際際滷

際際滷Share a Scribd company logo
BootstrappingYour
Hacktivist Community
Kiwicon 6 2012
Liz Henry
@lizhenry
Wednesday, May 1, 13
I will now tell you how
to make a hacktivist
community
Wednesday, May 1, 13
HAHAHAHA
Wednesday, May 1, 13
What is hacktivism?
 Legal or lower risk hacking:
 Reporting, citizen journalism (maybe)
 Outing people for something
 Protest, petition, policy, law changes
 Civil disobedience (maybe)
Wednesday, May 1, 13
Wednesday, May 1, 13
Sometimeshacktivism
looks like this
Wednesday, May 1, 13
And community?
 For community, you need trust
Wednesday, May 1, 13
Trust is nice
Wednesday, May 1, 13
Lower Risk hacktivism
 Publicity. Use all possible social capital.
 Get consent, protect privacy, personal
security, personal data if possible.
 Rhizomatic spread. Dont wait for the boss.
 Action plan. Group chat. Collectively edit
some documents. Needs list. Schedule.
 Report on what is effective.Ask for more.
Wednesday, May 1, 13
Emergency power!
 Hurricane Sandy
 Existing communities, social capital among
disabled people online
 Incredibly fast mobilization, public call, in-
person help from friends of friends of
friends, nearly random strangers
Wednesday, May 1, 13
Higher risk
 Reporting or citizen journalism (maybe)
 In鍖ltration, espionage
 Leaking military or other secret info
 Messing with governments, huge
corporations, organized crime
Wednesday, May 1, 13
Who will you piss off?
 Professional reputation/status?
 Stalkers or other hostile individuals?
 Intellectual property, legal, hacking laws
 Repressive government, military?
 Mexican drug cartel? Russian ma鍖a?
 In short, what are you risking?
Wednesday, May 1, 13
Example:
Editing the Zetas
 Whats the threat level if you want to edit
some Wikipedia pages about Mexican drug
cartels?
 Where are you?
 Not-Mexico: Make persona, use Tor +VPN
 Mexico or near: Maybe thats not enough
Wednesday, May 1, 13
Nuevo Laredo
carspotting
 Chat rooms to report on dangerous stuff
 Green Chevy at corner of 9th and Main
every afternoon
 Roadblock on the west road out of
downtown
Wednesday, May 1, 13
sms blogging
 blog from burner phones
 vojo.co has all-phone setup
Wednesday, May 1, 13
Risks, maybe
 Someone shoulder surfs you in a cafe and
shoots you in the head later
 Keylogging, insecure connection
 Site youre on is run by gangsters. Oops!
 Or is on phpBB or something scarier
 (narcomensajes, torture, murder)
Wednesday, May 1, 13
Consider Risk
 Are youre risking your freedom?
 Or your life
 Or other peoples lives
 Make sure its what you want to risk
 For a good reason!
Wednesday, May 1, 13
There are good reasons
Wednesday, May 1, 13
Why?
 What are your reasons and goals
 Publicity? (Then stick to lower risk)
 Personal studliness? (Dont!)
 Expose truth?
 Freedom 鍖ghter?
Wednesday, May 1, 13
How to make a hacker
community
Wednesday, May 1, 13
Dont!
Wednesday, May 1, 13
Or, 鍖rst...
 At least pause
 Ethics of encouraging others to do high risk
things on some crappy Windows machine
with LOIC or whatever.Yeah.
 Learn security, anonymity, privacy
 Put them into practice
 Practice!
Wednesday, May 1, 13
Before yall do this. . .
Wednesday, May 1, 13
Totally pause
Wednesday, May 1, 13
Wednesday, May 1, 13
Feminist Hackers
 Bunch of women hackers talking
 Why is there a false accusers wiki run by
MRAs, but no rapists wiki run by rape
survivors? Unfair and wrong!
 OMG Haxxors!
 Retaliation (identity/safety/DDoS)
 Defamation, legal threats
Wednesday, May 1, 13
Wednesday, May 1, 13
Pick your cool haxxor
names!
 We thought of some great ones
 Most of them were totally contaminated
 Anyway, they sounded like roller derby
names
 And we were telling them to each other,
which was dumb, but we realized that
about 2 minutes in
Wednesday, May 1, 13
 So I can never secretly be Louise
Boat.This makes me very sad.
Wednesday, May 1, 13
Test for leaks
Wednesday, May 1, 13
Testing each other
 We looked at what info we were leaking by
accident, and what we knew or could deduce or
鍖nd about each other.
 Some of us were better at it than others.
Wednesday, May 1, 13
We found a lot of leaks
Wednesday, May 1, 13
Some hackers are more
equal than others
 We all had some practice, because we are
all women talking in public and thus,
present more attack surface
 Various factors made some of us more
vulnerable than others: queer, trans, people
of color, homeless, have kids, domestic
violence survivors...
 Those factors often encourage more
practice in privacy, anonymity, pseudonymity
Wednesday, May 1, 13
Check your privilege
 If youre hacking in a high risk way youre
risking everyone around you.
 The others in your hacktivist community
may be at risk merely by being associated
with you
 Protect your contacts
Wednesday, May 1, 13
Learn to attack
Wednesday, May 1, 13
Learn to spy
Wednesday, May 1, 13
Be a trickster
Wednesday, May 1, 13
Be Paranoid
Wednesday, May 1, 13
Trust no one
Wednesday, May 1, 13
Make personas within
personas
Wednesday, May 1, 13
Dont contaminate your
personas
Wednesday, May 1, 13
Dont boast
Wednesday, May 1, 13
Ops checklist
 Safer computer, software (encrypt)
 Physical security (for your computer!)
 Safer connection (Tor, thenVPN?)
 Persona management.
 Shut your pie hole!
Wednesday, May 1, 13
More leak vectors to
consider
 Location, time, time zone. Avoid patterns!
 Password hygiene
 Paying for stuff
 clicking links someone sends... (dont)
 Panopticlick (browser 鍖ngerprinting)
 Tor, thenVPN(s)
Wednesday, May 1, 13
Study security, privacy,
anonymity guides
 EFF guide
 Internews, CPJ guides
 TOR, crypto.is
 Study together
 Thats still not good enough
Wednesday, May 1, 13
You must be 鍖awless
Wednesday, May 1, 13
Consciousness Raising
 Bootstrapping new hackers is hard.
 Consider your personal identity and what
attack surface you present.
 This will take some discussion and thought.
 You will get a community that is capable of
hacking something for some reason
someday. Maybe in a crisis.
 Its political consciousness raising
Wednesday, May 1, 13
That isnt very
glamorous
Wednesday, May 1, 13
But neither is jail
Wednesday, May 1, 13
Or the Ecuadorian
Embassy
Wednesday, May 1, 13
Medium risk hacking
 Theres still things to do that probably
arent super super super risky...
Wednesday, May 1, 13
SRS Business
 Hollaback. Cell phone pics of street
harassment.
 Public callouts of public bad behavior,
whether pseudonymous or real name
 Twitter hashtags, mockery
 ShitRedditSays started reporting on public
misogyny. Outing and doxxing of
violentacrez ... ie googling and his beer
buddy told on him.
Wednesday, May 1, 13
FERT was born
 Feminist Emergency Response Team!
Wednesday, May 1, 13
Lower risk high risk
hacker activity
 Neighbor in domestic violence crisis, we found
her husband in herYahoo email and her phone
 Ex-pat Syrian journalist getting death threats.
Looked at email headers, IP and told her it was
not obviously a local threat or a threat from
within Syria
 Palestinian activist convinced site was hacked by
Israeli govt. Were able to show them it was just a
spambot, php/sql injection
 Advised feminist blogger undergoing 4chan raid
Wednesday, May 1, 13
Stay Safe (or not)
Wednesday, May 1, 13
Create possibilities
Wednesday, May 1, 13
Ad

Recommended

Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Andrew Schwabe
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
Impacts of Leak Sites - Masayuki Hatta (Surugadai University)
mysociety
Comm law ppt invasion of privacy
Comm law ppt invasion of privacy
Julie Price
Gawker v. Hulk Hogan v. Peter Thiel
Gawker v. Hulk Hogan v. Peter Thiel
Dan Kennedy
Picamp ntk
Picamp ntk
Paul Evans
Chapter 14 - Privacy - JNL-2105 - Journalism Ethics - Professor Linda Austin ...
Chapter 14 - Privacy - JNL-2105 - Journalism Ethics - Professor Linda Austin ...
Linda Austin
Libel Law
Libel Law
StudentPressLawCenter
People. The Social Engineer's Dream - TechPulse 2017
People. The Social Engineer's Dream - TechPulse 2017
Evan Francen
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
Class 11 fall 2016 slides
Class 11 fall 2016 slides
bmitchslides
Web and politics
Web and politics
Willem Kuypers
Plagiarism secondary
Plagiarism secondary
Heather Lewis
What we can learn from LulzSec
What we can learn from LulzSec
Positive Hack Days
Writefor media ucsd_ext_spring12_2
Writefor media ucsd_ext_spring12_2
dml communications
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
Gabor Szathmari
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
Frederick Lane
Plagiarism Lesson 2018
Plagiarism Lesson 2018
Elisabeth Palmer Abarbanel
Test on BB
Test on BB
nickstroller
OSINT
OSINT
Apurv Singh Gautam
Xavier Johnson Powerpoint
Xavier Johnson Powerpoint
xavierjohnson
Administracion )
jackebt
Code Of Our Own
Code Of Our Own
Liz Henry
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
jackebt
Fight Spam and Hackers!
Fight Spam and Hackers!
Liz Henry
Crowdsourced fact checking
Crowdsourced fact checking
Liz Henry
Bad inventions-talk
Bad inventions-talk
Liz Henry
Awesome bugzilla-tricks-slides2
Awesome bugzilla-tricks-slides2
Liz Henry
Cartilla Part 2
Cartilla Part 2
jackebt

More Related Content

What's hot (14)

Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
Class 11 fall 2016 slides
Class 11 fall 2016 slides
bmitchslides
Web and politics
Web and politics
Willem Kuypers
Plagiarism secondary
Plagiarism secondary
Heather Lewis
What we can learn from LulzSec
What we can learn from LulzSec
Positive Hack Days
Writefor media ucsd_ext_spring12_2
Writefor media ucsd_ext_spring12_2
dml communications
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
Gabor Szathmari
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
Frederick Lane
Plagiarism Lesson 2018
Plagiarism Lesson 2018
Elisabeth Palmer Abarbanel
Test on BB
Test on BB
nickstroller
OSINT
OSINT
Apurv Singh Gautam
Xavier Johnson Powerpoint
Xavier Johnson Powerpoint
xavierjohnson
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
Class 11 fall 2016 slides
Class 11 fall 2016 slides
bmitchslides
Plagiarism secondary
Plagiarism secondary
Heather Lewis
What we can learn from LulzSec
What we can learn from LulzSec
Positive Hack Days
Writefor media ucsd_ext_spring12_2
Writefor media ucsd_ext_spring12_2
dml communications
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and youre all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
Gabor Szathmari
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
Frederick Lane
Xavier Johnson Powerpoint
Xavier Johnson Powerpoint
xavierjohnson

Viewers also liked (8)

Administracion )
jackebt
Code Of Our Own
Code Of Our Own
Liz Henry
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
jackebt
Fight Spam and Hackers!
Fight Spam and Hackers!
Liz Henry
Crowdsourced fact checking
Crowdsourced fact checking
Liz Henry
Bad inventions-talk
Bad inventions-talk
Liz Henry
Awesome bugzilla-tricks-slides2
Awesome bugzilla-tricks-slides2
Liz Henry
Cartilla Part 2
Cartilla Part 2
jackebt
Administracion )
jackebt
Code Of Our Own
Code Of Our Own
Liz Henry
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
S I S T E M A D E I N V E N T A R I O P E R M A N E N T E
jackebt
Fight Spam and Hackers!
Fight Spam and Hackers!
Liz Henry
Crowdsourced fact checking
Crowdsourced fact checking
Liz Henry
Bad inventions-talk
Bad inventions-talk
Liz Henry
Awesome bugzilla-tricks-slides2
Awesome bugzilla-tricks-slides2
Liz Henry
Cartilla Part 2
Cartilla Part 2
jackebt
Ad

Similar to Tracking trollers (20)

Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Marie Notcheva
Joakim Jardenberg's presentation
Joakim Jardenberg's presentation
dxfswe
How to protect black journalists from online abuse #NABJ17
How to protect black journalists from online abuse #NABJ17
Wendi C. Thomas
Internet safety
Internet safety
cameronfurnival
Privacy and libraries
Privacy and libraries
Dorothea Salo
Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next Generation
James Arlen
Columbus Startup Weekend 3.1.13 - Hustle Town deck
Columbus Startup Weekend 3.1.13 - Hustle Town deck
Dan Rockwell
5 Ways To Overcome The Fear And Dread Of Networking
5 Ways To Overcome The Fear And Dread Of Networking
John Muscarello
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Marie Notcheva
Bullying by Grady
Bullying by Grady
Luseland School
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
ICT Watch - Indonesia
Using BuddyPress as a Directory - BuddyCamp Minneapolis 2013
Using BuddyPress as a Directory - BuddyCamp Minneapolis 2013
vegasgeek
Social Media - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
Social Media - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
Zarb School of Business, Hofstra University
The internet
The internet
Donna Luna
Social media presentation
Social media presentation
LaQuesha Moore
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015
James LaPorte
5B Bullying henry, warren, john, issaih
5B Bullying henry, warren, john, issaih
ktrefz
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Christians and the Internet - Being Aware; Being Equipped; and Being Good Wit...
Marie Notcheva
Joakim Jardenberg's presentation
Joakim Jardenberg's presentation
dxfswe
How to protect black journalists from online abuse #NABJ17
How to protect black journalists from online abuse #NABJ17
Wendi C. Thomas
Privacy and libraries
Privacy and libraries
Dorothea Salo
Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next Generation
James Arlen
Columbus Startup Weekend 3.1.13 - Hustle Town deck
Columbus Startup Weekend 3.1.13 - Hustle Town deck
Dan Rockwell
5 Ways To Overcome The Fear And Dread Of Networking
5 Ways To Overcome The Fear And Dread Of Networking
John Muscarello
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Marie Notcheva
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
ICT Watch - Indonesia
Using BuddyPress as a Directory - BuddyCamp Minneapolis 2013
Using BuddyPress as a Directory - BuddyCamp Minneapolis 2013
vegasgeek
Social Media - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
The internet
The internet
Donna Luna
Social media presentation
Social media presentation
LaQuesha Moore
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
The Science of Sharing - SXSW 2015
The Science of Sharing - SXSW 2015
James LaPorte
5B Bullying henry, warren, john, issaih
5B Bullying henry, warren, john, issaih
ktrefz
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
Ad

Tracking trollers

  • 1. BootstrappingYour Hacktivist Community Kiwicon 6 2012 Liz Henry @lizhenry Wednesday, May 1, 13
  • 2. I will now tell you how to make a hacktivist community Wednesday, May 1, 13
  • 4. What is hacktivism? Legal or lower risk hacking: Reporting, citizen journalism (maybe) Outing people for something Protest, petition, policy, law changes Civil disobedience (maybe) Wednesday, May 1, 13
  • 7. And community? For community, you need trust Wednesday, May 1, 13
  • 9. Lower Risk hacktivism Publicity. Use all possible social capital. Get consent, protect privacy, personal security, personal data if possible. Rhizomatic spread. Dont wait for the boss. Action plan. Group chat. Collectively edit some documents. Needs list. Schedule. Report on what is effective.Ask for more. Wednesday, May 1, 13
  • 10. Emergency power! Hurricane Sandy Existing communities, social capital among disabled people online Incredibly fast mobilization, public call, in- person help from friends of friends of friends, nearly random strangers Wednesday, May 1, 13
  • 11. Higher risk Reporting or citizen journalism (maybe) In鍖ltration, espionage Leaking military or other secret info Messing with governments, huge corporations, organized crime Wednesday, May 1, 13
  • 12. Who will you piss off? Professional reputation/status? Stalkers or other hostile individuals? Intellectual property, legal, hacking laws Repressive government, military? Mexican drug cartel? Russian ma鍖a? In short, what are you risking? Wednesday, May 1, 13
  • 13. Example: Editing the Zetas Whats the threat level if you want to edit some Wikipedia pages about Mexican drug cartels? Where are you? Not-Mexico: Make persona, use Tor +VPN Mexico or near: Maybe thats not enough Wednesday, May 1, 13
  • 14. Nuevo Laredo carspotting Chat rooms to report on dangerous stuff Green Chevy at corner of 9th and Main every afternoon Roadblock on the west road out of downtown Wednesday, May 1, 13
  • 15. sms blogging blog from burner phones vojo.co has all-phone setup Wednesday, May 1, 13
  • 16. Risks, maybe Someone shoulder surfs you in a cafe and shoots you in the head later Keylogging, insecure connection Site youre on is run by gangsters. Oops! Or is on phpBB or something scarier (narcomensajes, torture, murder) Wednesday, May 1, 13
  • 17. Consider Risk Are youre risking your freedom? Or your life Or other peoples lives Make sure its what you want to risk For a good reason! Wednesday, May 1, 13
  • 18. There are good reasons Wednesday, May 1, 13
  • 19. Why? What are your reasons and goals Publicity? (Then stick to lower risk) Personal studliness? (Dont!) Expose truth? Freedom 鍖ghter? Wednesday, May 1, 13
  • 20. How to make a hacker community Wednesday, May 1, 13
  • 22. Or, 鍖rst... At least pause Ethics of encouraging others to do high risk things on some crappy Windows machine with LOIC or whatever.Yeah. Learn security, anonymity, privacy Put them into practice Practice! Wednesday, May 1, 13
  • 23. Before yall do this. . . Wednesday, May 1, 13
  • 26. Feminist Hackers Bunch of women hackers talking Why is there a false accusers wiki run by MRAs, but no rapists wiki run by rape survivors? Unfair and wrong! OMG Haxxors! Retaliation (identity/safety/DDoS) Defamation, legal threats Wednesday, May 1, 13
  • 28. Pick your cool haxxor names! We thought of some great ones Most of them were totally contaminated Anyway, they sounded like roller derby names And we were telling them to each other, which was dumb, but we realized that about 2 minutes in Wednesday, May 1, 13
  • 29. So I can never secretly be Louise Boat.This makes me very sad. Wednesday, May 1, 13
  • 31. Testing each other We looked at what info we were leaking by accident, and what we knew or could deduce or 鍖nd about each other. Some of us were better at it than others. Wednesday, May 1, 13
  • 32. We found a lot of leaks Wednesday, May 1, 13
  • 33. Some hackers are more equal than others We all had some practice, because we are all women talking in public and thus, present more attack surface Various factors made some of us more vulnerable than others: queer, trans, people of color, homeless, have kids, domestic violence survivors... Those factors often encourage more practice in privacy, anonymity, pseudonymity Wednesday, May 1, 13
  • 34. Check your privilege If youre hacking in a high risk way youre risking everyone around you. The others in your hacktivist community may be at risk merely by being associated with you Protect your contacts Wednesday, May 1, 13
  • 43. Ops checklist Safer computer, software (encrypt) Physical security (for your computer!) Safer connection (Tor, thenVPN?) Persona management. Shut your pie hole! Wednesday, May 1, 13
  • 44. More leak vectors to consider Location, time, time zone. Avoid patterns! Password hygiene Paying for stuff clicking links someone sends... (dont) Panopticlick (browser 鍖ngerprinting) Tor, thenVPN(s) Wednesday, May 1, 13
  • 45. Study security, privacy, anonymity guides EFF guide Internews, CPJ guides TOR, crypto.is Study together Thats still not good enough Wednesday, May 1, 13
  • 46. You must be 鍖awless Wednesday, May 1, 13
  • 47. Consciousness Raising Bootstrapping new hackers is hard. Consider your personal identity and what attack surface you present. This will take some discussion and thought. You will get a community that is capable of hacking something for some reason someday. Maybe in a crisis. Its political consciousness raising Wednesday, May 1, 13
  • 49. But neither is jail Wednesday, May 1, 13
  • 51. Medium risk hacking Theres still things to do that probably arent super super super risky... Wednesday, May 1, 13
  • 52. SRS Business Hollaback. Cell phone pics of street harassment. Public callouts of public bad behavior, whether pseudonymous or real name Twitter hashtags, mockery ShitRedditSays started reporting on public misogyny. Outing and doxxing of violentacrez ... ie googling and his beer buddy told on him. Wednesday, May 1, 13
  • 53. FERT was born Feminist Emergency Response Team! Wednesday, May 1, 13
  • 54. Lower risk high risk hacker activity Neighbor in domestic violence crisis, we found her husband in herYahoo email and her phone Ex-pat Syrian journalist getting death threats. Looked at email headers, IP and told her it was not obviously a local threat or a threat from within Syria Palestinian activist convinced site was hacked by Israeli govt. Were able to show them it was just a spambot, php/sql injection Advised feminist blogger undergoing 4chan raid Wednesday, May 1, 13
  • 55. Stay Safe (or not) Wednesday, May 1, 13