>Hostage from the hijacked airplane leaves a picture, supposedly created by voice commands on the iPhone 5, with Exif data and coordinates from the actual location of where the
How possible is all this from a technical perspective? Please discuss the technical aspects, exif data, iphone commands, and all the other stuff investigated by the man in the beforeitsnews.com link.
Supposedly the coordinates on the exif data cannot be faked as it is put there through machine language...
>from the actual location where the people are being hostage. Supposedly drugged and kept in a dark room
sorry forgot to complete the sentence. the beforeitsnews.com guy seems to have done all his homework, the guys real name and job are true, he was on the airplane, etc.
These sort of news stories are fabricated and designed to see what the reaction is by different online communities.
You're engaging in a psychological warfare study without even knowing it if you participate in online discussions or "search for wreckage" by browsing pre fabricated satellite images. This is all done to see how media is disseminated through web communities and how media manipulation affects certain demographics.
tldr; sage for bullshit
>exif can’t be rewritten with common software, it can only be either completely removed or added to on some of the lines, such as image credits, with some applications and that photos with the exif intact will hold up in court because the other data fields cannot be edited, they can only be erased.. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.
>I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google or anything else on the web says, because it proves that the source of those coordinates did not come from google or another web site, they really did come from the imaging device and prove that it was in fact taking the photo in Diego Garcia.
>If anything was used to re-tag this image, it would say so in the software tag of the image. Any time software modifies any aspect of the image, the last thing to touch the image gets put in the software tag. The Iphone’s standard software is in the image tag and nothing else. That means this image has NOT been re-tagged and that is the FIRST THING I checked before posting this story. And NO, YOU CANNOT MODIFY IT WITH A PROGRAMMING EDITOR UNLESS YOU ARE A MACHINE LANGUAGE GENIUS. Open notepad (which is a basic programming editor). Drag the photo into notepad. it will open as code. The Exif is all machine code. This is the NSA type hack I talked about, unless the NSA or a serious hacker wanted to do this, the photo is legit. And the surrounding circumstances also show this story to be legit.
Turn off your 4chan enhancer scripts. If you reload the captcha too quickly (for example opening many threads simultaneously) you will get the difficult to solve captcha because Google assumes you're a bot.
what are you trying to prove here? this has no exif
and neither does this
inb4 this whole story is a GNAA troll
I pushed the lightness of this pic to 100 in gimp to see the differences in colors. I found... fucking nothing.
This isn't news, and exif data CAN be fakes.
Anything that the computer can put on, YOUR computer can put on.
This is all made up
>Coords aren't exactly the same as what's on google
So they looked on google and they slightly changed the numbers. All this shows is that this ruse was well-thought-out.
EXIF data can be easily modified with exiftool. http://www.independent.co.uk/news/world/asia/missing-malaysia-airlines-flight-mh370-daddy-went-away-and-he-got-lost--relatives-of-the-239-passengers-speak-of-their-anguish-9194845.html This article was written 3 days before the shitpost.
tux@oniichan:~/Downloads/Images$ exif 1395192158752.jpg
EXIF tags in '1395192158752.jpg' ('Motorola' byte order):
Model |iPhone 5
Resolution Unit |Inch
Date and Time |2014:03:18 21:08:34
YCbCr Positioning |Centred
Exposure Time |1/15 sec.
Exposure Program |Normal programme
ISO Speed Ratings |3200
Exif Version |Exif Version 2.21
Date and Time (Origi|2014:03:18 20:49:41
Date and Time (Digit|2014:03:18 20:49:41
Components Configura|Y Cb Cr -
Shutter Speed |3.91 EV (1/15 sec.)
Aperture |2.53 EV (f/2.4)
Brightness |-8.47 EV (0.01 cd/m^2)
Metering Mode |Pattern
Flash |Flash did not fire, compulsory flash mode
Focal Length |4.1 mm
Subject Area |Within rectangle (width 1795, height 1077) around (x,y) =
Sub-second Time (Ori|921
Sub-second Time (Dig|921
FlashPixVersion |FlashPix Version 1.0
Colour Space |sRGB
Pixel X Dimension |240
Pixel Y Dimension |320
Sensing Method |One-chip colour area sensor
Scene Type |Directly photographed
Exposure Mode |Auto exposure
White Balance |Auto white balance
Focal Length in 35mm|66
Scene Capture Type |Standard
Image Unique ID |412f1198c985b43b2eced4067e9360d0
GPS Tag Version |18.104.22.168
North or South Latit|S
Latitude | 7, 18, 58.308907
East or West Longitu|E
Longitude |72, 25, 35.5591
Altitude Reference |Sea level
Reposting from /pol/ thread
>Plane getting terroristed
>Stand up pull pants down and bend over people sitting next to you
>Insert your Iphone 5 into your rectum
>Terrorists land plane and bag your head
>Hands remain unrestrained and you are also unrestrained and thus able to reach inside your anus to remove your Iphone 5
>Then proceed to give siri instructions to open the web browser and navigate to /pol/
When using modern dictation software it follows basic grammatical rules, like capitalization which isn't seen on the subject line for the word "help". A human error. He couldn't have directed siri to tab to individual entry fields and then the submit button. He would need a 4chan pass or use the audio captcha. And also hit "choose file" and select the latest photo he took.
I spy, I spy with my little eye some data in the bottom right corner
i think what the guy is saying is this:
you cannot just edit one little part of the exif (the coordinates). you literally have to add every single part of the exif back on from scratch and the exif of the original image is clearly a legitimate iphone 5 exif with tons of data. im not exactly sure what he means about machine code, needing to hack it, etc. though. doesnt anyone at least understand what he means by this stuff?
How about this? It still has all the IDs and shit, just the GPS changed.
Okay so the exif may not be edited, but why can't it just be some funny anon on holiday in the Indian Ocean pranking pol?
If you were held hostage then I doubt you'd contact /pol/. You'd update your facebook status or something. I don't even think it's possible to navigate to /pol/ using Siri, let alone fill in the captcha and file.
It's complete and utter bullshit.
pretty good. you missed the "Flash did not fire" section and why couldnt you get the GPS coordinates to be the same? we are making progress here. screen shot of what youre using too please?
>you missed the "Flash did not fire" section
The original flash didn't fire either. I changed nothing but the GPS data.
>why couldnt you get the GPS coordinates to be the same?
What do you mean? What's the point? I could just post the original picture then.
>screen shot of what youre using too please?
>he should have been able to turn the flash on and take a picture of the room.
Like I said, some people have that turned off by default. I doubt the guy would've wanted to risk blowing his cover by turning on flash in a room that may have cameras.
Here's the image from the article. 2 minutes in a Hex editor and the camera manufacturer becomes Orange instead of Apple, the same can be done to any other field. The author of the article obviously doesn't know, what he's talking about.
>The original flash didn't fire either. I changed nothing but the GPS data.
yea but it actually details this fact in the exif data. the point is to clone the exif data, no?
>What do you mean? What's the point? I could just post the original picture then.
to show that every single thing can be cloned...
well it is definitely true of /lit/ and /sci/, that i know for sure
Battery life of a cell phone in "lock" mode is pretty long. The main power consumers are the backlight and screen in a phone. I'd recon that it'd last over a month if the phone is turned off.
Dear god. I really hope most of you aren't American.
I don't know how I can go on knowing my countrymen think that exif is some magical read-only "machine language" that's beyond normal comprehension.
so are you unable to add the "flash did not fire" section and the proper gps coordinates or something along with all the other cloned iphone 5 exif data?
keep your filler to yourself
It still says that flash did not fire, I'm not sure why it's not in the exif data section. I can't be bothered with that. Just use a hex editor or something if you care that much about it.
and thats exactly the point the guy in the article was making. you cant fake it all without getting deep into the underlying machine code. thanks for the confirmation.
Should have ended here.
Machine language is directly executed by the cpu. That's why it's called machine language.
Exif is just text, and a pretty simple standard without encryption at that. It's as hard to edit Exif data as it is to edit html comments. editing exif data leaves no sort of fingerprint. That doesn't even make sense. The data is not signed.
UPDATE: MAIN SITE AT www.jimstonefreelance.com HAS BEEN EXTENSIVELY HACKED, WITH GROTESQE PICTURES INSERTED VIA DNS RE-DIRECT. THIS CAN ONLY HAPPEN VIA DNS RE-DIRECT WHICH CONFIRMS THE NSA IS DOING IT, FROM MY END THE SITE IS PERFECTLY NORMAL AND CONTAINS THE ABOVE INFORMATION AS IT APPEARS ABOVE. BEFOREITSNEWS IS BIG ENOUGH TO ENFORCE THE TRUTH AND PROVIDE AN ANCHOR, AND I THANK THEM VERY MUCH.
why is he yelling?
Why does the site look like a 5 year old designed it?
Why does everything on that site look cheap?
/pol/ says it is disinfo but i haven't been that interested in this whole plane fiasco.
well you did manage to include the flash section this time, but for some reason it is out of order from the one supposedly created by the iphone 5 which might mean it was not created with exiftool. also missing a few other fields and the proper GPS. anyway it looks like its perfectly possible to fake this shit although he has some other reasons why he doesnt think so.
In the end, Zuckerberg is some sort of a nice guy.
>Exif is just text
Well, actually exif is mostly binary. So yeah, it's a little harder to edit than html.
I simply overwrote some other tag with a flash one, because tbh I don't know exactly how exif works, how to add a new tag and I have better things to do than reading that shit up. It's definitely possible to copy and change exif data though.
He has no good reason to.
He repeatedly showcased his ignorance. He had no idea what exif is. It would be absolutely idiotic to take his thoughts seriously on a specification he has made no effort to understand.
youre exaggerating. he may not be an expert but what hes saying would seem legit to a layman. using exiftool and command line arguments would seem "hackerish" to a person like him, which is what he claimed. still, no one has cloned the exact thing yet, so dont be so fool of yourself.
Here you go, you dumb piece of shit. Original picture, new coordinates. Even with flash and everything.
>using exiftool and command line arguments would seem "hackerish" to a person like him, which is what he claimed. still, no one has cloned the exact thing yet, so dont be so fool of yourself.
You seem to confuse me with someone else. I never said that this is "hackerish" or even complicated.
the guy in the article said only "hackers" could do this because all the more simple programs that do so with GUIs and such leave their markings on them or dont give you full access to all fields, etc. etc.
I'm not exaggerating.
For anybody who has any idea about how software works, referring to exif as machine language is a very extreme level of ignorance. like referring to the pistons of a motor as "special carburetors".
If it's true it begs three questions -
1. It means that poor dude is still there, and he is wondering why the fuck nobody has come to help
2. How did he fit an iPhone 5 in his ass (or did he just mean between the cheeks?)
3. Why would he post it on /pol/ exactly?
>who the hell would ever call something a special carburetor?
An ignorant Person talking entirely out of their ass about something they don't understand. which is the analogy.
>1. It means that poor dude is still there, and he is wondering why the fuck nobody has come to help
He posted it on 4chan
>2. How did he fit an iPhone 5 in his ass (or did he just mean between the cheeks?)
>3. Why would he post it on /pol/ exactly?
4chan user... No family, no friends
he didnt refer to exif as machine language, he said in order to get a legitimate clone, you would need to do some "hackerish" editing such as opening it in a text file and altering the machine code or be really good at "hackerish" stuff (because the GUI apps hes familiar with do not have full functionality). hes clearly ignorant but so are you; ignorant of what exactly he said. so before posting excitedly next time to prove what an "expert" you are, try reading the links next time.
>using a mac to do real-people work
If you check the exif data using a REAL tool, you'd find that the picture here:
was "made" on 2001/09/11 and has GPS coords at the location of the White House.
2.31 inches (58.6 mm) in an anus?
the message said he stuffed it up his ass. i don't see how stuffing something up one's ass would simply be 'wedging it between your butt cheeks'
fine you beat me to that hahhahahahaha
This is the very last time I'm replying to you
Read this. If you still don't understand how wrong you are, I have bad news for you.You're just fucking retarded.
The guy who made this elaborate troll must be fucking laughing his ass off right now.
By the way, an iPhone 5 would have run out of batteries within days... this was posted like a week+ after it went missing
The guy doesn't even into screenshot. How the hell will he know anything about exif?