Excerpt:
Maricopa County Sheriff's Office said it was not aware of the cyber attack until LulzSec tweeted Sheriff Joe Arpaio's Twitter account.
"The media has been giving me a lot of heat lately but nothing compared to tent city!" Arpaio tweeted Thursday. LulzSec responded, "Media? Heat? You? Chinga La Migra!"
http://ktar.com/category/local-news-articles/20110623/MCSO-found-out-about-hacker-attack-via-Twitter/
Excerpt:
MCSO found out about hacker attack via Twitter
by KTAR.com (June 23rd, 2011 @ 7:00pm)
The attack on Arizona law enforcement by a hacker group who call themselves "LulzSec" seems to have caught officials unawares, as Maricopa County Sheriff's Office said they were notified of the attack not by their computers, but by a message posted to Sheriff Joe Arpaio's Twitter account.
"They actually did post something on the Sheriff's Twitter page," MSCO spokesperson Joseph Rango said. "That's how we found out about it. I don't know if that's something they're trying to use to get their message across because of how many people are following the sheriff."
"They actually did post something on the Sheriff's Twitter page," MSCO spokesperson Joseph Rango said. "That's how we found out about it. I don't know if that's something they're trying to use to get their message across because of how many people are following the sheriff."
http://www.rawstory.com/rs/2011/07/02/lulzsec-hackers-hit-arizona-law-enforcement-a-third-time/
http://techcrunch.com/2011/06/23/lulzsec-releases-arizona-law-enforcement-data-in-retaliation-for-immigration-law/
Excerpt:
Jun 23, 2011
Hacker collective of the moment LulzSec has just released a torrent of data it claims to belong to Arizona law enforcement, in what it calls “Operation Chinga La Migra” (or literally translated ”Fuck the border patrol”).
They claim that the information, widely available via BitTorrent, includes hundreds of classified documents including personal emails, names and phone numbers. I’ve confirmed by phone that at least one of the addresses posted in the initial release belongs to someone who works in the Arizona police department.
The hacker group says that the Arizona Department of Public Safety was targeted specifically because of the controversial SB 1070 law, which is one of the strictest anti-illegal immigration measures in the US (the policies in Alabama, Arkansas and Kentucky are also contenders for this dubious distinction) and requires Arizona immigrants to carry registration documents at all times.
From the LulzSec press release:
We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.
The documents classified as “law enforcement sensitive”, “not for public distribution”, and “for official use only” are primarily related to border patrol and counter-terrorism operations and describe the use of informants to infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest movements.
Every week we plan on releasing more classified documents and embarassing [sic] personal details of military and law enforcement in an effort not just to reveal their racist and corrupt nature but to purposefully sabotage their efforts to terrorize communities fighting an unjust “war on drugs”.
Hackers of the world are uniting and taking direct action against our common oppressors – the government, corporations, police, and militaries of the world. See you again real soon! ;D
This adamantly anti-SB 1070 political agenda seems like somewhat of a pivot for the hacker group, which up until now has been adamant about being motivated primarily by “lulz.” It is also probably the grandest actualization yet of its Operation Anti-Security, which it has positioned as a war against all governments.
In any case, taking a stance against racial profiling by “doxing” or dumping personal data like this is a decidedly more serious endeavor than hacking into online gaming communities or even briefly taking down the websites of the Senate and the CIA.
Secret CIA Hacker Front Group Lulz Sec Takes Phone Poll Then Hacks CIA
Slip Sliding Away (Paul Simon)
.......and when you're down and out you just gotta watch this Mother and Child Reunion Paul Simon (Remember when watching that HELL HATH NO FURY LIKE A WOMAN Scorned) ...cal
http://www.youtube.com/watch?v=IiMdkY_5Gfw&feature=related
http://bits.blogs.nytimes.com/2011/06/21/f-b-i-seizes-web-servers-knocking-sites-offline/
Excerpt:
http://bits.blogs.nytimes.com/2011/06/21/f-b-i-seizes-web-servers-knocking-sites-offline/
Excerpt:
F.B.I. Seizes Web Servers, Knocking Sites Offline
By VERNE G. KOPYTOFF6:16 p.m. | Updated Adding that the F.B.I. did not comment.
6:55 p.m. | Updated Adding comments from Curbed Network and Instapaper.
7:35 p.m. | Updated Adding comment from DigitalOne.
9:22 p.m. | Updated Adding additional comments from DigitalOne.
The F.B.I. seized Web servers in a raid on a data center early Tuesday, causing several Web sites, including those run by the New York publisher Curbed Network, to go offline.
The raid happened at 1:15 a.m. at a hosting facility in Reston, Va., used by DigitalOne, which is based in Switzerland, the company said. The F.B.I. did not immediately respond to a request for comment on the raid.
http://www.dailymail.co.uk/sciencetech/article-2006118/Ryan-Cleary-charged-cyber-attack-CIA-LulzSec-takes-revenge.html
Excerpt:
6:55 p.m. | Updated Adding comments from Curbed Network and Instapaper.
7:35 p.m. | Updated Adding comment from DigitalOne.
9:22 p.m. | Updated Adding additional comments from DigitalOne.
The F.B.I. seized Web servers in a raid on a data center early Tuesday, causing several Web sites, including those run by the New York publisher Curbed Network, to go offline.
The raid happened at 1:15 a.m. at a hosting facility in Reston, Va., used by DigitalOne, which is based in Switzerland, the company said. The F.B.I. did not immediately respond to a request for comment on the raid.
http://www.dailymail.co.uk/sciencetech/article-2006118/Ryan-Cleary-charged-cyber-attack-CIA-LulzSec-takes-revenge.html
Excerpt:
No comments:
Post a Comment