Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Mustafa Al-Bassam

From Wikipedia, the free encyclopedia
Iraqi-British computer hacker and co-founder of LulzSec

Mustafa Al-Bassam
Mustafa Al-Bassam giving a talk at the 34thChaos Communication Congress (2017)
BornJanuary 1995 (age 31)
Other namestflow
Citizenship
Alma mater
AwardsForbes 30 Under 30
Scientific career
FieldsComputer science
ThesisSecurely scaling blockchain base layers (2020)
Doctoral advisorGeorge Danezis

Mustafa Al-Bassam (born January 1995) is anIraqi-Britishcomputer security researcher,hacker, and co-founder of Celestia Labs.[1] Al-Bassam co-founded the hacker groupLulzSec in 2011, which was responsible for several high profile breaches.[2][3] He later went on to co-found Chainspace, a company implementing asmart contract platform, which was acquired byFacebook in 2019.[4][5] In 2021, Al-Bassam graduated fromUniversity College London, completing a PhD in computer science with a thesis on Securely Scaling Blockchain Base Layers.[6][7] In 2016,Forbes listed Al-Bassam as one of the30 Under 30 entrepreneurs in technology.[8]

Early life and education

[edit]

Al-Bassam was born inBaghdad,Iraq in January 1995, and migrated toLondon,United Kingdom when he was five years old.[9] He received aBSc in computer science fromKing's College London,[10][11] and subsequently completed aPhD atUniversity College London.[12]

Hacktivism

[edit]
Main article:LulzSec

In 2011 as a 16 year old teenager, Al-Bassam was one of the six core members ofLulzSec during its 50-day hacking spree, going by the alias "tflow". The group useddenial-of-service attacks and compromised a number of high profile organizations and corporations, includingSony,Fox,News International,Nintendo and theCIA.[3]

He was also affiliated with the online association ofhacktivists known asAnonymous, where he was involved with the hacking of emails fromHBGary Federal, anintelligence contractor for theU.S. government.[13] The emails revealed that HBGary Federal was working to developastroturfing software to create an "army" of fakesocial media profiles,[14] and was hired by theU.S. Chamber of Commerce to spy on and smear political opponents with fake documents and communications.[15] As a result, members of theU.S. Congress called for an investigation intoHBGary Federal.[15]

Arrest and legal proceedings

[edit]

On 20 July 2011, it was announced on Fox News and other press outlets[16][17][18] thatLondon's Metropolitan Police had arrested a 16-year-old student in London who was alleged to have used the nickname "Tflow" in a series of high-profile attacks on fox.com,[19] the FBI affiliate "Infragard",[20] PBS[21][22] and Sony.[23] For legal reasons, his name could not be disclosed for nearly two more years. On 9 April 2013, Tflow's full name was revealed along with his picture on multiple news outlets throughout the Internet.[24] He pleaded guilty to computer misuse and received a 20-month suspended sentence with 320 hours of unpaid community service work.[25] A nearly two-year internet ban imposed by police has since expired.[26][27]

Career and research

[edit]

Distributed ledgers

[edit]

Al-Bassam has published research on scaling blockchains and cryptocurrencies.[28] He contributed to the design and implementation of Chainspace, a blockchain protocol that makes use of sharding to increase transaction throughput.[29] Chainspace was later spun-out into a commercial company he co-founded, and was then acquired byFacebook in 2019 to become a part of theLibra project.[4][5] Al-Bassam has since been critical of Libra, stating that "the road to dystopia is paved with good intentions, and I'm concerned about Libra's model for decentralization".[4]

Privacy and surveillance

[edit]

In 2014 Al-Bassam volunteered forPrivacy International,[2] where he released research on the computer destruction techniques thatGCHQ used when forcing journalists atThe Guardian'sLondon headquarters to destroy the computers on which they stored copies of classified documents provided byNSAwhistleblowerEdward Snowden.[30]

In an article forMotherboard, he revealed thatGCHQ'sJoint Threat Research Intelligence Group (JTRIG), had been involved with onlinesockpuppetry by creating a series of fakeTwitter accounts and anURL shortener which was used as a honeypot for dissidents during theArab spring, having been targeted byJTRIG himself.[31]

Awards and honours

[edit]

In 2016, Al-Bassam was listed in theForbes 30 Under 30 in the technology section for his work on uncovering government surveillance.[8]

Wikimedia Commons has media related toMustafa Al-Bassam.

References

[edit]
  1. ^"Celestia".celestia.org. Retrieved29 August 2022.
  2. ^abColeman, E. Gabriella, 1973- (2014).Hacker, hoaxer, whistleblower, spy : the many faces of Anonymous. London.ISBN 9781781685839.OCLC 890807781.{{cite book}}: CS1 maint: location missing publisher (link) CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  3. ^abRobertson, Adi (16 May 2013)."LulzSec hackers sentenced to between one and three years in prison by UK court".The Verge. Retrieved21 July 2019.
  4. ^abcField, Matthew (26 June 2019)."The tiny UK start-up founded by UCL scientists now at the heart of Facebook's Libra currency".The Telegraph.ISSN 0307-1235. Retrieved21 July 2019.
  5. ^ab"Facebook Makes First Blockchain Acquisition With Chainspace: Sources".Cheddar. 4 February 2019. Retrieved21 July 2019.
  6. ^Al Bassam, Mustafa (28 December 2020)."Securely Scaling Blockchain Base Layers". UCL (University College London).
  7. ^"Mustafa Al-Bassam - Research Homepage".www0.cs.ucl.ac.uk. Retrieved29 August 2022.
  8. ^ab"Mustafa Al-Bassam".Forbes. Retrieved21 July 2019.
  9. ^Miller, Carl (Researcher on social media) (2018).The death of the gods : the new global power grab. London.ISBN 9781785151330.OCLC 1051237704.{{cite book}}: CS1 maint: location missing publisher (link)
  10. ^Bano, Shehar, Mustafa Al-Bassam, and George Danezis. "The road to scalable blockchain designs."USENIX; login: magazine (2017).
  11. ^"Cyber defence unit 'may use hackers'". 22 October 2013. Retrieved21 July 2019.
  12. ^"Despite high-profile hacks, companies still aren't behaving securely: ex-LulzSec hacker".www.cso.com.au. Retrieved21 July 2019.
  13. ^Bright, Peter (10 March 2012)."With arrests, HBGary hack saga finally ends".Ars Technica. Retrieved21 July 2019.
  14. ^Monbiot, George (23 February 2011)."The need to protect the internet from 'astroturfing' grows ever more urgent | George Monbiot".The Guardian.ISSN 0261-3077. Retrieved21 July 2019.
  15. ^abFogarty, Kevin (4 March 2011)."Congress eyes dirty tricks from HBGary, Chamber of Commerce".ITworld. Retrieved21 July 2019.
  16. ^"Leading Member of LulzSec Hacker Squad Arrested in London". Fox News. 19 July 2011. Retrieved30 October 2013.
  17. ^Bright, Peter (20 July 2011)."FBI arrests 16 Anons across US; UK police pick up LulzSec member". Ars Technica. Retrieved30 October 2013.
  18. ^"Hacker Arrests May Have Included Core Member Of LulzSec".Forbes. 19 July 2011. Retrieved30 October 2013.
  19. ^"Fox.com Hacked By Group Lulz Security". Huffingtonpost.com. 10 May 2011. Retrieved30 October 2013.
  20. ^Satter, Raphael G. (5 June 2011)."LulzSec Hackers Claim Breach Of FBI Affiliate Infragard Atlanta". Huffingtonpost.com. Retrieved30 October 2013.
  21. ^"PBS website hacked, defaced after WikiLeaks documentary evokes online ire". Latimesblogs.latimes.com. 30 May 2011. Retrieved30 October 2013.
  22. ^"Sites Hacked; Readers' Data Not Compromised". PBS NewsHour. 30 May 2011. Archived fromthe original on 1 June 2011. Retrieved30 October 2013.
  23. ^Albanesius, Chloe (3 June 2011)."Sony LulzSec Hack: What You Need to Know". PCMag.com. Retrieved30 October 2013.
  24. ^"Mustafa Al-Bassam". NakedSecurity.sophos.com. Archived fromthe original on 1 November 2013. Retrieved30 October 2013.
  25. ^How I Hacked The US Government Aged 16 | Minutes With | @LADbible TV, 30 May 2021, retrieved11 September 2021
  26. ^"Mustafa Al-Bassam (musalbas) on Twitter". Twitter.com. Retrieved30 October 2013.
  27. ^"Were you banned from the internet for two years like Jake Davis? | ask.fm/musalbas". Ask.fm. Archived fromthe original on 31 October 2013. Retrieved30 October 2013.
  28. ^"Mustafa Al-Bassam - Google Scholar Citations".scholar.google.com. Retrieved21 July 2019.
  29. ^Al-Bassam, Mustafa; Sonnino, Alberto; Bano, Shehar; Hrycyszyn, Dave; Danezis, George (2018)."Chainspace: A Sharded Smart Contracts Platform"(PDF).Proceedings 2018 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.doi:10.14722/ndss.2018.23241.ISBN 9781891562495.S2CID 1360317.
  30. ^McLaughlin, Jenna (26 August 2015)."The Way GCHQ Obliterated The Guardian's Laptops May Have Revealed More Than It Intended".The Intercept. Retrieved21 July 2019.
  31. ^Al-Bassam, Mustafa (29 July 2016)."British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents".Vice. Retrieved21 July 2019.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Authority control databases: AcademicsEdit this at Wikidata
Retrieved from "https://en.wikipedia.org/w/index.php?title=Mustafa_Al-Bassam&oldid=1333181702"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp