by Meridith Levinson

Anonymous, LulzSec, AntiSec, Etc.: A Brief History of Hacktivism

News
Jan 6, 20129 mins
Data BreachIntrusion Detection SoftwareSecurity

The hacktivist collective Anonymous began getting media attention in 2008 with its attacks on the Church of Scientology. Three years later, Anonymous and its many offshoots and associations, including LulzSec, AntiSec, TeamPoison and the Peoples Liberation Front, reached the pinnacle of their infamy with major attacks on powerful corporations and government agencies. Here, CIO.com presents in pictures an abridged (and admittedly U.S.-centric) timeline of hacktivist activity.

January 2008: The Church of Scientology

Members of Anonymous defaced the Websites of several local chapters of the Church of Scientology and launched distributed denial-of-service (DDoS) attacks against them. Anonymous targeted the Church of Scientology after the church forced Websites to remove a Scientology video featuring Tom Cruise. Anonymous viewed the church’s forceful effort as censorship and a threat to Internet freedom.

December 6 – 10, 2010: Financial services companies

“Image by Anonymous

Anonymous launched DDoS attacks against PayPal and other financial services companies that shut off donations to WikiLeaks after the news organization published classified cables from the U.S. State Department. In a poster (pictured) for “Operation Avenge Assange” that Anonymous circulated over the Internet, the group wrote that WikiLeaks founder Julian Assange “deifies” the principles that the hacktivist collective holds dear.

December 16, 2010: Santa Cruz County’s Website

The Peoples Liberation Front struck Santa Cruz County’s Website with a DDoS attack that took it offline. According to a press release from the U.S. Justice Department, The Peoples Liberation Front executed the attack after several protesters, who had staged a demonstration at the Santa Cruz County Courthouse, were arrested. Law enforcement officials arrested them because their protest violated restrictions on camping within the city.

Joshua John Covelli (pictured) was indicted on September 22, 2011 for his alleged role in the DDoS attack against Santa Cruz County’s Website. He was previously brought up on charges for his suspected role in the DDoS attack on PayPal.

February 2011: HBGary Federal and its then-CEO Aaron Barr

When Anonymous got wind that Aaron Barr, then CEO of security firm HBGary Federal, planned to unveil the identities of top Anonymous operatives at a security conference, the hacktivist collective made sure that didn’t happen. They hacked into HBGary Federal’s Website and seized highly sensitive emails that they posted online. The email exchanges revealed, among other things, Barr’s schemes to discredit WikiLeaks and Salon.com writer (and WikiLeaks’ supporter) Glenn Greenwald. The revelations from these emails sent the company into a tailspin. Anonymous succeeded in sending a menacing message of what can happen to people who try to mess with them.

This picture shows HBGary’s booth, which Anonymous vandalized at an RSA conference last year.

June 15, 2011: The CIA

“Image by LulzSec/Twitter

LulzSec aimed its Low Orbit Ion Cannon at the CIA and launched a DDoS attack against the CIA’s Website that incapacitated it for several hours.

October 14 – 15, 2011: Pedophiles

“Image by YouTube.com

Anonymous doesn’t solely hound corporate and government organizations. They harass pedophiles and the Websites that support their perversions, too. As part of Operation Darknet, Anonymous removed all the links to child pornography that it found on an underground Website known as a Darknet. The hacktivists warned the company hosting the images, Freedom Hosting, to remove the illegal content from their servers. When Freedom Hosting refused, Anonymous infiltrated their servers, shut down access to all of their sites, and exposed the login details of 1600 users. Freedom Hosting restored the child pornography sites, only to have Anonymous attack again. Here is a video Anonymous made against the Darknet.

December 11, 2011: Coalition of Law Enforcement and Retail

“Image by memefest.org

Exphin1ty, a hacker associated with Anonymous and AntiSec, accessed the member database for CLEAR (Coalition of Law Enforcement and Retail) and posted online the names, phone numbers, email and home addresses, and hashed passwords of more than 2,400 law enforcement, federal, military, loss prevention and corporate professionals, according to Exphin1ty’s PasteBin dump.