Intelligence Wet DREAM.
Intelligence Wet DREAM.
Paradigm Intel.
Counter surveillance divided.
The Golden fleece of all Intelligence Agencys.
Functional access to all the PC's in the world,
pre-searched.
Its an "Invisible Persistent Threat"
We have used them since 1997 (1993 was typo,G).
Disguised file in Autoexe.bat file.
Remember that?
And we have proof of concept.
The key lies in what is malware-virus
and what are your programs.
Malware-virus have choice tidbits in them
that are illegal, and anti-virus recognizes
those bits as naughty.
But how does your security program know
whats bad and whats good?
There in lies the key.
If its a MicroSoft program its good, right.
Well its not doing anything illegal, but it
can still be used for illegal purposes.
And NO security program will ever tag it as
malware-virus EVEN though it can be used
as malware.
Lets go on a Recon:
We use malware to gain access to a PC,
we dump a file and erase the malware-virus.
The file sets up a string to run every time
the PC is booted,
It turns on MS Movie maker.exe in the background.
It takes a photo every 1 min or hr of your PC
screen, then, maybe it makes a FTP connection
using your software and sends the picture-movie
file to another PC. Keep activity low enough
to run in background without notice, not slow PC
down.
No security program will ever identify the programs
used as malware, its INVISIBLE, none of its bits
will set off any alarm.
And for all tech intents and purposes its an
"Invisible persistent Threat". Because its a regular
program with instructions, no virus, malware sig. which
runs other MS software.
Ok now lets look at this paradigm in operation.
MicroSoft has a searchindexer.exe program on everyones
copmuter, to make it easier for you to find things
on your PC, it searches your whole PC and indexes
everything.
And MS doesn't want you to turn it off, kill the process
and it just starts backup. There is NO turn off switch.
What if MicroSoft asked to add a Host to the search indexer?
And connected to the World Wide Web. They didn't
Searchfilterhost.exe
Searchprotocolhost.exe
What parts-data is this host sending out on to the Internet?
And to whom?
Of course if you shut it off in the register and are using
Google Desk top you got them beat, Right?
Nope, Google is shutting down Google Desktop 14th of Sept.
http://www.uniquetipsonline.com/google-shutdown-google-desktop/
Coincidence of course.
Or maybe just steal a MS cert. or 531 of them.
http://www.securelist.com/en/blog/208193111/Why_Diginotar_may_turn_out_more_important_than_Stuxnet
Only one agency has the capability to possibility monitor
all the PC's in the world and index them, NSA.
With Googles help, they have the experience, switching
from indexing the WWW to Indexing worlds PCs. Question of
scaling.
WOULD MicroSoft run such risks, and put the programs in
public view?
A few yrs back MS changed its TOS, to include un-named
security, anti-malware companies, permission to run
on your PC.
Could NSA set up a fake AV company and get access through
a loop hole in MS TOS, and exempt MS because you approved
the TOS?
If you kill either process:
Searchfilterhost.exe
Searchprotocolhost.exe
It comes right back.
But if you kill the searchindexer.exe program
both of them die.
So it would seem the searchIndex program is calling
both Searchfilterhost.exe and Searchprotocolhost.exe ,
There seems to be some confusion on MS part as
to who owns my PC and operating system.
I never OKed
Searchfilterhost.exe
Searchprotocolhost.exe
Of course it could be something very innocent,
a dump of both files was confusing and alarming.
Can you set up a GPS on a PC without hardware?
Only software or using existing hardware already on your
PC?
Interesting question after you look a the dump.
The Internet you function on is just one of 7 levels.
For example did you know there are DLL's being uploaded
to your PC all day long, on another level, and MS has a
program that lets DLLs function just like "EXE's"
Well I think its proof of concept. Simplified,
and I've left out some details, but you get the idea.
Prvacy is DEAD, can we trust Intelligence and Law
Enforcement with that kind of access, I don't think
so based on what I've seen in the prosecutorial paradigm.
I think it will be used for personal vendettas, politics
profit. Police Taze kids and seniors, they will abuse this
also.
Can the constitution withstand such assault, can it be turned
back? Not with a Congress that has been bought by Wall St
Banks. that Paradigm clearly points out many congressional
whores. and they make the laws.
US has the best politicians money can buy.
A Chinese curse "May you live in interesting times"
and we DO.
This ride just keeps getting more and more INTERESTING.LOL ROF
What Lutz.
Taliban DOWN:
Taliban thats 2 of your Tweeters gone, wheres #3, You Mad? http://bit.ly/qVhrUB Tweet some more U bitches, @alemarahweb mostafa ahmedi G
Gerald
Anthropologist
Bin Laden can be credited with killing privacy
for all mankind.
I gave FBI, CIA NSA a option to stop the post with a 48 hr & 24 hr kill notice
respectively..
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home