You are on page 1of 11

Anonymous Aids Cyber Jihadists

The recent
opening of the
Anonymous-backed School4lulz has caused quite a stir around the Internet
with postings of their activities and invitations to join in for IRC led training
classes or video classes from time to time. Operation New Blood is the
Anonymous (LulzSec/AntiSec) beginners school for anonymity and hacking.
It provides how-to instruction using Tor for various operating systems, addons for Firefox that can limit your identity, the use of tools to maintain
anonymity in IRC rooms, standard IRC commands, virtual machine and
encryption
information as well
as links to sites for
more hacking tools
and capabilities. The
handbook is
relatively basic but it
does give the junior
member enough
information to get
started. Engaging in
the asynchronous
classroom activities
and the junior
member begins to
gather some steam
and confidence.
The super secret
security handbook is
a brief compilation
that can easily be
found but the
budding new hacker
will find it a solid
beginning.
A few months ago, I
posted a blog on the
proliferation of
virtual small arms
discussing LOIC and
LOIC Hive Mind. This
recent release by
www.treadstone71.com

info@treadstone71.com

7/4/2011

Anonymous continues the process of providing information and technology


to potential adversaries. Not only adversaries for Whitehat security
professionals, but also adversaries for the Anonymous way of life. More on
this later.
http://blogs.csoonline.com/1393/low_intensity_conflicts_virtual_small_arms
_proliferation
Anonymous released an ISO image of the Cyberterrorism Defense and
Analysis Center training for the Sentinel program that seems to have been
posted by the Federal Emergency Management Administration (FEMA) in
2009. The Cyberterrorism Defense Initiative (CDI) Sentinel program is used
to educate technical personnel in cyberterrorism response and prevention."
Many of the technologies provided on the CD used to be very easy to find on
the Internet. Some have long since been removed until the release of the
ISO image. The release of the ISO image provides hackers a centralized
resource to access and use many tools that can be used for assessment,
scanning and penetration testing as well as used for nefarious purposes.
2 of 11

Treadstone 71

7/4/2011

3 of 11

Treadstone 71

7/4/2011

Many have looked at the ISO image information as freely available tools. I
see it as something altogether different. I see it as a typically irresponsible
act by a reckless group of individuals who have no clue as to the big picture.
They would be best served to continue their DDoS attacks and exploitation
of SQL-injection miss-configurations than to download and publish tools of
this type. Their asinine activities, false bravado and chest thumping are
providing information and expertise to cyber jihadists.

The above post is from a well-known cyber jihadist site that provides link
information directly to the Opnewblood documentation, which in turn
provides links and other information to Sentinel, IRC asynchronous training:

4 of 11

Treadstone 71

7/4/2011

Ansar Al-Mujahideen > Headlines > Ummah News

Anonymous Releases "Super Secret Security Handbook"


Register

Rules And Policies

Invite Brothers/Sisters

Now on the forums


[hide]

5 of 11

Treadstone 71

FAQ

Members List

ISpy

7/4/2011

Arabic Forum

Secure/SSL

RSS Feeds

www.as-ansar.com/vb https://www.ansar1.info Ansar AlJihad English RSS

6 of 11

Treadstone 71

7/4/2011

Go to
Page...

Thread Tools

#1

06-30-2011, 11:19 PM

Anonymous Releases "Super Secret Security Handbook"

Assalaamualaikum,
Source: INFOSEC ISLAND
The rogue hacker movement Anonymous has released the
"OpNewBlood Super Secret Security Handbook" (pdf) in an
effort to recruit more would-be hacktivist types to further the
Internet anarchy cause.
The tutorial-style guide instructs users on multiple subjects,
particularly how to set up secure Internet Relay Chat (IRC)
access for group discussion participation.
"If you have not gone through the IRC chat client setup for
your operating system, we recommend you go back and get
started there," the guide states.
The publication will edify aspiring armchair hackers on
methods used to obscure one's identity while conducting
operations online and avoid exposing one's identity to rival
hackers and law enforcement.
The guide is replete with step-by-step instructions and
peppered with tips on how to avoid missteps in the process,
as well as warnings for those who might me getting in over
their head from a technical standpoint:
7 of 11

Display Modes

Treadstone 71

7/4/2011

"Always be cautious when tinkering with systems you don't


fully understand, as this may lead to undesirable results,
detection, and in extreme cases system failure or legal
trouble... While this guide does attempt to put it simply and in
laymans terms, you the user are ultimatly [sic] responsible for
the security of your own systems," the publication warns.
The publication is more evidence that hacktivist groups like
Anonymous and the now supposedly defunct LulzSec are
shifting tactics by moving away from conducting offensive
operations themselves, and instead may be seeking to
educate and enable others take up the cause.
Recently we have also seen the emergence of the
Anonymous-backed School4lulz, a resource for hi-tech
hooligans to learn the finer art of hacking, cross-site scripting,
SQL injections, botnet herding, doxing, and tools of the trade.
By concentrating on instruction and inspiration, the core
leadership of these hacker collectives can effectively remove
themselves as primary targets for law enforcement and antiAntiSec hackers like The Jester (th3j35t3r), The A-Team, and
the Web Ninjas, and instead encourage their less-savvy teen
minions to commit the attacks and take the heat.

link to download the guide:


hxxp://www.vulnerabilitydatabase.com/wpcontent/uploads/2011/06/OpNewblood-Super-Secret-SecurityHandbook.pdf
__________________
Verily, Allah has purchased of the believers their lives and their
properties; for the price that theirs shall be the Paradise. They fight in
Allah's Cause, so they kill (others) and are killed. It is a promise in
truth which is binding on Him in the Taurat (Torah) and the Injeel
(Gospel) and the Quran. And who is truer to his covenant than Allah?
Then rejoice in the bargain which you have concluded. That is the
supreme success- Surah Taubah, Verse 111

The Following 6 Users Say JazakAllah Khair For This Post:

8 of 11

Treadstone 71

Allah's

7/4/2011

slave (0701-2011),
Khadija
(07-012011),
Mustafa
al-Farsi
(07-012011),
Muwahhid
(07-012011),
Servantof-Islam
(06-302011),
striver
(07-012011)
Number of answers: 2

Only registered members can read replies.


Previous Thread | Next Thread

Thread Tools

Show Printable Version


Email this Page
Display Modes

Linear Mode
Switch to Hybrid Mode
Switch to Threaded Mode
Posting Rules

You may not post new threads


You may not post replies
You may not post attachments
You may not edit your posts

Forum Jump

Ummah New s

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Similar Threads
Thread

# Ansar al-Jihad Network # ::Presents::

9 of 11

Thread Starter

Forum

Ummah News

Treadstone 71

Replies

Last Post

06-20-2011 06:30

7/4/2011

Similar Threads
Security First: "The Basics of Browsing
Security for the Supporters of the
Mujahideen" - Part 1

PM

Moqatel Network # Presents # Ummat


Studio Releases " Pak Jihad "

Jihaad Related Media

03-18-2011 10:18
AM

Dutch secret service ran "Bait-site" for


radical Islam

Ummah News

08-09-2010 04:48
PM

JHUF Present : Urdu Translation of Ansar


releases Entited " Rejoice in the bargain
which ye have concluded!" The martyrdom
of Amir Sayfullah (may Allah have Mercy on
him)

Archive

04-15-2010 06:31
AM

"New Links for Recent Releases by alFurqan, al-Sahab, al-Ansar, Al-Qaeda in


Islamic Maghreb and al-Shabaab"

Archive

12-11-2008 09:33
AM

All times are GMT +2. The time now is 04:36 AM.
Contact Us - Ansar Al-Mujahideen - Top
Powered by vBulletin Version 3.7.1
Copyright 2000 - 2011, Jelsoft Enterprises Ltd.

Other links provide information to the Sentinel ISO download. This


proliferation of virtual small arms, online trainings and instructional how-to
is the Anonymous method of radicalization for their cause. It follows much
the same method as cyber jihadist radicalization:

It looks like Anonymous is taking a page directly from the cyber jihadist
recruitment handbook to Anonymize new blood while providing virtual small
arms and expertise to cyber jihadists. Both groups use the Internet as their
primary source of recruitment and C4ISR (Command, Control,
Communications, Computers, Intelligence, Surveillance and
10 of 11

Treadstone 71

7/4/2011

Reconnaissance). Both providing training to would be cyber soldiers as a


method of recruitment and both use an ideology as the primary method of
self-identification. Both use Web 2.0 technologies to spout their propaganda
and drive readership to their views of the world. Both use cyber denial and
deception to misdirect. There is one primary difference and that is the final
step of the cyber jihadist: physical training for acts of violence.
Regardless their differences, it could be said that Anonymous is aiding and
abetting the cyber jihadists and terrorists, which is a felony under U.S. law if
proven. Anonymous recruits, proselytizes their own jihad, raises funds and
plans for cyber attacks. The parallels of their methods are many.
For those of you thinking of joining the ranks of Anonymous, follow these
words:
The irresponsible actions of Anonymous are not serving much of any
cause. What their actions will do is create a series of new, knee-jerk
laws that make it difficult for all of us. What their actions are doing is
providing training for cyber jihadists and a myriad of other groups at a
minimum. Come on Anonymous, wake up to your actions. Why not
defend the liberties you so vehemently say Whitehat security
professionals violate? Why not target every damn jihadist site on the
internet and smack them down every day? Why not follow a true
cause that actually supports the human spirit and defends the rights
you hold so dear? Why not direct your efforts against those who would
cut your throat in a heartbeat?
Civilization is the progress toward a society of privacy. The savages
whole existence is public, ruled by the laws of his tribe. What you do
with crowdsourcing is nothing more than the laws of the tribe. You let
others determine your course of action. Do not ever say that the
desire to do good by force is a good motive. Your DDoS activity is
such a motive. Neither power-lust nor stupidity are good motives yet
you display them daily. The person who lets a leader prescribe his
course is a wreck being towed to the scrap heap so why follow the
crowdsourcing lemming activities that Anonymous proposes.
There is a level of cowardice lower than that of the conformist: the
fashionable non-conformist. And right now, Anonymous is fashionable.

Call today 1-888-687-8450 or email us at info@treadstone71.com

11 of 11

Treadstone 71

You might also like