Feeds

BT and Dixons named as May Day protest targets

Cops comb Net for anti-capitalist mayhem info

  • alert
  • submit to reddit

Application security programs and practises

Police are preparing to meet the threat posed by anti-capitalist protestors in London on 1 May by monitoring their evolving plans on the Internet.

Tactics for the loose confederation of anti-capitalist, green and anarchist groups who are planning rallies in May remain unclear.

Because of this police are keeping an open mind about whether hacking or Web site defacement attacks will be carried out as part of the protests - a very real concern in the face on widespread web defacements at the beginning of this month.

Detective Chief Superintendent Keith Akerman, who heads an influential police computer crime working group, reflected the view of many in law enforcement when he said that anti-establishment protests would likely be focused on street activity.

Police are certainly not keen to give protestors ideas, but the inclusion of Dixons and BT among the list of targets raises the real possibility that technology and the Internet may become involved in protests.

Neil Barrett, technical director of Information Risk Management, and a long-time advisor to the police on information security, said he hasn't seen serious discussions about hacktivism, so far - but that doesn't mean it won't occur.

Dealing with any acts of Web sabotage or vandalism should be the responsibility of Britain's recently-formed Hi-Tech Crime Unit, said Barrett, who added that such cases would be the first high-profile test for the unit, which began operations this month.

For now the Internet seems to have been largely used as a message board by protestors and there are unconfirmed reports that the posting of fake messages and use of encryption has frustrated police investigations.

The police and City authorities are keen to avoid a repeat of last-year's anarchist and anti-capitalist demonstrations, which saw the defacement of monuments including the cenotaph and widespread damage to property.

Groups active on the Internet this time around include organisations like MayDay Monopoly, which takes its name from the famous board game. It has published a list of targets, including banks and multinationals (Dixons and BT are in there), that will be attacked in locations taken from streets that feature in the Monopoly board game.

A spokesman for the Metropolitan Police said it preparing a "robust response" based in large part on intelligence obtained from the Internet for any violence or disorder that might occur on 1 May. Police are not willing to say how many protestors they expect to take part in the demonstration or how many officers are likely to be involved in any operations aimed at quelling unrest.

It also believed that police will be advising firms to improve their security measures in the run-up to the 1 May protests. ®

External links

MayDay Monopoly

Related Stories

Win-NT/IIS admins made April Fools by hackers
One in three UK firms hit by cyber-crime
S'kiddies find hacking BT all too easy
Hackers worse than terrorists - Robin Cook
'Cyber Sweeney' host hi-tech crime meet
Police urge business to report hi-tech crimes

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.