Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

B9teSqlIYAAmpaE.jpg:large

In the realm of social media wars, some are more fraught than others. Yet for months, Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

ISIS has done much of their recruiting work through social media channels: Facebook and Twitter, as well as more esoteric platforms. They use social media, particularly Twitter, as a propaganda tool and on this front they are considerably in advance of NATO and other Western forces, who tend to view such use as more of a risk than an advantage. 

But as ISIS, the most feared organization in the world (as far as the US State Department and mainstream media are concerned) has learned, sometimes all it takes to wipe you out is for your enemy to press a button enough times.

Here, then, is exactly how you push that button.
AnonOps, one of the central nodes in the Anonymous hive, has released specific instructions on how to cut off ISIS lines of communication and recruitment on Twitter. 
1. Locating an Islamic State Twitter account
If you are new to this locating an Islamic State militant account can prove to be difficult however after locating your first account you will be able to find thousands more following these steps. ISIS militants and their supporters feed off of attention and publicity commonly using Twitter hash tags such as #IslamicState among others. Run a Twitter search using this hash tag and you will find your first Islamic State account. If you are still having difficulty locating an account Twitter search #CtrlSec or #OpISIS
2. I have located my first Islamic State Twitter account
Now that you have located your first Islamic State Twitter account you will now be able to collect many more and form a vast network of information. With the account you initially located review all of their following and followers collecting Twitter account names as you move forward. When you are collecting account names you must retrieve their Twitter ID by visiting http://gettwitterid.com/ If you do not collect the account ID they can easily change their account name to evade you as they commonly do once detected. As you are collecting Islamic State Twitter accounts check each bio and their tweets for website URLS and log the information. With the data you have compiled visit http://pastebin.com and publish a paste of your findings.
3. I have a list of Islamic State Twitter accounts and URLS.
Now that you have collected this information you can take action against them by reporting them to Anonymous, authorities and Twitter. If your paste link contains Islamic State Twitter accounts you can tweet your paste making sure to use the hash tag #CtrlSec so the corresponding operatives can collect your link and terminate the accounts. If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the website. If you have concerns for your personal safety you can alternatively email us with your information at ghostec@riseup.net using a anonymous mailer service such as http://anonymousemail.me

Your contributions to our cause are immensely appreciated and this could never be achieved without your unyielding support.
Your move, Caliphate

The Cryptosphere

 

« Facebook Data Row Reaches Top Euro Court
A Simple Guide to GCHQ's Hacking Powers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

Sunday Cyber

Sunday Cyber

Sunday is a personal cybersecurity platform, built to protect the world’s top executive teams beyond the enterprise perimeter.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.