By Peter Bright, Jacqui Cheng

Nameless bought fortunate. whilst 5 of its hackers attacked protection corporation HBGary Federal on February 6, 2011, they have been doing so that allows you to protect the group’s privateness. It wasn’t simply because they was hoping to bare plans to assault WikiLeaks, create surveillance cells focusing on pro-union organisations, and promote subtle rootkits to the U.S. govt to be used as offensive cyber weapons—but that’s what they found.

In the weeks after the assault, the hackers published tens of millions of e mail messages and made headlines around the globe. Aaron Bar, the CEO of HBGary Federal, ultimately resigned; 12 Congressman referred to as for an research; an ethics criticism used to be lodged opposed to a tremendous DC legislations enterprise concerned with a number of the extra doubtful plans.

Join Ars' editors as they dig into the key global of nameless and hackers for rent in Unmasked.

Show description

Quick preview of Unmasked PDF

Best Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one ny instances bestseller opposed to All Enemies, former presidential consultant and counter-terrorism professional Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber battle! each involved American should still learn this startling and explosive ebook that gives an insider’s view of White condominium ‘Situation Room’ operations and incorporates the reader to the frontlines of our cyber safeguard.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling desktop safeguard book--fully improved and updated"Right now you carry on your hand some of the most winning protection books ever written. instead of being a sideline player, leverage the precious insights Hacking uncovered 6 offers to aid your self, your organization, and your nation struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Strengthen and enforce a good end-to-end safety application Today’s complicated global of cellular structures, cloud computing, and ubiquitous information entry places new defense calls for on each IT expert. info safeguard: the whole Reference, moment version (previously titled community safeguard: the total Reference) is the one finished booklet that provides vendor-neutral info on all elements of data safety, with an eye fixed towards the evolving possibility panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State-of-the-art ideas for locating and solving serious defense flaws improve your community and dodge electronic disaster with confirmed innovations from a group of safeguard specialists. thoroughly up to date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth variation explains the enemy’s present guns, abilities, and strategies and gives field-tested treatments, case reviews, and ready-to-deploy checking out labs.

Additional info for Unmasked

Show sample text content

Barr used to be even keen to helpfully guesstimate the a long time of youngsters in images (“they have 2 teenagers, son and daughter glance to be 7 and 4”). With one power customer, Barr sifted the man’s social media info after which famous that “I am tempted to create somebody from his high school and ship him a request, yet that would be overstepping it. ” because the funds ran out on HBGary Federal, Barr more and more had no challenge “overstepping it. ” In November, while an enormous US financial institution sought after a method for taking down WikiLeaks, Barr instantly drafted a presentation within which he steered “cyber assaults opposed to the infrastructure to get facts on rfile submitters. this might kill the undertaking. because the servers at the moment are in Sweden and France, placing a workforce jointly to get entry is easier. ” Faking files appeared like a good suggestion, too, records which may later be “called out” so one can make WikiLeaks glance unreliable. And Barr desired to cross additional, pushing on humans like civil liberties Salon. com columnist Glenn Greenwald—apparently hoping to threaten their livelihoods. “These are validated pros that experience a liberal bent, yet eventually so much of them if driven will pick out specialist upkeep over reason, such is the mentality of so much enterprise professionals,” he wrote. “Without the help of individuals like Glenn WikiLeaks may fold. ” whilst the united states Chamber of trade desired to check out a few of its competitors, Barr teamed with different safeguard businesses and went nuts, presenting that the Chamber create an absurdly dear “fusion cellphone” of the type “developed and used by Joint particular Operations Command (JSOC)”—and costing $2 million a month. And if the fusion telephone couldn’t occur sufficient competition study, the safety organizations will be chuffed to create honeypot web content to trap the Chamber’s union-loving rivals with the intention to seize extra info from them. the safety businesses even begun grabbing tweets from liberal activists and mapping the connections among humans utilizing complicated hyperlink research software program mostly utilized by the intelligence group. (Some of the Chamber fabric used to be unearthed by way of ThinkProgress and different liberal bloggers, whereas The Tech usher in and Crowdleaks. org first wrote in regards to the proposed WikiLeaks assaults. ) whereas ready to work out if his proposals could lead to paintings for HBGary Federal, Barr became in January to unmask the management of the hacker collective nameless. This a part of the tale is celebrated by means of now (read our investigative feature): while Barr went public together with his findings, nameless took down his site, stole his e-mails, deleted the company’s backup info, trashed Barr’s Twitter account, and remotely wiped his iPad. within the days because the assault and the ebook of Barr’s e-mails, his companions at different safeguard corporations threw him below the bus. “I have directed the corporate to sever any and all contacts with HB Gary,” stated the CEO of Palantir. Berico applied sciences, one other inner most defense enterprise, acknowledged that it “does no longer condone or help any attempt that proactively goals American organizations, businesses or members.

Download PDF sample

Rated 4.58 of 5 – based on 31 votes