It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by CitizenNum287119327
Cryptome site is up again as they have backups ready for incidents like this which makes the hack event nothing more than a dumb waste of time.
As for timing of the hack itself. The hack started Oct 2, so logic would suggest that Articles/Documents posted on Oct 1 might contain an item that got the hackers attention and prompted them to try and delete all items.
The only item of any import from the October 1 postings on Cryptome is a short item about the StuxNet Virus that is hitting Iran and others Industries.
That item, Stuxnet Myrtus or MyRTUs?, hints at the possible link to "Israel's Unit 8200"?
There is another link in this to a nytimes article, but i am not about to sign up to read it.
Josh aka Trainreq is not a legit hacker...
Cryptome: Steps of the Cryptome hack on the morning of 2 October 2010.
1. The Cryptome email account at Earthlink was accessed by unknown means and its access password changed.
2. According to emailed notifications from Network Solutions (NSI) retreived after email access was restored, the hacker requested information about Cryptome's multiple accounts by using the email address.
3. With a password guessed or stolen by unknown means the Cryptome.org management account at NSI was accessed.
4. All 54,000 files (some 7GB) were deleted and the account password changed.
5. NSI was sending emails of the account management modifications.
6. The hack was discovered by lack of access to email or to the Cryptome.org NSI account.
7. A call to NSI support restored all files from a back-up except for the previous two days.
8. An Earthlink online support chat restored email access and showed the NSI emails about management changes.
9. New passwords for Earthlink and NSI were set.
10. Email is not stored at Earthlink. What undelivered email might have been deleted by the hacker is unknown, the NSI and a couple of spam emails were awaiting delivery.
11. The other Cryptome accounts hosted by NSI do not seem to have been affected.
12. This is the second shutdown hack in 14 years. Except the one by Microsoft abusing DMCA.
Originally posted by Pinke
Personally I think if it was the government they would be a bit more effective about it. If this is the same government that allegedly faked the moon landings, hide the shape shifting serpents, and mislead the entire science community surely they would do something a bit more reliable.edit on 5-10-2010 by Pinke because: (no reason given)
Originally posted by the_denv
I don't think it's the pentagon, probably a private corporation; or sub-contractor to an agency that probably only has one government personal within its corporation.
XyriX/Ruxpin
Corey Barnhill
541 Hamilton St Apt A
Harrison, NJ 07029
IP Address: 76.124.84.68. Host name: c-76-124-84-68.hsd1.nj.comcast.net.
Virus Mike Nieves
20-30 Merle Place, Apt 3F
Staten Island,
NY 10305-3751
SSN: [omitted, ends in 916]
Birthday: 10/21/1948
Driver Licences: [omitted, ends in 979]
Home telephone: 347-466-4996
[Omitted] = sister
Old home phone (347) 466-4996
Mikenieves[at]tmail.com - T-mobile line
3476731499 = grandcentral number
IP Address: 96.250.224.79. Host name: pool-96-250-224-79.nycmny.fios.verizon.net.