Search This Blog

Wednesday, April 29, 2015

Fight ISIS online - Beginners Guide

Beginner Level
Click on the Images in this Post to go to those Web Sites & Links
These are tools for the ISIS Hunters Toolbox

This method requires no knowledge of the issue. They have a online Data Base of known ISIS members web sites. it is a updated constantly 24/7. When a ISIS site goes down it is removed form the list. Read the details on their web site below for more info on how you can help by simply click on the twitter link and send report and then block it.

Lucky Troll Club

"WARNING: Profiles may contain extremely disturbing graphic images/"
This is a very helpful web site lots of helpful links. The link to the left * Here is the ISIS Block list. the following text is from that link

The following is the complete list of active suspected ISIS accounts from this site's database. It is a subset of the much larger databases maintained by @CtrlSec and @Iridium_Blacker.If, after viewing an active acount on this list, you feel that it is the account of an ISIS supporter, please report it to Twitter for violating Twitter content policies.

If you are going to evaluate/report accounts using the links provided here, please start at the top and work your way down. The more people that report an account, the more likely it is that it will be suspended. Suspended accounts are removed from the list at least once a day.WARNING: Profiles may contain extremely disturbing graphic images.
ISIS Block List - Lucky Troll Club

This is a great source to really get up to speed on how to surf the internet safely. Everyoone who uses the internet should learn and know these basics/

Virtual Private Network (VPN) A virtual private network is a connection from your computer to another network. Some of you may be familiar with these type of connections as they are widely used by businesses to handle their internal communications needs and to allow employees to access systems from remote locations. Setup properly, they can also be used by anyone to create a safer connection to the internet and have the added benefit of disguising your true location. Click the link below for a short tutorial on the different types of
VPN connections and encryption. 
Virtual Private Networks

The Onion Network (TOR) The Tor (The Onion Router) Network is a means of relaying your traffic to either an exit node (whereby your traffic then exits the network and into the open web) or to a hidden service/site maintained within the network itself. The traffic is routed through an 'untrusted' relay circuit, whereby each relay node only knows the node before it and the node after, thus no complete list of nodes used to route your traffic can be enumerated. The network exhibits end-to-end encryption but only within itself: if your traffic is not encrypted in the first place, any person data-sniffing the exit node will be able to see where you are then going and what you are doing while there.  Tor Information

Security Security online is a very long and involved subject. The various possibilities and methods of securing your client computer are combined by you to suit your unique environment. No one solution is good for every internet user. The reason for this is simple: We all use the internet in different ways. Some surf the web and read emails. Others spend their days on social media sites and twitter. Most do some degree of business online, either paying bills or making purchases. For these reasons, we cannot possibly cover every aspect of online life and we will make no attempt to cover every situation. We can give you a start and from there, we can assist you more once you are connected to the network. Click the link below and read the information, as many times as you have to until you have a basic understand then we can move to the next phase. Security Handbook

Encryption Recent news of how extensive the NSA's efforts to compromise internet security might make privacy seem impossible, but there is still hope. Edward Snowden said it in an online Q&A soon after he made his first document public: "Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on." We've put together a short primer to help get you started with more secure email (and files). Email Encryption Basics

IRC Clients  The IRC client is the application that allows you to connect to the IRC servers. The clients are free, easy to use but the initial setup can be confusing. Each of the links below contain the basic information to get connected to our network. If you cannot connect to the network after following the guide use the webchat link further down the page.

Windows - Mac OS X - Linux - Android - Irssi

Connecting to IRC Connect to IRC