Friday, December 10, 2010

Anonymous attackers 'go public'

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- companion banner --> <!-- END - companion banner --><!-- caption -->

'Coldblood', a member of the group Anonymous, tells Jane Wakefield why he views its attacks on Visa and Mastercard as defence of Wikileaks.

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

A group of pro-Wikileaks activists who coordinated a series of web attacks have explained their actions.

The Anonymous group said they were not hackers but "average internet citizens" who felt motivated to act because of perceived injustices against Wikileaks.

The group said it had no interest in stealing credit card details or attacking critical infrastructure.

The details were posted online by one of the many factions claiming to carry out the attacks.

"Anonymous is not a group, but rather an internet gathering," it said in a statement published on 10 December.

It said the ongoing attacks were a "symbolic action" targeted at corporate website that had withdrawn services from Wikileaks.

"We do not want to steal your personal information or credit card numbers. We also do not seek to attack critical infrastructure of companies such as Mastercard, Visa, PayPal or Amazon," it read.

The statement comes as other documents have come to light suggesting the group may be changing its tactics.

Numbers game

The statement was published by one of the several Anonymous groups operating online.

"Anonymous has a very loose and decentralized command structure that operates on ideas rather than directives," it said.

Is taking part in these attacks illegal?

<!-- pullout-items--> <!-- Embedding the audio player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- end of the embedded player component --> <!-- Player embedded --> <!-- pullout-body-->

The short answer is yes, according to Struan Robertson, legal director at law firm Pinsent Masons.

He told the BBC that in the UK, taking part in the attacks would be a breach of the Computer Misuse Act.

He said that anyone found guilty of taking part could face "up to ten years imprisonment".

"Even downloading the [software] tools to assist in committing these attacks… are themselves guilty of an offence," he said.

He said this could carry a sentence of up to two years in the UK.

Different countries will have different laws and penalties.

However, security expert Peter Wood said that in practice it would be very difficult to track down the people involved because the attacks used "anonymising software" to hid their tracks online.

<!-- pullout-links-->

It also acknowledged that there was "perceived dissent between individuals" in the group, but said that it did not threaten its structure.

For example, members have distanced themselves from a member of the group, calling himself Coldblood, who spoke with several media outlets, including the BBC.

Several Twitter accounts have also appeared that claim to be coordinating Operation Payback, as the attacks are known.

Anonymous has been conducting the attacks using a tool called LOIC that allows people to bombard a site of their choosing with data.

The tool launches what is known as a distributed denial of service (DDoS) attack, which tries to knock a website offline by bombarding it with so much data that it cannot respond.

The LOIC tool has been downloaded more than 46,000 times.

However, the group has not always had the numbers needed to make its operations successful.

On 9 December, for example, the group abandoned an attack on the online retailer Amazon after some elements admitted it did not have enough people using the tool.

"While it is indeed possible that Anonymous may not have been able to take Amazon.com down in a DDoS attack, this is not the only reason the attack never occurred," read the document.

"After the attack was so advertised in the media, we felt that it would affect people such as consumers in a negative way and make them feel threatened by Anonymous. Simply put, attacking a major online retailer when people are buying presents for their loved ones would be in bad taste."

Instead, the attack was re-directed towards Paypal and its computer systems, which, according to a status page, have intermittently suffered "performance issues" ever since.

Early on 10 December, elements of the group also attacked money transfer site Moneybookers, knocking it offline briefly at 1100 GMT.

Criminal chain

Defences against the attacks are being drawn up as security firms scrutinise the code behind LOIC to work out how attacks happen. Some suggest that well-written firewall rules would be able to filter out most of the harmful traffic.

Information is also starting to emerge about the other resources that supporters of Anonymous have been able to bring to bear. Research by security firm Panda suggests that some of the earlier attacks on payment firms were aided by hi-tech criminals.

What is Anonymous?

<!-- pullout-items--> <!-- pullout-body-->

'Anonymous' describes itself as an 'internet gathering'. The term is used to describe a leaderless collective of people who come together online, commonly to stage a protest.

The groups vary in size and make-up depending on the cause. Members often identify themselves in web videos by wearing the Guy Fawkes masks popularised by the book and film V for Vendetta.

Its protests often take the form of disrupting websites and services.

Its use of the term Anonymous comes from a series of websites frequented by members, such as the anarchic image board 4Chan.

These allow users to post without having to register or provide a name. As a result, their comments are tagged "Anonymous".

In the past, groups have staged high-profile protests against plans by the Australian government to filter the internet and the Church of Scientology.

The latter spilled over into the real world with protests by masked members outside churches. An offshoot of Anonymous called Project Chanology focuses purely on this cause.

Many Anonymous protests tackle issues of free speech and preserving the openness of the net.

<!-- pullout-links-->

Luis Corrons, technical director of Panda Labs, said during its investigation of Anonymous' attacks its analysts got talking to some of the activists via Internet Relay Chat (IRC).

One of those activists said he had a botnet of 30,000 machines under his control that he was planning to use on behalf of Wikileaks.

"The guy said he had this botnet which was nothing special and was not specifically designed to do these attacks but could be used to do them," said Mr Corrons.

A botnet is a network of hijacked home computers that have been compromised by their owners visiting a booby-trapped webpage that installs code to hand over control to a hi-tech criminal.

Mr Corrons said a botnet with 30,000 machines in it was "about average size". Most of the spam sent around the net is funnelled through machines that are in botnets.

It was becoming clear, he said, that some attacks were aided by the 30,000 machines under the cyber criminals control.

"We know for sure the botnet was used in at least one attack on Paypal," he said.

Panda itself has come under attack with its blog knocked offline for hours by an attack very similar to those Anonymous has been carrying out. Mr Corrons said that, so far, it did not why it was being attacked or who was attacking it.

Fresh leaks

There are also suggestions that the Anonymous group might be about to drop the web attacks in favour of another tactic.

A message posted on the 4chan image board, out of which Anonymous has grown, suggests dropping LOIC in favour of publicising information in the diplomatic cables that Wikileaks is releasing.

Searching for the less-well publicised cables and spreading the information they contain around the web could be more effective than simply knocking out sites deemed to be enemies of Wikileaks, it said.

The message also suggests using misleading tags on posts and YouTube videos to trick people into reading or viewing the information.

"They don't fear the LOIC, they fear exposure," read the message.

It is not yet clear if the call to change tactics has been taken up by the Anonymous group at large.

In related news, Wikileaks looks set to have a rival as former staffers of the whistle-blowing website prepare to launch. Set up by Daniel Domscheit-Berg, Open Leaks is expected to launch in mid_December and will host and post information leaked to it.



Powered by WizardRSS | Best Membership Site Software

Web attackers mull tactic change

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- companion banner --> <!-- END - companion banner --><!-- caption -->

'Coldblood', a member of the group Anonymous, tells Jane Wakefield why he views its attacks on Visa and Mastercard as defence of Wikileaks.

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

Web attacks carried out in support of Wikileaks are being wound down as activists consider changing tactics.

Attacks against Amazon were called off late on 9 December and re-directed towards net payments firm Paypal.

Analysis suggests the earlier attacks were made more effective by the involvement of hi-tech criminals.

At the same time one wing of the activist group suggested ditching the attacks and doing more to publicise what is in the leaked cables.

Site saving

The attacks have been carried out using a tool, called LOIC, that allows people to bombard a site of their choosing with data or let the target be chosen by those running the Anonymous campaign.

Is taking part in these attacks illegal?

<!-- pullout-items--> <!-- Embedding the audio player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- end of the embedded player component --> <!-- Player embedded --> <!-- pullout-body-->

The short answer is yes, according to Struan Robertson, legal director at law firm Pinsent Masons.

He told the BBC that in the UK, taking part in the attacks would be a breach of the Computer Misuse Act.

He said that anyone found guilty of taking part could face "up to ten years imprisonment".

"Even downloading the [software] tools to assist in committing these attacks… are themselves guilty of an offence," he said.

He said this could carry a sentence of up to two years in the UK.

Different countries will have different laws and penalties.

However, security expert Peter Wood said that in practice it would be very difficult to track down the people involved because the attacks used "anonymising software" to hid their tracks online.

<!-- pullout-links-->

The tool launches what is known as a distributed denial of service (DDoS) attack which tries to knock a website offline by bombarding it with so much data that it cannot respond.

The LOIC tool has been downloaded more than 46,000 times but, said Anonymous activists in a tweet, this did not translate into enough people using it to knock the retail giant off the web.

Instead, the attack was re-directed towards Paypal and its computer systems which, according to a status page, has intermittently suffered "performance issues" ever since.

There have also been calls for attacks on official Dutch websites following the arrest of a 16-year-old boy suspected of involvement in the online campaign.

But early on 10 December Moneybookers was chosen as the next target and its site was occasionally unreachable from about 1100 GMT.

The chances of success could be boosted by a new version of LOIC written in web programming language Javascript that allows anyone with a browser, including on a mobile phone, to launch attacks.

However, defences against the attacks were being drawn up as security firms scrutinise the code behind LOIC to work out how attacks happen. Some suggest that well-written firewall rules would be able to filter out most of the harmful traffic.

Criminal chain

Information is also starting to emerge about the other resources that supporters of Anonymous have been able to bring to bear. Research by security firm Panda suggests that some of the earlier attacks on payment firms were aided by hi-tech criminals.

What is Anonymous?

<!-- pullout-items--> <!-- pullout-body-->

'Anonymous' is commonly used to describe a leaderless collective of people who come together online, commonly to stage a protest.

The groups vary in size and make-up depending on the cause. Members often identify themselves in web videos by wearing the Guy Fawkes masks popularised by the book and film V for Vendetta.

Its protests often take the form of disrupting websites and services.

Its use of the term Anonymous comes from a series of websites frequented by members, such as the anarchic image board 4Chan.

These allow users to post without having to register or provide a name. As a result, their comments are tagged "Anonymous".

In the past, groups have staged high-profile protests against plans by the Australian government to filter the internet and the Church of Scientology.

The latter spilled over into the real world with protests by masked members outside churches. An offshoot of Anonymous called Project Chanology focuses purely on this cause.

Many Anonymous protests tackle issues of free speech and preserving the openness of the net.

<!-- pullout-links-->

Luis Corrons, technical director of Panda Labs, said during its investigation of Anonymous' attacks its analysts got talking to some of the activists via Internet Relay Chat (IRC).

One of those activists said he had a botnet of 30,000 machines under his control that he was planning to use on behalf of Wikileaks.

"The guy said he had this botnet which was nothing special and was not specifically designed to do these attacks but could be used to do them," said Mr Corrons.

A botnet is a network of hijacked home computers that have been compromised by their owners visiting a booby-trapped webpage that installs code to hand over control to a hi-tech criminal.

Mr Corrons said a botnet with 30,000 machines in it was "about average size". Most of the spam sent around the net is funnelled through machines that are in botnets.

It was becoming clear, he said, that some attacks were aided by the 30,000 machines under the cyber criminals control.

"We know for sure the botnet was used in at least one attack on Paypal," he said.

Panda itself has come under attack with its blog knocked offline for hours by an attack very similar to those Anonymous has been carrying out. Mr Corrons said that, so far, it did not why it was being attacked or who was attacking it.

Fresh leaks

There are also suggestions that the Anonymous group might be about to drop the web attacks in favour of another tactic.

A message posted on the 4chan image board, out of which Anonymous has grown, suggests dropping LOIC in favour of publicising information in the diplomatic cables that Wikileaks is releasing.

Searching for the less-well publicised cables and spreading the information they contain around the web could be more effective than simply knocking out sites deemed to be enemies of Wikileaks, it said.

The message also suggests using misleading tags on posts and YouTube videos to trick people into reading or viewing the information.

"They don't fear the LOIC, they fear exposure," read the message.

It is not yet clear if the call to change tactics has been taken up by the Anonymous group at large.

In related news, Wikileaks looks set to have a rival as former staffers of the whistle-blowing website prepare to launch. Set up by Daniel Domscheit-Berg, Open Leaks is expected to launch in mid_December and will host and post information leaked to it.



Powered by WizardRSS | Best Membership Site Software

Twitter &#39;popular for minorities&#39;

African-American and Latino adults in the US who use the internet are twice as likely as whites to use the website Twitter, a survey has found.

The Pew Research Center, a Washington-based think tank, found that 13% of Latino and 18% of African-American adult internet users use Twitter.

Of all US adult internet users, 8% use the micro-blogging site, Pew found.

Minority groups visit the site more because they are younger and use mobile technology more often, the centre said.

"Both of those groups, African-American and Latino adult internet users in the US, tend to be younger than white internet users, which helps to lead to their adoption of Twitter," said Senior Research Specialist Aaron Smith.

"Both of those groups are also very mobile populations in their use of cell phones in particular to access the web," he said, adding that "Twitter lends itself easily to mobile technology."

"Overall, non-whites are more likely than white cell phone owners to do a range of non-voice tasks on their cell phones - they are more likely to use instant messaging and social networking on their phones."

The study also suggested those who live in cities and were more likely to use the social networking site - which lets users post updates using up to 140 characters.

Twitter obsession

Researchers found that 25% of active Twitter users checked the service several times a day, with 2% saying they were extremely active.

As Americans spend more of their time online, social networking technology as a whole is growing and starting to replace activities individuals once performed in physical spaces, Mr Smith said.

The Pew researchers noted in the report that they focused on Twitter because the service was "one of the most popular online activities among tech enthusiasts and has become a widely used tool among analysts to study the conversations and interests of users, buzz about news, products or services".

Twitter was launched in July of 2006 and now claims tens of millions of users around the globe.

The Pew study - part of an initiative to explore technology in the US - surveyed 2,257 adult internet users.



Powered by WizardRSS | Best Membership Site Software