Welcome to WebmasterWorld Guest from

Forum Moderators: incrediBILL & lawman

Message Too Old, No Replies

The New Snowden Revelation Is Dangerous for Anonymous — And for All of

Are the spooks coming after us?

1:35 am on Feb 6, 2014 (gmt 0)

Senior Member from US 

WebmasterWorld Senior Member tangor is a WebmasterWorld Top Contributor of All Time 10+ Year Member Top Contributors Of The Month

joined:Nov 29, 2005
votes: 377

The latest Snowden-related revelation is that Britain’s Government Communications Headquarters (GCHQ) proactively targeted the communications infrastructure used by the online activist collective known as Anonymous.

Specifically, they implemented distributed denial-of-service (DDoS) attacks on the internet relay chat (IRC) rooms used by Anonymous. They also implanted malware to out the personal identity details of specific participants. And while we only know for sure that the U.K.’s GCHQ and secret spy unit known as the “Joint Threat Research Intelligence Group” (JTRIG) launched these attacks in an operation called “Rolling Thunder,” the U.S.’ NSA was likely aware of what they were doing because the British intelligence agents presented their program interventions at the NSA conference SIGDEV in 2012. (Not to mention the two agencies sharing close ties in general.)

Just find this interesting from a security and privacy point of view.
6:14 am on Feb 6, 2014 (gmt 0)

Senior Member from LK 

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month

joined:Nov 16, 2005
votes: 30

GCHQ is an intelligence agency, infiltrating and spying on a group like Anonymous is what they do.

I am worried about surveillance of peaceful and law-abiding protest groups - but Anonymous is not law-abiding so they are fair targets.

DDOS attacks are a different matter altogether.

They claim the attacks were legal within the framework for authorising intelligence operations. Attacking things is not intelligence, its "cyberwar". If the law permits this as an intelligence operation, the law is wrong,

Whose computers they were using to mount the attacks? What collateral damage was done - for example by bringing down shared servers or slowing access to other servers in the data centre.