Members of Anonymous have intercepted a conference call between the UK's Metropolitan Police in London, and the FBI, after an email containing the login details of the call were accessed.

The contents of the call --- though audibly censored in places --- contained critical intelligence about ongoing cybercrime investigations. The ironic thing here is that the call was recorded by the very people who were being discussed.

The FBI confirmed that the interception of the "confidential phone call" was "illegally obtained", adding that it is, "hunting those responsible."

@AnonymousIRC on Twitter said in a tweet that: "The FBI might be curious how we're able to continuously read their internal comms for some time now."

The subject of the email was "Anon-Lulz International Coordination Call", and contained information of how to access the conference call. According to Sophos, the call itself was to "discuss the on-going investigations related to Anonymous, Lulzsec, Antisec, and other associated splinter groups."

Included in the email are members from the FBI, UK police at London's Scotland Yard, along with officers from the Irish Garda, Europol, the French Interior Ministry, Swedish police, and representatives from the Dutch National High-Tech Crime Unit.

The call is understood to have taken place over two weeks ago in mid-January.

It is no secret that during the Anonymous and LulzSec attacks on companies and websites last year, both UK and U.S. law enforcement units worked together to apprehend suspects. A number of arrests were made, but many still are unaccounted for, and only a handful currently face trial.

The call seems to shed light on the U.S. and UK intelligence sharing arrangements, and the details of data sharing across European law enforcement units. It clearly shows that a number of law enforcement units are working together in a bid to track down those who were involved in the previous and continued hacking attacks.

The video can be found online, along with the email, which was posted on Pastebin.

Image source: Pastebin; YouTube/ZDNet.

Related: