There have been a rash of arrests and lately, along with many of our brother’s and sister’s going underground and dark for fear of arrest. While I can’t say that I blame anyone for going dark when the heat is on, (I did it myself for almost six months), we are starting to lose the core of our actual hackers. As the year winds on, we have had some successes, and some failures, but we as a whole, are not where we were this time last year. Our progress has declined and our former glory of exposing corruption has faded somewhat.

The entire idea of Anonymous is decentralization, and therefore there is no leader or Lt’s to motivate or plan and what not, these things happen on the fly from various people within the collective.  Those newer to the collective have not had the experience of dealing with some of the most talented hackers that I have ever had the pleasure to work with, but whom are now either in prison, facing charges, or cooperating with the feds because they were being threatened.

For us to move forward into the future we require not leadership, but some of the older and most technically skilled members to step up and show the entire collective how it’s done. We need to stop with the bullshit, and start doing more basically. Lulz are great, i’m a huge fan of them, but it isn’t the only reason why we’re doing what we’re doing. Good luck in the future to us all, and here’s to a brighter tomorrow.

-Bree

@Anon_Bree 

Anonymous: The PR Machine & The Evolution of the Collective.

 

Image

   We have become a PR machine. I pass no judgement on this what so ever. Anonymous does good for the right reasons, while circumventing the red tape. But we are gradually moving away from the hacking heavy tactics and on to public relations tactics. This is just what i see. I myself have not been very active as of late within Anonymous due to personal issues, however i keep appraised on the news and talk to who i talk to on the IRC’s and twitter.

  #OpJustice4Rehtaeh is the most recent example of how our PR tactics are having a profound inpact on the world. No longer are hackers alone. There are roles to fill in all catagories within the Anonymous Collective. As a whole we have evolved past straight hacks, dumps, and pure lulz. For lack of a better term, we grew up. It hasn’t happened all at once, and it has been a long road. From our turbulant beginings, to the many weathered storms, and eventually to now, we have been evolving. I personally cannot wait to see where we will be in ten years, or even one.

  I’m not saying that all of us within Anonymous are knights in shining white armor who do good because that’s just what we do. Yes, i am a part of Anonymous, yes i do like to think we have the best intentions all the time, and do things the correct way all the time (whatever that means). We are only…..wait for it…..human. We have hurt some innocents over the years in pursuit of a greater good (And in years gone by, just for lulz).

  When i first got involved in hacktivism in the 90s, the adventure was what attracted me initially i suppose. Here was this shiny new idea. This shiny new adventure to undertake. The morality was still new. But after Omega coined the term ‘Hacktivism’, i knew i was along for the ride. Anonymous is carrying on a long tradition dating back decades, as it were, in a new way. It’s been a hell of a ride so far for us, and i don’t know where we’ll end up, but i can’t wait to see what’s there when we finally arrive.

-Bree

@Anon_Bree

irc.voxanon.net/6667 #LulzTeam #FreeAnons

 

 

Sorry for the lapse in posts. i will resume posting this following week. have had a lot of things to deal with lately and no time for blogging, but that will change this comming week. thanks for all the support and love guys.

-Bree

Here is how Anonymous breaks down from bottom to top: (keep in mind, the bottom is no less important than the top) We have our activists on the ground in support of operations, risking limb, arrests, and literally their lifes to do so. Than you have our hacktivists that create graphix and pressreports for operations, both underway, and for future ones. Next up we have the Skiddies: The onles who DDoS wepages which results in a kind of digital sit in against some form of corruption or wrongdoing a company or organization has done. Nearer to the top, are hackers who come up with plans of attacks, organize how said attacks should go down, and why. Basically they create a plan of attack for each of the subgroups i have previously mentioned. Than at the top of the list is the classic black hat hacker, who can do everything from break into your encrypted emails, webdefacments, and break into pretty much any box possible and make it their own. Together, we make up something the world has never seen in such numbers: Anonymous.

While i know that there will be more than a few that will imediately dismiss what i am about to propose, i would hope that there will be others that will understand why this idea could be extremely benifical to the group. To be put simply, my propsal is this:
Let me start by saying these people would not be LEADERS of Anonymous. But, i suggest that we round up the best in our feilds, such as graphix design, idea people, tactic planning, people with the best ddos ability due to botnet or unique programs they have made or whatever, the best actuall hackers, and some older hackers who have seen the entire picture of hacktivism because they have been around since its inception. What i propose is a small pannel of these people, who, together, would be more apt to coordinate the bigger Anonymous operations. These people would have power only in the group, and as usual, anyone under said group of, lets say, coucilors, can accept their plans or not. My hope is that if we can get the best of the best at the top to formulate, design, and come up with an execution plan, the people outside of this little coucil would see a well made plan, for a good reason, and want to join on their own. Or course others are free to no participate as they wish, like i said this coucil is by no means a leadership aspect to Anonymous. It’s just good organizing. We all have diff skill sets, ideas, implimentations, and have diff opinions about how things should be done.
This council should be kept private from the authorities for as long as possible, because any attention could bring a new wave of fanatic searching for them by the feds. The council names should be known only to the counsil. This council would only be needed for conducting large scale operations that require by definition leaks, dumps, and box pwning. Obviously Anonymous can do any other type of operations (some badly hence being caught). The idea of the council are the best of the best doing 100% damage to the target on all aspects of the front. and already bein on the ready before the op happens with a very elequint press release as to why and bring anyone who reads it to our side,thus gaining more anon’s in a half assed round-a-bouted way like OpNewBlood minus the feds in that op.
The identies of the council would be kept as secret as possible, but even if all somehow get arrested, we still will go back to the previous mode without a council until another can be formed. no real damage there. The problem i know will be in selecting these people because we all think that we are the best of everything we do, until we take our egos out of the picture. It will have to be done that way, otherwise it will not work. All this effectivly does is take the best minds in their particular fields and throw them into an IRC to brainstorm and come up with a plan for an OP that one or two or even three of them alone could not have. It’s the next logical step to Anonymous imo.
Give me many coments on what everyone things of this please. or tweet them to me @Anon_bree

(EDITOR’S NOTE: The council has power only in itself.hey would come up with the best plan target nd execution of said plan. This will th an trickle down to  other Anons to either accept and execute the plan, or not. The council would have ZERO power to tell anyone what to do, they are , for lack of a better word, a think tank)

 

 

-Bree
@Anon_Bree
#LulzTeam

    As most people in the cyber community have noticed, there has been a lull in activity from Anonymous in recent months. There have still been Ops successfully executed, although usually on a smaller scale than in the last year. Many have equated this diminished activity to the recent string of high profile arrests of many prominent hackers within the group, along with other sub-groups, such as TeaMp0sioN in explicably and effectively going dark after the arrest of TriCk. While this would seem to be a logical conclusion from an outsider point of view, such is not the case.
    To understand why this is not the case, you have to understand the history behind hacktivism. Hacktivism has been around for a long time now, over 20 years, but it is only within the last five or six years that it has gotten enough mainstream media attention to have been recognized on a global scale. This attention is almost exclusively because of the new hacktivism model of Anonymous. While Anonymous has changed the form of a hacktivist collective, it has not changed how hacktivsm effectively works. In years gone by, groups that took up the fight did so with an actual roster. Groups like Cult of the Dead Cow, Electronic Disturbence Theater, People’s Liberation Front, and the l0pht to name a few, all had a limited member list. New members were inducted into said groups at the discretion of the groups themselves or forced to fight on their own. When members were arrested or went dark for fear of arrest, it would take time for new groups to rise up and take their place. With the new Anonymous model, anyone and everyone who wants to sail their ship under the Anonymous banner is free to do so, effectively making the collective immortal as long as hacktivsm lives on in the hearts of the people. Like i said before however, the model of Anonymous has changed, but they way we conduct hactivsm has not.
     To put it simply, we react to threats against freedom, privacy, and anonminity. Operations such as OpPayback, OpBART, all of the arab spring operations, operations against SOPA, ACTA, and pretty much 90% of operations to date have all be responses to a threat. When there are fewer real threats, or rather known threats, operations shift to smaller ones of people’s choosing, rather than wide spread uprising like with OpMegaUpload for instance. While injustices still exist, there is not always a cyber solution to the problem, and Anonymous has risen to this particular challenge by taking to the streets in protest with operations such as OpBART, paperstorm, feed the homeless, and most notably suppport of occupy wall st. The media doesn’t consider those operations as hacktivsm persay, and thus do not report them as such, leading mainstream media, and even hackers and activists within Anonymous to think this lull in activity to mean that we are in some way no longer as active as ‘normal’.
    Recently there has been a call from more than a few hackers within Anonymous to ‘step up’, or ‘get organized’. People that have risen up to take the place of those that have been arrested have been called ‘wanna-be lulzsec hackers’. This is particularly annoying in that, while lulzsec grabbed much media attention with their 50 days of lulz, and high profile hacks, they did not do much for the movement. Their main motivation was for the lulz. Don’t get me wrong, there was contribution to the cause, and some very high profile hacks that contributed to it by the group, Sabu in particular, but as a whole their main contribution to Anonymous has to allow the media to portray us as anarchists only hacking for laughs. While i know that many actually joined Anonymous because of the media attention that LulzSec grabbed, and my position is probably not a popular one with many who will read this, if you step back and really look at everything they did last year i don’t know how anyone could come to any other conclusion.
    The truth of the matter is that with any activsm, a great injustice or corruption is needed for everyone to join together, organize, and do something about it. Anonymous is not declining, nor is is dying. Quite the opposite actually; with the new and quite frankly revolutionary mode that Anonymous has established, we will be around for a very long time.

-Bree

@Anon_Bree
#LulzTeam

     There having been several, and way too many, high profile arrests in recent months, i will be explaining various methods with which to protect yourself while you sail the high seas of that thing we call the Internet. For various reasons, one being time, the other being that if you’re reading this to learn how to protect yourself, you are probably not a ‘leet hacker’ (i hate that term btw), i’ll be simplifying how these methods work as best i can without loosing the overall process of the function. With the arrests of the Anonymous 16, the activists who simply participated in a DDoS attack on Paypal, the news has made no secret about how easy it was to catch them. Simply by analyzing the incomming IP traffic from the host computer to the target computer (paypal), they were able to pinpoint who sent the traffic that helped to disable the site. This was made especially easy by the fact that nothing was used by the Anonymous 16 to obscure their IP addresses during the attack. The Anonymous 16 used a program called Low Orbit Ion Cannon, which is a DDoS tool. While some DDoS tools allow for the use of a proxy (which isn’t as secure and anonymous as most people tend to think) to obscure your IP address, the LOIC is not one of them. So, these activists simply joined in an attack, without taking precautions (some of them not even knowing what they were doing was illegal), and were subsequently arrested and charged in federal court.

     There are several ways to accomplish obscuring your IP address while engaging in a DDoS attack on a website. My personal favorite is the SSH Encrypted Tunnel. Simply put, what an encrypted tunnel does is establish an encrypted connection to a remote machine, subsequently making all outgoing traffic from your computer and IP address, appear that it is coming from the remote machine that your tunnel has connected to. To top it off, all information to and from are encrypted with various different cyphers, depending on what program you are using to establish said connection. SSH Encrypted Tunnels also have other functions that are helpful. For example, they allow you to bypass firewalls that prohibit certain internet services, such as censored webpages. I suggest that you read up on SSH Encrypted Tunnels, they are very useful for a many number of things besides the two things i have described above.

     The next way to obscure your IP address is by use of a VPN, a Virtual Private Network. Very simply put, VPN’s allow you to access a network, and by way of which, changes your outgoing traffic IP address. Now there is a reason that i almost exclusively use SSH Tunneling rather than a VPN. I’m sure that a lot of you heard about HideMyAss turning over their servers, including logs, to the authorities last year, which lead to the arrests of several Anon’s. While VPN’s do support a tunneling function, they do not use cryptographic tunneling. Instead they rely on the security of a single provider’s network to protect your traffic.

     Proxy address are also another method of obscuring your IP address, although not near as secure as the previous two methods i have listed. A proxy works pretty much the same way that a tunnel does with the following exceptions: The information is not encrypted; You have no way of knowing how secure the proxy you are using to connect to is unless you check it out yourself; and publicly available proxy’s tend to get blocked quickly by various services because they are used quite a bit by amateurs to DDoS, or spam on an IRC for example.

     The last method for obscuring your IP address that i will address here is the Tor Network. Tor has been around for over a decade, and was quite innovative when it was released so long ago. Now a days, however, there are much more secure and a lot faster ways to protect yourself. Now don’t get me wrong, using Tor in a pinch when you have to is fine. Just don’t rely on it for everyday use. There have been instances where a person running a Tor Relay or use Tor to do blackhat activities, have been arrested and charged with their crime; at the very least people have been questioned for running Tor Relays alone even when they themselves have done nothing illegal. Tor relies on other Tor users setting up Relay points in the Tor Network, allowing you to surf the Internet anonymously in a pinch. As i said, while the Tor Network is encrypted, it isn’t the most stable or secure of things out there.

     Now that we have ways to obscure our IP addresses from view, it’s time to move on to protecting sensitive data. Obviously, the first thing that would come to anyone’s mind is encrypting sensitive data. But there are other questions most people have: What is the most secure encryption? Where should i keep the encrypted files? What about the encryption key? How hard is it to crack encrypted files? When it comes to which is the most secure, i will turn to what has been mathematically proven: Vernam Encryption. Vernam encryption works on the same theory as one-time pads, and is often called one-time pads also. It has been mathematically proven to be unbreakable if used correctly. Vernam encryption relies on the unique use of the key and sufficient randomness of the used key. Even with increased computing power, it cannot be broken. This is in contrast to other encryption methods, such as AES encryption, which achieve their security based on the burden of calculating theoretical conceivable decoding, which for an attacker, is practically not feasible. In other words, it works on the assumption that the attacker will not have the necessary computing power to break the cypher. Moving on now to where you should keep your encrypted files. This one is simple. NOT ON YOUR COMPUTER. Use a USB stick, or even a portable hard drive. USB sticks are portable, easily concealable, and easily destroyed if need be. Both the files and the encryption key should be kept on portable removable storage devices.

     All in all, if you are careful, and learn how and why things work, and how to circumvent them, you should be fine. How do i know this? Easy. I have been active for almost two decades now. I have rubbed elbows with the likes of Lords of Destruction, the l0ft, and the Cult of the Dead Cow in the 90’s just to name a few, and i am still here, fighting for the cause. Lastly, and probably one of the most important things i can tell you is this: Change your handle at least on a semi-regular basis. Personally i change my handle roughly every few years just in case. Once your name is known, and people either know your exploits by you bragging (never brag btw), or by however else, you are in danger. Over the last two decades i have had literally dozens of handles, and i am not remembered by many for that reason. And in a year or two, i will shed the name Bree, and start over with another name. Hacking is not about getting your name in the paper, or people knowing who you are in the blackhat community. This will only lead to bad things happening, like attention from the authorities, which can lead to arrest and imprisonment, or worse getting flipped to a whitehat by the feds. Anyway, hope you’ve all enjoyed this, and i hope you take what i have said to heart.

-Bree

@Anon_Bree

#LulzTeam

%d bloggers like this: