Considering they'd even earlier today advertised a Monday booty release, I suspect that, rather than abandoning the Lulzsec facade after 50 days, it's that the fuzz is a little too hot on their trail for comfort.
I'd have to agree. Even now I think that with time they will all be outed - if they've not already. Some of these 'raids' have just been too daring to expect to get away with forever.
Damn, the AT&T-release is especially juicy. It contains a lot of highly confidential information about technology and strategy that their competitors would love to get their hands on.
I'm a quite technical guy and I barely understand a thing. No wonders AT&T are having troubles with fixing their network troubles, it looks like a massive, massive beast of technology.
My first job out of college was at Nortel, coding their 4G data network infrastructure. I still think I only understood about 20% of the big picture by the time I left. So many moving parts, massive code base and tons of acronyms.
What about analyzing their writing? They release quite a bit of text...somebody likes to write. Considering there are efforts to identify people by typing patterns, I wonder if this is how they'll get caught: http://petsymposium.org/2011/papers/hotpets11-final8Chairunn...
Unfortunately given the scope of that paper, it doesn't sound like typing patterns can be used just yet. A sample size of 36 participants doesn't handle the scale involved when going against 'The Internet'.
Also, the paper collected timestamps of each keystroke, something that'd need to done on suspects; however, if they are already suspecting you, they probably have other ways to identify you.
Finally, how in the world does a paper like this get away with having 'nowadays' in it? I know its a legit word, but, just seems awkward.
Note that the press release was two days ago, after NATO was notified by police. AFAIK, this is the first that Lulzsec has disclosed that the NATO bookstore was hit, which means the police knew before we did. That can't be good for those behind the mask.
Given that the LulzSec name was a clique from AnonOps rebranding itself to begin with, I would bet on the latter. Although it may be a while before we hear of them pulling such flamboyant stunts again.
Looks like they were a getting a bit anxious that they were going to be outed, which will ultimately still happen anyway. Regardless, it was a fun reading their Pastebins and Twitter feeds every few days making a mockery of multiple corporations information security.
I was going to say something snarky, but I checked your comment history and it seems you are on here seldom enough to explain an honest lack of knowledge about them. Basically, LulzSec is a hacking group that has been attacking many targets very publicly over the past 2 months. They've been all over HN, /., reddit, etc. They've even earned some mentions in the MSM.
Basically, they're notable for a) the number of targets they've hit, b) how brazen they are about it (hitting the FBI, CIA, and other law enforcement agencies), and c) how vigorously they court publicity (270k followers on Twitter).
[+] [-] ianterrell|14 years ago|reply
[+] [-] 46Bit|14 years ago|reply
[+] [-] kristofferR|14 years ago|reply
I'm a quite technical guy and I barely understand a thing. No wonders AT&T are having troubles with fixing their network troubles, it looks like a massive, massive beast of technology.
I found the frequency chart fascinating. It's available publicly here: http://www.ntia.doc.gov/osmhome/allochrt.pdf
[+] [-] ender7|14 years ago|reply
[+] [-] Skywing|14 years ago|reply
[+] [-] unknown|14 years ago|reply
[deleted]
[+] [-] aklemm|14 years ago|reply
[+] [-] tsumnia|14 years ago|reply
Also, the paper collected timestamps of each keystroke, something that'd need to done on suspects; however, if they are already suspecting you, they probably have other ways to identify you.
Finally, how in the world does a paper like this get away with having 'nowadays' in it? I know its a legit word, but, just seems awkward.
[+] [-] dmix|14 years ago|reply
http://www.nato.int/cps/en/SID-40BE0A99-F4F5EB32/natolive/ne...
[+] [-] ianterrell|14 years ago|reply
[+] [-] jfb|14 years ago|reply
[+] [-] estel|14 years ago|reply
* EA (Battlefield Heroes) * Hackforums.net * Nato-bookshop.org * Misc other forums
The first of these purports to be 200K+ users.
[+] [-] Strom|14 years ago|reply
[+] [-] ianterrell|14 years ago|reply
[+] [-] Zarathust|14 years ago|reply
http://www.gamemarshal.com/features/20110622113313/lulzsec-h...
[+] [-] lhnz|14 years ago|reply
[+] [-] BasDirks|14 years ago|reply
Or to put my high school poetics into plain English:
They will want to blend in with the Anonymous masses, until they deem it safe to once again to craft new identities for themselves.
[+] [-] chao-|14 years ago|reply
[+] [-] skeltoac|14 years ago|reply
[+] [-] cantbecool|14 years ago|reply
[+] [-] Tichy|14 years ago|reply
[+] [-] trotsky|14 years ago|reply
[+] [-] shareme|14 years ago|reply
Not too smart either why include the number of Lulzsec members?
[+] [-] sbierwagen|14 years ago|reply
2.) What makes you think that they're not lying?
[+] [-] Mad_Dud|14 years ago|reply
[+] [-] alvivar|14 years ago|reply
[+] [-] tathagatadg|14 years ago|reply
[+] [-] mrb|14 years ago|reply
[+] [-] redthrowaway|14 years ago|reply
Basically, they're notable for a) the number of targets they've hit, b) how brazen they are about it (hitting the FBI, CIA, and other law enforcement agencies), and c) how vigorously they court publicity (270k followers on Twitter).
[+] [-] Periodic|14 years ago|reply