Tag Archive: FBI


#Anonymous y sus tentáculos y brazos armados, lulzsec, sector404, etc etc, son como hienas, se devoran entre ellos mismos, previas ceremonias mutuas de sodomización…

Fuente: NacionRed
Artículo de Arnau Fuentes 9 de marzo de 2012 | 20:05
Las detenciones de miembros de LulzSec del pasado martes 6 de Marzo fueron debidas a que su auto-nombrado líder Sabu les delató al FBI ya que, al parecer, trabajaba para ellos desde el pasado verano. Pero, ¿cómo terminó Sabu trabajando para el FBI?
Pues resulta que una antigua componente de Anonymous, Jennifer Emick, logró poner cara, nombre y apellidos al nickname Sabu. Concretamente, Hector Xavier Monsegur, un puertorriqueño de 28 años, en paro y con dos hijos.
Emick participó en algunas manifestaciones de Anonymous en contra de la iglesia de la cienciología allá por 2008, pero cuando el grupo pasó a realizar sus conocidos ataques de denegación de servicio, se desencantó y lanzó un par de críticas que no gustaron nada.
Emick se unió a un grupo de antiguos integrantes de Anonymous descontentos, Backtrace Security, cuyo fin es dedicarse a delatar a miembros de Anonymous. Un amigo de Emick consiguió un fichero de logs de un canal de IRC en que miembros de LulzSec, incluido Sabu, comentaban el caso de la intrusión en los servidores de HBGary, en febrero de 2011.
Rebuscando por los registros del chat, Emick encontró un nombre de dominio curioso, que le llevó a un subdominio que contenía un mirror de una página web en la que Sabu publicaba fotos de su Toyota AE86, para enlazarlas desde una red social para amantes de los coches. A partir de ahí, logró encontrar la página de Facebook de Monsegur, la identidad real de Sabu.
En Marzo, Backtrace Security publicó una lista con nombres reales de integrantes de Anonymous, incluyendo a Hector, lo que les valió una llamadita del FBI pidiéndoles que retiraran la información de la web y se la entregaran.
Ya en junio, en Backtrace se sorprendieron que Sabu desapareciera de la noche a la mañana sin dejar rastro, pero aunque ellos habían estado siguiendo sus actividades y manteniendo la comunicación con la agencia federal, no supieron explicar esa desaparición.
La cosa es que el 7 de Junio de 2011, los federales lograron detener a Sabu, que pasó a disposición judicial hasta Agosto, en que se declaró culpable de los doce cargos que le imputaban. Esos cargos incluían la participación de Monsegur en acciones de Anonymous y LulzSec como el ataque a HBGary, The Tribune y la FOX, así como cierta relación en algunas actividades de apoyo a los rebeldes en la Primavera Árabe, en que se atacaron los servidores gubernamentales de Argelia y Túnez, y también de intentar acceder de forma ilegal a servidores de los gobiernos del Yemen y de Zimbabwe para encontrar vulnerabilidades.
Como no quería ir a la cárcel y que sus dos hijos tuvieran que pasar por la experiencia de ver a su padre encarcelado, accedió a trabajar para el FBI, que sustituyó el ordenador de Monsegur por otro que ellos controlaban. Y así fue como Sabu se pasó al lado oscuro.
Y llegó el momento Stratfor
Pero la cosa no terminó aquí. Jennifer Emick cuenta que el affaire Stratfor no está demasiado claro, e incluso apunta que todo podría haber sido preparado, una especie de cebo para que los Anonymous picaran y poder empezar a detener a más gente, ya que parece que desde Stratfor tuvieron conocimiento el mismo día de la brecha que terminó con la publicación de información sobre la agencia privada de seguridad e inteligencia.
Se ve que Sabu ‘volvió’ a la actividad, y eso levantó suspicacias entre la comunidad, que empezó a recelar de su antiguo colega especialmente cuando les emplazó a usar su servidor privado, alertándoles que sus ordenadores estaban controlados por el FBI, cuando en realidad era al revés.
Muchos empezaron a borrar discos duros, rastros y huellas para cortar cualquier posible relación con Monsegur, y empezaron a atar cabos, reconociendo que Emick identificó correctamente a Sabu, lo que le valió, a Jennifer, algunas críticas (así como la creación de un blog de burla y de una entrada propia en la Enciclopedia Dramática en la que se pinta a Emick como una narcisista con delirios de grandeza), como la que lanza But Housh, otro antiguo Anonymous:
Los datos apuntan a Backtrace Security. Eso cabrea a mucha gente, porque a ninguno de nosotros nos caen bien.
A partir de aquí, y ya en febrero, empezaron las detenciones en Anonymous que incluyeron a dos españoles y 21 latinoamericanos en el ambito de la operación policial internacional Exposure.
Y ya para terminar, las detenciones culminaron el pasado lunes, con cinco antiguos miembros de LulzSec detenidos entre el Reino Unido y los Estados Unidos de América, y el contra-ataque de Anonymous contra Panda Security.
Seguramente la historia no acabe con esos cinco detenidos. Anonymous, LulzSec, Antisec y otros grupos seguirán funcionando, y las relaciones humanas seguirán siendo tan complicadas como hasta ahora, a expensas de sentimientos encontrados que pueden causar que, dos personas que hasta anteayer fueron amigas del alma, pasado mañana terminen traicionándose la una a la otra. Y también que, como dice la ranchera, “a los zorros más astutos los atrapan con su gente“.
Via | Owni
CrimeHigh School Pals Targeted In FBI Hacktivist Probe. Plain text:

AUGUST 10–A trio of high school buddies are among the targets of on ongoing FBI probe into an online “Anonymous” assault carried out earlier this year against web sites of Koch Industries, the conglomerate owned by billionaire brothers Charles and David Koch, the influential Republican benefactors, The Smoking Gun has learned.
In simultaneous raids last month, federal agents searched the Long Island homes of three teenagers who have excelled academically at Bellport High School on Long Island’s South Shore. Agents removed an assortment of computer equipment from the respective homes in connection with the criminal investigation being run from the FBI’s Kansas City field office (Koch Industries is headquartered in Wichita).
As TSG reported last month, the FBI is probing a coordinated series of distributed denial of service (DDoS) attacks on Koch Industries web sites in February and March. The assault–organized by the so-called hacktivist group “Anonymous”–flooded several Koch Industries web sites with so many requests that it left the sites unavailable for legitimate visitors.
The web sites were targeted due to support provided by the Koch brothers to Wisconsin Governor Scott Walker, who earlier this year launched a crackdown on public employees unions. Calls to join the DDoS attack were repeatedly posted to the notorious “/b/” board on 4chan.org, which has proven to be a favored locale for mischief-making young men.
A confidential FBI affidavit, excerpted here, identifies a dozen “targets” of the bureau’s probe of the Koch Industries attack. The home addresses of the Long Island teenagers are included in the document along with the name of the respective parent in whose name Internet service is registered.
The father of one of the teenagers told TSG that he was “shocked” when a group of six investigators showed up at his home at 6 AM on July 19. During conversations with agents he learned the nature of the FBI probe and that raids were simultaneously being conducted at the nearby homes of two of his son’s close male friends. He added that he was unaware if the young men jointly participated in the Koch Industries attack.
The man’s 18-year-old son just graduated from Bellport High School and will soon begin studies at a university known for its engineering and technology programs. The teenager was a member of his high school’s science and math teams and was cited as one of the Class of 2011’s top students.
The two other teenagers, both 17, begin their senior years next month. They each have outstanding academic records and have been members of an assortment of clubs and “competition teams” in Latin, science, and math.
Reached by telephone yesterday, one of the boys’s fathers declined to comment about the FBI probe. The man, a veteran administrator at the federal Department of Energy’s Brookhaven National Laboratory, is mistakenly named as a “target” in the FBI affidavit since his residence’s Internet service is in his name. The other 17-year-old suspect did not respond to a message sent to his Facebook page seeking comment from either the teen or his parents.
While the Koch Industries investigation has yet to result in criminal charges, it appears certain that some of the targets will eventually be arrested for their alleged roles in the DDoS attack. The Long Island trio is likely concerned about their legal exposure since federal investigators have shown no hesitation in charging teenagers, including minors, in connection with illegal online operations orchestrated by “Anonymous.” (8 pages)

Anonymous & 4chan High School 

Pals Targeted In FBI Hacktivist Probe

Evidence 4chan.org is Anonymous

Feds Raid Boy’s Home Over 4chan Child Porn Post

Notorious site’s administrators sparked Homeland Security probe

JUNE 29–In what should serve as a warning to 4chan Nation, federal agents this month raided the home of a 15-year-old California boy who uploaded a single image of child pornography to the outlaw web site, whose administrators sparked the criminal probe, The Smoking Gun has learned.
Department of Homeland Security agents carried out the June 7 raid at the teenager’s Fresno home and seized the boy’s laptop and iPhone. The high school sophomore admitted posting the illegal image to 4chan, according to his father. Chris Glover, a 54-year-old contractor, also told TSG that agents discovered a folder on his son’s computer containing other illicit images.
According to an affidavit sworn by DHS Agent Calvin Kim, the boy uploaded an explicit photo of a naked prepubescent girl in late-February. Federal investigators learned about the post on 4chan’s “/b/” forum from the National Center for Missing & Exploited Children, which provides law enforcement agencies with tips about the online distribution of child pornography.
In turn, NCMEC itself was alerted to the teen’s posting from 4chan’s administrators, who turned over a copy of the photo along with the IP address from which the image was uploaded. Michelle Collins, vice president of NCMEC’s exploited children unit, said that the group has a “working relationship” with 4chan, and that the notorious site has been “cooperative.”
The resulting federal investigation led DHS agents to Fresno, where they used a battering ram on Glover’s front door during the early-morning raid. Glover, who said he was briefly handcuffed when agents came through his door, said that he was “outraged that they came with all that manpower” over a “single post.” A single parent, Glover acknowledged that he was unaware of his son’s online activities. “These kids have access to more than they should,” he said.
Glover described his son as a good student who enjoys playing “Call of Duty” and is a fan of the Comedy Central show “Tosh.0.” He said that DHS agents extensively questioned his son about his activities on 4chan, a site Glover said he had never heard of until federal agents raided his home. Glover added that, since the raid, he has not heard from federal investigators, so he is unaware whether his son could face criminal charges.    
Since the raid, Glover said his son has not been allowed online and that he has made sure to review the teen’s Facebook page. But Glover was unaware that his son had a Twitter page and used a handle including the phrase “Anus Destroyer.” In one tweet to Justin Bieber, the boy asked the singer to come to Fresno so that he could “destroy” the singer’s anus. (3 pages)

         Jun 22, 2011
From thesmokinggun.com child-porno 4chan

The 4chan user who admitted downloading illicit images of children from the notorious web site has been sentenced to three years in prison on a federal child pornography conviction, court documents show.
Collin Campbell, a Navy Machinist’s Mate, was arrestedin February after a folder containing “between 10-20 images of child pornography” was discovered on his iPhone by a fellow seaman aboard the USS Boxer in San Diego. During the ensuing Naval Criminal Investigative Service probe, Campbell admitted that he had downloaded child porn “from the website http://www.4chan.org.”
Campbell was sentenced last week by U.S. District Court Judge Larry Burns, who also ordered him to serve 10 years of probation upon his release from prison. Campbell, pictured in the above mug shot, faced a maximum of 20 years in custody.

NOVEMBER 3–After borrowing a fellow Navy man’s iPhone last month in order to play video games while aboard the USS Boxer, a sailor browsed through a folder titled “porn” and discovered his friend was in possession of illicit images of children, a discovery that has triggered a federal child porn investigation, records show.
When questioned by a Naval Criminal Investigative Service agent, Collin Campbell admitted to “downloading between 10-20 images of child pornography” that he claimed to have found on 4chan.org, the notorious image and message board. Campbell, pictured at right, is a Machinist’s Mate 2nd Class aboard the Boxer, a Navy warship currently docked in San Diego, but due for deployment in early-2011.
According to a U.S. District Court filing excerpted here, Campbell and fellow sailor William Vest were “in the Machinery Room, Cargo Weapons Elevator” on the Boxer on October 6 when Campbell “allowed Vest to use his personal cellular telephone, an iPhone 3G, in order to play video games while Campbell was also present playing video games on his iPod Touch.”
Vest, a Machinist’s Mate Fireman, told NCIS investigators that, after about 20-30 minutes playing video games, he “began opening pictures contained within the cellular telephone.” While browsing through the “porn” folder, Vest opened 5-6 images showing “what he believes to be child pornography.” Vest provided a detailed description of the images to Gerald Martin, who is identified in court records as the NCIS “Special Agent Afloat aboard the USS Boxer.”
Vest said that he initially considered speaking with Campbell about the photos, but “he thought that
if he did, Campbell may dispose of the evidence or would get Vest in trouble since Campbell is of higher rank than him,” according to the court filing.
On October 15, NCIS agents seized “several items of electronic media…from Campbell’s person and berthing area” on the USS Boxer. During an interview with investigators, Campbell reportedly copped to possessing child porn and “alleged he obtained all those images from the website http://www.4chan.org.” He added that the images were on his iPhone and a personal computer in his home in National City, a San Diego suburb.
Campbell, who was previously stationed on the carrier USS Kitty Hawk, did not respond to a Facebook message seeking comment about the ongoing NCIS probe. It is unclear whether Campbell is aware of Vest’s cooperation with investigators, since Vest’s name is still included among the 58 friends listed on Campbell’s Facebook page. (4 pages)
[11/5 UPDATE: In an e-mail today, Ed Buice, an NCIS public affairs officer, confirmed the agency’s probe of Campbell, but said that no charges have been filed against the sailor, who is not in custody.]