Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Gay Nigger Association of America

Page semi-protected
From Wikipedia, the free encyclopedia
(Redirected fromGNAA)

Defunct internet trolling group
"GNAA" redirects here. For other uses, seeGNAA (disambiguation).

Gay Nigger Association of America
AbbreviationGNAA
Formation2002; 23 years ago (2002)[1]
TypeInternet trolls
PurposeTrolling
AffiliationsGoatse Security[2][3][4]
Websitewww.gnaa.eu

TheGay Nigger Association of America (GNAA) was anInternet trolling group. They targeted several prominent websites and internet personalities includingSlashdot,Wikipedia,CNN,Barack Obama,Alex Jones, and prominent members of theblogosphere. They also released software products, and leaked screenshots and information about upcoming operating systems. In addition, they maintained a software repository and awiki-based site dedicated to internet commentary.[5][6]

Members of the GNAA also foundedGoatse Security, agrey hat information security group. Members of Goatse Security released information in June 2010 about email addresses onAT&T's website from people who had subscribed to mobile data service using theiPad. After the vulnerability was disclosed, the then-president of the GNAA,weev, and a GNAA member, "JacksonBrown", were arrested.[7]

Origins, known members and name

The group was run by a president.[4]New media researcherAndrew Lih stated that it was unclear whether or not there was initially a clearly defined group of GNAA members, or if founding and early members of the GNAA were online troublemakers united under the name in order to disrupt websites.[8] However, professorJodi Dean and Ross Cisneros claimed that they were an organized group of anti-blogging trolls.[5][9] Reporters also referred to the GNAA as a group.[10][11][12]

In her 2017 bookTroll Hunting, Australian journalistGinger Gorman identified the president of the GNAA as an individual fromColorado known as "Meepsheep".[13] Known former presidents of the GNAA were security researcher Jaime "asshurtmacfags" Cochran, who also co-founded the hacking group "Rustle League",[14] and "timecop", founder of the anime fansub group "Dattebayo".[13][15] Other members included former presidentAndrew "weev" Auernheimer, Daniel "JacksonBrown" Spitler,[7][16] and former spokesman Leon Kaiser.[17] GNAA has also been documented as having been loosely affiliated with the satirical wikiEncyclopedia Dramatica.[13]

The group's name incited controversy and was described as "causing immediate alarm in anyone with a semblance of good taste," "intentionally offensive",[8] and "spectacularly offensive".[10] The group denied allegations of racism and homophobia, explaining that the name was intended tosow disruption on the internet and challengesocial norms (claiming it was derived from the 1992 Danish satiricalblaxploitation filmGayniggers from Outer Space).[5] In an interview on the OfFenzive podcast, president Weev recalled an anecdote where the organization did actually once contain a member that was a homosexual black male.[18]

Trolling

The GNAA used many different methods of trolling. One was to simply "crapflood" a weblog's comment form with text consisting ofrepeated words and phrases.[5][10] On Wikipedia, members of the group created an article about the group, while adhering to Wikipedia's rules and policies, a process Andrew Lih says "essentially [used] the system against itself".[8] Another method included attacking manyInternet Relay Chat channels and networks using differentIRC flooding techniques.[19]

The GNAA also producedshock sites containingmalware.[5][20] One such site, "Last Measure", contained embedded malware that opened up "an endless cascade of pop-up windows displaying pornography or horrific medical pictures".[20][21] They also performedproof of concept demonstrations.[19][22] These actions occasionally interrupted the normal operation of popular websites.

2000s

In July 2004, two GNAA members submitted leaked screenshots of the upcoming operating systemMac OS X v10.4[23] to the popularMacintosh news websiteMacRumors.[24]

In June 2005, the GNAA announced that it had created a Mac OS X Tiger release forIntelx86 processors which caught media attention from various sources.[25][26][27] The next day, the supposed leak was mentioned on theG4 television showAttack of the Show.[28] TheISO image released viaBitTorrent merely booted ashock image[28][29] instead of the leaked operating system.[30]

On February 3, 2007, the GNAA successfully managed to convince CNN reporterPaula Zahn that "one in three Americans" believe that theSeptember 11, 2001, terror attacks werecarried out by Israeli agents.[31] CNN subsequently ran a story erroneously reporting this, involving a round-table discussion regarding antisemitism and an interview with the father of a Jewish 9/11 victim.[32] The GNAA-owned website said that "over 4,000" Jews were absent from work at the World Trade Center on 9/11.[32]

On February 11, 2007, an attack was launched on the website of US presidential candidate (and future US president)Barack Obama, where the group's name was caused to appear on the website's front page.[33]

2010s

In late January 2010, the GNAA used a then-obscure phenomenon known as cross-protocol scripting (a combination ofcross-site scripting andinter-protocol exploitation) to cause users of theFreenode IRC network to unknowingly flood IRC channels after visiting websites containing inter-protocol exploits.[11] They also have used a combination of inter-protocol, cross-site, andinteger overflow bugs in both theFirefox andSafari web browsers to flood IRC channels.[12]

On October 30, the GNAA began a trolling campaign in the aftermath ofHurricane Sandy on the US East Coast, spreading fake photographs andtweets of alleged looters in action. After the GNAA published a press-release detailing the incident,[34] mainstream media outlets began detailing how the prank was carried out.[35][36]

On December 3, the GNAA was identified as being responsible for across-site scripting attack onTumblr that resulted in thousands of Tumblr blogs being defaced with a pro-GNAA message.[37]

In January 2013, the GNAA collaborated with users on the imageboard4chan to start a "#cut4bieber" trend on Twitter, encouraging fans of Canadian pop singerJustin Bieber to practiceself-harm.[38][39]

From 2014 into 2015, GNAA members began playing an active role in theGamergate controversy, sabotaging efforts made by pro-Gamergate parties. Several GNAA members were able to gain administrative access to8chan's (an imageboard associated with Gamergate) primary Gamergate board, which they disrupted and ultimately closed. The GNAA also claimed responsibility for releasing private information related to many pro-Gamergate activists.[40]

On October 13, 2016, GNAA member Meepsheep vandalized Wikipedia to cause the entries forBill andHillary Clinton to be overlapped with pornographic images and a message endorsing Republican presidential candidateDonald Trump.[41]

In August 2017, GNAA was named as having been involved in a feud between employees of the popular dating appBumble, and tenants of the apartment building inAustin, Texas where the company was, at the time, illegally headquartered.[42] Joseph Bernstein ofBuzzFeed News reported that one of the building's residents contacted GNAA to "fight back" against Bumble after multiple complaints regarding the company's activities were ignored. The dispute resulted in Bumble choosing to relocate from the building, which GNAA claimed credit for in a press release the group spammed across several websites viaclickjacking.[42]

Goatse Security

Main article:Goatse Security
Goatse Security's logo. Their logo and name are a reference to the infamousshock sitegoatse.cx.[16]

In December 2009, several members of the GNAA with expertise ingrey hat[43] computer security research created the "Goatse Security" group to uncoversecurity vulnerabilities.[44] The members chose to use a separate name to publish their work because they thought that they would not be taken seriously when publishing under "GNAA".[16]

In June 2010, Goatse Security attracted mainstream media attention for their discovery of at least 114,000 unsecuredemail addresses[45][46] registered to Apple iPad devices for early adopters of Apple's 3G iPad service.[3][47] The data was aggregated from AT&T's own servers by feeding a publicly available script withHTTP requests containing randomly generatedICC-IDs, which would then return the associated email address. TheFBI soon investigated the incident. This investigation led to the arrest of then-GNAA President,[48] Andrew 'weev' Auernheimer, on unrelateddrug charges[49] resulting from an FBI search of his home.[16][50]

In January 2011, the Department of Justice announced that Auernheimer would be charged with one count of conspiracy to access a computer without authorization and one count of fraud.[51] A co-defendant, Daniel Spitler, was released on bail.[52][53] In June 2011, Spitler pleaded guilty on both counts after reaching a plea agreement with US attorneys.[54] On November 20, 2012, Auernheimer was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization.[55] On April 11, 2014, these convictions were overturned by the U.S. Court of Appeals for the Third Circuit on the basis that the New Jersey venue was improper and Auernheimer was subsequently released from prison.[56]

References

  1. ^"About". GNAA. Archived fromthe original on July 20, 2011. RetrievedJune 10, 2011.
  2. ^Emspak, Jesse (January 19, 2011)."The Case Against The iPad Hackers".International Business Times. Archived fromthe original on January 25, 2011. RetrievedMarch 19, 2011.
  3. ^abChokshi, Niraj (June 10, 2010)."Meet One of the Hackers Who Exposed the iPad Security Leak".The Atlantic.Atlantic Media Company. RetrievedFebruary 25, 2011.
  4. ^abRohr, Altieres (June 11, 2010)."Saiba como ocorreu falha que expôs e-mails de 114 mil usuários do iPad" [Know how failure exposing 114 thousand iPad user email addresses happened].Rede Globo (in Portuguese). RetrievedSeptember 13, 2010.
  5. ^abcdeDean, Jodi (2010).Blog Theory: Feedback and Capture in the Circuits of Drive.Cambridge, UK: Polity Press.ISBN 978-0-7456-4970-2. RetrievedAugust 27, 2010.
  6. ^"FreeNode, allarme sicurezza".PuntoInformatico (in Italian). June 28, 2006. RetrievedAugust 26, 2011.
  7. ^abBilton, Nick; Wortham, Jenna (January 19, 2011)."Two Are Charged With Fraud in iPad Security Breach".The New York Times. p. 4.
  8. ^abcLih, Andrew (March 17, 2009).The Wikipedia Revolution: How a Bunch of Nobodies Created the World's Greatest Encyclopedia. Cambridge, UK: Hyperion. pp. 170–71.ISBN 978-1-4001-1076-6.
  9. ^Cisneros, Ross B (2005).Regarding Evil (SM). Massachusetts Institute of Technology.
  10. ^abcKirkpatrick, Stewart (November 22, 2005)."Lazy Guide to Net Culture: Dark side of the rainbow".The Scotsman. RetrievedMarch 20, 2011.
  11. ^abConstantin, Lucian (January 30, 2010)."Firefox Bug Used to Harass Entire IRC Network".Softpedia. RetrievedMarch 17, 2011.
  12. ^abvan der Meijs, Sander (February 1, 2010)."Bug in Firefox gebruikt tegen IRC netwerk".Webwereld (in Dutch). IDG Netherlands. Archived fromthe original on July 22, 2012. RetrievedMarch 17, 2011.
  13. ^abcGorman, Ginger (April 16, 2019).Troll Hunting: Inside the World of Online Hate and its Human Fallout. Hardie Grant. pp. 185–194.ISBN 978-1743794357.
  14. ^"Meet the Mysterious Hacking Collective Who Love Trolling Anonymous".Vice. February 22, 2013. RetrievedJanuary 17, 2022.
  15. ^Eordogh, Fruzsina."Meet the Mysterious Hacking Collective Who Love Trolling Anonymous".Vice.com. RetrievedSeptember 6, 2022.
  16. ^abcdKaiser, Leon (January 19, 2011)."Interview: Goatse Security on FBI Charges Following AT&T iPad Breach".DailyTech (Interview: transcript). Interviewed by Mick, Jason. Archived fromthe original on March 31, 2014. RetrievedJanuary 21, 2011.
  17. ^"DailyTech - Interview: Goatse Security on FBI Charges Following AT&T iPad Breach". Archived fromthe original on March 31, 2014. RetrievedJanuary 31, 2011.
  18. ^"Ep 18 Andrew "Weev" Auernheimer – OfFenzive – Podcast". January 29, 2021.
  19. ^ab"Firefox-based attack wreaks havoc on IRC users",The Register, January 30, 2010, retrievedAugust 27, 2010
  20. ^abAttwood, Feona (2010).Porn.com: making sense of online pornography. Peter Lang.ISBN 978-1-4331-0207-3. RetrievedMarch 20, 2011.
  21. ^Jones, Dr. Steve (2011)."Horrorporn/Pornhorror: The Problematic Communities and Contexts of Online Shock Imagery"(PDF). Archived fromthe original(PDF) on March 18, 2014. RetrievedAugust 26, 2012.
  22. ^Very Ugly Bug at BarackObama.com.TechCrunch. Accessed August 27, 2010.
  23. ^"Wie typisch".Mac news (in German).DE: Giga. June 28, 2004. Archived fromthe original on August 2, 2012. RetrievedAugust 26, 2011.
  24. ^"Mac OS X 10.4 (Tiger) Screenshots?",MacRumors, June 26, 2004, retrievedAugust 27, 2010[permanent dead link]
  25. ^"Apple Mac OS X 10.4.1 for Intel hits piracy sites",Mac daily news (report), June 11, 2005, retrievedSeptember 6, 2010
  26. ^"OS X for x86 already in the wild?",Engadget, June 12, 2005, retrievedSeptember 6, 2010
  27. ^"Mac Hacks Allow OS X on PCs",Wired, August 2005, archived fromthe original on July 27, 2010, retrievedSeptember 8, 2010
  28. ^ab"Attack of the Show!".Attack of the Show!. June 2005.G4.
  29. ^"MacInDell Part Quatre – The Ruby Goldmine",Gizmodo, June 15, 2005, retrievedAugust 27, 2010
  30. ^Jumping on the bandwagon: OS X on x86! OMG!,TUAW, August 12, 2005, archived fromthe original on August 20, 2009, retrievedSeptember 7, 2010
  31. ^Welaratna, Deepthi (April 6, 2007)."Terror! Conspiracy! Hoax!".KQED Arts.KQED. Archived fromthe original on September 22, 2011. RetrievedMarch 18, 2011.
  32. ^ab"Paula Zahn Now".Transcripts. February 3, 2007.CNN.
  33. ^"Very Ugly Bug at BarackObama.com",Tech crunch, February 11, 2007
  34. ^Kaiser, Leon."GNAA Fabricates "Sandy Loot Crew", Media Bites". GNAA. Archived from the original on November 3, 2012. RetrievedNovember 2, 2012.
  35. ^Grubb, Ben."Twitter works up a storm over looting images".Sydney Morning Herald. RetrievedNovember 2, 2012.
  36. ^Dillon, Kit."Less Looting, More Trolling: Daily Mail, Drudge Get Pwnd By Twitter Pranksters #SandyLootCrew".Betabeat. RetrievedNovember 2, 2012.
  37. ^Hepburn, Ned (December 3, 2012)."Tumblr just got massively hacked".Deathandtaxesmag.com. RetrievedMarch 19, 2013.
  38. ^"Internet Trolls Start Sick Trend To Encourage Justin Bieber Fans To Self-Harm".stereoboard.com. January 8, 2013. RetrievedApril 16, 2013.
  39. ^"Justin Bieber fans draw shock, outrage with gruesome 'Cut4Bieber' trending topic".NY Daily News.
  40. ^Bernstein, Joseph (December 4, 2014)."GamerGate's Headquarters Has Been Destroyed By Trolls".BuzzFeed. RetrievedApril 25, 2015.
  41. ^O'Connor, Brendan (October 13, 2016)."Internet Trolls Vandalize Hillary and Bill Clinton's Wikipedia Pages in Extremely NSFW Way". Archived from the original on October 13, 2016. RetrievedMarch 24, 2024.
  42. ^abBernstein, Joseph (August 1, 2017)."Bumble's Former Neighbors Say It Was Using A Luxury Apartment Building As Its Personal Playground".BuzzFeed News. RetrievedJanuary 17, 2022.
  43. ^Kirsch, Cassandra (2014)."The Grey Hat Hacker: Reconciling Cyberspace Reality and the Law"(PDF).Northern Kentucky Law Review.41: 386.
  44. ^Dowell, Andrew (June 17, 2010)."Programmer Detained After FBI Search".The Wall Street Journal.Dow Jones & Company, Inc. Archived fromthe original on May 23, 2015. RetrievedOctober 11, 2010.
  45. ^Apple's iPad security breach reveals vulnerability of mobile devices.Washington Post. Accessed September 2, 2010.
  46. ^Apple's iPad Breach Raises Alarms.NPR. Accessed September 6, 2010.
  47. ^"Falha de segurança que expõe donos do iPad investigada pelo FBI" [Security failure exposing iPad owners investigated by the FBI].Tek (in Portuguese).PT:Sapo.pt. June 11, 2010. Archived fromthe original on July 23, 2011. RetrievedMarch 17, 2011.
  48. ^United States District Court — District Court of New Jersey, Docket: MAG 11-4022 (CCC). Filed with the court January 13, 2011
  49. ^Torrenzano, Richard; Davis, Mark W (2011).Digital Assassination: Protecting Your Reputation, Brand, Or Business. Macmillan. p. 116.ISBN 978-0-312-61791-2.
  50. ^Hacker in AT&T-iPad security case arrested on drug chargesArchived August 10, 2011, at theWayback Machine. CNET. Accessed September 1, 2010.
  51. ^McMillan, Robert; Jackson, Joab (January 18, 2011)."Criminal charges filed against AT&T iPad attackers".Computerworld. Archived fromthe original on October 10, 2012. RetrievedAugust 6, 2012.
  52. ^Voigt, Kurt (January 21, 2011)."No bail for 2nd iPad e-mail address theft suspect".MSNBC. NBC News. Associated Press. RetrievedFebruary 15, 2011.[dead link]
  53. ^Porter, David (February 28, 2011)."Suspect in iPad Data Theft Released on Bail in NJ".ABC News. Associated Press. RetrievedMarch 2, 2011.
  54. ^Smith, Catharine (June 23, 2011)."Daniel Spitler Pleads Guilty To iPad Hack, Email Address Theft".Huffington Post.
  55. ^Zetter, Kim (November 20, 2012)."Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data".Wired.com.
  56. ^Voreacos, David (April 14, 2014)."AT&T Hacker 'Weev' Parties and Tweets as Case Still Looms".Bloomberg. RetrievedApril 14, 2014.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=Gay_Nigger_Association_of_America&oldid=1306391944"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp