Subject: Your assistance, please |
From: Truth in Advertising <tia@dizum.nl> |
Date: 3/3/11, 21:13 |
To: tia@dizum.nl,barriticus@gmail.com |
Dear Mr. Browning:
I have the following article I'd like to publish on Crowdleaks, but I would
appreciate it greatly if you could give me some feedback on it, as it were,
prior to my publishing it.
Am I going too far out on a limb?
Am I making unwarranted assumptions?
I believe that my reasoning is sound, but I would really appreciate another
opinion.
Thanks.
My PGP key can be found at the end of this email. Do you have a PGP key?
Thanks.
Truth in Advertising <tia@dizum.nl>
PGP Key: http://pgp.mit.edu:11371/pks/lookup?search=0xBB1F2688&op=vindex&fingerprint=on
PGP Key Fingerprint: 88D8 4D56 CE2F 9764 8226 E1F6 6DDC D7D9 BB1F 2688
P.S.: If you'd like to publish this story, please feel free to do so. I
don't even particularly care about attribution. If you don't wish to publish
it (or even comment on it) that's fine -- I'll respect that.
If I DO end up publishing on Crowdleaks, I will be discreet -- for all
intents and purposes I will treat it as if you had never seen the story, if
that is what you'd like.
TIA
===========================================================================
Aaron Barr: Pervert or Vigilante?
While trawling though the almost 72,000 HBGary emails recently acquired by
Anonymous, I came across two that are more than a little bit disturbing.
The first of these two emails, with a Subject: line of "You can't protect
stupid" was sent by Aaron Barr to his colleagues at HBGary, and contains a
copy of a posting Mr. Barr made to a hacking forum -- www.hackforums.net.
The second email -- the only reply Mr. Barr received to the above email --
was from HBGary CEO Greg Hoglund, wherein Mr. Hoglund replied:
"Thats fucking brilliant."
It would appear that Mr. Barr, who was using the handle "Night Hacker", was
a regular contributor to www.hackforums.net, having made some 121 posts
between the date he joined the site in June 2010 and the date of this
particular email, July 12th, 2010.
This email to his HBGary associates, like many others Mr. Barr sent from his
hbgary.com account, bears a valid digital signature, made with an S/MIME
Class 1 Individual Signing Certificate purchased by Mr. Barr from VeriSign
in April 2010. The existence of this valid digital signature authenticates
this email beyond a reasonable doubt. It is therfore neither a forgery, nor
has it been tampered with.
In this email, Aaron Barr describes how he hangs around chatrooms frequented
by teenagers, e.g. 321.com. The full text of his email, as well as the
response from HBGary CEO Greg Hoglund can be seen below.
Barr's first email: http://hbgary.anonleaks.ch/aaron_hbgary_com/16436.html
Hoglund's response: http://hbgary.anonleaks.ch/aaron_hbgary_com/7853.html
Once logged-in to 321.com, Barr claims he would adopt the persona of an
underage female, using a "good photo... from MySpace of a nice looking
chick...."
Barr further relates that he would choose a name like "Naughty Vicky" and
describe himself as: "16 straight and naughty got some nice pictures..."
Barr describes purportedly sending 'pictures' to people and advising them to
turn off their anti-virus programs -- it would appear from his wording that
he intended to infect his victims with a keylogger, virus or a RAT (remote
access trojan), witness his description:
"...Free Public Crypter and it only leaves your server FUD for a
small amount of time."
For those unfamiliar with this terminology, a Crypter has been described
as:
... free software used to hide... viruses, RATs or any
keylogger from anti-viruses so that they are not detected
and deleted by anti-viruses. Crypters may be coded in
different launguages but [their] functionality remain[s]
almost the same i.e to crypt your detectable servers so
they become FUD.... FUD means Fully Undetectable....
http://www.technodevils.com/forum/showthread.php?tid=277
Now, it needs to be emphasized that Mr. Barr said in his hackforums.net
post, and repeated again in email that: "This is something that I use" and
"... I go straight to a chat room such as 321.com so sign up with a good
name...."
In other words, Mr. Barr is stating that these are methods that he actually
made use of as opposed to methods or examples that he is merely describing,
or proposing that other people carry out.
All the above activities raise a number of issues:
* By Mr. Barr's own admission he was ripping-off images of young girls from
their MySpace pages, and using them as bait.
I regard the idea of a grown man (who is NOT a law-enforcement officer)
hanging about in teenage chatrooms impersonating underage girls to be creepy,
to put it mildly, This goes double, especially since (by his own admission)
he's using stolen images of /real/ underage-appearing females as part of it.
One has to wonder, is he using other stolen identity information as well?
* He describes himself as "Naughty Vicky" and states that he has some
"... pictures please don’t spread them though ok as don’t want the whole
world seeing them..."
I believe his intent here is to make his 'victims' (as he calls them)
believe:
1) That he is a "naughty" underage female; and
2) That he has some photos, which he is willing to share, which are
implied to be of a sexually-explicit nature.
Now, according to the so-called 'pandering' provisions of the currently-in-
force American child pornography statute: (18 USC 2252(A)(3)(B), it is an
offence to:
... knowingly ... advertise ... any material or purported material
in a manner ... that is intended to cause another to believe, that
the material or purported material is, or contains--
(i) an obscene visual depiction of a minor engaging in sexually
explicit conduct; or
(ii) a visual depiction of an actual minor engaging in sexually
explicit conduct;
It appears to me that Mr. Barr intends his victims to believe that the
images he is purporting to send them contain sexually-explicit images of a
minor, thus rendering him potentially liable to prosecution and conviction
under 18 USC 2252(a)(3)(B).
Whether in fact the images are sexually-explicit images of a minor or not,
is totally irrelevant, for the purposes of this statute. It doesn't matter
whether any such images even exist or not -- all that matters is that the
/recipient/ /believe/ that these purported images being offered are:
1) of a minor; and
2) are sexually-explicit in nature.
The fact that Mr. Barr apparently intended to infect his victims' machines
with a keylogger, virus or remote-access trojan (RAT) only underscores his
belief that his 'victims' who took up his offer are/were pedophiles
interested in underage girls.
Finally, regardless of his motivations, it is a clear violation of any
number of computer-crime statutes to attempt to install keyloggers/viruses/
trojans, whether or not carried out across state lines.
In particular, the laws of the state of Virginia (Mr. Barr resides in
McLean, Virginia) prohibit:
§ 18.2-152.4. Computer trespass; penalty.
A. It shall be unlawful for any person, with malicious intent, to:
[...]
6. Use a computer or computer network to make or cause to be made
an unauthorized copy, in any form, including, but not limited
to, any printed or electronic form of computer data, computer
programs or computer software residing in, communicated by, or
produced by a computer or computer network;
7. [Repealed.]
8. Install or cause to be installed, or collect information through,
computer software that records all or a majority of the keystrokes
made on the computer of another without the computer owner's
authorization; or
9. Install or cause to be installed on the computer of another,
computer software for the purpose of (i) taking control of that
computer so that it can cause damage to another computer ...
B. ... If a person installs or causes to be installed computer
software in violation of this section on more than five
computers of another, the offense shall be a Class 6 felony.
If a person violates subdivision A 8, the offense shall be a
Class 6 felony.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Here is the full text of the relevant section of U.S. child pornography
statute:
Source: http://www.law.cornell.edu/uscode/18/usc_sec_18_00002252---A000-.html
TITLE 18 > PART I > CHAPTER 110 > § 2252A
§ 2252A. Certain activities relating to material constituting or
containing child pornography
(a) Any person who--
(3) knowingly --
(B) advertises, promotes, presents, distributes, or solicits through
the mails, or using any means or facility of interstate or foreign
commerce or in or affecting interstate or foreign commerce by any
means, including by computer, any material or purported material
in a manner that reflects the belief, or that is intended to cause
another to believe, that the material or purported material is, or
contains--
(i) an obscene visual depiction of a minor engaging in sexually
explicit conduct; or
(ii) a visual depiction of an actual minor engaging in sexually
explicit conduct;
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Text of Aaron Barr's email:
From: Aaron Barr <aaron@hbgary.com>
Content-Type: multipart/signed; boundary=Apple-Mail-482-7348960; protocol="application/pkcs7-signature"; micalg=sha1
Subject: You can't protect stupid
Date: Mon, 12 Jul 2010 15:17:39 -0400
Message-Id: <AE92F13C-0CDB-4BAD-9C78-583E96CCA46F@hbgary.com>
Cc: Ted Vera <ted@hbgary.com>,
Rich Cummings <rich@hbgary.com>
To: Greg Hoglund <greg@hbgary.com>
Mime-Version: 1.0 (Apple Message framework v1081)
X-Mailer: Apple Mail (2.1081)
[snip]
Night Hacker Online
Learning Python 2.6
******
HF l33t Posts: 121
Joined: Jun 2010
Reputation: 1
Hi all I have decided to create a quick basic straight to the point TUT
on a bit of Social Engineering, this is something that I use and it’s
handy if you are using a free Public Crypter and it only leaves your
server FUD for a small amount of time.
Ok so first things first I go straight to a chat room such as 321.com
so sign up with a good name e.g. Naughty Vicky get a good photo to use
from MySpace of a nice looking chick save it to your computer, also
remember to leave your msn your using in the profile you create so the
victims can simply add you from there. So now go to the Teen chat you
will get about 20-30 boxes pop up with questions such as ASL please
now just copy and paste this ...
They say ASL now just copy and paste it in each box you will have
about 20 Victims asking you.
Hey there 16 straight and naughty ive got some nice pictures add me
it’s (put your email)
Copy this above ^ into the 321 in each Victims chat box then wait
tell they add you on your msn
Copy and paste this into your victims msn chat from your fake msn
when you have added them.
Hey heres the pictures please don’t spread them though ok as don’t
want the whole world seeing them ;) also you might need to take your
crappy Antivirus off as msn picks up everything enjoy Tongue
Remember as well don’t bother chatting to them for ages it’s
pointless it only puts them off in the long run, my trick is to
simply go from one to the next if they moan block them and move
one. "Try to sound as legit as possible” by adding smiley faces
Tongue etc. If you do this you seem more like a chick and that is
what you want "
Well that is pretty much what I use for sniping my victims this
is just a simply basic TUT for any new members that might be
finding it hard to spread servers etc... Thumbsup
Aaron Barr
CEO
HBGary Federal Inc.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Delivered-To: aaron@hbgary.com
Received: by 10.224.36.193 with HTTP; Mon, 12 Jul 2010 16:10:50 -0700 (PDT)
In-Reply-To: <AE92F13C-0CDB-4BAD-9C78-583E96CCA46F@hbgary.com>
References: <AE92F13C-0CDB-4BAD-9C78-583E96CCA46F@hbgary.com>
Date: Mon, 12 Jul 2010 16:10:50 -0700
Message-ID: <AANLkTikaK526nwGAFU2QLeuZ9R_RvJAr0vuB0EU_Lgc6@mail.gmail.com>
Subject: Re: You can't protect stupid
From: Greg Hoglund <greg@hbgary.com>
To: Aaron Barr <aaron@hbgary.com>
Cc: Ted Vera <ted@hbgary.com>, Rich Cummings <rich@hbgary.com>
--001517503cc81020d8048b38ddc8
Content-Type: multipart/alternative; boundary=001517503cc81020d4048b38ddc7
--001517503cc81020d4048b38ddc7
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Thats fucking brilliant.
-G
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
===========================================================================
-----BEGIN PGP PUBLIC KEY BLOCK-----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=3x+x
-----END PGP PUBLIC KEY BLOCK-----