GhostSec on Twitter “We are YOU, the people”
Ghost Security Group is a counterterrorism organisation that uses the internet as a weapon to combat extremism on the digital front lines. Our cyber operations include target discovery and surveillance, threat data collection, situational awareness, advanced forensics, and customised offensive strategies.
According to exclusive details provided by GhostSec, they are not affiliated with Ghost Security Group. The group separated two years back, while one is now a part of the United States. The other is working as Anonymous trying to help the needy. In a post shared by Ghost Security, the anonymous collective then explains that they are not computer hackers, they are protestors, not criminals. They are you, the people. ANyone can be anonymous who works for the benefit of the people and fight the aggressor without revealing their names.
We are not computer hackers.
We are not protesters.
We are not criminals.
We are YOU, the people.#Anonymous #GhostSechttps://t.co/jJrQUagmUz pic.twitter.com/nbSdi2rUfj— GSM (@GS_M4F14) April 17, 2022
It is regarded as a branch of the Anonymous hacking collective. By collaborating with law enforcement and intelligence agencies, the group claims to have taken down hundreds of ISIS-affiliated websites and social media accounts, as well as thwarted potential terrorist attacks.
Ghost Security Group’s primary focus is electronic warfare, which includes offensive strategies as well as the collection of real-time data to aggressively analyse threats and provide situational awareness to federal governments and the intelligence community. They keep the world’s largest database of extremist social media profiles, websites, and communications, including those found on the dark web.
Data mining is critical for operational success because it constantly seeks previously unknown hostile digital assets to analyse relevant threat data. Ghost Security Group can also infiltrate enemy communications through social media and other platforms for real-time data collection. They also use ground assets that can relay information to us from actual conflict zones and provide real-time data on an ever-changing battlefield.