<meta http-equiv="content-type" content="text/html; charset=utf-8"><span class="Apple-style-span" style="color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; line-height: 16px; "><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<meta http-equiv="content-type" content="text/html; charset=utf-8">note : an older post / related topic , mentioning the HBGary case, which was already documented , march 4 2011 by Michel via Jodi, on</p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<meta http-equiv="content-type" content="text/html; charset=utf-8"><a href="http://p2pfoundation.net/Persona_Management">http://p2pfoundation.net/Persona_Management</a></p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<span class="Apple-style-span" style="font-size: 13px; line-height: 19px; color: rgb(0, 0, 0); font-family: sans-serif; -webkit-text-decorations-in-effect: none; "><i>&quot;According to an embedded MS Word document found in one of the HBGary emails, it involves creating an army of sockpuppets, with sophisticated &quot;persona management&quot; software that allows a small team of only a few people to appear to be many, while keeping the personas from accidentally cross-contaminating each other. Then, to top it off, the team can actually automate some functions so one persona can appear to be an entire Brooks Brothers riot online.&quot;</i></span></p>
<p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<span class="Apple-style-span" style="font-size: 13px; line-height: 19px; color: rgb(0, 0, 0); font-family: sans-serif; -webkit-text-decorations-in-effect: none; "><i><meta http-equiv="content-type" content="text/html; charset=utf-8"><a href="http://jdeanicite.typepad.com/i_cite/2011/03/daily-kos-updated-the-hb-gary-email-that-should-concern-us-all.html">http://jdeanicite.typepad.com/i_cite/2011/03/daily-kos-updated-the-hb-gary-email-that-should-concern-us-all.html</a></i></span></p>
<p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<span class="Apple-style-span" style="font-size: 13px; line-height: 19px; color: rgb(0, 0, 0); font-family: sans-serif; -webkit-text-decorations-in-effect: none; ">--------------</span></p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; line-height: normal; ">
<span class="Apple-style-span" style="line-height: 19px; color: rgb(0, 0, 0); font-family: sans-serif; "><meta http-equiv="content-type" content="text/html; charset=utf-8"></span><span class="Apple-style-span" style="line-height: 19px; color: rgb(0, 0, 0); font-family: sans-serif; "><a href="http://www.readwriteweb.com/archives/anonymous_hacks_security_company_hbgary_dumps_5000.php">http://www.readwriteweb.com/archives/anonymous_hacks_security_company_hbgary_dumps_5000.php</a></span></p>
<p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; line-height: normal; ">
<meta http-equiv="content-type" content="text/html; charset=utf-8"><a href="http://www.wired.com/threatlevel/2011/02/anonymous-hacks-hbgary/">http://www.wired.com/threatlevel/2011/02/anonymous-hacks-hbgary/</a></p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<a href="http://nakedsecurity.sophos.com/2011/02/07/hbgary-federal-hacked-and-exposed-by-anonymous/">http://nakedsecurity.sophos.com/2011/02/07/hbgary-federal-hacked-and-exposed-by-anonymous/</a></p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
<a href="http://nakedsecurity.sophos.com/2011/02/07/hbgary-federal-hacked-and-exposed-by-anonymous/"></a>Anonymous unleashed their anger at a security firm who had been investigating their membership.</p><p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
HBGary Federal had been working on unmasking their identities in cooperation with an FBI investigation into the�<a href="http://nakedsecurity.sophos.com/2010/12/09/mastercard-visa-paypal-and-4chan-the-furor-of-wikileaks-unleashed/" title="MasterCard, Visa, Paypal and 4chan - The furor of WikiLeaks unleashed" style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(37, 113, 194); text-decoration: none; background-position: initial initial; background-repeat: initial initial; ">attacks against companies</a>�who were cutting off WikiLeaks access and financing.</p>
<p style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; ">
Unlike the DDoS attacks for which Anonymous has made headlines in recent months, this incident involved true hacking skills. Anonymous compromised the HBGary website and�<a href="http://img838.imageshack.us/img838/2294/internetsanon.jpg" rel="nofollow" title="Anonymous message regarding HBGary hack" style="background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; vertical-align: baseline; color: rgb(37, 113, 194); text-decoration: none; background-position: initial initial; background-repeat: initial initial; ">replaced it with an image</a>�explaining their motivation. In addition to the defacement, they downloaded over 60,000 emails from the company and posted them on The Pirate Bay.</p>
</span><div><br></div><div>----------</div><div><br></div><i>Thanks to Xavier for informing me</i><div><br><div class="gmail_quote">On Fri, Mar 18, 2011 at 11:15 AM, Dante-Gabryell Monson <span dir="ltr">&lt;<a href="mailto:dante.monson@gmail.com">dante.monson@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;"><span style="font-size:14px;line-height:18px;border-collapse:collapse;color:rgb(51, 51, 51);font-family:arial, sans-serif"><p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

<a href="http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks" target="_blank">http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks</a></p>
<p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

excerpts :</p><p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

<i>&quot; The�<a href="http://www.guardian.co.uk/world/us-military" title="More from guardian.co.uk on US military" style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;border-collapse:collapse;color:rgb(0, 86, 137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">US military</a>�is developing software that will let it secretly manipulate social media sites such as Facebook and Twitter by using fake online personas to influence internet conversations and spread pro-American propaganda. &quot;</i></p>

<p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

<i>&quot;�Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. &quot;</i></p>

<p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

<i>&quot;�The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon ... &quot;</i></p><p style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:13px;margin-left:0px;border-collapse:collapse;font-family:arial, sans-serif;background-repeat:no-repeat no-repeat">

<i>&quot;�OEV was discussed last year at a�<a href="http://www.crows.org/the-io-institute/infowarcon-2010-agenda.html" title="" style="padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;border-collapse:collapse;color:rgb(0, 86, 137);text-decoration:none;background-repeat:no-repeat no-repeat" target="_blank">gathering of electronic warfare specialists in Washington DC</a>�&quot;</i></p>

</span>
</blockquote></div><br></div>