Two arrested after hackers attacked anti-terror hotline
http://www.telegraph.co.uk/news/9201621/Two-arrested-after-hackers-attacked-anti-terror-hotline.html
Two boys aged 16 and 17 have been arrested as part of an investigation into
recordings made of conversations on Scotland Yard's anti-terror hotline,
which were posted on the internet.
An investigation is underway after hackers targeted Scotland Yard's
anti-terror hotline and leaked conversations between officials on the
internet.
The recordings were later posted online in what will be regarded as a major
embarrassment of the security services Photo: Alamy
Christopher Williams and Hannah Furness
11:59PM BST 12 Apr 2012
The teenagers were being held in the West Midlands by officers from the
Police Central e-Crime Unit on suspicion of offences under the Malicious
Communications Act and the Computer Misuse Act.
Yesterday, an organisation called Team Poison claimed to have carried out a
cyber-attack in response to the alleged detention of innocent people on
terrorism charges and the recent ruling to deport a number of terror
suspects to the United States
The Daily Telegraph also understands that the group was angry at Government
plans to introduce so-called snooping laws, allowing the authorities greater
access to personal communications.
The group, which claims to have carried out a string of similar assaults on
other organisations including Nato, launched a two day "phone bombing"
exercise against the anti-terror hotline, jamming the network and preventing
genuine callers from getting through.
It is understood Team Poison used readily available software to bombard the
Scotland Yard phone line, but routed the activity through a computer server
based in Malaysia in order to cover their tracks.
Related Articles
The hackers then claim to have exploited a "weakness" in the Scotland Yard's
phone system to eavesdrop and record a conversation between officials
discussing the incident.
Recordings of the conversations were later posted on internet, suggesting an
embarrassing lapse of security within Scotland Yard's counter-terrorism
unit.
Last night the Metropolitan Police insisted that their phone security had
not been breached the integrity of the confidential anti-terror hotline
remained intact.
In one recording, an alleged hacker, who has an American accent, is heard
goading one of the hotline operatives about the phone-bombing exercise.
The caller, who claimed to be called Robert West, told the official:
"I got some terrorism for you here .. our philosophy is pretty simple, it's
knowledge is power."
More worryingly for the security services however is the question of how
hackers apparently managed to record a conversation between two officials
within Scotland Yard discussing the incident.
One operative is heard telling another that the anti-terror hotline had been
inundated with hundreds of calls from the hacking group.
In a recording posted on the internet he is heard to say: "We have been
subjected to a barrage of calls from a group called Team Poison.
We have had about 700 calls over the last couple of nights. One of the
conversations I had last night was leaked on YouTube.
"Everyone else calling was effectively shut out and could not through at
all."
It is not clear how the group managed to listen in to the conversation, but
one theory is that the receiving handset was compromised during the
phone-bombing exercise.
One member of Team Poison allegedly claimed to have used a well established
system of phone hacking known as Phreaking.
He said: "It was very easy, they were using an old phone system which was
vulnerable to a private phreaking method that we discovered.
He added: "The guys at the Counter Terrorist Command are clowns, whilst
listening in on them, all they do is socialise and joke around with other
employees. But to be honest, they are the real terrorists, imprisoning
innocent people without evidence and invading countries for their own
benefit."
Explaining what had motivated the attack, the alleged hacker claimed it was
in response to Britain's treatment of terror suspects.
He said: "We done it due to the recent events where the counter terrorist
command and the UK court system have allowed the extradition of Babar Ahmad,
Adel Abdel Bary (sic) and a few others - we also done it to due the new
"snooping" laws where the GCHQ can "spy" on anyone and everyone."
He added: "Our members come from all over the world, we have no religion, no
race, we are not affiliated with any other groups, we believe in equality
for all & were anarchists."
It is the second time in a matter of months that hackers have gained access
to private telephone conversations involving Scotland Yard personnel.
In February hackers from the group known as Anonymous released a recording
of a conference call between the FBI and UK police in which they were
discussing efforts to catch hackers.
Last night, Ailsa Beaton, Director of Information for the Metropolitan
Police said: "We are confident the MPS communication systems have not been
breached and remain, as they always have been, secure.
"We are satisfied that any recording would have been made via the receiving
handset only and not from an attack on internal systems.
The public can remain confident in the ability to communicate in confidence
and that the integrity of the Anti-Terrorist Hotline remains in place."
==========================================
(F)AIR USE NOTICE: All original content and/or articles and graphics in this
message are copyrighted, unless specifically noted otherwise. All rights to
these copyrighted items are reserved. Articles and graphics have been placed
within for educational and discussion purposes only, in compliance with
"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.
The principle of "Fair Use" was established as law by Section 107 of The
Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain
permission or pay royalties for the use of previously copyrighted materials
if the purposes of display include "criticism, comment, news reporting,
teaching, scholarship, and research." Section 107 establishes four criteria
for determining whether the use of a work in any particular case qualifies
as a "fair use". A work used does not necessarily have to satisfy all four
criteria to qualify as an instance of "fair use". Rather, "fair use" is
determined by the overall extent to which the cited work does or does not
substantially satisfy the criteria in their totality. If you wish to use
copyrighted material for purposes of your own that go beyond 'fair use,' you
must obtain permission from the copyright owner. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS
PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.
No comments:
Post a Comment