UK Police Charge Suspected Anonymous Spokesman 247
An anonymous reader writes "Scotland Yard has tonight charged 18-year-old Jake Davis, who was arrested in the Shetland Islands last week, with five offenses including unauthorized computer access and conspiracy to carry out a DDoS (distributed denial-of-service) attack against the SOCA (Serious Organized Crime Agency) website. When announcing his arrest on Wednesday, police said that they believed Davis used the online nickname 'Topiary' and acted as the spokesperson for the Anonymous and LulzSec hacking groups. Topiary's final twitter message said 'You can't arrest an idea' just before his arrest."
Evidence suggests wrong person (Score:5, Informative)
Evidence such as previously leaked information, IRC logs, and the age, identity and location of the suspect arrested suggest that they caught the wrong person.
Re:Too young to hide? (Score:2, Informative)
Tor will successfully hide your IP from every node except your entry point. However, by inspecting the actual data, you can sometimes learn something about the origin of the packet. Just because an envelope has no return address, that doesn't mean you can't figure out who sent it by reading the actual letter.
Re: (Score:5, Informative)
Played up or not, it is a problem. [justdetention.org]
Re:Because thats how to handle things. (Score:5, Informative)
Note the example he picks of an 'evil' oil company: BP. Of course everyone knows why, and before that the political meme was Exxon. But why do you ignore the full-on corruption, crime, and murder, of oil companies that are truly evil, like Gazprom? It's because you only have a shallow understanding of the subject.
Likewise, it is easy to get mad at Murdoch (since no one likes him anyway), but are you aware that many UK newspapers were doing the same kind of thing? The story there isn't about Murdoch, it's about a corrupt political/police system in the UK.
Re:Today's lesson (Score:4, Informative)
The major purpose of Bush in Iraq was to advance US corporate interests and secure control over oil etc. The secondary purpose was to test new weapon systems and ensure vast sums of money were either "lost" or awarded to US military contractors and other companies. Most of the huge sums of money spent on the war went directly into corporate pockets.
Re:Darn kids these days (Score:4, Informative)
"It was estimated by internet security expert Dan Kaminsky that XCP was in use on more than 500,000 networks". http://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal [wikipedia.org]