June 2011 On 27 June 2011, Anonymous published information relating to the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory program, or Sentinel program, an operation run by the United States
Department of Homeland Security and
Federal Emergency Management Agency. The hack included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of
Federal Bureau of Investigation bureau locations, details on counter-hacking tools, and form letters that law enforcement agencies used to obtain user details from
internet service providers. On 28 June, the group released the second collection of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed "Chinga la Migra Communique Dos", or "Fuck the Border Patrol Message Two", the data file contained the names, addresses, phone numbers, internet passwords, and
social security numbers of a dozen Arizona police officers. It also contained the emails,
voicemails, chat logs of some of them; in at least one instance it included sexually explicit photographs from one of the officer's girlfriends. Anonymous also claimed that the documents included officers forwarding racist chain emails, evidence of
K-9 unit officers using
percocet, and a
Fraternal Order of Police member who is also a convicted
sex offender. They claimed to also have access to all Zimbabwean government websites ending in gov.zw. Most of the information and control were given through
SQL injection. Anonymous claimed they targeted Brazil for what they saw as data manipulation and Zimbabwe for the controversial
2008 Zimbabwean presidential election. The release also included a file containing internal mapping of
Viacom servers as well as passwords and data from umusic.com, a website of
Universal Music Group. They also released the names of 2,800 members of the
Black Eagles paramilitary group.
July 2011 On 1 July, Anonymous once again targeted Arizona law enforcement by publishing a number of
backdoors that could be used to access Arizona police servers to
Pastebin. Arizona was forced to pull many websites offline for a time. Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They also claimed to have found "anti-
Muslim" emails during the attack. On 3 July, Anonymous hacked into the database of the
Democratic Party of
Orange County, Florida. They published a partial membership list and a handbook for precinct committee members. The hack was also considered part of the group's OpOrlando plan. On 4 July, Anonymous released a document containing 27 administrative usernames and passwords from an
Apple Inc. system used to operate online
technical support follow-up surveys. The encrypted passwords were taken from an
SQL database. Anonymous launched what it dubbed "Turkish Takedown Thursday" on 6 July. They posted internal data from over one hundred
.tr websites and brought down and replaced the content of 74 of them. The 74 sites had their normal pages replaced with an Antisec logo and a message denouncing supposed attempts at internet censorship by the Turkish government. Websites affected included that of a children's hospital, but not of any key government agencies. On the same day, the group released database dumps taken from 20 universities in
Italy. Two days later, Italian police arrested 15 alleged members of Anonymous ranging in age from 15 to 28. The group vowed revenge for the raids. On 8 July, the group claimed responsibility for hacks against IRC Federal, an
engineering firm that contracts with the
Federal Bureau of Investigation and other agencies of the
United States federal government. Internal database documents and personnel email were stolen during the attack. The group also claimed to have vandalized the firm's website and forcing them to take it offline. The group says that in the documents procured, they found a proposal to the FBI for the firm to produce a "Special Identities Modernization (SIM) Project" that would help identify those who might present a criminal or terrorist risk in the future,
fingerprinting contracts with the
United States Department of Justice, and
biometrics contracts with the military. They also claimed to have obtained information allowing them to log into various
virtual private networks and access panels belonging to the
United States Department of Energy. They also sent a message to company employees urging them to work against the government rather than for it. The hack was done with a simple
SQL injection. On 11 July, Anonymous hacked into systems belonging to
defense contractor Booz Allen Hamilton, breaking through barriers that the group described as having "no security measures in place." They released what they said were 90,000 email accounts and encrypted passwords from
United States Central Command,
United States Special Operations Command, the
United States Marine Corps, the
United States Air Force, the
United States Department of Homeland Security,
United States Department of State, and various private sector contractors, calling the released "Military Meltdown Monday". They also sarcastically posted an invoice charging the company for "security audit services rendered". The Department of Defense said they were aware of the incident and were coordinating with other agencies for a response. Booz Allen confirmed the intrusion on 13 July, but contradicted Anonymous' claims in saying that the attack never got past their own systems, meaning that information from the military should be secure. On 12 July, the group attacked the web servers of
agricultural biotechnology company
Monsanto and released information on the company's employees, including names, addresses, and email addresses. The group claimed they performed the attack to protest the company's lawsuits against farmers who manufacture
organic milk in an effort to stop them from stating on the label that their milk does not contain artificial
Bovine Growth Hormones. Monsanto confirmed the attack but claimed that only about ten percent of the information published came from current or former employees of the company. They said that the other ninety percent were email addresses and names of media contacts and employees of other agricultural companies. On 21 July, Anonymous released two
PDFs purportedly taken from servers belonging to
NATO. They claimed via Twitter to have obtained around one gigabyte of data that they would release portions of over the course of a few days. The group claimed that some of the data was so sensitive that they felt it would be irresponsible to release, and thus would only make a portion of what was taken available. The first two documents released relate to outsourcing
communication and information services (CIS) in
Kosovo and the funding request for the project. The
Austrian branch of Anonymous hacked the website of the Austrian Gebühren Info Service, the television license agency run by
the Austrian national public service broadcaster, on 22 July. They accessed 214,000 records containing personal information and stole the banking data of 96,000 people from the server. The counter-terrorism bureau of the country launched an investigation and were preparing to file criminal complaints against those involved. On 25 July, first posted confidential information that they claimed came from the
Italian Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche, translated as the National Anti-Crime Computer Center for Critical Infrastructure Protection, an agency tasked with protecting vital computer systems for the country. The Twitter account @anonesc posted less than 100 megabytes of data, but they claimed to have taken over eight gigabytes. The data related to
oil,
nuclear, and other firms deemed to be involved in "critical infrastructure", as well as government agencies including the
Department of Defence of
Australia. On 29 July, Anonymous hacked the FBI-contractor
ManTech International. They posted a PDF of a
résumé sent into the company as proof that they had infiltrated their systems. Anonymous claimed that the attack would be the first part of a promised "Fuck FBI Friday", or FFF, campaign as part of the larger Operation AntiSec. They published 400 megabytes of content from the company later the same day. The internal documents generally concern contracts that ManTech has with NATO, the nature of which Anonymous claims shows a waste of
taxpayer money. The files also include dealings with the
United States Army and a list of employee emails. On 31 July, Anonymous attacked the websites of 77 different
law enforcement websites hosted on the same server. As much as 10 gigabytes of data was taken, including the personal information of police officers from numerous jurisdictions. Emails were also taken, as well as the confidential information of inmates and
confidential informants, though not released yet. Anonymous said that they would redact inmate names but would release the names of all " informants who had the false impression that they would be able to 'anonymously' snitch in secrecy." The release also included a demand that all arrested members of Anonymous be released immediately. Some of the information released, however, was already publicly available. They proceeded to release the
social security numbers of over 100 police officers from the Missouri Sheriffs' Association website. The following Saturday, 6 August, they released a cache of data from the websites title "Shooting Sheriffs Saturday Release" which included the information taken from law enforcement websites. Large amounts of personal information was included, with Anonymous stating, "We have no sympathy for any of the officers or informants who may be endangered by the release of their personal information. For too long they have been using and abusing our personal information." Anonymous claimed that their motive was revenge over the arrests of a number of participants in previous operations and of LulzSec and Anonymous member
Topiary. They also used stolen
credit card numbers to make donations to the
American Civil Liberties Union,
Electronic Frontier Foundation, and the
Chelsea Manning Support Network. The group released 1 gigabyte of information three days later, all of it taken from Garcia's personal email account; it mainly related to Garcia's former role with InfraGard.
September 2011 In retaliation for arrests of people who allegedly participated in Operation AntiSec, and especially
Topiary, Anonymous attacked the website of the Texas Police Chiefs Association. On 1 September, the group defaced the website and released documents from it marked "law enforcement sensitive" and "for official use only". The release also included police officer private email. The same day, the group brought down the website of the
United States Court of Appeals for the Ninth Circuit for the justice system's characterization of Anonymous activities as "cyber-terrorism".
October 2011 On 21 October, announced a dump of data related to law enforcement in support of the
Occupy Wall Street and
Occupy movement. The dump including data taken from the
International Association of Chiefs of Police,
Boston Police Patrolmen's Association, and the Sheriff's office of
Baldwin County, Alabama. A number of police websites
virtually hosted together also had their content replaced with an anti-police
rap video. The dump 600 megabytes of information including membership rosters, internal documents, and social security numbers from the International Association of Chiefs of Police; nearly 1000 names, ranks, addresses, phone numbers, and social security numbers of police officers in
Jefferson County, Alabama, and
Birmingham, Alabama; 1000 names and passwords of members of the Boston Police Patrolmen's Association; and the financial information and client list of web developer and marketing company Matrix Group, a business with several law enforcement clients. AntiSec claimed that at least 40 law enforcement related websites were included in the attack.
November 2011 On 18 November 2011, Anonymous posted 38,000 email messages from the
Gmail account of Alfredo "Fred" Baclagan, a special agent supervising computer crime investigations with the
California Department of Justice and the Computer and Technology Crime Hightech Response Team, to a site on
Tor and to
The Pirate Bay. They also added what they claimed were Baclagan's personal home address and phone number. The group claimed the action as part of their attack on law enforcement in support of the Occupy movement and in protest for prosecution of computer criminals in general. They also claimed to have read his text messages, listened to his voicemail, and used his
Google Voice account to call and text his friends and family. The group claimed that the 1 million IDs were part of a dataset of 12.36 million records taken from an FBI laptop. Going further the FBI also stated that there is no reason that they have "sought or obtained" the data that was "stolen". According to an
Ars Technica article published on 10 September: A digital publishing company named BlueToad has come forward to take responsibility for the leak of a million iOS unique device identifiers (UDIDs) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the company's systems in order to steal the file. == Actions by other groups and individuals ==