Failed a Spot Check: Difference between revisions

Content added Content deleted
Line 316: Line 316:
* [http://www.youtube.com/watch?v=WmhvdtX72eQ&feature=context&context=G24486f7FOAAAAAAACAA Texting guy almost runs into a bear]
* [http://www.youtube.com/watch?v=WmhvdtX72eQ&feature=context&context=G24486f7FOAAAAAAACAA Texting guy almost runs into a bear]
* A Chinese [[False-Flag Operation]] to discredit the 2019 Hong Kong protests by staging a violent incident was exposed when a press conference supposedly filmed after the attack on the same day had an actor with a wristwatch set to several hours ''before'' the attack, exposing it as prerecorded (mentioned e.g. [//sinoinsider.com/2019/07/politics-watch-analyzing-the-hong-kong-legislature-break-in/ here]).
* A Chinese [[False-Flag Operation]] to discredit the 2019 Hong Kong protests by staging a violent incident was exposed when a press conference supposedly filmed after the attack on the same day had an actor with a wristwatch set to several hours ''before'' the attack, exposing it as prerecorded (mentioned e.g. [//sinoinsider.com/2019/07/politics-watch-analyzing-the-hong-kong-legislature-break-in/ here]).
* Right after the 2002 Bali Bombings in Bali, Indonesia, investigators struggled to find a lead as to who perpetrated the attacks, even when top forensic investigators were on site to scour for clues–cultural factors also came into play as Islamic custom dictates that deceased Muslims should be buried within 24 hours, hampering autopsy efforts–and the only other lead they had was a white minivan used to carry out the bombing, which had the serial numbers literally filed off. What the terrorists forgot to file off however was the IMEI (International Mobile Equipment Identity) number used to identify nearly every cellphone on the planet,<ref>CDMA phones on the other hand use ESN and MEID numbers instead, though dual-mode phones such as those sold in the States do carry both IMEI and MEIDs.</ref> which was retrieved intact from the remains of an old [[Nokia]] 5110 used as a remote detonation device. Through this, Australian intelligence agencies were able to trace the origins of the call and thus unravel the terrorist group responsible.


{{reflist}}
{{reflist}}