Latin America, Caribbean unite to support Ecuador over Assange — RT

Published: 25 August, 2012, 08:47

Permanent council of the Organization of American States in Washington (Reuters / Jason Reed)

Permanent council of the Organization of American States in Washington (Reuters / Jason Reed)

TAGS: MeetingSouth AmericaPoliticsLawUSA,Assange


All the members of the Organization of American States, except for the US and Canada, have stated their solidarity and support of Ecuador’s decision to grant asylum to Julian Assange at a meeting of 35-member bloc in Washington.

Senior officials from all states of the Americas adopted a resolution of solidarity with Ecuador. They reaffirmed their “respect of sovereignty” and denounced “the use of forces in solving conflicts.”

All members approved the full text of the document except for Canada and the United States, which refused to express “solidarity” with Quito.

The meeting was called by Ecuador which stated that Britain had threatened to storm its embassy in London to arrest WikiLeaks founder Julian Assange, who had taken refuge there.

The final version of the resolution, however, did not include reference to the alleged UK threats due to objections from the United States, Canada, Panama, Trinidad and Tobago and others.

Britain, which has observer status at the OAS, insisted it had made no such threats.

“I would like to state unequivocally at the outset that at no time has the British government made any threat against the embassy of Ecuador. Respect for and compliance with international law is at the heart of the foreign policy of the United Kingdom,” Deputy Head of Mission at the British Embassy in Washington Philip Barton said.

During the debate Ecuadoran Foreign Minister Ricardo Patino condemned Britain for what he called an “assault on our sovereignty.”

The United States did not vote against the resolution, but a US State Department representative once again urged the OAS to allow Ecuador, Sweden and the United Kingdom to resolve the matter among themselves.

“It involves matters of criminal justice, European law and the sovereign extradition arrangements between the United Kingdom and Sweden, two nations with very well-respected judicial systems,” said US Department of State representative John D. Feeley.

Following the OAS meeting, Ecuador’s President Rafael Correa expressed his gratitude to the Latin American states that backed Quito in a televised address.

We don’t have anything other than words of gratitude to our brothers of Latin America, to their governments, their people for their overwhelming and decided support for the sovereign position of Ecuador, and the rejection of this explicit threat to enter an embassy and arrest a person granted diplomatic asylum,” he said on Friday.

Earlier, the Ecuadorian president said in an exclusive interview with RT that “Once we granted asylum to Assange, he is under the protection of Ecuador, and we will do everything to make sure this protection is effective.”


Operation Free Assange – Anonymous takes down Interpol website — RT

Published: 27 August, 2012, 01:23
Edited: 29 August, 2012, 13:35



TAGS: ProtestWikiLeaksAssangeAnonymous


Hacktivist group Anonymous claimed they took down the websites of Interpol and a British police unit as part of a campaign demanding freedom for WikiLeaks founder Julian Assange.

Several Twitter accounts associated with the loose-knit hacker collective Anonymous announced that the website of International Criminal Police Organization (Interpol) had been taken down. The site was unavailable as of 9:18 pm GMT on Sunday, but resumed functioning soon afterward.

The hackers also claimed to have taken down the website of the Serious Organised Crime Agency (SOCA), a UK police unit responsible for operations against major criminal organizations.

Assange, the founder and editor of whistleblowing website WikiLeaks, was ordered by Swedish authorities to be extradited from the UK, where he had been under house arrest before taking refuge at London’s Ecuadorian embassy. Two women from Sweden have accused Assange of sex crimes, for which he has not yet been charged.

Assange applied for political asylum in Ecuador over fears that he would be extradited from Sweden to the US, where he would be tried for espionage for his role with WikiLeaks. The Latin American country granted Assange’s request earlier this month.

British authorities have refused to guarantee safe passage out of London for Assange.

LulzSec exposes alleged child porn traders

Apparently operating under the semi-defunct LulzSec banner, infamous hacker Sabu appears to have taken over a website forum alleged to to be trading in child porn.

Over 7000 account log-in details for the site were posted up on pastebin.

The Densetsu site itself now simply contains a list of file folders now marked as “owned by Sabu”.

Sabu’s Twitter feed has be unchracteristically quite of late, possibly because it seems likely he’s been ‘doxed’ as a PR man for Portugal.

A statement on the pastebin post reads: “virtual CP is wrong so we decided to take over the forum”.

hacked! and describes its self as “A site dedicated to asian games and entertainment. Anime Densetsu is an interactive site, which allows you to discover people around the world with similar interests.”

We tried one of the log-ins at random and could successfully log in to the site. We left pretty sharpish.

If Sabu has indeed been outed, this may be a PR offensive. After all no-one loves a paedo.

Read more:

50 Days of Mayhem: How LulzSec Changed Hacktivism Forever | Damon Poeter |

50 Days of Mayhem: How LulzSec Changed Hacktivism Forever


LulzSec didn’t invent hacktivism, let alone hacking. But the small crew of publicity-hungry digital pirates may have ushered in a new era for both as they merrily sailed the cyber-seas for 50 days of mayhem that became perhaps the biggest tech story of the first half of 2011.

LulzSec now says that it’s put the Lulz Boat in permanent dry dock. Taking the group at its word, what did these six individuals (the membership number LulzSec now cops to) accomplish in their brief but explosive time in the spotlight?

Brand Name Hacktivism
More important than the digital scalps LulzSec took—Sony, PBS, Infragard, the CIA, Arizona’s Department of Public Saftey, to name a few—was the group’s canny use of social media and clever manipulation of a pliant press that may have redefined hacktivism forever.

LulzSec, short for Lulz Security, seems to have coalesced some months ago from the core group of hackers in the Anonymous collective which raided the computer systems of security firm HBGary Federal in February. Many of the handles used by purported Anonymous members in leaked Internet Relay Chat (IRC) logs where the HPGary Federal hit is discussed extensively have been linked to LulzSec’s core group of six members.

At some point, it seems, this group came up with a remarkably effective strategy for branding itself and publicizing its exploits. That campaign involved adopting a name based on the “in it for the lulz” (or laughs) Internet meme that straddles the line between being recognizable to a good chunk of the mainstream audience and still insider-y enough to seem young and hip.

Next, LulzSec used Twitter and its own Web site to great effect in scoring media coverage of its latest adventures in hacktivism. The LulzSec Twitter feed had more than 283,000 followers by the time the group called it quits. Following LulzSec’s first major attacks, including a hack of and the publication of thousands of transaction logs from ATMs in the U.K., scores of mainstream and tech journalists began following “The Lulz Boat” religiously on Twitter.

A LulzSec core member called Topiary is believed to have been the group’s mouthpiece and PR specialist. His taunting, witty tweets entertained LulzSec followers in between the gleefully transmitted news that another prominent site had been taken down or defaced, or that documents had been uploaded to public forums with gigabytes full of sensitive data purloined from a network intrustion.

The final ingredient in the group’s success was simple. LulzSec delivered. During its 50-day run, LulzSec alerted the public to a high-profile hack, Web page defacement, or site takedown about once every three to four days.

More than the funny ASCII drawings of boats or the colorful operational names (“F*** FBI Friday,” “Chinga La Migre”), this is what kept everybody coming back for more “lulz.”

This is Why We Can Have Nice Things
LulzSec may also have paved the way for a new method of doing things within the loose online collective known as Anonymous. That anarchic movement has been fairly successful in its various cyber-pranks and site takedowns since getting serious about such operations in recent months. The bumbling, opportunistic raid on Sarah Palin’s Yahoo email account back in 2008 by anonymous members of 4Chan’s /b/ board seems like ages ago.

But the arrests of dozens of suspected Anonymous members in recent weeks demonstrates that such a large, flowing membership base is probably detrimental to keeping secrets. Whether or not authorities are now closing in on LulzSec’s members, the group did manage to pull off their 50-day lulz spree without getting caught.

Instead of operating within the sprawling, “leaderless” climate of Anonymous, LulzSec formed itself as a small cadre of talented individuals, each with a key skill to offer (despite being derided as “script kiddies” by some rival hacking groups, LulzSec had skills). The group was reportedly comprised of hackers (like Sabu) who handled the network intrusions, coders who built software tools, botnet owners who launched DDoS attacks, and even a frontman in Topiary.

LulzSec almost certainly emerged from Anonymous and likely has simply melted back into its ranks since disbanding. The group may have distanced itself from Anonymous at first, but with the launch of Operation Anti-Security in concert with Anonymous, LulzSec indicated it had never really strayed too far from its roots.

With reportedly strong ties to other senior members of Anonymous, LulzSec’s members may be in a very good position to instruct others on the strategy and tactics that made them such a success. The group already has copycats like Canada’s LulzRaft. Would it be all that surprising to see more tight-knit hacking cells emerge from Anonymous and elsewhere?

When—not if—that happens, those next-gen LulzSecs would be wise to heed a final lesson from the originals: Know when to quit. And when you do, know how to bow out with some panache. LulzSec’s stated motivation for disbanding was “boredom”—a game effort at laughing in the face of the real reason—that authorities were closing in.

For more, see PCMag’s Guide to Knowing Your Hackers and Did LulzSec Change the Hacking Game, or Just Get Lucky?

For the top stories in tech, follow us on Twitter at @PCMag.