You are on page 1of 27

Hubris Bio

Hubris is retired from the USAF, where he spent his last four years as a Computer, Network, Cryptography, and Telephone Switching Technician (2E2x1). His military qualifications include: Theater Battle Management Core Systems (TBMCS), Fedora System Administration, Sun Solaris, Combat Communications, Equipment Control Officer, Wire Dog. Hubris has spoken at Dartmouth University (RF-ID attack vectors, Modern Electronic Warfare), Hope (Hacking Terrorist Networks), Defcon2011 (Modern Cyber Warfare), Phreaknic (Social Engineering), Pump-Con (Trolling for Sensitive Information), Toor Camp (Trolling for Sensitive Info) Missions: Global War on Terrorism, Joint Expeditionary Force Experiment, Global Strike, maintained 24 hours Combined Air and Space Operations Center (CAOC)

Law Of Armed Conflict


A formal declaration of war / hostilities Military Targets Only Unlawful Combatants Noncombatants

Operation Overlord
Psychological
o o o

Practical
o o o

Create the illusion of multiple opponents Make backtrace a legitimate target Public "calling out"

Highlight criminal activity Create Red herrings Visibility

Tactical Exploit drama Increase participation risk

Psychological
Create the illusion of larger operations/ many participants Create mysterious personas, encourage speculation Create paranoia by discussing infiltration efforts openly (we were never caught, but many anons were accused!) Drop logs everywhere

Practical
o o o

Social engineering- active and passive intelligence Create false leads (red-herring LinkedIn, Facebook / etc accounts, etc.) Be visible, and publicize contact with LE- just being available attracts information! In our first few days, we were given logs that identified leaders in the HBGary attacks, later identified as members of "Lulzsec"

Tactical
Utilize gossip, social engineering to exploit fractures in the group Draw fire via visibility- be impossible to ignore Get and keep the attention of anons and their opponents Original plans included herding users onto new locations, but budget did not allow- Ryan's meltdown was perfect opportunity

Meet the Characters


Public Figures: A5h3r4 Bad Cop Hubris Evil Cop Non Public: Support Aries: Technical assistance Phobos: Knight of Mars, beater of ass. Deimos: Information Analyst

A5h3r4
Name chosen as an inside joke/ psychological tweak - the name of a virus that destroys hackers, a direct gag on the names of members of anonops Maintained visibility/accessibility on IRC/social network Curious anons couldn't stay away- numerous conversations with members of Anonops/Lulzsec; malcontents with gossip, allies with information, and facilitated LE contact for mmany

Hubris
Lightning rod - meant to attract negative attention, speculation from anons Aloof- Very few media interviews, little communication resulted in tremendous speculation Hubris was blamed for *everything*

Jenifer Emick is a witch that made me do this. Please help.

Live Free or Die

"Fear is the path to the dark side. Fear leads to anger. Anger leads to hate. Hate leads to suffering." - Master Jedi Yoda Hubris is a drama Queen- A5h3r4h

Propaganda

Black Propaganda Spotlight poor character of anon/lulzsec "leaders" Counteract anon's media snowjob Disruption Interception/infiltration

Disruption

Disrupt anonymous IRCs, planning sites A major failing of anonymous is their decentralized organizing, which makes it impossible to operate in secret We spied on their operations, giving targets advance warning, publicly challenging/ridiculing (Operation Manning/Quantico) Invited 4chan to "participate" in planning, resulting in nonstop trolling, disruption of planning sites

Interception/infiltration
Intercept communications- many times we were able to pass ourselves off as personal messengers to members of Anonops/Lulzsec, and captured several vulns meant for Lulzsec to exploit Impersonation- dropping into IRCs as someone else often results in a ton of information very quickly! Plain old social engineering- we were allowed access to secret sites conferences, logs very quickly, just by appearing enthusiastic

Operation Cover
72 hours (ideal) non stop trolling, blanking, etc. Create confusion, frustration, anger Generate Publicity- give media access to incriminating logs, resulting in the public's first glimpse into the anonymous treehouse

Operation Neptune

Enormous "Dox drop," with personally identifying information Public "calling out" of individual participants (exposing activity not only to LE, but family, etc)

Neptune Overview
"Dox Drop" serves several purposes: Discourages both high-risk and lower-level participants- making it "real" instead of a fun social game to play on the internet Disrupt the illusion of safety in numbers and the invincibility of anonymity Draw the expected negative attention while everyone is watching- forcing anon's bad behavior into the public spotlight

Mission Objectives
Disrupt recruitment and speed attrition Accomplished Disrupt support to anonymous from anonymous sympathizers Accomplished Expose the hierarchy and leadership structure of Anonaccomplished Expose the Media/Public to the "real" Anonymous- no more warm fuzzies from the media or the public Recruit allies and informants- accomplished

After action report


Anonymous lacks discipline to work as a cohesive fighting force. Anon's inability to act in secret, oust bad apples, or even form a coherent mission severely limits them Open groups are very susceptible to infiltration Most are bored rather than believersmaking the nuisance less attractive slows recruitment

Das Ende

You might also like