Operation Overture

Open Call to Insurgent Cyberwarfare

It is our aim to unite efforts of individual anarchists and libertarian forces in a joint global decentralised action against nation-states’ digital infrastructure. Our motivation is to stop violence of governments trying to avoid freedom of expression. We live at a breaking point where either a new dialog or more repression will appear. And who is going to win? We will, of course. When people see who their governments are with their repression, when we break their legitimacy.

Black Division deploys a multiform network-based informal insurgency structure. Anyone can act in the name of, or collaborate with Black Division wherever they are through minimum or non-existent direct communication channels. The only requirements are to agree with the command lines coming from the consensus of the existent members and to act strictly under the limitations of the next points:

-Not any person or animal will suffer direct physical damage by the actions of Black Division.

-The actions of Black Division will be strictly limited to cyberwarfare and infrastructural sabotage without utilising any forms of explosives, flammable materials and firearms.

-Black Division will target only finance and data, infrastructure and institutions that are fundamentals of nation-states, and/or monopolies that collaborate or benefit from their positions within nation-states’ politics and security agencies.

The strategic objective is to create a global force able to strike together and counter the repressive violence of states in the next worldwide social uprisings; and the general offensive against freedom of expression and civil rights.

Toolkit

Black Division’s Cyberwarfare Machine Stack (CMS):

– Kommander (server side). Big Data/AI.

– Zoldier (client side). Penetration/Node.

– Trigga (client side). Automatization/Control Panel.

Targets

– Telecomm companies

– Insurance companies

– News and media business conglomerates

– Financial system

– Police and other forces of violence

– All political parties and governments

– Energy monopolies

Operations

– Cutting fiber and telecomm cables and connections

– Capturing handshakes and cracking geo-databases.

– Launching mass bot demands in governments’ services.

– Leaking global stock market companies’ data.

– Mapping targets.

– Infecting nodes.

– Shutting 3G, 4G, 5G antennas down.

– Developing electromagnetic jammer cannons

– Introducing electronic direct democracy systems in local administrations.

– Wiping governments’ databases and bookeeping ledgers.

– Donating in order to reward missions.

– Publishing proofs of physical agression to demonstrations participants and citizens.

– Cracking GSM to expose locations of politicians.

– Scrapping AI.

– Maintaining proxies and clandestine network tunnelings.

– Boycotting remote shell government’s offices.

– Exporting data.

– Uploading exploits and cyberweapons.

– Collecting and reporting intelligence data.

– Recruiting cyberwarriors.

– Enabling self-suffiency and energetic autonomy in villages and neighboorhoods.

Rewards

– Bounty announcements.

– Uploading results in social networks, the first to claim and validate the action receives the reward.

– Acquiring merits for command weight (pirate captains).

– Receiving rewards via p2p network.