DAY ONE: OCTOBER 4, 2018
October 4, 2018, marked WikiLeaks’ twelve-year anniversary and to celebrate the occasion they posted a “Quest of Random Clues” for its followers on Twitter. I’m not sure if we’re seeing another publicity move for an upcoming publication but just in case I figured I would start covering it like I did Vault 7.
So WikiLeaks first clue (above) has this long string of letters and numbers and a drawing of what is obviously a mole. And even though the first assumption might be that WikiLeaks is calling out an infiltrator, @greekemmy posted two insightful links (this and this) about the origins of WikiLeaks’ hourglass logo and the mole drawing. After reading the articles, it seemed like WikiLeaks had creatively pointed their followers in the direction of where it all began. As Emmy put it, “Back to the beginning – Happy 12th Birthday WikiLeaks, the pioneering online Library, a refuge for persecuted documents wanting to break into the light :-).”
But what about the numbers and letters? First, head over to a hexadecimal to text converter like this one and put in the WikiLeaks code. The hex to text converts to “三五七一七五六三八, 一三九五三四九二六六.” Now, put that in Google translate. You get this:
“Three five seven one seven five six three eight, one three nine five three four nine two six six”
In other words: 357175638, 1395349266. Initially I did what folks on Reddit did, used it as coordinates, and came up with Tokyo, Japan. One poster there noted that on Mapquest the coordinates pointed to Nishi Tokyo Data Center also known as the “West Tokyo Data Center” which is owned by Canon. Apparently the data center provides,
“…next-generation reliability and solutions to support the future IT infrastructure….it handles cloud services, all manners of IT and server services to major companies in Japan and from around the world.”
I didn’t check to see if that’s correct so here’s the website if you guys want to check it out yourselves.
I always think it’s important to look at what WikiLeaks (and very often other accounts) posted before or after clues so looking at October 4, 2018, they tweeted about their latest publication, “Dealmaker: Al Yousef,” a secret document about a billion dollar arms deal between French company GIAT Industries SA (renamed Nexter Systems) and the United Arab Emirates here and here.
They also discredited Lian Tech Meng’s accusations that WikiLeaks had published banking information about Anwar Ibrahim and retweeted a March 8, 2017 Speigel Online article that discussed the CIA’s “secret hacking arsenal” which was revealed in WikiLeaks’ Vault 7 publications. For those keeping track at home, March 8, 2017 was the day after WikiLeaks began “its new series of leaks on the U.S. Central Intelligence Agency. Code-named ‘Vault 7‘… the largest ever publication of confidential documents on the agency.”
Then they retweeted more than a few of their Vault 7 tweets from last year about the United States’ CIA “hacker base in Europe,” also known as the U.S. consulate in Frankfurt (see here, here, and here). WikiLeaks then addressed the allegations that “GRU hackers on diplomatic passports drove in EU to conduct WiFi attacks” on the OPCW in the Hague. They added, “Such attacks do occur. WikiLeaks revealed a giant CIA hacker base in Frankfurt…”
For a link to Dutch military slides about the alleged GRU attack go here.
And then there’s Bloomberg. In case you missed it, yesterday they published the story, “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies” in which they reported on exactly what the headline implies — the Chinese government has been spying on American companies like Apple and Amazon by implanting microchips in the supply chain. As @realKyleOlbert pointed out, “…the real threat posed by hostile state intelligence services far exceeds the overinflated, headline-making threat of whistleblowers …there’s a very clear, present danger that industrial supply chains & software pipelines are being infiltrated for state intel purposes.”
Apple, Amazon, Supermicro all denied the assertations in Bloomberg’s article. Meanwhile, China’s Ministry of Foreign Affairs took a different approach,
“China is a resolute defender of cybersecurity. It advocates for the international community to work together on tackling cybersecurity threats through dialogue on the basis of mutual respect, equality and mutual benefit.
Supply chain safety in cyberspace is an issue of common concern, and China is also a victim. China, Russia, and other member states of the Shanghai Cooperation Organization proposed an “International code of conduct for information security” to the United Nations as early as 2011. It included a pledge to ensure the supply chain security of information and communications technology products and services, in order to prevent other states from using their advantages in resources and technologies to undermine the interest of other countries. We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.” —Translated by Bloomberg News in Beijing
I’m not sure that they actually denied anything in this statement but I do appreciate them essentially calling out the United State for possibly doing the same thing. And I don’t want you to think I’m getting off track because I’m not, I promise. WikiLeaks retweeted Apple’s response to Bloomberg’s article here and then tweeted,
“While Apple and Amazon have denied BusinessWeek’s ‘China spy chips’ story, which also has other errors, such attacks do occur. For example, #Vault7 has 27 references to CIA conducted supply chain attacks.”
So, I’d say for day one we’ve got ourselves the subject matter: Spying, hacking, and Vault 7.
DAY TWO: OCTOBER 5, 2018
When I saw “Mythic Airplanes” the first thing I thought of was rendition airplanes and tweets put out previously by @AnonScan about the one that had been deployed for Edward Snowden (see also #N977GA). I might have been onto something because @BellaMagnani posted,
“Well, Shannon airport ‘played vital logistical role’ in the #CIA renditions project: [link to irishtimes.com included] They’d be ‘mythical airplanes’…See Reprieve’s ‘Renditions Inc’ [link to reprieve.org included]
But let’s back up for a moment. The reason anyone is talking about Shannon airport in Ireland is because WikiLeaks clue, “2u55fq73azn2lhzm.onion,” is a photo of Shannon Airport’s Terminal 2.
In Sara Brady’s book “Performance, Politics, and the War on Terror: ‘Whatever it Takes,'” she remarked on US-Ireland “bilateral aviation agreements” and Shannon airport,
“As we landed and began and began to taxi toward the terminal, I noticed an unmarked jet on the tarmac. Immediately my petty annoyance changed to curiosity, because Shannon is used by the US military as a stopover. Rendition flight? I wondered.”
She went on,
Shannon airport is a site of visibility and invisibility. It is located in a neutral country, Ireland, that involves itself in the war-making of another country, the United States…The US military personnel that wait in its terminal can be seen, and yet the CIA personnel, private jets, and very possibly human cargo that also land and takeoff from Shannon are most decidedly unseen.” (See ShannonWatch.org)
Truthout.org‘ called it, “Ireland’s Gateway to Torture” and all you have to do is google this stuff to see that Shannon really does work hand in hand with the U.S. government — more particularly with the CIA.
So, could this be what WikiLeaks is eluding to? A rendition plane marked for Julian Assange has landed at Shannon?
WikiLeaks put out a second clue today and I totally feel like this is something really easy that we all learned in second grade math about patterns but, yeah. No idea.
However, @greekemmy Google image searched the clue and apparently “Ted Cruz presidential campaign, 2016” showed up. Wut? When I googled it, I got meetcircle.com, an online service that helps manage parental controls and internet filtering (boooring, I think?), and circle.com, a crypto finance company.
Someone did mention that the shapes are different colors but I’m not that tech saavy to know what they’re talking about. And here’s another tweet that shows what the colors actually are (Head’s up, I cannot confirm that this is true)…
…and then somebody else mentioned more hex codes when it came to the colors.
So we have so far (maybe) clues that link to a Tokyo data center, spying, hacking, the Shannon airport, Ted Cruz, and the colors of shapes. Besides Cruz having an Irish-Italian mother, I’m lost.
UPDATE: Oh boy. It’s been about fifteen minutes since I published this and we’ve already got ourselves some updates! @AnonScan posted this tweet approximately thirty minutes ago about Apple and the China hack using microchips in the supply chain. Then they tweeted this video showing Trump boarding Air Force One with toilet paper on his shoe and yes, insert any emoji of your liking here. I don’t know if these have to do with the “Quest for Random Clues” but the second tweet did contain this code:
…with a link to M.I.A.’s “Paper Planes.” You might remember that Julian Assange posted the same video and code back on December 31, 2017.
I don’t believe that anyone has figured out what the code means so if you have any ideas, post them on Twitter.
Stay tuned (again).
UPDATE: Check out @ChateauRuby’s tweet — she posted a video showing that the circles and stars are definitely colored.
Part Two → “WikiLeaks Quest of Random Clues Days 3-4”
Disclaimer: Ten thousand more pages of disclaimers to follow.
If you were mentioned in this article because your associate(s) did or said something stupid/dishonest, that’s not a suggestion that you did or said something stupid/dishonest or that you took part in it. Of course, some may conclude on their own that you associate with stupid/dishonest individuals but that’s called having the right to an opinion. If I’ve questioned something that doesn’t make sense to me, that’s not me spinning the confusing material you’ve put out. That’s me trying to make sense out of something that doesn’t make sense. And if I’ve noted that you failed to back up your allegations that means I either missed where you posted it or you failed to back your shiz up.
If I haven’t specifically stated that I believe (my opinion) someone is associated with someone else or an event, then it means just that. I haven’t reported an association nor is there any inference of association on my part. For example, just because someone is mentioned in this article, it doesn’t mean that they’re involved or associated with everyone and everything else mentioned. If I believe that there’s an association between people and/or events, I’ll specifically report it.
If anyone mentioned in this article wants to claim that I have associated them with someone else or an event because I didn’t disclose every single person and event in the world that they are NOT associated with, that’s called gaslighting an audience and it’s absurd hogwash i.e. “They mentioned that I liked bananas but they didn’t disclose that I don’t like apples. Why are they trying to associate me with apples???” Or something similar to this lovely gem, “I did NOT give Trish the thumb drive!” in order to make their lazy audience believe that it was reported they gave Trish the thumb drive when, in fact, that was never reported, let alone inferred.
That’s some of the BS I’m talking about so try not to act like a psychiatric patient, intelligence agent, or paid cyber mercenary by doing these things. If you would like to share your story, viewpoint, or any evidence that pertains to this article, or feel strongly that something needs to be clarified or corrected (again, that actually pertains to the article), you can reach me at email@example.com with any questions or concerns.
I cannot confirm and am not confirming the legitimacy of any messages or emails in this article. Please see a doctor if sensitivity continues. If anyone asks, feel free to tell them that I work for Schoenberger, Fitzgibbon, Steven Biss, the CIA, or really just about any intelligence agency because your idiocy, ongoing defamation, and failure as a human is truly a sight to behold for the rest of us.
If I described you as a fruit basket or even a mental patient it's because that is my opinion of you, it's not a diagnosis. I'm not a psychiatrist nor should anyone take my personal opinions as some sort of clinical assessment. Contact @BellaMagnani if you want a rundown on the psych profile she ran on you.
This is an Op-ed article. The information contained in this post is for general information purposes only. While we endeavor to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information contained on the post for any purpose. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site.
The views or opinions represented in this blog do not represent those of people, institutions or organizations that the owner may or may not be associated with in professional or personal capacity, unless explicitly stated. Any views or opinions are not intended to malign any religion, ethnic group, club, organization, company, or individual.
The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information.