0 0
Predatory Sparrow - The Cyber Shafarat - Membership only site
Read Time:1 Minute, 41 Second

Day 3: Muslim extremist hacker groups @team1916 @lulzsecmuslim continue to make threats towards destruction of Israel by launching cyberattack.

Predatory Sparrow patiently awaits favorable condition before striking;

The anniversary for cyberattack of Iran’s Parliament.

Let’s play a game @CYBER_AN0N. It’s called “Show-off.” We will take turns showing off that we are government affiliated. The one with the most government or military affiliation wins a game. Let’s play, ladies first. I’ll go first. Here’s a recording of my computer’s desktop.

Greetings
This is cyber anon the leader of Syrian  Cyber  Army as @ANONYMlSS she named me
She tried to dox me but unlucky for her she posted a wrong ip for my location
When I started Hacking my only target was israhell but now you wanted a cyber war and you will have it
Japan I hope you will be fine in the next few days
It is just a matter of time and you will have what you want

Want to get on the FBI Most Wanted List for hacking? Want to be famous? I can help you get there. Send some  proof that you’re a state-sponsored hacker acting on the behalf of government and which American critical infrastructure you plan or have attacked. #Anonymous #FBI #FBIMostWanted #CIA #NSA #Cyber #infosec

Cyb3RAN0N changed his profile picture to the Syrian Cyber Army. +1

Round 2 Part 1: The DOD assigning me with a task to contact Federal News Network by phone and email to request them to take down Controlled Unclassified Information (CUI) for Copyright Infringement

Round 2 Part 2: Email where I reached out to Federal News Network.

Round 2 Part 3: Emails between the DOD and where I initially called the Federal News Network updates and reporting task competition.

Round 2 Part 4: The U.S. Dept of Defense staff lecturing me on not to screenshot a Top Secret (TS) documents because it was first offense.

About Post Author

Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Trending

Copyright 2024

Discover more from The Cyber Shafarat - Membership only site

Subscribe now to keep reading and get access to the full archive.

Continue reading