Over 16,529,793 people are on fubar.
What are you waiting for?

 

Internet #Censorship : CISPA - Newest Cyber Security Bill 
Internet+Censorship+CISPA+-+Newest+Cyber+Security+Bill

 If you download and distribute copyrighted material on the Internet, or share any information that governments or corporations find inconvenient, you could soon be labeled a threat to national security in the United States. That’s the aim of a bill in Congress called the Cyber Intelligence Sharing and Protection Act (CISPA).

 The good news is that SOPA and PIPA haven’t come to pass, but the bad news is that they could be followed by a bill that is even more invasive and could violate even more of your civil liberties. According to a press release issued last week, the bill already has over a 100 congressional co-sponsors. Yet the bill is only now beginning to appear on the public radar.

 CISPA would let companies spy on users and share private information with the federal government and other companies with near-total immunity from civil and criminal liability. It effectively creates a ‘cybersecurity’ exemption to all existing laws.
 CISPA, however, is nothing like SOPA, despite its recent association in the media. While SOPA included provisions that would have essentially broken the Internet by allowing the U.S. to delete domains from a central registry system, CISPA does nothing of the sort, and aims more at “cyber threat intelligence” gathering than censorship and piracy prevention.
 The bill presents itself as a simple enhancement of America’s cyber-security that would amend the National Security Act to include “cyber threat intelligence” gathering. To those ends, it would tear down the firewall between private corporate networks and the National Security Agency , enabling corporations to share data with the world’s most sophisticated spy apparatus.
 While the bill is openly supported by companies like AT&T, Lockheed Martin, Microsoft, Facebook, Boeing and Intel, ACLU legislative counsel Michelle Richardson cautioned last month that it is not something to be taken up lightly.

 

POSTED BY THN REPORTER ON 4/06/2012 10:46:00 AM 

http://thehackernews.com/2012/04/internet-censorship-cispa-newest-cyber.html

#OpDarknet Official and Last Release

In the last three weeks of #OpDarknet, we gained much support from The World with our Operation Darknet. We would like to thank our supporters, in #OpDarknet’s cause. There also was a large amount of resistance from the pedophile community claiming that Tor was their safe haven with messages such as:

Hidden Wiki ‘Hard Candy’ section – October 20:
“To the vandals, you vandalize the page 1,000,000 times, we will correct it 1,000,001. It will just go back and forth. We are here to stay. People want to run DDoS attacks over tor and think it hurts us, it does. It is our GOD given right that we can choose to have our sexual preferences for youth. It is the same for the any other porn community. It is not what we choose to become, it is who we are. You Anonymous aka #OpDarknet do not have the right to censor us.”

Operation Darknet was never intended to bring down Tor or the “darknets”. The only purpose of Operation Darknet was to reveal that a service like the “Tor Project” has been ruined by the 1% using it for Child Pornography. The rest, 99% consists of Chinese/Iran journalists, Government intelligence fighting a secret war with Al-Qaeda, and us Anons who believe in the right to Free Speech.

However, Child Pornography is NOT FREE SPEECH. We proved beyond doubt, that 70% of users to The Hidden Wiki access the HARD CANDY section, “a secret directory” used by the pedophiles to access sites like Lolita City and The Hurt Site, a site dedicated to trade of child rape.

In that, We Anonymous planned and successfully executed an complex “Social Engineering” operation dubbed “Paw Printing”. This consisted of the following things:

1) One week prior to October 27th, 2011, We Anonymous performed OpSec, “Operations Security” against the developers of Tor. We quietly listened on irc.oftc.net channels #tor and #tor-dev to find when the next major release of Tor would be.
2) Form our OpSec, we determined that on October 27th 2011, a new Tor version would be released to recent “security” publications about Tor
3) We secretly contacted our friends at The Mozilla Foundation™, Developers of Firefox™, for them to authorize a developer signer certificate for “The Honey Pawt”, a TorButton that we Anon created to funnel all ORIGINATING traffic to our forensic logger.
4) On October 26th, 2011 we passed certification of a modified TorButton for Firefox™ called “The Honey Pawt” which would be used for the forensic logging of users accessing The “HARD CANDY” and “Lolita City” Tor Hidden Onion sites. Our TorButton aka “The Honey Pawt” did not contain any malware or virus. It was developed according to the Firefox/Mozilla Foundation guidelines.
5) We built a forensic data logger dubbed “Whiny da Pedo” that would capture the IP traffic, log that IP packet, and re-route it through our local Tor Bridge.
6) On October 27th, 2011 we launched Operation “Paw Printing”. What we did was stopped our #occupy Denial-of-Service on The Hidden Wiki and placed a Tor “security update” message on the “HARD CANDY” section of The Hidden Wiki.
7) No where else did we place that message except for the HARD CANDY page on The Hidden Wiki. The message contained a download link to our “The Honey Pawt”. To ensure no conflicts with the existing, TorButton our “The Honey Pawt” replaced the old TorButton Firefox extension.
8) The pedo who was on the “HARD CANDY” section would then restart Firefox™ and turn our TorButton and attempt to access websites such as The Hidden Wiki and Lolita City.
9) That traffic would then be forwarded to our special forensics server and log the incoming IP and destination. If an Tor Onion site matched a known Child Pornography Tor site, we would block the request. Otherwise, the traffic would then be redirected through the Tor network.
10) For only 24 hours, we ran Operation “Paw Printing”. On October 28th, 2011. We shut down the forensics and resumed #occupy The Hidden Wiki to prevent access to the Tor Hidden Wiki Site

 

Anonymous has taken down more than 40 darknet-based child porn websites over the last week. Details of some of the hacks have been released via pastebin #OpDarknet, including personal details 1500 users of a site named 'Lolita City,' and DDoS tools that target Hidden Wiki and Freedom Hosting — alleged to be two of the biggest darknet sites hosting child porn.

News of the Anonymous campaign to actively target anyone hosting child porn sites comes from statements associated with Anonymous on Pastebin and two Anonymous YouTube video channels. AnonNews has yet to issue a press release.

The AnonMessage and BecomeAnonymous YouTube channels both posted videos with statements of intent to hunt, skin and kill pedobears everywhere, starting with Freedom Hosting.

 

 

 

_        __        ___                 __               _               
| |     / /__     /   |  ________     / /   ___  ____  (_)___  ____     
| | /| / / _    / /| | / ___/ _    / /   / _ / __ `/ / __ / __    
| |/ |/ /  __/  / ___ |/ /  /  __/  / /___/  __/ /_/ / / /_/ / / / / _ _ _
|__/|__/___/  /_/  |_/_/   ___/  /_____/___/__, /_/____/_/ /_(_|_|_)_)
                                              /_/ /
                                              _ /                                     
#OpDarknet Press Release - 10/15/2011
 
------------------------
   Timeline of Events
------------------------
At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable.
--
 
At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting.
--
 
At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do.
--
 
At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server.
--
 
At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do.
--
 
At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients.
--
 
------------------------
     Our Statement
------------------------
The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death.
 
For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.
 
By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography.
 
We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography.
 
------------------------
      Our Demands
------------------------
Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.
 
------------------------
     Images & Misc
------------------------
Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg
--
Freedom Host PR Screenshot: http://i53.tinypic.com/o5qlip.jpg
--
Our Manifesto: http://www.youtube.com/watch?v=aFuJp_zPIlU
--
 
  #Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS
 
 
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
  

 

Posted by THN Reporter On 10/22/2011 06:17:00 PM

last post
12 years ago
posts
3
views
2,783
can view
everyone
can comment
everyone
atom/rss

other blogs by this author

 11 years ago
Guyz n' Dollz
 12 years ago
Tech Support
blogroll (list of blogs that the blogger recommends)
12 years ago 
The Good, The Bad, and The ... by Ninja  
13 years ago 
Grrrrrrrrrrrrrrr and stuff by Ninja  
9 years ago 
Ask the Ninja by Ninja  
1 year ago 
Real Fu-Kin Life. by Johnnydevil  
9 years ago 
Cooking with Ninja by Ninja  
12 years ago 
help-tips by 1334117  
official fubar blogs
 8 years ago
fubar news by babyjesus  
 13 years ago
fubar.com ideas! by babyjesus  
 10 years ago
fubar'd Official Wishli... by SCRAPPER  
 11 years ago
Word of Esix by esixfiddy  

discover blogs on fubar

blog.php' rendered in 0.066 seconds on machine '109'.