OPERATION ISIS
By OpMopUpISIS & Shir Panjshir
Original Post is located – here
This is a simple how to instructions for average persons who want to help us fight ISIS online. Most of the Web sites you find will be wannabees, or people who are into ISIS but not active on the ground. When you do find ones that look to truly be in the fight, or planing attacks etc. that’s a big win and we want to help give you a place and friends who know how to handle the most extreme cases. Some of the worse sites do not go down right away. Often they need to be observed. Fake US military IDs, Fake NYC cop ID and a flew plots in the Works are all things we helped shut down in 2007. I Personally Shut down 3,000 web sites in 2007. About 30 of those the FBI IC3 and CIA were notified about. The rest the server/host shut down after we pointed out what it was on their websites, mostly violations of User Agreement is how we shut most of them down.
So here is what to do:
First you have to ask yourself
Do you want to report known targets? or do you want to find new Targets and look for actionable Intel.
First you have to ask yourself
Do you want to report known targets? or do you want to find new Targets and look for actionable Intel.
REPORT TARGETS:
Whats is Needed – Any Twitter account can be used, even with no virus protection. If you do not click on the bad guys links ,do not interact via Tweets, replies. favs, retweets, or direct message any Bad Guys. But we do always recommend have anti virus and firewall and do not click on bad guys links EVER !!! You can copy the link then report it toGhostSec.org
here is our page on How to Report targets
Whats is Needed – Any Twitter account can be used, even with no virus protection. If you do not click on the bad guys links ,do not interact via Tweets, replies. favs, retweets, or direct message any Bad Guys. But we do always recommend have anti virus and firewall and do not click on bad guys links EVER !!! You can copy the link then report it toGhostSec.org
here is our page on How to Report targets
How to Report Targets – (click here to learn how to report targets) – Find Targets by using the search function in Twitter,
or once you find a target you can check who do they follow the first 25 or so you should look at most.
or once you find a target you can check who do they follow the first 25 or so you should look at most.
You can Search various Hash Tags in Twitter
HUNT & REPORT TARGETS:
Make a New Twitter or Facebook account (Twitter is the main site ISIS uses) Do not friend your grandmother or something be sure it is friends who are ok with you fighting ISIS, or who may be a potential ISIS hunters, we have many nice people you can join in this fight. Feel free to friend other people who are fighting ISIS, these will be a great asset and they can help show you the ropes, and all the ISIS sites they find. I recommend new hunters start out just doing reporting and re-Tweeting of targets.
Here is an Example of a Tweet from @OpMopUpISIS with #ISIS #Targets
Here is an Example of a Tweet from @OpMopUpISIS with #ISIS #Targets
After you have reported targets for a while you should get idea of what the enemy targets look like and how to find them. Be sure to speak up and others will help you learn all kinds of things. If you would rather just Donate to help GhostSec fight ISIS online see end of this Post.
HOW TO SURF THE WEB SAFELY
If you can use a Linux machine that is the safest way to be online.
But no matter what broswer computer or device you are you are using, be sure to get a VPN (Virtual Private Network).
Use a VPN Virtual Private Network ZenMate is a good one. Do not click on WebSites Unless you know it is reliable, dont add add-ons or extensions unless you check out reviews and trust the provider, use Avast anti-virus, malwarebytes, and scan for Bots, don’t click-on or download pictures unless you are sure it is from your real friends and safe. Some can contain tracking info. Also use seperate browsers one for normal stuff one for fighting ISIS. or even 3 or 4 different browsers. ZenMate works on Firefox Chrome and Opera browsers.
(Leave comments below to help add to the ?how to surf safe” section of this post. I will update and add contribution info.)
If you can use a Linux machine that is the safest way to be online.
But no matter what broswer computer or device you are you are using, be sure to get a VPN (Virtual Private Network).
Use a VPN Virtual Private Network ZenMate is a good one. Do not click on WebSites Unless you know it is reliable, dont add add-ons or extensions unless you check out reviews and trust the provider, use Avast anti-virus, malwarebytes, and scan for Bots, don’t click-on or download pictures unless you are sure it is from your real friends and safe. Some can contain tracking info. Also use seperate browsers one for normal stuff one for fighting ISIS. or even 3 or 4 different browsers. ZenMate works on Firefox Chrome and Opera browsers.
(Leave comments below to help add to the ?how to surf safe” section of this post. I will update and add contribution info.)
You create your own data base
Use WinPad or NotePad or basic word doc program.
Columns should include at least:
Use WinPad or NotePad or basic word doc program.
Columns should include at least:
———————————————————————————————————————————————————-
User ID # or Link with using ID Violation Details Profile Photo Targets 1st 25 Friends
User ID # or Link with using ID Violation Details Profile Photo Targets 1st 25 Friends
———————————————————————————————————————————————————-
How to find someones User ID?
http://tweeterid.com/
http://tweeterid.com/
SECRET – SILENT METHOD – Direct Messaging
You can form a DM group of friends or join an existing Direct Message (DM) Group and all you need is a few if you each have several acounts. Each person reports targets they find to the group and group members report theirs and other members targets.
You can form a DM group of friends or join an existing Direct Message (DM) Group and all you need is a few if you each have several acounts. Each person reports targets they find to the group and group members report theirs and other members targets.
VISIBLE METHOD – Tweeting Targets
You can Tweet it and use @Usernames(from above) & Hashtags like #OpISIS #IceISIS #targets #OpMopUpISIS
If you Tweet it ( a less visible to target method is )
You can take a picture of the user ID violation and details. (screenshot cut & paste)
Then use the text area of tweet to make hashtags #IceISIS #OpISIS #IceISIS #OpMopUpISIS #Targets
You can Tweet it and use @Usernames(from above) & Hashtags like #OpISIS #IceISIS #targets #OpMopUpISIS
If you Tweet it ( a less visible to target method is )
You can take a picture of the user ID violation and details. (screenshot cut & paste)
Then use the text area of tweet to make hashtags #IceISIS #OpISIS #IceISIS #OpMopUpISIS #Targets
Individual user IDs you can report anonymously at: http://ghostsec.org/
Direct Threats Attack planing bombs, recruitment, material support, etc
To report Users talking about wanting to set up a bombing or other terrorist event these need to be tracked by professionals
use hastags #OpMOpUPISIS #OpISIS #GhostSec #IceISIS #targets for this type that need tracked please include these as well @CIA @FBI Report these type accounts and tweets ASAP.. Try make your repoort short and concise. 2 to 5 sentences should be sufficient. Make sure you are polite and also make sure to list is this a known ISIS member a Wanabee or ? also is this user ID likely to have actionable intel and what type? how likely will it have actionable intel? Be sure to include a link to the actual tweet, not just the users page. So if they have a tweet talking about making a bomb = right click on the time of Post (that has the link to the actual post) click on “Copy Link Address”
To report Users talking about wanting to set up a bombing or other terrorist event these need to be tracked by professionals
use hastags #OpMOpUPISIS #OpISIS #GhostSec #IceISIS #targets for this type that need tracked please include these as well @CIA @FBI Report these type accounts and tweets ASAP.. Try make your repoort short and concise. 2 to 5 sentences should be sufficient. Make sure you are polite and also make sure to list is this a known ISIS member a Wanabee or ? also is this user ID likely to have actionable intel and what type? how likely will it have actionable intel? Be sure to include a link to the actual tweet, not just the users page. So if they have a tweet talking about making a bomb = right click on the time of Post (that has the link to the actual post) click on “Copy Link Address”
Violations of twitter agreement
That includes harassment, beheadings, terrorist speech, porn, & other abuses. Include in your report or tweet the type of violation,
===============================================================
FIRST things FIRST
I would like to point out that we recommend making a 2ndry online ID to use for fighting ISIS online. Make sure it does not give away info or pictures about yourself. Also when you see a post or comment made by Jihadists do not respond to their comments. If you do want to be part of the Harass ISIS campaigns like #OpISIS #OpIceISIS #
I recommend simply copy paste the various examples we will give you. I am going to be making various Links to Cartoons, Text, and Pictures to post onto ISIS sites and #hashtags. If you chat with a jihadists you will only get mad and have a bad day. It is much better to take the high-ground and properly address jihadists comments, Bogs Pictures Videos Etc, by reporting harassing comments, photos of beheading,, hangings crucifixions etc. these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
1. MAIN fight is - Report ISIS harassment, ISIS web sites (accounts), and ISIS wannabee's web sites.
This phase is also to report Harassment by ISIS and their followers. they often are dumb enough to tweet things in comments / replies like "Nice photo it will look even better when I cut your head off with my Knife" This makes it easy to ban, suspend, and even delete their accounts.
Q. What type of web sites should we report? A. ISIS Blogs, Pictures, Video,s Etc, photos of beheading,, hangings crucifixions, etc........ these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
a. If you are on Twitter YouTube or other social media
Be sure tyo report bad targets there as wlel to theHost/Server like YouTube, Twitter, Facebook Etc.
(If you locate a Islamic State account report it and Block it and encourage your friends to also report and block it, The more who do so, the more likely the web site will be closed down.)
b. What should my Twitter hunter account look like?We recommend you consider that the more followers you have and close friends the more will rpeort on targets that you tweet. So it maybe best to think of a hobby or other thing you know well and tailor your accounts to fit that, and to find more followers and friends.
c. If on YouTube, Blogger, +Gplus, yahoo....etc.
Then you should contact the Host (i.e. Yahoo, YouTube, etc.) Use the report abuse button or other contact they recommend.
e. FBI IC3 http://www.ic3.gov/complaint/default.aspx (IC3 FAQ)
If it is a Fake U.S. military ID then you can also report it to FBI IC3 (internet crimes division) You can also contact FBI IC3 if you get riped-off online via any kind of scam. Be sure to keep your report to 1 - 2 short sentences. Make it clear and concise like "this uses appears to be a Fake US military ID. (then a short sentence why you think it is fake. Most of these are brought to my attention by friends or family of US military troops accounts, that are being harassed by people with fake IDs.
f. Report Potential Terrorists Web sites or accounts to FBI
If it is a terrorist web sites and Fake U.S. military IDs. Report it to FBI as well as the Server - Contact your local FBI field office or closest international office. To report suspicious activity involving chemical, biological, or radiological materials, call (toll-free): 855-TELL-FBI or 855-835-5324. Report an online scam or e-mail hoax by filing a complaint online with our Internet Crime Complaint Center or by using our online Tips and Public Leads form
2. Moderate Difficulty - HARASS AND HOUND STRATEGIES - The next Big push is to Harass ISIS/ISIL
2.a. Point out the realities of what happens to people who join ISIS (or other al-Qaeda like groups)
Post comments, tweets, etc. that point out how the bad guys use most foreigners (esp western, and southeast Asia) as cannon fodder and suicide bombers. We will be making a page that helps and gives examples.
2.b. Post cartoons that depict makes fun of ISIS
Be sure to remember we do not want to make a potential ISIS follower decide because you pissed them off now they gonna go Join ISIS. So be almost polite about how you do it. Comedy also seems to work good.
2.c. Post quranic verses that contradict ISIS Wahabbi, Jihadi, Salafi teachings.
I haven't had a chance to work on this one yet please check back soon. If you have some examples to share please do. Thanks
3. Experts Only - Denial of Service Attacks on ISIS / ISILTwitter - Flood #IslamicStateMedia - this can disrupt their tweets and result in downtime for the bad guys This is a much more aggressive approach to fighting ISIS/ISIL will include having groups of people to flood the ISIS hashtags like #IslamicStateMedia @IslamicStateMedia. During the flood attack sessions we recommend those doing it favorite and re-tweets all the tweets that are countering the enemy's propaganda.
4. Experts Only - Seek and track movements and chat on Jihadi and ISIS web sites / forums, chats.
This is the most aggressive of ways to attack ISIS online. Only persons well trained in internet security and using secure methods (like using accounts designate for only fighting ISIS - DO NOT use your normal profile names images etc) . Here is a link to a Mom who did this in her off hours, and she is one of the very successful terrorist hunters in chat rooms.
-============================================================================-
Edit - Additions April 3rd 2015
#OpMopUpISIS
We are looking for people who want to infiltrate ISIS ranks online in Twitter and Facebook. We want to find out the Hashtags they use for communication, We also track their IPs and in some cases we send the local Gov or the Kurds to go get em.
Or you can help us by finding and reporting #ISIS accounts
It is easy just make a separate/new account on twitter (do not put normal friends in your friend list or they target them) and use the following #Hashtags = #OpISIS #OpIceISIS #OpISISMopUp #IceISIS
Include the person's Account/Link you are reporting on
and brief detail like "Suspect ISIS", #Beheadings #Daeshbags etc.
Here is an example:
☢ The Doctor ☢@iridium_black · 9m 9 minutes ago
Daeshbags:
https://twitter.com/_luluIS_ (new)
https://twitter.com/saddaa19999 *new)
https://twitter.com/okatoka7 (new)
#IceISIS #targets
On FaceBook use Hasghtag #IceIisis #IceISIS #OpISIS
fighters from Anonymous review these hashtags and shut em down
https://www.facebook.com/profile.php?id=100009535500895
That includes harassment, beheadings, terrorist speech, porn, & other abuses. Include in your report or tweet the type of violation,
===============================================================
==============================================================================
Additional Info for Hunters and Fighters - by OpMopUpISIS
Epilogue
- I want to address the most common responses we see to ISIS propaganda
is anti Muslim posts, comments, etc. This however is not addressing the
problem in a manner that helps us fight propaganda. By posting anti
Muslim comments etc this further alienates Muslims especially in Western
Countries were they are a minority. ISIS and al-Qaeda have a game plan
and it does involve making non-Muslims fear or hate all Muslims. This
gives the enemy a larger pool of people to recruit from to serve their
militant urges. By comment on #ISIS Tweets, Blogs, Posts, etc. you open
yourself and your friend list up for retaliation and harassment.Additional Info for Hunters and Fighters - by OpMopUpISIS
FIRST things FIRST
I would like to point out that we recommend making a 2ndry online ID to use for fighting ISIS online. Make sure it does not give away info or pictures about yourself. Also when you see a post or comment made by Jihadists do not respond to their comments. If you do want to be part of the Harass ISIS campaigns like #OpISIS #OpIceISIS #
I recommend simply copy paste the various examples we will give you. I am going to be making various Links to Cartoons, Text, and Pictures to post onto ISIS sites and #hashtags. If you chat with a jihadists you will only get mad and have a bad day. It is much better to take the high-ground and properly address jihadists comments, Bogs Pictures Videos Etc, by reporting harassing comments, photos of beheading,, hangings crucifixions etc. these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
1. MAIN fight is - Report ISIS harassment, ISIS web sites (accounts), and ISIS wannabee's web sites.
This phase is also to report Harassment by ISIS and their followers. they often are dumb enough to tweet things in comments / replies like "Nice photo it will look even better when I cut your head off with my Knife" This makes it easy to ban, suspend, and even delete their accounts.
Q. What type of web sites should we report? A. ISIS Blogs, Pictures, Video,s Etc, photos of beheading,, hangings crucifixions, etc........ these are all things that most Web services like Google, YouTube, Yahoo, Twitter etc. Therefore it is relatively easy to create a very bad day for many many ISIS and ISIS wannabees accounts online.
a. If you are on Twitter YouTube or other social media
Be sure tyo report bad targets there as wlel to theHost/Server like YouTube, Twitter, Facebook Etc.
(If you locate a Islamic State account report it and Block it and encourage your friends to also report and block it, The more who do so, the more likely the web site will be closed down.)
b. What should my Twitter hunter account look like?We recommend you consider that the more followers you have and close friends the more will rpeort on targets that you tweet. So it maybe best to think of a hobby or other thing you know well and tailor your accounts to fit that, and to find more followers and friends.
c. If on YouTube, Blogger, +Gplus, yahoo....etc.
Then you should contact the Host (i.e. Yahoo, YouTube, etc.) Use the report abuse button or other contact they recommend.
e. FBI IC3 http://www.ic3.gov/complaint/default.aspx (IC3 FAQ)
If it is a Fake U.S. military ID then you can also report it to FBI IC3 (internet crimes division) You can also contact FBI IC3 if you get riped-off online via any kind of scam. Be sure to keep your report to 1 - 2 short sentences. Make it clear and concise like "this uses appears to be a Fake US military ID. (then a short sentence why you think it is fake. Most of these are brought to my attention by friends or family of US military troops accounts, that are being harassed by people with fake IDs.
f. Report Potential Terrorists Web sites or accounts to FBI
If it is a terrorist web sites and Fake U.S. military IDs. Report it to FBI as well as the Server - Contact your local FBI field office or closest international office. To report suspicious activity involving chemical, biological, or radiological materials, call (toll-free): 855-TELL-FBI or 855-835-5324. Report an online scam or e-mail hoax by filing a complaint online with our Internet Crime Complaint Center or by using our online Tips and Public Leads form
2. Moderate Difficulty - HARASS AND HOUND STRATEGIES - The next Big push is to Harass ISIS/ISIL
2.a. Point out the realities of what happens to people who join ISIS (or other al-Qaeda like groups)
Post comments, tweets, etc. that point out how the bad guys use most foreigners (esp western, and southeast Asia) as cannon fodder and suicide bombers. We will be making a page that helps and gives examples.
2.b. Post cartoons that depict makes fun of ISIS
Be sure to remember we do not want to make a potential ISIS follower decide because you pissed them off now they gonna go Join ISIS. So be almost polite about how you do it. Comedy also seems to work good.
2.c. Post quranic verses that contradict ISIS Wahabbi, Jihadi, Salafi teachings.
I haven't had a chance to work on this one yet please check back soon. If you have some examples to share please do. Thanks
3. Experts Only - Denial of Service Attacks on ISIS / ISILTwitter - Flood #IslamicStateMedia - this can disrupt their tweets and result in downtime for the bad guys This is a much more aggressive approach to fighting ISIS/ISIL will include having groups of people to flood the ISIS hashtags like #IslamicStateMedia @IslamicStateMedia. During the flood attack sessions we recommend those doing it favorite and re-tweets all the tweets that are countering the enemy's propaganda.
4. Experts Only - Seek and track movements and chat on Jihadi and ISIS web sites / forums, chats.
This is the most aggressive of ways to attack ISIS online. Only persons well trained in internet security and using secure methods (like using accounts designate for only fighting ISIS - DO NOT use your normal profile names images etc) . Here is a link to a Mom who did this in her off hours, and she is one of the very successful terrorist hunters in chat rooms.
-============================================================================-
Edit - Additions April 3rd 2015
#OpMopUpISIS
We are looking for people who want to infiltrate ISIS ranks online in Twitter and Facebook. We want to find out the Hashtags they use for communication, We also track their IPs and in some cases we send the local Gov or the Kurds to go get em.
Or you can help us by finding and reporting #ISIS accounts
It is easy just make a separate/new account on twitter (do not put normal friends in your friend list or they target them) and use the following #Hashtags = #OpISIS #OpIceISIS #OpISISMopUp #IceISIS
Include the person's Account/Link you are reporting on
and brief detail like "Suspect ISIS", #Beheadings #Daeshbags etc.
Here is an example:
☢ The Doctor ☢@iridium_black · 9m 9 minutes ago
Daeshbags:
https://twitter.com/_luluIS_ (new)
https://twitter.com/saddaa19999 *new)
https://twitter.com/okatoka7 (new)
#IceISIS #targets
On FaceBook use Hasghtag #IceIisis #IceISIS #OpISIS
fighters from Anonymous review these hashtags and shut em down
https://www.facebook.com/profile.php?id=100009535500895
================================================================
================================================================
================================================================
- Many individuals have showed an amazing amount of support in regards to Operation ISIS and have asked how they can contribute to our cause. The steps below can be used to track Islamic State Twiiter accounts and their websites.
- 1- Locating an Islamic State Twitter account.
- If you are new to this locating an Islamic State militant account can prove to be difficult however after locating your first account you will be able to find thousands more following these steps. ISIS militants and their supporters feed off of attention and publicity commonly using Twitter hash tags such as #IslamicState among others. Run a Twitter search using this hash tag and you will find your first Islamic State account. If you are still having difficulty locating an account Twitter search #CtrlSec or #OpISIS
- 2- I have located my first Islamic State Twitter account.
- Now that you have located your first Islamic State Twitter account you will now be able to collect many more and form a vast network of information. With the account you initially located review all of their following and followers collecting Twitter account names as you move forward. When you are collecting account names you must retrieve their Twitter ID by visiting Click here to find a user's ID If you do not collect the account ID they can easily change their account name to evade you as they commonly do once detected. As you are collecting Islamic State Twitter accounts check each bio and their tweets for website URLS and log the information. With the data you have compiled visit http://pastebin.com and publish a paste of your findings.
- 3- I have a list of Islamic State Twitter accounts and URLS.
- Now that you have collected this information you can take action against them by reporting them to Anonymous, authorities and Twitter. If your paste link contains Islamic State Twitter accounts you can tweet your paste making sure to use the hash tag #CtrlSec
If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the websites. If you have concerns for your personal safety you can alternatively email us with your information at ghostsec@riseup.net using a anonymous mailer service such as Click here to learn how to email Anonymously If your paste link contains Islamic State website URLS tweet them using the hash tag #GhostSec so their operatives can collect intelligence and disable the websites. If you have concerns for your personal safety you can alternatively email us with your information at ghostsec@riseup.net using a anonymous mailer service such as Click here to learn how to email Anonymously
If you would like to contribute to #CtrlSec or #GhostSec via donation our Bitcoin address can be found below. All funds received will go towards server maintenance expenses and hardware to combat the Islamic State.
Ghost Security Bitcoin Address: 1KDkYapMUiwzHuCzNp32EGJY8c6eX6Hn6U
Your contributions to our cause are immensely appreciated and this could never be achieved without your unyielding support.
Ghost Security
We are the ghosts that you have created.
No comments:
Post a Comment