Do you have a story to share?

7 Min Read

Project NightHawk

In the dim corridors of my memory, there lies a chapter from my time as a software engineer working on a defense contract, a period of my life that I have to keep cloaked in shadows and silence. It’s a story that gnaws at the edges of my conscience, a relentless whisper in the stillness of the night.

23 Min Read

EBO ScientistA

The biggest thing to happen for disclosure just occurred: a scientist working for Battelle National Biodefense at Fort Detrick, Maryland just gave us details about the existence and current scientific understanding of aliens. This may be the single greatest disclosure to ever occur in our lifetime on the subject and while we are still working to vet the details, some aspects align so well with our own intimate understanding of Battelle that we are inclined to believe this to be factual and true.

2 Min Read

Government: Information Classifications

Classified information and code names have long captured our imagination, representing hidden knowledge and covert operations. In this blog post, we breakdown classified information, exploring different classification levels and intriguing code names associated with clandestine programs. Let’s unravel the mysteries and shed light on these intriguing aspects of secrecy.

9 Min Read

Lockheed Martin: Hacked!

Today a few members of our team are coming forward to the story of how they hacked into one of the most secretive and secured privately held businesses in the world. Aliens, hacking, and government secrets are all inbound and slated to release over the next weeks. We have it all, and you want proof, of course. You always put the burden of proof on us truthers, and someday we are going to take the time to tell you how one-sided and toxic this relationship is, but today we are just going to give you what you asked for. With a newly signed pact amongst our group, we have collectively decided to start sharing verifiable details on this site cautiously.

1 Min Read

Regular Expressions (“Regex”)

This is a quick explanation of a simple software term for anyone who is less inclined to read a Wikipedia explanation and prefers the explain-like-Im-five approach. Programmers rely on regular expressions (regex) to identify and parse patterns in text or other data. A regular expression allows a developer to specify a pattern and then run that pattern search over a payload and identify any matches. Most of the time, hackers use regex in the form of “grep” to find files on a computer through a console. Or when scraping websites or quickly sifting through a large amount of data.

3 Min Read

From Student to Mentor and Back

Some of the best advice I ever received was to always have a mentor throughout life. If you don’t have a mentor, then how intentional or accountable are you about seeking self-improvement and growth? I found my first business mentor at 17 working as a handyman for a successful entrepreneur, Mike. He had built his wealth over time through hard work and persistence. He had slowly worked his way up to 20 or so rental properties, and his full-time business was simply maintenance and improvement of his properties. He wasn’t content to sit on his ass and collect a check like most landlords. He believed that we can only grow if we continue to invest in ourselves. Mike taught me so much about who I wanted to be as an entrepreneur and helped me realize that I could achieve anything if I had the fortitude.

9 Min Read

Fort Ord, Gigling, and Die Glocke

Deep within the confines of Fort Ord, hidden from prying eyes, lies a mysterious facility known as “Gigling.” This secret facility played a pivotal role in the creation of many policies and tactics to control the American people in the event of existential threats. Many martial law strategies, programs such as FEMA, and alien-invasion simulations were invented at this facility. There are even rumors of secret programs and alien technology being revealed by cryptographers. Step into the shadows of Gigling and its origins with Die Glocke and learn about the hidden facility underneath the now-decommissioned base of Fort Ord.

5 Min Read

Maul the Sith Lord Hacker

In the world of hacking, labels such as black hat, grey hat, and white hat are often used to categorize hackers based on their activities. However, these terms fail to convey the true abilities and intentions of these individuals. When it comes to describing an elite hacker with malicious intent, I prefer to use the term “Sith Lords.” Among the few Sith Lords I’ve encountered, one stands out as particularly ruthless. For safety reasons, I won’t disclose his real name, but I will refer to him as Maul. Hailing from the Russian Mafia, he operates within a secretive network of brilliant minds driven by malicious intent and abundant resources. In this article, I will share my personal encounter with Maul, how I crossed paths with him, and the dangerous game that ensued.

12 Min Read

Secret Societies Hiding in Plain Sight

There are tens of thousands of embedded secrets hiding in plain sight across websites like 4chan. The deepest, darkest, and craziest shit is all ripe for picking if you’re willing to dig through the garbage of 4chan/b Random (NSFW). The average person probably wouldn’t be able to figure out WHY these secrets are posted in public and in the filth of pornographic or disturbing images, but the reasons are actually fairly trivial. By hiding messages in images ranging from revolting to illegal, hackers reduce the likelihood that some government spooks are going to browse our shit. If the requirement to decode content means staring at hardcore porn or gore for hours on end then that means the average person cannot or will not do so.

Exit mobile version