Jump to content

Topiary (hacktivist)

From Wikipedia, the free encyclopedia

Jake Leslie Davis (born 27 October 1992),[1] best known by his online pseudonym Topiary, is a British hacktivist. He has worked with Anonymous, LulzSec, and other similar groups.[2] He was an associate of the Internet group Anonymous,[3] which has publicly claimed various online attacks, including hacking HBGary,[4] Westboro Baptist Church, and Gawker.[5] They have also claimed responsibility for the defacing of government websites in countries such as Zimbabwe,[6] Syria,[7] Tunisia,[8] Ireland,[9] and Egypt.[10]

After serving his time and staying off the Internet for two years, Jake Davis is now a security researcher, disclosing bugs to corporations as a part of their bounty programs.

Anonymous

[edit]

Davis was a member of hacker collective Anonymous,[3] where he was involved in the attack on HBGary in response to Aaron Barr, then CEO of the organization, claiming to have unmasked various members of Anonymous.[4] The stolen HBGary emails were published and the small team who had been responsible splintered from Anonymous calling itself LulzSec.

LulzSec

[edit]

On 24 February 2011, Topiary gained attention after he appeared on The David Pakman Show. He informed the host that Anonymous had replaced a Westboro Baptist Church webpage with a message from Anonymous during an on-air confrontation with Shirley Phelps-Roper.[11] A recording of this event was placed on YouTube,[12] where it reached over one million views in five days.

Topiary was a member of LulzSec, and ran their Twitter account.[13][14] The Guardian made a claim in a report that Topiary's name was Daniel.[15]

On 14 July 2011, The Guardian published an exclusive interview with Topiary,[16] in which he spoke extensively about his motivations. Describing himself as "an internet denizen with a passion for change" he said he feared being tracked by the authorities: "I can only hope that they haven't pinned any of us, especially my friends from LulzSec." Later, a full transcript of the lengthy interview surfaced on the website of freelance Guardian journalist Ryan Gallagher.[17]

Arrest

[edit]

An 18-year-old man suspected of being Topiary was arrested in the Shetland islands of Scotland on 27 July 2011.[18] On 31 July 2011, the man was charged with five offences including unauthorised computer access and conspiracy to carry out a distributed denial of service attack on the Serious Organised Crime Agency's website.[19] Scotland Yard later identified the man arrested as Jake Davis, a resident of the island of Yell.[20] He was charged with unauthorised access of a computer under the Computer Misuse Act 1990, encouraging or assisting criminal activity under the Serious Crime Act 2007, conspiracy to launch a denial-of-service attack against the Serious Organised Crime Unit contrary to the Criminal Law Act 1977, and criminal conspiracy also under the Criminal Law Act 1977.[21]

Police confiscated a Dell laptop and a 100-gigabyte hard drive that had 16 different virtual machines. The hard drive also contained details relating to an attack on Sony and hundreds of thousands of email addresses and passwords.[22] A London court released Davis on bail under the conditions that he live under curfew with his mother and have no access to the Internet. His lawyer Gideon Cammerman stated that, while his client did help publicise LulzSec and Anonymous attacks, he lacked the technical skills to have been anything but a sympathiser.[22]

After his arrest, Anonymous launched a 'Free Topiary' campaign,[23] which included adding a "Free Topiary" banner to their Twitter avatars, similar to the Free Bradley banner.

Guilty plea

[edit]

Davis pleaded guilty on 25 June 2012 to DDoS attacks on several websites, but pleaded not guilty to two counts of encouraging others to commit computer offenses and fraud. Davis was due to be tried along with Ryan Cleary (Ryan), Ryan Ackroyd (Kayla), Mustafa Al-Bassam (tflow), beginning 8 April 2013. The court was informed it would take 3,000 hours to view the material against Ackroyd alone. They were released on bail, except for Cleary.[24][25]

Davis was not tried for a number of other crimes perpetrated by LulzSec.

Court appearance

[edit]

On 8 April 2013, Davis again appeared in court with fellow hackers, Ryan Ackroyd, Ryan Cleary and Mustafa Al-Bassam. All four pleaded guilty to computer crimes and were sentenced on 14 May 2013. Davis faced a maximum of 10 years in prison but got 24 months in a young offenders institute. He served 38 days because he had been electronically tagged for 21 months and this counted against his sentence.[26]

References

[edit]
  1. ^ "Ackroyd, Et Al. Indictment". Scribd.
  2. ^ ATopiary. "Topiary (atopiary) on Twitter". Twitter. Retrieved 12 April 2011.
  3. ^ a b Cook, John; Chen, Adrian (18 March 2011). "Inside Anonymous' Secret War Room". Gizmodo.
  4. ^ a b Anderson, Nate (9 February 2011). "How one man tracked down Anonymous—and paid a heavy price". ars technica. Retrieved 12 April 2011.
  5. ^ "Gawker hack triggers password resets at major sites". BBC News. 15 December 2010. Retrieved 12 April 2011.
  6. ^ "Pro-WikiLeaks hackers deface Zimbabwe government websites". The Hacker News. 2 January 2010. Retrieved 12 April 2011.
  7. ^ Shannon, Brad (8 August 2011). "Syrian Ministry Of Defense Website Hacked By 'Anonymous'". Huffington Post. Retrieved 21 December 2011.
  8. ^ Read, Max (3 January 2011). "Anonymous Attacks Tunisian Government over Wikileaks Censorship". Gawker. Retrieved 12 April 2011.
  9. ^ "Anonymous Hacks Into Fine Gael Website". infosec island. 10 January 2011. Retrieved 12 April 2011.
  10. ^ Svensson, Peter (2 February 2011). "Anonymous Hacker Group Attacks Egyptian Government Sites". Huffington Post. Retrieved 12 April 2011.
  11. ^ Goodman, William (24 February 2011). "Video: Anonymous hacks Westboro Baptist Church website during on-air confrontation". CBS News. Retrieved 12 April 2011.
  12. ^ MidweekPolitics (24 February 2011). "Anonymous Hacks Westboro Baptist Church Website During Live Confrontation". YouTube. Retrieved 6 November 2011.
  13. ^ Poeter, Damon (2 July 2011). "Who is LulzSec?: The Frontman". PC Magazine. Ziff Davis. Archived from the original on 8 March 2012. Retrieved 13 July 2011.
  14. ^ Olson, Parmy (2012). We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Little, Brown. p. 248. ISBN 978-0-316-21354-7.
  15. ^ Halliday, Josh (24 June 2011). "Lulzsec - the members and the enemies". Guardian. London.
  16. ^ Gallagher, Ryan (14 July 2011). "Why hacker group LulzSec went on the attack". Guardian. London.
  17. ^ "LulzSec interview: the full transcript". RJGallagher.co.uk. 22 July 2011.
  18. ^ "Man arrested over computer hacking claims". BBC News. 27 July 2011. Retrieved 27 July 2011.
  19. ^ "LulzSec: Man charged over computer hacking claims". BBC News. 31 July 2011. Retrieved 31 July 2011.
  20. ^ United States of America v Jake Davis aka Topiary aka Atopiary et al – United States District Court, Southern District of New York. Indictment 6 March 2012
  21. ^ Albanesius, Chloe (31 July 2011). "Report: Scotland Yard Identifies LulzSec Hacker". PC Magazine. Ziff Davis. Archived from the original on 19 October 2011. Retrieved 31 July 2011.
  22. ^ a b Prodhan, Georgina (1 August 2011). "UK teen cyber activist bailed without Internet access". Reuters. London. Thomson Reuters. Archived from the original on 2 August 2011. Retrieved 1 August 2011.
  23. ^ DJ Pangburn. "Anonymous Launches 'Free Topiary' Campaign". Death and Taxes. Archived from the original on 8 February 2012. Retrieved 21 December 2011.
  24. ^ Mills, Elinor. "Two Hackers plead guilty to LulzSec attacks on Web sites". news article. CNET. Retrieved 6 December 2012.
  25. ^ "LulzSec's Ryan Cleary admits hacking into CIA and the Pentagon". news article. The Telegraph. Retrieved 6 December 2012.
  26. ^ "Former Lulzsec hacker Jake Davis on his motivations". BBC News. 16 May 2013.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy