Home Blog Page 2155

Google Indonesia is hacked, defaced and left to hang

27

Written by: Tech Anonymous

 

One of the team members from a group calling themselves team  “MaDLeets” has confirmed that yes, the group is responsible for the attack on www.pandi.or.id  earlier this month according to a quote in techworm* 

Although it appears that the “attack” was more of a defaming poke in the belly to the online giant, it still seems to be a major breech as far as the Indonesians are concerned. Apparently, when Google claimed to have upgraded it’s systems after last years breech of Google Malaysia (using the exact same method)… they may have been stretching the truth. Once again, it is believed these folks were able to wiggle their way in using a method called DNS poisoning. While so very many of you are thinking “wow, that’s cool” there are even more laymen (and women) out there thinking “WTH is that? Now I hafta worry about computer poisoning?” No, not like you’re thinking. Other than their pride and maybe a few servers suffering from the sniffles, we do not believe any computers were harmed or data stolen.  Basically, the way this works is a hacker finds their way into the system, past security and into the Domain Name Server (DNS) and puts in data/commands that reroute traffic back out of the server and into a server that the hacker controls.   In this case, back to a page that looked mysteriously like the Google Indonesia homepage with a slight alteration; a diagonal watermark from “MaDLeeTs”.  Like a broken traffic signal in a strange town you’ve never been to. It’s taking you to the wrong place and you don’t even know it until you’ve arrived.  There is no reliable information on how long the “defacing” was in effect but the group apparently took mercy on the general public after about 2 hours and added a usable search box to the false google page so that users themselves could still actually  search information; an even BIGGER slap to Google : ) google indonesia hacked

“who are these people?” one may ask. Well, there’s not a pile of information about them but this quote is taken directly from an official facebook page labeled MaDLeets;

“Verified: Official MaDLeets Fan Page! © www.MadLeets.COM

MadLeets is a Ethical and 1337 White Hat Hackers Community. We are Anti Hackers , we teach how to protect yourself from getting hacked.

MadLeets is a Ethical and 1337 White Hat Hackers Community.

We are Anti Hackers , we teach how to protect yourself from getting hacked.

we are not supported by any other organization.

Madleets.com is our Official Website / Community. we dont have any other Facebook Page.

we are 1337 , we are Ethical , we are White Hat’s & we are MaD All Time”**

Also appearing on this page is a checklist with a question;

Do you believe 1337 can haxor Google India & Israel ?

Google Indonesia ✓

Google Malaysia ✓

Google Serbia ✓

Google Burundi ✓

Google Kenya ✓

 

One might assume Google India and Israel may be their next targets. LoL. Through all this, the curious questions of “why Google” and “why” in general, continuously float about.  A quote made after the Malaysia breech last year states:

“There’s not much reason behind it, only to prove that security is just an illusion. It does not exist.

We have no political intentions whatsoever, as you have already stated.

Regards, LeeT”***

Ok. It sounds well and good but we aren’t here to judge good and evil or light and dark. This group could be one of the “Cyber Robin Hoods” of our future. It could very well go the other direction.  The Devil on one shoulder whispers “they’re just gonna do more damage as they learn more”. The angel on the other shoulder whispers “they’re just practicing while they learn and they’re going to do great things”.  Time will reveal all. In the meantime, applause given in recognition of the intelligence to pull something like this off not just once but, so many times.  At the same time, a display of sadness. This intelligence could be collectively directed to much higher and even more positive goals. What’s YOUR take on it all?

Links: Protect your PC and mobile devices from hackers & governments and surf anonymously 

___________________________________________________________

*http://www.techworm.net/2014/10/google-indonesia-hacked-and-defaced.html

** https://www.facebook.com/Madleets

*** http://techcrunch.com/2013/10/10/google-malaysia-site-hacked-credit-claimed-by-team-madleets/

Man Imprisoned For 23 Years Under Wrongful Conviction Dies Shortly After Release

27

Written by: Anon.Dos

 

New York: A man was sentenced for twenty three years for a crime that he did not commit. After being discharged from prison a few months ago he was to win a hundred and twenty four million dollar lawsuit, but was found dead.

William Lopez, who was fifty five years of age at the time of his release from prison; suffered a fatal respiratory malfunction or an asthma attack as told by his peers and family, Lopez was convicted in 1989 for a gun murder of a possible drug dealer who went by the name Suria (last name). Suria was from Brooklyn, New York.

Jeffery Deskovic the founder of Jeffery Deskovic Foundation for Justice (who also helped Lopez gain his freedom) said that, it was extremely hard for him to accept the fact that Lopez passed away. He further stated that Lopez had lot on his mind for his future.

The Federal Court Judge that granted Lopez his freedom said that the evidence was dodgy to start with and that evidence has no solid grounds anymore.

Lopez had filled his case in June of 2014 and his trail was to begin on Wednesday just four days after his death.

Deskovic also his long term friend & criminal lawyer created Jeffery Deskovic Foundation for Justice when he himself was discharged in 2006. Deskovic served seventeen years in prison for murder of woman which he had never committed. Deskovic said that Lopez always talked about new ideas of starting his life all over again. But unfortunately his life was really stolen from him.

_____________________________________________________________________

Sources:

http://www.examiner.com/article/william-lopez-wrongly-convicted-dies-months-after-being-released-from-prison

http://viral.stkittsthegreat.com/william-lopez-man-wrongfully-convicted-2-decades-dies-release/

http://www.godlikeproductions.com/forum1/message2648014/pg1

http://www.usatoday.com/story/news/nation/2014/09/22/man-exonerated-after-23-years-in-prison-dies-suddenly/16042651/

https://firstlook.org/theintercept/2014/10/08/william-lopez/

http://www.miamiherald.com/living/health-fitness/article2200197.html

 

 

 

‘Anonymous’ Hacker Group Goes After ISIS

112

Written by: Alek Hidell

 

Every time I turn on the news, all I hear about is ISIS.  I like to think I keep up with things and I’m still kind of bewildered by ISIS.  So let me get this straight…Obama keeps with the deadline set by the Bush administration and withdraws troops from Iraq.  The American people were sick of war and wanted out. Of course the opposition pitched their usual fit, but the deadline arrived and the troops came home. All of a sudden there is a new terrorist threat, ISIS, who goes around cutting people’s heads off and now 70% of the American public support going back to war. This seems a little too convenient to me. This reeks of the intelligence community’s touch.  I find it amazing that people are so willing to jump back into military conflict after suffering war fatigue for the last decade. The war has achieved nothing tangible for the American people and has only thrown the country into further economic turmoil.  Once upon a time war meant a booming economy.  Not anymore. The military industrial complex grinds on at the expense of the soldiers who give their lives for an ideal which doesn’t appear to be shared by their superiors.

 

ISIS has been around for a while, but over the years has changed it’s name several times.  It  has been known as the JTJ, the AQI, The Islamic State Iraq, Al-Qaeda in Iraq and ultimately the Islamic State which we in America like to call ISIS (Islamic State in Iraq and Syria). So what exactly is ISIS? ISIS is the next wave of boogie men that we as American’s are told we must degrade and destroy, or whatever Obama said about them, because if we don’t they will surely be responsible for the next 911.  Whether or not that is true I don’t know.  What I do know is that I am absolutely sick to death of fighting wars against ideology.  That is ultimately what this war is about.  Obama can drop as many bombs on ISIS as he wants but nothing he does will end the IDEA of ISIS.  Whether or not you agree with or believe in what ISIS believes in, you cannot dismiss the fact that ISIS and Islamic extremism is an idea. An idea is what gives Anonymous it’s strength. Idea’s cannot be broken or thrown away into the trash.  You know the deal.  As long as the idea of ISIS exists, no number of bombs you drop on them will win the war.  The air strikes and soon-to-be boots on the ground are nothing more than a stop gap.  You can spend years going over the politics of war in the middle east, Islamic fundamentalist extremists and why they seem to want to blow up the world.  Ultimately, if I was born into a war torn desert where my people were starving, where disease and despair were prevalent, and where outsiders were sucking up the only natural resource my country had while I squandered my life away in poverty, I’d want to blow shit up too. anonymous vs isis

 

Now while the idea of ISIS will not be destroyed by bombs or anything else for that matter, the greatest way to battle an idea is with a better idea.  This brings me to OPISIS.  Our Anon brothers and sisters around the world have launched a cyber-war against ISIS. Back in June, ISIS hacked an Anonymous Twitter account.  I’m sorry but that’s like poking the sleeping bear.  Anonymous set out to launch it’s own war against the new terrorist group airing a video which made it very clear that any country who assists ISIS will suffer the consequences.  Anonymous has already committed cyber attacks against Turkish government websites and has put a scare into countries like Syria and Qatar who have recently invested heavily in upgrading their cyber security. What effect will cyber attacks have against ISIS? It is hard to say. One factor which is of concern is, what kind of retaliation will there be from ISIS? ISIS has suspected connections to the Syrian Electronic Army (SEA).  If the SEA retaliate against western cyber targets, the outcome could be disastrous. Follow the Anonymous battle against ISIS at #OPISIS.

 

When I first heard about ISIS, my first thought was that this was some kind of CIA operation on behalf of the military industrial complex designed to get us back into Iraq.  I haven’t changed my mind.  When one traces world events throughout the last 60 years or so, the CIA and the American intelligence community has played a major role in shaping world events.  From the attempted coup in Haiti, to the Bay of Pigs, to the Gulf of Tonkin, the CIA have proved their willingness and ability to manipulate world events to further their own agenda, even if that agenda is in direct opposition to the will of the American people.  You constantly hear people talking about “the government” and blaming them for all their woes.  The one thing that I have come to realize is that there truly are two American governments.  There are your elected officials who appear to play the game by the rules, have to get elected, follow procedure, etc. Then there is the American intelligence community.  These are the guys who really call the shots.  The CIA have a long history of manipulation, especially in the middle east.  We created Al-Qaeda and I have no doubt that the CIA helped create what we know today as ISIS.  The military industrial complex knew that once we went into Iraq, we would never leave.  I applauded Obama for pulling soldiers out of Iraq, but he should have known the powers that be, would never let it go at that.  Even Obama answers to the powers that be.

 

There is no doubt that ISIS poses a great threat to the world.  They have no respect for any idea that doesn’t fit with theirs.  They do not embody the freedom and equality that we hold so dear. If ever there  was an idea that needed to be wiped out, it is ISIS.  I do not know where this war is going, what our objective is and if it will ever truly end.  I do know that while the bombs are dropping, ISIS is still gathering strength and at this moment is within miles of Turkey and their movement is taking them toward Baghdad. I sit here frustrated as I know that the problems we are currently facing were created by my own government.  I wish I could close with some powerful words of encouragement but I can’t.  All I can do is watch and wait and hope that the people in charge make the right decisions as this unending war wages on.

Links: Protect your PC and mobile devices from hackers & governments and surf anonymously 

___________________________________________________________

Sources:

http://www.ijreview.com/2014/09/177896-anonymous-gets-fight-isis-supporters/

 

 

 

 

 

The Million Mask March 2014 – Largest World Protest by the Most Influential Group in the World

118

The Agenda: “Remember who your enemies are: billionaires who own banks and corporations who corrupt politicians who enslave the people in injustice.”

The Mission: 7 billion people to 1,400 billionaires is 5,000,000 to 1 million-maskmarch

What is The ‘Million Mask March’? 

Last year thousands of people worldwide joined Million Mask March rallies organized by the amorphous Anonymous movement. Rallies, both peaceful and confrontational, protested austerity, surveillance, corporate greed and corrupt governments.

In a mass demonstration of people power, crowds in 450 cities around the world filled the streets wearing Guy Fawkes masks. “The corrupt fear us. The honest support us. The heroic join us” – under this motto protesters united in a global mass-march to deliver various messages. 4440721_orig

From Sydney to Los Angeles, from Johannesburg to London – thousands came forward to make their voices heard. Among key ideas which virtually connected all different protests were anti-capitalist idealism and the rejection of NSA surveillance. Some rallies had a sense of carnival, where whole families with kids marched in protest, while other gatherings – like in London and Washington – turned more intense, with people not hiding their rage.

You Want To Participate This Year In The Million Mask March 2014 with thousands of others all around the world?

Here is all information you need for 2014:

 

HOW TO USE THE MAP

Make sure you have the latest version of Google maps.

Go to:  MillionMaskMarch.com/map.  (.com, .org & .net lead to the same place).  Once you start zooming in,  city names/event pages and the search option will appear.   As a protective measure, copy this link for safekeeping in case anything ever happens to this web site:  https://mapsengine.google.com/map/viewer?mid=zcw0ZYrLl5RQ.khgYCnHItPbY

HOW TO ADD YOUR EVENT TO THE MAP

1.  We add events to the map that you create.

2.  If you only see a 2013 event, contact the group, ask if they’ll update it to 2014 and email us here or on Facebook with the link so we can add it to the map. Posting links on our FB discussion threads as the only way of informing us is discouraged.

3. If you don’t hear back from 2013 MMM event page admins (don’t wait more than 24 hours), trying searching for: “Million Mask March Facebook Wednesday (your city)” to see if a 2014 event has already been created. If you find an event, message us the link so we can add it to the map.

4.  If you can’t update a 2013 event and don’t find a 2014 event, create a new event page for 2014, we’ll add it to the map and reference last year’s page.  Set privacy settings to public.

5.  If you think any of event pages are hijacked duds, make another one and we’ll add it the map. Yes, you have power and choices.

Please allow 24 hours for updates.

CONTACT
eMail:  [email protected] and [email protected].

Christine Ann Sands, MMM Domain Owner
Tel:  860-888-3127 – Washington, DC

MORE INFO 

https://www.facebook.com/millionmaskmarch/

ANONYMOUS SELF DEFENCE HANDBOOK

https://www.youtube.com/watch?v=YbsnU7I3aG0

MISSION ASSANGE
Defend the right to truth always:  Free Julian Assange today.

WEARING MASKS
Masks are permitted since no harm is intended.

WHERE TO GET MASKS
MillionMaskMarch.org/shop
Tell them Million Mask March or Anonomobile sent you (in the notes section with your order) and you’ll get a FREE Million Mask March package (stickers) with your order.

PERMITS
In the spirit of ending tyrannical rule with civil disobedience, it is hereby recommended nobody obtain permits. Please, however, be courteous to other groups who may have events planned in places you wish to gather.

SAFETY
Bring pepper spray decontamination wipes just in case.

ADVERTISE
Use Facebook, Twitter, Craigslist and posters. millmaskmarch2014

NSA sent ‘Secret Agents’ In Foreign Companies

0

Written by: NiRA

 

In our lives one day or the other we all must have thought about how NSA got a huge extent of its Surveillance operation throughout the globe, which one can measure from the number of secret documents which were discharged by the former NSA contractor named Edward Snowden.

This abyss boundary of NSA’s operation did not reached by its agents sitting in the NSA headquarter in the United States, but by its secret agents which are working in foreign companies which are based in countries like China, Germany and South Korea to penetrate and compromise foreign networks and devices, according to documents found by The Intercept.

 

NSA SEIZING FOREIGN NETWORKS AND DATA CENTRES

The newest document from the Snowden’s desk discussions regarding a program named physical subversion, in which NSA’s secret workers were penetrating foreign networks to obtain delicate data and access to systems in the global communications industry and even some of the American firms.

The document explains the details concerning numerous field activities comprising computer network attacks. Information which is held between the NSA’s purported code secrets in a system code which is named Sentry Eagle. This document’s date is 2004, although there is no reason to believe the fact that NSA has brought change in its behaviour since then.

Earlier documents which were mainly fixated on U.S. companies delivering the agency a vast number of customer data which included phone records and email traffic and also exposed NSA’s operations to hack into other systems or to function with private corporations in an attempt to deteriorate their own encryption systems, but the latest report indicates that the agency might be implanting workers into foreign as well as local, commercial entities. But, it is blurred whether these commercial entities are American or foreign or both.

REVELATION OF VARIOUS PROGRAMS

According to the newest document, NSA explains 6 different programs under its core secrets, all of them are classified under the Sentry Eagle and some of which are on-going as of year 2012. These programs are made of the following:-

  • Sentry Hawk – involves cooperation between the NSA as well as foreign and local companies in order to exploit computer networks.
  • Sentry Falcon – includes the defence of computer networks.
  • Sentry Osprey – involves the NSA cooperating with the CIA, FBI and Pentagon to hire human agents that can help give the agency access to networks.
  • Sentry Raven – describes the NSA’s negotiations with American companies to weaken their encryption in order to give the agency easier access.
  • Sentry Condor – includes offensive network attacks that can destroy or weaken computer systems.
  • Sentry Owl – involves the NSA working with foreign companies to make their products susceptible to NSA data gathering.

The document clearly states that any revelation of the secrets may lead to exceptionally grave damage to US national security and should not be performed without the permission from a senior intelligence official.

One of the essential programs in Sentry Eagle under the codename Sentry Osprey is HUMINT, a human intelligence advantage that has the ability to conduct Signals intelligence operations (SIGINT), which includes the seizure of communications and electronic signals. Both foreign as well as local companies could be aimed.

This program is marked as TAREX which, according to a 2012 classification guide, conducts worldwide clandestine Signals Intelligence (SIGINT) close-access operations and overt and clandestine Human Intelligence (HUMINT) operations. The program apparently has an existence in South Korea, Germany, and China, with a local presence in Georgia, Hawaii, and Texas.

 

 

NSA DECLINED TO COMMENT

For its part, NSA declined to clarify details to The Intercept. A statement is release saying:-

“It should come as no surprise that NSA conducts targeted operations to counter increasingly agile adversaries.”

 

At the same time NSA stated:-

“It takes into account the globalization of trade, investment and information flows, and the commitment to an open, interoperable, and secure global Internet.”

Links: Protect your PC and mobile devices from hackers & governments and surf anonymously 

___________________________________________________________

Source: http://thehackernews.com/2014/10/core-secrets-nsa-used-undercover-agents.html