Jump to content
Heads Up! This website is no longer maintained, if your a member from our era, consider joining the discord to say hello.
Sign in to follow this  

LULSec - Web Ninjas - J35t3R

Recommended Posts

sometimes I wish I was a 1337 haxzor

Share this post


Link to post

Obama did not veto this bill but asked to take out the part where it does not affect american people.

 

 

Edited by Cripp

Share this post


Link to post

Share this post


Link to post

I can't believe what the hell is going on. I got nothing against us citizens but goddamn the gov't is fucked up.

The sad part is Alex Jones is actually representing this, anything that comes out of his mouth sounds like its bs but step by step what hes saying is coming true.

 

 

lol I'm glad I live in left wing Canada :)

Share this post


Link to post

NDAA passed, and they're already labeled terrorists, so well yeah you know the rest....

Share this post


Link to post
Twitter - @AnonymousWiki

 

 

January 19th, 2012

 

Popular file-sharing website megaupload.com gets shutdown by U.S Justice - FBI and charged its founder with violating piracy laws. Four Megaupload members were also arrested. The FBI released a press release on its website which you can view here:

http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement

 

We Anonymous are launching our largest attack ever on government and music industry sites. Lulz. The FBI didn't think they would get away with this did they? They should have expected us.

 

 

 

#OpMegaupload

The following sites were taken down in response to the FBI shutting down megaupload.com

:) TANGO DOWN

 

 

justice.gov

universalmusic.com

riaa.org

mpaa.org

copyright.gov

hadopi.fr

wmg.com

usdoj.gov

bmi.com

fbi.gov

Anti-piracy.be/nl/

ChrisDodd.com

Vivendi.fr

Whitehouse.gov

 

DOX of MPAA CEO Chris Dodd (original: http://pastebin.com/mvLYNdWB)

 

Name: Christopher John Dodd, Jr.

Birthdate: May 27, 1944

Age: 67

Religion: Roman Catholic

Party Affiliation: Democratic Party

High School: Georgetown Preparatory School, Bethesda, MD

University: BA English Literature, Providence College (1966)

Law School: JD, University of Louisville School of Law (1972)

Occupations: US Senator, Connecticut (1981-2011), US Congressman, Connecticut 2nd (1975-80)

Current Position: Motion Picture Association of America Chairman & CEO (2011-Present)

 

Wife: Jackie Marie Clegg Dodd

Age: 49

Religion: Mormon

High School: Orem High School, Orem, UT

University: BA Communications and Political Science, Southern Utah State College (1987)

University: MA National Security Studies, Georgetown University

Occupation: Clegg International Consultants LLC Managing Partner (2001-Present)

 

Children: Grace Dodd (10), Christina Dodd (8)

 

Address 1:

8 7th Street Northeast, Washington, DC 20002-6022

Phone Number: (202) 548-6040

Property Value: $997,000 [http://bit.ly/A7wfpb]

 

Address 2:

53 Main Street, East Haddam, CT 06423-1305

Property Value: $453,400 [http://bit.ly/ynBXN0]

 

Motion Picture Association of America Corporate Offices:

 

Washington, D.C.

1600 Eye St., NW

Washington, D.C. 20006

Phone: (202) 293-1966

Fax: (202) 296-7410

 

Los Angeles

15301 Ventura Blvd., Building E

Sherman Oaks, CA 91403

Phone: (818) 995-6600

Fax: (818) 285-4403

 

New York

200 White Plains Road 1st Floor

Tarrytown, NY 10591

Phone: (914) 333-8892

Fax: (914) 333-7541

 

Chicago

1010 Lake St.

Suite 422

Oak Park, IL 60301

708-660-0481

Phone: (708) 660-0481

Fax:(708) 660-0484

 

Dallas

1425 Greenway Dr.

Suite 270

Irving, TX 75038

Phone: (972) 756-9078

Fax: (972) 756-9402

 

Sao Paulo, Brazil

Rua Jerônimo da Veiga, 45, Conj 121/122, 12º Floor

Jardim Europa, São Paulo, S.P

04536-000, Brazil

Phone: 011-55-11-3667-2080

Website: www.mpaal.org.br

 

Brussels, Belgium

Motion Picture Association

Brussels office

Avenue des Arts 46 box 8

B - 1000 Brussels

Phone: +32 2 778 27 11

Fax: +32 2 778 27 00/+32 2 778 27 50

 

Mexico City, Mexico

Lafontaine #42

Chapultepec Polanco

Mexico, 11560 DF

Phone: 011-5255 5280 6878/5281 6090

 

Singapore

#04-07 Central Mall

No. 1 Magazine Road

Singapore 059567

Phone: +65 6253 1033

Phone: +65 6255 1838

Website: www.mpa-i.org

 

Toronto, Canada

55 St. Clair Avenue, West

Suite 210

Toronto, ON M4V 2Y7

Phone: (416) 961-1888

Phone: (416) 968-1016

Website: www.mpa-canada.org

 

MPAA Email: [email protected]

 

Other Contact Info:

Website: http://chrisdodd.com

Facebook: http://www.facebook.com/SenChrisDodd

Twitter: http://twitter.com/SenChrisDodd

YouTube: http://www.youtube.com/user/SenChrisDodd

Flickr: http://www.flickr.com/photos/SenChrisDodd

Miscellanous: http://www.peekyou.com/chris_dodd/229085828

 

We are Anonymous.

We are Legion.

We do not Forgive.

We do not Forget.

Expect Us.

 

@AnonymousWiki

 

 

Source: http://pastebin.com/WEydcBVV

Share this post


Link to post
Hacktivist group Anonymous made the rounds over the weekend, attacking sites from CBS.com to (once again) Universal Music.

 

In what looks like hacking-spree retribution following the FBI’s shut down of file-sharing site Megaupload, Anonymous didn’t just take CBS.com offline on Sunday with a series of distributed denial-of-service (DDOS) attacks — it redirected visitors to different web servers all together. This means that visitors trying to access CBS.com saw what appeared to be a completely deleted site for about 20 minutes.

 

Anonymous redirected CBS.com visitors to servers that showed a directory file and error messages when trying to load pages. CBS.com is now back up and functioning properly.

 

The group also took down other sites over the weekend, including UniversalMusic.com — a site the group attacked last week — as well as its parent company, Vivendi. Various Brazilian sites were also involved in the cyber-attacks, including one for popular singer Paula Fernandes. Elysée — the official website of the French government — as well as several Polish government sites were also hit. Although Twitter accounts for The Daily Show and The Colbert Report were also hacked Sunday night, it appears to be an act from Anonymous supporters — not Anonymous itself.

 

Last week, the U.S. Department of Justice (DOJ) indicted seven people and two companies which ran the file uploading site Megaupload.com. The site — which called itself “the leading online storage and file delivery service” has been shut down for making $175 million on about a half a billion dollars in copyright infringement. Anonymous threatened in a video (above) to bring other sites down if Megaupload isn’t reinstated soon.

 

The video states that Anonymous has gained access to the servers of the United Nations, Facebook, YouTube, Twitter and various banks, and threatened to take them down: “We are prepared to launch a global blackout of these websites” if Megaupload isn’t back online in 72 hours. The video was released last Thursday.

 

“We have access to banking and credit card information of millions of citizens,” the video said. “But as for the citizens, do not fear — for your accounts will not be compromised. This is simply to raise awareness — a demonstration to those that doubt our abilities. To those that support SOPA and PIPA. To those congressmen that want to vote yes on those bills. We are not f-ing playing. You have been warned.”

 

According to a Huffington Post report, @ColbertReport and @TheDailyShow were also hacked on Sunday night, as identical tweets were sent out to followers with a link to this picture — two men in a disguise, one wearing a Pokemon hat. But the hackers said they were not associated with Anonymous, although they do support their efforts. The tweets also included hash-tags that referenced Anonymous and Stop ACTA!, a protest group of the anti-counterfeiting trade agreement. The tweets also included this message: “Watch your security, bro <3."

 

Soon after, the accounts reportedly tweeted followers to ignore the previous messages, implying that they had been hacked. Other Viacom accounts -- including @ComedyCentral and @Spike_TV -- were also hacked in the process through Hoot Suite, social media dashboard that helps companies manage and send messages to Facebook and Twitter.

 

The messages have since been deleted from @TheDailyShow, but @ColbertReport has left up a message denying ties to Anonymous: "We are not anonymous, however we do respect @anonops and @poisanon we are however http://twitter.com/ashpluspikachu <3 #stopACTA."

 

Source: http://mashable.com/2012/01/23/anonymous-cbs/

Share this post


Link to post
#Polish Parliament members wear #Anonymous masks to protest #ACTA in chambers

Poland on Thursday signed an international copyright agreement, sparking more demonstrations by Internet users who have protested for days over fear it will lead to online censorship.

 

After the signing, protesters rallied in the Polish cities of Poznan and Lublin to express their anger over the treaty. Lawmakers for the left-wing Palikot's Movement wore masks in parliament to show their dissatisfaction, while the largest opposition party — the right-wing Law and Justice party — called for a referendum on the matter.

 

Lawmakers from the leftist Palikot's Movement cover their faces with masks as they protest against ACTA during a parliament session.

 

http://www.youtube.com/watch?v=wj_cIiu3hU4&feature=channel_video_title

 

Sources:

http://abcnews.go.com/Technology/wireStory/poland-signs-copyright-treaty-drew-protests-15449837#.TyHg4G9IHIL

youtube lol...

Share this post


Link to post

ANONYMOUS EXPOSED

 

The ‘Anonymous’ operation – which isn’t likely to represent a real movement but rather a ‘no-flag’ operation played by the Banksters against the free Internet - seems to be escalating its position on the globalist world theater of destabilization with actual acts of sabotage. What are its real motives ?

 

Anonymous displays all the telltale signs of a very typical no-flag operation, branded around the very notion of not having any specific identity and not waving any flag at all.

 

This way the ruling elite, collectively named ‘Illuminati’, portray themselves as victims, albeit indirectly since they “are being threatened”.

 

This is ultimately an excuse for ‘plugging the holes’ of the Internet thus muting it, killing the competition and silencing the opposition.

 

Anonymous is the Banksters’ excuse to subvert the aforementioned Internet. Luckily, the Internet cannot any more be “shutdown” the way it could be till a few years ago, thanks to the advent of Cloud active-sharing platforms, starting with the likes of ‘Dropbox’ & ‘iCloud’ and maturing towards Implementing Cloud Computing in Federal Agencies.

 

See: Cloud computing solutions might improve the overall security of government software

 

Thus the global cybernetic village can tackle the non-flagged Anonymous operation, just like the people of Sleepy Hollow confronted the headless horsemen in Washington Irving’s classic story.

 

Anonymous & Wikileaks

 

Anonymous seems to go hand in hand with the globalist limited hangout operation – Wikileaks.

 

This is obviously so, given the Anonymous threat to target those who planned to shut down Wikileaks infrastructure . Anonymous thus serves the purpose of branding Wikileaks under the “radical chic” moniker, which is crucial to its popularity in the ever expanding ‘alternative’ media niche. Another telltale sign pointing in this direction is the recent Anonymous threat to launch a “crusade” against Israeli cyber infrastructure, in a ludicrous video message designed to appeal to the average “alternative” radicalized patsy milieu, where Israelophobia is prevalent.

 

The golden choke-point

 

Gold is the choke point which allowed the English/British empire to reign supreme the world over. The real basis for paper-money is its validity for tax payment, thus the state issues a closed-loop of paper-credentials starting with payrolling its personnel and ending with tax collection. This should be the basic formula:

 

(payroll issuance) = (tax collection) + GDP growth.

 

Insofar, the banks are those who issue the money as a sum of:

 

1. Expected business revenue.

2. Expected business valuation.

3. Interest, excused as commission for the above monitoring service.

 

The prevalence and ubiquity of the Internet allow the government to regulate the money creation at the state-level, where the consultation on whether to issue a loan to a business should be made on the basis of a professional accountancy report audited by a reputed firm, thus implementing a separate and rule regime over the financial market.

 

The Greek Tragedy

 

The Greek tragedy of the GIPSI countries was mediated and perpetrated by the Banksters acting in the shadows of a scarcely-connected global village, in which rumors (Banksters reports) prevailed over responsibility, given the epistemological limitations which have always bogged humanity were still intact. A fully-connected global village, in which the actual activity and situation of the major players are observable is no more clandestine, thus lifting the veil of epistemology off the face of public sector economics.

 

Source:

http://www.infowars.com/anonymous-cia-cybernetic-sleepy-hollow/

Edited by Cripp

Share this post


Link to post
Executive Summary

 

The hacktivist who goes by the handle “th3j35t3r” has been carrying out denial of service (DoS) attacks against suspected jihadist websites since he showed up on the hacktavism scene on January 1, 2010. He uses a DoS tool called XerXes that he claims to be the sole author of. He also claims to be “an ex-soldier with a rather famous unit” and to have served two tours of duty as an airborne combat trooper “in (and around) Afghanistan amongst other places”. He says he is between 31-49 years old.

 

He recently carried out a DoS attack against wikileaks.org, which generated quite a bit of media attention. He is now a declared target of Anonymous, some of whom’s members believe he is a Robin Jackson of Helena, Montana, a 49-year-old employee of the State of Montana who goes by the online handle of “rjacksix”. But while rjacksix has publicly claimed that he and th3j35t3r “have worked together” and share “operational details”, it is unlikely that Robin Jackson is th3j35t3r.

 

The involvement of rjacksix and others, however, shows that th3j35t3r is not the “lone wolf” operator he has claimed to be and receives operations support from civilians like rjacksix. Some have suggested that th3j35t3r might also receive some level of support from operatives within the U.S. intelligence community. While there is no hard evidence that th3j35t3r has assistance from the U.S. Government–an assertion that he expressly denies–it is unlikely that no one inside the U.S. intelligence community, the Department of Defense, or law enforcement has no knowledge as to th3j35t3r’s true identity given his stated military background and the fact that he posses such a demonstrably powerful and effective cyber-weapon as XerXes.

 

Some have gone as far as to suggest that th3j35t3r is not an individual at all, but a persona created as a front for a secret government program that carries out unattributable cyber-attacks. While this is not beyond the realm of possibility, there is no hard evidence to support this far-fetched claim, which gets cut to pieces when pressed against the sharp blade of Occam’s razor.

 

The identity of th3j35t3r as an individual, a group, a secret government program, or otherwise remains unknown and he is “crack on”, as he has said, with his DoS campaign against jihadist websites.

 

An Ex-Soldier

 

th3j35t3r (The Jester) is a self-proclaimed “hacktivist for good” who has taken down numerous jihadist websites and, most recently, wikileaks.org using a denial-of-service (DoS) attack. Although there has been much speculation, th3j35t3r’s identity has not been conclusively determined and confirmed. In an email exchange with Richard Stiennon, author of Surviving Cyberwar, in January 2010, th3j35t3r claimed he is ex-military.

 

“I am an ex-soldier with a rather famous unit, country purposely not specified,” wrote th3j35t3r. “I was involved with supporting Special Forces, I have served in (and around) Afghanistan amongst other places.”

 

In a November 30, 2010 interview with ABC News, th3j35t3r said that he is under 50 years of age and over 30. He said that he began coding at the age of 10 because he was ”thirsty for knowledge about how computers worked, and fascinated by the fact that just a guy and a keyboard might make a difference to something.” thj35t3r also said that he was “always drawn to applying myself within the military,” and that he served twice as an airborne frontline combat trooper.

 

Assuming that what th3j35t3r said is true, we can only speculate about what branch/unit th3j35t3r served in. Although th3j35t3r did not specify the country and unit, it is likely that he was with either the United States Army Special Forces or United States Army Rangers. Specifically, the 75th Ranger Regiment has been deployed in Afghanistan (Operation Enduring Freedom) and in Iraq (Operation Iraqi Freedom).

 

The only other “special forces” units known to have carried out operations in Afghanistan were the Spetsnaz during the Soviet war in Afghanistan (1979-1989) and, more recently, the United Kingdom Special Forces (UKSF).

 

Given th3j35t3r’s proven cyber skills and prowess, it is also plausible–but in no way substantiated–that he was (or still is) in some way connected with one of the various cyber command units that are now under the recently created United States Cyber Command (USCYBERCOM), which was officially activated May 21, 2010 and reached “full operational capability” on November 3, 2010. Again this is only speculation.

 

th3j35t3r sometimes uses “hooah” (and variations) in his Twitter posts, further suggesting that he is ex-U.S. military. The term “hooah” and variations such as the USMC “oorah” are common throughout the various branches of the U.S. military.

 

In addition to using the U.S. military term “hooah”, th3j35t3r also often uses the phrase “tango down” in his Twitter announcements about websites that he has taken down with a DoS attack. “Tango down” is a special forces military term for having eliminated a terrorist, according to Chandler’s Watch, a radio show and accompanying website run by two Marines.

 

th3j35t3r has stated that he takes operations security (OPSEC) “very seriously”. This further seems to support his claim that he is ex-military and has operations field experience. At a minimum, it separates him from “skiddies” as well as those who are currently carrying out traditional DDoS attacks against websites and/or engaging in site defacement, which is something that th3j35t3r claims he does not do:

 

 

Source: twitter.com/th3j35t3r

 

“Skiddie”, which is short for “script kiddie”, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites. Based on th3j35t3r’s hackography, however, calling him a “skiddie” is merely juvenile name-calling.

 

th3j35t3r has been carrying out systematic cyber-attacks against suspected jihadist website targets using his own DoS utility since he appeared on the hacktivism scene on January 1, 2010. His stated purpose for these ongoing cyber-attacks is to disrupt terrorists from using the Internet as a means of recruiting and coordinating:

 

 

Source: twitter.com/th3j35t3r

 

In addition to his stated practical reason of causing disruption to suspected jihadist websites, th3j35t3r has made statements that suggest he operates with the moral foundation of utilitarianism as evidenced by one of his early Twitter postings:

 

 

Source: twitter.com/th3j35t3r

 

Weapons of Mass Disruption: The XerXes Attack Platform

 

th3j35t3r uses a DoS “attack platform” called XerXes. The “attack platform” concept comes from th3j35t3r himself. Beginning on November 16, 2010, his Twitter postings were flagged as being published “via XerXes Attack Platform”.

 

In a February 2010 interview with Infosecisland.com Managing Editor Anthony M. Freed, th3j35t3r stated that XerXes started with “a little script I wrote a while back to harden-test servers.”

 

“I modified this script, and it was just a nasty script, very cumbersome,” the th3j35t3r told Freed. “When I realized the extent of the jihad online recruiting and co-ordination involvement (much later), I realized I could turn this script into a weapon.”

 

XerXes is a denial of service (DoS) software platform. It is important to distinguish it from a distributed denial of service (DDoS) attack. In the DDoS attack model, many computers are used to send simultaneous and repeated requests to the webserver hosting a particular website. In most cases, this collection of remote computers are computers that have been compromised through malware injection and/or exploitation of unpatched security holes and/or zero-day security exploits. In many cases, the owners of compromised and exploited computer systems are unaware that those systems are participating members of a botnet. In a DDoS attack, the attacker activates the compromised computer systems that have been corralled into the botnet and uses them to make repeated requests to the webserver that hosts the target website until the server becomes overwhelmed and can no longer accept legitimate inbound HTTP requests.

 

XerXes is different. According to th3j35t3r, it does not require a botnet nor comparable vast computing resources in order to carry out a successful attack against a specified target.

 

“There is nothing ‘distributed’ about this,” th3j35t3r said. “It is possible with very low bandwidth and a single low-spec Linux machine.”

 

According to th3j35t3r, XerXes “does not require a botnet, zombie PC’s or other people’s bandwidth in order to successfully pull down a site.” The veracity and effectiveness of XerXes has been confirmed and th3j35t3r has made publicly available two video demos of DoS attacks using XerXes.

 

“Once a single attacking machine running XerXeS has smacked down a box, it’s down, there is no need for thousands of machines,” th3j35t3r told Freed in February. He added that the attack only affects the intended target.

 

“Many people worry about the nodes between me and the target,” th3j35t3r said. “This technique affects nobody but the intended target. All intermediaries remain unaffected.”

 

th3j35t3r claims to have independently developed XerXes without any government sponsorship or involvement. When asked in a June 2010 interview with Welt Online if he was “supported in any way by Western governments, intelligence agencies or anybody who is also fighting Jihadi propaganda”, th3j35t3r responded, “At this time I work completely alone, and have no ties or affiliations with any government entities.”

 

“Lone wolves work faster, eat more and are harder to track and capture,” he added.

A Sheep in (Lone) Wolf’s Clothing?

 

If th3j35t3r is indeed the “lone wolf” he claims to be, he’s accomplished a lot for one person this past year: writing and testing code for his DoS attack platform (which includes a GUI), researching and assessing Arabic-language websites for targeting and attack, and being his own publicist to mention a few. All of this would be quite achievable for an individual with the right combination of skill-sets, experience, time, and resources.

 

Whether or not th3j35t3r has direct or tacit support from the U.S. intelligence community, he likely has support from someone. Up until the wikileaks.org attack, the websites he has taken down have been Arabic-language “jihadist” websites.

 

The grammatical structure of Arabic is very different from English (as well as other Indo-European languages). Online translation software such as Google Translate or Babel Fish do not do a good job of translating Arabic into comprehensive English. At a minimum, one must have an intermediate understanding of Arabic grammar and the nuances of its triliteral root system in order to achieve a coherent and useful translation in English.

 

Due to this fact, there are only several possibilities: 1) th3j35t3r has at least intermediate Arabic-language skills, 2) he has help from someone who does (government or civilian), 3) he relies on only a handful of easily translated keywords and/or phrases to determine that a website or forum is “jihadist” in nature and should therefore be targeted.

 

In a January 2, 2010 posting on Twitter, th3j35t3r wrote:

 

 

Source: twitter.com/th3j35t3r

 

Analysis of that translation by an Arabic linguist working on behalf of T3h Her0d07u5 Rep0r7, has determined that it was a machine-generated translation and not that of a human with at least intermediate Arabic-language skills.

 

In his interview with Welt Online, th3j35t3r stated, “many followers on twitter have passed leads on to me, which I then vet to ensure the site poses a threat before it makes it onto the hit-list.”

 

One of th3j35t3r’s followers on Twitter asked him directly how he found the sites he targets:

 

 

Source: twitter.com/th3j35t3r

 

Based on the information we have at this time, there is no compelling evidence that th3j35t3r acting as a lone operative has the Arabic-language skills one would need in order to thoroughly and accurately vet a suspected jihadist website to “ensure the site posses a threat before [being placed] onto the hit-list.”

The Anonymous Hunt for th3j35t3r

 

“Often the surest way to convey misinformation is to tell the strict truth.”

- Mark Twain, quoted by th3j35t3r in a December 9 blog posting.

 

Who is th3j35t3r? This conundrum has recently been the focus of Anonymous participants who have sought to determine and expose th3j35t3r’s true identity. Interestingly, the occurrence and nature of these efforts were made public by th3j35t3r himself who recently published a lengthy excerpt from an IRC session (#AnonymousDown) with a date/time stamp of Fri Dec 10 15:38:58 2010. It was unclear whether th3j35t3r was a participant in the session under an alias or whether he was a silent observer or gained access to the session log by other means. He recently boasted on Twitter that he has “eyes on” inside of Anonymous:

 

 

Source: twitter.com/th3j35t3r

 

The topic of the IRC session was, “Let’s find the guys that are trying to stop us. AnonymousDown: http://twitter.com/AnonymousDownhttp://www.stumbleupon.com/stumbler/AnonymousDown/. th3j35t3r: http://twitter.com/th3j35t3rhttp://www.xfire.com/profile/th3j35t3r/http://th3j35t3r.wordpress.com”.

 

The entire session log snippet is 484 lines in length. What follows is a pieced together narrative of key excerpts from the IRC session transcript in which participants speculated about th3j35t3r’s true identity:

 

Thatoneguy: “Who’s the jester?”

AsD: “nothing”

AsD: “forget him”

@Cyberpolice: “We have a name, but not confirmed.”

@Cyberpolice: “Rusty Schackelford”

@Cyberpolice: “lol”

 

[Rusty Shackleford is an alias for the fictional character of Dale Gribble on the animation series King of the Hill.]

 

Fr0stii: “wow some fuckin kid tryin to jump on the bandwagon”

Beagollum: “according to his twitter not just a kid”

Beagollum: “some anti-jihad, US-nationalist”

@Cyberpolice: “yea he’s attacking jihad shit”

@Cyberpolice: “And us”

@Cyberpolice: “He’s using XerXes”

CrazyKlompjes: “he could be ofcourse a forefront for the government”

Ap3X: “There are enough leads that Jester = 1 person”

Ap3X: “1 day ago we tracked down a guy who seems to be him”

Ap3X: “we have no proof though”

Beagollum: “what info did you got?”

Ap3X: “ill search it up for you”

Ap3X: “jester seems to be -> rjacksix”

@Cyberpolice: “rjacksix?”

Ap3X: “rjacksix = has a hacking website too”

Ap3X: “and writes alot about Jester”

Ap3X: “Jester speaks English And russian”

@Cyberpolice: “rjacksix = Robin Jackson”

Ap3X: “exactly”

Ap3X: “rjacksix states on his linkedin that he speaks english and russian”

bada: “rjacksix isnt the jester”

bada: “i looked into it heavily”

Ap3X: “rjacksix works for the gov.”

bada: “similar interests, similar everything”

bada: “but not him”

bada: “in my opinion”

@Cyberpolice: “Why not?”

bada: “i could be wrong though”

@Cyberpolice: “No one is sure in here”

Ap3X: “Well all leads go to rjacksix”

bada: “i forget exactly why i ruled him out”

bada: “it was like a week ago”

Beagollum: “if he is jester, he is weird”

Thatoneguy: “could it be real hackers from 2600?”

Ap3X: he is wierd

@Cyberpolice: “Well most people only use 1 username”

Beagollum: “indeed”

Ap3X: “1 day ago we traced all info on”

Ap3X: “rjacksix”

Ap3X: “we even got his home adres & phone nmber”

@Cyberpolice: “fuck”

Ap3X: “Point is we have no proof”

@Cyberpolice: “Ap3X Yea you can’t act without proof”

Ap3X: “exactly”

Ap3X: “only thing we can is phone this guy and say: Hello jester”

Ap3X: “see how he respons”

@Cyberpolice: “Jester whats up man? Wanna hang out?”

Ap3X: “hellow Jester, we know your there”

Beagollum: “something doesn’t add up”

Ap3X: “if the man doesnt know well then its not him”

@Cyberpolice: “Just ask if Jesters home”

Fr0stii: “I’m in the US what is his number?”

Ap3X: “remeber it might NOW be him”

Fr0stii: “I know…”

Ap3X: “just ask if Jester is home”

Fr0stii: “I’m not asking for jester…. most dont call me and ask for frostii ahaha”

Fr0stii: sec brb

Beagollum: “Frostii, ask for Rusty Shackelford”

@Cyberpolice: “I bet his mom will pick up the phone”

Fr0stii: “answering machine ‘hi you have reached the jacksons plz leave a msg after the tone and have a good day’”

@Cyberpolice: “fuck”

Beagollum: “well, atleast it’s a real number”

Fr0stii: “it sounded like a young guy on the answering machine”

@Cyberpolice: “Its all connected somehow”

Ap3X: “point is, we have no 100% proof… just suspicions”

@Cyberpolice: “Yes we need proof”

@Cyberpolice: “We need to find the link between th3j35ter and Jackson”

Fr0stii: “yea I’m trying something now. somehow we have to link this to the miltary background”

Fr0stii: “right ahaha”

Ap3X: “he has a ex mil background”

Ap3X: “there is proof for that already”

Ap3X: “The intrusion of the military into the commercial realm raises immediate Posse Commitatus issues.

 

[The Posse Comitatus Act prohibits federal military personnel and units of the National Guard under federal authority from acting in a law enforcement capacity within the United States, except where expressly authorized by the Constitution or Congress.]

 

Ap3X: “If the military isn’t allowed to police the physical world in in the US, why would we think that it was OK for them to do so in the virtual world.”

Ap3X: “I am not some extremist either. I am ex-military and worked in a no-such for quite some time.”

Ap3X: “The question is one we need to address.”

Ap3X: “only way to find out if its jester is to piss him off”

Beagollum: “Jackson was military”

Ap3X: “Started as a Russian Linguist”

Ap3X: “and he speaks russian”

Ap3X: “both facts point to Jester”

Beagollum: “there’s a connection”

Beagollum: “RL-connection”

@Cyberpolice: “Yes there is”

@Cyberpolice: “So are we going to announce that we found th3j35ter?”

Ap3X: “this guy needs to disapear”

Ap3X: “Question is… did we find him?”

Beagollum: “no plubicity until it is proven 100% who he is”

Ap3X: “Agree”

@Cyberpolice: “We just need to confirm that he’s the guy”

 

But to date, there has been no confirmation–only speculation–as to th3j35t3r’s identity. th3j35t3r has denied being Robin Jackson.

 

“If you think I am Rusty Shackleford–you fail,” he wrote in his December 10 blog posting. “If you think I am Robin Jackson–you fail again.” Then he added this:

 

“In conclusion, you should rest assured that you don’t ruffle me at all–I don’t have a single shred of fear induced by yourselves, what I do have are a very particular set of skills; skills I have acquired over a very long career. Skills that make me a nightmare for people like you.”

 

Members of Anonymous who launched Operation Payback, are now targeting Robin Jackson (who goes by rjacksix online) because they believe that he is th3j35t3r. The following is the poster announcing Anonymous’s targeting of Robin Jackson:

 

 

Source: praetorianprefect.com

 

The following posting by Anonymous provides information for what they have called “Project th3j35t3r”:

 

 

Source: praetorianprefect.com

 

The timestamp on this posting is December 9. The IRC session log in which Anonymous members are discussing and speculating about the identity of th3j35t3r is dated December 10. Based on that disparity, it looks as though Anonymous engaged in “Project th3j35t3r” while still uncertain that th3j35t3r was indeed Robin Jackson.

 

According to his Linkedin profile, Robin Jackson is the Chief of the Management Services Bureau for the State of Montana. This is confirmed at the State of Montana’s official website, mt.gov.

 

According to his profile at internetrevolution.com, Robin Jackson (rjacksix), ”Started as a Russian Linguist. Learned how to program at Ft. Meade MD (hehe). Left the military and ended up doing SCADA for GE…Currently manage computer programming, technology, budget, leases and other support functions for the Montana Dept. of Labor, Employment Relations Division.”

 

Jackson’s Linkedin profile does not mention his having been a Russian linguist nor having served in the U.S. military and/or having worked for the NSA. His Linkedin profile does, however, list his specialties as: “Open Source, Linux, PC’s, servers, virtualization, networking, web publishing, web pages, ITIL, technology, technology forecasting”.

 

In a December 10 Twitter posting, Robin Jackson outrightly denied being th3j35t3r:

 

 

Source: twitter.com/rjacksix

 

And again on December 11:

 

 

Source: twitter.com/rjacksix

 

rjacksix follows th3j35t3r on Twitter. So do 6,546 other people as of December 17, 2010. rjacksix was the 518th follower of th3j35t3r. rjacksix has 195 current followers on Twitter. His 10th follower was th3j35t3r, who currently only follows 67 people on Twitter.

 

According to whendidyoujointwitter.com, rjacksix joined Twitter on February 17, 2009 and th3j35t3r joined on December 19, 2009:

 

 

Source: whendidyoujointwitter.com, an online utility created by Neville Ridley-Smith.

 

th35t3r has denied being Robin Jakcson (rjacksix) as well:

 

 

Source: twitter.com/th3j35t3r

 

“Holy imposter Batman!”

 

On November 30, 2010, an imposter claiming to be th3j35t3r emerged on Twitter. The imposter used a very similar username: th3j3st3r. Note the subtle difference in which the imposter used an “s” in replacement for the “5″. He had to do this because usernames are unique on Twitter. Once a particular username has been registered, it cannot be used by someone else. Slight variations, however, are allowable as are duplicates of the Name field in a user’s profile.

 

The imposter used the same name in the Name field of his Profile as the real th3j35t3r. He also copied the real th3j35t3r’s Bio and Picture in his Profile:

 

 

Source: twitter.com/th3j3st3r

 

Other than the username, there was another significant difference: the imposter listed www.th3j35t3r.net in the Web field of his Profile.

 

According to Network Solutions WHOIS, th3j35t3r.net was registered with domain privacy on December 1, 2010:

 

Source: Network Solutions WHOIS

 

The imposter directed www.th3j35t3r.net to a wordpress.com blog that used the same theme (Greyzed) as the real th3j35t3r. (The imposter’s blog has since been deactivated and/or deleted.)

 

The imposter then posted the following blog entry:

 

So much for being quiet around here. The fire is starting to stir.. as many of you already are aware my door was kicked in and all of my equipment was seized. The weird thing is it was the local sheriffs office not the government. Hmmm..

 

In the mean time, my email and WordPress accounts are probably jeopardized so I decided to launch on my own server since nothing can be trusted at this time. I still have copies of all utilities, code, and web backups.

 

I am trying to raise money from my supporters for attorney fees. If I can raise the required $10k, I will release XerXes along with a port to Win32.

 

I will keep everyone posted as things start to unfold. I am not sure whats going to happen, no charges have been filed as of yet. Thanks for all your support! Don’t forget, Follow the new ‘th3j35t3r‘ Twitter!

 

On his dummy blog, the imposter included a link to gofundme.com for online donations:

 

 

Source: Crabbyolbastard Ruminates

 

In addition to trying to fleece some cash from unsuspecting suckers, it seems as though the imposter was also trying to stir up media attention and get federal agencies engaged in a hunt for th3j35t3r with a threat of porting XerXes to Windows and releasing it to every skiddie on the Internet to use indiscriminately to carry out DoS attacks.

 

On November 30, Mikko H. Hyppönen, the Chief Research Officer at F-Secure Corporation, tweeted that th3j35t3r had been raided:

 

 

Source: twitter.com/mikkohypponen

 

Robin Jackson (rjacksix), who follows Hyppönen on Twitter, replied:

 

 

Source: twitter.com/rjacksix

 

It was unclear what rjacksix meant by “cannot verify operational details”. The statement seems to suggest that the imposter could not verify “operational details” to rjacksix, which suggests that rjacksix and th3j35t3r had shared knowledge. This would leave only three options: 1) rjacksix was lying and has no knowledge of any of th3j35t3r’s “operational details”, 2) rjacksix is working with th3j35t3r and knows operational details that only he and th3j35t3r would know, or 3) rjacksix (Robin Jackson) and th3j35t3r have shared knowledge of operational details because they are the same person.

 

rjacksix then made an all-call to security professionals in which he suggested that the imposter was engaged in a social engineering (SE) attack on th3j35t3r:

 

 

Source: twitter.com/rjacksix

 

rjacksix then made several posts in a row that raised questions about the alleged police raid:

 

 

Source: twitter.com/rjacksix

 

While these were all relevant questions regarding the veracity of the alleged police raid, he soon after apologized:

 

 

Source: twitter.com/rjacksix

 

Flippintheraya, Just_this_time, rjacksix, and th3j35t3r all follow one another on Twitter. In his posting, rjacksix refers to “op senses”, which was likely a shortening of “operation senses”. Again, this suggests his being involved in operations with th3j35t3r as well as with Flippintheraya and Just_this_time.

 

rjacksix then informed Hyppönen with “100% reliability” that the raid was faked by an imposter:

 

 

Source: twitter.com/rjacksix

 

Following this, rjacksix made a post containing a link to a posting on his website, dc406.com, entitled “th3j35t23r Social Engineering Scam” in which he stated:

 

“In a blatant attempt to use social engineering for either individual gain, or to discredit and break into the circle of people around the real jester…”

 

He also wrote, “th3j35t3r is dark, but probably safe. He has impeccable operational security. Numerous questions were asked of the imposter who immediately went silent when asked to answer simple questions.”

 

Further substantiating his claim that he and th3j35t3r are operating together, rjacksix posted the following tweets on December 1:

 

 

Source: twitter.com/rjacksix

 

While Anonymous’ assertion that Robin Jackson (rjacksix) is th3j35t3r is unsubstantiated, this is confirmation that he has at least been involved in some way with th3j35t3r’s ongoing operations. To what degree and in what manner is unclear. Based on his Twitter and website postings, however, it is clear that rjacksix is a big admirer of th3j35t3r and one could say that he quite literally he has been playing “Robin” to th3j35t3r’s Batman.

 

Anthony M. Freed has suggested that th3j35t3r himself was behind the imposter and the hoax of the police raid. So has Scot Terban, an information security professional who authors the blog Crabbyolbastard Ruminates.

 

“Was the The Jester (th3j35t3r) himself the instigator of reports that he had been the subject of a raid by law enforcement officials on Monday? That seems likely to be the case,” Freed concluded.

 

Terban, also believes that th3j35t3r instigated and was “in control” of the hoax the entire time:

 

“It’s my belief that Jester was in control [of the hoax] the whole time, but as to his motivations in doing this? I have no real clue other than perhaps this was a false flag to get people off of the trail,” wrote Terban on his blog.

 

Freed and Terban are most likely wrong in their individual assessments. A hoax that draws media attention and raises the specter of th3j35t3r porting and releasing XerXes on the Windows platform doesn’t seem to fit with th3j35t3r’s modus operandi and his attention to OPSEC.

 

Additionally, during the course of compiling this report, we’ve read all of th3j35t3r’s Twitter and blog postings, as well as various comments he has left on other people’s blogs. The “voice” of the writing in the imposter’s blog posting doesn’t sound like th3j35t3r; rather, it sounds like someone trying to sound like him and doing a very poor job of it. The real th3j35t3r sounds intelligent. The imposter, on the other hand, sounds stupid.

 

In a December 8 blog posting that addressed “The Imposter Saga”, th3j35t3r himself pointed out the imposter’s stupidity and obvious logic flaws:

 

“[The imposter] claimed that I had been arrested by errr the local Sheriff (lol) and since released without charge but still needed to raise (a measly) $10K for a legal defense fund.- PS you were released without charge – why do you need a defense fund?”

 

According to th3j35t3r, he contacted the imposter on Twitter via Direct Message (DM):

 

“I approached this person via DM and kindly pointed out that he has just made himself a huge target, especially by registering a domain name, and by clearly not having any kind of situational awareness, will be found, and they will think you are me. He immediately (not by my request) pointed his domain to this blog. Fool.”

 

In regards to the request for money and the promise to port XerXes to Windows and release it th3j35t3r said:

 

“As has been stated over the last 12 months many times. I do NOT require any financial donations, will never ask for any, and if, as in last week’s debacle, it ever again appears I have asked for donations, look carefully at the facts: It will not be me begging for cash. Ever.”

 

The Herd Mentality

 

One speculation raised in the #AnonymousDown IRC session is the possibility that th3j35t3r is not a single person, but a front created by the U.S. Government in order to carry out unattributable cyber-attacks. There is no hard evidence for which to substantiate this far-fetched claim; only circumstantial evidence that makes it of interest even though it gets cut to pieces when pressed against the sharp blade of Occam’s razor.

 

In a January 2, 2010 Twitter posting, th3j35t3r wrote, “Terrorists are utilizing internet technologies to recruit, propagate, and co-ordinate. I exist in shadow to disrupt their online activity.” If the th3j35t3r is a U.S. Government-sponsored operation carrying out cyber-attacks “in shadow”, it would be a secret, special access program that only those who were read-in to the program would know about.

 

While it is easy and common for people to manufacture all kinds of elaborate government conspiracies in an attempt to explain all sorts of world phenomena that they do not understand, the creation of a secret government operation that utilized manufactured identities, online personas, media manipulation, misinformation, and deception is not beyond the realm of possibility.

 

U.S. intelligence services have a long history of creating and executing outlandish and complex operations, such as the CIA’s creation of a fake science film to sneak six Americans out of Iran in 1979 during the Iranian Revolution. Such clandestine operations in cyberspace would be far less risky and dangerous than actual field operations. Clandestine cyber-operations would also take far less resources. A small team of subject matter experts could accomplish a lot in very short order. Additionally, OPSEC would be vastly improved. As the emerging saga of Cablegate has demonstrated: secrecy is inversely proportional to the number of people in-the-know.

 

A possible down-side of such a compartmentalized operation is that it could work at cross-purposes with other U.S. intelligence operations. For example, th3j35t3r’s disruption of jihadist websites and discussion forums could dampen ongoing intelligence-gathering efforts by the NSA. The resulting disruption of ongoing communications and the possible scattering of participants could effectively dry-up the gathering of actionable intelligence.

 

th3j35t3r has refuted this notion on Twitter in an exchange with Leah Farrall (allthingsct), a former senior Counter Terrorism Intelligence Analyst with the Australian Federal Police (AFP) who authors the blog All Things Counter Terrorism.

 

 

Source: twitter.com/th3j35t3r

 

While his DoS attacks against suspected jihadist websites are certainly disruptive, th3j35t3r advocates that these attacks have a “herding” effect.

 

“By NOT hitting certain sites, and hitting others hard, I am ‘herding’–people give up easily when a site is constantly up and down, and move on to a more reliable one,” th3j35t3r said in his interview with Welt Online. “So it creates a funnel-effect–funnelling terrorists and potential terrorists away from peripheral sites and into a smaller space that is easier to monitor.”

 

If that is indeed the case, th3j35t3r would be aiding ongoing intelligence-gathering efforts by narrowing down the number of suspected jihadist websites and discussion forums monitored by U.S. intelligence services.

 

However, there is also the possibility that his efforts have had a chilling effect and result in herding jihadist communications out of the clear and receding into the digital underground of the darknet.

 

According to Terban, th3j35ter’s DoS attacks on jihadist websites have had little effect at all.

 

“Sure he was pissing off some in the intelligence community,” wrote Terban, “but for the most part people ignored him because he was not performing any kind of substantive attacks that effected change. The jihadi’s kept on talking on the same sites that they mirrored.”

A “Frosty” Conclusion

 

The tagline for th3j35t3r’s blog is “Stay Frosty My Friends”. So far, this has been the case as attempts to uncover th3j35t3r’s identity have all gone cold. While Robin Jackson (rjacksix) of Helena, Montana has publicly claimed that he and th3j35t3r “have worked together” and share “operational details”, it is unlikely that Robin Jackson is th3j35t3r himself. At most, rjacksix and others have provided some level of operations support for th3j35t3r.

 

While unsubstantiated, it is unlikely that no one inside the U.S. intelligence community, the Department of Defense, or law enforcement has no knowledge as to th3j35t3r’s true identity given his stated military background and the fact that he posses such a demonstrably powerful and effective cyber-weapon as XerXes, which could wreack havoc on the World Wide Web if the code base were indeed released into the “skiddie” community. At a minimum, th3j35t3r is likely receiving tacit support from the U.S. Government for his ongoing operations against suspected jihadist websites and most recently wikileaks.org.

 

And if th3j35t3r is not an individual at all but rather a persona created as a front for a secret government program to carry out unattributable cyber-attacks against specific targets, it is highly unlikely that we’ll ever know the truth about that–well, unless someone on the inside leaks evidence of the existence of such a program via an organization like WikiLeaks.

 

Meanwhile, the identity of th3j35t3r as an individual, a group, a secret government program, or otherwise remains unknown and he remains “crack on” as he has commented with his DoS campaign against suspected jihadist websites.

 

 

Source:

http://h3r0d07u5.wordpress.com/2010/12/17/who-is-th3j35t3r/

Share this post


Link to post

IM BACCCKK! Here you go!!

 

Commentary | The hacking collective known as Anonymous renewed their war on the Westboro Baptist Church today. After the haters from the infamous church posted their intentions to picket the funerals of the twenty children killed in the shooting at the Sandy Hook Elementary School, Anonymous responded by re-posting the personal and professional information for members of the church on the Internet. Now the general public can contact the church members directly and tell them what they think about people who would desecrate the funerals of murdered children.

 

Westboro Baptist Church has been irritating Americans for years with venom filled message about their demented version of God. According to the many closely related and intermarried members of the Phelps family who make up the majority of the congregation of the so-called church, God enjoys killing children and soldiers. They constantly proclaim God hates homosexuals and plans to destroy America for not following the Westboro Baptist Church’s twisted version of Christianity. The incredible obsession with homosexuality expressed by Fred and family seems to many as a sure fire case of “thou dost protest too much.”

 

Anonymous has been after the Westboro Baptist Church for several months now, hacking their websites repeatedly. Recently, they accused the church of creating a fake letter from the hacking group in order to trick other hackers into attacking the website. Anonymous warned their supporters the church planned to harvest internet addresses and sue people. Suing people is apparently the primary activity of the Westboro Baptist Church when they aren’t screaming hate at funerals.

 

Of course, Westboro denied the charges and taunted Anonymous as incompetent hackers. They claimed their website was protected by God. Big mistake. A few days later, while a Westboro spokeswoman was boasting about how the church foiled Anonymous on a radio talk show, an Anonymous spokesman called in and hacked the church’s website in real time on the air.

 

Hopefully saner heads will prevail and nothing terrible will occur if the Westboro Baptist Church shows up in Newtown, Connecticut. The State Police made the extraordinary decision to assign a trooper to each of the victim’s families to prevent unwelcome idiots from tormenting them and to protect their privacy.

 

It is hard to imagine what kind of person would attend the funerals for these children and promote the hate filled message of the Phelps family and their followers. While we certainly do not condone illegal activity, it is hard not to root for Anonymous as they take it to these sad, pathetic excuses for human beings from the Westboro Baptist Church. If the Church’s website is offline forever, it wouldn’t be a moment too soon for most Americans.

Read more at http://www.inquisitr.com/440545/anonymous-hacks-the-westboro-baptist-church-posts-all-their-personal-information/#1daC9iUOtkehHAX3.99'>http://www.inquisitr.com/440545/anonymous-hacks-the-westboro-baptist-church-posts-all-their-personal-information/#1daC9iUOtkehHAX3.99

Source: http://www.inquisitr.com/440545/anonymous-hacks-the-westboro-baptist-church-posts-all-their-personal-information/

Share this post


Link to post

If only the gunman had targeted the Westboro church members and actually did Humanity a favor instead of killing these kids, the world would truly have been better off.

Share this post


Link to post
#CispaBlackout – Anonymous call for an Internet Black Out on Monday April 22nd

by anoninsiders

 

Greetings United States gov,

 

We are the Internet. Again, you are trying to pass this ridiculous CISPA law in order to control censor the people. This will not stand. You already control the medias, the economy, the criminal underworld, your national plots and our energy. YOU WILL NOT GET OUR INTERNET!

 

The U.S. law that would turn Google, Facebook, and Twitter into legally immune government spies just passed the House.

 

This bill affects everyone — not just U.S. citizens. Anyone with a Facebook account could now have their data shipped directly to the U.S. government. That’s why Internet users overwhelmingly oppose this bill. Over 1.5 million people signed petitions against it. But Congress didn’t listen. This law broadened the state terror and repression of the people. By allowing corporations to track our every doing on the internet the state and corporations will be merged and that we have seen before it is called facism

 

We are going dark on MONDAY April 22nd from 6 AM GMT for 24 hours to protest your illogical and terrorising bill against the Internet itself. Even with the whole Internet crying out to stop this BILL, the US House of Representatives failed to do so blinded by the lobbyist’s money and cum in your eyes. lel So we will take action ourselves and open your eyes. Every popular/mainstream website will be black until you, Mr. DronObama promise us to use your VETO power to stop this bill at Senate. Take this as a protest or a warning as you wish. One thing is for certain, you or anyone in this world cannot control the Internet so don’t even try. Stop wasting taxpayers’ money into doing these kind of stupid things.

 

We are Anonymous.

We are Legion.

We do not Forgive.

We do not Forget.

Expect us.

 

Source: https://anoninsiders.wordpress.com/2013/04/19/cispablackout-anonymous-call-for-an-internet-black-out-on-monday-april-22nd/

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×