It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Hackers Anonymous message to the United States Government! (Regarding Egypt)

page: 9
64
<< 6  7  8    10  11 >>

log in

join
share:

posted on Feb, 10 2011 @ 08:07 PM
link   
reply to post by kcfusion
 




Your kidding right?

So...let me understand your line of thinking is that Anon could only be held
responsible for something they cop to?



posted on Feb, 10 2011 @ 08:10 PM
link   

Originally posted by burntheships
reply to post by kcfusion
 




Your kidding right?

So...let me understand your line of thinking is that Anon could only be held
responsible for something they cop to?


No...he is not kidding...he refuses to believe Anon has ever done anything wrong.

You can give him 1000 sources...but if it isn't a statement from Anon (whoever that is
)...he won't believe it.



posted on Feb, 10 2011 @ 08:11 PM
link   
reply to post by burntheships
 


Ah they have done so each and everytime they have planned something big? So why not those times? All I can find is statements from 4chan about the porn on youtube I can't find anything on anonymous saying they are part of it?

Edit to add: you can check what I did or didnt say in Mindsets thread here www.abovetopsecret.com...
edit on 10-2-2011 by kcfusion because: (no reason given)



posted on Feb, 10 2011 @ 08:15 PM
link   

Originally posted by MindSpin

Originally posted by burntheships
reply to post by kcfusion
 




Your kidding right?

So...let me understand your line of thinking is that Anon could only be held
responsible for something they cop to?


No...he is not kidding...he refuses to believe Anon has ever done anything wrong.

You can give him 1000 sources...but if it isn't a statement from Anon (whoever that is
)...he won't believe it.

1st. I have seen statements that 4chan admit doing the porn on youtube, you can find them easily!
techcrunch.com...
I can't find anything from anonymous!

2nd. I can't believe after all this you still don't understand what the meaning of the word Proof actually is!

Wikipedia it for gods sake, this is getting old already, I thought you had finally got it!!



posted on Feb, 10 2011 @ 08:15 PM
link   

Originally posted by burntheships
reply to post by kcfusion
 


In case you did not realize, which obvioulsy you did not....

Wikipedia does contain footnotes, and in many of them are hyperlinks to the actual news stories,

As in this one....


a group calling itself Anonymous launched a viral No Cussing Sucks campaign across the Web.

On sites that seemed to vanish as quickly as they appeared, they posted Hatch’s name, photo and contact information and urged people to harass him.

McKay’s father, Brent Hatch, said his son had received more than 22,000 e-mails in fewer than two weeks.

“We are conducting an investigation at this time, but I’m not able to talk about what we’re doing,” South Pasadena police Capt. Richard Kowaltschuk said.

He did say detectives were examining the e-mails, adding, “If someone threatens your life that is a violation of the law, whether it’s done verbally or over the Internet.”

www.vcstar.com...



I am not following you....
Where did I mention porn?



posted on Feb, 10 2011 @ 08:17 PM
link   

Originally posted by burntheships

Originally posted by burntheships
reply to post by kcfusion
 


In case you did not realize, which obvioulsy you did not....

Wikipedia does contain footnotes, and in many of them are hyperlinks to the actual news stories,

As in this one....


a group calling itself Anonymous launched a viral No Cussing Sucks campaign across the Web.

On sites that seemed to vanish as quickly as they appeared, they posted Hatch’s name, photo and contact information and urged people to harass him.

McKay’s father, Brent Hatch, said his son had received more than 22,000 e-mails in fewer than two weeks.

“We are conducting an investigation at this time, but I’m not able to talk about what we’re doing,” South Pasadena police Capt. Richard Kowaltschuk said.

He did say detectives were examining the e-mails, adding, “If someone threatens your life that is a violation of the law, whether it’s done verbally or over the Internet.”

www.vcstar.com...



I am not following you....
Where did I mention porn?


Mindspin mentioned the following source en.wikipedia.org...(group)#YouTube_porn_day

that is what im refering to!

link to his thread which resulted from earlier posts www.abovetopsecret.com...
edit on 10-2-2011 by kcfusion because: link



posted on Feb, 10 2011 @ 08:22 PM
link   
This has Obama crapping in his pants and me LMAO, obama 0 mubarick 1 lol



posted on Feb, 10 2011 @ 08:23 PM
link   
reply to post by kcfusion
 


I am not Mindspin, now am I?

I think your deflecting?

You first said Wiki was not a valid source of information concerning Anon.
I pointed out that there are news articles, plenty of them that trace the activities of Anon.

Then you again deflect by saying that Anon can only be gulity of what they "take credit" for.

And then, I said your kidding right?



posted on Feb, 10 2011 @ 08:28 PM
link   

Originally posted by burntheships
reply to post by kcfusion
 


I am not Mindspin, now am I?

I think your deflecting?

You first said Wiki was not a valid source of information concerning Anon.
I pointed out that there are news articles, plenty of them that trace the activities of Anon.

Then you again deflect by saying that Anon can only be gulity of what they "take credit" for.

And then, I said your kidding right?



I am not deflecting! Is the source of the article not wikipedia? which states a false fact that Anonymous were behind the youtube porn attacks when it was in fact 4chan? So why would I take articles that percieve 4chan as Anonymous as a source of proof???

You know what the definition of proof right and difference between it and a theory?
edit on 10-2-2011 by kcfusion because: (no reason given)


Edit to add: the No Cussing Group is linked to 4chan as well by the way!
edit on 10-2-2011 by kcfusion because: (no reason given)

edit on 10-2-2011 by kcfusion because: spelling

edit on 10-2-2011 by kcfusion because: (no reason given)



posted on Feb, 10 2011 @ 08:31 PM
link   
reply to post by kcfusion
 


I did not mention porn.

I am not Mindspin.

Its ludicrous to think that Anon can only be credited with what they admit to.



Done.



posted on Feb, 10 2011 @ 08:33 PM
link   

Originally posted by burntheships
reply to post by kcfusion
 


I did not mention porn.

I am not Mindspin.

Its ludicrous to think that Anon can only be credited with what they admit to.



Done.


Hahaha you are deflecting now! I dont really care to be honest I'm sick of talking to brick walls for one day!



posted on Feb, 10 2011 @ 08:33 PM
link   
reply to post by Gixxer
 


Are the bullets American or from Israel?



posted on Feb, 10 2011 @ 08:55 PM
link   
Hello,
I am new as a member here but have been reading here for over a year. I just came across an interesting document on cryptome about this group.
I am going to hold off on posting a link because it's ultra revealing and is loaded with details about this group.
The document seems to be some kind of investigation...
I'm a little confused as to the link policy here even though I read it through several times and all it's still a bit intimidating. I check cryptome at least once a day, it's like wikileaks without all the annoying extras.



posted on Feb, 10 2011 @ 11:14 PM
link   
This is the first time I've seen an anonymous video. It was a lame video.



posted on Feb, 10 2011 @ 11:22 PM
link   
reply to post by TechUnique
 


word of advise,
watch the way you say things like
''target the u.s."
they govt will watch you and spy on you like your the enemy.



posted on Feb, 10 2011 @ 11:37 PM
link   
This is interesting. I just watched v for vendetta yesterday
any who.

Dear Anonymous hackers,

If you really want to show the government hack into the credit databases of major credit card companies and creditors and the dept of education databases and erase all student loan and credit debt data like in fight club
you'd be my heroes.

K BYE.

But seriously that is kind of bold threatening the U.S. government. Really what could they do. If they eep screwig around they will have a random rape charge pinned on them like assange. Keep messing with the usa an you and your hard drives will be floating in the middle of the pacific ocean :p NO TRIAL, NO JURY, BLACK OPS STYLE.

A wound from a seals issued W.A.S.P assult knife is not too pleasant my friends. I would chill with the threats before you get the business from the government. Could the U.S. remove this guy from office 2marrow with a carefully placed bullet from a CIA operative. Yes. Will they... No Why... because arab and muslim groups will whine and gripe about how imperialist america always butts in and is trying to control the middle east.

What do you think our government cares about the Egyptian Citizens? Not really what are you going to do ban us from touring the pyramids. Surprise Surprise the government barely cares about their own citizens but they always look like the nice guys. America is in debt and we have our own problems going on. If you want to remove the guy put together a group and do it. Don't expect us to get our hands bloody for you.

I bet this guy is getting his ducks in a row so that he can purchase a nice estate in the U.S.A. and retire. personally If no one wanted me some where I wouldn't stay. In my old age I would retire in another country. Perhaps giving orders from a place where the people couldn't rise up and try to snipe, or hurt me seriously. When you gotta go you got to go. I am curious to see who will replace this guy. Probably someone that will act concerned but the same old thing will happen again.

Sorry Egypt Unless you have an abundance of a natural resource that we could use then we will not invade you guys to establish democracy.... First you guys do't want us to push democracy in the middle east now you do?

make up your minds.

In my opinion the U.S. will have limited involvement and this guy will move out of the country to live out his days as a very rich embarassed old guy



posted on Feb, 10 2011 @ 11:50 PM
link   

Originally posted by _R4t_


......and your ignorance is disturbing, If you are using an online server proxy, they delete your log files as per a legal agreement when you sign up with the companies. There are real "hackers" out there that offer online services in pursuit of their "everyone owns the internet" theory and they make sure your tracks are covered for you. It costs you a monthly payment but it gets done. They delete (automatically) the log files and DHCP timestamps and they do a DOD security wipe to ensure there is no recovery. There are private VPN services that are even faster considering bandwidth using strong encryption methods such as SSL/TLS and do the same as the previous. Don't try to exalt yourself over someone here who actually knows how the internet works. You will become now the foolish one. I know a couple of these guys and I have seen them at work. Go learn something new.
edit on 10-2-2011 by Phenomium because: (no reason given)


#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...

#2> Before you REACH the proxy you go through in average 20 nodes... WHICH anyone can hack into and sniff anything that can go through... OR government can request the info with a subpoena... What good is your proxy server here???

#3> Proxy server can be miss-configured even by the best admin errors happen all the time... as SQUID proxy can leak IP's if x-forwarding is added to squid.conf... TOR proxy is knows to leak... WEB server can be forced to leak IP's... OR you can exploit the browser being used itself to push forward the IP

4>DHCP timestamp... do you actually even have a clue of what DHCP is or you just googled stuff quickly to try to sound intelligent??? DHCP as in "Dynamic Host Configuration Protocol" is a daemon running that provide DHCP lease containing IP/DNS/GW.... that allows you to be lazy and not have to configure it manually on a WAN/LAN network which has anything to do with what you think it does...

5> when you connect to a proxy all it does is port forward you in the direction you chose to your never allocated an IP... a simple version of a 2 way proxy that would point at a straight host would be done on a linux box with this command [socat TCP-LISTEN:sumport, fork TCP: sumaddress.com:sumport] which would wait on a port and forward you to the address and port you've pre-defined... at NO point your being assigned an IP the only reason why they see this IP at the destination node is because they see the IP of where the data come from which is the node your going through... no DHCP here man... LOL

6> SSL has been cracked... [www.worldnewschannel.info...] lets assume your only speaking of WEB proxies here... another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away.

7> you can even force network discovery beyond firewalls by simple UDP datagram/TTL packet manipulation/injection... to force errors on the network and the host past the firewalls will start spiting errors your way revealing data/IP address that otherwise should of been not accessable...

8>DOD wipe right??? LOL... you MUST be talking about tools that says "DOD Standard drive wiper"... which just write/overwrite/erase and start over again thousands of times hoping to circumvent any forensic attack from recovering the data... well SORRY dude... Class 3 forensic attack such as magnetic force microscopy WILL get it back NO MATTER what... you can DOD wipe it until it starts smoking... it can be put back together its just a matter of money... MFM forensic is very expensive... But the funds are always allocated when you tick off the wrong people...

and finaly... I didn't try to exalt myself above anybody I've been in cyber-security business for the last 12 years, I'm currently working for one of Canada's major ISP, I administrate linux servers and I was going to start my own small security firm around here but I was offered something for the government in Can pertaining to cyber security/digital forensic they are creating a team of talented individuals in anticipation of an certain "upcoming bill" that they seem to believe will pass... anyways I can't really talk about it I signed a NDF and I'm waiting to know if I passed the TS clearance so I better shut up in the meantime I'm cleared to talk more about it... All I wanted to do was to let you know that you were foolish to believe a proxy would magically make you 100% safe... cuz they don't... never did... never will they only slow things down and make it a bit harder... but they definitely don't protect you as well as you think they do...

But if you don't believe me be by guess... like Barney in "How I Met Your Mother" would say.... "Proxy up!"

ps: "real hackers" won't make you pay for it... they give it away for free because we/they are motivated by the intellectual challenge... Linus Torvalds is a "real" hacker... he created Linux the best operating system out there and gave it to the world...
edit on 10-2-2011 by _R4t_ because: (no reason given)


------------------------------------------------------------------------------------------------------------------------------------------------------ ----------
------------------------------------------------------------------------------------------------------------------------------------------------------ ----------
------------------------------------------------------------------------------------------------------------------------------------------------------ ----------
(Beginning)



#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...


1) First off, it's l33t h4x07. (what you have there is haxoa) notwitstanding,
If you have friends ya don't pay. Ask Kevin Mitnik or Gary McKinnon how it feels to "do it yourself".
As the book "The 48 Laws of Power" says,....(Law 26) "You must seem a paragon of civility and efficiency: Your hands are never soiled by mistakes and nasty deeds. Maintain such a spotless appearance by using others as scapegoats and cat's paws to disquise your involvement." ...that's right, you get yourself a Lee Harvey Oswald to do your dirty work.

#2 I ran a test. Ran my proxy, I only routed through 3 nodes. One is your own local host, (several times) and then 2 more (pertaining to the proxy).


#3 Sure no ones perfect but only one thing to say .....Squid in reverse proxy - web/http accelerator

4# I meant DNS Timestamp (which can be forensically audited)...mistake by haste.

5) Don't know about linux (and doing it yourself) but in the Windows world A proxy works like this (My computer)(My IP and Port forward) to---> (middleman Server) ------->(using new servers IP)--------->connection to (victim/destination). Here is a wiki link proving that. Proxy Servers...notice there is one system between the two, nodes would be minimal... (refer to #2)

6)


"another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away."


...?? I'll have to be honest, I don't have a clue what this means. I know of SQL injections to hack but why would you inject to get information that you didn't want??? ( Why would I do this to myself if I wanted to be anonymous?) If you're talking about forensics, they would have to know prior to my actions to be able to do this anyway. They would have to be waiting (fully aware of my intentions) ...down the road of my signals travels.



7) UDP (user datagram protocol) is an internet protocol (set of rules), not a tool to inject with. TTL = Time To Live which is also not a tool.....it is a time limit set by datagram and DNS. How you inject time and internet rules to manipulate an IP number is beyond me.

Wiki (below) describes UDP as just as unstable and unreliable as your accusations about the aforementioned proxies. This doesn't appear to be fool-proof either.
"UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level."
Source


8) Although MFM can recover data magnetically on a nano scale (recovering partial data from broken discs etc.) It has yet to be proven what you have claimed.

www.nber.org..." target="_blank" class="postlink" rel="nofollow">Souce for below - Gutteman himself.

Claims that intelligence agencies can read overwritten data on disk drives have been commonplace for many years now. The most commonly cited source of evidence for this supposed fact is a paper (Secure Deletion of Data from Magnetic and Solid-State Memory) by Peter Gutmann presented at a 1996 Usenix conference. "I found this an extraordinary claim, and therefore deserving of extraordinary proof."
"There is a large literature on the use of Magnetic Force Scanning Tunneling Microscopy (MFM or STM) to image bits recorded on magnetic media. The apparent point of this literature is not to retrieve overwritten data, but to test and improve the design of drive read/write heads."
"So I can say that Gutmann doesn't cite anyone who claims to be reading the under-data in overwritten sectors, nor does he cite any articles suggesting that ordinary wipe-disk programs wouldn't be completely effective."
Gutmann claims that "Intelligence organisations have a lot of expertise in recovering these palimpsestuous images." but there is no reference for that statement. There are 18 references in the paper, but none of the ones I was able to locate even referred to that possibility. Subsequent articles by diverse authors do make that claim, but only cite Gutmann, so they do not constitute additional evidence for his claim. (end)

In fact there has been a challenge laid out to any security professional or security firm or individual to use MFM to recover data after it has been wiped and written over JUST ONCE with 1's and 0's. To this day no one has accepted and therfore it has not been proven.
(source)- hostjury.com...

..................I'll stop here, read the rest for yourself.


9)


"ps: "real hackers" won't make you pay for it... they give it away for free"
Ahh, but to a certain extent. hackers are people who have to make money too, not all of them get accepted into the 'hacker hall of fame' like yourself. There are some who actually have to sell their services for provisions.....they are not like you White Hat, they are not the evil Bin Laden hacker called Black Hats......they are Grey Hats and they work alone.
Sorry, I didnt feel the need to nerd things up to the point where it is hard to understand what one is saying, not necessary.

edit on 10-2-2011 by Phenomium because: (no reason given)



posted on Feb, 11 2011 @ 12:31 AM
link   
reply to post by starwarsisreal
 
O.K. it is one thing to call the USA hypocritic but what does that make the nations who are working with the USA but hypocrites as well. Is Mubarak a hypocrite because he takes US dollars? Was Saddam Hussein a hypocrite when he worked with Donald Rumsfeld and shook his hand? What about all the other dictators of the world who work hand in hand with the USA as well? What does that make them? Friends or Foe?

Will you never wake up? It does still take two to tango? Aren't all governments a bit shady in their dealings, and do you really think a new one will be any different from the last one?

I think you need to quit dreaming and think about this before you speak.



posted on Feb, 11 2011 @ 01:21 AM
link   
reply to post by TechUnique
 


I effing LOVE this.

Period.



posted on Feb, 11 2011 @ 01:30 AM
link   
Anonymous is a joke these days. After they outed Scientology, it's been taken over by more and more skiddies from 4chan.

I know two people who are "members". Donate to them and everything. Neither of these guys have a clue about hacking and have said things that made me laugh hysterically. Keep in kind that most of them come off as being these super intelligent "l33t h4x0r5". Here's a few things said to me in conversations with them:

1.) "Windows 7 is slower and more bloated than Windows Vista"

Actually, Microsoft removed a lot of legacy code and also removed a lot of the internal software (Mail, Movie Maker, Photo Gallery...etc) and made them available online. Resulting in a faster and less bloated OS.

2.) "I find Windows 7 hard to use. They changed the user interface too much from Windows Vista"

That has to be my favorite. The biggest change in UI was the taskbar (Superbar) which can be changed to a more Vista-ish look by changing the taskbar icons to small. The other change was they removed the sidebar and left it as just gadgets. Everything else UI related is basically the same except the apps that use the ribbon UI.

3.) "Linux is soo awesome (about 20 minutes later after looking through my software collection) What's Ubuntu?"

:-/ Only one of, if not the most popular distribution of that awesome Linux you spoke of.

4.) (While looking at my Android phone) "This is pretty cool. Someone should make an OS platform for smartphones based on Linux"

Do I need to explain the hilarity in that?

5.) "OSX is more secure than any other OS."

Far from it. Windows has been coming out on top. Followed by Linux with OSX being last. Apple has actually gone as far as threatening to sue websites and security firms if they report on security holes in their OS.

--------------------------------

Anyway. Anonymous is nothing but skiddies these days. There's no real leadership within and if anyone honestly believes they are actually this super organized group, you know nothing about them. For proof of how unorganized they are, look at their recent attacks on PayPal and other companies over the whole WikiLeaks scandal. A lot of arguing was going on within the "group" during the entire thing. Their IRC was flooded with arguments because nobody really knew what was going on.

For further proof they are not the super hackers they claim to be, look at their tool of choice for DDoS attacks (LOIC). When used, it broadcasts the persons IP address to the site they are "attacking". So much for the whole "anonymous" thing LOL. All a company has to do is log every IP hitting the site. Sure it brings the site down, at the same time giving that company all the evidence it needs.

Oh and the easiest way to call out anyone who tries to claim to be "Anonymous" is to simply look at their username and avatar. Anyone who is part of what Anonymous was meant to be, knows that you aren't supposed to use your real name or any photo of yourself in any kind of profile. If you see anyone bragging to be a member and their profile has a name attached to it, they're fake. Most of the original members will use a form of the word "anonymous" in their username and their avatar is usually the anonymous logo. The black suit and tie figure with no face. They also won't brag and announce their plans ahead of time like all the skiddies do these days.

The real Anonymous is dead and has been for a while now. The last and really only good thing they ever did was out Scientology when they released all the internal documents they got from within Scientology. Look at their attitude back then compared to how it is now. Nothing but kids with way too much time on their hands.

Supported them when they outed Scientology, but now I just laugh at how pathetic they have become. I'd really love to see them try to go after the government. They fight for freedom? Can someone tell them that when they do their little DDoS attacks and even try to go after the government, that all they do is give that government more ammunition to take away what freedoms we do still have left? Proof that it's just immature and ignorant kids who don't think about their actions because they think too highly of themselves and feel they can't be touched.

Go ahead and go after the US government skiddies. Hand over all the ammo needed for Obama to get that internet kill switch he wants.

/end rant
edit on 11-2-2011 by nightmare_david because: Spelling. Pretty sure there's still typos in there, but I really don't care.




top topics



 
64
<< 6  7  8    10  11 >>

log in

join