Click here to close now.

Welcome!

Web 2.0 Authors: Elizabeth White, Ian Khan, Carmen Gonzalez, Aria Blog, Plutora Blog

Related Topics: Security, Open Web, Cloud Expo

Security: Article

Wiki War Breaks Out

Vigilantes acting in support of Assange's rogue site started unleashing a torrent of punishing denial of service attacks

Even before WikiLeaks mastermind Julian Assange got hauled off to Wandsworth Prison in southwest London Tuesday, vigilantes acting in support of his rogue site started unleashing a torrent of punishing denial of service attacks on the financial institutions that turned the spigot off on the donations WikiLeaks needs to survive and pay Assange's legal bills.

That includes PayPal, MasterCard, Visa and the Swiss Post bank.

Amazon.com, which booted WikiLeaks off its cloud last week, was threatened again Thursday but reportedly the new avenging angel lacked the "forces" given Amazon's EC2-style elasticity. The ruffians pushed on to PayPal. Twitter is also a possible target for not allowing WikiLeaks discussions to "trend" to the top of the heap.

The attacks, which WikiLeaks refused neither to "condemn nor applaud" and which the US government is now investigating, brought down the web sites of Visa, MasterCard and the Swiss Post bank PostFinance.

Authorities apparently don't believe WikiLeaks and its leader aren't responsible for the attack and moved Assange to a segregated part of the prison where there is limited computer access, according to the Guardian Thursday.

PostFinance, which has so far suffered the most, was first hit on Monday and was down most of Tuesday preventing depositors from doing online banking; mastercard.com was still impossible to reach Wednesday but its core business was reportedly unaffected. Ditto Visa whose web site crashed Wednesday.

The attacks, however, have continued with reports of interference with MasterCard payment operations and from our own in-house experience with Visa Thursday that appeared to be true.

PayPal, which pulled WikiLeaks' account last Friday, has reportedly been hit too but seemed to bear up aside from some difficulties with its blog and Thursday with its web site.

The web site of the Swedish prosecutor's office, which is pressing the sex crimes case against Assange, was down Tuesday into Wednesday and then the web site and e-mail system of the law firm for the two Swedish women who brought the complaint were attacked.

So too Sarah Palin's web site and US Senator Joe Lieberman's, both outspoken WikiLeaks critics. At press time, the US Senate web site was a target.

Oddly enough the web site of the hysterically liberal Democratic senator from California Dianne Feinstein, who chairs the Senate Intelligence Committee and suddenly finds herself in Lieberman's company, is so far untouched. Guess the mob doesn't have a subscription to the Wall Street Journal where she wrote an op-ed saying Assange should be hauled into court for violating the Espionage Act of 1917.

Dubbed Operation Payback, the revenge attacks are the work of an army of maybe 1,500-but-swelling self-styled "hacktivists" associated with the so-called Anonymous hacker coalition that has previously attacked the Church of Scientology and RIAA for its anti-piracy moves.

When Operation Payback first started, these modern-day Vikings said, "While we don't have much of an affiliation with WikiLeaks, we fight for the same reasons. We want transparency and counter censorship."

After the marauders downed the Visa and MasterCard web sites Wednesday, Facebook killed an Operation Payback page where it appeared the vandals have been congregating, congratulating each other and getting their marching orders.

Facebook said the page was removed "for violating our Terms of Use," which outlaw hate speech, threats of violence and bullying.

It appears it was an idle gesture since they just regrouped elsewhere on Facebook.

Twitter, where the timing of some of the attacks has been posted, tried to do the same thing after a file appeared that seemed to contain credit card information. MasterCard said it was bogus.

In retaliation Anonymous has been hit and WikiLeaks itself has been under sporadic DDoS attacks since it started releasing stolen US embassy cables.

After WikiLeaks got kicked off Amazon's cloud last week and lost its wikileaks.org domain to DDoS attacks on EveryDNS.net, WikiLeaks borrowed a Swiss web address belonging to the Swiss Pirate Party and reportedly now has DNS servers in 14 countries and a thousand mirror sites.

It also took out an "insurance" policy.

Before turning himself in, Assange claimed he sent a practically biblical army of 100,000 fellow travelers a stockpile of secret national and commercial information that he threatened would be decrypted and released if something happened to him. His lawyers called it a "thermonuclear device."

On Tuesday WikiLeaks said it wouldn't send out the decryption code just yet. A spokesman told the AP it will only be used if "grave matters" take place involving WikiLeaks staff. What that means is unclear.

Indicative of what the file might contain WikiLeaks, in a shot across the establishment's bow Monday, released a list of critical foreign infrastructure assets such as pipelines, mines, trans-Atlantic cables, food sources and pharmaceutical supplies that are important to the security of the United States not to mention its allies. The list is a terrorist's dream.

The AP said British Foreign Secretary William Hague condemned the disclosure, telling the BBC it was a "reprehensible" act committed "without regard to wider concerns of security, the security of millions of people."

The wire service said it decided against publishing the list "due to the sensitive nature of the information." The BBC linked to the list on WikiLeaks and the AP wants to know why. It said the BBC didn't respond.

The list was part of the huge cache of 252,000 stolen diplomatic cables and State Department documents that WikiLeaks started releasing last week to the detriment of international relations. Nothing so far comes close to the dictionary definition of whistle-blowing, just voyeurism and general mayhem.

The Telegraph speculates that the financial giants are acting in lockstep because Assange made the "fatal mistake" of threatening to bring down a major US bank with New Year's revelations supposedly akin to Enron. Fingers pointed at Bank of America.

The paper figures such a thing cuts a little too close to home for all of them especially in the middle of a recession.

WikiLeaks still has a post office box in Australia and bank accounts in Germany and Iceland to accept donations.

Wading into the fray Tuesday, possibly to heighten its non-existent profile, a Philadelphia start-up financial processing service called Xipwire (say Zipwire) has offered to handle WikiLeaks donations via debit and credit cards over cell phones.

It said on its site, "While people may or may not agree with WikiLeaks, we at Xipwire believe that anyone who wishes to support the organization through a donation should be able to do so." It said it is "waiving all fees so that 100 percent of the donations collected will be directly passed on to WikiLeaks." The AP says it holding the money in an escrow account since it hasn't been able to make contact with WikiLeaks.

Of course, if WikiLeaks is declared a terrorist organization, as the incoming chairman of the House Homeland Security Committee wants, US banks would be prohibited from processing payments and it would be a felony to provide the group with "material support or resources."

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will discuss how to cut costs, scale easily, and unleash insight with CommVault Simpana software, the only si...
Analytics is the foundation of smart data and now, with the ability to run Hadoop directly on smart storage systems like Cloudian HyperStore, enterprises will gain huge business advantages in terms of scalability, efficiency and cost savings as they move closer to realizing the potential of the Internet of Things. In his session at 16th Cloud Expo, Paul Turner, technology evangelist and CMO at Cloudian, Inc., will discuss the revolutionary notion that the storage world is transitioning from mere Big Data to smart data. He will argue that today’s hybrid cloud storage solutions, with commodity...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will focus on how to set up a cloud data governance program and s...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been involved at the beginning of four IT industries: EDA, Open Systems, Computer Security and now SOA.
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to-market strategies, pricing and packaging and technology innovation. The company also announced that it had realigned its structure to create business units to more directly match how customers evaluate, deploy, operate, and purchase technology.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...