Delivery-Date: Sun, 22 Nov 2015 21:45:30 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,LOTS_OF_MONEY,
	RCVD_IN_DNSWL_MED,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BBC3A1E0C86;
	Sun, 22 Nov 2015 21:45:28 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 47093385A7;
	Mon, 23 Nov 2015 02:45:25 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C0FCA37F9C
 for <tor-talk@lists.torproject.org>; Mon, 23 Nov 2015 02:45:21 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id LGUOL4HmZ781 for <tor-talk@lists.torproject.org>;
 Mon, 23 Nov 2015 02:45:21 +0000 (UTC)
Received: from millet.cc.columbia.edu (millet.cc.columbia.edu [128.59.72.250])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 8F36237D93
 for <tor-talk@lists.torproject.org>; Mon, 23 Nov 2015 02:45:21 +0000 (UTC)
Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250])
 by millet.cc.columbia.edu (8.13.8/8.13.8) with ESMTP id tAN2f4ml007769
 for <tor-talk@lists.torproject.org>; Sun, 22 Nov 2015 21:45:18 -0500
Received: from hazelnut (localhost.localdomain [127.0.0.1])
 by hazelnut (Postfix) with ESMTP id 828916D
 for <tor-talk@lists.torproject.org>; Sun, 22 Nov 2015 21:45:18 -0500 (EST)
Received: from salak.cc.columbia.edu (salak.cc.columbia.edu [128.59.29.6])
 by hazelnut (Postfix) with ESMTP id 6D1D47E
 for <tor-talk@lists.torproject.org>; Sun, 22 Nov 2015 21:45:18 -0500 (EST)
Received: from mail-vk0-f52.google.com (mail-vk0-f52.google.com
 [209.85.213.52])
 by salak.cc.columbia.edu (8.14.4/8.14.3) with ESMTP id tAN2jIYN015357
 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
 for <tor-talk@lists.torproject.org>; Sun, 22 Nov 2015 21:45:18 -0500 (EST)
Received: by vkay187 with SMTP id y187so29113516vka.3
 for <tor-talk@lists.torproject.org>; Sun, 22 Nov 2015 18:45:17 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to
 :subject:content-type;
 bh=6UarHECpDgAtNntZ7R9gAh97M/7lqq/vkBMBOJndX3w=;
 b=M0qlvNn49rcN9+t/YLkbXE6CWmy1raEPX2U5tCNFI2DKRne/tZOduMOOBjokCQJ4Wj
 NJ7RhpLf4Q8WT9mTDVIEhwEQ31oHrdtaFzxtM83fTM6uPfAqSKcOaA4AeON2sUAKTkAi
 XJcA1TglEovEx5P/PJvqvucwItFTbiK8LN7/khTh8Pl74jWt5W43o+J9yZiz2v1Lm9lr
 zcLYiqjPEvHY1/v8k0H/dYGbzX5u+k72LQFNrNfcTLHIb1Wn3sWi6uGBQteok1Th4zP/
 BO+M35g1POuwj2TwKdeM19I+Lpyv/ZDaOW8jMS6fToPH8HiS/zGUZ8Sh6fED06TfuD8U
 SCOw==
X-Gm-Message-State: ALoCoQmCkjvSm5jnvYgCcwL9v2FoEJBwId080gqBLlXzGa7epxI0vYgxh+QNm1cXKiscwVSHqbRhkv5IEfpMFXAfgPRo7uk3NbZzMQ7tyo9juEP11nClQ/s+hRBOBE3MAs/4oCT3SAANQVFPMSZmuemR28Hr5x8VMA==
X-Received: by 10.31.165.194 with SMTP id o185mr15284023vke.125.1448246717901; 
 Sun, 22 Nov 2015 18:45:17 -0800 (PST)
X-Received: by 10.31.165.194 with SMTP id o185mr15284003vke.125.1448246717630; 
 Sun, 22 Nov 2015 18:45:17 -0800 (PST)
Received: from [192.168.1.47] (pool-108-27-112-70.nycmny.east.verizon.net.
 [108.27.112.70])
 by smtp.gmail.com with ESMTPSA id w125sm9111119vke.13.2015.11.22.18.45.16
 for <tor-talk@lists.torproject.org>
 (version=TLSv1/SSLv3 cipher=OTHER);
 Sun, 22 Nov 2015 18:45:17 -0800 (PST)
Message-ID: <56527DBA.6000904@columbia.edu>
Date: Sun, 22 Nov 2015 21:45:14 -0500
From: "William H. Depperman" <whd2@columbia.edu>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
 rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
X-CU-modified: SCRIPT link
X-No-Spam-Score: Local
X-Scanned-By: MIMEDefang 2.68 on 128.59.29.6
Content-Disposition: inline
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Removing viruses from the BIOS Chip to Vladimir and
	Matthew Kaufman
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

To Vladimir:

Hi Vladimir,

             You did not reply through regular email so the NSA may have 
blocked my incoming email. In fact today I received virtually NO email 
from TOR. Obviously what you sent me appears to be a genuine response. 
But I showed your response to a friend who knows how to program but he 
could not understand what you were telling me to do. So there is still a 
problem for me but not for you. _*Here are your responses to me asking 
how to remove BIOS Chip computer viruses: *_

             1.) "see doc. on INT 9h (hardware interrupt)  and INT 21h 
(BIOS keyboard)"

             2.) Trace(debugger) from INT 9 vector - and see all...

             3.) Use loadable INT 9/21h driver - and any viruses can't 
have control...
                  (checked debugger in mem int 9 --> our driver).

             4.) Virus can't be detected, if signature not in 
antivirus-collection, but
                   debugger show all...

             5.) Also use not connected to network computer for typing 
and removable FD/flash...

             I need step by step instructions on to precisely accomplish 
this meaning that I need more information on how to do what you said. 
Remember YOU are a Hacker already! I am NOT! So Big difference! So 
please imagine you are writing a book: _*"Removal of NSA Computer 
viruses placed on the BIOS CHIP FOR DUMMIES*_

             Thanks very much. I hope you liked what I sent you and have 
decided to send it out to your complete mailing list. Thanks again and I 
hope to hear from you in the very near future. (Once again TOR does not 
permit attachments.)

Bill Depperman
whd2@columbia.edu

_*And to Matthew Kaufman I wrote:*_

Hey,

             Do you know how to or have you ever removed a virus from 
the BIOS Chip? Attacking the BIOS Chip is how it is done these days by 
NSA. Apparently they do not bother with the hard drive and go directly 
to the mother board. Here is what I wrote on the ANT Program described 
by Edward J. Snowden. See the bottom of *_page 8_*. I also recently 
completed the _*Materialist Analysis of Theoretical Astrophysics*_. It 
is self-explanatory. Before we meet to talk please read these 2 
documents and at least read the first several pages of the second 
document and tell me what you think. If we are are going to talk it is 
good to know what is to be discussed.

Bill Depperman
whd2@columbia.edu


On 11/21/2015 11:27 PM, Matthew Kaufman wrote:
>
> Hey,
>
> Are you in New York city? I will meet you.. to talk!
>

Here is what I wrote in the Materialist Analysis of Edward G. Snowden

*"_ANT!_"*

*"_ANT_"* (*_Access Network Technology!_*) is the *_NSA_* Special 
Division which has surreptitiously installed an entire catalogue, an 
"*_NSA_* toolbox," of hardware products into computer networks and 
computers worldwide (*/Der Spiegal/*, December 30, 2013), penetrating 
their digital firewalls through special "back doors." *_ANT_* has 
burrowed into all security architecture made by major network and 
computer companies e.g. such as CISCO Systems, Junipur Networks and the 
Chinese Huawei and also Dell, HP and all the rest! For example, the name 
of the so-called "digital lock pick" for Junipur Networks is 
*_FEEDTROUGH Malware_* (Oy!) and is used to */_permanently_/* implant 
*_NSA_* surveillance programs into even mainframe computers, spy 
programs which can even withstand "across reboots and software 
upgrades." The specialists at *_ANT_*, the *_ANT PEOPLE_*, work in the 
*_NSA's_* department for *_Tailored Access Operations_* (*_TAO_*). The 
*_ANT_* hardware is very expensive but the costs are all taken care of 
in the *_Black Budget!_* No problem! A targeted monitor cable that 
allows "TAO personnel to see what is displayed on the targeted monitor" 
costs only $30.00, but an "active GSM base station" that mimics a mobile 
phone tower, which can monitor cell phones costs $40,000.00. The *_USB_* 
computer-bugging devices mentioned above, which are capable of sending 
and receiving data undetected via radio come in packs of 50 for over $1 
Million! The *_ANT_* people (!) develop and preferentially plant malware 
in the *_BIOS chip_* on the motherboard. This makes is invisible to 
anti-virus or anti-malware programs. And even if the hard drive is 
completely erased and a new operating system is installed the *_ANT_* 
malware continues to function and ensures that new spyware can again be 
loaded onto what was thought to be a "clean computer!" The *_ANT_* 
developers call this *"_Persistence_,"* which simply means *_NSA_* has 
permanent access to the computer. Another (nameless?) program attacks 
the hard drives of Western Digital, Seagate, Maxtor and Samsung 
undermining the security of both American companies and *_ALL_* 
companies! Other *_ANT_* programs target Internet large-scale routers 
and hardware firewalls intended to protect company networks. Many 
digital attack weapons are "remotely installable" over the Internet, 
while others require a direct attack, which the *_NSA_* calls an 
*"_interdiction_"* in order to install it. This writer has had his 
computer completely taken over by *_NSA-ANT._* The NSA has installed its 
software in the *_BIOS CHIP_* of both computers so "anti-virus" and 
"anti-malware (e.g. Malwarebytes)" is totally useless. This writer has 
keystroke-by-keystroke real time team monitoring & open harassment. If 
the *_ANT_* software was removed it could be immediately re-installed!

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

