Operation AntiSec

Last updated

An image that Anonymous has used to represent the operation; it contains elements of symbols used to represent both Anonymous and LulzSec. AntiSec.svg
An image that Anonymous has used to represent the operation; it contains elements of symbols used to represent both Anonymous and LulzSec.

Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of the hacking group LulzSec and Anonymous, and others inspired by the announcement of the operation. LulzSec performed the earliest attacks of the operation, with the first against the Serious Organised Crime Agency on 20 June 2011. Soon after, the group released information taken from the servers of the Arizona Department of Public Safety; Anonymous would later release information from the same agency two more times. An offshoot of the group calling themselves LulzSecBrazil launched attacks on numerous websites belonging to the Government of Brazil and the energy company Petrobras. LulzSec claimed to retire as a group, but on 18 July, they reconvened to hack into the websites of British newspapers The Sun and The Times , posting a fake news story of the death of the publication's owner Rupert Murdoch.

Contents

Anonymous released their first cache of the operation on 27 June 2011, taken from an anti-cyberterrorism program run by the United States Department of Homeland Security and Federal Emergency Management Agency. They continued attacks on the Arizona government. They also launched attacks against the governments of Brazil, Zimbabwe, and Tunisia. Their most recent attacks have been against large corporations, NATO, and various United States law enforcement websites. Anonymous has used the stolen credit card numbers of police officers to make unauthorized donations to various causes. Others have also committed hacks in the name of the operation, including a hack into the Fox News Twitter account to post a false news story about the assassination of President of the United States Barack Obama and attacks on the websites of government entities in various countries. The groups involved have published sensitive government and corporate information, as well as the email addresses, names, and social security numbers, and credit card numbers of website users.

Law enforcement has launched investigations into many of the attacks committed as part of Operation AntiSec. At least seven arrests have been made in connection to activities related to the operation, including the arrests of two purported LulzSec members, a man who provided LulzSec with security vulnerability information, and four alleged members of AntiSec NL, a group inspired by the operation.

Background

The LulzSec hacking group formed in May 2011 and came to international prominence after hacking the websites of the Public Broadcasting Service, Sony, and the United States Senate. [1] [2] Initially, the group claimed to hack "for the lulz" and to enjoy the chaos that follows their intrusions. [3] [4] However, on 20 June 2011, the group announced that they were teaming up with hacking collective Anonymous for a series of attacks they dubbed Operation Anti-Security or Operation AntiSec. The press release accompanying the beginning of the operation called for supporters to steal and publish classified government documents under the name AntiSec. Major banks and corporations were also mentioned as potential targets. [5] Though LulzSec disbanded as a group on 26 June 2011, members have been reported to be continuing the operation from within Anonymous. [6] [7]

The groups involved claim that the operation aims to protest government censorship and monitoring of the internet. [8] LulzSec members also mention ending what they believe are corrupt racial profiling and copyright laws as a goal of the operation. [9] The War on Drugs has also been given as a reason for particular hacks. [10] In contrast, USA Today described the operation as cyberwarfare targeting governments and large corporations. [11]

LulzSec activities

June 2011

LulzSec launched the first attacks of the operation against the Serious Organised Crime Agency, the national law enforcement agency of the United Kingdom that handles cybercrime. The group launched a distributed denial-of-service attack against the agency's website on 20 June, taking it offline for only a few minutes. [12] On the same day, they knocked the website of the Jianhua District in Qiqihar, China, offline. [13]

On 23 June, the group released a large cache of documents taken from the servers of the Arizona Department of Public Safety. The release, titled "chinga la migra", roughly translating to "fuck the border patrol", including email addresses and passwords and hundreds of documents marked "sensitive" or "for official use only". [14] The group claimed that they did so in retaliation for the passage of Arizona SB 1070, a law they saw as leading to unjust racial profiling. [15] Arizona complained that the release of officer identities and the personal information of their families could put them and their families in danger and gave those exposed security protection. In response, they mobilized the Arizona Counter Terrorism Information Center and locked remote access of Department of Public Safety email accounts. [16]

On 25 June 2011, the group released what they described as their last dump of the operation. The release contained a large amount of information from varied sources. Included was information from numerous companies, including half a gigabyte of data from telecommunications company AT&T and IP addresses from Sony, Viacom, Disney, EMI, and NBC Universal. [17] [18] The AT&T portion included information pertaining to the release of the 4G LTE, 90,000 personal phones used by IBM, and the development of the iPad 3. [18] [19] It also contained over 750,000 usernames and password combinations, including 200,000 from hackforums.net, 12,000 from the NATO online bookstore, 500,000 from the online video game Battlefield Heroes, 50,000 from various video game forums, and 29 from Irish private investigation company Priority Investigations. [18] Finally, an internal manual for AOL engineers and a screencapture of the United States Navy website navy.mil after being vandalized. [18]

On 22 June, an offshoot of the group calling themselves LulzSecBrazil took down the website of the Government of Brazil, brasil.gov.br, and the President of Brazil, presidencia.gov.br. [20] [21] They also targeted the website of Brazilian energy company Petrobras. [22] On 24 June, they claimed to publish access codes and passwords to the Petrobras website along with personnel profiles. However, the company denied that any information had been stolen, and the group removed the claim from their Twitter feed a few hours later. [23] The group also published the personal information of President of Brazil Dilma Rousseff and Mayor of São Paulo Gilberto Kassab. [24]

July 2011

Despite claiming to have retired, on 18 July LulzSec hacked into the website of British newspaper The Sun . [25] The group redirected the newspaper's website to an also-hacked redesign website of another newspaper The Times , altering the site to resemble The Sun and posting a fake story claiming that Rupert Murdoch had died after ingesting a fatal dose of palladium. [26] They objected to the involvement of News Corporation, the Murdoch-owned company that publishes The Sun and The Times, in a large phone hacking scandal. The hacked website also contained a webcomic depicting LulzSec deciding on and carrying out the attack. [25] [27] The group later redirected The Sun website to their Twitter feed. News International released a statement regarding the attacks before having the page the statement appeared on also redirected to the LulzSec Twitter page and eventually taken offline. The group also released the names and phone numbers of a reporter for The Sun and two others associated with the newspaper and encouraged their supporters to call them. [28] The group further included an old email address and password of former News International executive Rebekah Brooks. [28] News Corporation took the websites offline as a precaution later in the day. [29]

Anonymous activities

June 2011

On 27 June 2011, Anonymous published information relating to the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory program, or Sentinel program, an operation run by the United States Department of Homeland Security and Federal Emergency Management Agency. The hack included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of Federal Bureau of Investigation bureau locations, details on counter-hacking tools, and form letters that law enforcement agencies used to obtain user details from internet service providers. [30]

On 28 June, the group released the second collection of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed "Chinga la Migra Communique Dos", or "Fuck the Border Patrol Message Two", the data file contained the names, addresses, phone numbers, internet passwords, and social security numbers of a dozen Arizona police officers. It also contained the emails, voicemails, chat logs of some of them; in at least one instance it included sexually explicit photographs from one of the officer's girlfriends. [31] Anonymous also claimed that the documents included officers forwarding racist chain emails, evidence of K-9 unit officers using percocet, and a Fraternal Order of Police member who is also a convicted sex offender. [31] Anonymous noted that their motivation stemmed from a desire to make police officers "experience just a taste of the same kind of violence and terror they dish out on an every day basis." [31]

On the same day, the group released information obtained from various government sources. Government data from Anguilla, passwords from servers belonging to the Government of Brazil, the users of Zimbabwe government websites, and data from the Municipality of Mosman council were included. [32] The Mosman council dump included mainly publicly available information from the website as well as a not-publicly-available prototype version of the website that had not yet been launched. [33] They claimed to also have access to all Zimbabwean government websites ending in gov.zw. [32] Most of the information and control were given through SQL injection. Anonymous claimed they targeted Brazil for what they saw as data manipulation and Zimbabwe for the controversial 2008 Zimbabwean presidential election. [34] They also gained control of a website belonging to the Government of Tunisia. They replaced the webpage with a graphic representing Anonymous with text reading "The Internet is the last frontier and we will not let corrupt governments spoil it. We are Anonymous, We are LulzSec, We are People from around the world who are stepping in the name of freedom". [35] The release also included a file containing internal mapping of Viacom servers as well as passwords and data from umusic.com, a website of Universal Music Group. [34] They also released the names of 2,800 members of the Black Eagles paramilitary group. [36]

July 2011

On 1 July, Anonymous once again targeted Arizona law enforcement by publishing a number of backdoors that could be used to access Arizona police servers to Pastebin. Arizona was forced to pull many websites offline for a time. [37] Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They also claimed to have found "anti-Muslim" emails during the attack. [38] On 3 July, Anonymous hacked into the database of the Democratic Party of Orange County, Florida. They published a partial membership list and a handbook for precinct committee members. The hack was also considered part of the group's OpOrlando plan. [39] On 4 July, Anonymous released a document containing 27 administrative usernames and passwords from an Apple Inc. system used to operate online technical support follow-up surveys. [40] [41] The encrypted passwords were taken from an SQL database. [42]

Anonymous launched what it dubbed "Turkish Takedown Thursday" on 6 July. They posted internal data from over one hundred .tr websites and brought down and replaced the content of 74 of them. [43] The 74 sites had their normal pages replaced with an Antisec logo and a message denouncing supposed attempts at internet censorship by the Turkish government. [44] Websites affected included that of a children's hospital, but not of any key government agencies. [45] On the same day, the group released database dumps taken from 20 universities in Italy. Two days later, Italian police arrested 15 alleged members of Anonymous ranging in age from 15 to 28. The group vowed revenge for the raids. [46]

On 8 July, the group claimed responsibility for hacks against IRC Federal, an engineering firm that contracts with the Federal Bureau of Investigation and other agencies of the United States federal government. Internal database documents and personnel email were stolen during the attack. The group also claimed to have vandalized the firm's website and forcing them to take it offline. The group says that in the documents procured, they found a proposal to the FBI for the firm to produce a "Special Identities Modernization (SIM) Project" that would help identify those who might present a criminal or terrorist risk in the future, fingerprinting contracts with the United States Department of Justice, and biometrics contracts with the military. [47] They also claimed to have obtained information allowing them to log into various virtual private networks and access panels belonging to the United States Department of Energy. They also sent a message to company employees urging them to work against the government rather than for it. [48] The hack was done with a simple SQL injection. [49]

On 11 July, Anonymous hacked into systems belonging to defense contractor Booz Allen Hamilton, breaking through barriers that the group described as having "no security measures in place." They released what they said were 90,000 email accounts and encrypted passwords from United States Central Command, United States Special Operations Command, the United States Marine Corps, the United States Air Force, the United States Department of Homeland Security, United States Department of State, and various private sector contractors, calling the released "Military Meltdown Monday". [50] [51] They also sarcastically posted an invoice charging the company for "security audit services rendered". [51] Despite Anonymous' claims that 90,000 emails were released, the Associated Press counted only 67,000 unique emails, of which only 53,000 were military addresses. The remainder of the addresses came from educational institutions and defense contractors. [52] The Department of Defense said they were aware of the incident and were coordinating with other agencies for a response. [53] Booz Allen confirmed the intrusion on 13 July, but contradicted Anonymous' claims in saying that the attack never got past their own systems, meaning that information from the military should be secure. [54]

On 12 July, the group attacked the web servers of agricultural biotechnology company Monsanto and released information on the company's employees, including names, addresses, and email addresses. The group claimed they performed the attack to protest the company's lawsuits against farmers who manufacture organic milk in an effort to stop them from stating on the label that their milk does not contain artificial Bovine Growth Hormones. [55] Monsanto confirmed the attack but claimed that only about ten percent of the information published came from current or former employees of the company. They said that the other ninety percent were email addresses and names of media contacts and employees of other agricultural companies. [56]

On 21 July, Anonymous released two PDFs purportedly taken from servers belonging to NATO. They claimed via Twitter to have obtained around one gigabyte of data that they would release portions of over the course of a few days. The group claimed that some of the data was so sensitive that they felt it would be irresponsible to release, and thus would only make a portion of what was taken available. The first two documents released relate to outsourcing communication and information services (CIS) in Kosovo and the funding request for the project. [57] [58]

The Austrian branch of Anonymous hacked the website of the Austrian Gebühren Info Service, the television license agency run by the Austrian national public service broadcaster, on 22 July. They accessed 214,000 records containing personal information and stole the banking data of 96,000 people from the server. The counter-terrorism bureau of the country launched an investigation and were preparing to file criminal complaints against those involved. [59]

On 25 July, first posted confidential information that they claimed came from the Italian Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche, translated as the National Anti-Crime Computer Center for Critical Infrastructure Protection, an agency tasked with protecting vital computer systems for the country. The Twitter account @anonesc posted less than 100 megabytes of data, but they claimed to have taken over eight gigabytes. The data related to oil, nuclear, and other firms deemed to be involved in "critical infrastructure", as well as government agencies including the Department of Defence of Australia. [60]

On 29 July, Anonymous hacked the FBI-contractor ManTech International. They posted a PDF of a résumé sent into the company as proof that they had infiltrated their systems. Anonymous claimed that the attack would be the first part of a promised "Fuck FBI Friday", or FFF, campaign as part of the larger Operation AntiSec. [61] They published 400 megabytes of content from the company later the same day. The internal documents generally concern contracts that ManTech has with NATO, the nature of which Anonymous claims shows a waste of taxpayer money. [62] The files also include dealings with the United States Army and a list of employee emails. [63]

On 31 July, Anonymous attacked the websites of 77 different law enforcement websites hosted on the same server. As much as 10 gigabytes of data was taken, including the personal information of police officers from numerous jurisdictions. Emails were also taken, as well as the confidential information of inmates and confidential informants, though not released yet. Anonymous said that they would redact inmate names but would release the names of all " informants who had the false impression that they would be able to 'anonymously' snitch in secrecy." The release also included a demand that all arrested members of Anonymous be released immediately. [64] Some of the information released, however, was already publicly available. [65] They proceeded to release the social security numbers of over 100 police officers from the Missouri Sheriffs' Association website. [66] The following Saturday, 6 August, they released a cache of data from the websites title "Shooting Sheriffs Saturday Release" which included the information taken from law enforcement websites. Large amounts of personal information was included, with Anonymous stating, "We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information. For too long they have been using and abusing our personal information." [67] Anonymous claimed that their motive was revenge over the arrests of a number of participants in previous operations and of LulzSec and Anonymous member Topiary. They also used stolen credit card numbers to make donations to the American Civil Liberties Union, Electronic Frontier Foundation, and the Chelsea Manning Support Network. [67]

August 2011

On 16 August, Anonymous gained access to the email account of Richard Garcia, former assistant director in charge of the FBI field office in Los Angeles and senior vice president of Vanguard Defense Industries, in the name of AntiSec. They claimed that the firm's relationships with United States military and law enforcement organizations made it a legitimate target as part of the operation. They also claimed to have breached the company's website, which was running on a WordPress platform, though the company says that their website was never affected. [68] The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email account; it mainly related to Garcia's former role with InfraGard. [69]

September 2011

In retaliation for arrests of people who allegedly participated in Operation AntiSec, and especially Topiary, Anonymous attacked the website of the Texas Police Chiefs Association. On 1 September, the group defaced the website and released documents from it marked "law enforcement sensitive" and "for official use only". The release also included police officer private email. The same day, the group brought down the website of the United States Court of Appeals for the Ninth Circuit for the justice system's characterization of Anonymous activities as "cyber-terrorism". [70]

October 2011

On 21 October, announced a dump of data related to law enforcement in support of the Occupy Wall Street and Occupy movement. The dump including data taken from the International Association of Chiefs of Police, Boston Police Patrolmen's Association, and the Sheriff's office of Baldwin County, Alabama. A number of police websites virtually hosted together also had their content replaced with an anti-police rap video. [71] The dump 600 megabytes of information including membership rosters, internal documents, and social security numbers from the International Association of Chiefs of Police; nearly 1000 names, ranks, addresses, phone numbers, and social security numbers of police officers in Jefferson County, Alabama, and Birmingham, Alabama; 1000 names and passwords of members of the Boston Police Patrolmen's Association; and the financial information and client list of web developer and marketing company Matrix Group, a business with several law enforcement clients. [71] [72] AntiSec claimed that at least 40 law enforcement related websites were included in the attack. [73]

November 2011

On 18 November 2011, Anonymous posted 38,000 email messages from the Gmail account of Alfredo "Fred" Baclagan, a special agent supervising computer crime investigations with the California Department of Justice and the Computer and Technology Crime Hightech Response Team, to a site on Tor and to The Pirate Bay. [74] [75] They also added what they claimed were Baclagan's personal home address and phone number. The group claimed the action as part of their attack on law enforcement in support of the Occupy movement and in protest for prosecution of computer criminals in general. They also claimed to have read his text messages, listened to his voicemail, and used his Google Voice account to call and text his friends and family. [74] They also purchased a camera using his Google Wallet. [75] The release includes forensic experts discussing techniques for tracking cybercriminals and how different companies respond to law enforcement requests for information. [75]

September 2012

On 4 September 2012, 1 million unique device IDs for Apple products were published by a group associated with Anonymous. [76] The group claimed that the 1 million IDs were part of a dataset of 12.36 million records taken from an FBI laptop. [76] The FBI responded by saying they were not aware of any unauthorized data release. [77] Going further the FBI also stated that there is no reason that they have "sought or obtained" the data that was "stolen". [78]

According to an Ars Technica article published on 10 September:

A digital publishing company named BlueToad has come forward to take responsibility for the leak of a million iOS unique device identifiers (UDIDs) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the company's systems in order to steal the file. [79]

Actions by other groups and individuals

The original announcement of Operation Anti-Security included a call from LulzSec to spread the name "AntiSec" through physical graffiti. [11] A few days after, a number of locations in Mission Beach, San Diego, were vandalized with pieces of graffiti reading the phrase. [80] [81]

On 4 July, a Fox News Twitter account (@foxnewspolitics) was hacked and false tweets reporting that President of the United States Barack Obama has been shot three times and killed were sent from the account. [82] The Script Kiddies, a group with close ties to Anonymous including two hackers with former membership in the group, claimed responsibility for the attack and hoax. The group claimed that the action was in the name of Operation Anti-Security and that they would continue looking to expose information on corporations "to assist with antisec." [83] The United States Secret Service is investigating the incident as a threat on the President. [84] The group subsequently hacked into the Facebook page of pharmaceutical company Pfizer, claiming they did so for "moral reasons" as part of AntiSec. [85] They posted numerous messages to the company's Facebook wall mocking their security. [86]

On 4 July, someone going by the name f1esc posted a file to The Pirate Bay containing 600 megabytes of information described as national "AU election data" and labelled with the tag #Antisec. In reality, the data concerned the 2011 New South Wales state election and was taken from a government website designed to provide election results where the data was publicly available, and the data proved freely accessible information instead of a hack. [87] In early July, the group RedHack hacked into and defaced over 1000 websites based in Turkey. They claimed to do so both to mark the anniversary of the Sivas massacre and as part of Operation Anti-Security. The websites belonged both to agencies of the Government of Turkey and Adnan Oktar, an Islamic creationist. The group vowed to continue contribution to the AntiSec operation. [88]

On 6 July, a hacker called p0keu released of around 2,658 usernames, passwords hidden behind hash functions, and email addresses from the blog TamilCanadian.com. He gave no reason for why he chose the website to attack other than that he did so under the AntiSec label. [89] On 14 July, he leaked part of the Stevens Institute of Technology website database. At least 31 of the records in the database contained plain text files with email addresses, user names, and passwords of site users. p0keu posted the user information to Pastebin. [90] p0keu has continued hacking, but has not labelled all of his releases with the AntiSec slogan. [91]

In the Netherlands, a splinter group inspired by LulzSec formed, calling themselves AntiSec NL. The group hacked into the websites of online dating service pepper.nl and software company Nimbuzz. Four people believed by police to be members were later arrested. [92]

On 24 July, a group called BashCrew hacked the website of the House of Representatives of the Philippines in the name of AntiSec. The names, telephone numbers, and email addresses of members of the Filipino Congress were released via Pastebin, with the group claiming that they may also release blood types and the private websites of some members. [93]

A hacker going by the name Thehacker12, a self-purported AntiSec supporter but not a member of Anonymous, released data stolen from event management company allianceforbiz.com on 24 August 2011 on Mediafire and Pastebin. The release contained a spreadsheet of usernames, email addresses, passwords, employers, and other information of around 20,000 people, many of them United States government employees or contractors. The organization with the most employees compromised was the Small Business Administration. [94]

Law enforcement response

Law enforcement agencies in various countries have arrested or searched the property of alleged participants in Operation AntiSec. These suspects have come from different groups who carried out attacks as part of the operation. On 11 July, prosecutors in the Netherlands released details of the arrests of four suspects aged 17, 18, 25, and 35. All were located in different Dutch and cities and accused of being part of the hacking group AntiSec NL, an operation participant inspired by LulzSec. On 19 July 2011, the London Metropolitan Police announced the arrest of possible core LulzSec member T-flow. A 16-year-old male was arrested in South London on charges of violating the Computer Misuse Act as part of an operation involving the arrest of several other hackers affiliated with Anonymous in the United States and United Kingdom. [95] [96] On the same day, the FBI arrested 21-year-old Lance Moore in Las Cruces, New Mexico. He was accused of stealing thousands of documents and applications from AT&T that LulzSec published as part of their so-called "final release" of the operation. LulzSec denied that any of their membership had been arrested, stating "there are six of us, and we're all still here." [92] The four, going by the online handles Ziaolin, Calimero, DutchD3V1L, and Time, were arrested on 19 July and their computers and electronic equipment confiscated as evidence. Prosecutors identified the suspects after computer security company Fox-IT helped them gain access to a chat channel thought to be used by the group. [92]

The Police Central E-Crime Unit arrested an 18-year-old man from Shetland on 27 July 2011 suspected of being LulzSec member Topiary. They also searched the house of and interviewed a 17-year-old from Lincolnshire possibly connected to the investigation. [97] Scotland Yard later identified the man arrested as Yell, Shetland resident Jake Davis. He was charged with unauthorized access of a computer under the Computer Misuse Act 1990, encouraging or assisting criminal activity under the Serious Crime Act 2007, conspiracy to launch a denial-of-service attack against the Serious Organised Crime Unit contrary to the Criminal Law Act 1977, and criminal conspiracy also under the Criminal Law Act 1977. [98] Police confiscated a Dell laptop and a 100-gigabyte hard drive that ran 16 different virtual machines. Details relating to an attack on Sony and hundreds of thousands of email addresses and passwords were found on the computer. [99] A London court released Davis on bail under the conditions that he live under curfew with his parents and have no access to the internet. His lawyer Gideon Cammerman stated that, while his client did help publicize LulzSec and Anonymous attacks, he lacks the technical skills to have been anything but a sympathizer. [99]

In early September 2011, Scotland Yard made two further arrests relating to LulzSec. Police arrested a 24-year-old male in Mexborough, South Yorkshire, and a 20-year-old male in Warminster, Wiltshire. The two are accused of conspiring to commit offenses under the Computer Misuse Act of 1990; police said that the arrests related to investigations into LulzSec member Kayla. [100]

On 6 March 2012, two men from Great Britain, one from the United States, and two from Ireland were charged in connection to their alleged involvement with LulzSec. The FBI revealed that supposed LulzSec leader Hector Xavier Monsegur, who went by the username Sabu, had been aiding law enforcement since pleading guilty to twelve counts, including conspiracy and computer hacking, on 15 August 2011 as part of a plea deal. [101] In exchange for his cooperation, federal prosecutors agreed not to prosecute Monsegur for his computer hacking, and also not to prosecute him for two attempts to sell marijuana, possession of an illegal handgun, purchasing stolen property, charging $15,000 to his former employer's credit card in a case of identity theft, and directing people to buy prescription drugs from illegal sources. He still faces a misdemeanor charge of impersonating a federal agent. [102] Five suspects were charged with conspiracy: Jake Davis, accused of being the hacker "Topiary" (who had been previously arrested); Ryan Ackroyd of London, accused of being "Kayla"; Darren Martyn of Ireland, accused of being "pwnsauce"; Donncha O’Cearrbhail of Ireland, accused of being "palladium"; and Jeremy Hammond of Chicago, accused of being "Anarchaos". While not a member of LulzSec, authorities suspect Hammond of being a member of Anonymous and charged him with access device fraud and hacking in relation to his supposed involvement in the December 2011 attack on intelligence company Stratfor as part of Operation AntiSec. [101]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

<span class="mw-page-title-main">Timeline of Internet conflicts</span>

The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

<span class="mw-page-title-main">Jeremy Hammond</span> American political activist and hacker

Jeremy Alexander Hammond, also known by his online moniker sup_g, is an American anarchist activist and former computer hacker from Chicago. He founded the computer security training website HackThisSite in 2003. He was first imprisoned over the Protest Warrior hack in 2005 and was later convicted of computer fraud in 2013 for hacking the private intelligence firm Stratfor and releasing data to WikiLeaks, and sentenced to 10 years in prison.

<span class="mw-page-title-main">Anonymous (hacker group)</span> Decentralized hacktivist group

Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.

Michael Gregory Hoglund is an American author, researcher, and serial entrepreneur in the cyber security industry. He is the founder of several companies, including Cenzic, HBGary and Outlier Security. Hoglund contributed early research to the field of rootkits, software exploitation, buffer overflows, and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds a patent on fault injection methods for software testing, and fuzzy hashing for computer forensics. Due to an email leak in 2011, Hoglund is well known to have worked for the U.S. Government and Intelligence Community in the development of rootkits and exploit material. It was also shown that he and his team at HBGary had performed a great deal of research on Chinese Government hackers commonly known as APT. For a time, his company HBGary was the target of a great deal of media coverage and controversy following the 2011 email leak. HBGary was later acquired by a large defense contractor.

<span class="mw-page-title-main">Antisec Movement</span> Hacking (computer security)

The Anti Security Movement is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information. The general thought behind this is that the computer security industry uses full disclosure to profit and develop scare-tactics to convince people into buying their firewalls, anti-virus software and auditing services.

The Jester is a self-identified grey hat hacktivist. He claims to be responsible for attacks on WikiLeaks and Islamist websites. He claims to be acting out of American patriotism.

HBGary is a subsidiary company of ManTech International, focused on technology security. In the past, two distinct but affiliated firms had carried the HBGary name: HBGary Federal, which sold its products to the US Government, and HBGary, Inc. Its other clients included information assurance companies, computer emergency response teams, and computer forensic investigators. On 29 February 2012, HBGary, Inc. announced it had been acquired by IT services firm ManTech International. At the same time, HBGary Federal was reported to be closed.

Jake Leslie Davis, best known by his online pseudonym Topiary, is a British hacktivist. He has worked with Anonymous, LulzSec, and other similar groups. He was an associate of the Internet group Anonymous, which has publicly claimed various online attacks, including hacking HBGary, Westboro Baptist Church, and Gawker. They have also claimed responsibility for the defacing of government websites in countries such as Zimbabwe, Syria, Tunisia, Ireland, and Egypt.

<span class="mw-page-title-main">LulzSec</span> Hacker group

LulzSec was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist Hector Monsegur, who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. Prior, British authorities had announced the arrests of two teenagers they alleged were LulzSec members, going by the pseudonyms T-flow and Topiary.

Teamp0ison was a computer security research group consisting of 3 to 5 core members. The group gained notoriety in 2011/2012 for its blackhat hacking activities, which included attacks on the United Nations, NASA, NATO, Facebook, Minecraft Pocket Edition Forums, and several other large corporations and government entities. TeaMp0isoN disbanded in 2012 following the arrests of some of its core members, "TriCk", and "MLT".

Hector Xavier Monsegur, known also by the online pseudonym Sabu, is an American computer hacker and co-founder of the hacking group LulzSec. Monsegur became an informant for the FBI, working with the agency for over ten months to aid them in identifying the other hackers from LulzSec and related groups while facing a sentence of 124 years in prison. LulzSec intervened in the affairs of organizations such as News Corporation, Stratfor, UK and American law enforcement bodies and Irish political party Fine Gael.

Anonymous is a decentralized virtual community. They are commonly referred to as an internet-based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.

<i>We Are Legion</i> 2012 American film

We Are Legion: The Story of the Hacktivists is a 2012 documentary film about the workings and beliefs of the self-described "hacktivist" collective, Anonymous.

<span class="mw-page-title-main">NullCrew</span>

NullCrew was a hacktivist group founded in 2012 that took responsibility for multiple high-profile computer attacks against corporations, educational institutions, and government agencies.

RedHack is a Turkish Marxist-Leninist computer hacker group founded in 1997. The group has claimed responsibility for hacking the websites of institutions which include the Council of Higher Education, Turkish police forces, the Turkish Army, Türk Telekom, and the National Intelligence Organization others. The group's core membership is said to be twelve. RedHack is the first hacker group which has been accused of being a terrorist organization and circa 2015 is one of the world's most wanted hacker groups.

<span class="mw-page-title-main">Mustafa Al-Bassam</span> Iraqi-British computer hacker and co-founder of LulzSec

Mustafa Al-Bassam is an Iraqi- British computer security researcher, hacker, and co-founder of Celestia Labs. Al-Bassam co-founded the hacker group LulzSec in 2011, which was responsible for several high profile breaches. He later went on to co-found Chainspace, a company implementing a smart contract platform, which was acquired by Facebook in 2019. In 2021, Al-Bassam graduated from University College London, completing a PhD in computer science with a thesis on Securely Scaling Blockchain Base Layers. In 2016, Forbes listed Al-Bassam as one of the 30 Under 30 entrepreneurs in technology.

Ryan Ackroyd, a.k.a.Kayla and also lolspoon, is a former black hat hacker who was one of the six core members of the computer hacking group "LulzSec" during its 50-day spree of attacks from 6 May 2011 until 26 June 2011. Throughout the time, Ackroyd posed as a female hacker named "Kayla" and was responsible for the penetration of multiple military and government domains and many high profile intrusions into the networks of Gawker in December 2010, HBGaryFederal in 2011, PBS, Sony, Infragard Atlanta, Fox Entertainment and others. He eventually served 30 months in prison for his hacking activities.

References

  1. Morse, Andrew; Sherr, Ian (6 June 2011). "For Some Hackers, The Goal Is Just To Play A Prank". The Wall Street Journal. p. B1. Retrieved 6 June 2011.
  2. Svensson, Peter (27 June 2011). "Parting is such tweet sorrow for hacker group". The Sydney Morning Herald . Retrieved 29 June 2011.
  3. Murphy, David (19 June 2011). "Three Reasons to Fear Lulzsec: Sites, Skills, and Slant". PC Magazine . Ziff Davis. Archived from the original on 15 December 2011. Retrieved 20 June 2011.
  4. Taylor, Jerome (16 June 2011). "Who are the group behind this week's CIA hack?". The Independent . London. Independent Print Limited. Archived from the original on 19 June 2011. Retrieved 20 June 2011.
  5. Ross, Nick (20 June 2011). "Lulzsec teams up with Anonymous". ABC Online . Australian Broadcasting Corporation . Retrieved 20 June 2011.
  6. Olivarez-Giles, Nathan (29 June 2011). "AntiSec 'hackers without borders' claim new hack on Arizona state police". Los Angeles Times . Los Angeles. Tribune Company. Archived from the original on 3 July 2011. Retrieved 30 June 2011.
  7. Weisenthal, Joe (25 June 2011). "Notorious Hacker Group LulzSec Just Announced That It's Finished". Business Insider . Silicon Alley Insider. Archived from the original on 27 June 2011. Retrieved 25 June 2011.
  8. Stevenson, Alastair (22 June 2011). "Operation Anti-Security: Anonymous yet to act while LulzSec rampage". International Business Times . New York City. Archived from the original on 25 June 2011. Retrieved 24 June 2011.
  9. Watts, Susan (24 June 2011). "Newsnight online 'chat' with Lulz Security hacking group". BBC News . London. BBC. Archived from the original on 1 July 2011. Retrieved 30 June 2011.
  10. Bright, Peter (25 June 2011). "LulzSec's first Operation Anti-Security release: Arizona DPS". Ars Technica . Condé Nast Publications. Archived from the original on 9 July 2011. Retrieved 5 July 2011.
  11. 1 2 Acohido, Byron (20 June 2011). "LulzSec, Anonymous declare war against governments, corporations". USA Today . McLean, Virginia. Gannett Company. Archived from the original on 23 June 2011. Retrieved 20 June 2011.
  12. Meyer, David (20 June 2011). "LulzSec claims Soca hack". ZDNet . CBS Interactive. Archived from the original on 14 January 2013. Retrieved 20 June 2011.
  13. Ragan, Steve (21 June 2011). "LulzSec and Anonymous: Hunting for skeletons hidden in closets". The Tech Herald. Archived from the original on 27 June 2011. Retrieved 21 June 2011.
  14. Aamoth, Doug (23 June 2011). "LulzSec Claims Breach Against Arizona Law Enforcement". Techland (Time). Retrieved 23 June 2011.
  15. Tsotsis, Alexia (23 June 2011). "LulzSec Releases Arizona Law Enforcement Data in Retaliation For Immigration Law". TechCrunch. Retrieved 23 June 2011.
  16. "DPS Victim of Cyber Attack". Press Releases. Phoenix, Arizona: Arizona Department of Public Safety. 27 June 2011. Archived from the original on 1 July 2011. Retrieved 30 June 2011.
  17. Whittaker, Zack (25 June 2011). "LulzSec disbands: Final cache includes AT&T internal data and 750,000 user accounts". ZDNet . CBS Interactive. Archived from the original on 29 June 2011. Retrieved 26 June 2011.
  18. 1 2 3 4 Greenberg, Andy (25 June 2011). "LulzSec Says Goodbye, Dumping NATO, AT&T, Gamer Data". Forbes Magazine . New York City. Forbes. Archived from the original on 23 January 2013. Retrieved 26 June 2011.
  19. Sin, Gloria (28 June 2011). "LulzSec leaked AT&T LTE rollout plans and iPad 3 rumor". CNET . CBS Interactive. Archived from the original on 20 March 2012. Retrieved 4 July 2011.
  20. Emery, Daniel (22 June 2011). "LulzSec hits Brazilian websites". BBC. Retrieved 22 June 2011.
  21. Clark, Jack (22 June 2011). "LulzSec takes down Brazil government sites". CNet. Retrieved 22 June 2011.
  22. McMillan, Robert (22 June 2011). "Brazilian Government, Energy Company Latest LulzSec Victims". PC World . IDG. Archived from the original on 25 June 2011. Retrieved 22 June 2011.
  23. Rapoza, Kenneth (25 June 2011). "LulzSec Strikes Brazil Again; Petrobras Denies Being Hacked". Forbes Magazine . New York City. Forbes. Archived from the original on 27 June 2011. Retrieved 26 June 2011.
  24. Lopez, Luciana; Brian Ellsworth (24 June 2011). Anthony Boadle (ed.). "Hackers target Brazilian statistics agency". Reuters. London. Archived from the original on 27 June 2011. Retrieved 26 June 2011.
  25. 1 2 Gayomail, Chris (18 July 2011). "LulzSec Hacks 'News of the World' and 'The Sun,' Plants Fake Murdoch Death Story". Time . New York City. Time Inc. Archived from the original on 20 July 2011. Retrieved 18 July 2011.
  26. Rovzar, Chris (18 July 2011). "Website of Murdoch's Sun Hacked". New York Magazine . New York City. New York Media Holdings. Archived from the original on 21 July 2011. Retrieved 18 July 2011.
  27. Anonymous (18 July 2011). "Media moguls body discovered". The Times . London: News Corporation. Archived from the original on 25 May 2024. Retrieved 18 July 2011.
  28. 1 2 Mills, Elinor (18 July 2011). "Hackers target Murdoch newspaper Web site". CNET . CBS Interactive. Archived from the original on 9 November 2011. Retrieved 19 July 2011.
  29. "Lulz Security hackers target Sun website". BBC News . London: BBC. 18 July 2011. Archived from the original on 19 July 2011. Retrieved 19 July 2011.
  30. Reisinger, Don (27 June 2011). "Anonymous ready to roll in post-LulzSec world". CNET . CBS Interactive. Archived from the original on 9 November 2011. Retrieved 5 July 2011.
  31. 1 2 3 Albanesius, Chloe (29 June 2011). "LulzBoat Sails On: Anonymous Dumps More Arizona Data". PC Magazine . Ziff Davis. Archived from the original on 14 December 2011. Retrieved 5 July 2011.
  32. 1 2 Wilson, Dean (28 June 2011). "Anonymous hacks Anguilla, Brazil, Zimbabwe and Australia governments". The Inquirer . Incisive Media. Archived from the original on 1 July 2011. Retrieved 5 July 2011.{{cite news}}: CS1 maint: unfit URL (link)
  33. Lee, Michael (28 June 2011). "Sydney council victim of AntiSec campaign". ZDNet . CBS Interactive. Archived from the original on 3 July 2011. Retrieved 6 July 2011.
  34. 1 2 Albanesius, Chloe (30 June 2011). "Anonymous 'AntiSec' Operation Targets Viacom, Universal Music". PC Magazine . Ziff Davis. Archived from the original on 24 June 2012. Retrieved 5 July 2011.
  35. "'Hacktivist' spree continues, Tunisian govt site latest target". GMA News TV . Quezon City. GMA Network, Inc. 28 June 2011. Archived from the original on 2 August 2012. Retrieved 5 July 2011.
  36. Stevenson, Alastair (24 June 2011). "Operation Anti-Security: Anonymous release the identities of 2800 Columbian Black Eagles Special Police Unit members". International Business Times . New York City. Archived from the original on 27 June 2011. Retrieved 6 July 2011.
  37. Stevenson, Alastair (1 July 2011). "As LulzSec disband Anonymous continues re-targeting Arizona law enforcement in the name of Operation Anti-Security". International Business Times . New York City. Archived from the original on 3 October 2011. Retrieved 5 July 2011.
  38. Shaer, Matthew (1 July 2011). "Anonymous temporarily brings down Arizona police websites". The Christian Science Monitor . Boston. Christian Science Publishing Society. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  39. Wilson, Drew (3 July 2011). "Anonymous Posts Internal Data of the Orange County Democrats". Zeropaid. Archived from the original on 9 February 2013. Retrieved 6 July 2011.
  40. O'Grady, Jason (3 July 2011). "AntiSec posts passwords from Apple survey server (updated 5x)". ZDNet . CBS Interactive. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  41. Yap, Jamie (4 July 2011). "Anonymous boasts hack into Apple". ZDNet . CBS Interactive. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  42. Ribeiro, John (4 July 2011). "Hackers Claim Apple Online Data Was Compromised". PC Magazine . Ziff Davis. Archived from the original on 6 July 2011. Retrieved 5 July 2011.
  43. Stevenson, Alastair (7 July 2011). "AntiSec: Anonymous hackers strike again in "Turkish Takedown Thursday"". International Business Times . New York City. Archived from the original on 9 July 2011. Retrieved 7 July 2011.
  44. Morse, Andrew; Ian Sherr (6 July 2011). "Hackers Claim Attack on Turkish Government Defaces 74 Websites". The Wall Street Journal . New York City. Dow Jones & Company. Archived from the original on 10 July 2011. Retrieved 7 July 2011.
  45. Ribeiro, John (7 July 2011). "Anonymous Attacks Turkish Websites Again". PC World . IDG. Archived from the original on 9 July 2011. Retrieved 7 July 2011.
  46. Bright, Peter (8 July 2011). "Anonymous vows revenge after 15 arrested; AntiSec hacks continue". Ars Technica . Condé Nast Publications. Archived from the original on 11 July 2011. Retrieved 9 July 2011.
  47. Richmond, Riva (8 July 2011). "AntiSec Hackers Hit F.B.I. Contractor". The New York Times . New York City. The New York Times Company. Archived from the original on 10 July 2011. Retrieved 9 July 2011.
  48. "Hackers attack another FBI 'partner'". GMA News TV . Quezon City. GMA Network, Inc. 9 July 2011. Archived from the original on 5 September 2012. Retrieved 9 July 2011.
  49. Bright, Peter (11 July 2011). "AntiSec target learns the hard way that whitelists > blacklists". Ars Technica . Condé Nast Digital. Archived from the original on 13 July 2011. Retrieved 12 July 2011.
  50. Gerwirtz, David (11 July 2011). "Military Meltdown Monday: 90,000 military email profiles released by AntiSec". ZDNet . CBS Interactive. Archived from the original on 15 July 2011. Retrieved 12 July 2011.
  51. 1 2 Storm, Darlene (11 July 2011). "AntiSec hackers mangle & pwn defense contractor, leak Booz Allen Hamilton's data". Computerworld . International Data Group. Archived from the original on 26 March 2012. Retrieved 12 July 2011.
  52. Hennigan, W.J. (11 July 2011). "Hacking group AntiSec says it stole 90,000 U.S. military email passwords". Los Angeles Times . Los Angeles. Tribune Company. Archived from the original on 15 July 2011. Retrieved 12 July 2011.
  53. Stray, Jonathan (11 July 2011). "Hackers target top contractor, nab passwords". Air Force Times . Springfield, Virginia. Gannett Government Media. Archived from the original on 17 July 2012. Retrieved 12 July 2011.
  54. Stevenson, Alastair (13 July 2011). "AntiSec: Booz Allen Hamilton Confirm Anonymous Hacker Raid's Authenticity". International Business Times . New York City. Archived from the original on 15 July 2011. Retrieved 13 July 2011.
  55. Mills, Elinor (12 July 2011). "Anonymous targets Monsanto, oil firms". CNET . CBS Interactive. Archived from the original on 2 November 2012. Retrieved 13 July 2011.
  56. Mills, Elinor (13 July 2011). "Monsanto confirms Anonymous hacking attack". CNET . CBS Interactive . Retrieved 13 July 2011.
  57. Stevenson, Alastair (21 July 2011). "Anonymous Hackers Hit NATO: One Gigabyte of Military Data Lost". International Business Times . New York City. Archived from the original on 3 October 2011. Retrieved 21 July 2011.
  58. Associated Press (21 July 2011). "'Anonymous' Hackers Claim to Breach NATO Security". Fox News Channel . New York City. News Corporation. Archived from the original on 21 July 2011. Retrieved 21 July 2011.
  59. "'Anonymous' hackers access Austrian bank data". Associated Press . New York City. 25 July 2011. Archived from the original on 23 February 2014. Retrieved 25 July 2011.
  60. "Hackers post documents from Italian cybercrime unit". The Daily Telegraph . London. Telegraph Media Group. 25 July 2011. Archived from the original on 25 July 2011. Retrieved 25 July 2011.
  61. Stevenson, Alastair (29 July 2011). "Anonymous Target U.S. Security Contractor: FBI Release Promised". International Business Times . New York City. Archived from the original on 2 April 2012. Retrieved 29 July 2011.
  62. Hachman, Mark (29 July 2011). "Anonymous Publishes Internal Documents from Govt. Contractor ManTech". PC Magazine . Ziff Davis. Archived from the original on 14 October 2012. Retrieved 29 July 2011.
  63. Greenberg, Andy (29 July 2011). "Undeterred By Arrests, Anonymous Spills Data From FBI Contractor ManTech". Forbes Magazine . New York City. Forbes. Archived from the original on 7 July 2012. Retrieved 29 July 2011.
  64. Ragan, Steve (31 July 2011). "AntiSec: 77 law enforcement websites hit in mass attack". The Tech Herald. Archived from the original on 22 August 2011. Retrieved 31 July 2011.
  65. David, Brennan (1 August 2011). "Hackers crash sheriffs' association website: Carey Says Most Info was Public". Columbia Daily Tribune . Columbia, Missouri. Archived from the original on 4 April 2012. Retrieved 1 August 2011.
  66. Usigan, Ysolt (3 August 2011). "Online security breach! Hackers leak social security numbers of cops in Missouri". CBS News . New York City. CBS. Archived from the original on 4 August 2011. Retrieved 5 August 2011.
  67. 1 2 Mills, Elinor (6 August 2011). "AntiSec hackers post stolen police data as revenge for arrests". CNET . CBS Interactive. Archived from the original on 10 August 2011. Retrieved 6 August 2011.
  68. Ragan, Steve (16 August 2011). "Vanguard Defense Industries compromised by AntiSec". The Tech Herald. p. 1. Archived from the original on 21 August 2011. Retrieved 18 August 2011.
  69. Skillings, Jonathan (19 August 2011). "AntiSec hackers target Vanguard Defense exec". CNET . CBS Interactive. Archived from the original on 14 October 2011. Retrieved 19 August 2011.
  70. Ribeiro, John (2 September 2011). "Anonymous Claims Hack of Texas Police Website". PC World . IDG. Archived from the original on 19 October 2012. Retrieved 5 September 2011.
  71. 1 2 Norton, Quinn (22 October 2011). "Anonymous and Antisec Attack Law Enforcement Websites". Wired . New York City. Condé Nast Publications. Archived from the original on 23 October 2011. Retrieved 22 October 2011.
  72. Kelly, Meghan (21 October 2011). "Anonymous releases private police information in name of Occupy Wall Street". VentureBeat . Archived from the original on 22 October 2011. Retrieved 22 October 2011.
  73. Guilfoil, John (22 October 2011). "Online political hacker group hits Boston police websites". The Boston Globe . Boston. The New York Times Company . Retrieved 22 October 2011.
  74. 1 2 Gallagher, Sean (21 November 2011). "Anonymous exposes cybercrime investigator's Gmail, voicemail". Ars Technica . Condé Nast Publications. Archived from the original on 23 November 2011. Retrieved 29 November 2011.
  75. 1 2 3 Norton, Quinn (19 November 2011). "Anonymous Hacks Back at Cybercrime Investigators". Wired . Condé Nast Publications. Archived from the original on 3 December 2011. Retrieved 29 November 2011.
  76. 1 2 Al Jazeera English. "Hackers claim 12 million Apple IDs from FBI" . Retrieved 5 September 2012.
  77. The Guardian (UK) (4 September 2012). "FBI denies hacking group AntiSec obtained Apple IDs from federal laptop". London. Retrieved 5 September 2012.
  78. Goddard, Louis (4 September 2012). "One million Apple device IDs with personal information allegedly stolen from FBI laptop". The Verge. Retrieved 27 April 2023.
  79. Cheng, Jacqui. "Publishing firm: iOS UDID leak came from us, not the FBI". Ars Technica. Retrieved 11 September 2012.
  80. Gayathri, Amrutha (21 June 2011). "Operation Anti-Security: Mysterious serial graffiti reported; LulzSec gaining mass support?". International Business Times . New York City. Archived from the original on 24 June 2011. Retrieved 21 June 2011.
  81. ""Anti-Sec" group spreads message through graffiti in Mission Beach". CBS 8. 20 June 2011. Retrieved 21 June 2011.
  82. Stevenson, Alastair (4 July 2011). "Hacked Fox News falsely reports U.S. President Obama Assassinated". International Business Times . New York City. Archived from the original on 7 July 2011. Retrieved 5 July 2011.
  83. Stevenson, Alastair (4 July 2011). "Hacked Fox News Obama assassination hoax done in the name of Anonymous' Operation Anti-Security". International Business Times . New York City. Archived from the original on 3 October 2011. Retrieved 5 July 2011.
  84. MacInnis, Laura (5 July 2011). "Hackers falsely claim Obama dead on Fox Twitter feed". Los Angeles Times . Los Angeles. Tribune Company. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  85. Brewster, Tom (22 July 2011). "The AntiSec campaign rumbles on with a new group going under the moniker of the Script Kiddies joining in". IT Pro. Dennis Publishing. Archived from the original on 26 March 2012. Retrieved 25 July 2011.
  86. Danchev, Dancho (27 July 2011). "Pfizer's Facebook hacked by AntiSec". ZDNet . CBS Interactive. Archived from the original on 21 October 2012. Retrieved 28 July 2011.
  87. Chirgwin, Richard (4 July 2011). "Operation Antisec lames out again: Public data posted in Pirate Bay facepalm". The Register . Archived from the original on 7 July 2011. Retrieved 5 July 2011.
  88. Stevenson, Alastair (5 July 2011). "AntiSec hacking Boom: On the anniversary of the Sivas Katliamı Anonymous and allies RedHack deface 1000 websites". International Business Times . New York City. Archived from the original on 6 July 2011. Retrieved 7 July 2011.
  89. Wilson, Drew (6 July 2011). "P0keu Dumps Usernames and Passwords of TamilCanadian.com to Pastebin". Zeropaid. Archived from the original on 14 July 2011. Retrieved 16 July 2011.
  90. Purcell, Joe (14 July 2011). "237,234 Records Breached: Operation AntiSec Continues, Operation Green Rights Begins". Security Pro News. Archived from the original on 9 September 2011. Retrieved 15 July 2011.
  91. Wilson, Drew (17 July 2011). "P0keu Hacks Eastern District Court of Tennessee Website, Passwords Exposed". Zeropaid. Archived from the original on 9 August 2011. Retrieved 18 July 2011.
  92. 1 2 3 Sterling, Toby (21 July 2011). "Dutch give details on 4 'Anonymous' hacker arrests". The Sydney Morning Herald . Sydney. Fairfax Media. Archived from the original on 30 December 2012. Retrieved 21 July 2011.
  93. "Hackers hit Congress website on eve of SONA". GMA News TV . Quezon City. GMA Network, Inc. 24 July 2011. Archived from the original on 24 July 2011. Retrieved 25 July 2011.
  94. Rashid, Fahmida (24 August 2011). "Cyber-Attacker Dumps Log-ins for 20,000 Customers, U.S. Employees". eWeek . Ziff Davis. Archived from the original on 22 January 2013. Retrieved 25 August 2011.
  95. Kaplan, Jeremy (19 July 2011). "Leading Member of LulzSec Hacker Squad Arrested in London". Fox News Channel . New York City. News Corporation. Archived from the original on 21 July 2011. Retrieved 20 July 2011.
  96. Greenberg, Andy (19 July 2011). "Hacker Arrests May Have Included Core Member of LulzSec". Forbes . New York City. Forbes Publishing. Archived from the original on 20 July 2011. Retrieved 20 July 2011.
  97. "Man arrested over computer hacking claims". BBC News . London. BBC. 27 July 2011. Archived from the original on 28 July 2011. Retrieved 27 July 2011.
  98. Albanesius, Chloe (31 July 2011). "Report: Scotland Yard Identifies LulzSec Hacker". PC Magazine . Ziff Davis. Archived from the original on 19 October 2011. Retrieved 31 July 2011.
  99. 1 2 Prodhan, Georgina (1 August 2011). "UK teen cyber activist bailed without Internet access". Reuters . London. Thomson Reuters. Archived from the original on 2 August 2011. Retrieved 1 August 2011.
  100. "LulzSec and Anonymous police and FBI investigation sees two more arrested". The Guardian . London. Guardian Media Group. 2 September 2011. Retrieved 2 September 2011.
  101. 1 2 Winter, Jana (6 March 2012). "Infamous international hacking group LulzSec brought down by own leader". Fox News Channel . New York City. News Corporation. Archived from the original on 13 March 2012. Retrieved 13 March 2012.
  102. Caruso, David B.; Jennifer Peltz (9 March 2012). "Feds: NYC hacker also involved with drug dealing". The Boston Globe . Boston. The New York Times Company. Archived from the original on 28 December 2013. Retrieved 13 March 2012.