Search This Blog

Monday, April 13, 2015

A How to Help fight ISIS 4.0 (Public version)


  1. OPERATION ISIS


    This is a simple how to instructions for average persons who want to help us fight ISIS online. Most of the Web sites you find will be wannabees, or people who are into ISIS but not active on the ground. When you do find ones that look to truly be in the fight, or planing attacks etc. that’s a big win and we want to help give you a place and friends who know how to handle the most extreme cases. Some of the worse sites do not go down right away. Often they need to be observed. Fake US military IDs, Fake NYC cop ID and a flew plots  in the Works are all things we helped shut down in 2007. I Personally Shut down 3,000 web sites in 2007. About 30 of those the FBI IC3 and CIA were notified about. The rest the server/host shut down after we pointed out what it was on their websites, mostly violations of User Agreement is how we shut most of them down.
    So here is what to do:
    First you have to ask yourself
    Do you want to report known targets? or do you want to find new Targets and look for actionable Intel.
    REPORT TARGETS:
    Whats is Needed – Any Twitter account can be used, even with no virus protection. If you do not click on the bad guys links ,do not interact via Tweets, replies. favs, retweets, or direct message any Bad Guys. But we do always recommend have anti virus and firewall and do not click on bad guys links EVER !!! You can copy the link then report it toGhostSec.org
    here is our page on How to Report targets
    How to Report Targets – (click here to learn how to report targets) – Find Targets by using the search function in Twitter,
    or once you find a target you can check who do they follow the first 25 or so you should look at most.
    You can Search various Hash Tags in Twitter
    Our Operations uses:
    #MUI_United      #MUI_Persian      #MUI_Arabic
    Other Operations uses:
    #IceISIS      #AntiISIS     #Targets     #No2ISIS
    HUNT & REPORT TARGETS:
    Make a New Twitter or Facebook account (Twitter is the main site ISIS uses) Do not friend your grandmother or something be sure it is friends who are ok with you fighting ISIS, or who may be a potential ISIS hunters, we have many nice people you can join in this fight. Feel free to friend other people who are fighting ISIS, these will be a great asset and they can help show you the ropes, and all the ISIS sites they find. I recommend new hunters start out just doing reporting and re-Tweeting of targets.
    Here is an Example of a Tweet from @OpMopUpISIS with #ISIS #Targets  
    MUI_United Target
    After you have reported targets for a while you should get idea of what the enemy targets look like and how to find them. Be sure to speak up and others will help you learn all kinds of things. If you would rather just Donate to help GhostSec fight ISIS online see end of this Post.
    HOW TO SURF THE WEB SAFELY
    If you can use a Linux machine that is the safest way to be online.
    But no matter what broswer computer or device you are you are using, be sure to get a VPN (Virtual Private Network).
    Use a VPN Virtual Private Network ZenMate is a good one. Do not click on WebSites Unless you know it is reliable, dont add add-ons or extensions unless you check out reviews and trust the provider, use Avast anti-virus, malwarebytes, and scan for Bots, don’t click-on or download pictures unless you are sure it is from your real friends and safe. Some can contain tracking info. Also use seperate browsers one for normal stuff one for fighting ISIS. or even 3 or 4 different browsers. ZenMate works on Firefox Chrome and Opera browsers.
    (Leave comments below to help add to the ?how to surf safe” section of this post. I will update and add contribution info.)
    You create your own data base
    Use WinPad or NotePad or basic word doc program.
    Columns should include at least:
    ———————————————————————————————————————————————————-
    User ID #  or Link with using ID           Violation        Details          Profile Photo       Targets 1st 25 Friends
    ———————————————————————————————————————————————————-
    How to find someones User ID?
    http://tweeterid.com/
    Then upload the word file to pastebin http://pastebin.com/ or use https://justpaste.it/ so you can keep track of it.
    SECRET – SILENT METHOD – Direct Messaging
    You can form a DM group of friends or join an existing Direct Message (DM) Group and all you need is a few if you each have several accounts. Each person reports targets they find to the group and group members report theirs and other members targets.
    VISIBLE METHOD – Tweeting Targets
    You can Tweet it and use @Usernames(from above) & Hashtags like #OpISIS #IceISIS #targets #OpMopUpISIS
    If you Tweet it ( a less visible to target method is )
    You can take a picture of the user ID violation and details. (screenshot cut & paste)
    Then use the text area of tweet to make hashtags #IceISIS #OpISIS #IceISIS #OpMopUpISIS #Targets
    Individual user IDs you can report anonymously at: http://ghostsec.org/
    Direct Threats Attack planing bombs, recruitment, material support, etc
    To report Users talking about wanting to set up a bombing or other terrorist events
    these need to be tracked by professionals
    If you think the user may know actual actionable intel, i.e. first hand knowledge involvement or knowledge of facts about attacks before they happen.
    Foreign Intelligence Services to Report Daeshbags to when you find actionable intelligence.

    You can also let @OpMopUpISIS know and he will also be sure to watch the noted bad guys.

    use hastags #OpMOpUPISIS #OpISIS #GhostSec #IceISIS #targets for this type that need tracked please include these as well @CIA @FBI Report these type accounts and tweets ASAP.. Try make your report short and concise.  2 to 5 sentences should be sufficient. Make sure you are polite and also make sure to list is this a known ISIS member a Wanabee or ? also is this user ID likely to have actionable intel and what type? how likely will it have actionable intel? Be sure to include a link to the actual tweet, not just the users page. So if they have a tweet talking about making a bomb = right click on the time of Post (that has the link to the actual post) click on “Copy Link Address”
    Violations of twitter agreement
    That includes harassment, beheadings, terrorist speech, porn, & other abuses. Include in your report or tweet the type of violation,
    ==============================================================================
    Additional Info for Hunters and Fighters – by OpMopUpISIS
    Epilogue – I want to address the most common responses we see to ISIS propaganda is anti Muslim posts, comments, etc. This however is not addressing the problem in a manner that helps us fight propaganda. By posting anti Muslim comments etc this further alienates Muslims especially in Western Countries were they are a minority. ISIS and al-Qaeda have a game plan and it does involve making non-Muslims fear or hate all Muslims. This gives the enemy a larger pool of people to recruit from to serve their militant urges. By comment on #ISIS Tweets, Blogs, Posts, etc. you open yourself and your friend list up for retaliation and harassment.
    FIRST things FIRST
    I would like to point out that we recommend making a 2ndry online ID to use for fighting ISIS online. Make sure it does not give away info or pictures about yourself. Also when you see a post or comment made by Jihadists do not respond to their comments. If you do want to be part of the Harass ISIS campaigns like #OpISIS  #OpIceISIS #
    I recommend simply copy paste the various examples we will give you. I am going to be making various Links to Cartoons, Text, and Pictures to post onto ISIS sites and #hashtags. If you chat  with a jihadists you will only get mad and have a bad day. It is much better to take the high-ground and properly address jihadists comments, Bogs Pictures Videos Etc, by reporting harassing comments, photos of beheading,, hangings crucifixions etc. these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
    1.    MAIN  fight is – Report ISIS harassment, ISIS web sites (accounts), and ISIS wannabee’s web sites.
    This phase is also to report Harassment by ISIS and their followers. they often  are dumb enough to tweet things in comments / replies like “Nice photo it will look even better when I cut your head off with my Knife” This makes it easy to ban, suspend, and even delete their accounts.
    Q. What type of web sites should we report?  A. ISIS Blogs, Pictures, Video,s Etc, photos of beheading,, hangings crucifixions, etc…….. these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
    a.   If you are on Twitter YouTube or other social media
    Be sure tyo report bad targets there as wlel to theHost/Server like YouTube, Twitter, Facebook Etc.
    (If you locate a Islamic State account report it and Block it and encourage your friends to also report and block it, The more who do so, the more likely the web site will be closed down.)
    b.  What should my Twitter hunter account look like?
    We recommend you consider that the more followers you have and close friends the more will rpeort on targets that you tweet. So it maybe best to think of a hobby or other thing you know well and tailor your accounts to fit that, and to find more followers and friends.
    c.   If on YouTube, Blogger, +Gplus, yahoo….etc.
    Then you should contact the Host (i.e. Yahoo, YouTube, etc.) Use the report abuse button or other contact they recommend.
    e.   FBI IC3   http://www.ic3.gov/complaint/default.aspx     (IC3  FAQ)
    If it is a Fake U.S. military ID then you can also report it to FBI IC3 (internet crimes division) You can also contact FBI IC3 if you get riped-off online via any kind of scam. Be sure to keep your report to 1 – 2 short sentences. Make it clear and concise like “this uses appears to be a Fake US military ID. (then a short sentence why you think it is fake. Most of these are brought to my attention by friends or family of US military troops accounts, that are being harassed by people with fake IDs.
    If it is a terrorist web sites and Fake U.S. military IDs. Report it to FBI as well as the Server – Contact your local FBI field office or closest international office.   To report suspicious activity involving chemical, biological, or radiological materials, call (toll-free): 855-TELL-FBI  or 855-835-5324. Report an online scam or e-mail hoax by filing a complaint online with our Internet Crime Complaint Center or by using our online Tips and Public Leads form
    2.    Moderate Difficulty – HARASS AND HOUND STRATEGIES – The next Big push is to Harass ISIS/ISIL
    2.a.    Point out the realities of what happens to people who join ISIS (or other al-Qaeda like groups)Post comments, tweets, etc. that point out how the bad guys use most foreigners (esp western, and southeast Asia) as cannon fodder and suicide bombers.  We will be making a page that helps and gives examples.
    2.b.    Post cartoons that depict makes fun of ISISBe sure to remember we do not want to make a potential ISIS follower decide because you pissed them off now they gonna go Join ISIS. So be almost polite about how you do it. Comedy also seems to work good.
    2.c.    Post quranic verses that contradict ISIS Wahabbi, Jihadi, Salafi teachings.I haven’t had a chance to work on this one yet please check back soon. If you have some examples to share please do. Thanks
    3.    Experts Only – Denial of Service Attacks on ISIS / ISILTwitter – Flood #IslamicStateMedia – this can disrupt their tweets and result in downtime for the bad guys This is a much more aggressive approach to fighting ISIS/ISIL will include having groups of people to flood the ISIS hashtags like #IslamicStateMedia @IslamicStateMedia. During the flood attack sessions we recommend those doing it favorite and re-tweets all the tweets that are countering the enemy’s propaganda.
     4.    Experts Only – Seek and track movements and chat on Jihadi and ISIS web sites / forums, chats.
    This is the most aggressive of ways to attack ISIS online. Only persons well trained in internet security and using secure methods (like using accounts designate for only fighting ISIS – DO NOT use your normal profile names images etc) . Here is a link to a Mom who did this in her off hours, and she is one of the very successful terrorist hunters in chat rooms.
    ====================================================================================
    Edit – Additions July 4th   2015
    #OpMopUpISIS
    We are looking for people who want to infiltrate ISIS ranks online in Twitter and Facebook. If you would like to join Operation Mop Up ISIS email us at 86.all.isis@gmail.com or DM @OpMopUpISIS
    We need people who will report targets we find, Hunt for new targets are for intel on known targets.
    We also need people who want to find out the Hashtags they use for communication, track their IPs and in some cases we send the local Gov or the Kurds to go get em.
    On FaceBook use Hasghtag   #IceIisis #IceISIS #OpISIS
    fighters from Anonymous review these hashtags and shut em down
    https://www.facebook.com/profile.php?id=10000953550
    ====================================================================================
    ===================================================================================-
    Many individuals have showed an amazing amount of support in regards to Operation ISIS and have asked how they can contribute to our cause. The steps below can be used to track Islamic State Twiiter accounts and their websites.
    1- Locating an Islamic State Twitter account.
    If you are new to this locating an Islamic State militant account can prove to be difficult however after locating your first account you will be able to find thousands more following these steps. ISIS militants and their supporters feed off of attention and publicity commonly using Twitter hash tags such as #IslamicState among others. Run a Twitter search using this hash tag and you will find your first Islamic State account. If you are still having difficulty locating an account Twitter search #CtrlSec or #OpISIS
    2- I have located my first Islamic State Twitter account.
    Now that you have located your first Islamic State Twitter account you will now be able to collect many more and form a vast network of information. With the account you initially located review all of their following and followers collecting Twitter account names as you move forward. When you are collecting account names you must retrieve their Twitter ID by visiting Click here to find a user’s ID If you do not collect the account ID they can easily change their account name to evade you as they commonly do once detected. As you are collecting Islamic State Twitter accounts check each bio and their tweets for website URLS and log the information. With the data you have compiled visit http://pastebin.com and publish a paste of your findings.
    3- I have a list of Islamic State Twitter accounts and URLS.
    Now that you have collected this information you can take action against them by reporting them to Anonymous, authorities and Twitter. If your paste link contains Islamic State Twitter accounts you can tweet your paste making sure to use the hash tag #CtrlSec
    If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the websites. If you have concerns for your personal safety you can alternatively email us with your information at ghostsec@riseup.net using a anonymous mailer service such as Click here to learn how to email Anonymously
    If you would like to contribute to #CtrlSec or #GhostSec via donation our Bitcoin address can be found below. All funds received will go towards server maintenance expenses and hardware to combat the Islamic State.
    Ghost Security Bitcoin Address:1KDkYapMUiwzHuCzNp32EGJY8c6eX6Hn6U
       Your contributions to our cause are immensely appreciated and this could never be achieved without your unyielding support.
    We are the ghosts that you have created.