New Anonymous Hack Exposes 90,000 Email Addresses of U.S. Military Members

rated by 0 users
This post has 3 Replies | 1 Follower

Top 10 Contributor
Posts 25,859
Points 1,171,545
Joined: Sep 2007
ForumsAdministrator
News Posted: Mon, Jul 11 2011 9:45 PM
Anonymous' latest AntiSec hack centers on Booz Allen Hamilton (AKA Booz Allen). Booz Allen's core business is "contractual work completed on behalf of the US federal government, foremost on defense and homeland security matters." Guess what Anonymous leaked? The login information of 90,000 members of the military.

Typically, the hacker group posted the information on pastebin.

Anonymous' interest in Booz Allen, the hacker groups said, was over "questionable involvement in the U.S. government's SWIFT surveillance program." Additionally, the group said, Booz Allen was complicit, along with HBGary Federal, in a project intended "to destroy the concept of online anonymity."

Anonymous added that they have been investigating Booz Allen for some time, and "has uncovered all sorts of other shady practices by the company, including potentially illegal surveillance systems, corruption between company and government officials, warrantless wiretapping, and several other questionable surveillance projects."

AntiSec is a campaign first started by former hacker group LulzSec, in partnership with Anonymous. Since LulzSec disbanded, Anonymous has taken up the slack.

There's been some backlash over this hack, with some objecting to the exposure of the email accounts of U.S service personnel, when the actual target was Booz Allen. AnonymouSabu, who is believe to be a key member of the group, Tweeted: "I think people are confused. What we did today was more patriotic than wearing a cute little American flag pin. And we're not even American."
  • | Post Points: 65
Top 150 Contributor
Posts 509
Points 3,965
Joined: Oct 2010
Location: HOLLAND!!!!
jonation replied on Tue, Jul 12 2011 8:01 AM

hey if they can uncover this "warrantless wiretapping" - I will be forever greatful. This isn't soo bad, its just login info. Just hope they don't use the same username and password on everything, cuz that's foolish.

CPU: e6400 @ 3.2 (H-50'd)
MB: MSI p6n
RAM: 4G adata
GPU: GTS-450 and 8800GTS for Physx
HDD: WD 500G Black
PSU: 620W Corsair  Mod.
Case: 900-2 with 7 cathodes and AP-15s
OS: W7 and Ubuntu

  • | Post Points: 5
Top 50 Contributor
Posts 3,094
Points 38,120
Joined: Aug 2003
Location: Texas
acarzt replied on Tue, Jul 12 2011 9:06 AM

This is pretty bad, because with the right username and password you can get access to a WHOLE LOT of information.

The Gov't uses a lot of different websites which contain web based file sharing, email, etc.

There is potentially a lot of information they can get ahold of.

  • | Post Points: 5
Not Ranked
Posts 1
Points 5
Joined: Jul 2011

Username/password are almost non-existent on military networks now. Military access is through a Common Access Card (CAC)/PIN combination, so unless you have the military members CAC and PIN you will not gain access to anything that isn't available on the DOD's public sites.

  • | Post Points: 5
Page 1 of 1 (4 items) | RSS