Government websites in the UK, Australia and more than two dozen other countries were provided by an undercover FBI informant to a hacker involved with the group Anonymous as cybertargets to attack, according to previously unpublished documents.
The files â€” chat logs between a turncoat and hacktivist Jeremy Hammond that were used by US attorneys to prosecuted the latter for major intrusions committed by Anonymous and an offshoot, AntiSec â€” are under seal by order of a United States District Court judge and werenâ€™t publicly available until The Daily Dot used them to report on Wednesday this week to show that the informant encouraged Hammond to hit foreign government targets.
Before American authorities arrested Hammond at his Chicago apartment in March 2012, law enforcement officials gathered the evidence they used against him with the help of a former fellow hacker within the online collective, Hector â€œSabuâ€ Monsegur. A months-long investigation led by the FBI and largely made possible due to Monsegurâ€™s cooperation led to Hammond, now 29, pleading guilty to a multitude of computer crimes last year and receiving a 10-year prison sentence in return.
As RT reported previously, Hammond said publicly that Monsegur provided him with foreign targets to strike while speaking in court last year before being dished out a decade-long sentence by District Court Judge Loretta Preska.
â€œI broke into numerous websites he supplied, uploaded the stolen email accounts and databases onto Sabuâ€™s FBI server, and handed over passwords and backdoors that enabled Sabu and, by extension, his FBI handlers, to control these targets,â€ Hammond said. Preska, who later sentenced Monsegur to time served, cut off Hammond, but not before the hacktivist began to name a handful of countries he claimed were supplied by the informant.
A joint probe launched earlier this year by the Dot and Motherboard has already raised questions concerning the role of the Federal Bureau of Investigation in cyberattacks waged by Anonymous at the behest of the FBI against the websites of companies and countries alike, but this weekâ€™s revelations made through leaked chat logs between the informant and hacktivist identify for the first time the names of foreign nations that were specifically supplied to Hammond by the FBI mole with the intent that he attack them.
In full, the websites supplied to Hammond by Monsegur to target included URLs pertaining to organizations affiliated with the governments of: Brazil; Netherlands; Belgium; Slovenia; United Kingdom; Australia; Papua New Guinea; Republic of Maldives; Philippines; Laos; Libya; Turkey; Sudan; India; Nigeria; Puerto Rico; Greece; Paraguay; Saint Lucia; Malaysia; South Africa; Yemen; Iran; Iraq; Saudi Arabia; Trinidad and Tobago; Lebanon; Kuwait; Albania; Bosnia and Herzegovina and Argentina.
â€œ[D]id you hit those govs I gave you last night?â€ Monsegur asks Hammond in an excerpt from a leak chat log published by the Dot. Monsegur, who is Puerto Rican, then provided Hammond with targets specific to that territory and called it a â€œpersonal favor.â€ In another leaked log, Monsegur provides Hammond with a list of targets with .gov.br domains and says â€œhit these bitches for our [B]razilian squad.â€
According to the Daily Dot, Monsegur told Hammond to strike targets in 30 countries. It is not immediately clear what sites were attacked and with what success, but previous reporting on leaked files concerning the Hammond case showed that hacktivists were successful in campaigns against Brazilian and Turkish websites with the assistance of the informant. An American firm, Stratfor, was also struck by Anonymous in 2012 in an operation that was orchestrated largely by Monsegur while working for the feds, and authorities did not make the company aware of the intrusion until later on.
Ahead of Monsegurâ€™s sentencing hearing this year, attorneys for the informant said his cooperation â€œhelped avoid over 300 intrusionsâ€ and, in aiding the FBI, â€œhe strengthened the security of agencies such as the United States Congress, the United States Courts, other government agencies, as well as private companies.â€
â€œHe did not break the systems, he revealed vulnerabilities,â€ insisted lawyer Peggy Cross-Goldenberg. â€œThese systems needed fixing anyway, regardless of his actions,â€
Attorneys for Hammond, however, have raised questions of their own.
â€œWhy was our government, which presumably controlled Mr. Monsegur during this period, using Jeremy Hammond to collect information regarding the vulnerabilities of foreign government websites and in some cases, disabling them,â€ Hammondâ€™s attorneys wrote in December 2013. â€œThis question is especially relevant today, amidst near daily public revelations about governmentâ€™s efforts, worldwide, to monitor the communications of, and gather intelligence on, world leaders.â€
Dell Cameron, the Daily Dot reporter who first published the list of countries sent to Hammond, told RTâ€™s Andrew Blake that the FBI has been mostly unwilling to cooperate when it comes to weighing in with regards to the investigation into the Sabu files.
â€œWe reached out to the FBI at the beginning of June to see if theyâ€™d be willing to discuss what this evidence says about their investigative procedures. They were very polite, seemed eager to help, and told us, in no equivocal terms, that they wouldnâ€™t discuss the Hammond case,â€ he said.
â€œIâ€™ve been told repeatedly that the information weâ€™ve published suggests that Hammond was entrapped by law enforcement. Thatâ€™s for legal experts to comment. Of course, he was eager to hack all of those targets and heâ€™ll be the first to tell you,â€ Cameron continued. â€œHowever, the question of whether the FBI is in some way culpable for a string of international cyberattacks is not dependent on whether Hammond was entrapped. It depends on whether statements by the NY US Attorneyâ€™s office are true or not â€“ that federal investigators were with Monsegur â€˜around-the-clock,â€™ at his side, and were aware of his activities at all times.â€
Mustafa Al-Bassam, a London student who participated in Anonymous-affiliated hacks with Monsegur in early 2011, told RTâ€™s Blake that â€œSabu has always been socially manipulative and therefore good at social engineeringâ€ and said â€œthat’s always been his biggest strength in the group.â€
â€œThe FBI simply capitalized on that skill to build trust and connections within various groups,â€ Al-Bassam added.
Monsegurâ€™s attorneys boasted during his sentencing in May that their clientâ€™s efforts â€œcontributed directly to the identification, prosecution and convictions of core members of LulzSec,â€ an Anonymous offshoot that included Al-Bassam, as well as Hammond and other hacktivists..