We may control the Air, but the enemy controls the airwaves (Media).
Taking down ISIS Web Sites is like shooting Fish in a barrel
There is soo many targets out there right now on Twitter, Facebook, YouTube, and Sendvid all are flooded with ISIS users and Propaganda. You can help and you do not even need to be a Hacker to Shut Down ISIS Web Sites !!
Most of the Web sites, all we have to do is report the User to the Host (like twitter, facebook, Etc.) and they will Suspend or Shutdown the User / ISIS account.
Most of the Web sites you find, will be wannabees, or people who are into ISIS but not active on the ground. When you find ones that look to truly be in the fight, spreading Propaganda, planning to join ISIS, or recruitment, planning attacks, etc. that’s a big win and we want to help give you the tools to know how to notify the right authorities. If you wish to remain Anonymous we can contact the Feds or Other Gov Agencies for you. Your info will always be anonymous. We do not save any info except Targets Links, unless requested.
The very bad sites with beheadings etc will normally go down in one (1) day. Other sites do not go down fast, they need to be observed. This may take as long as a Month. I saw one case in australia took almost 3 months.
Here is what to do:
Do you want to report known targets? or do you want to find new Targets, and look for Actionable Intel? to Join Operation Mop Up ISIS Email us at email@example.com
Whats is Needed – Any Twitter account can be used, even with no virus protection. If you do not click on the bad guys links ,do not interact via Tweets, replies. favs, retweets, or direct message any Bad Guys. But we do always recommend have anti virus, VPN and firewall and do not click on bad guys links EVER !!
How to Find Targets to Report – Find Targets by using the search function in Twitter, Type various Hashtags like #MUI_United.
Then you can view the various ISIS targets. Review the target make, sure it is a legit ISIS Target. be sure to look around, check who they follow, the first 25 at bottom of the List for Followers & Following. These are most likely their closest & first contacts.
Our Operations use:
Other Operations use:
If you can use a Linux computer that is the safest way to be online.
But no matter what computer, device, or browser you are using, be sure to get a VPN (Virtual Private Network).
Use a VPN Virtual Private Network ZenMate is a free one. Do not click on WebSites Unless you know it is reliable, don’t add add-ons or extensions unless you check out reviews and trust the provider, use Avast anti-virus, malwarebytes, and scan for Bots, don’t click-on or download pictures unless you are sure it is from your real friends and safe. Some can contain tracking info. Also use separate browsers one for normal stuff one for fighting ISIS. or even 3 or 4 different browsers. ZenMate works on Firefox, Chrome, and Opera browsers.
Make a New Twitter or Facebook account (Twitter is the main site ISIS uses) Do not friend your grandmother or something, be sure it is friends who are ok with you fighting ISIS, or who may be potential ISIS hunters, there is many nice people fighting ISIS you can join. Feel free to friend other people who are fighting ISIS, these will be a great asset and they can help show you the ropes, and all the ISIS sites they find. I recommend new hunters start out just doing reporting and re-Tweeting of targets.
After you have reported targets for a while you should get idea of what the enemy targets look like and how to find them. Be sure to speak up and others will help you learn all kinds of things.
SECRET – SILENT METHOD – Direct Messaging
You can form a DM group of friends or join an existing Direct Message (DM) Group and all you need is a few if you each have several accounts. Each person reports targets they find to the group and group members report theirs and other members targets.
VISIBLE METHOD – Tweeting Targets
You can Tweet it and use @Usernames(from above) & Hashtags like #OpISIS #IceISIS #targets #OpMopUpISIS
If you Tweet it ( a less visible to target method is )
You can take a picture of the user ID violation and details. (screenshot cut & paste)
Then use the text area of tweet to make hashtags #IceISIS #OpISIS #IceISIS #OpMopUpISIS #Targets
Individual user IDs you can report anonymously at: http://ghostsec.org/
Direct Threats Attack planing bombs, recruitment, material support, etc
To report Users talking about wanting to set up a bombing or other terrorist event these need to be tracked by professionals
use hastags #OpMOpUPISIS #OpISIS #GhostSec #IceISIS #targets for this type that need tracked please include these as well @CIA @FBI Report these type accounts and tweets ASAP.. Try make your repoort short and concise. 2 to 5 sentences should be sufficient. Make sure you are polite and also make sure to list is this a known ISIS member a Wanabee or ? also is this user ID likely to have actionable intel and what type? how likely will it have actionable intel? Be sure to include a link to the actual tweet, not just the users page. So if they have a tweet talking about making a bomb = right click on the time of Post (that has the link to the actual post) click on “Copy Link Address”
Violations of twitter agreement
That includes harassment, beheadings, terrorist speech, porn, & other abuses. Include in your report or tweet the type of violation,
Additional Info for Hunters and Fighters – by OpMopUpISIS
Epilogue – I want to address the most common responses we see to ISIS propaganda is anti Muslim posts, comments, etc. This however is not addressing the problem in a manner that helps us fight propaganda. By posting anti Muslim comments etc this further alienates Muslims especially in Western Countries were they are a minority. ISIS and al-Qaeda have a game plan and it does involve making non-Muslims fear or hate all Muslims. This gives the enemy a larger pool of people to recruit from to serve their militant urges. By comment on #ISIS Tweets, Blogs, Posts, etc. you open yourself and your friend list up for retaliation and harassment.
FIRST things FIRST
I would like to point out that we recommend making a 2ndry online ID to use for fighting ISIS online. Make sure it does not give away info or pictures about yourself. Also when you see a post or comment made by Jihadists do not respond to their comments. If you do want to be part of the Harass ISIS campaigns like #OpISIS #OpIceISIS #
I recommend simply copy paste the various examples we will give you. I am going to be making various Links to Cartoons, Text, and Pictures to post onto ISIS sites and #hashtags. If you chat with a jihadists you will only get mad and have a bad day. It is much better to take the high-ground and properly address jihadists comments, Bogs Pictures Videos Etc, by reporting harassing comments, photos of beheading,, hangings crucifixions etc. these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
This phase is also to report Harassment by ISIS and their followers. they often are dumb enough to tweet things in comments / replies like “Nice photo it will look even better when I cut your head off with my Knife” This makes it easy to ban, suspend, and even delete their accounts.
Be sure tyo report bad targets there as wlel to theHost/Server like YouTube, Twitter, Facebook Etc.
(If you locate a Islamic State account report it and Block it and encourage your friends to also report and block it, The more who do so, the more likely the web site will be closed down.)
We recommend you consider that the more followers you have and close friends the more will rpeort on targets that you tweet. So it maybe best to think of a hobby or other thing you know well and tailor your accounts to fit that, and to find more followers and friends.
Then you should contact the Host (i.e. Yahoo, YouTube, etc.) Use the report abuse button or other contact they recommend.
If it is a Fake U.S. military ID then you can also report it to FBI IC3 (internet crimes division) You can also contact FBI IC3 if you get riped-off online via any kind of scam. Be sure to keep your report to 1 – 2 short sentences. Make it clear and concise like “this uses appears to be a Fake US military ID. (then a short sentence why you think it is fake. Most of these are brought to my attention by friends or family of US military troops accounts, that are being harassed by people with fake IDs.
If it is a terrorist web sites and Fake U.S. military IDs. Report it to FBI as well as the Server – Contact your local FBI field office or closest international office. To report suspicious activity involving chemical, biological, or radiological materials, call (toll-free): 855-TELL-FBI or 855-835-5324. Report an online scam or e-mail hoax by filing a complaint online with our Internet Crime Complaint Center or by using our online Tips and Public Leads form
2.a. Point out the realities of what happens to people who join ISIS (or other al-Qaeda like groups)
Post comments, tweets, etc. that point out how the bad guys use most foreigners (esp western, and southeast Asia) as cannon fodder and suicide bombers. We will be making a page that helps and gives examples.
2.b. Post cartoons that depict makes fun of ISIS
Be sure to remember we do not want to make a potential ISIS follower decide because you pissed them off now they gonna go Join ISIS. So be almost polite about how you do it. Comedy also seems to work good.
2.c. Post quranic verses that contradict ISIS Wahabbi, Jihadi, Salafi teachings.
I haven’t had a chance to work on this one yet please check back soon. If you have some examples to share please do. Thanks
This is the most aggressive of ways to attack ISIS online. Only persons well trained in internet security and using secure methods (like using accounts designate for only fighting ISIS – DO NOT use your normal profile names images etc) . Here is a link to a Mom who did this in her off hours, and she is one of the very successful terrorist hunters in chat rooms.
Create a ISIS Target List
You create your own data base
Use WinPad or NotePad or basic word doc program.
Columns should include at least:
———————————————————————————————-User ID # or Link with user ID Violation Details Profile Photo Targets 1st 25 Friends
———————————————————————————————-How to find someone’s User ID?
Then upload the word file to pastebin http://pastebin.com/ or use
Edit – Additions July 4th 2015
We are looking for people who want to Hunt & Report ISIS web Sites. on Twitter, Facebook, & other
We need people who will report targets we find, Hunt for new targets, or intel on known targets.
We also need people who want to help Translate, Educate, Counter Enemy Propaganda, find the Hashtags they use, track their IPs and much more.
fighters from Anonymous review these hashtags and shut em down.
Analysis of the 30 September 2013 BBC Panorama documentary 'Saving Syria's Children' and related BBC News reports, contending that sequences filmed by BBC personnel and others at Atareb Hospital, Aleppo on 26 August 2013 purporting to show the aftermath of an incendiary bomb attack on a nearby school are largely, if not entirely, staged.
The world's most viewed site on global warming and climate change
Uncensored updates on world events, economics, the environment and medicine
Viewing conflicts through the eye of Counterinsurgency COIN - Since 2007
We have to find a way to counter the Enemys Propaganda and Islamaphobia
Non lasciare che la scintilla venga del tutto spenta dalle legge - Paul Klee -
A beautiful magazine theme
Thought Catalog is a digital youth culture magazine dedicated to your stories and ideas.
News ~ Resources ~ Activism
A bit of Bible, A bit of Life, A bit of Politics
Conservative Views and News.
Nationally Syndicated Editorial Cartoonist
News and Opinions From Inside China
The Newspapers Today
News & Analysis from Turkey