A99 Operation Empire State Rebellion: House of Cards

Dear Financial Tyrants,

Your days are numbered.
We have the power.
We are the people.
Expect us.

http://ampedstatus.org/network

See also:

Operation Empire Rebellion Starts: Hackers Deface Chinese Government Site

A99 Operation Empire State Rebellion: World’s Most (In)Famous Hacker Group ‘Anonymous’ Brings Peaceful Revolution To America To End Corrupt Two-Party System And Above All To Break Up Global Banking Cartel (Federal Reserve, IMF, BIS And World Bank)

Operation Empire Rebellion Starts: Hackers Deface Chinese Government Site

Before:

A99 Operation Empire State Rebellion: World’s Most (In)Famous Hacker Group ‘Anonymous’ Brings Peaceful Revolution To America To End Corrupt Two-Party System And Above All To Break Up Global Banking Cartel (Federal Reserve, IMF, BIS And World Bank)


Team Greyhat has just hacked the website of the Jishou Audit Office, a Chinese government property. Following Saturday’s announcement by the Anonymous hacker syndicate of “civil disobedience” until Ben Bernanke steps down, how long before some US government websites are defaced in a comparable way? And just how hackerproof is Fedwire anyway?

Before:

After:

Submitted by Tyler Durden on 03/14/2011 12:45 -0400


Source: ZeroHedge

ZYNGA HACKED: Hacker Transferred 400 Billion (!) Virtual Poker Chips to His Account

What could possibly go wrong?


ZYNGA HACKED, $12 Million Stolen

Update:

Zynga released this statement in response to the breach: “Zynga treats game security with the utmost of seriousness. We want to provide our users with the safest and most enjoyable game experience possible. To that end, we have a world class security team which continues to proactively identify and address security breaches with the highest priority. We will pursue these issues vigorously, which could involve criminal and civil prosecutions.”

Earlier:

Apparently a guy was able to hack into social gaming giant Zynga. He then transferred 400 billion (!) virtual poker chips to his account and proceeded to sell them on the black market. (Yes, apparently, there’s a black market in virtual Zynga Poker chips.) They were worth about $12 million. (Develop)

That’s how they caught the guy, and he has since pled guilty and will probably serve a long sentence in jail (he was on probation from an earlier hacking-related offense).

Read moreZYNGA HACKED: Hacker Transferred 400 Billion (!) Virtual Poker Chips to His Account

Hackers Penetrate Nasdaq Computers

Feb. 05 (Wall Street Journal) — Hackers have repeatedly penetrated the computer network of the company that runs the Nasdaq Stock Market during the past year, and federal investigators are trying to identify the perpetrators and their purpose, according to people familiar with the matter.

The exchange’s trading platform—the part of the system that executes trades—wasn’t compromised, these people said. However, it couldn’t be determined which other parts of Nasdaq’s computer network were accessed.

Investigators are considering a range of possible motives, including unlawful financial gain, theft of trade secrets and a national-security threat designed to damage the exchange.

The Nasdaq situation has set off alarms within the government because of the exchange’s critical role, which officials put right up with power companies and air-traffic-control operations, all part of the nation’s basic infrastructure. Other infrastructure components have been compromised in the past, including a case in which hackers planted potentially disruptive software programs in the U.S. electrical grid, according to current and former national-security officials.

“So far, [the perpetrators] appear to have just been looking around,” said one person involved in the Nasdaq matter. Another person familiar with the case said the incidents were, for a computer network, the equivalent of someone sneaking into a house and walking around but—apparently, so far—not taking or tampering with anything.

Read moreHackers Penetrate Nasdaq Computers

FBI Knocks Down 40 Doors in Probe of Pro-WikiLeaks Attackers

On Wikileaks:

Webster Tarpley: Wikileaks Is The ‘Cognitive Infiltration’ Operation Demanded by Cass Sunstein

Veterans Today: ADL To Attack Journalists And Publications Tying Israel To Wikileaks

Wikileaks: Julian Assange Released From Jail, His Lawyer Is Connected To The Rothschilds

The No.1 Trend Forecaster Gerald Celente: Righteous Rage – Wikileaks BS – Class Warfare Has Begun – Bailout Bubble Bursting – The Great War – This Is Not America, It’s Fascism

Who Is Really Behind Wikileaks?

Wikileaks: A US Government Con Job

Wikileaks: Brought to you by the CIA or Mossad

Wikileaks Founder Julian Assange on 9/11 and Bilderberg:

What about 9/11?

“I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.”

What about the Bilderberg conference?

“That is vaguely conspiratorial, in a networking sense. We have published their meeting notes.”


FBI Knocks Down 40 Doors in Probe of Pro-WikiLeaks Attackers

The FBI has joined in the hunt for those who participated in the retaliation attacks against companies that cut off services to Wikileaks, executing more than 40 search warrants across the United States on Thursday, the bureau announced.

In what seem to be timed raids, British police arrested five men Thursday morning who allegedly participated in the Anonymous group’s denial of service attacks on Visa, Mastercard, Paypal and Amazon in mid-December. Anonymous was seeking to bring attention to — and punish — the financial-service companies’ decisions to prohibit donations to Wikileaks. Amazon was targeted after it kicked Wikileaks off its web-hosting service.

The attacks caused no permanent damage, as they simply temporarily overloaded a website with more traffic than the server could handle. They were, for the most part, really nothing more than the cyber equivalent of a campus sit-in.

But the FBI warned it did not see it that way.

“The FBI also is reminding the public that facilitating or conducting a DDoS attack is illegal, punishable by up to 10 years in prison, as well as exposing participants to significant civil liability,” the FBI said in a press release. The FBI did not announce any arrests in conjunction with the searches.

The attacks were conducted by the loosely organized ‘Anonymous’ group to show displeasure with the financial-service companies that cut off donations to Wikileaks.

Read moreFBI Knocks Down 40 Doors in Probe of Pro-WikiLeaks Attackers

No Secrets! WikiLeaks Founder Julian Assange’s Mission For Total Transparency

wikileaks-founder-julian-assange
Assange, the founder of WikiLeaks, oversees a populist intelligence network. Digitally altered photograph by Phillip Toledano.

The house on Grettisgata Street, in Reykjavik, is a century old, small and white, situated just a few streets from the North Atlantic. The shifting northerly winds can suddenly bring ice and snow to the city, even in springtime, and when they do a certain kind of silence sets in. This was the case on the morning of March 30th, when a tall Australian man named Julian Paul Assange, with gray eyes and a mop of silver-white hair, arrived to rent the place. Assange was dressed in a gray full-body snowsuit, and he had with him a small entourage. “We are journalists,” he told the owner of the house. Eyjafjallajökull had recently begun erupting, and he said, “We’re here to write about the volcano.” After the owner left, Assange quickly closed the drapes, and he made sure that they stayed closed, day and night. The house, as far as he was concerned, would now serve as a war room; people called it the Bunker. Half a dozen computers were set up in a starkly decorated, white-walled living space. Icelandic activists arrived, and they began to work, more or less at Assange’s direction, around the clock. Their focus was Project B-Assange’s code name for a thirty-eight-minute video taken from the cockpit of an Apache military helicopter in Iraq in 2007. The video depicted American soldiers killing at least eighteen people, including two Reuters journalists; it later became the subject of widespread controversy, but at this early stage it was still a closely guarded military secret.

by Raffi Khatchadourian
June 7, 2010

Read the full article here: The New Yorker


Related information:

Read moreNo Secrets! WikiLeaks Founder Julian Assange’s Mission For Total Transparency

US Cyber Command chief: ‘Pentagon systems are ‘probed by unauthorized users approximately 250,000 times an hour, over six million times a day’

See also: NATO Warns of Military Strike Against Cyber Attackers (Times)


US Cyber Command chief warns of ‘remote sabotage’

general-keith-alexander

The top US cyberwarrior said Thursday that Pentagon networks are probed over six million times a day and expressed concern about a rise in “remote sabotage” attacks on computer systems.

General Keith Alexander, head of the newly created US Cyber Command, also said developing a real-time picture of threats to US military networks and the rules to fight back would be among his priorities.

Alexander, who also heads the National Security Agency, the super secret US surveillance agency, said Pentagon systems are “probed by unauthorized users approximately 250,000 times an hour, over six million times a day.”

In his first public remarks since assuming command of Cyber Command two weeks ago, Alexander said the US military “depends on its networks for command and control, communications, intelligence, operations and logistics.”

“We at the Department of Defense have more than seven million machines to protect linked-in 15,000 networks,” he said in a speech to cybersecurity experts and reporters at the Center for Strategic and International Studies.

The role of US Cyber Command is to “deter, detect and defend against emerging threats against our nation in cyberspace,” Alexander said.

“Our nation’s interests are in jeopardy,” he said citing “tremendous vulnerabilities” and threats from a “growing array of foreign actors, terrorists, criminal groups and individual hackers.”

“Cyberspace has become a critical enabler for all elements of national and military power,” Alexander said. “Our data must be protected.”

Read moreUS Cyber Command chief: ‘Pentagon systems are ‘probed by unauthorized users approximately 250,000 times an hour, over six million times a day’

Hackers target freshly-uncovered Internet Explorer hole

internet-explorer

Microsoft on Tuesday warned that hackers are targeting a freshly-uncovered weakness in some earlier versions of its Internet Explorer (IE) Web browser software.

Microsoft said it is investigating a hole that cyber attackers are taking advantage of in IE 6 and IE 7.

“At this time, we are aware of targeted attacks attempting to use this vulnerability,” Microsoft said in an advisory posted along with a routine release of patches for Windows and Office software.

“We will continue to monitor the threat environment and update this advisory if this situation changes.”

Hackers could use the flaw to remotely seize control of computers. The new IE 8 Web browser and an old IE 5 version are not affected, according to the US software colossus.

Read moreHackers target freshly-uncovered Internet Explorer hole

Climategate: George Monbiot – aka the Great Moonbat – makes it all suddenly OK through medium of satire

First the good news. George Monbiot – aka the Great Moonbat – has issued a personal apology for the shabby behaviour of his climate-fear-promoting scientist chums in the Climategate scandal.

It’s no use pretending that this isn’t a major blow. The emails extracted by a hacker from the climatic research unit at the University of East Anglia could scarcely be more damaging(1). I am now convinced that they are genuine, and I’m dismayed and deeply shaken by them.

Yes, the messages were obtained illegally. Yes, all of us say things in emails that would be excruciating if made public. Yes, some of the comments have been taken out of context. But there are some messages that require no spin to make them look bad. There appears to be evidence here of attempts to prevent scientific data from being released(2,3), and even to destroy material that was subject to a freedom of information request(4).

Now the not-so-good-news. He’s trying to limit the damage by pinning the blame on one (admittedly very deserving, but there are others, Lord knows there are others) man.

Worse still, some of the emails suggest efforts to prevent the publication of work by climate sceptics(5,6), or to keep it out of a report by the Intergovernmental Panel on Climate Change(7). I believe that the head of the unit, Phil Jones, should now resign. Some of the data discussed in the emails should be re-analysed.

Now for the bit where it gets unpleasant. So seriously unpleasant that I’m not sure I should be posting such things in a family newspaper. You ready? I’m warning you, it’s not pretty. The Moonbat makes a brave but not – I fear – wholly successful foray into the unfamiliar terrain of humour and satire. Here goes:

Read moreClimategate: George Monbiot – aka the Great Moonbat – makes it all suddenly OK through medium of satire

Climategate on Lateline: Private climate documents hacked, published

Some of the world’s leading climate scientists have been embarrassed by the publication of hundreds of private emails and research documents, which were stolen by computer hackers from a British university.

Climate change skeptics have hailed the material as proof that research data has been skewed and suppressed.

Added: 23. November 2009

Related information:

Climategate:

Climategate Bombshell: Dr. Tim Ball on the hacked CRU emails

Climategate: The Day Science Died (TBR)

Climategate: how the MSM reported the greatest scandal in modern science (Telegraph)

Climategate: CRU director admits the emails flying all over the internet appear to be genuine (Herald Sun)

Climategate: The Final Nail in The Coffin of ‘Anthropogenic Global Warming’?! (Telegraph)

Read moreClimategate on Lateline: Private climate documents hacked, published

Climategate Bombshell: Dr. Tim Ball on the hacked CRU emails

Retired climatologist Dr. Tim Ball joins us to discuss the significance of the recently leaked emails and documents from the Climate Research Unit at East Anglia University which expose deceit, duplicity and collusion between climate researchers to maintain the fraud of the manmade global warming theory.

These emails reveal stunning behind-the-scenes details about how this fraud has been developed and perpetuated, and Dr. Ball shares his insights on what they show.


Added:

Related information:

Climategate:

Climategate: The Day Science Died (TBR)

Climategate: how the MSM reported the greatest scandal in modern science (Telegraph)

Climategate: CRU director admits the emails flying all over the internet appear to be genuine (Herald Sun)

Climategate: The Final Nail in The Coffin of ‘Anthropogenic Global Warming’?! (Telegraph)

Read moreClimategate Bombshell: Dr. Tim Ball on the hacked CRU emails

Climategate: The Day Science Died

As the fallout from CRUHACK grows, the biggest story is not actually whether data was manipulated in individual cases, although in my view that’s bad. And it’s not that global warming scientists were so arrogant in 2004 as to mock the death of an opponent, although that too is bad.

It’s not that some of these scientists were sitting on taxpayer-sourced slush funds worth tens of millions of dollars each, for an industry total of somewhere close to US$100 billion, whilst their supporters raised merry-hell about Exxon sponsoring skeptic research to the tune of a few million, although this too is massively hypocritical.

It’s not that the scientists show signs of being political activists, and even helping promote a global governance agenda.

No, in my view the biggest scandal to erupt from CRUHACK is the death of peer-reviewed climate science.

We now all know – the entire industrialized world – that while global warming scientists and their supporters were publicly ridiculing skeptic’s arguments as “not peer reviewed” because – by implication – the arguments were not good enough, that in fact some of the top scientific advisors to the UN IPCC were conspiring (and that is the right word) to sabotage any attempt by other scientists to publish peer reviewed papers challenging global warming.

We now know the UN IPPC/Global Governance lobby had sufficient political clout to intimidate scientific journals into submission and to run roughshod over the integrity of the peer review process.

Read moreClimategate: The Day Science Died

Climategate: CRU director admits the emails flying all over the internet appear to be genuine

8.15 PM UPDATE: The Hadley University of East Anglia CRU director admits the emails seem to be genuine:

The director of Britain’s leading Climate Research Unit, Phil Jones, has told Investigate magazine’s TGIF Edition tonight …”It was a hacker. We were aware of this about three or four days ago that someone had hacked into our system and taken and copied loads of data files and emails.”…

TGIF asked Jones about the controversial email discussing “hiding the decline”, and Jones explained what he was trying to say….

So the 1079 emails and 72 documents seem indeed evidence of a scandal involving most of the most prominent scientists pushing the man-made warming theory – a scandal that is one of the greatest in modern science. I’ve been adding some of the most astonishing in updates below – emails suggesting conspiracy, collusion in exaggerating warming data, possibly illegal destruction of embarrassing information, organised resistance to disclosure, manipulation of data, private admissions of flaws in their public claims and much more. If it is as it now seems, never again will “peer review” be used to shout down sceptics.

This is clearly not the work of some hacker, but of an insider who’s now blown the whistle.

Not surprising, then, that Steve McIntyre reports:

Earlier today, CRU cancelled all existing passwords. Actions speaking loudly.

But back to the original post – and the most astonishing of the emails so far…

Friday, November 20, 2009

Full article here: Herald Sun

Read moreClimategate: CRU director admits the emails flying all over the internet appear to be genuine

Climategate: The Final Nail in The Coffin of ‘Anthropogenic Global Warming’?!

Related information:
Study: CO2 levels remained constant since 1850! (University of Bristol)

Update:

Climategate: The Day Science Died (TBR)

Climategate: CRU director admits the emails flying all over the internet appear to be genuine (Herald Sun)


gore_fire

If you own any shares in alternative energy companies I should start dumping them NOW. The conspiracy behind the Anthropogenic Global Warming myth (aka AGW; aka ManBearPig) has been suddenly, brutally and quite deliciously exposed after a hacker broke into the computers at the University of East Anglia’s Climate Research Unit (aka Hadley CRU) and released 61 megabites of confidential files onto the internet. (Hat tip: Watts Up With That)

When you read some of those files – including 1079 emails and 72 documents – you realise just why the boffins at Hadley CRU might have preferred to keep them confidential. As Andrew Bolt puts it, this scandal could well be “the greatest in modern science”. These alleged emails – supposedly exchanged by some of the most prominent scientists pushing AGW theory – suggest:

Conspiracy, collusion in exaggerating warming data, possibly illegal destruction of embarrassing information, organised resistance to disclosure, manipulation of data, private admissions of flaws in their public claims and much more.

One of the alleged emails has a gentle gloat over the death in 2004 of John L Daly (one of the first climate change sceptics, founder of the Still Waiting For Greenhouse site), commenting:

“In an odd way this is cheering news.”

But perhaps the most damaging revelations  – the scientific equivalent of the Telegraph’s MPs’ expenses scandal – are those concerning the way Warmist scientists may variously have manipulated or suppressed evidence in order to support their cause.

Here are a few tasters. (So far, we can only refer to them as alleged emails because – though Hadley CRU’s director Phil Jones has confirmed the break-in to Ian Wishart at the Briefing Room – he has yet to fess up to any specific contents.) But if genuine, they suggest dubious practices such as:

Read moreClimategate: The Final Nail in The Coffin of ‘Anthropogenic Global Warming’?!

Hacker (Ex-US Secret Service) charged with biggest ever US credit card fraud

credit-cards

A hacker who had once worked with the US secret service has been charged with the biggest credit card identity theft ever recorded in the US.

Albert Gonzales, 28, of Miami, and his accomplices, allegedly stole at least 130 million accounts from big retail companies.

Gonzales is accused of working with two unidentified Russian conspirators to hack into the databases of retail chains, and then selling the information around the world.

Read moreHacker (Ex-US Secret Service) charged with biggest ever US credit card fraud

Cyber-spies breach US fighter-jet program: report


F-35 Joint Strike Fighter Lightning II

WASHINGTON (AFP) — Computer spies have hacked into the Pentagon’s costly program for a new fighter jet, a US newspaper reported Tuesday, but the Defense Department said sensitive technology for the Joint Strike Fighter aircraft had not been compromised.

Citing current and former government officials, The Wall Street Journal said cyber-intruders were able to copy vast amounts of data on the 300-billion-dollar Joint Strike Fighter project, also known as the F-35 Lightning II.

Related articles:
Computer Spies Breach Fighter-Jet Project (Wall Street Journal)
China denies it hacked into US jet program
(AP)
Pentagon denies jet program hacked (Brisbane Times)

The newspaper cited unnamed former US officials saying the attack appeared to have originated in China, which the Pentagon says has put a priority on bolstering its cyber-warfare capability.

Asked if sensitive technology for the Joint Strike Fighter had been jeopardized, Pentagon spokesman Bryan Whitman said: “I’m not aware of any specific concerns.”

Whitman declined to confirm the breach of security for the F-35 but said the number of attempted attacks on the US military’s computer network were on the rise.

Read moreCyber-spies breach US fighter-jet program: report

China accused over global computer spy ring

• Dalai Lama and foreign ministries bugged
• Cambridge researchers point finger at Beijing

An enormous electronic espionage programme run from servers in China has been used to spy on computers in more than 100 countries, according to two reports published at the weekend.

The reports, published by the universities of Cambridge and Toronto, detail a “murky realm” where cyber spooks infiltrate email, take over humble desktop computers and use them to spy on organisations, individuals and governments.

The reports name the system GhostNet, and claim that it has been used to attack governments in south and south-east Asia as well as the offices of the Dalai Lama. In two years, the reports suggest, the operation infiltrated 1,295 computers in 103 countries.

Read moreChina accused over global computer spy ring

Hackers claim there’s a black hole in the atom smashers’ computer network


From
September 13, 2008

Hackers have broken into one of the computer networks of the Large Hadron Collider (LHC).

A group calling itself the Greek Security Team left a rogue webpage describing the technicians responsible for computer security at the giant atom smasher as “schoolkids” – but reassuring scientists that they did not want to disrupt the experiment.

The hackers gained access to a website open to other scientists on Wednesday as the LHC passed its first test, sending its protons off on their dizzying journey through time and space, close to the speed of light.

Read moreHackers claim there’s a black hole in the atom smashers’ computer network