https://metsantarinoita.blogspot.com/
Kimmo Huosionmaa
WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the co-operation between governmental and private security corporations, what are actually intelligence agencies.
Somebody has even claimed, that the CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.
This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.
Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.
Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets, some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.
If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.
Showing posts with label data. Show all posts
Showing posts with label data. Show all posts
Friday, August 10, 2018
Saturday, February 24, 2018
What is the difference between bio- and genetic manipulation?
![]() |
(Picture 1) |
Kimmo Huosionmaa
There are some differences of bio- and genetic manipulation. Biomanipulation actually means to make artificial cell-lines, and actually, there would be no touch for genomes. One version of biomanipulation is to make artificial retina and surgically implant that retina in the eye, and the retina can be made by cell base, what is filled only with cone cells. Also, two type of vegetables can be connected mechanically, and those combinations make the saplings, what are from an upper vegetable.
Biomanipulation is effective, but it takes time. The modification of the organisms will not transfer to next generations. And mass production of those organisms is very difficult. Genetic manipulation is the more effective way to compile species and give them new features. The needed thing is an artificial virus, what has wanted genome, and that little DNA-bite would be transferred to the nucleus of the cell. The problem is that those manipulated organisms are that those features would transfer to next generations of that organism.
One of the possibility of genetic manipulation for improving some species like a human is to connect genomes to the cells, what makes possible to create chlorophyll in the cells of mammals, and in some visions, those manipulated humans may have roots or threads in the skin, what can take food and water from the air. Those threads might also have harpoon cells, what protects this creature. When we are thinking about the combination of the human and other species, we might face the situation, where we are creating an alien, the species with superpowers. That creature might have a similar nervous system like bugs. It can use only electricity, what means that neurons could connect together and close the synopses.
That would make the brains more effective. Also, those manipulated organisms blood might be poisonous. And the chlorophylls in the skin makes possible to produce sugars in the creatures own body. This might be the route of controlled evolution, and maybe tomorrow we can order the features, what we will have in our next life. In this futuristic scenario the human would record their life by using WLAN-implants, and of course, the body will be cloned. This might make the person live forever. The cloning of the creature will happen by changing the DNA inside the nucleus of just when fertilized ovum. And that would allow making modifications even to human body and mind.
Sources:
Picture 1
https://www.biology-questions-and-answers.com/images/Genetic-Engineering.jpg
https://crisisofdemocracticstates.blogspot.fi/
http://crisisofdemocracticstates.blogspot.fi/p/what-is-difference-between-bio-and.html
Thursday, February 15, 2018
How the Internet-observations officer chooses the individual, who is put under surveillance?
![]() |
(Picture 1) |
Kimmo Huosionmaa
Many people are thinking, that it is safe to avoid the hotel's WiFi networks because the operators can catch the data from the WiFi, but they are entirely wrong in this case. The reason why those persons are wrong is that if they don't use the free Internet, there might be something to hide with those people because they don't use that WLAN even with big laptops, and this makes the observers curious. They are looking for people, who use sophisticated and robust network security when that will compile in the things what they do on the Internet.
The situation, when the safety makes person suspected data criminal is like using the enterprise-level security solutions in-home network, and of course, if those solutions are expensive, could that cause that the interest of put this person under surveillance will grow extremely high. Those surveillance operators will not use only one method to break the privacy of the targeted person, and those operators use normally also telescopes, binoculars and small remote control helicopters in their missions. But the massive number of data will go thru the Internet Sockets all the time.
But somebody will know, that exception to the normal behavior will be noticed by the surveillance team. If some person normally uses credit-cards for paying, but suddenly will that same person starts to use cash, will that cause the reaction in the surveillance screens. And the reason for the change of behavior must be found. Another way to make the surveillance team very interested in avoiding some services.
One of the misunderstandings is just avoiding the franchise hotels, what belong to some ring. In the small independent hotels have the smaller number of information in those databases and the operators must just check the data. If there were many more users, the data storage will be so large, that the systematical check of that information would be very long action. But in the big and small systems is small differences. Then somebody wants to keep the name as the secret, will this person choose small size system, where the "surface data" flow only in the hands of the small group.
But in the small system, the deep scanning of data will be possible and give more effective information for surveillance operators who work in this kind of system. In big systems, many operators will see "surface data" of the users, but deeper analyze of information will be difficult because there is the larger number of bytes and there are many same-ranked officers who are watching the system. In small system might have only one high-school trained operator or maybe that service is produced by some other actor. This allows those men to work alone without afraid that somebody even sees what is going on.
Picture 1
http://www.sifytechnologies.com/wp-content/uploads/2017/03/datacenterhosting_managedservice_taxialways_fod.jpg
https://crisisofdemocracticstates.blogspot.fi/
http://crisisofdemocracticstates.blogspot.fi/p/how-internet-observations-officer.html
Friday, February 9, 2018
Thursday, January 18, 2018
Subscribe to:
Posts (Atom)
New self-assembly nanotubes turn the impossible possible.
New self-assembly nanotubes turn the impossible possible. "The crystal structure of a carbon bilayer. The purple outer layer and blue...

-
That is the thing where electromagnetic wormholes are needed. In photonic data transportation, the system loads information as wave movement...
-
"Illustration of the USS Delaware deploying the Yellow Moray spy robot underwater. Image generated by AI" (Sustainability Times, “...
-
Above is a fictional interstellar spacecraft. There is a possibility that in the future this kind of spacecraft will be are reality. The ide...