Christopher Doyon

Last updated
Christopher Doyon
Chris-doyon.jpg
Personal details
Born
Christopher Doyon

1964
Maine, United States
Occupation Hacktivist

Christopher Doyon (born 1964) is an American homeless hacktivist and the self-described leader of hacker group Anonymous.

Contents

First arrest

Doyon was arrested in September 2011 [1] for using the High Orbit Ion Cannon to make a DDoS attack on servers belonging to Santa Cruz County, California. The attack, which occurred in December 2010, was triggered by a new law affecting the homeless community of which Doyon was a part, and it affected Santa Cruz servers for just 30 minutes. The government alleged a few thousand dollars in damages for investigation and remediation, clearing threshold of the Computer Fraud and Abuse Act and making the DDoS a federal crime.

Helped by his pro-bono attorney, Jay Leiderman, [2] Doyon jumped bail in February 2012 and fled across the border into Canada. [3] [4] He spent around seven years issuing press releases, hanging out on Twitter, and writing a self-published memoir, talking to journalists and appearing in documentaries. [5]

Second arrest

On June 11, 2021, several armed, uniformed, Mexican men identifying themselves as DEA agents attempted to gain entry to the community where Doyon lived in Mexico City, Mexico but were turned away. They returned dressed as civilians, with representatives from the US Embassy, scaled the walls of the compound and took Doyon away in the early evening. This was confirmed by a press release from the US Attorney for the Northern District of California, where Doyon was imprisoned, though no details were provided. [6] [7]

In 2022 Doyon pled guilty to his 2011 charges. [8]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">Food Not Bombs</span> Group of independent collectives serving free food

Food Not Bombs (FNB) is a loose-knit group of independent collectives, sharing free vegan and vegetarian food with others. The group believes that corporate and government priorities are skewed to allow hunger to persist in the midst of abundance. To demonstrate this, FNB serves surplus food gathered from grocery stores, bakeries and markets which would otherwise go to waste, or occasionally has already been thrown away. The group exhibits a form of franchise activism.

<span class="mw-page-title-main">Jeremy Hammond</span> American political activist and hacker

Jeremy Hammond is an American anarchist activist and former computer hacker from Chicago. He founded the computer security training website HackThisSite in 2003. He was first imprisoned over the Protest Warrior hack in 2005 and was later convicted of computer fraud in 2013 for hacking the private intelligence firm Stratfor and releasing data to WikiLeaks, and sentenced to 10 years in prison.

<span class="mw-page-title-main">Anonymous (hacker group)</span> Decentralized hacktivist group

Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.

Michael Gregory Hoglund is an American author, researcher, and serial entrepreneur in the cyber security industry. He is the founder of several companies, including Cenzic, HBGary and Outlier Security. Hoglund contributed early research to the field of rootkits, software exploitation, buffer overflows, and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds a patent on fault injection methods for software testing, and fuzzy hashing for computer forensics. Due to an email leak in 2011, Hoglund is well known to have worked for the U.S. Government and Intelligence Community in the development of rootkits and exploit material. It was also shown that he and his team at HBGary had performed a great deal of research on Chinese Government hackers commonly known as APT. For a time, his company HBGary was the target of a great deal of media coverage and controversy following the 2011 email leak. HBGary was later acquired by a large defense contractor.

<span class="mw-page-title-main">Operation Payback</span> Series of cyberattacks conducted by Anonymous

Operation Payback was a coordinated, decentralized group of attacks on high-profile opponents of Internet piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retaliation to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. The Motion Picture Association of America, the Pirate Party UK and United States Pirate Party criticised the attacks.

The Jester is a self-identified grey hat hacktivist. He claims to be responsible for attacks on WikiLeaks and Islamist websites. He claims to be acting out of American patriotism.

HBGary is a subsidiary company of ManTech International, focused on technology security. In the past, two distinct but affiliated firms had carried the HBGary name: HBGary Federal, which sold its products to the US Government, and HBGary, Inc. Its other clients included information assurance companies, computer emergency response teams, and computer forensic investigators. On 29 February 2012, HBGary, Inc. announced it had been acquired by IT services firm ManTech International. At the same time, HBGary Federal was reported to be closed.

Jake Leslie Davis, best known by his online pseudonym Topiary, is a British hacktivist. He has worked with Anonymous, LulzSec, and other similar groups. He was an associate of the Internet group Anonymous, which has publicly claimed various online attacks, including hacking HBGary, Westboro Baptist Church, and Gawker. They have also claimed responsibility for the defacing of government websites in countries such as Zimbabwe, Syria, Tunisia, Ireland, and Egypt.

<span class="mw-page-title-main">LulzSec</span> Hacker group

LulzSec was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist Hector Monsegur, who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. Prior, British authorities had announced the arrests of two teenagers they alleged were LulzSec members, going by the pseudonyms T-flow and Topiary.

Anonymous is a decentralized virtual community. They are commonly referred to as an internet-based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.

<span class="mw-page-title-main">Barrett Brown</span> American journalist, essayist and activist

Barrett Lancaster Brown is an American journalist, essayist, activist and former associate of Anonymous. In 2010, he founded Project PM, a group that used a wiki to analyze leaks concerning the military-industrial complex. It was classified a "criminal organization" by the Department of Justice. In late 2020, Brown restarted Project PM.

<span class="mw-page-title-main">Jay Leiderman</span> American lawyer (1971–2021)

Jason Scott "Jay" Leiderman was an American criminal defense lawyer based in Ventura, California. The Atlantic Magazine called Leiderman the "Hacktivist's Advocate" for his work defending hacker-activists accused of computer crimes, or so-called "Hacktivism" especially people associated with Anonymous. BuzzFeed called Leiderman "The Maserati-Driving Deadhead Lawyer Who Stands Between Hackers And Prison" and stated he was "A medical marijuana and criminal defense lawyer from Southern California [who] has made himself into the country's leading defender of hackers."

Ryan Ackroyd, a.k.a.Kayla and also lolspoon, is a former black hat hacker who was one of the six core members of the computer hacking group "LulzSec" during its 50-day spree of attacks from 6 May 2011 until 26 June 2011. Throughout the time, Ackroyd posed as a female hacker named "Kayla" and was responsible for the penetration of multiple military and government domains and many high profile intrusions into the networks of Gawker in December 2010, HBGaryFederal in 2011, PBS, Sony, Infragard Atlanta, Fox Entertainment and others. He eventually served 30 months in prison for his hacking activities.

The PayPal 14 are a group of defendants allegedly connected with the hacktivist group Anonymous, thirteen of whom pleaded guilty in a San Jose court in California, United States in December 2013, to charges of conspiring to disrupt access to the PayPal payment service. The attempted four-day disruption of PayPal's operations was allegedly in response to PayPal's refusal to process donations to Wau Holland Stiftung's PayPal account set up to collect funds for WikiLeaks, and was part of a wider Anonymous campaign, Operation Payback.

Mirai is malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' website, an attack on French web host OVH, and the October 2016 Dyn cyberattack. According to a chat log between Anna-senpai and Robert Coelho, Mirai was named after the 2011 TV anime series Mirai Nikki.

<span class="mw-page-title-main">DDoS attacks on Dyn</span> 2016 cyberattack in Europe and North America

On October 21, 2016, three consecutive distributed denial-of-service attacks were launched against the Domain Name System (DNS) provider Dyn. The attack caused major Internet platforms and services to be unavailable to large swathes of users in Europe and North America. The groups Anonymous and New World Hackers claimed responsibility for the attack, but scant evidence was provided.

<span class="mw-page-title-main">Distributed Denial of Secrets</span> Whistleblowing organization

Distributed Denial of Secrets, abbreviated DDoSecrets, is a non-profit whistleblower site founded in 2018 for news leaks. The site is a frequent source for other news outlets and has worked on investigations including Cyprus Confidential with other media organisations. In December 2023, the organisation said it had published over 100 million files from 59 countries.

The Face of Anonymous is a Canadian documentary television film, directed by Gary Lang and released in 2021. The film is a portrait of Christopher "Commander X" Doyon, a senior figure in the computer hacktivist collective Anonymous who spent several years living on the streets of Toronto as a homeless person after fleeing the United States due to criminal prosecution.

References

  1. "Feds: Homeless hacker 'Commander X' arrested". www.cbsnews.com. 2011-09-23. Archived from the original on 2023-05-20. Retrieved 2023-05-23.
  2. Allnutt, Luke (2012-10-03). "Hacktivist's Advocate: Meet the Lawyer Who Defends Anonymous". The Atlantic. Archived from the original on 2023-05-21. Retrieved 2023-05-23.
  3. "Man accused of hacking into county computers speaks in Santa Cruz; Commander X of Anonymous says he"s innocent". Santa Cruz Sentinel. 2011-10-02. Archived from the original on 2017-08-31. Retrieved 2023-05-23.
  4. Anderson, Nate (December 11, 2012). "Anon on the run: How Commander X jumped bail and fled to Canada". Ars Technica. Archived from the original on May 18, 2023. Retrieved May 18, 2023.
  5. McGuire, Patrick (2016-11-01). "Commander X, a Fugitive Homeless Hacker, Has a New Book About Hacking on the Run". Vice. Archived from the original on 2023-05-23. Retrieved 2023-05-23.
  6. "Former Mountain View Resident Christopher Doyon Apprehended In Mexico And Returned To The United States". United States Department of Justice. 2021-06-15. Archived from the original on 2023-05-20. Retrieved 2023-05-23.
  7. Anderson, Nate (June 16, 2021). "Ten-year hacktivist fugitive Commander X arrested in Mexico". Ars Technica. Archived from the original on May 18, 2023. Retrieved May 18, 2023.
  8. "Activist hacker 'Commander X' pleads guilty to federal charges for shutting down Santa Cruz County's website". The Mercury News. 2022-03-31. Archived from the original on 2022-03-31. Retrieved 2023-12-23.