To be fair, Anon was 'founded' around doing stuff for kicks and giggles and because they can, the whole being moral part of it only came in more recently. If they do follow through with these threats they aren't going to target a specific ISP, like you implied they are going to go after all the ISP's at the same time and whoever gets breached first will have their information posted.<br>
<br>--Damian<br><br><div class="gmail_quote">On Wed, Jul 25, 2012 at 11:26 AM, thelionroars <span dir="ltr"><<a href="mailto:thelionroars1337@gmail.com" target="_blank">thelionroars1337@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">I remember reading quite a detailed breakdown of the HBGary breach on Ars Technica. Yes 'they' are resourceful, and really anyone can be operating as them or using their activities as cover for their own. What I really despise about Anonymous though is the way they will slap a cause on, when it's clear that undertaking the criminal activity itself is the primary motivation. At best their 'causes' seem to be jumping off points for who to try next and some of their resultant attacks seem to be pretty far down the chain. The link between a draconian law being considered at the Federal level and a Queensland Tourism website is pretty tenuous, you would have to agree. It brings to mind the maxim that you don't have to have the best security, it just has to be better than the next target... I wish you luck in your determination of whether Anonymous is targeting you next based on one of their 'causes', because clearly you are going to need it.<br>
<br>If there is a leak of customer data from an ISP, it is going to be the same sloppy security measures of the likes of HBGary that are to blame.<br><br>PS Don't get me started on the cut'n'paste movie references. An attempt at irony I suppose.<div class="HOEnZb">
<div class="h5"><br>
<br><div class="gmail_quote">On 25 July 2012 11:32, Damian Guppy <span dir="ltr"><<a href="mailto:the.damo@gmail.com" target="_blank">the.damo@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
If you are unsure of what Anon has done in the past do some research on the HBGary breach by anon, and the Stratfor breach. Both are security companies that work closely with groups like the FBI etc.<span><font color="#888888"><div>
<br></div></font></span><div><span><font color="#888888">--Damian</font></span><div><div><br>
<br><div class="gmail_quote">On Wed, Jul 25, 2012 at 9:29 AM, Christopher Cowling <span dir="ltr"><<a href="mailto:chris@faktortel.com.au" target="_blank">chris@faktortel.com.au</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
I agree, with the success rate of lulzsec and the fact that they have broken into so many websites / services / servers and so forth they are quite formidable. I think anyone would be questioning their own security if it was tried by these gentlemen. I have yet too see a news article entitled "Company or Govt successfully avoids lulzsec attack due too astounding security procedures" and honestly I don't expect too see it.<div>
<br></div><div>Chris.</div><div>FaktorTel.<br><div><br><div class="gmail_quote"><div>On Wed, Jul 25, 2012 at 10:59 AM, Christopher Pollock <span dir="ltr"><<a href="mailto:chris@ionetworks.com.au" target="_blank">chris@ionetworks.com.au</a>></span> wrote:<br>
</div><div><div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">While the temptation to derisively refer to the legion as script kiddies, that really only applies to the LOIC. I would be hesitant to get any of my critical infrastructure in the crosshairs of Lulzsec. Any idiot with enough tails can generate DDOS traffic, but with their success rate of bringing paedophiles / animal abusers to justice and penetrating targets .. I have more faith in their abilities than a lot of US Govt law enforcement.<div>
<br></div><div>Brad really summed it up IMO.<br><div><br></div><div>Cheers,<div>--<br>Christopher Pollock,<br>io Networks Pty Ltd.<div>e. <a href="mailto:chris@ionetworks.com.au" target="_blank">chris@ionetworks.com.au</a><br>
p. <a href="tel:1300%201%202%204%208%2016" value="+611300124816" target="_blank">1300 1 2 4 8 16</a></div><div>d. <a href="tel:07%203188%207588" value="+61731887588" target="_blank">07 3188 7588</a></div><div>m. <a href="tel:0410%20747%20765" value="+61410747765" target="_blank">0410 747 765</a></div>
<div>skype: christopherpollock</div><div><a href="http://twitter.com/chrisionetworks" target="_blank">twitter.com/chrisionetworks</a></div><div>
<div>
<a href="http://www.ionetworks.com.au" target="_blank">http://www.ionetworks.com.au</a><br>In-house, Outsourced.</div></div><br>
<br><br><div class="gmail_quote">On Tue, Jul 24, 2012 at 7:39 PM, thelionroars <span dir="ltr"><<a href="mailto:thelionroars1337@gmail.com" target="_blank">thelionroars1337@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
More circle jerking from Script Kiddies Inc.<br><br><div class="gmail_quote"><div><div>On 24 July 2012 18:41, PRK <span dir="ltr"><<a href="mailto:ausnog@digitaljunkie.net" target="_blank">ausnog@digitaljunkie.net</a>></span> wrote:<br>
</div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><u></u>
<div>
<p><a href="http://www.gizmodo.com.au/2012/07/anonymous-threatens-to-expose-data-from-an-australian-isp/" target="_blank">http://www.gizmodo.com.au/2012/07/anonymous-threatens-to-expose-data-from-an-australian-isp/</a></p>
<p>"The group also made threats against an unnamed local ISP, saying that if the National Security Inquiry continued it would leak data to show how unsecured the information of citizens would be if it had to be retained at a service provider level."</p>
<span><font color="#888888">
<p> </p>
<p>prk.</p>
<div> </div>
</font></span></div>
<br></div></div>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div></div></div><br></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div></div></div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br>
</div></div></blockquote></div><br>