https://gamesandtehories.blogspot.com/
Kimmo Huosionmaa
Penicillin was one of the first so-called wonder medical, what was easy to produce and that mushroom poison has saved billions of lives. But the fact is that this medicine has been lost its power. The penicillin is used without control and the problem with this kind of usage is that the bacteria, what have weak genomes would be destroyed. And the bacteria with strong genomes are surviving from this medicine.
The doses and numbers of the penicillin pills have calculated that way, the dose of the medicine is effective against bacteria, and when the period is over, the bacteria would be lost. In this case, the patient must eat all pills, but if this person would not do that, it will begin the eugenics process in that bacteria population. That means the penicillin destroys weak bacteria, and that would make those bacteria stronger than ever before.
This method where bacteria would expose by medicine or ultra-violet light is used to make artificial bacteria population for biological warfare. In the movies, we see that biological weapons are mainly the viruses like Ebola, but in the real life the laboratories, what investigates biological warfare are interested in natural bacteria like tuberculosis because every state in the world has signed the treatment to deny the biological weapons. But those weapons are very attractive in the world of the military.
The producer of the strong bacteria doesn't need complicated laboratories. Only thing, what that person needs is the raising platform where is the bacteria culture and ultra-violet light. By using that equipment can this person create extreme lethal and invisible biological weapons. So this makes this thing so frightening. The actors might not be governmental, and the purpose of the biological weapon could sweep some area clean from people, that some company can begin to dig the diamonds from those areas.
And when we are thinking about the "blood diamonds" of Congo, we might ask, are those diggings happen without the knowledge of the mining companies, or how those diamonds what are using for buying guns for the guerrillas enter the marketing, and how they can sell it to buyers? That kind of people would like that there is no evidence about their actions in the jungles because that would be bad for business. In those officially illegal mining would be many people, who are working as slaves for getting the weapons for the gunmen, who are controlling the diamonds. And if they would inject the bacteria to the workers, they could kill them imperceptibly by using bacteria like cholera or diphtheria, what is easy to claim natural epidemics. And in that case, the workers must not get their payments, what those guerrillas have promised for them.
The natural organisms are easy to weaponize by making them stronger than before. In those cases, the tolerance capacity of bacteria would be increased by breeding them by using antibiotics or ultra-violet radiation. After that, the super-bacteria would be delivered to the area, and that would seem like normal epidemics, what would be caused by resistant tuberculosis. And here I must ask, is there something, what somebody doesn't want to tell the people about the antibiotics resistant bacteria like tuberculosis, because those things are not often handle in public media?
Showing posts with label crime. Show all posts
Showing posts with label crime. Show all posts
Monday, October 1, 2018
Tuesday, August 14, 2018
The Christianity and secret societies
https://metsantarinoita.blogspot.com/
Kimmo Huosionmaa
Don't worry, I don't invent all my texts myself, and the ideas of these writings are taken from the Internet. The YouTube channel "Stuff they don't want you to know" is the very interesting place, if you want to know, why somebody believes conspiracies or UFO:s. The most common conspiracy in the world might be an inner circle stock trading, that means some business partners would tell their friends about the coming share issues, that allows this group to make very good profits.
And here is one thing, what is very interesting, because the conspiracies and cover-ups are the very interesting thing to think about the hidden use of the power inside some nations. When we are thinking about the "Family" or Christian community, what might have some kind of influence about the policy of the United States of America, we forget one thing. Those religious groups would allow very good cover for the businessmen, who work in the very illegal area, and makes the inner circle share trading.
The religion is the very good thing to hide something really big. And under the cover of the religious meetings could be made almost anything, what could come in the mind. And the religious meetings are the good forum for making business contacts. In some claiming some Christian societies also give the place, where the businessmen can make inner circle stock trading. This thing is illegal, and if that person would burn about that the coming share issue has been informed to the limited group, would the judge give very big punishments about that kind of thing.
The idea of this could be that some businessmen would use the church to cover their real way to make money. In this case, some businessman would just tell other, that there would be releasing the shares of the company before the shares would become to the shares come to sell, and that would give change to make very big profits.
And that could explain the big incomings of some of those communities. That makes very interesting ideas in the mind, about how some businessmen do business. And why some families can make so big money in the business life. There are many secrets in the financial life, and maybe some people would make money with that kind of illegal activities.
Almost every year, some person would be under the investigations with inner circle trading, what is the very sad thing. But are those suspicions caused only by coincidence or by purpose is very hard to prove. And at the last, we must consider, that maybe some persons are only lucky and they can make very big money in the stock trading business by legal methods.
Friday, July 13, 2018
Something forgot to tell about the exploding lakes
![]() |
| Illustrial photo |
Kimmo Huosionmaa
I just wrote a story about lakes, where is massive carbon dioxide storages, what makes those lakes like time bombs. When we are thinking about the carbon dioxide storages those storages can be made by humans. This gas is forming when baking soda and sodium bicarbonate would be mixed together in the water. The releasing of the chemicals would be done near the bottom of the lake, what would liquid the carbon dioxide in the water. And when the concentration is high enough, the gas would be released by explosives.
Or the carbon dioxide can be formed in the lake by conducting the exhaust gas of the motors in the water. Those things are very difficult to notice, and sometimes I have thought the possibility, that some mining company or mercenary soldiers would use this thing in the genocide operations. In the international laws, chemical warfare is very clearly mentioned as illegal actions, and in the press, the chemical attacks against guerillas have been justified inhumane actions against humanity by using weapons of mass destruction.
But if somebody would want to make this kind of strike must this person just find the small lake, and then put the chemicals in it. When the concentration of carbon dioxide would rise high enough, the water must just be disturbed by dropping explosives like depth charges. That would cause that the carbon dioxide would rise from the lake and make the humanitarian catastrophe. If the lake is higher than it's environment, that would cause that the gas would start to flow to the downland, and cause the horrible situation.
Monday, May 28, 2018
Why somebody made that text?
![]() |
| Picture I |
Kimmo Huosionmaa
Above the text is a picture of rock painting in Heinola, Finland. And we might think, that it's made by some narcotic users, who have been in camping at this area at 70's. This text has been made over ancient stone-age rock painting, and if somebody would catch by this, would the price of this text very big. Some narcotic-users make very impulsive actions when they are under the influence of drugs. And this is the good example, why this kind of artifact must be protected.
When we are thinking this kind of ancient paintings, what has been made by some caveman, we must say that some of those paintings have been destroyed by medieval people, who have had the fanatic relationship with Christianity. And those paintings are made by some pagan, that means, that they should be destroyed. But in this case were not question of some medieval person, because those people didn't have the opportunity to buy oil colors from the shop, and this is, why I suspect that some drug-users have wanted to make their names known forever. And maybe they wanted to show the world, that they had camping site in that area.
And maybe those days what are painted in that yellow text, are the dates when those people were on this camping site. And probably the months are wrong. This kind of people is the reason, why some of the most fantastic cave paintings are kept out of the human eye in secrecy. There are always people, who want to destroy those ancient paintings, and many of those people are drug users. And maybe they don't know what this kind of graffiti costs for them if they would catch about this kind of actions. Destroying ancient artifact is the very bad thing and the bill about those actions is very high. So this kind of art would cause very big bill. But why it's done. If the local people would not talk anything about this case, there would probably not any mysteries behind it.
Of course, some woman could hide just born children in the forest and then kill them in some mental disorder. And those children are probably not born in the hospital, and this causes thoughts about the murder of two innocent children. But normally local people would know about this kind of things if those children were found in some church books. But if behind this is some drug user, there is a possibility, that those hypothetical children are born in some forest, and then some terrible thing has happened. In this scenario, some prostitute has been caught children with some person, who wanted to protect his reputation.
And after this very selfish person have been made the crime, what has no excuses. This kind of action would send that person straight to the mental hospital for the rest of the life. Here I remember some writings in the newspaper, where some reporter protected this kind of crimes and claimed that, if the victim would be just born child, there should not prosecute those brutal and cold-blooded murderers. And now I must ask, is there a connection between those writings and this rock painting? They were quite disturbing writings, where child murders were defended, by claiming that those children were not even humans. In those cases, where the person has been made crime, what cannot be defended, would this criminal try to apologize for that kind of heartless and brutal crime, by convicting, that this sick crime was right, and other people would accept it.
This feeling of guilty sometimes causes disturbing writings in some newspapers, if someone has been killed the child on purpose or accidentally as an example impacting that young person by car. and in some person's mind comes thoughts, that this kind of victim was handicapped, because that would make the life easier. And sometimes the reason for the texts were child victims are underrated caused the crime, what is called a "hit and run", where the driver escapes from the place, where the impact happened. In those cases would this person sometimes try to convict that the victim was guilty in this thing, what was not right, but claiming that another person would accept that action makes that criminals life easier because that driver might have the very bad conscience about this hypothetical action, that caused the death of the innocent person.
Picture I
Kuva: Ismo Luukkonen. Museovirasto - Musketti Copyright: Kuva: Ismo Luukkonen. Museovirasto - Musketti. Kuva: Ismo Luukkonen.
https://www.mtv.fi/lifestyle/koti/artikkeli/mita-lapsille-tapahtui-heinolassa-kallioon-maalattu-mystinen-muistokirjoitus-1970-luvulta-puhuttaa/6927528
https://pimeakronikka.blogspot.fi/
Monday, May 14, 2018
The security problems with keyless cars and modern computers might cause horrible situations
![]() |
| (Picture I) |
http://crisisofdemocracticstates.blogspot.fi/p/the-security-problems-with-keyless-cars.html
Kimmo Huosionmaa
Computers are everywhere, and this means that the next generation criminals might use them more often than firearms. Hacker doesn't need the license for equipment, and this is the reason, why modern criminals are using computer breaking for closing the alarming systems and transferring money to their own accounts and other computer-based methods in their actions. Hackers are modern thieves, who slip into the system and then steal money or information for their employers.
When hackers would break in some car's computer systems, they would cause the horrible situation. And the worst of all is that the driver would lock in the car, and thermostat turned in full power. If that happens out of city area and the hacker can jam the mobile telephone and locks the breaks, the situation would be like in some horror movie. The keyless car is the very nice idea. But there is the little problem, it can accidentally turn it motor on if there would be some malfunctions in the ignition system or its control circuit. Also if the computer programs, what is controlling that system involves some critical code-errors would the motor start to run without warning in the garage.
But when we are thinking about the cars, what is very highly automatized is a possibility that some hackers can break in the ignition system of that kind of car by using electric locking system as the gate. And in this kind of cases, the hacker can turn on the motor by some kind of remote control software. But there is another way to make this trick. If the hacker would slip little computer program to the microchip, what controls the locking and alarming system, this person might start the motor very easily without any trace.
This means that hacker just replaces the ignition control software by self-modified code, what involves the code, what would start the engine in the certain time. And after that, the car can run its motor until somebody notices that. But who would make that kind of trick? Sometimes I have thought that, if the targetted vehicle belonged to some cargo company, would the motive in this kind of action be, that the competitor would want to increase the fuel bill of that company, or maybe the competitor wants some contracts, by using unethical methods for getting those contracts. In those cases, the competitor might hire hackers to make dirty jobs for the vehicles.
And if in the cars or trucks ABS-system would be hacked, that only one wheel would be locked in the middle of the drive, would it cause slowing the services. And then clients would get new partners for logistics. But if the garage is involved in the house, where the people lives, is one risk. This is that somebody wants to kill the owners of the house by using carbon monoxide, what is created in the engine of the car. This would be the very deadly thing and the new weapon in the hands of organized crime. Computers make life easier, but they are also causing new threats, and this is the reason, why law enforcement should advantage and get new skills all the time. And criminals are clever.
They are always forward of law enforcement because the criminals must act before law enforcement can begin the operations. And the data security is the key element in the safety of modern vehicles. If some hacker takes some of the systems of the car in control, it could make very bad things. Or what would you think the situation that somebody would lock the driver in the car and turn the thermostat in maximum level by hacking the computer of the car? Or what if somebody hacks the radio of the vehicle, and turns the stereo in full power?
Those things are the horror-scenarios in modern life. and maybe modern "voodoo men" would use those car radios for subliminal commands to give all the money to them. In this scenario in the car's stereo system would infect the program, what starts to send infra-sound messages to the driver. In some rumors, the pilots of planes what attacked to WTC-building in 2001 were targeted that kind of commands, what was given by "white noise". But those rumors are without evidence. Same way some very bad trades are sometimes believed to make under the influence of infra sound loudspeakers. And that kind of things might be used in next-generation mafia-men, who wants to make inexpensive contracts. And that kind of systems is more effective than guns. The users of those methods would not catch in the same way that the regular gangsters, what makes them more dangerous than any "Don Corleone" could ever be.
Sources:
https://www.nytimes.com/2018/05/13/business/deadly-convenience-keyless-cars-and-their-carbon-monoxide-toll.html?nl=top-stories&nlid=16324671ries&ref=cta
Picture I
http://mutantville.com/blog/wp-content/uploads/2011/06/christine.jpg
http://crisisofdemocracticstates.blogspot.fi/p/the-security-problems-with-keyless-cars.html
Saturday, April 21, 2018
The thoughts about the song "In the year 2525" part II (Microchip, what allows to click straight in the net)
Kimmo Huosionmaa
When we are thinking about the song "The Year 2525", we can imagine that maybe tomorrow in our society might put GSM-data implants to a human head, and that kind of systems allows the people of tomorrow to click themselves inside the Internet, without using visible computers. Those WLAN-microchips might have the decoder, what would change the data that form, that it can be used to control computers and in another way, the human brains would understand that data. In this case, the implanted microchips can allow us to use remote cameras or any database, where that person has access. This kind of equipment can allow making the "modern shaman", who can click the mind to the Internet, and it allows this person communicate with electronic devices by using EEG-transmission. Those micro chips could be the most dangerous invention in human history.
Implanted Microchips would allow following any thoughts and actions, what we do, and that would be the top invention of "Orwellian control society". This kind of systems is introduced in some SciFi-books, where the person is allowed to click inside Internet, without any visible computers. That could be possible by using implanted WLAN-microchips, what is set in the brains after the birth. Why is this technology so fascinating? It allows us to increase our body and mind to the machine, what would become our second body. But we don't always realize the risks of that technology.
Memories what would transfer from robots would be our own, and if somebody would hack that system, would it cause the situation, where somebody can make murder and put that to some other person's fault. In this case, the criminal would simply collect the own EEG during the crime and transfer the brain waves to other person's brain core. Only thing, what that criminal must avoid, is to think his own name. And then this person can record the EEG, and transfer that to some other man or woman brain core. That kind of systems is investigating in real life because the brain core controlled robots would be very useful in many missions.
Those robots would look like humans, and they would be controlled by thoughts, what means that the electric operands in the human brain would send by decoder thru the Internet. And the opposite way the robot would send the feedback from its cameras and other sensors straight to controller's brain core. The sense of touch would make by using piezoelectric crystals, what would send the sense to robots computer, and that robot would send that information to controller's brains. That kind of equipment allows controlling robots in very dangerous missions.
Below:
The link to that song
https://www.youtube.com/watch?v=yesyhQkYrQM
http://crisisofdemocracticstates.blogspot.fi/p/the-thoughts-about-song-in-year-2525.html
When we are thinking about the song "The Year 2525", we can imagine that maybe tomorrow in our society might put GSM-data implants to a human head, and that kind of systems allows the people of tomorrow to click themselves inside the Internet, without using visible computers. Those WLAN-microchips might have the decoder, what would change the data that form, that it can be used to control computers and in another way, the human brains would understand that data. In this case, the implanted microchips can allow us to use remote cameras or any database, where that person has access. This kind of equipment can allow making the "modern shaman", who can click the mind to the Internet, and it allows this person communicate with electronic devices by using EEG-transmission. Those micro chips could be the most dangerous invention in human history.
Implanted Microchips would allow following any thoughts and actions, what we do, and that would be the top invention of "Orwellian control society". This kind of systems is introduced in some SciFi-books, where the person is allowed to click inside Internet, without any visible computers. That could be possible by using implanted WLAN-microchips, what is set in the brains after the birth. Why is this technology so fascinating? It allows us to increase our body and mind to the machine, what would become our second body. But we don't always realize the risks of that technology.
Memories what would transfer from robots would be our own, and if somebody would hack that system, would it cause the situation, where somebody can make murder and put that to some other person's fault. In this case, the criminal would simply collect the own EEG during the crime and transfer the brain waves to other person's brain core. Only thing, what that criminal must avoid, is to think his own name. And then this person can record the EEG, and transfer that to some other man or woman brain core. That kind of systems is investigating in real life because the brain core controlled robots would be very useful in many missions.
Those robots would look like humans, and they would be controlled by thoughts, what means that the electric operands in the human brain would send by decoder thru the Internet. And the opposite way the robot would send the feedback from its cameras and other sensors straight to controller's brain core. The sense of touch would make by using piezoelectric crystals, what would send the sense to robots computer, and that robot would send that information to controller's brains. That kind of equipment allows controlling robots in very dangerous missions.
Below:
The link to that song
https://www.youtube.com/watch?v=yesyhQkYrQM
http://crisisofdemocracticstates.blogspot.fi/p/the-thoughts-about-song-in-year-2525.html
Tuesday, March 13, 2018
Why somebody poisoned Russian ex-agent?
![]() |
| (Picture 1) |
Kimmo Huosionmaa
In the media have been questions about the reason for poisoning the Russian ex-agent, and of course, there have been speculations about systematic assassination campaign, what is targeted to ex-agents of Russian intelligence. And now people are asking, is the security service of Russia behind those actions?
This is like some high-level political thriller, where somebody attacks against the enemies of Russian leaders, and there are claiming that some person, who has lived at the refugee has been also found dead. But if those stories would be true, we must ask why somebody is doing this thing?
Of course, Russian intelligence is known about tough methods, but when we are thinking about the fully open campaign against ex-spies and retired intelligence officers of Russian intelligence, we must say that this won’t help them at all. If there would be evidence about the systematic killing program, what is done in the foreign area, that would have catastrophic consequences of the relationship between the Russian and that other country.
There are some persons, who don’t like that other intelligence office co-operates with Russians. Those persons are the members of so-called “Russian mafia” or “Organizacija”, what was very powerful in the chaotic years when the Soviet Union collapsed. Then Vladimir Putin cleaned the streets and that organization continued to operate in the shape of the leaders of those gangs, what controlled the underworld of many Russian cities.
When so-called open mafia was terminated, people were happy. And they forgot to investigate the backgrounds of some high-profile businessmen. Or I must say that I believe that any leader of that Russian mafia was changed their business as legal. They put the money, what was collected from streets to legal business, and left the gangs. Those persons are now selling mobile telephones, and everything, what they do is legal. But the start-money for their business is from the streets and drug business.
There was the question, why those people don’t want that the Russian intelligence co-operates with other organizations is clear. If those persons names will come in the eyes of the investigators in wrong papers or document, their backgrounds could be uncovered. And that would cause those persons very much trouble. There were relationships between Russian mafia and western criminals because Russia was the good country for money laundering because the information did not travel between Russian and western authorities.
Those ex-mafia persons were operated with some Russian emigrates, who have collected money from the western gangsters, took them to Russia, and changed that money to Rupees. Then that money changed back to western money, and that made this money clean. Also, those Russian mafia members had the good chance to get firearms in their hands, and they were sold those guns to western gangs.
Also, some of those gangs sold contract kill to some western customers. Russia is quite a difficult language, and those persons were safe until the relationship between west and east were became warmer. That is the thing, what those mafia-persons doesn’t want. Their business bases the straight line and cold relationship between East and West. Because if somebody will find out their identity, those persons might be in trouble.
Sources:
Picture 1.
Wednesday, March 7, 2018
This painting could be from any battlefield around the world.
![]() |
| "Burned village" Albert Edelfelt (1879) |
Kimmo Huosionmaa
Above this text is a painting, what we all know. It’s Albert Edelfelt’s “Burned village”, and it is the vision of the burned house. There is a couple of people managed to escape from that place before the military men came and killed all. This vision could be from any war in the world, and it could be the portrait of attack to some village in German Eastern front. Those cavalrymen were painted without details, what helps to return this kind of happenings in the mind if some person were in that kind of situation.
This painting could be the portrait of an attack against civilians. And the message of this painting, is somebody always sees, what really happened. This portrait might be used in some memory therapy, where the therapist tries to find out why some person sees nightmares all the time. So the question of this portrait is that it is painted in 1879, and this picture could be based on the real story.
And when we are thinking about the war crimes, this picture would portray anything from the medieval period to “Einsatzgruppen” actions in the Eastern front. There would be burning house, and a small child, who would not remember this thing in the adult age. But when this young boy returns to that place, would he remember everything, and in the worst case, could this boy became the knight, if he were adopted into the right family.
Remember that this boy would hide his past, and in this painting is a message, that even the child is small, would he grow bigger and stronger. In many war crimes the leader of those crimes would claim, that they have right to do that thing. This painting always makes me think many things. One is that why somebody wants to burn that village? Is that because the maker of that crime wanted to cause hate inside civilians minds?
In some “Einsatzgruppen” operations were used Ukrainian SS-men, who were used Soviet weapons, because the SS wanted that people hate Soviets. Those men were easy to liquidate as the war criminals, and nobody would ever believe, that orders made by the German army. Those units were known as “Terror” or T-units.
Somebody claims that NKVD had similar units, what used German uniforms and shot the co-operatives of SS. If this unit was true, It worked that those men came to the village in SS-uniforms, and then those men have executed those cooperatives immediately. This methodology was in use in the “Phoenix”-program, what was made by Americans in Vietnam War. The “Phoenix”-operators claimed that they were some kind of V.C sympathizers, and then those operators executed the V.C members, who came to talk with them.
Monday, February 12, 2018
Dirty business can destroy entire firm
![]() |
| Mister X (Picture 1) |
Kimmo Huosionmaa
Statistics are the memory of the company. They will tell many things about how good business is the company make. And if the selling would decrease, the reason for that must find out, because this kind of things will cause the collapse of the corporation. If the incoming money flow will decrease when the certain worker came in the house, that person would cause the collapse of the company. That means that the situation must be investigated, and if the decrease of selling will happen always when the certain person comes to the workplace, would that be only coincidence. But if this happens all places, where this person has been working, the question will be not about coincidence. That means this person is not suitable for the job, or the thing is about professional provocateur, who would try to drive the business down on purpose.
The economical environment is basically the same kind of structure like some Facebook-community. If we will draw the model of that structure, it will look like some kind of spider net, where we can find the centers. With using this knowledge, we could build a computer program, what will find the center or central persons in that structure. The idea of this program is that it will compile the buying and sell actions in the marketing environment. The data will uncover the persons, who first will buy or sell the part of some target. One time might be coincidence, but if the same action happens simultaneous, there must be some reason for that.
If some person is always first, but when this person makes the movements in the market environment, and this action causes a large number of actions in stock marketing, there will be something special in that person. So this person is so called control in the environment, and there is a reason, why everybody is following this person. There must be something in this person's personal history or in the training of the person because other investments will follow this particular thing. The idea of this system is, that the data of marketing happenings will be collected to the database and if some selling happening follows the mass selling or buying, this doesn't necessarily mean anything.
But if this happens simultaneously, and always some persons would make millions of euros profits there would be the question of inner circle marketing. Of course, that doesn't necessarily happen very often, but if some investor makes always millions of euros profits and this person never loses money, it would mean that this person would get some information before other investors. And in this case, the selling of some stocks might be the mark for another person to start the operation.
In this scenario "Mr. Smith" will give the mark to other investors if the company will make extra money, by buying some stocks just before the stock market will be closed. This person could be some bookkeeper or auditor, who has access to the financial reports of that company. If this person would give the information, is the investment profitable by one day before the reports would be published for the friends of this person, they would make very good profits.
And this is strictly prohibited. If the telephones or emails were used, that would be uncovered the operation, and those persons would go to the "Blacklist" of the stock-markets So there must be the mark, that will start to make business. And it could be that somebody sells or buys those stocks. The statistics would uncover this kind of thing, and then the officials would start the investigations if somebody makes only profits in that environment.
Sources
Picture 1
Wednesday, January 10, 2018
What if the antivirus program transforms as the spying tool?
Kimmo Huosionmaa
Is Kaspersky's antivirus software a spying tool for the Russian intelligence is the very good question. If some antivirus- or firewall software has been used as the spying tool, the results could harm the national security. When we are talking about the use of an antivirus or any other security program as the spying tool, that will give change to the attacker to monitor all data, that goes between the computer and the Internet. But how to modify those extremely safe programs as the spying tool?
The best way is to make the "trojan horse", what just looks like that security program. In this scenario, the hackers just make their own software, what has the same kind of icons than the real antivirus program has, and then they must just route the net traffic to their own server. And then they have full access to any data, what is on that computer. Another way is to put the computer virus or spying program to the router, but the problem of that is that device's operating system is normally Linux, what makes the slipping that tool in the system quite difficult. Making the programs for Linux is different than making them for Windows, but if the monitoring tool can be set in the router, the hackers can monitor all data, what goes thru this device.
The problem of those hackers is that if too many persons will download that program, they would get so much data, that it becomes useless, and in the nastiest scenarios they will send the "sale offers" to the targetted persons, and in this case those persons will pay for those programs, what will steal their personal pictures and other data, what they wanted to keep secrecy.
That most advanced malware software might be stolen from the NSA (National Security Agency) or some other information security authority. Those tools were the national secret, but somebody copied the editors in their USB-stick and then those persons just walked away from Fort Meade. That software has been used to create computer monitor tools, what became public in the case, where the Iranian nuclear program have been monitored. And that software has probably been sold to the Russian intelligence and probably the criminals also have their copies of that complicated software.
But if the person is the good coder, can the necessary programming tools downloaded from the Internet. And in this scenario, the hacker will make the package, what looks like the update package for the antivirus software. This action bases that the antivirus tools must be updated simultaneously, that they can be effectively detected the malware. And if the computer virus will strike in the antivirus software, that might open the back gate to the system, and then all data can be stolen. Then the hackers might cover their crime by destroying the data system by the virus what forces to reinstall the system again, and if the backups were not made, the databases and evidence of the data crime would be stolen forever.
Tuesday, December 5, 2017
What kind of picture of the hacking is given in the public media?
![]() |
| Does normal hackers this kind of equipment? |
Kimmo Huosionmaa
In the beginning of the text is a picture, what I used before. I must ask is it the picture of the real world of hackers? Of course, it is published in some newspapers, but does real hacker this kind of systems? The picture is really taken from the Internet, and it was mentioned originally for the art of the story. In my opinion, if some hackers have this kind of resources, they must have very much financial support.
Most of that kind of persons are not dangerous, but if the hackers are working with international criminals, could those people want that this computer genius will be silent forever, and that's why they might kill this kind of people, what those gangsters think that they are weak rings in their organization. If the criminals are the part of the mafia, they might be very dangerous, and if they think that somebody is useless, they might kick that person off the system, and they can't leave evidence of their actions. The gangsters can play the people like Greenpeace and claim that they are looking for the evidence of corruption etc. , and they might hire hackers to make computer brakings inside the police computers to find the covered agents from their organization, and if the hacker will know too much about their work, those criminals might want to silent this person, because they don't want any witnesses to this kind of crimes like drug trafficking and murders.
When we are looking for the photos, what will jump to our screen, when we are searching the Internet using the word “hacker”, must we ask ourselves one special question. “Is the hacker this kind of person in real life”? The equipment in those pictures are fantastic, and the working spaces are awesome, but in those photographs are given the picture, that those hackers have very much financial support for their operations. In the real life, most of those people only dream about this kind of equipment and working areas. The problem of the hacking tools is that all the equipment, what is fully downloaded from the net must be registered. In this text, I will analyze the hacking to set myself to hackers position.
If I want to be phantom of the Internet, I would not use the software, what can link straight to my telephone or bank account, and that’s why I can’t use the software like Kali-Linux in my illegal operations. Of course if I were the spectacular programmer and I have lots of time, I could make the hacking software myself, but the programming skills must be very good, and of course, I should have enough time to make that software. In the real world making the hacking tool is not so easy, that the code is properly done in the one hour, and in the real world making the programs is not the synonym for the word “coding”. Making the code is, of course, the big function ft r the programmers, but also testing is the important part of the process. When we are talking about the making the program, we must make one thing clear.
When somebody wants to make the program, that person must not even know how to make codes. That person must only get the list of the codes, and then connect that code to freeware code editor like “DEV-C++” and then just compile that program, what might be delivered with the World documents. When the mission of the hacking is purely illegal, that hacker must hide identity very careful. If we are talking about official so-called “white hat” hackers, they can use the official software, what is properly tested. But how the criminal hacker does the test of the programs, and the programming editors sometimes codes the operating systems user information in those programs, what is made by that editor.
This is the thing, what is made to guarantee the programmer’s rights of that product, and that thing can be used for tracking the hackers. Normally the hackers don’t have millions in their bank accounts, and they don’t have very cool places, where the can make their operations. Of course, there is somewhere international gangs, what are lead by military intelligence, but normally hackers can only dream about this kind of offices, what are seen in the picture above this text. Normal hackers operate in their homes, or they will use some other open networks. Those networks are found from the library or some kind of public places, but the problems are the limits of the batteries. And that's why that kind of connection is unstable, and when the hacker stands on the streets this person might be in danger to be targeted by robberies or some person might stand behind this hacker and see what's going on in this person's computer screen. That's why the hacker needs the secure place where to work without risks. And this is why those persons will normally do their missions at home.
Tuesday, October 10, 2017
"Loving Vincent" will have same old theme what makes investigators believe that something was not right
Kimmo Huosionmaa
There will be a new masterpiece of animation called "Loving Vincent" from 2016, and that have been dawn by style what used by famous artist Vincent van Gogh during his life. This artist died tragically by his own hand, and that's one of the saddest stories of the world. I saw the trailer for this movie in the net, and the website what I used was YouTube as you might guess.In this trailer was on retort, what made me write this essay to the Internet. It went like this "all village hated that man", and this kind of things make investigators think that something was wrong in that community. And the question of Vincent van Gogh's life did community drove that man into suicide or did he brutally murdered by some people who could not accept his work or personality. Or did Vincent make some false paintings and dealers who sold them brutally murder him?
Even if some person is strange or he wants to be lonely rider all of his life, doesn't cause anger in all community. I mean that everybody doesn't care if people are someway different than other members of the community. When people face pure hate all around him he will collapse. And the sad thing about this is those persons like Vincent van Gogh are sensitive. Artist is never so-called "easy person", but they are very sensitive and deeply feel persons who want to create something unique. And anger what some artists face will be hurt them, and it can drive them to suicide.
In this case, I mean that hate is not spontaneous if the target for hate didn't do nothing bad for people. Those very large scale anger cases where everybody hates somebody reason is normally most disgusting thing what people can imagine. Somebody might claim that some lonely man made murder or something like that, to rise anger of every person against some poor man. Some of those cases reason of hate were that somebody puts his or her own crimes on this kind of man shoulder. And after that, they will agitate people against one member of the community.
I know that Van Gogh was in mental institute or hospital, and if somebody was claiming that this artist was some kind of monster could he cause anger against that man. This is a reason why the staff of those institutes must keep them mouths locked. If somebody just says that people like Vincent were in a closed hospital, they could cause something terrible. The mental hospital patient is a good target for blaming that person crimes what they couldn't even make. And in this kind of cases where all village hates somebody should the investigator think that people are agitated or even forced to hate some member of the community.
This is how some leaders of criminals work. They agitate people against some people who are different than others. After that, they say if somebody doesn't want to take a part of actions against this person they won't get free tennis-tickets. This is how works people who buy friends, and collective hate is thing what brings criminal polices investigators in the community. When somebody will burn of trolling will he get very long discussion in the police stations interrogation room with a couple of detectives? In this kind of discussion is an idea that all information of crime will go to hands of law enforcement officials. So what makes the investigation begin? Collective and spontaneous hate what is filled all community. And the question is why nobody defends this man? Movie is good animation which technique is following drawing method what is used by Vincent van Gogh
Link to that trailer: https://www.youtube.com/watch?v=47h6pQ6StCk
Subscribe to:
Comments (Atom)
New autonomous task units are entering service.
"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...
-
Basically. The Medusa system is based on a similar concept. With the famous project Orion. The attempt to create the nuclear pulse propulsio...
-
"Schematic configuration for generation and detection of femtosecond UV-C laser pulses in free space. A message is coded by a UV-C lase...








