Anonymous plans to knock State of the Union offline
Hacking collective claims it has a plan to disrupt live streaming of President's speech due to Swartz death and Obama cybersecurity plan
Computerworld - The Anonymous hacking collective Tuesday said it plans to disrupt the live web stream of President Barack Obama's State of the Union address tonight.
In separate communiques, Anonymous said it is moving to distrupt the proceedings to protest the recent death of Internet pioneer Aaron Swartz and a White House plan to issue a cybersecurity executive order on Wednesday.
In one alert, Anonymous said it will form a "virtual blockade between Capitol Hill and the Internet" during the President's address. "Armed with nothing more than Lulz, Nyancat and PEW-PEW-PEW! Lazers, we will face down the largest superpower on Earth," the group said.
The communique offered no details on how Anonymous plans to derail the webcast. Instead it called attention to Swartz' recent suicide and blamed the death on "idiotic and destructive efforts" to control the Internet, presumably by the government.
It goes on to list various topics that Obama is not expected to mention in the address, including the National Defense Authorization Act and the continued detention of Bradley Manning, the U.S. soldier accused of leaking critical documents to WikiLeaks.
A communique in the form of a letter addressed to Obama called attention to the administration's widely reported plans to issue a cybersecurity executive order on Wednesday. The long-expected order stems from what the White House has long said is the need for immediate action to protect critical assets against cyber threats because Congress has long failed to pass cybersecurity legislation.
"Anonymous has reached a verdict of NO CONFIDENCE in this executive order and the plans to reintroduce the CISPA bill to Congress on the same day," the group said referring to plans by two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill.
"As such, President Obama and the State of the Union Address will be BANISHED from the Internet for the duration of live delivery," the group claimed.
Anonymous is known for making such threats on a regular basis, some successful and some not.
The White House has said that it will offer an enhanced version of Obama's third State of the Union address that will combine live streaming with charts, statistics and data designed to provide context for those following online.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Syrian Electronic Army shanghais Microsoft's Twitter account, blog
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- Cyber drills like Quantum Dawn 2 vital to security in financial sector
- Quantum Dawn 2 will test Wall Street's cyber readiness
- Pentagon accuses China of cyberattacks on U.S military, business targets
- Spamhaus attacks expose huge open DNS server dangers
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts