Posts Tagged ‘Hacking’
Friday, October 28th, 2016
Check out the new guide here:
This guide aims to be a concise overview on information security for anyone in emancipatory struggles against structures of power. It represents assembled knowledge and best practices from personal experience, conversations with hackers and fellow activists, hacker conferences, and university courses on computer security and cryptography. Nonetheless, the best security is sharing skills with trusted people.
If you have any corrections, questions or additions, please contact us.
Sunday, October 19th, 2014
Please note, this operation is now called #Op4Kobane, not #OpKobane anymore.
Once again the comrades from Kurdish hacking collective ColdHackers have gone into action and attacked the online presence of the murderous and cowardly Turkish regime in solidarity with their YPG / YPJ brothers & sisters who are fighting for Rojava and the total liberation of Kobane.
In this latest co-ordinated wave of precision cyber attacks code-named #Op4Kobane, 6 Turkish regime-linked websites were skilfully defaced and 4 Turkish regime-linked Facebook accounts were completely hacked and at the time of this report were still in complete rebel control displaying YPG / YPJ solidarity messages and images.
On the 6 websites, a message was broadcast in Kurdish, English, French & Turkish languages. The message is as follows :
“MASSACRE IN ROJAVA WILL BE BROUGHT TO THE ACCOUNT. We will call a stop to bloodthirsty massacre of Kurdish people in Rojava. We will defy and will not remit to those who commits and supports this merciless massacre. We will take revenge on those uncivilized who slaughter the children and civilian population. O
barbarians we will breathe down your neck both in cyber and in real media, You and your brutal supporters will account for this horrible massacre. Our folk, for their freedom and liberty will fight for the last drop of their blood. Hooray freedom, Hooray Kurdistan, Hooray hero APO! Hacked By ColdHackers (KurdishHackers)!”.
For more info on the websites & FB accounts attacked & image proofs, please visit @ColdHackers on Twitter.
War against ISIS/Daesh: #OpKobane : 12 Turkish State-linked Websites Defaced By ColdHackers (Kurdistan)
Friday, October 17th, 2014
16/10/2014 : Comrades from the Kurdish hacking collective ColdHackers have hijacked & defaced 12 websites linked to the fascist Turkish state.
The news was announced via their Twitter account with the simple message : “Calakiyen Me ji bo Kobane” (our Action For Kobane).
The 12 websites were all defaced with images of the Rojava Revolution, solidarity messages to the heroic Resistance of Kobane & “Freedom For Ocalan” (imprisoned Kurdish Resistance figure Abdullah Öcalan). For more information & links to the sites (as well as mirrors in case they are taken down by
authorities later), please visit ColdHackers Twitter account : @ColdHackers.
Kobane Will Not Fall! Smash ISIS!
Smash The Turkish State!
Long Live The Rojava Revolution!!
Monday, October 6th, 2014
In response to the call for international actions of solidarity with the brave
people of Kobane who are fighting both ISIS and the fascist Turkish military &
Turkish police who are helping & supporting ISIS we hereby declare the beginning of #OpKobane!! Here is a small list of targets to begin with. This operation will not stop until Turkey stops assisting ISIS terrorists and stops blocking Freedom Fighters from entering Kobane to help their fellow brothers & sisters defend Kobane!
Sail safe comrades & aim true!!
Turkish National Police : http://www.egm.gov.tr
Turkish Armed Forces : http://www.tsk.tr/ing/
Website of Turkish president : http://www.tccb.gov.tr/pages/
Turkish ministry of interior : http://www.mia.gov.tr/
These are just a small sample of potential targets, we’re sure you can find more!
Please use hashtag #OpKobane when publicizing news of this operation!
#OpKobane #Anonymous #AntiSec
'Call for papers' for Interference gathering on society and technology August 15-17 2014 (Netherlands)
Friday, April 25th, 2014
1. preventing (a process or activity) from continuing or being carried out properly.
2. the combination of two or more electromagnetic waveforms to form a resultant wave in which the displacement is either reinforced or cancelled.
Interference is a gathering of people, perspectives, theories, and actions that share a critical approach to society and technology. It will take place at the Binnenpret in Amsterdam, NL from 15th to the 17th of August 2014. It will be a space where we can meet, debate, share, learn, and find our affinities and oppositions. The event comes as a response to the lack of a common ground for confrontation and discussion over themes like hacking, technology, art and politics that could break out of the existing containers and roles for such concepts and practices.
Interference is not a hacker conference. From a threat to the so-called national security, hacking has become an instrument for reinforcing the status quo. Fed up with yet another recuperation, the aim is to re/contextualize hacking as a conflictual praxis and release it from its technofetishist boundaries. Bypassing the cultural filters, Interference wants to take the technical expertise of the hacking scene out of its isolation to place it within the broader perspective of the societal structures it shapes and is part of. (more…)
Saturday, November 16th, 2013
325 receives and transmits this message from anonymous anarchist hackers in the ongoing information war:
Due to the 10 year sentence handed down to anarchist hacker Jeremy Hammond in NYC yesterday Wikileaks decided to release the remaining Stratfor emails they had been sitting on for some time. Stratfor is a company that posed outwardly as a global intelligence information publisher but were in fact providing confidential intelligence services to many fucked up corporations, government and law enforcement agencies.
There are MANY emails – millions of them, but already we have found some emails of interest to the global anarchist movement, they are as follows… (more…)
Saturday, November 16th, 2013
Sentenced to 10 Years in Prison, Anarchist Hacker Jeremy Hammond Uses Allocution to Give Consequential Statement Highlighting Global Criminal Exploits by FBI Handlers.
Good morning. Thank you for this opportunity. My name is Jeremy Hammond and I’m here to be sentenced for hacking activities carried out during my involvement with Anonymous. I have been locked up at MCC for the past 20 months and have had a lot of time to think about how I would explain my actions.
Before I begin, I want to take a moment to recognize the work of the people who have supported me. I want to thank all the lawyers and others who worked on my case: Elizabeth Fink, Susan Kellman, Sarah Kunstler, Emily Kunstler, Margaret Kunstler, and Grainne O’Neill. I also want to thank the National Lawyers Guild, the Jeremy Hammond Defense Committee and Support Network, Free Anons, the Anonymous Solidarity Network, Anarchist Black Cross, and all others who have helped me by writing a letter of support, sending me letters, attending my court dates, and spreading the word about my case.
I also want to shout out my brothers and sisters behind bars and those who are still out there fighting the power. (more…)
Thursday, August 22nd, 2013
I hope this evening finds you all in the best of health and highest of spirit.
Thanks for coming out to show support for me and Barrett Brown.
I want to shout out to all my brothers and sisters locked down, here at New York Metropolitan Correctional Center, at Brooklyn MDC, at Rikers Island, in the Tombs, at Cook County Jail in Chicago, and to all those on hunger strikes in California prisons and Guantanamo Bay. (more…)
Tuesday, August 20th, 2013
“Z” being the last alphabet has been chosen for “ZCompany Hacking Crew (ZHC)” as its an end to injustice, extremism, Racism, Zionism, lies, illegal occupations and all such evils. We Hack/Deface for a reason, our reason for defacing is to raise awareness of the issues in the world with a main focus on Kashmir & Palestine.
EDL UDL Names , Mobiles
Andrew Benton 07597221476
Adam Hopkinson 07543356078
Anthony Kirk 07460273402
Bill Brown 07446411348 (UDL/UVF) (more…)
Wednesday, October 10th, 2012
325 receives and transmits:
On the 9th of October to coincide with the visit to Athens by the so-called ‘leader’ of Germany, Angela Merkel, we took part in a coordinated international cyber operation with our comrades from many different factions of Anonymous.
Angered at the many preemptive arrests made by the fascist Greek police force prior to the visit of Merkel, the banning of many public protests & the news that Greek uniformed pigs sympathetic to the neo-nazis of Golden Dawn had tortured and detained anti-fascist protesters, we decided action of some sort had to be taken.
As the brave street fighters of Athens battled the pigs paid by the Greek Junta to protect the so-called ‘peace’ & to prevent the people from storming the parliament; we launched massive distributed denial of service attacks against the following websites associated with the Junta :
hellenicpolice.gr (website of the National Police Force of Greece)
mfa.gr (website of the Greek Ministry of Foreign Affairs)
ydt.gr (website of the Greek Ministry of Civilian Protection & Public Order)
presidency.gr (website of the so-called Greek ‘President’)
All of the above websites were only prevented from functioning for the duration of the protests. If the Greek Junta do not respond to the demands of the people soon, next time we will wipe their entire internet presence from the face of the Earth!
We hope this small gesture of solidarity assisted the rebels of Greece in some way or at the very least let them know that they are not alone and that we are always willing to risk our so-called ‘freedom’ to assist them via whatever means our individual circumstances enable.
We would like to dedicate our part in this action to the members of the Revolutionary Organizations Conspiracy of Cells of Fire & Revolutionary Struggle who are currently facing the fascist ‘justice’ in the courts of the Junta and to all anarchist prisoners imprisoned in Greece : STAY STRONG COMRADES!!
We also send revolutionary greetings to accused #AntiSec hacker Jeremy Hammond, currently awaiting ‘trial’ in the U$A, and to our 7 arrested comrades in Turkey from the hacking collective RedHack who are facing up to 20 years prison for the bullshit charge of being members of a ‘terrorist organization’…YOU ARE IN OUR THOUGHTS & IN OUR HEARTS WHENEVER WE TAKE ACTION!!
Invisible Combatant Cells
Sunday, May 13th, 2012
From: NYC ANARCHISTS
Subject: PRESS RELEASE: SOLIDARITY ACTION FOR PRISONER JEREMY HAMMOND, MAY 14, 2012
We call on all NYC-metro anarchists to come out and show support for Jeremy Hammond who’s being arraigned on Monday, May 14th, 12PM at the U.S. Federal Courthouse, 500 Pearl St., New York, NY 10038, in courtroom 12A.
Jeremy Hammond is a 27-year-old activist currently being held in pre-trial detention at a federal prison in New York. Jeremy and his four co-defendants who are currently awaiting extradition from the UK, are accused of hacking Stratfor, HBGary, and the Arizona Department of Public Safety known for its racist immigration policies. (more…)
Friday, February 24th, 2012
325 receives and transmits:
24 February 2012
Anonymous have struck a blow against the Prison-Industrial Complex and eliminated the online presence of prison for profit scumbags GEO group from the face of the internet…
Saturday, February 4th, 2012
A recent trans-Atlantic call between the FBI and the UK’s Scotland Yard in which operatives from the two law enforcement agencies discussed ongoing cases regarding a number of alleged hackers was intercepted and recorded—by hackers.
Monday, January 2nd, 2012
325 receives and transmits:
CALIFORNIA LAW ENFORCEMENT ASSOCIATION – DEFACED AND DESTROYED BY ANTISEC
Soundtrack to the Rev Track: The Coup – Five Million Ways to Kill a CEO
I’m from the land where the Panthers grew
You know the city and the avenue
If you the boss we be smabbin through
And we’ll be grabbin’ you
To say “What’s up with the revenue?”
Most everybody already knows that we don’t like police very much. Shit, just
about everybody hates them, everybody except for the rich and powerful who
depend on their protection. But which state got the most blood on their hands?
Well we already owned pigs in Texas and Arizona, and many many others; guess its time to ride on the California police.
From the murder of Oscar Grant, the repression of the occupation movement, the
assassination of George Jackson in San Quinten prison, the prosecution of our
anonymous comrades in San Jose, and the dehumanizing conditions in California
jails and prisons today, California police have a notorious history of brutality
and therefore have been on our hitlist for a good minute now.
So we went ahead and owned the California State Law Enforcement Association
(CSLEA.COM), defacing their website and giving out live backdoors. (more…)
Revenge for the Occupy crackdown – ANTISEC targets a 'Special Agent Cybercrime Supervisor' of the CA Department of Justice (USA)
Monday, November 21st, 2011
325 receives and transmits:
19 November 2011
ANTISEC LEAKS DOJ SPECIAL AGENT SUPERVISOR’S PRIVATE EMAILS, IACIS CYBERCRIME INVESTIGATOR COMMUNICATIONS care of the #OCCUPYWALLST CRACKDOWN RETALIATION TASK FORCE.
Greetings Pirates, and welcome to another exciting #FuckFBIFriday release.
As part of our ongoing effort to expose and humiliate our white hat enemies, we targeted a Special Agent Supervisor of the CA Department of Justice in charge of computer crime investigations. We are leaking over 38,000 private emails which contain detailed computer forensics techniques, investigation protocols as well as highly embarrassing personal information. We are confident these gifts will bring smiles to the faces of our black hat brothers and sisters (especially those who have been targeted by these scurvy dogs) while also making a mockery of “security professionals” who whore their “skills” to law enforcement to protect tyrannical corporativism and the status quo we aim to destroy.
We hijacked two gmail accounts belonging to Fred Baclagan, who has been a cop for 20 years, dumping his private email correspondence as well as several dozen voicemails and SMS text message logs. While just yesterday Fred was having a private BBQ with his CATCHTEAM high computer crime task force friends, we were
reviewing their detailed internal operation plans and procedure documents. We also couldn’t overlook the boatloads of embarrassing personal information about our cop friend Fred. We lulzed as we listened to angry voicemails from his estranged wives and ex-girlfriends while also reading his conversations with girls who responded to his “man seeking woman” craigslist ads. We turned on his google web history and watched him look up linux command line basics, golfing tutorials, and terrible youtube music videos. We also abused his google
voice account, making sure Fred’s friends and family knew how hard he was owned.
Possibly the most interesting content in his emails are the IACIS.com internal email list archives (2005-2011) which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests. The information in these emails will prove essential to those who want to protect themselves from the techniques and procedures cyber crime investigators use to build cases. If you have ever been busted for computer crimes, you should check to see if your case is being discussed here.
There are discussions about using EnCase forensic software, attempts to crack TrueCrypt encrypted drives, sniffing wireless traffic in mobile surveillance vehicles, how to best prepare search warrants and subpoenas, and a whole lot of clueless people asking questions on how to use basic software like FTP. In the end, we rickrolled the entire IACIS list, causing the administrators to panic and shut their list and websites down.
These cybercrime investigators are supposed to be the cream of the crop, but we reveal the totality of their ignorance of all matters related to computer security. For months, we have owned several dozen white hat and law enforcement targets– getting in and out of whichever high profile government and corporate system we please and despite all the active FBI investigations and several billion dollars of funding, they have not been able to stop us or get anywhere near us. Even worse, they bust a few dozen people who are allegedly part of an “anonymous computer hacking conspiracy” but who have only used kindergarten-level DDOS tools– this isn’t even hacking, but a form of electronic civil disobedience.
We often hear these “professionals” preach about “full-disclosure,” but we are sure these people are angrily sending out DMCA takedown notices and serving subpoenas as we speak. They call us criminals, script kiddies, and terrorists, but their entire livelihood depends on us, trying desperately to study our techniques and failing miserably at preventing future attacks. See we’re cut from an entirely different kind of cloth. Corporate security professionals like Thomas Ryan and Aaron Barr think they’re doing something noble by “leaking” the public email discussion lists of Occupy Wall Street and profiling the “leaders” of Anonymous.
Wannabe player haters drop shitty dox and leak partial chat logs about other hackers, doing free work for law enforcement. Then you got people like Peiter “Mudge” Zatko who back in the day used to be old school l0pht/cDc only now to sell out to DARPA going around to hacker conventions encouraging others to work for the feds. Let this be a warning to aspiring white hat “hacker” sellouts and police collaborators: stay out the game or get owned and exposed. You want to keep mass arresting and brutalizing the 99%? We’ll have to keep owning your boxes and torrenting your mail spools, plastering your personal information all over teh internets.
Hackers, join us and rise up against our common oppressors – the white hats, the 1%’s ‘private’ police, the corrupt banks and corporations and make 2011 the year of leaks and revolutions!
We are Anti-Security,
We are the 99%
We do not forgive.
We do not forget.
video message from #AntiSec : http://www.youtube.com/watch?v=fBtCBg9HgZI
Browse the emails using Tor Hidden Services:
http://ibhg35kgdvnb7jvw.onion/cybercrime <- on tor http://ibhg35kgdvnb7jvw.tor2web.org/cybercrime <- not on tor [*] Download the emails using BitTorrent: http://www.thepiratebay.org/user/AntiSecurity
[*] Donate BitCoins for future leaks!! 18NHixaoQekQJ3y52aBGJJwgBWX9X3myYR