Fuck FBI Friday III: ManTech, I think I missed this one

DfgDfg Admin
edited August 2011 in Spurious Generalities
_| || |__ _____ _____/ |_|__| ______ ____ ____ #Anonymous
\ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #AntiSec
| || | / __ \| | \ | | |\___ \\ ___/\ \___ #FUCK
/_ ~~ _\ (____ /___| /__| |__/____ \ \___ \ \___ | #FBI
|_||_| \/ \/ \/ \/ \/ #FRIDAY

/*******************************************************************************
*** FUCK FBI FRIDAY III: ManTech Mayhem ***
*******************************************************************************/

Ahoy thar,

Today is Friday and we will be following the tradition of humiliating our friends
from the FBI once again. This time we hit one of their biggest contractors for
cyber security: Mantech International Corporation.

What ManTech has to do with the FBI? Well, quite simple: In Summer 2010 the FBI
had the glorious idea to outsource their Cybersecurity to ManTech. Value of the
contract: 100 Million US-Dollar:

"The FBI is outsourcing cybersecurity to the tune of nearly $100 million to a
Washington-area managed services company. The deal shows a willingness in the
federal government to place IT services more and more in the hands of third
parties as agencies don't have enough staff on hand to do the job."

http://www.informationweek.com/news/government/security/226700486

And this is not the only Cybersecurity contract ManTech won; with a quick
internet search you will be able to find lots more. And just a few months back,
in March 2011, ManTech received another 9 Million cybersecurity contract from
the FBI:

http://www.euroinvestor.co.uk/news/story.aspx?id=11545467

Well done, good sirs. You failed epically. Because we pwned ManTech utterly and
throughly; and we did not need hundreds of millions for it. In fact, we did not
require any funds at all, we did it with Lulz.

So we begin by releasing 400MB of internal data from ManTech, this gives
some insight on how they are wasting the tax payer's money. Most of the
documents in this first batch are related to NATO who, you may recall, made some
bold claims regarding Anonymous earlier this year:

"It remains to be seen how much time Anonymous has for pursuing such paths.
The longer these attacks persist the more likely countermeasures will be
developed, implemented, the groups will be infiltrated and perpetrators
persecuted"

http://www.nato-pa.int/default.asp?SHORTCUT=2443

Indeed, it remains to be seen. It also remains to be seen how much longer the
public will accept how completely incompetent law enforcement agencies are
spending their citizens' money to fund even more incompetent federal
contractors. Incidentally, apart from the FBI, ManTech International has some other
clients:

* Defense Intelligence Agency,
* National Geospatial-Intelligence Agency
* National Reconnaissance Office
* National Security Agency
* Department of Homeland Security
* U.S. Navy, Air Force, Army, Marine Corps
* Missile Defense Agency and DARPA
* Department of Justice
* Department of State
* Environmental Protection Agency
* NASA, NATO, state and local governments

Great. It's really good to know that you guys are taking care of protecting the
Unites States from so-called cyber threats.

It should also be noted that ManTech, along with HBGary, Palantir, Endgames and
others were involved in the now-dubbed Operation MetalGear to manipulate and spy
on their citizens using persona management software for social networks:

http://wiki.echelon2.org/wiki/Mantech

We are providing these ManTech documents so the public can see for themselves
how their tax money is being spent. But don't you worry, the U.S. is a rich
country and can afford to waste money, right?

Dear Government and Law Enforcement, we are repeating this message as we have
the suspicion you still do not take us seriously: We are not scared anymore and
your threats to arrest us are meaningless. We will continue to demonstrate how
you fail at about every aspect of cybersecurity while burning hundreds of
millions of dollars that you do not even have.

The director of the U.S. Computer Emergency Response Team (CERT), Randy
Vickers, already resigned from his post, without proving an explanation. Let us
provide you with one: Mr. Vickers realized that he is on the losing side of
this war. A war that should never have been started in the first place. Not
only because the enemy was vastly underestimated and misjudged completely but
even more because it is fought against innocent citizens who simply chose to
protest against the grievance of the government. You cannot win this war and
the sooner you realize this and call for peace, the sooner we can put an end to
this and solve the problems of this world together.

Dear citizens of the U.S. and the world: We are fighting in the name of all the
oppressed and betrayed people. In your name we will continue to fire upon these
laughable battleships until they are no more. Hold on tight while the seas are
rough but we will prevail!

Anonymous
AntiSec


http://thepiratebay.org/torrent/6571301-

I am not even going to bother with this one. These idiots are going to end up creating more censorship and control laws.

Comments

  • 1357913579 Death Cog Machine
    edited August 2011
    lol, amazing how so many millions of dollars are spent to keep people out, and these guys are breaking in for fun. Haha, what a waste of money...well done.
  • RemadERemadE Global Moderator
    edited August 2011
    I think people need to realise what a rip-off industry IT actually is. I fucking hate how everything is now a "solution" with it, too when they made it the damn problem.
    I applaud them for doing it, but I will not applaud the backlash in the form of probable internet censorship.
  • edited August 2011
    I appreciate the fact that they might want to do this for fun, but trying to expose something like the FBI and it's outsourced companies is stupid. It's just going to lead to more shit from the government regarding internet laws and censorship. In the end, we'll be left with an even bigger steaming pile of shitty mess which was once called the internet.
  • bornkillerbornkiller Administrator In your girlfriends snatch
    edited August 2011
    They attack security rentacops so easily but not the government system? Hmmm...
  • bornkillerbornkiller Administrator In your girlfriends snatch
    edited August 2011
    What I can't understand is....Why target the middleman when you can go to the top.
  • skunkskunk Regular
    edited August 2011
    They have been targeting both government and corporate websites.
  • bornkillerbornkiller Administrator In your girlfriends snatch
    edited August 2011
    skunk wrote: »
    They have been targeting both government and corporate websites.
    I meant the government main frame. Now that's the shit I'd like to see hit hard, Cut out the middle man...:D
  • SpecGuruSpecGuru Semo-Regulars
    edited August 2011
    PS. I'll bet it's another sqli
    < S4BU> owned another major federal contractor today
    < S4BU> we first spear-phished their IT team
    < S4BU> then spread through their intranet via reverse connection
    < S4BU> then vpn
    < S4BU> then we got to the mail server
    < S4BU> and now we're dumping that
    < S4BU> So far we have 600mb of files to skim through

    pastebin.com/cA6nrZty
    twitter.com/anonymouSabu
    ..

    bornkiller wrote: »
    They attack security rentacops so easily but not the government system? Hmmm...
    >> August 6
    >>
    >> Hackers associated with the AntiSec movement...
    >> have released a 10GB in size cache of data
    >> belonging to law enforcement.
    >>
    >> Since the Wikileaks’ releases, this is thought to be one
    >> of the largest caches of government data to be leaked.
    -- tinyurl.com/3jtowoz

    >> And to search the emails, use this nifty thing:
    >> http://bit.ly/rqjoYU
    >> Pro tip: search for: paypal, facebook, vpn, password, confidential
    -- tinyurl.com/3sva5kk
    ...

Sign In or Register to comment.