Wie gestern berichtet wurde, kündigte Anonymous einen Leak von Dokumenten des ManTech-Konzerns an. Dieser steht in Verbindung mit dem FBI und betreibt unter anderem die IT-Sicherheit der Bundesbehörde. Nun hat das Kollektiv seine Drohung wahr gemacht und die Dokumente veröffentlicht. Auf dem Twitter-Account der Gruppe sind zahlreiche Links zu vertraulichen Dokumenten und privaten E-Mails der Mitarbeiter aufgetaucht. Mit dieser Aktion protestierte Anonymous gegen die Festnahme mehrerer Mitglieder der Vereinigung. Anonymous gab dieser Aktion den Namen „Fuck FBI Friday“.
http://thepiratebay.org/torrent/6571301/Fuck_FBI_Friday_III__ManTech
Ahoy thar, Today is Friday and we will be following the tradition of humiliating our friends from the FBI once again. This time we hit one of their biggest contractors for cyber security: Mantech International Corporation. What ManTech has to do with the FBI? Well, quite simple: In Summer 2010 the FBI had the glorious idea to outsource their Cybersecurity to ManTech. Value of the contract: 100 Million US-Dollar: "The FBI is outsourcing cybersecurity to the tune of nearly $100 million to a Washington-area managed services company. The deal shows a willingness in the federal government to place IT services more and more in the hands of third parties as agencies don't have enough staff on hand to do the job." http://www.informationweek.com/news/government/security/226700486 And this is not the only Cybersecurity contract ManTech won; with a quick internet search you will be able to find lots more. And just a few months back, in March 2011, ManTech received another 9 Million cybersecurity contract from the FBI: http://www.euroinvestor.co.uk/news/story.aspx?id=11545467 Well done, good sirs. You failed epically. Because we pwned ManTech utterly and throughly; and we did not need hundreds of millions for it. In fact, we did not require any funds at all, we did it with Lulz. So we begin by releasing 400MB of internal data from ManTech, this gives some insight on how they are wasting the tax payer's money. Most of the documents in this first batch are related to NATO who, you may recall, made some bold claims regarding Anonymous earlier this year: "It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted" http://www.nato-pa.int/default.asp?SHORTCUT=2443 Indeed, it remains to be seen. It also remains to be seen how much longer the public will accept how completely incompetent law enforcement agencies are spending their citizens' money to fund even more incompetent federal contractors. Incidentally, apart from the FBI, ManTech International has some other clients: * Defense Intelligence Agency, * National Geospatial-Intelligence Agency * National Reconnaissance Office * National Security Agency * Department of Homeland Security * U.S. Navy, Air Force, Army, Marine Corps * Missile Defense Agency and DARPA * Department of Justice * Department of State * Environmental Protection Agency * NASA, NATO, state and local governments Great. It's really good to know that you guys are taking care of protecting the Unites States from so-called cyber threats. It should also be noted that ManTech, along with HBGary, Palantir, Endgames and others were involved in the now-dubbed Operation MetalGear to manipulate and spy on their citizens using persona management software for social networks: http://wiki.echelon2.org/wiki/Mantech We are providing these ManTech documents so the public can see for themselves how their tax money is being spent. But don't you worry, the U.S. is a rich country and can afford to waste money, right? Dear Government and Law Enforcement, we are repeating this message as we have the suspicion you still do not take us seriously: We are not scared anymore and your threats to arrest us are meaningless. We will continue to demonstrate how you fail at about every aspect of cybersecurity while burning hundreds of millions of dollars that you do not even have. The director of the U.S. Computer Emergency Response Team (CERT), Randy Vickers, already resigned from his post, without proving an explanation. Let us provide you with one: Mr. Vickers realized that he is on the losing side of this war. A war that should never have been started in the first place. Not only because the enemy was vastly underestimated and misjudged completely but even more because it is fought against innocent citizens who simply chose to protest against the grievance of the government. You cannot win this war and the sooner you realize this and call for peace, the sooner we can put an end to this and solve the problems of this world together. Dear citizens of the U.S. and the world: We are fighting in the name of all the oppressed and betrayed people. In your name we will continue to fire upon these laughable battleships until they are no more. Hold on tight while the seas are rough but we will prevail! Anonymous AntiSec
Quelle : http://www.anonyops.com/
[yframe url=’http://www.youtube.com/watch?v=v_SYqD1Yzmo‘]