Feeds

Know what Ferguson city needs right now? It's not Anonymous doxing random people

U-turn on vow to identify killer cop after fingering wrong bloke

Protecting against web application threats using SSL

Anonymous has called off efforts to name and shame the cop who shot unarmed teen Michael Brown dead in Ferguson, Missouri – after the hacktivists identified a bloke whom the police say has never worked as a beat officer.

On Thursday the group released the name and pictures from Facebook of a man they accused of shooting 18-year-old Brown, but the police say the hackers fingered the wrong man.

Brown's death last Saturday sparked four days of demonstrations in the city; the protest was broken up on Wednesday night by a highly militarized police force. Soon after the shooting, Anonymous wrongly claimed that a man named Bryan Willman is responsible for the teen's death.

That allegation prompted the St Louis County Police Department to issue the following tweet:

Willman's stepmother told USA Today that Willman had never been a serving officer and instead works as a police dispatcher. She said she is now in fear for her life after her address appeared online.

"I guess I'm going to have to sleep with my gun and put cameras on the house," she said. "Now I have to defend myself and I didn't do anything wrong."

The Anons' disclosure led Twitter to suspend the @TheAnonMessage account the group were using, although they have set up an alternative account @TheAnonMessage2, on which they posted a message that all doxing will stop for the moment.

The group hasn't shut up shop completely, however. Following a press statement threatening a hacking attack, the group released what they claim is the radio logs of the St Louis police department at the time of Brown's death, and say they also have video of his body being loaded into a police van.

Ferguson police are refusing to release the name of the police officer involved in Brown's shooting, or the autopsy report into his death. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.