The nAbAt a ICC soApboX
Wednesday,Jan 29,2020 
18 Users Online
The future or end 4the International CyberGuerrillA Column | By BlackRat | January 1, 2020 - 02:38 | Posted in Ops | 15 Comments

TL;DR: This page will tell you what the future plans for ICC look like, and it includes a plea for donations as we are in financial trouble. The future plans start right below this text, the donation plea is at the end of the page.

You know when it is that period when water-heater leaks, boat sinks yeah fucking 60k nao eating mud and other stuff all on the same time give up there live on top work is not that in amount that we can afford to keep our services running without endanger our IRL cost of living.

As you may or may not know, ICC (cyberguerrilla.org) has existed for several years now. It first went online in 2010, during Operation Tunisia: The Tunisian Revolution, also known as the Jasmine Revolution, was an intensive campaign of civil resistance, including a series of dictatorships fubar with the assistance of anonymous like in Tunisia, Egypt…

In those years, Anonymous has changed tremendously. The types of operations have changed, but so have the channels used by people to stay up to date so have we. Again: at the end of this page, I’m going to ask you for a donation – We are a horizontally-run, decentralized organization which believes our internet-base should be free and available for everyone to view and share for non-commercial purposes. You will never see pop-ups, advertisements, or commercials on any of our livestreams or website.

All of this is only made possible because we are independently funded through contributions from viewers like you.but before you get there, you’ll learn about what the future of ICC looks like.

So why International CyberGuerrillA Column is needed
Can you rely on a corporate provider for confidentiality of your sensitive communications? Not only do they typically scan and record the content of your messages for a wide variety of purposes, they also concede to the demands of governments that restrict digital freedom and fail to have strict policies regarding their user’s privacy. Not to mention their obviously commercial interests put commercial providers at odds with what we are doing. Government’s practices “full pipe monitoring” and association mapping, which gives them the ability to build a detailed map of how our social movements are organized, worse this gives them precise information about what linkages should be disrupted in order to disrupt large social movements

We believe it is vital that essential communication infrastructure be controlled by movement organizations and not corporations or the government.

Again: at the end of this page, I’m going to ask you for a donation – We strive to keep our communications as secure and private as we can. We do not log your IP address. (Most services keep detailed records of every machine which connects to the servers. We keep only information which cannot be used to uniquely identify your machine). All your data is stored by CyberGuerrilla in encrypted form. We work hard to keep our servers secure and well defended against any malicious attack. We do not share any of our user data with anyone. We will actively fight any attempt to subpoena or otherwise acquire any user information or logs. We will not read, search, or process any of your communications other than by automatic means to protect you from viruses and spam or when directed to do so by you when troubleshooting.

So nao this it where we start get ready to donate!!!

Donation via Paypal

฿ What is Bitcoin? 1Bhgvcsm3P59fSCLg5G6DSstpV4srk5JTy

There are still comrades in prison, we support all efforts that result in the prisoners coming out of jail upright. At this moment in our history, we want to greet and thank all of you who have received solidarity along the path of the past years, who have supported us in many ways and who have fought with us from their foundations. Behind us all lies a common path. We wish that we all find ourselves on the unknown and winding paths of liberation along with many others. We will never forget the comrades, we want to especially remember those who decided to give everything in the struggle and died in it. Our memory and our full respect for those whose names we can not name because we do not know them.
Mohammed Bouazizi
Mohammad Nabbous
Ultras 77
The countless dead, tortured in Egypt/Libya/Syria army jails
Aaron Swartz
Tayyeb Shehadah
Owen Dennis Collins
Sue Crabtree

Rest In Power

We are Autonomen,
We are Ungovernable,
We are Action,
We do not forget our comrades,
Politburo Meowist Party of the Soviet #CgAn International CyberGuerrillA Column #ICC

This Post is Tagged with:

15 Responses to The future or end 4the International CyberGuerrillA Column

  1. I’d buy a zip up hoodie but it doesn’t look li,e that’s an option….

  2. Take a text or bits
    Create a Smith chart OVER it
    Get cryptography

  3. take a text

    -each word each a coordinate

    – apply this algorithm


  4. Algorithm 1 :
    -Create a heuristic process through a text
    -The heuristic process is the edges of a Dudeney transformation . -Create from this edges some triangles which are filled with the words of the text (or bits)
    -Make from that transformation a new triangle with Dudeney transformation.

    Algorithm 2:
    -Take a text or bits
    -Project a triangle on that text
    -Make a Dudeney transformation (the cipher key)
    -Get the new triangle

    Algorithm 3 :
    -Count the occurrence of words in a text
    -Choose any frequency (1.68855 MHZ)
    -Make a wavelet transform of that frequency with occurrence of words in wavelet coefficients.

    Algorithm 4:
    -Get a code
    -Make a real hologram of that code (hologram of the screen with the code)
    -Use that hologram as steganographic process.

    Algorithm 5:
    -Consider any map of a town (country, etc) as a biometric process
    -a path in a town (streets places, etc) is considered in the same way as a biometric face.

    Algorithm 6:
    – bitcoins source code are communication process
    -Use I SWARM robots communication process to make that bitcoins having a common behaviour.

    Algorithm 7:
    -Consider 3 source codes A,B,C
    -Code A is the reference beam of a computing generated hologram.
    -Code B is the object beam
    -Code C is the object which to make an hologram with.
    -Generated the computing generated hologram

    Target required :
    Banks, oïl compagny, non renewable Energy providers

  5. Cryptographie process split screen
    Algorithm :
    1)Search randomly words in a text
    2)get all the pointers of these words
    3)consider these pointers as parameters to create a chaotic attractor
    4)get from that chaotic attractor a trajectory
    5)put the value of this trajectory in svga registers
    6)create a fractal splitscreen with these registers.
    7)blink it all
    Target required :Facebook
    Guilty of :intrusion in private life, addiction to communication,non respect of disabilities people especially autist people, destabilisation of financial market with Libra, propagation of fear and insane behaviour during the forcoming financial krach.
    Total destruction required with no chance to recover.

    Algorithm 2:
    Same process but create a computed generated hologram with the pointers

    Algorithm 3:
    1) Make a basic compiler program
    2)run that compiler with any files(any text) in a computer
    3)let the compiler generate some codes with that files
    4)some codes will run depending on compiler parameters others are garbages codes.

    Algorithm 4)
    Data mining can be disturbed by using a compiler algorithm which compiles the datas which are scanned by data mining.

    Algorithm 5:
    search for words in a text
    -get the pointer
    -make vigenere circle with it

    -make a hologram of that vigenere circle with Computed genrated hologram
    -use SVGA register to mùake a diffraction pattern with plit screen :split screen as diffraction pattern

  6. August 24, 2019 at 16:44
    anonymous says:

    If Mr SNOWDEN is deprived from his rights ant throw to jail or his life is in danger,one could consider doing
    a massive spam of fake news concerning him.It is more a malware using a massive information load as a logical bomb.
    Mr SNOWDEN would be protected in a way by thousands of thousands of news concerning him like an information labyrinth
    different location ,different speeches,differents friends,etc.

    Anonymous can be in overcrowded place so why not overinformation to protect someone.
    Good luck!

  7. August 23, 2019 at 17:52
    Anonymous says:

    One week before the terrorist attack in Strasbourg 11 décembre 2018 the Mayor of the city Hall got an email suggesting to make a counter Riot or counter terrorist exercise in live to prépare the people.the e-mail added that the city Hall of Paris should do the same be cause the social catharsis and the political interest was obvious after the yellow jackets riots.any attrempt to Get a copy of that email was a No answer ,seems to be embarrassing.many légal entreprise have been donne with no success.up2 ù

Leave a Comment (Anonymous).

Comment author must fill out name and e-mail. (Email will not be published).

NOTE - You can use these (HTML tags and attributes):

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Whoever you are, we are ungovernable! Whoever lays his hand on us to govern us, is a usurper and tyrant, and we declare you our enemy.