I remember walking by Empire Office Equipment many years ago when its Queen West storefront displayed quaint and dusty office hardware that had been stacked there, seemingly, for convenience rather than for display. The grimy windows and murky interior made it hard to see inside but it appeared to be packed with nicotine-infused business furniture and apparatus that weren’t modern even at that time.
The place didn’t ever look open to casual foot traffic or, for that matter, ever actually open at all. Posted business hours were nowhere to be found and given the stuff perennially piled up against the front door it now seems appropriate that all that remains today is found in an alley at the back.
Not long after I got comfortable with TCL I happened upon a local comedy troupe called The Raisin Gang. Unfortunately, their official website is now defunct, their X account hasn’t been updated since it was called Twitter, and little remains of The Gang but their YouTube channel.
I did a little expectant spotlight piece a while back but, to my discredit, I have not done much to follow up since then. In my defense, neither did they. Every once in a while, though, I flash back to the first Raisin Gang video I ever saw and wonder whatever happened to them.
The concepts were ahead of their time, the production values were great, the skits were well written, and the execution was excellent. For a while there I thought Toronto might have a “new media” Kids in the Hall on our hands.
Alas, as far as I know this never materialized. Maybe it was bad timing. Could be a lack of follow-through. Possibly the participants got into the hooch a wee bit too often.
Perhaps they’d care to contact me to explain themselves. As an added incentive, failure to do so will result in more videos being posted at unspecified future times, possibly with additional context.
In my search for spies and espionage in Toronto I came across something called Deniable Activity. It’s basically a pricey LARP whose latest event was described as, “a covert operation in Toronto to oppose a Chinese-Russian paramilitary unit and discover a leak within the Blackline organization.“
The “Blackline organization” is an obvious take on Blackline Simulations, the company behind Deniable Activity. Blackline seems to specialize more in military simulations and the Deniable event appears to have been their first espionage-themed outing. It sounds like they put some effort into it, although calling the first installment “The Compromise” seems a little derivative, maybe even like someone caved during planning. Still …
We’ve been able to include vehicle pursuits, helicopter trips, installing audio and video surveillance, clandestine entry into residences, and simulated gun fights in a number of events.
The fact that this event exists got me to thinking … what if a simulated urban spy adventure was infiltrated by actual spies and hijacked for nefarious purposes (until the good guys figured out what was going on and thwarted it). You’re welcome, Hollywood.
There are some event photos available online and kudos to the organizers for location selections. Ultimately, the event seems fun albeit a little contrived. Not sure how much it costs per person and prices aren’t otherwise broadly mentioned but a 6 hour “Covert Entry and Surveillance for Teams” event is listed at a starting price of $3,500.
Deniable appears to be headquartered in a squat, industrial, red brick building in northern York (a.k.a. Toronto), although this is somewhat questionable since the listed address of “51 Vine Road” seems to be a little farther north.
That’s all the information I have regarding the target at this time.
It’s something I’d stumbled on a few years ago, a nearly decade-old comic series named “We Stand On Guard” which took much the same tone, albeit set ninety-nine years into the future (as of this year).
Spoiler alert: a good number of the rebellious Canadian “heroes” die and ostensibly take a large part of the water-deprived U.S. civilian population with them. Hooray!
Long story short, the artwork is great but the tale is bleak.
It’s still a bit too chilly out there for aquatic hijinks but I’m sure I’ll soon be complaining about the heat and humidity, something that I suspect is (at least) a century-old Toronto tradition.
In the meantime, there’s plenty more of the following sort of thing over at archive.org
About 7 months ago I wrote a short post about traffic trends here on TCL. At the time there was a deluge of visitors from China that seemed legit, by which I mean that most views were of content pages. With enough IPs at their disposal I suppose that the Chinese government could’ve been scraping the blog for content but generally speaking the only unusual thing was the volume of requests.
That’s not to say that there haven’t been hacking attempts on the website but these usually come in bursts of seemingly uncoordinated activity from a variety of sources. Recently, however, I’ve been noticing what looks like a more sinister trend.
The first of these is a coordinated campaign being launched from Ashburn, Virginia and Columbus, Ohio. I’ve kept this fact on the back burner since Ashburn is considered to be a technology hub, not unlike Columbus, and no doubt home to many VPNs. This means that despite the traffic patterns being strongly suggestive of a single upstream source, that source could be almost anyone.
Maybe, or maybe not, as newer information suggests.
A few seconds of research quickly revealed that the CIA ran (and probably continues to run), a massive undercover hacking operation from Frankfurt am Main in Hesse, Germany. This top-secret CIA unit is reported to have made use of malware, viruses, trojans, and “zero days” — freshly discovered and therefore undefended vulnerabilities.
Very similar vulnerability scanning patterns also appear on TCL out of Singapore which boasts strong security ties with the US. The Frankfurt-Singapore traffic often appears alongside Ashburn-Columbus requests and all of them almost entirely ignore content.
If I had to hazard a motive I would say that whoever is behind this effort is trying to gain backdoor access to the site. TCL isn’t exactly a treasure trove of national secrets but it could provide a nice little boost to a DDOS attack or act as an unwitting intermediary for subsequent hacking operations. I can think of at least a few other uses for a compromised website and it sure doesn’t look like the “visitors” in question are here to read any stories so I don’t think that a little concern is unwarranted.
On the upside, I have the opportunity to take a first-hand peek at the secret arsenal being employed. I may not have heard of these vulnerabilities and I may not know how they’re exploited but this information could give me a wonderful starting point, were I so inclined.
Maybe the whole Frankfurt-Singapore-Ashburn-Columbus connection is a bit tenuous. The Frankfurt-Singapore traffic does seem different than the Ashburn-Columbus traffic — yet they collectively show other patterns like clustering and repetition of requests which suggest similar behind-the-scenes automation.
Maybe it’s just a bunch of unusually sophisticated and persistent script kiddies with seemingly endless access to international VPNs. Maybe other interests are at play. Whatever the case, I’ll be keeping my eyes open — and if TCL suddenly goes dark or launches a DOS attack against another site, it wasn’t me!