Suspected Anonymous Members Arrested for 'Hacktivist' Activities

By

Suspected members of the loose-knit group of “hacktivists” known as Anonymous have been arrested in the U.K., according to this Guardian report. Earlier Thursday, police arrested five people from across the U.K. in connection with a spate of online attacks last month in support of WikiLeaks, known as the whistleblowers’ site.

According to police, the five males, aged between 15 and 26, are being held after a series of arrests in the West Midlands, Northamptonshire, Herfordshire, Surrey and London. A series of coordinated raids were conducted to identify and capture the men. All five are being held in custody at local police stations.

These men became targets after they allegedly crippled the websites of MasterCard, Visa and PayPal in retaliation. These companies had cut off financial services to WikiLeaks and the attacks followed the release of U.S. diplomatic cables from late November.

"They are part of an ongoing [Metropolitan police] investigation into Anonymous which began last year following criminal allegations of DDoS attacks by the group against several companies," Scotland Yard said in the Guardian. "This investigation is being carried out in conjunction with international law enforcement agencies in Europe and the US."

The group’s attacks, described as “distributed denial of service (DDoS) attacks, enable them to bring down sites by bombarding them with repeated requests to load Web pages. These attacks are illegal in the U.K. under the Computer Misuse Act.

WikiLeaks started receiving support from Anonymous after Amazon and other companies terminated business links with the site. This group is 1,000 strong and activists within the group launched what they referred to as Operation Payback, vowing to give perceived anti-WikiLeaks firms a “black eye.”

The group’s attention more recently has been placed on supporting the political uprising in Tunisia and Egypt. Anonymous has been credited with temporarily disabling access to 10 Tunisian government websites and four Egyptian government sites.

According to reports from Anonymous, the cyber attacks are in retaliation for the government censorship in both countries. They suggest that Facebook, Twitter and other information-sharing sites have been blocked by government authorities. Facebook later claimed no change in traffic on their site there.

Earlier this month, Ireland’s main opposition party’s website was also hacked and Anonymous claimed responsibility for the attack which compromised up to 2,000 people’s personal details.

Authorities throughout Europe have already signaled an intention to identify those behind the attacks and report that the majority are traceable by their Internet protocol (IP) addresses that connect each device to the Internet.

Want to learn more about how federal regulations are shaping and re-defining communications and information technology? Then be sure to attend the Regulatory 2.0 Workshop, collocated with TMC’s ITEXPO East, taking place Feb 2-4, 2011, in Miami. Federal Communications Commission Chairman Julius Genachowski has pursued the singular goal of ubiquitous broadband access to an open Internet. While some progress has been made, the most difficult decisions are ahead. What's the Commission to do? This program will examine the important issues facing the FCC including net neutrality, inter-carrier compensation and universal service reform, new CALEA legislation, next generation 911, additional spectrum for wireless broadband and the evolving role of state regulation. To register, click here.


Susan J. Campbell is a contributing editor for TechZone360 and has also written for eastbiz.com. To read more of Susan’s articles, please visit her columnist page.

Edited by Tammy Wolf
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Unlocking Recruiting Potential: Leveraging LinkedIn Messaging API

By: Contributing Writer    9/20/2023

In the cheap place of hire, the strength of useful contact could be extreme. On the other hand, where details flow at the race of bright, businesses &…

Read More

Safe and Sound: A Guide to Auditing and Strengthening Digital Data Protection

By: Contributing Writer    9/12/2023

In today's heavily digital economy, data represents one of a company's most valuable assets and a key competitive advantage. But maximising the potent…

Read More

How to Conduct a Data Security Audit to Assess Vulnerabilities

By: Contributing Writer    9/7/2023

Businesses today retain a lot of data about both internal operations and their customers. This information is one of your strongest assets, but that a…

Read More

How Cyber Attack Can Ripple a Company's Operation

By: Contributing Writer    8/30/2023

Cyber attacks and Data breaches are pretty common these days. In the first half of 2022, businesses lost an average of $4.35 million. At the same time…

Read More

Cybersecurity: How to Stay Secure and Be Compliant

By: Contributing Writer    8/25/2023

The internet plays a huge part in our daily lives. We use it to find information, book tickets, pay bills and collaborate on work projects. Cybersecur…

Read More