大便次数多吃什么药| HP是什么| 洋葱吃了有什么好处| 空调室内机漏水是什么原因| 2023年属什么生肖| 腰椎退行性变什么意思| 喝水牙疼是什么原因| 石钟乳是什么意思| edifier是什么牌子| 折射率是什么意思| kenzo属于什么档次| 有眼屎是什么原因| 意图是什么意思| 牡丹和芍药有什么区别| 练深蹲有什么好处| 令坦是对方什么人的尊称| 半夜流鼻血是什么原因| 球镜是什么| 去侍庙有什么禁忌| 黄精有什么功效| 三伏天什么意思| 6月30号什么星座| 区号是什么| 球镜是什么意思| 鸡肠炎用什么药效果好| 梦见买床是什么意思| 麻疹是什么| 一个胸大一个胸小是什么原因| 女孩名字带什么字好听| 做梦烧纸钱什么意思| ci是什么意思| 脸发麻是什么病的前兆| 中性粒细胞百分比偏低什么意思| 籍贯是指什么| 坨是什么意思| 下面有味道用什么药| 王母娘娘姓什么| 首鼠两端是什么意思| 鼻窦炎的症状是什么| 缱绻旖旎是什么意思| 番茄可以做什么菜| 生男生女取决于什么| 十一月八号是什么星座| 老舍原名是什么| 睡眠不好吃什么药最有效| 仰望是什么意思| 嘴角上方有痣代表什么| 五月二十四是什么星座| 省亲是什么意思| 喝陈皮水有什么好处| 姥姥的妈妈叫什么| 睡觉时身体抽搐是什么原因| 血清和血浆有什么区别| 顺理成章是什么意思| 药娘吃的什么药| 湿疹用什么药好得最快最有效| 什么的梦想| 稽留流产是什么意思| 小孩嗓子疼吃什么药| 舌苔厚黄是什么原因| 鸽子拉绿稀便是什么病| 什么时候开始孕吐| 看甲沟炎挂什么科| 迎刃而解是什么意思| 雷诺综合症是什么病| 潜血试验阳性什么意思| 满月回娘家有什么讲究| 什么时候开始胎教| 氯雷他定片主治什么病| 珀莱雅属于什么档次| 明目退翳什么意思| 嘌呤高会引起什么症状| 蜗牛吃什么| 刮宫是什么意思| 什么病可以请长假| 什么地望着| 痤疮是什么| 勇气是什么| 布洛芬有什么作用| 夷是什么意思| 心如止水是什么意思| 牛剖层皮革是什么意思| 三净肉是什么| 健康证要带什么| 吃什么补雌激素最快| 龟头炎用什么药膏| 一个虫一个合读什么| 勇敢地什么| 保释是什么意思| 衣字旁的字和什么有关| 30年婚姻是什么婚| 激素高是什么原因| 切糕为什么这么贵| 微信中抱拳是什么意思| aemape是什么牌子| 6月初6是什么星座| afp是什么意思| 梦见进监狱是什么兆头| 偶尔耳鸣是什么原因| 让平是什么意思| 马克华菲是什么档次| 椒盐是什么调料| 梦见吃核桃是什么意思| 拉血挂什么科| o型血为什么叫熊猫血| 2009年属什么| 水煎服是什么意思| 好朋友是什么意思| 牙疼吃什么药最好最有效| 双绉是什么面料| 大黄是什么药| 鱼头和什么搭配煲汤好| 杂酱面用什么面| 奥美拉唑和雷贝拉唑有什么区别| 反贪局局长是什么级别| 十二月十四日是什么星座| 一什么湖面| 大腿内侧疼痛什么原因| 静五行属性是什么| 怀孕初期吃什么蔬菜好| 烫伤用什么| 山见念什么| 自言自语是什么意思| 风寒吃什么感冒药| 鸟在家里做窝预示什么| 贤者模式是什么意思| 补充蛋白质吃什么食物| 九月23日是什么星座| 叶酸不能和什么一起吃| 梦见剪头发是什么意思| 孩子注意力不集中缺什么微量元素| 一剪梅是什么意思| 拔牙为什么要验血| dha孕妇什么时候吃| 永垂不朽什么意思| 总爱睡觉是什么原因| 实名认证是什么意思| 政治面貌是什么意思| 紫砂壶适合泡什么茶| 鼻子无故出血什么原因| 生日蛋糕上写什么字比较有创意| 钢铁侠叫什么名字| 明矾和白矾有什么区别| 嗓子苦是什么原因引起的| 血糖仪h1是什么意思| 汽车点火线圈坏了有什么症状| alp医学上是什么意思| dsa是什么意思| 家里进蝴蝶有什么预兆| 10个油是什么意思| 感冒吃什么药好| 科技布是什么材质| 蒙奇奇是什么动物| 腹胀挂什么科| 痰湿吃什么食物| 看病人买什么水果| 清歌是什么意思| 碟鱼头是什么鱼| 9.23号是什么星座| wb是什么意思| 钥字五行属什么| 麸子是什么东西| 夜晚咳嗽是什么原因| 十二指肠溃疡吃什么药| 助产学是干什么的| 导诊是干什么的| 办护照照片有什么要求| 养字五行属什么| 吃甲钴胺有什么副作用| 老做梦是什么原因| 梦见摘水果是什么意思| 山楂泡酒有什么功效| proof是什么意思| 仲夏夜是什么意思| 弥漫是什么意思| 类风湿和风湿有什么区别| 大姨妈吃什么好| 什么原因会怀上葡萄胎| 冷感冒吃什么药好得快| 什么不平| 阚姓念什么| 预包装食品指的是什么| kingtis手表什么牌的| 清蒸什么鱼好吃| 办护照照片有什么要求| 阴唇萎缩是什么原因| 华法林是什么药| 什么情况下需要做造影| 是什么原因导致肥胖| 怀孕什么时候显怀| lsp是什么意思| 热锅凉油是什么意思| 溢脂性皮炎用什么药| 喝芝麻糊有什么好处| 女属猪的和什么属相最配| mastercard是什么意思| 月经不正常去医院检查什么项目| 全麦面是什么面| 女孩小名叫什么好| dw是什么意思| 扬长而去是什么意思| 口胃读什么| 舌苔厚是什么原因引起的| 华丽转身是什么意思| 支气管哮喘吃什么药| 肾上腺素是什么意思| 霉菌性阴道炎是什么症状| 茶减一笔是什么字| 耳道炎是什么原因引起的| 胆结石挂什么科室| 打一个喷嚏代表什么意思| 眼睛模糊什么原因| 高血压吃什么盐| 牙疼吃什么饭| 印堂发红是什么的征兆| 阉人什么意思| 盛世美颜是什么意思| 为什么隔夜茶不能喝| 湿气重吃什么能去湿气| 1950年属虎的是什么命| 颔是什么意思| 芡实有什么功效| 卵巢早衰是什么引起的| 胸痛是什么原因| 乌合之众什么意思| 火是什么| 法克油是什么意思| 结婚长明灯有什么讲究| 慢性非萎缩性胃炎伴糜烂是什么意思| 什么唱什么和| 阑尾有什么作用| 大学硕士点是什么意思| 皮肤黄的人适合穿什么颜色的衣服| 心脾两虚吃什么中成药| 菜籽油是什么菜籽做的| 喝什么茶去火排毒祛痘| 什么是流水| 翡翠的五行属性是什么| 手抖是什么原因造成的| 后背疼挂什么科| 吃什么排便顺畅| 松鼠尾巴像什么| 什么是简历| 2004属什么生肖| 头皮屑多是什么原因怎么去除| 吉士粉是什么粉| 大腿疼是什么原因| 出差什么意思| 七十岁老人装什么牙合适| 小鱼吃什么| 拔罐颜色深浅代表什么| 代谢是什么| 带状疱疹什么样子| adidas是什么牌子| 漂亮的近义词是什么| 金达莱是什么花| 梦见大青蛇是什么预兆| 十二生肖排第七是什么生肖| 世态炎凉什么意思| arb是什么意思| 玉兰油属于什么档次| 空心菜长什么样| 孩子为什么不愿意上学| ct值是什么意思| 百度
Skip to content
Policy

一线城市新房价格同比连降2月

百度 这部全国首部反映军改题材的电影,主要讲述在国防和军队改革大背景下,一批复转军人积极投身社会建设,主动承担重要角色,发挥重要作用的故事。

Aaron Barr, CEO of security firm HBGary Federal, spent a month tracking down …

Nate Anderson | 511
Story text

Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them. But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code.

In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project.

"They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are suppsed to be they don't get it. I have pwned them! :)"

But had he?

"We are kind of pissed at him right now"

Aaron Barr

Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. While the group claimed to be headless, Barr believed this to be a lie; indeed, he told others that Anonymous was a tiny group.

"At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail.?(All e-mails in this investigative report are provided verbatim, typos and all.)?"Most of the people in the IRC channel are zombies to inflate the numbers."

The show was run by a couple of admins he identified as "Q," "Owen," and "CommanderX"—and Barr had used social media data and subterfuge to map those names to three real people, two in California and one in New York.

Near the end of January, Barr began publicizing his information, though without divulging the names of the Anonymous admins. When the Financial Times picked up the story and ran a piece on it on February 4, it wasn't long before Barr got what he wanted—contacts from the FBI, the Director of National Intelligence, and the US military. The FBI had been after Anonymous for some time, recently kicking in doors while executing 40 search warrants against group members.

Confident in his abilities, Barr told one of the programmers who helped him on the project, "You just need to program as good as I analyze."

But on February 5, one day after the Financial Times article and six days before Barr's sit-down with the FBI, Anonymous did some "pwning" of its own. "Ddos!!! Fckers," Barr sent from his iPhone as a distributed denial of service attack hit his corporate network. He then pledged to "take the gloves off."

When the liberal blog Daily Kos ran a story on Barr's work later that day, some Anonymous users commented on it. Barr sent out an e-mail to colleagues, and he was getting worked up: "They think all I know is their irc names!!!!! I know their real fing names. Karen [HBGary Federal's public relations head] I need u to help moderate me because I am getting angry. I am planning on releasing a few names of folks that were already arrested. This battle between us will help spur publicity anyway."

Indeed, publicity was the plan. Barr hoped his research would "start a verbal braul between us and keep it going because that will bring more media and more attention to a very important topic."

But within a day, Anonymous had managed to infiltrate HBGary Federal's website and take it down, replacing it with a pro-Anonymous message ("now the Anonymous hand is bitch-slapping you in the face.") Anonymous got into HBGary Federal's e-mail server, for which Barr was the admin, and compromised it, extracting over 40,000 e-mails and putting them up on The Pirate Bay, all after watching his communications for 30 hours, undetected. In an after-action IRC chat, Anonymous members bragged about how they had gone even further, deleting 1TB of HBGary backup data.

They even claimed to have wiped Barr's iPad remotely.

The situation got so bad for the security company that HBGary, the company which partially owns HBGary Federal, sent its president Penny Leavy into the Anonymous IRC chat rooms to swim with the sharks—and to beg them to leave her company alone. (Read the bizarre chat log.) Instead, Anonymous suggested that, to avoid more problems, Leavy should fire Barr ?and "take your investment in aaron's company and donate it to BRADLEY MANNINGS DEFENCE FUND." Barr should cough off up a personal contribution, too; say, one month's salary?

As for Barr's "pwning," Leavy couldn't backtrack from it fast enough. "We have not seen the list [of Anonymous admins] and we are kind of pissed at him right now."

Were Barr's vaunted names even correct? Anonymous insisted repeatedly that they were not.?As one admin put it in the IRC chat with Leavy, "Did you also know that aaron was peddling fake/wrong/false information leading to the potential arrest of innocent people?" The group then made that information public, claiming that it was all ridiculous.

Thanks to the leaked e-mails, we now have the full story of how Barr infiltrated Anonymous, used social media to compile his lists, and even resorted to attacks on the codebase of the Low Orbit Ion Cannon—and how others at his own company warned him about the pitfalls of his research.

Anonymous, angry at Barr

"I will sell it"

Barr had been interested in social media for quite some time, believing that the links it showed between people had enormous value when it came to mapping networks of hackers—and when hackers wanted to target their victims. He presented a talk to a closed Department of Justice conference earlier this year on "specific techniques that can be used to target, collect, and exploit targets with laser focus and with 100 percent success" through social media.

His curiosity about teasing out the webs of connections between people grew. By scraping sites like Facebook or LinkedIn, Barr believed he could draw strong conclusions, such as determining which town someone lived in even if they didn't provide that information. How? By looking at their friends.

"The next step would be ok we have 24 people that list Auburn, NY as their hometown," he wrote to the programmer implementing his directives. "There are 60 other people that list over 5 of those 24 as friends. That immediately tells me that at a minimum those 60 can be tagged as having a hometown as Auburn, NY. The more the data matures the more things we can do with it."

The same went for hackers, whose family and friends might provide information that even the most carefully guarded Anonymous member could not conceal. "Hackers may not list the data, but hackers are people too so they associate with friends and family," Barr said. "Those friends and family can provide key indicators on the hacker without them releasing it…"

His programmer had doubts, saying that the scraping and linking work he was doing was of limited value and had no commercial prospects. As he wrote in an e-mail:

Step 1 : Gather all the data

Step 2 : ???

Step 3 : Profit

But Barr was confident. "I will sell it," he wrote.

To further test his ideas and to drum up interest in them, Barr proposed a talk at the BSides security conference in San Francisco, which takes place February 14 and 15. Barr's talk was titled "Who Needs NSA when we have Social Media?" and his plan to draw publicity involved a fateful decision: he would infiltrate and expose Anonymous, which he believed was strongly linked to WikiLeaks.

"I am going to focus on outing the major players of the anonymous group I think," he wrote. "Afterall - no secrets right? :) We will see how far I get. I may focus on NSA a bit to just so I can give all those freespeech nutjobs something… I just called people advocating freespeech, nutjobs - I threw up in my mouth a little."

With that, the game was afoot.

"I enjoy the LULZ"

Barr created multiple aliases and began logging on to Anonymous IRC chat rooms to figure out how the group worked. He worked to link these IRC handles to real people, in part using his social networking expertise, and he created fake Twitter accounts and Facebook profiles. He began communicating with those he believed were leaders.

After weeks of this work, he reported back to his colleagues on how he planned to use his fake personas to drum up interest in his upcoming talk.

I have developed a persona that is well accepted within their groups and want to use this and my real persona against eachother to build up press for the talk. Pre-talk plan.

I am going to tell a few key leaders under my persona, that I have been given information that a so called cyber security expert named Aaron Barr will be briefing the power of social media analysis and as part of the talk with be dissecting the Anonymous group as well as some critical infrastructure and government organizations

I will prepare a press sheet for Karen to give to Darkreading a few days after I tell these folks under persona to legitimize the accusation. This will generate a big discussion in Anonymous chat channels, which are attended by the press. This will then generate press about the talk, hopefully driving more people and more business to us.

Barr then contacted another security company that specializes in botnet research. He suspected that top Anonymous admins like CommanderX had access to serious Internet firepower, and that this probably came through control of bots on compromised computers around the world.

Barr asked if the researchers could "search their database for specific targets (like the one below) during an operational window (date/time span) to see if any botnet(s) are participating in attacks? Below is an attack which is currently ongoing." (The attack in question was part of Anonymous' "Operation Payback" campaign and was targeted at the government of Venezuela.)

The report that came back focused on the Low Orbit Ion Cannon, a tool originally coded by a private security firm in order to test website defenses. The code was open-sourced and then abandoned, but someone later dusted it off and added "hivemind mode" that let LOIC users "opt in" to centralized control of the tool. With hundreds or thousands of machines running the stress-test tool at once, even major sites could be dropped quickly. (The company recorded only 1,200 machines going after MasterCard on December 11, for instance.)

To boost the credibility of his online aliases, Barr then resorted to a ruse. He asked his coder to grab the LOIC source code. "I want to add some code to it," Barr said. "I don't want to distribute that, it will be found and then my persona will be called out. I want to add it, distribute it under a persona to burn and then have my other persona call out the code."

A screenshot of LOIC

The code to be added was an HTTP beacon that linked to a free website Barr had set up on Blogspot. He wanted a copy of the altered source and a compiled executable. His programmer, fearing Anonymous, balked.

On January 20, the coder wrote back, "I'm not compiling that shit on my box!" He even refused to grab a copy of the source code from message boards or other IRC users, because "I ain't touchin' any of that shit as those are already monitored."

"Dude," responded Barr. "Anonymous is a reckless organization. C'mon I know u and I both understand and believe generally in their principles but they are not a focused and considerate group, the[y] attack at will and do not care of their effects. Do u actually like this group?"

The coder said he didn't support all they did, but that Anonymous had its moments. Besides, "I enjoy the LULZ."

"Dude—who's evil?"

At one time, Barr supported WikiLeaks. When the site released its (edited) "Collateral Murder" video of a US gunship killing Reuters photographers in Iraq, Barr was on board. But when WikiLeaks released its huge cache of US diplomatic cables, Barr came to believe "they are a menace," and that when Anonymous sprang to the defense of WikiLeaks, it wasn't merely out of principle. It was about power.

"When they took down MasterCard do u think they thought alright win one for the small guy!" he asked. "The first thought through most of their malcontented minds was a rush of power. That's not ideals."

He continued in this philosophical vein:

But dude whos evil?

US Gov? Wikileaks? Anonymous?

Its all about power. The Wikileaks and Anonymous guys think they are doing the people justice by without much investigation or education exposing information or targeting organizations? BS. Its about trying to take power from others and give it to themeselves.

I follow one law.

Mine.

His coder asked Barr how he slept at night, "you military industrial machine capitalist."

"I sleep great," Barr responded. "Of course I do indoor [enjoy?] the money and some sense of purpose. But I canget purpose a lot of places, few of which pay this salary."

The comments are over the top, of course. Elsewhere, Barr gets more serious. "I really dislike corporations," he says. "They suck the lifeblood out of humanity. But they are also necessary and keep us moving, in what direction I don't know.

"Governments and corporations should have a right to protect secrets, senstive information that could be damage to their operations. I think these groups are also saying this should be free game as well and I disagree. Hence the 250,000 cables. WHich was bullshit… Society needs some people in the know and some people not. These folks, these sheep believe that all information should be accessible. BS. And if they truly believe it then they should have no problem with me gathering information for public distribution."

But Anonymous had a bit of a problem with that.

The hunter and the hunted

As Barr wrapped up his research and wrote his conference presentation, he believed he had unmasked 80-90 percent of the Anonymous leadership—and he had done it all using publicly available information.

"They are relying on IP for anonymity," he wrote in a draft of his presentation. "That is irrelevant with social media users. U use IRC and FB and Twitter and Forums and Blogs regularly… hiding UR IP doesn't matter."

Barr would do things like correlate timestamps; a user in IRC would post something, and then a Twitter post on the same topic might appear a second later. Find a few of these links and you might conclude that the IRC user and the Twitter user were the same person.

Even if the content differed, what if you could correlate the times that someone was on IRC with the times a Facebook user was posting to his wall? "If you friend enough people you might be able to correlate people logging into chat with people logging into Facebook," Barr wrote.

The document contained a list of key IRC chatrooms and Twitter accounts. Facebook groups were included, as were websites. But then Barr started naming names. His notes are full of comments on Anonymous members. "Switch" is a "real asshole but knows what he's talking about," while "unbeliever" might be "alexander [last name redacted]."

In the end, Barr determined that three people were most important. A figure called Q was the "founder and runs the IRC. He is indead in California, as are many of the senior leadership of the group." Another person called Owen is "almost a co-founder, lives in NY with family that are also active in the group, including slenaid and rabbit (nicks)." Finally, CommanderX can "manage some significant firepower." Barr believed he had matched real names to each of these three individuals.

He wasn't doing it to actually expose the names, though. "My intent is not to do this work to put people in jail," Barr wrote to others in the company. "My intent is to clearly demonstrate how this can be effectively used to gather significant intelligence and potentially exploit targets of interest (the other customers will read between the lines)."

He then revealed himself on Facebook to the person he believed was CommanderX. "I am not going to release names," Barr said on February 5, using the alias Julian Goodspeak. "I am merely doing security research to prove the vulnerability of social media." He asked for Anonymous to call off its DDoS attack on HBGary Federal, an attack that had begun earlier that day.

Barr reveals himself

Some of the responses from CommanderX were a bit chilling. Late in the conversation, CommanderX warned Barr "that your vulnerabilities are far more material. One look at your website locates all of your facilities. You might want to do something about that. Just being friendly. I hope you are being paid well."

Then came an IRC log that Barr sent around, in which a user named Topiary tried to recruit him (under the name CogAnon) for "a new operation in the Washington area" where HBGary Federal has its headquarters. The target is "a security company."

The Anonymous "threat"

By late afternoon on the 5th, Barr was angry and perhaps a little scared, and he asked his PR person to "help moderate me because I am getting angry. I am planning on releasing a few names of folks that were already arrested." It's not clear that Barr ever did this, however; he admitted in another e-mail that he could get a bit "hot" in private, though he would generally cool down before going public.

Hours later, the attack escalated from some odd DDoS traffic to a full-scale break-in of HBGary Federal systems, one that showed tremendous skill. "What amazes me is, for a security company - you had such a basic SQL vulnerability on your website," wrote one Anonymous member later.

Days afterward, the company has still not managed to restore its complete website.

"Danger, Will Robinson!"

Throughout Barr's research, though, the coder he worked with worried about the relevance of what was being revealed. Barr talked up the superiority of his "analysis" work, but doubts remained. An email exchange between the two on January 19 is instructive:

Barr: [I want to] check a persons friends list against the people that have liked or joined a particular group.

Coder: No it won't. It will tell you how mindless their friends are at clicking stupid shit that comes up on a friends page. especially when they first join facebook.

Barr: What? Yes it will. I am running throug analysis on the anonymous group right now and it definately would.

Coder: You keep assuming you're right, and basing that assumption off of guilt by association.

Barr: Noooo….its about probabilty based on frequency...c'mon ur way smarter at math than me.

Coder: Right, which is why i know your numbers are too small to draw the conclusion but you don't want to accept it. Your probability based on frequency right now is a gut feeling. Gut feelings are usually wrong.

Barr: [redacted]

Coder: [some information redacted] Yeah, your gut feelings are awesome! Plus, scientifically proven that gut feelings are wrong by real scientist types.

Barr: [some information redacted] On the gut feeling thing...dude I don't just go by gut feeling...I spend hours doing analysis and come to conclusions that I know can be automated...so put the taco down and get to work!

Coder: I'm not doubting that you're doing analysis. I'm doubting that statistically that analysis has any mathematical weight to back it. I put it at less than .1% chance that it's right. You're still working off of the idea that the data is accurate. mmmm…..taco!

Later, when Barr talks about some "advanced analytical techniques" he's been pondering for use on the Anonymous data, the coder replies with apparent frustration, "You keep saying things about statistics and analytics but you haven't given me one algorithm or SQL query statement."

Privately, the coder then went to another company official with a warning. "He's on a bad path. He's talking about his analytics and that he can prove things statistically but he hasn't proven anything mathematically nor has he had any of his data vetted for accuracy, yet he keeps briefing people and giving interviews. It's irresponsible to make claims/accusations based off of a guess from his best gut feeling when he has even told me that he believes his gut, but more often than not it's been proven wrong. I feel his arrogance is catching up to him again and that has never ended well...for any of us."

Others made similar dark warnings. "I don't really want to get DDOS'd, so assuming we do get DDOS'd then what? How do we make lemonade from that?" one executive asked Barr. The public relations exec warned Barr not to start dropping real names: "Take the emotion out of it -> focus on the purpose. I don't see benefit to you or company to tell them you have their real names -- published or not."

Another internal warning ended: "Danger Will Robinson. You could end up accusing a wrong person. Or you could further enrage the group. Or you could be wrong, and it blows up in your face, and HBGary's face, publicly."

"Quite simply, nonsense"

But Barr got his Financial Times story, and with it the publicity he sought. He also made clear that he had the real names, and Anonymous knew he would soon meet with the FBI. Though Barr apparently planned to keep his names and addresses private even at this meeting, it was easy to see why Anonymous would have doubts.

When HBGary President Penny Leavy, who was an investor in separate company HBGary Federal, waded into IRC to reason with Anonymous, she pleaded ignorance of Barr's activities and said that they were "for security research only; the article was to get more people to the [BSides] event." To which someone responded, "Penny: if what you are saying is tree [true] then why is Aaron meeting with the FBI tomorrow morning at 11am? PLEASE KEEP IN MIND WE HAVE ALL YOUR EMAILS." (The answer from the e-mails is that Barr was trying to drum up business with the feds, not necessarily take down Anonymous.)

As for the names in Barr's BSides presentation, Anonymous insisted that they were wrong. "Penny please note that the names in that file belong to innocent random people on facebook. none of which are related to us at all," said one admin.

Another user complained to Leavy that "the document that [Barr] had produced actually has my girlfriend in it. She has never done anytihng with anonymous, not once. I had used her computer a couple times to look at a group on facebook or something."

In the note posted on HBGary Federal's website when it was taken over, Anonymous blasted Barr's work. "You think you've gathered full names and addresses of the 'higher-ups' of Anonymous? You haven't. You think Anonymous has a founder and various co-founders? False…. We laughed. Most of the information you've 'extracted' is publicly available via our IRC networks. The personal details of Anonymous 'members' you think you've acquired are, quite simply, nonsense."

Oh—and remember the threatening IRC log above, the one "recruiting" Barr to attack a DC security company? Anonymous says that it was all a joke.

"I mean come on, Penny," wrote Topiary in an IRC chat, "I messaged Aaron in PM [private message] and told him about a 'secret' Washington OP, then he emailed the company (including you) being entirely confident that we were directly threatening you, and he thought we didn't know who he was.

"He seriously works at a security company?"

Never forgive, never forget

Barr's hacked Twitter account

Anonymous doesn't like to let up. Barr's Twitter account remains compromised, sprinkled with profane taunts. The HBGary websites remain down. The e-mails of three key players were leaked via BitTorrent, stuffed as they were with nondisclosure agreements, confidential documents, salary numbers, and other sensitive data that had nothing to do with Anonymous.

And they have more information—such as the e-mails of Greg Hoglund, Leavy's husband and the operator of rootkit.org (which was also taken down by the group).

When Leavy showed up to plead her case, asking Anonymous to at least stop distributing the e-mails, the hivemind reveled in its power over Leavy and her company, resorting eventually to tough demands against Barr.

"Simple: fire Aaron, have him admit defeat in a public statement," said Topiary, when asked what the group wanted. "We won't bother you further after this, but what we've done can't be taken back. Realize that, and for the company's sake, dispose of Aaron."

Others demanded an immediate "burn notice" on Barr and donations to Bradley Manning, the young military member now in solitary confinement on suspicion of leaking classified documents to Wikileaks.

The hack unfolded at the worst possible time for HBGary Federal. The company was trying to sell, hopefully for around $2 million, but the two best potential buyers started to drag their heels. "They want to see delivery on pipeline before paying those prices," Leavy wrote to Barr. "So initial payout is going to be lower with both companies I am talking with. That said our pipeline continues to drag out as customers are in no hurry to get things done quickly so if we dont sell soon and our customers dont come through soon we are going to have cash flow issues."

And being blasted off the 'Net by Anonymous is practically the last thing a company in such a situation needs. After the attacks, Leavy told the Financial Times that they cost HBGary millions of dollars.

“I wish it had been handled differently,” she added.

"The Internet is here"

And who were Barr and his company up against in all this? According to Anonymous, a five-member team took down HBGary Federal and rootkit.com, in part through the very sort of social engineering Barr had tried to employ against Anonymous.

One of those five was allegedly a 16-year old girl, who "social engineered your admin jussi and got root to rootkit.com," one Anonymous member explained in IRC.

Another, pleased with power, harrassed Penny Leavy and her husband, who sat beside her during the chat: "How does it feel to get hacked by a 16yr old girl?" One can almost hear the taunt echoing from some kind of grade school playground.

The attackers are quintessentially Anonymous: young, technically sophisticated, brash, and crassly juvenile, all at the same time. And it's getting ever more difficult to dismiss Anonymous' hacker activity as the harmless result of a few mask-wearing buffoons.

Perhaps the entire strange story can be best summed up by a single picture, one that Barr e-mailed to two of his colleagues back on January 28. "Oh fuck," it says beneath a picture of an Anonymous real-world protest. "The Internet is here."

Photo of Nate Anderson
Nate Anderson Deputy Editor
Nate is the deputy editor at Ars Technica. His most recent book is In Emergency, Break Glass: What Nietzsche Can Teach Us About Joyful Living in a Tech-Saturated World, which is much funnier than it sounds.
511 Comments
幺妹是什么意思 梦见自己把蛇打死了是什么意思 高诊是什么意思 asics是什么牌子 越南人说什么语言
小孩风热感冒吃什么药 肚脐眼左边是什么部位 癔症是什么病 女人在什么时候最容易怀孕 尿毒症能吃什么水果
男士内裤什么材质的好 册那是什么意思 矬是什么意思 6月19是什么星座 粥米是什么米
疣长什么样子 什么是挠脚心 祛斑喝什么花茶最有效 中度脂肪肝吃什么药 满月红鸡蛋用什么染
看病人买什么花合适hcv8jop8ns0r.cn 沉默不是代表我的错是什么歌bfb118.com 茯苓的作用是什么hcv8jop8ns8r.cn 猫鼻支什么症状hcv8jop7ns1r.cn 血糖高吃什么好能降糖hcv8jop3ns1r.cn
葡萄糖输液有什么作用hcv8jop3ns5r.cn 君子菜是什么蔬菜qingzhougame.com 普洱茶什么季节喝好hcv9jop0ns7r.cn 七五年属什么xscnpatent.com sdnn是什么意思hcv8jop2ns1r.cn
什么的飞机hcv7jop9ns2r.cn 郡肝是什么hcv9jop8ns0r.cn 猫的尾巴有什么用处cj623037.com 走路气喘是什么原因hcv8jop4ns8r.cn 梦见结婚是什么意思hcv8jop0ns0r.cn
丝状疣挂什么科hcv9jop2ns9r.cn 喝咖啡不能吃什么食物hcv9jop8ns3r.cn 中焦不通用什么中成药hcv8jop3ns5r.cn 我行我素的人什么性格hcv8jop1ns3r.cn 偏头痛挂什么科zhongyiyatai.com
百度