Feeds

Anonymous hacks Westboro Baptists during live interview

LOLZcats

The essential guide to IT transformation

Denizens of Anonymous defaced a website run by the Westboro Baptist Church on Thursday during a live radio interview.

An ongoing spat between the controversial church of GodHatesFags fame and the loosely knit hacking collective began last weekend with a message threatening hacks against websites that, depending on who you believe, was posted either by the Church itself or a faction of Anonymous. Another faction of Anonymous distanced itself from the plan, categorising Westboro Baptist Church as trolls looking for attention.

Whatever the origins of the row, WBC's site has been subject to ongoing attacks over recent days, and the topic served as suitable fodder for an item on the David Pakman show. A member of Anonymous faced off against Shirley Phelps-Roper of the Westboro Baptist Church.

Anon said the supposed threat against WBC came from "nowhere" and didn't match its writing style. He said attacks against WBC sites were the work of Jester. Phelps-Roper, who kept interrupting the Anon member, said everyone for Anonymous was going to hell. After eight minutes into the interview the Anon member posted its own statement on downloads.westborobaptistchurch.com.

The statement, headed "This domain has been seized by Anonymous under section #14 of the rules of the Internet", derides the Church for attempting to "goad" Anonymous into attacking it for describing them as "crybaby hackers". The statement went on to say Anonymous had bigger fish to fry, such as campaigns involving Libya and managing the fallout from its hack against HBGary.

"Take this defacement as a simple warning: go away," the statement (screenshot here) concludes. "The world (including Anonymous) disagrees with your hateful messages, but you have the right to voice them. This does not mean you can jump onto Anonymous for attention."

Watching the duo square up was akin to watching two wrestlers trash talk each other prior to a carefully orchestrated fight, as can be seen from a video clip from the Pakman show below.

Phelps-Roper, probably like the wider Westboro Baptist Church, seems to revel in being "persecuted" while both she and the rep of Anon more or less admitted that they were enjoying the media attention brought about by the ongoing spat. ®

Next gen security for virtualised datacentres

More from The Register

next story
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.