Showing posts with label programming. Show all posts
Showing posts with label programming. Show all posts

Thursday, April 10, 2008

Hutch's E-mail application

Associative memory brings back an episode of the Internet's nascent days, 1995-early 1996. Hutch asked me to accompany him on a electronic mail procurement mission.

We knocked on the door of a Palmer Park apartment walk-up, and were led inside a turmeric-fumigated abode. The Indian engineer, a software magician, was uneasy, since it became clear to me that he owed Hutch a big favor for an INS matter. Hutch asked in no uncertain terms if in a matter of three (3!) weeks he would have a program he could carry around on a floppy diskette (1995, remember? No sign of USB), which would allow him "to send electronic mail from any computer" connected to the internet and having a floppy drive.

And thus the Indian wrote the magic code. Hutch used it mainly at random terminals of public libraries. The peculiarity of e-mails which he sent was that the headers From: field contained a domain of a web site he had to be on to send the e-mail.
I remember seeing headers like

From: Curious George CGN @07.22.1995.politics.cnn.com

I think this was the coolest e-mail application I ever seen. It was just like my bot that has been working wonders for me, see Russian Torpedo, Putin's Letter, espionage search results, FSB Employee list, FSB secrets, and Bot writing.

Tuesday, February 12, 2008

spy-curious network locations

Here we have written a bot in U6-ICICL to harvest network locations from any search engine queries. (Previously we have revealed command strings in ICICL-AIPL which would find intentionally obscured public information from commodity exchanges)

Just a couple of days ago we have unleashed a bot that gathered officers' names from Russian Security services internal directory. This time the ICICL bot incessantly shuttled back and forth between a search engine server and a source of any query that asked for any of our own preset ,arbitrary espionage-related keyword, "secret report" for example). The results are interesting. Federal security service of Russian federation is understandable, but the Texas State Transportation Department, Gazsvyaz (gas communication?), Calgary Board Of Education?

bb-hfa
verizon internet services inc.
road runner holdco llc
earthlink inc
*se4-drp*
performance systems international inc.
telstra internet
adsl-go-plus
comcast cable communications inc.
cox communications
federal security service of russian federation
gesti n de direccionamiento uninet
jnec7300i02_consumer
volia subnet
*se3-ptk*
adsl pool - bras7 lsanca.1158477
adsl-fixip-cust
agt
allstream corp. corporation allstream
atx telecommunications services
bezeq international-ltd
bison building materials
bluewin is an internet service provider in ch.
btnl-chn-dsl
buyers united inc. - ucn
cable & wireless telecommunication services gmbh
cable and wireless jamaica
calgary board of education
charlotte bus & rv inc
command data inc.
data link impex
denton wilde sapte
east midlands regional broadband consortium
ezula inc-041105174302
france telecom
gazsvyaz ltd
harris county central technology center
hk cable tv ltd
iinet limited
imported inetnum object for monash
insight communications company l.p.
microsoft corp
netcologne gmbh
paetec communications inc.
pioneer online pvt. ltd.
poyner & spruill
pppox pool - bras15.lsan03-1179372062
pppox pool - bras15.lsan03-1189477562
pppox pool - bras21.rcsntx 011606 0935
pppox pool - mrdnct rback7
pppox pool - rback2.chic01
pppox pool - rback6.ipltin
private customer - sbc internet services
provincia di milano public subnet
proxad / free sas
qwest communications corporation
racetrac petroleum
range2 mansfield /18
rogers cable communications inc.
severen telecom
sevsky network in yalta and chernomorsk
sify limited
smart broadband incorporated
speakeasy network dsl
star broadband services(i) pvt. ltd
suddenlink communications
sympatico hse
telefonica de espana
telenet broadband cable operator network
telenet n.v. residentials
telenet operaties n.v.
telus communications inc.
texas state department of highways and
public transportation

tiscali italia spa
tpg internet pty ltd.
tstt isp
tt adsl-meteksan ttnet dynamic_aci


strange things are floating around on the net

Thursday, January 31, 2008

Bot harvests FSB secrets

Soon after the previous post we have unleashed a bot using intriguing keywords that are usually associated with the cloak-and-dagger domains

("recce, FSB, проксимити-пропуск, секретныe сведения," etc.)

hereunder are the results:

Алексей Кондауров, Генерал ФСБ в запасе
[Alexey Kondaurov, (ret.) FSB General]

Александр Купряжкин, генерал-лейтенант ФСБ начальник Управления собственной безопасности (УСБ)
[Alexander Kupryazhkin, leut.general FSB, director of the USB]

Александр Бортников, главa экономического департамента ФСБ
Alexander Bortnikov, the Chief of the FSB Economics Department

Отметка органов ФСБ России о проведении проверочных мероприятий для оформления допуска по третьей форме
[FSB authorities grading ("white paper", grade"?), of vetting procedures for filing clearance applications]

Журнал учета выдачи справок о допуске
[Log of clearance inquiries]

Номенклатура должностей работников,подлежащих оформлению на допуск к особой важности, совершенно секретным и секретным сведениям
[List of positions that must apply for a Special Importance, Top Secret and Secret clearances]

It is impressive to realize first hand the power of artificial intelligence.

Saturday, January 19, 2008

Bot Writing

Previously we have revealed command strings in ICICL-AIPL which would find intentionally obscured public information from commodity exchanges. What if we have a fire-and-forget script, as they say in C+++ and other worlds, a bot of sorts, that would find a precious information and deliver it for us on a silver plate, in other words, in an easy-to-read, formatted file.

Let's use U6's LUICS again. Let's start with the ICICL and AIPL prompts (can we keep it to one, albeit long line, vs. a kilobyte-heavy Microsoft script?):

!@net exit net:pack(open any;tcp/ip:tunnel:any<:any>) look(www:"*.*.*":"*.blog*.com") script(>1:gen(pack:cell:block) get check("*text":"gold,commodity, dollar, bank, central, bubble, crisis, flight, US, China, oil") then get( "noun other(check) use(dictionary synonym simple)[any local] text("?find.rtf") return any time chrono show(("bug name"(Gold Bug)))

The above command contains an ICICL net:pack code which lets it loose, and in the eventuality of unknown network environment, server obstacles, or content hosted by a third party, will let the bot literally turn to a closest U6 hub and fetch an additional AIPL code to read what seems to be an incomprehensible content.

By specifying the "www" we would narrow down the search to the www domains only, eliminating the need to pore through every FTP and other environments.

Since every lemming out there naively went and bought Mac-Linux-Windows server, there is virtually no machine that can recognize U6-specific commands, and, at worst, would discard it through an equally naive, dumb-machine decision of a checksum rejection.

Look at the Gold Bug command again. Short, sweet, intuitive, even to a pierced, pot-soaked wigger youth smart enough to get an A at his liberal-curriculum worship club he calls his high school.

Sorry for the poetic digression. Barring any server patches or exotic things like JAVA BOSSPlus and CGI Gateless, for which the Gold Bug turns to a nearby support machine, the bug is to  look for any content having the check keywords, then  grab the content, and format it, for demonstration purposes  here substituting  non-keyword nouns with simple synonyms from a dictionary found at any workstation of the host, or any nearby U6 machine.

Nice, ain't it? What do we do next?

Thursday, January 17, 2008

AI Language Finds Gold Reports

The  is an electronic trading system that replaces the open pit trading system after 2:00 pm each business day, and continues until 8:00 am the following day. Trading stops for the weekend at 4:30pm Friday and resumes at 7:00pm Sunday, NY time.
Trading volumes are much lighter in the Access Market. Glitches in the system have created unusual spikes in the gold ticker in the past that have nothing to do with actual price movements. Always check anomalous dips or spikes with another reputable pos source. The wealth of real-time information, on Sunday, is literally worth gold, pun intended.

The NYAM by its nature is an open, public POS, but it does not have an online public access. How do you find it? One method is to spend countless hours on Google, and maybe you can glimpse a possible URL in discussion groups.
If you know how to get onto a U6 hub (some of them are here) while knowing the ICICLE and AIPL commands, or, better yet, you have a Photonic, and not an IBM PC/Windows machine that can find it in a jiffy, then you are about a minute or two away from the totally legit insider info.  Do this - type in the command window:

!@find net www/any search string directory[NY Access Market] check(script,object,any/any) pack(open;999::tcp/ip) show chars@!

See for yourself the unsurpassed cleverness of the AI engine supporting this command, by getting a continuous reports on gold prices from the real players in the trade - London, Sydney, Hong Kong, by inserting the floor name in the square brackets:

[Sydney:gold trade:]

and you are in the know. You might need it - the gold is heading for the psychological threshold of $1000 an ounce.

 If you happen to be a trader in pork bellies, or palladium, or depleted uranium, then the AI system shall surely find for you at least the login window of the exchange you are looking for. Just try the above command, and instead of gold trade write in depleted uranium.