Feeds

Anonymous vows to wipe web clean of child abuse scum

'For the good of mankind, and for our own enjoyment'

Providing a secure and efficient Helpdesk

Sections of Anonymous have once again turned their ire towards online sites frequented by child abusers.

OpPedoChat follows earlier campaigns by sections of the hacktivist groups that subjected websites linked to the distribution of paedophile material with denial of service attacks and membership exposure. For example, Operation Darknet in October 2011 targeted hidden child abuse hubs on .onion domains, only accessible to Tor users or through Tor gateways.

This time around the hacktivist group has set its sights on 100 domains that host forums allegedly used by child abusers for chat and picture sharing.

Anonymous has promised to deface or hijack targeted domains as well as tracing and exposing the personal details of (ie. doxing) their members. A number of data dumps have already appeared on Pastebin related to OpPedoChat, featuring emails and addresses purportedly taken from users of the targeted forums.

In a YouTube video, Anonymous sets out a manifesto for the operation and calls for public support, including lobbying of politicians and the media, to "create political and social pressure on these paedophile sites".

Recently it has come to our attention that there has been a surge of websites dedicated to pedophiles for chat and picture sharing ...

Anonymous aim to diminish if not eradicate this plague from the internet. For the good of our followers, for the good of mankind, and for our own enjoyment we shall expel from the internet and systematically destroy any such boards that continue to operate.

Anonymous recognises this as a serious undertaking and do not expect it to be completed in a short period of time. Factions of Anonymous from all over the globe are participating in sub-operations. Information on pedophiles is being gathered and released.

Anonymous prides itself on championing free speech, a stance somewhat at odds with denial of service attacks elements of the group frequently engage in. In this case the need to protect the innocence of children that might be abused takes precedence, the group argues. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.