Code

You are currently browsing the archive for the Code category.

7-shirtCode6b

The government is seeking to protect itself from its own spy apparatus and stymie the public service done by agencies like CARPAleaks by conceiving ways to keep records that are ‘eyes-only.’ This move to physical record keeping is an effective stop to CARPAleaks’s ongoing requests for documents under the Freedom of Information Act.

CARPAleaks has discovered that Rob Mertens, a CARPA agent operating out of Eugene, OR, has been developing an encryption code based on pre-digital South American methods of record keeping. For centuries, Andean cultures relied on methods of tying knots or weaving information into cord or cloth. These fibrous codes confused the Spanish during colonial times and continue to prove difficult for contemporary translators.

The Quechua term khipu, which translates to English as ‘knot,’ is an example of this fiber code logic. Systems of knotted wool and cotton cords can represent numeric data as well as narrative information. The Andeans could represent quantities of food in storage for the dry season, calendar dates, or population tallies of local communities. Recently, it has been discovered that the knotted language included personal stories of the Capac Coya and cosmological myths. Although the Spanish imperialists could not translate the khipu, they understood that it was an information system ripe for use in subversive separatist activities and destroyed much of it. The Andean peoples also used textile design to represent personal or mythological information. Many of these records survived because they were dually concealed, first as functional/decorative objects and second as encrypted images.

Agent Mertens’s project, ‘Encryption Cloth,’ will be demonstrated during the CARPA recruitment event, Camp CARPA (to be held October 16-19 in Joshua Tree, CA). His presentation will display the process of weaving coded information into cloth. Demonstrating this technology for potential recruits, Agent Mertens emphasizes the innocuous uses of fiber code logic, such as weaving birthday dates and Facebook status updates. We must remember that the system has a dangerous flexibility that could also encompass data like bank account information, browser histories, and phone records. At Camp CARPA, agents and potential agents will learn to weave on light, collapsible backstrap looms that provide optimal field mobility for agents reconnoitering enemy territory.

Fiber codes are a return to an older definition of classified information, one that is controlled via a chain of custody. The craft insurgency, powered by services like CARPAleaks, cannot release information that is stored this way because, unlike digital documentation, corded and woven records cannot be infinitely replicated and released. The government co-opting of this kind of independent craft technology is cause for alarm.

To download the source files, click here: 7-plaidCode

Tags: , , ,

QuiltMap of insurgent network in Khost region 2010

QuiltMap of insurgent network in Khost region 2010

Human Terrain and Relational Infiltration Teams (HuTRITs) use social craft techniques to infiltrate, classify and trace local loyalties and tribe constellations which are otherwise hard for military commanders to decipher. HuTRITs use local craft techniques to reach deeper into the social fabric of the afghan tribes, often trying to reach working women to help out mapping out local insurgent influence stratagems.

With the help of an established coded quilt system, maps of clan networks and links to insurgents are smuggled out to the NATO forces hidden in the layout of Afghan quilts. With US artisans trained in community quilt-making, a popular aesthetic amongst artists working with “social practice”, the HuTRITs teach women the codes and the secret quilts help unveil the enemy constellations for more surgical strikes and liquidations of adversaries by SEAL teams.

Leaked quilt code manual: 5MQ-2013×2

CARPA and CIA-facilitated secret code necklace

CARPA and CIA-facilitated secret code necklace

Coco Chanel’s collaboration with the Abwehr (Nazi military intelligence), and later with the CIA, has been long known, but a leak from the Chanel workshops in Paris have revealed more about the extensive collaboration of coded messages in the famous Chanel pearl jewellery.

Probably inspired by the South American Quipus (or “talking knots”), necklace-cords which contained numeric codes in knots, the Chanel atelier established a system for encoded messages between spies through the arrangements of black and white pearls in necklaces. Coco Chanel herself (known to the Abwehr as F 7124) used her suite at the Hotel Ritz in Paris as an operations base to design these necklaces, encoding information to messengers within the secret service. After the war, Chanel quickly aligned with the US forces who initiated this method among agents, facilitated through highly secretive courses in beading by CARPA.

As is exposed in the leak, in 2011 CARPA established an alias-shop at the Chinese trading site Aliexpress.com to leak secret information from Chinese industrial workshops through counterfeit Chanel necklaces.

Click here to download the pdf of these secret files: 2CQ2013-x

Tags: , , , ,

310 patterns for military “blood-bracelets” revealed

Military allies do not only have several secret ceremonies of blood-brotherhood, but a leaked pattern shows how they also provide “ally-bracelets” (what in civil life are often peaceful friendship bracelets). These blood-bracelets are braided by members of special forces in different NATO countries during their missions in Afghanistan, often from conquered wool and ripped carpets under secret ceremonies in their bases while browsing censored sites, such as knitting forum Ravelry.com.

Blood-Bracelet 4392-32Army

 

Click here to view the pdf of these classified files: 1BB2013-a-x

For part 2 of this document torrent: 1BB2013-b-smX

Tags: , ,