Yesterday, I posted a press release noting that the Financial Times article that appeared yesterday and which drew on input from HBGary Federal employee Aaron Barr was laughably inaccurate. An hour ago, Anon seized control of the internet security firm's website, defaced its pages, acquired 60,000 company e-mails, deleted backup files, seized Barr's Twitter account, and took down the founder's website rootkit.com. Anonymous also acquired this document, which HBGary was set to provide to the FBI at a scheduled meeting tomorrow.
Update - Press release added below.
Like Barr's previous statements to FT, the entirety of his research is not only terrible, but in many cases less informative than is the public record. The entry on me, for instance, is entirely inaccurate despite the fact that I have not been a clandestine participant since coming out of the closet months ago.
As noted by Bernard Keane, the situation is rather hilarious. More to the point, it should demonstrate that HBGary Federal is not only incapable of protecting its clients and informing on folks who were among the first to get involved in Tunisia and Egypt - it is incapable of protecting itself.
Here are the 60,000 e-mails that were acquired today. Enjoy! NOTE: I'VE TAKEN DOWN THE LINK BECAUSE THOSE E-MAILS ALSO INCLUDE THOSE FROM HBGARY ITSELF, WHICH ONLY OWNS 15 PERCENT OF HBGARY FEDERAL. THE PRESIDENT, PENNY, GAVE ME A CALL AND WAS PRETTY NICE ABOUT IT. NEGOTIATIONS ARE ONGOING AMONG RELEVANT PARTIES.
I'll be posting additional updates and materials here over the next few minutes.
In conclusion, lol.
ANONYMOUS PRESS RELEASE
For Immediate Distribution
February 7th, 2011
Recently, the head of internet security firm HBGary Federal, Aaron Barr, sought to elevate his investigation of the Anonymous movement by providing the Financial Times with what he claimed to be accurate and useful information about those who allegedly drive our activities.
In yesterday's release we inferred that the information presented was easy to undermine by any of the millions of people around the world with a cursory understanding of internet culture. Not only was the information provided by HBGary Federal woefully inaccurate, it provided no incriminating evidence against any of the persons named.
Today, Anonymous learned that HBGary Federal intended to sell to the FBI a large document (it can be found at http://hizost.com/... ) that allegedly detailed the identities of dozens of our participants.
Within hours of learning this, Anonymous infiltrated HBGary Federal's network and websites. Anonymous acquired the document with supposed personal details of anons, along with more than 50,000 company e-mails (~4.71GB) - all of which have now been distributed on the internet. Additionally, his associated websites and social media accounts were hijacked and manipulated to stress how poorly this 'security expert' handles matters of his own security ( http://imagebin.org/... ). Woe to his clients and others who invested in his confidence.
The lack of quality in Aaron Barr's undertaken research is worth noting. Aaron Barr missed a great deal of information that has been available online, and in fact failed to identify some of those whose identities were never intended to be hidden. People such as DailyKos' diarist blogger Barrett Brown, and the administrator for anonnews.org joepie91, whose identities could have been found with a simple Google search.
It is also worth noting that Aaron Barr was also providing this documentation as an example of investigation protocol. This would introduce a systemic flaw to the FBI's investigative woodwork. The risk of institutionalising a flawed procedure exponentiates a problem, and it does so at the taxpayers expense in every sense. Had the FBI indeed bought this information from HBGary Federal, it would have been paid for by taxpayers money. Many innocent people would have been marked as leaders in actions they may not even have been associated with.
Unlike you, Aaron, we did our research, we know who you are, and now, so will everyone else. Although you have managed to ruin your credibility in an attempt to further it, you did provide us with entertainment, albeit very briefly.
Anonymous does not have leaders. We are not a group, we are not an organization. We are just an idea. What we have done today will appear harsh. It is harsh. We will respond to those who see threats to Anonymous. We understand that our participants have been concerned about recent FBI raids and companies such as HBGary lurking in our chats, so we’ve given all of Anonymous a message: we will fight back.
We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us - always.
Yours faithfully,
Anonymous.