I am back after a long hiatus which was rather fruitful. Many documents gathered, images obtained, lists formatted for blogging, and much more.
The Gazprom list is here, as the first installment. That post has been empty for quite some time, because back then I thought I had the list, but it arrived in a poor-quality hard-copy.
This time I have in my possession some more of Putin's communications, transcripts of Russia's naval operations, mysterious codeword texts, radio intercepts, documents that the Bear has pilfered, all ready for the prime time.
Any requests?
Showing posts with label status report. Show all posts
Showing posts with label status report. Show all posts
Wednesday, November 12, 2008
Friday, July 25, 2008
Secret status report
I have been really busy, more than I thought I'd be considering the summertime and the approaching vacation season. I have a lot of content for upcoming posts, the content itself not quite ready for the prime time, since it needs to be sanitized and the names of the innocent to be protected. You just never know where Putin's plutonium men will pop up next.
The visitor map is rather simple. More than have the visitors came from the US, and the rest from Russia and UK. Less than 15 percent remaining are random, or not so random hits from Germany and other European countries.
I know for sure not to post network host names that visited this blog, since it has caused some consternation that was beyond my expectations or aspirations for this blog.
Up ahead - more stuff on the BAE espionage affair, some more of Putin's personal, politically relevant correspondence, and other products of Russia's pathological megalomania.
Any requests?
I know for sure not to post network host names that visited this blog, since it has caused some consternation that was beyond my expectations or aspirations for this blog.
Up ahead - more stuff on the BAE espionage affair, some more of Putin's personal, politically relevant correspondence, and other products of Russia's pathological megalomania.
Any requests?
Thursday, April 10, 2008
Hutch's E-mail application
Associative memory brings back an episode of the Internet's nascent days, 1995-early 1996. Hutch asked me to accompany him on a electronic mail procurement mission.
We knocked on the door of a Palmer Park apartment walk-up, and were led inside a turmeric-fumigated abode. The Indian engineer, a software magician, was uneasy, since it became clear to me that he owed Hutch a big favor for an INS matter. Hutch asked in no uncertain terms if in a matter of three (3!) weeks he would have a program he could carry around on a floppy diskette (1995, remember? No sign of USB), which would allow him "to send electronic mail from any computer" connected to the internet and having a floppy drive.
And thus the Indian wrote the magic code. Hutch used it mainly at random terminals of public libraries. The peculiarity of e-mails which he sent was that the headers From: field contained a domain of a web site he had to be on to send the e-mail.
I remember seeing headers like
From: Curious George CGN @07.22.1995.politics.cnn.com
I think this was the coolest e-mail application I ever seen. It was just like my bot that has been working wonders for me, see Russian Torpedo, Putin's Letter, espionage search results, FSB Employee list, FSB secrets, and Bot writing.
We knocked on the door of a Palmer Park apartment walk-up, and were led inside a turmeric-fumigated abode. The Indian engineer, a software magician, was uneasy, since it became clear to me that he owed Hutch a big favor for an INS matter. Hutch asked in no uncertain terms if in a matter of three (3!) weeks he would have a program he could carry around on a floppy diskette (1995, remember? No sign of USB), which would allow him "to send electronic mail from any computer" connected to the internet and having a floppy drive.
And thus the Indian wrote the magic code. Hutch used it mainly at random terminals of public libraries. The peculiarity of e-mails which he sent was that the headers From: field contained a domain of a web site he had to be on to send the e-mail.
I remember seeing headers like
From: Curious George CGN @07.22.1995.politics.cnn.com
I think this was the coolest e-mail application I ever seen. It was just like my bot that has been working wonders for me, see Russian Torpedo, Putin's Letter, espionage search results, FSB Employee list, FSB secrets, and Bot writing.
Tuesday, February 12, 2008
spy-curious network locations
Here we have written a bot in U6-ICICL to harvest network locations from any search engine queries. (Previously we have revealed command strings in ICICL-AIPL which would find intentionally obscured public information from commodity exchanges)
Just a couple of days ago we have unleashed a bot that gathered officers' names from Russian Security services internal directory. This time the ICICL bot incessantly shuttled back and forth between a search engine server and a source of any query that asked for any of our own preset ,arbitrary espionage-related keyword, "secret report" for example). The results are interesting. Federal security service of Russian federation is understandable, but the Texas State Transportation Department, Gazsvyaz (gas communication?), Calgary Board Of Education?
bb-hfa
verizon internet services inc.
road runner holdco llc
earthlink inc
*se4-drp*
performance systems international inc.
telstra internet
adsl-go-plus
comcast cable communications inc.
cox communications
federal security service of russian federation
gesti n de direccionamiento uninet
jnec7300i02_consumer
volia subnet
*se3-ptk*
adsl pool - bras7 lsanca.1158477
adsl-fixip-cust
agt
allstream corp. corporation allstream
atx telecommunications services
bezeq international-ltd
bison building materials
bluewin is an internet service provider in ch.
btnl-chn-dsl
buyers united inc. - ucn
cable & wireless telecommunication services gmbh
cable and wireless jamaica
calgary board of education
charlotte bus & rv inc
command data inc.
data link impex
denton wilde sapte
east midlands regional broadband consortium
ezula inc-041105174302
france telecom
gazsvyaz ltd
harris county central technology center
hk cable tv ltd
iinet limited
imported inetnum object for monash
insight communications company l.p.
microsoft corp
netcologne gmbh
paetec communications inc.
pioneer online pvt. ltd.
poyner & spruill
pppox pool - bras15.lsan03-1179372062
pppox pool - bras15.lsan03-1189477562
pppox pool - bras21.rcsntx 011606 0935
pppox pool - mrdnct rback7
pppox pool - rback2.chic01
pppox pool - rback6.ipltin
private customer - sbc internet services
provincia di milano public subnet
proxad / free sas
qwest communications corporation
racetrac petroleum
range2 mansfield /18
rogers cable communications inc.
severen telecom
sevsky network in yalta and chernomorsk
sify limited
smart broadband incorporated
speakeasy network dsl
star broadband services(i) pvt. ltd
suddenlink communications
sympatico hse
telefonica de espana
telenet broadband cable operator network
telenet n.v. residentials
telenet operaties n.v.
telus communications inc.
texas state department of highways and
public transportation
tiscali italia spa
tpg internet pty ltd.
tstt isp
tt adsl-meteksan ttnet dynamic_aci
strange things are floating around on the net
Just a couple of days ago we have unleashed a bot that gathered officers' names from Russian Security services internal directory. This time the ICICL bot incessantly shuttled back and forth between a search engine server and a source of any query that asked for any of our own preset ,arbitrary espionage-related keyword, "secret report" for example). The results are interesting. Federal security service of Russian federation is understandable, but the Texas State Transportation Department, Gazsvyaz (gas communication?), Calgary Board Of Education?
bb-hfa
verizon internet services inc.
road runner holdco llc
earthlink inc
*se4-drp*
performance systems international inc.
telstra internet
adsl-go-plus
comcast cable communications inc.
cox communications
federal security service of russian federation
gesti n de direccionamiento uninet
jnec7300i02_consumer
volia subnet
*se3-ptk*
adsl pool - bras7 lsanca.1158477
adsl-fixip-cust
agt
allstream corp. corporation allstream
atx telecommunications services
bezeq international-ltd
bison building materials
bluewin is an internet service provider in ch.
btnl-chn-dsl
buyers united inc. - ucn
cable & wireless telecommunication services gmbh
cable and wireless jamaica
calgary board of education
charlotte bus & rv inc
command data inc.
data link impex
denton wilde sapte
east midlands regional broadband consortium
ezula inc-041105174302
france telecom
gazsvyaz ltd
harris county central technology center
hk cable tv ltd
iinet limited
imported inetnum object for monash
insight communications company l.p.
microsoft corp
netcologne gmbh
paetec communications inc.
pioneer online pvt. ltd.
poyner & spruill
pppox pool - bras15.lsan03-1179372062
pppox pool - bras15.lsan03-1189477562
pppox pool - bras21.rcsntx 011606 0935
pppox pool - mrdnct rback7
pppox pool - rback2.chic01
pppox pool - rback6.ipltin
private customer - sbc internet services
provincia di milano public subnet
proxad / free sas
qwest communications corporation
racetrac petroleum
range2 mansfield /18
rogers cable communications inc.
severen telecom
sevsky network in yalta and chernomorsk
sify limited
smart broadband incorporated
speakeasy network dsl
star broadband services(i) pvt. ltd
suddenlink communications
sympatico hse
telefonica de espana
telenet broadband cable operator network
telenet n.v. residentials
telenet operaties n.v.
telus communications inc.
texas state department of highways and
public transportation
tiscali italia spa
tpg internet pty ltd.
tstt isp
tt adsl-meteksan ttnet dynamic_aci
strange things are floating around on the net
Labels:
espionage,
fsb,
intelligence,
need to know,
programming,
status report
Subscribe to:
Posts (Atom)