Operation AntiSec
   HOME

TheInfoList



OR:

Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of the hacking group
LulzSec LulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed ...
and
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
, and others inspired by the announcement of the operation. LulzSec performed the earliest attacks of the operation, with the first against the
Serious Organised Crime Agency The Serious Organised Crime Agency (SOCA) was a non-departmental public body of the Government of the United Kingdom which existed from 1 April 2006 until 7 October 2013. SOCA was a national law enforcement agency with Home Office sponsorship ...
on 20 June 2011. Soon after, the group released information taken from the servers of the
Arizona Department of Public Safety The Arizona Department of Public Safety (AZDPS) is a state-level law enforcement agency with a primary function of patrolling and enforcing state laws on Arizona highways. Director Heston Silbert was promoted from Deputy Director to Director in ...
; Anonymous would later release information from the same agency two more times. An offshoot of the group calling themselves LulzSecBrazil launched attacks on numerous websites belonging to the
Government of Brazil The Federal Government of Brazil (''Governo Federal'') is the national government of the Federative Republic of Brazil, a republic in South America divided in 26 states and a federal district. The Brazilian federal government is divided in th ...
and the energy company
Petrobras Petróleo Brasileiro S.A., better known by the portmanteau Petrobras (), is a state-owned Brazilian multinational corporation in the petroleum industry headquartered in Rio de Janeiro, Brazil. The company's name translates to Brazilian Petrole ...
. LulzSec claimed to retire as a group, but on 18 July they reconvened to hack into the websites of British newspapers '' The Sun'' and ''
The Times ''The Times'' is a British daily national newspaper based in London. It began in 1785 under the title ''The Daily Universal Register'', adopting its current name on 1 January 1788. ''The Times'' and its sister paper '' The Sunday Times'' ( ...
'', posting a fake news story of the death of the publication's owner
Rupert Murdoch Keith Rupert Murdoch ( ; born 11 March 1931) is an Australian-born American business magnate. Through his company News Corp, he is the owner of hundreds of local, national, and international publishing outlets around the world, including ...
. Anonymous released their first cache of the operation on 27 June 2011, taken from an anti- cyberterrorism program run by the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
and
Federal Emergency Management Agency The Federal Emergency Management Agency (FEMA) is an agency of the United States Department of Homeland Security (DHS), initially created under President Jimmy Carter by Presidential Reorganization Plan No. 3 of 1978 and implemented by two Ex ...
. They continued attacks on the Arizona government. They also launched attacks against the governments of
Brazil Brazil ( pt, Brasil; ), officially the Federative Republic of Brazil (Portuguese: ), is the largest country in both South America and Latin America. At and with over 217 million people, Brazil is the world's fifth-largest country by area ...
,
Zimbabwe Zimbabwe (), officially the Republic of Zimbabwe, is a landlocked country located in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Botswana to the south-west, Zambia to the north, and ...
, and
Tunisia ) , image_map = Tunisia location (orthographic projection).svg , map_caption = Location of Tunisia in northern Africa , image_map2 = , capital = Tunis , largest_city = capital , ...
. Their most recent attacks have been against large corporations,
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
, and various United States law enforcement websites. Anonymous has used the stolen credit card numbers of police officers to make unauthorized donations to various causes. Others have also committed hacks in the name of the operation, including a hack into the
Fox News The Fox News Channel, abbreviated FNC, commonly known as Fox News, and stylized in all caps, is an American multinational conservative cable news television channel based in New York City. It is owned by Fox News Media, which itself is o ...
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
account to post a false news story about the assassination of
President of the United States The president of the United States (POTUS) is the head of state and head of government of the United States of America. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal gove ...
Barack Obama Barack Hussein Obama II ( ; born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017. A member of the Democratic Party (United States), Democratic Party, Obama was the first Af ...
and attacks on the websites of government entities in various countries. The groups involved have published sensitive government and corporate information, as well as the email addresses, names, and social security numbers, and credit card numbers of website users.
Law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term ...
has launched investigations into many of the attacks committed as part of Operation AntiSec. At least seven arrests have been made in connection to activities related to the operation, including the arrests of two purported LulzSec members, a man who provided LulzSec with security vulnerability information, and four alleged members of AntiSec NL, a group inspired by the operation.


Background

The
LulzSec LulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed ...
hacking group formed in May 2011 and came to international prominence after hacking the websites of the
Public Broadcasting Service The Public Broadcasting Service (PBS) is an American public broadcaster and non-commercial, free-to-air television network based in Arlington, Virginia. PBS is a publicly funded nonprofit organization and the most prominent provider of educa ...
,
Sony , commonly stylized as SONY, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. As a major technology company, it operates as one of the world's largest manufacturers of consumer and professional ...
, and the
United States Senate The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States. The composition and po ...
. Initially, the group claimed to hack "for the lulz" and to enjoy the chaos that follows their intrusions. However, on 20 June 2011, the group announced that they were teaming up with hacking collective
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
for a series of attacks they dubbed Operation Anti-Security or Operation AntiSec. The press release accompanying the beginning of the operation called for supporters to steal and publish classified government documents under the name AntiSec. Major banks and corporations were also mentioned as potential targets. Though LulzSec disbanded as a group on 26 June 2011, members have been reported to be continuing the operation from within Anonymous. The groups involved claim that the operation aims to protest government censorship and monitoring of the internet. LulzSec members also mention ending what they believe are corrupt
racial profiling Racial profiling or ethnic profiling is the act of suspecting, targeting or discriminating against a person on the basis of their ethnicity, religion or nationality, rather than on individual suspicion or available evidence. Racial profiling involv ...
and
copyright law A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, educatio ...
s as a goal of the operation. The
War on Drugs The war on drugs is a global campaign, led by the United States federal government, of drug prohibition, military aid, and military intervention, with the aim of reducing the illegal drug trade in the United States.Cockburn and St. Clair, 1 ...
has also been given as a reason for particular hacks. In contrast,
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
described the operation as
cyberwarfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic ...
targeting governments and large corporations.


LulzSec activities

LulzSec launched the first attacks of the operation against the
Serious Organised Crime Agency The Serious Organised Crime Agency (SOCA) was a non-departmental public body of the Government of the United Kingdom which existed from 1 April 2006 until 7 October 2013. SOCA was a national law enforcement agency with Home Office sponsorship ...
, the national
law enforcement agency A law enforcement agency (LEA) is any government agency responsible for the enforcement of the laws. Jurisdiction LEAs which have their ability to apply their powers restricted in some way are said to operate within a jurisdiction. LE ...
of the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and ...
that handles
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
. The group launched a distributed denial-of-service attack against the agency's website on 20 June, taking it offline for only a few minutes. On the same day, they knocked the website of the Jianhua District in
Qiqihar Qiqihar () is the second-largest city in the Heilongjiang province of China, in the west central part of the province. The built-up (or metro) area made up of Longsha, Tiefeng and Jianhua districts had 959,787 inhabitants, while the total populat ...
,
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slig ...
, offline. On 23 June, the group released a large cache of documents taken from the servers of the
Arizona Department of Public Safety The Arizona Department of Public Safety (AZDPS) is a state-level law enforcement agency with a primary function of patrolling and enforcing state laws on Arizona highways. Director Heston Silbert was promoted from Deputy Director to Director in ...
. The release, titled "chinga la migra", roughly translating to "fuck the border patrol", including email addresses and passwords and hundreds of documents marked "sensitive" or "for official use only". The group claimed that they did so in retaliation for the passage of
Arizona SB 1070 The Support Our Law Enforcement and Safe Neighborhoods Act (introduced as Arizona Senate Bill 1070 and commonly referred to as Arizona SB 1070) is a 2010 legislative Act in the U.S. state of Arizona that was the broadest and strictest a ...
, a law they saw as leading to unjust racial profiling. Arizona complained that the release of officer identities and the personal information of their families could put them and their families in danger and gave those exposed security protection. In response, they mobilized the Arizona Counter Terrorism Information Center and locked remote access of Department of Public Safety email accounts. On 25 June 2011, the group released what they described as their last dump of the operation. The release contained a large amount of information from varied sources. Included was information from numerous companies, including half a
gigabyte The gigabyte () is a multiple of the unit byte for digital information. The prefix '' giga'' means 109 in the International System of Units (SI). Therefore, one gigabyte is one billion bytes. The unit symbol for the gigabyte is GB. This definit ...
of data from telecommunications company
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
and
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es from
Sony , commonly stylized as SONY, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. As a major technology company, it operates as one of the world's largest manufacturers of consumer and professional ...
, Viacom,
Disney The Walt Disney Company, commonly known as Disney (), is an American multinational mass media and entertainment conglomerate headquartered at the Walt Disney Studios complex in Burbank, California. Disney was originally founded on October ...
, EMI, and
NBC Universal The National Broadcasting Company (NBC) is an American English-language commercial broadcast television and radio network. The flagship property of the NBC Entertainment division of NBCUniversal, a division of Comcast, its headquarters are ...
. The AT&T portion included information pertaining to the release of the 4G LTE, 90,000 personal phones used by IBM, and the development of the iPad 3. It also contained over 750,000 usernames and password combinations, including 200,000 from hackforums.net, 12,000 from the
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
online bookstore, 500,000 from the online
video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This feedba ...
Battlefield Heroes, 50,000 from various video game forums, and 29 from Irish
private investigation A private investigator (often abbreviated to PI and informally called a private eye), a private detective, or inquiry agent is a person who can be hired by individuals or groups to undertake investigatory law services. Private investigators of ...
company Priority Investigations. Finally, an internal manual for
AOL AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City. It is a brand marketed by the current incarnation of Yahoo! Inc. ...
engineers and a screencapture of the
United States Navy The United States Navy (USN) is the maritime service branch of the United States Armed Forces and one of the eight uniformed services of the United States. It is the largest and most powerful navy in the world, with the estimated tonnage ...
website navy.mil after being vandalized. On 22 June, an offshoot of the group calling themselves LulzSecBrazil took down the website of the
Government of Brazil The Federal Government of Brazil (''Governo Federal'') is the national government of the Federative Republic of Brazil, a republic in South America divided in 26 states and a federal district. The Brazilian federal government is divided in th ...
, brasil.gov.br, and the
President of Brazil The president of Brazil ( pt, Presidente do Brasil), officially the president of the Federative Republic of Brazil ( pt, Presidente da República Federativa do Brasil) or simply the ''President of the Republic'', is the head of state and head o ...
, presidencia.gov.br. They also targeted the website of Brazilian energy company
Petrobras Petróleo Brasileiro S.A., better known by the portmanteau Petrobras (), is a state-owned Brazilian multinational corporation in the petroleum industry headquartered in Rio de Janeiro, Brazil. The company's name translates to Brazilian Petrole ...
. On 24 June, they claimed to publish access codes and passwords to the Petrobras website along with personnel profiles. However, the company denied that any information had been stolen, and the group removed the claim from their
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
feed a few hours later. The group also published the personal information of
President of Brazil The president of Brazil ( pt, Presidente do Brasil), officially the president of the Federative Republic of Brazil ( pt, Presidente da República Federativa do Brasil) or simply the ''President of the Republic'', is the head of state and head o ...
Dilma Rousseff Dilma Vana Rousseff (; born 14 December 1947) is a Brazilian economist and politician who served as the 36th president of Brazil, holding the position from 2011 until her impeachment and removal from office on 31 August 2016. She is the first ...
and
Mayor of São Paulo In many countries, a mayor is the highest-ranking official in a municipal government such as that of a city or a town. Worldwide, there is a wide variance in local laws and customs regarding the powers and responsibilities of a mayor as well as ...
Gilberto Kassab Gilberto Kassab ( or ; born 12 August 1960) is a Brazilian politician and former mayor of São Paulo. His term ended in 2012. A civil engineer and economist, one of the most famous Brazilians of Syrian descent, Kassab took over from José Serra, ...
. Despite claiming to have retired, on 18 July LulzSec hacked into the website of British newspaper '' The Sun''. The group redirected the newspaper's website to an also-hacked redesign website of another newspaper ''
The Times ''The Times'' is a British daily national newspaper based in London. It began in 1785 under the title ''The Daily Universal Register'', adopting its current name on 1 January 1788. ''The Times'' and its sister paper '' The Sunday Times'' ( ...
'', altering the site to resemble ''The Sun'' and posting a fake story claiming that
Rupert Murdoch Keith Rupert Murdoch ( ; born 11 March 1931) is an Australian-born American business magnate. Through his company News Corp, he is the owner of hundreds of local, national, and international publishing outlets around the world, including ...
had died after ingesting a fatal dose of
palladium Palladium is a chemical element with the symbol Pd and atomic number 46. It is a rare and lustrous silvery-white metal discovered in 1803 by the English chemist William Hyde Wollaston. He named it after the asteroid Pallas, which was itself ...
. They objected to the involvement of
News Corporation News Corporation (abbreviated News Corp.), also variously known as News Corporation Limited, was an American multinational mass media corporation controlled by media mogul Rupert Murdoch and headquartered at 1211 Avenue of the Americas in New ...
, the Murdoch-owned company that publishes ''The Sun'' and ''The Times'', in a large
phone hacking scandal The News International phone hacking scandal was a controversy involving the now-defunct ''News of the World'' and other British newspapers owned by Rupert Murdoch. Employees of the newspaper were accused of engaging in phone hacking, police b ...
. The hacked website also contained a webcomic depicting LulzSec deciding on and carrying out the attack. The group later redirected ''The Sun'' website to their Twitter feed. News International released a statement regarding the attacks before having the page the statement appeared on also redirected to the LulzSec Twitter page and eventually taken offline. The group also released the names and phone numbers of a reporter for ''The Sun'' and two others associated with the newspaper and encouraged their supporters to call them. The group further included an old email address and password of former News International executive Rebekah Brooks. News Corporation took the websites offline as a precaution later in the day.


Anonymous activities


June 2011

On 27 June 2011, Anonymous published information relating to the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory program, or Sentinel program, an operation run by the United States
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
and
Federal Emergency Management Agency The Federal Emergency Management Agency (FEMA) is an agency of the United States Department of Homeland Security (DHS), initially created under President Jimmy Carter by Presidential Reorganization Plan No. 3 of 1978 and implemented by two Ex ...
. The hack included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
bureau locations, details on counter-hacking tools, and form letters that law enforcement agencies used to obtain user details from
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
s. On 28 June, the group released the second collection of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed "Chinga la Migra Communique Dos", or "Fuck the Border Patrol Message Two", the data file contained the names, addresses, phone numbers, internet passwords, and
social security number In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to ...
s of a dozen Arizona police officers. It also contained the emails,
voicemail A voicemail system (also known as voice message or voice bank) is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to ind ...
s, chat logs of some of them; in at least one instance it included sexually explicit photographs from one of the officer's girlfriends. Anonymous also claimed that the documents included officers forwarding racist chain emails, evidence of K-9 unit officers using
percocet Oxycodone/paracetamol, sold under the brand name Percocet among others, is a fixed-dose combination of the opioid oxycodone with paracetamol (acetaminophen), used to treat moderate to severe pain. In 2020, it was the 69th most commonly prescr ...
, and a
Fraternal Order of Police The Fraternal Order of Police (FOP) is a fraternal organization consisting of sworn law enforcement officers in the United States. It reports a membership of over 355,000 members organized in 2,100 local chapters (lodges), state lodges, and th ...
member who is also a convicted
sex offender A sex offender (sexual offender, sex abuser, or sexual abuser) is a person who has committed a sex crime. What constitutes a sex crime differs by culture and legal jurisdiction. The majority of convicted sex offenders have convictions for crim ...
. Anonymous noted that their motivation stemmed from a desire to make police officers "experience just a taste of the same kind of violence and terror they dish out on an every day basis." On the same day, the group released information obtained from various government sources. Government data from
Anguilla Anguilla ( ) is a British Overseas Territory in the Caribbean. It is one of the most northerly of the Leeward Islands in the Lesser Antilles, lying east of Puerto Rico and the Virgin Islands and directly north of Saint Martin. The terr ...
, passwords from servers belonging to the
Government of Brazil The Federal Government of Brazil (''Governo Federal'') is the national government of the Federative Republic of Brazil, a republic in South America divided in 26 states and a federal district. The Brazilian federal government is divided in th ...
, the users of
Zimbabwe Zimbabwe (), officially the Republic of Zimbabwe, is a landlocked country located in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Botswana to the south-west, Zambia to the north, and ...
government websites, and data from the
Municipality of Mosman Mosman Council is a local government area on the Lower North Shore of Sydney, New South Wales, Australia. The Mayor of Mosman Council is Cr. Carolyn Corrigan, a representative of the Serving Mosman independent political group since 9 Septembe ...
council were included. The Mosman council dump included mainly publicly available information from the website as well as a not-publicly-available prototype version of the website that had not yet been launched. They claimed to also have access to all Zimbabwean government websites ending in gov.zw. Most of the information and control were given through
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL in ...
. Anonymous claimed they targeted Brazil for what they saw as data manipulation and Zimbabwe for the controversial
2008 Zimbabwean presidential election General elections were held in Zimbabwe on 29 March 2008 to elect the President and Parliament. Because of Zimbabwe's dire economic situation, the elections were expected to provide incumbent President Robert Mugabe with his toughest elector ...
. They also gained control of a website belonging to the Government of Tunisia. They replaced the webpage with a graphic representing Anonymous with text reading "The Internet is the last frontier and we will not let corrupt governments spoil it. We are Anonymous, We are LulzSec, We are People from around the world who are stepping in the name of freedom". The release also included a file containing internal mapping of Viacom servers as well as passwords and data from umusic.com, a website of
Universal Music Group Universal Music Group N.V. (often abbreviated as UMG and referred to as just Universal Music) is a Dutch–American multinational music corporation under Dutch law. UMG's corporate headquarters are located in Hilversum, Netherlands and its ...
. They also released the names of 2,800 members of the Black Eagles paramilitary group.


July 2011

On 1 July, Anonymous once again targeted Arizona law enforcement by publishing a number of backdoors that could be used to access Arizona police servers to
Pastebin A pastebin or text storage site is a type of online content-hosting service where users can store plain text (e.g. source code snippets for code review via Internet Relay Chat (IRC)). The first pastebin was the eponymous pastebin.com. Other s ...
. Arizona was forced to pull many websites offline for a time. Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They also claimed to have found "anti-
Muslim Muslims ( ar, المسلمون, , ) are people who adhere to Islam, a monotheistic religion belonging to the Abrahamic tradition. They consider the Quran, the foundational religious text of Islam, to be the verbatim word of the God of Abrah ...
" emails during the attack. On 3 July, Anonymous hacked into the database of the Democratic Party of
Orange County, Florida Orange County is located in the central portion of the U.S. state of Florida. As of the 2020 census, the population was 1,429,908, making it Florida's fifth most populous county. The county seat is Orlando. Orange County is the central count ...
. They published a partial membership list and a handbook for precinct committee members. The hack was also considered part of the group's OpOrlando plan. On 4 July, Anonymous released a document containing 27 administrative usernames and passwords from an Apple Inc. system used to operate online
technical support Technical support (abbreviated as tech support) is a call centre type customer service provided by companies to advise and assist registered users with issues concerning their technical products. Traditionally done on the phone, technical suppor ...
follow-up surveys. The encrypted passwords were taken from an SQL database. Anonymous launched what it dubbed "Turkish Takedown Thursday" on 6 July. They posted internal data from over one hundred
.tr .tr is the Internet country code top-level domain (ccTLD) for Turkey. It is administered by trABİS (under the Information and Communication Technologies Authority of Turkey) and managed by the Computer Center DNS Group of the ICT Authority. The ...
websites and brought down and replaced the content of 74 of them. The 74 sites had their normal pages replaced with an Antisec logo and a message denouncing supposed attempts at internet censorship by the Turkish government. Websites affected included that of a children's hospital, but not of any key government agencies. On the same day, the group released database dumps taken from 20 universities in
Italy Italy ( it, Italia ), officially the Italian Republic, ) or the Republic of Italy, is a country in Southern Europe. It is located in the middle of the Mediterranean Sea, and its territory largely coincides with the homonymous geographical ...
. Two days later, Italian police arrested 15 alleged members of Anonymous ranging in age from 15 to 28. The group vowed revenge for the raids. On 8 July, the group claimed responsibility for hacks against IRC Federal, an
engineering Engineering is the use of scientific principles to design and build machines, structures, and other items, including bridges, tunnels, roads, vehicles, and buildings. The discipline of engineering encompasses a broad range of more speciali ...
firm that contracts with the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
and other agencies of the
United States federal government The federal government of the United States (U.S. federal government or U.S. government) is the national government of the United States, a federal republic located primarily in North America, composed of 50 states, a city within a fed ...
. Internal database documents and personnel email were stolen during the attack. The group also claimed to have vandalized the firm's website and forcing them to take it offline. The group says that in the documents procured, they found a proposal to the FBI for the firm to produce a "Special Identities Modernization (SIM) Project" that would help identify those who might present a criminal or terrorist risk in the future,
fingerprinting A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
contracts with the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
, and
biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify i ...
contracts with the military. They also claimed to have obtained information allowing them to log into various
virtual private network A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The b ...
s and access panels belonging to the
United States Department of Energy The United States Department of Energy (DOE) is an executive department of the U.S. federal government that oversees U.S. national energy policy and manages the research and development of nuclear power and nuclear weapons in the United States ...
. They also sent a message to company employees urging them to work against the government rather than for it. The hack was done with a simple
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL in ...
. On 11 July, Anonymous hacked into systems belonging to
defense contractor The arms industry, also known as the arms trade, is a global industry which manufactures and sells weapons and military technology. It consists of a commercial industry involved in the research and development, engineering, production, and se ...
Booz Allen Hamilton Booz Allen Hamilton Holding Corporation (informally Booz Allen) is the parent of Booz Allen Hamilton Inc., an American management and information technology consulting firm, headquartered in McLean, Virginia, in Greater Washington, D.C., with 8 ...
, breaking through barriers that the group described as having "no security measures in place." They released what they said were 90,000 email accounts and encrypted passwords from
United States Central Command The United States Central Command (USCENTCOM or CENTCOM) is one of the eleven unified combatant commands of the U.S. Department of Defense. It was established in 1983, taking over the previous responsibilities of the Rapid Deployment Joint Ta ...
,
United States Special Operations Command The United States Special Operations Command (USSOCOM or SOCOM) is the unified combatant command charged with overseeing the various special operations component commands of the Army, Marine Corps, Navy, and Air Force of the United States Ar ...
, the
United States Marine Corps The United States Marine Corps (USMC), also referred to as the United States Marines, is the maritime land force service branch of the United States Armed Forces responsible for conducting expeditionary and amphibious operations through c ...
, the
United States Air Force The United States Air Force (USAF) is the air service branch of the United States Armed Forces, and is one of the eight uniformed services of the United States. Originally created on 1 August 1907, as a part of the United States Army Si ...
, the
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-ter ...
,
United States Department of State The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other na ...
, and various private sector contractors, calling the released "Military Meltdown Monday". They also sarcastically posted an invoice charging the company for "security audit services rendered". Despite Anonymous' claims that 90,000 emails were released, the
Associated Press The Associated Press (AP) is an American non-profit news agency headquartered in New York City. Founded in 1846, it operates as a cooperative, unincorporated association. It produces news reports that are distributed to its members, U.S. new ...
counted only 67,000 unique emails, of which only 53,000 were military addresses. The remainder of the addresses came from educational institutions and defense contractors. The Department of Defense said they were aware of the incident and were coordinating with other agencies for a response. Booz Allen confirmed the intrusion on 13 July, but contradicted Anonymous' claims in saying that the attack never got past their own systems, meaning that information from the military should be secure. On 12 July, the group attacked the web servers of agricultural biotechnology company
Monsanto The Monsanto Company () was an American agrochemical and agricultural biotechnology corporation founded in 1901 and headquartered in Creve Coeur, Missouri. Monsanto's best known product is Roundup, a glyphosate-based herbicide, developed in ...
and released information on the company's employees, including names, addresses, and email addresses. The group claimed they performed the attack to protest the company's lawsuits against farmers who manufacture
organic milk Organic milk refers to a number of milk products from livestock raised according to organic farming methods. In most jurisdictions, use of the term "organic" or equivalents like "bio" or "eco", on any product is regulated by food authorities. In ...
in an effort to stop them from stating on the label that their milk does not contain artificial Bovine Growth Hormones. Monsanto confirmed the attack but claimed that only about ten percent of the information published came from current or former employees of the company. They said that the other ninety percent were email addresses and names of media contacts and employees of other agricultural companies. On 21 July, Anonymous released two
PDF Portable Document Format (PDF), standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. ...
s purportedly taken from servers belonging to
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two N ...
. They claimed via Twitter to have obtained around one gigabyte of data that they would release portions of over the course of a few days. The group claimed that some of the data was so sensitive that they felt it would be irresponsible to release, and thus would only make a portion of what was taken available. The first two documents released relate to outsourcing communication and information services (CIS) in
Kosovo Kosovo ( sq, Kosova or ; sr-Cyrl, Косово ), officially the Republic of Kosovo ( sq, Republika e Kosovës, links=no; sr, Република Косово, Republika Kosovo, links=no), is a international recognition of Kosovo, partiall ...
and the funding request for the project. The
Austria Austria, , bar, Östareich officially the Republic of Austria, is a country in the southern part of Central Europe, lying in the Eastern Alps. It is a federation of nine states, one of which is the capital, Vienna, the most populous ...
n branch of Anonymous hacked the website of the Austrian Gebühren Info Service, the television license agency run by the Austrian national public service broadcaster, on 22 July. They accessed 214,000 records containing personal information and stole the banking data of 96,000 people from the server. The counter-terrorism bureau of the country launched an investigation and were preparing to file criminal complaints against those involved. On 25 July, first posted confidential information that they claimed came from the
Italian Italian(s) may refer to: * Anything of, from, or related to the people of Italy over the centuries ** Italians, an ethnic group or simply a citizen of the Italian Republic or Italian Kingdom ** Italian language, a Romance language *** Regional Ita ...
Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche, translated as the National Anti-Crime Computer Center for Critical Infrastructure Protection, an agency tasked with protecting vital computer systems for the country. The Twitter account @anonesc posted less than 100 megabytes of data, but they claimed to have taken over eight gigabytes. The data related to
oil An oil is any nonpolar chemical substance that is composed primarily of hydrocarbons and is hydrophobic (does not mix with water) & lipophilic (mixes with other oils). Oils are usually flammable and surface active. Most oils are unsaturated ...
,
nuclear Nuclear may refer to: Physics Relating to the nucleus of the atom: *Nuclear engineering *Nuclear physics *Nuclear power *Nuclear reactor *Nuclear weapon *Nuclear medicine *Radiation therapy *Nuclear warfare Mathematics *Nuclear space *Nuclear ...
, and other firms deemed to be involved in "critical infrastructure", as well as government agencies including the
Department of Defence Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philippin ...
of
Australia Australia, officially the Commonwealth of Australia, is a sovereign country comprising the mainland of the Australian continent, the island of Tasmania, and numerous smaller islands. With an area of , Australia is the largest country by ...
. On 29 July, Anonymous hacked the FBI-contractor
ManTech International ManTech International Corporation is an American defense contracting firm that was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is ...
. They posted a PDF of a
résumé A résumé, sometimes spelled resume (or alternatively resumé), also called a curriculum vitae (CV), is a document created and used by a person to present their background, skills, and accomplishments. Résumés can be used for a variety of rea ...
sent into the company as proof that they had infiltrated their systems. Anonymous claimed that the attack would be the first part of a promised "Fuck FBI Friday", or FFF, campaign as part of the larger Operation AntiSec. They published 400 megabytes of content from the company later the same day. The internal documents generally concern contracts that ManTech has with NATO, the nature of which Anonymous claims shows a waste of taxpayer money. The files also include dealings with the
United States Army The United States Army (USA) is the land service branch of the United States Armed Forces. It is one of the eight U.S. uniformed services, and is designated as the Army of the United States in the U.S. Constitution.Article II, section 2, ...
and a list of employee emails. On 31 July, Anonymous attacked the websites of 77 different
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term ...
websites hosted on the same server. As much as 10 gigabytes of data was taken, including the personal information of police officers from numerous jurisdictions. Emails were also taken, as well as the confidential information of inmates and
confidential informant An informant (also called an informer or, as a slang term, a “snitch”) is a person who provides privileged information about a person or organization to an agency. The term is usually used within the law-enforcement world, where informan ...
s, though not released yet. Anonymous said that they would redact inmate names but would release the names of all " informants who had the false impression that they would be able to 'anonymously' snitch in secrecy." The release also included a demand that all arrested members of Anonymous be released immediately. Some of the information released, however, was already publicly available. They proceeded to release the
social security number In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to ...
s of over 100 police officers from the Missouri Sheriffs' Association website. The following Saturday, 6 August, they released a cache of data from the websites title "Shooting Sheriffs Saturday Release" which included the information taken from law enforcement websites. Large amounts of personal information was included, with Anonymous stating, "We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information. For too long they have been using and abusing our personal information." Anonymous claimed that their motive was revenge over the arrests of a number of participants in previous operations and of LulzSec and Anonymous member
Topiary Topiary is the horticultural practice of training perennial plants by clipping the foliage and twigs of trees, shrubs and subshrubs to develop and maintain clearly defined shapes, whether geometric or fanciful. The term also refers to plants w ...
. They also used stolen credit card numbers to make donations to the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
,
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
, and the
Chelsea Manning Chelsea Elizabeth Manning (born Bradley Edward Manning; December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage A ...
Support Network.


August 2011

On 16 August, Anonymous gained access to the email account of Richard Garcia, former assistant director in charge of the FBI field office in
Los Angeles Los Angeles ( ; es, Los Ángeles, link=no , ), often referred to by its initials L.A., is the largest city in the state of California and the second most populous city in the United States after New York City, as well as one of the world ...
and
senior vice president A vice president, also director in British English, is an officer in government or business who is below the president (chief executive officer) in rank. It can also refer to executive vice presidents, signifying that the vice president is on ...
of Vanguard Defense Industries, in the name of AntiSec. They claimed that the firm's relationships with United States military and law enforcement organizations made it a legitimate target as part of the operation. They also claimed to have breached the company's website, which was run on a
WordPress WordPress (WP or WordPress.org) is a free and open-source content management system (CMS) written in hypertext preprocessor language and paired with a MySQL or MariaDB database with supported HTTPS. Features include a plugin architectu ...
platform, though the company says that their website was never affected. The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email account; it mainly related to Garcia's former role with InfraGard.


September 2011

In retaliation for arrests of people who allegedly participated in Operation AntiSec, and especially
Topiary Topiary is the horticultural practice of training perennial plants by clipping the foliage and twigs of trees, shrubs and subshrubs to develop and maintain clearly defined shapes, whether geometric or fanciful. The term also refers to plants w ...
, Anonymous attacked the website of the Texas Police Chiefs Association. On 1 September, the group defaced the website and released documents from it marked "law enforcement sensitive" and "for official use only". The release also included police officer private email. The same day, the group brought down the website of the
United States Court of Appeals for the Ninth Circuit The United States Court of Appeals for the Ninth Circuit (in case citations, 9th Cir.) is the U.S. federal court of appeals that has appellate jurisdiction over the U.S. district courts in the following federal judicial districts: * District ...
for the justice system's characterization of Anonymous activities as "cyber-terrorism".


October 2011

On 21 October, announced a dump of data related to law enforcement in support of the
Occupy Wall Street Occupy Wall Street (OWS) was a protest movement against economic inequality and the influence of money in politics that began in Zuccotti Park, located in New York City's Wall Street financial district, in September 2011. It gave rise to the ...
and
Occupy movement The Occupy movement was an international populist socio-political movement that expressed opposition to social and economic inequality and to the perceived lack of "real democracy" around the world. It aimed primarily to advance social and econo ...
. The dump including data taken from the
International Association of Chiefs of Police International Association of Chiefs of Police (IACP) is a nonprofit organization based in Alexandria, Virginia (United States). It is the world's largest professional association for police The police are a Law enforcement organization, c ...
,
Boston Police Patrolmen's Association The Boston Police Patrolmen’s Association (BPPA) is the largest of the police unions representing police officers in the Boston Police Department. As of 2020, it represents approximately 1,500 officers. History The BPPA was established in 196 ...
, and the Sheriff's office of
Baldwin County, Alabama Baldwin County is a county located in the southwestern part of the U.S. state of Alabama, on the Gulf coast. It is one of only two counties in Alabama that border the Gulf of Mexico, along with Mobile County. As of the 2020 census, the pop ...
. A number of police websites virtually hosted together also had their content replaced with an anti-police rap video. The dump 600 megabytes of information including membership rosters, internal documents, and social security numbers from the International Association of Chiefs of Police; nearly 1000 names, ranks, addresses, phone numbers, and social security numbers of police officers in
Jefferson County, Alabama Jefferson County is the most populous county in the U.S. state of Alabama, located in the central portion of the state. As of the 2020 census, its population was 674,721. Its county seat is Birmingham. Its rapid growth as an industrial city ...
, and
Birmingham, Alabama Birmingham ( ) is a city in the north central region of the U.S. state of Alabama. Birmingham is the seat of Jefferson County, Alabama's most populous county. As of the 2021 census estimates, Birmingham had a population of 197,575, down 1% f ...
; 1000 names and passwords of members of the Boston Police Patrolmen's Association; and the financial information and client list of web developer and marketing company Matrix Group, a business with several law enforcement clients. AntiSec claimed that at least 40 law enforcement related websites were included in the attack.


November 2011

On 18 November 2011, Anonymous posted 38,000 email messages from the
Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion active users worldwide. A user typically accesses Gmail in a web browser or the official mobile app. Google also supports the use of email clients via the POP and ...
account of Alfredo "Fred" Baclagan, a special agent supervising computer crime investigations with the
California Department of Justice The California Department of Justice is a statewide investigative law enforcement agency and legal department of the California executive branch under the elected leadership of the California Attorney General (AG) which carries out complex cri ...
and the Computer and Technology Crime Hightech Response Team, to a site on Tor and to
The Pirate Bay The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute ...
. They also added what they claimed were Baclagan's personal home address and phone number. The group claimed the action as part of their attack on law enforcement in support of the Occupy movement and in protest for prosecution of computer criminals in general. They also claimed to have read his text messages, listened to his voicemail, and used his
Google Voice Google Voice is a telephone service that provides a U.S. phone number to Google Account customers in the U.S. and Google Workspace (G Suite by October 2020) customers in Canada, Denmark, France, the Netherlands, Portugal, Spain, Sweden, Switz ...
account to call and text his friends and family. They also purchased a camera using his
Google Wallet Google Wallet (or simply Wallet) is a digital wallet platform developed by Google. It is available for the Android, Wear OS, and Fitbit OS operating systems, and was announced on May 11, 2022, at the 2022 Google I/O keynote. It began rol ...
. The release includes
forensic Forensic science, also known as criminalistics, is the application of science to criminal and civil laws, mainly—on the criminal side—during criminal investigation, as governed by the legal standards of admissible evidence and criminal p ...
experts discussing techniques for tracking cybercriminals and how different companies respond to law enforcement requests for information.


September 2012

On 4 September 2012, 1 million unique device IDs for Apple products were published by a group associated with Anonymous. The group claimed that the 1 million IDs were part of a dataset of 12.36 million records taken from an FBI laptop. The FBI responded by saying they were not aware of any unauthorized data release. According to an
Ars Technica ''Ars Technica'' is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews, and guides on issues such as computer hardware and software, sc ...
article published on 10 September:
A digital publishing company named BlueToad has come forward to take responsibility for the leak of a million iOS unique device identifiers (UDIDs) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the company's systems in order to steal the file.


Actions by other groups and individuals

The original announcement of Operation Anti-Security included a call from LulzSec to spread the name "AntiSec" through physical
graffiti Graffiti (plural; singular ''graffiti'' or ''graffito'', the latter rarely used except in archeology) is art that is written, painted or drawn on a wall or other surface, usually without permission and within public view. Graffiti ranges from s ...
. A few days after, a number of locations in
Mission Beach, San Diego Mission Beach is a community built on a sandbar between the Pacific Ocean and Mission Bay. It is part of the city of San Diego, California. Mission Beach spans nearly two miles of ocean front. It is bounded by the San Diego River estuary on the ...
, were vandalized with pieces of graffiti reading the phrase. On 4 July, a
Fox News The Fox News Channel, abbreviated FNC, commonly known as Fox News, and stylized in all caps, is an American multinational conservative cable news television channel based in New York City. It is owned by Fox News Media, which itself is o ...
Twitter account (@foxnewspolitics) was hacked and false tweets reporting that
President of the United States The president of the United States (POTUS) is the head of state and head of government of the United States of America. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal gove ...
Barack Obama Barack Hussein Obama II ( ; born August 4, 1961) is an American politician who served as the 44th president of the United States from 2009 to 2017. A member of the Democratic Party (United States), Democratic Party, Obama was the first Af ...
has been shot three times and killed were sent from the account. The
Script Kiddies A script kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes. Characteristics In a Carnegie Mellon report prepared for the U.K. Department of Defense in 2 ...
, a group with close ties to Anonymous including two hackers with former membership in the group, claimed responsibility for the attack and hoax. The group claimed that the action was in the name of Operation Anti-Security and that they would continue looking to expose information on corporations "to assist with antisec." The
United States Secret Service The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting U.S. political leaders, their families, and ...
is investigating the incident as a threat on the President. The group subsequently hacked into the
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dust ...
page of pharmaceutical company
Pfizer Pfizer Inc. ( ) is an American multinational pharmaceutical and biotechnology corporation headquartered on 42nd Street in Manhattan, New York City. The company was established in 1849 in New York by two German entrepreneurs, Charles Pfize ...
, claiming they did so for "moral reasons" as part of AntiSec. They posted numerous messages to the company's Facebook wall mocking their security. On 4 July, someone going by the name f1esc posted a file to
The Pirate Bay The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute ...
containing 600 megabytes of information described as national "AU election data" and labelled with the tag #Antisec. In reality, the data concerned the
2011 New South Wales state election Elections to the 55th Parliament of New South Wales were held on Saturday, 26 March 2011. The 16-year-incumbent Labor Party government led by Premier Kristina Keneally was defeated in a landslide by the Liberal–National Coalition opposition ...
and was taken from a government website designed to provide election results where the data was publicly available, and the data proved freely accessible information instead of a hack. In early July, the group RedHack hacked into and defaced over 1000 websites based in Turkey. They claimed to do so both to mark the anniversary of the Sivas massacre and as part of Operation Anti-Security. The websites belonged both to agencies of the Government of Turkey and
Adnan Oktar Adnan Oktar (; born 2 February 1956), also known as Adnan Hoca or Harun Yahya, is a Turkish religious sex cult leader, creationist/ anti-evolutionist, conspiracy theorist, preacher and pamphleteer.Filiu, ''Apocalypse in Islam'', 2011: p.171 I ...
, an Islamic
creationist Creationism is the religious belief that nature, and aspects such as the universe, Earth, life, and humans, originated with supernatural acts of divine creation. Gunn 2004, p. 9, "The ''Concise Oxford Dictionary'' says that creationism is 'th ...
. The group vowed to continue contribution to the AntiSec operation. On 6 July, a hacker called p0keu released of around 2,658 usernames, passwords hidden behind
hash functions A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually ...
, and email addresses from the
blog A blog (a Clipping (morphology), truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in Reverse ...
TamilCanadian.com. He gave no reason for why he chose the website to attack other than that he did so under the AntiSec label. On 14 July, he leaked part of the
Stevens Institute of Technology Stevens Institute of Technology is a private research university in Hoboken, New Jersey. Founded in 1870, it is one of the oldest technological universities in the United States and was the first college in America solely dedicated to mechanical ...
website database. At least 31 of the records in the database contained plain
text file A text file (sometimes spelled textfile; an old alternative name is flatfile) is a kind of computer file that is structured as a sequence of lines of electronic text. A text file exists stored as data within a computer file system. In operat ...
s with email addresses, user names, and passwords of site users. p0keu posted the user information to Pastebin. p0keu has continued hacking, but has not labelled all of his releases with the AntiSec slogan. In the
Netherlands ) , anthem = ( en, "William of Nassau") , image_map = , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of the Netherlands , established_title = Before independence , established_date = Spanish Netherl ...
, a splinter group inspired by LulzSec formed, calling themselves AntiSec NL. The group hacked into the websites of
online dating service Online dating, also known as Internet dating, Virtual dating, or Mobile app dating, is a relatively recent method used by people with a goal of searching for and interacting with potential romantic or sexual partners, via the internet. An onlin ...
pepper.nl and software company
Nimbuzz Nimbuzz was a proprietary cross-platform instant messaging and voice-over-IP provider and aggregator for smartphones, tablets and personal computers developed by Kuraakani Online Private Limited, with the origins of its technology dating back ...
. Four people believed by police to be members were later arrested. On 24 July, a group called BashCrew hacked the website of the
House of Representatives of the Philippines The House of Representatives of the Philippines ( fil, Kapulungan ng mga Kinatawan ng Pilipinas, italic=unset, ''Kamara'' or ''Kamara de Representantes'' from the Spanish word ''cámara'', meaning "chamber") is the lower house of Congress, th ...
in the name of AntiSec. The names, telephone numbers, and email addresses of members of the Filipino Congress were released via Pastebin, with the group claiming that they may also release blood types and the private websites of some members. A hacker going by the name Thehacker12, a self-purported AntiSec supporter but not a member of Anonymous, released data stolen from
event management Event management is the application of project management to the creation and development of small and/or large-scale personal or corporate events such as festivals, conferences, ceremonies, weddings, formal parties, concerts, or conventions. ...
company allianceforbiz.com on 24 August 2011 on Mediafire and Pastebin. The release contained a
spreadsheet A spreadsheet is a computer application for computation, organization, analysis and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in ...
of usernames, email addresses, passwords, employers, and other information of around 20,000 people, many of them United States government employees or contractors. The organization with the most employees compromised was the
Small Business Administration The United States Small Business Administration (SBA) is an independent agency of the United States government that provides support to entrepreneurs and small businesses. The mission of the Small Business Administration is "to maintain and stre ...
.


Law enforcement response

Law enforcement agencies in various countries have arrested or searched the property of alleged participants in Operation AntiSec. These suspects have come from different groups who carried out attacks as part of the operation. On 19 July 2011, the London Metropolitan Police announced the arrest of possible core LulzSec member T-flow. A 16-year-old male was arrested in South London on charges of violating the Computer Misuse Act as part of an operation involving the arrest of several other hackers affiliated with Anonymous in the United States and United Kingdom. On the same day, the FBI arrested 21-year-old Lance Moore in
Las Cruces, New Mexico Las Cruces (; "the crosses") is the second-largest city in the U.S. state of New Mexico and the seat of Doña Ana County. As of the 2020 census the population was 111,385. Las Cruces is the largest city in both Doña Ana County and southern Ne ...
. He was accused of stealing thousands of documents and applications from AT&T that LulzSec published as part of their so-called "final release" of the operation. LulzSec denied that any of their membership had been arrested, stating "there are six of us, and we're all still here." On 11 July, prosecutors in the Netherlands released details of the arrests of four suspects aged 17, 18, 25, and 35. All were located in different Dutch and cities and accused of being part of the hacking group AntiSec NL, an operation participant inspired by LulzSec. The four, going by the online handles Ziaolin, Calimero, DutchD3V1L, and Time, were arrested on 19 July and their computers and electronic equipment confiscated as evidence. Prosecutors identified the suspects after computer security company Fox-IT helped them gain access to a chat channel thought to be used by the group. The Police Central E-Crime Unit arrested an 18-year-old man from
Shetland Shetland, also called the Shetland Islands and formerly Zetland, is a subarctic archipelago in Scotland lying between Orkney, the Faroe Islands and Norway. It is the northernmost region of the United Kingdom. The islands lie about to the n ...
on 27 July 2011 suspected of being LulzSec member
Topiary Topiary is the horticultural practice of training perennial plants by clipping the foliage and twigs of trees, shrubs and subshrubs to develop and maintain clearly defined shapes, whether geometric or fanciful. The term also refers to plants w ...
. They also searched the house of and interviewed a 17-year-old from
Lincolnshire Lincolnshire (abbreviated Lincs.) is a Counties of England, county in the East Midlands of England, with a long coastline on the North Sea to the east. It borders Norfolk to the south-east, Cambridgeshire to the south, Rutland to the south-we ...
possibly connected to the investigation. Scotland Yard later identified the man arrested as
Yell, Shetland Yell ( sco, Yell) is one of the North Isles of Shetland, Scotland. In the 2011 census it had a usually resident population of 966. It is the second largest island in Shetland after the Mainland with an area of ,Penrith, James & Deborah (2007) ...
resident Jake Davis. He was charged with unauthorized access of a computer under the
Computer Misuse Act 1990 The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in ''R v Gold & Schifreen'' (1988) 1 AC 1063 (see below). Critics of the bill complained that it was introduced hastily ...
, encouraging or assisting criminal activity under the
Serious Crime Act 2007 The Serious Crime Act 2007 is an Act of the Parliament of the United Kingdom that makes several radical changes to English criminal law. In particular, it creates a new scheme of serious crime prevention orders to frustrate crime in England a ...
, conspiracy to launch a denial-of-service attack against the Serious Organised Crime Unit contrary to the
Criminal Law Act 1977 The Criminal Law Act 1977 (c.45) is an Act of the Parliament of the United Kingdom. Most of it only applies to England and Wales. It creates the offence of conspiracy in English law. It also created offences concerned with criminal trespass in ...
, and
criminal conspiracy In criminal law, a conspiracy is an agreement between two or more persons to commit a crime at some time in the future. Criminal law in some countries or for some conspiracies may require that at least one overt act be undertaken in furtherance ...
also under the Criminal Law Act 1977. Police confiscated a
Dell Dell is an American based technology company. It develops, sells, repairs, and supports computers and related products and services. Dell is owned by its parent company, Dell Technologies. Dell sells personal computers (PCs), servers, data ...
laptop and a 100-gigabyte hard drive that ran 16 different
virtual machine In computing, a virtual machine (VM) is the virtualization/ emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized h ...
s. Details relating to an attack on Sony and hundreds of thousands of email addresses and passwords were found on the computer. A London court released Davis on bail under the conditions that he live under curfew with his parents and have no access to the internet. His lawyer Gideon Cammerman stated that, while his client did help publicize LulzSec and Anonymous attacks, he lacks the technical skills to have been anything but a sympathizer. In early September 2011, Scotland Yard made two further arrests relating to LulzSec. Police arrested a 24-year-old male in
Mexborough Mexborough is a town in the City of Doncaster in South Yorkshire, England. Situated between Manvers and Denaby Main, it lies on the River Don close to where it joins the River Dearne, and the A6023 road runs through the town. It is contiguous ...
,
South Yorkshire South Yorkshire is a ceremonial and metropolitan county in the Yorkshire and Humber Region of England. The county has four council areas which are the cities of Doncaster and Sheffield as well as the boroughs of Barnsley and Rotherham. ...
, and a 20-year-old male in
Warminster Warminster () is an ancient market town with a nearby garrison, and civil parish in south west Wiltshire, England, on the western edge of Salisbury Plain. The parish had a population of about 17,000 in 2011. The 11th-century Minster Church o ...
,
Wiltshire Wiltshire (; abbreviated Wilts) is a historic and ceremonial county in South West England with an area of . It is landlocked and borders the counties of Dorset to the southwest, Somerset to the west, Hampshire to the southeast, Gloucestershire ...
. The two are accused of conspiring to commit offenses under the Computer Misuse Act of 1990; police said that the arrests related to investigations into LulzSec member Kayla. On 6 March 2012, two men from Great Britain, one from the United States, and two from
Ireland Ireland ( ; ga, Éire ; Ulster-Scots: ) is an island in the North Atlantic Ocean, in north-western Europe. It is separated from Great Britain to its east by the North Channel, the Irish Sea, and St George's Channel. Ireland is the s ...
were charged in connection to their alleged involvement with LulzSec. The FBI revealed that supposed LulzSec leader Hector Xavier Monsegur, who went by the username Sabu, had been aiding law enforcement since pleading guilty to twelve counts, including conspiracy and computer hacking, on 15 August 2011 as part of a
plea deal A plea bargain (also plea agreement or plea deal) is an agreement in criminal law proceedings, whereby the prosecutor provides a concession to the defendant in exchange for a plea of guilt or ''nolo contendere.'' This may mean that the defendant ...
. In exchange for his cooperation, federal prosecutors agreed not to prosecute Monsegur for his computer hacking, and also not to prosecute him for two attempts to sell
marijuana Cannabis, also known as marijuana among other names, is a psychoactive drug from the cannabis plant. Native to Central or South Asia, the cannabis plant has been used as a drug for both recreational and entheogenic purposes and in various t ...
, possession of an illegal handgun, purchasing stolen property, charging $15,000 to his former employer's credit card in a case of
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
, and directing people to buy prescription drugs from illegal sources. He still faces a misdemeanor charge of impersonating a federal agent. Five suspects were charged with conspiracy: Jake Davis, accused of being the hacker "Topiary" (who had been previously arrested); Ryan Ackroyd of London, accused of being "Kayla"; Darren Martyn of Ireland, accused of being "pwnsauce"; Donncha O’Cearrbhail of Ireland, accused of being "palladium"; and
Jeremy Hammond Jeremy Hammond (born January 8, 1985) is an American activist and former computer hacker from Chicago. He founded the computer security training website HackThisSiteLuman, Stuart. ''Chicago'' Magazine, July 2007"The Hacktivist" in 2003.Hayes, ...
of
Chicago (''City in a Garden''); I Will , image_map = , map_caption = Interactive Map of Chicago , coordinates = , coordinates_footnotes = , subdivision_type = List of sovereign states, Count ...
, accused of being "Anarchaos". While not a member of LulzSec, authorities suspect Hammond of being a member of Anonymous and charged him with access device fraud and hacking in relation to his supposed involvement in the December 2011 attack on intelligence company
Stratfor Strategic Forecasting Inc., commonly known as Stratfor, is an American geopolitics publisher and consultancy founded in 1996. Stratfor's business model is to provide individual and enterprise subscriptions to Stratfor Worldview, its online public ...
as part of Operation AntiSec.


References


External links

*
GreekSec's page
{{Hacking in the 2010s Denial-of-service attacks Hacking (computer security) 2011 crimes 2011 protests Internet vigilantism Internet-based activism Racism Anonymous (hacker group)