Mariana's Web (part 3)


SUBMITTED BY: Guest

DATE: Aug. 4, 2015, 5:15 p.m.

FORMAT: Text only

SIZE: 5.9 kB

HITS: 624

  1. part 3: https://bitbin.it/ydXOytVd
  2. I sent some emails out to the people on the list. Half of the emails were TOR email, so they were username@tormail.net or similar.
  3. The usernames were quite varied. Just a few included:
  4. Albatross
  5. Proton
  6. P0ison
  7. Anon_Russia
  8. EXcalibre
  9. That was just five of the people I sent emails to. There must have been thirty on there, at least.
  10. Here’s a transcript of the one email I sent to all of them.
  11. Dear sir/madam,
  12. I believe you knew my uncle. He went by the online name of DeepBlue. He knew you from years ago, when he was what is called a black hat among your community.
  13. You may like to know that he became a white hat hacker and found a high paying job at Windows. Until not long ago, he was doing well for himself.
  14. Sadly, my uncle died a month ago.
  15. He left me his laptop and a piece of paper, with a file pathname on it that led me to a file. In that file were a list of usernames and email addresses. They were labelled as being his old ‘associates’. I think we both know what that means.
  16. I am sending this email out to all of those who were on the list. Most of your use TorMail, so I think I can safely assume you don’t want to be found. You’re exactly the people I need to talk to.
  17. Why have I turned to contacting you?
  18. Well, I believe my uncle’s death was no accident. I think he was investigating something and he was killed for it.
  19. I may sound cold and artificial, but believe me, on the inside I’m trying hard not to crumble.
  20. There’s the Deep Web, which I assume all of you use to stay hidden. It’s either that or personal VPNs, and VPNs cost large amounts of money. I’m going to assume you use TOR.
  21. You have probably heard of the Deep Web Level 5 rumours. Mariana’s Web, anyone?
  22. I want to prove whether it exists or not, and I know you are the people to ask. It was someone from Anonymous who started the rumour in the first place!
  23. If any of you have any information, positive or negative, proving or disproving this myth of myths, please contact me. I promise that you won’t regret it.
  24. Yours,
  25. Blue Adept
  26. Nephew to DeepBlue.
  27. So that has been sent out. I am waiting for the reply. I don’t know if I’ll even get any, but at least I’ve tried.
  28. I also sent a message to the woman who posted that badly-spelt paragraph about Mariana’s Web that intrigued me so. I wonder if she’ll get back to me? Probably not, seeing as the forum states she hasn’t been online since September of last year. That’s around five months.
  29. In other news, Apple was targeted by hackers! That was a couple of days ago.
  30. Apparently they also attacked Apple Mac computers, by exploiting a flaw in Java. Huh. We’ve known all along that Java’s a security risk, can’t you hurry up and make something better already?
  31. Oh, they try and defend themselves, saying the malware was hidden, and it spread through a site for the developers. Let’s face it, hackers and designers are locked in a never ending game. It’s Red Queen rules here, folks, running fast just to stand still. If either of them lets up for a second, the other has their head on a stick.
  32. Also in the news recently is that China are being accused of secretly running a global hacking operation. What’s this, OpChina?
  33. Seriously though, an American computer safety company called Mandiant think they’ve discovered where it’s running from, its headquarters.
  34. They’ve published a seventy four page report on it; I might have to pick one up just to see how they work. I really could use a company like that to help me in my investigation – except I’m only sixteen, and there is no way they’d work for me. I don’t have that kind of money anyway.
  35. Back to the topic.
  36. They say that ‘extensive evidence’ that they’ve allegedly collected over a period of three years is near conclusive proof that a white twelve story tower block in Shanghai is actually not offices but is home to this ‘hacking operation’ that is supposedly run by the Chinese military.
  37. For any Chinese people who ever read this – psst! It’s in Datong Road, in the Pudong district of the city, wherever that actually is.
  38. This is the best part though – Madiant claims to have done this, but articles state that ‘Mandiant was not able physically to prove that the hackers were inside the building but is convinced that they could not be anywhere else.’
  39. Of course, Madiant. Because this couldn’t just be an advertising scheme, could it? Of course not, don’t tell me – you’ve tracked down every single member of Anonymous! You’re ‘convinced they can’t be anyone else’ but you can’t prove it.
  40. Eh, they could just be V For Vendetta fans – I remember reading once where a group of fans wearing V’s Guy Fawkes mask stumbled across the Occupy Wall Street protest and were mistaken as Anonymous members – that didn’t turn out too well. Hilarious stuff.
  41. Honestly, sometimes I think they only do this so the big websites and newspapers have something to report.
  42. Just for the record, a person becomes a member of Anon by simply desiring to be one. There is no leadership, no proper structure, but they run remarkably smoothly for all that. Hence the term ‘organised chaos’.
  43. So, I’m now waiting on any replies I get before I can carry on with my investigation. This is my best lead and I’m going to use it. Even if I get no replies, I’m sure I can use them somehow to further my own research – perhaps looking up their old forums and such? I’ll probably need TOR or other proxy servers, to keep my own computer safe.
  44. Yes. It’s mine now.
  45. I miss you, uncle.
  46. part 3: https://bitbin.it/ydXOytVd

comments powered by Disqus