Archive
Can Comment Crew, Anonymous and Luzsec endarger Capitalism?
Posted on February 20, 2013 by Akashma Online News
The New York Times released yesterday a special report on ‘Comment Crew’, a group of hackers from China. The U.S. government knew about them since 2005. But Obama Administration is keeping its mouth shut regarding ‘Comment Crew’. According to The New York Times, Comment Crew was tracked down to a white tall building in Shanghai, China.
On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.
The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower. The New York Times
Hackivists around the world as they are widely known, are a group of hackers that serve social interest for the general public. The corporate world, and the governments see them as cyber criminals, crimes that can landed them in jail for 100 years if the governments wanted to, or 5 years or less if they take a plea. There had been all types of arrests on the hacker community, but there are many types of hackers and common criminals as well.
David Thomas known as El Mariachi was a common criminal and not a hackivist. His activities and crimes can not even be considered to be the work of a hacker, this type of crime does not involve hacking into computers. They have a gang working together, people that work in banks, or in places where there is a database to be extracted, but not by means of hacking. See Hakcers Wars

Attorney General Eric Holder promises the Justice Department will play a “pivotal role” in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.
(Credit: White House)
Madiant Security Firm reports(SPT&SPT1) speak of serious threat coming from China, “they have the evidence”, Madiant said. Why then the U.S. government insist on looking the other way. In the latest White House public release, Obama Administrations blames Wikileaks, Anonymous, and Luzsec as a threat to the U.S. and its American corporations.
White House warns of dangers posed by WikiLeaks, LulzSec, other ‘hacktivists’
New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct “economic espionage against U.S. companies. Attorney General Eric Holder at press conference, February 20
The recent published 74 pages report of Mandiant security firm amount of information is impressive, they give an scope of the type of activities ‘Comment Crew’ is interested in: APT1 Exposing One of China’s Cyber Espionage Units. (APT-Advanced Persistent Threat) Mandiant_APT1_Report
On 2004 Mandiant started tracking the groups APT, that according to this security firm amount to 20 or so of these groups. In 2010 Mandiant published the first report on these Chinese groups, APT Report.
“The Chinese government may authorize this activity, but there’s no way to determine the extent of its involvement. Now, three years later, we have the evidence required to change our assessment” .Mandian said
This issues needs to be taken very seriously and not just like another paper published. There are serious consequences and ramifications to this report.
There is no news that all the governments have an army of cyber warriors, but the interesting point on this report is the deep of the insertion of ‘Comment Crew’ into the U.S. government databases. Remember this group is in China, where more of the illegal cyber activity occurs apart from Indonesia where there are more than 65,000 known hackers.
The war on words started last year when U.S. Rep. Mike Rogers accused China of cyber espionage. There are serious consequences when you speaking publicly acting as a representative of the U.S. government. Specially is your adversary is China, known to buy U.S. debt and owning trillions of dollars of it.
China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy. Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage to put an end to this scourge. — U.S. Rep. Mike Rogers, October, 2011
Chinese Defense Minister on January, 2013 responded to such charges, saying that it is unprofessional and groundless to accused the Chinese Military of launching cyber attacks without conclusive evidence.
Why will China want to steal American Corporate secrets? Isn’t the U.S. government sent our corporations and its secrets to China a decade ago? The American Corporations become greedy and exchanged security for cheaper operational costs. They moved to China.
Made in China
100 % of Microsoft Hardware – Read the Microsoft Hardware – The China Connection
SMT and DIP PCB Assembly, Mother Boards and circuits.
Modems, speakers, microphones, cameras, video cameras
PCB Assembling Network Board
Networking PCBA
CISCO and Linksys Routers, Modems, Network adapters Where Linksys products are make?
When we think communication, we think Internet. Most of our communication gadgets come from China. How hard will be to install mini dropping devices inside every product that China produce?.

Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry. Sam Palmisano before a sign “What makes us special? IBM China” magnifying-glass Sunil Mittal being recognised by Samuel J. Palmisano and President APJ Abdul Kalam India President APJ Abdul Kalam, Samuel J. Palmisano and IBMers lighting the lamp magnifying-glass Samuel J. Palmisano shaking hands with IBMers magnifying-glass
2006-2010: Remaking IBM into a globally integrated enterprise
IBM was clear on its strategy; making it a reality took a lot of work. The transformation took place in phases that often overlapped. From 2006 to 2008, IBM expanded its presence in Asia, Latin America and Eastern Europe, and today nearly half of its employees are in emerging markets. The company set up a network of global delivery centers in India, China, Brazil and other countries. By standardizing processes and outputs across its large, diverse client base, IBM could deliver quality services to its IT and business process outsourcing clients consistently, with the right skills, in the right place—wherever that would be. Projects could be staffed more quickly, delivering greater value to clients sooner.
Sharing resources
The model of shared services caught on. Global procurement was centralized in China.
Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry.
Dell will consider transferring its factories to central and western China if wages in coastal areas continue to rise. However, the company supports higher wages for workers in coastal areas, said Amit Midha, the president of Dell in Greater China and South Asia, on June 21, 2010
Several electronic manufacturers including Foxconn have previously decided to move factories to inland regions. In 2009, Taiwan Hon Hai Group, the parent company of Foxconn, established a joint venture for producing laptop computers with Hewlett-Packard in Chongqing.
Taiwan Quanta Computer, another major laptop contract manufacturer, also established factories in Chongqing in early 2010.
Cyber espionage and cyber warfare has everything to do with China, theoretically speaking. If People Liberation Army controls every aspect of the life in China, including people jobs, habitat, and food. Chances are, that China government is taking advantage of the greed of American Corporations. Pay back time for the years of abusing the people of China. The government of China allowed for a whole decade to use their people as slaves workers for American companies.
While this phenomenon of jobs transfer was going to China, American Corporate world was enjoying a steady raise in their profits, and China as Imperial power, become stronger, controlling the price of the dollar, monopoly of products made in China, buying American debt, accelerated production of weapons of all calipers and strategically straightening its power in the world.
For China the ‘One Child Policy” paid off. On the backs of their citizens the Chinese Imperial Power Become a World Power.
Read on this issue Negligence at home while giving away our power in the name of greed and slavery: The mentality that everything could be made in China grew to a devastating proportions for United States.
We the United States of North America sent our manufacturers to China, even some of the Military gadgets were to be made in China, critical technology for the Defense Department was even ‘Made In China’.
Report links China’s army to cyber attacks
Published on February 19, 2013 by Akashma Online News
By David E. Sanger
The New York Times
On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.=
The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower.
A 60-page study to be released by the U.S. security firm Mandiant tracks for the first time individual members of the most sophisticated of the hacking groups-known to many of its victims as “Comment Crew” or “Shanghai Group” – to the doorsteps of the military unit’s headquarters.-
Exposing Issue
The computer security firm Mandiant provided an advance copy of its report, saying hoped to “bring visibility to the issues addressed.” New York Times reporters then tested the conclusion with others experts inside and outside government. (Mandiant was hired by The New York Times Co. to investigate a Chinese-origin attack on its news operations, but concluded it was not the work of Comment Crew, but another group. The firm is not currently working for The Times.)
“Either they are coming from inside Unit 61398,” said Kevin Mandia, the founder and chief executive of Mandiant, in an interview last week, “or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about of thousands of people generating attacks from this neighborhood.”
Other firms that have tracked “Comment Crew” say they also believe the group is state-sponsored, and a recent classified National Intelligence Estimate, issue as a consensus document for all 16 U.S. Intelligence agencies, makes a strong case that many of these groups are either run by army officers or are contractors working for commands like Unite 61398.
While Comment Crew has drained terabytes of data from companies like Coca-Cola, increasingly its focus is on companies involved in physical and virtual infrastructure electrical power grids, gas lines, waterworks and government and corporate databases. According to the security researchers, one target was a company with remote access to more than 60 percent of oil and gas pipelines in North America.
Contacted Monday, Chinese officials in Washington said their government does not engage in computer hacking, and that such activity is illegal. They described China itself as victim of hacking, and note that other are many hacking groups in the United States. But in recent years the Chinese attacks have grown significantly, security researchers say. Mandiant has detected more than 140 Comment Crew intrusions since 2006.
“Right now there is no incentive for the Chinese to stop doing this,” Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, said in an interview. “If we don’t create a high price, it’s only going to keep accelerating.”
The White House said it was “aware” of the report, and Tommy Vietor, the spokesman for the National Security Council, said, “We have repeatedly raised our concerns..with senior Chinese officials, including in the military, and we will continue to do so.”
Under a directive signed by President Barack Obama last week, the government plans to share with American Internet providers-starting today-information it has gathered about the unique digital signature of the largest of the hacking groups, including Comment Crew and other emanating from near where Unit 61398
is based.
While the warnings will not explicitly link those groups or their giant computer servers to the Chinese army, U.S. officials say they are planning to tel China’s new leaders in coming weeks that the volume and sophistication of the attacks have become so intense that they threaten the relation between Washington and Beijing.
The U.S. government also has cyber warriors. But officials insist they operate under strict, if classified, rules that bar using offensive weapons for nonmilitary purposes or stealing corporate data.
–
The Hackers wars
Posted on February 04, 2013 by Akashma Online News
by Marivel Guzman
Young bright computer geeks and social activists, at war with the establishment of governmental control and corporate greed.
Hacktivists against Government’s hackers-snitch-ex-anons or simply Fedhackers

What it is the maximum penalty for internet hacking? 1,5,10,35, or life in prison? All depend actually. If you are individual of interest for the district attorney’s office, you can be offer a deal, a deal you can not refuse.
If Aaron Swartz, our young privacy advocate, political and social activist was alive today, he probably can tell you about his 6 months in jail deal. Well, not that he accepted, so he was facing 35 years in jail, all because he did not want to play the district attorney’s sinister deal. This cost him his life.
What about the other “cyber breakers”? They all being offered a deal. One by one saw its day at the district attorney’s office. What do they do? All acted according to their conscience and sense of justice.
The district attorney’s office managed to brake few of them. Some of them “went to work” for the DA, some refused, but the simple truth is that now they are divided, scared and scattered.
Simple as this. The divide and conquer start showing inside the anon community. The paranoia is running wild. By now the Anons do not know who is snitch, who is being followed, and who is real anonymous. Once you see an anon’s name in the news, you are considered to be exposed.
The anons are doxing each other, they are snitching. And more scary for the anons, is that the Feds are hiring some of them and using them to infiltrate the ranks of the hackivist community. Who is wining this cyber war? Just in Indonesia, there is an estimate that
In some other instances the feds are blackmailing the anons already detained,they are being forced to work as snitches, in exchange to drop some of the charges.
By now, you should know how the district attorney’s office of crooks and escalators works. Once they arrest one anon, they will be offered two deals; One, to be an informant, a snitch in other words, if that is not accepted, they will probably be offer a deal, if that is refused also, the DA will play with the life of the defendants, using the unconstitutional trick called, plea bargain or blackmail. The DA assure with deals an 80 % of the cases a wining verdict. For them plea bargain or cases won sqare and fair in the court room is the same. They use this convictions to move up in the ladder of the office of the district attorney.
The less they care is justice being served. We can not help, but to remember Aaron Shwartz, the latest of its victims. Using the scare tactic, bringing outrageous charges, unheard charges on the book. Its call plea bargain. Aaron was offer 6 months in jail to plea guilty, off course innocent as he was he refused the Plea, Ortiz got mad and charged him with 9 counts of bogus charges that carried all together 35 years in jail.
Pleas Bargaining has come to dominate the administration of justice in America.
According to one legal scholar, “Every two seconds during a typical workday, a criminal case is disposed of in an American courtroom by way of a guilty plea or nolo contender plea. Even though plea bargaining pervade the justice system. He argue that the practice should be abolished because it is unconstitutional.
Government should not retaliate against individuals who exercise their right to trial by jury.
Plea Bargain it is one of the dirtiest tactics used by the government to coerce individuals into agreeing to plea guilty charges that they did not commit in exchange for waving their constitutional rights of a court trial.
Paul Lewis Hayes, serving life sentencing for writing a check of $ 88.30 and declining to accept a plea bargain of 5 years. The district attorney retaliated and charge him with another crime “Habitual Criminal Act”, which carries a mandatory life imprisonment. Hayes lost and appealed his conviction, took his case to the Supreme Court and 5 to 4 the supreme court upheld the conviction. The Case Against Plea Bargaining
The government has already understood that they lose the cyberwar, the youth in the planet outnumber the old. We seen the youth rebelling against the old in the
Please stop by and read International Strategy for Cyberspace, US government had said that will respond hackers attack military if necessary.
As a cyber space race looms, the military is looking for a few good geeks.

In Hacker Wars, rogue hackers on the payroll of malevolent corporations are taking over the Internet. Our privacy and basic liberties are being swept aside at an alarming rate. The only way to stop them is to beat them at their own game! Hackers like you have to stand on the side of freedom and fight for those who can not fight for themselves. In this war of the electron and the switch, there is no substitute for victory.
High school hackers, crackers and digital deviants: Uncle Sam wants you. Again the government blackmailing the youth of America. They want to use our youth to snitch each other in exchange for a pay check.
Anons hackers doxing each other. Who they working for? Feds? private firms, ego? Next Generation Fuckery
I Was a Cybercrook for the FBI-David Thomas ran one of the most popular online crime hubs, while the FBI ran him. El Mariachi
Anonymous hacker, commentator, journalist, and fameball Barrett Brown was arrested in a dramatic takedown last night live and on-camera, in the middle of a TinyChat with a dozen others.
Some weren’t worried. “Cool how the FBI staged @BarrettBrownLOL‘s arrest live on cam to bolster the idea he hasn’t been working for them for some time already,” said Methadonna on Twitter, voicing the suspicions of many. Daily Dot
The hacker group Anonymous is dealing with the arrest and betrayal of one of its most vocal members the only way it knows how: By hacking a security firm and covering its website with a rant against feds and snitches. To Snitch Sabu
Read the following story of Sabu, the mention of the victim SONY, makes the crimes more expensive and the years of jail multiply by the dollar $ Sign!!!!!
Hector Xavier Monsegur, a.k.a. Sabu, was outed Tuesday as a Puerto-Rican American resident of New York who pleaded guilty in August to an indictment on charges of computer crimes against targets ranging from Visa and Mastercard to the security firm HBGary and Sony that carried a maximum sentence of up to 124 years and six months in prison.
Six top computer hackers associated with groups such as Anonymous, LulzSec and AntiSec have been arrested and charged in New York in connection with a series of attacks on computers used by the entertainment industry, credit card companies, intelligence firms and even an Irish political party, U.S. officials announced Tuesday. Los Angeles Times
The FBI and Secret Service have successfully infiltrated the underground world of computer hackers in the US: 25 percent are secretly informing the government about their peers for fear of a long prison sentence. In fact, the community is riddled with paranoia and mistrust as it is not clear who is part of this “army of informants.” Tech Spot on hackers
One of the six, Hector Xavier Monsegur – also known by his computer name of “Sabu” – pleaded guilty and was said by officials to be working with the government against his former colleagues.
Brian Salcedo, now 23, has been in custody since 2003, when an FBI stakeout caught him and a partner breaking into several Lowe’s networks over an unsecured Wi-Fi connection at a suburban Detroit store. 8 years for Crazy Long Hacker
A skilled San Francisco computer intruder was sentenced here Friday to 13 years in federal prison for stealing nearly two million credit card numbers from banks, businesses and other hackers — in what is the longest hacking sentence in U.S. history. Record Sentence for hacker Max Vision
We see these hackers thieves that stole millions of dollars in wire fraud, their sentences are very small compared to Aaron Swartz 35 years sentence.
Hackers and thieves are notorious nowadays. In fact it’s all anyone tends to hear in the news, and they get long sentences. A con artist/thief stole millions of dollars and got sentenced to 150 years in Jail. Which obviously he won’t ever survive. A man who murdered two children, aged 10, and 12 respectively, got 14 years combined.
Who decide when a crime deserve more years in jail? Justice, Judge, Governor, District Attorney? Make your opinion count, demand accountability for harsh punishment and outrageous district attorney charges for social activist and dissidents.
“Being a federal prosecutor isn’t just a job, it’s a privileged position of power… And one of the things that goes with the unbridled power to decide who to indict and what charges will be brought; is the responsibility to use that power appropriately. Anyone who does not understand that responsibility should not be allowed to pass the bar, much less be handed the power to ruin lives with relative impunity.” Kurt Hopking
On January 14, 2013, Yesterday, it became public that Stephen Heyman oversaw TWO excessive prosecutions of hacker-defendants who committed suicide, Aaron Swartz and Jonathan James.
Swartz was charged with using the Massachusetts Institute of Technology’s computer networks to steal more than 4 million articles from JSTOR, an online archive and journal distribution service. He faced a maximum sentence of 31 years if convicted. Federal Reserve HACKED
Jonathan Joseph James (December 12, 1983 – May 18, 2008), was an American hacker who was the first juvenile incarcerated for cybercrime in the United States.The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.
Leonard Harris Sassaman (1980 – July 3, 2011) was an advocate for privacy, maintainer of the Mixmaster anonymous remailer code and remop (operator) of the randseed remailer.
Sassaman was a well-known cypherpunk, cryptographer and privacy advocate. He worked for Network Associates on the PGP encryption software, was a member of the Shmoo Group, a contributor to the OpenPGP IETF working group, the GNU Privacy Guard project, and frequently appeared at technology conferences like DEF CON. Sassaman was the co-founder of CodeCon along with Bram Cohen, co-founder of the HotPETS workshop (with Roger Dingledine of Tor and Thomas Heydt-Benjamin), co-author of the Zimmermann–Sassaman key-signing protocol, and at the age of 21, was an organizer of the protests following the arrest of Russian programmer Dmitry Sklyarov. He committed suicide.
Ilya Zhitomirskiy (12 October 1989 – 12 November 2011)[1] was a Russian-American software developer and entrepreneur. Zhitomirskiy was a co-founder and developer of the Diaspora social network and the Diaspora free software that powers it. Diaspora could have destroyed facebook platform if being developed as Zhitomirskiy had planned.
On the evening of 12 November 2011, Zhitomirskiy was found dead in his San Francisco home by police responding to calls about a suspected suicide. An autopsy report from the Medical Examiner’s office formally ruled the death a suicide in April 2012. While press reports questioned whether the pressure of working on Diaspora had led to his suicide, Diaspora co-founder Maxwell Salzberg disagreed. Salzberg stated, “Yes, I agree that being a startup founder is stressful. But it wasn’t the stress of work that killed Ilya. He had his own issues. He was sick.” Zhitomirskiy’s mother, Inna Zhitomirskiy, did not comment on reports of his history of mental illness, but she did say on his participation in Diaspora, “I strongly believe that if Ilya did not start this project and stayed in school, he would be well and alive today.”
Diaspora is the Privacy Aware Open Source Social Network that puts you in control of your information.
With Diaspora you decide what you’d like to share, and with whom. RIP Ilya Co-founder of Diaspora
“”Indonesia has 65 thousand hackers and the largest base in Yogyakarta, Yogyakarta hackers on a more active and creative,” says IT analyst Onno W. Purbo here on Thursday. and the largest base in Yogyakarta, Yogyakarta hackers on a more active and creative,” says IT analyst Onno W. Purbo here on Thursday.
CHINA has revealed that millions of its computers have been hacked by the US in the past year, as it hits back at claims foreign media organisations had been infiltrated by Chinese spies. The Australian
Iranian official says bank attack blame is a smoke screen for the U.S. to continue launching cyber attacks against Iran. US blame Iran for hacking US bank
Excuse to attack Syria exposed by amateur hacker
Excuse to attack Syria exposed by amateur hacker
The quantity of documents suggests this is not a spoof
http://niqnaq.wordpress.com/2013/01/29/the-quantity-of-documents-here-su… [2]
The source of this trove is pastebin:
According to an Iranain source, who combed through the leaked documents: “An email exchange between two senior officials at Britam suggested that the scheme was approved by Washington, explaining that Qatar would fund the militants in Syria to use chemical weapons.”
How the site was hacked indicates the company had used bargain-basement hosting. Their domain shared the same numerical address as many other domains. A young hacker simply saw this as a target of opportunity, and exploited an obvious weakness.
It’s hard to find good people when dirty deeds need to be done, thus we have the culture of fear cultivated by our leaders in Washington to prevent us from viewing and discussing the obvious truths.
INDYRADIO brings the ruckus to Facebook: http://facebook.com/IndyRadio [4]
Links:
[1] http://www.indyradio.nu/sites/default/files/syria00.png
[2] http://niqnaq.wordpress.com/2013/01/29/the-quantity-of-documents-here-suggests-to-me-that-this-is-not-a-spoof/
[3] http://pastebin.com/Whyvnnd6
[4] http://facebook.com/IndyRadio

