Msg#: 4642876 posted 1:35 am on Feb 6, 2014 (gmt 0)
The latest Snowden-related revelation is that Britain’s Government Communications Headquarters (GCHQ) proactively targeted the communications infrastructure used by the online activist collective known as Anonymous.
Specifically, they implemented distributed denial-of-service (DDoS) attacks on the internet relay chat (IRC) rooms used by Anonymous. They also implanted malware to out the personal identity details of specific participants. And while we only know for sure that the U.K.’s GCHQ and secret spy unit known as the “Joint Threat Research Intelligence Group” (JTRIG) launched these attacks in an operation called “Rolling Thunder,” the U.S.’ NSA was likely aware of what they were doing because the British intelligence agents presented their program interventions at the NSA conference SIGDEV in 2012. (Not to mention the two agencies sharing close ties in general.)
[wired.com...] Just find this interesting from a security and privacy point of view.
Msg#: 4642876 posted 6:14 am on Feb 6, 2014 (gmt 0)
GCHQ is an intelligence agency, infiltrating and spying on a group like Anonymous is what they do.
I am worried about surveillance of peaceful and law-abiding protest groups - but Anonymous is not law-abiding so they are fair targets.
DDOS attacks are a different matter altogether.
They claim the attacks were legal within the framework for authorising intelligence operations. Attacking things is not intelligence, its "cyberwar". If the law permits this as an intelligence operation, the law is wrong,
Whose computers they were using to mount the attacks? What collateral damage was done - for example by bringing down shared servers or slowing access to other servers in the data centre.