Showing posts with label skills. Show all posts
Showing posts with label skills. Show all posts

Sunday, September 7, 2025

Hacking as the new and old threats.

   Hacking as the new and old threats. 



There are always suspicions that organized crime uses hackers to steal psychiatric papers to get policemen, prosecutors, and judges fired. Same way. Fake papers can also be a tool that allows people in foreign intelligence to make military forces. To kick off their best commanders. Sensitive information can be used to blackmail even top-level politicians. 

Hackers are people who steal data. Some of that data is harmful, or it contains personal, sensitive information. That kind of data can be a very effective tool if someone wants to destroy someone’s reputation. Hackers can steal data from psychiatric services and try to blackmail politicians. One of those cases was the Vastaamo case, where a hacker stole client information from a psychotherapy company. That hacker also sent a SWAT team to a person’s home and marked one aircraft passenger as a bomb carrier. Hackers can also make things like deactivate the payment cards of their victims. 

Or, in some cases, hackers simply steal money from accounts. If a hacker steals 1 euro. From 10,000 bank accounts. Those victims might not even notice that thing. Or do you follow every euro that is lost from accounts? If there is a loss, let’s say 1 euro, do you call your bank? You should tell that thing. Because in those cases, hackers steal a small sum from many accounts. But are hackers evil people? Some of them are. Some of them enjoy their crimes, and they want to hurt people. 

Being an effective hacker. You don't have to be a computer genius. You must only have access to passwords. One unprotected telephone on the desk gives a hacker access to the entire system. If a telephone is left open on a table, the hacker can call the IT support. And ask for access to the system. If that is some very high-level boss's telephone, that makes it possible to create a super user’s access to the system. That allows an intruder to make new users.  And that allows hackers to expand that operation. 

We can say that all criminals are marginal people. But what makes them marginal people? When some ex-neonazi or MC-gang member wants to get back into society, those people carry the criminal stamp. The rest of their lives. Some people ask, can ex-Nazis or other ex-criminals really regret their actions? If we think like that. Criminals are individuals. That means some of them regret, and some of them don’t. 

We will put those people. Into a marginal position in society.  The rest of their lives. And that raises the risk that those people will commit other crimes. If a person is surrounded by other criminals, they cannot re-integrate into normal life. 



Only jobs. What the ex-inmates can get is some kind of cleaning work. They carry a criminal stamp. The rest of their lives. 

So, are hackers criminals that society created? We can say that some of them have criminal behavior. Because of other people. didn’t accept them for who they are. The media introduces computer hobbyists as some stereotype who is not social. Their place in a mental hospital is the message. Those people face demeaning treatment; they have no girlfriends, because some elder guy wants to show that they are alpha members of some school party. What would you feel if somebody yelled at you, “Get out”? Would that be non-respectful behavior?

What if your workplace treats you as necessary furniture, whose mission is to do jobs? But whose mission is to be otherwise invisible. There are people who just wait to fire those ICT support persons. They show their authority to those people all the time. So, what if your workmates treat you without respect? What if you are always an outsider? Would you want to take revenge? Those kinds of outsiders are excellent targets for a criminal gang recruiter. The hyride threat is that those criminals can cooperate with foreign intelligence services. And they can give a tip for those hostile agents. Maybe they get guns or drugs as payment for cooperation. 

And then we must ask why hackers are what they are. In this case, we must ask why computer hobbyists are what they are. Those people are boring nerds who are not in any way interesting.  Do you know those people? Some of them are people who don’t find any social hobbies. They are people who are lonely because nobody wants to play with them. And the computer is their only friend. Then some criminals come and offer money or women to those people. Some hackers are young, and they don’t understand why some criminals want policemen's home addresses. But then. We must realize. People grow into criminal behavior. 

Maybe the first case that. Those people did it for revenge. It’s easy to steal somebody's passwords. To some system, and then send a message to customs or airport security. When we think of things like professional hackers. Those people work for some criminal organizations or governments. 

Some hackers are made by governments. They can be forced to make those things for the military intelligence. Or some criminal organizations can blackmail them. The fact is, this hacker must not be a qualified programmer. That person must not be an extreme computer genius. If the person gets access to the system is enough. One of the oldest tricks is to play some cleaner and then step into the office. And search for those passwords in the places. Like under keyboards or from computer briefcases. 

The question is always who made the initiative.  Who gave the idea for the hacking operation? Or was it the hacker self, or somebody else? That means some sensitive information can be used as a booster in political games. Psychiatric papers are tools that can offer a possibility to clear the competitor out of the way. That means some people can steal those papers. And some other people are willing to pay for that kind of information. 



Sunday, March 4, 2018

The secrets of Moses and Pharaoh were a big thing at that time.


(Picture 1)

Kimmo Huosionmaa

In the movie “The raider of the lost ark” was a scene, where hero put the stick in the hole and finds a secret model, what shows the place of the Ark of the Covenant. But when we would think, what those “magical sticks” actually do, we would find very inventive technical solutions, what might look very impressive for ordinary people of that time. The stick might have the normal lens, what has long focal length. That would cause a very impressive reaction when it focuses the focal point in certain place.


But when we will start to use our imagination for those things, we must realize that those people had deadly traps to protect their secrets. In this case, the holy men or the guardians of secrets could use those lenses to burn the seal of the graves or storage of secret documents. This is only the imagination, but those secret files might be protected in the very deep. And they might consist the contracts of the leaders, what would not want to tell to ordinary people.


One of those secrets might be that the secret contract between Pharaoh and Moses. But what that contract might involve? If the escape to desert was pharaoh’s idea, we must ask, why he did that? When we are thinking about the social position of Hebrews, we might guess that pharaoh might want to decoy those people to desert, and then kill them out of public eye. If Moses knew that but didn’t mention that to other persons, he would  be in danger, because when other people would get that knowledge,  they would become very angry.


But what made the power of the pharaoh? We must say that grasshoppers could be grown in some basements, and then those bugs would be released in the air. This thing would get more effect if those bugs were grown on the some special corn, what means the same corn what people plant in their fields. If those grasshoppers would grow on some special vegetable, it would think this vegetable as the primary food. And that would be used to support the power of the pharaoh.


If there would be two kinds of corn in the country, would the priests support another competitor simply way, They took the corn of the opponent, and grow the grasshoppers on it. This might seem the person, who they support, very wise man. Because they could grow the grasshoppers what eats only the corn of their opponents. That would cause great hunger in the camp of opposite competitor, and that kind of tricks would raise the popularity of the person, who is supported by the priests.


In the modern day that knowledge is used in the DEA:s operations. They would grow the grasshoppers or bird cherry-ermines on the foliage of coca bush, and that would cause the situation, where those bugs would transfer to put their eggs on those bushes foliage, and those bugs would eat every green part of that vegetable. Also, the bugs would grow with plastic explosives, and after that, they would land on the mines, and mark them to military forces.

Sources:

Picture 1:

http://www.papaleng-amazing-animals.com/wp-content/uploads/images/-hngfAsd1yCY/Ug0eMP-LwAI/AAAAAAAAOjQ/7uDeFEuCsbU/s500/1a1.jpg

https://crisisofdemocracticstates.blogspot.fi/

http://crisisofdemocracticstates.blogspot.fi/p/the-secrets-of-moses-and-pharaoh-were.html

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....