Showing posts with label USA. Show all posts
Showing posts with label USA. Show all posts

Surveillance Proof

Saturday, 14 July 2012

As government agencies in the United States, the United Kingdom, Canada, and Australia push for increased surveillance powers, one pioneering American is pushing back.

New York-based entrepreneur Nicholas Merrill is making progress on a project he revealed in April: an encryption-based telecommunications provider designed to be “untappable.” After crowd-funding almost $70,000 in donations, Merrill says that he has held talks with a host of interested venture capitalists and a few “really big companies” apparently interested in partnering up or helping with financial support. Now the “surveillance-proof” software is in development, and he is on track to begin operating a limited service by the end of the year.

Merrill’s ultimate aim is to create a telecommunications infrastructure that inhibits mass surveillance. First, he is building an Internet provider that will use end-to-end encryption for Web browsing and email. Then he plans to roll out a mobile phone service that will enable users to encrypt calls, making them difficult to intercept. The key to decrypt the communications would be held by each individual customer, not Merrill’s company. Because the telecom firm would be unable to access the communications, law enforcement agencies that want to read or listen to communications would be forced to serve warrants or court orders on individuals directly. “This would make it impossible to do blanket, dragnet surveillance of all the customers of a telecommunications carrier,” Merrill says.

The idea for the project is not to help bad guys evade detection, though undoubtedly that’s how some critics will see it. Rather, Merrill is particularly keen to develop the technology to help journalists and human rights organizations—groups, he says, “whose right to confidentiality is more or less accepted under the law.”

Merrill has a strong record of defending user privacy. In 2004, he became the first ISP executive to successfully challenge a secret FBI “national security letter” demanding he hand over customer information. His willingness to question the constitutionality of the secret letter at the time put him at odds with most major telecoms providers, which have a poor track record when it comes to protecting customer privacy. In 2005 and 2006, a number of companies were revealed to have handed over troves of customer data and opened up wiretaps to the National Security Agency, sometimes without a warrant.

Today, Merrill admits prospective funders of his latest project have expressed concerns that it could lead to a confrontation with powerful actors (“It’s challenging to go up against some of the forces that are trying to open up all communications to wiretapping,” he says). But he is trying to address this by showing that government and law enforcement agencies could themselves benefit from his technology. Cybersecurity and privacy are part of the same problem but framed differently, he believes. Both could be addressed at once by ubiquitous encryption of communications and data transfer—protecting user privacy while also helping prevent malicious hackers from stealing information.

Some establishment figures have already been won over by Merrill’s argument. The advisory board of his nonprofit research institute, Calyx, which is developing the technology, includes a former NSA technical director and a former federal prosecutor who is also ex-CIA. Whether he can get the backing of current members of the U.S. law enforcement community, though, is another matter altogether. Merrill’s technology could be seen as creating extra barriers for law enforcement and the authorities would likely oppose it for that reason. Existing U.S. wiretapping law, called CALEA, states that telecom providers "shall not be responsible for decrypting" communications if they don't possess "the information necessary to decrypt.” But that may change under reforms proposed by the FBI, which is actively seeking more surveillance powers.

As governments increasingly move toward expanding their power to conduct electronic surveillance, it is inevitable that innovative technologists, software developers, and cryptographers will work to help people protect the privacy of their personal communications. Earlier this week the NSA’s chief tried to quell concerns over allegations that it is building a huge domestic surveillance center in Utah, dismissing whistle-blowers’ claims as “baloney.” Given the NSA’s recent history, however, it is likely many Americans will remain skeptical about the spy agency’s reassurances—and some will turn to encryption.

Merrill aims to launch his telecommunications firm first in the United States before tackling the international market, where there are also mounting concerns about government surveillance schemes. “We’re not trying to force people to use our service,” Merrill says. “What we’re trying to do is re-envision how the telecommunications industry could work if privacy and encryption technology was built in from the beginning.”

This article first appeared at Slate.com

Mumia Abu-Jamal

Wednesday, 21 December 2011


With the prospect of execution hanging over him, for three decades Mumia Abu-Jamal awoke every morning in a small Pennsylvania jail cell. A former Black Panther activist, he was sentenced to death in 1982 after being convicted of killing a police officer in hotly disputed circumstances. Earlier this month, in an extraordinary turn, prosecutors dropped their pursuit of capital punishment following a long legal battle that deemed the original trial flawed.

For Abu-Jamal’s supporters, it was a major victory. The 1982 verdict was judged to have breached the US constitution, because the jurors in the trial were given misleading instructions that wrongly encouraged them to issue the death sentence. “The district attorney did the right thing,” said John Payton, Abu-Jamal’s lawyer. “After three long decades, it was time to bring the quest for a death sentence for Mr. Abu-Jamal to an end.”

In Philadelphia, Pennsylvania, Abu-Jamal’s home city, hundreds gathered to celebrate the result. Last week he was moved to a new wing of his prison, where for the first time in 30 years he will be able to come into physical contact with his family and friends when they visit him. While Abu-Jamal remains incarcerated on a life sentence without parole, with capital punishment off the table some believe he now has a greater chance of being freed entirely.

“This is not the end of the road. We are fighting for his freedom and we want him to be freed immediately,” says Jeff Mackler, a friend of Abu-Jamal who directs a “Free Mumia” campaign in Oakland, California. “But there’s nothing in this world better than to go to sleep at night and to know that you’re not going to be executed the next morning or within weeks. We are overjoyed that Mumia is alive, that for the first time he can touch his family and hug his friends and be in contact with the real world.”

The controversial saga began on 9 December 1981, when a 27-year-old Abu-Jamal (born Wesley Cook) was found at the scene of a shooting in the heart of Philadelphia. In the early hours of the morning his younger brother, William, was pulled over by a police officer as part of a routine traffic stop. It is alleged that a struggle ensued, during which Abu-Jamal, who was working in the area as a taxi-driver, arrived amid the scuffle and twice shot the officer – once in the back and once in the head – taking a single bullet himself in the chest. Police backup arrived moments later, and found Abu-Jamal injured on the pavement. A revolver belonging to him was found at the scene. It contained five spent cartridges.

How events unfolded is to this day a subject of contention. Prosecutors of the case are firm in their conviction that Abu-Jamal was the killer, using his links with Black radical politics to argue he was a man on the edge – a dangerous sort of figure with a disdain for the law. But Abu-Jamal’s defence maintain he did not shoot the officer, Daniel Faulkner, with his supporters claiming he was a victim of a “frame-up” at a time when racial tensions between the police and African Americans in Philadelphia were simmering.

What brought Abu-Jamal’s case to the attention of the world, however, was not the circumstances surrounding the killing of officer Faulkner. Whether he did or did not shoot the policeman, it was the manner in which his trial was conducted that brought it notoriety.

The presiding judge, Albert Sabo, was a former member of the Fraternal Order of Police and widely considered to be bias in favour of the prosecution in all cases – calling in to question his ability to be impartial. Over a period of 14 years, he presided over trials in which 31 defendants were sentenced to death, 29 from ethnic minorities. During Abu-Jamal’s trial, press reports noted he displayed “undue haste and hostility toward the defence’s case.” And some years later, the court stenographer filed an explosive affidavit in which she claimed to have heard Sabo say, in the courtroom antechamber, "I'm going to help them fry the nigger."

By the mid nineties, Abu-Jamal, who was a part-time journalist and broadcaster before his incarceration, had written a number of essays and one best-selling book while on death row, making him perhaps the most famous inmate in America.

A number of well-known actors and writers including Spike Lee, Alec Baldwin and Salmon Rushdie championed calls for a retrial. And in 2000, human rights organisation Amnesty International published a thorough report on his case, concluding that “the proceedings used to convict and sentence Mumia Abu-Jamal to death were in violation of minimum international standards that govern fair trial procedures and the use of the death penalty.” The proceedings had been highly politicised, Amnesty noted, which “may not only have prejudiced his right to a fair trial, but may now be undermining his right to fair and impartial treatment in the appeal courts.”

On 7 December Amnesty welcomed the news Abu-Jamal would no longer face execution, but said: “justice would best be served by granting Mumia Abu-Jamal a new trial.” Meanwhile, South African archbishop Desmond Tutu spoke out upon hearing the revelation, going one step further than Amnesty by calling on Pennsylvanian authorities to immediately free him.

“Now that it is clear that Mumia should never have been on death row, justice will not be served by relegating him to prison for the rest of his life – yet another form of death sentence,“ said the archbishop, a Nobel prize winning peace activist. “Based on even a minimal following of international human rights standards, Mumia should be released.”

For the widow of officer Faulkner, Maureen, the latest twist in the long legal struggle provoked a disparate reaction. Describing Abu-Jamal as a “seething animal,” she attacked the judges that questioned the validity of his death sentence, calling them “dishonest cowards.”

“This decision certainly does not mark the end of my journey, nor will I stop fighting to see justice done for my husband,” she said in a statement. “I am heartened by the thought that he will finally be taken from the protected cloister he has been living in all these years and begin living among his own kind: the thugs and common criminals that infest our prisons.”

Faulkner’s words worry Abu-Jamal’s supporters, who realise that as he enters a new chapter of less-isolated prison life among the so-called “general population,” his fate is almost impossible to predict. 68-year-old Osagyefo Tongogara, who runs a UK “Free Mumia” group based in London, remains seriously concerned for Abu-Jamal’s welfare and has vowed to fight on.

“It’s very positive in the sense that he longer faces the death penalty, but there are a lot of killings that take place within American prisons,” he says. “With Mumia being a high-profile person he’s particularly at risk – he’s still in danger of being executed, not judicially but extrajudicially. So we have no intent in letting up in the campaign. We want to see him freed.”

LulzSec Interview: the full transcript

Saturday, 23 July 2011


Last week, hacker collective LulzSec returned with a bang, attacking a series of websites owned by Rupert Murdoch's News International in apparent response to the ongoing phone hacking scandal.

For 50 days between May and June, the tight-knit, six-strong group made headlines across the world, rising to almost instant notoriety after perpetrating a series of audacious cyber attacks on high-profile government and corporate websites, before abruptly announcing that they would disband. Among just a few of LulzSec's targets: Sony, the US Senate, the CIA, the FBI and even the UK's Serious Organised Crime Agency.

The authorities continue to try to track them down, and on Tuesday 20 suspected hackers were arrested in the UK, US and Netherlands as part of an ongoing international investigation. In a joint statement with an affiliated network of hackers known as Anonymous, LulzSec responded to the authorities directly. "We are not scared any more," they wrote. "Your threats to arrest us are meaningless as you cannot arrest an idea."

Earlier this month, two weeks after they had announced their apparent split, I managed to track down "Topiary", a founding member of LulzSec and self described "captain of the Lulz Boat". The interview was long - almost three hours - and covered lots of ground. But a great deal of what Topiary told me never made it in to the final write up, published by the Guardian, due principally to restrictions of space.

It was troublesome, deciding what to include and what to omit; the entirety of the interview was valuable. So rather than let the sections that were not printed disappear into the ether, the most sensible thing to do, I felt, was to have the full transcript published here in its entirety.

In the sections that were until now unpublished, Topiary explains how he first became involved in hacktivism and pays credit to his fellow hackers. He details the basis for extortion claims levelled against LulzSec by one US security company; reveals that he recently engaged in a bout of philanthropy, donating thousands of dollars to organisations including WikiLeaks; and also takes time to talk politics - blasting the US government, who he says are "scared of an uprising"... (click read more below for the full interview.)

Why LulzSec went on the Attack

Friday, 15 July 2011


Its audacity was brazen and apparently fearless. Among its high-profile victims were Sony, the CIA, the FBI, the US Senate and even the UK's Serious Organised Crime Agency. Exposing frailties in government and corporate networks, the group leaked hundreds of thousands of hacked passwords, and in the process garnered more than a quarter of a million followers on Twitter. But after just 50 days, on 25 June, LulzSec suddenly said it was disbanding.

Just hours before this announcement, the Guardian had published leaked internet chat logs revealing the inner workings of the group, which appeared to consist of six to eight members. The logs showed that authorities were often hot on their heels, and that after an attack on an FBI-affiliated website two hackers had quit LulzSec as they were "not up for the heat". As media attention mounted, Ryan Cleary, an Essex-based 19-year-old suspected of affiliation to LulzSec, was arrested in a joint UK-US "e-crime" investigation. Had the pressure simply got too much to handle?

To find out, the Guardian tracked down one of LulzSec's founding members, "Topiary". A key figure in the tight-knit group, he was revealed in the logs to have managed LulzSec's Twitter account and to have written their press releases. After verifying his identity by asking him to send a direct message from the account – "This is the captain of the Lulz Boat," he confirmed – we began a long conversation by Skype.

"I know people won't believe this, but we genuinely ended it [LulzSec] because it was classy," he says. "The leaks we promised happened . . . 50 days were reached, we just about hit 275,000 Twitter followers, things were on a high, so we redirected our fans to [hacker collective] Anonymous and [hacking movement] AntiSec and wrapped it up neatly . . . A high note, a classy ending, a big bang, then a sail into the distance."

LulzSec's jovial public image undoubtedly helped it achieve unusual popularity within a short time. Its stated aim was to provide "high-quality entertainment at your expense," and the word "Lulz" is itself internet slang for laughs. The group's popularity spiked after it planted a fake story on US news outlet PBS.com in protest over what it claimed was a misrepresentative WikiLeaks documentary made by the broadcaster. The story falsely reported that rapper Tupac Shakur, who was killed in a shooting 15 years ago, had been found alive and well in New Zealand.

"What we did was different from other hacking groups," says Topiary. "We had an active Twitter (controlled by me), cute cats in deface messages, and a generally playful, cartoon-like aura to our operations. We knew when to start, we knew when to stop, and most of all we knew how to have fun."

But the group's mission, Topiary explains, was not calculated. Almost everything LulzSec did – from choosing its name to its next target – happened spontaneously. "We made it up as we went along. We were originally @LulzLeaks on twitter, but I forgot the password so we became @LulzSec. My first name was The Lulz Train, then The Lulz Cannon, then The Lulz Boat. I had no idea what The Love Boat was, it was a complete accident . . . I wrote every press release in Notepad without planning. That's what made us unique, we just came out and made stuff up out of nowhere . . . We released when it felt right, we tweeted what felt right, we wrote what we felt needed to be wrote. We weren't burdened by plans or board meetings, we just did it."

The leaked chat logs also revealed the hackers appeared to revel in the international attention they received. However, Topiary says it wasn't that LulzSec was media-hungry, but that the media was LulzSec-hungry.

"We didn't contact a single media outlet for at least the first 40 days, they just kept reporting on our humble tweets," he says, though he admits the attention "gave us more reasons to leak more. It was a thrill, sure, and it did play a role. We enjoyed occasionally confusing and pranking media with weird tweets, or giving exclusives to certain journalists to piss off other certain journalists. It was another aspect of the situation that helped us leverage the entertainment."

Yet although many of LulzSec's attacks were perpetrated "for the lulz", the group was accused of attempted extortion by one US security company, Unveillance – a charge Topiary staunchly denies. It was also criticised after it hacked and dumped thousands of Sony Pictures Europe customers' usernames and passwords online, some of which were reportedly later used in scams by fraudsters. But Topiary is unapologetic.

"It's Sony's fault for not defending – and encrypting – its customers' data," he says. "Similarly, in a perfect world, we'd have dumped said data and nothing would have happened. These scams simply prove that other people (our fans/spectators) are more evil than us."

Towards the end of LulzSec's reign, it seemed to gravitate towards more overtly political causes. It occasionally compared itself to WikiLeaks in tweets, and its penultimate leak was a joint effort with Anonymous to expose Arizona police as "racist and corrupt", and to "sabotage their efforts to terrorise communities fighting an unjust 'war on drugs'."

Anonymous is well known for its acts of political "hacktivism". On Monday it reportedly threatened to attack the Metropolitan police over News International's phone hacking and the possible extradition to Sweden of WikiLeaks founder Julian Assange. Earlier this year the group claimed responsibility for a series of Distributed Denial of Service (DDoS) attacks on government websites in Tunisia, Iran, Egypt and Bahrain, and in 2008 it attacked the Church of Scientology after it allegedly attempted to suppress a leaked video interview with actor and scientologist Tom Cruise. Topiary has been heavily involved with Anonymous in the past, occasionally acting as its spokesman in televised interviews.

"Anonymous has been a great way for the younger generations to get involved through methods they understand, like utilising the internet," he says. "My main goal with Anonymous was to spread the word of revolution to those who might be seeking something new."

How does he define revolution? "Revolution is kicking the Tunisian government in the teeth by rendering their malicious Javascript embedments inert, allowing Tunisian citizens to surf Facebook without fear of password sniffing. Revolution is a horde of activists holding up Anonymous masks and thanking us for assisting their hard work by obliterating their government's ministry, stock and finance websites, replacing them with inspiring words. Revolution, to me, is bringing down the big guy while not forgetting to stand up for the little guy."

Though Topiary will not disclose his age, he describes himself as a teenager and "an internet denizen with a passion for change". He believes he is part of a generational shift in the way technology – specifically the internet – is increasingly being used as a tool to influence the world. The actions of Anonymous in particular, he says, have brought attention to the idea that actions taken online can have a major impact in real life – "linking the two realities". But he also recognises that the actions of Anonymous, LulzSec and other affiliated hackers can be used by governments as justification for greater control of the internet. So how does he balance his actions with that knowledge?

"It only results in greater government control if we remain apathetic and let it happen," he says. "The goal with Anonymous is to brutally cut down the middle of that decision and shout 'NO' to laws we don't agree with. Laws are to be respected when they're fair, not obeyed without question."

For now, however, Topiary is taking a break from law-breaking. He says he will continue operating on the margins of Anonymous, but will not engage in any more hacking. Instead, he intends to create art, video and graphics for the group to help with a new public relations project, to be titled Voice.

"I've been at this non-stop for a while, it's a big time-sink," he says. "Some people can handle it for years on end, and I respect those people. I just needed some air and a new page in the Anonymous/LulzSec era."

After the arrest of Cleary last month, suspected US hackers believed to be affiliated with LulzSec had their homes raided in Ohio and Iowa. In the past, hackers have been offered immunity from prosecution if they cooperate with the authorities. But, if caught, Topiary says he would "never snitch" on other hackers and that he would "pretty much" rather go to jail than work for the government in any capacity.

"Not sure I'd have a place in government security, unless they enjoy bizarre tweets," he says. "But again, no, I wouldn't accept a job that would fight against the things I've fought for. As for the authorities, well, if they have their claws in, they have their claws in, there's not much I can do about it. But I can only hope that they haven't pinned any of us, especially my friends from LulzSec."

This article originally appeared at: http://www.guardian.co.uk/technology/2011/jul/14/why-lulzsec-decided-to-disband

Inside LulzSec

Saturday, 25 June 2011


It was a tight-knit and enigmatic group finding its feet in the febrile world of hacker collectives, where exposing and embarrassing your targets is just as important as protecting your own identity.

But leaked logs from LulzSec's private chatroom – seen, and published today, by the Guardian – provide for the first time a unique, fly-on-the-wall insight into a team of audacious young hackers whose inner workings have until now remained opaque.

LulzSec is not, despite its braggadocio, a large – or even coherent – organisation. The logs reveal how one hacker known as "Sabu", believed to be a 30-year-old security consultant, effectively controls the group of between six and eight people, keeping the others in line and warning them not to discuss what they have done with others; another, "Kayla", provides a large botnet – networks of infected computers controlled remotely – to bring down targeted websites with distributed denial of service (DDoS) attacks; while a third, "Topiary", manages the public image, including the LulzSec Twitter feed.

They turn out to be obsessed with their coverage in the media, especially in physical newspapers, sharing pictures of coverage they have received in the Wall Street Journal and other papers. They also engineered a misinformation campaign to make people think they are a US-government sponsored team.

They also express their enmity towards a rival called The Jester – an ex-US military hacker who usually attacks jihadist sites, but has become embroiled in a dispute with Anonymous, WikiLeaks and LulzSec over the leaked diplomatic cables and, more recently, LulzSec's attacks on US government websites, including those of the CIA and the US Senate.

In a further sign that the spotlight is beginning to engulf LulzSec, a lone-wolf hacker managed to temporarily cripple the group's website on Friday morning. Originally thought to be the work of The Jester, an activist, known as Oneiroi, later claimed responsibility for the attack but did not provide an explanation.

The group's ambitions went too far for some of its members: when the group hit an FBI-affiliated site on 3 June, two lost their nerve and quit, fearing reprisals from the US government. After revealing that the two, "recursion" and "devrandom" have quit, saying they were "not up for the heat", Sabu tells the remaining members: "You realise we smacked the FBI today. This means everyone in here must remain extremely secure."

Another member, "storm", then asks worriedly: "Sabu, did you wipe the PBS bd [board] logs?", referring to an attack by LulzSec on PBS on 29 May, when they planted a fake story that the dead rapper Tupac Shakur was alive. If traces remained there of the hackers' identities, that could lead the FBI to them.

"Yes," Sabu says. "All PBS logs are clean." Storm replies: "Then I'm game for some more." Sabu says: "We're good. We got a good team here."

Documenting a crucial five-day period in the group's early development from 31 May to 4 June, the logs – whose authenticity has been separately confirmed through comments made online by LulzSec's members – are believed to have been posted online by a former affiliate named "m_nerva". They contain detailed conversations between the group, who have in recent weeks perpetrated a series of audacious attacks on a range of high-profile targets, including Sony, the CIA, the US Senate, and the UK's Serious Organised Crime Agency (SOCA).

LulzSec threatened m_nerva on Tuesday in a tweet saying "Remember this tweet, m_nerva, for I know you'll read it: your cold jail cell will be haunted with our endless laughter. Game over, child." As an explanation, they said: "They leaked logs, we owned them [took over their computer], one of them literally started crying for mercy". The leaked logs are the ones seen by the Guardian.

The conversations confirm that LulzSec has links with – but is distinct from – the notorious hacker group Anonymous. Sabu, a knowledgeable hacker, emerges as a commanding figure who issues orders to the small, tight-knit team with striking authority.

Despite directing the LulzSec operation, Sabu does not appear to engage in the group's public activity, and warns others to be careful who and how they talk outside their private chatroom. "The people on [popular hacker site] 2600 are not your friends," Sabu warns them on 2 June. "95% are there to social engineer [trick] you, to analyse how you talk. I am just reminding you. Don't go off and befriend any of them."

But the difficulty of keeping their exploits and identities secret proves difficult: Kayla is accused of giving some stolen Amazon voucher codes to someone outside the group, which could lead back to one of their hacks. "If he's talking publicly, Kayla will talk to him," Sabu comments, bluntly.

Topiary, who manages the public image of LulzSec – which centres around its popular Twitter feed, with almost 260,000 followers – also acted previously as a spokesman for Anonymous, once going head-to-head in a live video with Shirley Phelps-Roper of the controversial Westboro Baptist Church, during which he hacked into the church's website mid-interview.

His creative use of language and sharp sense of humour earns praise from his fellow hackers in the chat logs, who tell him he should "write a fucking book". On one occasion, after a successful DDoS attack brings down a targeted web server, Topiary responds in characteristic fashion to the hacker responsible, Storm: "You're like our resident sniper sitting in the crow's nest with a goddamn deck-shattering electricity blast," he writes. "Enemy ships being riddled with holes."

But while LulzSec has a jovial exterior, and proclaims that its purpose is to hack "for the lulz" (internet slang for laughs and giggles), Sabu is unremittingly serious. Domineering and at times almost parental, he frequently reminds the other hackers of the dangers of being tracked by the authorities, who the logs reveal are often hot on their heels.

During one exchange, a hacker named Neuron starts an IAmA (Q and A) session for LulzSec on the website Reddit for "funzies" and to engage with the public. This immediately raises the ire of Sabu, who puts an angry and abrupt halt to it.

"You guys started an IAmA on reddit?" Sabu asks in disbelief. "I will go to your homes and kill you. If you really started an IAmA bro, you really don't understand what we are about here. I thought all this stuff was common knowledge ... no more public apperances [sic] without us organizing it."

He adds: "If you are not familiar with these hostile environments, don't partake in it."

The logs also reveal that the group began a campaign of disinformation around LulzSec. Their goal was to convince – and confuse – internet users into believing a conspiracy theory: that LulzSec is in fact a crack team of CIA agents working to expose the insecurities of the web, headed by Adrian Lamo, the hacker who reported the alleged WikiLeaks whistleblower Bradley Manning to the authorities.

"You guys are claiming that LulzSec is a CIA op ... that Anonymous is working to uncover LulzSec ... that Adrian Lamo is at the head of it all ... and people actually BELIEVE this shit?" writes joepie91, another member. "You just tell some bullshit story and people fill in the rest for you."

"I know, it's brilliant," replies Topiary. The attempts did pay off, with some bloggers passing comments such as: "I hypothesize that this is a government 'red team' or 'red cell' operation, aimed at building support for government intervention into internet security from both the public and private sectors."

The group monitors news reports closely, and appears to enjoy – even thrive – on the publicity its actions bring. But the logs show that the members are frustrated by the efforts of a self-professed "patriot-hacker" known as the Jester (or th3j35t3r), whose name is pejoratively referenced throughout.

The Jester is purportedly an ex-US military hacker, and was responsible for high-profile attacks on WikiLeaks prior to the release of US diplomatic cables in November. In recent weeks he has made LulzSec his principal target, describing them as "common bullies". Topiary in turn dismisses The Jester as a "pompous elitism-fuelling blogger" – but the group is always worried that The Jester or his associates are trying to track them down.

The Jester claims LulzSec are motivated by money and points to allegations that the group tried to extort money from Unveillance, a data security company. Similar accusations against LulzSec by two other groups, "Web Ninjas" and "TeaMp0isoN_". Web Ninjas say they want to see LulzSec "behind bars" for committing "insane acts ... in the name of publicity or financial gain or anti-govt agenda".

The logs do not reveal any discussion of extortion between the LulzSec inner circle; nor do they indicate any underlying political motivations for the attacks. But amid the often tense atmosphere depicted in the logs the hackers do occasionally find time to talk politics.

"One of these days we will have tanks on our homes," writes trollpoll, shortly after it emerged the US government was reclassifying hacking as a possible act of war. "Yea, no shit," responds Storm.

"Corporations should realize the internet isn't theirs," adds joepie91. "And I don't mean the physical tubes, but the actual internet ... the community, idea, concept."

"Yes, the utopia is to create a new internet," says trollpoll. "Corporation free."

On Monday 20 June, Sabu's worst fears may have been confirmed when a 19-year-old named Ryan Cleary was arrested in Wickford, Essex and later charged with a cyber attack in connection with a joint Scotland Yard and FBI probe in to a hacking group believed to be LulzSec.

Metropolitan Police Commissioner Sir Paul Stephenson described the arrest as "very significant", though LulzSec itself was quick to claim Cleary was not a member of the group and had only allowed it to host "legitimate chatrooms" on his server.

"Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us," the group tweeted.

An individual named "Ryan" is occasionally referenced by the hackers in the logs, though he himself does not feature and appears to have only a loose association with the group.

Scotland Yard confirmed on Thursday that it was continuing to work with "a range of agencies" as part of an "ongoing investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group".

In response to the leaked logs, LulzSec posted a statement on the website pastebin, claiming users named joepie91, Neuron, Storm and trollpoll were "not involved with LulzSec" and rather "just hang out with us".

They added: "Those logs are primarily from a channel called #pure-elite, which is /not/ the LulzSec core chatting channel. #pure-elite is where we gather potential backup/subcrew research and development battle fleet members – ie, we were using that channel only to recruit talent for side-operations."

The group has vowed to continue its actions undeterred. But they now face a determined pincer movement from the FBI, UK police, and other hackers – including The Jester, who has been relentless in his pursuit of them for more than a fortnight. If its members' real identities are revealed, LulzSec may vanish as quickly as it rose to prominence.


This article originally appeared at: http://www.guardian.co.uk/technology/2011/jun/24/inside-lulzsec-chatroom-logs-hackers

Read the full chat logs here: http://www.guardian.co.uk/technology/2011/jun/24/lulzsec-irc-leak-the-full-record

Follow up coverage: New York Times, ZDNet, The Age, Yahoo, Maximum PC, Salon, Thinq, the Register, Washington Post, BGR.

The Inslaw case: Dirtier than Watergate

Thursday, 28 April 2011


It was described as dirtier than Watergate, and involved US government dealings with Iraq, Libya, Korea and even the late British publishing tycoon Robert Maxwell. The story is deep, dark and complex; a web of strange dealings and dubious characters, it implicates wealthy arms dealers, Israeli intelligence services, the Soviet KGB, MI5 and the CIA. But unlike Watergate, this scandal, from a particularly dark chapter in American history, has appeared in no Hollywood film and is yet to reach a satisfying conclusion.

It began in the late 1970s, when the Washington-based software developer Inslaw pioneered people-tracking technology, designed to be used by prosecutors to monitor case records. Known as the Prosecutor's Management Information System (PROMIS), the software was developed under grants from the US department of justice. The US government, as it helped fund the creation of PROMIS, had been licensed to use the software on condition that it did not modify, distribute or create derivative versions of it. The government, however, did not stick to this agreement.

Under the Ronald Reagan administration's covert intelligence initiative known as "'Follow the Money", the US National Security Agency (NSA) misappropriated PROMIS for sale to banks in 1982. The version of PROMIS sold by the NSA had been "espionage-enabled" through a back door in the programme, allowing the agency to covertly conduct real-time electronic surveillance of the flow of money to suspected terrorists and other perceived threats to US national interests.

A letter from the US department of justice in 1985, later obtained by Inslaw, documented more plans for the covert sale and distribution of the espionage-enabled version of PROMIS, this time to governments in the Middle East (which would surreptitiously allow the US to spy on foreign intelligence agencies). The letter outlined how sales of the software were to be facilitated by the late Saudi billionaire Khalid bin Mahfouz and the arms dealers Adnan Khashoggi and Manucher Ghorbanifar. PROMIS should be delivered without "paperwork, customs, or delay", it stated, and all of the transactions paid for through a Swiss bank account.

In the years that followed, friends of then attorney general Edwin Meese, including a Reagan associate, Dr Earl Brian of the government consultancy firm Hadron, Inc, were reportedly allowed to sell and distribute pirated versions of PROMIS domestically and overseas. As a House judiciary committee report found in 1992, these individuals were apparently permitted to do so "for their personal financial gain and in support of the intelligence and foreign policy objectives of the United States".

Brian, who was later jailed for four years on an unrelated fraud charge in 1998, has since denied any association with the Inslaw case. According to the former arms broker and CIA "contract operative" Richard Babayan, however, he was instrumental in selling PROMIS to the governments of Iraq, Libya and Korea. When Brian was unable to market PROMIS further, it is claimed that, with the help of Rafi Eitan, a high-ranking Israeli intelligence officer, the British publisher Robert Maxwell was recruited to assist.

In a sworn affidavit, the investigative author Gordon Thomas recounts how Eitan told him Maxwell alone sold over $500m worth of espionage-enabled versions of PROMIS – including licences to the UK, Australia, South Korea, Canada and the Soviet KGB. The British counter-intelligence agency MI5, according to Eitan (who himself was an adviser to the UK secret service MI6), used PROMIS to track members of the Irish Republican Army (IRA), as well as Irish republican political leaders including Gerry Adams.

Inslaw alleges the US government, by selling PROMIS to other governments around the world, engaged in what equates to "multibillion-dollar theft". This claim was supported by two separate courts in 1988, which ruled that it "took, converted, stole" PROMIS from Inslaw "through trickery, fraud and deceit". Three years later, however, a court of appeal overturned both rulings on a "jurisdictional technicality" after pressure from the federal justice department.

Now more than two decades since he pioneered PROMIS, the Inslaw president Bill Hamilton today believes the story illustrates an enduring, fundamental problem at the heart of the US justice system. "[It] chronicles the continued inability of the US government to enforce federal criminal laws in cases involving national security issues, or even to render ordinary civil justice," he says. "National security appears to suspend the checks and balances built into the system of government in the United States, to the detriment of the citizens."

Some, including the US government, have tried to dismiss the Inslaw saga as conspiracy. But a message relayed to Bill Hamilton and his wife from the former chief investigator of the Senate judiciary committee, Ronald LeGrand, seems to confirm that the strange PROMIS affair – which remains unresolved – is much more than just a case of chronic paranoia.

"What Mr and Mrs Hamilton think happened, did happen," LeGrand wrote, conveying information he had received from a trusted government source. "The Inslaw case is a lot dirtier for the Department of Justice than Watergate was, in both breadth and depth. The Department of Justice has been compromised in the Inslaw case at every level."


This article appeared originally at: http://www.newstatesman.com/blogs/the-staggers/2011/04/promis-government-inslaw