I asked for the Vancouver Hack Space logs to be grepped so that I can find out what the RCMP was doing. Turns out that the RCMP didn’t want to have their visit logged by the VHS Webserver. So, do you think they would have changed their proxy so that they could go onto the Interent with Tor, or some other Anonymity tool? Nope! They went to the Google Cache! Again, for brevity, here’s the first line of the logs! - - [17/Mar/2009:18:39:21 +0000] “GET /lib/exe/css.php?s=all&t=phosphor HTTP/1.1” 200 2982 “” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; INFOWEB-APPROVED; INFOWEB-APPROVED-IE6-FR; .NET CLR 1.1.4322; .NET CLR 2.0.50727)” </em>

Also, it seems that the RCMP have been all over the Internet with the SAME IP ADDRESS. This seems rather fucked up until you realize that it’s probably a proxy server/vpn solution of some type and that the RCMP connects to this to get into their Intranet. This is just an educated guess, based on the fact that we can see mentioned on the Internet, and this crazy User-Agent. However, that’s the only explanation I can come up with as to why the same IP address appears all over the place.

The fact that the RCMP visited VHS by accessing the Webpage’s cache instead of going to the webpage is bizarre! The site was definitely live in March of 2009. Admittedly at this time, we were still meeting at The Hackery, and we didn’t have our space up and running, but we definitely had the site up. Furthermore, we can see that they’re investigating some group called the Vancouver Hacker Society, which, even though it’s the same acronym of the Vancouver Hack Space, sounds far more ominous. It’s like we all sit around, drink brandy, and plot to topple governments or something while sitting in suits and talking about transparency like that guy who plays Julian Assange on Saturday Night Live.