Part 1: Invaluable Resources Every Political Researcher, Historian & Activist Should Have

In part 1 of 2 of this particular series I am going to disclose the locations of nearly every library of declassified documents you can find online dating back to World War II, specifically implicating the United States Government. Perhaps most importantly, all of the documents contained within them were won via Freedom of Information Act requests and/or lawsuits. In part 2 of this series, I will assemble all of the online links you need to begin requesting new information from the Government for yourself, for free, with just the click of a button and the filling out of an application. But without any further adieu……

For those of you whom are not aware, over the course of the last two decades or so many legal experts, researchers and activists have been lobbying very hard to make government records more accessible to the general public. However, even in victory, rarely if ever do these successes ever get reported in the news. To this effect, below you can find various archives and repositories full of hundreds of thousands of newly declassified documents/files dating all the way back to the end of WW2 and up on through the 2000’s – all disclosed via “Freedom of Information Act” (FOIA) lawsuits. In the case of the CIA for example, these archives used to only be accessible via one computer located in Washington DC – until the entire archive was published/released online for the first time in 2017, that is.

Below is a list of open/available databases hosting countless records across different US Government agencies, almost all of them classified at one point or another throughout America’s past. I put them all together here today not only for my own resources, but also because I believe them to be invaluable resources for anyone reporting on modern US politics or US history, including educators, as a means to understand various situations or circumstances as they existed throughout the past – leading to the politics of today.

NSA FOIA Online Archive/Repository: https://nsarchive.gwu.edu/virtual-reading-room
NSA Declassification & Transparency Index: https://www.nsa.gov/news-features/declassified-documents/

US Department of State Archive/Repository: https://foia.state.gov/Search/Search.aspx

CIA Online Archive/Repository: https://www.cia.gov/library/readingroom/home

The Vault – FBI Archive/Repository: https://vault.fbi.gov/search

Reading Room – National Archives: https://www.archives.gov/foia/electronic-reading-room

Reading Room – Library of Congress: http://www.loc.gov/rr/main/

Department of Homeland Security Library: https://www.dhs.gov/foia-library

Available Documents – Department of Justice: https://www.justice.gov/oip/available-documents-all-doj-components

Executive Services Directorate – White House: https://www.esd.whs.mil/FOID/DoD-Records/

Electronic Library – NASA: https://www.hq.nasa.gov/pao/FOIA/err.htm

DoD – US Inspector General Reading Room: https://www.dodig.mil/FOIA/FOIA-Reading-Room/

US Army – FOIA Library: https://www.foia.army.mil/readingroom/index.aspx

US Navy FOIA Reading Room: https://www.secnav.navy.mil/foia/readingroom/SitePages/Home.aspx

US Airforce FOIA Library: https://www.foia.af.mil/Library/

Tutorial: Learning How To Write & Remember Un-Hackable Passwords

Before we begin, why should learning how to write strong passwords be of much more importance to you? Believe it or not, it is a statistical fact that more people are hacked as a result of weak passwords than any other single factor. This is also why encryption – aka passwords – should be much more important to you. With that said, learning how to read, write and remember strong passwords is not nearly as hard or complicated as people might think, in fact it is rather easy once you understand the core concepts.

Lesson 1 – Password Length:

To unlock someone’s password, “law enforcement authorities” and/or “hackers” will either run something known as a “Brute Force Attack” or “Dictionary Attack” against it, in an attempt to break or de-crypt the numbers, letters and symbols contained within the password itself. One by one over time, these software programs will slowly decrypt the password, just like cracking the numbers to open a vault or safe.

Quite simply, the more complicated/randomized the sequence of numbers, letters and symbols in your password are, and the longer the password is, the longer it takes hackers to break. Moreover, each letter, number or symbol you add on to the end of your password literally makes it exponentially harder for even the most sophisticated programs to crack. For example, here are estimates from the FBI regarding how long it takes them to crack lengthier encrypted passwords.

  • seven-digit passcodes will take up to 9.2 days, and on average 4.6 days, to crack
  • eight-digit passcodes will take up to three months, and on average 46 days, to crack
  • nine-digit passcodes will take up to 2.5 years, and on average 1.2 years, to crack
  • 10-digit passcodes will take up to 25 years, and on average 12.6 years, to crack
  • 11-digit passcodes will take up to 253 years, and on average 127 years, to crack
  • 12-digit passcodes will take up to 2,536 years, and on average 1,268 years, to crack
  • 13-digit passcodes will take up to 25,367 years, and on average 12,683 years, to crack

Lesson 2: LEET or “1337” Language:

L33t Language is a way of replacing letters with numbers and symbols in everyday sentences and it is perhaps the most basic form of encoding used to encrypt messages. To understand how it works, here are some quick examples:

Normal Statement v 1337 Version:

BankruptMedi4 – 84nkru97M3di4
TheDailyProletariat – 7h3D@i1y9r0L37@Ri@7
Elitepassword – 31it3p4$$w0rd
Activism – 4ctivi$m
Encryption – 3ncry9ti0n
Brian Dunn – 8ri4nDunn

It doesn’t necessarily have to be that complicated and you don’t necessarily have to replace as many letters with numbers and symbols, those are just examples of how it works. You can run any attack your little heart desires at “84nkru97M3di4” or “7h3D@i1y9r0L37@Ri@7” all day long, go ahead – have fun. To make the password even stronger mix in capitalized and un-capitalized letters throughout.

I think I have explained the concept easily enough? To make an un-hackable password simply take a name, phrase, short sentence – et cetera – that is personable to you and convert it into l33t language, then use that as your new password. Not only will it be impossible to break, but it should be fairly easy for you to remember. And as always, use two-factor-authentication whenever possible.

Lesson 3: Two-Factor Authentication

I’ve always understood that 2-Factor Authentication (2FA) is a concept lost on most “normal people” in society right now, but a new statistic really puts it all into perspective. This would be the news that, according to Google’s own statistics, less than 10% of all Gmail or Google business owners currently have enabled 2-Factor Authentication for their online accounts. Considering that Google is estimated to host well over 2 billion accounts globally, this means that there are over 2 billion insecure accounts floating around the internet right now – and that’s just from Google alone!

This is not to mention the fact that there are literally billions of email addresses, along with their passwords, currently available on the Deep Web and DarkNet for search. For example, there are single websites around the internet that are currently selling the log in credentials of 1.4 billion people and if anyone of those people simply just enable 2-factor authentication for their accounts, all the information stored on those would become utterly useless.

Responding to the news last week Grzegorz Milka, a Google software engineer, said that the company’s latest statistics “demonstrates the lack of awareness of cyber threats and the way to mitigate them.” Adding that he believes more people don’t or haven’t “configured 2-Factor Authentication for their accounts” because “many users believe 2FA can make their experience worse,” or at least more of a hassle. To do everything they could to mitigate the problem from their end, Google also took the occasion/platform to release a 2-Factor Authentication tutorial of their own, imploring Google users to immediately begin securing their accounts in this way.

Google 2FA Tutorial: https://myaccount.google.com/signinoptions/two-step-verification/enroll-welcome

As for what 2-Factor Authentication is, does or means, it’s not nearly as complex or complicated as people think. In fact, it only adds about 10 seconds to the amount of time it already takes you to log into your accounts anyways. Essentially, as soon as you type in your password and press enter you will receive a text message on your phone, which will have a short code for you to type in. Without that secondary code no one is allowed to login, even you. That’s it – literally. That’s the amount of “hassle” it will take you to begin practicing strong cyber security in the future. Again, despite the simplicity of it all, less than ten percent of people in society have taken this step.

2-Factor Authentication should be available for nearly every App or account you own, and you can find/enable it by searching for it in your account(s) settings. As I also once explained in a different article on this subject earlier last year, even if someone already knows your password, “close to 100% of hackers will be prevented from successfully hacking into your social media accounts if you simply enable 2-Factor Authentication” for them – and I still believe this holds true today.

Interestingly/Coincidentally Enough?

As I was in the process of writing this article I got a text message informing me of new log in codes to verify, because someone had somehow managed to brute-force their way past my password – which no one has ever been able to do before. Put another way, my site was literally saved from being hacked/hijacked by malicious cyber actors, all because I once enabled 2-factor authentication on my account(s) months ago. To put the importance of 2-Factor Authentication into focus, I’ve invested thousands upon thousands of hours of my personal time into this website, and it took me less than one minute to turn on and verify 2-Factor Authentication for it – certainly worth the time/effort!

Here’s A Look At an Active Freedom of Information Act Lawsuit Against The US Government In Live Time

Sometimes I wonder why the US Government is so afraid of me? I mean, I applied for Clandestine work with the CIA, openly worked with the CIA on different occasions for various DarkNet operations, sent maybe 5 dozen+ reports to the FBI, worked with countless intelligence contractors and pieces off my old website were read to the US Senate Intelligence Committee. I just don’t get it, how did I become the bad guy all of a sudden?

I mean, is it the fact that I was trained/paid by German intelligence? They are “allies” – right? Is it the fact that I left the country, defected my citizen ship and became a political refugee in the Bahamas? Is it that I’ve been inside the Russian consulate and Visa centers three different times, each – the first time as a political refugee? Is it the fact that I uncovered a Russian staff member secretly working for the US while in there, and then sold them out to the FSB to show my worth? Is it the fact I’ve been in the French consulate twice and embassy once? Is it the fact that I can become a Russian citizen any day I want? Is it the fact that I’ve published about 100 leaks globally in the last 9 months alone? I mean, all of that is totally normal – right? Who hasn’t done that? 🤔

All humor aside for a moment, it literally can’t be any of those things. Well, at least the defecting, refugee stuff and political asylum parts that is – because I did all of that “ex post facto.” Unfortunately, the sad reality of my situation is that the US Government is quite literally spending millions observing me and sabotaging everything I do, chasing me from country to country, state to state, instead of just paying me thousands to work for them in the first place! Makes complete sense – right? I guess that would just be too simple a solution for them. But what do I know?

Well, after more than a year and a half now, with no end in site, I decided to begin the process of filling a Freedom of Information Act (FOIA) lawsuit against the US National Security Agency (NSA) earlier this year. Of course, this began with a simple FOIA request which was expectedly denied – see below – and is currently in the appeals process. Once that appeal gets denied a second time, as I’m certain it will, I will then file a FOIA lawsuit to one up the request and put some more heat on them. Please note that I’ve redacted some of my own personal statements to the NSA in the copies of their response provided below.

NSA FOIA Denial Page 1:

Image may contain: text

 

NSA FOIA Denial Page 2:

Image may contain: text

NSA Denail Page 3:

Image may contain: text

Any of this sounding familiar to you? Sort of sounds like Tom Cruise’s “Rogue Nation Mission Impossible” spin-off perhaps? 😂 I swear, you really can’t make this stuff up!

Once again however, all humor aside, this is actually a very serious matter. I bring all of that up because you have to read between the lines here. If the technology or program didn’t exist in the first place, they would’ve just flat out denied everything outright and probably try and ship me to a psych ward for 32 days – oh wait! The fact that they can neither “confirm nor deny” the existence of the program/technology and can not “confirm nor deny” any of the people(s) targeted by it is actually a defacto admission that the program does exist – which I already know. They just use classification guidelines to hide their violations of article’s 4 and 8 of the US Constitution from the public’s eye. I know, such Patriots – right? 😏

Quite frankly, I don’t care if it all fails. I just want to share intelligence with the world/US, and show people the truth about things they may not have ever been aware of or heard of before – funded by their own tax dollars. After-all, even I know there is a reason the Government is doing this to me, my mind is a weapon and I pledge my allegiance to no one! This country was just to stupid to hire me.

🎆Merry 4th of July America! Damn Those British Sons of Bitches!!🎆

🇺🇸

Pepe The Unredacted Frog Releases FBI Files of ‘The Dancing Israeli’s’ Won via Freedom of Information Act Request

So, here’s an interesting story that doesn’t appear to be getting much press anywhere – except by news outlets which have been banned off Facebook and Google 🤔. Regardless, it revolves around a new Freedom of Information Act (FOIA) request submitted to the FBI seeking information related to five individuals referred to as “The Dancing Israeli’s,” whom were detained by the FBI shortly after the 9/11 Terror attacks of September 11th 2001.

According to a previously redacted report released by the FBI in 2002, these 5 individuals arrived in a parking lot and began filming the Twin Towers up to 40 minutes prior to the first plane strike – indicating that the group had prior knowledge the attacks were immanent. As the rest of the footage shows, the group then proceeded to document the full attack from the parking garage – going as far as to begin dancing and celebrating wildly as the towers burned and collapsed in the background. While the group has since been forgotten, a later investigation revealed that at least two of the five men were active members of Mossad, Israeli Intelligence, whom were undercover on assignment in the US at the time. Moreover, one of the five men, Oded Ellner, also went on to directly state that they were only there in the first place to “document the event” – the terror attack itself.

View Redacted FBI Report – The Dancing Israeli’s 9/11/2001: https://archive.org/details/DancingIsraelisFBIReport

As it is now clear to see, Israeli intelligence was indeed aware of the 9/11 terror attack well before it occurred, begging the question why more wasn’t done to prevent it in the first place? While we may never know the answer to that question, a US citizen referring to themselves simply as “Pepe The Unredacted Frog” has just posted documents won via a recent FOIA request made with the FBI in regards to these five individuals – the dancing Israeli’s. Interestingly enough, despite the US Department of Justice previously claiming that pictures of the 5 individuals were destroyed as of 2014, the FBI released a series of redacted photos of the individuals in 2019 – fully redacting their facial expressions, presumably because some of them are/were active secret foreign agents.

The documents were released to the public for the first time on May 12th 2019, which you can access via their Twitter handle or download link below. Rogue Media Labs has also made the documents browse-able via the pdf embed also featured below.

Download 5 Israeli’s FBI FOIA Release: https://www.scribd.com/document/409691150/FOIA-Release-of-9-11-Dancing-Israelis-thru-the-FBI

https://twitter.com/DualCitiznPepe/status/1127692509768028160

The release is fairly interesting on many levels, chief of which is the fact that US allies were well aware of the terror attacks we before they happened – and that Israeli agents publicly celebrated the incidents. If you would like to learn more about the history surrounding these events or these people, you are invited to read an excellent report by Whitney Webb of Mintpress News featured below.

Browse Full 17 Page Dancing Israeli’s FOIA Release:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/05/409691150-FOIA-Release-of-9-11-Dancing-Israelis-thru-the-FBI.pdf”]

Senator Scott Demands Meeting w/ FBI Following Release of Mueller Report

Over the course of my 4 year career, for whatever reason, one of the topics I’ve covered most heavily are the US elections hacking/tampering campaigns of 2016 – and US voter hacks in general. In fact, this topic was the first article I ever covered here for Rogue Media Labs, following a voter registration leak of 35 million records less than a month before the November elections of 2018. Perhaps this is why I happen to find a recent letter from Senator Rick Scott (R-FL) particularly interesting. In it, Scott is essentially demanding that the US Federal Bureau of Investigation make public any/all records they have in regards to voter fraud and/or election interference in the state of Florida, after information contained in the Mueller Report was redacted.

More specifically, according to the results of the Mueller Report, approximately 120 different election officials throughout Florida were found to have had their personal email addresses hacked by foreign threat actors – though the report never did specify whom exactly or what counties around Florida they represented. Consequentially, this is also what Senator Scott would like to find out – in order to predict which areas of his state may be most susceptible to voter fraud and/or tampering next year, ahead of the 2020 elections.

For those of you whom might be unaware, Florida is quite literally the United States most “transient” state, with the highest population of active residents residing outside of that state – at least depending on the time of year. Generally speaking, Florida is also considered the have the US’s single largest and most undecided/unpredictable voter bases – making it the US’s largest “Swing State” election after election. Because of this, and for literally all of the same reasons, it theoretically makes Florida voting systems and records the single easiest to fake or tamper with at the same time. For the time being, it appears as though the FBI has agreed to meet with Senator Scott to address these issues, though an exact time and date have not been set.

Download Copy of Letter: https://www. rickscott.senate.gov/sites/default/ files/2019-04/190419-FBI-GRU-Florida.pdf

Browse Letter:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/190419-FBI-GRU-Florida.pdf”]

FBI Releases Internet Crime Complaint Center’s (IC3) Annual Internet Crime Report

I’m going to keep this article short and sweet because the news is really contained via the report below – not from anything I can say about the report. I know, I’m getting pretty good at this whole news reporting thing – right? Really makes you wonder why you spend so much time reading peoples opinions about reports, instead of just reading the reports for themselves – right? In that spirit, here is the executive summary and full release of the US Federal Bureau of Investigations (FBI) Internet Criminal Complain Center’s (IC3) annual “2018 Internet Crime Report.

Highlights from IC3 Annual Report:

– Internet-enabled theft, fraud, and exploitation were responsible for a $2.7 billion dollars in financial losses throughout 2018.
– The FBI’s Internet Crime Complaint Center received 351,936 complaints in 2018 (+900 daily).
– Individuals over 50 years of age accounted for the vast majority of financial theft victims.
– The FBI was able to recover/refund victims of fraudulent spending in 75% of all instances.
– The FBI recovered $192 million dollars in total that was spent fraudulently around the United States.
– Since the start of 2000 the FBI has tracked $7.45 billion dollars worth of loses resulting from internet enabled crime.

Download Copy of The Report: https://www.ic3.gov/media/annualreport/2018_IC3Report.pdf

Browse 28 Page Report:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/2018_IC3Report.pdf”]

European Parliament Approves Vote To Create International Biometric Database To Secure EU Border Countries

Last week European Parliament approved the establishment of an international biometric database referred to as the Common Identity Repository (CIN), a means to better help international authorities in securing EU borders. According to the systems parameters, the database will include identity records, including names, dates of birth, passport numbers, and other personally identifiable information, in conjunction with biometric information such as fingerprints and facial scans of both EU and non-EU citizens – estimated to encompass roughly 350 million individuals at the start.

More specifically, according to EU officials, “the systems covered by the new rules would include the Schengen Information System, Eurodac, the Visa Information System (VIS) and three new systems: the European Criminal Records System for Third Country Nationals (ECRIS-TCN), the Entry/Exit System (EES) and the European Travel Information and Authorisation System (ETIAS).” Explaining that the move comes in response to an effort to consolidate multiple databases into one browse-able place, serving to consolidate information – thus speeding up and making the jobs of border security officials much easier/proficient – whilst also simultaneously modernizing civilian records  into the 21st century.

With that said however, the vote is not without controversy. In May 2018, in anticipation of this very move, an organization known as State Watch published an investigative report into the pitfalls, short-comings and privacy violations such a database presents – see pdf accompanying this article below. Additionally, the FBI has also come under heavy scrutiny for similar databases in the US, ultimately forced to go to court after it was revealed the agency had been secretly stockpiling the biometrics records of US citizens without alerting them to this – a clear violation of the US Privacy Act in 2016.  While a federal judge did finally rule in their favor in 2017, it was later revealed that the FBI’s biometric database was hacked by the CIA, which was later hacked by Russia, meaning that all US biometric data once owned by the US Government is now out in the wild. For obvious reasons, these are all situations/lessons the EU should look to learn from as they move forward with this new initiative in the future.

Copy – State Watch Investigation: https://statewatch.org/analyses/eu-interop-morphs-into-central-database.pdf

Download CIN Presentation: https://www.securityresearch-cou.eu/sites/default/files/02.Rinkens.Secure%20safe%20societies_EU%20interoperability_4-3_v1.0.pdf

Common Identity Repository (CIN) Slideshow Presentation :

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/02.Rinkens.Secure-safe-societies_EU-interoperability_4-3_v1.0.pdf” title=”02.Rinkens.Secure safe societies_EU interoperability_4-3_v1.0″]

PokemonGo Team Releases The Names & Contact Information of 22,013 US Citizens Currently on The FBI’s National Watchlist

Earlier this morning, April 14th 2019, a new group of hackers calling themselves “PokemonGo Team” released another data leak effecting the US Federal Bureau of Investigation (FBI) – following a separate data leak implicating the FBI’s National Academy Association just a few days prior. Today’s leak is significant, exposing the names, email addresses, physical locations and contact information of approximately 22,013 individuals currently on the FBI’s national watchlist. So, if you have ever worried whether or not the FBI has been spying on you, today’s leak presents the perfect opportunity 😉. Rogue Media Labs has already downloaded and backed up the file locally, and can certify it’s 100% safe to the public – enjoy!

Download & Read: https://pokemongo.icu/?page=news&name=usersleak
Download Watchlist w/o Password: https://pokemongo.icu/files/users111.csv

As for why they are doing this, aside from promoting future leaks which the group intends on selling instead of just simply releasing to the public, PokemonGo Team says that they are demanding the release of Peter Levashov – whom is currently in US prison after being extradited from Barcelona, Spain where he was first arrested in 2017. For those of you whom might not be aware, Peter Levashov is also known as alias “Spamhaus,” a Russian activists credited with the creation of the Keilhos Botnet whom is well known for his central role in spam/internet trolling campaigns throughout the past. Until he is released from US custody, PokemonGo Team promises to continue releasing more data leaks implicating different US Government agencies.

Learn More – Peter Levashov’s Indictment from DoJ: https://www.justice.gov/opa/pr/russian-national-indicted-multiple-offenses-connection-kelihos-botnet

https://twitter.com/PokemonGoICU/status/1117508230081601536

FBI’s National Academy Association Hacked by PokemonGo Team, 203 MB of Data Leaked Online

While the internet is just catching on to the leak for the first time today, two days ago a group of hackers calling themselves “PokemonGo Team” released the contents of a leak effecting the US Federal Bureau of Investigation. More specifically, the hackers appear to have breached 3 websites belonging to the FBI’s National Academy Associationa collection/association of various offices offering law enforcement training and consultation across the United States.

While not much is known about the hackers or their backstories, and they are new to social media as of April 2019, they do appear to be highly advanced. Not only are they building their own websites, but they’ve also released the source code of their very own ransomware variant and claim to be in possession of several important/critical databases worldwide. Perhaps most importantly or interestingly, the hackers claim that the hack/leak of the FBI was nothing more than a publicity stunt, so to speak, because they are actually in possession of much more interesting/valuable information that they’ll begin selling as soon as their website is complete. Essentially, the release of FBI data was meant to show how serious they are – as well as to attract the attention of future buyers.

The leak itself is significant, including enough sensitive information to scare off some of the tech worlds largest websites from wanting to go near or publish it – see TechCrunch’s so-called reporting on the leak. More specifically, the meat of the leak contains personal records of nearly 4,000 individuals across the FBI, Secret Service and local/state law enforcement offices nationwide. You can find a link to the data leak, as well the password needed to decrypt it below. Rogue Media Labs has already downloaded/decrypted the file and can confirm that it is 100% safe to the general public – enjoy!

Press Release: https://pokemongo.icu/?page=news&name=fbiinfoleaked
File Download (203 MB zip): https://pokemongo.icu/files/fbiinfo.zip
File Decryption Password: pokemongo.icu

https://twitter.com/PokemonGoICU/status/1116456539106234369

Infamous/Notorious Hacker Forum Known as Dark0de Comes Back Online Under New Ownership

Roughly 3 years after first being taken down by European/international police in 2016, the infamous hacking forum known as “Dark0de” has officially come back online. For those of you whom may be unfamiliar with the sites legacy/history, originally founded in 2007, Dark0de went on become perhaps the single largest and most notorious hacking forum in the world up until the time of its closing just a few years ago. In fact, as described by Europol, the police organization which initially closed it, “Darkode is the most prolific English-speaking cybercriminal forum to date.

The operation to close the forum, originally code-named “Operation Shrouded Horizon” by the FBI, ultimately resulted in the arrests of 70 people across 20 countries – including Denmark, Germany, India, Israel, Romania, Sweden, and the UK. At the time, then US Attorney General, Leslie Caldwell, called the closing of Dark0dea milestone in our efforts to shut down criminals’ ability to buy, sell, and trade malware, botnets and personally identifiable information used to steal from US citizens and individuals around the world.” Also stating how she believed that “this operation is a great example of what international law enforcement can accomplish when we work closely together to neutralize a global cyber-crime marketplace.

Learn More – Operation Shrouded Horizon: https://www.fbi.gov/news/stories/cyber-criminal-forum-taken-down

 

 

 

Today however, the site is now being managed by “Hitman,” the owner of Dark0de, as well as “Ownz” – the leader/founder of New World Hackers. At the current moment in time the site and its forums are back online and open for business – featuring categories/information such as leaks, forum resources, webmasters, malware, exploits & 0days, cracking, hacking, technology and gaming – among many more.

Access Website: https://dark0de.net/
Online Chat Affiliated w/ Dark0de: https://discord.gg/hBcze2E

In statements made available to Rouge Media Labs, Dark0de‘s developers explained how “we plan to bring back Dark0de to give hackers a place to go to look for accounts, tools, proxies, methods, and configs – not to mention email:username combinations for cracking accounts.” According to Ownz, “the goal is to become the #1 hacking forum once again like done in the past back in 2013-2015.” Adding that “the reason we waited three years is because we were aware that there was an investigation ongoing because the actual original owner of the site was not ‘Hitman‘ but it was ‘Obstriegel‘ aka ‘Sp3cial1st‘ and we didn’t want the same troubles as he had trying to cover up what he had created.

While the forum used to be associated almost primarily with the DarkNet, it is now freely available across the ClearNet. Aside from a change of ownership, the sites current developers claim that “nothing has changed, but we did add more site categories for Malware, Exploits, and the Marketplace” – etc. For example, the forum has already been restored to its previous version – with over 12,000 registered users, featuring +55,000 postings across +6,000 different threads.

DC Capitol Police – FBI Foil Plot To Assassinate Congresswomen Ilhan Omar

As a proud and open supporter/member of the Anti-Fascism (ANTIFA) alliance, I am perhaps more aware than most that White Supremicism/Nationalism and neo-Nazism is alive an well in this country – a far greater/larger problem than anyone in the United States actually gives it credit for. In this spirit, this past Friday, April 4th 2019, the US Federal Bureau of Investigation (FBI) successfully foiled an assassination plot targeting Congresswomen Ilhan Omar (D-MI) – the second ever Muslim women elected to US Congress, and the first ever naturalized citizen of Africa to serve in US Congress.

The man behind the assassination plot was one Patrick Carlineo, a US citizen from upstate New York. According to reports, upon being interrogated, Carlineo told the FBI that he was “a patriot who loves Donald Trump” – whom “hates radical Muslim extremists serving in our Government.” Later going to state that “if our forefathers were still alive, the would’ve put a bulltet in her skull.” Consequentially enough, as phone transcripts intercepted by DC Capitol Police can attest, Carlineo threatened to do this very act for himself.

Patrick Carlineo was arrested Friday afternoon and is officially being charged with “threatening to murder a United States official with intent to impede, intimidate and interfere with such United States official while engaged in the performance of official duties.” You can read more about Capitol Police’s investigation and the charges against Carineo via the court documents provided below.

Download Criminal Complaint: https://roguemedia.co/wp-content/uploads/2019/04/12914518717.pdf

Browse Full Document:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/04/12914518717.pdf”]

Hackers The World Over Prepare for April Lulz Day 2019

Having been around the internet for a while I cant help but notice an increased level of international fervor surround something referred to as “April Lulz Day 2019,” an international hacking operation being launched by LulzSec affiliates all around the world. While I’m certain not all of the targets whom will be #TangoDown‘ed tomorrow have been released publicly, it appears as though the US Federal Bureau of Investigation, Central Intelligence Agency and National Security Agency appear to be the groups central targets, no pun intended – with all of the those 3 letter acronyms appearing in several publications advertising the date.

To date, at least from what I have been able to find, LulzSec Argentina, LulzSec Kurdistan, LulzSecITA, Pinoy LulzSec and ForTheLulz have all been pushing advertisements on behalf of it for several days now.  Rumor has it LulzSecITA has been holding onto a leak of a certain Mayor from Rome, though it remains to be seen if/when that leak will be released to the public. For the time being, if you are not planning on participation yourself, I guess just sit back and enjoy the lulz! 🍿

https://twitter.com/ForTheLuIz/status/1111366142122225664

https://twitter.com/PinoyLulzSec__/status/1112153161903407105

https://twitter.com/ForTheLuIz/status/1110685602389901312

https://twitter.com/LulzSeguridad/status/1110687220355215367

https://twitter.com/ForTheLuIz/status/1110925278753316864