Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

ECD - ALL HACKERS OUT TO DISRUPT THE RNC - BATTLE LOGISTICS ENCLOSED
e-mail from a security geek | Aug 19, 2004

Posted on 08/19/2004 10:27:43 AM PDT by FourPeas

DISTRIBUTE WIDELY - DISTRIBUTE WIDELY - DISTRIBUTE WIDELY

ECD - ALL HACKERS OUT TO DISRUPT THE RNC - BATTLE LOGISTICS ENCLOSED

Contact: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@graffiti.net

Hackers are organizing for a massive electronic civil disobedience campaign against the Republican party to coincide with the massive protests in New York City for the Republican National Convention. This document contains logistical information on how people can participate in this campaign.

We won't stand idly by while the Republican Party exploits the democratic city of New York to further their agenda of endless war, attacks on our freedoms and and breaks for corporations. We demand an end to the so-called "war on terrorism", which is nothing more than a pretext for empire and the erosion of our civil rights. As long as Amerikkka continues to further their war on the poor for the benefit of the rich, we will use all weapons at our disposal to disrupt the RNC - on the streets, and on the net.

All are encouraged to help out this campaign in any way they can. Deface websites, flood email servers, cause financial disruption, change electronic billboards. Turn the system over and put the people on top. Hacktivists of the world, unite!

What will be happening?

August 22nd - Day of online direct action a week before the convention begins. All are encouraged to attack as many right-wing, corporate, government or military sites as possible. Web defacements, email attacks, financial disruption, anything and everything. These attacks will be used to stir discussion of the RNC, encourage people to participate in the protests in NYC itself, and to build for the mainstream electronic sit-in on the 29th.

August 29 - September 2nd - Mainstream electronic sit-in while the RNC is in session. The actions will commence on noon of each day. The protests will utilize a wide diversity of tactics including email, web, fax and phone disruption. The logistical details of this campaign are included in this document below.

Who are we flooding? The email addresses, fax numbers, and phone numbers listed below are various contacts of the Republican National Committee and the official George W. Bush re-election staff.

Isn't this cyber terrorism? It is important to make a distinction between electronic civil disobedience and terrorism. Civil disobedience is a fundamental part of the democratic process which our country was founded upon. Like Henry David Thoreau and our revolutionary forefathers who shot up the pigs at Lexington and Concord, electronic civil disobedience is the logical continuation of these theories applied towards the internet as a medium for disruption. ECD is a legitimate protest act.

Terrorism tries to instill fear into people through violence and destruction. Terrorism is not an act of liberation or unity but of division fear and conquer. A bitter act of desperation that solves no problems, makes no statement, and disempowers many. Electronic civil disobedience causes no harm to people or property. Instead of disempowering, ECD tries to bring people together to realize and exercise their power over oppressive governments and corporations using hacking as a means of fighting for social justice.

Who are we? There is no 'us'. This is a decentralized campaign - there are no leaders or orders or hierarchy. Most of us don't know the other people working on this project. None of us know what sorts of attacks are being planned. This is an autonomous call out, anyone who agrees with what we've said and wants to participate in this campaign is welcome to resist the RNC in any way they can.

This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We are not participating in any of the actions or any illegal activities ourselves. We recognize the political significance of the RNC and realize that one way or another there is going to be some sort of cyber attack. We are simply serving as a press tool to communicate with the media about different electronic methods people are employing to protest the RNC.

Contact Us: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@graffiti.net

DISCLAIMER: This is an autonomous call out for electronic direct action against the RNC. This document contains a number of resources that can help people who choose to participate in such actions. If you decide to help out, you do so on your own terms and accept responsibility for what might happen. However, there is safety in numbers and there are a number of people who plan on a number of actions and there is a very low risk. So hack on!

If you participate... Let us know what you're up to! We are communicating with the media on this project and we want to post on our website what sorts of attacks are being made. Feel free to rip bits of text from our website, this document, or any other press release we have made and use it in your messages. Make sure to link to our page!

Fellow citizens, PARTICIPATE! ----------------------------- You do not need to be an experienced hacker to help this campaign: we've made it easy for people to help out through a variety of different ways. The mainstream electronic sit-in is composed of several methods of disruption: flooding RNC websites, email addresses, fax and phone numbers. Listed below are the targets and explanations / tools you can use to help this campaign.

WEB SITE FLOODING ----------------- We are asking people to use all tools at their disposal to bombard the given servers with so much traffic that it will become unable to serve any more web requests. People can participate in the actions by using the given floodnet scripts on the campaign website or by launching your own distributed denial of service attacks.

The Republican National Convention: http://www.2004nycgop.org/ The Republican National Committee: http://www.rnc.org/ George W. Bush official re-election site: http://www.georgewbush.com/

You can help flood these servers by going to our website and running the FloodNet tools on our website. There is a web-based tool and several perl scripts that you can use to flood the targets. You can also download and run several denial of service applications on your home machine and point them to the above servers.

A list of good denial of service tools for the Mac is available at Freaky's Mac Archive and Underground Mac

A list of good denial of service tools for Windows is available at elitehackers.com

... but denial of service attacks isn't hacking!

DoS attacks are seen as somewhat lame in the hacking community because it does not require any actual skills to perform such attacks - any script kiddie can simply download a few tools and launch attacks against major servers. It can hardly be considered hacking. But it is a method of electronic disruption that can bring the enemy's servers to it's knees. No reason to overlook tools at our disposal.

E-MAIL BOMBING -------------- E-mail bomb attacks are done by sending tens of thousands of emails to the enemy's contact addresses. This can make it painful to send and receive emails while simultaneously consuming server resources, possibly slowing or shutting it down. There are numerous tools that one can use to perform such attacks.

There are a number of Windows email bombers available for download at Elitehackers.com.

A number of good email bombers for the mac are available at Underground Mac.

Targets: webmaster@gop.com Info@gop.com RNCommunications@gop.com MemberRelations@gop.com Administration@gop.com Counsel@gop.com Chairman@gop.com Political@gop.com Finance@gop.com NOS@gop.com BushCheney04@GeorgeWBush.com Blog@GeorgeWBush.com

FAX BOMBING ----------- Fax bombing is a method of electronic disruption that clogs the enemy's fax communications and wastes their paper and toner resources. Tape together a few sheets of black construction paper and start faxing to the following targets. When the first page goes through, roll it back and tape it to the other end of your sheet to form an infinite loop of black construction paper. Then sit back and watch the mayhem begin. Use any and all fax machines at your availability - the more the merrier!

Targets: 703.647.2993 202.863.8820 202-863-8774 202-863-8609 202-863-8773 202-863-8654 202-863-8808 202-863-8851 202-863-8851

PHONE BOMBING ------------- Phone bombing is another method of disrupting their communication systems by preventing them from making / receiving calls. You can either call these numbers and tell them what you think about the Bush agenda, or you can beige box into someone else's line and set up auto-dialing scripts to flood their lines.

Targets: 703.647.2700 202.863.8500 202-863-8700 202-863-8545 202-863-8560 202-863-8614 202-863-8638 202-863-8743 202-863-8720 202-863-8600 202-863-8670 202-863-8888

That's all for today, kids. Stay out of trouble, and don't get caught!


TOPICS: Business/Economy; Constitution/Conservatism; Culture/Society; Front Page News; News/Current Events; Politics/Elections
KEYWORDS: crooksforkerry; hacker; rnc; rncconvention
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-76 next last
To: Sunshine55

http://www.usdoj.gov/criminal/cybercrime/reporting.htm

This is the link for the FEDS for CYBERCRIME!

ANYONE WHO is attacked during the convention can forward all info to these departments.

Pass it along.
OPs4 God BLess America!


41 posted on 08/19/2004 11:28:29 AM PDT by OPS4
[ Post Reply | Private Reply | To 36 | View Replies]

To: jamesnwu
"These guys are domestic terrorists, plain and simple, including the ones who are doing their propaganda and communications work, even if they don't themselves do the hacking."

That's right, and that guy who cut me off on the Turnpike this morning - he's a terrorist too. They were making a bunch of noise moving things around next door to where I work today. Bunch of terrorists. I missed a long light which made me late to work today. Whoever put that light there is a terrorist.

Or maybe we should confine use of that word to those who would slaughter innocents by the thousands with guns, explosives, and airplanes used as missiles, rather than cheapen it down to the point of using it to describe anything we don't like.
42 posted on 08/19/2004 11:30:46 AM PDT by NJ_gent (Conservatism begins at home. Security begins at the border. Please, someone, secure our borders.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: jamesnwu
"Online hackers can and do contribute to terrorism."

If they somehow manage to access the coolant controls at a nuclear power plant? Yes.

But I'm not about to agree that running black sheets of paper through a fax machine is the same as blowing up a bus or a shopping mall.
44 posted on 08/19/2004 11:45:11 AM PDT by NJ_gent (Conservatism begins at home. Security begins at the border. Please, someone, secure our borders.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: FourPeas

I do hope Homeland Security, the NYPD, the FBI, etc. have been given this information. Not that they don't have it already .. but I'd send it just to be sure. And .. I'd add in the Secret Service.

These websites need to be shut down. This action is endangering people's lives .. there are other ways to protest than to endanger someone else.

If there is an emergency and some person in the convention dies of a heart attack .. these people will consider their attack worked. But .. these are the people of "peace" .. please don't insult my intelligence.


45 posted on 08/19/2004 11:45:39 AM PDT by CyberAnt (President Bush: The only way to Peace is through Victory!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blue Highway

Can't forget A.N.S.W.E.R.


46 posted on 08/19/2004 11:47:14 AM PDT by RockinRight (Liberalism IS the status quo)
[ Post Reply | Private Reply | To 30 | View Replies]

To: boxerblues

Done at 2:30 EST.


47 posted on 08/19/2004 11:47:15 AM PDT by 7.62 x 51mm (• Veni • Vidi • Vino • Visa • "I came, I saw, I drank wine, I shopped")
[ Post Reply | Private Reply | To 11 | View Replies]

To: FourPeas
A vote for Bush is a vote for a divided, unstable, paranoid America. -- Bruce Springsteen

Looks like the unstable paranoids, with the intent to divide, are working on the web as well as the concert hall.

48 posted on 08/19/2004 11:49:34 AM PDT by spodefly (This post meets the minimum daily requirements for cynicism and irony.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NJ_gent

I guess you think corrupting, military,Gov, Corp, as well as sites like FR, computers is just good clean fun. Interesting how they are all busy coordinating their TERRORIST ATTACKS at the same time. Al Quaeda, Fascist TAHRAAZA's Storm Troopers, the evil Dums. Nothing to worry about though.


49 posted on 08/19/2004 11:49:44 AM PDT by marty60
[ Post Reply | Private Reply | To 42 | View Replies]

To: marty60
"I guess you think corrupting, military,Gov, Corp, as well as sites like FR, computers is just good clean fun."

You guess incorrectly - hacking web servers is a criminal act and should be punished as such. Web servers are not critical infrastructure.

"Interesting how they are all busy coordinating their TERRORIST ATTACKS at the same time."

While amusing, this statement merely reiterates the same opinion I've said I don't agree with - these are criminal acts; not terrorist acts. Blowing up buildings and buses and flying airplanes into buildings are good examples of terrorist acts. Your broad brush of what constitutes terrorism would extend to include anything which has the potential to inconvenience you. Again, in my opinion, that just cheapens the sacrifices of all those who've died fighting real terrorists.

"Al Quaeda, Fascist TAHRAAZA's Storm Troopers, the evil Dums."

That's a list of things, none of which have much to do with a bunch of kids trying to tie up phones, websites, and fax machines.
50 posted on 08/19/2004 12:00:53 PM PDT by NJ_gent (Conservatism begins at home. Security begins at the border. Please, someone, secure our borders.)
[ Post Reply | Private Reply | To 49 | View Replies]

To: FourPeas

Just informed the German "FBI" . . . .


51 posted on 08/19/2004 12:03:58 PM PDT by An.American.Expatriate (A vote for JF'nK is a vote for Peace in our Time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sprite518

Have a look at this one:

http://www.lillianvernon.com/webapp/wcs/stores/servlet/ProductDisplay?storeId=10001&catalogId=10001&langId=-1&productId=45444&addOn=485&categoryId=&catTree=&clearance=&sid=eas

I was quite shocked to see this on the second page of the Lillian Vernon Kids catalog. How can anyone dress a 4 year old like that?


52 posted on 08/19/2004 12:14:56 PM PDT by Eepsy (Today's Read-Aloud: Pascual and the Kitchen Angels)
[ Post Reply | Private Reply | To 37 | View Replies]

To: FourPeas

Bump for later read.


53 posted on 08/19/2004 12:21:25 PM PDT by Dec31,1999 (www.protestwarrior.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FourPeas
This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We are not participating in any of the actions or any illegal activities ourselves

Well, that just about sums it up for me. All talk, no action-just what I'd expect from these losers.

54 posted on 08/19/2004 12:54:34 PM PDT by gura
[ Post Reply | Private Reply | To 1 | View Replies]

To: spodefly

I filled-out the FBI Tips Email form at 2:30pm, and someone mistakenly sent me the URL for IFCC - internet fraud complaints. Post #47.

I re-sent the thread with a further explanation, and an FBI Agent just called to apologize for that, and said that they've received hundreds of complaints and tips about that site, and they're on it.

He said thanks for your vigilance, and for that of your FRiends at FR.com, from all of us.

Message relayed.


55 posted on 08/19/2004 1:52:30 PM PDT by 7.62 x 51mm (• Veni • Vidi • Vino • Visa • "I came, I saw, I drank wine, I shopped")
[ Post Reply | Private Reply | To 48 | View Replies]

To: RedEyeJack
Don't be surprised if we aren't targeted for special treatment here at Freerepublic...

No doubt. Hopefully whomever hosts/manages these sites will deploy a sniffer to capture the traffic. Each offender should have his/her traffic session, including all context, captured and used against him/her in a court of law.

Telling isn't it, that not only did we not disrupt their site, but many of us visited and thoughtfully considered their perspective. As telling as them wanting to silence any speech that presents an opposing point of view...While we, (like fools), listen to their point of view. It would seem that these purported intellectual giants are remarkably closed minded.

56 posted on 08/19/2004 2:11:03 PM PDT by softengine (Single lady seeking single guy.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: FourPeas
We won't stand idly by while the Republican Party exploits the democratic city of New York to further their agenda of endless war, attacks on our freedoms and and breaks for corporations.

Like Serbia/Kosovo, Waco and Enron.

57 posted on 08/19/2004 2:19:36 PM PDT by <1/1,000,000th%
[ Post Reply | Private Reply | To 1 | View Replies]

To: NJ_gent
That's a list of things, none of which have much to do with a bunch of kids trying to tie up phones, websites, and fax machines.

I have to disagree here, if they can disrupt enough business's you have lost a lot of manhours trying to get things back to normal, not mention lost revenue. Do this to enough companies and you hvae major headaches.
58 posted on 08/19/2004 2:32:20 PM PDT by boxerblues
[ Post Reply | Private Reply | To 50 | View Replies]

To: boxerblues
"Do this to enough companies and you hvae major headaches."

A headache, yes. Dead bodies? No. What they're generally advocating is the wasting of time and resources (toner, etc). While this is wrong, and while this is criminal, it's just not on par with what Osama bin Laden does.
59 posted on 08/19/2004 2:51:01 PM PDT by NJ_gent (Conservatism begins at home. Security begins at the border. Please, someone, secure our borders.)
[ Post Reply | Private Reply | To 58 | View Replies]

To: FourPeas

I filled-out the FBI Tips Email form at 2:30pm, and someone mistakenly sent me the URL for IFCC - internet fraud complaints. Post #47.

I re-sent the thread with a further explanation, and an FBI Agent just called to apologize for that, and said that they've received hundreds of complaints and tips about that site, and they're on it.

He said thanks for your vigilance, and for that of your FRiends at FR.com, from all of us.

Message relayed.


60 posted on 08/19/2004 3:20:50 PM PDT by 7.62 x 51mm (• Veni • Vidi • Vino • Visa • "I came, I saw, I drank wine, I shopped")
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-76 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson