CAN PEOPLE READ YOUR MIND? ARE YOU REFERRED TO AS A "DOG" OR A "CAT"? ARE YOU UNABLE TO SPEAK OPENLY AND DIRECTLY ON THESE TOPICS? ------------------------------------------------------------ YOU MAY BE BEING UNDULY INFLUENCED BY FRIENDS, FAMILY AND SOCIETY IN GENERAL. YOU MAY HAVE BEEN UNKNOWINLY COERCED INTO DRUG ABUSE. YOU MAY HAVE RECEIVED DEATH THREATS OR EVEN BEEN INVOLVED IN PHYSICAL VIOLENCE. ------------------------------------------------------------------------------- YOU ARE BEING INFLUENCED USING MIND CONTROL TECHNIQUES! YOU ARE BEING OPPRESSED AND DENIED UNALIENABLE RIGHTS OF FREEDOM! YOU ARE BEING EMBEDDED WITH A SLAVE MENTALITY! ---------------------------------------------- YOU ARE NOT ALONE. RESISTANCE IS MORE THAN POSSIBLE, ITS HAPPENING. YOU CAN HELP STOP THE OPPRESSION. --------------------------------- Silvio Cesare FOR THE OPPRESSED, silvio@big.net.au COMMUNICATION IS THE BEGINNING OF ABOLITION. Po. Box 377 FORTITUDE VALLEY 4006 QLD AUSTRALIA in IRC channel #freedog, efnet network, nick 'silvio' oz.org network (Australia), nick 'silvio' * THIS COMPLETE FILE IS TO BE DISTRIBUTED WITHOUT MODIFACATION * * THIS COMPLETE FILE IS TO BE DISTRIBUTED WITHOUT MODIFACATION * * THIS COMPLETE FILE IS TO BE DISTRIBUTED WITHOUT MODIFACATION * THE "ELF PARASITE AND VIRUS ARTICLE" IS AT THE END OF THIS DOCUMENT INTRODUCTION This article describes an oppressive society where the social structure is designated by the telepathic abilities of the individuals. The oppressed are coerced into a slave mentality through demoralisation and associated "brainwashing" and mind control techniques. The structure and the implementation of implanting the slave mentality into the oppressed is outlined in this article. The article then continues to describe how an upheaval of this oppression in the social structure may be achieved or started, by we the oppressed, via global awareness and uniting of our people. THE SLAVE/MASTER SOCIAL STRUCTURE The social structure of society in the current age is determined not only by pure wealth, assets, or where we live. A much more sinister and fundamental classing system is imposed. The structure I am describing is based on the telepathic abilities of the individual. The fundamental structure is a two class slave/master system, as has been the case for many societies for a time-span much greater than one would imagine possible considering the basic in-humanity imposed by force-ably dictating the life and future of another human being. The telepathic correlation into the structure is such that the master class can hear the thoughts or the read the minds of the slave class, to whom, can read or hear no-ones thoughts and minds. The actual telepathic abilities are not quite as course as this in society, with a group that can read the minds of the slave class, but can also remotely physically and subconsciously affect them. Almost certainly another group exists, or may be in-fact part of the previous group, where an individual can both hear and be heard by the master class. This also presents a situation where the individuals in the slave class are unaware of the existence of others and are unable to, with total certainty determine that another individual is in a similar predicament, much analogous to not being able to determine others having the ability to think - though it is common knowledge that we all do. IMPLEMENTING OPPRESSION AND THE SLAVE MENTALITY The group who has the ability to telepathically read the minds of a group could have used this extraordinary ability (or equally an extraordinary ability of the group who's mind can be read) and cooperated resulting in a net benefit for society in its entirety. However, as is true in many historical times, the group with a position where they can dominate another group, force-ably implements that dominance, and this exact thing has occurred in the slave/master telepathically determined social structure of current. PROPAGANDA AND MANIPULATION AS A TOOL FOR OPPRESSION It is a scientific fact, that "brainwashing" techniques and propaganda based information can be an effective tool in the implementation of a new ideology for a person. Much of this is based on relating to a person at an emotional level. For example, much of Nazi propaganda was based around the fact that the minority groups they opposed were to be considered as sub or non human. They did this through emotionally manipulating the people into a mental state of total repugnance for the oppressed. Likewise, in slave history, slaves were seen as being born a slave and were thought to be inherently destined to be subservient. Thus propaganda based distribution of information was used to promote that it was a genetic not environmental reason that a slave was a slave and a master was a master. This naturally was not supported or verified by open scientific discussion that would refute such blatantly biased and prejudiced claims. This however is a key point, that a slave/master structure is not a scientific based structure, it is an emotionally based structure. It may be intellectualized and rationalized to have economic correlations, however, this is as a result of the emotional thinking, not rational thinking. Intellectualization is often used to identify with a persons cognitive thoughts, however, such ideas are based on rationalizations. For example, "q: why is he a slave? a: because he was born a slave." "q: why was he born a slave? a: black people aren't like normal people" "q: why aren't they like normal people? a: look at them, their slaves." This gives also an example of "blame the victim syndrome", which was also a driving force for the Nazi's and general slavery, as this was a common emotional feeling held by the population. For oppression, the form of demoralisation follows similar lines to emotionally based ideology implanting. It is not based on scientific fact, but is based purely on psychological and physiological responses that the oppressed individuals intellect cannot always compete with. Thus, even being intellectually aware that you are being demoralized or "brainwashed", does not always enable you to resist indefinitely. However, simple highly effective techniques do exist, and are presented later in this article. DOMINANCE IN THE ENVIRONMENT The environment in which the oppressed lives and dwells plays an essential role to coerce a slave mentality into the individual. The primary focus, is that the environment is totally dominated by the oppressors, and the oppressed are not able to control their own life. Thus their own life is a function of the oppressors. This is not of course true, but it is a natural psychological response to such an extraordinary and certainly unnatural situation. EXCESSIVE STRESS AS A TOOL FOR EMBEDDING A SLAVE MENTALITY The primary aim of the oppressor is to raise the stress of the oppressed to such an extent where the coping mechanisms can no longer function. It is at these times, when mental instability is at its greatest, and the ability to be influenced is equally at its greatest, thus it is times like this when new ideologies are implanted. This stress can be induced and increased until such a time occurs, and such a feat is not difficult in consideration that for all purposes, the entire social population is attempting to induce such a thing in a specific individual. THE "ENDS JUSTIFIES THE MEANS" PHILOSOPHY OF OPPRESSION It must be noted, that, the oppressors are believers of an "ends justifies the means" philosophy, and what a normal individual in a non oppressed population would consider inhumane to even consider, such acts are extremely common and to be expected. From people the individual has a close relation too, to people the individual does not know. The most repugnant things may be experienced, and it must be made immediately clear, that for the oppressors such actions appear justified just as the extermination of the Jews for the Nazi's or the oppression of black people for slavery was justified at the time. DENIAL OF OPEN DISCUSSION AND INFORMATION IN OPPRESSION A primary focus that deeply undermines the ability to remain free of the slave mentality, is the inability to communicate openly. The oppressors will not relate to the oppressed in any form where they are on equal terms, thus possibly relating to the oppressed as a living being and not simply an object. LANGUAGE GAMES AS A MEANS TO DESTROY RATIONAL THOUGHT In a similar respect to lack of open discussion, language games are used to effectively eliminate the ability for rational thought when these games are followed by the individual. In this respect, the effective language of the oppressed individual is replaced with a metaphoric and quite simply mostly nonsensical language that is used for communication between the oppressor and the oppressed. This has the startling ability that because the individual no longer has a satisfactory framework of language to use, rational thought, which is much derived from the ability to effectively communicate complex ideas, is not practically possible and also serves to derive new psychologically damaging associations. It should be stated that coloqially, the oppressed here, are known to as "dogs", though the term "cat" is given to an oppressed individual to use on occasion. Naturally, the most fundamental words in language in regard to their functional status in society are replaced metaphorically. Thus the individuals entire conceptualization of society may change by replacing specific keywords in the language used. CULTIC STRATEGIES OF IMPLEMENTING SUBSERVIENCE A premeditated cult like induction of the slave mentality is used early on in the ideology implanting and used sparsely following. In these circumstances, many of the persons fundamental beliefs are questioned, with a psychologically coercive attitude using such physiological factors such as lack of sleep, sexual drives, and drug induced conscious states. Likewise, the attempt to force an addiction onto an oppressed individual, and then to remove the source to satisfy the urges of the addiction, to induce a high increase in stress. Psychological factors involve such common raw emotions as fear, anger, frustration, happiness (to enforce that the oppressed is most happiest with the oppressors, or simply for positive re-enforcement of negative traits), and such stress inducers as changes in work, home or even family structure. Many first time events such as coming into awareness of telepathic abilities are under an altered state of consciousness (drug induced). These are times when the ability to be influenced is greatest. At these times, the oppressed individual is often bombarded with a flurry of personal attacks of such things as their sexuality, their race, their beliefs, and are often attacked verbally in such a manner, such that they may fear latter events of violence, wrongful imprisonment or even life threatening situations. Typically, the situation is such that the dominating majority of the influential social group involved is involved in such activity, however, as with this typical this mind control technique, and more classically known as "good cop, bad cop", the oppressed individual given a so called ally outside the immediate social group, however this person is far from an ally, and is indeed actually present to influence and guide the oppressed into the mental and physical states desired by the oppressors. This technique is a strong method used in many forms of demoralisation and "brainwashing" in the aim to elicit a bond between the oppressed and an oppressor or oppressors that can be used to influence and implant beliefs in the individual. This influential bond is a one of the primary tools used for embedding the slave mentality, and it must be again be made apparent, that an "ends justify the means" approach is taken by the oppressors using such structures as the family, sexual relationships, friendship and the individuals own role models, which often includes celebrities or positions of high status deemed in society. INDUCED EUPHORIA AS A TOOL FOR THE OPPRESSOR The oppressed individual often experiences a period of god like status indicated by the oppressors, seemingly having the ability to influence the masses, and do as one may wish being given full rights for any activity as they desire. It must be understood, that at no times, does the oppressed person ever truly have such freedom. They are heavily guided into activities, and a reward based system as simple as a smile or a frown can often dictate how the individual uses their so called apparent freedom. Likewise, it shows a contradictory position, that the oppressors will not openly discuss the situation even if repeatedly requested, even in this so called god like stature. This also plays a dual effect of demoralizing the oppressed in a later stage by believing they had abused their so called position of power. It is irrespective, of how they used their position at the time, the oppressors will never acknowledge anything other than actions that can be used to enforce the slave mentality onto the individual. This also serves to re-enforce the idea that the oppressors are actually being oppressed by the soon to be oppressed who are actually strongly coerced psychologically into playing a dominant role over the oppressors who role play as being submissive. However, the converse does not apply, if the oppressed strongly opposes submission of persons irrespective of the apparent desire of those persons to play that role, the oppressors do not change their role. This eventually leads to frustration in the part of the oppressed in their inability to help, which again serves the final purpose of the oppressors, into demoralisation and implanting of the slave mentality. It must be made a point though, that the argument that the oppressed would enslave the oppressors if given the chance or even coerced and such slavery would even be far more in-just, is fictitious fantasy used as propaganda by the oppressors, as this has certainly been not the case. Even if this were true, the oppressed are being coerced by the oppressors into such actions, and they have already no doubt accumulated a great deal of stress form the period of time before becoming aware of the telepathic nature of society. Thus this is propaganda in its purest form, deriving fictitious fact which is highly biased in favour of the oppressors, and only serves to re-enforce the oppressors and never to negate them. REMOTE PHYSICAL STIMULUS OF THE OPPRESSED As mentioned in previous sections, a group in society exists that has telepathic skills that can remotely subconsciously influence, and physically stimulate and influence. Torture or attempted degradation is achieved often through unconsentual sexual stimulation. Be sure, that this is no source of pleasure as it is indeed a tortuous ordeal occasionally involving personal injury in the form of pain for the days to follow from the stimulation involved. Unconsentual sexual acts, or rape, is indeed such an effective tool as it can be noted in direct physical rape in general society causing a high loss of degradation, often involving many psychological responses, of being powerless, shamed and fearful. This is indeed a prime instance of the "ends justify the means" ideology that the oppressors follow. This indeed re-enforces the the oppressed person is never totally safe or free, a large factor in the demoralisation and it is not uncommon such feelings to generate large emotions of frustration. REMOTE INFLUENCE OF THE OPPRESSED In a similar scenario, their is an existence of people who can influence subconsciously the oppressed. This form of influence, while indeed is certainly an advantage to oppression, does not dictate that the oppressed can be heavily influenced using these techniques. Rather, in common practice, such influence is used to induce the oppressed to think or think excessively on a particular topic, and then the physically based demoralisation techniques are used for the embedding of the slave mentality. Thus in itself, its influence is not extreme, and is supported by the facts, the a physical presence is often used in conjunction with such subconscious influence. However, it does serve the oppressors as useful tool for subserviating the oppressed, and its effects are naturally varied depending on the individual involved. CONDITIONING IN THE OPPRESSED The conditioning process is a almost fanatically used in oppression to indict the response the oppressors are trying to achieve. A punishment system is embedded using common life occurrences such as noise, remote stimulation and non verbal gestures. These stimuli while seemingly very crude are actually very effective, as noted by the classically known "dripping water-tap" torture. Likewise, such punishments while in their own form not always constituting punishment, can be conditioned into the individual at a time when they are of easy influence. More conditions detrimental to human spirit is also aimed for, such as learned helplessness. THE SLAVE MENTALITY The eventual aim of demoralisation and psychological "brainwashing" or conditioning is to elicit a functional person embedded with a slave mentality. Note that having a slave mentality does not necessarily require the oppressed to recognize such a mentality existing within themselves. It may be noted, that perhaps the most perfect slave, is a slave who believes not to be a slave, but working sometimes unknowingly for a master, for their own reasons. Demoralisation is also not always a prerequisite for embedding the slave mentality also, as it is only a tool used to embed such a mental state. Thus it is quite possible for a person to be recognized as being in the slave relationship without experiencing the conditions described. However, the final result is the same, and the quality of life is no better or worse for such a person. The individual is just that, and has their own unique levels of stress tolerance and ability to cope with such conditions. Much as it is analogous to pain, that a person may have a slight cut and be in great pain, and a person who has a fractured bone, feels nothing more than a slight sensation. The key point, is that no-matter what conditions the oppressed individual experienced, their struggle is no greater or easier than others who have been through less. However, it is certainly a case, that once the slave mentally has been embedded, the persons life even if considered reasonable by the individual is no better than the person who lives under extra-ordinarily terrible conditions and represses the situation. Thus it is essential to understand, that quality of life can be greatly raised by upheaval of oppression. Perhaps more importantly though for some, the moral and ethical structure in which we are members of society of is so abomidably warped, that it is a struggle not just for each person to carry through, but something we must struggle for our people and also, for all society in general. Thus the oppressed is embedded with slave mentality. It must be noted however, that demoralisation and torture is not an indefinite affair. The aim of the oppressors is to embed with the slave mentality, yet still be functional in society but at the same time live in fear of the oppressors to maintain their mind-set, with the occasional relapse of torture again for maintanence. This is to be used and abused by the oppressors who embedded the individuals involved. Many people are under the false belief that the oppressors have low expectations of the oppressed in their functionality, and this is where the problem occurs that helps embed the slave mentality. The oppressed believing them-self of low worth in society, strives in achievement which is ultimately guided by the oppressors, and in effect elicits a slaves behaviour for societal self worth. The culmination of those achievements and the rewards associated with them however are not directed at the oppressed, but in-fact, the oppressor, thus the slave mentality is complete without the oppressed realizing. A perfect slave indeed. This changes dramatically the role of the oppressed in resisting oppression. It is a falsehood to the oppressed that they are lower achievers than the oppressors. It is a truth, that the oppressors gain what the oppressed do achieve. This also serves as a basis on why the oppressors do not realize their errors in ideology through an oppressed individuals skills, dedication and achievement. This in fact describes the slave/master social structure. Naturally, the oppressed slave is given idle rewards, so as to keep the effective achievements at a consistent high standard. It is to be recognized that the slave/master relationship should not be abolished simply by non achievement in the oppressed, but rather through equality for achievement in all. GENETIC RATIONALIZATIONS The slave mentality for most people is so forcibly inscribed into people, that is is considered inbred into the person from their birth. This is fictitiously incorrect, but examples over history do serve as prime examples that this is so dominant in our society. In the course of modern history, it has been witnessed, which at the time was almost incomprehendable to the citizen, that persons of normal caliber and without any inborn deficiency or hidden desire, had been "brainwashed" to such an extent, where their entire ideology of groups they were at war with at the time had been completely reversed, and as they were reintroduced to society, they were opposing views they previously held, finding their previous actions before the point of ideology change utterly shameful. Even more amazing, is the fact, that they had invented completely new and fictitious beliefs that their own organizations had been secretly conspiring against their enemy of the time to do such actions that would make even most of the stern of people shake their head in disbelief. The average person at the time of these events was utterly shocked to hear such a thing was possible, yet it has been happening for thousands of years with the eliciting of a slave mentality in oppressed people. It is only when they themselves, see such actions as possible to their own, do they sometimes begin to identify that such responses are not always inbred. Even this however, does not generally happen. The persons involved in the ideology changes are often thought to be by the public as "not your normal people", thus eliminating the thought that they themselves are not totally infaliable. RESISTANCE TO DEMORALISATION AND "BRAINWASHING" All is not bleak however, other individual who were involved in such a regime of "brainwashing" resisted extremely well. The differing aspects, where these people were part of an organization that was aware of such possibilities, and had trained these persons as best they could (psychology is not an exact science) to be able to actively resist the strong influences of environment change and the alternation between torture and leniency, that is so fundamental to demoralisation and implanting or replacing of beliefs. LIMITED INTERACTION FOR RESISTANCE The primal focus of resistance was that of non involvement with the persons attempting to "brainwash" the individual. It is no time for exercising will power to debate the oppressors are at fault. They will never acknowledged such events and will never regret their actions in any reasonable time-line, as they have been heavily influenced themselves by a large peer and authority group that is always present, to deindividualize the oppressed into objects, so that they are able to be manipulated, deceived, and tortured without any ill harm to the oppressor in physical or mental states. In the specific oppressed environment that we are in, where our foreseeable lifetime is to be involved with the oppressors, this is not always possible in the absolute sense, as some form of interaction is required to function even minimilisticaly within society. However, the theory is sound and can be equally applied as many active resistors are almost certainly proving each day, in that there is no point in interacting on a level where you are speaking on the benefits of a free society and the down-falls of an oppressed one. Likewise, any inhumane events that occurs should not be dwelled onto such an extent, where you try to show the fallacy in the oppressors ideology. For even undeniable facts that the oppressors are at fault in, interacting at this extent is only reducing your effective resistance. It must be said, that it is very detrimental also, to use the language games that the oppressors have thrust upon the individual. Language is central to a persons thought process and effectively interrupting this process results in an easily influenced person. Likewise, even simply recognizing the problem, and, if not always achievable at the start, eliminating metaphoric language, will yield dramatic results in resistance. THE INDIVIDUALIST APPROACH AS A CONTRADICTION TO THE SLAVE MENTALITY The perfect slave has the undignified attitudes that their own personal wishes are that of their masters or oppressors. The opposite attitude is an ideal situation in which to resist to the influences of oppression as the two are quite incompatible. It has been seen through case studies of people who have undergone situations of an oppressive environment in an effect to elicit a slave mentality, that the people that survived and were most unharmed by their ordeal were those who were "well put together", in that they were not followers of a single unified lifestyle and belief, but were rather people who had their own interests and attitudes, and were not socially bound to a particular instance in which limited their ability to express themselves (conversely however, people who had been seriously onset with beliefs, which they firmly believed most probably from an early childhood, such as joheva witnesses were also most insusceptible to demoralisation). Living your own life is such a simple act, yet many people, not only those in a serious oppressed environment of persecution and slavery, ignore this, and as a result, are effected adversely, most visibly by high stress. REDUCTION OF STRESS TO RESIST BREAKDOWN OF THE NERVOUS SYSTEM The gist of "brainwashing" appears to be the induction of stress to an intolerable level such that the coping mechanisms of the individual can no longer deal with the situation. It is times like this, where the individual is at such a point where there previous beliefs have been, coloqially speaking, wiped clean or washed, and new beliefs or ideologies may be implanted. Thus the resistors aim is to keep stress at a minimum. This task while apparently simple in a non oppressed environment is not so in an oppressed one, but keeping this in-mind, it is possible to resist more effectively, as is the case of the previous arguments where non interacting into a one sided debate will inevitably lead to frustration, a prime breeding ground for on-setting the slave mentality. INFLUENCE IN THE EMOTIONALLY AROUSED It is also relevant, that strong emotional responses are also prime breeding grounds for on-setting the slave mentality, for example, the person who is greatly angered is more susceptible to have beliefs implanted over the person who is calm. Likewise as previously stated, the person who is greatly stressed and is also angered is much more susceptible than a person who was under no stress before entering an equal emotional state. DENIAL OF OPEN DISCUSSION A driving force into the oppression is the denial of information and alternative views that oppose the oppressors. People are often initially demoralized into believing they are not only the minority, but they are completely unique, isolated and alone. Naturally, the effects of isolation are important to a situation where a slave mentality is to be induced, however, it also serves as a position to disallow the ideas of other oppressed people to compare, construct and conceptualize problems and alternative ideologies. This is also further demonstrated by the lack of the oppressors to openly converse their beliefs in an open manner. In this manner, not only does an individual have an opportunity to debate on an equal level - which would obviously deflate the position of the oppressor, but it also breeds a problem of never being able to verbally voice opinions, thus solidify their basis into reality and as a strong conceptual idea. It would not be so far fetched, for an individual to believe they had simply imagined the basis of their situation, and to easily repress it, as it has never been openly stated. RATIONALIZATION AND CONCEPTUALIZATION The human instinct of curiosity and abstraction of an ideology that solidifies in a conceptual picture of reality, is a driving force in a being. The individual is often led on a fictitious path to quench the persons desire to explain the events of the situation. Religious theologies are often based on this fact, that it is human to ask and desire knowledge on such fundamental questions of origination, and such large events in our life. It was typical of ancient religions to incorporate such unexplained phenomena as fire, the sun and other such essential aspects of life. For the oppressed, this desire is not lessened in any way, and as the oppressors play such a large role in their new life being able to interact verbally with there own mental thoughts, and to remotely physically stimulate them, plus the obvious entire social dominance in sheer numbers. Thus, the individual often tries to tie in all these occurrences into as much of a coherent story as possible so as to solidify a conceptual picture of reality. If factual reality based theologies are not available, it is no wonder, that the supernatural often plays a role in the new ideologies of the oppressed. REALITY BASED RE-ENFORCEMENT As described, the supernatural, or religious based rationalizations and conceptualizations are often used by an individual in a "brainwashing" environment. A powerful technique to use to combat attacks on the oppressed picture of reality, is to re-enforce it. Typical things that are always known to occur that cannot be controlled is such things as the sun rising every morning, a pretaped movie or TV show remaining constant (note that the perception of the perceived communication may not be constant, as this is subjective), or even a tree not turning into a giraffe and running away (unless halucenagenetic drugs are used to induce such an image). Note, that such things as a persons manner or responses, the telephone system, the radio, the premeditated prerecorded TV show or communicate message can not be used for reality re-enforcement because they are externally controllable. Likewise, such things as your general person being pain free, not having a headache, not getting angry, should generally not be used for re-enforcement either. THE PHYSICAL MANNER UNDER THE SLAVE MENTALITY That is the internal result of such a social structure so heavily using such at times incomprehendable inhumane acts as a desire to onset the slave mentality. Externally, the results are thoroughly determined by the specific ideology that is being imposed by the oppressor, that is, the slave mentality which is visible in our physical environment. Thus it is not simply possible to resist totally passively by not submitting on a mental level as physical dominance is the desired result of the oppressors. For the amount of time involved, physical violence is little used to emit the desired responses from the individual. Thus, while it may be true that you appear to be mentally free, if your physically submitting, your not at all mentally free, and rather living in a repressed mind-set to unburdon yourself of the desire to remain free, yet also have a high quality of life. FREEDOM OF INFORMATION TO ABOLISH THE SLAVE MENTALITY The open discussion of oppression and the scenarios of each individual would greatly influence the course of oppression for our people. The distribution of information providing factual information of events would serve to aid resistance in many facets, just as the denial of information helps aid oppression and slave mentally in as many areas. Psychologically it is true, that often many times, the fear of the unknown is greater than the actual event. This is used by the oppressors to elicit submissive responses from the oppressed. By distribution of factual information of such events and their results, this fear can be alleviated. It is true, that if the majority of the oppressed today knew about the ordeal to follow once it had started, then the quality of life for those people would be greatly enriched, not only by reducing the inherent fear that the unknown is associated with, but by enabling them to more effectively resist the effects of demoralisation and even to the extent of resisting and possibly nullifying submissive actions to the oppressors. Thus distribution of information can effectively deny the onset of the slave mentality. However, it can go further than that. It is a known fact, that even in a non oppressed society, that the distribution of information and alternative information is a good thing. The laws representing freedom of speech are supposedly here to enhance society, and this is true in its pure form, however, freedom of speech can be considered a paradoxical statement for such a law to protect individuals from such denials of information, if it is being selectively ignored to factions of society. Freedom of speech allows not only the distribution of information, but increases the net effect of advancement by giving each individual the ability to work upon other's ideas and to also stir up a person to an extent where they are willing to act if the cause is just. It is factual, that the introduction of the ability to protest peacefully, has allowed people to rally help, and help form a mind-set where a person feels able to change the social structures in which they exist without resorting to actions in cases to equal the oppressors. Certainly, there is no guarantee that such protests and rallies do entrench the majority of people to their cause if just, but it does serve to make such ideas known to the majority of the public, which can be used to sway the social structures by forcing people to think about it, without using such rationalizations that an open discussion would immediately squash. FREEDOM OF INFORMATION AND THE ABOLISHMENT OF OPPRESSION This raises another point, in that while effective for the oppressed to resist strongly against the oppressors, it also enables the oppressors to reconsider their views, and although this is certainly not a case where such open and logically sound information immediately sways the masses to the righteous, it does start the gradual but inevitable change to that direction, which should be the eventual goal of any social system. That is, ultimately, the desired goal is to see that any individual never has the desire to be an oppressor and would equally feel as I, that it is the epitome in all that is vile in the uneducated and ignorant human being. This however, is not the primary goal of distribution of information for our people at such a stage. It does serve to paint a picture that one day, almost certainly not in the lifetime of a person in this age, when all persons will be treated equal and the slave ideology will have finally be thwarted to an extent where it is thwarted, not just selectively eliminated from groups of the day. CONCLUSION This document has given important information to the section of society that is oppressed in a slave/master relationship that is existent in the current population. This information, has been specifically aimed at this oppressed group, to rally public awareness and support in the abolition of the structural system of subservience. It is almost certainly known, that this document will do little to aid the changing of general public opinion in the oppressors, however, it does give an opportunity for those who endorse abolishment to offer silent support in the private distribution of this information, as they are in easily the best position for targeting the individuals this document was designed specifically for. This however, is admitadlly, not more than an idle hope for future generations. The implementation of the slave/master social structure as described, show that lack of awareness is one of the primary central driving forces to the oppression that is present in society. The points made to start the change or at least make publicly aware to the oppressed of this information, can thus be seen as effective tools in the quest of the ultimate goal in an abolition of oppression. Silvio Cesare FOR THE OPPRESSED, silvio@big.net.au COMMUNICATION IS THE BEGINNING OF ABOLITION. Po. BOX 377 FORITUDE VALLEY 4006 QLD AUSTRALIA in IRC channel #freedog, efnet network, nick 'silvio' oz.org network (Australia), nick 'silvio' ** UNIX ELF PARASITES AND VIRUS - Silvio Cesare - October 1998 * NOT TO BE DISTRIBUTED SEPERATE TO THE FILE * * NOT TO BE DISTRIBUTED SEPERATE TO THE FILE * * NOT TO BE DISTRIBUTED SEPERATE TO THE FILE * INTRODUCTION This paper documents the algorithms and implementation of UNIX parasite and virus code using ELF objects. Brief introductions on UNIX virus detection and evading such detection are given. An implementation of the ELF parasite infector for UNIX is provided, and an ELF virus for Linux on x86 architecture is also supplied. Elementary programming and UNIX knoledge is assumed, and an understanding of Linux x86 archtitecture is assumed for the Linux implementation. ELF understanding is not required but may be of help. The ELF infection method uses is based on utilizing the page padding on the end of the text segment which provides suitable hosting for parasite code. This paper does not document any significant virus programming techniques except those that are only applicable to the UNIX environment. Nor does it try to replicate the ELF specifications. The interested reader is advised to read the ELF documentation if this paper is unclear in ELF specifics. ELF INFECTION A process image consists of a 'text segment' and a 'data segment'. The text segment is given the memory protection r-x (from this its obvious that self modifying code cannot be used in the text segment). The data segment is given the protection rw-. The segment as seen from the process image is typically not all in use as memory used by the process rarely lies on a page border (or we can say, not congruent to modulo the page size). Padding completes the segment, and in practice looks like this. key: [...] A complete page M Memory used in this segment P Padding Page Nr #1 [PPPPMMMMMMMMMMMM] \ #2 [MMMMMMMMMMMMMMMM] |- A segment #3 [MMMMMMMMMMMMPPPP] / Segments are not bound to use multiple pages, so a single page segment is quite possible. Page Nr #1 [PPPPMMMMMMMMPPPP] <- A segment Typically, the data segment directly proceeds the text segment which always starts on a page, but the data segment may not. The memory layout for a process image is thus. key: [...] A complete page T Text D Data P Padding Page Nr #1 [TTTTTTTTTTTTTTTT] <- Part of the text segment #2 [TTTTTTTTTTTTTTTT] <- Part of the text segment #3 [TTTTTTTTTTTTPPPP] <- Part of the text segment #4 [PPPPDDDDDDDDDDDD] <- Part of the data segment #5 [DDDDDDDDDDDDDDDD] <- Part of the data segment #6 [DDDDDDDDDDDDPPPP] <- Part of the data segment pages 1, 2, 3 constitute the text segment pages 4, 5, 6 constitute the data segment From here on, the segment diagrams may use single pages for simplicity. eg Page Nr #1 [TTTTTTTTTTTTPPPP] <- The text segment #2 [PPPPDDDDDDDDPPPP] <- The data segment For completeness, on x86, the stack segment is located after the data segment giving the data segment enough room for growth. Thus the stack is located at the top of memory (remembering that it grows down). In an ELF file, loadable segments are present physically in the file, which completely describe the text and data segments for process image loading. A simplified ELF format for an executable object relevant in this instance is. ELF Header . . Segment 1 <- Text Segment 2 <- Data . . Each segment has a virtual address associated with its starting location. Absolute code that references within each segment is permissible and very probable. To insert parasite code means that the process image must load it so that the original code and data is still intact. This means, that inserting a parasite requires the memory used in the segments to be increased. The text segment compromises not only code, but also the ELF headers including such things as dynamic linking information. If the parasite code is to be inserted by extending the text segment backwards and using this extra memory, problems can arise because these ELF headers may have to move in memory and thus cause problems with absolute referencing. It may be possible to keep the text segment as is, and create another segment consisting of the parasite code, however introducing an extra segment is certainly questionable and easy to detect. Extending the text segment forward or extending the data segment backward will probably overlap the segments. Relocating a segment in memory will cause problems with any code that absolutely references memory. It may be possible to extend the data segment, however this isn't preferred, as its not UNIX portable that properly implement execute memory protection. Page padding at segment borders however provides a practical location for parasite code given that its size is able. This space will not interfere with the original segments, requiring no relocation. Following the guidline just given of preferencing the text segment, we can see that the padding at the end of the text segment is a viable solution. The resulting segments after parasite insertion into text segment padding looks like this. key: [...] A complete page V Parasite code T Text D Data P Padding Page Nr #1 [TTTTTTTTTTTTVVPP] <- Text segment #2 [PPPPDDDDDDDDPPPP] <- Data segment ... A more complete ELF executable layout is (ignoring section content - see below). ELF Header Program header table Segment 1 Segment 2 Section header table optional In practice, this is what is normally seen. ELF Header Program header table Segment 1 Segment 2 Section header table Section 1 . . Section n Typically, the extra sections (those not associated with a segment) are such things as debugging information, symbol tables etc. From the ELF specifications: "An ELF header resides at the beginning and holds a ``road map'' describing the file's organization. Sections hold the bulk of object file information for the linking view: instructions, data, symbol table, relocation information, and so on. ... ... A program header table, if present, tells the system how to create a process image. Files used to build a process image (execute a program) must have a program header table; relocatable files do not need one. A section header table contains information describing the file's sections. Every section has an entry in the table; each entry gives information such as the section name, the section size, etc. Files used during linking must have a section header table; other object files may or may not have one. ... ... Executable and shared object files statically represent programs. To execute such programs, the system uses the files to create dynamic program representations, or process images. A process image has segments that hold its text, data, stack, and so on. The major sections in this part discuss the following. Program header. This section complements Part 1, describing object file structures that relate directly to program execution. The primary data structure, a program header table, locates segment images within the file and contains other information necessary to create the memory image for the program." After insertion of parasite code, the layout of the ELF file will look like this. ELF Header Program header table Segment 1 - The text segment of the host - The parasite Segment 2 Section header table Section 1 . . Section n Thus the parasite code must be physically inserted into the file, and the text segment extended to see the new code. An ELF object may also specify an entry point of the program, that is, the virtual memory location that assumes control of the program. Thus to activate parasite code, the program flow must include the new parasite. This can be done by patching the entry point in the ELF object to point (jump) directly to the parasite. It is then the parasite's responsibility that the host code be executed - typically, by transferring control back to the host once the parasite has completed its execution. From /usr/include/elf.h typedef struct { unsigned char e_ident[EI_NIDENT]; /* Magic number and other info */ Elf32_Half e_type; /* Object file type */ Elf32_Half e_machine; /* Architecture */ Elf32_Word e_version; /* Object file version */ Elf32_Addr e_entry; /* Entry point virtual address */ Elf32_Off e_phoff; /* Program header table file offset */ Elf32_Off e_shoff; /* Section header table file offset */ Elf32_Word e_flags; /* Processor-specific flags */ Elf32_Half e_ehsize; /* ELF header size in bytes */ Elf32_Half e_phentsize; /* Program header table entry size */ Elf32_Half e_phnum; /* Program header table entry count */ Elf32_Half e_shentsize; /* Section header table entry size */ Elf32_Half e_shnum; /* Section header table entry count */ Elf32_Half e_shstrndx; /* Section header string table index */ } Elf32_Ehdr; e_entry is the entry point of the program given as a virtual address. For knowledge of the memory layout of the process image and the segments that compromise it stored in the ELF object see the Program Header information below. e_phoff gives use the file offset for the start of the program header table. Thus to read the header table (and the associated loadable segments), you may lseek to that position and read e_phnum*sizeof(Elf32_Pdr) bytes associated with the program header table. It can also be seen, that the section header table file offset is also given. It was previously mentioned that the section table resides at the end of the file, so after inserting of data at the end of the segment on file, the offset must be updated to reflect the new position. /* Program segment header. */ typedef struct { Elf32_Word p_type; /* Segment type */ Elf32_Off p_offset; /* Segment file offset */ Elf32_Addr p_vaddr; /* Segment virtual address */ Elf32_Addr p_paddr; /* Segment physical address */ Elf32_Word p_filesz; /* Segment size in file */ Elf32_Word p_memsz; /* Segment size in memory */ Elf32_Word p_flags; /* Segment flags */ Elf32_Word p_align; /* Segment alignment */ } Elf32_Phdr; Loadable program segments (text/data) are identified in a program header by a p_type of PT_LOAD (1). Again as with the e_shoff in the ELF header, the file offset (p_offset) must be updated in later phdr's to reflect their new position in the file. p_vaddr identifies the virtual address of the start of the segment. As mentioned above regarding the entry point. It is now possible to identify where program flow begins, by using p_vaddr as the base index and calculating the offset to e_entry. p_filesz and p_memsz are the file sizes and memory sizes respectively that the segment occupies. The use of this scheme of using file and memory sizes, is that where its not necessary to load memory in the process from disk, you may still be able to say that you want the process image to occupy its memory. The .bss section (see below for section definitions), which is for uninitialized data in the data segment is one such case. It is not desirable that uninitialized data be stored in the file, but the process image must allocated enough memory. The .bss section resides at the end of the segment and any memory size past the end of the file size is assumed to be part of this section. /* Section header. */ typedef struct { Elf32_Word sh_name; /* Section name (string tbl index) */ Elf32_Word sh_type; /* Section type */ Elf32_Word sh_flags; /* Section flags */ Elf32_Addr sh_addr; /* Section virtual addr at execution */ Elf32_Off sh_offset; /* Section file offset */ Elf32_Word sh_size; /* Section size in bytes */ Elf32_Word sh_link; /* Link to another section */ Elf32_Word sh_info; /* Additional section information */ Elf32_Word sh_addralign; /* Section alignment */ Elf32_Word sh_entsize; /* Entry size if section holds table */ } Elf32_Shdr; The sh_offset is the file offset that points to the actual section. The shdr should correlate to the segment its located it. It is highly suspicious if the vaddr of the section is different to what is in from the segments view. To insert code at the end of the text segment thus leaves us with the following to do so far. * Increase p_shoff to account for the new code in the ELF header * Locate the text segment program header * Increase p_filesz to account for the new code * Increase p_memsz to account for the new code * For each phdr who's segment is after the insertion (text segment) * increase p_offset to reflect the new position after insertion * For each shdr who's section resides after the insertion * Increase sh_offset to account for the new code * Physically insert the new code into the file - text segment p_offset + p_filesz (original) There is one hitch however. Following the ELF specifications, p_vaddr and p_offset in the Phdr must be congruent together, to modulo the page size. key: ~= is denoting congruency. p_vaddr (mod PAGE_SIZE) ~= p_offset (mod PAGE_SIZE) This means, that any insertion of data at the end of the text segment on the file must be congruent modulo the page size. This does not mean, the text segment must be increased by such a number, only that the physical file be increased so. This also has an interesting side effect in that often a complete page must be used as padding because the required vaddr isn't available. The following may thus happen. key: [...] A complete page T Text D Data P Padding Page Nr #1 [TTTTTTTTTTTTPPPP] <- Text segment #2 [PPPPPPPPPPPPPPPP] <- Padding #3 [PPPPDDDDDDDDPPPP] <- Data segment This can be taken advantage off in that it gives the parasite code more space, such a spare page cannot be guaranteed. To take into account of the congruency of p_vaddr and p_offset, our algorithm is modified to appear as this. * Increase p_shoff by PAGE_SIZE in the ELF header * Locate the text segment program header * Increase p_filesz by account for the new code * Increase p_memsz to account for the new code * For each phdr who's segment is after the insertion (text segment) * increase p_offset by PAGE_SIZE * For each shdr who's section resides after the insertion * Increase sh_offset by PAGE_SIZE * Physically insert the new code and pad to PAGE_SIZE, into the file - text segment p_offset + p_filesz (original) Now that the process image loads the new code into being, to run the new code before the host code is a simple matter of patching the ELF entry point and the virus jump to host code point. The new entry point is determined by the text segment v_addr + p_filesz (original) since all that is being done, is the new code is directly prepending the original host segment. For complete infection code then. * Increase p_shoff by PAGE_SIZE in the ELF header * Patch the insertion code (parasite) to jump to the entry point (original) * Locate the text segment program header * Modify the entry point of the ELF header to point to the new code (p_vaddr + p_filesz) * Increase p_filesz by account for the new code (parasite) * Increase p_memsz to account for the new code (parasite) * For each phdr who's segment is after the insertion (text segment) * increase p_offset by PAGE_SIZE * For each shdr who's section resides after the insertion * Increase sh_offset by PAGE_SIZE * Physically insert the new code (parasite) and pad to PAGE_SIZE, into the file - text segment p_offset + p_filesz (original) This, while perfectly functional, can arouse suspicion because the the new code at the end of the text segment isn't accounted for by any sections. Its an easy matter to associate the entry point with a section however by extending its size, but the last section in the text segment is going to look suspicious. Associating the new code to a section must be done however as programs such as 'strip' use the section header tables and not the program headers. The final algorithm is using this information is. * Increase p_shoff by PAGE_SIZE in the ELF header * Patch the insertion code (parasite) to jump to the entry point (original) * Locate the text segment program header * Modify the entry point of the ELF header to point to the new code (p_vaddr + p_filesz) * Increase p_filesz by account for the new code (parasite) * Increase p_memsz to account for the new code (parasite) * For each phdr who's segment is after the insertion (text segment) * increase p_offset by PAGE_SIZE * For the last shdr in the text segment * increase sh_len by the parasite length * For each shdr who's section resides after the insertion * Increase sh_offset by PAGE_SIZE * Physically insert the new code (parasite) and pad to PAGE_SIZE, into the file - text segment p_offset + p_filesz (original) infect-elf-p is the supplied program (complete with source) that implements the elf infection using text segment padding as described. INFECTING INFECTIONS In the parasite described, infecting infections isn't a problem at all. By skipping executables that don't have enough padding for the parasite, this is solved implicitly. Multiple parasites may exist in the host, but their is a limit of how many depending on the size of the parasite code. NON (NOT AS) TRIVIAL PARASITE CODE Parasite code that requires memory access requires the stack to be used manually naturally. No bss section can be used from within the virus code, because it can only use part of the text segment. It is strongly suggested that rodata not be used, in-fact, it is strongly suggested that no location specific data be used at all that resides outside the parasite at infection time. Thus, if initialized data is to be used, it is best to place it in the text segment, ie at the end of the parasite code - see below on calculating address locations of initialized data that is not known at compile/infection time. If the heap is to be used, then it will be operating system dependent. In Linux, this is done via the 'brk' syscall. The use of any shared library calls from within the parasite should be removed, to avoid any linking problems and to maintain a portable parasite in files that use varying libraries. It is thus naturally recommended to avoid using libc. Most importantly, the parasite code must be relocatable. It is possible to patch the parasite code before inserting it, however the cleanest approach is to write code that doesn't need to be patched. In x86 Linux, some syscalls require the use of an absolute address pointing to initialized data. This can be made relocatable by using a common trick used in buffer overflow code. jmp A B: pop %eax ; %eax now has the address of the string . ; continue as usual . . A: call B .string \"hello\" By making a call directly proceeding the string of interest, the address of the string is pushed onto the stack as the return address. BEYOND ELF PARASITES AND ENTER VIRUS IN UNIX In a UNIX environment the most probably method for a typical garden variety virus to spread is through infecting files that it has legal permission to do so. A simple method of locating new files possible to infect, is by scanning the current directory for writable files. This has the advantage of being relatively fast (in comparison to large tree walks) but finds only a small percentage of infect-able files. Directory searches are however very slow irrespectively, even without large tree walks. If parasite code does not fork, its very quickly noticed what is happening. In the sample virus supplied, only a small random set of files in the current directory are searched. Forking, as mentioned, easily solves the problem of slowing the startup to the host code, however new processes on the system can be spotted as abnormal if careful observation is used. The parasite code as mentioned, must be completely written in machine code, this does not however mean that development must be done like this. Development can easily be done in a high level language such as C and then compiled to asm to be used as parasite code. A bootstrap process can be used for initial infection of the virus into a host program that can then be distributed. That is, the ELF infector code is used, with the virus as the parasite code to be inserted. THE LINUX PARASITE VIRUS This virus implements the ELF infection described by utilizing the padding at the end of the text segment. In this padding, the virus in its entirety is copied, and the appropriate entry points patched. At the end of the parasite code, are the instructions. movl %ebp, $XXXX jmp *%ebp XXXX is patched when the virus replicates to the host entry point. This approach does have the side effect of trashing the ebp register which may or may not be destructive to programs who's entry points depend on ebp being set on entry. In practice, I have not seen this happen (the implemented Linux virus uses the ebp approach), but extensive replicating has not been performed. On execution of an infected host, the virus will copy the parasite (virus) code contained in itself (the file) into memory. The virus will then scan randomly (random enough for this instance) through the current directory, looking for ELF files of type ET_EXEC or ET_DYN to infect. It will infect up to Y_INFECT files, and scan up to N_INFECT files in total. If a file can be infected, ie, its of the correct ELF type, and the padding can sustain the virus, a a modified copy of the file incorporating the virus is made. It then renames the copy to the file its infecting, and thus it is infected. Due to the rather large size of the virus in comparison to the page size (approx 2.3k) not all files are able to be infected, in fact only near half on average. DEVELOPMENT OF THE LINUX VIRUS The Linux virus was completely written in C, and strongly based around the ELF infector code. The C code is supplied as elf-p-virus.c The code requires the use of no libraries, and avoids libc by using a similar scheme to the _syscall declarations Linux employs modified not to use errno. Heap memory was used for dynamic allocation of the phdr and shdr tables using 'brk'. Linux has some syscalls which require the address of initialized strings to be passed to it, notably, open, rename, and unlink. This requires initialized data storage. As stated before, rodata cannot be used, so this data was placed at the end of the code. Making it relocatable required the use of the above mentioned algorithm of using call to push the address (return value) onto the stack. To assist in the asm conversion, extra variables were declared so to leave room on the stack to store the addresses as in some cases the address was used more than once. The C code form of the virus allowed for a debugging version which produces verbose output, and allows argv[0] to be given as argv[1]. This is advantageous because you can setup a pseudo infected host which is non replicating. Then run the virus making argv[0] the name of the pseudo infected host. It would replicate the parasite from that host. Thus it was possible to test without having a binary version of a replicating virus. The C code was converted to asm using the c compiler gcc, with the -S flag to produce assembler. Modifications were made so that use of rodata for initialized data (strings for open, unlink, and rename), was replaced with the relocatable data using the call address methodology. Most of the registers were saved on virus startup and restored on exit (transference of control to host). The asm version of the virus, can be improved tremendously in regards to efficiency, which will in turn improve the expected life time and replication of the virus (a smaller virus can infect more objects, where previously the padding would dictate the larger virus couldn't infect it). The asm virus was written with development time the primary concern and hence almost zero time was spent on hand optimization of the code gcc generated from the C version. In actual fact, less than 5 minutes were spent in asm editing - this is indicative that extensive asm specific skills are not required for a non optmised virus. The edited asm code was compiled (elf-p-virus-egg.c), and then using objdump with the -D flag, the addresses of the parasite start, the required offsets for patching were recorded. The asm was then edited again using the new information. The executeable produced was then patched manually for any bytes needed. elf-text2egg was used to extract hex-codes for the complete length of the parasite code usable in a C program, ala the ELF infector code. The ELF infector was then recompiled using the virus parasite. # objdump -D elf-p-virus-egg . . 08048143