Feeds

Police probe British Anonymous activists

Scotland Yard on the case

The essential guide to IT transformation

The Metropolitan Police has confirmed it is investigating the activities of Anonymous, the online activism movement recently under the spotlight for its DDoS attacks in support of WikiLeaks.

The probe was launched several months ago, apparently following complaints about Anonymous' attacks on the website of ACS:Law, a London legal firm controversially targeting file-sharers. It also targeted the BPI, the record industry trade body.

"Earlier this year the Metropolitan Police Service received a number of allegations of 'denial-of-service' cyber attacks against several companies by a group calling themselves Anonymous," the Met said in a statement.

"The Metropolitan Police Service is monitoring the situation relating to recent and ongoing denial of service attacks and will investigate where appropriate."

Anonymous attacked ACS:Law in September as part of its "Operation: Payback Is A Bitch", which targeted organisations connected to the music and film industries in Europe and the US.

Further attacks were launched after the firm's founder, Andrew Crossley, mocked the group's initial DDoS in an interview with The Register. Disastrous efforts to restore the website then publicly exposed confidential company files, including the personal data of ACS:Law's targets. The Information Commissioner is investigating the apparent breach of the Data Protection Act by the firm.

Meanwhile, the Met's investigation of the incident – and the more recent WikiLeaks-related attacks on the websites of Visa, Mastercard and PayPal – could have serious consequences for British members of Anonymous. Mounting a DDoS attack is an offence under the Computer Misuse Act, and carries a maximum sentence of 10 years in prison.

Dutch computer crime police, who have close links to the Met's Police Central e-Crime Unit, have already arrested two alleged participants. Anonymous' LOIC tool, which coordinates its DDoS attacks, makes no attempt to disguise the sources of the bombardment of requests it fires at target servers.

A Greek web designer has also been detained after he was traced from an Anonymous press release. ®

The essential guide to IT transformation

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.