The IRC servers used by AnonOps have been compromised and taken over by "Ryan," who is reportedly a young man in Essex, England. These servers were used to plan and coordinate many of the denial-of-service attacks that flew the Anonymous flag, including the recent attack on Sony. Ryan says he seized control of the servers and lots of other infrastructure in protest of a secretive cabal of Anonymous "leaders" whom, he claims, secretly steer Anonymous's debate over which targets to hit and for how long using private IRC channels.
Anonymous claims to have no leaders, but it also lacks any sort of structure through which such a claim could be made -- that is, lacking any constitution or formal decision-making structure, there is no clear way in which an official "no leaders" policy could be ratified and articulated. If no one can speak for Anonymous, can anyone say (on behalf of Anonymous), "We have no leaders?" It's the key question in this bit of drama, because the ousted "leaders" have made counterclaims that Ryan acted as he did in order to establish himself as leader of Anonymous.
Others argued against this equivalence. "Ryan was the dictator, not the one who decided to solve the dictator problem," said one. Another responded, "Lol, how do you know? For all you know, Owen and Ryan are just the classic generals duking out to take over."
The hackers hacked: main Anonymous IRC servers invaded
For his part, Ryan told the UK's Thinq today that he shared the concerns over private decision making. Owen and the other leaders "crossed the barrier, involving themselves in a leadership role," Ryan said. "There is a hierarchy. All the power, all the DDoS--it's in that [private] channel."
But among those who backed AnonOps, one thing was clear: Ryan needs to get got. Anons quickly embarked on a mission to find Ryan "dox," and quickly unearthed what they said was his full name, his home address (in Wickford, Essex, UK), his phone number, his Skype handle, and his age (17).
(Image: Anonymous Declaration of IndepenDance. Wallpaper (3923x4656), a Creative Commons Attribution (2.0) image from thinkanonymous's photostream)
The Norse Map is a Wargames-style visualization of ongoing attacks on servers around the world. Though it shows honeypots rather than actual private or government targets, the result is a live snapshot of trends in computer mischief. Dubai seems to be getting quite a pounding today.
The internal records of Lizardsquad’s Lizardstresser — a service that would, for money, flood sites with traffic intended to knock them off the Internet — were dumped to Mega by Doxbin’s former operator, providing an unprecedented public look at the internal workings of booter.
In Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door, Brian Krebs offers a fascinating look at the mass-scale cybercrime that underpins the spam in your inbox and provides an inside peek at a violent fight among its principle players. Cory Doctorow reviews.
Plastic is so 2013. You don’t want to buy something only to throw it away or lose it and barely care. You like nice things and want to hang onto them. The Plazmatic lighter here is a high quality, high tech alternative to the typical cheap, plastic lighter you get at the old gas station. […]
Real engineers build things. Super cool engineers build things with their hands and fingers, like our engineering forefathers did. No idea where to even begin to do that? This step by step Arduino course is now 92% off and is going to get you up and running, from zero to hero, in no time. So […]
How do Google and YouTube really work? It turns out, Python kind of runs things around those parts. And with this bootcamp, you’ll get whipped into shape and ready to start programming yourself. Whether you’re a Python pro and just want to sharpen your skills, or a total tech newbie with little or no coding […]