Web attackers point to cause in WikiLeaks

Advertisement
By Noam Cohen, The New York Times | Updated: 5 June 2012 02:22 IST
Highlights
  • They got their start years ago as cyberpranksters, an online community of tech-savvy kids more interested in making mischief than political statements. But the coordinated attacks on major corporate and government Web sites in defense of WikiLeaks, which
Web attackers point to cause in WikiLeaks
They got their start years ago as cyberpranksters, an online community of tech-savvy kids more interested in making mischief than political statements.

But the coordinated attacks on major corporate and government Web sites in defense of WikiLeaks, which began on Wednesday and continued on Thursday, suggested that the loosely organized group called Anonymous might have come of age, evolving into one focused on more serious matters: in this case, their definition of Internet freedom.

While the attacks on such behemoths as MasterCard, Visa and PayPal were not nearly as sophisticated as some less publicized assaults, they were a step forward in the group's larger battle against what it sees as increasing control of the Internet by corporations and governments. This week they found a cause and an icon: Julian Assange, the former hacker who founded WikiLeaks and is now in a London jail at the request of the Swedish authorities investigating him on accusations of rape.

"This is kind of the shot heard round the world -- this is Lexington," said John Perry Barlow, a co-founder of the Electronic Frontier Foundation, a civil liberties organization that advocates for a freer Internet.

On Thursday, the police in the Netherlands took the first official action against the campaign, detaining a 16-year-old student in his parents' home in The Hague who they said admitted to participating in attacks on MasterCard and Visa. The precise nature of his involvement was unclear, but in past investigations, the authorities have sometimes arrested those unsophisticated enough not to cover their tracks on the Web.

Meanwhile, a lawyer for Mr. Assange, 39, said he strongly denied that he had encouraged any attacks on behalf of WikiLeaks.

"It is absolutely false," the lawyer, Jennifer Robinson, told the Australian Broadcasting Corporation in London on Thursday. "He did not make any such instruction, and indeed he sees that as a deliberate attempt to conflate hacking organizations" with "WikiLeaks, which is not a hacking organization. It is a news organization and a publisher."

Although Anonymous remains shadowy and without public leaders, it developed a loose hierarchy in recent years as it took on groups as diverse as the Church of Scientology and the Motion Picture Association of America.

The coordination and the tactics developed in those campaigns appeared to make this week's attacks more powerful, allowing what analysts believe is a small group to enlist thousands of activists to bombard Web sites with traffic, making them at least temporarily inaccessible. Experts say the group appears to have used more sophisticated software this time that allowed supporters to repeatedly visit the sites at a specific time when the command was given.

The Twitter account identified with the Anonymous movement contained messages with little more than the words "Fire now."

The attacks thus far have been of limited effect, shutting down the MasterCard Web site, not its online transactions.

But to security experts and people who have tracked or participated in the Anonymous movement, they indicated a step forward for cyberanarchists railing against the "elites" -- corporations and governments with power over both the machinery and, critics increasingly argue, the content on the Web.

"In the past, Anonymous made quite a lot of noise but did little damage," said Amichai Shulman, chief technology officer at Imperva, a California-based security technology company. "It's different this time around. They are starting to use the same tools that industrial hackers are using."

Despite the name, Anonymous can be found in many locations and formats. Members converse in online forums and chat rooms where friendships and alliances often build.

"It's the first place I go when I turn on my computer," said one Anonymous activist, reached on an online chat service, who did not want to be named discussing the structure of the organization.

Groups of these friends, who form new conversations, or threads, sometimes decide on a topic or an issue that they feel is deserving of more attention, the activist said.

"You post things, discuss ideas and that leads to putting out a video or a document" for a campaign. In the case of WikiLeaks, the activist said, it appears that two groups decided almost simultaneously to mount a concerted effort against the site's enemies.

"I got e-mailed these two links on Sunday or Monday," he said. Denouncing "what's being done to Julian and WikiLeaks," he said, he decided to join in.

These ideas bubble up, but ultimately a small group decides exactly what affiliated site should be attacked and when, according to a Dutch writer on the Anonymous movement, who writes a blog under the name Ernesto Van der Sar. There is a chat room "that is invite only, with a dozen or so people," he said, that pick the targets and the time of attack.

He described the typical Anonymous member as young; he guessed 18 to 24 years old.

While Anonymous has recently had success with attacks on sites related to copyright infringement cases, the WikiLeaks cause has brought a much greater intensity to its efforts.

The campaigns are part of Operation Payback, created in the summer to defend a file-sharing site in Sweden that counts itself part of the mission of keeping the Internet unfettered and unfiltered and that was singled out by the authorities.

"We could move against enemies of WikiLeaks so easily because there was already a network up and running, there was already a chat room for people to meet in," said Gregg Housh, an activist who has been involved in Anonymous campaigns but disavows a personal role in any illegal online activity.

The software used to coordinate the attacks is being downloaded about 1,000 times per hour with about one-third of those downloads coming from the United States. Recently the software was improved so that a command could be sent to a supporter's computers and the attack would begin -- no human needed.

But even Mr. Barlow of the Electronic Frontier Foundation appeared to have second thoughts about where such escalation could lead: On Thursday, he said that the Anonymous group members represented "a stunning force in the world.

"But still," he said, it is "better used to open, not to close." He added that he opposed denial-of-service attacks on principle: "It's like the poison gas of cyberspace. The fundamental principle should be to open things up and not close them."

Things were hardly so serious when Anonymous first made a name for itself. The group grew out of online message boards like 4chan, an unfiltered meeting place with more than its share of misanthropic behavior and schemes.

Mr. Housh said of Anonymous: "It was deliberately not for any good. We kind of took pride in it."

That changed when Mr. Housh and a few dozen others were incensed by the Church of Scientology's attempt to use copyright law to remove a long video in which the actor Tom Cruise had spoken about church beliefs.

With its work on behalf of WikiLeaks, Anonymous has found a much more high-profile cause. As the campaign expands, many fear a more contentious Internet as governments and businesses respond to more serious attacks by activists who benefit from improvements in bandwidth and readily available hacking tools.

"Home field advantage goes to the attacker," said Gunter Ollmann, vice president of research at Damballa, an Atlanta-based firm that specializes in Internet protection. "With a little bit of coordination and growing numbers of participants, these things will continue to happen regularly."

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement
Popular Mobile Brands
  1. OnePlus Nord 5 and Nord CE 5 Colour Options, Key Features Leaked
  2. Poco F7 5G to Launch in India and Global Markets on This Date
  3. Oppo Reno 14 5G Series, Watch X2 Mini, Enco Buds 3, Pad SE to Launch Globally
  4. Trump Mobile T1 Phone With 5,000mAh Battery Announced; See Price, Features
  5. Samsung Galaxy S25 Ultra Price in India Discounted for a Limited Time
  6. OnePlus 15 May Get a Big Design Overhaul
  1. Google Unveils India-Focused Safety Charter, Shares How It Is Using AI to Combat Online Frauds and Scams
  2. Realme Buds Wireless 5 Lite India Launch Date Set for June 23; Availability Details, Key Features Revealed
  3. Prince of Persia: Sands of Time Remake Remains "Deep" in Development, Says Ubisoft
  4. Trump Mobile T1 Smartphone With 6.8-Inch Display, 5,000mAh Battery Announced; Price, Specifications
  5. Samsung Galaxy S25 Ultra Price in India Discounted for a Limited Time: Check Offers, Availability
  6. Poco F7 5G India Launch Date Set for June 24; to Debut in Global Markets On the Same Day
  7. Meta AI App Now Shows a Warning Message to Dissuade Users from Publicly Sharing Private Chats
  8. OnePlus Pad Lite, OnePlus Watch 3 43mm to Launch on July 8 Alongside Nord 5 Series
  9. Samsung Galaxy Watch to Get Bedtime Guidance, Vascular Load Features With One UI 8 Watch Update
  10. OnePlus Nord 5 and Nord CE 5 Colour Options, Key Specifications Leaked
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.