Subject: Re: DEADLINE #1 |
From: Gregg Housh <greggatghc@gmail.com> |
Date: 3/5/12, 14:43 |
To: Barrett Brown <barriticus@gmail.com> |
CC: Daniel Conaway <dconaway@writershouse.com> |
Revised version of second chapter:
Anonymous is a loose and nebulous confederation of Internet users who tend to
congregate in a number of stronghold websites of a certain character. These
websites include 4chan (particularly the anything goes /b/ imageboard), Encyclopaedia
Dramatica, reddit, and other forum or imageboard websites that do not require registration to contribute. Anonymous features no distinct or recognized organization or leadership, operating instead by the momentum of Internet populism... Perhaps the only commonality among people affiliated with Anonymous is a militant, fundamentalist view on the freedom of information, censorship, and corruption, especially with respect to governments or organizations leveraging governments.
- Endgame Systems report on Anonymous, late 2010
Stolen by Anonymous in February 2011
The CNN presenter, a British female, is otherwise indistinguishable from the hundreds of other anchors who collectively and haphazardly preside over something akin to news. Ten minutes before the segment began, shed likely been reminded by the producer as to who I was and provided with a brief summary of what might allegedly be happening that made this interview desirable. The producer would have spoken to me that morning via e-mail and paid attention to random sections of what Ive told him; at best, he will have since conveyed some portion of this to the presenter, likely along with a few things hes been told on the subject by some other person who is entirely wrong about all of them. Were all set for cable.
The hacker group Anonymous obviously likes to stay undercover. But our next guest says that hes been associated with them for years. He says he speaks for the organization and shares their views. Gregg Housh is the administrator of a website called Why We Protest. And he joins us now live, from Boston. Prepare to show your face, Gregg!
she challenges, in the general direction of the in-studio feed in which I stand unmasked as usual, having done television interviews under my real name for over a year now.
You say you speak for Anonymous. We cant verify that, so talk me through it.
I have... never said that I speak for Anonymous, I reply. That is a very bad thing to say in the eyes of Anonymous. Simply by being here in front of you, Im not Anonymous. Heres my name, heres my face. I had explained this to the producer - and, before that, to dozens of different journalists who had insisted on referring to me as the official mouthpiece, spokesman, or even leader of Anonymous.
Okay, forgive me for that, but I thought when youd spoke to my producer earlier on that you said that you thought that you could speak for Anonymous.
I can speak for whats going on. Im in all the chat channels, Im in all the websites, Ive been involved in past Anonymous actions such as the Church of Scientology. But Im personally not taking part in any of the illegal activities. Im just trusted by these people and Im around all their inner circles.
Tell me in your own words what you think theyre trying to achieve.
You know, everyone on there - so many people from so many different countries - all have their own ideas. But they all revolve around the idea that information is free. And one of the big goals is...
I pause for a moment, deciding to change tacks. This wasnt the proper venue in which to try to explain the bigger picture. Nor was it the proper time; December 2010 marked the beginning of a shift that is best recognized in hindsight. It wasnt yet evident that the operation Anonymous had just conducted would lead to a war with the U.S. government that continues to escalate at the time of this writing.
In the hours before the interview, Anonymous participants had launched a distributed denial of service attack, or DDOS, against the respective websites of MasterCard, Visa, Paypal, and Amazon, taking several of these down for hours. The first three had each, within a few days of each other, announced that they would no longer process donations to Wikileaks, which itself had just begun the release of some 250,000 U.S. diplomatic cables. Amazon, meanwhile, had ceased to provide the use of their servers to the organization. All, it seemed, had buckled under pressure from the federal government - which itself had been carrying out a secret war against Wikileaks and its principals for quite a while now. Months later, we would learn more about how that war was being conducted and how widespread the conspiracy had become; for now, I at least knew enough to get the CNN barker off my back.
We live in a certain society where journalists have certain freedoms, the press has certain freedoms, I begin. And from this side of the fence, it looks like Wikileaks is working as a journalistic organization. Theyre working with The Guardian and all these other existing organizations. So we think they should get those same protections. And we find it very interesting that these financial organizations are cancelling their accounts or denying them charges, like MasterCard, Visa, PayPal. And listing off very clearly-
How, though, do the aims effectively justify the means? she asks me, and likely no one else prior to me, the means being disrupting me and millions of our viewers from using Visa, MasterCard - and Amazon, which, lets be honest, lets face it, they werent able to bring down today. And right before Christmas! How do the ends justify the means, you think?
Theres a very tough balance to keep here. And Im smiling because Ive been asked this question several times today. We dont want to interrupt the publics livelihood...
... but you are.
because in the end we want them on our side. Some people have been affected, but in all honesty, even when Visas website is down completely, you dont go to Visas website to use your credit card. The payment process was working perfectly fine.
That Anonymous operation had not actually inconvenienced the millions of viewers she had said it had fazed the woman not a bit; nor does she seem concerned about having just grossly misinformed those precious viewers about an issue that was important enough to take air time away from Tiger Woods marital difficulties. Suddenly, the issue is not that we had inconvenienced everyone, but that we had failed to do so.
There werent enough hackers today to bring down the Amazon site, she notes. I get the sense that there are about 1,000, 1,500 participants around the world - and were giving them the oxygen of publicity tonight, and there might be more by the time this story is over. I hope were not complicit in what theyre doing.
They were.
But 1,500 - she continued, citing the number someone had made up - doesnt sound like a lot of people to me. And they certainly werent able to hit the Amazon site. So what should we expect next?
As it turns out, we should have expected that Id end up doing a book for Amazon less than a year later, which makes for a good lesson in and of itself.
Well, the Amazon site didnt go down, I conceded. Youre absolutely correct. But your numbers - as I left for the studio, there were about 3,000 people in the chat channels doing this. so its still growing. And the complicit line you used there - thats a bit tough, because the reason that DDOS are effective is not necessarily because the sites go down, but that whenever these DDOS happen, people like me and people like you end up talking about it.
***
I was born in a town that no longer exists, it having been swallowed up by the ever-expanding Dallas suburbs in the years since. My life began normally enough that I was able to get used to normality and thereby identify abnormality when it came along, which it promptly did when I was about three.
At that point, my dad owned a furniture store as well as a series of Dodge Chargers, Corvettes, and other fun status symbols of the middle class. My older sister had cerebral palsy, which is rare but not so rare as to be out of the ordinary. Mom was a homemaker. My dad and his friends started a gang.
Thirty years later, I still have no idea why that should have been so, or whether drug use prompted the car theft and bank robberies or if drugs just sort of seemed the natural thing to do under the circumstances. What I know is that my dad, his brother, and a few friendly accomplices somehow lurched into a crime spree sufficient to draw the attention of the Feds. By the end of it - to the extent that it ever ended - my dad and my uncle were on the run, one of their friends was dead, and mom had quite understandably filed for divorce.
Mom and dad thereafter had a series of spirited arguments as to whether or not dad had voided his right to help raise me. Dads position was that he was indeed responsible enough to do so, and he tried to prove it by threatening to find us and kidnap me. Lest dad win the debate via fait accompli, mom moved the two of us around quite a bit until dad finally gave up and left us alone.
No longer at risk of having her son taken by a career criminal, mom was free to move us in with our grandmother. This was a major plus since she couldn't afford much in the way of housing; with no prior work experience, she had been relegated largely to a series of waitressing jobs even as she had to contend with the expenses involved in raising not only me, but also a daughter suffering from a major degenerative disease. There would be plenty of days on which we only had one meal.
Another advantage to moving in with grandma was the presence of a potential father figure in the person of John, an older man whose son had been the one who died in the midst of the drug-fueled crime spree. John had needed a place to stay, and grandma had needed someone else living there. Beyond that, the two had an interesting sort of friendship that seemed to fall short of love. Uncle John, as I called him, was drunk every night that I knew him, which I suppose was understandable; a few years after his sons death, his daughter died from a cocaine overdose. Incidentally, he ended up killing himself in grandmas backyard a few years ago.
The next few years of my childhood were uneventful. After I turned nine, dad suddenly showed up driving a Porsche. He explained to mom that hed gotten a new job driving high-end vehicles from their original lot to another where they might sell better. This was true in a way. At any rate, I got to ride around in a couple of those cars before they were chopped or sold out of state. Then dad disappeared once again.
Childhood continued. At home, I was no help to mom. At school, I made a couple of friends with whom I remain close today. But always in the back of my mind, there was the threat - sometimes the anticipation - that dad would change his mind again and come to kidnap me. A day didnt go by that I didnt wonder what he was up to now.
But there were other men, some of whom I liked, some of whom I only like in retrospect, years after having given them a hard time. One of them, Rick, was a professor. Another one, Craig, was especially patient with me - which is just as well, since I gave that one more shit than Id given to anyone previously, and still regret it to this day. But by that time I considered myself man of the house. After all, I was already making loads of money at the age of 13.
At that time, there was an arcade in the area called Tilt. They had filled up the entire basement of a mall with video games. And this was the second heyday of arcade games, when Street Fighter 2 had just come out and ones status was determined in large part by ones ability to excel at it. I earned a lot of status in those days - which is good, because when you beat someone else, you keep playing, and it was rare occasion that I had more than a dollar to spend for the afternoon.
One day, a new machine appeared. Lotto Fun was something akin to the little wired machines that models operate on local news segments given over to the state lottery. Animated ping pong balls hopped around in a see-through container, each with a number on it. The user picks six numbers, which would appear on the screen on the left. Each time you pushed a button, whichever ball is closest to the gap would fall in. The more numbers you got correctly, and in order, the more you won. And it was a sliding scale, like a slot machine; if you put in four tokens and won, you got 16 in return.
On around the fourth time I played the machine, I noticed something. Among the various animations given off by the screen was one that seemed somehow out of place - a sort of pixel that turned yellow at certain moments. Soon Id figured out that if one happened to push the button when the pixel was flashing yellow, the ball that fell in would be that of the number youd selected - which is to say that if you simply put in four tokens and then pressed the button only when that little yellow light flashed, you would be assured of making a profit of 12 tokens. Most likely, some programmer decided to set it up that way, unknown to his employers, for the same reason that so many other programmers have added similar back doors to other products - a reason that well have plenty of occasion to discuss later. For now, I was just a 13-year-old with lots and lots of arcade tokens.
Now, the reason that games like Lotto Fun dont legally constitute gambling is that the tokens entered and the tokens won have No Cash Value, as is stamped on each token. One could just as well stamp This Does Not Exist or Cure For Cancer on such tokens with equal results; cash value is not determined by imprinted proclamations but rather by the market. And in a video arcade such as this one, the market dictates that tokens are worth a quarter each, that being how much they sell for in the dispensers. Markets, though, can be undercut.
My pockets filled with tokens, I waited next to one of the token dispensers until someone came up to use it.
Hey, man. Ill give you six tokens for that dollar.
What? Do they work?
I stuck one of my tokens into a nearby arcade game, which promptly started up.
Okay. Heres two bucks, give me 12.
Sure thing.
It was, at that point, a week before class picture. A week later, I came to class wearing the nicest clothes I had ever owned.
There was more than one Lotto Fun machine at Tilt. I taught a friend the games secret tell, lectured him on the finer points of the scam - learning the pattern that the security guards walked so as to avoid having one come by when one was selling at the token dispensers, paying attention to the ceiling cameras, etc - and took a 25 percent cut of his daily take. At that point, I hadnt seen any of the mobster movies. I didnt know anything about RICO or racketeering or anything else of the sort. But the fundamentals of crime are universal. My friend wasnt quite as proficient as I was but he could pull out $50 in a day. Soon I was making about $400 a week - an extraordinary amount of cash for any 13-year-old, and almost unimaginable for a kid from a poor family.
Back at home, I kept my increasing supply of cash in a tennis ball canister. One night I came home to find my mom sitting at the kitchen table, the canister open on the table. Concerned, she asked where I was getting this kind of money. I told her, no drugs, no violence. She pressed me, still not understanding how I could possibly pull off something like this. I explained the situation with the arcade. She laughed and told me that I probably couldnt even get in any real trouble for that. Looking back, that was the moment when I realized that I could probably get away with quite a bit more. I bought a moped.
One day, I had just walked into Tilt when an employee stopped me. He was about 25 years old, a big guy with a mustache and a beard.
We need to walk, he said.
Out of options, I followed alongside of him.
Am I in trouble?
No, no, no.
Are you calling security?
No, no.
He took me to one end of the arcade where no one could overhear us. Hed been watching me for a while, he explained. He knew what I was doing, and he had a pretty good idea of how much money I was making. And he wanted in.
Being the dumb kid I was, I told him exactly how much I was making. As such, he ended up with about 25 percent of the overall take from then on. But he also made sure that I had a solid perimeter, free from security guards. And of all the ceiling cameras, he informed me, about five percent actually worked, and none of those were in our area - one less limiting factor in the time my friend and I could spend selling at the dispensers.
Things proceeded like this until Tilt finally removed the Lotto Fun games, likely on a scheduled rotation. In the six months or so that I had run the operation, we probably took out something around $10,000. At any rate, my growing suspicion that the law simply didnt apply to me had been confirmed.
As my adolescence continued and my savings dried up, I found myself in need of a real job. The first of these was at Wendys, where I lasted about two weeks before throwing a soda at my boss face. For some reason I thought McDonalds might work out better. Instead, I ended up throwing my manager onto the grill, burning his hands; this was in retaliation for him stupidly burning me with the fry basket out of sheer negligence, but apparently McDonalds policy does not take into account the occasional necessity for revenge, because I was fired. Anyway, jobs werent my thing.
School wasnt my thing, either. I hassled my teachers with endless questions in order to improve their job performance, but the administration failed to appreciate my assistance. One day, when I found myself sent to his office one too many time for his liking, the principal told me that if I showed up there again, Id be suspended. On my way out, the coach stopped me, pushed me against a wall, and made a similar threat, except this one involved taking me out back and kicking my ass.
That evening, I recruited two friends. One was actually a friend, while another was simply a kid I didnt care for all that much but who had the virtue of being the son of the county sheriff. He was therefore a sort of walking insurance policy against any police involvement were we to somehow get caught doing what it was that we were about to do. And the thing we were about to do involved crowbars.
The next morning, everyone arrived at school to find it trashed - shattered glass, broken desks, smashed lamps, and other synonyms followed by nouns of the breakable sort. No one could prove anything, nor was I necessarily even the key suspect. It seemed like we would get away with it until a few days later, when my friend decided he would brag about it to some other kid - not realizing that a teacher was standing right behind him. He, the sheriffs son, and I were rounded up, brought into the office, and with some great degree of satisfaction, the principal announced to us that the sheriff was on his way. I tried not to smile.
At the end of it, my friend was shipped off to another school district in Illinois, where he was able to start school just in the nick of time, before the paperwork to the effect that he was a hoodlum was made available. The son of the sheriff was sent to military school. But nothing really happened to me. My mom told me Id better get a new Moped to replace the decrepit one Id bought a few years back with my crime money, because she sure as well wasnt going to be driving me around all day. I never went back to school.
***
I got a computer at some point after I turned 16. Within a few weeks I was able to code. Unlike everything else, coding came naturally to me. I started playing around on the dial-up bulletin board systems (BBSs) that were popular at the time; I also managed to get a research account that allowed me to access the internet before it was effectively available to the public. This was 1992, and institutions like the National Center for Supercomputing Applications were playing around with some interesting browser ideas; Mosaic, then the top of the line, couldnt even show images yet. Meanwhile, there werent many people who had even heard of HTML, much less knew how to program in it; at the same time, an increasing number of companies were deciding that they needed a web presence.
A neighbor of mine with whom Id discussed programming on occasion had a friend at one of those companies - a Kansas City firm that needed a database converted to a website. Having learned that I could code HTML, my neighbor called up his friend and said that while I could do the job, I was only 16. The company said they didnt give a shit if I was 12, that they wanted me to interview for the job. I did, and was hired to come out to Kansas City and do the specified work.
Moving to Kansas City at my age would have been difficult were it not for a happy coincidence - my dad happened to be living out there at the time, working for my uncle. My moms good friend was also based in the area, and could thus report back to my mom. So my dad and I rented a townhouse together. Finally, we got a chance to get to know each other; from the age of four up until then, I had only spent a total of a few days with him.
I began my career as a web developer and all-around programmer. I did a good job at the firm - good enough to automate everything they needed and thereby put myself out of work. At that early point in the history of corporate web work, there wasnt yet a constant push for changes and improvements in online setups; just setting up a website was considered akin to pulling off a five-man theft of a high-security art museum or some such thing, and when it was all over, everyone concerned was satisfied.
But I found other companies that needed similar work done, and was thereby able to land a series of consultancies and full-time positions over the next several years. I went to work for Ringside, the largest manufacturer of boxing equipment in the US, where I ran their computer network. The head, a guy named John Brown, was the guy you consulted with if you were making a boxing movie and wanted everything to be nice and accurate. That was an interesting job to have, as far as jobs go. I worked at American Century - the third largest investment firm in the world at that time - where I had originally been brought on to help run a massive computer migration from OS2 to NT4, and was afterwards asked to stay on for a while.
For the entirety of my stay in Kansas City, I helped run the local production of Rocky Horror Picture Show, playing Brad. This was where I met my first wife, whom Id marry a few years later. But shortly after moving to Chicago, we got divorced, and she took our daughter and went back to Kansas City. Bummed out about the break-up of my first family, I was thrilled when my dad suddenly showed up, broke and hoping to stay on my couch. The two of us continued to live as roommates even after he found a new job, and once again we had the opportunity to reconnect. Things were looking up.
About a year later, I found myself unable to withdraw money from my bank account. It turned out that a lien had been filed against it, one that had actually been intended for someone else. Today, this sort of thing can be fixed in a few hours, but back then it took a week to rectify. While I waited for the bank to sort everything out, bills came up. I spent a long evening scrounging together about $1700 in cash, borrowed from assorted friends, with the intention of paying rent, electric, gas, and all that the next day. As it turned out, I wouldnt have the time to drive around town paying off things in person, as I had a meeting the next morning at work. Luckily, my dad had the day off, and he volunteered to take care of it. I gave him the cash and my car and went to work.
When I got home, he wasnt there. Neither was my car. When the next day came and he still hadnt showed up, I called around and discovered that none of the bills had been paid. I never saw my dad again.
***
There was a time, years later, when a certain array of people had a degree of influence over something very powerful. One of these people wrote a sort of manuscript, one that was originally intended to serve as a guide for the others who would come along to assist, or even to replace them one day. For several reasons, that manuscript was never distributed.
To the extent that it is a guide, it advises a particular blend of caution and aggression. To the extent that is a manifesto, it centers on two facts: that anyone may now theoretically have any information they please, and that anyone may now talk with, agree with, and act with anyone else on the planet. These two facts are portrayed as central to any relevant school of thought about where humanity is headed.
The document is huge, and deals with a wide range of subjects, but two lines bear noting:
The more aggressively you play your cards, the more you will be perceived as a threat. This is not to say that aggressive tactics are intrinsically disadvantageous. As you will see, quite the opposite is often true.
Balance of power refers not to a one-dimensional measurement of who is stronger than whom, but to an overall disposition of strengths and weaknesses among opponents.
***
I made some interesting friends on the dial-up BBSs I frequented at the time. Among them was a kid who told me that everything is on IRC - internet relay chat.
IRC was a world unto itself, its user base drawn from the technical elite, many of whom would become millionaires over the next decade. Early adapters, software engineers, security experts, hackers of both the criminal and legitimate sort, and the system administrators who controlled the increasingly crucial technical infrastructure of the worlds major companies all congregated together in what was essentially a secret plane of existence, unknown to the world at large. It was an environment that seemed especially designed for conspiracy.
Among other things, this kid introduced me to the nascent warez subculture - the informal network of individuals who pirated software for free distribution, and motivated either by ideology or street cred or some combination of the two. I had downloaded a few things off BBSs, but Id never seen anything like this. From the moment I was introduced to it, I was in.
My mind has a very organizational side to it; I have the desire to fix everything, to make everything run smoother. As the kid proceeded to show me the structure that this illegal sub-industry had so far taken, my mind was already attacking the problem of how to improve on it. Within the next few years, I had reformed one of the worlds biggest warez syndicates at the time, and many of our techniques were thereafter adopted by others.
Such improvements didnt hinge merely on programming, but also social engineering - something that will come up quite a bit in this book and which entails the manipulation of another person in order to prompt them to act in a certain way. Of course, theres not necessarily any clear line between social engineering and straightforward yet self-interested persuasion. But the term has come to be used within the context of the security field in particular as a means of describing hacking by other means - the non-technical means of the sort that famed hacker Kevin Mitnick often employed as a last resort when his objectives werent otherwise attainable.
The bulk of my plans for the re-invention of the warez community required me to build up a series of sources within a number of major firms dealing in both software and hardware. To those system administrators at software companies who could leak us the programs before they were released, I sent free hardware. To those sysadmins at hardware firms who could manage to sneak out any hardware that for one reason or another didnt have to be accounted for, I made available the entirety of our pirated software. As our surplus hardware and library of software increased, I was in a better and better position to make offers that were sufficiently attractive to a higher and higher class of backroom techie until such time that I was ready to take things to the next level.
Sprints headquarters were based in Kansas City - itself the backbone of the growing internet at the time, with the majority of net traffic flowing through the areas trunks and a wide range of research facilities having sprung up in the area as a result. Several of these were Sprint labs dedicated in part to developing faster internet technologies, and which necessarily had a tremendous amount of bandwidth available - one had six OC3s, each sporting 155 megabytes, an unbelievable amount in those days. And it was all unmetered, which is to say that no one in a position to care was keeping track of how much of it was used on a given day in the course of the firms research.
In the course of my perpetual online search for useful people, I happened to meet a guy who was connected to one of these labs. It turned out that we had a mutual friend in real life, beyond the world of IRC channels and BBS forums. That friend facilitated a lunch meeting, and in the hour and a half that I had with this fellow, I gave him the latest variation on a spiel that Id been using to recruit new participants, one that had improved with time as our resources increased - that, first of all, what I was doing on the internet was a lot more fun than whatever is what that he was doing; that by this time we had regimented things in such a way that it was almost impossible that he or any of our other supplies would get caught having this particular brand of fun; that, if he were to agree to the plan, wed be storing all of our software - games, apps, music, porn, anything that anyone could possibly want - on servers located right behind his desk, from which he could help himself; that the software in question would include new releases and that this would begin uploading to those servers within seconds of its public release - not a couple hours or a few minutes, but literally four or five seconds after a given company had made it available for sale; that in some cases software would be on his servers not upon release, but months prior, as we had employees who leaked us stuff the minute the software was completed, all cracked and ready to go; and that, in addition to all of this, we would feed him all the hardware his little heart desired - hard drives, computer casing, CPUs, anything - as we already had deals in place with people at firms so large that adding a dozen extra units to the monthly orders wouldnt even show up on the paperwork. And all he had to do in exchange for all of this was to give us access to those OC3s.
He agreed. And just a few days later, our warez syndicate had more bandwidth capability than did most governments.
We were now in a position to wreak havoc on the worlds corporate giants using their own employees, their own resources, their own infrastructure. I got us a source inside of Microsoft who was willing to leak us the various beta builds of Windows long before each one was available as a commercial product. We had Windows 95 and were shooting it out around the globe almost a year before it hit store shelves. It was a beta version, with its project designation Chicago 32 still imprinted in large letters on the desktop background - buggy, but working, and interesting to play with. Microsoft was pissed, but so long as we had direct, internal, and hidden access to their beta build server, we had whatever they had within ten minutes flat - no activation necessary, no serial number needed. Theoretically, every program ever devised could be made available to everyone in the world for free. Someone was going to have to go to prison.
**
When the knock on my door comes, my roommate answers it. Hes pushed back into the living room. The local cops come in first, guns drawn - the FBI come in behind them so as to skip any initial shootout. I decline the chance to engage in a firefight with several dozen law enforcement agents and instead come out of my room to surrender, or whatever one does.
They let my friend go and sit me down in the living room. More FBI stream in to secure the house. I ask if I can turn on the TV and watch the news and they tell me to shut up. I ask a few more times before they finally let me. The Feds are taking individual photographs of each and every five-square-yard portion of everything, like Japanese tourists who just did their first hit of crack at Disneyland.
When all my hardware has been loaded up into federal vans, someone tells me that Im not actually charged with anything just yet, that theyre simply here to collect information. Id have to come downtown with them but would be home by evening.
They want me to cooperate. Most everyone Id be able to cooperate against has already been swept up like me, so thats not going anywhere. But I want a way out. I wont go after anyone involved in just warez, but if they want me to infiltrate credit card thieves or child porn merchants, Id be more than happy to do either. They tell me that this is possible. Theyll get back to me.
They take me to the lie detector. I tell them Ill lie anyway and that, incidentally, I dont ascribe to the science behind lie detection devices and neither does anyone else whos competent. I ask the administrator if he really thinks hes doing anything useful. But I do compliment him on his bright orange tie, one of the few things about the day that still sticks out.
***
Before getting to me and several other people like me, the FBI had snatched up dozens of lesser participants, turned a few, and successfully conjured more raids out of what little they started with. I had been on a short list of people in whom they were particularly interested - rather, my screenname wizy was on the list. But the Feds were obligated to make thousands of arrests altogether if the industry and anyone else paying attention were to be satisfied. There probably wasnt any one particular grizzled old agent whod spent months contemplating and chasing this enigmatic wizy character through the more dramatically-charged ends of the cyber wasteland, sometimes scoring clues but mostly being outwitted, although this may change when we start working on the screenplay.
Three days after Id first been detained, the FBI brought me back downtown, and fuck me if they didnt put me right back on the goddamned lie detector test again and ask me the very same questions theyd asked me three days previously and getting back the same mostly false answers. They put me back on the thing a couple more times over the next three months, during which I had no clue what was going to happen; they werent any more forthcoming to me than I was to them. Finally they made me a proposal: I would start working on a child porn sting operation which, like a lot of the more productive offers that are made by the Feds to people in my position, eventually fell through after months of preparation, and for no reason that can be ascertained by anyone at all. They resumed alternating between putting me on the lie detector and asking me to help bring in people that I simply wasnt going to bring in.
Some variant of all this went on for five years, during which I had no idea if I were going to go to prison or become a crime fighter or what. This is a common situation among those engaged in crime or activism or both and who use computers to this end; its being faced at this writing by dozens of Anonymous activists who face charges in nations around the world, and many of them will go on to do interesting things in the years to come, on different sides of different fights, and retaining old enemies with whom theyll continue to do battle across a changing but increasingly consequential, and thus increasingly dangerous, landscape. Some will be swept up by society and placed into positions of limited but effectively secret power - most societies accidentally take up such people and equip them with positions in the state, unconsciously deeming them to be a sort of useful weapon - and some of these will co-opt the resources that become available to them to carry on their personal or political conflicts by other means. Almost everything that occurs will be invisible to the public except in the form of occasional news items that will be mostly false.
***
Five years after I was first detained, prosecution began. A few months later, I was convicted of conspiracy to commit copyright infringement and sentenced to three months in federal prison. This would have been reasonable had I not been sent to the worst federal prison in the system, rather than the far less notorious one that was originally to be me home. Very likely, this was done out of anger on the part of certain people that Id managed to get off with such little time.
On the day I was told to report in, my friend dropped me off at X prison, walked me to the door, and said goodbye. Coming in, I saw that the intake lobby was crowded as hell; I had to wait 45 minutes to actually become a prisoner, which annoyed me for some reason. When my turn finally came, I still had a great deal of processing ahead of me. They fit you for your jumpsuit, take all your belongings, and compel you to sign every manner of document. No surprises until an administrator explained that I was going to be put in the special housing unit because they didnt have any beds right now. I asked him what that was, exactly. In return, I got a strange smile, and years later Ive still yet to decide if it was malicious or sympathetic. What I knew then was that I was being sent to solitary, and that this was the doing of whoever still had it out for me.
Also, its going to be a few days until we have sheets for you. And were out of pillows.
My bed turned out to be industrial shelving - it even had the OSHA logo on it. On my fourth day there, they brought me sheets. This was nice, as both the steel shelf and the concrete cell were extraordinarily cold. I never got a pillow. And thats how my sentence started.
Now, the solitary I did wasnt quite as harsh as what Malcolm X went through. I got an hour of exercise each day. We got desserts, such as pudding cups. They were six months expired and disgusting but nonetheless popular in the same way that the Democratic Party is popular. We were allowed to receive mail, which the guards slide through the slit under the door. And because of that slit, there really was a we; although you couldnt see them, you could communicate with anyone within ear shot - and, with the proper tools, anyone else on the block. There was also a system of trade in place. All of this was thanks to fishing, something I was taught my first day by one of the two prisoners whose cells were closest to me - and whom I never laid eyes on until the day I left.
The cell doors werent placed across from each other, but rather in a zig-zap pattern. The slits at the bottom have about an inch of clearance. With this in mind, you would take a sheet and unwind it until you had a few long strands of thread, which you would wind together so that the end result would be sufficiently strong. Then you would take an empty toothpaste tube and rip the end off, poke a hole through it, and fill it with whatever you had that possessed some weight (well-behaved prisoners could earn tiny little AM/FM radios; the dead batteries from these worked best). The thread goes through the hole you poked in the tube end. Now, you take a letter you got that was a pretty good read, or part of a newspaper youd been receiving if you were special (if you had USA Today, you were a god, hilariously enough), and fold it up with the line in such a way that its firmly attached enough to go where that line goes. Then you slide the whole thing around a little on the floor, make sure that the paper is slick, with no crumples to disrupt its flow. Youre not quite ready to throw yet; first you have to lie down next to the slit and tap the concrete floor right outside of it in order to determine by echo if one of the guards were standing in the hall. Upon determining that none are around, you take your fish line - now youre lying down flat on your chest - and, using the weight, you slide it under the slit in the direction of one of the two doors located six feet diagonal to yours, hoping to get your little fish under their door slit. He grabs it and then pulls as fast as he can, takes off the reading material, and then, yelling Fish, slides the contraption back to your own slit, where you likewise pull it in as fast as possible lest a guard see you do it and come and confiscate the fish you made with eminently valuable materials, some of which, like toothpaste tubes, youll never receive again if caught. The process could be repeated in order to get something to other cells down the block, though this of course entailed extra time and risk. This was our internet.
It was a lucky thing that the guards considered fishing a game worthy of participation, rather than strictly as a rule to be enforced. If a guard at the end of the hallway saw a fish sliding across the floor, hed run as fast as possible down the corridor and even jump towards it with hands outstretched in order to nab it. But if it made it under nonetheless, the guard wouldnt come in and take it, but rather say, Aha, next time, punk, or something of the sort, and walk back to his post.
Fishing is among the many clever, desperate techniques developed by prisoners who work under the threat of hunger, madness, further punishment, and other pressures of the sort that hone ones creativity into a laser beam. Without access to the many, one does wondrous things with the few - not just in terms of making inventions, but also developing mental skills and pursuing specialized avenues of study. In The Count of Monte Cristo, the imprisoned Edmond Dantes asks the Abbe, whose ingenuity in the face of solitary confinement was enough to produce books written in blood ink, what wonders he might have accomplished had he been a free man. The Abbe replies that, being free, he would have been distracted by the whole, thus never having to focus on a few segments of it in the way that yields such results as he had produced while imprisoned.
***
The guy across the hall seemed like a really nice fellow. He gave me a fish - the contraption itself - on my first night there, after having determined I wasnt yet ready to build my own. He held it on another line and passed it to me several times so that I could get the hang of it. Eventually, he sent it back again with a magazine.
Heres something for you to read. Enjoy.
It was a copy of Maxim - a major item due to it being the most pornographic thing one is allowed to have in federal prisons.
(Other prison systems have implemented similar restrictions against anything that includes nudity, and not always simply to protect the innocence of prisoners. A few years ago the Texas Board of Corrections passed a two-pronged revision that restricted pornographic magazines and quickly became known in the media as the Playboy Ban. The other part of the provision, which placed new restrictions on communication between inmates and the media, was largely ignored by the media itself.)
My new neighbor showed a friendly interest in my background, asking me where I was from and all that. In return I asked him what hed done to get solitary in the systems worst prison.
There was a riot in Leavenworth and I killed a couple guards, so they sent me here.
You must be a pretty big guy, I replied, diplomatically. He confirmed this with some modesty.
For a month, he was the only person I could talk to with any regularity. The usual presence of guards in the corridor prevented most any form of human interaction except for a few times a day. Talking to those in other cells was prohibited, and this rule was enforced to the letter despite the sporting chance we were given on the fish thing; those caught talking could lose their dinner, among other things. Of the 23 hours one spent in the cell - the other hour being given over to exercise outside - almost all of it had to be spent by ones self, incommunicado.
Only when I was released from solitary did I happen to catch a glimpse of my friend across the hall, as he was being led to exercise; a huge, bald white guy with a motorcycle beard and a giant swastika tattoo.
This wasnt an uncommon look in general population, where I was to spend the next month and a half. But no one was rioting or killing guards; one can generally avoid violence and other forms of prison drama if one knows what to do, which I instinctively did. The racial animosity that varies from system to system wasnt a serious problem here. This was for the best, as the blacks controlled the chess boards, one of the few amenities I sought. Otherwise, I kept to myself, spending most of my time scribbling on a pad.
Finally, my sentence ended. As I went through processing, one of the guards who knew what I was in for took the occasion to mock me one last time. I had been a hotshot computer guy, he noted, who would never get another job in computers again. Through the transitive property or something like it, he concluded that, in fact, I wasnt such a hotshot after all, and that Id better get used to working a real job. Id be lucky to find one doing anything now, he added; the economy was about out of gas, and there were plenty of people looking for work who didnt have a federal conviction to their name. I took my clothes and left.
A few days later I reported to my new probation officer, with whom Id have to check in every week for quite a while. She was more sympathetic than the guard, and right off the bat started telling me about the various federal programs that were in place. There were some ride share programs I could sign up for; until then, there were a couple of good bus routes to the probation office that would save me some trouble.
I thanked her for everything, but pointed outside, where my company car sat.
I hadnt lost my job went I went in for my sentence; to the contrary, my employer at the time expected me to complete a piece of software. The language it was to be written in was so new that the first book describing it had yet to come out at the time I went to prison; I had to have my mom send it to me upon its release, about two days after I got out of solitary, where books were forbidden (another counter-productive policy that helps to perpetuate criminality among prisoners). Now having access to whole pads of paper and pens, I read the book from cover to cover and wrote out a draft of the program, followed by an improved version, followed in turn by the final product, 30 handwritten pages of commands that needed only to be fed into an actual computer, where the two or three errors could be fixed, after which it would be ready to go. More importantly, the language itself, Ruby on Rails, would soon come into heavy demand; I had gotten into the Ruby market on the ground floor, already able to boast of having written a program in it.
People dont really mind if you break the law.
On Fri, Mar 2, 2012 at 10:50 AM, Daniel Conaway <dconaway@writershouse.com> wrote:My apologies! Spam filter! Sorry Barrett
--D
Sent, briefly, from my phone
----- Forwarded message -----
From: "Stephen Barr" <sbarr@WritersHouse.com>
To: "Daniel Conaway" <dconaway@WritersHouse.com>
Subject: DEADLINE #1
Date: Fri, Mar 2, 2012 11:43 am
WHAT ARE THE ODDS? This was stuck in the spam filter last night
Stephen Barr
Writers House, LLC
21 West 26th Street
New York, NY 10010
sbarr@writershouse.com<mailto:sbarr@writershouse.com>
(212) 685-2400 x 140
From: Barrett Brown [mailto:barriticus@gmail.com]
Sent: Thursday, March 01, 2012 11:01 PM
To: Daniel Conaway
Cc: greggatghc@gmail.com; Stephen Barr
Subject: Re: DEADLINE #1
This round of e-mails is throw up via pastebin.com<http://pastebin.com>, a popular web utility among Anons. The press digs right into it, with most articles centering on the "This may completely destroy the Law Firm" line. The same file is posted to reddit, a website on which various submissions from around the web are voted up or down by some limitless number of users. The demographic has historically been overrepresented by scholarly types, scientists, bookworms, and the internet's vast population of unemployable know-it-alls, which makes it the most powerful crowd-sourcing engine in existence; it remains so even despite a decline in the average erudition of the usership, a downward spiral that almost inevitably ensues as a site grows increasingly popular, and thus increasingly accessible. Also, posting something on reddit is a great way to get people like Andrew Sullivan to post it a week later.
chapter one draft: (I'm probably going to change the ending, but can't do so until I hear back from someone who can tell me a few things I'll need to know first)
The games of the young are as old as the sins of their fathers.
- William Durant
Its Friday morning and my inbox is even more cluttered than usual. This tells me that Anonymous has been busy. That tells me that Ill be busy.
There was a time when I knew beforehand when Anonymous was to be busy, and what theyd be busy doing, as I would have usually been somehow involved in whatever was to be done.
Along with a few other individuals who have since gone their separate ways, I did indeed run some parts of Anonymous, and rather thoroughly at that; but that was years ago when what we had was something different than the larger, vastly more complex thing that has grown out of it; even back then, our control was only as good as our ability to predict what might be permitted of us by the very people we were trying to influence. No one is in control now, except by degrees and to extents, and even then the control is a juggling act, performed in the dark. Just trying to keep up after the fact is a juggling act in and of itself, as will be made abundantly clear to you.
Adding to the trouble is the problem of defining what exactly Anonymous is and who is involved. I am not Anonymous, for instance. I used to be, but then I was outed and taken to court by a certain enemy institution. This made me less anonymous, and thus less Anonymous. That it happened to make me more Anonymous, I suppose, will not clarify anything. Suffice to say that I am neither anonymous nor Anonymous, but that I remain heavily involved in Anonymous. Better yet, well come back to that.
For now, my inbox is cluttered. It is cluttered because several dozen media outlets have just been made aware of some new Anonymous action. Many of the subject lines include the terms FBI, call, and hack in some combination or another. This could be good news or bad news. I open one of the press inquiries.
Gregg-
Can you tell me anything about the FBI conference call that Anonymous somehow got its hands on and put up on YouTube this morning?
Its good news. That means it can wait. I go downstairs to the kitchen and grab a nice cold plastic bottle of Pepsi from the fridge. I love drinking Pepsi.
Back upstairs, I sit down again at my desk. On the wall in front of me are three large flatscreen TVs which I use as monitors. This is not an unnecessary extravagance. One monitor displays my e-mail and a few other browser windows. Another is for a live feed of some cable news channel, usually CNN. The third is given over to the various IRC channels in which the business of Anonymous is largely conducted.
IRC stands for internet relay chat. Its a relatively old means of text communication that remains popular with Anons for a variety of reasons, both historical and practical. A particular IRC server will include anywhere from one to hundreds of channels, each one acting as an individual chat room. A few servers among the countless others in existence are dedicated entirely to Anonymous. Most of these will have several hundred people logged on at any given time, with those users divided into dozens of different channels and each channel dedicated to a particular operation. But a user may be in more than one channel at once, and more than one server. And any user may privately chat with any other user on the same server, or several of them at once. It is a system that practically guarantees at least a degree of intrigue.
On this morning, I am logged on to a certain Anonymous-associated server which is unusual insomuch as that it has only one channel, and that channel rarely includes more than fifty people at a time. It is also unusual because of who some of these people are, and what they are collectively capable of doing.
One of these people, for instance, is a hacker who made his name when he led an attack on the servers of a certain government contractor that had sought to bring down Anonymous; he would later go on to conduct countless operations against further targets, many affiliated with the U.S. military, intelligence, and law enforcement world. All of this has left him with a sizable personal following.
Another individual is best described as an Anonymous organizer; his Twitter feed is followed by more than 150,000 people. Yet another person present, so to speak, has over 500,000 Twitter followers. In both cases, a great number of these followers are other Anons, and many others are journalists - which is to say that if one hopes to get an operation off the ground, or bring attention to some particular item of information, both of these people can accomplish that in a few seconds.
One fellow is a member of a particular cell of Anonymous that specializes in obtaining personal information about police officers and government agents. Another has endless contacts in D.C. and a network of informants that keep him abreast of whats going on in Congress; yet another has written speeches and op-eds for congressional candidates in addition to God knows what other horrible things. Three of them help administrate a much larger IRC server network called Anonops. Others present serve as researchers, analysts, propagandists, programmers, or some combination thereof.
This is just one of many nodes that together constitute the distributed network of activists known as Anonymous.
And this one grouping of about fifty people - like every other de facto grouping of Anonymous activists, large or small - operates with absolute military discipline and unity of purpose. Their combined capabilities, resources, and connections are deployed in perpetual lockstep. Imagine an individual who has lived fifty lives in fifty different places, who draws expertise from fifty different industries, who has access to the friends and acquaintances and colleagues of fifty different people, who can engage in fifty different pursuits at one time in such a way as to bring all of these resources to bear against a single target, and in perfect concert. Imagine this, and you begin to understand the power inherent to Anonymous.
Just kidding. A bunch of them are fighting.
Fight Participant (FP) #1 is a prominent information activist who, at the time I come in, is explaining to FP #2 that if he himself really intended to inform on FP #2 to the police, he could have done so by now. FP #2, who has presumably just finished asserting something to the effect that FP #1 is a potential police informant, then criticizes FP #3 for having associated with cop-lovers such as FP #1, and also for having given some quote to Wired which apparently caused some sort of perception problem for Wikileaks. FP #3 retorts that FP #2 has engaged in counterproductive operations and also has a habit of repeating himself. FP #1 adds to that charge with an example of an attack carried out by FP #2 that allegedly caused incidental harm to innocent civilians. But FP #2 is still focused on FP #3, whom he characterizes as having been rightfully kicked out of the elite operational group of which both were once major participants, and that this expulsion had been prompted by the fact that his opponent was untrustworthy and soft on cops. He even accuses FP #3 of having been probably busted afterwards, thereby explaining the period afterwards in which the fellow disappeared from the scene. FP #1 breaks in with the charge that that particular operational group, as well as the sub-movement that its participants successfully founded afterwards, possessed no regard for the well-being of the population. FP #4, a skilled hacker who is allied with FP #2, breaks in to note that FP #1 is a straight up pussy who has performed a metaphorical act of fellatio on a certain European newspaper, and merely out of pique at that.
Aside from these particular combatants, others among these 50 dislike each other based on every imaginable sort of grievance, and even a few grievances of the sort that have barely been invented. A couple of regulars here believe that one particular channel resident is loyal to a certain tight-knit group of ex-military men and intelligence contractors who spend their free time trying to identify and out Anonymous participants. One is down on another out of contempt for the other having worked closely with still another group, a group that acted under the auspices of Anonymous but whose membership was proverbial for its incompetence. At least one person suspects that two others are secretly working to discredit Anonymous, but this one keeps his suspicions quiet enough that those two don't suspect that he suspects them of being suspect. It's all a rich tapestry, you see. And I don't mean to imply that I'm somehow above any of this. Just a week ago, I was in a big fight with FP #2 and FP #4.
The thing about a fight is that it dies out after being fought. And the nature of IRC, which encourages confrontation by virtue of making physical altercation impossible, encourages fighting. The conflict having burnt out, I can get the attention of the channel as a whole.
"Hey, who stole the FBI conference call, and what's up with that, anyway?"
A question like this, posed in an Anonymous channel, will receive two kinds of answers. One kind of answer is made in-channel and will consist of speculation, jokes, or speculative jokes. The other sort is made via a private message to the questioner and will be accurate.
I get both sorts of answers; privately, Im told that the FBI recording is of a conference call between bureau agents and their counterparts at Scotland Yard and concerns their joint investigation into Anonymous, with some talk about previous and upcoming arrests. In-channel, Im told that the FBI recording is of a conference call between bureau agents and their counterparts at Scotland Yard and involves a gay phone sex orgy in which orgasms are successfully achieved by all participants.
I'm also told, via another private message, that the issue of the FBI recording should be downplayed today, as something else of far greater importance is about to surface. Fine by me, as I'm still not sure what the deal is with the FBI recording, which Ive just learned of two minutes ago, and I dont want to have to just wing it on The Situation Room like David Gergen does. Ill actually have to listen to it.
I start to regret this after pressing the play button, as the first few minutes consists of in-jokes that presumably stem from earlier communications - there is something about cheese which they all deem to be very funny - and even this is followed by several minutes of inane smalltalk before the leading agents on each side finally get down to the business of trans-Atlantic cooperation on the Anonymous problem.
... reached back out to our Washington field office...
... thats an interesting one, there...
... got Ryan Cleary and Jake Davis in court on the 27th...
... try to build some time in to allow for some operational matters on your end...
... set back the further arrests of Kayla and Tflow...
... without the defense knowing...
... partly by our guys and partly by the USAF team...
... weve cocked things up in the past, we know that...
... where they hacked the Manchester Credit Union...
... he was of interest to one of the guys in New York...
Much of whats here will be of interest to various defense lawyers on both sides of the Atlantic, as well as to certain Anonymous participants of the sort who spend their time investigating the investigators. That a certain trial is being pushed back for a particular reason without the defense knowing is particularly helpful. Certain individuals on our side will need to be told about the involvement of a USAF team, a discovery which would seem to confirm certain suspicions about another issue entirely.
The conversation in the IRC channel is turning to Greece, where Athens burns and where Anonymous participants from around the world have been hitting two dozen government websites via distributed denial of service attacks, successfully holding them down in protest of the austerity measures. Similar attacks were made against Polish government websites a week before, when the copyright measure ACTA was being considered for implementation; the next day, some large number of Polish parliamentarians had donned the Guy Fawkes masks popularized by Anonymous. That whole ACTA/SOPA thing had been wild.
Someone comes in to the channel and drops a link to the Boston Police Department website. I click on it, and see that the website has been taken over, its front page now adorned with a long message from the Anonymous sub-campaign Antisec along with a YouTube embed of the track Sound of Da Police by KRS 1. So I listen to Sound of Da Police for a bit and sip my Pepsi. I have to turn it down when someone from the Boston Herald calls to ask why the Boston Police Department website is now playing 90s hip hop. I explain as best I can. Incidentally, it was out of retaliation for the earlier Boston Police raid on Occupy Boston, which brought one of the last Occupy Wall Street branch demonstrations to a close; the message left by Anonymous on the BPD website recaps the whole thing.
The funny thing is, Anonymous had already retaliated a month or two previously by finding and releasing the names, phone numbers, and addresses of Boston policemen, and the Suffolk County District Attorney had retaliated to that by asking Twitter to provide his department with the identities behind several Twitter accounts that had disseminated the offending info. The DA also requested that Twitter refrain from informing the individuals involved, but Twitter did anyway, sending them helpful e-mails to the effect that they had seven days to inform the company of their intention to file a motion to squash, in which case Twitter would decline the DAs request altogether. The Anons in question got in touch with an associate of mine who sent them along to a California lawyer named Jay Leiderman, who in turn arranged for the Massachusetts ACLU to get that motion squashed, baby. Thus it was that the DA got nothing.
I take a few more calls from reporters and then turn my attention back to the channel. Theyre talking about an Anonymous campaign against the Syrian government, which is heating up in coordination with the local unrest. But then I get another private message notifying me that I should take a look at a certain message board used by Massachusetts police officers. Turns out some cops are unhappy about the Boston PD hack; the site administrator writes, I wish these guys would get caught, and someone would show them some old-fashioned justice. A state cop adds, I love [sic] to be on the entry team that removes these assclowns from their mommy's basement. Another fellow daydreams aloud about extraordinary rendition.
Well, cops can be temperamental. Someone suggests that we use these and other quotes for a PR offensive, but I decline; theres enough going on already, and we need to stay on point for whatever else is coming out today.
Why not? These are quality quotes, the individual writes to me.
I know, I reply. Maybe Ill use them later, for something else.
The CNN producer buzzes me on Skype; The Situation Room is about ready for me. Speaking into my webcam, I answer the questions as best I can while also making sure not to say anything that would sound bad in print. Its amazing how much worse things can sound in print than they do when said first on television.
On IRC, another argument breaks out about tactics. Then, a certain hacker announces that the law firm Puckett & Faraj - which earlier in the month had secured a plea bargain centering around a mere pay cut for the Marine whod eventually admitted to leading his unit into a massacre of 24 men, women, and children in Haditha - had been taken down.
I pulled up the website. This one, too, had been taken over and replaced, in this case with a screed against the circumstances surrounding the massacre and the punishment. Meanwhile, Bradley Manning, who was brave enough to risk his life and freedom to expose the truth about government corruption, is threatened with life imprisonment, the message read. When justice cannot be found within the confines of their crooked court systems, we must seek revenge on the streets and on the internet.
It was Sabu and an associate of his, both of whom were in the channel as well. Even if they hadnt been there to confirm, it would have been clear from the rest of the message, especially the part pointing out that several years worth of e-mails to and from the firm had been seized in the hack and would be available for download shortly.
I remember the first time Sabu did this, almost exactly a year beforehand. A few minutes after it had happened, I tipped off a reporter whod interviewed me a couple of times previously, a fellow with one of the major newspapers. That 70,000 e-mails had been taken from a company - in this case, an intelligence contracting firm that did business with the FBI and various military and intelligence branches of the federal government - did not strike him as newsworthy just then. The next day, it blew up into a massive story spawning hundreds of newspaper and magazine articles, dozens of television and radio segments, and at least two documentaries. This time, no reporter would make that same mistake. Im on the phone for much of the next hour.
Between calls, I pick up more snippets from the IRC channel and private messages. The e-mails amount to 3 gigabytes, Im told, which means there are quite a few of them even if some of the space is taken up by larger PDF files, pictures, whatever else. Someone points out that Sabu and his partner had already gone through a couple e-mails and found some damaging samples. Its noted that the firm specializes in defending military men and both partners are ex-Marines themselves.
The link to the e-mails appears in the channel - and shortly afterwards, on several other channels at the Anonops server, where hundreds of Anons will see them. The downloading begins, while a couple people at our channel begin forwarding the link to certain journalists known to be particularly competent.
Reports start coming in from in-channel Anons within a few minutes. One has just located an e-mail thread featuring some fellow named Don Greenlaw writing to one of the firms principals about a recent incident in which some Marines had been caught urinating on dead Afghan combatants.
Since we all know that 'pigs/pork' are something they detest and a major insult and offensive to them. Do whatever you think is necessary. Put pig's grease on your bullets, dump pig's grease on the dead, chop 'em up and feed them to the local dogs. But don't put it on the internet.
Some digging is done on Greenlaw, who turns out to be a retired Marine captain. I continue reading the thread. Another fellow named James Spoo apparently chimed in a while later, taking issue with Greenlaws comments:
I have to disagree.
Well, this ones got some restraint.
I don't have a problem with someone pissing on the enemy.
Nevermind.
I just don't think it's smart (in this day and age) to take a photo of your actions and put it on the internet. If you HAVE to piss on them. Do what you have to do, spread the word around town (tell everybody what you did), become a 'folk hero', but don't share it with the WORLD in a photo or on the internet.
Mr. Spoo belabors the point for another paragraph or two and then brings it on home:
It's like the Abu Ghraib Prison incident. Pose for photos with the prisoners, have some fun, and do what you need to do, BUT don't put it on the internet. No/no one would have ever heard of that 'session' if they kept it off of the internet.
Someone volunteers to go ahead and start putting all of the deranged and indicative comments in a single online file for easy distribution. Someone else reports that James Spoo is in fact a USAF captain - a fellow whose name has come up before, that time in leaked cables concerning the State Department, to which hes somehow attached, and TEMPEST, a program of countermeasures against the leaking of data. This is noted to be both amusing and relevant to the interests of several Anonymous participants present. Someone else posts another discovery from another thread:
If we had a CinC in the WH with a pair of balls instead of a dipshit, Muslim/Marxist from Kenya we would have turned our troops loose early on to shot, bayonet, behead, bomb, blast with artillery, as many of the SOBs as they could...
and it goes on like that. Everyone in the channel giggles over the hilarious Muslim/Marxist from Kenya thing until another argument breaks out, this time over the ethics of hacking a defense firm. Its been pointed out by now that the leak, unaccompanied by any redaction, could have untold repercussions on who knows how many cases; at least one news outlet is already loudly announcing that the name of a sexual assault victim may be found in the e-mails if one looks for it. Someone else points out in turn that the outlet in question is exactly the sort that would start looking for the names of sexual assault victims rather than the truth about a massacre that lead to the shooting of children who were hiding in cabinets.
The debate's cut short, as many are, by an announcement in the channel: police were about to move on Occupy Austin in an effort to get it shot down. I relay the message to an associate, who has connections in Austin; he calls a friend at a local news affiliate, who tells him he's already sent out a crew to capture the proceedings. I answer a few more e-mails from reporters and get myself another Pepsi. The girlfriend arrives back home and I fill her in on the day's rampages, notify her that I may be in for a busy weekend. I only check in on the IRC a couple
dozen more times that evening.
By the time I wake up on Saturday, another surprise is out. Sabu & Co. never left Puckett & Faraj's servers, even after their presence had been discovered, and no one had thought to check to see if they might still be inside. As such, all of the e-mails sent by everyone on the network right after the hack had been intercepted as well. This hadn't been done before; not only would it be interesting, the contents would potentially be actionable.
The narrative starts the previous morning, when Neal Puckett has presumably learned via an inquiring reporter that his law firm has just been dealt some unknown blow by a mysterious band of computer monsters. He writes a note to the guy who does his security secrity, a fellow named Micah who's associated with the security firm Chief Ingredient:
Micah,
News agencies are reporting that our website was hacked and that the hackers claim our emails and sensitive personal information was taken. Is that possible?
Micah writes back:
Hi Neal,
This was done by someone who clearly knows what they are doing. Anonymous is one of the largest, if not THE largest group of hackers in the world at this time. They've taken down Sony, DoD and many others in recent months... If this truly is anon, it may not be limited to just your site or just this one attack... Anonymous is a little out of my league. Since you are being targeted, I would suggest hiring a specialist for this type of matter. I'd be more than happy to help you select one, but it seems that someone dedicated to ensuring the security on an ongoing basis and can have 100% control over the server and site may be the direction needed at this point.
Micah goes on to suggest that Neal call the FBI. Likely he wasn't yet aware about the taped FBI conference call thing or he would have probably suggested someone else.
Neal forwards Micah's explanation to his partner, Haytham Faraj, who asks, "Why the fuck does Chief Ingredient not know about this before we have to tell them." Or, I guess, he states it.
Micah writes back again to note that there may be some bad news; it looks like the hackers might have gotten access to the firm's e-mail. By this time, the latest round of news reports had already confirmed this.
Neal breaks the news to his family members:
Because we did so well on the case, a group of reckless international hackers stole all of our law firm emails to publish on the internet today. Not sure how this will affect the business of the firm going forward, but for now, we're not able to do any business.
Marcy, another firm employee, alerts her mother:
This may completely destroy the Law Firm.
And then, there's this, from Neal to some fellow named "Al."
Al,
All of the firm's emails were stolen today by "Anonymous" the international hackers. All because we won the Wuterich case. Beware. May want to change your passwords to your email accounts. Any emails between you and me may have been captured and could be released onto a website.
The day's business proceeds. The discussions on the IRC channel are split between further analysis of the Puckett & Faraj e-mails and Syria; a couple of Anonymous operatives who are native to the country have provided some new videos of government forces committing atrocities. These are sent off to the relevant news agencies and otherwise disseminated through Twitter and Facebook. But then someone present in the channel who also helps run another one on another server, the one from which the bulk of Anonymous' Syria work is organized, announces that Assad's office has been hacked.
I log in to the channel in question. The hacker responsible is doing a bit of bragging, which I don't begrudge him; he claims he deleted every file on 12 computers in addition to taking the available e-mails. Those are already starting to circulate in the form of samples, on pastebin as usual, and are taken from the e-mail account of Assad regime's PR woman, Bouthaina Shaaban. Ms. Shaaban turns out to lack a certain saving subtlety. In one of the e-mails posted, someone at the U.S. television network ABC contacts here with the following question:
As Im sure youve seen, there are some comments attributed to you in the Kuwait Times today that I wanted to ask you about. Is this true? Could you expand a little on what it is you have?
Shaaban the Diplomat responds in pitch-perfect dictatorese:
According to Kuwait Times, I regret the unprofessionality and irresopnsibility of some mass media in Gulf region. It is obvious that such news has no relevence to reality and can not be said either by me or by any other Syrian officials. Needless to say that no other mass media has paid attention to such false statements that might pup up every now and then.
The quote, as it turns out, was Shaaban addressing a delegation to Assad, which she allegedly told that the regime possessed sex tapes of several Gulf leaders that had been putting pressure on the regime in the wake of its response to the unrest, adding that those tapes would be released on internet websites if things, like, came to that.
I skip the other e-mails, which are already being analyzed by people with a better idea of what to look for than I; aside from the Syrian Anons, the channel is filled with others from around the world who have specialized in Middle Eastern affairs since at least the previous January, when Anonymous intervened in the Tunisian revolt which would thereafter spread across the region. As for how many of them have been involved in such things beforehand, it's hard to say; to the extent that they become known, Anonymous participants of the especially active sort tend to have colorful, wonkish backgrounds. But there's another sort - people like me - who had nothing but disdain for activism until Anonymous introduced them to it.
Another announcement, made via Twitter, announces the death of a certain Anonymous operative who has just been shot to death by government forces while taping near Tahrir Square. He was the third Anon of whom I'm aware that has died in Egypt thus far. Two of them were Egyptians; another had travelled to the country shortly after the revolt and was killed under similar circumstances, in an attempt to record and document the evil that is inflicted upon other men.
***
Saturday afternoon. A small group of Anons called Cabin Crew have released dozens of e-mail address and passwords for some ridiculously large number of police officers and sheriffs departments in West Virginia. Sometimes this sort of thing simply forces a whole lot of lawmen to change their passwords; on other occasions - and depending largely on the sort of network in which the e-mail accounts sit - someone or another will manage to get into the actual e-mail accounts, thereby whipping up a nice batch of scandal fodder as the results go to the local press. Something of the sort had happened to Texas cops a month previously, bringing revelations of the sort you can probably imagine.
By the time all of this is sent along to the requisite news outlets, someone on reddit notices that the Al to whom Neal Puckett sent a warning about their shared e-mail correspondence is actually Congressman Allen West.
We search the law firms e-mails for Allen West, as well as two private e-mail addresses that are tied to him, and we discover that the Florida representative and Iraq vet assisted Puckett & Faraj in a secret effort to get the military trial shot down altogether:
General Dunford,
greetings Sir and wanted to introduce you to LtCol Neal Puckett (USMC, Ret). Neal was my defense counsel for my case in Iraq back in 2003. He has worked many high profile military cases including the current one with Marine SSgt Wuterich. In the strictest of confidence Neal has asked me to connect the two of you. He wishes to have a meeting with you on this case, he resides in Alexandria. I will step aside so as to not have any potential of influence from my "position".
General Dunford is the second in command of the United States Marine Corp, who agrees to secretly meet with the defense attorney of a Marine being prosecuted for ordering a slaughter of civilians at such time as the case as ongoing, and doing so at the behest of a newly-elected congressman who also acts in secret. Not long thereafter, an associate of the firm named Mark Zaid brings the following good news:
Guys, I spoke privately yesterday with Congressman Duncan Hunter about Wuterich's situation. He is willing to help see about making this whole case go away. He wants me to talk with one of his staffers and I am waiting to hear back from the guy (another Marine). I also met with ColG.I. Wilson USMC (ret) who I know through a client. You may know him. He knows Brahams and about the case. He is also willing to do what he can, including talking with the current Marine Commandant who he knows, about dropping the case
Hunter is a former congressman and 2008 GOP presidential primary candidate.
By the next day, all of this is sent to the press. People are giddy; between this and a few other nuggets in the same vein, the material is beautiful, relevant stuff, certainly more than enough to get the public thinking again about the role of power in the rule of law, and at the very least worthy of prompting some legwork on the part of the press now that the analysis and key points were already out and about and free for the taking.
But nothing really appears in the press about any of it. The Marine captains cheering Abu Ghraib and calling for the desecration of the Islamic enemy with pork; the secret collusion of two congressmen and a high-ranking Marine official with a law firm on one side of a serious criminal proceeding, the other e-mails that were found in which are described various instances of witness intimidation by officers against privates in the context of still other cases; long and mysterious screeds from Puckett and his partner to a Marine official in which it is claimed that the trial must not go forward lest certain things get out - none of it made the press. The reporters had been happy to report on and even repeat the stolen e-mails that provided an entertaining glimpse of a law firm being devastated by futuristic cyber whatevers. The story that Anonymous had disrupted yet another powerful institution was again in the consciousness; the information that was the objective of the operation was largely ignored. The press had gotten their story.
This happens sometimes. And its a fine thing, because it reminds some of us why it is that we decided to live like this in the first place.
On Wed, Feb 29, 2012 at 8:21 PM, Barrett Brown <barriticus@gmail.com<mailto:barriticus@gmail.com>> wrote:
Yep indeed. It's not going to be done till evening, though, but it'll be in to you then.
On Wed, Feb 29, 2012 at 4:48 PM, Daniel Conaway <dconaway@writershouse.com<mailto:dconaway@writershouse.com>> wrote:(212) 696-3825<tel:%28212%29%20696-3825>
Hey, Barrett
So just a reminder: chapter 1 due to Gregg and me tomorrow, March 1.
Chapter 2 due March 3, two days laterbut lets not get ahead of ourselves, shall we?
Thanks,
Dan
Dan Conaway
Literary Agent
Writers House
--
Regards,
Barrett Brown
512-560-2302<tel:512-560-2302>
--
Regards,
Barrett Brown
512-560-2302