Here’s A Look at Leaked Passports from MI6 Agents

Unfortunately, you will not find James Bond on here or any other 007’s, but interestingly enough a hacker by the name of “neptuneX3c,” the same hacker behind a leak of MOSSAD emails earlier this year, has released another batch of leaks, this time exposing agents known to have worked with MI6 – England’s version of the Central Intelligence Agency. For those of you whom might not be aware, MI5 refers to any agents of England’s Government working on National Intelligence, on the island. On the other hand, MI6 refers to a group of “private” or “secret” agents working in the field of international intelligence gathering and espionage. Trust me, as someone whom has worked with many international intelligence agencies and offices over the years through the Anonymous Intelligence Agency, I’ve found MI6 to be by far the most impenetrable – or least responsive to any outside assistance.

As for the back drop to the story, there really isn’t much to tell, so I’ll just get on then with the leaks – enjoy!

Download File:

Browse Leaks (9 Pages):

[pdf-embedder url=””%5D


** If you cant browse the documents, hover you mouse over the pdf (above) and look at the bottom left where you will see up and down arrows, this will help you navigate the document **

Saudi Cargo Ship Departs from European Ports Loaded w/ Weapons & Munitions Destined for Yemen

(AI) – Reacting to the onward voyage of the Saudi Arabian state shipping company’s vessel, the Bahri Yanbu, from the Spanish port of Santander this afternoon, Ara Marcen Naval, Deputy Director for Arms Control and Human Rights at Amnesty International, said:

Laden with arms that will likely be used in the war in Yemen, the Bahri Yanbu has been bouncing off European ports like a pinball. After loading up with Belgian munitions in Antwerp, it has visited or attempted to visit ports in the UK, France and now Spain, and is due to dock at the Italian port of Genoa later this week. This is a serious test of EU countries’ resolve to uphold their obligations under the Arms Trade Treaty and EU Common Position on Arms Exports. Several states have failed this test in the space of just a few days.

No EU state should be making the deadly decision to authorize the transfer or transit of arms to a conflict where there is a clear risk they will be used in war crimes and other serious violations of international law.

The Bahri Yanbu’s voyage reminds us that states prefer to allow the lucrative global arms trade to continue to operate behind a veil of secrecy. But this veil is not impenetrable, and Amnesty International and its partners will continue to closely monitor developments and denounce states for flouting their international legal obligations.


In Yemen, the Saudi Arabia/UAE-led Coalition has used arms imports to contribute to thousands of civilian deaths and injuries, including as a result of attacks that violated international humanitarian law. This has exacerbated the world’s worst humanitarian crisis, where 2.2 million people have been displaced and 22 million people are in need of humanitarian assistance.

Read More – The War In Yemen, The Media’s Forgotten War:

According to the EU’s reporting on arms exports, EU member states issued at least 607 licences worth over 15.8 billion euros to Saudi Arabia in 2016. The main European exporters of conventional arms to Saudi Arabia include the UK, France, Spain, Italy and Bulgaria. Between 2013 and 2018, Saudi Arabia accounted for nearly half of the UK’s and a third of Belgium’s arms exports. Other countries – including Germany, the Netherlands and Norway – have started to restrict weapons sales to the Saudi and UAE-led coalition.

According to a published export schedule for Saudi Arabian state-owned shipping vessels, the Bahri Yanbu set sail from Corpus Christi, USA on 2 April 2019, destined for Jeddah in Saudi Arabia. It then called at several other US ports and one Canadian port before crossing the Atlantic and stopping in Germany, Belgium and the UK in early May.

On 3 May, it was reportedly loaded with six containers of Belgian-manufactured munitions at Antwerp, before continuing on to France. It was due to dock at the French port of Le Havre to receive additional arms on 8 May, but following legal action by French NGOs and increased public scrutiny, it continued its voyage without stopping in France, and made an unscheduled stop at Santander in northern Spain on 12-13 May. Its next scheduled port of call is in Genoa, Italy, now expected on or after 18 May.

Read More – The Yemen Papers, Classified Documents from French MoD Published Online:

Amnesty International activists in Belgium, France, Spain and Italy have been monitoring the Bahri Yanbu’s voyage around Europe. The activists have joined protests and co-authored a letter to the Spanish authorities to call on them not to authorize its transit through Spanish waters. The organization will highlight the apparent ATT and EU Common Position violations at a 17 May meeting of the European Council’s Working Party on Conventional Arms Exports.

Saudi Weapons Export Schedule – April to May 2019:

[pdf-embedder url=””%5D

This report was originally published by Amnesty International on May 15th 2019. It was republished, with permission, under a Creative Commons BY-NC-ND 4.0 International License, in accordance with the Terms & Conditions of Amnesty International | Formatting Edits and PDF’s added and embedded by Rogue Media Labs

Records from Over Two Dozens Local Police Departments Across The UK Hacked & Leaked Online by CyberGhost404

Yesterday, April 17th 2019, an independent hacker known as “CyberGhost404” (@CyberGhost404) of the “Philippine Cyber Eagles” (@PHCyberEagles) released a relatively large data leak effecting over two dozen police agencies across the United Kingdom. Though the exact location where they originally stole the data from remains unknown, contained within a compressed zip file posted online are various spread sheets and Microsoft Excel documents from dozens of local police offices/branches across England – including information such as local records, press releases and ongoing court cases. Rogue Media Labs has downloaded a copy of the file and can certify it is safe to the public.

Data Download (44.14 MB zip):

While not much is known about the hacker or their group, and they appear new to Twitter as of April 2019, the Philippine Cyber Eagles have also been active in a number of DDoS attacks across Europe – all carried out under the banners of #OpAssange and #OpUK. To date, included in their attacks have been the Barnsley News Council, Council of Mid & East Antrim, Bolton Town Council, Ryedale Town District, Council of East Riding & Yorkshire and the London Datastore. The group has also posted a hit list of websites around Ecuador, said to be targets of future cyber attacks.

#OpEcudaor Target List:

Pryzraky Hackers Responsible for 39 International Hacks, Leaks & DDoS Attacks Over The Last 4 Days

Dating back to the weekend, “Pryzraky” hackers have been extremely active in a number of hacks, leaks and DDoS attacks targeting Government institutions in and around Europe, United States, United Kingdom and South America. However, while their hacks have primarily been carried out under the banners of #OpAssange, #OpEcuador and #OpUK, Pryzraky is doing as much as possible to distance themselves from the Anonymous hacker collective, whom been extremely active in publicizing these operations online.

All told, group members “Mecz1nho Markov” (@Mecz1nho), “Alne3737” (@Al1ne3737) and “PopTart” are responsible for a 39 cyber attacks over the last 4 days, including attacks targeting the Association of Police Investigators (Brasil), International Police (France), Department of Defense (USA) and National Police Association of the United Kingdom – with some attack bringing websites down for days at a time. A full list of their attacks is chronicled below.


Association of Civilian Police Investigators: hxxp://
Faculdade Integrada Tiradentes: hxxp://
Data Download:

[Target]: hxxps://

DDoS Attacks:

International Police (INTERPOL) – hxxp:// (Tango Down’d)
US Department of Defense (DoD) – hxxp:// (Tango Down’d)
UK National Police – hxxp:// (Tango Down’d)
Supreme Court of The United Kingdom – hxxp:// (Tango Down’d)

SQLi Injection Vulnerabilities:





#OpUK: Anonymous Espana Hacks/Leaks 4 Government Websites Across United Kingdom & United States

Earlier this evening, April 15th 2019, a group of hackers known as “Anonymous Espana(@An0nym0us_Esp) released a data leak effecting 4 government affiliated websites across the United Kingdom and United States. Among the victims were Ross-on-Wye Town Council, Exning Parish Council and Bedale Town Council of the United Kingdom, as well as a small sample of email releases allegedly stolen from the servers of – an online directory of United States Government offices, branches and departments.

More from Anonymous Espana:

The hacks/leaks themselves were carried out in conjunction with #OpAssange and #OpUK, an international hacking operation scheduled for April 15th launched in protest of the jailing of Julian Assange at the hands of UK authorities last week. As Anonymous Espana is a notoriously outspoken supporter of Anti-Fascism (Antifa), its no reason why these developments attracted their attention/talents. However, it should also be noted that Anonymous Espana was far from the only group active today, and several other groups have also posted hacks/leaks online throughout the course of the day. If you would like to learn more you are invited to follow the operation via the link provided below.

Follow #OpUK:

Anonymous Espana Hacks/Leaks 04/15/2019

Target: hxxp://
Database Download (1.17 MB zip):

Target: hxxp://
Data Download (141 KB zip):

Target: hxxp://
Database Download (421.04 KB zip):

Target: hxxp://
Database Download (552 B):


Court Rules Criminal Complaint Against UK Parliament for Arming Saudi Arabia In Yemen Civil War Can Move Forward

(HRW) – Human Rights Watch, Amnesty International, and RW UK intervened in a court case beginning today that is challenging the United Kingdom’s continued sale of arms to Saudi Arabia. The case is being heard by the Court of Appeal for three days starting on April 9, 2019.

Copy of Criminal Case Against UK:

The landmark case, brought by the UK-based Campaign Against Arms Trade (CAAT), seeks to establish that the UK government is breaking its own arms export licensing criteria by continuing to sell weapons to Saudi Arabia, given the clear risk that the weapons would be used to commit serious violations of international humanitarian law in Yemen. The High Court in London dismissed the case in 2017, but the Campaign Against Arms Trade won the right to appeal, and the three groups, along with Oxfam, again received permission to intervene.

The UK government says it has very rigorous arms controls, yet weapons continue to be sold to Saudi Arabia despite considerable evidence of Saudi-led coalition abuses in Yemen,” said Clive Baldwin, senior legal adviser at Human Rights Watch. “This case is a key opportunity to make sure that the UK rules on arms sales are being properly applied to Saudi Arabia.” The three organizations are intervening to address the meaning of the term “clear risk” of a serious violation of international humanitarian law, which governs when arms sales should not take place. They also intend to set out the importance for the UK government and other decision-makers to take into consideration research and reports on the abuses in the war in Yemen by the United Nations and by nongovernmental groups.

Since the coalition began its aerial campaign in Yemen in March 2015, the UK has licensed at least £4.7 billion (US$6.1 billion) worth of arms sales to Saudi Arabia. Human Rights Watch researchers have regularly visited Yemen and documented the use of weapons, including weapons made in the UK, in strikes that appeared to be unlawful. The UN, Human Rights Watch, Amnesty International, and Yemeni rights groups have repeatedly documented unlawful attacks by the coalition that have hit homes, markets, schools, and hospitals, and killed and wounded many civilians.

Since 2016, Human Rights Watch has called for all countries to end arms sales to Saudi Arabia until the Saudi-led coalition ends its unlawful attacks and credibly investigates those that have already occurred. A growing number of European countries have halted sales of weapons to Saudi Arabia, including Germany, the Netherlands, and Austria.

The organizations are represented by Deighton Pierce Glynn, Jemima Stratford QC, Nikolaus Grubeck and Anthony Jones.

Browse Full Case:

[pdf-embedder url=””%5D

This article was originally published by Human Rights Watch on April 9th 2019. It was republished, with permission, using a Creative Commons BY-NC-ND 3.0 US License, in accordance with the Terms & Conditions of Human Rights Watch | Formatting edits, Tweets & Documents added/embedded by Rogue Media Labs

Infamous/Notorious Hacker Forum Known as Dark0de Comes Back Online Under New Ownership

Roughly 3 years after first being taken down by European/international police in 2016, the infamous hacking forum known as “Dark0de” has officially come back online. For those of you whom may be unfamiliar with the sites legacy/history, originally founded in 2007, Dark0de went on become perhaps the single largest and most notorious hacking forum in the world up until the time of its closing just a few years ago. In fact, as described by Europol, the police organization which initially closed it, “Darkode is the most prolific English-speaking cybercriminal forum to date.

The operation to close the forum, originally code-named “Operation Shrouded Horizon” by the FBI, ultimately resulted in the arrests of 70 people across 20 countries – including Denmark, Germany, India, Israel, Romania, Sweden, and the UK. At the time, then US Attorney General, Leslie Caldwell, called the closing of Dark0dea milestone in our efforts to shut down criminals’ ability to buy, sell, and trade malware, botnets and personally identifiable information used to steal from US citizens and individuals around the world.” Also stating how she believed that “this operation is a great example of what international law enforcement can accomplish when we work closely together to neutralize a global cyber-crime marketplace.

Learn More – Operation Shrouded Horizon:




Today however, the site is now being managed by “Hitman,” the owner of Dark0de, as well as “Ownz” – the leader/founder of New World Hackers. At the current moment in time the site and its forums are back online and open for business – featuring categories/information such as leaks, forum resources, webmasters, malware, exploits & 0days, cracking, hacking, technology and gaming – among many more.

Access Website:
Online Chat Affiliated w/ Dark0de:

In statements made available to Rouge Media Labs, Dark0de‘s developers explained how “we plan to bring back Dark0de to give hackers a place to go to look for accounts, tools, proxies, methods, and configs – not to mention email:username combinations for cracking accounts.” According to Ownz, “the goal is to become the #1 hacking forum once again like done in the past back in 2013-2015.” Adding that “the reason we waited three years is because we were aware that there was an investigation ongoing because the actual original owner of the site was not ‘Hitman‘ but it was ‘Obstriegel‘ aka ‘Sp3cial1st‘ and we didn’t want the same troubles as he had trying to cover up what he had created.

While the forum used to be associated almost primarily with the DarkNet, it is now freely available across the ClearNet. Aside from a change of ownership, the sites current developers claim that “nothing has changed, but we did add more site categories for Malware, Exploits, and the Marketplace” – etc. For example, the forum has already been restored to its previous version – with over 12,000 registered users, featuring +55,000 postings across +6,000 different threads.

CyberGuerrilla Releases Integrity Initiative Leaks Part 7, Detailing The UK’s Use of International Espionage Unit Referred To as The EXPOSE Network

Earlier this morning, March 25th 2019, as promised, Anonymous CyberGuerrilla unleashed round 7 of the now infamous Integrity Initiative and Institute for Statecraft leaks. This time, the leaked information deals with the dealings of England’s Foreign and Commonwealth Affairs Office (FCO) and their development of something referred to as the “Counter Disinformation Media Development Programme” – a programme mentioned in far less detail in previous leaks.

Learn More – Integrity Initiative Leaks 1-6:

The leaked documents below essentially tell the tale of how the British Government pays agents to go undercover in countries all around the world, simply just to conduct espionage and collect intelligence which will ultimately allow the English Government to create/craft disinformation campaigns against issues in the international press painting England in a negative light. For lack of a better term, the documents detail how the UK goes about creating pro-England propaganda in order to counteract so-called propaganda or negative publications against them. The British Government’s use of these agents and the information they collect is referred to as “the EXPOSE Network,” which operates with a yearly budget of around 10 million pounds.

The network itself operates on two levels, also referred to as “consortium’s,” which include the following sub-groups: Sibylline, Albany Associates, Stratagem Consulting, The Stabilisation Network, Torchlight Group, M&C Saatchi, Institute for War and Peace Reporting, ZINC Network, The Institute for Statecraft, Bellingcat, Aktis Strategy Ltd., Toro Group, Media Diversity Institute, DFR Lab, ECORYS – each of which operate under the terms of non-Disclosure Agreements to keep the nature out of their work and the information they uncover out of the public’s eye/knowledge. In addition to drafting pro-British propaganda press clippings and conducting espionage in the countries they are assigned, the leaks also expose how at least a portion of the EXPOSE Networks budget goes towards using its agents as “Troll Factories,” simply just to troll others online in order to distract people away from or discredit stories of political interest tied to the English Government in the international media – a strategy largely made famous by the Chinese Government throughout the past.

Today’s Leak In Full:

Greetings! We are Anonymous.

Having found that Sir Alan Duncan and Frau Deborah Haynes intend to keep on misleading the international community, lie to members of the UK Parliament and feed falsehood to the Media, we have again decided to break silence to protect the informational environment in civilized countries.

Here is another project of the FCO’s Counter Disinformation and Media Development Programme that we have previously mentioned. They call it EXPOSE Network and the UK taxpayers will have to pay almost 10 million pounds for it.

[pdf-embedder url=””%5D

British secret agents travel around the world, measure the capabilities of potential agents and prepare strictly confidential reports for the FCO:

[pdf-embedder url=””%5D

After that based on the results of the spy trips they conduct extensive studies with fancy titles like Upskilling to Upscale:

[pdf-embedder url=””%5D

Operation ‘Integrity Initiative’, British informational war against all, which the Anonymous exposed last year, has become empiric evidence that the UK secret services intend to use the campaign against the Russians as a cover for fighting any kind of dissent that runs counter to the globalist policy.

Virtually, today it doesn’t really matter whether you are a forward-looking and independent Media outlet or a distinguished professor, since if you don’t stick to the Euro-Atlantic views then you are a part of the propagandist network! Similarly, if your political views stray too far to the right or to the left from neoliberal agenda then you’re an agent of influence!

We can clearly see how a small group of lobbyists from the United Kingdom has unceremoniously taken advantage of the civil society and its institutions in allied sovereign countries.

Sir Alan Duncan has shamelessly lied to the British MPs during a special hearing, which means the Government will continue to spend British taxpayers’ money on fighting those very taxpayers, afterwards the Government will deny everything and get off scot-free.

We want every British taxpayer to know that in August 2018 FCO’s chief propaganda officer Andy Pryce held a private meeting with two consortiums that sought to receive a grant to implement the EXPOSE Network project.

[pdf-embedder url=”” title=”workshop—8th-august”]

The first consortium includes: Sibylline, Albany Associates, Stratagem Consulting, The Stabilisation Network, Torchlight Group, M&C Saatchi, Institute for War and Peace Reporting.

The second consortium consists of: ZINC Network, The Institute for Statecraft, Bellingcat, Aktis Strategy Ltd., Toro Group, Media Diversity Institute, DFR Lab, ECORYS.

Surely we think managers of the companies will not miss our publication, yet we don’t wait for any comments from them since we know that all those who attended the meeting with Andy Pryce signed a non-disclosure agreement.

[pdf-embedder url=””%5D

Well, Statecraft, Bellingcat, DFR Lab (virtually the Atlantic Council) and some others in the ZINK consortium were most eager to receive the 10 million pounds of the British taxpayers’ money to implement the EXPOSE Network project:

[pdf-embedder url=””%5D

Funny how in late January Eliot Higgins tried to persuade his twitter followers that Bellingcat had never received funding from Government institutions and had never even filed an application for funding while it was the Integrity Initiative’s proposal to include Bellingcat which he knew nothing about.

Do you think millions of people from around the world should now believe the investigations of the man?

Apart from all that, the document contains many curious facts about high security projects members of the consortium are implementing inside the United Kingdom, about their secret foreign operations (including the Integrity Initiative), CVs of officials and their proposals to the FCO on developing the EXPOSE Network.

Please note that every member of the meeting was very well aware of what they were supposed to do:

“…unmanaged risks could undermine not only the project’s effectiveness but also the FCO’s broader reputation, credibility and relationships in this space.” (page 61 ZINC Network_Technical Response_Final)

“Project interpreted as UK-sponsored disinformation or “troll factory”, seriously undermining UK reputation and agenda in this space.” (page 63 ZINC Network_Technical Response_Final)

We also publish all technical documentation of the EXPOSE Network project that we have at our disposal:

[pdf-embedder url=””%5D

We again urge European countries to defend their sovereignty and make sure the UK Government stop all secret operations they are conducting in the united Europe!

Citizens of Great Britain! It’s high time you cast off the shackles of lies and hypocrisy of your ruling elite and brought the scoundrels to trial!

You can download all files in a single archive below, and Rogue Media Labs has also personally backed up each file individually – should any of the leaked files be taken offline elsewhere.

Original Press Release:
Integrity Initiative Leak 7 In Full:
Leak Backup:

We are Anonymous.
We are Legion.
We do not Forgive.
We do not Forget.
Expect Us.

This article, CyberGuerrilla Releases Integrity Initiative Leaks Part 7, Detailing The UK’s Use of International Espionage Unit Referred To as The EXPOSE Network, is free and open source, published under an internationally recognized Rogue_Publishers_License. You are hereby free to republish, re-edit or re-use this content at your discretion, so long as this license is directly attached to it and my original work attributed.

Report from UK’s Ministry of Defense Claims To Only Have Killed 1 Civilian In Combat Throughout Iraq & Syria Over The Years

I felt compelled to write this article here today after coming across a piece of information that downright enraged me yesterday. This would be the news that, according to the United Kingdom’s Ministry of Defense at least, UK forces have only killed 1 civilian in combat throughout the course of the Syrian Civil War and War in Iraq. The official report, along with files and statistics, was officially published by a European Non-Governmental Organization (NGO) going by the name of Action On Armed Violence towards the end of February – a report which also pretends to claim that British Forces are only responsible for the deaths of approximately 4,315 enemy combatants dating back to the beginnings of these armed conflicts dating back to 2003 and 2011.

However, according to another NGO going by the name of Rogue Security Labs, this report is absolutely asinine – and you can quote me on that. I say this because, according to UNICEF, over 560,000 people have died in the Syrian Civil War alone since the start of 2011. And according to Iraq Body Count (IBC), over 193,000 people have died in Iraq since the start of the War in 2003. This is not to mention the millions whom have been displaced by violence over the years, nor those who have died as a result of disease, famine or lack of resources in these countries over the same time period. Considering that the UK has been the single largest participant/donor to the US led coalition over the course of the last two decades, it’s an utterly absurd notion to think/state that the UK is only responsible for a little over 4,000 deaths. I mean honestly, who are they actually trying to fool or convince?

In response to news of the release yesterday, a spokesperson from Amnesty International stated: these statistics “beggars belief and show just how deeply in denial the Ministry of Defense is in its role of mass bombings – particularly in Mosul, Iraq and Raqqa, Syria.” Adding that “The US-led Coalition has admitted killing hundreds in Iraq and Syria. Why can’t the British own up to their role in this? The days in which powerful nations can subject foreign territories to massive bombardment and then refuse to admit and accept responsibility for the civilians that they kill and injure must be consigned to history.

To serve as proof refuting the MoD’s release, which can be found in its entirety at the very bottom of this article, Amnesty International has decided to republish all of their investigatory reports from recent battles in Iraq and Syria – evidence of just how widespread civilian casualties in Iraq and Syria have been, exposing just how ridiculous the MoD’s publication really is.

Full 70 pg Report – “WAR OF ANNIHILATION” The Devastating Toll The Syrian Civil War Has Taken On The Civilians of Raqqa, Syria:

No Where To Run, Trapped In Raqqa, Syria:
Full 36 pg Investigative Report – Civilians Trapped In The Battle for Raqqa:

Civilians Bombed In Mosul, Iraq After Being Told Not To Flee Their Homes:
Full 50 pg Report – At Any Cost, The Civilian Casualties As The US Led Coalition Fights for Mosul, Iraq:

Download MoD’s Report for Yourself:
Download Collated Data/Spreadsheet from Report:

UK Ministry of Defense Causalities Report 2019:

[pdf-embedder url=””%5D

UK Parliament Releases 8th & Final Report Into Fake News Interference

Last week the United Kingdom’s Parliament released their 8th and final report in conclusion of their two year long investigation into international “fake news” programs, providing unique insight into how UK government researchers believe fake news and other propaganda programs like them may have manipulated society, culture, government agencies, elections and/or businesses practices worldwide between 2017 and 2019. Produced by the House of Commons under the Digital, Culture, Media and Sport Committee and officially entitled “Disinformation and ‘fake news’: Final Report,” the 111 page report specifies a number of changes that researchers believe the UK Government needs to make to crack down on future abuses, as well as a set of guidelines for legislators to follow to safeguard/protect future elections.

Perhaps most notably, as least here in the United States, was the UK’s chastising of Facebook for what they deemed to be blatant violations of data privacy and anti-monopoly laws. Interestingly enough, these criticism as similar to the ones Mark Zuckerberg faced during his testimony in front of US Congress April 2018. Also somewhat ironically, the UK’s report on the manipulation of fake news programs comes in the midst of a series of international leaks implicating as secret Government agency known as the Institute for Statecraft, funded exclusively to create and disseminate fake news and other propaganda in countries all around the world.

Download Final Report 2019:

Parliament Report Calls For:

  • Compulsory Code of Ethics for tech companies overseen by independent regulator
  • Regulator given powers to launch legal action against companies breaching code
  • Government to reform current electoral communications laws and rules on overseas involvement in UK elections
  • Social media companies obliged to take down known sources of harmful content, including proven sources of disinformation

Further Finding That:

  • Electoral law ‘not fit for purpose’
  • Facebook intentionally and knowingly violated both data privacy and anti-competition laws

Browse Through Full Report:

[pdf-embedder url=””%5D

Anonymous CyberGuerrilla Releases Integrity Initiative & Institute for Statecraft Leaks Part 6

Yesterday, February 8th 2019, Anonymous CyberGuerrilla published their sixth round of Integrity Initiative and Institute for Statecraft leaks. The leaks primarily focus on Christopher Donnelly’s dealings with various UK intelligence contractors and other Statecraftfellows,” detailing how the Institute for Statecraft and UK Government allocated millions of pounds towards the creation of public relations campaigns and other propagandist strategies throughout Eastern Europe – though primarily in the Baltic’s, which is prone to higher levels of Russian influence. Today’s leaks also document Christopher Donnelly’s long term visions for what he wants Baltic nations to think, feel or believe about the United Kingdom, as well as what the UK could do make Baltic nations feel worse about those ‘big bad meanie heads‘ in Russia over the same time period.

At least in my opinion, today’s leaks are particularly interesting because they really nail down various tactics used by “Clandestine” intelligence agencies to manipulate public opinion on certain issues. For example, in the leaked documents provided below you can learn how it was the UK’s intent to “use commerce as a tool of influence over public opinion,” essentially leveraging economies to make people feel better or worse, happier or angrier, about what’s happening inside their own country’s, as well as how Government agencies utilize “Corruption As A Weapon of War” – using extreme ideological approaches to smear elected officials and therefore manipulate public opinion about them, much like what we are currently seeing in Venezuela with President Maduro.

The leaks also chronicle the UK’s dealings with contractors at Edelman Intelligence, the self proclaimedlargest public relations company in the world,” detailing how the UK allocated millions of pounds of taxpayer money to Edelman Intelligence to produce P.R. campaigns designed to manipulate public opinion on/over various matters, as well as to counter-act Russian influence inside the region. Rogue Media Labs has backed up all of the documents and contracts below, hosted locally so that they can be browsed by the international public. If you would like to own all the documents for yourself, the entire leak is also backed up via an AnonFile located at the very bottom of this page – Happy Clicking!

In a message attached to the leak, CyberGuerrilla stated:

Greetings! We are Anonymous.

While the UK Government keeps on defying our demands for an honest and unbiased investigation into the Institute for Statecraft and the Integrity Initiative’s meddling in domestic affairs of sovereign European states, Chris Donnelly’s team awkwardly try to justify their illegal activity paid for by the British taxpayers.

The Integrity Initiative’s German cluster held a meeting in Berlin on the 31st of January 2019. A well-known British intelligence officer Harold Elletson and the cluster’s chief Dr Hannes Adomeit co-chaired the event. They again made an effort to divert people’s attention from the organisation’s wrongful activity in the European Union. However their pathetic attempt has been shattered to pieces by irrefutable evidence that we have been and will continue to share with you.

Today we are talking about the way Chris Donnelly used his agents in the FCO to obtain millions of British taxpayers’ pounds through grant foundations: Conflict, Stability and Security Fund and Counter Disinformation and Media Development Programme (ex Russian Language Strategic Communications Programme). We demand that the organisations’ spending of budget money be subject to public control and their activity be absolutely transparent!

Here is the next part of the documents that show to the people of Europe how Donnelly intended to use the capacity of clusters that he had created in allied countries. People of Western Balkans would be especially fascinated to learn how he defended their democracy against disinformation in the 1990s-2000s.

[pdf-embedder url=””%5D

Donnelly wrote the letter when he was preparing one of his bids for the FCO to allocate 5.5 million of British taxpayers’ pounds to the Institute for Statecraft and Edelman Intelligence.

It is quite obvious that the choice made by the people of former Yugoslavia was as far away from free expression of their will as in fact the UK government is from being transparent to the UK citizens.

By the way, Donnelly-the-puppet-master returns in 2019 to again defend the people of Western Balkans this time from corruption rather than disinformation:

His New Project:

[pdf-embedder url=””%5D

Draft Plan:

[pdf-embedder url=”” title=”ii—balkans-ac-effort-draft—140818″]

Edelman Intelligence Planning To Contribute To The Integrity Initiative:

[pdf-embedder url=””%5D

Alongside with Donnelly’s Balkans plans we publish the reports of the Institute for Statecraft’s Euan Grant working under the Integrity Initiative project.

His Key Performance Indicators:

[pdf-embedder url=””%5D

In the following documents you can identify people who are one way or another directly connected to the Integrity Initiative. Their names should be very well familiar to you:

[pdf-embedder url=””%5D

This is not the final part of the Integrity Initiative documentation we have at our disposal. In conclusion we would like to directly address members of the Integrity Initiative clusters for the first time. Some of you have proudly admitted being part of the project. Well, are you really that sure now about what you are doing under the slogan ‘Defend democracy against disinformation’?

We are Anonymous.
We are legion.
We do not forgive.
We do not forget.
Expect us.

Original Press Release:
Download Entire File Archive (2.95 MB):
Backup Download of File Archive (2.8 MB):

Image may contain: one or more people

Investigative Report: United Cyber Caliphate & Islamic State Making Returns To The Hacking Scene In 2019?

Going about my normal online routines over the course of the last several weeks I keep picking up more and more “chatter” surrounding the alleged return of a group of hackers known as the United Cyber Caliphate (UCC), a group largely thought to have disbanded dating back to July 2016. Once comprised of a much larger group of international hackers including Anon Ghost, Ghost Squad Hackers, E-Security Team, Caliphate CyberArmy, Sons Caliphate Army and many others, the group has traditionally had a mixed reputation amongst the digital underground or individual hacking circles around the web.

I say this because the group largely splintered and broke apart from one another over allegiances to the Islamic State and terrorism, which was largely supported by some members of the Caliphate whilst others were simultaneous fighting to destroy them/it. Ironically, whats particularly interesting about the alleged rise or return of the UCC in 2019 is that, once again, there appears to be two different factions fighting over control of the group and its official title – one side fighting for terrorism and the another against. As the old saying goes, the more things change, the more things basically say the same.

For example, already this month in the United Kingdom and the Washington Post in the United States have both covered new reports featuring the UCC – hinting at the groups possible return to the hacking scene this year. Even the international Terrorism Research and Analysis Consortium (TRAC) is coming out with new warnings about the group, going as far as to post a newly received message from the Munashir Cyber Section of the new UCC reading “MESSAGE TO KUFFAR IN THE WORLD. You were the first to fight us so we will soon fight. Fight you from all fronts and we will fight you, with cyber attacks and real attacks, remember this O Salibris!! There is no safe place. The whole world is threatened. Wait and we are waiting. Soon.

Comprising information from a number of various international sources, allegedly, the 2019 version of the United Cyber Caliphate comprises of the following factions/groups: Islamic Intelligence, Caliphate Cyber Army, Ghost Caliphate Section, SONS Caliphate Army, Anon Terror, Fighter Muslim Cyber Caliphate, Team System DZ and Anshar Caliphate Army. The groups is now also flying operations under a new “flag,” a bouillabaisse of all the aforementioned groups logo’s put together into one…

UCC Logo 2019:

No photo description available.

Before I continue, what makes me qualified to cover this article here today? Well, I am glad you asked! Not only was I heavily entrenched in #OpISIS throughout the course of 2015 and 2016, but I am also the founder of the Anonymous Intelligence Agency (AIA) – an intelligence gathering organization formed to pick up the slack and take on tips after Ghost Security Group sold out to the FBI to make their millions. I was also to original publisher of the doxx of the UCC in July 2016 and have had regular contact with several of the groups former and current members over the years.

Learn More – Anonymous Intelligence Agency:

With that established, before writing this article here today I had been doing some research into these matters dating back to November 2018,  after publishing the identities of ISIS members in Yemen for S1ege of Ghost Squad Hackers. What I have discovered since this time is that dating back to Donald Trumps declaration of victory over the Islamic State at the tail end of 2018, Islamic State propaganda, chatter and online activity has once again started exploding as we’ve entered into 2019. I am also certain that this is no coincidence, and knowing full well that all US Government agencies hunting/tracking ISIS’s online presence would be shutdown also didn’t help matters. For example, Trump declared victory over ISIS on the 19th, then the Government was shutdown on the 22nd, and by mid-January 2019 reports about ISIS related terror activity spreading online had began circulating all around the world – such as was documented in the stories provided above.

Before moving forward, in 2015 Anonymous hackers launched something known as “Operation Ice ISIS” (#OpISIS) – going as far as to publicly delete hundreds of thousands Islamic State Facebook profiles, Twitter accounts, YouTube pages and websites offline, ultimately forcing the group and many of its core members off the ClearNet and onto more encrypted/private lines of communications. I bring this up because as I was going about investigating ISIS accounts and terror related activity at the time, I remember coming across thousands upon thousands of ISIS web pages, accounts and online profiles that hadn’t been used in years – seemingly abandoned dating as far back as 2012 and 2013. At the time I guess I just assumed that their creators had either been killed in the War or deserted the profiles entirely, and therefore didn’t register them as “active threats” – instead choosing to only focus on reporting/closing more active accounts and users.

Learn More – #OpISIS 2015/2016:

Tying this back into events currently unfolding in the here and now, intelligence researchers around the world have begun discovering that ISIS members are once again jumping back online, using many of the old terror accounts created/abandoned and left ignored by international authorities years ago. Not only this, but ISIS hackers have also begun hacking old accounts belonging to random Twitter users whom haven’t used there accounts in years, some dating as far back as 2009, simply to use the accounts to Anonymously spread propaganda and/or recruit new members online. However, it remains unknown if these tactics are merely opportunistic or designed as part of a much larger, long term online strategy for the terror group.

Regardless, as was first reported by TechCrunch on January 2nd 2019, “Hackers are using a decade-old flaw to target and hijack dormant Twitter  accounts to spread terrorist propaganda.” Explaining how “the recent resurgence in hijacked accounts appears to be hackers exploiting Twitter’s legacy lack of email confirmation,” allowing for “many older Twitter accounts to be easily hijacked by creating the email address used to initially register the Twitter account.

Outside of that, more in depth research into the matter has revealed that some of ISIS’s most elite or core members have primarily shifted all of their communications over to a peer-to-peer networking system/application known as ZeroNet, which essentially allows users to create web pages as if they existed on the “DarkNet,” but which are actually hosted on the “ClearNet.” Researching the design a little further, ZeroNet works by assigning the location of a web page with a unique “Bitcoin Address,” rather an a custom “URL Address” – something typically/historically standard on the ClearNet. This is done to assure that only the people who know the proper sequence of letters, numbers and symbols contained within the Bitcoin address will ever be able to find or access the website. In other words, to paraphrase Pirates of The Caribbean, it is essentially a website which can not be found except for those whom already know where it is 😉.

The application itself is also built in Python, something incredibly unique for a website or web hosting client, further allowing users to route all of their activity through Tor network relays to obscure their activity and identities.

In a private message, a former/founding member of the UCC dating back to 2015 and one of many parties currently attempting to re-establish the group headed into 2019 told Rogue Media Labs that “the UCC is making a return.” Explaining that “some of tour members support ISIS, but most of us do not. We do not work for or with ISIS directly.” They explain how it is their mission to defend Muslim communities around the world and empower them to fight back against Zionism and retaliate for open displays of Xenophobia. However, they want to make it crystal clear that they “do not support terrorism.” Another hacker once loosely affiliated with the UCC and some of its former members also told  Rogue Media Labs that many of the modern partners attempting to re-establish the UCC are “all just skids.” Adding that any of its members whom actually possessed any real skills were all doxxed by Ghost Squad Hackers back in 2016 – the same event ultimately leading to the groups demise.

It is also important to distinguish that there are two entirely separate groups of people fighting for the naming rights belonging to the United Cyber Caliphate in 2019, and the groups listed by the Terrorism Research and Analysis Consortium (TRAC) only tell half the story. The other groups fighting for control of the group are not related to or with these people, instead comprising of various independent Muslim hackers once affiliated with other groups – though primarily AnonGhost. Consequentially enough, they are  far less extremist than the groups published by TRAC and there are far less of them, though its suspected that they are much more skilled.

For the time being, the “Anonymous Intelligence Agency” is continuing to monitor the situation, and in light of the recent surge in UCC and Islamic State activity across the web has officially decided to re-open our international tip line. If anyone reading this article comes across or knows anyone whom has or will come across any suspicious or terror related activity online, please submit any/all information via the email address provided below. The emails will be forwarded to a secure location, obscuring the source/end destination, ensuring that all sources remain anonymous.

Submit Tips/Information: Tips@AnonIntell.Org

No photo description available.