Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, January 27, 2013

In Swartz protest, Anon hacks U.S. site, threatens leaks

Posted on 2:14 AM by Unknown

In response to the death of tech activist Aaron Swartz, hacktivist collective Anonymous hacked a U.S. government Web site related to the justice system and posted a screed saying it would begin leaking a cache of government documents if the justice system is not reformed.
The group hacked the Web site for the United States Sentencing Commission late Friday, posting a message about what it's calling "Operation Last Resort," along with a set of downloadable encrypted files it said contain sensitive information. The sentencing commission is the caretaker of the guidelines for sentencing in U.S. federal courts.
"Two weeks ago today, a line was crossed," the group's statement reads. "Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win -- a twisted and distorted perversion of justice -- a game where the only winning move was not to play."

Anonymous encouraged its followers to download the files on the hacked site, a set of nine downloads named after the U.S. Supreme Court's nine justices and collectively referred to by the hacking collective as a "warhead."The recent suicide of Swartz, a proponent of freely accessible information, has been blamed by some on what they say were outrageously aggressive efforts on the part of the U.S. Attorney in Massachusetts to punish Swartz for his alleged theft of millions of articles from a database of academic journals. The 26-year-old Swartz, who struggled with bouts of depression, had been charged with 13 felonies and threatened with decades in prison and fines exceeding $1 million. U.S. Attorney Carmin Ortiz says Swartz' lawyers were also offered a plea bargain in which he'd plead guilty and serve perhaps 6 months.
"Warhead-US-DOJ-LEA-2013.AEE256 is primed and armed. It has been quietly distributed to numerous mirrors over the last few days and is available for download from this website now. We encourage all Anonymous to syndicate this file as widely as possible."
The group wouldn't specify what, exactly, is in the files, saying only that "the contents are various and we won't ruin the speculation by revealing them. Suffice it to say, everyone has secrets, and some things are not meant to be public. At a regular interval commencing today, we will choose one media outlet and supply them with heavily redacted partial contents of the file."
The contents of the encrypted files can apparently be accessed only with a decryption key, and Anonymous said it didn't necessarily want to provide that key to its followers -- it mentioned "collateral damage" as a result of any leaks and said "It is our hope that this warhead need never be detonated." But the group said the U.S. government must begin acting on reforms to the justice system suggested by the system's critics, and in spelling out its demands more specifically, it mentioned plea bargaining and suggested the overhaul of legislation such as the mid-1980s antihacking law entitled the Computer Fraud and Abuse Act.
 ...in order for there to be a peaceful resolution to this crisis, certain things need to happen. There must be reform of outdated and poorly-envisioned legislation, written to be so broadly applied as to make a felony crime out of violation of terms of service, creating in effect vast swathes of crimes, and allowing for selective punishment. There must be reform of mandatory minimum sentencing. There must be a return to proportionality of punishment with respect to actual harm caused, and consideration of motive and mens rea [criminal intent]. The inalienable right to a presumption of innocence and the recourse to trial and possibility of exoneration must be returned to its sacred status, and not gambled away by pre-trial bargaining in the face of overwhelming sentences, unaffordable justice, and disfavourable odds. Laws must be upheld unselectively, and not used as a weapon of government to make examples of those it deems threatening to its power.
The group said it had acquired the files by compromising various government Web sites and installing "leakware," which it has since removed to cover its tracks.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • How Access Registry Using Command Prompt
    Firstly, you need to know that regedit.exe is a tool that created to access registry based on windows. And reg.exe is a tool that created ...
  • Pirate Bay to sue antipiracy site for pirating its design
    An antipiracy group may find itself in legal trouble after borrowing the look of the Pirate Bay Web site for a new campaign. The Pirate Bay...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ▼  January (19)
      • Nokia begins work on graphene, world's strongest m...
      • iPhone users pay highest phone bills
      • 10 ways PowerPoint 2013 gets more polish
      • New iPad 4 reportedly in the works -- perhaps a 12...
      • In Swartz protest, Anon hacks U.S. site, threatens...
      • Swartz didn't face prison until feds took over cas...
      • Samsung quarterly profit jumps 76 percent on Galax...
      • CNET News Business Tech Intel to wind down desktop...
      • WikiLeaks says Aaron Swartz may have been a 'source'
      • SSDs vs. hard drives vs. hybrids: Which storage te...
      • Prosecutor in Aaron Swartz 'hacking' case comes un...
      • Feds: MegaUpload was not entrapped
      • Apple is done, say teens
      • White House shoots down petition to build Death Star
      • Chrome 24 brings math formatting, better offline a...
      • Eyes-on: Samsung's Youm flexible-display tech at C...
      • Intel at CES: throwing down the gauntlet with Nvidia
      • Dad hires hit men to kill son's video game characters
      • Google to make Maps accessible to Windows Phone users
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile