Turkey arrests Anonymous suspects after DDoS protest
Turkish police have arrested 32 suspected members of Anonymous, the loosely knit cracktivist collective, following hack attacks against government websites.
Anonymous supporters in Turkey vented their frustration against proposed net filtering legislation by running a series of denial of service attacks against government websites last week. The sites targeted included Turkey’s Telecommunications Communication Presidency (http://tib.gov.tr) and Ministry of Labour (www.sgk.gov.tr).
It appears that the activists made the mistake of using tools, such as Anonymous' Low Orbit Ion Cannon, that fail to cloak the identity of computers participating in denial of service attacks.
However they did it, Turkish authorities were quick to identify potential suspects, before launching a series of raids that resulted in the arrest of 32 suspects in 12 cities, according to Turkish news agency Anadolu.
Turkey has a history of net censorship, including incidents where it mandated local ISPs to block YouTube, sometimes for months at a time, over clips taken as insulting the country's founder Mustafa Kemal Atatürk. Activists fear Turkey's net filtering systems, due to come online in August, could become a tool for logging surfing habits and stifling free speech.
The arrests in Turkey follow last week's arrest of three Spanish residents accused of hacking the Sony PlayStation store and the Spanish Electoral Commission website. These assaults were also motivated by proposed laws geared towards clamping down on illegal filesharing.
Unsurprisingly the Spanish arrests have incurred the ire of parts of Anonymous, who responding by launching a fresh wave of attacks targeting the web presence of Spain's national police. The site - www.policia.es - was knocked offline for about an hour on Saturday as a result, the BBC reports. ®
The Low-Orbit Ion Cannon is quite a neat idea as a form of protest. Rather like attending a protest march that stops traffic for an hour. You don't cover your face - that would be hypocritical; you want to be seen as one of those who will stand up and be counted.
Unfortunately, if the number of people using it is numbered in the dozens, rather than in the tens of thousands, they're rather sticking their heads above the parapet. Imagine how long the Tiananmen square thing would have lasted if only a few dozen protestors had turned up.
tools that fail? Not.
"the activists made the mistake of using tools, such as Anonymous' Low Orbit Ion Cannon, that fail to cloak the identity of computers participating in denial of service attacks."
Well, LOIC doesn't fail at anything, it just doesn't spoof the adress. Apparently there's also a number of people using more complete tools such as hping and others, which do have the ability to spoof IPs, but refuse to spoof, by principle. See, there's a significant portion of these "Anonymous" people who see DDOS as a network form of the good ol' street demonstration, or picketting. That's quite comparable, when you think about it: sure it makes the shops along the way unreachable for a few hours, but there's usually little to no long-lasting damage (except for the reputation). There's the occasional opportunistic break-in but few street demonstration go without a smashed window or ten (although the collateral damage scale is clearly tipping towards the men in blue these days).
Not Anon at all...
... they are all Spartacus.