It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
I got to chat with the Commander as he was coordinating DDOS attacks on the Web sites for the Iranian government. There are many things he declined to divulge – like the PLF’s source of funding, and the true nature of Anonymous' relationship to WikiLeaks – but he was remarkably candid in other ways. Here’s an edited version of that conversation.
How does Anonymous pick its targets?
There are some rough criteria, they are basically the same for both the PLF and Anon Ops. They are as follows:
1) Must be protesters on the ground.
2) They must be non-violent. Neither the PLF nor Anon Ops involve themselves in armed conflicts.
3) There must be some hope of victory. With all the Targets to chose from, we must try and pick fights we can win.
4) There must be some clear moral imperative.
Can you define what you mean by "victory"?
Dictators on planes to Saudi Arabia works for us. :-)
So have you considered using more advanced hacking techniques?
Considered? How do you think Tunisia started? :-)
Are you saying you hacked the government of Tunisia?
That’s confidential. But I would point out that Tunisia's "Jasmine Revolution" has been attributed to the leaking to WikiLeaks of some very embarrassing info on the Tunisian gov. Ever wonder where that leak came from ?
One of the stories floating about after the hack is that HBGary had decompiled code for Stuxnet, and now that's in the hands of the Anons. Any truth to that?
Absolutely none. Anonymous does NOT create viruses or other malicious code. Ever. It's one of the guiding principles and it is never broken.