. Repurposing technology 2. Understanding technology and how it works 3. Sharing the knowledge
  • 34. So Hacking is… 1. Repurposing technology 2. Understanding technology and how it works 3. Sharing the knowledge 4. Some lulz
  • 39. Daniel and Anke in garden
  • 40.
  • 42.
  • 43. So what is hacktivism? Involves… 1. Repurposing ofTechnology
  • 44. So what is hacktivism? Involves… 1. Repurposing ofTechnology 2. Better understanding of technology (including traditional technologies)
  • 45. So what is hacktivism? Involves… 1. Repurposing ofTechnology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us).
  • 46. So what is hacktivism? Involves… 1. Repurposing ofTechnology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy
  • 47. So what is hacktivism? Involves… 1. Repurposing ofTechnology 2. Better understanding of technology (including traditional technologies) 3. Promoting education of these technologies (they should not be foreign to us). 4. Possibly with a sense of whimsy 5. Done for a social cause.
  • 48. The Rise of Hacktivism The Mentor
  • 49. The Mentor: Conscience of a Hacker (1986) Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after BankTampering"... Damn kids. They're all alike.
  • 50. The Mentor 2 But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...
  • 51. The Mentor 3 Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike.
  • 52. The Mentor 4 I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me...Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike.
  • 53. The Mentor 6 You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
  • 54. The Mentor 7 We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals.You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
  • 55. The Mentor 8 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
  • 56. The Mentor 8 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. That year… Julian Assange get’s his first computer
  • 57. The Mentor 8 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. That year… Julian Assange get’s his first computer Jeremy Hammond is Born
  • 58. The Mentor 8 Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. That year… Julian Assange get’s his first computer Jeremy Hammond is Born Meanwhile…
  • 59.
  • 60. WANKWorm  According to Julian Assange, theWANK worm is the first instance of hacktivism. On Oct. 16, 1989, during the ColdWar when nuclear war was an immediate possibility, hackers hit the NASA computers with the WANK Worm.Two days prior to the launch of the plutonium-fueled Galileo space probe from the Kennedy Space Station, NASA employees logged on to see a humorous yet frightening welcome screen: "Your computer has been officially WANKed.You talk of times of peace for all, and then prepare for war," and "Remember, even if you win the rat race, you're still a rat."The machines of the U.S. Department of Energy and NASA worldwide had been penetrated by the anti- nuclearWANK (WORMS AGAINST NUCLEAR KILLERS) worm.
  • 62. Electronic DisturbanceTheater In 1998, Electronic DisturbanceTheater (EDT) developed and utilized a tool called Floodnet to target the Pentagon, theWhite House, the School of the Americas, the office of Mexico’s president, the Mexican Stock Exchange and the Frankfurt Stock Exchange, all in support of the Zapatista guerrilla movement in Mexico.
  • 63. Electronic DisturbanceTheater method. Floodnet, which has subsequently been released as part of EDT’s “Disturbance Developer Kit,” allowed users to participate in a sit-in attack on these sites by a simple click on an icon on EDT's Web site.The Floodnet software then directed the participating computers to continually attack the target Web sites. It has been estimated that 10,000 people accessed Floodnet in this two-day action resulting in targeted servers being hit at a rate of 600,000 hits per minute.
  • 64. The Electrohippies FloodNet has subsequently been deployed by a group called The Electrohippies who used it to target the WorldTrade Organization and various e-commerce websites, defending their actions in Biblical terms: "As Jesus ransacked the temple in Jerusalem because it had become a house of merchandise, so the recent attacks on e- commerce web sites are a protest against the manner of it's [sic] recent development."
  • 65. More about Electrohippies Electrohippiesrecognized that DDOS attacks did have the result of denying speech to the target, but came up with a formula for determining when such action was justified: 1. the acts or views perpetrated by the targets of a [D]DoS action must be reprehensible to many in society at large, and not just to a small group. 2. the attack should show proportionality, -- it should focus on a single issue, and not the organization as a whole.
  • 66. More about Electrohippies  The theoryis that the attacks should be counterpoints that allow alternative points of view to become visible; the goal is not to silence the targeted group but to restore informational balance.
  • 67. More about Electrohippies  The Electrohippies also distinguished between server side attacks and client-side attacks, where a client-side attack is coming from multiple individuals (using Floodnet, for example), the though being that such action is more democratic.
  • 68. Oxblood Ruffin objects  "Denial of Service attacks are a violation of the First Amendment, and of the freedoms of expression and assembly. No rationale, even in the service of the highest ideals, makes them anything other than what they are-- illegal, unethical, and uncivil.” 
  • 69. 3. Hong Kong Blondes  The Hong Kong Blondes was an underground network of Chinese students spread across at least three continents. It was started by Blondie Wong, who had reportedly witnessed his father being stoned to death during the 1966-'76 Cultural Revolution. Group primarily protested censorship and the violations of human rights that occurred in China.
  • 70. 3. Hong Kong Blondes method.The group launched cyberattacks against the "Great Wall" -- a series of firewalls put in place to block access to Western Internet sites. With members operating inside and outside of China, the group claimed to have found significant security holes within Chinese government computer networks and claimed to have defaced governmentWeb sites, torn down firewalls and even disabled Chinese communication satellites.They worked to forewarn political dissidents of imminent arrests.
  • 71. PROJECT CHANOLOGY  Project Chanology (also called Operation Chanology) was a protest movement against the practices of the Church of Scientology by Anonymous, a loosely unorganized Internet-based group that emerged from the 4chan message boards.The project was started as a “mental warfare” response to the Church of Scientology's attempts to prevent the online sharing of a video interview with actor/ScientologistTom Cruise.
  • 72. PROJECT CHANOLOGY  Method.The project was publicly launched with a video posted toYouTube, "Message to Scientology," on January 21, 2008.The project's goals were to "take down all ScientologyWeb sites as an immediate act of retaliatory censorship, counteract Scientology's attempts to suppress the videos (and other cult materials) by constantly reposting them, and publicize the cult's well-documented history of employing suppressive and violent tactics to mask its illegal or immoral activities."The initial cyber attack, which came in the form of a distributed denial of service attack, was followed by black faxes, prank calls, and other activities intended to disrupt the Church of Scientology's operations.
  • 73. Wikileaks  Leaking site Developed by Julian Assange  Background as a hacker  Endorses hacktivist ethic: information wants to be free. 22:50 https://www.youtube.com/watch?v=PvmfOaZ34Pk
  • 74. Wikileaks Bradley Mannings Data Dump ignites the Arab Spring. the revolution seemed to have jelled days days after Wikileaks released a secret cable, written in 2008 by Ambassador Robert F. Godec that seemed to make it vivid that the external world saw his corruption as clearly as the Tunisians did.
  • 75. Arab Spring  As Godec put it in the leaked cable, “...beyond the stories of the First Family's shady dealings,Tunisians report encountering low-level corruption as well in interactions with the police, customs, and a variety of government ministries… With those at the top believed to be the worst offenders, and likely to remain in power, there are no checks in the system.”TheTunisian Government, the Ambassador wrote, seemed to believe that “what’s yours is mine”.
  • 76. The HBGary hack Colbert breaks it down. https://www.youtube.com/watch?v=wLNFOJQZdwM
  • 78. What the HBGary hack yields Bank of America goes to the Department of Justice
  • 79. What the HBGary hack yields Bank of America goes to the Department of Justice Department of Justice directs them to Hunton andWilliams
  • 80. What the HBGary hack yields Bank of America goes to the Department of Justice Department of Justice directs them to Hunton andWilliams Hunton andWilliams introduces them toThemis
  • 83. Barrett and Project PM  Crowdsource the leaks.
  • 84. What they found a plan by HBGary to undermine the credibility of the journalist Glenn Greenwald and thereby neutralize his defense of WikiLeaks. a disinformation campaign against critics of the Chamber of Commerce. There were also plans for data mining and disinformation campaigns targeting social organizations and advocacy groups. “persona management” system, a program, developed at the request of the US government, that allowed one user to control multiple online identities (i.e. “sock puppets”) for commenting in social media spaces, thus giving the appearance of grass roots support.
  • 85. Sabu
  • 86. Jeremy Hammond Born 1985: They yearThe Mentor wrote his manifesto Glendale East High School
  • 88. Barrett and Project PM  Crowdsource the Stratfor leaks.
  • 89. What they found this time admissions of Proposals for renditions plans to discredit theYes Men on behalf of Union Carbide. the Coca-Cola company was asking Stratfor for intelligence on PETA, and the StratforVice President for Intelligence remarked in a leaked email that “The FBI has a classified investigation on PETA operatives. I'll see what I can uncover.” Suggesting, of course, that not only did Stratfor have access to the classified material, but that it would be provided to Coca-Cola.
  • 90. Barret’s conclusion: The FBI had been turned into a private dick for corporate America.
  • 91. Barret’s conclusion: The FBI had been turned into a private dick for corporate America. And then it got worse
  • 92. Endgame Systems "Please let HBgary know we don't ever want to see our name tin a press release."
  • 93. Endgame Systems "Please let HBgary know we don't ever want to see our name tin a press release." Their principle product, available for a 2.5 million dollar annual subscription, gave their customers access to “zero- day exploits” – security vulnerabilities unknown to software companies – for computer systems all over the world (including the US).
  • 94. Endgame Systems "Please let HBgary know we don't ever want to see our name tin a press release." Their principle product, available for a 2.5 million dollar annual subscription, gave their customers access to “zero- day exploits” – security vulnerabilities unknown to software companies – for computer systems all over the world (including the US). http://www.blackhat.com/presentations/bh-usa- 09/DAIZOVI/BHUSA09-Daizovi-AdvOSXRootkits- SLIDES.pdf
  • 95. Endgame Systems "Please let HBgary know we don't ever want to see our name tin a press release." Their principle product, available for a 2.5 million dollar annual subscription, gave their customers access to “zero- day exploits” – security vulnerabilities unknown to software companies – for computer systems all over the world (including the US). Brown speculated that they were selling these exploits to foreign actors. In other words they were committing treason.
  • 96. Then the hammer drops The DoJ took advantage of the fact that the Stratfor data had a number of unencrypted credit card numbers and validation codes. This would be the pretext for charging that Brown was engaged in credit card fraud when he shared that link with the editorial board of ProjectPM. Specifically the FBI charged him withTraffic in Stolen Authentication Features, Access Device Fraud,Aggravated IdentityTheft. Add to this an Obstruction of Justice charge (for being at his mother’s when the initial warrant was served) and the charges relating to the “threat” against the FBI agent, and Brown is looking at century of jail time. He has been denied bail. https://www.youtube.com/watch?v=6LGL_W9sixA
  • 97. Actually its worse than that Not only isThe FBI the private dick for large corporations… But they are going to make sure you don’t even *embarrass* those corporations…
  • 99. Embarrassed AT&T Found that AT&T left web pages for Ipad users unprotected
  • 100. Embarrassed AT&T Found that AT&T left web pages foriPadusers unprotected Each page could be accessed by simply adding 1 to a URL
  • 101. Embarrassed AT&T Found that AT&T left web pages for Ipad users unprotected Each page could be accessed by simply adding 1 to a URL Harvested e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff)
  • 102. Embarrassed AT&T Found that AT&T left web pages for Ipad users unprotected Each page could be accessed by simply adding 1 to a URL Harvested e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff) Weev did not try to profit from it; he notified the blog Gawker of the security hole.
  • 103. Embarrassed AT&T Found that AT&T left web pages for Ipad users unprotected Each page could be accessed by simply adding 1 to a URL Harvested e-mail addresses of 114,000 iPad users, including Mayor Michael Bloomberg and Rahm Emanuel, then the White House chief of staff) Weev did not try to profit from it; he notified the blog Gawker of the security hole. Sentenced to 41 months in jail and $73,000 to cover the cost of notifying customers of THEIR security hole!
  • 104. The judge at sentencing “You consider yourself a hero of sorts,” she said, and noted thatWeev’s “special skills” in computer coding called for a more draconian sentence.
  • 105. The judge at sentencing “You consider yourself a hero of sorts,” she said, and noted thatWeev’s “special skills” in computer coding called for a more draconian sentence. Flashback from 1985: “My crime is that of outsmarting you, something that you will never forgive me for.”
  • 106. Meanwhile: Aaron Swartz  1:50http://www.kickstarter.com/projects/26788492/aaron- swartz-documentary-the-internets-own-boy-0
  • 108. CFAA Computer Fraud and Abuse Act Makes unauthorized use of a computer system a felony. Justice Dept. interprets this to mean violation of a terms of service agreement.
  • 109. CFAA Computer Fraud and Abuse Act Makes unauthorized use of a computer system a felony. Justice Dept. interprets this to mean violation of a terms of service agreement. So… Don’t lie on OK Cupid.
  • 110. But it was illegal entry…
  • 111. Abelson Report: Not clear there was unauthorized access.
  • 112. Abelson Report: Not clear there was unauthorized access. Ultimate Conclusion: MIT Community needs to examine itself. Why didn’t it care? Reflects community ignorance of the dangers facing every MIT student and faculty member.
  • 113. Questions  What sources of information - blogs, alternate media etc we could follow to get informed about the intelligence activities of these privateintel companies?
  • 114. To follow private intel companies  http://timshorrock.com/  @TimothyS  @anoncorpwatch  @youranonknews  Threatpost.com  http://www.wired.com/threatlevel/  http://wiki.project-pm.org/wiki/Main_Page
  • 115. Questions  What can Individuals and corporations do to maintain their privacy?
  • 116. Questions  What can Individuals and corporations do to maintain their privacy? Hire a professional.
  • 117. Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy?
  • 118. Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy? Abelson’s point: First we have to educate our peers.
  • 119. Questions  How can we influence policy decisions on surveillance & protest our invasion of privacy? Abelson’s point: First we have to educate our peers. KeepTalking. Spread the word.