If I am Wrong… I’ll say I’m Wrong. Here’s my apology. |RE Sabu by th3j35t3
You can be a king or a street sweeper, but everybody dances with the Grim Reaper. – Robert Alton Harris
First order of business….Wally? Are you taking the piss? (or what?)
On July 13th 2011 - I stated via my blog post here that:
“IF or when the time to apologize to Hugo comes. I will humbly be the second to do so. @anonymouSabu will be the first …..”
Actual instance of that quote by me right here.
I stand corrected – In light of further information and investigations ongoing, I am now more than comfortable with apologizing before @anonymouSabu as suits him that there is confusion, which I will, before the end of this post, attempt to clear up.
In the meantime….
Sincerest apologies from myself and on behalf of the wider group go to Mr Hugo Carvalho (@visigod) – who many of us have previously believed to be the leader of Lulzsec, the group that sprung outta #Anonymous and have, and continue to release amongst many other things innocent folks CC nums, login credentials, emails, …. and the list goes on. In the name of what?
Antisec? #OWS? #Anonymous? – either way google it.
In essence… to Mr Carvalho. I officially apologize. You got caught up in something nothing to do with you. But make no mistake, you were caught up in it because @anonymouSabu used that domain sale purchase to fit you up. Also notice how he has never sprung to your defense. That’s because your ‘involvement’ suited his misinformation campaign.
I myself have been ‘doxed’ at least 15 times by #anonymous and supporters, always incorrectly and I always defend the poor person they somehow finger as me.
So why would I apologize, when I really have no need to, nobody gives a shit right?
Because I said I would….
Because the person behind @anonymouSabu is feeling the heat, not least because of what he did…. but also because of what he didn’t, in four months (as of now) he still hasn’t cared that another innocent guy was (by his doing) fingered as him. << Pro-tip. bad skillz. Bad Karma.
Lets get right to it….
(tick tock… 6͎̫̹̏ͦ̿̈́͗̚͠9̜̙͈͓̫̼̼ͮ̓͗̽͂̓ͨ͢4̥͙̔͊̋9̣̖͈́̾1̙̔̈͒̌5̥̣͈̮͔͈̯ͩ̈ͩd͇̲͚͖̉ͧͥ7̐͠d4͌a̙̪̫̫̝̭̓̐͂ͫ̈ͭ͞ͅc̹͔̈ͯ̏̈̓̄ͅf̱5͖͓̣͕̾̊̉̓̂͟0͆̀b̟̯̱̗͇ͤ͋̊͟b̕f͈̩̼̮͖̿̋͒4̩͍̰ͣ̏͑̾ͥͮ̽3̜̞͓͎̎̋̌̈͆͠a̛̯͎̠ͪ1̲̞̹͖̠͙̽̃̑͋͗ͤ͌ͅ0̢̼͖̮3͏͙̱̤8̱ͭ͑ͣ͗̀e͎̦̫̯͓̋̔3͖̘͎ͯ͐̓e̞͖͉̲̰͚̅͋̔͐̐͊9̗̊͊͊ͫ̄̐f̨1͚͎͑̊ͦ͗7̫̈̃̿)
In support of my heartfelt and necessary apology to Mr Hugo Carvalho…
So…..a lot of info has been gathered in a short space of time, remember, I dropped the name ‘Monsegur’ 4/5 months ago…
and @anonymouSabu never once defended him. The secondary name in above linked post was ‘Hector Monesgur’ – granted a family name.
But on the strength of those convictions, over time …we softly softly… (ps – don’t fear the Reaper(sec)) Sabu, AKA @anonymouSabu, thinks that he’s fighting for the right cause. He’s helped “compromise” many systems. He’s helped “compromise” many companies. He’s helped “compromise” many people, all under the mask (no Anonymous pun intended) of fighting for freedom for the people
All Sabu has succeeded in is helping to “compromise” himself. Let’s take a look at http://pastehtml.com/view/be43yl8ph.html real quick.
This dump was received on November 15, 2011, from an apparent snag that happened on November 5, 2011.
When Anonymous fought back against AnonOps. You see, the thing about AnonOps is that they have become power hungry little skiddies are more enthralled with their “cool kids club” than with actually performing acts to support the Anonymous idea and cause.
So a rogue hacker or group of hackers performed an attack on the AnonOps server and helped produce the afformentioned dump. (Kudos to whoever got this lovely bit of information. Over 4000 idents exposed. Kinda cutting it short on the 9001 collective legion, though, aren’t we AnonOps?)
Back to the point. If you will go to the dump link above and search for “compromise@gmail.com” you will find that it’s the email used by Sabu to register his nick. Why would this be important? Well lets take a look at some information from the past, shall we?
http://pastebin.com/vLXBqbeB – Pastebin link entitled SABU Xavier Monsegur
http://pastebin.com/911rucP3 – Pastebin link entitled Lulzsec / Sabu – new info
http://seclists.org/fulldisclosure/2006/Oct/253 – Full Disclosure link showing Xavier asking questions about things that fall in line with Sabu’s mindset. Notice the questions about Hamas, jihad, etc.
http://www.velocityreviews.com/forums/t357473-memory-leak-in-python.html – Link to a forum thread discussing python, which is known to be a favorite of Sabu’s. Please note that the question asking to paste an example of the code comes from compromise@gmail.com
http://ceaxx.wordpress.com/uncovered/ – Possibly the biggest hunk of research into Sabu’s identity out there. (Extreme props to the author of this post.)
http://seclists.org/fulldisclosure/2006/Jun/177 – Another Full Disclosure link about XSS (Cross Site Scripting) flaws in (back then) major websites.
http://seclists.org/fulldisclosure/2005/Dec/989 – Another Full Disclosure link about XXS in Myspace
http://www.securityfocus.com/archive/1/archive/1/440126/100/0/threaded – More posted from compromise@gmail.com with xavier@tigerteam Links linking links.
http://www.nytimes.com/2007/10/01/nyregion/01banned.html – Dad is banned from seeing his mother due to drug convictions.
http://www.nytimes.com/imagepages/2007/10/01/nyregion/01bannedCA02ready.html – Pic of grandmom holding pics of Dad and Sabu
http://ceaxx.files.wordpress.com/2011/08/sabu.png – From the above blog post (and Sabu’s old Myspace) Kinda looks like the kid in the pic that grandmom is holding up, don’t you think?
Thanks to the post at http://ceaxx.files.wordpress.com and…..
http://pastehtml.com/view/be43yl8ph.html which is the dump created by a rogue Anonymous member fed up with the direction that AnonOps has been taking the Anonymous movement.
All possible from a single seed…
The idealogy behind Anonymous can be considered a valiant one, even if the delivery is not something to be admired. It took a member of the group to fight back against the injustices that Sabu and AnonOps have been pushing the group towards.
Instead of moving forward, it’s just continued to move backwards. I am sure that Sabu never thought that he could be a victim to a “compromise” such as this one.
Then again, what do I know? I’m just another writer in a sea of watchers monitoring the happenings between the proverbial good and evil. With the good majority of Sabu’s former clique already caught by law enforcement (Topiary, kayla, tflow, etc.) only time will tell if Sabu/Xavier will meet the same fate.
Did I not tell ya? 4 months ago?
But my favorite tell after all these months..
Only 2 nights agoCLICK HERE TO SEE IT LARGE! – CMON? TELL ME I WRONGZ?
@anonymouSabu right here:
.
There’s an unequal amount of good and bad in most things….. the trick is to figure out the ratio an act accordingly.
DON’T FEAR THE REAPER
BE FROSTY.
J
UPDATE 11/21/11
The facebook profile above and the link and timings between that and @anonymousabu‘s twitter account had me interested. I decided there HAD to be more interesting ‘coincidences’ like this one:Another closer look at this post to twitter from Sabu 3 days ago.
https://scribe.twitter.com/#!/anonymouSabu/status/137346759360905217
Ooops.
Food for thought, why did Sabu spend no time to defend Hugo Carvalho in 4 months….but in 3 days has spent a lot of time on IRC channels refuting he is Monsegur?
Also why has Monsegur not publically on any of his profiles denied being Sabu – anywhere?
.
.
Portions of this post cross-posted from ReaperSec
th3j35t3r.wordpress.com
NEW ANONYMOUS IRC SERVER HOWTO
A NEW ANONYMOUS IRC SERVER HOWTO
HOW TO LOG INTO THE ANONYMOUS NEW IRC SERVERS!
USING GNU/LINUX – Ubuntu: (if using other distro just check http://www.i2p2.de/download.html) and skip the install part of this doc.
Adding the PPA via the command line and installing I2P
Open a terminal and enter:
sudo apt-add-repository ppa:i2p-maintainers/i2p
This command will add the PPA to /etc/apt/sources.list.d and fetch the gpg key that the repository has been signed with. The GPG key ensures that the packages have not been tampered with since being built.
Notify your package manager of the new PPA by entering
sudo apt-get update
This command will retrieve the latest list of software from each repository that is enabled on your system, including the I2P PPA that was added with the earlier command.
You are now ready to install I2P!
sudo apt-get install i2p
Adding the PPA Using Synaptic
Open Synaptic (System -> Administration -> Synaptic Package Manager).
Once Synaptic opens, select Repositories from the Settings menu.
Click the Other Sources tab and click Add and paste:
ppa:i2p-maintainers/i2p
into the APT-line field and click Add Source. Click the Close button then Reload.
In the Quick Filter box, type in i2p and press enter. When i2p is returned in the results list, right click i2p and select Mark for Installation. After doing so you may see a Mark additional required changes? popup. If so, click Mark then Apply.
now SETUP ANONS IRC
download this script to make things easier or copy and paste into a .sh file
————————– START filename: add_irc_tunnel.sh and chmod +x ——————
#!/usr/bin/env bash
if [[ "$#" -lt "3" ]]; then
cat << EOF
USAGE:
./$(basename $0) <path> <host> <port>
ARGS:
path ……. Full path to your i2p tunnel list, if you have already
ran I2P before this script, you may have to use
/home/<user>/.i2p/i2ptunnel.config
host ……. The IRC server’s address you want to access
port ……. A local open port to use
EXAMPLE:
./$(basename $0) “/etc/i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
EOF
exit 0
fi
die() { # shout bloody messages
echo -e “\e[1;31mERROR:\e[0;31m $1 \e[0m \n"
exit 1
}
run_checks() { # brain check
[[ "${I2PTUNNEL##*/}" != "i2ptunnel.config" ]] && die “Wrong file”
[[ ! -w "$I2PTUNNEL" ]] && die “$I2PTUNNEL : No write permission.”
[[ "$IRC_HOST" != @(*.*) ]] && die “$IRC_HOST : Not a valid hostname.”
[[ "$LOCAL_PORT" -eq 6668 || "$LOCAL_PORT" -lt 1024 || "$LOCAL_PORT" -gt 65535 ]] && die “$LOCAL_PORT : Invalid port.”
[[ "$NUM" -lt 7 ]] && die “$NUM : Not a valid tunnel identifier.”
}
add_tunnel() {
cat >> “$I2PTUNNEL” << EOF
tunnel.${NUM}.name=IRC Proxy
tunnel.${NUM}.description=
tunnel.${NUM}.type=ircclient
tunnel.${NUM}.sharedClient=false
tunnel.${NUM}.interface=127.0.0.1
tunnel.${NUM}.listenPort=${LOCAL_PORT}
tunnel.${NUM}.targetDestination=${IRC_HOST}
tunnel.${NUM}.i2cpHost=127.0.0.1
tunnel.${NUM}.i2cpPort=7654
tunnel.${NUM}.option.inbound.nickname=IRC Proxy
tunnel.${NUM}.option.outbound.nickname=IRC Proxy
tunnel.${NUM}.option.i2cp.closeIdleTime=1200000
tunnel.${NUM}.option.i2cp.closeOnIdle=true
tunnel.${NUM}.option.i2cp.delayOpen=true
tunnel.${NUM}.option.i2cp.newDestOnResume=false
tunnel.${NUM}.option.i2cp.reduceIdleTime=600000
tunnel.${NUM}.option.i2cp.reduceOnIdle=true
tunnel.${NUM}.option.i2cp.reduceQuantity=1
tunnel.${NUM}.option.i2p.streaming.connectDelay=1000
tunnel.${NUM}.option.i2p.streaming.maxWindowSize=16
tunnel.${NUM}.option.inbound.length=3
tunnel.${NUM}.option.inbound.lengthVariance=0
tunnel.${NUM}.option.outbound.length=3
tunnel.${NUM}.option.outbound.lengthVariance=0
tunnel.${NUM}.startOnLoad=true
EOF
}
#[ VARIABLES ]#
I2PTUNNEL=$1 # path to our i2ptunnel.config file
IRC_HOST=$2 # our irc i2p hostname
LOCAL_PORT=$3 # our local port
# A default i2p installation already has 7 tunnels, labeled from 0 -> 6
# default is set to num=7 unless our 4th argument changes it.
NUM=${4:-7}
#[ MAIN ]#
run_checks # make sure the user used their brain before keyboard
add_tunnel # add our irc tunnel to their i2p tunnel list
echo “Done.”
exit 0
—————————— END ————————————–
ok now to this script when you run it as “sudo” or with toor priviledges
the options are”
./add_irc_tunnel “/etc/i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
or
./add_irc_tunnel “/home/$yourusername_here/.i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
now download X-chat, iircII, Kvirc, BitchX or whatever is the IRC client you like to use
and configure it to use:
host: localhost
port: 6669
and to auto join channels:
#aaa
#anonops
#AnonAnarchistAction
#opmonsanto
#legionnet (soon)
etc for more channels when you are already log into IRC type
/list
or start your own ;-)
here there is an image with how should it look on the i2p config:
at the i2ptunnel tab look for the client tunnels you will see http https and two IRC ones..
open the IRC you just created.
HOW TO LOG INTO THE ANONYMOUS NEW IRC SERVERS!
USING GNU/LINUX – Ubuntu: (if using other distro just check http://www.i2p2.de/download.html) and skip the install part of this doc.
Adding the PPA via the command line and installing I2P
Open a terminal and enter:
sudo apt-add-repository ppa:i2p-maintainers/i2p
This command will add the PPA to /etc/apt/sources.list.d and fetch the gpg key that the repository has been signed with. The GPG key ensures that the packages have not been tampered with since being built.
Notify your package manager of the new PPA by entering
sudo apt-get update
This command will retrieve the latest list of software from each repository that is enabled on your system, including the I2P PPA that was added with the earlier command.
You are now ready to install I2P!
sudo apt-get install i2p
Adding the PPA Using Synaptic
Open Synaptic (System -> Administration -> Synaptic Package Manager).
Once Synaptic opens, select Repositories from the Settings menu.
Click the Other Sources tab and click Add and paste:
ppa:i2p-maintainers/i2p
into the APT-line field and click Add Source. Click the Close button then Reload.
In the Quick Filter box, type in i2p and press enter. When i2p is returned in the results list, right click i2p and select Mark for Installation. After doing so you may see a Mark additional required changes? popup. If so, click Mark then Apply.
now SETUP ANONS IRC
download this script to make things easier or copy and paste into a .sh file
————————– START filename: add_irc_tunnel.sh and chmod +x ——————
#!/usr/bin/env bash
if [[ "$#" -lt "3" ]]; then
cat << EOF
USAGE:
./$(basename $0) <path> <host> <port>
ARGS:
path ……. Full path to your i2p tunnel list, if you have already
ran I2P before this script, you may have to use
/home/<user>/.i2p/i2ptunnel.config
host ……. The IRC server’s address you want to access
port ……. A local open port to use
EXAMPLE:
./$(basename $0) “/etc/i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
EOF
exit 0
fi
die() { # shout bloody messages
echo -e “\e[1;31mERROR:\e[0;31m $1 \e[0m \n"
exit 1
}
run_checks() { # brain check
[[ "${I2PTUNNEL##*/}" != "i2ptunnel.config" ]] && die “Wrong file”
[[ ! -w "$I2PTUNNEL" ]] && die “$I2PTUNNEL : No write permission.”
[[ "$IRC_HOST" != @(*.*) ]] && die “$IRC_HOST : Not a valid hostname.”
[[ "$LOCAL_PORT" -eq 6668 || "$LOCAL_PORT" -lt 1024 || "$LOCAL_PORT" -gt 65535 ]] && die “$LOCAL_PORT : Invalid port.”
[[ "$NUM" -lt 7 ]] && die “$NUM : Not a valid tunnel identifier.”
}
add_tunnel() {
cat >> “$I2PTUNNEL” << EOF
tunnel.${NUM}.name=IRC Proxy
tunnel.${NUM}.description=
tunnel.${NUM}.type=ircclient
tunnel.${NUM}.sharedClient=false
tunnel.${NUM}.interface=127.0.0.1
tunnel.${NUM}.listenPort=${LOCAL_PORT}
tunnel.${NUM}.targetDestination=${IRC_HOST}
tunnel.${NUM}.i2cpHost=127.0.0.1
tunnel.${NUM}.i2cpPort=7654
tunnel.${NUM}.option.inbound.nickname=IRC Proxy
tunnel.${NUM}.option.outbound.nickname=IRC Proxy
tunnel.${NUM}.option.i2cp.closeIdleTime=1200000
tunnel.${NUM}.option.i2cp.closeOnIdle=true
tunnel.${NUM}.option.i2cp.delayOpen=true
tunnel.${NUM}.option.i2cp.newDestOnResume=false
tunnel.${NUM}.option.i2cp.reduceIdleTime=600000
tunnel.${NUM}.option.i2cp.reduceOnIdle=true
tunnel.${NUM}.option.i2cp.reduceQuantity=1
tunnel.${NUM}.option.i2p.streaming.connectDelay=1000
tunnel.${NUM}.option.i2p.streaming.maxWindowSize=16
tunnel.${NUM}.option.inbound.length=3
tunnel.${NUM}.option.inbound.lengthVariance=0
tunnel.${NUM}.option.outbound.length=3
tunnel.${NUM}.option.outbound.lengthVariance=0
tunnel.${NUM}.startOnLoad=true
EOF
}
#[ VARIABLES ]#
I2PTUNNEL=$1 # path to our i2ptunnel.config file
IRC_HOST=$2 # our irc i2p hostname
LOCAL_PORT=$3 # our local port
# A default i2p installation already has 7 tunnels, labeled from 0 -> 6
# default is set to num=7 unless our 4th argument changes it.
NUM=${4:-7}
#[ MAIN ]#
run_checks # make sure the user used their brain before keyboard
add_tunnel # add our irc tunnel to their i2p tunnel list
echo “Done.”
exit 0
—————————— END ————————————–
ok now to this script when you run it as “sudo” or with toor priviledges
the options are”
./add_irc_tunnel “/etc/i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
or
./add_irc_tunnel “/home/$yourusername_here/.i2p/i2ptunnel.config” “irc.anon-anarchist-action.i2p” “6669″
now download X-chat, iircII, Kvirc, BitchX or whatever is the IRC client you like to use
and configure it to use:
host: localhost
port: 6669
and to auto join channels:
#aaa
#anonops
#AnonAnarchistAction
#opmonsanto
#legionnet (soon)
etc for more channels when you are already log into IRC type
/list
or start your own ;-)
here there is an image with how should it look on the i2p config:
at the i2ptunnel tab look for the client tunnels you will see http https and two IRC ones..
open the IRC you just created.
Capt Ray Lewis Joins OWS Protest
Name: | Capt Ray Lewis Joins OWS Protest |
Description: . If that’s not Pulitzer-worthy photography–capturing the true insanity of today–then we don’t know our Pulitzers. http://www.observer.com/2011/11/former-philadelphia-police-captain-ray-lewis-arrested-ows/ Capt Ray Lewis Joins OWS Protest,Gives Message to NYPD and Slams The Greed 1% from Zuccotti Park Capt Ray Lewis twitter account: https://twitter.com/#!/CaptainRayLewis Jesse LaGreca interviews Captain Ray Lewis about social justice, capitalism, and police brutality at Occupy Wall Street. shot and edited by Melissa Ulto www.globalrevolution.tv www.multo.com google for Videos Former Captain Ray Lewis Charged With Three Violations After OWS Protest.pdf Former Philadelphia Police Captain Ray Lewis, In Cuffs.pdf Former Police Captain and Current OWS Protester Ray Lewis Arrested.pdf Retired Police Captain Ray Lewis Alive and Well.pdf Captain Ray Lewis and Jesse LaGreca at GRTV Nov 15 2011.flv Former Philadelphia Police Captain Ray Lewis Joins With Occupy Wall Street Protesters.flv Fox 5 Shocked By Dirty Mouths of Occupiers; Might Have a Problem Down on Wall Street.mp4 Officer – Occupier Captain Raymond Lewis.flv |
Related articles
- OWS: NYPD arrest retired Philadelphia Police Captain Ray Lewis (dangerousminds.net)
- Retired Police Captain Ray Lewis Has Been Released From NYPD Custody And Will Rejoin The Protesters (businessinsider.com)
- one cop went to jail this week (busblog.tonypierce.com)
- Ret. Police Captain Arrested at OWS (stevebeckow.com)
- Former Philadelphia Police Captain Joins Occupy Protesters, Gets Arrested (kaystreet.wordpress.com)
- Police Mercenaries: Privatizing Liberty (crooksandliars.com)
- Pulitzer Prize Exposed: Award-Winning Left-Wing Journalist at Star Ledger Reveals Political Bias to Undercover Reporter (rogueoperator.wordpress.com)
Government Orders YouTube To Censor Protest Videos
Government Orders YouTube To Censor Protest Videos
By: Paul Joseph WatsonIn a frightening example of how the state is tightening its grip around the free Internet, it has emerged that You Tube is complying with thousands of requests from governments to censor and remove videos that show protests and other examples of citizens simply asserting their rights, while also deleting search terms by government mandate.
The latest example is You Tube’s compliance with a request from the British government to censor footage of the British Constitution Group’s Lawful Rebellion protest, during which they attempted to civilly arrest Judge Michael Peake at Birkenhead county court.
Peake was ruling on a case involving Roger Hayes, former member of UKIP, who has refused to pay council tax, both as a protest against the government’s treasonous activities in sacrificing Britain to globalist interests and as a result of Hayes clearly proving that council tax is illegal.
Hayes has embarked on an effort to legally prove that the enforced collection of council tax by government is unlawful because no contract has been agreed between the individual and the state. His argument is based on the sound legal principle that just like the council, Hayes can represent himself as a third party in court and that “Roger Hayes” is a corporation and must be treated as one in the eyes of the law.
The British government doesn’t want this kind of information going viral in the public domain because it is scared stiff of a repeat of the infamous poll tax riots of 1990, a massive tax revolt in the UK that forced the Thatcher government to scrap the poll tax altogether because of mass civil disobedience and refusal to pay.
When viewers in the UK attempt to watch videos of the protest, they are met with the message, “This content is not available in your country due to a government removal request.”
We then click through to learn that, “YouTube occasionally receives requests from governments around the world to remove content from our site, and as a result, YouTube may block specific content in order to comply with local laws in certain countries.”
You can also search by country to discover that Google, the owner of You Tube, has complied with the majority of requests from governments, particularly in the United States and the UK, not only to remove You Tube videos, but also specific web search terms and thousands of “data requests,” meaning demands for information that would reveal the true identity of a You Tube user. Google claims that the information sent to governments is “needed for legitimate criminal investigations,” but whether these “data requests” have been backed up by warrants is not divulged by the company.
“Between July 1 and Dec. 31 (2009), Google received 3,580 requests for user data from U.S. government agencies, slightly less than the 3,663 originating from Brazil,” reports PC World. “The United Kingdom and India sent more than 1,000 requests each, and smaller numbers originated from various other countries.”
With regard to search terms, one struggles to understand how a specific combination of words in a Google search can be considered a violation of any law. This is about government and Google working hand in hand to manipulate search results in order to censor inconvenient information, something which Google now freely admits to doing.
You Tube’s behavior is more despicable than the Communist Chinese, who are at least open about their censorship policies, whereas You Tube hides behind a blanket excuse and doesn’t even say what law has been broken.
Anyone who swallows the explanation that the videos were censored in this case because the government was justifiably enforcing a law that says scenes from inside a court room cannot be filmed is beyond naive. Court was not even in session in the protest footage that was removed, and the judge had already left the courtroom.
The real reason for the removal is the fact that the British government is obviously petrified of seeing a group of focused and educated citizens, black, white, old and young, male and female, go head to head with the corrupt system on its own stomping ground.
In their efforts to keep a lid on the growing populist fury that has arrived in response to rampant and growing financial and political tyranny in every sector of society, governments in the west are now mimicking Communist Chinese-style Internet censorship policies in a bid to neutralize protest movements, while hypocritically lecturing the rest of the world on maintaining web freedom.
Via a combination of cybersecurity legislation and policy that is hastily introduced with no real oversight, governments and large Internet corporations are crafting an environment where the state can simply demand information be removed on a whim with total disregard for freedom of speech protections.
Read More Here
credits@^^
Related articles
- Youtube/Google Censors My Videos! (survivalist.wordpress.com)
- Government Criticism Censored on Youtube !!! (2012patriot.wordpress.com)
- Leaked YouTube Redesign Shows Google+, Facebook Integration (readwriteweb.com)
- Google reveals YouTube terror crackdown (telegraph.co.uk)
NYPD Patrol Guide Procedure 203-09: Officers Must Courteously Identify Themselves.
NYPD Patrol Guide Procedure 203-09: Officers Must Courteously Identify Themselves.
Civilians filed 231 allegations of “refusal to provide name and/or shield number” in 1999, 349 in 2000, 468 in 2001, and 636 in 2002, a 175% increase in just four years and an 82% increase in the last three years. During these same years, refusal to provide name and/or shield number constituted less than one percent, 5%, 8%, and 10% of all allegations the board substantiated. These increases led the CCRB to take a closer look at this allegation and summarize its findings in this report. As the basis for this mini-study, the agency chose to examine all complaints in which the civilian filed this allegation that the board closed after a full investigation between January 1 and June 30, 2002.
A word must first be said about the legal landscape in which this allegation exists. The New York City Police Department Patrol Guide, procedure 203-09 (Public Contact—General), states that officers must “give name and shield number to anyone requesting them.” New York City’s Office of Administrative Trials and Hearings (“OATH”) has issued a number of recent opinions that examine what this patrol guide procedure requires of officers. In essence, these cases have held that the patrol guide procedure imposes an “affirmative obligation” to “give name and shield number to anyone requesting them;” in other words, a demand for a name or badge number demands an “affirmative response.”
…
1. As a result of a recommendation contained in the 2002 “New York City Civilian Complaint Review Board’s Status Report” and in order to claritY the obligation of members of the service to provide their name and shield number to the public, Patrol Guide procedure 203-09, “Public Contact- General” has been revised.
2. Therefore, effective immediately, Patrol Guide procedure 203-09, “Public Contact – General,” is amended as follows:
a. REVISE current step “1″, page “1″ to read:
“PUBLIC CONTACT
1. Courteously and clearly state your rank, name, shield number and command, or otherwise provide them, to anyone who requests you to do so. Allow the person ample time to note this information.”
3. Any provisions of the Department manual or other Department directive in conflict with the contents of this order are suspended.
Related articles
- Police face criticism in clash with protesters (seattletimes.nwsource.com)
- Asking an Oakland PD officer why he’s hidden his badge (boingboing.net)
- Oakland Police WERE Hiding Their Names With Tape During Wednesday’s Strike (businessinsider.com)
- Man sues, says SPD conceals dash-cam videos (seattletimes.nwsource.com)
- International Association of Chiefs of Police Owned (legionnet.wordpress.com)
- DEF CON 19: Hide Your Passwords. Hide Your Laptop. Hide Your Phone. They’re Hacking Er’body Out Here (thetechscoop.net)
- Antisec Messes with Texas, Attacks Dozens of Police Systems and Chief Emails (edmortimer.wordpress.com)
Law enforcement guidelines and user tracking in social media
Law enforcement guidelines and user tracking in social media
This article was written by e-lena“Internet is the greatest spying machine the world has ever seen. Facebook in particular is the most appalling spying machine that has ever been invented.” Julian Assange.
A button is generally expected to be “a user interface element that provides the user a simple way to trigger an event” [1] In case of Facebook the understanding of “a button” seems to be essentially different and obviously a part of a bigger stategy.
This article discusses the importance of the “triggering”-event”, if it comes to the exposure of personal information, and how Facebook is going around it. It is not about using or not using this service, but simply about the neccessity to understand the personal conseqences in the light of the current and future law enforcement climate inbetween the shrinking substance of civil rights.
Twitter’s resistance to the US-issued secret gag order
The company earned a spotlight of public interest, as a subpoena [7] issued from the U.S. Justice Department against 5 people associated with Wikileaks became public on January 7, 2011 thanks to Twitter’s reaction. Twitter fought to get an unsealing order [2] and notified the targeted persons (Julian Assange, Bradley Manning, Icelandic MP Brigitta Jonsdottir, Rop Gonggrijp, Jacob Appelbaum) about the subpoena. (And why wasn’t Daniel Domscheit-Berg one of those?). Probably the company realized that not only these 5 individuals, but the personal information of around 637,000 Twitter-users was to be released for the purpose of some secret “ongoing investigations on WikiLeaks” [3]. The investigators had to drop the unsealing order, but after the Judge Theresa Buchanan rejected the petition against the subpoena on March 11, 2011 [6], all requested information had indeed to be made legally accessible for to the Justice Department in the USA without any further public knowledge about this secret investigation. According to to people familiar with the investigation, says Thetechherald , Twitter still hasn’t turned over information from the accounts of Mr. Appelbaum, Ms. Jonsdottir and Mr. Gonggrijp.
Accompanied by a national security letter the Twitter subpoena contained a gag order, preventing its recipient from disclosing the existence of the subpoena to the public. This fact quickly raised the question, how many organizations might have been not so bold and fair to its users as Twitter and led WikiLeaks to demand Google and Facebook to reveal the contents of any US subpoenas they have received: “Note that we can assume Google & Facebook also have secret US government subpeonas. They make no comment. Did they fold?” [8]
“Facebook Law Enforcement Guidelines”
Facebook didn’t respond. Considering the known details of possible activities of Bradley Manning in Facebook [9] it is simply logical that the investigation couldn’t have left Facebook out. Unknown is how many orders Facebook had already secretely served and how many of its users are already monitored and striped of their privacy. One leaked document gives at least an insight into what personal information the 5 Wikileaks’ associates as well as their Facebook-”Likers” or the 637,000 Twitter-Followers have been most probably deprived from.“Facebook Law Enforcement Guidelines”, a CONFIDENTIAL paper leaked first time through Cryptome, shows that there has been a completely routinised way to handle subpoenas by Facebook already before 2007 as the change log of the guide suggests. It shows clearly that Facebook has had opportunities to learn and to improve its process of handling the subpoenas. The guide for 2007 lists the improvements achieved prior to this year such as:
- Added “Special Request” section
- new IP search functionality
- suggested subpoena language for each request category
- Neoprint description to include share, notes and gifts…
Since 2008 the list of services and data available for prosecutors widened and features from there on an option to spy: “If disabling or restricting user access to the user’s profile will jeopardize your investigation, you should clearly specify “DO NOT DISABLE UNTIL XX/XX/XXXX” on your request.” [11]
NOTE: this article is not completely published yet due to the volume of submitted information. The rest is following within next hours…
You are welcomed to participate:
http://piratenpad.de/facebook-user-tracking
“Our No. 1 enemy is ignorance.” Julian Assange
Sources:
[1] Wikipedia, last retrieved 03.02.2011
[2] Twitter Unsealing Order, Why Twitter was the only company to challenge the secret wikileaks subpoena
[3] Wikipedia: Twitter subpoena
[4] Twiter’s opinion
[5] WikiLeaks demands Google and Facebook unseal US subpoenas
[6] Wikileaks: court upholds us subpoena for twitter records
[7] Glenn Greenwald Twitter subpoena
[8] Twitter message from Wikileaks
[9] Wired: chat logs between Manning and Lamo
[10] Confidential Facebook Law Enforcement Subpoena Guides 2007-2010
[11] Confidential Facebook Law Enforcement Subpoena Guide 2010
[12] Facebook Developers-Blog: http://developers.facebook.com/blog/post/494/
[13] ECPA: Law Enforcement Intercepting Content
[14] Secret Orders Target Email, 10.Okt.2011, The Wall Street Journal, By JULIA ANGWIN
Related articles
- US court verdict ‘huge blow’ to privacy, says former WikiLeaks aide | World news | guardian.co.uk (mbcalyn.com)
- Court makes it official: You have no privacy online (gigaom.com)
- Twitter WikiLeaks Subpoenas of the Day (geeks.thedailywh.at)
- Judge Rules Feds Can Have WikiLeaks Associates’ Twitter Data (wired.com)
- Second judge gives DOJ access to Wikileaks-related Twitter accounts (news.cnet.com)
- Judge rules Feds can have WikiLeaks associates’ Twitter data (arstechnica.com)
- U.S. judge upholds Twitter subpoena of Wikileaks’ followers (zdnet.com)
- DoJ’s WikiLeaks Probe Widens to Include Gmail, ISP (wired.com)
- U.S. Judge upholds investigators’ access to Twitter data (infoworld.com)
- Justice Department Wins Access to Twitter Info in Wikileaks Probe (blogs.wsj.com)
Insecure.SE.Ring.Selling.P2L.Ran.By.Blakdeath-NiCEMUSTANG
Okey lets start, this time the headlights are on a lowlife insecure
pole smoker called BlakDeath.
This insecure prick has been bothering the scene for a while, so its
time to clean shit up.
This notice is a headsup to whats coming for Zach Harris and his
imbecile friends.
———-
Personal Info.
NickName: BlakDeath
Name: Zachary S Harris, 26 Yrs Old
Address: 3 Cairn Ct, Trenton, NJ, United States, 08619
Family: George R Harris, Linda L Harris
Vehicle: 20XX Mustang, Metallic Grey
We wont go as far as publishing his photos, facebook profile or phone
numbers, but you can find that easily enough.
You can see the vehicle parked out the front of his place if you search
for “3 Cairn Ct, Trenton, NJ, United States, 08619″ on
http://www.bing.com/maps/ click on ‘birds eye’, top left of screen.
———-
Insecure Fuck.
It has come to our attention that this insecure person not only runs a
sweden site ring called World Leaders (no we didnt bother showing you
the current affil list), but also has another site (looks also to be in
Sweden) using a different nickname and bncer for in which slots are being
sold for money (pay2leech). The details for all are below.
———-
IRC Details.
BlakDeath is “bd” (znc@sea.with.drunkensailor.org) (REALIP: 213.180.83.217)
BlakDeath opped in #WL-CHIEFS
BlakDeath using link-net.org (LinkNet IRC Network)
IP address : 213.180.83.217
IP country code: SE
IP address country: Sweden
IP address state: Varmlands Lan
IP address city: Karlstad
IP address latitude: 59.3667
IP address longitude: 13.5000
ISP of this IP : Ipeer AB
Organization: Ipeer AB
Host of this IP: sea.with.drunkensailor.org
As you can see above if you /whois BlakDeath on link-net.org irc, he is
clearly in #WL-CHIEFS site channel (WL staff channel). IRC Bouncer in Sweden.
———-
Current direct IP address.
BlakDeath is “bd” (zharris6@pool-108-35-134-67.nwrknj.fios.verizon.net) (REALIP: 108.35.134.67)
IP address : 108.35.134.67
IP country code: US
IP address country: United States
IP address state: New Jersey
IP address city: Roselle
IP postcode: 07203
IP address latitude: 40.6506
IP address longitude: 74.2600
ISP of this IP : Verizon Internet Services
Organization: Verizon Internet Services
Host of this IP: : pool-108-35-134-67.nwrknj.fios.verizon.net
Looks like his address is now in Roselle and not Trenton where his parents live.
He is also known to run his own home ftpd/dump/capbox/server from this IP address.
———-
P2L insecure crap.
BlakDeath is dealing in p2l, as information provided for this notice was
his paypal id to verify the accusations. We wont elaborate as to how or
where we found this information out, but if there was no selling going
on, how would we have his paypal details?
Name: Zachary Harris
Paypal ID: 9EK96334P1320472D
———-
Site details.
Blakdeath siteops/admins (paid for hardware via paypal) at a sweden site
ring called WL (World Leaders, Sweden site ring).
cosacmofg.armed.us = 88.83.58.73:7770 HUB
cosacmofg.armed.us = 88.83.58.73:7771 SLAVE 01
cosacmofg.armed.us = 88.83.58.73:7772 SLAVE 02
cosacmofg.armed.us = 88.83.58.73:7773 SLAVE 03
cosacmofg.armed.us = 88.83.58.73:7774 SLAVE 04
cosacmofg.armed.us = 88.83.58.73:7775 SLAVE 05
cosacmofg.armed.us = 88.83.58.73:7776 SLAVE 06
cosacmofg.armed.us = 88.83.58.73:7777 SLAVE 07
cosacmofg.armed.us = 88.83.58.73:7778 SLAVE 08
cosacmofg.armed.us = 88.83.58.73:7779 SLAVE 09
cosacmofg.armed.us = 88.83.58.73:7780 SLAVE 10
IP address : 88.83.58.73
IP country code: SE
IP address country: Sweden
IP address state: Vasterbottens Lan
IP address city: Ume
IP address latitude: 63.8333
IP address longitude: 20.2500
ISP of this IP : Telecom3 Networks AB
Organization: Telecom3 Networks AB
Host of this IP: 88-83-58-73.customer.t3.se
There is a bunch of slaves there, port range is between 7770 – 7780,
where each port is a slave. This IP looks to be a bouncer address.
———-
We also got word that this insecure fucker was going under the nickname
“puddy” on a suspicious ircd for another Sweden site called SNOW. This
IRCD looks to be hosted directly on the site box. P2L anyone?
irc-snow.myftp.biz = 83.177.31.173:+38123
IP address : 83.177.31.173
IP country code: SE
IP address country: Sweden
IP address state: n/a
IP address city: n/a
IP address latitude: 62.0000
IP address longitude: 15.0000
ISP of this IP : Tele2 SWIPnet
Organization: Tele2 SWIPnet
Host of this IP: s83-177-31-173.cust.tele2.se
He has ops in the channel for this site and its a bit strange that he
uses different nick/bnc/proxy only for this site. This where you’re
selling leech slots?
We wont say anything more due to respect to sceners that have just been
caught in the middle of things, we know exactly what you’re up to Zach
Harris, we just wanted everyone else to know about your dealings so they
can avoid you like the plague.
Like we said, this is a headups before bigger things come down on you
and your retard friends. You’re a fuckin insecure disgrace to the scene
and everything that it stands for. GTFO!
———-
Blakdeath is a known member of at least one well known scene group and
is affiliated himself with many more, if you’re one of these groups, now
is the time to shut the door on his ass! Anyone that is affiliated with
this useless cunt will eventually get fuckd. You’ve been warned! Keep
the scene free from parasites like BlakDeath aka Zach Harris, keep it
hidden and keep it secure ffs!
Ohh almost forgot, your parents got a hell of a crib. Pity should anything happen.
To be concluded :D
//Chuck Norris
–
*@LGN*
pole smoker called BlakDeath.
This insecure prick has been bothering the scene for a while, so its
time to clean shit up.
This notice is a headsup to whats coming for Zach Harris and his
imbecile friends.
———-
Personal Info.
NickName: BlakDeath
Name: Zachary S Harris, 26 Yrs Old
Address: 3 Cairn Ct, Trenton, NJ, United States, 08619
Family: George R Harris, Linda L Harris
Vehicle: 20XX Mustang, Metallic Grey
We wont go as far as publishing his photos, facebook profile or phone
numbers, but you can find that easily enough.
You can see the vehicle parked out the front of his place if you search
for “3 Cairn Ct, Trenton, NJ, United States, 08619″ on
http://www.bing.com/maps/ click on ‘birds eye’, top left of screen.
———-
Insecure Fuck.
It has come to our attention that this insecure person not only runs a
sweden site ring called World Leaders (no we didnt bother showing you
the current affil list), but also has another site (looks also to be in
Sweden) using a different nickname and bncer for in which slots are being
sold for money (pay2leech). The details for all are below.
———-
IRC Details.
BlakDeath is “bd” (znc@sea.with.drunkensailor.org) (REALIP: 213.180.83.217)
BlakDeath opped in #WL-CHIEFS
BlakDeath using link-net.org (LinkNet IRC Network)
IP address : 213.180.83.217
IP country code: SE
IP address country: Sweden
IP address state: Varmlands Lan
IP address city: Karlstad
IP address latitude: 59.3667
IP address longitude: 13.5000
ISP of this IP : Ipeer AB
Organization: Ipeer AB
Host of this IP: sea.with.drunkensailor.org
As you can see above if you /whois BlakDeath on link-net.org irc, he is
clearly in #WL-CHIEFS site channel (WL staff channel). IRC Bouncer in Sweden.
———-
Current direct IP address.
BlakDeath is “bd” (zharris6@pool-108-35-134-67.nwrknj.fios.verizon.net) (REALIP: 108.35.134.67)
IP address : 108.35.134.67
IP country code: US
IP address country: United States
IP address state: New Jersey
IP address city: Roselle
IP postcode: 07203
IP address latitude: 40.6506
IP address longitude: 74.2600
ISP of this IP : Verizon Internet Services
Organization: Verizon Internet Services
Host of this IP: : pool-108-35-134-67.nwrknj.fios.verizon.net
Looks like his address is now in Roselle and not Trenton where his parents live.
He is also known to run his own home ftpd/dump/capbox/server from this IP address.
———-
P2L insecure crap.
BlakDeath is dealing in p2l, as information provided for this notice was
his paypal id to verify the accusations. We wont elaborate as to how or
where we found this information out, but if there was no selling going
on, how would we have his paypal details?
Name: Zachary Harris
Paypal ID: 9EK96334P1320472D
———-
Site details.
Blakdeath siteops/admins (paid for hardware via paypal) at a sweden site
ring called WL (World Leaders, Sweden site ring).
cosacmofg.armed.us = 88.83.58.73:7770 HUB
cosacmofg.armed.us = 88.83.58.73:7771 SLAVE 01
cosacmofg.armed.us = 88.83.58.73:7772 SLAVE 02
cosacmofg.armed.us = 88.83.58.73:7773 SLAVE 03
cosacmofg.armed.us = 88.83.58.73:7774 SLAVE 04
cosacmofg.armed.us = 88.83.58.73:7775 SLAVE 05
cosacmofg.armed.us = 88.83.58.73:7776 SLAVE 06
cosacmofg.armed.us = 88.83.58.73:7777 SLAVE 07
cosacmofg.armed.us = 88.83.58.73:7778 SLAVE 08
cosacmofg.armed.us = 88.83.58.73:7779 SLAVE 09
cosacmofg.armed.us = 88.83.58.73:7780 SLAVE 10
IP address : 88.83.58.73
IP country code: SE
IP address country: Sweden
IP address state: Vasterbottens Lan
IP address city: Ume
IP address latitude: 63.8333
IP address longitude: 20.2500
ISP of this IP : Telecom3 Networks AB
Organization: Telecom3 Networks AB
Host of this IP: 88-83-58-73.customer.t3.se
There is a bunch of slaves there, port range is between 7770 – 7780,
where each port is a slave. This IP looks to be a bouncer address.
———-
We also got word that this insecure fucker was going under the nickname
“puddy” on a suspicious ircd for another Sweden site called SNOW. This
IRCD looks to be hosted directly on the site box. P2L anyone?
irc-snow.myftp.biz = 83.177.31.173:+38123
IP address : 83.177.31.173
IP country code: SE
IP address country: Sweden
IP address state: n/a
IP address city: n/a
IP address latitude: 62.0000
IP address longitude: 15.0000
ISP of this IP : Tele2 SWIPnet
Organization: Tele2 SWIPnet
Host of this IP: s83-177-31-173.cust.tele2.se
He has ops in the channel for this site and its a bit strange that he
uses different nick/bnc/proxy only for this site. This where you’re
selling leech slots?
We wont say anything more due to respect to sceners that have just been
caught in the middle of things, we know exactly what you’re up to Zach
Harris, we just wanted everyone else to know about your dealings so they
can avoid you like the plague.
Like we said, this is a headups before bigger things come down on you
and your retard friends. You’re a fuckin insecure disgrace to the scene
and everything that it stands for. GTFO!
———-
Blakdeath is a known member of at least one well known scene group and
is affiliated himself with many more, if you’re one of these groups, now
is the time to shut the door on his ass! Anyone that is affiliated with
this useless cunt will eventually get fuckd. You’ve been warned! Keep
the scene free from parasites like BlakDeath aka Zach Harris, keep it
hidden and keep it secure ffs!
Ohh almost forgot, your parents got a hell of a crib. Pity should anything happen.
To be concluded :D
//Chuck Norris
–
*@LGN*
Related articles
- Insecure.SE.Ring.Selling.P2L.Ran.By.Blakdeath-NiCEMUSTANG (legionnet.wordpress.com)
- Snow-Respons.Insecure.SE.Ring.Selling.P2L.Ran.By.Blakdeath-NiCEMUSTANG (legionnet.wordpress.com)
Snow-Respons.Insecure.SE.Ring.Selling.P2L.Ran.By.Blakdeath-NiCEMUSTANG
Snow-Respons.Insecure.SE.Ring.Selling.P2L.Ran.By.Blakdeath-NiCEMUSTANG
Ok all i se a nfo from my site and NO puddy is not site owner only a nuker and he is gone from the site “Snow”
And to that P2L NO we have no like that if we have we have more space in all boxes?
And we have only privet boxes no rented, privet irc and we have newer have P2L we have affils nice traders owners of boxes and some friend.
more info of puddy
IP masks: *@213.180.83.*, *@72.68.74.*
IRC Ident: puddy!BD@DUN-A2E31C32.with.drunkensailor.org
so del the Snow from that NFO
Frome the real site owner
Ok all i se a nfo from my site and NO puddy is not site owner only a nuker and he is gone from the site “Snow”
And to that P2L NO we have no like that if we have we have more space in all boxes?
And we have only privet boxes no rented, privet irc and we have newer have P2L we have affils nice traders owners of boxes and some friend.
more info of puddy
IP masks: *@213.180.83.*, *@72.68.74.*
IRC Ident: puddy!BD@DUN-A2E31C32.with.drunkensailor.org
so del the Snow from that NFO
Frome the real site owner
SCENENOTiCE-PC.rent3d.le4s3w3b.HDTV-PCHEX
SCENENOTiCE-PC.rent3d.le4s3w3b.HDTV-PCHEX
[pre] Here we have a leaseweb/rented site with affils. check below for affils. Its formally known as PC as you can see from the login info we obtained they only changed the channels but not the login area still says PC. We do have nicks for the channels but we will be protecting the racers/users but never know we may have to release nicks also at a later time. We are appy to see prenup/pr3nup supporting rented sites still as without prebots like his rented sites would not have a prebot to get those pres out for the rented affils. Its even sad that he runs TinyNET addpre net and supports rented sites but hey maybe its the new localnet where its contending with the #1 nukenet (localnet) to see which one can get more p2p/rented users on their nukenet. Lets whois the ip to make sure IP address [?]: 94.75.218.210 [Whois] [Reverse IP] IP country code: NL IP address country: ip address flagNetherlands IP address state: Noord-Holland IP address city: Amsterdam IP address latitude: 52.3500 IP address longitude: 4.9167 ISP of this IP [?]: LeaseWeb B.V. Organization: LeaseWeb channels (( now talking in (#HeX) (( topic: Bottom 5 Go this month no excuses | TVBR720P allowed in TV-X264 set by: done!~iSO@85.17.236.230 (Monday, November 14th 2011, 14:40:18) users: 23 users, 7 ops (30%), 0 voiced (0%), 16 regulars (70%) join synced in: (0.08) second(s) (( #HeX-CHaT #HeX-PRe #HeX-SPaM prebots (@PreBioTic) [PRE][Tv] Jonge.Dokters.Van.Het.OLVG.S01E05.DUTCH.WS.PDTV.XviD-iFH [iFH] (@pr3nup) [PRE/TV-XVID]: Jonge.Dokters.Van.Het.OLVG.S01E05.DUTCH.WS.PDTV.XviD-iFH (@pr3nup) [THIS HOUR: 72 releases][NUKED: 2][UNNUKED: 0][FILES: 1728F][SIZE: 83292.9MB] (@pr3nup) [TOP 3 GROUPS: REWARD in TV-DVDRIP with 10 pres | webfetish in XXX with 6 pres | iMCARE in TV-XVID with 4 pres] (@PreBioTic) [PRE][0-DAY] GraphicConverter.v7.5.MacOSX.Incl.Keymaker-CORE [CORE] (@pr3nup) [PRE/0DAY]: GraphicConverter.v7.5.MacOSX.Incl.Keymaker-CORE [2] Resolving pc01.dnsdojo.org... [2] pc01.dnsdojo.org => 94.75.218.210 [2] Connecting to 94.75.218.210:5567 [2] 220 PC (glFTPd 2.01 Linux+TLS) ready. [2] AUTH TLS [2] 234 AUTH TLS successful [2] Encryption algorithm: TLSv1 DHE-DSS-AES256-SHA-256 [2] PBSZ 0 [2] 200 PBSZ 0 successful [2] USER *** [2] 331 Password required for ***. [2] PASS (hidden) [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- IRC: EFNeT [2] 230- Get Invited: SITE INVITE [2] 230- FiSH KeY: h8sjrn38dncjs8chnnjnwn99a [2] 230- Quota: 40GB per month [2] 230- AFFILS: BoNKeRS Crackpots RTA [2] 230- ADB: CLOSED [2] 230- UDB: CLOSED [2] 230- Gbit.nl so use .nl sources [2] 230- Traders:/requests/PC.ini [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- n0! [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- NFO LAST UPDATE ON 2011 [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] 230- [2] site alup 100 [2] 200- ______________._________ _________________ ___ ___ [2] 200- \____ ___ \_ _ \ \____ ___ ___\ \| | [ ALLTIME ] [2] 200- / \/ | / _____/ / \/ _\_|_ \ | [UPLOADERS] [2] 200- / \ | // | // \ / / \ | [2] 200- \_____/_____\ | \_____/_______/___|\ | [2] 200- .----------------- \___| ------------------------------ \__| ---------=-. [2] 200- | ## User Location/Tagline Files Megabytes Avg k/s | [2] 200- |-=-------------------------------------------------------------------=-| [2] 200- [01] cartman No Tagline Set 159,229 2,130,92MB 6921K/s [2] 200- [02] Jack No Tagline Set 60,717 1,138,71MB 2372K/s [2] 200- [03] Gollum Stupid Fat Hobbit 21,709 1,019,43MB 2249K/s [2] 200- [04] Cappie No Tagline Set 20,158 976,003MB 4126K/s [2] 200- [05] grom No Tagline Set 71,496 972,174MB 1430K/s [2] 200- [06] BierUS No Tagline Set 29,828 934,144MB 2590K/s [2] 200- [07] Warrior No Tagline Set 16,096 831,964MB 3240K/s [2] 200- [08] WonTon No Tagline Set 42,965 820,198MB 1706K/s [2] 200- [09] n1gel No Tagline Set 22,002 698,639MB 6303K/s [2] 200- [10] cn No Tagline Set 62,985 632,649MB 874K/s [2] 200- [11] Spark No Tagline Set 13,255 631,688MB 5656K/s [2] 200- [12] cac No Tagline Set 59,707 607,539MB 1296K/s [2] 200- [13] sw No Tagline Set 61,288 601,598MB 1563K/s [2] 200- [14] d0pe thinking not. 24,017 530,677MB 3855K/s [2] 200- [15] GaStOn No Tagline Set 7,381 458,602MB 2050K/s [2] 200- [16] BongMan Looking.For.GBit.Sites 14,533 454,942MB 5273K/s [2] 200- [17] Berry No Tagline Set 39,948 450,424MB 2080K/s [2] 200- [18] bos No Tagline Set 7,273 364,216MB 5666K/s [2] 200- [19] STeeL No Tagline Set 19,794 347,651MB 4712K/s [2] 200- [20] foyel No Tagline Set 13,849 317,246MB 2108K/s [2] 200- [21] Windwalker No Tagline Set 5,256 276,914MB 5945K/s [2] 200- [22] fuas No Tagline Set 21,181 270,832MB 5035K/s [2] 200- [23] NoS ~N2o 4,118 253,440MB 5125K/s [2] 200- [24] scooter No Tagline Set 12,899 246,827MB 8927K/s [2] 200- [25] reqfilla No Tagline Set 19,490 208,335MB 1276K/s [2] 200- [26] Jarvis No Tagline Set 10,641 162,240MB 4981K/s [2] 200- [27] done on the BRiNK 5,348 95,446MB 3712K/s [2] 200- [28] Ness No Tagline Set 538 42,693MB 5128K/s [2] 200- [29] ikz No Tagline Set 2,826 41,908MB 5502K/s [2] 200- [30] coluk No Tagline Set 1,459 40,126MB 5252K/s [2] 200- [31] Onegin No Tagline Set 3,695 37,971MB 5324K/s [2] 200- [32] phaychp No Tagline Set 915 37,091MB 338K/s [2] 200- [33] BrIcKtOp No Tagline Set 2,669 35,884MB 7419K/s [2] 200- [34] w4r No Tagline Set 1,981 28,883MB 855K/s [2] 200- [35] psx No Tagline Set 720 9,282MB 11793K/s [2] 200- [36] icabudmudd No Tagline Set 73 6,598MB 30164K/s [2] 200- [37] lordice No Tagline Set 100 4,848MB 2523K/s [2] 200- [38] charlott3 No Tagline Set 12 622MB 238K/s [2] site aldn 100 [2] 200- ______________._________ . _________________.___ ___ [2] 200- __.\____ ___ \_ _ \ _:__\____ ___ _____ \| | _.__ [2] 200- _ _|____ / \/ | / _____/__|___;_ / \/ _\_|_ \ |__|_ __ [2] 200- ___|__ / \ | // | ___|_._|__ // \ / // \ | ___|_ [2] 200- __|_\_____/_____\ | _|___|___|.\_____/_______/___|\ |._|_ [2] 200- .------------------.\___| ALLTiME DOWNLOADERS... \__| :-----. [2] 200- .--------------------------------------------------------------------=-. [2] 200- | ## User Location/Tagline Files Megabytes Avg k/s | [2] 200- |-=-------------------------------------------------------------------=-| [2] 200- [01] adymags No Tagline Set 336,753 3,999,38MB 7422K/s [2] 200- [02] reqfilla No Tagline Set 135,691 3,210,55MB 1430K/s [2] 200- [03] d0pe thinking not. 134,000 1,518,99MB 1115K/s [2] 200- [04] charlott3 No Tagline Set 16,700 1,269,61MB 2071K/s [2] 200- [05] cn No Tagline Set 104,566 1,141,31MB 1086K/s [2] 200- [06] foyel No Tagline Set 17,580 936,910MB 7008K/s [2] 200- [07] Warrior No Tagline Set 12,786 927,844MB 4850K/s [2] 200- [08] BierUS No Tagline Set 25,069 796,379MB 2194K/s [2] 200- [09] cartman No Tagline Set 59,829 682,028MB 458K/s [2] 200- [10] grom No Tagline Set 28,496 640,793MB 1744K/s [2] 200- [11] adamon No Tagline Set 39,588 542,205MB 2608K/s [2] 200- [12] WonTon No Tagline Set 46,868 429,831MB 1053K/s [2] 200- [13] n1gel No Tagline Set 37,541 387,885MB 5670K/s [2] 200- [14] fuas No Tagline Set 23,611 387,838MB 4717K/s [2] 200- [15] Cappie No Tagline Set 9,737 335,185MB 2780K/s [2] 200- [16] Spark No Tagline Set 7,151 327,785MB 5347K/s [2] 200- [17] Gollum Stupid Fat Hobbit 5,440 324,691MB 3407K/s [2] 200- [18] BongMan Looking.For.GBit.Sites 9,161 309,851MB 3272K/s [2] 200- [19] Jack No Tagline Set 8,634 251,648MB 1757K/s [2] 200- [20] hurricane No Tagline Set 5,684 160,651MB 1242K/s [2] 200- [21] coluk No Tagline Set 9,114 147,958MB 1218K/s [2] 200- [22] cac No Tagline Set 3,049 145,624MB 4447K/s [2] 200- [23] snowman No Tagline Set 14,052 138,749MB 301K/s [2] 200- [24] Windwalker No Tagline Set 6,811 116,219MB 2820K/s [2] 200- [25] teawench No Tagline Set 6,356 70,110MB 737K/s [2] 200- [26] bos No Tagline Set 1,720 63,610MB 3758K/s [2] 200- [27] janet No Tagline Set 744 59,824MB 758K/s [2] 200- [28] done on the BRiNK 1,049 52,677MB 5379K/s [2] 200- [29] Jarvis No Tagline Set 2,838 37,958MB 1425K/s [2] 200- [30] streamer No Tagline Set 685 36,201MB 1458K/s [2] 200- [31] w4r No Tagline Set 2,108 34,795MB 1830K/s [2] 200- [32] phaychp No Tagline Set 715 27,767MB 833K/s [2] 200- [33] reprobate No Tagline Set 3,172 27,004MB 407K/s [2] 200- [34] GaStOn No Tagline Set 3,272 25,550MB 1124K/s [2] 200- [35] STeeL No Tagline Set 1,419 25,127MB 2250K/s [2] 200- [36] x1 No Tagline Set 289 21,943MB 238K/s [2] 200- [37] sw No Tagline Set 1,976 20,879MB 2332K/s [2] 200- [38] psx No Tagline Set 1,122 13,405MB 491K/s [2] 200- [39] icabudmudd No Tagline Set 216 9,145MB 1628K/s [2] 200- [40] lordice No Tagline Set 497 7,509MB 1968K/s [2] 200- [41] dooly F* Me I'm Famous 221 6,499MB 286K/s [2] 200- [42] BrIcKtOp No Tagline Set 258 3,190MB 4130K/s [2] 200- [43] NoS ~N2o 47 2,767MB 1360K/s [2] 200- [44] ikz No Tagline Set 37 1,572MB 1956K/s [2] 200- [45] Ness No Tagline Set 21 1,002MB 4407K/s [2] 200- [46] Onegin No Tagline Set 74 600MB 1420K/s [2] 200- [47] brr No Tagline Set 9 429MB 2133K/s [2] 200- [48] Berry No Tagline Set 3 242MB 11849K/s [2] 200- [49] forths No Tagline Set 1 0MB 216K/s [2] site groups [2] 200- #users Group Abbr. Group Description [2] 200- ---------------------------------------------------------------------- [2] 200- ( 8) AlZ AlZ [2] 200- ( 34) iND iND [2] 200- ( 0) fuzzybobble fuzzybobble [2] 200- ( 1) SiTEOPS SiTEOPS [2] 200- ( 5) friends friends [2] 200- ( 1) Crackpots Crackpots [2] 200- ( 1) BoNkErS BoNkErS [2] 200- ( 5) KGB KGB [2] 200- ( 2) RTA RTAGoodluck rented users we did protect your nicks unless you used same as your login next time you may not be so lucky. piece out [/pre]
Guide to bypassing the Malaysian filesharing site filter
Guide to bypassing the Malaysian filesharing site filter
Follow this guide to be able to access websites like Megaupload and The Pirate Bay again.
If you have any problems or questions, feel free to join the IRC (chat) channel at irc.anonops.li 6667/+6669 #OpMalaysia.
If you do not have an IRC client installed (or don’t know what IRC is) go to http://irc.lc/anonops/OpMalaysia/
SPREAD THIS GUIDE to fellow Malaysians on Facebook and Twitter!
LIST OF FREE DNS SERVERS AT THE END.
Changing DNS server settings on Microsoft Windows 7.
1. Go the Control Panel.
2. Click Network and Internet, then Network and Sharing Center, and click Change adapter settings.
3. Select the connection for which you want to configure Google Public DNS. For example:
To change the settings for an Ethernet connection, right-click Local Area Connection, and click Properties.
To change the settings for a wireless connection, right-click Wireless Network Connection, and click Properties.
If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
4. Select the Networking tab. Under This connection uses the following items, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
5. Click Advanced and select the DNS tab. If there are any DNS server IP addresses listed there, write them down for future reference, and remove them from this window.
6. Click OK.
7. Select Use the following DNS server addresses. If there are any IP addresses listed in the Preferred DNS server or Alternate DNS server, write them down for future reference.
8. Replace those addresses with the IP addresses of the DNS servers (Google’s public DNS servers are 8.8.8.8 and 8.8.4.4).
9. Restart the connection you selected in step 3.
10. Test that your setup is working correctly; see Testing your new settings below.
11. Repeat the procedure for additional network connections you want to change.
Mac OS X
DNS settings are specified in the Network window.
Example: Changing DNS server settings on Mac OS 10.5
From the Apple menu, click System Preferences, then click Network.
If the lock icon in the lower left-hand corner of the window is locked, click the icon to make changes, and when prompted to authenticate, enter your password.
Select the connection for which you want to configure Google Public DNS. For example:
To change the settings for an Ethernet connection, select Built-In Ethernet, and click Advanced.
To change the settings for a wireless connection, select Airport, and click Advanced.
Select the DNS tab.
Click + to replace any listed addresses with, or add, the DNS’ IP adresses at the top of the list. Google’s public DNS’ IP are 8.8.8.8 and 8.8.4.4
Click Apply and OK.
Test that your setup is working correctly; see Testing your new settings below.
Repeat the procedure for additional network connections you want to change.
Linux
In most modern Linux distributions, DNS settings are configured through Network Manager.
Example: Changing DNS server settings on Ubuntu
In the System menu, click Preferences, then click Network Connections.
Select the connection for which you want to configure Google Public DNS. For example:
To change the settings for an Ethernet connection, select the Wired tab, then select your network interface in the list. It is usually calledeth0.
To change the settings for a wireless connection, select the Wireless tab, then select the appropriate wireless network.
Click Edit, and in the window that appears, select the IPv4 Settings tab.
If the selected method is Automatic (DHCP), open the dropdown and select Automatic (DHCP) addresses only instead. If the method is set to something else, do not change it.
In the DNS servers field, enter the DNS IP addresses, separated by a space. (Google Public DNS IP addresses: 8.8.8.8 8.8.4.4).
Click Apply to save the change. If you are prompted for a password or confirmation, type the password or provide confirmation.
Test that your setup is working correctly; see Testing your new settings below.
Repeat the procedure for additional network connections you want to change.
If your distribution doesn’t use Network Manager, your DNS settings are specified in /etc/resolv.conf.
Example: Changing DNS server settings on a Debian server
Edit /etc/resolv.conf:
sudo vi /etc/resolv.conf
If any nameserver lines appear, write down the IP addresses for future reference.
Replace the nameserver lines with, or add, the following lines:
nameserver
nameserver
Save and exit.
Restart any Internet clients you are using.
Test that your setup is working correctly; see Testing your new settings below.
Additionally, if you are using DHCP client software that overwrites the settings in /etc/resolv.conf, you will need to set up the client accordingly by editing the client’s configuration file.
FREE DNS SERVERS:
=> Service provider: Google
Google public dns server IP address:
8.8.8.8
8.8.4.4
=> Service provider:Dnsadvantage
Dnsadvantage free dns server list:
156.154.70.1
156.154.71.1
=> Service provider:OpenDNS
OpenDNS free dns server list / IP address:
208.67.222.222
208.67.220.220
=> Service provider:Norton
Norton free dns server list / IP address:
198.153.192.1
198.153.194.1
=> Service provider: GTEI DNS (now Verizon)
Public Name server IP address:
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6
=> Service provider: ScrubIt
Public dns server address:
67.138.54.100
207.225.209.66
Other anti-censorship DNS servers:
85.88.19.10 (German Xail.net) sehr schnell!
85.88.19.11 (German Xail.net)
87.118.100.175 (German Privacy Foundation e.V.)
94.75.228.28 (German Privacy Foundation e.V.)
62.141.58.13 (German Privacy Foundation e.V.)
85.25.251.254 (German Privacy Foundation e.V.) langsam!
85.214.73.63 (FoeBuD e.V.)
212.82.225.7 (ClaraNet)
212.82.226.212 (ClaraNet)
213.73.91.35 (Chaos Computer Club Berlin)
58.6.115.42 (OpenNIC, Australien)
58.6.115.43 (OpenNIC, Australien)
119.31.230.42 (OpenNIC, Australien)
200.252.98.162 (OpenNIC, Brasilien)
217.79.186.148 (OpenNIC, Deutschland)
82.229.244.191 (OpenNIC, Frankreich)
216.87.84.211 (OpenNIC, USA)
2002:d857:54d2:2:20e:2eff:fe63:d4a9 (OpenNIC, IPv6 USA)
2001:470:1f07:38b::1 (OpenNIC, IPv6 USA)
2001:470:1f10:c6::2 (OpenNIC, IPv6 USA)
66.244.95.20 (OpenNIC, USA)
204.152.184.76 (f.6to4-servers.net, ISC)
2001:4f8:0:2::14 (f.6to4-servers.net, IPv6, ISC)
194.150.168.168 (dns.as250.net; anycast DNS!)
80.237.196.2 (Erdgeist)
194.95.202.198 (UDK Berlin)
88.198.130.211 (Dataflash)
78.46.89.147 (ValiDOM)
129.206.100.126 (URZ Uni Heidelberg)
79.99.234.56 (justnet.ch, Schweiz)
208.67.220.220 (OpenDNS)
208.67.222.222 (OpenDNS)
156.154.70.22 (Comodo Secure DNS)
156.154.71.22 (Comodo Secure DNS)
85.25.149.144 (Freie DNS-Server)
87.106.37.196 (Freie DNS-Server)
8.8.8.8 (Google Public DNS)
8.8.4.4 (Google Public DNS)
88.198.24.111 (jali/CCCHB)
Related articles
- Guide to bypassing the Malaysian filesharing site filter (legionnet.wordpress.com)
- Best way to Stay Anonymous ONLINE!! (legionnet.wordpress.com)
- 1 simple way to bypass file sharing sites blocks (ashtonmesh.wordpress.com)
- World’s stealthiest rootkit pushes DNS hijacking trojan (go.theregister.com)
- FBI tackles DNSChanger malware scam (reviews.cnet.com)
- DNS servers crashing as internet hit by unidentified vulnerability (100gf.wordpress.com)
The best FREE VPN – +2
The best FREE VPN out there at this point in time is currently CyberGhost, I think this because it does not slow your internet down, and you are Anonymous completely. As well as it is not difficult to use the program either. Here is the website to use it. CyberGhost Rocks. <3
BEST FREE VPN OUT THERE I THINK!!!
~VisionZ (Leader of L33T Security)
-
real-vpn.com = good and fast. (also *nl server allows p2p)
vpnod.com = slow
Best way to Stay Anonymous ONLINE!!
Workshop: How to evade the police and shag their wives and daughters, all without leaving traces, Coming back to #anonsec at irc.anonops.li ! People who are feeling lost about the talks, specially over tech aspects, listen and then ask at the end. Main Tips:
Encrypt everything.
Wipe everything non-encrypted.
Audit your networks connections (look for DNS queries going to your ISP).
No open ports.
Use a different machine for Anonymous.
Make fresh OS installs every month or so (and keep it updated).
Try to re-route your connection at least 2 times.
Keep secure. http://cryptoanarchy.org/wiki/Main_Page
-> DONT talk to the police. Ever. So dont even explain why you arent saying anything, just shut your mouth untill you are back home again, no matter how long it takes. They will lie to you. They will threaten you. They may even hurt you. But you CANT say a SINGLE WORD.
Contents:
Encryption
Document Shredding
MAC Spoofing
VPN/VPS
Tor & I2P
DNS
Assorted
Firefox Plugins
Encryption
Store sensitive files on encrypted volumes. Encrypt your files AES256
Use Truecrypt! – http://www.truecrypt.org/
Document Shredding
Shred all your documents non encrypted on a daily/weekly basis.
Keep them centralized.
NOTE for SSD disks users: enable the TRIM function, usual shredding methods are not suitable for them.
http://askubuntu.com/questions/18903/how-to-enable-trim
Linux
apt-get install wipe
wipe -r -P 7 folderToTrash
Mac OS X
For the Terminal Savvy:
srm -r
Others:
Put files into the bin and then Finder > Secure empty Trash
Windows
Expert needed
MAC Spoofing
MAC Spoofing is changing your unique MAC address to something more secure; like a line of zeros.
Linux
apt-get install macchanger
after that do:
sudo macchanger -A eth0 <— eth0 is the interface, use sudo ifconfig -a to show all interfaces, don’t use lo0, that is a loopback interface
or
sudo ifconfig wlan0 down
sudo ifconfig wlan0 hw ether 00:00:00:00:00:00
sudo ifconfig wlan0 up
-> You can doo this every boot up automatically.
https://we.riseup.net/riseuphelp+en/auto-random-macs
Script to be placed and chmod +x in /etc/network/if-pre-up.d/macchanger
#################################
#!/bin/sh
MACCHANGER=/usr/bin/macchanger
ifconfig eth0 down
macchanger -A eth0
ifconfig eth0 up
########################
->>> Replace eth0 with the interface you use to connect to the net. In order to know that, type in console: sudo ifconfig or /sbin/ifconfig
->>> The output will be a list of interfaces,
lo : local loopback
wlan0: wireless interface
eth0: ethernet interface
tap or tun0: VPN interface.
-> Also keep in mind that, even if you spoof your mac, if you are behind a router, it’s the routers mac that’s exposed, not your computers, so if you want this to work, you need to use a vpn. (Tips to firewall a vpn conn would be niceness too)
-> A good way of firewalling your linux, is using ufw (uncomplicated firewall) it’s easy, and you don’t need to know shit about iptables to make it work + it has a very simple interface (gufw). A more complete gui, and more complicated, is the well known firestarter.
-> To know the services listening on your box type the following in console
$sudo netstat –tcp –udp –listening –program
Youre done when there’s 0 listening programs in that list. (Avoid dhclient if you can, as for openvpn, firewall it properly)
-> send to /dev/null all the users that have suspicious activity (such as nobody, or in some cases proxy when u got tor installed.)
$sudo chsh -s /dev/null nobody
-> check this article for tor advanced (and very interesting) usage.
http://thesprawl.org/memdump/?entry=8
Mac OS X
1. Paste the following into Terminal (Applications/Utilities/Terminal.app):
sudo su
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport -z
sudo ifconfig en1 ether 00:00:00:00:00:00
2. Reconnect to a wireless network!
For wired connections, change ‘en1′ to ‘en0.’
BSD
1) Bring down the interface: “ifconfig xl0 down”
2) Enter new MAC address: “ifconfig xl0 link 00:00:00:AA:AA:AA”
3) Bring up the interface: “ifconfig xl0 up”
Linux
1) Bring down the interface: “ifconfig eth0 down”
2) Enter new MAC address: “ifconfig eth0 hw ether 00:00:00:AA:AA:AA”
3) Bring up the interface: “ifconfig eth0 up”
Windows 2000/XP
Method 1:
This is depending on the type of Network Interface Card (NIC) you have. If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.
b) Right click on the NIC you want to change the MAC address and click on properties.
c) Under “General” tab, click on the “Configure” button
d) Click on “Advanced” tab
e) Under “Property section”, you should see an item called “Network Address” or “Locally Administered Address”, click on it.
f) On the right side, under “Value”, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the “-” between the MAC address numbers.
g) Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes. If the changes are not materialized, then use the second method.
h) If successful, reboot your system.
Method 2:
This should work on all Windows 2000/XP systems
a) Go to Start -> Run, type “regedt32″ to start registry editor. Do not use “Regedit”.
b) Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}”. Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.
c) Find the interface you want by searching for the proper “DriverDesc” key.
d) Edit, or add, the string key “NetworkAddress” (has the data type “REG_SZ”) to contain the new MAC address.
e) Disable then re-enable the network interface that you changed (or reboot the system).
Method 3:
Use the program Etherchange from http://ntsecurity.nu/toolbox/etherchange/
Windows 9x
Use the same method as Windows 2000/XP except for the registry key location is “HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services\Class\Net” and you must reboot your system.
VPN/VPS
Links about tested VPNs services:
https://www.vpntunnel.se
https://www.perfect-privacy.de
https://www.swissvpn.net/
http://nvpn.net/index.php
Links about offshore VPS offers:
ipo
http://heihachi.net/
http://zhangltd.net/plans_at.html
http://www.dataclub.biz/en/site/services
http://www.santrex.net/vps-hosting.php
Other anonymisation services to hide your IP address
JonDonym https://anonymous-proxy-servers.net uses mix cascades with 2 or 3 mix servers around the world. Free mix cascades can be used only for anonymous surfing. Premium services can be used for all internet services like IRC, email or IM.
Tor https://www.torproject.org uses a route of 3 onion routers around the world. The route will change every 10 minutes. Because everybody can run a Tor node it is possible for intelligence services to insert spying nodes. Use SSL encryption to avoid traffic sniffing by spying exit nodes.
I2P
The very best of the deep internets. Anonymoulsy host, visit, and everything else. Reccomended.
http://www.i2p002.d
https://www.vpntunabout:startpagenel.se
e/
#Anonymous on I2P standard IRC.
DNS
Open DNS Servers:
=> Service provider:Dnsadvantage
Dnsadvantage free dns server list:
156.154.70.1
156.154.71.1
=> Service provider:OpenDNS
OpenDNS free dns server list / IP address:
208.67.222.222
208.67.220.220
=> Service provider:Norton
Norton free dns server list / IP address:
198.153.192.1
198.153.194.1
=> Service provider: GTEI DNS (now Verizon)
Public Name server IP address:
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6
=> Service provider: ScrubIt
Public dns server address:
67.138.54.100
207.225.209.66
Other anti-censorship DNS servers:
85.88.19.10 (German Xail.net) sehr schnell!
85.88.19.11 (German Xail.net)
87.118.100.175 (German Privacy Foundation e.V.)
94.75.228.28 (German Privacy Foundation e.V.)
62.141.58.13 (German Privacy Foundation e.V.)
62.75.219.7 (German Privacy Foundation e.V.)
85.214.73.63 (FoeBuD e.V.)
212.82.225.7 (ClaraNet)
212.82.226.212 (ClaraNet)
213.73.91.35 (Chaos Computer Club Berlin) +1
58.6.115.42 (OpenNIC, Australien)
58.6.115.43 (OpenNIC, Australien)
119.31.230.42 (OpenNIC, Australien)
200.252.98.162 (OpenNIC, Brasilien)
217.79.186.148 (OpenNIC, Deutschland)
82.229.244.191 (OpenNIC, Frankreich)
216.87.84.211 (OpenNIC, USA)
2002:d857:54d2:2:20e:2eff:fe63:d4a9 (OpenNIC, IPv6 USA)
2001:470:1f07:38b::1 (OpenNIC, IPv6 USA)
2001:470:1f10:c6::2 (OpenNIC, IPv6 USA)
66.244.95.20 (OpenNIC, USA)
204.152.184.76 (f.6to4-servers.net, ISC)
2001:4f8:0:2::14 (f.6to4-servers.net, IPv6, ISC)
194.150.168.168 (dns.as250.net; anycast DNS!)
80.237.196.2 (Erdgeist)
194.95.202.198 (UDK Berlin)
88.198.130.211 (Dataflash)
78.46.89.147 (ValiDOM)
129.206.100.126 (URZ Uni Heidelberg)
79.99.234.56 (justnet.ch, Schweiz)
208.67.220.220 (OpenDNS)
208.67.222.222 (OpenDNS)
156.154.70.22 (Comodo Secure DNS)
156.154.71.22 (Comodo Secure DNS)
85.25.149.144 (Freie DNS-Server)
87.106.37.196 (Freie DNS-Server)
8.8.8.8 (Google Public DNS)
8.8.4.4 (Google Public DNS)
88.198.24.111 (jali/CCCHB)
Google ones
8.8.8.8
8.8.4.4
-> These ones are good. We all know google is evil, but their DNS services process much traffic. This is security by obscurity, finding a request to them is like finding a needle in the sea!
What about Level3 dns servers? safe?
youtube link for dns tut
http://www.youtube.com/watch?v=r8d-Sv2 ifconfig eth0 lladdr 00:00:00:00WCQ
http://www.youtube.com/watch?v=CBJaIahhH20
http://www.youtube.com/watch?v=wwS6Jufjqds
http://www.youtube.com/watch?v=CBJaIahhH20
http://www.youtube.com/watch?v=wwS6Jufjqds
bypassing DNS filters
http://pastehtml.com/view/ax99xkcpi.rtxt
Assorted
- rule #efore dishonour1 and rule #2
- /dev/null before dishonour
- do not mention your involvement with $operations
- do not swank with your e-peen
- do not mention your YT, Twitter, FB… accounts
- do not swank with any special knowledge
- speak english only
- use password with more than 10 characters
- dont re-use passwords
-> Generating strong passwords (Linux)
$ cat /dev/urandom | tr -dc ‘[a-z][A-Z][0-9]-_!@#$%^&*()_+{}|:<>?=’ | fold -w 64| head -n 5
This will generate a 5 rows of 64 char long password with symbols, numbers and letters. Change the -w value suit your needs. -w 128 will generate a 128 char passwd
- use keepassx
- use Live-CDs and thumbdrives and portable software
- do not keep logs of any kind
- repeat after me: I will not keep any logs
- pay your VPN with bitcoin, Ukash etc.
- choose a VPN-Provider in a safe jurisdiction (that means not US, UK, France)
- using your neighbours Wifi is not a *very* good idea, but on the other hand… better than get arrested
- only inexistent data is good data, because any existing data will be used against you
- Govs will even use inexistent data against you
- do not use your anonops-nick anywhere else (Change your nicks oftenly)
- it is a good idea to change the OS every now and then
- it is a good idea to physically separate anything Anon from anything not Anon, use different machines
- do not use the same E-Mail or VPN you use for Anon for other activities
- if you have to keep data, put it on thumbdrives so they can easily be destroyed > micro sd drives are twice as easily destroyed and die after an ammount of writes.
- keep in mind that a single Anon is unimportant to Anonymous
- the media will not keep your identity secret because the media sell information, do not trust the media (https://www.eff.org/deeplinks/2011/06/ws…wers-false )
- do not expose yourself too much, avoid IRL-Interviews, avoid Voice Interviews
- sadly, you cannot trust other Anons
- report suspicious activities
- be paranoid
- keep a low profile
- tell others when you will not join the IRC for al longer time
- before issuing any documents erase their metadata
Port Scans
http://www.port-scan.de
———————-
Links
http://www.truecrypt.org (encrypting software , who cant read will not know )
if they see that you have truecrypr installed, they will know. see http://xekcd.com/538/
http://www.comodo.com (firewall )
https://wiki.archlinux.org/index.php/LUKS (even more encryption)
Firefox Configuration
Firefox about:config
network.proxy.socks_remote_dns = true
browser.search.suggest.enabled = false
layout.css.visited_links_enabled = false
network.http.sendRefererHeader = 0
geo.enabled = false
browser.display.use_document_fonts = 0
Try to have a common fingerprint for your browser:
http://panopticlick.eff.org
-> The more unique your browser looks, the more the bad guys will identify you.
Firefox Addons
- Cookieculler ( cookies can trace u do not keep logs ! )
- HTTPS everywhere ( secured is encrypted (Y) )
Modify Headers
https://addons.mozilla.org/en-US/firefox…y-headers/
RequestPolicy
https://addons.mozilla.org/en-us/firefox…estpolicy/
NoScript
https://addons.mozilla.org/en-us/firefox…/noscript/
Certificate Patrol
https://addons.mozilla.org/en-us/firefox…te-patrol/
AdBlock Plus
https://addons.mozilla.org/fr/firefox/ad…lock-plus/
Mafiaa redirector
https://addons.mozilla.org/en-US/firefox…edirector/
Better privacy
https://addons.mozilla.org/fr/f encrypirefox/addon/betterprivacy/
User Agent switcher
https://addons.mozilla.org/en-US/firefox…-switcher/
http://techpatterns.com/downloads/firefo…ntswitcher
–>Credits to LulzSec for making this!<–
Link to post
http://pastebin.com/ccUhiSxZ
~VisionZ (Leader of L33T Security)Encrypt everything.
Wipe everything non-encrypted.
Audit your networks connections (look for DNS queries going to your ISP).
No open ports.
Use a different machine for Anonymous.
Make fresh OS installs every month or so (and keep it updated).
Try to re-route your connection at least 2 times.
Keep secure. http://cryptoanarchy.org/wiki/Main_Page
-> DONT talk to the police. Ever. So dont even explain why you arent saying anything, just shut your mouth untill you are back home again, no matter how long it takes. They will lie to you. They will threaten you. They may even hurt you. But you CANT say a SINGLE WORD.
Contents:
Encryption
Document Shredding
MAC Spoofing
VPN/VPS
Tor & I2P
DNS
Assorted
Firefox Plugins
Encryption
Store sensitive files on encrypted volumes. Encrypt your files AES256
Use Truecrypt! – http://www.truecrypt.org/
Document Shredding
Shred all your documents non encrypted on a daily/weekly basis.
Keep them centralized.
NOTE for SSD disks users: enable the TRIM function, usual shredding methods are not suitable for them.
http://askubuntu.com/questions/18903/how-to-enable-trim
Linux
apt-get install wipe
wipe -r -P 7 folderToTrash
Mac OS X
For the Terminal Savvy:
srm -r
Others:
Put files into the bin and then Finder > Secure empty Trash
Windows
Expert needed
MAC Spoofing
MAC Spoofing is changing your unique MAC address to something more secure; like a line of zeros.
Linux
apt-get install macchanger
after that do:
sudo macchanger -A eth0 <— eth0 is the interface, use sudo ifconfig -a to show all interfaces, don’t use lo0, that is a loopback interface
or
sudo ifconfig wlan0 down
sudo ifconfig wlan0 hw ether 00:00:00:00:00:00
sudo ifconfig wlan0 up
-> You can doo this every boot up automatically.
https://we.riseup.net/riseuphelp+en/auto-random-macs
Script to be placed and chmod +x in /etc/network/if-pre-up.d/macchanger
#################################
#!/bin/sh
MACCHANGER=/usr/bin/macchanger
ifconfig eth0 down
macchanger -A eth0
ifconfig eth0 up
########################
->>> Replace eth0 with the interface you use to connect to the net. In order to know that, type in console: sudo ifconfig or /sbin/ifconfig
->>> The output will be a list of interfaces,
lo : local loopback
wlan0: wireless interface
eth0: ethernet interface
tap or tun0: VPN interface.
-> Also keep in mind that, even if you spoof your mac, if you are behind a router, it’s the routers mac that’s exposed, not your computers, so if you want this to work, you need to use a vpn. (Tips to firewall a vpn conn would be niceness too)
-> A good way of firewalling your linux, is using ufw (uncomplicated firewall) it’s easy, and you don’t need to know shit about iptables to make it work + it has a very simple interface (gufw). A more complete gui, and more complicated, is the well known firestarter.
-> To know the services listening on your box type the following in console
$sudo netstat –tcp –udp –listening –program
Youre done when there’s 0 listening programs in that list. (Avoid dhclient if you can, as for openvpn, firewall it properly)
-> send to /dev/null all the users that have suspicious activity (such as nobody, or in some cases proxy when u got tor installed.)
$sudo chsh -s /dev/null nobody
-> check this article for tor advanced (and very interesting) usage.
http://thesprawl.org/memdump/?entry=8
Mac OS X
1. Paste the following into Terminal (Applications/Utilities/Terminal.app):
sudo su
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport -z
sudo ifconfig en1 ether 00:00:00:00:00:00
2. Reconnect to a wireless network!
For wired connections, change ‘en1′ to ‘en0.’
BSD
1) Bring down the interface: “ifconfig xl0 down”
2) Enter new MAC address: “ifconfig xl0 link 00:00:00:AA:AA:AA”
3) Bring up the interface: “ifconfig xl0 up”
Linux
1) Bring down the interface: “ifconfig eth0 down”
2) Enter new MAC address: “ifconfig eth0 hw ether 00:00:00:AA:AA:AA”
3) Bring up the interface: “ifconfig eth0 up”
Windows 2000/XP
Method 1:
This is depending on the type of Network Interface Card (NIC) you have. If you have a card that doesn’t support Clone MAC address, then you have to go to second method.
a) Go to Start->Settings->Control Panel and double click on Network and Dial-up Connections.
b) Right click on the NIC you want to change the MAC address and click on properties.
c) Under “General” tab, click on the “Configure” button
d) Click on “Advanced” tab
e) Under “Property section”, you should see an item called “Network Address” or “Locally Administered Address”, click on it.
f) On the right side, under “Value”, type in the New MAC address you want to assign to your NIC. Usually this value is entered without the “-” between the MAC address numbers.
g) Goto command prompt and type in “ipconfig /all” or “net config rdr” to verify the changes. If the changes are not materialized, then use the second method.
h) If successful, reboot your system.
Method 2:
This should work on all Windows 2000/XP systems
a) Go to Start -> Run, type “regedt32″ to start registry editor. Do not use “Regedit”.
b) Go to “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}”. Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters. You should see it starts with 0000, then 0001, 0002, 0003 and so on.
c) Find the interface you want by searching for the proper “DriverDesc” key.
d) Edit, or add, the string key “NetworkAddress” (has the data type “REG_SZ”) to contain the new MAC address.
e) Disable then re-enable the network interface that you changed (or reboot the system).
Method 3:
Use the program Etherchange from http://ntsecurity.nu/toolbox/etherchange/
Windows 9x
Use the same method as Windows 2000/XP except for the registry key location is “HKEY_LOCAL_MACHINE\System\ CurrentControlSet\Services\Class\Net” and you must reboot your system.
VPN/VPS
Links about tested VPNs services:
https://www.vpntunnel.se
https://www.perfect-privacy.de
https://www.swissvpn.net/
http://nvpn.net/index.php
Links about offshore VPS offers:
ipo
http://heihachi.net/
http://zhangltd.net/plans_at.html
http://www.dataclub.biz/en/site/services
http://www.santrex.net/vps-hosting.php
Other anonymisation services to hide your IP address
JonDonym https://anonymous-proxy-servers.net uses mix cascades with 2 or 3 mix servers around the world. Free mix cascades can be used only for anonymous surfing. Premium services can be used for all internet services like IRC, email or IM.
Tor https://www.torproject.org uses a route of 3 onion routers around the world. The route will change every 10 minutes. Because everybody can run a Tor node it is possible for intelligence services to insert spying nodes. Use SSL encryption to avoid traffic sniffing by spying exit nodes.
I2P
The very best of the deep internets. Anonymoulsy host, visit, and everything else. Reccomended.
http://www.i2p002.d
https://www.vpntunabout:startpagenel.se
e/
#Anonymous on I2P standard IRC.
DNS
Open DNS Servers:
=> Service provider:Dnsadvantage
Dnsadvantage free dns server list:
156.154.70.1
156.154.71.1
=> Service provider:OpenDNS
OpenDNS free dns server list / IP address:
208.67.222.222
208.67.220.220
=> Service provider:Norton
Norton free dns server list / IP address:
198.153.192.1
198.153.194.1
=> Service provider: GTEI DNS (now Verizon)
Public Name server IP address:
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
4.2.2.6
=> Service provider: ScrubIt
Public dns server address:
67.138.54.100
207.225.209.66
Other anti-censorship DNS servers:
85.88.19.10 (German Xail.net) sehr schnell!
85.88.19.11 (German Xail.net)
87.118.100.175 (German Privacy Foundation e.V.)
94.75.228.28 (German Privacy Foundation e.V.)
62.141.58.13 (German Privacy Foundation e.V.)
62.75.219.7 (German Privacy Foundation e.V.)
85.214.73.63 (FoeBuD e.V.)
212.82.225.7 (ClaraNet)
212.82.226.212 (ClaraNet)
213.73.91.35 (Chaos Computer Club Berlin) +1
58.6.115.42 (OpenNIC, Australien)
58.6.115.43 (OpenNIC, Australien)
119.31.230.42 (OpenNIC, Australien)
200.252.98.162 (OpenNIC, Brasilien)
217.79.186.148 (OpenNIC, Deutschland)
82.229.244.191 (OpenNIC, Frankreich)
216.87.84.211 (OpenNIC, USA)
2002:d857:54d2:2:20e:2eff:fe63:d4a9 (OpenNIC, IPv6 USA)
2001:470:1f07:38b::1 (OpenNIC, IPv6 USA)
2001:470:1f10:c6::2 (OpenNIC, IPv6 USA)
66.244.95.20 (OpenNIC, USA)
204.152.184.76 (f.6to4-servers.net, ISC)
2001:4f8:0:2::14 (f.6to4-servers.net, IPv6, ISC)
194.150.168.168 (dns.as250.net; anycast DNS!)
80.237.196.2 (Erdgeist)
194.95.202.198 (UDK Berlin)
88.198.130.211 (Dataflash)
78.46.89.147 (ValiDOM)
129.206.100.126 (URZ Uni Heidelberg)
79.99.234.56 (justnet.ch, Schweiz)
208.67.220.220 (OpenDNS)
208.67.222.222 (OpenDNS)
156.154.70.22 (Comodo Secure DNS)
156.154.71.22 (Comodo Secure DNS)
85.25.149.144 (Freie DNS-Server)
87.106.37.196 (Freie DNS-Server)
8.8.8.8 (Google Public DNS)
8.8.4.4 (Google Public DNS)
88.198.24.111 (jali/CCCHB)
Google ones
8.8.8.8
8.8.4.4
-> These ones are good. We all know google is evil, but their DNS services process much traffic. This is security by obscurity, finding a request to them is like finding a needle in the sea!
What about Level3 dns servers? safe?
youtube link for dns tut
http://www.youtube.com/watch?v=r8d-Sv2 ifconfig eth0 lladdr 00:00:00:00WCQ
http://www.youtube.com/watch?v=CBJaIahhH20
http://www.youtube.com/watch?v=wwS6Jufjqds
http://www.youtube.com/watch?v=CBJaIahhH20
http://www.youtube.com/watch?v=wwS6Jufjqds
bypassing DNS filters
http://pastehtml.com/view/ax99xkcpi.rtxt
Assorted
- rule #efore dishonour1 and rule #2
- /dev/null before dishonour
- do not mention your involvement with $operations
- do not swank with your e-peen
- do not mention your YT, Twitter, FB… accounts
- do not swank with any special knowledge
- speak english only
- use password with more than 10 characters
- dont re-use passwords
-> Generating strong passwords (Linux)
$ cat /dev/urandom | tr -dc ‘[a-z][A-Z][0-9]-_!@#$%^&*()_+{}|:<>?=’ | fold -w 64| head -n 5
This will generate a 5 rows of 64 char long password with symbols, numbers and letters. Change the -w value suit your needs. -w 128 will generate a 128 char passwd
- use keepassx
- use Live-CDs and thumbdrives and portable software
- do not keep logs of any kind
- repeat after me: I will not keep any logs
- pay your VPN with bitcoin, Ukash etc.
- choose a VPN-Provider in a safe jurisdiction (that means not US, UK, France)
- using your neighbours Wifi is not a *very* good idea, but on the other hand… better than get arrested
- only inexistent data is good data, because any existing data will be used against you
- Govs will even use inexistent data against you
- do not use your anonops-nick anywhere else (Change your nicks oftenly)
- it is a good idea to change the OS every now and then
- it is a good idea to physically separate anything Anon from anything not Anon, use different machines
- do not use the same E-Mail or VPN you use for Anon for other activities
- if you have to keep data, put it on thumbdrives so they can easily be destroyed > micro sd drives are twice as easily destroyed and die after an ammount of writes.
- keep in mind that a single Anon is unimportant to Anonymous
- the media will not keep your identity secret because the media sell information, do not trust the media (https://www.eff.org/deeplinks/2011/06/ws…wers-false )
- do not expose yourself too much, avoid IRL-Interviews, avoid Voice Interviews
- sadly, you cannot trust other Anons
- report suspicious activities
- be paranoid
- keep a low profile
- tell others when you will not join the IRC for al longer time
- before issuing any documents erase their metadata
Port Scans
http://www.port-scan.de
———————-
Links
http://www.truecrypt.org (encrypting software , who cant read will not know )
if they see that you have truecrypr installed, they will know. see http://xekcd.com/538/
http://www.comodo.com (firewall )
https://wiki.archlinux.org/index.php/LUKS (even more encryption)
Firefox Configuration
Firefox about:config
network.proxy.socks_remote_dns = true
browser.search.suggest.enabled = false
layout.css.visited_links_enabled = false
network.http.sendRefererHeader = 0
geo.enabled = false
browser.display.use_document_fonts = 0
Try to have a common fingerprint for your browser:
http://panopticlick.eff.org
-> The more unique your browser looks, the more the bad guys will identify you.
Firefox Addons
- Cookieculler ( cookies can trace u do not keep logs ! )
- HTTPS everywhere ( secured is encrypted (Y) )
Modify Headers
https://addons.mozilla.org/en-US/firefox…y-headers/
RequestPolicy
https://addons.mozilla.org/en-us/firefox…estpolicy/
NoScript
https://addons.mozilla.org/en-us/firefox…/noscript/
Certificate Patrol
https://addons.mozilla.org/en-us/firefox…te-patrol/
AdBlock Plus
https://addons.mozilla.org/fr/firefox/ad…lock-plus/
Mafiaa redirector
https://addons.mozilla.org/en-US/firefox…edirector/
Better privacy
https://addons.mozilla.org/fr/f encrypirefox/addon/betterprivacy/
User Agent switcher
https://addons.mozilla.org/en-US/firefox…-switcher/
http://techpatterns.com/downloads/firefo…ntswitcher
–>Credits to LulzSec for making this!<–
Link to post
http://pastebin.com/ccUhiSxZ
Disturbing Photo Of Occupy Portland's Excessive Police Force! (PHOTO)
Disturbing Photo Of Occupy Portland’s Excessive Police Force!
Posted November 19, 2011by GlobalGrind Staff
The photo above shows an Occupy Portland protester being sprayed in the face at close range with pepper spray while another protester holds up a peace sign directly next to her. The Portland Police officers appear to be geared up for full on combat for the protesters who are simply armed with their peace signs.
PHOTOS: BATTLE NEW YORK! Police Empty Zuccotti Park Of Occupy Wall Street Protesters!
Images of the Occupy movement are becoming exponentially disturbing as the protests elevates. At the start of the movement, photographs showcasing witty picket signs and protesters setting up camp dominated mainstream media.
STORY: Colin Powell Is Riding With Occupy Wall Street “As American As Apple Pie”
As the movement has made its way around the world, photographs of officers using excessive force on peaceful protesters is dominating the space of the aforementioned.
We are disheartened by photos such as the one shown above and hope that the protest can remain peaceful—on both the ends of the police and the protesters.
RT @GlobalGrind: WOAH! Police spray pepper spray in a #OccupyPortland protester right in the face! photo >> http://t.co/UA1IiWyf about 12 hours ago
Related articles
- Police Response to Occupy Wall Street is Absurd (forbes.com)
- Police arrest protesters occupying DC building (sfgate.com)
- #OWS Day of Action (wordsnotbullets.com)
No comments:
Post a Comment
-