{"id":72562,"date":"2010-12-11T07:53:52","date_gmt":"2010-12-11T07:53:52","guid":{"rendered":"https:\/\/new.dedefensa.org\/index.php\/2010\/12\/11\/anatomie-danonymous\/"},"modified":"2010-12-11T07:53:52","modified_gmt":"2010-12-11T07:53:52","slug":"anatomie-danonymous","status":"publish","type":"post","link":"https:\/\/new.dedefensa.org\/index.php\/2010\/12\/11\/anatomie-danonymous\/","title":{"rendered":"Anatomie d&rsquo;<em>Anonymous<\/em>"},"content":{"rendered":"<p><h4>Anatomie d&rsquo;<em>Anonymous<\/em><\/h4>\n<p>Des informations de plus en plus nombreuses sont publi\u00e9es sur le groupe le plus c\u00e9l\u00e8bre de la cyber-insurrection d\u00e9clench\u00e9e par l&rsquo;affaire <em>Cablegate<\/em>. Il s&rsquo;agit du <a href=\"http:\/\/www.dedefensa.org\/article-anonymous_attaque_mastercard_pour_soutenir_wikileaks_08_12_2010.html\" class=\"gen\">groupe<\/a> <em>Anonymous<\/em>. Au reste, ce groupe commence \u00e0 envisager une certaine publicit\u00e9, par divers moyens, y compris des rencontres publiques (avec masques pour les repr\u00e9sentants d&rsquo;<em>Anonymous<\/em>), pour donner diverses indications sur lui-m\u00eame. D&rsquo;autre part, rien ne garantit non plus que certaines de ces manifestations publiques \u00e9manent vraiment d&rsquo;<em>Anonymous<\/em>.<\/p>\n<\/p>\n<p><p>\tLe <em>Guardian<\/em>, tr\u00e8s en pointe dans la couverture de <em>Cablegate<\/em>, donne un article instructif ce <a href=\"http:\/\/www.guardian.co.uk\/technology\/2010\/dec\/10\/wikileaks-cables-anonymous-online-war\" class=\"gen\">10 d\u00e9cembre 2010<\/a>. Son principal interlocuteur est un porte-parole d&rsquo;<em>Anonymous<\/em>, connu sous le surnom de <em>Coldblood<\/em>. Cette source appara\u00eet l&rsquo;une des plus s\u00e9rieuses \u00e0 propos du groupe,  si, finalement, l&rsquo;on peut vraiment parler de groupe&#8230;<\/p>\n<\/p>\n<p><p>\t\u00ab<em>As the name suggests, Anonymous is not a group with high-profile members. Its composition is multinational: a 16-year-old Dutch boy was arrested this week on suspicion of bringing down the websites of MasterCard and Visa in support of WikiLeaks. The family computer he is suspected of using has been seized.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>Although its attacks seem co-ordinated, it is not clear who is leading the group and its members have only the faintest of ideas about its goals. Its most audacious effort, an attempt to bring down Amazon, was thwarted after members could not agree which site to attack next.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>Described by one insider as complex, puerile, bizarre and chaotic, Anonymous propelled itself into the public consciousness this week with a succession of attacks on major US institutions  but it has been striking fear into the heart of Scientologists and copyright enforcement agencies for years. Earlier this year, members forced the Ministry of Sound websites offline after the dance music group tried to prevent piracy of its catalogue.<\/em> []<\/p>\n<\/p>\n<p><p>\t\u00bb<em>Anonymous has no command structure. Members communicate using secure chat-rooms, the location of which constantly move to evade detection. The movement works through organised chaos where individuals post ideas and new targets to attack, and wait to see the response. Eventually popular ideas generate action.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>The technique is simple. Members target a website with repeated requests to load its pages until the site under attack can no longer cope. A site can be hit with thousands of requests a second, and this week MasterCard was among the companies that found its website could not cope. These are known as distributed denial of service attacks  DDoS, an acronym that is ubiquitous in the hacker community. Those wanting to participate download a special software package  LOIC, or low orbit ion cannon  which takes only a few minutes to be ready to use.<\/em> []<\/p>\n<\/p>\n<p><p>\t\u00bb<em>The Anonymous movement is approaching a tipping point in its campaign. So unwieldy, reactive and vitriolic is the group that members often turn their weaponry on each other. Factions attack each other regularly, Coldblood says. The group can swell and contract, splinter and re-form  then muster an illegal attack that severely disables expensively administered websites owned by multinational corporations. It is the newest form of anarchic rebellion.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb<em>It is political activism to an extent, the 22-year-old hacker explains. But lots of the people just do it for a laugh really  there&rsquo;s the whole mentality of did it for the lulz&rsquo;. Lulz, for the uninitiated, is short for laugh out loud misspelt, but its meaning is closer to schadenfreude. However, Coldblood believes that the days of sheer anarchism are numbered, and that Anonymous is becoming more organised. Now it&rsquo;s moved more to the political side, which wants to take things a bit more seriously. It already has effectively split inside but it hasn&rsquo;t on the outside. You cut one section off and it&rsquo;ll grow back.<\/em>\u00bb<\/p>\n<\/p>\n<p>\n<p class=\"signature\"><em>dedefensa.org<\/em><\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anatomie d&rsquo;Anonymous Des informations de plus en plus nombreuses sont publi\u00e9es sur le groupe le plus c\u00e9l\u00e8bre de la cyber-insurrection d\u00e9clench\u00e9e par l&rsquo;affaire Cablegate. Il s&rsquo;agit du groupe Anonymous. Au reste, ce groupe commence \u00e0 envisager une certaine publicit\u00e9, par divers moyens, y compris des rencontres publiques (avec masques pour les repr\u00e9sentants d&rsquo;Anonymous), pour donner&hellip;&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[14],"tags":[10494,10462,10514,3659,9887],"class_list":["post-72562","post","type-post","status-publish","format-standard","hentry","category-ouverture-libre","tag-anonymous","tag-cablegate","tag-coldblood","tag-guardian","tag-wikileaks"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/72562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/comments?post=72562"}],"version-history":[{"count":0,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/72562\/revisions"}],"wp:attachment":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/media?parent=72562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/categories?post=72562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/tags?post=72562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}