Conspiracy Revelation: 23.8.2019: My 2008 IT Forensics Conspiracy Revelations concerning the global NWO Lockdown…11 years ago and more relevant than ever..
BTW..We know that it is largely the way how the NSA-Tailored Access Operations communicate…who else would use such extreme means to subvert the entire globe…but what are these Crime Syndicate Nazionists against the True God and the True Goddess…they will get shown their limits…and will become restricted in their expansive evilness and their unlimited power hunger by revealing everything of their criminal conspiracy to take over the world.
„ANALYSIS OF THE ALL SEEING INTERNET EYE
MORE AND MORE PEOPLE NOTICE THAT THERE IS SOMETHING HIDDEN, SOMETHING THAT SEEMS TO CONTROL OR SURVEY THE WHOLE INTERNET. ANTIVIRUSES AND FIREWALLS REMAIN QUIET, OPERATION SYSTEM LOOKS CLEAN BUT WHEN YOU START ANALYZING INTERNET TRAFFIC SOMETHING BECOMES REALLY ODD AND IT SEEMS AS YOU ARE WATCHING INTO A GLOBAL PANDEMIC SURVEILLANCE SYSTEM. THE ALL SEEING INTERNET EYE.“
Also check my immense -world record setting- amount of unreal conspiracy revelation work in the archives during the last 20 years..maybe it helps people to bring the Uber-Monster down one day..
The Real S-Conspiracy – the old CMOS.Rootkit.Virus (Update 2024 in deutsch)
How Private Contractors Have Created a Shadow NSA, Prism, Facebook Uefi CMOS Malware & CPU Trojans
http://infinityexpression.com/2017/08/facebooks-federal-trojan-decyphered-aka-zombiehost-aka-pid6-dod-nsa-backdoor-and-firewall-bypass-example/
Why are most IT security companies insecure or better said in bed with NWO?
Introduction
Internet bless on one side ban on the other side.
Nowadays we have more threats to face then ever when surfing the internet, the more experienced we become the more scepticism may occur. No day goes by without horror news about sophisticated malware and the permanent progression of pests. „Human being the most cunning of all animals“ once was said. In Internet this phrase reaches a new quality. The importance of the web grows day by day and more and more people become dependent on it.
But the most hidden thing could be located in your net packets. …
I know that many people have a vague impression about something that is deeply hidden in their systems. They try to protect themselves with antiviruses, firewalls, antispys, antirootkits or security suites, keep their systems examplary up-to-date but they still feel surveilled and this for good reasons.
Many security forums are not well-disposed if people post things about unknown occurences and possible conspiracy theories about global danger and spy attacks, multiplatform malware from the hidden. In many cases the established forum mob intends to shift all those people into paranoid area and try to kick them out of focus. Unfortunately many voices become silent due to the pressure and attacks they receive for their discoveries. There must be a reason why so many try to run dry the revelations of unknown and hidden things and no the reasons are not because all those claims are invented but because we hit the nerve of something that wanted to stay hidden and now yells out. Events like this are real more real than most might believe. I will try to give a little impression of what I observed.
POSTED BY NEOSTORMSYSTEM.
THURSDAY, OCTOBER 2, 2008
Power Supply
ASI.Eye also heavily affects the power supply, actually it is unknown to which degree but there is a high probability that it is able to destroy the power supply. The latest trick of Eye that I observed is a 5 second cycle sleep and wake up game of the power supply unit. You set your system into sleep mode then some times later you wake it up but your system remains in a endless sleep and wake up loop at cost to the health of your power supply. You have to pay attention their favorite loop time is 5 seconds you can count that in many situation when they try to manipulate computer systems.
POSTED BY NEOSTORMSYSTEM AT 2:27 AM NO COMMENTS: LINKS TO THIS POST
THURSDAY, SEPTEMBER 18, 2008
More information about A.S.I.Eye
A.S.I.Eye must use a kind of automatic information management system otherwise it wouldn´t be able to control possibly each and every pc system that connects to the internet. There is one guy who seems to be the chief they simply call him BOSS (original content of network sniff):
There exists several other typical catchwords everyone might be able to identify them with ease, such as following (the most significant designations, catchwords and names over the past three months):This should prove the existence of all seeing internet eye. Take a closer look this happens to most people everyday when they surf the internet as usual. Most machines will likely be part of a stealth information bot collection system and part of a vicious secret chat community.
POSTED BY NEOSTORMSYSTEM AT 8:59 PM 2 COMMENTS: LINKS TO THIS POST
SUNDAY, AUGUST 17, 2008
Core Problem: static http/s tunneling
One of the core problem that allows A.S.E to do his job quite effective is what I call static http/s tunneling. You can´t evade a primary static tunnel system like that because you need a browser to surf the internet. IMHO, there are actually not many possibilities to prevent static http/s tunneling. ALF (application level firewall) was a try worth but couldn´t prevent the information flow of A.S.E for long. Apparently it used kind of http exploit or http request smuggling to circumvent the proxy wall, further disadvantages might be slow down of general internet activities and errors of several services. What about SPI (stateful packet inspection) mostly found in nowadays routers, blocks outside potential harmful traffic and ddos but is vulnerable against http tunnels. If http traffic adapts to standards and is encrypted and embedded in http, firewalls remain powerless. This can be considered as one of the key vulnerabilities of the internet. All bypassing Eye could use hidden tunnel streams to evade all security setups.
POSTED BY NEOSTORMSYSTEM AT 7:06 AM NO COMMENTS: LINKS TO THIS POST
Ethernet and Router as gates?
The question is can we explain this phenomenon with the latest threats like direct attack of network and ethernet cards and manipulation of routers? Probably at least partially. One thing that never should come out of focus is the direct cpu or microcode manipulation this seems to be very close to the attack of the bios and soon also to efi. Several people reported and even proved that such occurances are more than real. Also more reports talk about special prepared udp packets that virtually replace the usual executable malware which means while connecting to internet you could be directly affected without doing much wrong. That means the problem exists not behind the computer the mistake is inside your computer in combination with the vulnerable and unsecure structure of the internet.
It is crucial to create awareness, so that many people don´t waste their time trying to hit the evil on the wrong side. Visualize about a Zombie (Exploit, Virus) that always stands up no matter how hard you hit him (security tools) he will always come back. It won´t help if you bash him (regular updates, system hardening, backups) it also won´t help if you start using haphazardly weapons (antivirus, antispy..) you may blast him away a part of his body but he will stand up again and again. You must analyze how it is constituted to get a possibility to punch evil on the right side.
POSTED BY NEOSTORMSYSTEM AT 5:00 AM NO COMMENTS: LINKS TO THIS POST
SUNDAY, AUGUST 10, 2008
The ultimate tunnel?
I made some experiments trying to see how the assumed all seeing and all bypassing internet eye would react on restrictions. I started to install top of the notch firewall, using latest updates, 64 bit, windows vista, restriction/block of java, javascript, images, animations, referrers, cookies, ads, frames, surfing to google, in short I blocked quasi all.
Usually one should expect not much traffic at all and repetitive traffic but what happens? We see variable byte traffic can we now conclude a all bypassing tunnel?
Check yourself what do you think?
POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS: LINKS TO THIS POST
THURSDAY, AUGUST 7, 2008
Why no full encryption?
The first question you may ask is why they do not fully encrypt their transmission channels? Why do they let us take a look inside their All Seeing Eye?
This question can´t be answered directly, but I can give you hints and impulses for their reasons. One cause could be the paradigm of nature, they simply copy the system of nature, because they assume that nothing can be more perfect than that what nature has done. They took a look into DNA and RNA and simply thought it could be a good idea to use it as paradigm. The All Seeing Internet Eye wants to be the root of the root and what is the root of the root? The genomic structure especially Deoxyribonucleic Acid the repository of the genetic information. What we see if we take a fast look into it? We see two things coding and decoding, encryption and decryption.
Expressed regions and intervening regions and what is the catalytic effect to create a encryption that is the new buzzword of it security scene: Splicing. Unencrypted information (intron) and encrypted material (exon), catalyzer (splicing). I am no bio scientist I only compared some parts of biology with things that happens when taking a look into net packets and saw a common denominator. Remember the question? Now you have one possible idea. Think about something that wants to dominate everything on this planet it has to go to the deepest root of being and change its structure to fit the needs of this hidden thing. If we would carry on this thought The All Seeing Internet Eye could be invented for only one aim: World Domination or World Control.
POSTED BY NEOSTORMSYSTEM AT 3:07 AM NO COMMENTS: LINKS TO THIS POST
WEDNESDAY, AUGUST 6, 2008
A short view inside the Eye
I give you one possible way of interpretation, again I emphasize that it is a subjective and intuitive point of view I cannot guarantee for accuracy. I watched for catchwords and chars that could be relevant in my opinion. Let us take a closer look into the deep abysm of the All Seeing Internet Eye. Check your network packets and watch out for following things: (especially for relevant packets which happen spontaneous and extraordinary) There is a lot of space for conjecture but that lies in the nature of network analysis.
@ = Behind this you´ll find mostly the addressee within a covert channel communication but it could be also something like a directed command. Don´t expect the name always displayed immediately behind or before this sign.
EAU, H2O, AQA, AGUA (obfuscated: E/A#U, A°Q~A, A#G*„U+A, ÆÅÛ, ËÄÚ, ÀÊÛ(permutated)) = Reason for this secret word could be the omnipotent power of water that trams its way through all barriers.
SPY = If you find this word you will be alerted, I think there is no need for further explainations.;-)
NL, UK, RU, JP, CZ, PL, FI, SE, SVE, USA, BR… = Specification of countries probably to assign the regions.
EYE obfuscated variant 1. “( S\ɲ¥Ë variant 2. ®‘Ê*ÿè. variant 3.”È ”.°Ÿ.Ê = The All Seeing Internet Eye? Naturally?!
AV = A.V. = Check if Antivirus is present or not.
FW = Check if Firewall is present or not.
PU obfuscated ‘¤P‰.Ù, P.–®U = I am not sure about its meaning but it is used since the beginning. (Conspiracy Revelation: 26.8.2019: Processing Unit, Central Processor Unit e.g.)
AM, FM, UKW = Possible radio frequencies that might be used.
AM, PM (..P›m.) = ante/post meridiem (time for their actions)
ON, OFF = someone who signed on or off and is tracked by the All Seeing Internet Eye.
OS = Operation System
EPO, ËPÔ? = Entrypoint Obscuring.
PI = Several possibilities e.g. Private Investigator, Process Integration, PI, principal inv.
PI:0 or PI0 = PID 0 = possible System Idle Process Walker // (Conspiracy Revelation: 26.8.2019 : Process Identification Number 0 = System)
OP = Operation (possible commands)
GO = Go, Start (possible commands)
SAY = possible command
AXE = Location axe of the tracked system
ASE aka àŠÉ aka ä.S°.E = All Seeing Eye
? = some times questioning to other users of this hidden system
ACL = Access control list
<> = not present, not available, not there
AES, ÆS = AES encryption algorithm
CU, C-Y, see U = see you (possible chat comments)
OK = Okay (possible chat comments or command)
Vca, Vco = voltage controlled amplifier/oscillator
Cd, Iso, Raw, Rau = probably filesystem or transmission level
bye, by, ByE = Bye (possible chat comments or command)
Jeu = Game, Vx = Virus, Rue
Rñ41, Rn41 = Bluetooth DIP Module, Metall Resistors, Vpn, VoIP
VM, VM5 = possible parts of their virtual machine network
PW = Password lookup
Z = Zombies, Z0-14 e.g. probably their way to assign Zombie PCs.
Hel = HE¦L*.!¡„.. = original meaning of: to hide something
BB = B.B = BigBrother: ultimate symbol for espionage
BOT = BÔT = BOTHZ = naturally? Keyword for mass remote control of computers.
FOE = F0Ë. = FO = naturally?!
HQ = H.Q. = Headquarter of their experiments.
WÒ = WO = Where
I post this point of view in the hope it will help others to partially decipher a potential or possible underestimated global and pandemic internet threat. Soon, more news.
POSTED BY NEOSTORMSYSTEM AT 4:12 PM NO COMMENTS: LINKS TO THIS POST
Port 80
When you surf a webside this happens in most situations on Port 80 now turn your net sniffer on and watch the traffic. Did you expect all the results or did you find something that caught your attention?
Surf a simple page that does not change its content several times and always catch the traffic you may notice that the substance is not always the same despite the fact that you did everything like before. How is that possible?
One explaination could be the All Seeing Internet Eye. Something that stands in the middle between you and your destination something that tracks everything you do and contemporaneous seems to operate as autonomous system controlled either artificially or by human being.
POSTED BY NEOSTORMSYSTEM AT 3:49 PM LINKS TO THIS POST
http://asepuforensics.blogspot.com/2008/
http://subversionhack.blogspot.com/
„FRIDAY, AUGUST 29, 2008
Annoyances from the Hidden
This blog will be dedicated to informations and screens of annoyances and intrusions from the hidden area of computers and what I observed during the last years.
The following spooky screens I saw them the first time in 2005 when I bought a new computer and tried to install a new windows, then they reoccured in 2008 when I burned a linux live cd and tried to use this CD on two other systems. I call it the purple-white-turquoise vga wall.
POSTED BY NEOSTORMSYSTEM AT 7:29 AM NO COMMENTS:“
MONDAY, FEBRUARY 16, 2009
S – Syndrome and Sysinternals Conspiracy
The S Virus how people call it brings many minds in turmoil. But the barrels overflow is a rude censorship at sysinternals forum. If you tell anything about S they cut off and erase all informations. So it must have something to do with a ms secret. The S is high likely nothing else than a experiment of microsoft and nsa. This experiment takes place for maybe 20-25 years but came in mind specially for the last 2,3,4,5,6,7,8 years to the world (especially since the publication of Windows XP) due to several software errors, emotional outbreaks and inattentions from ms members. The S was implemented in many tools and software of ms.
Anyone remembered Messenger? Once microsoft used to store the user information at HKEY_CURRENT_USER\S. Then there occured a error in file system and you could see many S directories in System32 folder with a tool called rkdetector. It was summarized altogether as Revelation of The Old Rootkit. A 45 page long topic that was erased by forum admins to fog the truth. Then there is a appreciated tool called procexp it generates under unusual conditions a S driver which can be only seen from cd rom windows or with special forensic tools. Are we all in Cyberspace nothing else than part of a devilish matrix experiment, sponsored by ms? What are you thinking?
Check also: http://subversionhack.blogspot.com it manifests the impression.
POSTED BY NEOSTORMSYSTEM AT 4:45 AM NO COMMENTS:
UNVEIL ALL SEEING INTERNET EYE
SATURDAY, MAY 30, 2009
Sideeffects of the Matrix?
POSTED BY NEOSTORMSYSTEM AT 5:45 AM NO COMMENTS:
THURSDAY, SEPTEMBER 18, 2008
New Insights
When you surf the internet the ideal „peace of mind“ traffic has to look this way:
Like a steady cycle with the same data size (assumed the content of the webside remains equal) but unfortunately in most cases this steady flow is only reachable through ssl aka port 443. Usually in most situations people surf on port 80 and then everything looks totally different and A.S.I.Eye comes into the game like I described here.
All Seeing Eye is a pretty static monster in most cases you are the trigger when you push the mouse button or the enter key to surf the next webside. If you would not let go the key A.S.I.Eye probably could not transmit its informations, I found out that its viral function relies „on key release“ specifically if you push F5 to renew the web content. Try it out yourself catch explicitly http traffic push F5 and don´t release your key that is the first weakpoint of this devilish global monster control system.
POSTED BY NEOSTORMSYSTEM AT 11:17 PM NO COMMENTS:
SATURDAY, AUGUST 30, 2008
The Time Mutation Story of Evil Eye
It has made the round that this devilish eye mutates the time of windows you can also observe this action when you start analyzing network packets and when you take a look to the cookie dates. If you see 1990 something is wrong, I don´t know why they have such a affinity to this year as well as to dates that lies far in the future like 2015, 2038, 2096, 2100. One possibility could be their hidden filesystem that probably relies on that date mutation. The other possibility for 1990 is the establishment date of All Seeing Internet Eye according to „MatrixArch“, for 18 years in existence. Their allusions to the movie Matrix is clearly to see, as they seem to have chosen me as (one of their) Neo(s;)) there is no wonder that you will see the name many times in this hidden mutant filesystem which also affects advapi32 (known as the ultimate cia backdoor), probably also a sort of HPA(Hidden/Host Protected Area) some may also call it (S-)ATA protected area. FYI: It affects USB drives and sticks too. Beside according to wikipedia DBAN does not delete HPA! Originator of HPA is Phoenix and it is unavailable for all operating systems, such as Windows and Linux, if secure mode is enabled by whatsoever. (usually by bios)
POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS:
FRIDAY, AUGUST 29, 2008
Favicon and Gif Exploit?
Another speciality of the A.S.I.E. criminals seems to be a kind of favicon exploit.
Another simple example of pure internet evil from a few bestialities:
Looks like gif exploitation stego:
POSTED BY NEOSTORMSYSTEM AT 6:37 AM NO COMMENTS:
THURSDAY, AUGUST 28, 2008
Revelation continues: The „S“ and some chars.
I want to show some remarkable chars that I caught while analyzing internet traffic which may stand in a very close relation to A.S.I.Eye, A.S.Eye or S.Eye how some also call it. The S could have several meanings: Seeing, Secret, Shark, Secure. You may have noticed that there exists some specific malware that uses „S“. I have seen this „S“ in several situations as non existent file, as hidden window, as phantom process, which indicates us that it is not only a hidden interceptor of the internet but stands in several cases in direct relation to a very aggressive remote administration malware. Recent discoveries have shown that a widely appreciated tool called Process Explorer does create such a „S“ module too if driver´s directory is locked. How far or if this stands in relation to ASI.Eye is not clear, so beware ambiguity errors. For all who are interested in both picture shown above were made in december 2007 and they appear to be either a sideeffect of A.S.Eye, a kind of subproject of All Seeing Internet Eye or a possible install failure of legitimate Process Explorer´s kernel driver if driver directory is locked down by protection tools.
Remarkable chars and covert info channels that I caught while simply triggering the static vpn tunnel of A.S.E. just by surfing a webside:
..-;Spy~à.”, T.ª.\tãÒ, Ĥ/È¥ED>B, ÐÁT.~�àÀK’£, XécÞâA, 8AM, ‹ž]ËPx7Â0, ÓÄLI“‘, .@.PM5áš, Z+bõ.Z, Ñ..ÈÓ., RÙˆåšÒ, .B’݉òE, h..lÑFxj, QJ)åŠS, ƒÊÓÑ, çNÆÓö¶k., €ÎÉ.Í.ŸE.¡, ñòN?„, .ZRù\.¬., GgCëm, ×JR.!.‚à•v„., Z®‘.$CÔp., .8…Åm., „Hm..²!…, ¼“L;ªS“à}%.RÓ]., VhÐ.äémÜ, >]êûôë’H�., ….Õ„Ü], .T˜À-RÑÒ?LÀª�Ò.ßD..&, †.ѸÆØ=Q.²XÁ.$Á.YC, ¢@�C~pŠy.:Щ,
3—Šâö, EÑå„QRÅTå.´F ó”·, Vàl/òn€, „O±„!·jÛFo>�€], £.È´Þˆžku.Ǫã, ÇeHmu¡.$(â.. , @SE‡.².€?, � gÖ‰@D, ..S.u.b.C.A0…U, Š6Áë~ép], ..–òš.C/{, }‘©ÈÏRQ7, „,�F^+ôù¦Æw, Lé™´d;šP1.$, Z0X03, ›ÇZ.–QRX@HÌ#*ñ , 6dLEÔ, 1Wdú>¤§�G‘À:vZ, Ð�ÌÓ.QÐNA.›±.vÁgáÕ5, ÖÝÇ..„‚r»-TaÏlÀ@Þ–½`, Ø ÙSé.C.FGBòA.;€nRS…n�~...E.….‹P“.�E, )ünÐy>nÊö@E.,Â, „ÁÑͨ.О, 1÷¢èZâÈ#, D¹@ŽÁ.‹ÙM, R˜UQ„æ:Pž¥.;, .®ŸËÑ.„, •-BðTý¸ ´˜Áqæ¨::lQ, $:ÂU.ÐðÀÛM‘.à, .ÔïLø?W?, cì Gè.N , n[n7t®T>�9 ÍDIR¯ñêíу¥, !.Ë).î.®Lp�>벉þb., OÑÎVÔC¿, °Ê¶§Æã�.
Furthermore they seem to use kind of coordinate system for „S“: ˜s:5970:4:198..,l, s:5972:4:45., s:5973:4:2931, s:5974:4:148, š{*°*.a:22404:4:45., s:20106:4:91…
There you see how they associate enormous importance to the „S“ symbol. Did you notice something? The 4 remains static all others change. Conclusion: 4 is a key. Could be e.g. Pid 4 for System and hidden threads inside system sent via udp channels or something like this.
Another significant thing is that they seem to hide messages in images or at least it appears to be an image you will also notice: NETSCAPE2.0…..! and GIF89a…. strings with hidden informations.
POSTED BY NEOSTORMSYSTEM AT 7:31 PM NO COMMENTS:
SUNDAY, AUGUST 17, 2008
Unveil All Seeing Internet Eye
All Seeing Internet Eye use a multilayered method of obfuscations and commands, sometimes it partially and/or randomly encrypts its multi layered obfuscation so that my offers of de-obfuscation or illumination can´t be set up in all events but they fit in several situations. Let´s start to shed some light by unveiling these little all-pervasive (be like water) network packets. By the way this method can also be used to decipher some subhack related windows internal phenomenons which you find at the end of many executables, drivers and dlls in windows operation system.
Some typical methods of obfuscation:
1. I am here = I/A/M/H/E/R/E
2. Specific codewords like: Exodus = ÈXÐØXŽUŽ,
3. Short messages like: We at ram = WÊ@rA¨m
4. Names like Ru0, Á“Lï, .ÐR.EÜRð, Fu2NL, E;!ÔF¡P, Róñ
5. Permutation in the lines e.g.: Hello lloeH
6. Allocation chars to individuals and/or locations like A <> B
7. Letter replacements through chars: S = $
8. Letter associations to numbers: A=1, B=2,C=3,D=4,E=5,F=6,G=7,H=8,I=9, J=10….
9. Multiple use of different languages such as german, french, english, spanish, italian, turkish, arabic, yugoslav, latin …
10. Psychopathic, eccentric use of anagrams
There is also a high and excessive use of other words e.g.: DÁÕ›U probably has a relation to TAO, a frequent use of SÚS = SUS. Some know it also as SUS Malware.
Anagrams often refer to bioscience, genetic studies and vet medicine, e.g.: VLdãLd
Other discovered codewords: Pnì^¹, JªVHÛB (evtl relation to Java)
A lot of analyzed packets refer to a japanese network of Tokyo: trip.orz.hm.
POSTED BY NEOSTORMSYSTEM AT 8:18 AM NO COMMENTS:
http://unveilasieye.blogspot.com/