Briefing

Operation Hammer Time
The scavenger hunt lead to USB flash drives containing an introduction video. This welcomes players to "Operation Hammer Time".

Towards the end of the video, within the final few seconds the characters 62 61 73 65 70 6C 61 74 65 20 77 61 72 70 69 67 flashed on the screen.

This Hex code converts to "baseplate warpig"

These were the login details for accessing the operationhammertime.co.za website

After logging in users were presented with the Mission Overview:

Status:                 Active
Below the overview players were briefed on the situation. Encrypted communications containing sensitive information was leaked through http://www.ufosightings.co.za/

The file which lead to this alert was included on the page under the Intel heading.

The mission objective is listed as data analysis.

Players download the file "recovered-1242.rtf" and discover some seemingly random characters. They soon discover the characters were actually encoded using the base64 encryption scheme. It was then pretty easy to use any online base64 decoder to display the true text value.

Mission Update: 3 August 2014
URL: http://www.chupacabra.co.za/

Visiting this site displayed the image of a chupacabra, while hovering over the image the words "find me" were displayed.

using select all then revealed a hidden link which once clicked prompted players for a username & password.

The user name and password combination was then used on the site to access a private chat system. Players are only able catch the tail end of the conversation but manage to discover a telephone number.

Mission Update: 5 August 2014
URL Activity: chupacabra.co.za

The text behind the encoded data in "recovered-1242.rtf" is a username and passowrd

No further intel was able to be retrieved. The number recovered was +27 87 702 0000 [Still Active]

Calling the number refers to a particular directory (658) on the ufosightings website. As the initial information leaked through the same site it has now been confirmed that ufosightings.co.za is involved.

Directory: http://www.ufosightings.co.za/658/

Mission Update: 6 August 2014
URL Activity: ufosightings.co.za

The recovered link was being closely monitored and a new updated file was uploaded.

Directory: http://www.ufosightings.co.za/658/

It is also implied that the URL: http://baalbeck.co.za is involved as clicking on one of the files links to the site.