anonymous operation payback indictment

Upload: leaksourceinfo

Post on 14-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 Anonymous Operation Payback Indictment

    1/28

    I N T H E U N I T E D S T A T E S D I S T R I C T C O U R T F O R TE A S T E R N D I S T R I C T O F V I R G I N I A

    Alexandria Division

    ^E OCTL

    2013

    CLLUK. U.S. DISTRICT COUALEXANDRIA. VIRGINIA

    UNITED STATES O F AMERICA

    v.

    DENNIS OWEN COLLINS,a/k/a "iowa," "owen," "anon5,"

    JEREMY LEROY HELLER,a/k/a "Jeremyhfht," "heelgea,"ZHIWEI CHEN,

    a/k/a "Jack," "TickL," "TickLe," "internets,'"Zhiwei,"

    JOSHUA S. PHY,a/k/a "Anonyjosh,"RYAN RUSSELL GUBELE,a/k/a "grishnav,"ROBERT AUDUBON WHITFIELD,a/k/a "mightymooch,"ANTHONY TADROS,

    a/k/a ''Winslow,*'GEOFFREY KENNETH COMMANDER,a/k/a "jake," "bipto,"PHILLIP GARRETT SIMPSON,

    a/k/a "jikbag,"AUSTEN L. STAMM,a/k/a "user_x,"TIMOTHY ROBERTMcCLAIN,WADE CARLWILLIAMS,a/k/a "TheMiNd," andTHOMAS J. BELL,

    Defendants.

    Criminal No. l :13-cr-383

    Count One: 18 U.S.C. 371Conspiracy to Intentionally CauseDamage to a Protected Computer

    Forfei ture Notice

    INDICTMENT

    OCTOBER 2013 Term- at Alexandria, Virginia

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 1 of 28 PageID# 1

  • 7/27/2019 Anonymous Operation Payback Indictment

    2/28

    T H E G R A N D J U R Y C H A R G E S T H A T :

    COUN T ONE

    At all t imes re levant to th is Indic tment:

    1. Between on or about September 16,2010 and at least January 2, 2011, defendantsDENNIS OWEN COLLINS, JEREMYLEROY HELLER, ZHIWEI CHEN, JOSHUA S. PHY,RYANRUSSELL GUBELE,ROBERTAUDUBONWHITFIELD, ANTHONY TADROS,GEOFFREY KENNETH COMMANDER, PHILLIP GARRETT SIMPSON, AUSTEN L.STAMM, TIMOTHY ROBERTMcCLAIN, WADE CARL WILLIAMS, and THOMAS J.BELL, together with others known and unknown to the Grand Jury, participated in a worldwideconspiracy as part of the onlinegroupANONYMOUS in a campaign dubbed "OPERATIONPAYBACK"(or "OPERATION: PAYBACKISA BITCH,") to engage in a coordinatedseriesof cyber-attacks against victims.

    2. OPERATIONPAYBACKtargeted victims worldwide, including governmentalentities, trade associations, individuals, law firms, and financial institutions, whichANONYMOUS claimedopposed its statedphilosophy ofmakingall information free for all,including information protected by copyrightlawsor national securityconsiderations. As aresult, the defendants, together with other ANONYMOUS members known and unknown to theGrand Jury, launched, or attempted to launch, cyber-attacks against entities including theRecording Industry Association ofAmerica ("RIAA") intheEastern District ofVirginia, theMotion Picture Association ofAmerica ("MPAA"), theUnited States Copyright Office of theLibrary ofCongress, Visa, MasterCard, and Bank ofAmerica, and caused significant damage tovictims.

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 2 of 28 PageID# 2

  • 7/27/2019 Anonymous Operation Payback Indictment

    3/28

    3. From on or about September 16, 2010 through on or about January 2, 2011, in theEastern District ofVirginia, and elsewhere, defendants DENNIS OWEN COLLINS, JEREMYLEROY HELLER, ZHIWEI CHEN, JOSHUA S. PHY, RYAN RUSSELL GUBELE, ROBERTAUDUBON WHITFIELD, ANTHONY TADROS, GEOFFREY KENNETH COMMANDER,PHILLIP GARRETT SIMPSON, AUSTEN L. STAMM, TIMOTHY ROBERTMcCLAIN,WADE CARLWILLIAMS, and THOMAS J. BELL, each knowingly and intentionallyconspired and agreed together and with each other, and with others known and unknown to theGrand Jury, including unindicted co-conspirators known and unknown to the Grand Jury, to

    commit an offense against the United States, that is, to knowingly cause the transmission of aprogram, information, code, and command, and, as a result of such conduct, intentionally causedamage, and attempt to cause damage, without authorization, to a protected computer, with suchdamage and attempted damage during the one-year period beginning on or aboutSeptember 16, 2010 affecting ten or more protected computers and causing loss to victimsresulting from the course of conduct affecting protected computers aggregating at least $5,000 invalue, in violation ofTitle 18, United States Code, Sections 1030(a)(5)(A), 1030(b), and1030(c)(4)(B).

    MANNE R A ND ME AN S OF THE CON SP IR ACY

    It was a part of the conspiracy that:4. Defendants DENNIS OWEN COLLINS, JEREMY LEROY HELLER, ZHIWEI

    CHEN, JOSHUA S. PHY, RYAN RUSSELL GUBELE, ROBERTAUDUBON WHITFIELD,ANTHONY TADROS, GEOFFREY KENNETH COMMANDER, PHILLIP GARRETTSIMPSON, AUSTEN L. STAMM, TIMOTHY ROBERT McCLAIN, WADE CARLWILLIAMS, and THOMAS J. BELL, as part ofANONYMOUS, planned and executed a

    3

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 3 of 28 PageID# 3

  • 7/27/2019 Anonymous Operation Payback Indictment

    4/28

    coordinated series of cyber-attacks against victim websites by flooding thosewebsiteswith ahuge volume of irrelevant Internet traffic with the intent to make the resources onthewebsitesunavailable to customers and users of those websites. This method of online attack is known as aDistributed Denial of Service ("DDoS") attack.

    5. Theweaponof choice for the DDoS cyber-attacks which defendants DENNISOWEN COLLINS, JEREMY LEROY HELLER, ZHIWEI CHEN, JOSHUA S. PHY, RYANRUSSELL GUBELE, ROBERT AUDUBON WHITFIELD, ANTHONY TADROS,GEOFFREY KENNETH COMMANDER, PHILLIP GARRETT SIMPSON, AUSTEN L.STAMM, TIMOTHY ROBERTMcCLAIN, WADE CARL WILLIAMS, and THOMAS J.BELL, used and, in some cases, publicized and distributed to other ANONYMOUS members,was a freely-available and downloadable network stress testing program known as the Low OrbitIon Cannon ("LOIC").

    6. To generate enough irrelevant Internet traffic to effectively shut down a specificwebsite required the collective firing ofmany LOIC tools at the same time and at the samewebsite address (the Internet Protocol or IP address). Members ofANONYMOUS, includingDENNIS OWEN COLLINS, JEREMY LEROY HELLER, ZHIWEI CHEN, JOSHUA S. PHY,RYAN RUSSELL GUBELE, ROBERT AUDUBONWHITFIELD, ANTHONY TADROS,GEOFFREY KENNETH COMMANDER, PHILLIP GARRETT SIMPSON, AUSTEN L.STAMM, TIMOTHY ROBERT McCLAIN, WADE CARLWILLIAMS, and THOMAS J.BELL, participated in and coordinated these DDoS cyber-attacks - deciding on the next target;publicizing the victim names and IP addresses; announcing dates, times, and relevantinstructions; downloading the LOIC tool; and recruiting more attackers - through postings(collectively, "fliers") on web bulletin boards and through social media and dedicated online

    4

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 4 of 28 PageID# 4

  • 7/27/2019 Anonymous Operation Payback Indictment

    5/28

    chatrooms known as Internet Relay Chat ("IRC") channels. IRC channels used byANONYMOUS for OPERATION PAYBACK included the ^command, tfsaveTPB,#savethepiratebay, and#operationpayback channels.

    7. OPERATION PAYBACK caused damage affecting at least ten protectedcomputers and caused loss aggregating at least $5,000 invalue during a one-year period.

    OVERT ACTSIn furtherance ofthe conspiracy andto effect theobjects of the conspiracy, the following

    overt acts, among others, were committed intheEastern District ofVirginia and elsewhere:8. Inor about September 2010,members ofANONYMOUS launched OPERATION

    PAYBACK to retaliate against thediscontinuation of "ThePirateBay,"a Sweden-based file-sharing website dedicated to the illegal downloading of copyrighted material.

    9. On or about September 16,2010, a memberof the conspiracy posted a flier on awebbulletin board advertisinga cyber-attackagainst theMotion PictureAssociation of America("MPAA") website hosted inCalifornia. The flier announced: "We target the bastard group thathas thus far led this charge againstour websites, likeThe PirateBay. We targetMPAA.ORG!The IP is designated at [IP address], and our firing time remainsTHESAME." The flierprovided the location at which co-conspirators could download theLOIC tool, and gaveinstructions as follows: "Install the LOIC linked above into any directory you choose, load it upand set the targetIP to [IP address] port 80Method will be TCP, threads set to 10+,with amessage of 'Payback is a bitch'... Everything elsemustbe left blank. Onceyou havethe targetlocked, DO NOT FIRE. REPEAT: DO NOT FIRE! This will be a calm, coordinated display ofblood. We will not be merciful. We wil not be newfags. The first wave will be firing in: ONE

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 5 of 28 PageID# 5

  • 7/27/2019 Anonymous Operation Payback Indictment

    6/28

    DAY: 09/17/2010 9PM EASTERN When it comes time to fire, ignore all warning messages.They mean nothing. Keep firing."

    10. On or about September 17, 2010, members of the conspiracy launched the DDoScyber-attack onMPAA.org. During theDDoS cyber-attack, defendant JEREMY LEROYHELLER repeatedly checked the status of theMPAA.org website.

    11. On or about September 18,2010, defendant ZHIWEI CHEN, as "internets,"participated in theDDoS cyber-attack onMPAA.org in a dedicated chat channel forOPERATION PAYBACK.

    12. Also on or about September 18, 2010, during the DDoS cyber-attack onMPAA.org, defendant RYANRUSSELL GUBELE, as "grishnav," monitored the effect of theattack on the victim website and issued warnings that the MPAA.org website was now at adifferent IP address: "need threads guys! mpaa.org is back! they have a new IP." GUBELEfurther announced: "new mpaa IP is an anti-ddos service... someone took notice."

    13. Also on or about September 18, 2010, during the DDoS cyber-attack onMPAA.org, defendantJEREMYLEROYHELLER,as "Jeremyhfht," announced in #saveTPBthat an attack on the Recording Industry Association ofAmerica ("RIAA") in the EasternDistrict of Virginiawas scheduled for the following day. HELLER also directed that anothermember of the conspiracyedit a propaganda flier announcing the attack.

    14. As a result of this DDoS cyber-attack by ANONYMOUS, the MPAA suffered atleast $5,000 in losses during a one-year period.

    15. Also on or about September 18, 2010, a member of the conspiracy posted a flieron a web bulletin board announcing a cyber-attack against the Recording Industry Association ofAmerica ("RIAA") website hosted in the Eastern District ofVirginia. The flier, captioned

    6

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 6 of 28 PageID# 6

  • 7/27/2019 Anonymous Operation Payback Indictment

    7/28

    "Operation:Payback (is a bitch)," provided instructions on how to download the LOIC tool,published the targetIP address for theRIAA, and declared: "Our first objectivewas to takedownAiplex, the ones that DDoSedTPB [The Pirate Bay]. Everything had went even betterthan expected. We selected a new target, MPAA, in just eight minutes after launching the attack,their website suffered another tremendous blow at our Hands. We will be launching a secondattack against the RIAA on September 19th, 3:00PM EDT."

    16. In connection with the RIAA DDoS cyber-attack, defendant RYAN RUSSELLGUBELE accessed RIAA network resources approximately 150 times.

    17. As a result of the DDoS cyber-attacks by ANONYMOUS in September 2010, theRIAA suffered at least $5,000 in losses during a one-year period.

    18. During the September 19, 2010 DDoS cyber-attack on RIAA, defendantJEREMY LEROY HELLER, as "Jeremyhfht," led a group vote in #saveTPB to formally namethe online groupas ANONYMOUS. Co-conspirators in #saveTPB and #savethepiratebay alsodiscussed DDoS cyber-attacks against Davenport Lyons, a British law firm helping clients toprotect intellectualproperty rights, and the British Phonographic Institute ("BPI"), which is atrade association representing the United Kingdom's recorded music industry. HELLERannounced the a t tack on BPI.

    19. Also on or about September 19,2010, a member of the conspiracy posted a flierannouncing a DDoS cyber-attack on BPI: "WE ARE ANONYMOUS. For the past 72 hours wehave brought down the oppresive RIAA and MPAA. These corperations have fought to restrictour freedoms... We brought them down the same way they brought down The Pirate Bay, with adistributed denial of service.. . There is one corperation that has so far escaped our notice. BPI,the British Phonographic Industry. .. So what can you do to help? Download LOIC or

    7

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 7 of 28 PageID# 7

  • 7/27/2019 Anonymous Operation Payback Indictment

    8/28

    JavaLOlC, chargeyour lazahs, and point themat [IP address] ... Remember, don't start shootinguntil 4:00 GMT Monday September 20."

    20. Thatday, September 19,2010, members of the conspiracylaunched a DDoScyber-attack againstthe BPIwebsitehostedin theUnitedKingdom.

    21. Duringthe attackon BPIonor aboutSeptember 19,2010, defendant ZHIWEICHEN, as "TickL," coachedotherco-conspirators in #savethepiratebay how to specifically usethe LOIC tool to accomplish the DDoS cyber-attack.

    22. On or about September 20, 2010, duringthe DDoS cyber-attack on BPI, membersof the conspiracy agreed in #saveTPB inwhichdefendant JEREMYLEROYHELLERwasachannel operator to attack theRIAA next. Amember of theconspiracy posted a flierannouncing anotherDDoScyber-attack on theRIAAin the EasternDistrictof Virginia that sameday at 8 p.m. An unindicted co-conspirator alsoused the socialmediaplatformTwittertoannounce "RAID ON THE RIAA OCCURJNGAT 0000 GMT," and included a l ink to anannouncement for the attack. That same day, members of the conspiracy also scheduled anotherattackon theMPAAfor September 21,2010. Defendant JOSHUA S. PHYparticipated in thesediscussions.

    23. Also on or about September 20,2010, members of the conspiracy changed theDDoS cyber-attack target fromBPI to AiPlexSoftware Pvt.Ltd. ("AiPlex"), an anti-piracycompanybased in the Republic of India. In connectionwith this attack, a memberof theconspiracy posteda flier publishingthe IP address of AiPlexand instructing LOICuserstoinclude the message "Payback is a bitch" in the irrelevant Internet traffic aimed at the AiPlexwebsite.

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 8 of 28 PageID# 8

  • 7/27/2019 Anonymous Operation Payback Indictment

    9/28

    24. On this day, defendant JOSHUA S. PHY, as "Anonyjosh," also identified AiPlexas a current targetand toldmembers of the conspiracy to "FIRENOW!" Onor aboutSeptember 21,2010, PHY, in #saveTPB, posted a linkto "AnOpen Letter from Anonymous"describing theOPERATION PAYBACK campaign ofDDoS cyber-attacks against MPAA andRIAAin the EasternDistrictofVirginia. The letter vowed that "[tjhese successfulattacksonMPAA and RIAA's servers shall continue."

    25. Also on or about September 21,2010, defendant JEREMY LEROYHELLER, as"heelgea," anddefendant JOSHUA S.PHY, as "Anonyjosh," in #saveTPB, announced aDDoScyber-attack onMPAA, andmembers of theconspiracy launched a DDoS cyber-attack againstMPAA. During this attack,HELLERcoached co-conspirators on howto most effectively usethe LOIC tool, admitted to coordinating the DDoS cyber-attacks, and solicited more DDoScyber-attacks.

    26. Also on or about September 21, 2010, during the attack on RIAA in the EasternDistrict ofVirginia, members of the conspiracy planned DDoS cyber-attacks on ACS:Law, aBritish lawfirmhelpingclients to protect intellectual propertyrights, andAnti-piracy.nl, thewebsite for the BREIN foundation, a Dutch trade association fighting intellectual property theft.Once defendant JEREMY LEROY HELLER announced the new targets, members of theconspiracy launched DDoScyber-attacks againstthe websitesof ACS:Lawand theBREINfoundation.

    27. During the DDoS cyber-attacks against ACS:Law and the BREIN foundationonor about September 21, 2010, members of the conspiracy agreed to attack the AustralianFederation Against Copyright Theft ("AFACT") next.

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 9 of 28 PageID# 9

  • 7/27/2019 Anonymous Operation Payback Indictment

    10/28

  • 7/27/2019 Anonymous Operation Payback Indictment

    11/28

    our movement against anti-piracy organizations across the globe," provided the IP address forthe law firm's website, gave instructions on how to download and use the LOIC tool, andprovided the exact time for the attack in various time zones.

    34. On or about September 25,2010, during the DDoS cyber-attacks on AiPlex andACS:Law, members ofthe conspiracy planned another attack on AFACT. Defendant JEREMYLEROY HELLER, as "heelgea," in #savethepiratebay stated, "Our next target will suffer just asmuch as ACS law. WE WILL NOT STOP."

    35. Also on orabout September 25,2010, during the DDoS cyber-attacks on AiPlexand ACS:Law, amember ofthe conspiracy posted a link to a flier entitled "Payback is abitch,isn't it?" The flier explained that organizations supportive ofcopyright laws, such as the MPAA,the RIAA, BPI, AFACT, and BREIN, were engaged in "propaganda" and that "[i]n the end, ourDDoS efforts have been compared towaiting for a train. What do we have todo to be heard?To be taken seriously? Do we have to take to the streets, throwing molitovs, raiding offices ofthose we oppose? Realize, you are forcing our hand by ignoring us. You forced us to DDoSwhen you ignored the people, ATTACKED, the people, LIED TO THE PEOPLE!"

    36. Also onorabout September 25,2010, during theDDoS cyber-attacks onAiPlexand ACS:Law, members ofthe conspiracy publicly posted the personal identifying informationof various individuals associated with thetarget entities ofOPERATION PAYBACK. Suchpersonal identifying information included home addresses, the names ofspouses, credit carddetails, personal email addresses, dates ofbirth, and other private information.

    37. On orabout September 26, 2010, during the DDoS cyber-attacks onAiPlex andACS:Law, amember ofthe conspiracy in #savethepiratebay posted a link to an attack list whichincluded as upcoming targets additional anti-piracy groups in Australia, Belgium, and Brazil, and

    11

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 11 of 28 PageID# 11

  • 7/27/2019 Anonymous Operation Payback Indictment

    12/28

    another member ofthe conspiracy posted aflier entitled "OPERATION PAYBACK." The fliercited to the DDoS attacks against AiPlex, MPAA, RIAA, ACS:Law, and Davenport Lyons, andclaimed: "We took down their websites... Our next target will suffer just as much as ACS law.Every swine is destined for astick with two pointed ends, and Anonymous is the usher that leadsthese swine to their fate."

    38. Also onor about September 26,2010, members of the conspiracy beganlaunching aDDoS cyber-attack against AFACT, and on or about September 27,2010, amemberofthe conspiracy posted a link to a flier announcing the attack against AFACT, recruiting newattackers, and pointing them towhere to get the LOIC tool: "We will not stop, because we areAnonymous. We cannot be stopped, because we are the face ofthe Internet. The time to rise isnow. You know why you are here. You know why you have kept reading this. You know whyyou areangry. Now ACT onit. Get in the IRC."

    39. Onor about September 27,2010, defendant JEREMY LEROY HELLER, as"heelgea," in#savethepiratebay urged his co-conspirators to keep firing atAFACT to keep upthe DDoS cyber-attack.

    40. Onorabout September 29,2010,members ofthe conspiracy launched DDoScyber-attacks on the websites ofWeb Sheriff, aBritish company providing anti-piracy services,and DGLegal, aBritish legal consulting firm. As part of the attack, amember ofthe conspiracyposted a recruiting flier online under the OPERATION PAYBACK banner. The flier listedtargets hit as RIAA, AiPlex, and BPI, showed the current target as "WebSheriff.com," pointedreaders to #savethepiratebay and theLOIC tool, and proclaimed: "Anonymous needs You. Thehour ofVengeance has come.... We will keep the DDoS down as long aspossible. Lets do this,A n o n s . "

    1 2

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 12 of 28 PageID# 12

  • 7/27/2019 Anonymous Operation Payback Indictment

    13/28

    41. On or about September 30, 2010, during the attack on DGLegal, members of theconspiracy planned aDDoS cyber-attack on the U.S. law firm ofDunlapWeaver, which providesintellectual property services and has offices in Leesburg and Richmond, Virginia in the EasternDistrict ofVirginia.

    42. Also on or about September 30, 2010, defendant ZHIWEI CHEN, as "TickL,"identified the current target as DGLegal and cautioned co-conspirators not to target WebSheriffwith aDDoS cyber-attack but rather directed the co-conspirators to aWeb Sheriff link if they"wantto harm WebSheriff." Onor about October 2,2010, CHEN also advised co-conspiratorsthat "unless you are DoS'ing from aclosed internet source (like north korea) or from aclosedinsititution (school, prison, ect), YOU WILL NOT BE CAUGHT."

    43. Betweenonor aboutOctober 1,2010 and on or aboutOctober3, 2010,duringtheDDoS cyber-attack on DGLegal and thereafter, members ofthe conspiracy planned attacks onHadopi, aFrench institution dedicated to the protection of intellectual property rights; theMinistry ofSound, aBritish record label; and Gallant MacMillan LLP, aBritish law firm helpingclients to protect intellectual property rights. Members of the conspiracy posted fliersannouncing the attack: "We, the people, will be DDoSing www.gmlegal.co.uk [IP address] on3 October, 7PM GMT / 3PM EDT."

    44. On or about October 3,2010, becauseGallant MacMillan's website went downbefore the attack, ANONYMOUS abandoned the campaign, and instead launched amulti-dayDDoS cyber-attack onthe Ministry ofSound. During this attack, members of the conspiracysuggested aDDoS cyber-attack on the Spanish General Society ofAuthors and Publishers("SGAE").

    13

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 13 of 28 PageID# 13

  • 7/27/2019 Anonymous Operation Payback Indictment

    14/28

    45. On or about October 6, 2010, amember ofthe conspiracy posted a flier captionedOPERATION PAYBACK" advertising the date and time ofthe upcoming DDoS cyber-attack

    SGAE: "After GMlegal taking down their own site before the countdown ended, effectivelysurrendering, we changed target to MinistryOfSound.com and brought them down withinminutes, along with their sales page, for about 24h. Now it's time for a new target:www.sgae.es [IP address]." The flier further gave instructions on where and how participantscould download the LOIC tool for the attacks.

    46. Also on or about October 6, 2010,membersof the conspiracy launched a DDoScyber-attack on SGAE; planned acyber-attack on the Business Software Alliance ("BSA"), ananti-piracy trade association headquartered in Washington, D.C.; and planned and launchedattacks on the Spanish Ministry ofEducation, Culture, and Sport ("MCU") and Promusicae, aSpanish trade group representing the interests ofthe Spanish recording industry. In connectionwith planning various DDoS cyber-attacks, members ofthe conspiracy posted fliers captioned"OPERATIONPAYBACK"and claimed that: "We sick and tiredof these corporations seekingto control the internet in their pursuit ofprofit. Anonymous cannot sit by and do nothing whilethese organizations stifle the spread of ideas and attack those who wish to exercise their rights toshare wi th o the rs ."

    47. From on or about October 9,2010 to on or about October 12, 2010, members ofthe conspiracy launched DDoS cyber-attacks on the Federal Italian Music Industry (fimi.it), theItalian branch of the International Federation of Phonographic Industry (ifpi.it), and an Italiandirectory ofPro Music, an Italian directory of sites offering music products legally (pro-music.it). During this time, ANONYMOUS planned and launched another attack on GallantMacMillan.

    14

    on

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 14 of 28 PageID# 14

  • 7/27/2019 Anonymous Operation Payback Indictment

    15/28

    48. From onor about October 13, 2010 toonor about October 15,2010, during theDDoS cyber-attack on Gallant MacMillan, certain members ofthe conspiracy planned andlaunched DDoS cyber-attacks on the websites ofGene Simmons, an American performer whohas spoken out against music piracy, and Access Copyright, aCanadian copyright licensingagency, and discussed attacking the website ofLily Allen, aBritish pop music singer andsongwriter who has reportedly stated that illegal file-sharing hurts emerging artists. Flierscaptioned "Operation: Payback (is abitch)" advertising the attack against Gene Simmons statedthat"Mr.Simmons shares the same ideology asACS:Law andmany of ourothertargets. Thuslyhis website has been targeted."

    49. On or about October 16,2010, members of the conspiracy suggested a DDoScyber-attack onthewebsite oftheAustralian Communications and Media Authority(ACMA.gov.au), thegovernment entity responsible for the regulation of broadcasting, theInternet, radio, and telecommunications, andplannedand launcheda DDoScyber-attack on theBritish Intellectual Property Office (IPO.gov.uk), the official government body responsible forgranting intellectual property rights in the United Kingdom. OPERATION PAYBACK fliers 'advertising the attack stated thatthe reason forattacking the British Intellectual Property Officewasbecause it was "[pjerpetuating the system that is allowing the exploitative usageofcopyrights and intellectual property."

    50. Between on or about October 17,2010 and on or about October 19, 2010, duringthe attack on the British IntellectualProperty Office, members of the conspiracy planned andlaunchedDDoS cyber-attackson Gene Simmons's websites. During the attack, defendantDENNIS OWEN COLLINS, as "iowa," in #savethepiratebay, monitored the effectiveness of the

    15

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 15 of 28 PageID# 15

  • 7/27/2019 Anonymous Operation Payback Indictment

    16/28

  • 7/27/2019 Anonymous Operation Payback Indictment

    17/28

    Be against the massive power of copyright labels. We must take revenge. It's time forpayback... DDoS riaa.org on the 29th October 2010 9PM EST." The flier additionallyencouraged participants to harass the chairman and CEO ofRIAA and his wife and listed theirhome address in Fairfax Station, Virginia, in the Eastern District ofVirginia: "Send pizza andother crap. Get creative. Prank Call and black faxes for maximum lulz and Payback... We areAnonymous We are Legion We do not forgive We do not forget Expect Us."

    57. Also on or about October27, 2010, defendant DENNISOWENCOLLINS, as"iowa," advised co-conspirators how toconfigure the LOIC tool, encouraged them to "steal yourneighbors wireless," and provided a link to the LOIC tool to another member of the conspiracy.58. On or aboutOctober29,2010, duringa countdownto the plannedDDoS cyber-attack on RIAA, defendantDENNIS OWEN COLLINS as "iowa" and othermembers of theconspiracy posted fliers advertising the upcoming planned attack onRIAA as part ofOPERATION PAYBACK. One flier stated: "The Recording Industry Association ofAmerica,a private corporation, has crossed a line. Inshutting down Limewire, they have exercised morecontrol thananyprivate entity should be allowed. Globally, these corporations are trying tocensorthe internet, a placewithoutborders, a placewheremillionsfreelyshare ideasandinformation. If Limewireis gone today,what will we lose tomorrow?... Whendoesthis stop?Anonymous says it stops right now... Beagainst censorship. Beagainst private corporationshaving more rights than the average citizen. Beagainst themassive power of copyright labels.Wemust fight back. Nomoreshall wewait. It is time for action. If theydareto takedownLimewire, thenwe shall takedownthe RIAAin kind." Members of the conspiracythenlaunched a DDoS cyber-attack on RIAA.

    1 7

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 17 of 28 PageID# 17

  • 7/27/2019 Anonymous Operation Payback Indictment

    18/28

    59. OnorOctober 31,2010, members of theconspiracy launched amulti-day DDoScyber-attack on the website ofthe U.S. Copyright Office ofthe Library ofCongress located atwww.copyright.gov. According to the website of the U.S. Copyright Office: "Copyright law isthe engine of free expression inour society and amajor building block of the U.S. economy.Our national system ofcopyright law, which the Office administers, plays anessential role in thecreation, promotion, and dissemination ofAmerican works of authorship throughout the world,and sustainsbusinesses largeand small in the information, entertainment, and technologysectors. TheOffice's legal and policy functions help shape the future of copyright ona globalscale, while theOffice's copyright registration system provides an authoritative record ofAmerican creativity. TheOfficeoverseesstatutory licensingprogramsfor certain typesofcopyrighted works, andenriches theLibrary ofCongress's collections by ensuring that authorsprovide copies of their works to the Library in connection with theCopyright Act'smandatorydeposit provisions."

    60. On or about November l ,2010andonor about November 3,2010, defendantsDENNIS OWEN COLLINS, as "iowa," and ROBERT AUDUBONWHITFIELD, as"mightymooch," participated in theDDoScyber-attack on the websiteof the U.S.CopyrightOffice, in concert with their co-conspirators, by using the LOIC tool to flood the website of theU.S. Copyright Officewith requests in an effort to make the website inoperable.

    61. On or about November 3,2010, a member of the conspiracy posted a flier

    advertisingthe DDoScyber-attackon the website of the U.S. CopyrightOffice and directingparticipants to the LOIC tool, and members of the conspiracy launched the planned attack on theU.S. Copyright Office that day. As a result of this DDoS cyber-attack by ANONYMOUS, theU.S. Copyright Officesuffered at least $5,000 in losses during a one-year period.

    18

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 18 of 28 PageID# 18

  • 7/27/2019 Anonymous Operation Payback Indictment

    19/28

    62. OnoraboutNovember 4, 2010, during the attackon theU.S. Copyright Office,members of the conspiracy planned and launched aDDoS cyber-attack on Hadopi.

    63. Fromon or aboutNovember 4, 2010 to on or about November 5,2010, during theattack on Hadopi, members ofthe conspiracy planned and launched aDDoS cyber-attack on theIrelandNationalFederation againstCopyrightTheft ("INFACT").

    64. On or about November 7,2010, defendant DENNIS OWEN COLLINS, as"iowa," in#operationpayback stated thathe had created a "recruit channel," posted a link to theLOIC tool, and provided explicit instructions to another member of the conspiracy astothesettings for theLOIC tool toallowone tojoin aDDoS cyber-attack.

    65. Between on or about November 7,2010 and on or aboutNovember 11,2010,members of the conspiracylaunchedanotherDDoS cyber-attackon INFACT,while planningand launching a multi-day DDoS cyber-attack on the IrishRecorded Music Association("IRMA").

    66. On or about November 18,2010, defendant DENNIS OWEN COLLINS, as"iowa," posted a message in #operationpayback suggesting that the conspiracy shouldtargetwebsites to "temporarily shut off income."

    67. On or about November 19,2010, the Pirate Party of both the UK and the USAposted an online letterto OPERATION PAYBACK. The letter calledonANONYMOUS to"immediately cease your Distributed Denial-of-Service (DDoS) attacks and to instead seek out alegalmethodto express your frustration . . . . By continuingOperation: Payback attacks, youwillhamper those who promote copyright reform and curtailment of abuses of copyright, but who doso within the bounds of the law." The next day, members ofANONYMOUS posted a responseletter signed OPERATION PAYBACK stating that "we refuse to halt our actions."

    19

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 19 of 28 PageID# 19

  • 7/27/2019 Anonymous Operation Payback Indictment

    20/28

    68. Between on or aboutNovember23, 2010and onor aboutNovember 24, 2010,members ofthe conspiracy planned and launched aDDoS cyber-attack on the website ofTheFight Piracy Organization (fightpiracy.org) inCyprus.

    69. On or aboutNovember 26, 2010,members of the conspiracy launched a DDoScyber-attack on the website of the International Federation ofthe Phonographic Industry(IFPI.org) in the United Kingdom, and defendant DENNIS OWEN COLLINS, as "iowa,"identified the current target at IFPI.org. A flier advertising the IFPI.org attack directedparticipants to the LOIC tool, announced that "[t]he time has come to show these rich corporateIFPI bastardsthat the internet should alwaysbe an uncontrolled territory" andurged potentialparticipantsto "Get the F InHere."

    70. On or about November 27,2010, during the DDoS cyber-attack on IFPI.org,members of theconspiracy discussed launching a DDoS attackandothercyber-attacks on thewebsite of theU.S. Immigrationand CustomsEnforcement ("ICE") located in the EasternDistrict ofVirginia.

    71. Between on or about November 27,2010, and on or about November 28,2010,during themulti-day DDoS cyber-attack on IFPI.org, members of the conspiracy planned andlaunched a multi-day attack on the website ofWarnerBrothers, an American movie studio.

    72. On or about November 28, 2010, during the DDoS cyber-attacks on IFPI.org andWarner Brothers,a member of the conspiracyposted a link to a flier declaring "war on the USgovernment" andencouraging DDoS attacksonwebsites includingthat of theCentralIntelligenceAgency ("CIA") in the EasternDistrict ofVirginia.

    73. Also on or about November 28, 2010, during the DDoS cyber-attacks on IFPI.organd Warner Brothers, members of the conspiracy, including defendantWADE CARL

    2 0

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 20 of 28 PageID# 20

  • 7/27/2019 Anonymous Operation Payback Indictment

    21/28

    WILLIAMS, as "TheMiNd," planned an attack on the website ofa copyright compliance agent(copyright-compliance.com).

    74. Onor aboutNovember29, 2010, duringtheDDoScyber-attacks on IFPI.organdWarner Brothers, members of theconspiracy discussed targeting United States governmentwebsites for DDoS cyber-attacks, including the websites for The White House, the CentralIntelligence Agency, the Internal Revenue Service, the Department ofJustice, and the FederalBureau of Investigation. Inaddition, members ofOPERATION PAYBACK discussed movingdomain registration overseas to avoid seizure by Immigration and Customs Enforcement (ICE).

    75. On or about December 2,2010, members of the conspiracy continued the ongoingDDoS cyber-attacks on IFPI.organdWarnerBrothers.

    76. On or about December 3, 2010, members of the OPERATION PAYBACKconspiracy discussed possible new targets related toWikiLeaks, the organization which hadreleased U.S. State department confidential diplomatic cables in lateNovember 2010. Adraftstatement byOPERATION PAYBACK statedin response to thequestion "whatdoes[WikiLeaks] have todowith censorship and Operation Payback?" that""While wedon't havemuch ofan affiliation withWikiLeaks,we fight for the same reasons. Wewant transparency andwe counter censorship."

    77. On or about December 4, 2010, members of the conspiracy in #operationpaybackplanned DDoS cyber-attacks on thewebsites of entities thatwereeithercritical ofWikiLeaks orhadrefused to processpayments forWikiLeaks, includingAmazonandUnitedStatesSenatorJoseph Lieberman.

    21

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 21 of 28 PageID# 21

  • 7/27/2019 Anonymous Operation Payback Indictment

    22/28

    78. Onorabout December6, 2010,members of the conspiracy in #operationpaybackplanned an attack on MasterCard and planned and launched aDDoS attack on PostFinance, aSwiss payments, e-finance, and electronic account management organization.

    79. On or about December 7, 2010, during the DDoS cyber-attack on PostFinance,members of the conspiracy planned and launched DDoS cyber-attacks ontheSwedishprosecutor's office; everydns.com; and Borgstrom and Bodstrom, aSwedish law firm; andplanned DDoS cyber-attacks on the websites of the British court system and the MetropolitanPolice in London, all in connectionwith arrestwarrants for sexual crimes issued for the foundero fWikiLeaks.

    80. On or about December 8,2010, members of the conspiracy launched a DDoScyber-attack onthewebsite ofMasterCard. Defendants ANTHONY TADROS, as "Winslow,"GEOFFREY KENNETH COMMANDER, as "bipto," PHILLIP GARRETT SIMPSON, as"jikbag," AUSTEN L. STAMM, as "user_x," TIMOTHY ROBERT McCLAIN, andTHOMASJ. BELL participated in theDDoS cyber-attack onMasterCard, in concert withtheircoconspirators, by usingthe LOICtool to flood thewebsiteofMasterCard with requests in aneffort to make the website inoperable.

    81. Also on or about December 8,2010, defendantWADE CARL WILLIAMS, as"TheMiNd," focusedmembers of the conspiracy on the current target, stating that "we need to behitting the companies who are subvertingwikileaksin the pocketbooks IMO."

    82. As a result of this DDoS cyber-attack by ANONYMOUS, MasterCard suffered atleast $5,000 in losses during a one-year period.

    22

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 22 of 28 PageID# 22

  • 7/27/2019 Anonymous Operation Payback Indictment

    23/28

    83. Also on or about December 8,2010, membersof the conspiracy planned andlaunched DDoS cyber-attacks on websites ofentities including Visa. In connection with theseattacks, members of the conspiracy posted fliers captioned "Operation: Payback."

    84. On or about December9, 2010,a member of the conspiracy posted an onlinedocument which expressed and re-confirmed the manner and means and object of the conspiracy,while members ofthe conspiracy planned aDDoS cyber-attack onthewebsite ofAmazon.com.Various fliers advertising theDDoS cyber-attacks provided step-by-step instructions onhowtouse the LOIC tool to "DDoS like a Pro."

    85. Also on or about December 9, 2010, members of the conspiracy planned andlaunched a DDoScyber-attack onMoneybookers.com, an onlinepayment service.

    86. Also on or about December 9,2010, defendant WADE CARL WILLIAMS, as"TheMiNd," statedthat "takeout internettransactions youhurt amazon,youhurt... visa,MC...you get the attention ofeveryone."

    87. On or about December 10,2010, after the DDoS cyber-attack onMoneybookers.com, a member ofthe conspiracy posted a linkto an online documentencouraging new participants tojoin OPERATION PAYBACK andto engage inDDoS cyber-attackswithoutgettingcaught. Adviceincluded: "F MAGNETS won't DELETE FEVERYTHINGunless they're exposed directly to the harddrive for a few minutes. Do not usethe recycle binto dump data!... Microwave works wonders onCDs, also onHDDs, pen driveand mos t electronics."

    88. Also on or about December 10,2010, members of the conspiracy launched aDDoS cyber-attack on thewebsite of theRecording Industry of SouthAfrica("RISA").

    23

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 23 of 28 PageID# 23

  • 7/27/2019 Anonymous Operation Payback Indictment

    24/28

    89. On or about December 11, 2010, after the attack on RISA, members of theconspiracy launched another planned DDoS cyber-attack on the website ofMasterCard.

    90. On or about December 12, 2010, during the attack on MasterCard, members ofthe conspiracy on #operationpayback launched a DDoScyber-attack on thewebsiteof Amazon.

    91. On or aboutDecember13,2010, a memberof the conspiracy posteda flier whichwarned members ofthe conspiracy about a planned "sweep ofARRESTS" and suggested thatindividuals "SECURELY DELETE YOUR LOGS (if youwere stupid enough to keep any)."

    92. On or aboutDecember 16,2010, membersof the conspiracy launched a DDoScyber-attackon the websiteofArborNetworks,a DDoS mitigation firm.

    93. On or aboutDecember 18,2010, members of the conspiracy plannedandlaunched a multi-day DDoS cyber-attack on the websites ofBank ofAmerica.

    94. Onor aboutDecember22, 2010,members of the conspiracy launched anotherDDoS cyber-attack on SGAE.

    95. Also on or about December 22, 2010, during the attack on SGAE, a member ofthe conspiracyposted a link to online documentsdesigned to recruit newmembers to theconspiracy.

    96. Onor about December 24,2010, members of the conspiracy launched additionalDDoS cyber-attacks on thewebsites ofRIAA in theEastern District ofVirginia andMPAA.During theongoing attacks onRIAA and MPAA, amember oftheconspiracy posted a fliercaptioned "Operation: Payback," referenced the previous DDoS attacks onentities includingMasterCard and Visa, and announced the ongoing attacks on RIAA and MPAA.

    97. Between onor about December 25,2010andonor about December 27,2010,during theattacks onRIAA andMPAA, members of theconspiracy continued to plan and then

    2 4

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 24 of 28 PageID# 24

  • 7/27/2019 Anonymous Operation Payback Indictment

    25/28

    launch a DDoS cyber-attackon Bank ofAmerica. Members of the conspiracy posted flierscaptioned "Operation: Payback" which announced Bank of America as a target.

    98. On or about December 27, 2010, following the attack on Bank ofAmerica,members of the conspiracy launched another DDoS cyber-attack on BREIN.

    99. On or about December 29, 2010, in #operationpayback, defendant WADE CARLWILLIAMS, as "TheMiNd," posted a link to flier which identified the CEO ofBank ofAmericaand his wife by their names, home address, and phone number, for harassment.

    2 5

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 25 of 28 PageID# 25

  • 7/27/2019 Anonymous Operation Payback Indictment

    26/28

    100. On or about January 1, 2011, members of the conspiracy in #operationpaybackdiscussed an FBI operation in which the FBI seized servers used in DDoS cyber-attacks.

    (All in violation ofTitle 18,United States Code, Section 371.)

    26

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 26 of 28 PageID# 26

  • 7/27/2019 Anonymous Operation Payback Indictment

    27/28

    FORFEITURE NOTICEPursuant toRule 32.2(a), each defendant is hereby notified that, if convicted ofthe

    offense alleged in Count One above, he shall forfeit to the United States, pursuant to18 U.S.C. 982(a)(2)(B) and 1030(i), any property, real or personal, constituting or derived from anyproceeds the defendants obtained directly or indirectly as a result ofthe offense, and all personalpropertythat was used or intendedto be usedto commitor to facilitatethe offense.

    27

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 27 of 28 PageID# 27

  • 7/27/2019 Anonymous Operation Payback Indictment

    28/28

    Pursuant to Title 21, United States Code, Section 853(p), as incorporated by Title 18,United States Code, Sections 982(b) and 1030(i)(2), the defendant shall forfeit substituteproperty if, by any act or omission of the defendant, the property described above, or any portionthereof, cannot be located upon the exercise ofdue diligence; has been transferred, sold to, ordeposited with athird party; has been placed beyond the jurisdiction of the Court; has beensubstantially diminished in value; or has been commingled with other property which cannot bedivided without difficulty.(In accordance with Title 18, United States Code, Sections 982 and 1030; and Rule 32.2(a),Federal Rules ofCriminal Procedure.)

    A TRUE BILL:I'unuontto the R-CovcmmentAcTii'c orlsteflofthisw h been filedundersell in this Clerk's Office.

    DANA J. BOENTEACTING UNITED STATES ATTORNEY

    Jay V. FrabhuAlexanderT.H.NguyenAssistantUnited States AttorneysMYTHILI RAMANACTINGASSISTANT ATTORNEYGENERALU.S. Department of JusticeCriminal DivisionRichard D. GreenTrial Attorney, U.S.Department of JusticeComputer Crime & Intellectual Property Section

    Foreperson oftheGrand Jury

    28

    Case 1:13-cr-00383-LO Document 1 Filed 10/03/13 Page 28 of 28 PageID# 28