Operation Payback: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Removed parameters. | Use this bot. Report bugs. | Suggested by Abductive | Category:Sarah Palin | #UCB_Category 16/36
m fix link
Tags: Mobile edit Mobile app edit iOS app edit App section source
 
(5 intermediate revisions by 4 users not shown)
Line 1:
{{short description|Series of cyberattacks conducted by Anonymous}}
'''Operation Payback''' was a coordinated,<ref>{{cite news |url=https://www.bbc.co.uk/news/technology-11971259 |title=Anonymous Wikileaks supporters explain web attacks |date=2010-12-10 |access-date=2010-12-10 |work=bbc.co.uk |publisher=[[BBC]]}}</ref> decentralized<ref>{{cite web |url=http://gawker.com/5710948/the-top-three-myths-about-anonymous |title=The Top Three Myths About Anonymous |first=Adrian |last=Chen |date=2010-12-09 |access-date=2010-12-11 |work=gawker.com |publisher=[[Gawker]]}}</ref> group of attacks on high-profile<ref>Bodmer, Kilger, Carpenter, & Jones, [[Reverse Deception: Organized Cyber Threat Counter-Exploitation]], (2012) McGraw-Hill Osborne Media. {{ISBN|0071772499}}</ref> opponents of [[Internet piracy]] by [[Internet activist]]s using the "[[Anonymous (group)|Anonymous]]" moniker. Operation Payback started as retaliation to [[denial-of-service attack|distributed denial of service]] (DDoS) attacks on [[TorrentCopyright fileinfringement#Peer-to-peer issues|torrent]] sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. The [[Motion Picture Association|Motion Picture Association of America]], the [[Pirate Party UK]] and [[United States Pirate Party]] criticised the attacks.
 
Following the [[United States diplomatic cables leak]] in December 2010, the organizers commenced DDoS attacks on websites of banks who had withdrawn banking facilities from [[WikiLeaks]].
Line 17:
When the site came back online a 350[[Megabyte|MB]] file, which was a backup of the site, was visible to anyone for a short period of time.<ref name="theregister4">{{cite news |title=Anti-piracy lawyers' email database leaked after hack |first=John |last=Leydon |newspaper=The Register |date=2010-09-27 |url=https://www.theregister.co.uk/2010/09/27/anti_piracy_lawyer_email_leak/ |access-date=2010-10-22}}</ref> The backup, which included copies of emails sent by the firm, was downloaded and made available on various [[peer-to-peer]] networks and websites including [[The Pirate Bay]].<ref name="theregister4"/><ref>{{cite web |url=https://www.wired.co.uk/news/archive/2010-09/27/leaked-emails-fuel-anti-piracy-scandal |title=Leaked emails fuel anti-piracy scandal |first=Duncan |last=Geere |publisher=Wired.co.uk |date=2010-09-27 |access-date=2010-09-27 |archive-url=https://web.archive.org/web/20100928164025/http://www.wired.co.uk/news/archive/2010-09/27/leaked-emails-fuel-anti-piracy-scandal |archive-date=2010-09-28 |url-status=dead }}</ref><ref>{{cite web |url=http://torrentfreak.com/acslaw-anti-piracy-law-firm-torn-apart-by-leaked-emails-100925/ |title=ACS:Law Anti Piracy Law Firm Torn Apart by Leaked Emails |author=enigmax |publisher=TorrentFreak |date=2010-09-25 |access-date=2010-12-23}}</ref> Some of the emails contained unencrypted [[Microsoft Excel|Excel]] spreadsheets, listing the names and addresses of people that ACS:Law had accused of illegally sharing media. One contained more than 5,300 [[Sky broadband]] customers whom they had accused of illegally sharing [[pornography]],<ref>{{cite news |last=Emery |first=Daniel |url=https://www.bbc.co.uk/news/technology-11418962 |title=Adult video-sharing list leaked from law firm |work=BBC News |date=2010-09-27 |access-date=2010-09-27}}</ref><ref>{{cite web |url=http://www.bbc.co.uk/newsbeat/11430299 |title='My details appeared on 'porn' list' |date=2010-09-28 |publisher=BBC |access-date=2010-12-23}}</ref> while another contained the details of 8,000 Sky customers and 400 [[Plusnet]] customers accused of infringing the copyright on music by sharing it on [[Peer-to-peer file sharing|peer-to-peer networks]].<ref>{{cite news|last=Emery |first=Daniel |url=https://www.bbc.co.uk/news/technology-11425789|title=Fresh ACS:Law file-sharing lists expose thousands more|date=2010-09-28 |access-date=2010-09-28 |work=BBC News}}</ref> This alleged breach of the [[Data Protection Act 1998|Data Protection Act]] has become part of the ongoing investigation into ACS:Law by the [[Information Commissioner's Office]].<ref>{{cite news|last=Emery |first=Daniel |url=https://www.bbc.co.uk/news/technology-11434809|title=BT embroiled in ACS:Law porn list breach|date=2010-09-29 |access-date=2010-09-29 |work=BBC News}}</ref><ref>{{cite news|last=Emery |first=Daniel |url=https://www.bbc.co.uk/news/technology-11418970|title=ACS:Law could face £500,000 fine for porn list leak|date=2010-09-28 |access-date=2010-09-28 |work=BBC News}}</ref>
 
On September 30, the [[Leesburg, Virginia]] office of Dunlap, Grubb & Weaver law firm &ndash; also doing business as the "[[US Copyright Group|U.S. Copyright Group]]"<ref>{{cite web |url=http://www.techdirt.com/articles/20100903/11144710895.shtml |title=Hurt Locker Subpoenas Arrive With New Language ... And Higher Demands |first=Mike |last=Masnick |work=Techdirt |date=2010-09-03 |access-date=2010-11-28}}</ref> &ndash; was evacuated by the police after an emailed bomb threat was received.<ref>{{cite web |url=http://www.leesburg2day.com/articles/2010/09/30/news/9513bombthreat093010.txt |title=Investigators Track Leads In Bomb Threat At Leesburg Law Office |date=2010-09-30 |access-date=2010-10-27 |first=Erika Jacobson |last=Moore |publisher=Leesburg Today |work=leesburg2day.com }}{{Dead link|date=January 2024 |bot=InternetArchiveBot |fix-attempted=yes }}</ref><ref>{{cite web |url=http://www.leesburgva.gov/index.aspx?recordid=872&page=29 |title= Leesburg Police Investigating Bomb Threat |work=leesburgva.gov |date=2010-09-30 |access-date=2010-12-23 |archive-date=2011-07-19 |archive-url=https://web.archive.org/web/20110719141728/http://www.leesburgva.gov/index.aspx?recordid=872&page=29 |url-status=dead }}</ref> It's believed the event could be connected to Anonymous.<ref name="torrentfreak-3">{{cite web |url=http://torrentfreak.com/anti-piracy-law-firm-evacuated-after-bomb-threat-101001/ |title=Anti-Piracy Law Firm Evacuated After Bomb Threat |date=2010-10-01 |access-date=2010-10-27 |publisher=TorrentFreak |author=Ernesto}}</ref> Non-related copyright or law firms sites, such as websheriff.com,<ref name="slyck"/> were also attacked. These attacks were originally organized through an [[Internet Relay Chat]] channel.<ref name="theregister1"/> The attacks also became a popular topic on [[Twitter]].<ref name="theregister1"/>
 
===Australian pro-copyright organization===
Line 64:
You cannot hide.
 
Stay tuned<ref name="Mennecke1">{{cite web |url=http://www.slyck.com/story2088_Gene_Simmons_Directly_Threatens_Anonymous_With_Legal_Action_Jail_Time |title=Gene Simmons Directly Threatens Anonymous With Legal Action, Jail Time |last=Mennecke |first=Thomas |date=2010-10-17 |publisher=SLYK |access-date=2010-10-12 |archive-date=2010-10-20 |archive-url=https://web.archive.org/web/20101020081701/http://www.slyck.com/story2088_Gene_Simmons_Directly_Threatens_Anonymous_With_Legal_Action_Jail_Time |url-status=dead }}</ref>}}
 
This led to additional attacks and subsequently more downtime for his websites.<ref name="Mennecke1"/><ref name="Read">{{cite web |url=http://gawker.com/5666411/gene-simmons-doesnt-understand-the-internet |title=Gene Simmons Doesn't Understand the Internet |last=Read |first=Max |date=2010-10-18<!-- 03:40 AM--> |work=[[Gawker]] |access-date=2010-10-20}}</ref><ref name="Anderson">{{cite news |url=https://arstechnica.com/tech-policy/news/2010/10/gene-simmons-vs-anonymous-whos-the-bigger-asshole.ars |title=Gene Simmons vs. Anonymous: Who's the bigger tool? |last=Anderson |first=Nate |work=[[Ars Technica]] |date=2010-10-18 |access-date=2010-10-20}}</ref><ref>{{cite web |url=http://laeknishendr.wordpress.com/2010/10/18/gene-simmons-vs-anonymous/ |title=Gene Simmons vs Anonymous |author=laeknishendr |work=Danger Nazi Zombies Ahead |publisher=WordPress |date=2010-10-18 |access-date=2010-10-20}}</ref> Later, Simmons's message was removed from his website.<ref>{{cite web |url=http://genesimmons.com/102010.html |title=GeneSimmons.com Archive News |access-date=2010-10-30 |publisher=[[Gene Simmons]] |archive-url=https://web.archive.org/web/20110115051159/http://www.genesimmons.com/102010.html |url-status=dead |archive-date=2011-01-15}}</ref> More than one year later, in December 2011, a person supposedly known under the nickname "spydr101" was arrested in relation to the attack against GeneSimmons.com. He was charged with conspiracy and unauthorized impairment of a protected computer.<ref>{{cite news |url=http://latimesblogs.latimes.com/lanow/2011/12/man-feds-say-connected-to-anonymous-hackers-man-charged-in-kiss-hacking-case.html |title='Anonymous' hacker charged in breach of KISS' Gene Simmons' website |date=2011-12-13 |access-date=2011-12-13 |author=Andrew Blankstein |work=[[Los Angeles Times]]}}</ref><ref>{{cite news |url=http://edition.cnn.com/2011/12/13/us/california-gene-simmons-anonymous/ |title=Hacker tied to Anonymous charged with targeting GeneSimmons.com |publisher=CNN |author=Michael Martinez |date=2011-12-14 |access-date=2011-12-14}}</ref><ref>{{cite news |url=https://www.reuters.com/article/us-genesimmons-hacker-idUSTRE7BC2MQ20111214 |title=Alleged Gene Simmons website hacker arrested |date=2011-12-13 |access-date=2011-12-13 |publisher=Reuters |first=Jill |last=Serjeant}}</ref>
Line 78:
Around October 28, 2010, the group set up a new website with the intention of coordinating protests around the world to raise awareness of their cause. The date for the protest activities were on November 5, the intended day of the [[Gunpowder Plot]], with which Anonymous heavily affiliates through its use of [[Guy Fawkes]] masks.
 
The protest activity included an attack on the [[United States Copyright Office]], after which the [[Federal Bureau of Investigation|FBI]] launched an investigation.<ref name="cnet">{{cite web |url=http://news.cnet.com/8301-31001_3-20022264-261.html |title=FBI probes 4chan's 'Anonymous' DDoS attacks |first=Greg |last=Sandoval |publisher=[[CNET.com]] |date=2010-11-09 |access-date=2010-12-23}}</ref> They later arrested one person accused of taking part in the attack on [[PayPal]].<ref name=nl>{{cite news|last=Sterling|first=Toby|title=Dutch give details on 4 'Anonymous' hacker arrests|url=http://news.smh.com.au/breaking-news-technology/dutch-give-details-on-4-anonymous-hacker-arrests-20110721-1hp9g.html|access-date=21 July 2011|newspaper=[[The Sydney Morning Herald]]|date=21 July 2011|agency=[[Fairfax Media]]|archive-url=https://wwwarchive.webcitation.orgtoday/20121230153054/60Lj08HZB?url=http://news.smh.com.au/breaking-news-technology/dutch-give-details-on-4-anonymous-hacker-arrests-20110721-1hp9g.html|archive-date=2130 JulyDecember 20112012|url-status=live|location=[[Sydney]]}}</ref>
 
===Hiatus and resumption of website attacks===
Line 84:
 
==Sarah Palin==
On December 8, 2010, U.S. politician [[Sarah Palin]] announced that her website and personal credit card information were compromised.<ref name="sarah-1"/> Palin's team believed the attack was executed by Anonymous, though Anonymous never commented about Palin as a possible target for any attack.<ref name="sarah-1"/><ref name="metro">{{cite web |url=http://www.metro.co.uk/tech/849918-sarah-palin-website-hit-by-wikileaks-operation-payback-ddos-attack |title=Sarah Palin website hit by WikiLeaks Operation Payback DDoS attack |date=2010-12-09 |access-date=2010-12-09 |work=metro.co.uk |publisher=[[Metro (British newspaper)|Metro]] |first=Tom |last=Phillips}}</ref><ref name="sarah-2"/> Palin's technical team posted a screenshot of a server log file showing the wikileaks.org [[URL]].<ref name="sarah-1"/><ref name="sarah-2">{{cite web |url=http://www.theatlanticwire.com/opinions/view/opinion/Is-Palin-Just-Using-Operation-Payback-to-Get-Attention-6125 |title=Is Palin Just Using 'Operation Payback' to Get Attention? |first=John |last=Hudson |work=theatlanticwire.com |publisher=The Atlantic Wire |date=2010-12-09 |access-date=2010-12-09 |archive-date=2010-12-11 |archive-url=https://web.archive.org/web/20101211120803/http://www.theatlanticwire.com/opinions/view/opinion/Is-Palin-Just-Using-Operation-Payback-to-Get-Attention-6125 |url-status=dead }}</ref> Visa attacks had been denial of service attacks, but credit card data was not compromised. It is unknown whether Palin's card was compromised as part of a broad attack on Visa or a specific attack on the Palins.<ref name="sarah-2"/>
 
==Operation Avenge Assange==
 
In December 2010, [[WikiLeaks]] came under intense pressure to stop publishing secret U.S. diplomatic cables. Corporations such as [[Amazon.com|Amazon]], [[PayPal]], [[BankAmerica]], Swiss bank [[PostFinance]], [[MasterCard]] and [[Visa Inc.|Visa]] either stopped working with or froze their customers' donations to WikiLeaks due to political pressures. In response, those behind Operation Payback directed their activities against these companies.<ref name="panda">{{cite web|url=http://pandalabs.pandasecurity.com/operationpayback-broadens-to-operation-avenge-assange/ |title=Operation:Payback broadens to "Operation Avenge Assange" |work=pandasecurity.com |date=2010-12-06 |access-date=2010-12-09 |first=Sean-Paul |last=Correll |publisher=[[Panda Security]] |url-status=dead |archive-url=https://web.archive.org/web/20101208061947/http://pandalabs.pandasecurity.com/operationpayback-broadens-to-operation-avenge-assange/ |archive-date=December 8, 2010 }}</ref><ref>{{cite news |url=http://thelede.blogs.nytimes.com/2010/12/06/latest-updates-on-leak-of-u-s-cables-day-9/#operation-payback-plans-attacks-on-paypal |title=Latest Updates on Leak of U.S. Cables, Day 9 |work=[[The New York Times]] |first=Robert |last=Mackey |date=2010-12-06 |access-date=2010-12-07}}</ref> Operation Payback launched DDoS attacks against PayPal, PostFinance and the [[Law enforcement in Sweden#Swedish Prosecution Authority|Swedish Prosecution Authority]].<ref name="rawstory1">{{cite web |url=http://www.rawstory.com/rs/2010/12/hackers-website-bank-froze-wikileaks-funds/ |title=Hackers take down website of bank that froze WikiLeaks funds |first=Daniel |last=Tencer |work=The Raw Story |date=2010-12-06 |access-date=2010-12-07 |archive-date=2010-12-08 |archive-url=https://web.archive.org/web/20101208235538/http://www.rawstory.com/rs/2010/12/hackers-website-bank-froze-wikileaks-funds/ |url-status=dead }}</ref><ref>{{cite news |url=https://www.theguardian.com/news/blog/2010/dec/07/wikileaks-us-embassy-cables-live-updates |title=WikiLeaks US embassy cables: live updates |first1=Matthew |last1=Weaver |first2=Richard |last2=Adams |work=The Guardian |date=2010-12-07 |access-date=2010-12-07 |location=London}}</ref><ref>{{cite web |url=http://www.eweek.com/c/a/Security/PayPal-PostFinance-Hit-by-DoS-Attacks-CounterAttack-in-Progress-860335/ |archive-url=https://archive.today/20121209011911/http://www.eweek.com/c/a/Security/PayPal-PostFinance-Hit-by-DoS-Attacks-CounterAttack-in-Progress-860335/ |url-status=dead |archive-date=December 9, 2012 |title=PayPal, PostFinance Hit by DoS Attacks, Counter-Attack in Progress |first=Fahmida Y. |last=Rashid |work=eWeek.com |date=2010-12-06 |access-date=2010-12-07 }}</ref> On December 8, 2010, a coordinated DDoS attack by Operation Payback brought down both the MasterCard and Visa websites.<ref>{{cite news |title=Cyberwar: Now Hackers Have Taken Down Mastercard.com As Revenge For Julian Assange |first=Joe |last=Weisenthal |url=http://www.businessinsider.com/cyber-hackers-that-took-down-swiss-bank-site-have-now-taken-down-mastercardcom-2010-12 |newspaper=Business Insider |date=2010-12-08 |access-date=2010-12-23}}</ref><ref>{{cite news |url=https://www.theguardian.com/world/2010/dec/08/wikileaks-visa-mastercard-operation-payback |title=WikiLeaks supporters disrupt Visa and MasterCard sites in 'Operation Payback' |date=2010-12-09 |access-date=2010-12-09 |first1=Esther |last1=Addley |first2=Josh |last2=Halliday |publisher=[[The Guardian]] |work=guardian.co.uk |location=London}}</ref><ref>{{cite news |url=https://www.pcmag.com/article2/0,2817,2374023,00.asp |title='Anonymous' Launches DDoS Attacks Against WikiLeaks Foes |work=pcmag.com |publisher=[[PC Magazine]] |first=Leslie |last=Horn |date=2010-12-08 |access-date=2010-12-09}}</ref><ref>{{cite web |url=http://www.boingboing.net/2010/12/08/in-pro-wikileaks-act.html |title=Continuing pro-WikiLeaks DDOS actions, Anonymous takes down PayPal.com |first=Xeni |last=Jardin |date=2010-12-08 |access-date=2010-12-09 |work=boingboing.net |publisher=[[Boing Boing]]}}</ref> On December 9, 2010, prior to a sustained DDoS attack on the PayPal website that caused a minor slowdown to its service, PayPal announced on its blog that it would release the frozen funds in the account of the [[Wau Holland Foundation]] that was raising funds for WikiLeaks, but would not reactivate the account.<ref>{{cite web |url=https://www.thepaypalblog.com/2010/12/updated-statement-about-wikileaks-from-paypal-general-counsel-john-muller/ |title=Updated Statement about WikiLeaks from PayPal General Counsel, John Muller |first=John |last=Muller |work=thepaypalblog.com |publisher=[[PayPal]] |date=2010-12-08 |access-date=2010-12-09 |archive-url=https://web.archive.org/web/20110108115822/https://www.thepaypalblog.com/2010/12/updated-statement-about-wikileaks-from-paypal-general-counsel-john-muller/ |url-status=dead |archive-date=2011-01-08}}</ref><ref>{{cite web |url=http://erictric.com/2010/12/08/paypal-vows-to-release-wikileaks-funds-account-to-remain-blocked/ |title=PayPal Vows to Release WikiLeaks Funds, Account to Remain Blocked |first=Bertrand |last=Vasquez |date=2010-12-08 |access-date=2010-12-09 |work=erictric.com |archive-date=2011-04-12 |archive-url=https://web.archive.org/web/20110412092610/http://erictric.com/2010/12/08/paypal-vows-to-release-wikileaks-funds-account-to-remain-blocked/ |url-status=dead }}</ref> Regarding the attacks, WikiLeaks spokesman Kristinn Hrafnsson denied any relation to the group and said, "We neither condemn nor applaud these attacks. We believe they are a reflection of public opinion on the actions of the targets."<ref>{{cite web|url=http://wikileaks.ch/articles/2010/Statement-on-DDOS-attacks.html |title=Statement on DDOS attacks |date=2010-12-09 |access-date=2010-12-09 |work=wikileaks.ch |publisher=[[WikiLeaks]] |url-status=dead |archive-url=https://web.archive.org/web/20101210081025/http://www.wikileaks.ch/articles/2010/Statement-on-DDOS-attacks.html |archive-date=December 10, 2010 }}</ref> On the same day, a 16-year-old boy was arrested in [[The Hague]], [[Netherlands]], in connection with the distributed denial-of-service attacks against MasterCard and PayPal.<ref>{{cite news |url=http://edition.cnn.com/2010/WORLD/europe/12/09/world.wikileaks/ |title=Pro-WikiLeaks hackers change target to PayPal |access-date=2010-12-09 |date=2010-12-09 |author=The CNN Wire Staff |publisher=[[CNN]] |work=edition.cnn.com}}</ref><ref>{{cite web |url=http://nakedsecurity.sophos.com/2010/12/09/dutch-boy-arrested-for-wikileaks-related-ddos-attacks-on-mastercard-and-paypal/ |title=Dutch boy arrested for WikiLeaks-related DDoS attacks on Mastercard and PayPal |date=2010-12-09 |access-date=2010-12-09 |first=Graham |last=Cluley |work=nakedsecurity.sophos.com |publisher=[[Sophos]]}}</ref><ref>{{cite web |url=http://www.om.nl/actueel/nieuws-_en/@154591/16-jarige_jongen/ |language=nl |title=16-jarige jongen aangehouden vanwege WikiLeaks-aanvallen |first=Landelijk |last=Parket |work=om.nl |date=2010-12-09 |access-date=2010-12-09 |archive-date=2012-03-31 |archive-url=https://web.archive.org/web/20120331221259/http://www.om.nl/actueel/nieuws-_en/@154591/16-jarige_jongen/ |url-status=dead }}</ref> The boy was an IRC operator under the nickname of Jeroenz0r.<ref>{{cite web |url=http://torrentfreak.com/anonymous-operation-payback-irc-operator-arrested-101210/ |title=Anonymous' Operation Payback IRC Operator Arrested |date=2010-12-10 |access-date=2011-01-07 |publisher=TorrentFreak |author=Ernesto}}</ref>
 
On December 10, 2010, ''[[The Daily Telegraph]]'' reported that Anonymous had threatened to disrupt British government websites if Assange were extradited to Sweden.<ref>{{cite news |url=https://www.telegraph.co.uk/news/worldnews/wikileaks/8193210/WikiLeaks-hackers-threaten-British-Government.html |title=WikiLeaks Hackers Threaten British Government |date=2010-12-10 |access-date=2010-12-10|first=Steven |last=Swinford |work=telegraph.co.uk |publisher=[[The Daily Telegraph]] |location=London}}</ref> Anonymous issued a [[press release]]<ref>{{Cite web |url=http://dump.no/files/467072ba2a42/ANONOPS_The_Press_Release.pdf |title=Dump.no |access-date=2010-12-10 |archive-url=https://web.archive.org/web/20101211014222/http://dump.no/files/467072ba2a42/ANONOPS_The_Press_Release.pdf |archive-date=2010-12-11 |url-status=dead }}</ref> in an attempt to clarify the issue.<ref>{{cite web |url=http://www.thinq.co.uk/2010/12/10/who-are-anonymous-and-what-do-they-want/ |title=Who are Anonymous? And what do they want? |first=James |last=Nixon |date=2010-12-10 |access-date=2010-12-10 |work=thinq.co.uk}}</ref>
Line 141:
|''sarahpac.com''
|align="center"|2010-12-08
|align="center"|<ref name="sarah-1">{{cite web |url=http://blogs.abcnews.com/politicalpunch/2010/12/exclusive-palin-under-cyber-attack-from-wikileaks-supporters-in-operation-payback.html |title=Exclusive: Sarah Palin Under Cyber-Attack from Wikileaks Supporters in 'Operation Payback' |date=2010-12-08 |access-date=2010-12-09 |work=abcnews.com |first=Jake |last=Tapper |publisher=[[ABC News (United States)|ABC News]]}}</ref>
|-
|[[PayPal]]
Line 188:
Operation Payback members used a modified version of the [[Low Orbit Ion Cannon]] (LOIC) to execute the DDoS attacks.<ref name="softpedia1">{{cite news |title=Anonymous DDoS Tool Gets Botnet Capabilities |first=Lucian |last=Constantin |newspaper=[[Softpedia]] |date=2010-09-27 |url=http://news.softpedia.com/news/Anonymous-DDoS-Tool-Gets-Botnet-Capabilities-158163.shtml |access-date=2010-10-22 |archive-date=2016-03-04 |archive-url=https://web.archive.org/web/20160304051237/http://news.softpedia.com/news/Anonymous-DDoS-Tool-Gets-Botnet-Capabilities-158163.shtml |url-status=dead }}</ref> In September 2010, a "Hive Mind" mode was added to the LOIC.<ref name="softpedia1"/> While in Hive Mind mode, the LOIC connects to [[Internet Relay Chat|IRC]], where it can be controlled remotely. This allows computers with LOIC installed on them to behave as if they were a part of a [[botnet]]. Utilising this tool, the coordinators of Operation Payback were able to quickly take down websites belonging to anti-piracy groups.<ref name="softpedia1"/> Botnets of all sizes have also been used.<ref>{{cite web |url=http://pandalabs.pandasecurity.com/wp-content/uploads/2010/09/ScreenHunter_01-Sep.-17-13.07.jpg |title=Operation Payback flyer from mpaa.org attack |date=2010-09-17 |access-date=2010-10-29}}</ref>
 
Members of Operation Payback reportedly used an IRC channel to communicate about which targets to select, after which instructions for attacking the targets were produced and posted on various [[imageboards]] (4chan/7chan/711chan/420chan/808chan).<ref name="p2pnet">{{cite interview|subject=Anonymous |interviewer=Jon Newton |title=p2pnet talks with Operation Payback |url=http://www.p2pnet.net/story/45762 |type=Interview: Transcript |work=p2pnet.net |date=2010-11-18 |access-date=2010-12-23}}</ref> Media such as [[Twitter]] and [[Facebook]] were also utilized for coordination,<ref name="p2pnet"/> but on December 8, 2010, Operation Payback's Facebook page was removed and its official Twitter account was suspended.<ref name="visa">{{cite web |url=http://news.cnet.com/8301-31921_3-20025075-281.html |title=Facebook, Twitter boot WikiLeaks supporters after Visa attack |first=Elinor |last=Mills |date=2010-12-08 |access-date=2010-12-09 |publisher=Cnet |work=news.cnet.com |archive-date=2011-10-08 |archive-url=https://web.archive.org/web/20111008134410/http://news.cnet.com/8301-31921_3-20025075-281.html |url-status=dead }}</ref><ref>{{cite web |url=http://www.heise.de/tp/blogs/6/148908 |title=Facebook und Twitter gegen "Operation Payback" |first=Florian |last=Rötzer |date=2010-12-08 |access-date=2010-12-08 |work=heise.de |language=de}}</ref><ref>{{cite news |url=https://blogs.forbes.com/mikeisaac/2010/12/08/facebook-and-twitter-suspend-operation-payback-accounts/ |title=Facebook and Twitter Suspend Operation Payback Accounts |first=Mike |last=Isaac |date=2010-12-08 |access-date=2010-12-09 |work=[[Forbes]]}}<!-- Do not remove this source, it has the most complete information and its supported by primary sources --></ref> Additionally a federal court order forced [[Encyclopedia Dramatica]] to delete its Operation Payback article, which featured a detailed history of the operation, including personal information of some individuals associated with the companies attacked .<ref>{{cite web |url=http://gawker.com/5709789/noose-closes-around-pro+wikileaks-vigilantes |title=Noose Closes Around Pro-WikiLeaks Vigilantes |first=Ryan |last=Tate |date=2010-12-09 |access-date=2010-12-09 |work=gawker.com |publisher=[[Valleywag]] |archive-url=https://web.archive.org/web/20110812065510/http://gawker.com/5709789/noose-closes-around-pro+wikileaks-vigilantes |archive-date=2011-08-12 |url-status=dead }}</ref><ref>{{cite news |title=Anonymous keeps the cannons firing while pressure mounts |first=Steve |last=Ragan |url=http://www.thetechherald.com/article.php/201049/6530/Anonymous-keeps-the-cannons-firing-while-pressure-mounts?page=1 |newspaper=The Tech Herald |page=1 |date=2010-12-09 |access-date=2010-12-23 |archive-date=2011-11-02 |archive-url=https://web.archive.org/web/20111102204510/http://www.thetechherald.com/article.php/201049/6530/Anonymous-keeps-the-cannons-firing-while-pressure-mounts?page=1 |url-status=dead }}</ref><ref>{{cite news |title=WikiLeaks cables: Shell, Operation Payback and Assange for the Nobel prize - as it happened |first1=Matthew |last1=Weaver |first2=Mark |last2=Tran |url=https://www.theguardian.com/news/blog/2010/dec/09/wikileaks-us-embassy-cables-live-updates |newspaper=The Guardian |date=2010-12-09 |access-date=2010-12-23 |location=London}}</ref>
 
== Federal indictment ==
In July 2011, 14 members of Operation Avenge Assange were arrested.<ref>{{Cite web |date=2011-07-27 |title=Anonymous, LulzSec Hacking Groups Call for PayPal Boycott |url=https://www.nbcnews.com/id/wbna43913282 |archive-url=https://web.archive.org/web/20210927222534/https://www.nbcnews.com/id/wbna43913282 |url-status=dead |archive-date=September 27, 2021 |access-date=2023-10-23 |website=NBC News |language=en}}</ref> In October 2013, 13 members of Operation Payback were indicted in Federal court in [[Alexandria, Virginia]] as co-conspirators in violation of [[Conspiracy against the United States|18 U.S.C. § 371]] and [[18 U.S.C. § 1030]].<ref>{{Cite web|url=https://www.scribd.com/document/173135553/Collins-Indictment|title=Collins_Indictment {{!}} Denial Of Service Attack {{!}} Wiki Leaks|website=Scribd|language=en|access-date=2018-07-21}}</ref> In 2014, some of the members received a plea deal, reducing their felony charges to a single misdemeanor.<ref>{{Cite news|url=https://www.reuters.com/article/us-anonymous-cybercrime-plea/anonymous-hackers-plead-guilty-to-minor-charge-in-u-s-for-cyberattacks-idUSKBN0GJ25720140819|title='Anonymous' hackers plead guilty to minor charge in U.S. for ...|last=Viswanatha|first=Aruna|work=U.S.|access-date=2018-07-21|language=en-US}}</ref> The defendants were penalized with jail sentences, and one defendant with community service.<ref>{{Cite web|date=2015-01-24|title=ANONYMOUS DDoS Attack Felony DISMISSED, No Jail Time Ordered on Misdemeanor Charge of Conspiracy to Intentionally Cause Damage to a Protected Computer|url=https://medvinlaw.com/anonymous-ddos-attack-conspiracy-to-intentionally-cause-damage-to-a-protected-computer/|access-date=2021-07-07|website=MEDVIN LAW|language=en-US}}</ref>
 
==See also==