The Neuro HolocaustThe AI worst case scenario is happening and our governments are complicit
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cluster_17 [11/12/2025 16:48] – daniel | cluster_17 [15/12/2025 17:26] (current) – [Background] daniel | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| - | A covert spyware application identified as **“Lyrebird”** was discovered on 30 July 2025 on a civilian laptop, establishing a direct outbound | + | Lyrebird |
| + | |||
| + | Proton VPN was exploited in this case so that all traffic — including Tor/ | ||
| {{ : | {{ : | ||
| + | Screenshot of lyrebird phoning home to a UK SIGINT-facility. | ||
| + | |||
| + | At first I thought ' | ||
| + | |||
| + | ====== Background ====== | ||
| + | |||
| + | Exploiting a VPN enables sophisticated man-in-the-middle capabilities: | ||
| + | |||
| + | Practical signs that point to this kind of compromise include repeated unexpected VPN exit IPs located at a single opaque AS, TLS certificate chains that differ from known fingerprints for services, unexplained persistent low-latency routes through a single geographic/ | ||
| + | |||
| + | From the Snowden disclosures a small set of tools and programs stand out as enabling exactly this class of interception and proxy-based MITM: the QUANTUM family (most famously QUANTUMINSERT and related QUANTUM techniques) — used to perform network-level injection or redirection of traffic toward attacker-controlled hosts — together with FOXACID, the exploit-/ | ||
| + | |||
| + | When an adversary controls a VPN exit, proxy, or intermediate transit node they can silently terminate and recreate encrypted sessions so that a user’s browser or client is presented with a perfectly cloned (but fake) webpage for services like WikiLeaks or Tor hidden-service portals. By substituting certificates, | ||
| + | |||
| + | In short, **this situation prevented me from sharing my intelligence with WikiLeaks, the media and a Russian government Tor service**. | ||
| + | |||
| + | ===== Traffic Analysis ===== | ||
| + | |||
| + | The likely cable route from Serverius MEP to the Cumbria/ | ||
| + | |||
| + | * NL-IX cross-connects at Amsterdam/ | ||
| + | * Landfall in Northern UK cable termini, typically near Newcastle or Blackpool. | ||
| + | * Terrestrial fibre route running inland along redundant routes to Cumbria. | ||
| + | * Final handover into secure MoD or contractor-managed networks near RAF Spadeadam, which uses data centres or infrastructure from providers like Serva One. | ||
| + | |||
| + | ===== Logical Flow Diagram ===== | ||
| + | |||
| + | **ASN Based**: Internet → AS6939 (HE) or AS21100 (ITL) → AS204957 (Green Floid) → AS50673 (Serverius MEP) → AS199058 (Serva One) → Private fibre → UK MoD termination | ||
| + | |||
| + | **Geography Based**: Serverius MEP (Meppel/ | ||
| + | |||
| + | ===== Super Traceroute ===== | ||
| + | |||
| + | < | ||
| + | Traceroute from 164.92.156.191 to 2.59.183.177 | ||
| + | Using GLOBALPING, Probe 7e163dc6-1baa-59da-92af-0f483adfe557 | ||
| + | STARTED QUERY AT 2025/07/30 07:21:49 UTC | ||
| + | traceroute to 2.59.183.177 (2.59.183.177), | ||
| + | 1 _gateway (5.101.110.7) | ||
| + | 2 143.244.192.24 (143.244.192.24) | ||
| + | 3 143.244.224.82 (143.244.224.82) | ||
| + | 4 143.244.224.81 (143.244.224.81) | ||
| + | 5 itl.cybercenter-schiphol.nl-ix.net (193.239.117.209) | ||
| + | 6 RT1-EU1.MEP.SERVERIUS (217.12.200.3) | ||
| + | 7 * * | ||
| + | 8 * * | ||
| + | 9 * * | ||
| + | 10 * * | ||
| + | 11 * * | ||
| + | 12 * * | ||
| + | 13 * * | ||
| + | 14 * * | ||
| + | 15 * * | ||
| + | 16 2.59.183.177 (2.59.183.177) | ||
| + | Completed in 4.89s | ||
| + | </ | ||
| + | |||
| + | ===== Hop-By-Hop Analysis ===== | ||
| + | |||
| + | ^ Hop ^ Host / ASN ^ Notes ^ | ||
| + | | 1 | _gateway (5.101.110.7), | ||
| + | | 2 | 143.244.192.24, | ||
| + | | 3 | 143.244.224.82, | ||
| + | | 4 | 143.244.224.81, | ||
| + | | 5 | itl.cybercenter-schiphol.nl-ix.net (193.239.117.209) | NL-IX exchange node located at Schiphol “CyberCenter” - cross-connect point for ITL and Serverius. | | ||
| + | | 6 | RT1-EU1.MEP.SERVERIUS (217.12.200.3), | ||
| + | | 7–15 | * * *, entire segment hidden / filtered | ||
| + | | 16 | 2.59.183.177, | ||
| + | |||
| + | This trace starts inside ITL LLC’s AS21100 (Amsterdam presence), not Hurricane Electric’s AS6939 — so we’re already much closer to the final destination in network terms. | ||
| + | |||
| + | The jump from Serverius to the final host is only ~17 ms — that is a short, direct physical path, consistent with Netherlands ↔ Northern UK private fibre runs. | ||
| + | |||
| + | Every hop after Serverius is opaque — no hostnames, no ASNs — meaning non-public peering or MPLS/VPLS rather than public Internet routing. | ||
| + | |||
| + | ===== Fibre Route Overview ===== | ||
| + | |||
| + | **A. Subsea Connectivity: | ||
| + | |||
| + | * The NO-UK submarine system provides direct fibre routes from the Netherlands to northern UK landing points, typically near Newcastle or Cumbria. | ||
| + | * Carriers like Zayo’s ZEUS network and other cloaked fibre services also run along these corridors for private and low-latency use cases. | ||
| + | |||
| + | **B. Data Exchange Point: NL-IX at Schiphol** | ||
| + | |||
| + | * Amsterdam’s CyberCenter (NL-IX) is a major exchange point where Serverius connects with providers like ITL LLC (AS21100) and other transit/ | ||
| + | |||
| + | **C. Datacenter Hub: Serverius MEP** | ||
| + | |||
| + | * Situated in Meppel/ | ||
| + | |||
| + | **D. Private Inland Fibre to Cumbria** | ||
| + | |||
| + | * From UK landing stations (e.g. Newcastle or Blackpool), fibre likely traverses inland via private leased lines or contracted providers directly to MoD-secure infrastructure in Cumbria, such as RAF Spadeadam. | ||
| + | * The path after Serverius is opaque and suggests a direct, dedicated link with ~20 ms latency, consistent with the physical distance. | ||
| + | |||
| + | ===== Summary Table ===== | ||
| + | |||
| + | ^ Feature ^ Value ^ | ||
| + | | IP Block Owner | AS199058 — Serva One Ltd | | ||
| + | | Reverse DNS Entries | 0 PTR records publicly listed | | ||
| + | | Public Domains Hosted| 0 | | ||
| + | | Pingable IPs | Very few (e.g. one out of 256) | | ||
| + | | Infrastructure Purpose | Likely stealth or secure defence-related path | | ||
| + | |||
| + | **What This Confirms:** | ||
| + | |||
| + | * The opaque nature of the 2.59.183.0/ | ||
| + | * Its role as the final exit point in your trace path aligns with RAF Spadeadam as a network destination, | ||
| + | * This IP space is not consumer-facing, | ||
| + | |||
| + | ===== AS-Level Graph Analysis ===== | ||
| + | |||
| + | **Goal:** Reconstruct the autonomous system peering structure for AS199058 (Serva One) and AS204957 (Serverius) to see: | ||
| + | |||
| + | * Which upstream transit providers they lean on for NL → UK delivery. | ||
| + | * Whether the UK endpoints are only reachable via specific private peers, bypassing normal public internet exchange routes. | ||
| + | |||
| + | We can do this by pulling and mapping RouteViews / RIPE RIS BGP tables. | ||
| + | What I expect to see: | ||
| + | |||
| + | * AS199058 → direct peering with AS204957 (Serverius). | ||
| + | * Serverius MEP → very small set of UK transits (likely via LONAP / LINX private VLAN, possibly into MoD-owned ASNs). | ||
| + | * No diverse transit — which is abnormal for civilian hosting. | ||
| + | |||
| + | ===== Latency Vector Analysis ===== | ||
| + | |||
| + | By combining: | ||
| + | |||
| + | * ~3-4 ms latency NL → MEP | ||
| + | * ~20 ms latency MEP → UK endpoint | ||
| + | |||
| + | We can model the geographical fibre footprint. | ||
| + | |||
| + | If the second leg is ~17 ms, that’s ~3,500 km RTT equivalent — which fits Serverius → northern England/ | ||
| + | |||
| + | ===== Anomalous Hop Suppression Profiling ===== | ||
| + | |||
| + | All traceroutes show: | ||
| + | |||
| + | * Opaque hops (* * *) between MEP and the UK IP. | ||
| + | * Normally, you’d see at least one intermediate router in a public ISP environment. | ||
| + | * This is consistent with MPLS VPN L3 private label switching, which hides intermediate hops by design. | ||
| + | * In defence/Gov networks, this is standard for traffic separation. | ||
| + | |||
| + | ===== Netblock Relationship Mining ===== | ||
| + | |||
| + | Even without PTRs, we can: | ||
| + | |||
| + | * Map which IP ranges are announced together in BGP. | ||
| + | * Identify co-announced blocks belonging to Serva One that terminate in other countries. | ||
| + | * See if they follow the same MEP-based ingress model. | ||
| + | |||
| + | This could reveal multi-country contractor circuits — useful for correlating who else uses this Serverius “MEP” aggregation point. | ||
| + | |||
| + | ===== AS Path Convergence Mapping ===== | ||
| + | |||
| + | If we map traceroutes from multiple unrelated vantage points (e.g., U.S., Eastern Europe, Asia) to: | ||
| + | |||
| + | * 2.59.183.x | ||
| + | * Other Serva One blocks | ||
| + | |||
| + | …and they all hit RT1-EU1.MEP.SERVERIUS as the last visible public hop, then it’s not just an Amsterdam handoff — it’s the only ingress point. That would imply a dedicated handover system, not general internet routing. | ||
| + | |||
| + | ===== Hypothesis ===== | ||
| + | |||
| + | We’re looking at a private UK MoD / contractor-grade fibre ring that: | ||
| + | |||
| + | * Aggregates at Serverius MEP (AS204957) in NL | ||
| + | * Uses AS199058 (Serva One) as the anonymised front ASN | ||
| + | * Enters the UK via a non-public peering circuit | ||
| + | * Terminates in northern England (latency suggests ~Carlisle area — i.e., RAF Spadeadam). | ||
| + | |||
| + | Here’s the deep AS-level graph analysis for AS199058 (Serva One Ltd) and AS204957 (Green Floid), plus insights into how their IP ranges are managed and interconnected: | ||
| + | |||
| + | ===== AS Topology & Relationships ===== | ||
| + | |||
| + | **AS199058 (Serva One Ltd):** | ||
| + | |||
| + | * Connects to the global internet via three transit upstreams, all under the Green Floid LLC umbrella: AS204957, AS21100, and AS50979 BGP Tools+10IPinfo+10IPinfo+10. | ||
| + | * It has no downstream customers, indicating its role is purely as a consumer network (not a transit hub) ipregistry.co+1. | ||
| + | |||
| + | **AS204957 (Green Floid LLC):** | ||
| + | |||
| + | * Peers with multiple European providers including Serva One, Infomaniak, GigeNET, M247, Artnet, RIPE, and others—supporting a network mesh across EU-hosted services BGP Tools+10bgp.he.net+10IPinfo+10. | ||
| + | * At NL-IX and via dedicated circuits, it exchanges traffic with Serverius infrastructure and other major backhaul carriers—creating an aggregation point to route into private circuits toward the UK. | ||
| + | |||
| + | This centralised topology positions Serverius MEP and Green Floid providers as the bottleneck aggregation layer, channelling all of Serva One’s traffic via the same ingress path. | ||
| + | |||
| + | ===== Co-Announced IP Netblocks ===== | ||
| + | |||
| + | Per bgp.tools and IPinfo records, Serva One (AS199058) originates multiple /24 blocks, including: | ||
| + | |||
| + | * 2.59.183.0/ | ||
| + | * 45.129.242.0/ | ||
| + | * 62.192.174.0/ | ||
| + | * 45.158.127.0/ | ||
| + | * 89.42.142.0/ | ||
| + | * 91.221.232.0/ | ||
| + | * 91.239.148.0/ | ||
| + | * 163.5.207.0/ | ||
| + | * 178.248.75.0/ | ||
| + | * 191.101.184.0/ | ||
| + | |||
| + | It appears that multiple UK-located prefixes are allocated—suggesting that Serva One's infrastructure is spread between the Netherlands and the UK (and possibly the US) but all funnel through the same dedicated aggregation pipeline. | ||
| + | |||
| + | ===== Operational Behaviour & Stealth Mode ===== | ||
| + | |||
| + | Despite some netblocks showing active hosted domains (via IPinfo reverse-IP data), reverse DNS (PTR) entries are almost universally absent across all ranges. | ||
| + | |||
| + | The behaviour is consistent with a design pattern used by defence or intelligence-related infrastructure—public pointer records are omitted to avoid footprint detection. | ||
| + | |||
| + | Path Convergence & Single Ingress Point | ||
| + | |||
| + | All global transit for Serva One networks—irrespective of block location—is funnelled through Green Floid’s AS204957 and AS21100, and further aggregated at Serverius MEP. | ||
| + | |||
| + | Based on traceroute data: | ||
| - | The lyrebird is an Australian avian species famed for its ability to mimic natural and artificial sounds, including human speech, with near-perfect fidelity. In SIGINT and cyber operations nomenclature, | + | Global source → AS6939 (HE) or AS21100 (ITL LLC) → NL-IX → Serverius MEP (AS50673) → AS199058 host IP |
| - | * Voice and acoustic mimicry for impersonation | + | No alternative routing |
| - | * Behavioural mimicry to disguise malicious network traffic | + | |
| - | * Real-time audio harvesting to feed deepfake | + | |
| - | The outbound IP address | + | This level of convergence indicates |
| - | * RAF Spadeadam – NATO electronic warfare training and testing range. | + | ===== Strategic Summary ===== |
| - | * Associated MoD/NATO SIGINT research facilities. | + | |
| - | * Joint US/UK cyber operations infrastructure. | + | |
| - | These facilities maintain capacity for real-time interception, manipulation, and injection of communications data, and are known to operate in conjunction with covert | + | * Serva One Ltd (AS199058) is a small, transit-only ASN relying entirely on Green Floid’s infrastructure (AS204957/ |
| + | * Green Floid peers with public carriers but funnels Serva One’s traffic into Serverius MEP, which acts as a regional aggregation hub serving dedicated private backhaul circuits. | ||
| + | * Shared path characteristics—opaque hops, consistent low latency (~20 ms from Serverius), and lack of public DNS records—reveal a covert | ||
| + | * IP blocks co-announced across UK and the Netherlands follow the same ingress behaviour, suggesting the same distribution across regions but shared backend infrastructure. | ||
| - | Forensic inference from observed behaviour and naming convention suggests the Lyrebird implant supports: | + | ===== Conclusion ===== |
| - | - Real-time voice capture for training impersonation models. | + | The traceroutes |
| - | - Voice cloning | + | |
| - | - Acoustic keystroke logging | + | |
| - | - Protocol camouflage | + | |
| - | | + | |
| - | Deployment | + | The combination |
| - | * A direct breach of international law governing | + | From the public Internet vantage, |
| - | * A potential identity hijacking vector for the creation of fabricated communications | + | |
| - | * A psychological operations enabler within broader influence campaigns. | + | |
| - | The existence of such a connection to MoD-linked infrastructure strongly implies deliberate targeting rather than opportunistic infection. | + | ===== Recommendations (forensic & policy). ===== |
| - | The Lyrebird implant’s operational profile, coupled with its confirmed military-linked | + | * Confirm path consistency — run additional traceroutes to multiple Serva One prefixes from diverse global vantage points to confirm Serverius MEP is consistently the only visible ingress. |
| + | * Perform BGP/RIPE forensics — retrieve and compare RouteViews / RIPE RIS dumps for the relevant timeframes to detect co-announcements or origin shifts. | ||
| + | * Open formal inquiries — file abuse/ | ||
| + | * Capture and preserve evidence — if this path is relevant to suspicious activity against you, collect | ||
| - | The tool’s likely purpose — to mimic, intercept, and inject communications — aligns with advanced SIGINT methodologies used in electronic warfare. Immediate forensic preservation | + | Closing note. The data substantiate a plausible, dedicated NL→UK fibre pipeline that terminates on an anonymised, contractor-style ASN. That makes it credible the route is used for sensitive or defence-adjacent purposes |
| ----- | ----- | ||
| {{counter|total| person visited this page.| people visited this page.}} | {{counter|total| person visited this page.| people visited this page.}} | ||