Posted on 08/19/2004 10:27:43 AM PDT by FourPeas
DISTRIBUTE WIDELY - DISTRIBUTE WIDELY - DISTRIBUTE WIDELY
ECD - ALL HACKERS OUT TO DISRUPT THE RNC - BATTLE LOGISTICS ENCLOSED
Contact: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@graffiti.net
Hackers are organizing for a massive electronic civil disobedience campaign against the Republican party to coincide with the massive protests in New York City for the Republican National Convention. This document contains logistical information on how people can participate in this campaign.
We won't stand idly by while the Republican Party exploits the democratic city of New York to further their agenda of endless war, attacks on our freedoms and and breaks for corporations. We demand an end to the so-called "war on terrorism", which is nothing more than a pretext for empire and the erosion of our civil rights. As long as Amerikkka continues to further their war on the poor for the benefit of the rich, we will use all weapons at our disposal to disrupt the RNC - on the streets, and on the net.
All are encouraged to help out this campaign in any way they can. Deface websites, flood email servers, cause financial disruption, change electronic billboards. Turn the system over and put the people on top. Hacktivists of the world, unite!
What will be happening?
August 22nd - Day of online direct action a week before the convention begins. All are encouraged to attack as many right-wing, corporate, government or military sites as possible. Web defacements, email attacks, financial disruption, anything and everything. These attacks will be used to stir discussion of the RNC, encourage people to participate in the protests in NYC itself, and to build for the mainstream electronic sit-in on the 29th.
August 29 - September 2nd - Mainstream electronic sit-in while the RNC is in session. The actions will commence on noon of each day. The protests will utilize a wide diversity of tactics including email, web, fax and phone disruption. The logistical details of this campaign are included in this document below.
Who are we flooding? The email addresses, fax numbers, and phone numbers listed below are various contacts of the Republican National Committee and the official George W. Bush re-election staff.
Isn't this cyber terrorism? It is important to make a distinction between electronic civil disobedience and terrorism. Civil disobedience is a fundamental part of the democratic process which our country was founded upon. Like Henry David Thoreau and our revolutionary forefathers who shot up the pigs at Lexington and Concord, electronic civil disobedience is the logical continuation of these theories applied towards the internet as a medium for disruption. ECD is a legitimate protest act.
Terrorism tries to instill fear into people through violence and destruction. Terrorism is not an act of liberation or unity but of division fear and conquer. A bitter act of desperation that solves no problems, makes no statement, and disempowers many. Electronic civil disobedience causes no harm to people or property. Instead of disempowering, ECD tries to bring people together to realize and exercise their power over oppressive governments and corporations using hacking as a means of fighting for social justice.
Who are we? There is no 'us'. This is a decentralized campaign - there are no leaders or orders or hierarchy. Most of us don't know the other people working on this project. None of us know what sorts of attacks are being planned. This is an autonomous call out, anyone who agrees with what we've said and wants to participate in this campaign is welcome to resist the RNC in any way they can.
This call out is issued by the CrimethInc Black Hat Hacker's Bloc. We are not participating in any of the actions or any illegal activities ourselves. We recognize the political significance of the RNC and realize that one way or another there is going to be some sort of cyber attack. We are simply serving as a press tool to communicate with the media about different electronic methods people are employing to protest the RNC.
Contact Us: CrimethInc Black Hat Hacker's Bloc Campaign Website: http://phil.ist-backup.de/rncelectronic/ Email: rainbowskies@graffiti.net
DISCLAIMER: This is an autonomous call out for electronic direct action against the RNC. This document contains a number of resources that can help people who choose to participate in such actions. If you decide to help out, you do so on your own terms and accept responsibility for what might happen. However, there is safety in numbers and there are a number of people who plan on a number of actions and there is a very low risk. So hack on!
If you participate... Let us know what you're up to! We are communicating with the media on this project and we want to post on our website what sorts of attacks are being made. Feel free to rip bits of text from our website, this document, or any other press release we have made and use it in your messages. Make sure to link to our page!
Fellow citizens, PARTICIPATE! ----------------------------- You do not need to be an experienced hacker to help this campaign: we've made it easy for people to help out through a variety of different ways. The mainstream electronic sit-in is composed of several methods of disruption: flooding RNC websites, email addresses, fax and phone numbers. Listed below are the targets and explanations / tools you can use to help this campaign.
WEB SITE FLOODING ----------------- We are asking people to use all tools at their disposal to bombard the given servers with so much traffic that it will become unable to serve any more web requests. People can participate in the actions by using the given floodnet scripts on the campaign website or by launching your own distributed denial of service attacks.
The Republican National Convention: http://www.2004nycgop.org/ The Republican National Committee: http://www.rnc.org/ George W. Bush official re-election site: http://www.georgewbush.com/
You can help flood these servers by going to our website and running the FloodNet tools on our website. There is a web-based tool and several perl scripts that you can use to flood the targets. You can also download and run several denial of service applications on your home machine and point them to the above servers.
A list of good denial of service tools for the Mac is available at Freaky's Mac Archive and Underground Mac
A list of good denial of service tools for Windows is available at elitehackers.com
... but denial of service attacks isn't hacking!
DoS attacks are seen as somewhat lame in the hacking community because it does not require any actual skills to perform such attacks - any script kiddie can simply download a few tools and launch attacks against major servers. It can hardly be considered hacking. But it is a method of electronic disruption that can bring the enemy's servers to it's knees. No reason to overlook tools at our disposal.
E-MAIL BOMBING -------------- E-mail bomb attacks are done by sending tens of thousands of emails to the enemy's contact addresses. This can make it painful to send and receive emails while simultaneously consuming server resources, possibly slowing or shutting it down. There are numerous tools that one can use to perform such attacks.
There are a number of Windows email bombers available for download at Elitehackers.com.
A number of good email bombers for the mac are available at Underground Mac.
Targets: webmaster@gop.com Info@gop.com RNCommunications@gop.com MemberRelations@gop.com Administration@gop.com Counsel@gop.com Chairman@gop.com Political@gop.com Finance@gop.com NOS@gop.com BushCheney04@GeorgeWBush.com Blog@GeorgeWBush.com
FAX BOMBING ----------- Fax bombing is a method of electronic disruption that clogs the enemy's fax communications and wastes their paper and toner resources. Tape together a few sheets of black construction paper and start faxing to the following targets. When the first page goes through, roll it back and tape it to the other end of your sheet to form an infinite loop of black construction paper. Then sit back and watch the mayhem begin. Use any and all fax machines at your availability - the more the merrier!
Targets: 703.647.2993 202.863.8820 202-863-8774 202-863-8609 202-863-8773 202-863-8654 202-863-8808 202-863-8851 202-863-8851
PHONE BOMBING ------------- Phone bombing is another method of disrupting their communication systems by preventing them from making / receiving calls. You can either call these numbers and tell them what you think about the Bush agenda, or you can beige box into someone else's line and set up auto-dialing scripts to flood their lines.
Targets: 703.647.2700 202.863.8500 202-863-8700 202-863-8545 202-863-8560 202-863-8614 202-863-8638 202-863-8743 202-863-8720 202-863-8600 202-863-8670 202-863-8888
That's all for today, kids. Stay out of trouble, and don't get caught!
"I submitted the e-mail to Department of Homeland Security."
Good work! When I started writing my response there were no replies. Everyone jumped on this, as we should.
Yup, what they advocate doing is patantly illegal. Furthermore note that the .de top level domain that thier website is hosted on indicates Germany. I'm not sure they can call it "civil disobediance" when they've got foreign nationals attempting to interfere with a U.S. election. I think that's called terrorism. Note also the lame attempt of these guys trying to cover thier own arse by the disclaimer at the end.
Typical leftie stuff, the only freedom of expression they support is thier own. If anyone else tries to express thier beliefs they'll use any means at thier disposal to muzzle them.
These people are the enemy of society. They should be treated like the terrorists that they are. If you find one, make sure his sorry ass is reported to the police.
These people are the enemy of society. They should be treated like the terrorists that they are. If you find one, make sure his sorry ass is reported to the police.
Do these criminals actually think they can do this kind of cyber-vandalism and there will be no retaliation? Do they really think that conservatives will sit by and meekly allow their free speech rights to be denied by their criminal activity? When inevitable counterattack comes against their left wing sites they will scream like stuck pigs. There activity could eventually lead to situation, where the only way you can maintain a controversial web site is with thousands of dollars of additional security enhancements.
Oh, let's just see what we're up against, here:
DOS attacks are felonies;
Posting your intent publicly is simply stupid;
Trolling for support is Conspiracy to Commit Felonies;
In their attempts to assault the named servers, they've got to go through other servers, thereby clogging up ALL traffic.
A general slowdown of the Web inhibits commerce, data transfers, and legitimate business. Sounds like "Electronic civil disobedience causes no harm to people or property" is a bunch of crap!
Oh, and here's another gem: "ECD tries to bring people together to realize and exercise their power over oppressive governments and corporations ..."
Gee, does that include the corporations that run the ISP's that your little 60'r retro-rave are using, and the regulations and government computer power that created the Internet in the first place?
FP, I'm directing all this at the weasel-libs who are about to commit crimes, and not you.
bumping for later read.
Did I miss anyone?
Yes,
Just to name a few more.
--- DO NOT GO TO THIS URL ---
//phil.ist-backup.de/rncelectronic/sitin1.html
--- DO NOT GO TO THIS URL --
"Someone will soon be pinging" ping.
Thanks. I will forward this to our local HQ.
Don't forget these guys;
You'd better rush right over to this site to pick up a pimp or ho Halloween costume for your child before they run out. Whatever happened to dressing up as a fireman, a ballerina or a monster?
http://shop.store.yahoo.com/brandsonsale-store/51104-costumes.html
>>Isn't this behaviour classed as a felony now ?
Yep, time to round em all up for storage in lake Michigan...
http://www.google.com/search?q=%22IRobot%22+%22Lake+Michigan%22&hl=en&lr=&ie=UTF-8&start=10&sa=N
Revolution requires alientated masses in order to be effective.
http://www.google.com/search?hl=en&lr=&ie=UTF-8&q=1918+1905+revolution
Please also forward them the info in post 31.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.