Showing posts with label hacked. Show all posts
Showing posts with label hacked. Show all posts

Tuesday, March 4, 2014

Bitcoin Incentive for Fraud; Two More Exchanges Hacked: "Flexcoin" Robbed of All Online Coins; "Poloniex" Missing 12.3% of Assets

Bitcoin Incentive for Fraud; Two More Exchanges Hacked: "Flexcoin" Robbed of All Online Coins; "Poloniex" Missing 12.3% of Assets
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7T076uoLkNy1tgXy9S9Pld7FLhp2a82mU9dfDU_djWEW_poTHr3pVdot2uRP7baY0VCBlBmk8S1xL571mSw7DQTGZz0hJsL6yGQT_TP1qBeo6G-bDUHBa3k5iY4EHJTmtkFoaVUPOX-I/s400/flexcoin.png

Two more bitcoin exchanges were robbed in the past few days. “Flexcoin” lost all online coins and shut its doors.   


Flexcoin admitted it did not have resources to cover 896 stolen bitcoins, worth £365,000 (about $ 608,200). Bitcoins in Flexcoin’s “cold storage” (offline), for which depositors have to pay a fee, were not affected.


“Poloniex”, the other hacked bitcoin site, admitted that it is missing 12.3% of its assets because of a flaw in its transaction system. Its owner apologized and will keep its exchange running.


The Guardian reports Bitcoin Bank Flexcoin Closes After Hack Attack.

Flexcoin has been forced to close after hackers stole 896 bitcoins, worth £365,000, in an attack on Sunday. The company shut its website and posted a statement on Tuesday morning detailing the loss.

“On March 2nd 2014 Flexcoin was attacked and robbed of all coins in the hot wallet,” the statement read. “As Flexcoin does not have the resources, assets, or otherwise to come back from this loss, we are closing our doors immediately.”


Not all of the company’s assets were stolen. In line with best practices for running a bitcoin financial service, Flexcoin held some bitcoins in “cold storage”, keeping them on devices not connected to the internet. Those bitcoins are safe, but only users who explicitly requested their bitcoins be held in cold storage (and paid a 0.5% fee) benefit.


“Users who put their coins into cold storage will be contacted by Flexcoin and asked to verify their identity,” the statement continues. “Once identified, cold storage coins will be transferred out free of charge. Cold storage coins were held offline and not within reach of the attacker. Flexcoin will attempt to work with law enforcement to trace the source of the hack.”


Just six days ago, the company was boasting that it was unscathed by the closure of MtGox, once the world’s largest bitcoin exchange:



The same day the company came clean about its losses, a second bitcoin firm, Poloniex, also admitted that 12.3% of its reserves had been stolen by hackers. Poloniex is a bitcoin exchange, and the company has committed to operating at a fractional reserve until it can replenish the losses itself.


“Poloniex” Robbed of 12.3% of Assets, Owner Apologizes


The problem at Poloniex stems from a flaw in Poloniex’s system that processed bitcoin transactions simultaneously rather than sequentially, ultimately allowing negative balances.


On the Bitcoin Forum, Poloniex owner Busoni explained how it happened and apologized to the bitcoin holders.

What Did Poloniex Do Wrong?

The major problem here is that the auditing and security features were not explicitly looking for negative balances. Another design flaw is that withdrawals should be queued at every step of the way. This could not have happened if withdrawals requests were processed sequentially instead of simultaneously.


What Did Poloniex Do Right?


The existing security features noticed unusual withdrawal activity and froze BTC. That is how the activity was discovered.


What Happens Now?


I take full responsibility for this and am committed to repaying the debt of BTC. The exchange funds are 12.3% short. Because there is not enough BTC to cover everyone’s balances, all balances will temporarily be deducted by 12.3%. Please understand that this is an absolute necessity–if I did not make this adjustment, people would most likely withdraw all their BTC as soon as possible in order to make sure they weren’t left in that remaining 12.3%. Aside from the obvious drawback of most of the BTC being taken out of the exchange, this would not be fair–some people would get all of their money right away, and a few would get none right away.


The amount deducted from everyone’s balances will be recorded, and funds raised from exchange fees, as well as donations from my own pocket (which is not very deep, I’m afraid), will be distributed regularly to all users who have had BTC deducted. Exchange fees will be raised to expedite the recovery of the debt. 1.5% has been suggested by many people, but I will take input on this.


If I had the money to cover the entire debt right now, I would cover it in a heartbeat. I simply don’t, and I can’t just pull it out of thin air.


Right now, all markets and withdrawals are still frozen, and they will remain that way until the negative balance watcher is written and in place and balance deductions are calculated. Please do not bother placing withdrawals right now, as they will not be processed and will probably all be cancelled before functionality resumes. ETA on availability of withdrawals is approximately 12 hours. I am afraid it is 3 AM where I am right now, and I think it is wise for me to get some rest before proceeding.


In conclusion…


I sincerely apologize for this, and I am very grateful to the many people who have already expressed their support and belief in my character. I take full responsibility; I will be donating some of my own money, and I will not be taking profit before the debt is paid.


I welcome your opinions on how to proceed, but please be constructive. I do not have the money to wave away the debt, so we’ll need to work together.


Bitcoin Log


Given that a log makes a record of every transaction, and given this hack recently occurred, it should be possible to track the missing bitcoins.


Bitcoins.Com explains “All newly mined Bitcoins, along with every transaction, are publicly recorded and verified through the network. This record is known as the Blockchain and is one of the features that helps keep the system secure from fraud and abuse. Bitcoins cannot be duplicated or forged.


Tracking the stolen bitcoins is easy enough, recovering the stolen money is likely be another matter. The thieves likely traded the bitcoins for cash and now a third party is holding the coins.


Sense some lawsuits regarding ownership of the stolen bitcoins?


Incentive for Fraud


Note the huge incentive for insider fraud at these sites. The owner or owners of these bitcoin exchanges can easily arrange for bitcoins to be stolen.


I do not propose that happened in either case above, I just mention the possibility.


Inside Japan’s Bitcoin Heist


Some do accuse Mt.Gox of fraud but the Daily Beast dismisses that idea. Please consider Inside Japan’s Bitcoin Heist

The Daily Beast was able to speak with a former employee of Mt. Gox, on the condition of anonymity, due to a nondisclosure agreement with the company. According to the former employee’s testimony and other expert analysis, it seems very likely that the collapse of Mt. Gox was not a criminal fraud but the result of poor management, faulty accounting, and system bugs that went unfixed many months after being recognized by the CEO himself. The final nail in the coffin was the unauthorized release of an internal document that was supposed to serve as the groundwork for saving the company. It is unclear who leaked the document—which was an unfinished draft of a plan of action.

“Essentially,” said the former employee, “Mt. Gox was a dysfunctional organization. Nobody was doing accounting reconciliation and there was an exploitable fault in the transaction system that allowed people to get paid twice—or in other words, withdraw more or less the same amount of Bitcoins two times.”


And it does seem true that Bitcoins are very hard to forge or duplicate. Unfortunately, if you know what you’re doing, they may be easy to steal. Or if you’re not careful, they may be very easy to lose.


Karpeles informed the former employee that an estimated 820,000 Bitcoins were unaccounted for—at the time, the equivalent of close to $ 500 million. The former employee was told the Bitcoins had possibly been siphoned off over several months by users exploiting flaws in the system. In particular, there seemed to be a system glitch that made it possible to get a payment reissued even after it had been already received. He says that because the firm hadn’t hired an accounting firm to keep the books or an auditor, the theft was undetected.


Teikoku Data Bank, Japan’s largest and most respected credit-rating agency, in July of last year reviewed the company and gave it a D4, the worst possible rating a company can receive on their scale. One of the reasons for the low rating was the lack of qualified accounting staff at the company.


Questions


Are you holding bitcoins? If so, what kind of auditing in in place at the exchange you hold them? Are they in cold storage? Should they be?


Accounting procedures at Mt.Gox were so bad it did not matter whether or not you had the transactions in cold storage.

Bitcoin Price and Fraud Go Hand in Hand


One final question: Is the runup in price directly related to fraud and theft?


Yes, two ways.


1. Increasing value of bitcoins made them an ideal target
2. Fraudsters who stole bitcoins had an incentive to artificially drive price higher knowing they could take out more than they put in, at more than one bitcoin exchange, and in more than one way.


How high would the price of bitcoin had gotten in the absence of those incentives?


Mike “Mish” Shedlock
http://globaleconomicanalysis.blogspot.com


Mish’s Global Economic Trend Analysis




Read more about Bitcoin Incentive for Fraud; Two More Exchanges Hacked: "Flexcoin" Robbed of All Online Coins; "Poloniex" Missing 12.3% of Assets and other interesting subjects concerning Economy at TheDailyNewsReport.com

Bitcoin Incentive for Fraud; Two More Exchanges Hacked: "Flexcoin" Robbed of All Online Coins; "Poloniex" Missing 12.3% of Assets

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Bitcoin Incentive for Fraud; Two More Exchanges Hacked: "Flexcoin" Robbed of All Online Coins; "Poloniex" Missing 12.3% of Assets

Saturday, November 2, 2013

SYRIA Hacked Emails: US Backed Plan To Stage Chemical Weapons Attack & Blame Assad 2013Jan30

At Alternate Viewpoint, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Alternate Viewpoint and how it is used.


Log Files


Like many other Web sites, Alternate Viewpoint makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Alternate Viewpoint does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Alternate Viewpoint.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Alternate Viewpoint and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Alternate Viewpoint send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Alternate Viewpoint has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Alternate Viewpoint"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



SYRIA Hacked Emails: US Backed Plan To Stage Chemical Weapons Attack & Blame Assad 2013Jan30

Tuesday, September 3, 2013

Marine Corps Page Hacked by Syrian Activists- Displayed Anti-War Message


By Cassius Methyl
Intellihub.com
September 1, 2013

Today, the US marine corps recruiting page was hacked by Syrian hackers, with a message warning US soldiers against joining ‘Al Qaeda’ in fighting in the Syrian civil war. It contained images of US soldiers holding pieces of paper, declaring that they will not fight in Syria, images that have been circulating around the internet rapidly in recent days, and the following message-


Link to this page

“This is a message written by your brothers in the Syrian Army, who have been fighting al-Qaida for the last 3 years. We understand your patriotism and love for your country so please understand our love for ours. Obama is a traitor who wants to put your lives in danger to rescue al- Qaida insurgents.”


“Marines, please take a look at what your comrades think about Obama’s alliance with al-Qaida against Syria. Your officer in charge probably has no qualms about sending you to die against soldiers just like you, fighting a vile common enemy. The Syrian army should be your ally not your enemy.”


“Refuse your orders and concentrate on the real reason every soldier joins their military, to defend their homeland. You’re more than welcome to fight alongside our army rather than against it.”


Your brothers, the Syrian army soldiers. A message delivered by the SEA”


 In these recent days, protests unprecedented in history have been held and planned, some considered ‘emergency protests’, a concept that seems to just have been created. This is an excellent sign that activists, truth speakers, and the opposition to war are finally being heard. People continue to wake up faster than ever before, and consequently, the people in power who want this war are trying to advance their agenda rapidly. Please share this with as many people as possible, as a method of raising morale and confidence for the opposition to this senseless war. Yet this raising confidence is not hollow, this isn’t building support for a resistance that is likely to fail- this is very powerful, very real opposition by spreading of information, and it is having a dramatic effect on the consciousness of people everywhere.


Writer Bio:

CassiusCassius Methyl is a journalist writing for Intellihub.com and a liberty activist who plays every instrument and vocals for an experimental metal-truth movement project called “Core of a Virus”. Find his music on Facebook. 

For media inquires, interviews, questions or suggestions for this author, email: cassius@intellihub.com or telephone: (347) 759-6075.

Read more articles by this author here.

*****

This article was originally brought to you by Intellihub.com


Don’t Be Lazy, Participate! Please Comment, LIKE & SHARE Below.


Note: Intellihub.com expressively grants permission to repost any article text on this site bearing the name “Intellihub.com” on the article’s byline header, attributing proper link-backs, keeping intact the article’s original byline header and writer bio. Images are subject to copyright by other parties.



Attention Readers: We value your opinion and comments. To participate in the discussion login. If you do not have a WordPress account you will need to make a new user or login via twitter below.



Intellihub.com



Marine Corps Page Hacked by Syrian Activists- Displayed Anti-War Message

Monday, September 2, 2013

US Marine corp. site hacked

So the Syrian Electronic Army strikes again, this time attacking the website for the US Marines.
They left a message on there see image below. you may need to zoom your browser to read the message.
The Marines website is currently down.


marines.com




AboveTopSecret.com New Topics



US Marine corp. site hacked

Saturday, July 13, 2013

Jailed Journalist Barrett Brown Faces 105 Years for Reporting on Hacked Private Intelligence Firms



Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors. Using information Anonymous took from the firm HBGary Federal, Brown helped discover a secret plan to tarnish the reputations of WikiLeaks and journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails from Stratfor Global Intelligence that were leaked in 2011. We speak to Peter Ludlow, professor of philosophy at Northwestern University, whose article “The Strange Case of Barrett Brown” recently appeared in The Nation. “Considering that the person who carried out the actual Stratfor hack had several priors and is facing a maximum of 10 years, the inescapable conclusion is that the problem is not with the hack itself but with Brown’s journalism,” Ludlow argues. He adds that the case against Brown could suggest criminality “to even link to something or share a link with someone.”




This is a rush transcript. Copy may not be in its final form.



JUAN GONZÁLEZ: As NSA leaker Edward Snowden remains at a Moscow airport, Army whistleblower Bradley Manning is on trial, and WikiLeaks founder Julian Assange is holed up in the Ecuadorean embassy in London, today we look at the strange story of another man tied to the world of cyber-activism who faces over a hundred years in prison. His name is Barrett Brown. He’s an investigative reporter with ties to the hacking collective Anonymous. He has spent the past 300 days in jail and has been denied bail. He faces 17 charges, ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors.


AMY GOODMAN: Before Brown’s path crossed with the FBI, he frequently contributed to Vanity Fair, The Huffington Post, The Guardian and other news outlets. In 2009, Brown created Project PM, which was, quote, “dedicated to investigating private government contractors working in the secretive fields of cybersecurity, intelligence and surveillance.” He was particularly interested in the documents leaked by WikiLeaks and Anonymous. In the documentary We Are Legion, Barrett Brown explains the importance of information obtained by hackers.


BARRETT BROWN: Some of the most important things that have been—have had the most far-reaching influence and have been the most important in terms of what’s been discovered, not just by Anonymous, but by the media in the aftermath, is the result of hacking. That information can’t be obtained by institutional journalistic process, or it can’t be obtained or won’t be obtained by a congressional committee or a federal oversight committee. For the most part, that information has to be, you know, obtained by hackers.



AMY GOODMAN: In 2011, the group Anonymous hacked into the computer system of the private security firm HBGary Federal and disclosed thousands of internal emails. Barrett Brown has not been accused of being involved in the hack, but he did read and analyze the documents, eventually crowdsourcing the effort through Project PM. One of the first things he discovered was a plan to tarnish the reputations of WikiLeaks and sympathetic journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails for Stratfor Global Intelligence that were leaked on Christmas Eve 2011. Shortly thereafter, the FBI acquired a warrant for Brown’s laptop and authority to seize any information from his communications—or, in journalism parlance, his sources. In September 2012, a troupe of armed agents surged into Brown’s apartment in Dallas, Texas, and handcuffed him face down on the floor. He has been in prison ever since.


JUAN GONZÁLEZ: Well, for more, we’re joined by Peter Ludlow, professor of philosophy at Northwestern University. He has written extensively on hacktivist actions against people—against private intelligence firms and the surveillance state. His recent article for The Nation is called “The Strange Case of Barrett Brown.”


Peter Ludlow, welcome to Democracy Now!


PETER LUDLOW: Hi. Thank you very much.


JUAN GONZÁLEZ: Talk to us about Barrett Brown, the importance of his case, given all the others that we’ve been dealing with on this show now for many years.


PETER LUDLOW: Well, yeah, it’s important for two reasons. First of all, it’s showing that, to some extent, all of us could be targets, because the principal reasons that they’re going after him with this sort of claim that he was involved in credit card fraud or something like that, I mean, that’s completely fallacious. I mean, in effect, what he did was take a link from a chat room and copied that link and pasted it into the chat room for Project PM. That is, he took a link that was broadcast widely on the Internet, and it was a link to the Stratfor hack information, and he just brought it to the attention of the editorial board of Project PM. And because there were, for whatever reason, unencrypted credit card numbers and validation codes among those five million other emails, the government is claiming that he was engaged in credit card fraud. They’re claiming that Project PM was a criminal enterprise. And so, basically, for our interest, why this is interesting to us is basically it makes this dangerous to even link to something or to share a link with someone.


JUAN GONZÁLEZ: And—


PETER LUDLOW: Go ahead, yeah, please.


JUAN GONZÁLEZ: Well, one of the things that you raise is, in some of your writings on this, is the incestuous relationship between the Justice Department, the government and these private firms that are being now targeted by cyber-activists. And could you talk about that, as well?


PETER LUDLOW: Well, sure. A lot of these private intelligence companies are started by ex-CIA, NSA people. Some people come from those agencies and rotate back into the government. I mean, you even see, with the case of Snowden, he was actually a contractor for a private intelligence company, Booz Allen. And, I mean, people think about the NSA, FBI, CIA, and they think of—those are the people that are doing the surveillance of you and doing this intelligence work, but really, if you look at how much the United States spends on intelligence, 70 percent of that is actually going to these private intelligence contractors. So, you know, if you add up CIA, NSA, FBI, that’s just a tip of the iceberg. So there’s all this sort of spook stuff going on in the private realm. And, yeah, right, a lot of it is very incestuous. There’s a revolving door. And no one is investigating it or even talking about it, as far as I can tell.


AMY GOODMAN: Let’s go to Barrett Brown in his own words. In March 2012, Democracy Now! spoke with Barrett soon after his house was raided.


BARRETT BROWN: On March 5th, I received a tip that I was about to be raided by the FBI. I left my apartment here in Dallas, went to my mom’s residence here in the same city. Next morning, three FBI agents arrived at my mom’s place. I went out and talked to them. They said my apartment had just been raided. The door was damaged. They would take care of that. And that they also asked me if I had any laptops with me that I wanted to give them. I said no.



A few hours later, the FBI returned to my mom’s house with another warrant, this time for her house, and detained the both of us for three hours while they searched the residence. They found several laptops I had stashed somewhere in the house and left the search warrants and left another one in my apartment, which I got when I came back here a little after, the next day or so.



The warrants themselves refer to the information that they’re seeking as regarding Anonymous, of course, a few other things of that nature, and also two companies: HBGary and Endgame Systems. Both of these are intelligence contracting companies that Anonymous had a run-in with in February of 2011, during which a number of emails were taken from HBGary, in particular, which themselves revealed a number of conspiracies being perpetuated by those companies in conjunction with Justice Department and several other institutions, including Bank of America, against WikiLeaks and against several journalists.



The time since, I’ve spent a lot of time going over those emails, researching them, conducting other research, otherwise trying to expose a number of things that have been discovered by virtue of those emails from HBGary having been taken. I sincerely believe that my activities on that front contributed to me being raided the other day and will no doubt contribute to any further action that the FBI decides to take. I would just also note the Justice Department itself is very much intertwined with this issue, and has been for a while, and in no way can conduct a fair investigation against me, based on what I’ve revealed, what I’ve helped to sort of emphasize about them.



AMY GOODMAN: That was Barrett Brown in his own words just after the raid.


PETER LUDLOW: Yeah.


AMY GOODMAN: Peter Ludlow, talk about what he had released. Talk about what he got from HBGary and how this links to Glenn Greenwald.


PETER LUDLOW: Sure. Well, what they uncovered was—I mean, it’s actually a little bit subtle, right? Because it begins with the Bank of America being concerned that WikiLeaks had information on it. Bank of America goes to the United States Department of Justice. The Department of Justice leads them to Hunton & Williams, the big law fix-it firm in the D.C. area, who in turn hooks them up with a group of private intelligence contractors that went under the umbrella Team Themis. And Team Themis had a number of proposals and projects that were exposed in all of this. They included running kind of a PSYOPs operation against the Chamber Watch, which is a group that sort of monitors the Chamber of Commerce, and it was an attempt to undermine it and Glenn Greenwald and other individuals. And, I mean, there were many, many plans that they had, many, many things, but some of the documents released showed that they were saying they were going to create fake documents, leak them to Greenwald, and then, when Greenwald eventually released them, they would expose it as a fraud and attempt to undermine him in that way. And they had a similar plan for Chamber Watch, as well.


JUAN GONZÁLEZ: And their concern with Greenwald was that he was giving—that his defense of WikiLeaks was giving legitimacy to WikiLeaks—


PETER LUDLOW: That was—yeah. That was the concern.


JUAN GONZÁLEZ: —it didn’t deserve.


PETER LUDLOW: That was the concern, yeah. And they actually said in there, “Well, he’s just a professional journalist, and he’ll fold under pressure immediately. I mean, apparently they were wrong about that. So, yeah.


JUAN GONZÁLEZ: There were also emails found where these private security firms were assessing the damage that Jeremy Scahill’s books had done to Blackwater?


PETER LUDLOW: Well, actually, those—I ran across that in the Stratfor leaks, and that was kind of interesting, because they were monitoring—they were monitoring this because they were concerned that Blackwater was going to get into the private intelligence business themselves. And they were commenting on Scahill. They go, “Well, yeah, Scahill, you know, I don’t care much for his politics, but he’s really got these guys figured out, yeah?” So that was a little compliment for Scahill, I think.


JUAN GONZÁLEZ: But the amazing thing in all of this is the degree to which these private security firms are engaging in attempts to influence what’s going on in the public debate on—


PETER LUDLOW: Oh, yeah.


JUAN GONZÁLEZ: —on intelligence.


PETER LUDLOW: Oh, yeah, yeah. I mean, one of the most crazy things in the whole thing was when Coca-Cola approached Stratfor, and they were concerned about PETA, you know, People for the Ethical Treatment of Animals. And why, I’m not entirely sure, but one of the people in Stratfor said, “Well, the FBI has a classified file on PETA. I’ll see if I can get it for you.” Now, that little story sums up a lot of stuff that’s wrong about this. First of all, why are private—why is Coca-Cola going to a private intelligence company for this? Why is—why did the private intelligence company feel that they had immediate access to a classified file by the FBI? And why did the FBI have a classified file, to begin with? I mean—but, to me, the creepiest part of that very creepy little story is the fact that the guy at Stratfor felt that he had access to this classified file by the FBI. And the Barrett Brown case revealed something like this, as well. It’s almost like the FBI has become just another private security firm, that it’s become like a private cop for these companies, as it were. And, I mean, that’s part because of the revolving door. It’s part because they get pressed into service for companies that want inside information on activist organizations like PETA.


AMY GOODMAN: We’re going to take break—


PETER LUDLOW: Yeah.


AMY GOODMAN: —and then come back to this conversation. We’re talking to Peter Ludlow, professor of philosophy at Northwestern University, has written extensively on hacktivist actions against private intelligence firms. The piece he most recently wrote is for The Nation, and it’s called “The Strange Case of Barrett Brown.” When we come back, I want to ask you how it’s possible he faces a hundred years in prison.


PETER LUDLOW: Yeah.


AMY GOODMAN: It makes us think about Aaron Swartz.


PETER LUDLOW: Yeah.


AMY GOODMAN: He didn’t face anything like that, but he faced decades in prison.


PETER LUDLOW: Yeah.


AMY GOODMAN: He ultimately committed suicide—


PETER LUDLOW: Yeah, yeah.


AMY GOODMAN: —before prosecution. Stay with us.


[break]


AMY GOODMAN: Peter Ludlow is our guest, a professor of philosophy at Northwestern University, has been tracking the case of Barrett Brown and wrote a Nation piece about him, “The Strange Case of Barrett Brown.” So, the FBI raids his home, and he ultimately is arrested. He faces 100 years in prison?


PETER LUDLOW: Yeah, if you add up all the charges and if he serves them sequentially, it will be 105 years in prison. Yeah, that’s right.


JUAN GONZÁLEZ: And the decision for no bail?


PETER LUDLOW: That’s a mystery to me.


AMY GOODMAN: He’s been in jail now for 300 days.


PETER LUDLOW: Three hundred days, yeah, over 300 days, no bail. For a while they were—they had frozen his—the contributions to his legal fund, too.


AMY GOODMAN: Well, that sounds like WikiLeaks.


PETER LUDLOW: Yeah.


AMY GOODMAN: Meaning that’s what happened to Wiki—well, WikiLeaks, they had all these different corporations like PayPal refuse to allow money to go to them.


PETER LUDLOW: Yeah, right.


AMY GOODMAN: Let’s go to an interview Barrett Brown did with NBC’s Michael Isikoff serving as a spokesperson for Anonymous.


BARRETT BROWN: Our people break laws, just like all people break laws. When we break laws, we do so in the service of civil disobedience. We do so ethically. We do it against targets who have asked for it.



MICHAEL ISIKOFF: You go against targets that have asked for it.



BARRETT BROWN: Yes.



MICHAEL ISIKOFF: What do you mean?



BARRETT BROWN: Targets who have engaged in a manner that is either unethical and contrary to the—sort of the values of this age, information freedom. Just, I mean—and sometimes just plain common sense, in the case of them going after journalists, going after WikiLeaks, in the way that they were planning to do so.



MICHAEL ISIKOFF: But you can attack websites.



BARRETT BROWN: Yes, we can attack websites. We can DDoS them. We can sometimes hack them. We can sometimes take over the websites themselves, put messages up, as we did today with Westboro and as we did with—with the company HBGary and other federal contractors during that attack.



MICHAEL ISIKOFF: You can—you can—



BARRETT BROWN: Take it over, debase it.



MICHAEL ISIKOFF: —take over the websites of government contractors.



BARRETT BROWN: And governments, of course. In Tunisia and in Libya, Algeria and Egypt and Iran, we either took down or replaced government websites. We replaced them with messages from us to the people of those nations, explaining what we’re doing and why and what we’ll provide if they choose to revolt.



MICHAEL ISIKOFF: Are you worried you’re going to get prosecuted?



BARRETT BROWN: I’m not worried about it, but I am going to get prosecuted at some point, yes.



MICHAEL ISIKOFF: Because you’re involved in hacking activity.



BARRETT BROWN: Because they could do whatever they want to anyone they want.



MICHAEL ISIKOFF: But you’re not worried?



BARRETT BROWN: No, because, again, like I said, I’m well protected right now.



MICHAEL ISIKOFF: What do you mean, well protected?



BARRETT BROWN: I’ve got a lot of lawyers. I’ve got a lot of higher-up people. I’ve got people to talk to who will—who support us. And if they come after me, they’re going to find that they’re not going to like everything that they see.



AMY GOODMAN: That’s Barrett Brown talking to NBC’s Michael Isikoff. Well, the fact is, Barrett Brown has been in prison now for 300 days, and he faces decades in prison. Can you explain—that’s when he was an Anonymous spokesperson—what Anonymous is? And then also talk about the groups he exposed, like Endgame and others, though he wasn’t the only one to do that.


PETER LUDLOW: Sure. I have to think he was a little bit optimistic there in his claims about how he was all lawyered up there. But he was a—he was related to Anonymous, which is—it’s not a group, per se. You know, you or I could claim to be members of Anonymous. It’s more like a flag that you fly if you choose to. And so, there was a loosely knit group of hacktivists. Some of them were intersecting. They carried out hacks against—as he says, against various private intelligence contractors and other kinds of targets. He’s quite right that during the Arab Spring and the Tunisian uprising and so forth, members of Anonymous did a lot of work in keeping protesters online and in minimizing the effectiveness of the governments in the Middle East in that time.


And then you asked about—


AMY GOODMAN: Endgame.


PETER LUDLOW: —things like Endgame Systems, for example. Yeah, Endgame is a very interesting thing. I mean, Endgame is this kind of very secretive private intelligence company. And you even see in the HBGary hack, you see these messages where someone from Endgame says in an email, “We don’t ever want to see our name in a press release from you guys.” And what makes it particularly interesting is, if you read the search warrant that’s issued to Barrett when he’s busted, it says, “Well, we’re looking for stuff related to HBGary and Endgame Systems.” You know, like, why Endgame Systems?


And this is a corporation that’s involved in what are called “zero-day exploits.” Now, what’s a zero-day exploit? Basically, what that means is that there are certain security flaws in the software that we have and that we use, and sometimes the company doesn’t know about it. Sometimes it’s known about it for seven days, and they’ve had seven days to work on it. A zero-day exploit is one that the software company doesn’t know about. And Endgame Systems packages these things and sells them. So, for example, they have one where you get—it’s a subscription for like $ 2.5 million a year, and you get these exploits. So it’s things that a hacker would do, but because they’re a business and they’re making money for it, it’s—apparently it’s OK, right? And it seems that the Justice Department is kind of running interference for these guys. And there’s a—I mean, you don’t have to take my word for it. There’s a great article in Businessweek on this in which they talk about the guys from Endgame, you know, running—setting up slides and showing you targets in airports, telling you what the computers are running there, and what kind of the—what the vulnerabilities are and so forth.


JUAN GONZÁLEZ: And who runs Endgame? Where are they based?


PETER LUDLOW: They’re based in Atlanta, Georgia, I believe. Someone recently posted a video on YouTube in which he walked into the place and—just to see what was going on there. And the people—I think it’s an ex—it’s started by an ex-intelligence person and by a security guy at IBM.


AMY GOODMAN: And, very quickly, Project PM?


PETER LUDLOW: Yeah. Project PM is basically Barrett’s—I mean, one of the genius things about Barrett was that he wanted to crowdsource all this information, because you get a hack of Stratfor and it’s five million emails, and how do you sort through all that? So he had a number of friends and acquaintances, including Michael Hastings, by the way, who were members of Project PM.


AMY GOODMAN: Michael Hastings, the reporter who just died in a fiery car crash.


PETER LUDLOW: The reporter who just died in the suspicious car accident, yeah, exactly right. And so, they would—he would basically crowdsource this. And so, the case where he copied that link, he was basically notifying the members of Project PM where they could find the information from the Stratfor hack.


AMY GOODMAN: So, what’s the schedule of—we just have 30 seconds—


PETER LUDLOW: Yeah.


AMY GOODMAN: —of what will happen to Barrett Brown right now? He’s in jail in Texas.


PETER LUDLOW: Yeah. I mean, he’s got a great legal team. Charles Swift is one of them, the guy from the judge advocate general’s thing that took that Gitmo case all the way to the Supreme Court.


AMY GOODMAN: From the JAG.


PETER LUDLOW: Ahmed Ghappour, who’s at University of Texas Law School. There’s a group of individuals with freebarrettbrown.org who are raising money for him there, and they’re available if you have questions and so forth.


AMY GOODMAN: Well, we’ll certainly follow this case, Peter Ludlow, professor of philosophy at Northwestern University. He’s written extensively on hacktivist actions against private intelligence firms and the surveillance state. His most recent piece is in The Nation; it’s called “The Strange Case of Barrett Brown.” We will link to it at democracynow.org.




Truthout Stories



Jailed Journalist Barrett Brown Faces 105 Years for Reporting on Hacked Private Intelligence Firms

Jailed Journalist Barrett Brown Faces 105 Years for Reporting on Hacked Private Intelligence Firms



Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors. Using information Anonymous took from the firm HBGary Federal, Brown helped discover a secret plan to tarnish the reputations of WikiLeaks and journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails from Stratfor Global Intelligence that were leaked in 2011. We speak to Peter Ludlow, professor of philosophy at Northwestern University, whose article “The Strange Case of Barrett Brown” recently appeared in The Nation. “Considering that the person who carried out the actual Stratfor hack had several priors and is facing a maximum of 10 years, the inescapable conclusion is that the problem is not with the hack itself but with Brown’s journalism,” Ludlow argues. He adds that the case against Brown could suggest criminality “to even link to something or share a link with someone.”




This is a rush transcript. Copy may not be in its final form.



JUAN GONZÁLEZ: As NSA leaker Edward Snowden remains at a Moscow airport, Army whistleblower Bradley Manning is on trial, and WikiLeaks founder Julian Assange is holed up in the Ecuadorean embassy in London, today we look at the strange story of another man tied to the world of cyber-activism who faces over a hundred years in prison. His name is Barrett Brown. He’s an investigative reporter with ties to the hacking collective Anonymous. He has spent the past 300 days in jail and has been denied bail. He faces 17 charges, ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors.


AMY GOODMAN: Before Brown’s path crossed with the FBI, he frequently contributed to Vanity Fair, The Huffington Post, The Guardian and other news outlets. In 2009, Brown created Project PM, which was, quote, “dedicated to investigating private government contractors working in the secretive fields of cybersecurity, intelligence and surveillance.” He was particularly interested in the documents leaked by WikiLeaks and Anonymous. In the documentary We Are Legion, Barrett Brown explains the importance of information obtained by hackers.


BARRETT BROWN: Some of the most important things that have been—have had the most far-reaching influence and have been the most important in terms of what’s been discovered, not just by Anonymous, but by the media in the aftermath, is the result of hacking. That information can’t be obtained by institutional journalistic process, or it can’t be obtained or won’t be obtained by a congressional committee or a federal oversight committee. For the most part, that information has to be, you know, obtained by hackers.



AMY GOODMAN: In 2011, the group Anonymous hacked into the computer system of the private security firm HBGary Federal and disclosed thousands of internal emails. Barrett Brown has not been accused of being involved in the hack, but he did read and analyze the documents, eventually crowdsourcing the effort through Project PM. One of the first things he discovered was a plan to tarnish the reputations of WikiLeaks and sympathetic journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails for Stratfor Global Intelligence that were leaked on Christmas Eve 2011. Shortly thereafter, the FBI acquired a warrant for Brown’s laptop and authority to seize any information from his communications—or, in journalism parlance, his sources. In September 2012, a troupe of armed agents surged into Brown’s apartment in Dallas, Texas, and handcuffed him face down on the floor. He has been in prison ever since.


JUAN GONZÁLEZ: Well, for more, we’re joined by Peter Ludlow, professor of philosophy at Northwestern University. He has written extensively on hacktivist actions against people—against private intelligence firms and the surveillance state. His recent article for The Nation is called “The Strange Case of Barrett Brown.”


Peter Ludlow, welcome to Democracy Now!


PETER LUDLOW: Hi. Thank you very much.


JUAN GONZÁLEZ: Talk to us about Barrett Brown, the importance of his case, given all the others that we’ve been dealing with on this show now for many years.


PETER LUDLOW: Well, yeah, it’s important for two reasons. First of all, it’s showing that, to some extent, all of us could be targets, because the principal reasons that they’re going after him with this sort of claim that he was involved in credit card fraud or something like that, I mean, that’s completely fallacious. I mean, in effect, what he did was take a link from a chat room and copied that link and pasted it into the chat room for Project PM. That is, he took a link that was broadcast widely on the Internet, and it was a link to the Stratfor hack information, and he just brought it to the attention of the editorial board of Project PM. And because there were, for whatever reason, unencrypted credit card numbers and validation codes among those five million other emails, the government is claiming that he was engaged in credit card fraud. They’re claiming that Project PM was a criminal enterprise. And so, basically, for our interest, why this is interesting to us is basically it makes this dangerous to even link to something or to share a link with someone.


JUAN GONZÁLEZ: And—


PETER LUDLOW: Go ahead, yeah, please.


JUAN GONZÁLEZ: Well, one of the things that you raise is, in some of your writings on this, is the incestuous relationship between the Justice Department, the government and these private firms that are being now targeted by cyber-activists. And could you talk about that, as well?


PETER LUDLOW: Well, sure. A lot of these private intelligence companies are started by ex-CIA, NSA people. Some people come from those agencies and rotate back into the government. I mean, you even see, with the case of Snowden, he was actually a contractor for a private intelligence company, Booz Allen. And, I mean, people think about the NSA, FBI, CIA, and they think of—those are the people that are doing the surveillance of you and doing this intelligence work, but really, if you look at how much the United States spends on intelligence, 70 percent of that is actually going to these private intelligence contractors. So, you know, if you add up CIA, NSA, FBI, that’s just a tip of the iceberg. So there’s all this sort of spook stuff going on in the private realm. And, yeah, right, a lot of it is very incestuous. There’s a revolving door. And no one is investigating it or even talking about it, as far as I can tell.


AMY GOODMAN: Let’s go to Barrett Brown in his own words. In March 2012, Democracy Now! spoke with Barrett soon after his house was raided.


BARRETT BROWN: On March 5th, I received a tip that I was about to be raided by the FBI. I left my apartment here in Dallas, went to my mom’s residence here in the same city. Next morning, three FBI agents arrived at my mom’s place. I went out and talked to them. They said my apartment had just been raided. The door was damaged. They would take care of that. And that they also asked me if I had any laptops with me that I wanted to give them. I said no.



A few hours later, the FBI returned to my mom’s house with another warrant, this time for her house, and detained the both of us for three hours while they searched the residence. They found several laptops I had stashed somewhere in the house and left the search warrants and left another one in my apartment, which I got when I came back here a little after, the next day or so.



The warrants themselves refer to the information that they’re seeking as regarding Anonymous, of course, a few other things of that nature, and also two companies: HBGary and Endgame Systems. Both of these are intelligence contracting companies that Anonymous had a run-in with in February of 2011, during which a number of emails were taken from HBGary, in particular, which themselves revealed a number of conspiracies being perpetuated by those companies in conjunction with Justice Department and several other institutions, including Bank of America, against WikiLeaks and against several journalists.



The time since, I’ve spent a lot of time going over those emails, researching them, conducting other research, otherwise trying to expose a number of things that have been discovered by virtue of those emails from HBGary having been taken. I sincerely believe that my activities on that front contributed to me being raided the other day and will no doubt contribute to any further action that the FBI decides to take. I would just also note the Justice Department itself is very much intertwined with this issue, and has been for a while, and in no way can conduct a fair investigation against me, based on what I’ve revealed, what I’ve helped to sort of emphasize about them.



AMY GOODMAN: That was Barrett Brown in his own words just after the raid.


PETER LUDLOW: Yeah.


AMY GOODMAN: Peter Ludlow, talk about what he had released. Talk about what he got from HBGary and how this links to Glenn Greenwald.


PETER LUDLOW: Sure. Well, what they uncovered was—I mean, it’s actually a little bit subtle, right? Because it begins with the Bank of America being concerned that WikiLeaks had information on it. Bank of America goes to the United States Department of Justice. The Department of Justice leads them to Hunton & Williams, the big law fix-it firm in the D.C. area, who in turn hooks them up with a group of private intelligence contractors that went under the umbrella Team Themis. And Team Themis had a number of proposals and projects that were exposed in all of this. They included running kind of a PSYOPs operation against the Chamber Watch, which is a group that sort of monitors the Chamber of Commerce, and it was an attempt to undermine it and Glenn Greenwald and other individuals. And, I mean, there were many, many plans that they had, many, many things, but some of the documents released showed that they were saying they were going to create fake documents, leak them to Greenwald, and then, when Greenwald eventually released them, they would expose it as a fraud and attempt to undermine him in that way. And they had a similar plan for Chamber Watch, as well.


JUAN GONZÁLEZ: And their concern with Greenwald was that he was giving—that his defense of WikiLeaks was giving legitimacy to WikiLeaks—


PETER LUDLOW: That was—yeah. That was the concern.


JUAN GONZÁLEZ: —it didn’t deserve.


PETER LUDLOW: That was the concern, yeah. And they actually said in there, “Well, he’s just a professional journalist, and he’ll fold under pressure immediately. I mean, apparently they were wrong about that. So, yeah.


JUAN GONZÁLEZ: There were also emails found where these private security firms were assessing the damage that Jeremy Scahill’s books had done to Blackwater?


PETER LUDLOW: Well, actually, those—I ran across that in the Stratfor leaks, and that was kind of interesting, because they were monitoring—they were monitoring this because they were concerned that Blackwater was going to get into the private intelligence business themselves. And they were commenting on Scahill. They go, “Well, yeah, Scahill, you know, I don’t care much for his politics, but he’s really got these guys figured out, yeah?” So that was a little compliment for Scahill, I think.


JUAN GONZÁLEZ: But the amazing thing in all of this is the degree to which these private security firms are engaging in attempts to influence what’s going on in the public debate on—


PETER LUDLOW: Oh, yeah.


JUAN GONZÁLEZ: —on intelligence.


PETER LUDLOW: Oh, yeah, yeah. I mean, one of the most crazy things in the whole thing was when Coca-Cola approached Stratfor, and they were concerned about PETA, you know, People for the Ethical Treatment of Animals. And why, I’m not entirely sure, but one of the people in Stratfor said, “Well, the FBI has a classified file on PETA. I’ll see if I can get it for you.” Now, that little story sums up a lot of stuff that’s wrong about this. First of all, why are private—why is Coca-Cola going to a private intelligence company for this? Why is—why did the private intelligence company feel that they had immediate access to a classified file by the FBI? And why did the FBI have a classified file, to begin with? I mean—but, to me, the creepiest part of that very creepy little story is the fact that the guy at Stratfor felt that he had access to this classified file by the FBI. And the Barrett Brown case revealed something like this, as well. It’s almost like the FBI has become just another private security firm, that it’s become like a private cop for these companies, as it were. And, I mean, that’s part because of the revolving door. It’s part because they get pressed into service for companies that want inside information on activist organizations like PETA.


AMY GOODMAN: We’re going to take break—


PETER LUDLOW: Yeah.


AMY GOODMAN: —and then come back to this conversation. We’re talking to Peter Ludlow, professor of philosophy at Northwestern University, has written extensively on hacktivist actions against private intelligence firms. The piece he most recently wrote is for The Nation, and it’s called “The Strange Case of Barrett Brown.” When we come back, I want to ask you how it’s possible he faces a hundred years in prison.


PETER LUDLOW: Yeah.


AMY GOODMAN: It makes us think about Aaron Swartz.


PETER LUDLOW: Yeah.


AMY GOODMAN: He didn’t face anything like that, but he faced decades in prison.


PETER LUDLOW: Yeah.


AMY GOODMAN: He ultimately committed suicide—


PETER LUDLOW: Yeah, yeah.


AMY GOODMAN: —before prosecution. Stay with us.


[break]


AMY GOODMAN: Peter Ludlow is our guest, a professor of philosophy at Northwestern University, has been tracking the case of Barrett Brown and wrote a Nation piece about him, “The Strange Case of Barrett Brown.” So, the FBI raids his home, and he ultimately is arrested. He faces 100 years in prison?


PETER LUDLOW: Yeah, if you add up all the charges and if he serves them sequentially, it will be 105 years in prison. Yeah, that’s right.


JUAN GONZÁLEZ: And the decision for no bail?


PETER LUDLOW: That’s a mystery to me.


AMY GOODMAN: He’s been in jail now for 300 days.


PETER LUDLOW: Three hundred days, yeah, over 300 days, no bail. For a while they were—they had frozen his—the contributions to his legal fund, too.


AMY GOODMAN: Well, that sounds like WikiLeaks.


PETER LUDLOW: Yeah.


AMY GOODMAN: Meaning that’s what happened to Wiki—well, WikiLeaks, they had all these different corporations like PayPal refuse to allow money to go to them.


PETER LUDLOW: Yeah, right.


AMY GOODMAN: Let’s go to an interview Barrett Brown did with NBC’s Michael Isikoff serving as a spokesperson for Anonymous.


BARRETT BROWN: Our people break laws, just like all people break laws. When we break laws, we do so in the service of civil disobedience. We do so ethically. We do it against targets who have asked for it.



MICHAEL ISIKOFF: You go against targets that have asked for it.



BARRETT BROWN: Yes.



MICHAEL ISIKOFF: What do you mean?



BARRETT BROWN: Targets who have engaged in a manner that is either unethical and contrary to the—sort of the values of this age, information freedom. Just, I mean—and sometimes just plain common sense, in the case of them going after journalists, going after WikiLeaks, in the way that they were planning to do so.



MICHAEL ISIKOFF: But you can attack websites.



BARRETT BROWN: Yes, we can attack websites. We can DDoS them. We can sometimes hack them. We can sometimes take over the websites themselves, put messages up, as we did today with Westboro and as we did with—with the company HBGary and other federal contractors during that attack.



MICHAEL ISIKOFF: You can—you can—



BARRETT BROWN: Take it over, debase it.



MICHAEL ISIKOFF: —take over the websites of government contractors.



BARRETT BROWN: And governments, of course. In Tunisia and in Libya, Algeria and Egypt and Iran, we either took down or replaced government websites. We replaced them with messages from us to the people of those nations, explaining what we’re doing and why and what we’ll provide if they choose to revolt.



MICHAEL ISIKOFF: Are you worried you’re going to get prosecuted?



BARRETT BROWN: I’m not worried about it, but I am going to get prosecuted at some point, yes.



MICHAEL ISIKOFF: Because you’re involved in hacking activity.



BARRETT BROWN: Because they could do whatever they want to anyone they want.



MICHAEL ISIKOFF: But you’re not worried?



BARRETT BROWN: No, because, again, like I said, I’m well protected right now.



MICHAEL ISIKOFF: What do you mean, well protected?



BARRETT BROWN: I’ve got a lot of lawyers. I’ve got a lot of higher-up people. I’ve got people to talk to who will—who support us. And if they come after me, they’re going to find that they’re not going to like everything that they see.



AMY GOODMAN: That’s Barrett Brown talking to NBC’s Michael Isikoff. Well, the fact is, Barrett Brown has been in prison now for 300 days, and he faces decades in prison. Can you explain—that’s when he was an Anonymous spokesperson—what Anonymous is? And then also talk about the groups he exposed, like Endgame and others, though he wasn’t the only one to do that.


PETER LUDLOW: Sure. I have to think he was a little bit optimistic there in his claims about how he was all lawyered up there. But he was a—he was related to Anonymous, which is—it’s not a group, per se. You know, you or I could claim to be members of Anonymous. It’s more like a flag that you fly if you choose to. And so, there was a loosely knit group of hacktivists. Some of them were intersecting. They carried out hacks against—as he says, against various private intelligence contractors and other kinds of targets. He’s quite right that during the Arab Spring and the Tunisian uprising and so forth, members of Anonymous did a lot of work in keeping protesters online and in minimizing the effectiveness of the governments in the Middle East in that time.


And then you asked about—


AMY GOODMAN: Endgame.


PETER LUDLOW: —things like Endgame Systems, for example. Yeah, Endgame is a very interesting thing. I mean, Endgame is this kind of very secretive private intelligence company. And you even see in the HBGary hack, you see these messages where someone from Endgame says in an email, “We don’t ever want to see our name in a press release from you guys.” And what makes it particularly interesting is, if you read the search warrant that’s issued to Barrett when he’s busted, it says, “Well, we’re looking for stuff related to HBGary and Endgame Systems.” You know, like, why Endgame Systems?


And this is a corporation that’s involved in what are called “zero-day exploits.” Now, what’s a zero-day exploit? Basically, what that means is that there are certain security flaws in the software that we have and that we use, and sometimes the company doesn’t know about it. Sometimes it’s known about it for seven days, and they’ve had seven days to work on it. A zero-day exploit is one that the software company doesn’t know about. And Endgame Systems packages these things and sells them. So, for example, they have one where you get—it’s a subscription for like $ 2.5 million a year, and you get these exploits. So it’s things that a hacker would do, but because they’re a business and they’re making money for it, it’s—apparently it’s OK, right? And it seems that the Justice Department is kind of running interference for these guys. And there’s a—I mean, you don’t have to take my word for it. There’s a great article in Businessweek on this in which they talk about the guys from Endgame, you know, running—setting up slides and showing you targets in airports, telling you what the computers are running there, and what kind of the—what the vulnerabilities are and so forth.


JUAN GONZÁLEZ: And who runs Endgame? Where are they based?


PETER LUDLOW: They’re based in Atlanta, Georgia, I believe. Someone recently posted a video on YouTube in which he walked into the place and—just to see what was going on there. And the people—I think it’s an ex—it’s started by an ex-intelligence person and by a security guy at IBM.


AMY GOODMAN: And, very quickly, Project PM?


PETER LUDLOW: Yeah. Project PM is basically Barrett’s—I mean, one of the genius things about Barrett was that he wanted to crowdsource all this information, because you get a hack of Stratfor and it’s five million emails, and how do you sort through all that? So he had a number of friends and acquaintances, including Michael Hastings, by the way, who were members of Project PM.


AMY GOODMAN: Michael Hastings, the reporter who just died in a fiery car crash.


PETER LUDLOW: The reporter who just died in the suspicious car accident, yeah, exactly right. And so, they would—he would basically crowdsource this. And so, the case where he copied that link, he was basically notifying the members of Project PM where they could find the information from the Stratfor hack.


AMY GOODMAN: So, what’s the schedule of—we just have 30 seconds—


PETER LUDLOW: Yeah.


AMY GOODMAN: —of what will happen to Barrett Brown right now? He’s in jail in Texas.


PETER LUDLOW: Yeah. I mean, he’s got a great legal team. Charles Swift is one of them, the guy from the judge advocate general’s thing that took that Gitmo case all the way to the Supreme Court.


AMY GOODMAN: From the JAG.


PETER LUDLOW: Ahmed Ghappour, who’s at University of Texas Law School. There’s a group of individuals with freebarrettbrown.org who are raising money for him there, and they’re available if you have questions and so forth.


AMY GOODMAN: Well, we’ll certainly follow this case, Peter Ludlow, professor of philosophy at Northwestern University. He’s written extensively on hacktivist actions against private intelligence firms and the surveillance state. His most recent piece is in The Nation; it’s called “The Strange Case of Barrett Brown.” We will link to it at democracynow.org.




Truthout Stories



Jailed Journalist Barrett Brown Faces 105 Years for Reporting on Hacked Private Intelligence Firms

Monday, February 18, 2013

Burger King Twitter account "hacked"

Burger King shop logo file pictureBurger King’s account has now been suspended

US fast-food company Burger King has said its Twitter account may have been hacked, after its profile picture was changed to a McDonalds logo.

The background picture on the account showed Fish McBites and some posts contained racial slurs, obscenities and references to drugs.

The firm says it asked Twitter to suspend the account and @BurgerKing has not posted since 13:15 EST (18:15 GMT).

Burger King says it will post an apology on its Facebook page.

The account tweeted that the company had been sold to rival hamburger chain McDonalds.

“We just got sold to McDonalds! Look for McDonalds in a hood near you,” one post read.

It also posted messages such as: “If I catch you at a Wendys, we’re fightin!”

The tweets stopped after a little more than an hour.

Meanwhile, McDonalds tweeted in response to the apparent hack: “We empathize with our @BurgerKing counterparts. Rest assured, we had nothing to do with the hacking.”

It is not known who might be responsible for the breach.

The development comes in the wake of a scandal across at least 12 European countries, in which it emerged that some products labelled as beef contained horsemeat.

Burger King has said it has cut ties with some of its suppliers as a precaution, in the wake of the scandal.


BBC News – US & Canada


Burger King Twitter account "hacked"

Burger King"s Twitter account hacked

Burger King hack

A screen grab of the Burger King Twitter page after it was apparently hacked. Source: Supplied

IT APPEARS that Burger King’s Twitter account has been hacked.

Starting just after 4am AEDT, the fast-foot company’s Twitter picture was changed to a McDonald’s logo, and the account tweeted that it had been sold to rival McDonald’s.

In the following hour, some posts from the account contained racial epithets, references to drug use and obscenities. The account has also tweeted: “if I catch you at a wendys, we’re fightin!”

Videos and photos making fun of the fast food giant flooded the feed for the next hour.

“We caught one of our employees in the bathroom doing this….” one of the tweets said, with a photo of a man injecting a syringe into his arm.

McDonald’s copped the brunt of the blame, with the company putting out a Tweet to assure customers they were not behind the hack.  

Burger King Worldwide Inc. spokesman Bryson Thornton said the company reached out to Twitter administrators to suspend the account. The account has not posted since about 5.15am AEDT.

The Miami company plans to post a statement on Facebook later today to apologise, especially for the offensive posts. It hopes to have the account back up soon.


NEWS.com.au | Technology News


Burger King"s Twitter account hacked