Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

B9teSqlIYAAmpaE.jpg:large

In the realm of social media wars, some are more fraught than others. Yet for months, Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

ISIS has done much of their recruiting work through social media channels: Facebook and Twitter, as well as more esoteric platforms. They use social media, particularly Twitter, as a propaganda tool and on this front they are considerably in advance of NATO and other Western forces, who tend to view such use as more of a risk than an advantage. 

But as ISIS, the most feared organization in the world (as far as the US State Department and mainstream media are concerned) has learned, sometimes all it takes to wipe you out is for your enemy to press a button enough times.

Here, then, is exactly how you push that button.
AnonOps, one of the central nodes in the Anonymous hive, has released specific instructions on how to cut off ISIS lines of communication and recruitment on Twitter. 
1. Locating an Islamic State Twitter account
If you are new to this locating an Islamic State militant account can prove to be difficult however after locating your first account you will be able to find thousands more following these steps. ISIS militants and their supporters feed off of attention and publicity commonly using Twitter hash tags such as #IslamicState among others. Run a Twitter search using this hash tag and you will find your first Islamic State account. If you are still having difficulty locating an account Twitter search #CtrlSec or #OpISIS
2. I have located my first Islamic State Twitter account
Now that you have located your first Islamic State Twitter account you will now be able to collect many more and form a vast network of information. With the account you initially located review all of their following and followers collecting Twitter account names as you move forward. When you are collecting account names you must retrieve their Twitter ID by visiting http://gettwitterid.com/ If you do not collect the account ID they can easily change their account name to evade you as they commonly do once detected. As you are collecting Islamic State Twitter accounts check each bio and their tweets for website URLS and log the information. With the data you have compiled visit http://pastebin.com and publish a paste of your findings.
3. I have a list of Islamic State Twitter accounts and URLS.
Now that you have collected this information you can take action against them by reporting them to Anonymous, authorities and Twitter. If your paste link contains Islamic State Twitter accounts you can tweet your paste making sure to use the hash tag #CtrlSec so the corresponding operatives can collect your link and terminate the accounts. If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the website. If you have concerns for your personal safety you can alternatively email us with your information at ghostec@riseup.net using a anonymous mailer service such as http://anonymousemail.me

Your contributions to our cause are immensely appreciated and this could never be achieved without your unyielding support.
Your move, Caliphate

The Cryptosphere

 

« Facebook Data Row Reaches Top Euro Court
A Simple Guide to GCHQ's Hacking Powers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO is an IT security specialist with a focus in three areas - technology management, managed security services, security consulting and auditing.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.