Anonymous plans to knock State of the Union offline
Hacking collective claims it has a plan to disrupt live streaming of President's speech due to Swartz death and Obama cybersecurity plan
Computerworld - The Anonymous hacking collective Tuesday said it plans to disrupt the live web stream of President Barack Obama's State of the Union address tonight.
In separate communiques, Anonymous said it is moving to distrupt the proceedings to protest the recent death of Internet pioneer Aaron Swartz and a White House plan to issue a cybersecurity executive order on Wednesday.
In one alert, Anonymous said it will form a "virtual blockade between Capitol Hill and the Internet" during the President's address. "Armed with nothing more than Lulz, Nyancat and PEW-PEW-PEW! Lazers, we will face down the largest superpower on Earth," the group said.
The communique offered no details on how Anonymous plans to derail the webcast. Instead it called attention to Swartz' recent suicide and blamed the death on "idiotic and destructive efforts" to control the Internet, presumably by the government.
It goes on to list various topics that Obama is not expected to mention in the address, including the National Defense Authorization Act and the continued detention of Bradley Manning, the U.S. soldier accused of leaking critical documents to WikiLeaks.
A communique in the form of a letter addressed to Obama called attention to the administration's widely reported plans to issue a cybersecurity executive order on Wednesday. The long-expected order stems from what the White House has long said is the need for immediate action to protect critical assets against cyber threats because Congress has long failed to pass cybersecurity legislation.
"Anonymous has reached a verdict of NO CONFIDENCE in this executive order and the plans to reintroduce the CISPA bill to Congress on the same day," the group said referring to plans by two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill.
"As such, President Obama and the State of the Union Address will be BANISHED from the Internet for the duration of live delivery," the group claimed.
Anonymous is known for making such threats on a regular basis, some successful and some not.
The White House has said that it will offer an enhanced version of Obama's third State of the Union address that will combine live streaming with charts, statistics and data designed to provide context for those following online.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Is French outrage against U.S. spying misplaced?
- Lawmakers seek answers on Obamacare Data Hub security
- China-based hacking group behind hundreds of attacks on U.S. companies
- How to Prepare for a Potential Syrian Counterattack on the U.S. Power Grid
- New York Times site outage caused by attack on domain registrar, company says
- Cyber drills like Quantum Dawn 2 vital to security in financial sector
- Quantum Dawn 2 will test Wall Street's cyber readiness
- Pentagon accuses China of cyberattacks on U.S military, business targets
- Spamhaus attacks expose huge open DNS server dangers
- Update: Spamhaus hit by biggest-ever DDoS attacks
Read more about Security in Computerworld's Security Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Review: Box beats Dropbox - and all the rest - for business
- Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and... All Government IT White Papers
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.