Feeds

ICO blasted offline by DDoS cannon in Leveson protest

Anonymous-linked hacktivists shell site for days

Gartner critical capabilities for enterprise endpoint backup

The UK's Information Commissioner's Office website has been blown offline by a distributed-denial-of-service attack that appears to be a hacktivist protest over the Leveson Inquiry.

The ICO spokesperson told The Register in an emailed statement that access to the site had been disrupted over the past few days by the DDoS assault.

"The website itself has not been damaged, but people are unable to access it," the spokesperson said, adding: "We provide a public-facing website which contains no sensitive information."

A group calling itself Anon Ateam took responsibility for the attack, tweeting:

Another Anonymous group UKAnonymous2012 also credited Anon Ateam on Twitter:

Anon Ateam claims on a Tumblr blog under the heading OpLeveson that the inquiry, set up to investigate press ethics in the wake the phone-hacking scandal, has become a farce and is stopping criminal proceedings from taking place.

"Instead of having a criminal court whereby investigations are conducted to unearth the scale of the crime, this show trial has been arranged so that there is no real investigation," the blog alleged. It also questioned the actions of Culture Secretary Jeremy Hunt and his boss, Prime Minister David Cameron.

The group links the ICO to the inquiry because it claims the watchdog lacks independence and "has repeatedly failed to protect the public's privacy from hacking or data protection breaches".

"80 per cent of data protection breaches in the UK are committed by the UK civil service and yet not properly investigated," the blog alleged.

The ICO said it was working to bring its website back online but did not comment on Anon Ateam's claims. There were also reports that the Leveson Inquiry's website fell offline yesterday, although at the time of publication the site was back to normal and serving content as per usual. ®

Boost IT visibility and business value

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Hello, police, El Reg here. Are we a bunch of terrorists now?
Do Brits risk arrest for watching beheading video nasty? We asked the fuzz
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.