Feeds

Anonymous threatens to name cop who shot dead unarmed Michael Brown

Police close ranks and refuse to reveal officer's identity

Internet Security Threat Report 2014

A group claiming to be affiliated with hacktivist collective Anonymous has threatened to release the name of the police officer who shot unarmed teen Michael Brown in the town of Ferguson, Missouri.

Operation Ferguson says it is a group of hackers linked to Anonymous. It was set up a day after the 18-year-old black man was shot six times, reportedly by a police officer, despite eyewitness claims that he attempted to surrender.

In a press release posted to Pastebin on Sunday, “Anonymous Operation Ferguson” said that the global collective was outraged at the events in Ferguson and demanded new legislation setting strict guidelines for police conduct in the US. The group also threatened to take down the websites of authorities in the town if they “abuse, harass or harm in any way protestors in Ferguson”.

The hackers appeared to make good on the threat on Tuesday, taking down the website of City Hall as well as phone lines and email systems in a flood of traffic that “just kept coming”, the St Louis Post-Dispatch reported.

Operation Ferguson took credit for the outages on its newly created Twitter account.

The group then tweeted that it had the name of the officer who shot Brown, which was being withheld by the police after threats on social media. So far, the hackers have not released the name, saying that they want to be certain of the officer’s identity first.

Operation Ferguson’s threats come after another Anonymous group tweeted that they would publish information on the daughter of St Louis County’s police chief Jon Belmar if he refused to release the officer’s name. @TheAnonMessage eventually backed down on its threats, saying that they were “damaging to the overall message of justice for Mike Brown”.

Ferguson has been the scene of protests, rioting and looting since Brown was shot and killed while reportedly trying to surrender to police. According to an interview with MSNBC, Dorian Johnson was walking down the middle of the road with Brown when a police officer driving down the road told them to get onto the sidewalk. After a struggle at the car window Brown was shot, Johnson told the news network.

Johnson and Brown both started to run away and Brown was shot again in the back. Johnson claims Brown then turned around with his hands up, telling police he didn’t have a gun and to stop shooting, after which he was reportedly shot again multiple times.

Other eyewitness accounts agree with Johnson’s, but police claim that Brown was killed after a struggle over the officer’s gun. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.