Blog Posts Tagged with "Jester"
July 31, 2012 Added by:ʞɔopuooq ʇuıɐs
I have done my best to ignore rantings, trying not to feed the trolls, but Emick recently upped her campaign against me and created a blog post berating my methods. One of my valued supporters, @render64, has read Emick's blog and kindly used intelligent analysis in order to expose what’s really going on here...
July 27, 2012 Added by:ʞɔopuooq ʇuıɐs
On this first day of Defcon, it appears my @th3j35t3r twitter account has been suspended. Coincidence? Probably not. We all know I have some pretty desperate enemies who will stop at nothing to see me inconvenienced, discredited or otherwise annoyed. So here’s the upshot...
July 11, 2012 Added by:ʞɔopuooq ʇuıɐs
About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...
July 05, 2012 Added by:ʞɔopuooq ʇuıɐs
There haven’t been a lot of ‘TANGO DOWNS’ over the last few months. I decided that I should concentrate on targeted intelligence gathering. I needed a way to get the real world identity of ‘the marks’ – be it Anons, Jihadists or forum admins. Over the last few months I have been running ‘Project Looking Glass’...
June 05, 2012 Added by:Laura Walker
Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...
May 25, 2012 Added by:Infosec Island Admin
Governments need to get a handle on this. If they want patriot hacker units, then they will have them and they will be controlled. As opposed to the Batman vigilante model that we now have here. If they did this, there would be plenty of volunteers and it might be a good thing...
May 16, 2012 Added by:ʞɔopuooq ʇuıɐs
As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...
May 14, 2012 Added by:Headlines
The content on a website maintained by anit-jihadi hacker The Jester (th3j35t3r) has been deleted and the hacktivist's Twitter account has been mysteriously taken down, and the events have sent the Twittersphere into a frenzy of conjecture... Has The Jester been doxed?
April 24, 2012 Added by:Infosec Island Admin
I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...
April 24, 2012 Added by:ʞɔopuooq ʇuıɐs
I would like to state that although everything above is factually true, I am in no way inferring that Mr Terban is in any way supportive of Jihad, quite the opposite. I have been ignoring his rants for a long time and felt that now was a good time to address him...
April 16, 2012 Added by:Ali-Reza Anghaie
Let’s not replicate the sins of our Governments. Let’s not aggravate the problems Governments face. I don't disregard the threats radicalization online brings. I'm suggesting Cyber Vigilantism is not a movement we want to support by throwing our Western weight behind it...
April 12, 2012 Added by:Headlines
"We did it with ease. Their security is bizarre, it's as if they have no security whatsoever. The security they lack, it's incredible. They use an old phone system. It's pretty much the art of phreaking," a TeaMp0isoN member called 'Detonate' said in an interview...
April 10, 2012 Added by:Anthony M. Freed
The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...
March 31, 2012 Added by:Infosec Island Admin
In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...
March 14, 2012 Added by:Infosec Island Admin
Jester may just be a person or a small group of people with an agenda that includes a media arm seeking attention from the populace, not motivated by altruism or patriotism. If indeed he/they think that they are doing something greater, then he/they are deluding themselves...
March 12, 2012 Added by:Headlines
The Jester posted a link to data exfiltrated during last week's Webkit exploit aimed at mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives...
OSI Model’s Relevance to Web App Security... Ankila Bhardwaj on 03-26-2015
Observations From Advisen Cyber Risk Confere... Harjinder singh on 03-26-2015
Who Validates Alerts Validated by Your Alert... Harjinder singh on 03-26-2015