Print 29 comment(s) - last by PrezWeezy.. on Sep 26 at 3:20 PM

Another member of LulzSec has fallen to police efforts. Only two members (Avunit and Sabu) remain at large.  (Source: FBI)
Federal authorities appear to slowly be catching some of those involved in recent attacks

LulzSec has fallen silent, with nary a Twitter post in two months.  The pace of its successor AntiSec's efforts has slowed.  And top LulzSec chief Topiary -- who turned out to be a teenager native of the UK's Shetland Islands -- awaits trial, after being caught by authorities who traced an account he used to play Xbox games online.  

Now more arrests are pouring in.  A 23-year-old Phoenix, Arizona native, Cody Andrew Kretsinger, has been arrested ("recursion").  You may recall that recursion showed up at numerous times in LulzSec's chat logs during the attacks 
[1][2][3on Sony Corp. (TYO:6758), but quit the group in June [source] as it stepped up attacks on the U.S. government.  Recursion reportedly was a relatively novice hacker relying heavily on SQL injection, a technique frowned upon by more sophisticated hackers.

Police in the UK last month also 
arrested 5 men ages 16 to 26 who allegedly together managed LulzSec chief Kayla's online identity.  Kayla claimed to be "a 16 year-old girl."  LulzSec/Anonymous chief Sabu confirms that Kayla has been arrested, though he/she has not verified that the UK authorities theory of multiple users' involvement is true.

According to Sabu, he and one other LulzSec member are the only ones walking free.  Topiary, KaylaRecursionTflowPwnsauce, and Palladium have all been arrested.  The other remaining free member appears to be Avunit, who was not a founding member, but participated in many of the group's key attacks.

Of course LulzSec was only a particularly bold subclan of the greater hacking collective Anonymous, who lives on via its thousands of members.  But active attackers within Anonymous have been hit with recent arrests as well.  Christopher Doyon, 47, of Mountain View, California, and Joshua Covelli, 26, of Fairborn, Ohio, allegedly members of Anonymous subclan People's Liberation Front
were arrested this week for allegedly orchestrating a distributed denial of service attack on the county of Santa Cruz, California back in 2010.

Anonymous isn't willing to go down without a fight, though.  Despite the recent arrests, members like Sabu remain defiant.  They have planned a "Day of Vengeance" on various parties in New York City in response to crackdowns on Wall Street protesters.  In 
a note for the group-without-a-leader writes, "... Anonymous and other cyber liberation groups will launch a series of cyber attacks against various targets including Wall Street, Corrupt Banking Institutions - and the NYC Police Department."

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: You can't hide
By PrezWeezy on 9/23/2011 3:21:41 PM , Rating: 2
a communications network that has every single bit duplicated and mirrored to government systems

Paranoid much?

RE: You can't hide
By greylica on 9/23/2011 4:53:12 PM , Rating: 2
He isn't a paranoid, it's real. The government are using systems near ''Echelon IV'' from the DeusEx Game. There is no escape once you're on the electronic trace. And there is no way of using alternate protocols once everything is mounted on top of IPV4/IPV6 nowadays. There is source and destination, simple as that. Even with such a decentralized way of comunicating with nearby systems that aren't exactly traceable by other country authorities, people that uses proprietary software normally will never know if their computers are sending discrete signals to some destination whereas identifiable information can be found, obviously, those guys uses technologies like wireshark to determine ''ins and outs'' of their computers to avoid be caugh, but once you dispare discrete signals to a tree of bots, some reversible information are stored in routers that could lead authorities to you. Ok, you can travel a lot, and send discrete signals to bots from where you are, but in fact, again, you will need a source and destination in order to those services get alive and active, then you have to send discrete alive signals from those infected machines to a destination, you can have lot's of destination for a botnet, but you will again need a source and destination, some uses domains to it ( those are being killed sistematically by giants like Microsoft and Governments )
But I can tell you one thing that is far more dangerous to be caugh working in an extensive botnet ( in fact, it's hard to be caugh once you have an extense range of Ips serving you...)

It's to put your head outside of wonderland...

RE: You can't hide
By geddarkstorm on 9/24/2011 12:08:41 AM , Rating: 2
I'd like to introduce you to a lovely concept called encryption, and onion routing, if you're really that worried.

RE: You can't hide
By ekv on 9/24/2011 2:29:06 AM , Rating: 1

1) encryption. It does scramble the message, but does nothing to hide, say, IP headers. The guy you're replying to kept talking about "source and destination". Encryption does nothing to obfuscate that. If you are LulzSec (or whatever) then you were trying to hide your true location. Otherwise you eventually get a knock on the door (if you're lucky).

2) onion routing. Effective but not guaranteed. Even something like TAILS
states upfront that TOR really isn't designed to defeat a global adversary. Umm, I think if you F*** with the CIA I suspect you will have just that kind of adversary.

There are other protocols in R&D that are specifically designed to make traffic analysis quite difficult. Haven't heard of anything that works reasonably well [i.e. like TAILS over the Internet, only better].

Lastly, given that LulzSec has been quiet as a mouse lately, I suspect that Eschelon is real.

RE: You can't hide
By SiliconJon on 9/24/2011 1:16:10 PM , Rating: 2
So tell me how many points it takes to secure a connection? And how many points does it take to infiltrate a connection?

A) 2, 1

RE: You can't hide
By SiliconJon on 9/24/2011 12:52:23 PM , Rating: 2
Condemn without investigation much?

What do you get when you upgrade ECHELON to TIA?

AT&T sued over NSA spy program

The Spy Factory

EFF - NSA Spying

AT&T whistleblower: I was forced to connect 'big brother machine'

AT&T whistleblower claims to document illegal NSA surveillance

Or were you deliberately being Orwellian by using "paranoid" to actually mean aware of realities of persecution? On that same doublespeak note, we've redefined whistleblowing to now mean of treason or terrorism.

RE: You can't hide
By PrezWeezy on 9/26/2011 3:20:40 PM , Rating: 2
Frank Blaco, former head of the NSA:
"Movies like Enemy of the State make those of us in the intelligence community laugh. They make us look omniscient, like we can collect anything we want, see anything we want. It's just not that way."

"This week I got an iPhone. This weekend I got four chargers so I can keep it charged everywhere I go and a land line so I can actually make phone calls." -- Facebook CEO Mark Zuckerberg

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki