Lost motivation temporarily? Haven’t renewed server since last November, site in free mode right now. All articles are still archived here. If you need files, ask.
The other month our proud commander in chief made a public announcement declaring all Anti-Fascists terrorist, while pleading with other world leaders to come together and help him both condemn and crack down against these ‘dangerous’ people – people like myself. At the time, the first thing I remember saying in response to that was if my Government is actually going to call me a terrorist for fighting fascism, authoritarianism and Nazi’s, then you better damn well sure believe I’d at least do something to earn that sort of title/reputation. In that spirit I release this article, perhaps the single biggest guide to Anarchy you will ever find or see in one place.
** NOTE: To browse through the pdf’s (below) hover your mouse over the document and notice the up and down arrows to the lower left of the document, these will help you flip through them. You can also view the documents before you download them by clicking on the download link **
The Original Anarchists Cookbook:
Recipes for Disaster – an Anarchists Cookbook:
[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/crimethinc.recipes.for_.disaster.an_.anarchist.cookbook.pdf” title=”crimethinc.recipes.for.disaster.an.anarchist.cookbook”]
The Book of Dirty Tricks (CIA):
The Anti-Fascists Handbook:
[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Antifa-The-Anti-Fascist-Handbook.pdf” title=”Antifa, The Anti-Fascist Handbook”]
The Terrorists Handbook:
The Assassins Survival Guide:
Improvised Sabotage Devices (CIA):
Bombs You Can Make In The Kitchen:
Middle East Bomb Making:
Improvised Land Mines:
Do It Yourself, Sub-Machine Gunning:
Homemade Guns & Ammo:
[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/11/Homemade-Guns-Homemade-Ammo.pdf” title=”Homemade Guns & Homemade Ammo”]
Car Jacking Tutorials (DarkNet): http://www.wdsxj2ukzyjtkg6agjtnclhz2aoasxa3vgwtqgjkdgfp7pod37jw6bad.onion/section.php?page=files/carjackingfiles
Only in a world this stupid, corrupt and ignorant can those those with knowledge fighting against fascism be considered “Terrorists.” You are the reason why we all say “fuck society.” My regards to Mr. Trump……..
Just this evening, November 3rd 2019, my Anti-Fascist friends over at “CyberGuerrilla Anonymous Nexus” and “Anonymous Italia” announced a massive round of hacks and leaks targeting agriculture companies and organizations not doing their part to help fight back against climate change not just in their county, Italy, but all around the world as well. Despite most of their leaks stemming in conjunction with “Operation Green Rights” (#OpGreenRights), this time, Anonymous Italia actually released the data to celebrate this years upcoming Million Mask March (MMM) – helping to raise more awareness ahead of it on November 5th.
Message from the Hackers
Hello Italians, this press release is from Anonymous Italy.
Today we have decided to make ourselves known to those institutions of our country, which should be the first to inform us and fight against our farmers and artisans against climate change, by starting to use different methods of more organic farming without preservatives and/or products harmful to both the environment, the flora and fauna of our country.
But not only this! The whole world is now aware of the environmental problem of our planet, demonstrations of millions of people have been held and are held to try to sensitize our Governments whom ignore the imminent danger here, instead interested only in profit and their own well-being, never interested to what according to them is a problem only for the people.
Studies done by great scientists easily found online have made it clear, we are killing our planet and little or nothing is being done to curb this genocide of nature and man. The posted data reveal the very little or even lack of security in the infrastructure of our country, and once again our privacy is not taken into account at all. Sabatoged to use a simple encryption of passwords, or even more simply not informed against using passwords like the ones you can see below.
But don’t worry !!
We are the terrorists, criminals, outlaws !!
We are Anonymous
We are Legion
We do not Forgive
We do not Forget
All Leaked Data:
Target: hxxp: confagricolturapiemonte.com
About: The Regional Federation of Farmers of Piedmont is the territorial branch of Confagricoltura (the General Confederation of Italian Agriculture), the oldest agricultural organization in Italy whose origin dates back to 1895.
Dump: Admin password in the clear
Raw Leak: https://privatebin.net/?2ebaae23a34ee559#BXKWvMvWK37qyvXjmmiwT8NwUBTQapcvpciq94CnCTze
About:CO.DI.MA. CONDIFESA Mantova-Cremon – the Agricultural defense consortium. Agricultural insurance with public contributions.
Dump: 800+ subscribers, emails, clear passwords. Hacked and Defaced
Raw Leak: https://privatebin.net/?ef3316378ab3345f#E9kg9mHwbyebdUFwuJgGwEK7M3oQy3URBBHXu6wQsPDV
About: Industrial experts, L’INI-PEC is a portal created and managed by info Rooms and is divided into two sections called ‘Business Section’ and ‘Professional Section’ respectively.
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?4160f625ff10bc8a#EU4wVXZE2iBjEF2jUvWbZnpdPaCqGapzCTCWeKvhjrwm
About: Colleges of Agricultural Technicians and Agricultural Technicians Graduates of Piedmont and Valle d’Aosta
Dump: admin, users, clear passwords
Raw Leak: https://privatebin.net/?47382f87beb8b8b2#HC3ZPf4eUuNNtfZ4Aoj4hSYRafVjg7XcjwJKbZ2fF4ot
About: Provincial College of Agricultural Technicians and Agricultural Technicians Graduates of Cuneo
Dump: users, emails, clear passwords
Raw Leak: https://privatebin.net/?90f17654fd13550c#Dhd6GqyStJCuhAsULLVxvBofi8mXjzD9Vo83VL6beohX
About: Ebiter (tourism trade services fvg)- Bilateral trade and tourism agency Friuli
Dump: users, passwords
Raw Leak: https://privatebin.net/?48d5bb255bee8fe8#DQ5VmB1w4CKqaiSHU725b6uREncWZa66Jv5m68vVCCBA
— Anonymous Italia (@Anon_ITA) November 3, 2019
A group of hackers affiliated with the AnonOps IRC going by the name of “Anonymous Chile” has claimed responsibility for a large string of hacks targeting Chile’s national uniformed police forces – otherwise known as the “Carabineros.” Exposed in the leaks provided below is information such as officers names, user names and passwords, RUT, sex, addresses, ranks and the police stations they work at, as well as instructions for others to compromise Chilean data entry interfaces.
The hacks/leaks themselves are being carried out in conjunction with “Operation Chile” (#OpChile) and “”Operation Chile Desperato” (#OpChileDesperato), as well as with the “Marcha Mas Grande De Chile” – supporting protesters actively being repressed by Chilean police forces and their Government. It should be noted that the group is not finished yet, and promises more leaks will soon be on the way – the longer these demonstrations continue in the streets. More importantly, the group has already had their social media accounts taken down and the location of some of the files removed – which is why I am hosting their files here – in case their index gets taken down too. Should any more leaks be published over the coming days, I will make sure to provide updates here for Rogue Media – stay tuned!
Leak Location: https://pacos.rebelside.pw/pacoleaks/
Leak Backups 11/02/2019:
25 de Octubre 2019:
https://pacos.rebelside.pw/pacoleaks/funcionarios.zip | Bases de datos con Nombres, RUT, Sexo, Zona, Prefectura, Comisaría de TODOS los Pacos de Chile (1.7MB)
https://pacos.rebelside.pw/pacoleaks/instructivos.zip | Instructivos de uso de plataforma de Documentación electrónica (DOE) (6.7MB)
26 de Octubre 2019:
https://pacos.rebelside.pw/pacoleaks/informativo.html | INFORMATIVO #1 ACERCA DEL HACKEO A CARABINEROS DE CHILE
https://pacos.rebelside.pw/pacoleaks/codigofuente.tar.gz | Código fuente plataforma de Documentación Electrónica (DOE) de Carabineros (12MB)
https://pacos.rebelside.pw/pacoleaks/dump_intranet.txt | Dump de cuentas de acceso al intranet DOE (1.02MB)
https://pacos.rebelside.pw/pacoleaks/grabaciones-walkie-talkie.zip | Algunas grabaciones de comunicaciones radiales de Carabineros (se viene más) (0.53M)
27 de Octubre 2019:
https://pacos.rebelside.pw/pacoleaks/informativo-2.html | INFORMATIVO #2 ¿EL FINAL? NO LO CREEMOS
https://pacos.rebelside.pw/pacoleaks/msg.zip | Algunos mensajes desencriptados intercambiados en la plataforma DOE (140KB)
https://pacos.rebelside.pw/pacoleaks/adjuntos-10-2019-10k.tar.gz | 10K de archivos adjuntados a los mensajes (3.11GB) Checksum de archivos
https://pacos.rebelside.pw/pacoleaks/check.txt | Checksum MD5 y SHA1 de archivos (ultima actualizacion: 29/10)
01 de Noviembre 2019:
INFORMATIVO #3 MADE IN CHILE: https://pacos.rebelside.pw/pacoleaks/Adjunt09.zip | 20K de archivos adjuntados a mensajes (6GB)
Anonymous hacks and exposes the private details of the entire police force in Chile to protest corruption and severe repression. #OpChileDesperto #OpChile #MarchaMasGrandeDeChile https://t.co/0YiIYVRUEC
— Anonymous Hacker Anarchist Book Club🐝 (@YourAnonCentral) October 26, 2019
Encrypted chatrooms and VoIP services, such as like WhatsApp and Telegram, are not only great for business communications, but they critically important for human rights defenders and political activists fighting around the world – especially in at risk or oppressive countries. It is important to understand that even if you are living in a country which has banned Tor, VPN’s or applications such as Telegram, and you are afraid to use/install those programs out of fear of persecution, encrypted chatrooms can be equally as easy to use and remain 100% legal to boot.
For example, even in countries like Egypt, Iran, Pakistan – et cetera – which have either outright or periodically banned VoIP services such as Telegram and Viber, other chatroom-based services like Chatbox or Slack are still free and legal to own, and can be used to protect private communications all the same. In fact, political activists in countries such as Ethiopia and Egypt are known to have used encrypted chat services to safely coordinate communications, rallies and protests in times of great civil unrest, such as during the Oromo protests and Rabba Massacre. I know this because I was there on the front-lines helping to set up their accounts.
It’s usually free to sign up for these services, and all you need is a verified email address or phone number to login. Then, once enrolled, you can encrypt your chatroom by setting up a custom name/URL for it and requiring password authentication for entry. This assures that only the people you give the URL address to will be able to find it, and only those who know the password to it will be able to enter. Additionally, once set up, you can even set up individual channels within the chatroom itself for a duel level of security/encryption. This includes setting custom rules for different channels, such as requiring Administrator approval for access. This assures that if even someone is able to brute-force their way into your chatroom itself, there are still protocols in place to protect individual communications and information within the chatroom itself.
Additionally, especially if you are doing activism or human rights work, or feel that your life/security could be in danger for the work you do, it is always recommended to never use your real life identity or personal email accounts to set up an encrypted chatroom or channel. Instead, you should always create an online alias and use it to register a new account within an encrypted email service provider, such as ProtonMail or Tutanota. Obviously, this advice need not apply for those of you who are using these services for business purposes. Lastly, some chatroom services actually offer built in video chats, allowing for a third means to make secure voice connections outside of standard phone calls or VoIP services.
For more information on how to keep a safe, private and Anonymous identity online, please read the following tutorial: https://anonhq.com/anonymous-security-guide-2-0/
For more information on different encrypted email service providers and how you can make the switch, please read the following link: https://roguemedia.co/2019/11/02/making-the-switch-to-encrypted-emails-2/
Best/Top Chatroom Service Providers:
Voice Over Internet Protocol (VoIP):
While VoIP services are not necessarily “essential“ for everyday phone use, they do offer critical protections for political activists, journalists, researchers and citizens living under oppressive regimes all around the world. VoIP stands for “Voice over Internet Protocol,“ which is just a fancy way of saying they transport all calls and messages over established internet connections, rather than routing them through your telecommunications or phone service provider – such as AT&T or Verizon.
In areas like the United States and European Union, VoIP services are important to own because they prevent your data from being intercepted, recorded or stolen by telecommunications companies and other interested 3rd parties, such as Governments, thus protecting any information you send across the wires. VoIP services also offer the ability to encrypt messages or calls between like users, further protecting customer privacy. By comparison, both of these options are unavailable on standard text messages or phone calls straight from your phone provider. In politically oppressive countries around the world, VoIP services are even more important because they offer a critical means to bypass Government imposed restrictions or blockades on national telecommunications on a local level, while also allowing users to make international calls entirely for free.
While this might sound a bit complex or advanced, once installed, operating a VoIP connection/application is no more different or complicated than making a regular phone call or sending traditional text messages. Instead of using your normal texts messages or phone App, you simply download a VoIP App and log into that to make/receive calls and texts – it’s literally that easy. Lastly, VoIP connections offer a secondary means to reach your contacts, should your phone lose service, go out of cell tower range or come under blackout. Rather than relying on the signal strength of your network service provider of choice, all you need is an active internet connection to utilize a VoIP services.
The Best/Top VoIP Service Providers:
- Telegram: https://telegram.org/
- WhatsApp: https://www.whatsapp.com/
- Wickr: https://wickr.com/
- Signal: https://signal.org/
- Viber: https://www.viber.com
As always, strong password protection is the number one priority for securing social media accounts. This includes using your phone to enable two factor authentication (2FA) for them. Due to the simple fact that social accounts usually hold far less important data/information than emails, I am willing to bet anything that close to 100% of all hacks against your social accounts will be deterred if you simply enable 2FA for them. It is also a widely known fact that more social accounts are compromised as a result of weak passwords than any other single factor.
Password Security Guide + 2FA: https://roguemedia.co/2019/10/30/tutorial-learning-how-to-write-remember-un-hackable-passwords/
While using your social media accounts, just as with emails, never open a message from or click on links by users, senders or accounts you do not know personally, were not expecting to hear from or haven’t done business with in the past. As I have already with emails, hackers can phish your social media accounts all the same. Moreover, it is actually much easier for a hacker to uncover your “IP Address” through something like Facebook Messenger than it is through email. This can also be done without you clicking on any individual hyperlink. For example, you can find someone’s IP when engaging them on Facebook by using a simple sequence of “cmd commands” – which are freely available on every Windows device.
Like your mother always told you, never talk to strangers – especially online 😉
You can add an extra layer of security to your accounts by preventing them from being “indexed” by search engines and web crawlers. This can be accomplished by making small changes to your account settings. By default, the largest social media platforms are all designed to connect to search engines like Google, Bing or Yahoo, in order to make social networking more accessible and convenient for everyone. However, allowing your account to be indexed means that theoretically anyone in the world could search for and find your account if they really wanted. Whereas if you disable your account from being indexed then the only people you personally give your account information to will know where to find it.
To do this, simply go under your accounts setting, scroll to Privacy Settings and uncheck the “Public Search Results” box. This will remove your profile’s page from Google, Bing, and Yahoo search returns. This is also a security practice instructed to Federal Employees and members of the US Defense Department.
Before we begin, you can have the most advanced cyber security practices and anti-virus in place, but if you do not have a strong enough password to secure your devices or online accounts, all your security measures might as well be useless. As I have already explained in a previous tutorial, more people are hacked as a result of weak passwords than any other single factor. With that established, the 2nd most common way to hack someone is through their email inboxes or accounts – just ask Hillary Clinton, John Podesta, John Brennan and the DNC about that.
Make no mistake, if some of the worlds most powerful people can have their personal emails hacked, so can you. This is also why learning how to practice better email habits should be of the upmost importance for you heading into the future.
What To Avoid & How Email Hacks are Pulled Off:
While browsing through your email account(s), never open a single email or click on any link(s) from a sender you do not know personally. It might seem harmless, but the simple act of curiously opening an email or clicking on a link within an email can open Malware or register and transmit the IP Address of the device you are using to the sender of that email or link.
When a hacker sends compromising emails or links to your personal inbox it is a technique known as “Phishing,” and it is perhaps the most common form of cyber-attack you will ever encounter. I am willing to bet that everyone whom has ever owned an email account has seen a phishing scheme at one point or another in their lifetime, whether they were even aware of it or not. This is also why it is important to not just leave your email out in the open for all the world to see, or blindly pass it around to so many pages across the internet – especially if you have something to lose.
Believe it or not, there are even free and public services which allow any person to secretly attach a program to any given link or email they send, which automatically transmits data such as your IP Address as soon as you open it. This type of program also reveals things like the time of day you clicked the link, the type of browser you were using and how long you kept the window open. This is also what is referred to as a “trap-link.” The most common of which comes in the form of an “IP-logger,” which automatically registers the data of any device that clicks on it. While this might sound extremely complicated or foreign to you, again, regardless of the legality of it all, there are actually multiple free services, platforms and tools available on the internet for people to do just this.
Needless to say, always use caution and judgement when clicking on any links in your inbox, online chat, message or social media network alike – especially from people/sources/senders you do not know/trust or have never done business with directly. Lastly, getting your IP logged is the least of your concerns – it’s just the most common practice. Typically, hackers will “Spear-Phish” different/specific emails with malicious links that can secretly upload or install malware onto a users device, granting further access to their information. Additionally, every file you download should be immediately scanned by your anti-virus, because Microsoft Word documents and weaponized pdf’s are increasingly being used by the world’s most sophisticated hackers – because these are the most widely downloaded types of documents online, making them the easiest means to widely install malware on more peoples devices.
Separate Your Inboxes:
A good practice is to also use separate accounts for different purposes. For example, use a separate email account for your online banking and/or business than you would use for family, friends, or subscribing to magazines. This ensures that if one account is ever breached or compromised, not every aspect of your life gets compromised along with it. Additionally, use separate passwords for separate accounts and always reserve your strongest passwords for your most important accounts. You should also utilize two-factor authentication whenever and wherever possible.
If you are a website domain owner, or own multiple email accounts, you can also secure your personal or business inbox behind a mail forwarding service through your domains DNS settings or an alternative service provider. Selecting this option will allow you to pass out an email address without actually revealing the true end destination where those emails will be sent, essentially turning the mail forwarding address into an “alias” or “proxy” for your real account.
If you would like to learn more about alternative/encrypted email service providers, as well as why you should consider making the switch to them, please utilize the following link: https://roguemedia.co/2019/11/02/making-the-switch-to-encrypted-emails-2/
If you need help learning how to read, write and remember stronger passwords to secure your online accounts, please utilize the following link: https://roguemedia.co/2019/10/30/tutorial-learning-how-to-write-remember-un-hackable-passwords/
This past February a US judge ordered Microsoft, an American based tech company, to honor the search warrants of American law enforcement agencies requiring the company to hand over any/all data, emails and the like which the company stores on servers located overseas. The ruling came in direct contradiction to a previous ruling from a Federal Appeals Court in August of 2016, which upheld a US Circuit court ruling from July 2016, prohibiting the US Government from seizing data stored on servers located outside of US borders.
The principle behind this case is very simple to understand, does the United States Government have the right to demand foreign businesses located outside of the United States hand over their records to the United States Government if that company happens to do business with a US citizen? In other words, are foreign nations forced to abide by US law and comply with all US based legal requests? Well, according to the most recent ruling, as of February 2017, at least as far as US courts are concerned, the answer is “yes.”
What Other “Authority” Does The US Government Have?
Let’s use the world’s most popular email service provider as a quick example – Gmail. Quite literally, everything you do on your Gmail account is accessible by Google at any given moment in time. After-all, you are using their service. If the US Government ever wants to see your account or any of the information on it, then all they have to do is pull up the file of a generic document, insert your name on top of it, print it out and just like that they magically have a “subpoena” to obtain all of your information from Google.
Despite how simple of a process this is, it is all groundbreaking stuff too. Believe it or not, it was not until May 2016 that the US government even needed to get a warrant or legal document of any kind to search through all of your personal emails. Don’t believe me?
Read More – Email Privacy Act of 2016: https://www.congress.gov/bill/114th-congress/house-bill/699
For you international folk out there, the news isn’t much better. You see, the US Government has its own private court known as a FISC court which, historically speaking, blindly grants “99.96%” of all warrant request brought in front of it – but who’s counting, right?
With that out of the way, all of the information above only goes to show how easy it is for the US Governments to go about obtaining all your data “legally.” But as I think we are all aware by now, agencies like the NSA or CIA do not necessarily care about US law and have the very real authority to act outside of it – #PatriotAct. To be fair, this does not necessarily mean that someone working for the US Government is literally watching/reading every single email you write every minute of the day, but they theoretically could be if/whenever they wanted to.
To that very point, early in 2016 Google came out with a press release addressing how “state-sponsored hackers” had breached over 1 million Gmail accounts over the course of that year. This was also not an isolated incident and it’s not just Google which has been targeted by these types of breaches. Literally hundreds of millions of Yahoo and Hotmail accounts have also been exposed over the years.
Read More – 3 Billion Yahoo User Accounts Hacked, Including 500 Million Email Addresses: http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html
So far I have only addressed how easy it is for the US Government and/or law enforcement agencies to access all of your personal accounts/information, this does not even account for all of the non-Government organizations or hackers out there or oppressive regimes located in countries all over the world. In fact, I am willing to bet that at least 95% of all hackers worldwide are non-Government affiliated. Moreover, Hillary Clinton, the DNC, CIA, John Brennan and John Podesta should all serve as evidence for just how easy it can be for hackers to compromise anyone’s email account if they really want to – even some of the most powerful people in society.
Quite frankly, there is a reason why politicians and members of the Armed Forces are told never to use their own personal or private email accounts, because none of these services are properly protected or encrypted! While members of the Government and Armed Forces use their own private versions of encrypted email services which are NOT open or available to the public sector, thankfully, there are a number of free and paid email encryption services out there open to the general public.
Mailfence is a relatively new company globally, but one which I have already placed at the top of all encrypted email service providers. Mailfence operates their servers out of Belgium, a country internationally renown for having some of the strongest and most resolute privacy laws in the world. Unlike the United States, every surveillance request or request for information inside Belgium, including on Mailfence’s servers, must be legally brought in front of a Belgium judge and proven in court as legitimate. In this way Belgium protects user data and business confidentiality in a way that no other country in the world does.
Sign Up/Create an Account Here: https://mailfence.com
This email service provider offers free end to end encryption and hosts its servers in Switzerland, outside of US jurisdiction – theoretically. When signing up, at no point in time are you asked for any personal information and you do not need to attach any other emails account or phone numbers in order to register. This service also utilizes 2-factor authentication to log in, preventing hacking attempts. ProtonMail has also partnered with humanitarian organizations around the world, such as Amnesty International, in order to help fight back against Government surveillance and cyber censorship in developing countries around the world.
On a lighter note, if you are a fan of the Television drama “Mr. Robot” this is Elliot’s email provider of choice on the show.
Sign Up/Create an Account Here: https://protonmail.com/
This is another free encrypted email service that has become quite popular in recent times. In fact, earlier in 2016 Tutanota officially surpassed 1 million accounts – becoming the world’s largest encrypted email service provider. In 2017, Tutanota then went on to surpass 2 million accounts, furthering the countries rock solid reputation as an industry leader.
What makes Tutanota unique is that the company makes their source code “open source,” meaning that security researches investigate for themselves the level of encryption they are receiving. For all you n00bs out there, making your source code public record and still not having it hacked proves just how good the code really is.
Sign Up/Create an Account Here: https://tutanota.com/
The more things change, the more things basically stay the same. This time, Human Rights Watch has just publishing findings from an independent investigation linking CIA backed forces in Afghanistan to assassination, targeted disappearances, an increase in civilian casualties resulting from continued drone strikes and much more – some even amounting to War Crimes. Entitled “They’ve Shot Many Like This’: Abusive Night Raids by CIA-Backed Afghan Strike Forces,” the 53 page report documents the aforementioned crimes carried out by CIA backed forces inside Afghanistan across 2017 to 2019, specifically under Donald Trumps command.
In a statement published on their website this morning representatives from Human Rights Watch said “United States Central Intelligence Agency (CIA)-backed Afghan forces have committed summary executions and other grave abuses without accountability.” Perhaps most worrisome of the problems however is the continued use of drone strikes on or near civilian populations, a problem that Barack Obama once also encountered in the region. HRW goes on the explain how “these strike forces have unlawfully killed civilians during night raids, forcibly disappeared detainees, and attacked healthcare facilities for allegedly treating insurgent fighters. Civilian casualties from these raids and air operations have dramatically increased in the last two years.” I could write more, or you could just consume all the resources for yourself – enjoy!
Executive Summary: https://www.hrw.org/report/2019/10/31/theyve-shot-many/abusive-night-raids-cia-backed-afghan-strike-forces
Download Full Report: https://roguemedia.co/wp-content/uploads/2019/11/afghanistan1019_web.pdf
Browse Full Report:
** If you can not browse the document hover over the pdf (above) and notice the up and down arrows on the bottom left. These will help you flip through the pages **
Interestingly enough, the same day the report was first released, the CIA issued a response to the report, essentially accusing Human Rights Watch of over simplifying the situation as the US continues its Was against the Taliban. You can read the CIA’s full 5 page response below…
In part 1 of 2 of this particular series I am going to disclose the locations of nearly every library of declassified documents you can find online dating back to World War II, specifically implicating the United States Government. Perhaps most importantly, all of the documents contained within them were won via Freedom of Information Act requests and/or lawsuits. In part 2 of this series, I will assemble all of the online links you need to begin requesting new information from the Government for yourself, for free, with just the click of a button and the filling out of an application. But without any further adieu……
For those of you whom are not aware, over the course of the last two decades or so many legal experts, researchers and activists have been lobbying very hard to make government records more accessible to the general public. However, even in victory, rarely if ever do these successes ever get reported in the news. To this effect, below you can find various archives and repositories full of hundreds of thousands of newly declassified documents/files dating all the way back to the end of WW2 and up on through the 2000’s – all disclosed via “Freedom of Information Act” (FOIA) lawsuits. In the case of the CIA for example, these archives used to only be accessible via one computer located in Washington DC – until the entire archive was published/released online for the first time in 2017, that is.
Below is a list of open/available databases hosting countless records across different US Government agencies, almost all of them classified at one point or another throughout America’s past. I put them all together here today not only for my own resources, but also because I believe them to be invaluable resources for anyone reporting on modern US politics or US history, including educators, as a means to understand various situations or circumstances as they existed throughout the past – leading to the politics of today.
NSA FOIA Online Archive/Repository: https://nsarchive.gwu.edu/virtual-reading-room
NSA Declassification & Transparency Index: https://www.nsa.gov/news-features/declassified-documents/
US Department of State Archive/Repository: https://foia.state.gov/Search/Search.aspx
CIA Online Archive/Repository: https://www.cia.gov/library/readingroom/home
The Vault – FBI Archive/Repository: https://vault.fbi.gov/search
Reading Room – National Archives: https://www.archives.gov/foia/electronic-reading-room
Reading Room – Library of Congress: http://www.loc.gov/rr/main/
Department of Homeland Security Library: https://www.dhs.gov/foia-library
Available Documents – Department of Justice: https://www.justice.gov/oip/available-documents-all-doj-components
Executive Services Directorate – White House: https://www.esd.whs.mil/FOID/DoD-Records/
Electronic Library – NASA: https://www.hq.nasa.gov/pao/FOIA/err.htm
DoD – US Inspector General Reading Room: https://www.dodig.mil/FOIA/FOIA-Reading-Room/
US Army – FOIA Library: https://www.foia.army.mil/readingroom/index.aspx
US Navy FOIA Reading Room: https://www.secnav.navy.mil/foia/readingroom/SitePages/Home.aspx
US Airforce FOIA Library: https://www.foia.af.mil/Library/
Over the course of the last few months I have been neglecting my primary business site, so I figured I would write a brief article here today and combine it with my online tutorials series. Today’s article is simple, really, instructing internet users how easy it is to host and store massive amounts of data with even the simplest of technologies. Say for example you own a 15 GB USB stick, most people think that you can only hold 15 GB of data on it – right? However, as I will attempt to demonstrate, not only is this untrue, but given the right amount of knowledge and skill, you can actually host thousands of Terabytes worth of data on a simple 15 Gigabyte USB stick. In the remainder of this article, I will attempt to do my best to explain why you might as well look at a 15 GB data stick as home to potentially infinite amounts of data storage.
The perfect example of this phenomenon can be observed with Wikileaks “Deadman’s Switch” insurance file, which contains approximately 88 GB of data, but offered to the public in the form of a 110 KB torrent file download. For some perspective on this figure, you can fit 1,000,000 Kilobytes (KB) in 1 GB of data. So, if a 100 KB Torrent File essentially equals 88 GB of data storage, this means you can store approximately 13,200,000 GB of data on a 15 GB USB Stick – or 13,200 TB. Mind 💥 yet?
Download Wikileaks Encrypted Torrent File: https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent
Proof of Concept:
100 KB Torrent File = 88 GB Storage
100 KB of Normal Storage Space x 10,000 KB = 1 GB of Storage Space
88 GB x 10,000 = 880,000 GB of Storage Space in a 1 GB Torrent File
1 TB of Data = 1,000 GB of Data
880,000 GB x 15 GB = 13,200,000 GB or 13,200 TB of Data Storage in 15 GB USB Stick
As the math is clear, you can see that it’s indeed possible to store well over 13,000 Terabytes of data on something as small as a 15 Gigabyte USB stick – the standard size available at most computer hardware stores, at least here in the US. As for how to compress a file into a torrent, this is also extremely simple given the right software. In fact, making a torrent file is literally as easy or takes up as much time/energy as creating a zip file. All you need to do is install a 3rd party torrenting program, some of which you can find below, then use the programs setting to upload and compress your file into a torrent. It’s literally as easy as clicking 3 buttons!
Sample Demo Using uTorrent:
While this may be somewhat of an extreme example, you can also dramatically free up storage space by combing all of your documents/files into a singular or multiple zip files – drastically freeing up vast amounts of storage space on your computer or USB stick. For the purposes of this article I did not do the exact math for zip files, as torrents far and away compress the greatest amount of data into the smallest of locations.
Lastly, most people tend to stay away from torrent files because they think they are “illegal,” but this is merely just a fallacy. You see, just as with anything else in life, torrent files are what you make of them. It just so happens because of their storage capacity, most people on the DarkNet use torrents as a means to easily transport large amounts of data – usually illegal or stolen. However, a torrent file itself is only as illegal as the information you put on it. Meaning that it is only illegal if you put illegal information on it. If you are simply using your own files from your computer or work, you have absolutely nothing to worry about.
Top Torrenting Applications:
As if you need yet another reminder why our local elections and Government are not safe, earlier today, October 30th 2019, “M1rox” of Ghost Squad Hackers announced a hack of the Putnam County State Government of Ohio. Though no data was leaked in conjunction with today’s announcement, the defacement of the counties website indicates that hacker was able to gain full root access over the entire website itself – theoretically along with all of its data.
While the hacker may not necessarily have had any political motives, at least in terms of conducting espionage for other countries, the news comes within weeks of Mississippi’s warning that close to 75% of the states offices are not prepared to mitigate,deflect or handle a cyber attacks again them. Expectedly enough, upon analyzing the website myself, Putnam Counties home website lacks even an SSL. Regardless, as M1rox once again reminds us, our state and local Governments are far from safer as we continue to inch closer towards 1 year until elections.
— ~#GhostSquadHackers (@GhostSquadHack) October 30, 2019