Collusion Syndicate

Last updated

The Collusion Syndicate, formerly the Collusion Group and sometimes spelled Collu5ion, C0llu5i0n or C011u5i0n, was a Computer Security and Internet Politics Special Interest Group (SIG) founded in 1995 and effectively disbanded around 2002.

Contents

Collusion Group

The Collusion Group was founded in 1995 by technologist Tex Mignog, aka the TexorcisT (sic) in Dallas, Texas before moving the headquarters to Austin, Texas in 1997. Founding members included individuals that all operated anonymously using hacker pseudonyms (called "handles" or "nyms") including the TexorcisT, Progress, Sfear (sic), Anormal, StripE (sic) and Elvirus. The membership of this organization grew to an estimated 30+ by 1999 and was not localized to its headquarters in Austin, Texas, with members in other states, countries and continents. The group made numerous open appearances at computer security events such as H.O.P.E. and DefCon and was often quoted by the media on computer related security, political and cultural issues.

The group was well known for its online publication, www.Collusion.org Archived 2017-09-17 at the Wayback Machine [1] and also founded and financed other events such as the "irQconflict", the largest seasonal computer gaming tournament in the South-Central US.

The group was often interviewed with regard to Internet security issues by reporters for a variety of media outlets, some examples being KVUE News [2] [3] [4] , [5] the Austin American Statesman and Washington Post , [6] and The New York Times . [7]

www.Collusion.org

The Collusion Syndicate began publishing articles written by its members and others that submitted articles in 1997 on their site, www.Collusion.org Archived 2017-09-17 at the Wayback Machine , their stated mission being to "Learn all that is Learnable". This site won awards including a Best of Austin [8] in 2000 by the Austin Chronicle where the site was described as "an edgy cabal of net-savvy punks and vinyl-scratching, video-gaming malcontents, laying it down in no uncertain terms with a lot of dark backgrounds and urban-toothed graphics and in-your-face-yo rants."

Collusion Syndicate research on SIPRNet has been referenced by the SANS Institute . [9]

Xchicago has published tips by Collusion's founder, TexorcisT, on Google Hacking. [10]

The group's work and research is referenced in many books including Steal This Computer Book 4.0: What They Won't Tell You about the Internet, [11] Mac OS X Maximum Security [12] and Anarchitexts: Voices from the Global Digital Resistance. [13]

The group may have been tied to Assassination Politics as evidenced by declassified documents. [14]

Notable Inventions and Actions

AnonyMailer

1995 - An application developed to point out security issues with the Simple Mail Transfer Protocol.

Port-A-LAN

1998 - The Port-A-LAN [15] is described as a "LAN-in-a-Box" and designed to facilitate quick network deployments. With Cat 3 50-pin telco cable and break-out "harmonicas" to quickly deploy a 160 node network at a previously unwired location in less than one hour. (Developed prior to the advent of WiFi popularity.)

irQconflict

1998-2001 - The Collusion Syndicate hosted the irQconflict [16] [17] [18] [19] [20] [21] [22] [23] , [24] the largest seasonal computer gaming tournament in the South-Central US. These events were different in that they were very large for LAN party standards (100-200 gamers) and included a rave like atmosphere with DJs, club lighting and projectors showing computer animation and machinima. They took place in various venues in Austin, Texas, utilized Port-A-LAN technology and, due to its size, required the re-engineering of the venues' electrical wiring. These events drew attendance from all over Texas and surrounding states. The Collusion Group took the show on the road in 1999, taking the irQconflict to DefCon 7 [25] [26] and in 2000 was invited to do their thing in conjunction with SXSW Interactive and COnduit 2K electronic film festival [27] [28] and was where some machinima films chose to debut , [29] during the gaming.

Virtual Sit-ins

1999 - The Collusion Syndicate promoted Virtual Sit-ins which are manual DDoS attacks created by hundreds of protesters attempting to overload the servers of the organization they are protesting by repeatedly requesting data, manually. SecurityTraq [30] credits this site as providing an early introduction to the concept of Hacktivism and they are referenced in The Internet and Democracy, a paper by Roger Clarke Prepared for IPAA/NOIE and included in a NOIE publication in September 2004. [31] They explanation of Hactivism was published in the Hacktivist [32] and credited in the Ashville Global Report [33] as lately as 2007.

Electric Dog

2000 - The Electric Dog [34] is a remote control wireless camera robot created to demonstrate the practicality of simple robotics in routine office technical repair.

See also

Related Research Articles

<span class="mw-page-title-main">Chaos Computer Club</span> Germany based hackers organization

The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an eingetragener Verein in Germany, with local chapters in various cities in Germany and the surrounding countries, particularly where there are German-speaking communities. Since 1985, some chapters in Switzerland have organized an independent sister association called the Chaos Computer Club Schweiz (CCC-CH) instead.

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online, posing as criminals themselves. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. On the other hand, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies, and employed by state actors as a weapon of both legal and illegal warfare.

<span class="mw-page-title-main">Script kiddie</span> Unskilled malicious hacker

A script kiddie, skript kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes.

<span class="mw-page-title-main">L0pht</span> American hacker collective

L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. The group famously testified in front of Congress in 1998 on the topic of ‘Weak Computer Security in Government’.

<span class="mw-page-title-main">DEF CON</span> Annual hacker gathering in Las Vegas, Nevada

DEF CON is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">Kevin Poulsen</span> American computer hacker

Kevin Lee Poulsen is an American former black-hat hacker and a contributing editor at The Daily Beast.

A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.

DreamHack is an ESL Gaming brand specializing in esports tournaments and other gaming conventions. It is recognized by the Guinness Book of Records and Twin Galaxies as being the world's largest LAN party and computer festival with the world's fastest Internet connection and the most generated traffic. It usually holds its events in Western Europe and North America.

Michael Calce is a security expert and former computer hacker from Île Bizard, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN. He also launched a series of failed simultaneous attacks against nine of the thirteen root name servers.

<span class="mw-page-title-main">Cult of the Dead Cow</span> Hacker organization

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members.

<span class="mw-page-title-main">Black Hat Briefings</span> Computer security conference

Black Hat Briefings is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and security professionals. The conference takes place regularly in Las Vegas, Barcelona, London and Riyadh. The conference has also been hosted in Amsterdam, Tokyo, and Washington, D.C. in the past.

<span class="mw-page-title-main">Level Seven (hacker group)</span> Hacker group

The Level Seven Crew, also known as Level Seven, Level 7 or L7,[OWNER SILLYDEV#0986]. Rumoured to have dispersed in early 2010 when nominal head 'vent' was raided by the FBI on February 25, 2013.

<span class="mw-page-title-main">Summercon</span> Hacker conventions

Summercon is one of the oldest hacker conventions, and America's oldest and longest-running information security conference. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., New York City, Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.

<span class="mw-page-title-main">Ankit Fadia</span> Indian author and speaker

Ankit Fadia is an Indian self-proclaimed white-hat computer hacker, author, and television host. He is considered to be a security charlatan. His work mostly involves OS and networking tips and tricks and proxy websites.

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

Patriotic hacking is a term for computer hacking or system cracking in which citizens or supporters of a country, traditionally industrialized Western countries but increasingly developing countries, attempt to perpetrate attacks on, or block attacks by, perceived enemies of the state.

Tex Mignog (1969-2002) is a punk musician. He became known as Texorcist, which is also the punk rock band he led. Mignog is the founder and Chief Subversion Officer of the Collusion Syndicate hacker group.

milw0rm Hacker group

Milw0rm is a group of hacktivists best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998. The group conducted hacks for political reasons, including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites. The group's logo featured the slogan "Putting the power back in the hands of the people."

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

References

  1. "Collusion Website". Archived from the original on 2017-09-17. Retrieved 2018-07-18.
  2. KVUE News: Hactivism (txt) [ permanent dead link ]
  3. KVUE News: Hacktivism (ra) [ permanent dead link ]
  4. KVUE News: Info Security [ permanent dead link ]
  5. KVUE News: DDoS [ permanent dead link ]
  6. Austin American-Statesman and The Washington Post: President pledges secure but open Net [ permanent dead link ]
  7. The New York Times: Technology: Govt Comp Sec [ permanent dead link ]
  8. The Austin Chronicle: Best of Austin, 2000
  9. SANS Institute: Applied Encryption: Ensuring Integrity of Tactical Data [ permanent dead link ]
  10. Xchicago: Google Search Tips
  11. Steal This Computer Book 4.0: What They Won't Tell You about the Internet by Wally Wang
  12. Mac OS X Maximum Security by John Ray, William Ray
  13. Anarchitexts: Voices from the Global Digital Resistance by Joanne Richardson
  14. United States Inspector General: REPORT OF INVESTIGATION: JOHNSON, CARL Archived 2007-09-21 at the Wayback Machine
  15. "Collusion.org: Port-A-LAN". Archived from the original on 2007-08-21. Retrieved 2008-01-14.
  16. http://www.irQconflict.org Archived 2008-01-05 at the Wayback Machine appears to have been hijacked
  17. "irQconflict: Results - 1998.12.12-13". Archived from the original on 1999-10-01. Retrieved 2008-01-24.
  18. "irQconflict: Results - 1999.03.27-28". Archived from the original on 1999-10-01. Retrieved 2008-01-24.
  19. irQconflict: Results - 1999.06.26-27 [ permanent dead link ]
  20. "Collusion.org: "What the hell is irQconflict you ask?" - 1999.10.16-17". Archived from the original on 2007-08-15. Retrieved 2008-01-24.
  21. "irQconflict: Results - 1999.10.16-17". Archived from the original on 2002-09-21. Retrieved 2008-01-24.
  22. "Collusion.org: "irQconflict Rocks On!" - 1999.10.16-17". Archived from the original on 2007-08-21. Retrieved 2008-01-24.
  23. "Collusion.org: "irQconflict" - 2000.02.26-27". Archived from the original on 2007-08-15. Retrieved 2008-01-24.
  24. "Collusion.org: "irQconflict" - 2001.04.07-08". Archived from the original on 2007-07-09. Retrieved 2008-01-24.
  25. "Collusion.org: "irQconflict Goes to DefCon" - 1999.07.09-11". Archived from the original on 2000-05-19. Retrieved 2008-01-24.
  26. DefCon 7: "Official" Events
  27. Machinima: Conduit 2K [ permanent dead link ]
  28. "irQconflict - 2000.03.12-13 - Open Invitation". Archived from the original on 2007-07-09. Retrieved 2008-01-24.
  29. Machinima: Rick Jones 2
  30. "SecurityTraq security resources directory: Collusion.org". Archived from the original on 2013-01-26. Retrieved 2008-01-24.
  31. "The Australian National University: Roger Clark "Internet and Democracy"". Archived from the original on 2007-11-14. Retrieved 2008-01-24.
  32. "The Hacktivist: Introduction to Hacktivism". Archived from the original on 2006-05-27. Retrieved 2008-01-24.
  33. Ashville Global Report: Nuclear disarmament gets critical
  34. "Collusion.org: Robot Dog". Archived from the original on 2007-08-15. Retrieved 2008-01-14.