Feeds

Anonymous reverse ferrets on CIA.gov takedown

'We blacked out website merely reported the outage'

Intelligent flash storage arrays

Loosely connected hacking collective Anonymous claimed responsibility for making the CIA's website inaccessible on Friday - but later said it was just reporting the event.

The apparent distributed denial of service attack against the spy agency's web presence follows a week after the release of a recording of a conference call between the FBI and British law enforcement officials discussing the progress of various cases against alleged members of Anonymous and LulzSec.

A Twitter account associated with the activists' movement claimed credit for the takedown before backtracking and saying it was merely "noting" that the cia.gov site was inaccessible.

The initial statement "#Anonymous takes down main CIA website cia.gov; site is still down | goo.gl/UL2ij" was followed by "We'd remind media that if we report a hack or ddos attack, it doesn't necessarily mean we did it... FYI" from the same YouAnonNews Twitter account a day later.

The conflicting statements have created a certain amount of confusion about who was responsible for the outage.

A CIA representative confirmed problems with the agency's website without commenting on the reasons for the downtime, saying: "We are aware of the problems accessing our Web site, and are working to resolve them."

The cia.gov site returned to normal operation on Saturday. The site (which essentially serves as an online brochure for the spy agency and an outlet for public relations material) has been the target of hacktivists in the past, including a June 2011 attack by LulzSec.

Other elements of Anonymous launched attacks against the Mexican Senate and Interior Ministry websites, in a protest against proposed Mexican anti-piracy laws that hacktivists compared to the SOPA legislation north of the border.

And in a further attack against US law enforcement, other hacktivists posted (partially redacted) information swiped from police and government servers in Alabama.

Hackers claimed they had obtained highly sensitive personal information on 46,000 Alabama residents, including names, Social Security numbers, dates of birth, criminal records, and license plate numbers from insecure state government servers. A censored version of a sample of the hacked data was uploaded to PasteBin.

Anonymous said the hack was in protest against controversial Alabama state immigration laws. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.