It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Hessdalen
Anonymous at its best!!!
Originally posted by purplemer
Originally posted by Hessdalen
Anonymous at its best!!!
This is not Anon, this is a different group. Possibly the same peeps that took down sony...
Originally posted by Hessdalen
reply to post by h0rror
its part of anonymous! fighting for netzfreedom is anonymous!
reply to post by hadriana
4chan aka anonymous, classy =)edit on 3-6-2011 by Hessdalen because: (no reason given)
Originally posted by neo96
reply to post by bigfatfurrytexan
hacking is not a first ammendment right. nor is the willful defacement of private property or government agencies websites.
no one is above the law but those who break the law are no better than the so called defenders of it.
anyone supporting those actions are the same as those fascists you decry
Originally posted by JBA2848
Seems this hacking group has attacked Infragard Atlanta Chapter. Thats is part of Homeland Security. I wonder if this will mean war according to the new cyber war laws passed. Im not sure what the emails show because I have not seen them. But there is supposed to be emails about cyber attacks on Libya. And even one of the members of the Infragard Atlanta Chapter trying to bribe Lulzsec into working with them.
The guys name was Karim Hijazi's. And he seems to be tied to alot of cyber security companies.
www.linkedin.com...
Interesting if true.
www.thehackernews.com
(visit the link for the full news article)
Originally posted by netwarrior
There won't be a target for a drone strike. Trust me, these guys are smart. They're hacking from public wi-fi hotspots with laptops that were either home built or paid for with cash.
They're not dumb enough to do it from home. The really paranoid guys operate from minivans out in the parking lot.
Originally posted by neo96
reply to post by bigfatfurrytexan
no one is above the law but those who break the law are no better than the so called defenders of it.
anyone supporting those actions are the same as those fascists you decry
5.1 Creation of Social Networking Sites
The opportunity exists to establish two different social networking sites each dedicated to one side of the
conflict. The potential for using traditional cyber jihadist favorite tools such as vBulletin could serve as an
intelligence collection mechanism for site participants. Each site would brandish propaganda sympathetic
to each cause as a method to attract and identify those loyal to Qathafi's regime and the rebels.
STUXNET exploited the Siemens SIMATIC PCS7 control system and the S7-315 and S7-415 PLCs that it
controlled. Research has uncovered that there are potentially vulnerable S7-315 PLCs installed within the
demineralization plant used to treat boiler feed water in 2002. Refineries depend on steam for both its
heat value and the ability to generate electricity (though many refineries in the Middle East do not depend
on steam for electric generation due to the abundance of refinery and natural gas). Refineries cannot
operate without steam.
Other references have also confirmed that there are xxxxxxxxxxxxxxxx controllers used on the gas
turbines that comprise the power plant of the refinery. These PLCs were likely installed before the
Reagan embargo and could likely still be in service. These become vulnerable targets for attack
considering they were likely integrated in recently years to a human-machine interface (HMI) type
architecture through the simple addition of Ethernet communication modules.
Finally, references have been found to projects implemented since xxxx that utilize
xnxnxnxnxnxnxnxnxnxnxnxnxnxnxnxnxn. xxx version x was released in xxxx and runs on either XXXX
XXX XXXXX XXXXX platforms – both unsupported and vulnerable to a complete compromise via cyberattack.
This information confirms the likelihood of able, vulnerable equipment within the Libyan refineries. A
cyber-attack would be among the easiest and most direct means to initially inject into the systems if
unable to gain physical engineering attacks against the facility. Numerous client-side attack vectors exist
that support payloads capable of compromising SCADA application platforms.
After a few discussions, he offered to pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim, a member of an FBI-related website, was willing to give us money and inside info in order to destroy his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information.
blogs.forbes.com...
Originally posted by hadriana
Karim says he didn't give anything up.
www.unveillance.com...