Anonymous, the international association of hacktivists, has been fighting with ISIS and aiming to take down its presence from the internet. Hacktivist groups have their own agenda, but ISIS has inspired Anonymous and some other groups to join forces and working towards this common goal. #OpISIS is one such operation that is being run by them and they continue to wipe off websites and Twitter handlers of ISIS.
Meanwhile, these Anonymous operations are facing some repercussions as well. Cyber security and surveillance agencies are not much amused with this step because now they are unable to acquire information from these websites and Twitter accounts. This ISIS targeted Operation ISIS (#OpISIS) has already disrupted hundreds of ISIS affiliated websites, social media accounts, and email accounts.
Here is the full statement by Anonymous:
All websites listed below are frequently used by the Islamic State through Twitter and other social media platforms for transmission of propaganda, religion, recruitment, communications and intelligence gathering purposes. Next to the URL you will find the company hosting content for that website. Verification can be done by visiting https://check-host.net and entering the website URL. It is our sincerest hope that the media use this as a tool to show the world that the Islamic State is everywhere in some shape or form and that companies are unaware of their customers content or they turn a blind eye for easy profit and choose to accept bloodmoney. CloudFlare is by far the largest offender on this list and they have been made aware of the specified content they are protecting but chose to block us from contacting them rather than addressing the issue. Together we can stop this from spreading and hold these companies accountable for their less than ethical business practices.
Here is the full statement and the list of websites.
Recommended: Anonymous Message to Barack Obama: Do You See What We See?
For more updates and interesting stories from fossBytes, subscribe to our newsletter. [newsletter_signup_form id=1]