Feeds

Anonymous hackers leak Scotland Yard-FBI conference call

Were you talking about us?

SANS - Survey on application security programs

Members of Anonymous have released an intercept of a conference call between investigators at the FBI and Scotland Yard during which operations against hacktivist group were discussed.

During the 17-minute call – which was released as an MP3 file and distributed on YouTube and elsewhere – investigators can be heard discussing various Anonymous and LulzSec-related cases. Information discussed in the call reportedly included details of evidence against suspects (sometimes referred to by their hacker handles), plans for legal action and court dates. The hacktivist group also published what it said was an FBI email detailing the addresses of invited call participants: 40 law enforcement officials in the UK, US, France, Ireland, The Netherlands and Sweden.

It is unconfirmed how the 17 January call was intercepted but the "leaked email" includes the time, dial-in number and access code, so it could be that members of the group simply dialled into the number and recorded the call directly.

The FBI confirmed the leak, saying the information "was intended for law enforcement officers only and was illegally obtained," AP reports. The agency has reportedly launched an investigation into the leak, the BBC adds.

Meanwhile, a Met spokesman said:

We are aware of the video which relates to an FBI conference call involving a PCeU [Police Central e-Crime Unit] representative.

The matter is being investigated by the FBI.

At this stage no operational risks to the MPS have been identified; however we continue to carry out a full assessment. We are not prepared to discuss (this) further.

The interception of the conference call is a serious operation security breach, especially because it affects an ongoing high-profile investigation, and is a major coup for the rag-tag hactivist collective.

A Twitter account linked to Anonymous – AnonymousIRC – boasted:

The #FBI might be curious how we're able to continuously read their internal comms for some time now. #OpInfiltration.

Hints that hackers may have had an inside track on police investigations into their activities came late last month when "Anonymous Sabu" (leader of the LulzSec group) correctly predicted the postponement of trial against Jake Davis, an alleged member of LulzSec, F-Secure notes.

The cases against Jake Davis (allegedly "Topiary", the public face of the Anonymous and LulzSec hacktivist groups) and Ryan Cleary (who is alleged to have run a DDoS attack on the Serious Organised Crime Agency's website) are discussed during the conference call.

Additional security commentary on the incident can be found in a blog post by Sophos here. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.