Freelance journalist: ‘Hijacked flight 370 passenger sent photo from hidden iPhone tracing back to secret U.S. military base Diego Garcia’

Are passenger Phillip Wood and others still alive after flight 370 was hijacked then taken to a secret U.S. military base located on a remote island in the Indian Ocean?

malasian airlines plane
Auckland Photo News/Flickr

INDIAN OCEAN (INTELLIHUB) — According to freelance journalist Jim Stone, one of the American passengers, Phillip Wood, a technical storage executive at IBM who was aboard the now missing Malaysian Airlines flight 370, somehow concealed his cellphone on his person after the Boeing 777 carrying 239 people was hijacked by military personnel while on route to China.

Amazingly Stone claims that metadata within the photo yields evidence confirming “100 percent” that Phillip Wood sent the photo along with a brief voice activated text from GPS coordinates which put Wood only a few miles away from the U.S. controlled Diego Garcia military base which is located on an island south of the Maldives in the Indian Ocean.

In his post Stone claims that the coordinates may be off by a few miles proving that passenger’s iPhone 5 actually sent the otherwise blank black picture revealing nothing else. Stone speculates the picture was taken in a dark room or in some position in which Wood’s hands were bound.

Stone reports how the all-black image was posted along with the following text allegedly from passenger Wood:

“I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.”

Stone’s provocative report reveals the all-black image labeled “1395192158752.jpg” contains the following metadata:

Dimensions: 240 x 320
Device Make: Apple
Device Model: iPhone 5
Color Space: RGB
Color Profile: sRGB IEC61966-2.1
Focal Length: 4.12
Alpha Channel: No
Red Eye: No
F Number: 2.4
Exposure Program: 2
Exposure Time: 1/15

In his report, the freelance journalist points out in detail how the Exchangeable Image Format (EXIF) image data is actually the true “smoking gun.”

Stone writes:

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an iPhone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the iPhone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL. 

Exif can’t be rewritten with common software, it can only be added to in fields such as image credits with some advanced applications. It can be erased as well but NOT CHANGED. Photos with the exif intact will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it’s posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.

Intellihub reported that flight 370 may have landed at Diego Garcia a secret United States-controlled military base that’s located in the Indian Ocean and may not have crashed as other outlets maintain. A rather revealing excerpt from the article which quotes the Montagraph YouTube channel reads:

“[…] MH370 most likely landed at Diego Garcia and the plane may have been ushered into a massive “Faraday cage” style hangar to avoid passengers from communicating with the outside world.”

Shockingly, Montagraph’s assertions dovetail with a report released on Mar. 18 titled U.S. military base, South Asian airports in MH370 pilot’s simulator, says paper which reveals how MH370’s pilot was found to have owned and been training on scale simulations of the Diego Garcia landing strip on his rather advanced home flight simulator.

From the report:

Investigations into the flight simulator taken from the missing pilot’s home showed a software for five practice runways, including one belonging to the United States, Berita Harian reported today.

“Among the software we checked so far is the Male International Airport in Maldives, three airports in India and Sri Lanka, and one belonging to the US military base in Diego Garcia. All have a runway length of 1,000 metres,” a source told the Malay daily.

The flight simulator was seized by police from Captain Zaharie Ahmad Shah’s home on Saturday.

Update 2:49 PM EST:

The following information was posted as a tip on Steve Quayle’s website:

Hi Steve,

Re: the black/blank photo from the IBM tech on the lost Malaysian jet. The photo was taken inside a building just off the runways at Diego Garcia. I put the photo into my editing software, grabbed the GPS point and here it is. Try this: go to: itouchmap.com , choose #6, go to the bottom right box and input the info:

-7 18 58.3 LATITUDE

72 25 35.6 LONGITUDE

Click on: SHOW POINT

Zoom in and you will see where the photo originated. Wow. You’ll probably recognize the heavy aircraft parked nearby.

Intellihub’s exclusive MH370 Coverage: