Wikileaks just issued several THREATENING Tweets, "Attention John Kerry" (Secretary of State) calling each Tweet a "Pre-Commitment" with what appear to be Digital Hashtags. (As shown above) Update 9:19 PM I just spoke to the Ecuadorian Embassy in London (see bottom)
A digital Hashtag is used to identify a file or set of files to make certain it is original and has not been altered. If someone was to alter the file or set of files, the alteration, however minor, would alter the Digital Hashtag forever.
The second Tweet:
For Wikileaks to have posted three Tweets containing Digital Hashtags addressed to John Kerry is extremely ominous . . . perhaps even for Secretary Kerry.
There is widespread speculation that the files "will be the political end of someone . . . or many someone's . . . " and apparently, Kerry knows what the hashtags mean. The first is said to be directly
There is also widespread speculation that something may be "up" with a possible US government action against Wikileaks, and they are showing the US they "have the goods" to protect themselves.
The Tweets make reference to very specific things. The first Tweet, references John Kerry. The second Tweet references Ecuador. The third Tweet references UK FCO (United Kingdom, Foreign and Commonwealth Office)
The third Tweet"
With regard to the meaning of "pre-commitment" we offer the following guidance:
"Precommitment is a strategy in which a party to a conflict uses a commitment device to strengthen its position by cutting off some of its options to make its threats more credible. Any party employing a Strategy of Deterrence faces the problem that retaliating against an attack may ultimately result in significant damage to their own side. If this damage is significant enough, then the opponent may take the view that such retaliation would be irrational, and therefore, that the threat lacks credibility, and hence, it ceases to be an effective deterrent. Precommitment improves the credibility of a threat, either by imposing significant penalties on the threatening party for not following through, or, by making it impossible to not respond."
"In cryptography, a commitment scheme allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later. Commitment schemes are designed so that a party cannot change the value or statement after they have committed to it: that is, commitment schemes are binding. Commitment schemes have important applications in a number of cryptographic protocols including secure coin flipping, zero-knowledge proofs, and secure computation.
A way to visualize a commitment scheme is to think of a sender as putting a message in a locked box, and giving the box to a receiver. The message in the box is hidden from the receiver, who cannot open the lock themselves. Since the receiver has the box, the message inside cannot be changed—merely revealed if the sender chooses to give them the key at some later time."
The unique sets of numbers previously thought to be Hashtags are NOT! They are DECRYPTION KEYS for certain files; passwords if you will. This means that Wikileaks has just given the entire planet the decryption keys for three sets of files, 1 on John Kerry, 1 on Ecuador and a third on the UK Foreign and Commonwealth Office (FCO).
This is a "dead man's switch" . . . it means that Wikileaks - or its Editor Julian Assange - are in direct danger ---- or Assange may be dead.
By issuing these decryption keys, they are announcing that the files are already distributed and the world will be told WHERE to find those files if someone dies. Once the world is told WHERE to download those files, the decryption keys can be used by literally ANYONE to get all the deep secrets inside.
If it is a dead-man's switch, then Julian Assange may already be dead or in custody. The release of the Encryption passwords would be PART OF the Dead Man's switch. We'll explain:
The decryption keys are an automated message in the case of someone like Assange being unable to regularly prove he's alive and well. It's usually set up where they must log in somewhere at a preset interval, say, once a day. This prevents the triggering of the switch.
If something happens to them, the system automatically sends out codes to encrypted files already in the hands of friends, the press, other governments, etc. In this case, if it is a dead-man's switch, the system did not receive the regular log-in and used Assange's Twitter credentials to send out the decryption codes. The proof will be if we see Assange again, or hear that he's dead/hospitalized/captured.
Otherwise, he could just be prepping for someone else to release the next batch of leaks. We're pretty sure there are powers who are trying to cut off his access to the internet. They may have done so and the automated Dead Man's Switch has begun its task.
If that's the case . . . . if Assange is dead or in custody . . . . then the Dead Man's Switch will continue its automated processing and, ultimately reveal to the world what Wikileaks has - thus doing severe harm to . . . somebody . . . .
I just spoke with the Ecuadorian Embassy in London. A man who identified himself only as a Security Guard answered the Press Office telephone. I idnetified myself and he told me he is not allowed to speak to the Press, that I would have to call back in the morning. SO I asked simply "Is Julian Assange still there?"
He replied "That is confidential information, I am not allowed to speak with you." A strange reply since the entire world knows he's been there for five years.
RUMINT: A low level intelligence guy (NOT CIA) has said the Obama Administration strong-armed Ecuador into Turning Assange over for Extradition. He also claims that Assange has refused to go, threatening to KILL HIMSELF if the try to take him out.
The Intel guy said "In 12 hours, Julian Assange will either be in a jail cell or dead."