Cicada 3301 Secret Rooms Quantum Encryption & Liber Primus

12yim

Uzman üye
18 Ağu 2019
1,119
16
türkiye
3301 Secret Intelligence Room
Shut that door, All the secrets hidden inside GCHQ's Room C3301 was accidentally revealed. in 2007 . Supposedly hidden , members only website called Room C3301 run by old retired GCHQ comrades, after they had provided a link to my own Secret Bases site. Strange but true. The "Room C3301" website is devoted to the former GCHQ employees' WJCAG club and carries the pre-2002 version of the official GCHQ crest. The website's main page was called The Hatch. This is a clear reference to special ******** transfer windows in security doors separating wireless operator rooms from cipher rooms – as found, for example, in the famous Cold War spy station at Teufelsberg in West Berlin, Germany.


This place had a bunch of top secret stuff like incinerator's, paper shredders, top of the line high tech 1 way lock screws, tamper-evident seals on doors, even Pressurized Pipes with Cables leading to the cipher machines.
116.jpg
These are monomode fibre cables, secured in pressure pipes. If you wish to tap the fibre you need to open the pipe which in turn leads to a pressure alarm. C3301 room was located under a rather huge white phallus.
44.jpg
Things like this was their "motivational" things on the walls- "LEAD FOLLOW OR GET THE HELL OUT"
5.jpg

The tech support could be reached at 6666. If you ever wanted to meet a NSA / INSCOM BOFH...
11.jpg

More things included inside:

Shadow Watch rooms
The rooms behind that door are a bit wet and have raised ceilings. Either they have been retrofitted as computer rooms or the MP was running some surveillance gear here to maintain communication discipline.
6.jpg
Thick bullet proof glass door
The entrance from the main analysts / computing building to the tower building. Thickness of doors and glass is stunning, this was apparently meant to stop armed intruders.

Arctic Tower
Set of mechanical workbench places, each with pressured air outlet for the tools. Apparently they manufactured electronics and antenna there for R&D in the interception field. The Field Station Berlin won several decorations for new methods and findings, so these activities were probably an important part of the work done here.

Tower dome
Renewed in 1999 to house a airspace control radar. The US left in 1992.

Airspace control
Radar of the german government in the tower after the US troops left the Teufelsberg. This explains the new installations performed on the top of the tower as well as the new radome
108.jpg
Cipher room
********s could be handed into the cipher room . Note the "you can only look through straight"-constuction. Straight onto the blend wall

Climate control equipment chambers
Empty packaging of Warp Core spares

JAMBALAYA and was apparently used for special research projects. Indications are that a bunker is beneath the tower, but we could not find an entrance so far. The floor of the tower looks like relatively fresh concrete, so it is very well possible that the entrance to the bunker was permanently sealed when the NSA left.

UKC1000
One part of the Databasing program used in Echelon was the UKC1000. It was a wiretap and telex / fax / email intercept facility . It allegedly incorporates an Echelon Dictionary computer system up on the 4th Floor to scan for "hot" keywords. The rear vehicle entrance – shared with the Ministry of Justice's Clive House on Petty France – can be found around the corner on Vandon Street, next door to British Transport Police's (BTP) garage for emergency response vehicles. The "Government Offices" at 6-8 Palmer Street, near Buckingham Palace in Central London, tucked-in between St. James's Park tube station, a Starbucks Coffee Shop and the Adam & Eve pub.

Teufelsberg
The NSA Field Station Berlin Teufelsberg was one of the premier listening posts of the cold war. Situated on top of the highest elevation in West Berlin - the Teufelsberg, the station had unobstructed reception of signals from all directions. And viewed from West Berlin, in all directions was "East". Situated on an artificial hill near a string of lakes, the Teufelsberg enjoyed excellent reception in most radio bands that were otherwise difficult to receive at long distances. The NSA got so far in their search for better reception, that they prolonged the operation of a flywheel that was accidentally found to be a excellent resonator for certain radar installations deep in the east.

The station was situated in the British sector of West Berlin, so the US services were technically a guest there. Given the intense collaboration of the British and american intelligence agencies, this was only a technicality. The British armed forces had one own building on the hill and a very high ****l grid antenna tower (removed around 1992) for their collection antennas. How the collection and analysis efforts were shared between the two operating countries is currently not entirely clear. Obvious is the common operation of auxiliary services like power, heating, sewer, dining facility etc.. A fascinating difference between the US and British complex on the hill is that the British had three different types of toilets: ladies, normal men and officers. The US forces had to live with just the normal two toilet varieties.

INSCOM
The US operation on the Teufelsberg has been managed in the last years of its existence by the US Army Intelligence and Security Command INSCOM. The NSA itself had analysts, researchers and linguists based on the Teufelsberg, in different numbers over time. Detachments from other services, like the Air Force, were assigned to a number of missions, like finding ways to subvert the air defense forces of the East in case of a hot war. The Field Station contained all kinds of ELINT and SIGINT equipment, the biggest known pieces were the 40 feet (12 meter) fully rotable down to below horizon dish antennas inside the radomes left and right of the main tower. The directional microwave link networks inside East Germany were probably recorded completely, as they all converged in East Berlin and had considerable beam width and side lobes and could therefore be easily intercepted with the kind of resources installed on the Teufelsberg. New types of air defense radars could be analyzed in detail as well as satellite transmissions and radio communications intercepted and analysed. It is known that the wireless communication systems in West Berlin were also on tap, in addition to the monitoring of the wire based communication under Allied Law performed in other installations like the one in Mariendorf. Rumor has it that even relatively small radio based room bugs installed somewhere in Berlin, were receivable with the enormous antenna systems.

WJCAG 3301 Code
WJCAG One can only hazard a guess at the old W and J Divisions of GCHQ's Cryptanalysis Group, where J was in charge of SIGINT (Signals Intelligence) interception and "W" was responsible for final delivery of SIGINT "product" to "consumer". The main website portal originally invited you to type in the "secret" code number (3301) of the Room, in order to access the supposedly "private" WJCAG club members' area. However, within a matter of seconds, a simple Google search on "WJCAG" got me the individual "hidden" page that members were redirected to upon entering the correct pass code. How hilariously ironic that cracking the GCHQ code was so easy. Not surprisingly, the code was hurriedly changed a few days later and the link to my site was removed, but I'd already made a copy of the contents.

H Cryptanalysis – Code-Breaking. Still the most important element within the UKUSA Accord, provides some 75% of Britain's take for NSA. Works closely with X Computer Services
X Computer services – Computers. Operates the agency's highly developed supercomputers
S Statistical Operations – Traffic Analysis. Source, destination, priority and frequency.
J Special SIGINT - Interception - Formerly SovBloc intercepts. Compiles user reports.
K General SIGINT - Interception - ROW. Compiles user reports. First sections specializing in Counter-Terrorism established in early 1980’s. K20 Special Unit monitors Radical Groups or Individuals ‘within’ Britain.
U Search Technology – LRTS Long Range Technical Search. Developing means of ********.
W Communications Division – Delivery of SIGINT to final consumer.
Z Requirements & Liaison - Coordinates coverage for domestic customers including SIS, MI5, MOD, FCO, Treasury, Bank of England, DTI, Customs and Excise, MPSB and NCIS. Liaison with NSA and other SIGINT partners
C Overseas staff,
E Personnel,
F Finance and Supply,
G Management and General,
M Mechanical engineering,
Q Technical
R Security

USMC-MOS codes:
3301 Programmer, Computer RCA
3301 Computer Operator RCA

Inside SIGNIT
Pine Gap military base near Alice Springs is a Joint Australian-U.S. facility monitors communications on four continents. It provides missile defence and warning and targeting for air and drone strikes and uses 14 antenna protected by their widely-recognised golf ball-like randomes with Computer system takes up 20,000sqm - size of the Melbourne Cricket Ground. Six protesters dodged jail for sneaking in .

TEMPEST
Many interpretations, but the most widely accepted one is "Telecommunications Electronics Material Protected from Emanating Spurious Transmissions". It refers to the measures that need to be put in place to counter the interception of electromagnetic radiation being emitted from everyday apparatus such as hard drives, printers, fax machines, computer monitors and so on.

These emissions can be intercepted by covert agents and used to spy on an individual or organisation. For example, the radiation fields surrounding a seemingly innocuous CRT display may be picked up by rogue operatives, the signals demodulated and then, amazingly, the data that was originally displayed on the computer monitor can be pieced back together again.

Surely, you think, corporations and governments must be aware of this. But if so, what are they doing about it? The race is on to develop materials and equipment to counter this electronic surveillance activity. The methods may involve modifying power supplies and cables and shielding rooms and even whole buildings against "TEMPEST" attack.

QinetiQ Aquila
Closed down in the early 2000's and was earmarked for development into a prime ******** for over 200 houses (below), as the main train line into central London lies next door. Indeed that train track, with its high voltage third rail, caused many a headache for the Aquila scientists, playing havoc with their equipment. The site, which had been in MoD use since 1946, has been abandoned for some time but fear not, Getmapping's aerial photo of the site (also below) was shot in Summer 2002, before the bulldozers were called in. Aquila' is the Latin word for 'eagle' and in Greek Mythology, Aquila was the beloved bird of the God Zeus, entrusted with bearing his weapons of choice, the thunderbolts.

Tell me what some people of the World think about Cicada 3301?
Some of the wildest conspiracies about Cicada 3301 is going to be uncovered today. One guy states "Some russian guy named "bob" solved it. This iteration of puzzles was pretty easy compared to previous ones. There were bunch of irrelevant references to some fags from the past. The most important thing was a message about singularity, The new species are emerging. Evolution is no longer guided by survival. It is now guided by will. The future is our to choose and the singularity is approaching. Myriad choices will be made, and the utopia will unsurp the world as neurons are designed to something new" We don'y really know much by judging by these anonymous wanna be hipsters.

Can you Verify PGP?
I cannot verify the credibility of the following piece but there you’ll find some information about the mysterious Cicada 3301. This whole thing has the stink of fake YouTube drama but usually one can surmise what’s really going on behind the fake show.

How do you guys know its a real thing?
It is a real thing conceived by some creepy ass group with a shit ton of money and really occult undertone ( cicada occult , Google it) There were clues popping up in a different bunch of countries simultaneously, there were some spooky ass report about some guys "disappearing" after solving some parts of it and houses burning down (anecdotal but I wouldn't dismiss it ) You don't have to be a a genius to realize it's a recruitment scene to grab the absolute IQ elite and place them in their ranks. Whether it's some sector of the deepstate, intelligence services or satanic elite group IDC, but the whole thing is creepy as fuck/ So we can literally track them by searching who is most interesting now into IPFS protocol?

What is this IPFS protocol?
It sounds good doesn't it? Well yeah I didn't say that Cicada is their prank but this would be first place to search. I meet on their side info about IPFS as this is a protocol which can replace in future a http: https://ipfs.io/ It's works like torrent, not depending from one server. You download files/read website from a lot of users and giving access to 10 others files. This method of file distribution is faster/more secured (no DDos attacks) but only if a lot of people use that. Anyway if would be a some internet fighter for freedom I would be interested in that in first place.

So you think it is about a freedom hacker thing?
They are reaching peak cyberwarfare; cicada may very well be guerrillas. It isn't really a puzzle really rather It's just the nature of the state of being. These things are like Nazis emerging from Antarctica in space ships within the storm and the the fluuds.

What is the whole point of this?
Over complicated ass puzzle solution of which depends on a number of tedious technical actions and knowing a whole bunch of obscure useless facts taking out of any context and they wait til a bunch of super erudite guys solve it, then tell them they are in but they need to pay membership fee the chances are the guys who are this learned and have so much free time are quite wealthy too. So they use their money to fund subversive anti-globalist activity around the world, they expand our influence then overthrow Illuminati and look who has the PROFIT from lainchan.

What the hell is a Lainchan?
It is a other imageboard which is focusing on programming, cryptography, cyberpunk and other similar shit. If you watched serial experimental lain you know the shit. Mainly occupied by russians and americans. They are so interested in security that they create own application to making stenography pictures that is images with codded info inside. I wrote that not because I have any clue what they are, but I don't miss occasion to kick some wannabe-occult-kids asses, and in this site surf so many autistic guys who can read my clues and find something useful.

Have these puzzles actually revealed anything you couldn't google?
No not really. Just look at Cicada wiki. They had some more esoteric than average references in their puzzles. that's all. their occult agenda is clearly very important to them. Various forms of art encode a LOT of imagery and symbolism, and it's actually important to be able to recognize the symbols to get the whole meaning of a picture. It's great to be able to mathematically decipher messages, but you can reach more creative, well-read, or experienced people by using references rather than just numbers.

Cicada-wikia
We're not going to spoonfeed someone who is endlessly skeptical about something he hasn't even looked into. i find instantly argumentative "rational thinkers" to be extremely bluepilled wastes of time and energy.

What are they recruiting?
Could be recruiting for corporate spying, and amass of other cyberwarriors. You can find a lot of info about corporate spying online from presentations and things from security professionals. You don't need to be an internet sleuth to be a corporate spy, you just need to dig through some trash or pretend to be someone you're not. They aren't going to universities probably because those who have those skills and the commitment spend most of their time on websites such as 4chan and twitter.

This is 5th grade-level cryptography. I'm not saying they they have more sophisticated puzzles, they probably do. What I'm saying is that the cutting edge of this field wouldn't be bothering with stuff like that. Apex Augist , CyberSec guys, elite IT guys, cryptofags tried to solve it and couldn't. Probably because it was contingent on making the right tenuous connection between wikipedia articles of mythological figures. Which is why it would be a shitty way of recruiting people with actual expertise. As always some russki solved it , apparently but don't know what happened to him since probably got blackbagged and framed for child porn is the story.

What people do they look for?
Like really special ones, they have a fascination with bright people, but you wouldn't want well-read people. You'd want mathematically skilled people that are trained in recognizing the hard and fast rules of the trade. Look into the stories of famous espionage uncovered in recent history. It's dead drops, microdots, code words in public radio. It's not obscure references to children's books but they want kid's that studied the occult and more.

There are plenty of unsolved math, statistics, and encryption problems that bounce around universities and experts. There's no reason to have a long, drawn out test with reversed audio messages and ridiculous mythology references when you could assess someone's capability with trials that would be far easier to set up and disseminate to the eligible populations

Whats Creepier?
The more you look into it the creepier it gets that is because it's meant to be creepy, not productive. This stuff isn't creepy in reality. It's just like any other professional environment. Cicada seems to be mostly automated and few people ever make it to the stages where they're contacted. They have bypassed natural selection to a large degree.

However as a symptom, they are left with the extreme ends of our species surviving, when in a natural hunter gatherer society they would have perished. This is one reason for such a massive influx in mental disorders. Not only would we have never come into contact with such large doses of things like xenoestrogens, people that acted extremely oddly would have been cast out of groups.

Shouldn't they band together?
These people find comfort banding together, and it is becoming an obvious problem for society as a whole as well as humanity in the long run. Our saving grace may actually be genetic manipulation behind the scenes. To weed out the worst aspects of humanity while bolstering the things that benefit us. We have to be careful however. One mistake could leave us as a race in some sort of genetic pot hole. Interesting that people refer to entities such as the typical grey alien as possible beings from our future, travelling back to collect DNA in order to make changes they can no longer process in their own time and space.

Why is it called Cicada?
The reason it's called cicada is because cicadas hum with your vibration frequency and it's an observable feature of nature reacting with the human consciousness on a "normal" physical sense that is more than physical connection. That's probably why it's called cicada, because it might've been one of the first time's it was observed. The numbers are a self-walking God. You want to hear your own cicada, tuned into seven. 3- Christ 3- Christ 01- identity The identity of Christ listening to it's own frequency would allow you know... Magic! You just take a bunch of Christians that are smarter than every atheist in STEM and they're releasing secret codes to help certain individuals find out the true meaning of god but really it mostly sounds like a bunch of nerds acting out Da Vinci Code fan fiction.
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.