Behind The US’s Use of Hacktivists Groups As Cover for Cyber Campaigns Targeting Brasil

As someone whom has covered hacking news and hacktivists quite heavily for the last 5 years now, I found many events which took place between the later half of 2018 and beginning of 2019 particularly interesting. For those of you whom might not have been paying attention, over this time period the country of Brasil came under heavy fire from seemingly every direction – with many local, state and federal political/Government agencies and organizations getting hacked/leaked.

However, as a hacking news journalists whom got many exclusives over this time period, what was particularly interesting to note were the people whom were behind at least some of these attacks. While some were Brasilians, such as Pryzraky, the longer all of the hacks went on, the more different groups began outing themselves as internationals – particularly Americans. Such as was the case of the group known as “Shadow Squad Hackers” whom were Americans and claimed they were targeting Brasil because they were “disgusting and dirty people.” They claimed they were targeting Brasil for know other reason that they “hate Brasil and Brasilians.” Many also claimed to the be former members of the US Department of Defense at the same time.

While those are just some examples, they were far from alone. As you can see by following the tag below, the number of new or previously unknown hacktivists groups targeting Brasil in 2018/2019 were almost too many to count.

Read More – Brasil Tag on Rogue Media:

Why Is This Happening?

This is a two part answer. The first is the fact that Brasilian Government and political websites are far behind the rest of the world when it comes to sound cyber security practices. For example, the vast majority of hacks were all pulled off via SQL injection (SQLi) – because their website’s IT staff apparently doesn’t know how to block bad query strings. Upon further investigation, many political websites leave their login pages out in the open, on the front end landing page, making themselves an easy target for brute force attacks. Still even further, many of the smaller, local government websites don’t even utilize a Secured Socket Layer (SSL) – making them easier targets for DDoS attacks and defacement campaigns, of which there were many.

However, the second reason is far more interesting – geopolitics. What you may not know is that Brasil is a member/signatory the the BRICS Alliance. Built by an international outreach campaign by Russian President Vladimir Putin over the years, what you should know is that BRICS is built on a long term economic/military strategy to lock the United States out of South Pacific and South Atlantic trading routes, opening up trade routes for developing countries and emerging economies – such as Brasil, Russia, India, China and South Africa (BRICS).

If you think about it logistically or tactically it makes sense, Brasil has potential for the largest economy in South America and sticks the furthest out into the South Atlantic, which gives them the best chance at controlling the South Atlantic and sealing out countries from doing business in those waters. South Africa, for example, can control the Cape of Good Hope – the only route for Western Countries to cross over the African continent and reach Eastern markets by sea. Moving further East, India could have full control over the Indian ocean and has already begun sealing out the US from shipping rubbage to their country. And still yet, further East, Russian and China have the military power necessary to completely lock out the US from reaching all Eastern countries if they really wanted – with an all out attack on Japan not withstanding (RIP).

With that established and with countless coverage of all the Brasilian attacks, along with interviews with each of the hackers and hacking groups behind the hacks, it is my firm belief that the United States Government was using “hacktivist” groups as a cover for the hacks of major political parties and Government websites across Brasil, as revenge for the Brasilians having signed new alliances with Vladimir Putin and the Russian Government. Moreover, do you believe that all of these cyber attacks targeting Brasil occurring over the same exact timeline of the US’s attacks against Venezuela were any coincidence?

It is my firm belief that the US Government used these groups and these tactics not only to expose information on the Brasilian Government and its members, but also to show them how weak their cyber security practices were. As we already know, the USA does also have a long and extensive history of “meddling” in South America as well. Many of these attacks were no different, they just didn’t have computers in the 60s and 70’s.

Read More – Declassified Documents from CIA Reveal US Political Interference Throughout South America During Cold War:

Russia Publishes Strategy Guide On How To Destabilize Itself, Documents Taken from US Army Research Affiliate

So, here’s an interesting bit of research I managed to stumble upon last night. Produced by the Rand Corporation for the United States Army and entitled “Over Extending and Unbalancing Russia,” the 12 page document details various strategies the US military could partake in to undermine, sabatoge and/or destabilize the Russian Government and its military – both within Russian borders and abroad. Interestingly enough, the documents were first published in Russia, not the United States, and it’s not exactly clear how they go them – but it’s actually kind of funny/ironic, especially given the subject matter.

For example, the Rand Corporation essentially ranks the likelihood of how successful a particular strategy may be. This includes theoretical options like increasing US troop presence in Syria to counter-act Russia’s military presence there, increasing foreign aid to Ukraine, manipulating China to be less receptive to Russian business in Asia, investing more heavily in space-based weapon systems – so on and so forth. Honestly, it’s an interesting look inside some of the private dealings of the US military, and provides an excellent example highlighting how the US Government outsources intelligence to contractors before ultimately making decisions. In a way, it is kind of a rare look behind the headlines – perhaps revealing details/insights into future US military decisions/strategies before they happen.

I could summarize more of the report for you, but why? I would rather just have you waste your time reading the intelligence documents for yourself – enjoy!

Download Document:

Browse 12 Page Release:

[pdf-embedder url=””]

Investigative Report: How Mass Surveillance Works Inside China

(HRW) – Chinese authorities are using a mobile app to carry out illegal mass surveillance and arbitrary detention of Muslims in China’s western Xinjiang region. The Human Rights Watch report, “China’s Algorithms of Repression’: Reverse Engineering a Xinjiang Police Mass Surveillance App,” presents new evidence about the surveillance state in Xinjiang, where the government has subjected 13 million Turkic Muslims to heightened repression as part of its “Strike Hard Campaign against Violent Terrorism.

Between January 2018 and February 2019, Human Rights Watch was able to reverse engineer the mobile app that officials use to connect to the Integrated Joint Operations Platform (IJOP), the Xinjiang policing program that aggregates data about people and flags those deemed potentially threatening. By examining the design of the app, which at the time was publicly available, Human Rights Watch revealed specifically the kinds of behaviors and people this mass surveillance system targets.

Download Full Report:

Our research shows, for the first time, that Xinjiang police are using illegally gathered information about people’s completely lawful behavior – and using it against them,” said Maya Wang, senior China researcher at Human Rights Watch. “The Chinese government is monitoring every aspect of people’s lives in Xinjiang, picking out those it mistrusts, and subjecting them to extra scrutiny.

Human Rights Watch published screenshots from the IJOP app, in the original Chinese and translated into English. The app’s source code also reveals that the police platform targets 36 types of people for data collection. Those include people who have stopped using smart phones, those who fail to “socialize with neighbors,” and those who “collected money or materials for mosques with enthusiasm.

The IJOP platform tracks everyone in Xinjiang. It monitors people’s movements by tracing their phones, vehicles, and ID cards. It keeps track of people’s use of electricity and gas stations. Human Rights Watch found that the system and some of the region’s checkpoints work together to form a series of invisible or virtual fences. People’s freedom of movement is restricted to varying degrees depending on the level of threat authorities perceive they pose, determined by factors programmed into the system.

A former Xinjiang resident told Human Rights Watch a week after he was released from arbitrary detention: “I was entering a mall, and an orange alarm went off.” The police came and took him to a police station. “I said to them, ‘I was in a detention center and you guys released me because I was innocent.’… The police told me, ‘Just don’t go to any public places.’… I said, ‘What do I do now? Just stay home?’ He said, ‘Yes, that’s better than this, right?

The authorities have programmed the IJOP so that it treats many ordinary and lawful activities as indicators of suspicious behavior. Some of the investigations involve checking people’s phones for any one of the 51 internet tools that are considered suspicious, including WhatsApp, Viber, Telegram, and Virtual Private Networks (VPNs), Human Rights Watch found. The IJOP system also monitors people’s relationships, identifying as suspicious traveling with anyone on a police watch list, for example, or anyone related to someone who has recently obtained a new phone number.

Based on these broad and dubious criteria, the system generates lists of people to be evaluated by officials for detention. Official documents state individuals “who ought to be taken, should be taken,” suggesting the goal is to maximize detentions for people found to be “untrustworthy.” Those people are then interrogated without basic protections. They have no right to legal counsel, and some are tortured or otherwise mistreated, for which they have no effective redress.

The IJOP system was developed by China Electronics Technology Group Corporation (CETC), a major state-owned military contractor in China. The IJOP app was developed by Hebei Far East Communication System Engineering Company (HBFEC), a company that, at the time of the app’s development, was fully owned by CETC.

Under the Strike Hard Campaign, Xinjiang authorities have also collected biometrics, including DNA samples, fingerprints, iris scans, and blood types of all residents in the region ages 12 to 65. The authorities require residents to give voice samples when they apply for passports. All of this data is being entered into centralized, searchable government databases. While Xinjiang’s systems are particularly intrusive, their basic designs are similar to those the police are planning and implementing throughout China.

The Chinese government should immediately shut down the IJOP platform and delete all the data that it has collected from individuals in Xinjiang, Human Rights Watch said. Concerned foreign governments should impose targeted sanctions, such as under the US Global Magnitsky Act, including visa bans and asset freezes, against the Xinjiang Party Secretary, Chen Quanguo, and other senior officials linked to abuses in the Strike Hard Campaign. They should also impose appropriate export control mechanisms to prevent the Chinese government from obtaining technologies used to violate basic rights. United Nations member countries should push for an international fact-finding mission to assess the situation in Xinjiang and report to the UN Human Rights Council.

Full 78 Page Research Presentation:

[pdf-embedder url=””]

This article was originally published by Human Rights Watch on May 2nd 2019. It was republished, with permission, using a Creative Commons BY-NC-ND 3.0 US License, in accordance with the Terms & Conditions of Human Rights Watch | Formatting edits, Teets, Videos and pdf added/embedded by Rogue Media Labs

CyberGuerrilla Releases Secrets of US Air Force Stealth Technology

Earlier today I came across an extremely unique dump of information posted online by Anonymous CyberGuerrilla, whom have become extremely active over the course of the last several days. What makes the information so interesting is the fact that, even after reading it and conducting some research, I’m completely unable to verify how rare, classified or confidential the information actually is. All I know is that, in all my years online, I’ve never come across anything like this before. Moreover specifically, the information contains detailed analysis on US stealth technology, such as the ingredients contained in US manufactured structures/material, as well as how these materials are structured within the framework of stealth aircraft.

Original Press Release:

In a message attached to the leak, CyberGuerrilla stated they wanted to unveil this technology to the public here today because “Democratization of this technology will have a positive effect on stability in an increasingly unstable world.” But without any further delay, here is the release in its entirety.

Broadband microwave absorber design concept using a honeycomb sandwich structure:

Unlike the conventional microwave absorbing honeycomb sandwich structure, the new design concept uses the transverse direction of a honeycomb structure with a coated lossy material.

When the incident waves reach the inside of the honeycomb coated with the lossy material, multiple scattering occurs inside the honeycomb due to the two different refractive indices. Then, the trapped electromagnetic (EM) waves lose energy due to the coated lossy walls.

Thus, the honeycomb structure can be used in the transverse direction and the effective thickness in terms of the incident EM waves becomes very large. This considerable thickness represents a very effective way to sufficiently attenuate the trapped waves.

This way, a lightweight and broadband absorber could be implemented without use of a magnetic material and without any limitations on the thickness.

A novel broadband lightweight radar absorbing material is developed using a phenolic aramid honeycomb (HC) coated with a graphene-filled polymeric paint, which is made of a colloidal suspension of graphene nanoplatelets (GNPs) dispersed in a mixture of polyvinyl-alcohol, water, and 1-propanol.

A multiscale effective-medium model of the GNP-coated HC, which takes into account the morphology and properties of the nanostructured material from micro- to macroscale, is developed and validated through the comparison with experimental data in the X-band. Findings demonstrate a feasible way to develop lightweight and broadband absorbers for various practical applications.

Chinese research showing remarkable absorption properties of honeycomb core structures coated with composite absorber

Preparation and microwave absorption properties of honeycomb core structures coated with composite absorber:

[pdf-embedder url=””]

It seems that Russian experts still do not use this technology on their latest stealth projects…?

We are Anonymous.

We are legion.

We do not forgive.

We do not forget.

Expect us.

Chinese Government Proposes New Legislation Banning Bitcoin Mining Inside Countries Borders

While the country has historically grappled with the “legality” of owning of possessing, new measures being put forth by the Chinese Government would ban the mining of Bitcoin entirely within their borders. It is a generally known fact that China is considered the Bitcoin mining capital of the world at the present moment in time and as a previous article of mine has once explained, the longer Bitcoin as a currency exists, the more expensive it becomes. Likely, this very fact is the same reason why China’s legislature has come to this conclusion – to save wealth and to save on future power consumption, whilst also cracking down on corruption, money laundering and hack all at the same time. A win, win, win for China’s Government – so to speak.

Learn More – Market Analysis: Is It Worth Investing In Bitcoin In 2019 & Beyond:

According to a press release from China’s Economic Planning Agencyvirtual currency mining activities [including] the production process of Bitcoin” to a list of industries that could be shut down.” Their rational centers around (1) the power consumption consumed by Bitcoin farms and (2), an increased level awareness surrounding the rise of C02 pollution caused by Bitcoin farms. For the time being, the  National Development and Reform Commission has yet to announce a final date when the ban may come into effect, and has given the general public until May 7th to express their comments/concerns over this matter.

Download Copy of Press Release:

Browse Press Release:

[pdf-embedder url=””]

#OpElephants: D3fS3c Hacks The Government of Laos To Raise Awareness Against Elephant Trafficking Into Asia

This afternoon, April 3rd 2019, a new group of hackers going by the name of “D3fS3c” announced a hack/leak of the Government of Laos. The hack was carried out in conjunction with an international hacking/public relations operation known as “Operation Baby Elephants” (#OpBabyElephants), designed to raise awareness on behalf of the capture/transportation of elephants out of the wild in Africa for commercial exploitation inside Asia.

To date, the operation has seen a hack if Zimbabwe’s National University of Science and Technology, as well as the doxxing of several public companies/government agencies known to have participated in elephant smuggling – including 100’s of emails of individuals most closely related to the trade.

Learn More – #OpBabyElephants:

Today’s leak is a little different, exposing sensitive information tied to the Government of Laos, including hundreds of emails, IP Addresses and Passport numbers, as well as information on several Government contractors. You can find this information and more via the leaks provided below. Considering that the Twitter account behind today’s leak has already been restricted, I took it upon myself to back up the information personally – enjoy!

We are D3fs3c, a group who fights against perpetrators, offering our beloved friends over the Internet some Lulz.

Over the last month we have proudly observed our brothers and sisters working hard on behalf of #OpBabyElephants, with the goal of raising awareness against the trading/smuggling of baby elephants in the name of populating zoos across Asia, primarily in China.

We have collected evidence not only against African States involved in the business, but also many Asian Governments, Loas included.

For this reason we have classified information related to radio equipment and frequencies, firearms manufacturers, manufacturer serial number, Passport ID’s and other Diplo information.

Enjoy the Lulz!

Target: hxxp://
Original Leak:
Data Download (Backup):

Understanding The Weaponization of Modern Cyberspace & The ‘Secret World’ of International Corporate Espionage

This is a concept which needs some explaining, because no one has really ever taken the time to break it down – at least from what I have seen. What you need to understand is that we live in a unique time in world history, and we are all headed towards an equally unique and uncertain future.

What I mean to say is that the 21st century is an exceptionally prosperous time in human history, there is no mass global Wars, there’s no great plague, the majority of us all have running water, plumbing, electricity, refrigeration and the like, we have bikes, cars, automobiles and planes and the entire world can theoretically be accessible/connectable with the click of a button. Not only is the modern 21st century perhaps the single easiest and most peaceful time in human history, but the human race is now also interconnected in ways that prior generations could have never imagined possible.

With that established however, not all is right as rain. For example, over the course of the last several years the United States, Germany, NATO and the like have all gone on to officially declare “cyber space” and “the internet” as the 5th domain/relm of Warfare – joining more traditions domains of Warfare such land, sea, air and space.

Learn More – NATO’s Recognition of Cyberspace As New Domain of Warfare:

However, as humanity continues to grapple with its understanding and regulation of our new technologies, we are only just now beginning to see/realize the weaponizing of the internet, internet conglomerates and their infrastructure – and this phenomenon is slowly beginning to rear its ugly head across nearly every other aspect of society these days. For example, consider the following evidence.

Google & The Department of Defense

I start off with Google for a number of reasons, chief among them is the fact that they are the single largest and highest grossing firm on the net. As Google is an American business, what you should know is that the company has a number of active contracts with the United States Government – particularly the United States military industrial complex. If you would like an example, look no further than “Project Maven,” a joint military operation currently underway with the help of Google researchers, developers, staff and Artificial Intelligence algorithms – some of which have recently made international headlines.

It should therefore go without saying, but you can not have a contract with the United States military without your full loyalties belonging to them. For this very reason, this also means that enemies of the US Government, or any other international Government agency for that matter, cannot rely on or trust Google to ensure their full security, privacy or look out for their best interests – especially in regards to contentious geo-political issues/events. In other words, as an American-based business and active military contractor, Google is loyal to the US military and for better or worse, has become a de facto branch of/for it – even if no one actually admits this out loud.

Consequentially enough, this is also why Google has always been restricted by “The Great Firewall of China,” and has recently faced banishment from Russia entirely as recently as just a few weeks ago.

Microsoft, Encryption Back-doors & Government Espionage

Similar to Google, Microsoft is yet another American based business with deep running ties to the United States military industrial complex. For example, every computer owned by the US Army and US Cyber Command is now literally mandated to run exclusively on Microsoft Windows 10 software and Operating Systems.

Now, I want you to notice the dates of those two Tweets above – August 29th and 31st, 2016. I bring this up because just a few weeks prior to this, on August 10th 2016, the Kremlin came out with a press release announcing how it was their immediate intention to begin switching all government/military computing systems off Microsoft and on onto domestically produced software – directly because of Microsoft‘s deep running ties with the US Government and US military.

It wasn’t until just a few months after this, in November 2016, that the Kremlin literally called switching over all their software away from Microsofta matter of national security.” Going on to explain how the Kremlin now believes that “software developed by American companies, such as Microsoft, could hide back-doors and bugs that could help other nations spy on their plans.” Also going as far as to say “not replacing foreign IT would be equivalent to dismissing the army.

Read More – Russia’s Plan To Abandon Microsoft & Foreign Software 9/17/2016:

If you think this conundrum is unique to Russia, you are mistaken. Believe it or not, Microsoft has similarly been banned from all Government systems in China dating back to 2013. This is when the country first interrogated then political asylum seeker/NSA contractor Edward Snowden, whom revealed that the United States has been secretly using Microsoft to conduct espionage on the Chinese Government and its companies for decades. Not only this, but Microsoft‘s own search engine, Bing, was also banned in China as recently as January 2019 – for essentially all the same reasons.

ZTE & Corporate Espionage

Consequentially enough, this sets me up perfectly for my next bit – America’s banning of the Chinese-based telecommunications conglomerate known as Zhongxing Telecommunication Equipment – otherwise simply referred to as ZTE. Truth be told, I first learned of this news after attempting to go into an AT&T in store in downtown New York City for repairs on my phone, only to find out that AT&T refused to fix my screen because it was a ZTE product – based out of China. They informed me that it was no longer their policy to service and/or fix any Chinese based phone, and advised me to purchase a new American phone – to which I declined, and not respectfully.

Regardless, similar in many ways to to the complaints international Government agencies have been levying against American tech giants for years now, the US has now started levying against other international tech giants/conglomerates. It is just a shame that this information is generally not available or public knowledge to the average American hopelessly wandering around our society.

Kaspersky & US Election Hacking

Along the same lines, throughout the course of 2017, the US Department of Homeland Security (DHS) made it a top priority to ban Kaspersky Lab anti-virus and other software from all Government systems around the United States. This is because, upon investigation, the US Federal Bureau of Investigation had come to believe that US government employees and personnel were originally compromised via the Kaspersky Lab products they had installed on their devices, which granted the Russian based software conglomerate root access over all their systems. Put more directly, the US Government had come to believe that Kaspersky Lab roots were the whole reason that Russia was able to hack the 2016 Presidential election and US Government employees so easily in the months just before it – especially considering Russian laws requires Russian companies to make all of their data freely accessible to the Kremlin. These laws are also why Kasperky later moved all of their severs out of Russia and into Switzerland by 2018, even though the public damage to the company had already been done.

However, it must also be stated while there was never any cut and dry evidence released indicating that this was indeed the case, at least publicly, and there are still technically court cases ongoing surrounding these allegations, the US Governments ban of Kaspersky has been implemented nonetheless. As a result, Kaspersky has also faced similar bans throughout Europe.

I also don’t know what it says about me, but I just bought a new computer two weeks ago and the first thing I did was install Kaspersky Lab software on it. I also own a ZTE phone 😉.

Facebook & Psychological Warfare

The last two sections of this article are almost exclusive to Rogue Media Labs, at least I have not seen anyone else reporting on these issues outside of Russia. The first is the fact that Facebook has quite literally become a military weapon – and no, I am not talking about Russia’s use of fake news, fake advertisements or propaganda either. While yes, those were huge problems in their own right throughout 2015/2016, new developments as of 2018/2019 are far more troubling and grotesque. More specifically, I am talking about the US Governments use of Facebook as a means of waging so-called “Psychological Warfare” against our adversaries.

Learn More – Russia Bans Military Personnel from Using Social Media To Counter-Act US Sponsored Psych-Ops:

You may recall a 2017 statement by James Mattis in which he personally stated how, as a result of complacency and improper funding of the US Department of Defense (DoD) under the previous administration, the United States has now fallen behind the rest of the world in several realms of Warfare – such as cyberspace, ultimately allowing the US elections to be hacked in the first place. Regardless, in an effort to ‘catch back up with the rest of the world,’ not only has Trump begun heavily investing back in the US military industrial complex, but we as a nation have also begun experimenting with new, unconventional forms of Warfare. For the purposes of this particular article I would like to talk specifically about Psychological Warfare and our use of Psych-Ops, as well as how these operations can be and are already actively being carried out online – in some instances, exclusively through Facebook.

Read More – US Military Field Manual on Unconventional Warfare:

If you were previously unaware, in November of 2018 the Kremlin signed a new piece of legislation into law officially banning all active duty military personnel from owning social media accounts or sharing across social platforms. This is because, at the time, according to the Kremlin itself, social platforms such as Facebook had begun being used to collect “analysis of the activities of the Russian military.” Explaining how “The data shared by the servicemen online is used to apply psychological and information pressure on Russia and its military as well as forming biased opinions on state policies of Russian authorities in society.” Not only this, but the US Government had also taken it a step further by using platforms like Facebook to wage psychological Warfare against Russian soldiers serving abroad in locations such as Syria and Africa.

For example, given that Facebook hosts its servers inside the United States, the US Government has started hijacking their platform in order to pretend to be friends or family members of Russian troops serving abroad. Not only does the US Government do this to organize psychological profiles on individual members of Russia’s military, but in some instances they also use Facebook accounts to cause Russian troops “distress” back home – by faking/fabricating conflicts, arguments or unfortunate circumstances with friends and family back in Russia.This was done to make Russian troops feel as though aspects of their lives were completely falling apart outside of their control back home, thus taking away pride/focus from their military efforts as they served abroad. It may have taken a few months to figure out, but the Kremlin did eventually catch on.

Despite however low down and “dirty” of a trick that is, this remains our current reality – at least under our new Commander In Chief Donald Trump as we continue to exploit American businesses internationally.

Twitter & Spying

I am proud to say that this last bit is exclusive to Rogue Media Labs, because it features research I have personally pieced together over recent months. They say that some of the worlds greatest discoveries were made by accident, and this last bit of news is no different.

The first bit of information I would like to share is something I have already shared a few months ago, which is the fact that Twitter is absolutely using their service to spy on its users. Not only can this be evidenced by the fact that every deleted Tweet attached to an owners account is secretly sent directly to Twitters internal servers, but also by the fact that I have personally caught the service recording one of my private messages with a famous hacker known as Nama Tikure. As previously reported, as I was physically typing it out on screen, a custom key logger built by yours truly accidentally caught Twitter bots clicking on my URL address literally 19 times in a 17 second time period. For some perspective on this, I never even pressed ‘enter’ onto the chat. Meaning that all of these clicks were recorded on my end, with all 19 IP Address ranges listed assigned exclusively to Twitter bots. In other words, I accidentally caught Twitter red hand trying to secretly record and log every last aspect of my private messages – and I am certain this isn’t or wasn’t an isolated incident.

Learn More- Twitter Caught Clandestinely Intercepting The Messages of Its Users:

The second bit of research is something I accidentally discovered last night, completely unrelated to this article and also 100% accidentally. I could describe it in more detail, but this article is already long enough. So ironically, I instead direct you to the following Tweet…..

Wrapping Things Up

I’m almost embarrassed to admit it, but the whole reason I got riled up enough to write this article was the fact that, upon buying my computer, I was immediately offered 25 GB of free storage from DropBox. Sounds like an amazing deal – right? Who wouldn’t want to jump all over that – right? How generous and caring of a company Dropbox must be! Right?

Well, I’m sorry to 💩 on your parade, so to speak, but that just isn’t exactly the reality of the situation at hand here. I know it’s getting a bit redundant at this point, but the fact of the matter is that Dropbox is a subsidiary – an American subsidiary. Moreover, as the US Governments Supreme Court case with Microsoft proves, as an American company, the US Government has the right to any/all data owned by that company if the Government truly wants it.

See where I am going here? The reason why Dropbox is offering 25 GB of free space to anyone who wants it is so that ignorant sheeple, I mean citizens, will upload all of their data to it – so that the US Government can own all that data themselves. The worst part is the fact that Dropbox is subsidized to mislead you to do exactly this, which is also why they can afford to offer up some much free storage space to so many people for free. I know, yay Capitalism – right? 😏.

Computer Science Graduates from The United States Currently Lead The World In Academic Testing

In a previous article attempting to ‘put Americans back in their place,’ so to speak, Rogue Media Labs explained how, at the present moment in time, “the United States ranks 115th among 200 countries in terms of linguistic diversity, 20th in math and 27th in science. On top of this, out of 40 countries ranked based off their colleges or secondary educational systems, the United States ranks 20th in the world.” Additionally, “according to our own ACT testing agency, it’s now estimated that 76% of all high school students are unprepared to enter into college level courses upon graduating high school.

This aside however, a new international study conducted by researchers at Stanford University and UC – Berkley an published by the International DOI Foundation (IDF) last week, the scores of senior level graduates from US based secondary institutions within the fields of Computer Science outperform those from all other world leaders, including China, Russia and India. Interestingly enough, the researchers do not attribute our test scores to income or wealth, but rather based on the fact the the US “has a large population of high scoring international students” – essentially on account of the countries ethnic diversity.  I could write more, but why? I have included the studies abstract and the full publication below – enjoy!

Download Full Study for Yourself:

Browse Full Study/Publication:

[pdf-embedder url=”” title=”1814646116.full”]

#OpBabyElephants: Hackers Publish Updated Email List of Animal Abusers/Traffickers from Asia To Africa

Earlier this morning I came across an updated listing affiliated with “Operation Baby Elephants” (#OpBabyElephants), an Anonymous operation designed to raise awareness on behalf of Elephant trafficking/smuggling out of Africa and into Eastern powers such as China, as well as hold those behind the trade of these animals accountable for their actions. To date, Anonymous has already hacked the National University of Science & Technology in Zimbabwe and released a detailed list of email addresses, subdomains, mail servers and DNS servers attached to different parties known to participated in Elephant trade/trafficking. Today’s release can be seen as an extension of those attacks.

Dated March 13th 2019, Anonymous hackers have published a new and updated/revised list of 631 email targets affiliated with Elephant trafficking/trade out of Africa, and are urging member so of the public to copy, paste and spam bomb them let them know how you feel about this issue. Other activists are asking members the international public to sign a petition banning the impending sale of 35 baby elephants to China in the near future. To date, over 113,000 have already signed the petition – with an initial goal of 120,000. You can find the revised email list and access to the petition below.

In a message attached to the release, the hackers stated:

Greeting citizens of the Internet Web, We are Anonymous and this is #OpBabyElephants.

This year plans by the government of Zimbabwe are to export as many as 35 baby elephants to China. The cruelty of the capture of baby elephants from their families in the wild has been revealed in disturbing photos videos secretly taken in Zimbabwe. These captures are usually kept as secret as possible. Therefore, we want to turn light on this issue. Here you have a huge list of mails all related to elephants business, parks and .govs. Please us it to express your disappointment.

Brothers and sisters of Anonymous. We ask that you stand along side us.

We are Anonymous.
We Do Not Forgive.
We Do Not Forget.
Expect Us.

Learn More – #OpBabyElephants:
Original Email List:
Updated/Revised Email List:
Sign The Petition:

Understanding How The Chinese Government Leverages Social Media To Influence Public Policy & Political Opinion Abroad

The following isn’t necessarily an article so much as it is an opportunity for informational download. But, without burying the lead any further, earlier today I managed to come across a new report published by researchers at Recorded Future entitled “Beyond Hybrid War: How China Exploits Social Media to Sway American Opinion,” explaining the subtle differences between how the Chinese Government and Kremlin utilize social media as a means of swaying public opinion abroad. While the report is interesting in its own right, it reminded me of a separate report published by Harvard University in 2017 entitled “How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument” – explaining how the Chinese Government goes as far as to literally employ thousands of employees just to scavenger social media and make pro-China comments on outlets like Facebook and Twitter, solely just to troll news/information painting China in a negative light, or make political policies seem more popular/unpopular than they otherwise would be.

Now, I could write thousands upon thousands of words on this subject here for Rogue Media Labs, but I’m not paid per word or to write articles in general like everyone else in the main stream media. For this reason, I would rather just have you waste your time reading/consuming the actual educational studies for yourself. Happy clicking!

Beyond Hybrid War: How China Exploits Social Media to Sway American Opinion:

Download Full Report Here:

[pdf-embedder url=””]

How the China Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument:

Download Full Report Here:

[pdf-embedder url=””]

SCode404 of Ghost Squad Hackers May Have Just Built A Botnet Capable of Producing The Largest DDoS Attack The World Has Ever Seen

For those of you whom might not be aware, just a few weeks on January 31st 2019, researchers working for the international cyber security firm known as Imeperva claimed to have successfully mitigated what would become the largest DDoS attack in world history. According to the data, January’s attack topped out at well over 500 million packets per second, nearly 4 times the amount of packets generated from a March 2018 attack against Github servers – an attack still considered to be the largest bandwidth consuming DDoS attack on record, topping out at approximately 1.35 Terabits per second.

Well, as it turns out, there may soon be a new record holder on the way. According to a message posted to Twitter on March 2nd 2019, “SCode404” of Ghost Squad Hackers claims to be in possession of a botnet capable of producing attacks topping out at just short of 3 Terabits per second. Officially named the “Uchiha Botnet” and used to launch Layer 7 DDoS Attacks, via a test run on Vedbex’s DNS resolver, SCode404 claims to have launched an attack topping out around 2,900 GB per second (2.9 TB per second) – a bandwidth level DDoS attack that would utterly smash previous record holders.

While Scode is remaining fairly tight lipped about their creation, at least for the time being, it does appear to be literal months in the making. I say this because dating back to a mid-January 2019 posting to Twitter, SCode announced that they ‘were back‘ and had begun the process of hijacking/exploiting hundreds of thousands of new devices on the Internet of Things (IoT) – primarily targeting the geographic regions of China and Korea via, the official search engine of the Internet of Things. For now though, SCode will not reveal to the public what their botnet comprises of, how they assembled it or built their source code, nor who/what their intended targets may be. When asked as much, SCode told Rogue Media Labsfor this I still keep it a secret.” I guess you will all have to just wait and find out with the rest of us, stay tuned….

#OpZimbabwe: Anonymous Hackers Raise Awareness Against International Elephant Trade

Oddly enough, researching hacks and leaks between Pakistani and Indian hackers this evening I managed to come across a hack and leak associated with #OpZimbabwe, an Anonymous operation launched in solidarity with the people of Zimbabwe as they fight against the ongoing injustices of the their Government. However, it must be noted that this most recent development technically falls under the umbrella of something known as #OpElephants, an operation I was previously unaware of, which appears to feature reconnaissance on various targets affiliated with the Government of Zimbabwe and different organizations/corporation tied to international Elephant and Ivory trade.

Learn More About #OpZimbabwe:

More specially, the leaked information contains the email addresses of 241 individuals, organizations, corporations, parks and Government agencies known to be actively involved with Elephant and Ivory trading, as well as detailed information relating to the virtual hosting providers of these parties websites, including detailed information on their email and domain name hosting servers.

Original Press Release w/ Recon:
Data Download:

In a message attached to the hack/leak Anonymous explained:

Greetings citizens of the world, We are Anonymous.

The capture of baby elephants is just one in a number of operations that have taken place in Zimbabwe and across the continent over several decades. Young elephants are being captured in Zimbabwe for Chinese zoos. Live elephant trade is now a million dollar business.

According to wildlife authorities elephant sales to China have raised $1 million so far. The cruelty of the capture of baby elephants from their families in the wild has been revealed in disturbing photos and videos secretly taken in Zimbabwe.

These captures are usually kept as secret as possible. First, a family herd is selected. Then operatives in a helicopter pick off the younger elephants with a fire from a riffle. As the elephant collapses, the pilot dive-bombs the distressed mothers to keep them away and a ground-team bundle the calves up and drags them on to trailers. Young elephants are being forcibly separated from their mothers which is highly damaging for them.

In the wild, elephants are completely depend on their mother’s milk until they are two and are not fully weaned until the age of five. A number of the captive calves, were displaying a stress-induced activity as a trunk twisting, trunk curled under, face touching, foot swinging, head-shaking, ear-cocking, displacement feeding, amongst others.

This year plans by the government of Zimbabwe are to export as many as 35 baby elephants to China. Under Cities, trading live elephants is legal, with a few stipulations and requires it is Appropriate and Acceptable, and that the sale must benefit conservation of elephants in home country but there is no monitoring of the requirement that a sale will benefit conservation.
Brothers and sisters of Anonymous. We ask that you stand along side us.
Join our tweet storm to spread awareness. Join us in combined attacks on Web sites and databases.

We are Anonymous
We do not forgive
We do not forget
Expect us

If you aren’t a hacker, you can participate in #OpElephants by signing the petition below, demanding that Japan ban the sale of Elephant Ivory along with China, Hong Kong and soon to be Singapore. You can also share this article, their press release or anything else you would like to release about #OpElephants on your social media channels as well.

Sign Petition Here: