Conversations between anti-terrorism officers at Scotland Yard were bugged and leaked on the internet by anarchist hackers.

A notorious group called Team Poison recorded a briefing between officers after bombarding the anti-terror hotline with more than 700 calls over 24 hours in a protest. The group posted the recordings on YouTube in a hugely embarrassing security breach for Scotland Yard.

Police were refusing to comment on how the recordings were made but the hacking group claimed to have used a method called “phone phreaking”, exploiting the Met’s “old fashioned” communications system.

A teenage hacker calling himself “Trick” claimed they compromised a server from Malaysia to record conversations before calling what they said were “MI6 offices in London”. When asked whether he found it simple to overcome MI6 security, Trick emailed: “Yes it was easy :)”.

Scotland Yard was today holding talks about the breach and launched an investigation after being told of the YouTube clips. It said in a statement: “We are aware of an issue whereby telephone conversations relating to the anti-terror hotline were recorded. Officers are currently looking into the matter and appropriate action will be taken.”

One recording features a conversation between an activist claiming to be called Robert and two officers. The activist tells them: “You are being phone-bombed right now.”

But a more sinister tape records a later conversation between the officer and his superior telling him details of the attack and other terror-related incidents in London.

The “hacktivist” group was behind a previous security lapse at the United Nations when email addresses and identities were stolen and posted online.

Trick is said to have launched the hacking group in 2010.

On one YouTube recording, he claims he recently celebrated his 16th birthday. A police officer replies: “Really, you are as old as that?”

The group has been linked to alleged hacking attempts on Facebook and a personal email account linked to a former staff member of Tony Blair’s.

Trick emailed the Press Association: “The phone denial of service was done via a custom script for Asterisk which was installed on an overseas server. The conversation was tapped into via a private phreaking method, their phone system is old and we found a way to get in via a basic but private phreaking technique.”

In response to the Scotland Yard statement, @-TeaMp0isoN tweeted: “OH REALLY NOW.”

The hacking group claimed it had taken the action in response to the decision to extradite alleged terrorists, including Babar Ahmad, to the US.

A “hacktivist” statement said: “The people who have been extradited have done nothing wrong to be extradited to the US, if anything they should have been trialled in the UK, the US has no reason to trial them over there, they are innocent!”