Anonymous grabs email from firm that defended Marine in Haditha case
Hacking collective says it has collected 3GB worth of detailed records, transcripts related to case
Computerworld - In what's turning out to be quite a busy Friday for the hacking collective, Anonymous today said it has broken into the website of a law firm that represented a U.S. Marine accused of killing civilians in Haditha, Iraq.
Anonymous said it had hacked into the site of Puckett & Faraj PLLC and accessed more than 3GB of 'court mails, faxes, transcriptions etc" related to the Haditha case. The group said it plans to release the documents soon.
Neal Puckett and Haytham Faraj were trial defense attorneys for Staff Sergeant Frank Wuterich, a marine accused on charges that he was responsible for the deaths of 24 civilians in Haditha in 2005.
Wuterich late last month pleaded guilty to negligent dereliction of duty in connection with the deaths and faces up to three months in prison, a pay cut and a demotion in rank.
The Anonymous attackers today said they defaced the law firm's website to protest the decision.
"We believe it is time to release all of their private information and court evidence to the world and conduct a People's trial of our own," the group said in a statement.
In a lengthy diatribe, Anonymous claimed it had grabbed 3GB worth of email messages from Puckett & Faraj which it plans to release soon.
According to Anonymous, the emails contain "detailed records, transcripts, testimony, trial evidence, and legal defense donation records pertaining to not only Frank Wuterich, but also many other marines they have represented."
"We got the usual boatloads of embarrassing personal information," the message noted.
No one from the law firm was immediately available for comment or to confirm if the firm's emails have in fact been stolen. The Puckett & Faraj home page had been replaced with a video of rapper KRS-One's Sound of Da Police and a long message explaining the rationale for the attack until early this afternoon when it was apparently shut down.
This is the second incident reported by Anonymous today. Earlier, the hacking collective posted a 16-minute recording of an intercepted phone call between the FBI and the Scotland Yard.
According to an FBI officials quoted in the New York Times, members of Anonymous appear to have gained access to an email detailing the time, phone number and access code for the call, which they then used to snoop in on the conversation.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts