martedì 22 novembre 2011
Revenge for the Occupy crackdown – ANTISEC targets a ‘Special Agent Cybercrime Supervisor’ of the CA Department of Justice (USA)
325 receives and transmits:
19 November 2011
ANTISEC LEAKS DOJ SPECIAL AGENT SUPERVISOR’S PRIVATE EMAILS, IACIS CYBERCRIME INVESTIGATOR COMMUNICATIONS care of the #OCCUPYWALLST CRACKDOWN RETALIATION TASK FORCE.
Greetings Pirates, and welcome to another exciting #FuckFBIFriday release.
As part of our ongoing effort to expose and humiliate our white hat enemies, we targeted a Special Agent Supervisor of the CA Department of Justice in charge of computer crime investigations. We are leaking over 38,000 private emails which contain detailed computer forensics techniques, investigation protocols as well as highly embarrassing personal information. We are confident these gifts will bring smiles to the faces of our black hat brothers and sisters (especially those who have been targeted by these scurvy dogs) while also making a mockery of “security professionals” who whore their “skills” to law enforcement to protect tyrannical corporativism and the status quo we aim to destroy.
We hijacked two gmail accounts belonging to Fred Baclagan, who has been a cop for 20 years, dumping his private email correspondence as well as several dozen voicemails and SMS text message logs. While just yesterday Fred was having a private BBQ with his CATCHTEAM high computer crime task force friends, we were
reviewing their detailed internal operation plans and procedure documents. We also couldn’t overlook the boatloads of embarrassing personal information about our cop friend Fred. We lulzed as we listened to angry voicemails from his estranged wives and ex-girlfriends while also reading his conversations with girls who responded to his “man seeking woman” craigslist ads. We turned on his google web history and watched him look up linux command line basics, golfing tutorials, and terrible youtube music videos. We also abused his google
voice account, making sure Fred’s friends and family knew how hard he was owned.
Possibly the most interesting content in his emails are the IACIS.com internal email list archives (2005-2011) which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests. The information in these emails will prove essential to those who want to protect themselves from the techniques and procedures cyber crime investigators use to build cases. If you have ever been busted for computer crimes, you should check to see if your case is being discussed here.
There are discussions about using EnCase forensic software, attempts to crack TrueCrypt encrypted drives, sniffing wireless traffic in mobile surveillance vehicles, how to best prepare search warrants and subpoenas, and a whole lot of clueless people asking questions on how to use basic software like FTP. In the end, we rickrolled the entire IACIS list, causing the administrators to panic and shut their list and websites down.
These cybercrime investigators are supposed to be the cream of the crop, but we reveal the totality of their ignorance of all matters related to computer security. For months, we have owned several dozen white hat and law enforcement targets– getting in and out of whichever high profile government and corporate system we please and despite all the active FBI investigations and several billion dollars of funding, they have not been able to stop us or get anywhere near us. Even worse, they bust a few dozen people who are allegedly part of an “anonymous computer hacking conspiracy” but who have only used kindergarten-level DDOS tools– this isn’t even hacking, but a form of electronic civil disobedience.
We often hear these “professionals” preach about “full-disclosure,” but we are sure these people are angrily sending out DMCA takedown notices and serving subpoenas as we speak. They call us criminals, script kiddies, and terrorists, but their entire livelihood depends on us, trying desperately to study our techniques and failing miserably at preventing future attacks. See we’re cut from an entirely different kind of cloth. Corporate security professionals like Thomas Ryan and Aaron Barr think they’re doing something noble by “leaking” the public email discussion lists of Occupy Wall Street and profiling the “leaders” of Anonymous.
Wannabe player haters drop shitty dox and leak partial chat logs about other hackers, doing free work for law enforcement. Then you got people like Peiter “Mudge” Zatko who back in the day used to be old school l0pht/cDc only now to sell out to DARPA going around to hacker conventions encouraging others to work for the feds. Let this be a warning to aspiring white hat “hacker” sellouts and police collaborators: stay out the game or get owned and exposed. You want to keep mass arresting and brutalizing the 99%? We’ll have to keep owning your boxes and torrenting your mail spools, plastering your personal information all over teh internets.
Hackers, join us and rise up against our common oppressors – the white hats, the 1%’s ‘private’ police, the corrupt banks and corporations and make 2011 the year of leaks and revolutions!
We are Anti-Security,
We are the 99%
We do not forgive.
We do not forget.
Expect Us!
-
video message from #AntiSec : http://www.youtube.com/watch?v=fBtCBg9HgZI
Browse the emails using Tor Hidden Services:
http://ibhg35kgdvnb7jvw.onion/cybercrime <- on tor
http://ibhg35kgdvnb7jvw.tor2web.org/cybercrime <- not on tor
[*] Download the emails using BitTorrent:
http://www.thepiratebay.org/user/AntiSecurity
[*] Donate BitCoins for future leaks!! 18NHixaoQekQJ3y52aBGJJwgBWX9X3myYR
http://325.nostate.net/
Iscriviti a:
Commenti sul post (Atom)
Nessun commento:
Posta un commento