Brian Martin’s (jericho) crimes and frauds exposed for justice…Part 2

 

Brian Martin’s (jericho) crimes and frauds exposed for justice

Warning: If you have been blackmailed or denigrated by attrition.org / securityerrata.org websites operated by jericho (real name: Brian Marin) – do not hesitate to make a legal lawsuit against him:

Brian Martin jericho Brian Martin, jericho attrition Brian Martin, attrition
Real name: Mr. Brian Keith Allan Martin.
Born on: April 1973 in South Carolina.
Currently resides at: 12646 West Virginia Avenue, Denver 80228, CO, United States.
Place of work: consultant at Tenable Network Security since 2008.
Work email: bmartin@tenable.com

It may be also useful to make your lawyers contacting his current employer and inform them about his criminal activities and background (more information below).

Chronology of Brian Martin’s crimes and frauds

Mr. Brian Martin, described above, is an amateur criminal. He has been already brought to the justice in the past:

  • Arizona, Maricopa County Court
    12 April 1997, Case N°CR1998-009088-A
    Marijuana-possession and drug dealing.
  • Arizona, Maricopa County Court
    11 November 1998
    Driving license suspended for driving under alcohol.
  • Texas, Bexar Criminal Court
    12 April 1999, Case N°CC5-690773
    Unlawfully carrying a weapon.
  • Arizona, Maricopa County Court, Civil Court
    3 November 1999, Case N°TJ1999-000792
    Rent debts, unpaid credits and loans.

Currently Brian Martin operates attrition.org and securityerrata.org websites filled with garbage and meaningless information, where he periodically posts some articles with distortion of facts, fake “analysis” and defamation writings backed by dishonorable and/or criminal entities. His others inventive articles about great hacks that have never occurred or fabricated situations were obviously created under the influence of drugs and alcohol.

Some quick facts from Brian Martin’s bio:

  • Before joining Tenable he has never worked in security industry as he pretends to do, besides some one-man-show companies as a part-time or external consultant. However he publicly insults, threats and defames security professionals from such companies as Microsoft, Yahoo, Cisco, Oracle, Kaspersky, Symantec, AVG, Comodo, HP and Sony.
  • Kicked out from his Lubbock college in Texas for poor grades in 1993, he doesn’t have a university degree or any certificate. At the same time he dares calling world-famous security certification authorities (e.g. ISC2, EC-Council) ‘charlatans’.
  • He has never performed any serious security research in his life, besides some lame articles about nothing, or lying and misleading writings about individuals and companies who are more successful than him (99.9% of the industry).
  • Each time lawyers of his victims send him an email, he begins to panic on twitter saying that he is being menaced, and his life is in danger. Paranoia caused by psychological disorder, alcohol and drugs poisons his everyday life.
  • He is drug-addict since many years, consuming cocaine and marijuana, and actually doesn’t try to hide it.
  • He regularly surfs websites with animal pornography (Brian, small advise for the future: don’t click on untrusted links on twitter and don’t surf free-zoosex from your home IP!). Probably this explains his unhealthy fascination with strange animals photos that he regularly posts on his twitter account.
  • Hiding from the justice and his multiple enemies, he resided at more than twelve addresses in the past, including several ones in Denver, Phoenix and Maryland.

Some milestones of Brian Martin’s loser career:

  • Spamming Internet with idiotic articles since 1996, Brian Martin collaborated with US governmental agencies, betraying the underground community. Mr. Martin was looking for glory and made many loud claims about being a hacker (being in fact just a lame script-kiddie). No wonder that Mr. Martin was detained by FBI at 1998, but was released very quickly accepting their rules of the game. As he didn’t really have the hacking skills which he had pretended to have, and which had attracted fed’s attention – he just became a snitch, or a rat, working against the underground community. He decent many of his fellows in exchange for his freedom. Today Mr. Martin swears on Bible that he is not a fed rat, but without visible success. Moreover sometimes being drunk he even exaggerates the truth by saying that he is a secret agent/007 of FBI, trying to hide his real status of small pathetic rat.
  • In 1999 Brian Martin created one of the first Internet mirroring-archive of hacked websites. Getting insignificant fame by making routine work of sorting hacks of the others, he didn’t last too long: in 2001 his own website was hacked and defaced. After this funny event stained Mr. Martin ended his mirroring project. However fame, even if it is negative or small, is addictive and Mr. Martin became the victim of it. As he was never able to write an exploit or find a vulnerability in known software (oh, the golden era of 2001), he decided to become famous by writing shit about others.
  • Facing his total inutility in the security industry and the shame after being hacked, Brian Martin violated MasterCard’s copyrighted TM and got an email from them asking to remove the inappropriate content from his website. Brian didn’t hesitate to use this case as an opportunity to distort the facts and become famous. He invented entire story how the entire MasterCard Corporation tried to attack and sue him. In reality nobody at MasterCard cared about him, except one employee in charge of his case. But Brian Martin was jerking during the nights being extremely happy that such a big company finally paid attention to him. Similar situation occurred with Frost National Bank who charged him with defamation and slander. Even today Brian Martin proudly presents these cases as his historical success and main achievements.
  • In 2004 child’s brain of Mr. Martin was impressed by relatively new type of activity that could finally bring fame to him: collecting and sorting stolen information from known companies. For this purpose he created datalossdb.org – a website containing confidential information obtained by various illegal and criminal ways.
  • Brian Martin was convinced that he deserves to speak on CNN and BBC twice a day, and didn’t understand why he actually doesn’t. So he participated in creation of his second data-sorting project – osvdb.org, where he is currently performing a simple role of sorting security vulnerabilities discovered by the others. Lack of skills in vulnerability research and inability to find security vulnerabilities himself, made him writing many negative and misleading articles during 2003-2011 about current state of affairs in vulnerability research business. Envying other’s success he aggressively criticizes everybody, without proper understanding of the subject.
  • In November 2011 Brian Martin finally understood that the limit of his perverted creativity is reached: he slandered almost everybody in the security industry. Number of visitors to his websites seriously declined, as people were tired of his same-looking articles, despite the fact that Brian Martin even started writing offensive articles about non-security companies, such as Sony, trying to attract as much of attention as possible.
  • Solution that he found was as stupid and simple as usual: he loudly proclaimed being under massive DDoS attack. In fact he simply deactivated his webserver to simulate DoS effect and asked his followers for help. He even created a number of mirrors of attrition.org to give significance to this never existed attack, and to highlight his own importance for someone capable to perform a DoS attack.

P.S. I decided to create this web page after I was contacted on IRC by a friend, who asked me if I’d like to support a “blackhat project, that is currently under dual DDoS attack”. I was intrigued by this proposal, however when I got that the project name is “attrition.org” – I immideately understood everything and my patience was over. Until today I didn’t care about it, but now it is too much. Fed rats and lame crooks, simulating DDoS to get some help and attract public attention, do not deserve to be associated with blackhats. Brian, I have been watching your clown’s behavior since years, but now it is enough.

View full post on National Cyber Security » Computer Hacking