My Interview w/ Project Hacktivism (Europe)

It may have been a couple months in the making, but earlier this month I finally agreed to an interview with a European based group of researchers known as “Project Hacktivism,” seeking to learn more about the underground world of hackers, who they are (so to speak), what motivates them, why it continues and why it all exists in the first place. Led by a man going by the name of Marco Romagna, I was submitted a series of questions that I will share the the viewing public here today as a sneak peak before the final research is published, produced or presented.

Here’s what I was sent, and how I replied…..

These are the first questions. Based on your answer I would be happy to ask more. If you can’t answer because it is too private, just let me know. Reading some of your blogs, I noticed you have been highly involved with Anonymous, likely not only as an observer. Therefore, my questions for you are…

1.) First, do you have hacking skills yourself, or are you passionate for technology but not a computer hacker.

Answer:I am not a computer hacker, but I am passionate about learning and view the internet as the greatest library on planet Earth, so I used to spend as much time as possible on it learning. Hacking culture always fascinated me so I began to research it and the more I researched it the more I found myself within it. I was never a hacker, but people seemed to gravitate to me because I have a high IQ and hackers tend to be some of the smartest people in the world actually, and the people who want to affiliate with them are always seeking to learn more about the world in general. I think you will find that some of the deepest corners of the hacking world are also some of the most intellectual corners of the world these days, all full of people whom spend nearly full time hours reading, learning, consuming new information. Couple this with different perspectives from different, cultures, religions, countries, etc, people wind up learning so much from one another – making it addictive.

2.) Have you directly been involved with Anonymous and hacktivism more in general (meaning: participating in active operations)? If so, what did (does) motivate you?

Answer:I have been directly involved in many Anonymous operations all around the world, led many myself, invented many myself, wrote transcripts for others, drafted press releases, made pictures – etc. What motivates me is what motivates everyone; being the change you wish to see in the world. Everyone in this world has different interests, goals or concerns. So people act on this individualism. Whether it be pedophiles, racists, animal abusers, terrorists, you name it, there is always going to be someone out there looking to fight back against it. So this is how people build their different Ops, based on what they want to fight for – which is always relative to the individual.

Hackers are some of the poorest, most oppressed people in this world that you will ever meet – believe me. In real life they have nothing, no possessions, no social power or political influence, often times social outcasts from their own schools or societies, geeks or losers, come from abusive families, lower class – etc. Just people who are accustomed to live without. So this is why they fight so hard online, because the internet levels out the playing field. With the right amount of knowledge, even the biggest of bums in the material world can be a God online. So this is why people fight, why they are willing to steal or pirate so much information/data from people online, because in real life they have nothing and this serves as their motivation to do whatever they can however they can.

What motivates us? It also works, meaning we get results. Look at operation Sudan in 2018 – 2019. We literally changed the course of African history. I started it with a few others from a homeless shelter computer lab in NYC, and helped a revolution in Africa. Just think about that. Anonymous was once one of Time Magazines top 100 people at one time, I have helped INTERPOL and the FBI make dozens of arrests internationally worldwide, been given lines to Air Force Intelligence in Yemen, all because Anonymous operations and online activism. You CAN change the world from a key board, and Anonymous knows this. You just have to work hard enough for it, so this is what many try to do.

3.) Hacktivism is a complex term: could you provide a definition of it and what ‘being a hacktivist’ mean?

Answer:I think my answer to #2 answers your question here.

4.) The golden age of hacktivism was probably the period 2010-2016. Do you think we are witnessing its decline? If so, what are the reasons behind it?

Answer:Well it all started with the FBI crackdowns which hit Anonymous very hard prior to 2015. Then we built up again and got mixed in with the whole Russian propagandist and fake news fiasco, so US Congress, Google, Facebook, and the President of the United States literally all teamed up to fight us, because no one knew who we were or what our true motivations were. As a ghostwriter, The Washington Post, Google and Facebook cited my work and the work I sourced to other websites as Russian Propaganda through the prop or not list and nearly all were banned offline/censored. Meanwhile, in real life, I had 3 verified pages on Facebook, 4 inclusions into Google News index and was an American conservative. But that doesn’t matter to them, anyone whom was Anonymous at the time was the enemy – automatically. The 2016 US Presidential election changed the course of history, including for hacktivism. All of our top platforms, pages and websites were essentially attacked and banned offline. Then, when the money stopped flowing in, the platforms shutdown, stopped running and people scattered. By 2017 everything was remnants of the year beforehand and there were no more central points of contacts for random or new people to find us. Anonymous HQ was the biggest Anonymous forum and webchat in the world in 2015-2016, sometimes thousands of people on at a time – millions of views/reads daily. After what Google and Facebook did to us, it was destroyed.

Getting back into hacktivism in 2018/2019 what I am finding is that the death of hacktivism is relative to geography. Meaning in the USA and Europe where it flourished during its Golden Age as you say, it is dead in the USA and Europe now. But on the other hand hacktivism is exploding in the Middle East, Africa, South America and South East Asia. These are also some of the least advanced countries/territories in the world in terms of cyber security, which is a direct correlation to the rise of hacktivism there I think.

For question number 4 I also think you need to look at the age of the people behind the movement. Many were inspired by movies like the Matrix and V for Vendetta. Maybe these people were teenagers or in their early 20s when these movies and these movements came out. The Matrix is 20 years old at this point. If you were 13 then, you are 33 now. If you were 20, you are 40 now. So the older people get the less time they have to play online or do things online because of adult life. Indubitably, this has also led to the death of the movement – the people originally behind it just got too old to keep playing games online and became remedial wage earners like the rest of society and it just kind of fell off.

** EDITORS NOTE: For the record, it might sound like I am saying Anonymous is dead, but I do not believe this at all, that was just the direction the question took me in that case. **

 

Online Tutorial: Phone Security

1.) Encryption

Encrypt your entire Operating System (OS). Phone encryption is the first line of defense for whichever phone you happen to use, ensuring that no one can even so much as turn on your device without the proper credentials. It is important to understand that encrypting your phone and setting a screen lock for it are not the same thing. It is also important to understand that, depending on the type of phone you have and who manufactured it, screen locks can be bypassed by 3rd parties – such as hackers – as well as through different back-doors found within various software applications/programs you’ve installed on it. Encrypting your phone on the other hand encrypts your entire operating system all at once, requiring password authentication for the phone to even boot up and power on in the first place – ensuring that no App, program or file can be exploited or corrupted to gain full access to your phone.

Depending on what type of phone you have, your settings might come with a built in feature allowing to encrypt individual Apps. If not, you can install a firewall application for that – more on this later on in the article. If you are unfamiliar where to find your phones encryption options, they are available in the “security” section under the main settings menu. Please note that it can take an hour or more to fully encrypt your phone, so it’s important to always begin with a fully charged battery.

Select an appropriate screen lock. Screen locks are a different form of encryption in a sense, ensuring that no one can use/operate your phone when you lose it, are away from it or leave it out in public. As far as how you set it up, there are 4 different options to choose from – each one having its pro’s and cons.

  • Password Lock. Users will be required to enter a unique password consisting of letters, numbers and symbols to unlock your device. Personally, I believe password protection to be by far the most secure of all options. However, for the same reason, it could be considered the most “inconvenient, because it requires the most amount of time/attention to enter every time you wish to unlock your device.
  • Pin Lock. Pin locks work exactly like password protections, only they exclude letters and symbols. Meaning that users will be required to enter a pass-code of random numbers in order to unlock your phone. For the very reason that pins exclude letters and symbols, they are a little less secure than passwords, exponentially decreasing the theoretical number of guesses it would take to crack/unlock your device.
  • Pattern Lock. I am finding that this is becoming the most “trendy” screen lock these days, simply requiring users to use their fingers to “connect the dots” and draw a unique pattern on the front of their screen before it unlocks. However, I find pattern locks to be less secure than some of the other options, because there is a much higher probability of successfully drawing a random pattern to unlock a device than their is guessing an advanced password or pin.
  • Biometrics. The newest “craze” is security is using your own fingerprints, eyes, face or facial expressions to unlock different devices. However, while these options may be the most convenient and fastest, they are also by far the least secure. I say this because multiple studies have proven how easy it is to trick biometric security measures, and often times the pictures off your own social media accounts are enough to bypass them.

Password/Pin protect your SIMor SSID card. It is important to understand that encrypting your operating system and setting a screen lock will do nothing to protect your data cards or memory chips, securing those is an entirely separate matter. So lastly, you are going to want to encrypt/password protect your SIM and/or SSID card. To do this simply enter into the security options within your phones main settings menu, find/select your memory chips and create a unique pin lock for them. This ensures that no matter where your memory chip goes or whatever phone/device it’s plugged into, no one will be allowed to access your contacts, photos, videos, messages, files or data without entering the correct pin code first.

If you would like help learning how to build strong and easy to remember passwords to encrypt your accounts/devices, please read more in the tutorial provided below.

How To Write Un-Hackable Passwords: https://roguesec.co/how-to-write-un-hackable-passwords/

2.) Firewalls

Some phones come pre-installed with various firewall options, but if yours does not then there is a sizeable number of firewall Apps to choose from. Firewalls are critically important to security because they allow users to seal off or block different Apps, limiting the possible points of entry for hackers or other 3rd parties. Depending on the type of firewall you select, you may also have the option to encrypt individual Apps on your phone, adding a 4th layer of encryption to your device while ensuring that even if someone is able to unlock it, they will not be allowed to use selected Apps without further permissions. This is particularly important/helpful if you utilize different types of chatrooms, group chats for work or VoIP services.

Perhaps most importantly, firewalls severely limit potential abuses of your phone. You can select different options to completely seal off individual Apps altogether, or seal off different settings/areas of your phone from outside sources.Not only does this prevent hackers from using selected Apps to compromise your phone, but at the same time it prevents App owners themselves and other 3rd parties from gaining access to your phone all the same. Firewalls also protect against unwarranted data collection of your phone, including call/text history and general phone usage. More importantly, building a strong firewall and sealing off selected Apps can free up memory space/data usage, both speeding up your phone and saving battery life. If there are Apps on your phone that you’ve never used a single day in your life, or you feel may be spying on you/invading your privacy, simply use your firewall to disable them altogether with the click of a button.

On a similar but side note, never blindly give every App different permissions just because they ask for them. For example, when first navigating a new phone you might find that you are regularly asked to allow different Apps to do random things, such as collect data or record audio/video. It might seem harmless, but think about it for a second. What the hell does the Google Chrome web browser possibly need to record audio for? The simple answer is it doesn’t, you are only being set up to have your phone hacked by authorities and/or law enforcement officials at a later date in time – should they ever feel the need. By checking these options and blindly granting permission to different Apps, your are secretly granting 3rd parties the permission to ‘flip the switch‘ so to speak and turn your phone into a spy/recording device whenever they want. So, don’t fall for it. There is literally no need to give different developers that much permission over your phone.

3.) Manage Security Certificates

Similarly, you should seriously check out the security certificates or “Trusted Credentials” list which came pre-installed on your phone. On my Android ZTE for example, my phone was handed to me with over 100 different security certificates installed on it, some of which grant different Government agencies/offices direct root access to my phone without requiring legal documents or warrants of any kind – no exaggeration. You might not have been told about this when you bought your phone, buy they are there. Just a short list of some of the organizations which have direct root access to my phone; China Financial Certification Authority, CyberTrust, Deutsche Telekom, Hellenic Academic Research Institute, HongKong Post, Japanese Government, VISA, TurkTrust,Wells Fargo, as well as countless other organizations operating under different Government umbrellas.

Thankfully though, you do have the ability to revoke these certificates/permissions if you like. Simply find where these certificates are under your settings menu and disable whichever ones you desire. Just note that disabling some of the most fundamental ones, such as those issues by your telecommunications provider, may break access to different areas of your phone – but this is always reversible.

4.) Internet Security & Antivirus

Most people are always surprised to learn that the same measures used to secure your computer can often times be transferred directly to your phone, this includes things like VPN’s and antivirus. For the purposes of this section of the article, I would like to discuss different measures you can install to help protect your phone and keep your data that much more private/secured.

  • VPN’s: I am not going to get into a breakdown of what VPN’s are and how they work, it is just important to understand that you can install and utilize a VPN connection on your phone all the same as a computer. If you already own a paid VPN account, simply install the service providers App on your phone and establish a new connection through it. Your IP Address and internet connection will be secured all the same, just note that the internet speed of your phone will be effected a little more significantly than a computer, simply because a phone can not process as much information as fast as a computer can.
  • Proxy’s: It is another common misconception that you can’t utilize proxy connections or the Tor network on your phone, this is simply untrue. You can either hide your IP address and internet activity by installing the Tor App directly, or you can install something known as Orbot – developed by The Tor Project. Orbot transfers all data/network activity from your phone across various tor relays, essentially turning the Tor network itself into a giant VPN connection/encryption setting for all of your data and every last thing you do on your phone. Unlike Tor, Orbot doesn’t just simply protect internet activity – even the Apps developers profess itself to be a “full phone VPN.
  • Re-Route DNS: Another way to protect against data spying, 3rd party abuses or intrusive hackers is to re-route your DNS through different service providers. For example, I personally route all of my network activity through Cloudflare DNS servers for added privacy and security. IBM’s Quad 9 DNS service is another good option, blocking you from gaining access to known malicious websites while preventing your device from ever becoming part of or wrapped up in a botnet. You can do your own research to find other options which may be more suitable, but another popular option is Google’s public DNS service.
  • Install Different Browsers: Just as with computers, you can choose a whole host of different browser options, many of which are far more secure and private than Google Chrome or the built in web browser found on your phone. If you would like to learn more about browsers, as well as the different/added benefits of each, please utilize the following link: https://roguesec.co/building-selecting-safer-web-browsers/
  • Antivirus: Phone antivirus programs essentially work the same as computer antivirus’, only they are far simpler and much cheaper. A good antivirus program for your phone should cost anywhere from $2-5$ per month, and will protect your phone against malicious hyperlinks, scan all downloads for viruses, as well as prevent all of the most common/basic forms of cyber attack. Some phone based antivirus service providers, such as Kaspersky Lab, also come with built in VPN connections to secure your internet activity at the same time.

5.) VoIP Services

While VoIP services are not necessarily essential for everyday phone use, they do offer critical protections for political activists, journalists, researchers and citizens living under oppressive regimes all around the world. VoIP stands for “Voice over Internet Protocol,” which is just a fancy way of saying they transport all calls and messages over established internet connections, rather than routing them through your telecommunications or phone service provider – such as AT&T or Verizon. For this reason, VoIp services prevent your data from being intercepted, recorded or stolen by telecommunications companies and other 3rd parties, such as Governments, thus protecting any information you send across them. VoIP services also offer the ability to encrypt messages or calls between like users, further protecting your privacy. By comparison, both of these options are not available on standard text messages or phone calls. In politically oppressive countries, VoIp services offer a critical means to bypass Government imposed restrictions or blockades on national telecommunications. VoIP services also let you make international calls for free.

While this might sound a bit complex or advanced, once installed, operating a VoIP connection/application is no more different or complicated than making a regular phone call or sending traditional text messages. Lastly, VoIP connections also offer a secondary means to reach contacts, should your phone lose service, go out of range or come under blackout. Rather than relying on the signal strength of your network service provider, all you need to use VoIP services is an active internet connection.

The Best/Top VoIP Service Providers:

CyberGuerrilla – Anonymous Gearing up for Operation Targeting Turkey Over Syrian Invasion

While I personally may be in favor of the Turkish invasion of Afrin and Rojava, it is not my job to care about which side is doing what when writing the news, I just report whats actively going on out there. But, getting into the hacktivist scene myself lately, I can not help but notice a ton of international outcry over what Turkey is presently doing in Syria and around their borders. I’m not talking about new reporters, politicians or anyone like that here, I’m specifically talking about some of the larger hacking networks the world over.

For example, over the course of just 1 week there were three different posting to CyberGuerrilla Anonymous Nexus (CgAn) indicating that operations against Turkey will soon be underway, and CgAn is not know to just f*ck around – so to speak. These postings, by the way, included a message from people inside Turkey, a posting from the United States and a posting from France – indicating a large scale effort is soon underway. It should also be noted that their operations are not entirely cyber and not entirely Black-Hat either, rather the groups are using whatever platforms they have to share the message about the Kurdish people and what is happening to them. In solidarity with them, I too share their messages here today with my audience.

Message from Kurds……..

Greeting citizens of the world

The Kurdish people who destroyed jihadist ISIS are now bombed by the Turkish State, the chief supporter of ISIS.
Unfortunately, we read the news of the deaths of many elderly women and children.
This is very sadly.
we shouldn’t stay silent more and not be part of this crime of humanity.
it is time to be sound to that scream echoing to stop this genocide.
Kurdish people should not be sacrificed to the dirty alliance of terrorist Trump and terrorist Erdogan.
All Anonymous members and all hacktivist groups should take action against that genocide.

Biji Berxwedana Rojava Biji Rojava

Message from Anonymous France…….

#OPSafeKurde #AnonymousFrance

Le collectif Anonymous ces lancé dans opération #OpsafeKurde à la suite que les force Turques ont traversé la frontière Syrienne.
Le collectif Anonymous France s’engage de manière indéterminé dans le conflit afin de permettre la paix entre les deux nations.

Et pour éviter toutes nouvelles guerre qui pourrait meurtrie des familles Turques, Kurdes, Syrienne.

Nous sommes légion
Nous pardonnons pas
Nous n’oublions pas
Attendez vous à nous

Message from BlackRat (CgAn)…..

Greeting Brothers and Sisters,

All those wars! All that devastation! All those victims, blood and reaction’s fury! Who is to blame? Who stands behind those who threw the burning torch into the keg of gunpowder? Who had long desired these wars and prepared them? The ruling classes! With their cronyism and kleptocracy, their bureaucracy and ideology, their police and spies calling us criminals. The governments and imperialist cliques, together with their press, tell you that the war(s) must be continued in order to destroy terrorism. Do not be deceived! Terrorism can only be eliminated by peace itself, and the task of bringing it down is posed in every country. Your governments and your press also tell you that the war’s must be continued so that it can be the last war on… This too is a deception. Never has a war put an end to war or terrorism. On the contrary, each war awakens the lust for revenge. Violence begets violence. Thus, after each sacrifice, your tormentors will demand new ones. Nor do the ruling pacifist zealots offer an escape from this vicious circle.

There is only one way to prevent future wars, namely for the Brothers, Sisters to conquer political power and abolish capitalist property. Enduring peace can only be achieved by victorious empowerment of the people.

A revolution not only to free the Kurdish population in Syria, but also the Middle East from the centuries of colonialism, oppression and dictatorships. And it has been an internationalist Revolution, because many internationalists joined this revolution, on the front line against the Islamic State and the Turkish fascism, we helped in hospitals, planted trees and worked to build up a democratic, ecological society, based on the liberation of women. And many revolutionaries joined the struggle all over the world, because the revolution in Syria has shown to all of us, that another world is not just theoretically possible, but it’s actually being built up in everyday life.

Social injustice and class rule are even more apparent in war than in peacetime. In peace, the capitalist system robs workers of the joys of life; in war(s) it robs them of everything, including life itself. And let us be done with devastation. It is you, the people, who will bear the burden of these heaps of ruins today and in the future. The hundreds of billions in cash thrown into the maw of the god of war are unavailable for maintaining the people’s well-being, for cultural purposes, and for social reform that could ease your lot, promote popular education, and alleviate poverty.

And tomorrow new and heavy taxes will be laid on your stooped shoulders. So let us end the squandering of your labor, your money, and your life’s energy. Rise up in struggle for an immediate peace with no annexations! Use every means possible to bring a rapid end to the human slaughter! Take up the slogan: For an immediate armistice! Rise up in struggle, peoples suffering ruin and murder! Take courage! Bear in mind that you are the majority and, when you so desire, you can assume power. Let the governments know that hate against war’s is growing in every country and with it, the desire for social retribution. This is bringing closer the hour of peace among the peoples.

Down with the War’s!
No Masters No Slaves!
Long live Liberty!
Long live Peace, immediate peace, without annexations!
Long live the Revolution!

At the time of this article, October 20th 2019, according to Amnesty International, “at least 218 civilians have been killed in Syria, including 18 children, since the offensive began” – something Turkey denies. If you want to learn more or hear first hand eyewitness accounts about Turkeys current offensive, you’re invited to read more here: https://www.amnesty.org/en/latest/news/2019/10/syria-damning-evidence-of-war-crimes-and-other-violations-by-turkish-forces-and-their-allies/

 

Join Rogue Media Labs New Online Chatroom

Earlier this year I managed to create a fairly large and successful online chatroom through the Discord service, but abruptly closed its doors for reasons I can not entirely understand/explain myself. Regardless, now that I have changed my website and begun writing again, I figure now is the perfect time to re-launch that platform and begin inviting everyone in once again.

Please note that it will take some time to build again and put all of the proper resources together, which might take a little longer now that I work full time offline. This includes stuff like security tutorials, nerd resources and weaponry, things like this. None the less, it will get there and I invite anyone interested to join in and watch/participate as we continue to build. If you don’t have Discord for your phone or PC yet, you should install this first, then click on the link. But you will still be able to join in the chat with your browser too, by clicking on the link below – though it will be as temporary as long as your browser window stays open, which is why I recommend to download first.

Chat Invitation – Click To Join: https://discord.gg/b3hmKYU

Here’s A Look at Leaked Passports from MI6 Agents

Unfortunately, you will not find James Bond on here or any other 007’s, but interestingly enough a hacker by the name of “neptuneX3c,” the same hacker behind a leak of MOSSAD emails earlier this year, has released another batch of leaks, this time exposing agents known to have worked with MI6 – England’s version of the Central Intelligence Agency. For those of you whom might not be aware, MI5 refers to any agents of England’s Government working on National Intelligence, on the island. On the other hand, MI6 refers to a group of “private” or “secret” agents working in the field of international intelligence gathering and espionage. Trust me, as someone whom has worked with many international intelligence agencies and offices over the years through the Anonymous Intelligence Agency, I’ve found MI6 to be by far the most impenetrable – or least responsive to any outside assistance.

As for the back drop to the story, there really isn’t much to tell, so I’ll just get on then with the leaks – enjoy!

Download File: https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf

Browse Leaks (9 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/mi6-passports.pdf”%5D

 

** If you cant browse the documents, hover you mouse over the pdf (above) and look at the bottom left where you will see up and down arrows, this will help you navigate the document **

Criticisms of Israel May Soon Be Banned In all US Schools, New Freedom of Information Act Request Uncovers

A new string of emails won via a successful Freedom of Information Act request (FOIA) by Center for Media and Democracy (CMD) paints an interesting portrayal for the way talk or history of the Jewish people may soon be taught in US schools nation wide. Taken from an exchange involving a right-wing American group of lobbyists going by the name of the American Legislative Exchange Council (ALEC), the emails document how openly far right wing lobbyists are currently working to pass new legislation banning any negative reporting or criticisms of Israel in US schools headed into the future.

More specifically, ALEC wants US legislature to ban talk of “human rights investigations focusing specifically on Israel.” As well as ban any speech “demonizing Israel by blaming Israel for all inter-religious or political tensions” or “de-legitimizing Israel by questioning Israel’s right to exist.

Reportedly, state representatives/lawmakers from from Arkansas, Florida, Kansas, North Carolina, Oklahoma, and South Carolina, all Republic powerhouses, have all met with ALEC about approving these measures in their states as of August. In addition to the 9 lawmakers (below), similar emails were also send to to state lawmakers; A.D. Motzen, national director of state Relations at Agudath Israel of America; and Joseph Sabag Israeli-American Coalition (IAC) for Action – all dated August 2019. You are invited to read those emails by browsing or downloading the documents provided below – enjoy!

Download Leaked Emails: https://assets.documentcloud.org/documents/6455535/Anti-Semitism-Bill-Discussed-at-ALEC-Emails.pdf

Browse Emails (3 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/Anti-Semitism-Bill-Discussed-at-ALEC-Emails.pdf”%5D

State Auditor: “Mississippi Shows Disregard for Cyber Security in State Government”

An internal audit of security systems, measures and protocols of the Mississippi State Government, at the hands of the states own auditor, is said to have revealed complete “disregard for cyber security” at the hands of Government employers and public universities – leaving the state particularly vulnerable to cyber attacks as we head deeper into the 2020 US Presidential election season.

As was reported by Mississippi’s State Auditor earlier this month, “As required by state law, the Auditor’s office sent a cyber security survey to 125 state agencies, boards, commissions, and universities. Only 71 state entities responded to the survey, and several respondents did not complete it. This leaves the status of cyber security in more than 50 state entities completely unknown.

Among the government offices that replied to the survey, the report shows at least 11 do not have adequate written procedures to prevent or recover from a cyber attack. Another 22 respondents have not executed a third-party risk assessment. Having a third party test the vulnerability of an agency’s server is a requirement under state law. Further, 38% of all respondents indicate sensitive information like health information, tax data, and student information is not being encrypted to protect it from hackers.

In short, the survey found over half of all respondents are less than 75% compliant with state cyber security laws.“”

Download Full Audit Report: http://www.osa.ms.gov/documents/Special_Reports/2019%20Cyber%20Security%20Report.pdf

Browse Report (3 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/2019-Cyber-Security-Report.pdf” title=”2019 Cyber Security Report”]

 

** If you cant browse the report, hover your mouse over the pdf (above) and notice the two up and down arrows in the bottom left, this will help you navigate the document **

Report: Anogola’s Historic Drought Threatens The Lives of Tens of Thousands

A new report from Amnesty International cautions the international public and Government of Angola that the lives of tens of thousands of its citizens are currently at risk of death/famine if nothing is done to help them in the immediate future. The drought is itself is said to have been an ongoing situation dating back to October 2018, and the crisis has been making international headlines dating back to May 2019 as the situation continued to worsen. Now, today, Amnesty International is warning that “tens of thousands of pastoral farmers who have been driven off their land to make way for commercial cattle ranches have been exposed to a greater risk of hunger and starvation as drought grips southern Angola.

As was explained by Amnesty International in more detail, “since the end of the civil war in 2002, the authorities have been diverting communal grazing land of Tunda dos Gambos and Vale de Chimbolela for commercial farming.” As a result, “the rise of commercial cattle ranches on this traditional grazing land has eroded economic, social, and cultural resilience, most notably food security, among the Vanyaneka and Ovaherero people in the Gambos, Angola.” This is also important to understand because it is the people/farmers whom have been locked out for federal/commercial land which have been the hardest hit by this drought, because the Government as offered them no money, resources or irrigation like they have to commercial farmers. As such, these are the people most likely to die the longer the drought exists.

Download Report: https://www.amnesty.org/download/Documents/AFR1210202019ENGLISH.pdf

Browse Report (64 Pages):

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/AFR1210202019ENGLISH.pdf”%5D

 

** If you cant browse report hover over the pdf (above) and notice the up and down arrows at the bottom left, this will help you navigate through the document **

Anonymous Hacker Known As XeljomundoX Arrested by Spanish Authorities – Faces 11 Years

Unfortunately, upon logging back online this evening I was met with a bit of bad news. This would be the news that the Anon known as “XeljomundoX,” one of the primary leaders of #OpCatalonia2019, was arrested for their alleged role in advertising and encouraging not just the Catalonian protests which took place this week, but also for their role in encouraging cyber attacks against the Spanish Government with a video shared to social media this past Monday.

As was first reported to me by Anonymous News this afternoon, roughly 5 hours ago, “The former hacktivist arrested again #Anonymous @YourAnonXelj. He was also arrested for cyber attacks on 1-O and they ask him for 11 years in jail. Now accused of spreading a video of which he is not part of the attacks.” On top of that, as was reported by the Spanish news paper El Confidencial today “One of the ‘hackers’ linked to the one known as #OpCatalonia2019, a series of cyberattacks launched this week in protest of the ‘procés’ ruling, has been arrested this morning by the National Police at his home in Tarragona. He is accused of alleged crime of computer damage for being behind a video announcing the cyberattack campaign that occurred as of Monday.

In case you had not seen it or were curious, here is the video he was arrested for………

This is also the second time XeljomudoX has been arrested. They were previously arrested by Spanish authorities earlier this calendar year, in January 2019, following their participation in various international hacking campaigns. Most notably, the hacks and leaks associated with the original #OpCatalonia which took place throughout 2017 and the months/years to follow.

For example, other members of Anonymous put out a video this evening in support of XeljomudoX, stolen video footage detailing the search of Xel’s home and seizure of his computer and social accounts from this past March – lulz……..

Additionally, in protest/support of XeljomundoX myself, I sent a private message to his previously seized Twitter account with my DoB, SSN, home phone number and address, telling Spanish National PoliceArrest me you cowards. I will post the video every single day until he is free. Want to arrest someone for a video, now I know the Spanish Government is desperate. Then you wonder why all these people despise and protest you. DO you actually have pride for Spain? Has any country in the world fallen off any more significantly than Spain the last 600 years? You used to own part of the USA, Central America and South America. Now what are you? A shell of your former shelf, lost all your territory, lost your glory. Now your just a single nation with a failing economy, at the bottom end of the EU. What would you even do without the international bailouts? It’s pathetic. Now you try to stop on anyone who speaks negatively of your country? That’s fucking sad. Ask your boy Mussolini how well Fascist approaches worked for him. You will fall, and it’s because of your own actions. Spend half the effort looking into a mirror that you do trying to squash free speech. This is why you are cowards, and why I would love to speak my piece in your shithole country.

Not unexpectedly, at the time of this article I have not received a response from Spanish authorities, and have no further update on Xel’s situation. Stay tuned.

If you’d like to learn more about this weeks cyber campaign, you can read more here:  https://roguemedia.co/2019/10/15/the-highlights-fallout-damage-from-opcatalonia2019/

338 Individuals Across 12 Countries Indicted by US Justice Department After Largest Ever Child Pornography Bust

Earlier today, October 16th 2018, the United States Department of Justice announced indictments of 338 individuals across 12 countries after the take down and seizure of a DarkNet website called “Welcome To Video” – the largest DarkNet child pornography site, by volume, US authorities have ever uncovered. The site itself is said to have been owned and operated by a 23 years old by the name of Jong Woo Son – whom is currently serving other charges for child pornography in South Korea, of which he is a citizen.

Upon unsealing today’s indictment, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division stated thatDarknet sites that profit from the sexual exploitation of children are among the most vile and reprehensible forms of criminal behavior. This Administration will not allow child predators to use lawless online spaces as a shield. Today’s announcement demonstrates that the Department of Justice remains firmly committed to working closely with our partners in South Korea and around the world to rescue child victims and bring to justice the perpetrators of these abhorrent crimes.” It’s also said that the site itself was ultimately done in by the use of Bitcoin transactions, which allowed authorities “to determine the location of the Darknet server, identify the administrator of the website and ultimately track down the website server’s physical location in South Korea.

It should also be noted that while 12 countries were identified in the indictment, most of the individuals named do come from the US – spanning across 24 different states. Interestingly enough, I’d estimate that over 90% of all the US citizens named were between the ages of 24 and 42 at the time of their arrest – something I would not have expected going into the story.

Statement from DoJ: https://www.justice.gov/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child
Indictment Release: https://www.justice.gov/opa/press-release/file/1210441/download
Complaint for Forfeiture: https://www.justice.gov/opa/press-release/file/1210461/download

Browse Indictment & Complaint for Forfeiture:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/son_indictment_0.pdf”%5D

 

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/2019_10_16_complaint_19cv3098_0.pdf”%5D

 

** If you cant browse the documents hover your mouse over the pdf’s (above) and notice the up and down arrows in the bottom left, these will help you navigate the documents **

Report: The Transnational Rise of The Violent White Supremacist Movement

(Red Revolution) – The United States should urgently place far-right extremist groups on its list of banned terrorist organisations, a new report released this past week suggests. The report, “White Supremacy Extremism: The Transnational Rise of The Violent White Supremacist Movement”, highlights the increasing threat posed by the far-right and indicates a surge in domestic supremacist groups seeking military training and experience abroad, primarily in Ukraine.

Produced by the New York-based Soufan Center, the report suggests that the American government has been slow to respond to the changing nature of the far-right threat and that white supremacist extremism is now a multi-headed hydra.

White supremacy extremism is a transnational challenge — its tentacles reach from Canada to Australia, and the United States to Ukraine – but it has evolved at a different pace in different parts of the world… To make serious progress, the United States should consider building upon Canada and the United Kingdom’s leadership by sanctioning transnational WSE groups as foreign terrorist organizations.” – Soufan Center Report –

Download Full Report: https://thesoufancenter.org/wp-content/uploads/2019/09/Report-by-The-Soufan-Center-White-Supremacy-Extremism-The-Transnational-Rise-of-The-Violent-White-Supremacist-Movement.pdf

Designating far-right groups as terrorist organizations would enable the U.S. government to seize assets, hinder travel and enable charges to be brought against both members and those providing material support to such groups. The report particularly highlighted Canada’s successful use of such legislation to combat the international neo-Nazi network Blood & Honor.

While the west has been overtly preoccupied with Islamic State, white supremacists were connected to 50 murders across the U.S. in 2018 and an estimated 17,000 foreigners from 50 countries have gone to fight in the Ukraine conflict, many affiliated with the neo-Nazi Azov Battalion.

In Ukraine, the Azov Battalion has recruited foreign fighters motivated by white supremacy and neo-Nazi beliefs, including many from the West, to join its ranks and receive training, indoctrination, and instruction in irregular warfare.” – Soufan Center Report –

Part of the Ukrainian military, the Azov Battalion has been linked to a multitude of far-right groups in the west, notably the U.S. based neo-Nazi Atomwaffen Division. The Atomwaffen Division has been responsible for 8 murders in the U.S. since 2017.

A British branch of the Atomwaffen Division, The Sonnenkrieg Division, was responsible for the “race traitor” threats to kill Prince Harry and his wife Megan Markle alongside claims that police officers should be raped and killed and that white women who date non-whites should be hanged. In June, Sonnenkrieg members Oskar Dunn-Koczorowski, 18, and Michal Szewczuk, 19, were jailed for terrorism offences. “Let’s fill our hearts with terror and London’s streets with blood” – Jacek Tchorzewski.

Earlier in the year, Sonnenkrieg member Jacek Tchorzewski, 18, was arrested at Luton airport and charged with terrorism offences after police discovered “an enormous amount” of documents on the manufacture of weapons and explosives. Judge Anuja Dhir said the defendant was a “deeply entrenched neo-Nazi with an interest in Satanism and occult practices” and an “offender of particular concern” as she sentences him to four years in prision last month.

Also last month, police in Kansas arrested a serving U.S. Army soldier after he allegedly shared bomb-making instructions online. The soldier, Jarrett William Smith, was interested in joining the Azov Battalion and was in correspondence with a second man in Texas who had allegedly fought for the group. Conversations included discussion on carrying out attacks against “left-wing” media outlets, activists and politicians, including Democratic Presidential nominee Beto O’Rourke.

White supremacy extremism is a growing transnational threat and one that is too large not to tackle head-on. As the world has become more and more interconnected through social media, white supremacy extremists have found it easier and easier to recruit, fundraise, and spread violent propaganda. Moreover, white supremacist extremists are imitating Salafi- Jihadist groups like Al-Qaeda and the Islamic State, and many are taking advantage of international conflicts – such as the conflict in Ukraine – to expand the global white supremacy movement. Our new report outlines how these groups currently operate across the world and provides actionable solutions for policymakers, civil society, security services, and law enforcement agencies to combat this brand of violent extremism.” – Ali Soufan –

Browse Full Report:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/10/Report-by-The-Soufan-Center-White-Supremacy-Extremism-The-Transnational-Rise-of-The-Violent-White-Supremacist-Movement.pdf”%5D

 

** If you cant navigate the document hover over the pdf (above) and notice the two up and down arrows located at the bottom left, this will help you navigate the document **


This article was originally published by Red Revolution Media on May 7th 2019. It was republished, with permission, through a mutually agreed upon publishing partnership between Rogue Media and Red Revolution. Formatting edits, video, and pdf were added/embedded by Rogue Media Labs.

 

Trump Tells Erdogan ‘I Will Destroy Turkeys Economy’ In Leaked White House Letter

Interestingly enough, Russia Today is now touting a leaked White House letter from the office of the Presidency, in which Donald Trump literally tells President Erdogan of Turkey “Dont be a fool” in regards to his current Syria invasion, with treats of “destroying Turkeys economy” if Erdogan and Trump can not reach a deal in the near future. Dated October 9th 2019, the letter is incredibly interesting for many reasons, first off is the fact it is completely immature and almost childish language coming the from nations highest office. Second, Trump is outright threatening a NATO ally with economic sanctions and economic Warfare – much like we have done to Russia, Venezuela, Iran and many others over recent years. This is also incredibly dangerous for not just the future of international relations between the US and Turkey, but all NATO countries for that matter.

Honestly, I am not going to hype up the letter any more or any less for you, instead you can read it for yourself below…..

Image may contain: text