Anonymous Announces #StopACTA2, an International Call To Action – Protests Scheduled Throughout Europe On March 23rd 2019

Ahead of the European Unions final vote to pass their new Copyright Directive into law in April, Anonymous hacktivists and political activists alike are teaming up together to stage a series of protests across Europe. Planned for March 23rd 2019 and officially entitled “StopACTA 2019,” protests are currently scheduled to be held across 25 countries, including Belgium, Croatia, Cyprus, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Malta, the Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden and Switzerland.

View Map of All Demonstrations: https://www.google.com/maps/d/viewer?mid=1tmjhVLt_-nomkGk6Hy77JtNnum5lc_cW&ll=50.56698897867709%2C12.68248445000006&z=6

Original Release Calling for Protests:

What are They Protesting?

ACTA2 is what we call the Copyright Directive on the digital market. We call it #ACTA2 because it’s not just about helping creators circumvent copyright restrictions, its about the European Unions attempts to use copyright law as a means/excuse of seizing control over the internet – including the information you post and receive from it. The way we see it, the EU’s Copyright Directive is nothing more than the Governments way of financing censorship. We wholeheartedly believe ACTA2 is dangerous, as it will set the precedent allowing the EU to step in an censor the internet throughout the future. The way we see it, ACTA2 is the beginning of the Orwellian world and we mustn’t open the door too allow our Governments to do this, which is why we will be staging these protests on March 23rd.

Article 11

Also known as the #LinkTax, Article 11 is in essence a direct result of corporate lobbying. It gives extra protections/rights to legacy press organizations and media outlets, requiring mutually agreed upon licenses between the publisher and anyone else whom would like to use, share or republish their information. This includes pieces of information as small as SEO snippets, article titles or headlines, summary descriptions and pictures. In essence, many believe that Article 11 spells the death of small time or independent media outlets online.

Image may contain: text

Article 13

Also known as #UploadFilters the new law dumps the responsibility for posts & comments from the authors who write them to the owners of a website. It offers a tool to help owners of websites better filter their content. However, internet purists fear that this so called “filter” is merely a guise for censorship, restricting the free speech of people on the internet by flagging or blocking users based off specific key words that could be focused around religion, politics, sexuality – et cetera. Activists fear that certain groups of people could be excluded from all conversations in the EU entirely, which sets a dangerous precedent for future abuses or complications.

No photo description available.

The Problem Explained In More Detail

Hello World, we are Anonymous

With overshadowing unease we are observing the deformation of copyright coming from the EU parliament. The so-called Article 13, which was unified agreed upon by EU states, Commission and Parlament on the 13th of February, is threatening the freedom of the internet.

The articles 4b and 4c contained in Article 13 could bring birth to the feared upload filter. This would lead to a massive limitation of uploads on media-sharing websites like YouTube, Instagram or Twitter. This includes the use and circulation of Memes.

We already achieved the aversion of a similar problem in 2012, ACTA. We protested on the web as well as in the streets. The final decision regarding Article 13 will be made mid-April 2019. We cannot rest without showing the EU parliament what it means to steal the freedom of the internet.

The loose collective Anonymous won’t be standing still, choosing to drop its cloak of the silent observer. Censorship of the free internet is one step too far. Anonymous will be supporting the protests on the web as well as the marching on the 23rd of March. The coalition ‘Save your Internet’ provides every information on the topic, including dates for demonstrations. There you will find all the representatives with whom you can share your worries about Article 13.

Together we have to be loud! Together we have to fight for the freedom of the internet! Together we have to shelve Article 13! Make the demonstrations on the 23rd of March massive. As we, the internet, are the very last, strong instance to fight for our rights. All important information is found in the description.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

Other Resources:

Save Your Internet: https://saveyourinternet.eu/
A Message To All The Creators – Artists, Bloggers, Youtube’rs: https://www.stopacta2.org/on-line-creators/
Save The Internet: https://savetheinternet.info/

This Directive is known by many hashtags on the internet – here are some of them: #stopACTA2, #CopyrightDirective, #SaveYourInternet, #SaveTheInternet, #Article11, #Article13, #UploadFilters, #LinkTax, #Filternet, #ACTA2.

Full Text of EU Copyright Directive As It Will Be Voted 04/2019:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/03/EU_Copyright_Directive.pdf”%5D

Ghost Squad Hackers Release Contents from Internal Operation Known as #OpDecryptISIS, Exposing +1GB of Compressed Data Related To ISIS Members, Recruiters & Sympathizers Online

Earlier this morning, February 12th 2019, “S1ege” of Ghost Squad Hackers released a treasure trove of leaked documents compiled as the result of something known as “Operation Decrypt ISIS” (#OpDecryptISIS), an exclusive operation unique to Ghost Squad Hackers. In a personal interview with Rogue Media LabsS1ege explains how the data provided below comes as the result of months of work, time spent quietly working behind the scenes infiltrating ISIS networks, socially engineering its members and compromising their administrators online.

Unlike operations of the past, such as #OpISIS and #OpIceISIS, largely carried out under the banner of the Anonymous Hacker Collective and which typically targeted low level members of ISIS located on the ClearNet, Ghost Squad’s most recent operation was unique in the fact that it was almost exclusively designed “to take out the top chain of ISIS’s command” – which also subsequently led to the uncovering of countless lower level members involved with the terror group.

Operation Decrypt ISIS Raw Press Release: https://hastebin.com/aqupasaboz.coffeescript

Included in the leaked material provided below are rooted phone numbers belonging to ISIS members, the account names and numbers of ISIS members operating on encrypted Voice-Over-Internet-Protocol (VoIP) services such as WhatsApp or Telegram, as well as detailed logs stolen from ISIS members as they browsed through the internet. The leak also contains detailed files on the identities of ISIS members extracted from various accounts, chatrooms and web pages across the internet, divided across the following countries: Algeria, Australia, Belgium, Ghana, India, Indonesia, Libya, Morocco, Palestine, Moldova, Syria, Turkey, Uganada and Yemen. Ghost Squad also attached a separate file of ISIS member compromised via their VPN connections. The individual file folders contained with the leak also contain Personally Identifiable Information (PII) on countless terror members, including their “Phones, Geolocation, Cameras, Telegram accounts, numbers and channels, Facebook profiles, Twitter accounts, personal ID’s, Credit Card details and IP Logs.

Screen Shot of Main Leak:

No photo description available.

It should be noted however that the information contained within the leaked files only includes information on those who are either directly operating under the flag of ISIS, or directly participating within clandestine communications associated with the terror group. Quite simply, you do not find your way into these sorts of rooms or channels by accident, meaning that everyone named in the leak represents legitimate targets either actively participating with ISIS or attempting to learn how to do so. Either way, they are all guilty – even if by nothing other than association.

In a message attached to the leak, S1ege wanted the world to know that:

The Islamic state is far from dead..

People fail to realize that Isis is a lot like a decentralized movement, they operate primarily based on ideologies. They’re not a centralized group or physically located anywhere. Think deeply about the fact that most of the Islamic state’s attacks globally aren’t executed by some foot soldier sent abroad to carry out an operation/terrorist attack handed to him by Isis’ chain of command, rather, they’re done by lone wolves inspired by radical ideologies discovered somewhere on the internet – not their local mosque’s.

Presidents fails to acknowledge what causes the Islamic state to gain in numbers, fails to understand how to tackle the core/root problem. Isis/terrorism will never die, so long as one remaining member creates propaganda GSH will continue to combat Isis wherever, whenever on the internet.

Encrypted or decrypted we will find you and expose you Isis…

Browse Through Entire File Archive Leak: https://mega.nz/#F!izo1XC7Q!xq18rHeHzwJrss9sJrIoTQ

Contacts Data from Hacked Islamic State Admin’s Phones:

Raw Leak (77KB): https://hastebin.com/bomucocivu.shell

SMS Data from Hacked Islamic Stat Admin’s Phones:

Raw Leak 1 (656 KB): https://hastebin.com/afadiseyow.shell
Raw Leak 2 (482 KB): https://hastebin.com/ozobawaheq.shell

Call log Data from Hacked Islamic State Admin’s Phones:

Raw Leak 1 (1,214 KB): https://hastebin.com/obaridisoy.css
Raw Leak 2 (956 KB): https://hastebin.com/eqebunisik.css 

File Archive Backup 1: https://anonfile.com/62q7Gct3b2/Operation_Decrypt_Isis_GSH_zip
File Archive Backup 2: https://roguemedia.co/operation-decrypt-isis-gsh/
Auto-Download Backup: https://roguemedia.co/wp-content/uploads/2019/02/Operation-Decrypt-Isis-GSH.zip

While today’s leak comes as something of a surprise, after talking with various group members over the course of the last several weeks and months perhaps it shouldn’t have. I say this because while they never hinted that a large scale release was immediately immanent, Ghost Squad Hackers have been making it clear that they intend to make 2019 the year in which this Islamic States online presence is finally exterminated once and for good. For example, these were sentiments echoed by M1r0x of GSH just last week.

Even with the release this week, the fight isn’t over and new intelligence indicates the Islamic State has once again started shifting their presence to a newer means of communication – such as ZeroNet. As always, the fight continues….

Browse Through Some of The Leaks Featured Above:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/02/GSH_Leak.pdf”%5D

#OpGreenRights: LulzSecITA Hacks 7 International Environmental & Energy Supply Companies

In the late evening hours of January 22nd 2019, LulzSecITA announced the hack and leak of 7 international companies throughout Europe and the Middle East, leaking sensitive information stolen from each of the companies websites online. The hacks were carried out as part of a much larger initiative known as “Operation Green Rights” (#OpGreenRights), an international operation led by the Anonymous hacker collective designed to raise awareness on behalf environment issues effecting our planet, while punishing any companies doing harm to it.

Included in the hacks/leaks this week were Euronova International, a European based sewage solutions provider, Optimus, a Belgium based pharmaceutical equipment supplier, Cable Energy, a European based electrical panel producer, Scott Petrolium Corporation, self explanatory, Recherche Exploitation Produits (REP), a French based company specializing in pollution prevention and mitigation, as well as the Specialized Company For Energy Services (SES), an Iraqi based power solutions provider.

Read More About #OpGreenRights: https://roguemedia.co/?s=%23OpGreenRights&x=0&y=0

In a statement attached to the leaks, LulzSecITA explained the following:

Anonymous began as an idea, an idea that unites people of the world in the struggle for human rights and freedom. The same ideals that led to the birth of this faction of Anonymous.

Operation Green Rights is the sum of our frustration at seeing the human race enslaved by god’s money, which commits murder, exploit and oppress people and goes against the principles of democracy and human respect that should be the basis of any modern civilized society.

We have seen wars carried out for (the black gold) oil, natural gases, precius metals or for access to vast pastures or arable land, subjecting people to convenient dictatorships for trade agreements, meanwhile billions are spent on weapons research and nuclear war, and funding for research on renewable energy keep getting cut, and oil tankers keep sinking.

In addition, global warming, caused by these policies, it is a reality that we must be aware. The glaciers are melting, tides rise, the ozone hole is growing, the climate changes, changing climatic conditions, animal species become extinct.

The current global policies of many large corporations and many governments are trampling on our rights and those of every other living being, only in exchange for money.

We of Operation Green Rights say stop to this!

Operation Green Rights wants for our children a life in a civilized world that welcomes them with open arms and show respect for life and nature itself.
We want that Mother Earth will continue to live healthy and promoting life with its beauty.

We want the exploitation of peoples and the blood spilled in the streets no longer in the name of greed. But today we are not here just to talk about that, but also about the air quality in the world (that we should do something more to change the disaster we making day by day) and how industrialized agriculture is responsible of 95% on Ammonia emission in air, water and soil.

We all know fighting air pollution is the main point of many environmental “policies” and “schemes” of the past few years. However, agriculture, and specifically meat production, seems the only sector always omitted and forgotten.

It’s not enough to reduce factories and vehicles gas emissions, as asked by the agriculture lobbyists, neither is “a more efficient” use of heavy nitrogen fertilizers, as asked by the other sectors lobbyists. It becomes futile trying to reduce air pollution while continuing to pour tons of manure, drugs, chemicals fertilizers and all the others byproduct of intensive farming into rivers and landfills. The People hope the big Lobbies, not only the Industry, but also the Intensive Farming and Meat Producers, understand the damages they are doing to the heart, lungs and blood of our planet.

Operation Green Rights wants a future for our kids where a clean and civilized world is waiting for them with open arms where there is respect for nature.
We don’t want anymore oppression and blood to rule because of greed.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

 

Fire & Gas Systems, Fire Fighting Systems, Analyzer Systems, Pressurized Cabinets and Air Conditioning Units.

Website: hxxps://www.safcoengineering.com/
Leak: https://privatebin.net/?f3b8ac199876631b#LB2lEmoCJoAz0/OUAtsI4C6xFz220vovFivON3OpNNs=

Deface:

Euronova International

Website: hxxp://.euronova.net/
Leak: https://privatebin.net/?26216f43659c2995#hAjYfR2zid77TBNzDzi9lsKwQ+KLgVi1owU6MCElsEI=

Optimus – Calibration, testing and maintenance of lab equipment by European Lab Services

Leak: https://privatebin.net/?d32ebfb213a7e53d#+PaDP3C4cIdbOeN3Rfq/YuvQIXW2p42HhNj3ba1iFsQ=

Cabel Energy progetta e realizza quadri elettrici

Leak: https://privatebin.net/?18ff278848d21fd6#XY3nPEJ3Fu/u9eHcwQdqbCUAOCCydU4yWCr9Ni2X3v0=

Scott Petroleum Corporation

Leak: https://privatebin.net/?1b53dbb787dbdacd#/U6gN8jxwvhjWiLC3nkxHOW2ixxzmlGHiYRDoPz2J5s=

REP (“Recherche Exploitation Produits”, or Research Operation Products)

Leak: https://privatebin.net/?30be4cf61419a383#GxdYhpmkijHmSl9CF8fBhLUlQaUgkgyXnPexgY68E8g=

Specialized Company For Energy Services

Leak: https://privatebin.net/?277f1ca618b4f28f#ssO4xLJg/YihAC2ATOXCEuPSR2WOGGjLGLl4OSobR00=

Original Press Release 1/22/2019: https://anon-italy.blogspot.com/2019/01/opgreenrights.html

Data Servers, Country of Origin & Sound Cyber Security

The other day I sent out a “Tweet” and proceeded to lose 30% of my combined followers, literally overnight. The Tweet explained how the 53rd Street Library in New York City had expressed weariness over allowing me to instruct or teach lessons at their facility after coming to the realization I work with and source a great deal of my content through international partners. I had cracked the joke; “Rogue Security is getting the Kaspersky treatment? Must be moving up in the world?…

For those of you who might not be familiar with the backdrop or sarcasm expressed here, Kaspersky Lab has recently become one of the most polarizing names in cyber security dating back to the 2016 US Presidential election. This is because many people have come to believe that the Kremlin deliberately altered Russian Law in order to corrupt/compromise Russian based businesses, which Kaspersky is, into handing over confidential information relating to customer databases. Moreover, considering that Kaspersky Lab was one of the most widely utilized software developers purchased by US Government employees and contractors over the years, it is now believed that Kaspersky Lab itself was one of the key players behind the whole Russian hacking election fiasco – whether they voluntarily intended to be or not. For this very reason, dating back to December 2017, all Kaspersky products have since been banned on the Federal level and their software has been pulled off the shelves of stores including Staples and Best Buy – though their products still remain legal on the civilian level.

However, it must be noted that what the Kremlin did is nothing new. In fact, this practice has been employed by the United States Government for far longer. You might be surprised to know that it is 100% illegal for any computer, privacy or cyber security company based out of the US to refuse to hand over their data, servers or customer records to the US Government, provided those servers and data are stored within United States borders. Believe it or not, it is even illegal for US based businesses operating servers/companies overseas to refuse to hand over their data if requested by US authorities. While Microsoft is currently taking this obligation to the Supreme Court, throughout the course of 2016 and 2017 multiple lower courts have upheld the US Governments right to demand this information. Not only this, but the acting attorney General, Jeff Sessions, has also vowed to make unfettered end-to-end encryption illegal as long as he is in office.

Therefore, at least when it comes to your data privacy, claiming that “those Russians” are any better or any worse than “those Americans” is nothing more than farcical, and your information is no more protected in the hands of The White House than it is the Kremlin. So, no matter how strong your sense of Patriotism or Nationalistic pride may be, the fact of the matter remains that your computer isn’t more secure just because you buy from an American company. In fact, you might be surprised to know that multiple independent tests and studies have confirmed Kaspersky Lab is the most secure software platform for Windows based devices, and other studies list Microsoft’s own platforms as the worst. Moreover, there is a very real reason none of the world’s top privacy/security companies host their services inside US territories.

With that established, let’s take a closer look at some of the other most notable countries in the field of cyber security these days.

Dont Necessarily Buy Into The Swiss Hype

Over the course of the last 3-4 years one of the biggest trends I’ve noticed is all of the “hype” surrounding Switzerland and their world renown reputation for protecting business privacy and confidentially. Traditionally, Switzerland has acquired this reputation for protecting foreign investors within their banking systems. However, it must be noted that the same protections afforded/granted to the multi-billion dollar banking system are not necessarily extend to the cyber security industry, and you can bet your ass that you are never going to get the same level of privacy or protection from the Swiss Government for your $50 a year VPN connection or email account that an investor is going to get for their multi-million dollar bank account – get it? Any thought to the contrary is just, well, dumb – really.

For lack of a better term, in 2018 it is a generally known fact that many companies are simply trying “bank” on Switzerland’s historic reputation and turn it into a few extra dollars for their cyber security companies. This is not to say however that there are not some top notch countries currently operating out of Switzerland.

In fact, for the very laws as they now exist inside Russia, Eugene Kaspersky has vowed to move all of his companies servers out of Russia and into Switzerland to provide his customers with a greater level transparency in hopes of regaining their trust. Other companies such as ProtonMail and Tutanota also operate out of Switzerland and are two of cyber securities most trusted vendors. Many of the industry’s top VPN service providers also operate their servers out of Switzerland. As always though, do your research and just be weary/cautious of all new tech startups in the country.

Don’t Trust The Netherlands

The Netherlands really started to lose the trust of the cyber security community dating back to 2016, following the closing of GhostMail email servers and a series of raids on VPN service providers around the country. Dutch authorities have remained quite about their recent change of policy, but prior to 2016 the Netherlands was considered by many to be one of the worlds fastest growing and most trusted names in cyber security/digital privacy. Because of this, the underground hacking community has long since speculated that the Dutch Government was ultimately pressured to crack down on digital privacy providers following a joint effort undertaken by the US Federal Bureau of Investigation and European Police (EUROPOL), whom had essentially had enough of criminals and/or terrorists taking advantage of security platforms operated out of the country. Fast forward into 2018, while there are still a few legacy companies operating out of the country, almost all new startups know not to do business there.

In March of 2018 I personally reached out to GhostCom Ltd, the original founders of Ghostmail, for comment on their closing and the true extend of the operation undertaken by Dutch/International police, but their legal team has declined any comments to this day.

Belgium & Ecuador Offer The Strongest Privacy Protections In The World

Ecuador is world renown for protecting digital privacy, internet rights and international freedom fighters. This is not only evidenced by Julian Assanges continued political asylum, Ecuador has also granted asylum to some of the worlds most elite and dangerous hackers over the course of the last several decades. By now, it is a well known fact that the Government of Ecuador is willing to do more than almost anyone else to shelter/protect political activists and members of the digital underground, helping them to continue doing what they are do safely and securely. For example, despite all of the “hoopla” surrounding Wikileaks, the Ecuadorian Government actually controls 100% of Julian Assanges internet connectivity. Yet, have you ever heard of any one of Assanges sources being compromised over the years? That is also exactly my point. For all these reasons, Ecuador is considered one of, if not the most trustworthy country in the world when it relates to data privacy and cyber security related practices.

Belgium on the other hand has a legal system in place which ensures Government accountability and restricts potential abuses of privacy/authority. This is because every request, subpoena or warrant for information, data, servers and digital accounts made in Belgium must first be brought in front of a judge, officially in court, and proven to be valid or legitimate before any Belgium authorities can have access to it. In other countries such as the United States for example, Federal employees can simple print out a file document, sign your name onto it and automatically have the right to search your accounts – it’s literally that easy for them. For this very reason, Belgium is considered to be one the most trustworthy and accountable countries in the world to do cyber security business with, leading the way in terms of informational security. On a side note, if I was a betting man, I would expect to see many more privacy/cyber security companies start popping up all over Belgium throughout the course of the next 5-10 years, especially given all of the recent changes/overhauls to internet/data laws now being enforced by the European Union.

Colombia On The Up & Up?

This really has nothing to do with computer security, it’s just a growing trend you might have started to pick up on recently. Starting around 2015, first led by small time internet activists and Anonymous, more and more website owners across the world began shifting or creating new domains with .co – this was done for a multitude of reasons. First off, .co is often times much cheaper than .com domains. Second, it is becoming harder and harder to find an original, unique or appropriate .com domain for your business, third because more people associate the word “company” with .co instead of .com, and lastly, .co helps make your website that much more unique and stand out from the crowd – which can be an asset in today’s overcrowded online marketplace.

As for Colombia itself, I think the rise of the .co domain only helps the country look that much more innovative comparatively to the rest of the world, which is why the Colombian Government has never really pushed back on all the international vendors registering new domains through their country, including myself.