background preloader

Asylos

Facebook Twitter

Jean-Marc Manach. Jean marc manach (@manhack) 4chan. 4chan is an English-language imageboard website.

4chan

Users generally post anonymously, with the most recent posts appearing above the rest. 4chan is split into various boards with their own specific content and guidelines. Rules of the Internet. About Rules of the Internet is a list of protocols and conventions, originally written to serve as a guide for those who identified themselves with the Internet group Anonymous.

Rules of the Internet

The list serves as a summation of popular catchphrases and axioms commonly associated with 4chan. Since there are numerous drafts and editions in circulation, the rules fluctuate in number and the validity of each rule remains debatable. Despite this, several of the rules including Rule 34 and Rule 63 are agreed upon across internet communities. Rule 34. About Rule 34 is an Internet adage in the “Rules of the Internet” list of protocols and conventions which asserts that if something exists, there is porn of it.

Rule 34

The humorous concept is commonly illustrated through fanart and fanfictions in which fictional TV and cartoon characters engage in sexual behavior, in similar vein to the Ruined Childhood meme. File:Rule 36.gif. Mormon Porn / Bubble Porn. Comment on peut, en trois clics, découvrir la carte des stations d'écoute des espions de la DGSE. Fatal Realities of Fortress Europe. Border management & externalisation Numerous deaths, especially those that remain undocumented, are a direct consequence of the repeated reinforcement of EU borders.

Fatal Realities of Fortress Europe

Not content with excessive policing and militarisation of the borders, common practice is now to extend, move and redraw them as a response to migration flows. The externalisation of the EU’s political borders can be seen mostly in North African countries, whose coasts are the starting point for many migrant journeys into Europe, especially to Spain, Italy and Greece.

The Italy-Libya Agreement, validated in 2005 and re-signed for another 5 years in 2010 demonstrates how the European countries systematically evade international treaties in managing immigration. In May 2010, 18 alleged criminals were executed in Tripoli and Benghazi. By contracting out border policing, migrants are subjected to the inhumane treatment that the Human Rights Convention prohibits. Detention Deportation Process ineffectiveness Unaccompanied minors. Listofdeaths. [APP] Mémorial des morts aux frontières de l’Europe. Plus de 14 000 réfugiés sont "morts aux frontières" de l'Europe depuis 1988.

[APP] Mémorial des morts aux frontières de l’Europe

Missing Migrants Project. Refugees/Migrants Emergency Response - Mediterranean - Regional Overview. Photos de Kadhafi à Paris: l’Elysée s’est trompé. L'Elysée s'est trompé en affirmant n'avoir jamais publié de photos de la rencontre de décembre 2007 entre Mouammar Kadhafi et Nicolas Sarkozy à Paris sur elysee.fr : elles y sont encore...

Photos de Kadhafi à Paris: l’Elysée s’est trompé

L’Elysée aurait-il censuré les photos de la visite de Khadafi à Paris, et de sa poignée de main avec Nicolas Sarkozy, en décembre 2007 ? C’est en tout cas ce que certains laissaient entendre sur Twitter, relayés en cela par plusieurs articles de presse. Interrogé par LeMonde.fr, le service Internet de l’Elysée a démenti avoir dépublié des photos de la visite de Mouammar Kadhafi à Paris, tout en déclarant que ces photographies, que personne ne retrouvait plus, n’avaient donc jamais été publiées sur le site : “Tout ce qui est produit n’est pas diffusé en ligne“.

Ces photos de Sarkozy que l’Élysée voulait cacher. Trois jours après la chute de Moubarak, l'Élysée a nettoyé son site web des photos montrant la complicité de Nicolas Sarkozy et du dictateur égyptien.

Ces photos de Sarkozy que l’Élysée voulait cacher

A guide to Libya’s surveillance network » OWNI.eu, News, Augmented. After repeated interrogations lead by Reflets.info, OWNI, the Wall Street Journal and the Figaro, Amesys, the French company that sold Internet surveillance systems to Gaddafi’s Libya tried to calm things down with a statement posted on its website (mirror): The contract only concerned the sale of materials capable of analysing a fraction of existing internet connections, only a few thousand.

A guide to Libya’s surveillance network » OWNI.eu, News, Augmented

However, the documents in OWNI’s possession tell a different story, in fact, the exact opposite story. In contrast to traditional surveillance systems that target specific connections, the “massive” (sic) Amesys surveillance system is used to intercept and analyze the entirety of the telecommunications network, to the scale of an entire country. Exclusive: How Gaddafi Spied on the Fathers of the New Libya » OWNI.eu, News, Augmented. 4journalistes chronique arretsurimage. Le propagandiste du FN avait 15 ans. "Sur l'Internet, personne ne sait que tu es un chien".

Le propagandiste du FN avait 15 ans

Le célèbre du New Yorker a beaucoup été utilisé pour fustiger le soi-disant anonymat que permettrait Internet. Original.81631. Que fait-on avec ça ? #JeSuisKouachi #NousSommesKouachi. ISIS Had a Social Media Campaign, So We Tracked Them Down - bellingcat. On Saturday, numerous supporters of ISIS posted pictures on social media from major European cities, displaying messages of support for the group. This social media campaign was in support of an imminent speech from ISIS spokesperson Abu Mohammed al-Adnani. In these photographs, backgrounds of various European cities can be seen, with the intention of, as described by Sheera Frankel of BuzzFeed News World, “instill[ing] fear by showing that the group had supporters in major European cities.” As noted by J.M. Berger, this was the “first time in months that the ISIS social media team has come out in force to push a release,” and that the ISIS “fanboys” felt accomplished in getting their hashtag to trend.

Crowdsourced Geolocation and Analysis of Russian MoD Airstrike Videos from Syria - bellingcat. Forensic Architecture - Home. Data-driven, participatory fact mapping. Open-source intelligence. Open sources for intelligence[edit] OSINT includes a wide variety of information and sources: OSINT is distinguished from research in that it applies the process of intelligence to create tailored knowledge supportive of a specific decision by a specific individual or group.[3] Definers for OSINT[edit] OSINT is defined by both the U.S.

Open-source intelligence

Director of National Intelligence and the U.S. Untangling the Web: How to Search the Internet Like the NSA. In Archive, Hacking, Internet, NSA on March 25, 2014 at 8:06 PM The National Security Agency has produced a book to help its spies uncover intelligence hiding on the web. The 652-page book is titled Untangling the Web: A Guide to Internet Research and was published by the Center for Digital Content of the National Security Agency.

It was released by the NSA last year after a FOIA request filed by MuckRock, but that version is a redacted black and white copy. After doing a quick Google search, LeakSource has discovered the proper unredacted version of the book (source/pdf), in color with working hyperlinks. It looks like it has been on the Internet since 2007. Facebook Graph Shortcuts. Investigation Techniques & Links by Bob Brasich. OSINT tools: Facebook, Twitter, Social Networks, Identity verification, and more NetBootCamp Facebook Search Tool Facebook Graph Queries: Profiles, Photos, Pages, Employers, Groups & More Facebook Search Tool NetBootCamp Facebook Search Tips Example queries created with NetBootCamp’s Facebook Tool: More Custom Facebook Tools Example Google Queries Find Profiles on Facebook Facebook Graph: API Facebook.com – Graph API documentsApigee.com – Facebook Graph console.

Facebook Search Tool by IntelTechniques.com. Online Training Live Training Search Tools Forum Blog Books Privacy Bio Contact. Manhack.net / WHOIS & Cie. Asylos Labs — asylos.