This is depressing, but important.Quotehttp://www.guardian.co.uk/technology/2011/jun/06/us-hackers-fbi-informerThe underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" hackers specialising in ID theft have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. "Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told the Guardian."It makes for very tense relationships," said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. "There are dozens and dozens of hackers who have been shopped by people they thought they trusted."The best-known example of the phenomenon is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, who is suspected of passing secret documents to WikiLeaks. Manning had entered into a prolonged instant messaging conversation with Lamo, whom he trusted and asked for advice. Lamo repaid that trust by promptly handing over the 23-year-old intelligence specialist to the military authorities. Manning has now been in custody for more than a year.For acting as he did, Lamo has earned himself the sobriquet of Judas and the "world's most hated hacker", though he has insisted that he acted out of concern for those he believed could be harmed or even killed by the WikiLeaks publication of thousands of US diplomatic cables."Obviously it's been much worse for him but it's certainly been no picnic for me," Lamo has said. "He followed his conscience, and I followed mine."The latest challenge for the FBI in terms of domestic US breaches are the anarchistic co-operatives of "hacktivists" that have launched several high-profile cyber-attacks in recent months designed to make a statement. In the most recent case a group calling itself Lulz Security launched an audacious raid on the FBI's own linked organisation InfraGard. The raid, which was a blatant two fingers up at the agency, was said to have been a response to news that the Pentagon was poised to declare foreign cyber-attacks an act of war.Lulz Security shares qualities with the hacktivist group Anonymous that has launched attacks against companies including Visa and MasterCard as a protest against their decision to block donations to WikiLeaks. While Lulz Security is so recent a phenomenon that the FBI has yet to get a handle on it, Anonymous is already under pressure from the agency. There were raids on 40 addresses in the US and five in the UK in January, and a grand jury has been hearing evidence against the group in California at the start of a possible federal prosecution.Kevin Poulsen, senior editor at Wired magazine, believes the collective is classically vulnerable to infiltration and disruption. "We have already begun to see Anonymous members attack each other and out each other's IP addresses. That's the first step towards being susceptible to the FBI."Barrett Brown, who has acted as a spokesman for the otherwise secretive Anonymous, says it is fully aware of the FBI's interest. "The FBI are always there. They are always watching, always in the chatrooms. You don't know who is an informant and who isn't, and to that extent you are vulnerable."Quotehttp://arstechnica.com/business/2012/03/turncoat-hackers-a-history-of-snitching-in-high-tech-dragnets/Supporters of Anonymous have been shocked by revelations that Sabu, one of the hacking collective's kingpins and spiritual leaders, spent the past eight months ensnaring other members in a coordinated FBI sting.Perhaps they shouldn't have been. As anyone who has followed other high-tech dragnets over the past two decades knows, turncoats are an inevitable ingredient in most probes.In 1995, for instance, when a fugitive named Kevin Mitnick was apprehended for using cloned cellular devices to hack into dozens of computer networks, federal authorities located him with the help of a cohort named Justin Peterson. A few years earlier, according to hacking folklore, Peterson helped feds find Kevin Poulsennow a senior editor at Wired who was then a fugitive wanted for a string of wire-fraud and phone-phreaking offenses. Peterson, who was being pursued for hacking crimes of his own, also helped investigators locate Ronald Austin, who was wanted for breaking into Arpanet servers."I can't think of any (hacking) case where there wasn't an informant involved because when these guys get busted, they roll," Kevin Mitnick, who is now a professional security consultant, told Ars. "They sing like a bird to get themselves out of trouble. It's common."More recently, there was the case of Max Butler, a hacker arrested in 2007 for the theft of 2 million credit card numbers following invaluable information cohort Christopher Aragon provided to the FBI.A few years later, another prolific carder named Albert Gonzalez was undone in part by help given to authorities from an associate who had helped him hack into dozens of retail and payment processor networks and steal data for tens of millions of cards. Besides the sophistication of the operation and the estimated $400 million worth of damage it caused to TJX, Heartland Payment Systems, and other victims, the Gonzalez case was significant for just how deep the duplicity went. Even as he masterminded the crimes, Gonzalez was a paid informant for the Secret Service who helped put away more than a dozen members of Shadowcrew, an online bazaar where crooks went to buy and sell payment card numbers and other data used in fraud.Adrian Lamo, another hacker who served time in federal prison, also became an informant of sorts when he supplied government investigators with chat transcripts of Bradley Manning detailing his leaking of hundreds of thousands of classified US documents to WikiLeaks.Enter SabuIn a series of Fox News exclusives, FBI officials said they arrested Sabu in June and quickly convinced him to become an informant. Court documents filed on Tuesday against five of his alleged associates show just how eager the 28-year-old father of twowhose real name is Hector Xavier Monsegurwas to help build a case against his one-time comrades. In late December, an alleged member of the splinter group Lulzsec entered a password-protected chat channel to report on the progress he was making in reformatting gigabytes of information stolen after breaching the security of Austin, Texas-based Strategic Forecasting Inc. so it could be publicly released on the Internet.On December 26, when the hacker identified as Jeremy Hammond of Chicago said some 60,000 confidential e-mails were close to being released, Monsegur replied with forced enthusiasm."Weee," he replied, as federal agents looked on.Transcripts of other chats show Monsegur painstakingly drawing incriminating information out of Hammond, who used multiple hacking handles to make it harder for investigators to link them to a single individual. In one session, he referred to Hammond by the aliases "sup_g" and "anarchaos" in what's now a not-so-oblique attempt to help feds prove the handles were masks used to hide the same individual. At other points, Monsegur, who was under constant supervision while conducting the sting, teased out details about a 2004 arrest of Hammond at the Republican National Convention in New York, a conviction the following year for a hack that stole credit card numbers from a politically conservative website, and a 2011 arrest for possession of marijuana.Transcripts of chats Monsegur conducted with a hacker alternately called "palladium," "polonium," and "anonsacco" show him working tirelessly to establish that the handles belonged to one Donncha O'Cearrbhail of Ireland. Prosecutors ultimately used the sessions to support allegations the 19-year-old infiltrated and recorded a conference call between members of the FBI and UK police on the topic of Anonymous.The dark side of confidential informantsThe transcripts of Sabu's dealings with the people he set up also shows the darker side of law enforcement's reliance on alleged criminals to win indictments and convictions. Discussions about the attack on Stratfor and the resulting exposure of e-mails, credit card details and passwords for more than 800,000 of its clients and employees means that agents monitoring the sessions had advanced notice that crimes would take place and chose not to stop them. From December 6 through early February, about $700,000 in unauthorized charges were made to the payment cards compromised in the hack. The price of protecting the confidentiality of the sting meant they had little choice but to stand by as the charges continued to accrue.Law enforcement photosSimilarly, agents monitoring Sabu's chats with Anonsacco had advanced notice that the Irish hacker had compromised the e-mail account of a senior UK law enforcement official and planned to use the access to intercept what was supposed to be a confidential conference call between FBI agents and their counterparts in Europe to discuss their investigation into Anonymous. Eleven days later, agents monitoring the chat sat by helplessly as Anonsacco discussed ways to use a recording of the call for maximum effect."I think we need to hype it up," the court documents quote Anonsacco as saying during a January 28 chat. "Let the feds think we have been recording their calls. They will be paranoid that none of their communications methods are safe or secure from Anon." A week later, agents found the recording had been posted to YouTube.Mark D. Rasch, a former US attorney who prosecuted hackers, said investigators often have little choice but to work with confidential informants when pursuing certain types of suspects. Like organized crime gangs, hacking groups are secretive organizations that aren't easily infiltrated. Because charges often revolve around conspiracies, it's crucial that conversations, agreements, and plans among members be carefully documented.Entrapping others to save yourself"Informants are an incredibly important tool for prosecutors to use, but like any tool, they need to be appropriately evaluated and used carefully," Rasch told Ars. "You want to get someone who's cooperating but you also need to know what they're doing and have some control over it."One of the last things a prosecutor wants to see is confidential witnesses like Gonzalez, whose misdeeds overshadow those who are being targeted in the initial investigation, Rasch added.Mitnick said the pressure on suspects to cooperate is enormous. He estimates the five years he spent in federal prisoneight months of them in solitary confinementwere 25 percent to 50 percent longer than he would have served if he had agreed to become a cooperating witness in other cases. He said he opted out."I didn't feel it was right to inform and entrap others to get myself out of my own trouble," he explained. I thought that was a pretty rotten thing to do. Even though I violated the law, my ethics and morals wouldn't let me do it."