Anonymous vs ISIS: the ongoing skirmishes of #OpISIS

B9teSqlIYAAmpaE.jpg:large

In the realm of social media wars, some are more fraught than others. Yet for months, Anonymous has been doing what it does best: hunting people. And now they are after ISIS.

ISIS has done much of their recruiting work through social media channels: Facebook and Twitter, as well as more esoteric platforms. They use social media, particularly Twitter, as a propaganda tool and on this front they are considerably in advance of NATO and other Western forces, who tend to view such use as more of a risk than an advantage. 

But as ISIS, the most feared organization in the world (as far as the US State Department and mainstream media are concerned) has learned, sometimes all it takes to wipe you out is for your enemy to press a button enough times.

Here, then, is exactly how you push that button.
AnonOps, one of the central nodes in the Anonymous hive, has released specific instructions on how to cut off ISIS lines of communication and recruitment on Twitter. 
1. Locating an Islamic State Twitter account
If you are new to this locating an Islamic State militant account can prove to be difficult however after locating your first account you will be able to find thousands more following these steps. ISIS militants and their supporters feed off of attention and publicity commonly using Twitter hash tags such as #IslamicState among others. Run a Twitter search using this hash tag and you will find your first Islamic State account. If you are still having difficulty locating an account Twitter search #CtrlSec or #OpISIS
2. I have located my first Islamic State Twitter account
Now that you have located your first Islamic State Twitter account you will now be able to collect many more and form a vast network of information. With the account you initially located review all of their following and followers collecting Twitter account names as you move forward. When you are collecting account names you must retrieve their Twitter ID by visiting http://gettwitterid.com/ If you do not collect the account ID they can easily change their account name to evade you as they commonly do once detected. As you are collecting Islamic State Twitter accounts check each bio and their tweets for website URLS and log the information. With the data you have compiled visit http://pastebin.com and publish a paste of your findings.
3. I have a list of Islamic State Twitter accounts and URLS.
Now that you have collected this information you can take action against them by reporting them to Anonymous, authorities and Twitter. If your paste link contains Islamic State Twitter accounts you can tweet your paste making sure to use the hash tag #CtrlSec so the corresponding operatives can collect your link and terminate the accounts. If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the website. If you have concerns for your personal safety you can alternatively email us with your information at ghostec@riseup.net using a anonymous mailer service such as http://anonymousemail.me

Your contributions to our cause are immensely appreciated and this could never be achieved without your unyielding support.
Your move, Caliphate

The Cryptosphere

 

« Facebook Data Row Reaches Top Euro Court
A Simple Guide to GCHQ's Hacking Powers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Sixteenth Air Force (Air Forces Cyber) - USA

Sixteenth Air Force (Air Forces Cyber) - USA

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.