IT News. Powered by Blogger.

.

.

Sunday, 16 February 2014

Switch Off Your Friends Mobile Phone Through SMS

Switch Off Your Friends Mobile Phone Through SMS


Hy Guyz Welcome!
Today i am going to share a Cool trick with you by using which you can switch off your friends mobile through SMS.

Lets Start:-

(1) Dont use Multimedia phones for this Trick because multimedia phone is not effected by this tick and other simple phone are effected. 
But you can apply this trick on those phone which are used for messaging now a day due to the softness its buttons.

(2) Then open  Menu >>> Message >>> Write new message
(3) Type 51 commas(for some of the phones or phone OS versions you need to use 79 commas instead of 
51) [ ' ] like below(These are inverted commas)
You can add you own comment at the start of this message like "Hy! I am going to Switch Off your Phone etc." 
NOTE: This Trick only work on simple mobile phones but not on multimedia phones.

Thursday, 13 February 2014

6 US Drone Testing Centers Announced!

 6 US Drone Testing Centers Announced!



In order to bring drones to U.S. skies the Federal Aviation Administration (FAA) of America has selected six site operators to research and test unmanned aircraft across the country.
Three universities named the University of Alaska, Virginia Tech and Texas A&M University-Corpus Christi  as well as Griffiss International Airport in upstate New York, the state of Nevada and the North Dakota Department of Commerce were among the FAA's picks announced Monday.
Drones have been used mainly for military purposes and other government-sponsored activities like border surveillance and environmental monitoring. But the FAA has been working on regulations for the use of commercial drones, projected to be a multibillion-dollar industry.

Sunday, 22 December 2013

Dotcachef Exploit Found

                  Dotcachef  Exploit Pack Found




Chris Wakelin recently Found a new exploit pack. The Exploit kit named DotkaChef" (aka DotCache, DotCacheF) was found to be targeting IP BOARD FORUM applications.

Kahu Security analyzed this exploit and found that all of the infected websites used by "Dotcachef' are running IP Board. 


The Security Researchers also says that cyber criminals might have exploited an old PHP code execution(CVE-2012-5692) vulnerability affecting 3.3.4 and previous IP board forum software versions. 

The Researchers told us that once the website is successfully compromised the"Dotcachef" is being uploaded to the victim's website in one folder with random name.
Once the website is successfully compromised the"Dotcachef" is being uploaded to the victim's website in one folder with random name. - See more at: http://www.ehackingnews.com/2013/12/dotcachef-exploit-pack-targets-ip-board.html#sthash.9uOnkDjr.dpuf
Kahu Security analyzed
DotkaChef" (aka DotCache, DotCacheF)
DotkaChef" (aka DotCache, DotCacheF)
Chris Wakelin
Chris Wakelin

Friday, 20 December 2013

Blocking Youtube Ads

Blocking Youtube Ads 


are you fed up of youtube ads??

if yes...........

Then today i am going to solve your this problem :)

I am going to share with you an amazing piece of tool with you which blocks youtube ads automatically. This tool will removes all video ads before and during videos as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on  Mozilla Firefox

Download  Link:-
 Click here

A car powered by Air and is Made From Lego blocks

A car powered by Air and is Made From Lego blocks



A car has been made by an Australian entrepreneur and a Romanian technologist who have used more then 500,000 pieces of Lego to made their car which has top speed of 20km/h.



 And it is an air-powered car which use four air-powered engines and 256 pistons which are also built of Lego bricks which enables the car to move. 

The wheels of the car are also made of Lego Bricks. the Creators of the car said that 
"It took 18 months and a lot more money to build this car"
 




Thursday, 19 December 2013

New Online Porn Filters Of UK's Blocking Sex Ed And Health Websites


As we know that Pakistan Telecom Authority blocked youtube and other adult websites now UK's government try to blocked these types of sites, I confused that mostly porn websites are running by american's now they want to take a step to blocked these websites.

Pornography filters the British government required major internet service providers to install seem to be working a little too well, blocking websites that supply sex ed, sexual health information and treatment for porn addiction, the BBC reported.

BBC found all major ISPs that not blocked hardcore porn websites.

British PM David Cameron announced in July that all UK households are to have their access blocked to online pornography unless they choose to ‘opt in.’ He called the "family-friendly" filters important to keep children from "stumbling across hardcore legal pornography.”

BishUK.com, a major British sex education site that receives over a million hits per year, was blocked by TalkTalk’s filter, as was the Edinburgh Women’s Rape and Sexual Abuse Center’s website.
Justin Hancock, who runs BishUK, did not know his site was blocked by some filters.

Sky’s filter blocked 99 percent of sites tested, but it also blocked six porn-addiction sites.

The move followed a pressure campaign in the UK led by British PM Cameron.
“We've listened, and in the last three months put more than 200 people to work developing new, state-of-the-art technology to tackle the problem,” Google Executive Chairman Eric Schmidt wrote in a Daily Mail op-ed.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

World’s fastest wireless network hits 100 gigabits per second can scale to terabits [IT News]

World’s fastest wireless network hits 100 gigabits  per second can scale to terabits


 The German researchers successfully combined photonics and electronics to create a world-record-breaking wireless network that can send and receive data at a high rate of 100 gigabits per second (Gbps). This beats the same team’s previous world record of 40Gbps. At 100Gbps, or a transfer rate of 12.5 gigabytes per second  ten times faster than Google Fiber  you could copy a complete Blu-ray disc in a couple of seconds.
To achieve such a massive data rate, researchers from the Karlsruhe Institute of Technology (KIT) used a massive swath of bandwidth at around 240 GHz  close to the terahertz frequency range. To create the signal, two laser beams (carrying the data) are mixed together (using a photon mixer made by NTT Electronics). An electrical signal results, where the frequency of the signal (237.5 GHz in this case) is the difference between the two optical signals. A normal antenna is then used to beam the signal to the receiver, where a fancy chip fabricated out of fast-switching III-V transistors is required to make sense of the super-high-frequency signal.(see this pic of III-V transistors )


Fraunhofer’s Millilink chip, with III-V transistors capable of switching at 300GHz

 The Fraunhofer’s Millilink chip, with III-V transistors capable of switching at 300GHz
KIT’s 100Gbps wireless network is exciting for two reasons. The first is the most obvious: Yay, faster download speeds! Second, because the wireless signal is generated by a laser signal, it’s an ideal technology to tack on the end of a fiber network. For example, if you have high-speed fiber coming into a telephone exchange or mobile base station, you could then use KIT’s wireless tech to cover the last mile to your home. So far, KIT has only created a 100Gbps network over a distance of 20 meters in the lab — but last year’s 40Gbps world record was set using similar hardware over a range of one kilometer, across the rooftops of the city of Karlsruhe, Germany.
Hence most importantly, though, KIT transmitted 100Gbps using a single data stream. In the case of conventional WiFi, a single connection — between your router and laptop, for example — in reality consists of dozens of data streams, which are squeezed over the same channel with clever techniques such as multiplexing and MIMO (multiple antennae). These same techniques could be used on KIT’s 100Gbps data streams, boosting total link speed to terabits per second — or entire Blu-ray movies in just a fraction of a second. (See: Infinite-capacity wireless vortex beams carry 2.5 terabits per second.)
Both the 40Gbps and 100Gbps world record were part of the Millilink project, a project funded by the German government to bring broadband internet connections to rural and under-connected areas. The project’s entire budget was just two million euros ($2.7 million). It makes you wonder what could be done to the abysmal state of rural internet access in the US and elsewhere if we actually invested some money into it.

Chewbacca', a new Tor-based Banking Trojan Spotted by Researchers

Chewbacca', a new Tor-based Banking Trojan Spotted by Researchers


 The Activities of Cyber Criminal associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with Cyber criminals, to hide their bots and the botnet's Command-and-Control real location from the security researcher.

Security Researchers belonging to anti-virus firm Kaspersky Lab have Found a new Tor-based banking trojan, dubbed "ChewBacca" ("Trojan.Win32.Fsysna.fej") ,that steal banking credentials and hosted on a Tor .onion domain.

This protects the location of a server as well as the identity of the owner in most cases. Still there are drawbacks preventing many criminals from hosting their servers within Tor. Due to the overlay and structure, Tor is slower and timeouts are possible. Massive botnet activity may influence the whole network, as seen with Mevade, and therefore let researchers spot them more easily.

ChewBacca is not first that adopt Tor for anonymity. Recently a new Zeus Trojan variant was also found in the wild that also based on Tor network and aimed at 64-bit systems.

 Researchers did not told that how they discovered Chewbacca, or the extent to which it has spread, but they Found that the Malware is compiled with Free Pascal 2.7.1.



When malware is executed on the victim's windows system, it drops as spoolsv.exe in the startup folder and also drops a copy of Tor 0.2.3.25, which runs with a default listing on "localhost:9050". The Trojan then logs all keystrokes and sends the data back to the botnet controllers via Tor anonymity network.

The Malware also enumerates all running processes and reads their process memory. According to the Kaspersky  researchers, The Command-and-Control server is developed using LAMP, that is based on Linux, PHP, MySQL and Apache.

Chewbacca is currently not offered in public (underground) forums, like other toolkits such as Zeus. Maybe this is in development or the malware is just privately used or shared.

The botnet's Command-and-Control server login page have an image of a character (ChewBacca) from the film series Star Wars.
Cyber Criminal activity associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with online criminals, to hide their bots and the botnet's Command-and-Control real location from the security researchers

Cyber Criminal activity associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with online criminals, to hide their bots and the botnet's Command-and-Control real location from the security researchers

Wednesday, 18 December 2013

What Happens To Our Body After Drinking CocaCola?

Have you ever wondered what exactly Coca Cola is?

After 10 minutes: Ten tea spoons of sugar contained in a glass of Cola, cause devastating “strike” on the organism and the only cause, by reason of not vomiting, is the phosphoric acid which inhibits the action of sugar.

After 20 minutes: A leap of insulin levels in bloodstream occurs. The liver converts all the sugar into fat.


After 40 minutes: Ingestion of caffeine is finally completed. The eye pupils are expanding. Blood pressure rises, because the liver disposes more sugar into bloodstream. The adenosine receptors get blocked, thereby preventing drowsiness.

After 45 minutes: Body raises production of dopamine hormone, which stimulates the brain pleasure center. Heroin has the same principle of operation.

After 1 hour: Phosphoric acid binds calcium, magnesium and zinc in the gastrointestinal tract, which supercharges metabolism. Releasing of calcium through urine also rises.

After more than 1 hour: Diuretic effect of the drink enters in “the game”. The calcium, magnesium and zinc are removed out of the organism, which are a part of our bones, as well as sodium. At this time we have already become irritable or subdued. The whole quantity of water, contained in a coca cola, is removed by the urine.
Watch the video below :



If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Google Steals Microsoft’s Top Engineer

                                 image of Agüera y Arcas
Microsoft best engineer  Agüera y Arcas will be leaving microsoft and joined google . He work with microsoft since 2006, when the company acquired his Seadragon startup.

Agüera y Arcas went on to become a key software architect, helping develop and build Microsoft’s Bing Maps and the image-stitching Photosynth software. When he moves to Google he will be working on machine learning, reports The New York Times. This could prove a little annoying to Microsoft, who have also been focusing intensley on machine learning recently.

Microsoft no doubt will feel the loss of Agüera y Arcas. The announced depature was revealed only a few days after a new Photosynth preview was shipped to the web. In a statement to The New York Times, a spokesperson from Microsoft said: “he was a great colleague and we wish him the best in his future endeavors.”
It’s not very often that we see Microsoft empolyees leaving to join Google. When Google employed the former vice president, Kai-Fu Lee, Microsoft sued the company, emphasizing the strong rivalry between these two high-profile companies.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Google Glass Updated to allow users to wink and take photos

 Google Glass Updated to allow users to wink and take photos.


Google has updated its Google Glass and added a new feature to , which allows users to take a photo with a "wink of the eye".

Google  claims that this feature is  faster than the camera button or the voice action and has also the ability to do works even when the display is off.

The update to Google Glass, dubbed version XE12, also added a screen lock feature and also the ability to upload and share videos on YouTube.

Google said the wink feature of their Glass could have various other uses in the future.

"Imagine a day where you're riding in the back of a cab and you just wink at the meter to pay," it was said by a firm in Blogspot .

"You wink at a pair of shoes in a shop window and your size is shipped to your door. You wink at a cookbook recipe and the instructions appear right in front of you - hands-free, no mess, no fuss," it added.





Student made bomb threats to get out of a final exam


You like exams ? i don't know your answer is yes or no but mostly peoples don't like exams , Same happened in Harvard University .

Eldo Kim, 20-year-old was charged for sending a hoax email claiming bombs were in four buildings on the Harvard University’s main campus in Cambridge, according to CBS Boston.

On Dec. 16th 2013, University officials, president of the Harvard Crimson, received an anonymous email with a subject "Bombs placed around campus".

"shrapnel bombs placed in:science center, sever hall, emerson hall, thayer hall
2/4. guess correctly. be quick for they will go off soon." The email reads.

University immediately notified the FBI.  After investigation, FBI find out the sender used a Temporary mail service 'Guerrilla Mail' and TOR to hide his identity.

If you don't know how "Tor Browser " Be Used Check The Link Below

http://wwalert.blogspot.com/2013/12/unblock-youtube-and-other-websites-in.html

After further investigation, they University determined Kim accessed the TOR using the Harvard's university wireless network.



If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Unblock Youtube and Other Websites In Pakistan




How To Unblock Youtube And Other Websites :
                                                                                     Some friends ask me on facebook how can we unblock websites that are banned or closed in Pakistan , First of all i want to tell you that PTA banned youtube and other adult websites , A very good job by PTA .
But i want to show you how we open youtube so let's start :

1: Download Tor Browser
2:When the download finished extract it any folder and click on start "Tor Browser"




3:when it's opened wait until it's not show green onion connected



3:when it's opened wait until it's not show green onion connected
4:when it's opened install Adobe flash player and open youtube .

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Tuesday, 17 December 2013

Pakistan Block Mobiles without IMEI

Pakistan Telecommunication Authority not allowing import of cellphones/smartphones that ship without any IMEI or with fake IMEI number.

According to a report published in Dawn.com, PTA has written a letter to Federal Board of Revenue (FBR) and has asked the board to not to clear consignments of cellular phones if the importer has not obtained clearance from PTA.

Importers and manufacturers will now have to submit these specification details to the PTA to get approval under section 29 of the Pakistan Telecommunications (Re-Organisation) Act, 1996.

Pakistan Telecommunication Authority has long been working to block the sale of phones that come without IMEI.

Mobile phone manufacturers, to keep the cost low, ship phones without IMEI. This IMEI, a 14 digit unique identifier of each and every phone, is obtained by mobile phone manufacturers from GSMA against a cost.

It merits mentioning here that import of phones without IMEI is banned in various other regional markets.

Phones without IMEI numbers are usually not traceable and potentially become a threat for National Security and law and order situation in the country.

To further straighten the situation in the country, Pakistan Telecommunication Authority may block all such phones (without IMEI) that are operating in Pakistan.

This development will hamper low-cost Chinese phones, that are notorious for having no IMEI numbers.


If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Customize Backtrack : Add wallpaper change colour of terminal

Many of my friends ask me how can we change Backtrack theme, color of terminal & wallpapers. So today i will show you how we can do it very simple and easy ok let's start.
You can see the pic below we change our backtrack theme, color of terminal and wallpaper to it .























Many peoples use this Os for ethical hacking and penetration testing , If you are one of them you definitely now about this Os.
1. Right click and click on change desktop background, you will see this window.
If  you have collection of wallpapers you can add it if you don't have then don't worry google wallpapers download and then add it.
2: Customize color of terminal , So open terminal, Go to edit and click on profiles. You will see the window like this
3. Go to the color tab and you will see this window.


























4. Go to the color tab and you will see this window.
  5.Click on the text color icon and you will see this.

8. Choose your terminal color whatever you want, In my case i choose green and then finally click on OK. If you are choosing green then let me say this, after clicking on OK go to color palette and choose palette entry
In my case I've edited palette entry 11 by double clicking on it, So you can also do the same until the color has became same as shown in the screenshot. Then if you're done close everything and you will have your customize backtrack.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Steal Data With Mic And Speaker


You know that you can steal any type of data from an infected computer ??
hahaha you think that's impossible ?? hmm but it's possible as you know that nothing is impossible, computer scientist's says that it is possible .
A German researcher at Fraunhofer Institute for Communication, Information Processing, and Ergonomics, says that this malware can transmit data using inaudible sounds.
It can steal your keystrokes or confidential data using nothing more just from a normal speaker and microphone even don't need internet connection.
They often suggest don't connect the systems which has sensitive data to Internet so that cyber criminals can't reach them.
But now, It can steal from audio sounds without network connection.  So what now?! Then, Let us remove the audio devices.
The researchers has described their idea in their paper entitled "On Covert Acoustical Mesh Networks in Air".  You can find the research paper here.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com
confidential data
can transmit data using inaudible sounds.
Fraunhofer Institute for Communication, Information Processing, and Ergonomics, -

Facebook tops Google searches for UK in 2013

Facebook tops Google searches for UK in 2013

 

The FaceBook(Social Network) was the most searched-for term on Google UK in 2013. It was also the most asked "what is" question 


Google has Relased that Facebook topped its list of the most searched-for terms of 2013 in the UK.

The FaceBook(social networking) site beat the search company's own YouTube video service to the top spot. Google itself made it in to third place.

Shopping sites has proved popular with web users with eBay, Amazon and Argos all making an appearance in the top 10.

Google also noted that what questions people typed in to its search engine and from this they compiled a top "what is" list. Facebook topped this too with a substantial number of UK-based searchers who were wanting to know what the social networking site was.



The second question was, "What is love?"

Other popular "what is" topics included searches for energy, cancer and blood pressure. Perhaps reflecting economic news throughout the year "What is the minimum wage" and "What is Universal Job match" made it in to the top 10 most-asked. Universal Job match is a government-run jobs-listing site.

Explaining the position of Facebook at the top of the most searched and "what is" lists, Chris Green - an analyst at the Davies Murphy Group consultancy - said that: "Facebook has now established itself very well as a hub on the internet, making it a destination for surfers to do multiple tasks such as communications, shopping, gaming,  information gathering. and photo-sharing.

Google's Top 10 search terms

1. Facebook
2. YouTube
3. Google
4. Hotmail
5. Ebay
6. BBC News
7. Amazon
8. Daily Mail
9. Argos
10. Yahoo






 

How to Recover Linux Root Password

It's happening some time you forget your linux root password then what you do ?
Ok so today i will tell you how to recover linux root password if you using Backtrack , kaali linux or any other linux Os then this tutorial help you .

You can reset linux password by booting system in single user mode or we can call it emergency mode :D

So some stpes you have to take to reset password :

1:Select the kernel
2:You can press the "e" button to edit entry
3:Select the line which start with the key work "kernel"
4:Press the "e" key button so that you can append single user mode
5:Append the Letter "s" to the end of the kernel line
6:Press Enter button
7:Now press "b" button to boot the linux single user mode
8:When you see prompt typw "passwd" command to reset password

You need to mount at least / and other partitions:
# mount -t proc proc /proc
# mount -o remount,rw /

Change the root password, enter:
# passwd
Finally reboot system:
# sync
# reboot

My boot loader is LILO

At LILO boot loader type linux single and press [ENTER] key:
Boot: linux single
When you get the # prompt you will need to type passwd root to reset password:
# passwd
Reboot system:
# sync
# reboot

If you need any type of help in this topic comment below , if you like this post must share it & keep visiting wwalert.blogspot.com

Tom Clancy’s Splinter Cell: Blacklist PC Game (Torrent)

                   Tom Clancy’s Splinter Cell: Blacklist PC Game (Torrent)

 

 

The United States has a military presence in two thirds of the countries around the world. A group of 12 have had enough and initiate a terror ultimatum called the Blacklist – a deadly countdown of escalating terrorist attacks on US interests. Sam Fisher is the leader of the newly formed Fourth Echelon unit: a clandestine unit that answers solely to the President of the United States. Sam and his team must hunt down these terrorists by any means necessary, and stop the Blacklist countdown before it reaches zero.
Game Details
Genre: Action Adventure, Stealth
Developer: Ubisoft Toronto
Publisher: Ubisoft
Engine: LEAD Engine
Official Game Site: Tom Clancy’s Splinter Cell: Blacklist
Minimum System Requirements
OS: Windows XP/Vista/7
Processor: Intel Core 2 Duo @ 2.2 Ghz / AMD Athlon 64 X2 4800+
Memory: 2 Gb
Hard Drive: 12 Gb free
Video Memory: 512 Mb
Video Card: nVidia GeForce 8800 / ATI Radeon HD 4850
Sound Card: DirectX Compatible
DirectX: 9.0c

Recommended System Requirements
OS: Windows 7/8
Processor: Intel Core 2 Quad @ 2.4 GHz / AMD Phenom II X4 @ 2.6 GHz
Memory: 4 Gb
Hard Drive: 12 Gb free
Video Memory: 1 Gb
Video Card: nVidia GeForce GTX 260 / ATI Radeon HD 4870
Sound Card: DirectX Compatible
DirectX: 10
Download Link:

How to install:
After download is done:
- open part1 (executable file) ,
- choose location,
- click install ,
- wait until is done,
- play game.
ScreenShots:-


Monday, 16 December 2013

Pirate Bay relocates to Peru while working on ‘domain-irrelevant’ browser



The Pirate Bay has moved again, this time to a .Pe domain based in Peru. As the battle to take down the world’s largest BitTorrent site continues, the website says it is developing a new system which will make domain names completely “irrelevant.”
The .Pe domain is the file-sharing website’s third domain in just a matter of days. The website was operating under thepiratebay.sx, based in Sint Maarten, until it was seized by authorities last week, TorrentFreak reported. But just hours after the seizure, thousands of users breathed a collective sigh of relief as the website resurfaced under a new .AC domain, based in the Ascension Islands – a UK controlled territory.
But the stopover on the isolated volcanic island did not last long; The Pirate Bay set sail for safer shores on Monday, finding a new docking place in the South American republic of Peru. The website underlined earlier that its landing at thepiratebay.ac was just a temporary measure, as it feared it would soon face the same problems that it faced under Sint Maarten’s .SX domain.
The website’s operators said earlier that along with Peru, it had a number of options, for its new domain. They added, however, that they do not plan to be on the run permanently.
The website’s team is working on updating its massively popular web browser, allowing users the opportunity to store and share files without the need for central hosting and domain names, TorrentFreak reported.
Addressing Dutch anti-piracy organization BREIN “and friends,” The Pirate Bay warned that while shutting down domains may currently be an irritant, that loophole will not be open forever.
“They should wait for our new PirateBrowser, then domains will be irrelevant,” the source told TorrentFreak. “Once that is available then all links and sites will be accessible through a perfectly legal piece of browser software and the rest of it will be P2P, with no central point to attack via the legal system.”
The new system will reportedly appear as independent software and Firefox and Chrome plugins.
Meanwhile, The Pirate Bay co-founder Gottfrid Svartholm Warg, known under the alias ‘Anakata,’ is facing hacking charges. The 29-year-old has been jailed in Denmark since November, after being extradited from Sweden.
His mother, Kristina Svartholm Warg, described the conditions her son is being kept in as “torture.” In an interview with RT, she said that Svartholm Warg is denied access to books, media, and computers, and is banned from communicating with other inmates. She personally believes that her son is innocent.
Hacktivist group Anonymous launched an online campaign to protest against the prison’s treatment of Svartholm Warg, calling it “wholly unacceptable” and “inhumane.”
The group demands fair treatment of Svartholm Warg and an end to his isolation. “He is not a terrorist,” it said in a statement.
The group called on supporters to join them on Monday in a ‘tweetstorm,’ using the hashtag #Freeanakata.