Anonymous hits US government site, threatens release of secrets
Hack claimed the suicide of Aaron Swartz as its spark
IDG News Service - Hackers working under the name of the Anonymous hacktivist collective hit a U.S. government website on Saturday, replacing its home page with a 1,340 word text detailing its frustrations with the way the American legal system works and a threat to release "secrets" gathered from U.S. government websites.
The website of the U.S. Sentencing Commission, which establishes sentencing policies for the federal court system, was offline for much of Saturday as a result of the attack.
"This mornings cyber attack on the Commissions website www.ussc.gov brought it down temporarily, but the site now has been restored," the commission said in a brief statement issued on Saturday evening.A "The Commissions publications, training materials, and federal sentencing statistics are again readily accessible to visitors to the site."
The site and timing of the attack was not random, according to the message that replaced the home page before it was taken offline.
"Two weeks ago today, a line was crossed," the message read. "Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win -- a twisted and distorted perversion of justice -- a game where the only winning move was not to play."
Swartz committed suicide in New York on Jan. 11, apparently over an upcoming trial on computer intrusion, wire fraud and data theft charges that carried a maximum penalty of 35 years in jail. The charges stem from allegations that Swartz stole millions of scholarly articles and documents from the JSTOR database with the intention of making them available online at no charge.
His suicide sparked outrage among the hacktivist community, much of which blamed the prosecution of the case and potential penalties he faced as directly contributing to his death.
"This website was chosen due to the symbolic nature of its purpose -- the federal sentencing guidelines which enable prosecutors to cheat citizens of their constitutionally guaranteed right to a fair trial, by a jury of their peers -- the federal sentencing guidelines which are in clear violation of the 8th amendment protection against cruel and unusual punishments," the message on the hacked website read.
The message went on to say that the group had infiltrated numerous U.S. government websites and gathered material it judged would be embarrassing if released.
"We have enough fissile material for multiple warheads. Today we are launching the first of these. Operation Last Resort has begun..."
The message didn't reveal the nature of the "secrets," but the hackers made available on the site a multi-part encrypted file that was said to contain them. It's impossible to determine what's actually in the files, which were named for judges on the U.S. Supreme Court.
The message went on to demand a number of reforms to the U.S. legal system.
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is firstname.lastname@example.org
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
Top Considerations for Moving to a Cloud Delivery Model for ITSM
Find out whether SaaS-based ITSM is right for you
- Software-as-a-service is more than just a cloud-based delivery model-it's a new approach to service that lets companies optimize utilization of in-house IT resources... All Government IT White Papers
- Pre-Engineered solutions from VCE Simplify Core Infrastructure Implementation In this video, the CTO of Purdue Pharma, a privately held pharmaceutical company explains how Purdue transformed their data center infrastructure with VCE.
- Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs George Weiss, Gartner Vice President and Analyst, and Praveen Akkiraju, CEO of VCE, provide practical information regarding the various aspects of Integrated Infrastructures...
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.