Advertisement
voice

FFFriday III: Mantech Mayhem [Release Statement]

Jul 30th, 2011
17,751
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.29 KB | None | 0 0
  1. _ _ __ __
  2. __| || |__ _____ _____/ |_|__| ______ ____ ____ #Anonymous
  3. \ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #AntiSec
  4. | || | / __ \| | \ | | |\___ \\ ___/\ \___ #FUCK
  5. /_ ~~ _\ (____ /___| /__| |__/____ \ \___ \ \___ | #FBI
  6. |_||_| \/ \/ \/ \/ \/ #FRIDAY
  7.  
  8. /*******************************************************************************
  9. *** FUCK FBI FRIDAY III: ManTech Mayhem ***
  10. *******************************************************************************/
  11.  
  12. Ahoy thar,
  13.  
  14. Today is Friday and we will be following the tradition of humiliating our friends
  15. from the FBI once again. This time we hit one of their biggest contractors for
  16. cyber security: Mantech International Corporation.
  17.  
  18. What ManTech has to do with the FBI? Well, quite simple: In Summer 2010 the FBI
  19. had the glorious idea to outsource their Cybersecurity to ManTech. Value of the
  20. contract: 100 Million US-Dollar:
  21.  
  22. "The FBI is outsourcing cybersecurity to the tune of nearly $100 million to a
  23. Washington-area managed services company. The deal shows a willingness in the
  24. federal government to place IT services more and more in the hands of third
  25. parties as agencies don't have enough staff on hand to do the job."
  26.  
  27. http://www.informationweek.com/news/government/security/226700486
  28.  
  29. And this is not the only Cybersecurity contract ManTech won; with a quick
  30. internet search you will be able to find lots more. And just a few months back,
  31. in March 2011, ManTech received another 9 Million cybersecurity contract from
  32. the FBI:
  33.  
  34. http://www.euroinvestor.co.uk/news/story.aspx?id=11545467
  35.  
  36. Well done, good sirs. You failed epically. Because we pwned ManTech utterly and
  37. throughly; and we did not need hundreds of millions for it. In fact, we did not
  38. require any funds at all, we did it with Lulz.
  39.  
  40. So we begin by releasing 400MB of internal data from ManTech, this gives
  41. some insight on how they are wasting the tax payer's money. Most of the
  42. documents in this first batch are related to NATO who, you may recall, made some
  43. bold claims regarding Anonymous earlier this year:
  44.  
  45. "It remains to be seen how much time Anonymous has for pursuing such paths.
  46. The longer these attacks persist the more likely countermeasures will be
  47. developed, implemented, the groups will be infiltrated and perpetrators
  48. persecuted"
  49.  
  50. http://www.nato-pa.int/default.asp?SHORTCUT=2443
  51.  
  52. Indeed, it remains to be seen. It also remains to be seen how much longer the
  53. public will accept how completely incompetent law enforcement agencies are
  54. spending their citizens' money to fund even more incompetent federal
  55. contractors. Incidentally, apart from the FBI, ManTech International has some other
  56. clients:
  57.  
  58. * Defense Intelligence Agency,
  59. * National Geospatial-Intelligence Agency
  60. * National Reconnaissance Office
  61. * National Security Agency
  62. * Department of Homeland Security
  63. * U.S. Navy, Air Force, Army, Marine Corps
  64. * Missile Defense Agency and DARPA
  65. * Department of Justice
  66. * Department of State
  67. * Environmental Protection Agency
  68. * NASA, NATO, state and local governments
  69.  
  70. Great. It's really good to know that you guys are taking care of protecting the
  71. Unites States from so-called cyber threats.
  72.  
  73. It should also be noted that ManTech, along with HBGary, Palantir, Endgames and
  74. others were involved in the now-dubbed Operation MetalGear to manipulate and spy
  75. on their citizens using persona management software for social networks:
  76.  
  77. http://wiki.echelon2.org/wiki/Mantech
  78.  
  79. We are providing these ManTech documents so the public can see for themselves
  80. how their tax money is being spent. But don't you worry, the U.S. is a rich
  81. country and can afford to waste money, right?
  82.  
  83. Dear Government and Law Enforcement, we are repeating this message as we have
  84. the suspicion you still do not take us seriously: We are not scared anymore and
  85. your threats to arrest us are meaningless. We will continue to demonstrate how
  86. you fail at about every aspect of cybersecurity while burning hundreds of
  87. millions of dollars that you do not even have.
  88.  
  89. The director of the U.S. Computer Emergency Response Team (CERT), Randy
  90. Vickers, already resigned from his post, without proving an explanation. Let us
  91. provide you with one: Mr. Vickers realized that he is on the losing side of
  92. this war. A war that should never have been started in the first place. Not
  93. only because the enemy was vastly underestimated and misjudged completely but
  94. even more because it is fought against innocent citizens who simply chose to
  95. protest against the grievance of the government. You cannot win this war and
  96. the sooner you realize this and call for peace, the sooner we can put an end to
  97. this and solve the problems of this world together.
  98.  
  99. Dear citizens of the U.S. and the world: We are fighting in the name of all the
  100. oppressed and betrayed people. In your name we will continue to fire upon these
  101. laughable battleships until they are no more. Hold on tight while the seas are
  102. rough but we will prevail!
  103.  
  104. Anonymous
  105. AntiSec
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement