Internet Anthropologist Think Tank: Intelligence Wet DREAM.

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, September 03, 2011

    Intelligence Wet DREAM.


    Intelligence Wet DREAM.
    Paradigm Intel.

    Counter surveillance divided.

    The Golden fleece of all Intelligence Agencys.
    Functional access to all the PC's in the world,
    pre-searched.


    Its an "Invisible Persistent Threat"
    We have used them since 1997 (1993 was typo,G).
    Disguised file in Autoexe.bat file.
    Remember that?

    And we have proof of concept.
    The key lies in what is malware-virus
    and what are your programs.

    Malware-virus have choice tidbits in them
    that are illegal, and anti-virus recognizes
    those bits as naughty.

    But how does your security program know
    whats bad and whats good?

    There in lies the key.

    If its a MicroSoft program its good, right.
    Well its not doing anything illegal, but it
    can still be used for illegal purposes.
    And NO security program will ever tag it as
    malware-virus EVEN though it can be used
    as malware.



    Lets go on a Recon:
    We use malware to gain access to a PC,
    we dump a file and erase the malware-virus.

    The file sets up a string to run every time
    the PC is booted,

    It turns on MS Movie maker.exe in the background.
    It takes a photo every 1 min or hr of your PC
    screen, then, maybe it makes a FTP connection
    using your software and sends the picture-movie
    file to another PC. Keep activity low enough
    to run in background without notice, not slow PC
    down.

    No security program will ever identify the programs
    used as malware, its INVISIBLE, none of its bits
    will set off any alarm.

    And for all tech intents and purposes its an
    "Invisible persistent Threat". Because its a regular
    program with instructions, no virus, malware sig. which
    runs other MS software.

    Ok now lets look at this paradigm in operation.
    MicroSoft has a searchindexer.exe program on everyones
    copmuter, to make it easier for you to find things
    on your PC, it searches your whole PC and indexes
    everything.
    And MS doesn't want you to turn it off, kill the process
    and it just starts backup. There is NO turn off switch.

    What if MicroSoft asked to add a Host to the search indexer?
    And connected to the World Wide Web. They didn't
    ask they just did it.

    Searchfilterhost.exe
    Searchprotocolhost.exe

    What parts-data is this host sending out on to the Internet?
    And to whom?

    Of course if you shut it off in the register and are using
    Google Desk top you got them beat, Right?
    Nope, Google is shutting down Google Desktop 14th of Sept.
    http://www.uniquetipsonline.com/google-shutdown-google-desktop/
    Coincidence of course.

    Or maybe just steal a MS cert. or 531 of them.
    http://www.securelist.com/en/blog/208193111/Why_Diginotar_may_turn_out_more_important_than_Stuxnet

    Only one agency has the capability to possibility monitor
    all the PC's in the world and index them, NSA.
    With Googles help, they have the experience, switching
    from indexing the WWW to Indexing worlds PCs. Question of
    scaling.

    WOULD MicroSoft run such risks, and put the programs in
    public view?

    A few yrs back MS changed its TOS, to include un-named
    security, anti-malware companies, permission to run
    on your PC.

    Could NSA set up a fake AV company and get access through
    a loop hole in MS TOS, and exempt MS because you approved
    the TOS?

    If you kill either process:
    Searchfilterhost.exe
    Searchprotocolhost.exe

    It comes right back.
    But if you kill the searchindexer.exe program
    both of them die.
    So it would seem the searchIndex program is calling
    both Searchfilterhost.exe and Searchprotocolhost.exe ,
    There seems to be some confusion on MS part as
    to who owns my PC and operating system.
    I never OKed
    Searchfilterhost.exe
    Searchprotocolhost.exe

    Of course it could be something very innocent,
    a dump of both files was confusing and alarming.

    Can you set up a GPS on a PC without hardware?
    Only software or using existing hardware already on your
    PC?
    Interesting question after you look a the dump.

    The Internet you function on is just one of 7 levels.
    For example did you know there are DLL's being uploaded
    to your PC all day long, on another level, and MS has a
    program that lets DLLs function just like "EXE's"




    Well I think its proof of concept. Simplified,
    and I've left out some details, but you get the idea.

    Prvacy is DEAD, can we trust Intelligence and Law
    Enforcement with that kind of access, I don't think
    so based on what I've seen in the prosecutorial paradigm.
    I think it will be used for personal vendettas, politics
    profit. Police Taze kids and seniors, they will abuse this
    also.

    Can the constitution withstand such assault, can it be turned
    back? Not with a Congress that has been bought by Wall St
    Banks. that Paradigm clearly points out many congressional
    whores. and they make the laws.
    US has the best politicians money can buy.

    A Chinese curse "May you live in interesting times"
    and we DO.

    This ride just keeps getting more and more INTERESTING.LOL ROF
    What Lutz.

    Taliban DOWN:
    Taliban thats 2 of your Tweeters gone, wheres #3, You Mad? Tweet some more U bitches, mostafa ahmedi G


    Gerald
    Anthropologist

    Bin Laden can be credited with killing privacy
    for all mankind.

    I gave FBI, CIA NSA a option to stop the post with a 48 hr & 24 hr kill notice
    respectively..

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home