Showing posts with label criminal activity. Show all posts
Showing posts with label criminal activity. Show all posts

Saturday, January 13, 2018

Only things, what we always remember are bad things


(Picture is taken in Finland)

Kimmo Huosionmaa

When we are trying to remember something, we face the thing, what sometimes distorts and dominates the memories, what has been told and written about some things that happen or what claimed to happen. One of those things is the NKVD, and the second one is the GULAG when we are talking as an example about the Soviet Union. And of course that state made also one war crime, it executed thousands of Polish officers in the place, what is known as Katýn.


The brutal crime and mass murder of Polish officers by orders of the Stalin himself with NKVD:s supreme commanders like Yezhov and Beria. I always thought that the real supervisor of those crimes was Beriya because Yezhov was the drug addict and very good choice for the scapegoat and after this crime NKVD:s most unpopular chief was executed by orders of Stalin, who was blamed Yezhov about the crimes, what he was ordered himself.


That way is common when some gangsters are in the courtroom. The main criminals blame their henchmen about the crimes, what they are ordered, and play some kind of angel, and we can think Stalin as the normal criminal, who just had changed to make the very large scale crimes. The demonization of the criminals makes them look like more dangerous than they are. And if we think that Stalin was the head of the gang, what took the all-state as they area, we might be right. Those men who worked in his secret police were nothing more than murderers who worked under the official authority.


Yezhov was suitable for this kind of operations, because of his addiction he was dependent on the injections and another person. And addiction made him very good perfect mask-man for Stalin and his notorious executioners. Yezhov was sadist and brutal man, who was responsible for many things, but he was easily controlled by the men, who gave him opium. And when he was executed, we must say that he was the perfect enemy of the people.


The remarkable thing about this war crime is that Katýn is remembered only because the people, who were shot were officers. After the Second World War the Soviet Union execution many trials against "the enemies of the people" in the Eastern block of Europe, and none of the victims of those trials have ever remembered. This is the question, what sometimes is under the discussions in some circles, what thinks about morality and the people relationship about morale, and we must establish that in sometimes the victims of the Katýn are remembered because they were officers.


When we are talking about the people who made crimes, we must see that every time in the court of law, there will remember only the bad things about the person, who is prosecuted some crime. And in those situations is visible how some persons forget they own role in the fights. Also, we must notice, that there will be also remembered only the last action, about the fights. That is the problem with police and other investigators. They see just the last thing, what is done in that situation. The things what have done before that fight or some other action, what brought the person in the courtroom as the accused of some criminal activity.


There is a principle in the western court system, that person is innocent until the authorities prove that person is guilty. And if somebody is suspected of a crime, that is the thing, what should not tell other persons. The thing, what will tell to some person that the charges might be raised, are that the person's faces very strong bureaucracy in their life. There will be many double checks in every time when this person makes something, and also there will be found many other things like slow reaction if this person is asking for help

Tuesday, December 5, 2017

What kind of picture of the hacking is given in the public media?

Does normal hackers this kind of equipment?

Kimmo Huosionmaa

In the beginning of the text is a picture, what I used before. I must ask is it the picture of the real world of hackers? Of course, it is published in some newspapers, but does real hacker this kind of systems? The picture is really taken from the Internet, and it was mentioned originally for the art of the story. In my opinion, if some hackers have this kind of resources, they must have very much financial support.


Most of that kind of persons are not dangerous, but if the hackers are working with international criminals, could those people want that this computer genius will be silent forever, and that's why they might kill this kind of people, what those gangsters think that they are weak rings in their organization. If the criminals are the part of the mafia, they might be very dangerous, and if they think that somebody is useless, they might kick that person off the system, and they can't leave evidence of their actions. The gangsters can play the people like Greenpeace and claim that they are looking for the evidence of corruption etc. , and they might hire hackers to make computer brakings inside the police computers to find the covered agents from their organization, and if the hacker will know too much about their work, those criminals might want to silent this person, because they don't want any witnesses to this kind of crimes like drug trafficking and murders.


When we are looking for the photos, what will jump to our screen, when we are searching the Internet using the word “hacker”,  must we ask ourselves one special question. “Is the hacker this kind of person in real life”? The equipment in those pictures are fantastic, and the working spaces are awesome, but in those photographs are given the picture, that those hackers have very much financial support for their operations. In the real life, most of those people only dream about this kind of equipment and working areas. The problem of the hacking tools is that all the equipment, what is fully downloaded from the net must be registered. In this text, I will analyze the hacking to set myself to hackers position.


If I want to be phantom of the Internet, I would not use the software, what can link straight to my telephone or bank account, and that’s why I can’t use the software like Kali-Linux in my illegal operations. Of course if I were the spectacular programmer and I have lots of time, I could make the hacking software myself, but the programming skills must be very good, and of course, I should have enough time to make that software. In the real world making the hacking tool is not so easy, that the code is properly done in the one hour, and in the real world making the programs is not the synonym for the word “coding”. Making the code is, of course, the big function ft r the programmers, but also testing is the important part of the process. When we are talking about the making the program, we must make one thing clear.


When somebody wants to make the program, that person must not even know how to make codes.  That person must only get the list of the codes, and then connect that code to freeware code editor like “DEV-C++” and then just compile that program, what might be delivered with the World documents. When the mission of the hacking is purely illegal,  that hacker must hide identity very careful. If we are talking about official so-called “white hat” hackers, they can use the official software, what is properly tested. But how the criminal hacker does the test of the programs, and the programming editors sometimes codes the operating systems user information in those programs, what is made by that editor.


This is the thing, what is made to guarantee the programmer’s rights of that product, and that thing can be used for tracking the hackers. Normally the hackers don’t have millions in their bank accounts, and they don’t have very cool places, where the can make their operations. Of course, there is somewhere international gangs, what are lead by military intelligence, but normally hackers can only dream about this kind of offices, what are seen in the picture above this text.  Normal hackers operate in their homes, or they will use some other open networks. Those networks are found from the library or some kind of public places, but the problems are the limits of the batteries. And that's why that kind of connection is unstable, and when the hacker stands on the streets this person might be in danger to be targeted by robberies or some person might stand behind this hacker and see what's going on in this person's computer screen. That's why the hacker needs the secure place where to work without risks. And this is why those persons will normally do their missions at home.

New autonomous task units are entering service.

"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...