Suspected Anonymous Members Arrested for 'Hacktivist' Activities

By

Suspected members of the loose-knit group of “hacktivists” known as Anonymous have been arrested in the U.K., according to this Guardian report. Earlier Thursday, police arrested five people from across the U.K. in connection with a spate of online attacks last month in support of WikiLeaks, known as the whistleblowers’ site.

According to police, the five males, aged between 15 and 26, are being held after a series of arrests in the West Midlands, Northamptonshire, Herfordshire, Surrey and London. A series of coordinated raids were conducted to identify and capture the men. All five are being held in custody at local police stations.

These men became targets after they allegedly crippled the websites of MasterCard, Visa and PayPal in retaliation. These companies had cut off financial services to WikiLeaks and the attacks followed the release of U.S. diplomatic cables from late November.

"They are part of an ongoing [Metropolitan police] investigation into Anonymous which began last year following criminal allegations of DDoS attacks by the group against several companies," Scotland Yard said in the Guardian. "This investigation is being carried out in conjunction with international law enforcement agencies in Europe and the US."

The group’s attacks, described as “distributed denial of service (DDoS) attacks, enable them to bring down sites by bombarding them with repeated requests to load Web pages. These attacks are illegal in the U.K. under the Computer Misuse Act.

WikiLeaks started receiving support from Anonymous after Amazon and other companies terminated business links with the site. This group is 1,000 strong and activists within the group launched what they referred to as Operation Payback, vowing to give perceived anti-WikiLeaks firms a “black eye.”

The group’s attention more recently has been placed on supporting the political uprising in Tunisia and Egypt. Anonymous has been credited with temporarily disabling access to 10 Tunisian government websites and four Egyptian government sites.

According to reports from Anonymous, the cyber attacks are in retaliation for the government censorship in both countries. They suggest that Facebook, Twitter and other information-sharing sites have been blocked by government authorities. Facebook later claimed no change in traffic on their site there.

Earlier this month, Ireland’s main opposition party’s website was also hacked and Anonymous claimed responsibility for the attack which compromised up to 2,000 people’s personal details.

Authorities throughout Europe have already signaled an intention to identify those behind the attacks and report that the majority are traceable by their Internet protocol (IP) addresses that connect each device to the Internet.

Want to learn more about how federal regulations are shaping and re-defining communications and information technology? Then be sure to attend the Regulatory 2.0 Workshop, collocated with TMC’s ITEXPO East, taking place Feb 2-4, 2011, in Miami. Federal Communications Commission Chairman Julius Genachowski has pursued the singular goal of ubiquitous broadband access to an open Internet. While some progress has been made, the most difficult decisions are ahead. What's the Commission to do? This program will examine the important issues facing the FCC including net neutrality, inter-carrier compensation and universal service reform, new CALEA legislation, next generation 911, additional spectrum for wireless broadband and the evolving role of state regulation. To register, click here.


Susan J. Campbell is a contributing editor for TechZone360 and has also written for eastbiz.com. To read more of Susan’s articles, please visit her columnist page.

Edited by Tammy Wolf
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Shabodi Accelerates Adoption of Network-Aware Applications with CAMARA API Enterprise Reference Implementation

By: Special Guest    2/16/2024

Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…

Read More

How Much Does Endpoint Protection Cost? Comparing 3 Popular Solutions

By: Contributing Writer    2/2/2024

Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…

Read More

What Is Databricks? Simplifying Your Data Transformation

By: Contributing Writer    2/2/2024

Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …

Read More

What Is Blue/Green deployment?

By: Contributing Writer    1/17/2024

Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…

Read More

The Threat of Lateral Movement and 5 Ways to Prevent It

By: Contributing Writer    1/17/2024

Lateral movement is a term used in cybersecurity to describe the techniques that cyber attackers use to progressively move through a network in search…

Read More