Some of you guys underestimate this group and its abilities.
Oh really? Care to enlighten us?
Da fuq are they gonna do sitting behind a buncha computer screens?
Last time I checked, hacking doesn't prevent people from using knives, guns, or any other physical weapons.
Oh really? Care to enlighten us?
Da fuq are they gonna do sitting behind a buncha computer screens?
Last time I checked, hacking doesn't prevent people from using knives, guns, or any other physical weapons.
Oh really? Care to enlighten us?
Da fuq are they gonna do sitting behind a buncha computer screens?
Last time I checked, hacking doesn't prevent people from using knives, guns, or any other physical weapons.
this.
You really underestimate what hackers can do to a group like this. They can shut down all of these asshole's financiers in Dubai, Saudi Arabia etc. They can shut down power grids, eliminate any form of tech they have as well. Anonymous if used right can put these guys in the stone age.
Also another interesting thing is that they can hand over current location data of Terrorist leaders to international police, military and intelligence agencies.
Don't underestimate the power of hack.
I'm sure they are terrified.
You really underestimate what hackers can do to a group like this. They can shut down all of these asshole's financiers in Dubai, Saudi Arabia etc. They can shut down power grids, eliminate any form of tech they have as well. Anonymous if used right can put these guys in the stone age.
Also another interesting thing is that they can hand over current location data of Terrorist leaders to international police, military and intelligence agencies.
Don't underestimate the power of hack.
See above. We take for granted the amount of technology we use in a day, how often we use the internet. How much power/remotely accessed technology is around us. You guys are thinking stone age.
A brilliant man once said 'I know not what World War III will be fought with, but World War IV will be fought with sticks and stones'
World war 3 will be fought using electronic communications and the disruptions of such. How do you think these terrorist leaders interact with each other? Carrier pigeons? They are wanted by many many people, and when these wanted men's addresses are posted, what do you think will happen to them?
Just a thought. There is so much that happens behind the scenes that people dont ever think about. I've got acquaintances that do this sort of data acquisition, not on Anonymous's level, but it can definitely do much more damage than you could imagine.
Contact info for a cave in the desert?Won't take much for this group to come through on their promises. Simply identify, locate and provide contact information for a few top level guys of ISIS and it will be mission accomplished. There are a lot of governments out there that would probably pay top dollar to locate and kill a high level operative, US and France come top of mind:idea:
.
Won't take much for this group to come through on their promises. Simply identify, locate and provide contact information for a few top level guys of ISIS and it will be mission accomplished. There are a lot of governments out there that would probably pay top dollar to locate and kill a high level operative, US and France come top of mind:idea:
Amazing none of you could figure that out on your own.
Contact info for a cave in the desert?
Also the thing is you have to understand while their camps are in the desert many of them hide in plain sight in Western nations. It's really easy for anonymous to track them down in urban areas.
Also AQ uses the internet in the desert.