Virtual Private Network (VPN) A virtual private network is a connection from your computer to another network. Some of you may be familiar with these type of connections as they are widely used by businesses to handle their internal communications needs and to allow employees to access systems from remote locations. Setup properly, they can also be used by anyone to create a safer connection to the internet and have the added benefit of disguising your true location. Click the link below for a short tutorial on the different types of
VPN connections and encryption. Virtual Private Networks
It is not the voice of the terrorist that we seek hide from or put our heads in the Sand and ask “please make the bad man go away”.
Instead when we have humans who report potential ISIS web sites and those are reviewed. Some are monitored others are sut down ASAP. If you see something I would be happy to look at it and let you know what I think it actually is. Often I have been amazed at things people have asked me to help with. in 2007/08 I was contacted 8 different times 8 different users about 8 fake Mil IDs on Yahoo that were saying very abusive stuff to military families. So the military families contacted me they pointed out the flaws the person made mistakes that a Lt. Col. would not have, (like in one Case).
The GhostSec division of Anonymous has been keeping itself busy. They have been compiling a list (https://ghostbin.com/paste/ce5jz) of websites “frequently used by the Islamic State through Twitter and other social media platforms for transmission of propaganda, religion, recruitment, communications and intelligence gathering purposes,” the group said in a statement.
Please do not refer to this how to below it was an ISIS Trick on Anonymous & others
They made Bunch Fake Anon IDs somehow they unfriended my top Anon frineds and replaced them
Here is what u need to do.
First off search Web for App called ZenMate To hide your IP address
make it at least lil harder ?
Do not click on pictures unless U sure it yor real friends
the fake guys are tweeting @IridiumBlacker and a few other
and they are spamming the fake IDs on other accounts
So that Jams up Twitter brain and We cant see the real guys they too low on list of search and even may not show at all.
For now when u thiink u find one do a click on the botton on low roght of post select “Report”
then it does not have option for ISIS or terrorist
so each selection hit worse thing like threats of violence on You
then U get a Box and one sentence sya this is likely ISIS and say why
Be sure also check this link
but DO NOT tweet the Bad Guys IDs
“This raises questions about the US government’s definition of terrorism and whether they have expanded it to including hackers,” said Hanni Fakhoury, a senior staff attorney for the Electronic Frontier Foundation.
Fakhoury said he was curious to know the identity of the “terrorist organisation” mentioned in the documents.
“If it was al-Qaida or Islamic State that would pose no problem for me, but if they were referring to Anonymous that would be a different proposition,” he said.
Hammond was arrested in March 2012 and sentenced in November the following year to 10 years in prison for his part in a series of high-profile hacks carried out in the name of Anonymous. One of the largest of those breaches in which Hammond played a leading role was the release of five million emails from the private intelligence firm Stratfor.
He was prosecuted under the Computer Fraud and Abuse Act (CFAA). There was never any suggestion during the proceedings that he was involved in any activities related to terrorism or terrorist organisations.
After 14 years of GWOT,
ISIS has spread to 16 countries.
A savage brutal doctrine is able to win hearts
and minds and attract followers from around the
world even for suicide bombings.
Western view; “The best counterinsurgency campaigns
integrate and synchronize political, security, economic,
and informational components that reinforce governmental
legitimacy and effectiveness while reducing insurgent
influence over the population.”
(U.S. Government Counterinsurgency Guide, 2009)
And have been a failure.
Below is a great Article by “The Anthropologist” a Hacker that helps keep us all safe from the bad guys. ————————————————————————————————————– ISIS is a recurring paradigm. Al Qaeda, Taliban, ISIS. 14 YRS … Continue reading
This is a new idea will make tweets company regret the closure of the supporters of the Islamic State accounts
If you receive an invitation message from any of your friend saying, “Hey, I’m inviting you to try WhatsApp Free Voice Calling feature, click here to activate now —> http://WhatsappCalling.com”, BEWARE! It is a Scam.