This week Elise Jordan, wife of famed journalist Michael Hastings, who recently died under suspicious circumstances, corroborated this reporter's sources that CIA Director, John Brennan was Hastings next exposé project (CNN clip).
Last month a source provided San Diego 6 News with an alarming email hacked from super secret CIA contractor Stratfor’s President Fred Burton. The email (link here) was posted on WikiLeaks and alleged that then Obama counter-terrorism Czar Brennan, was in charge of the government's continued crackdown or witch-hunt on investigative journalists.
On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor's web of informers, pay-off structure, payment laundering techniques and psychological methods.
After providing the Stratfor email to the CIA for comment, the spymaster's spokesperson responded in lightning speed. Two emails were received; one acknowledging Hastings was working on a CIA story and the other said, “Without commenting on information disseminated by WikiLeaks, any suggestion that Director Brennan has ever attempted to infringe on constitutionally-protected press freedoms is offensive and baseless.”
He (and you) have put it very starkly: it is the military and covert agencies taking shots at democracy for their own ends. If you don't have free speech and a free press press then truly you have entered into a 1984-kafkaesque-brave-new-world-order.
'Early in the morning on June 18, a brand new Mercedes C250 coupe was driving through the Melrose intersection on Highland Avenue in Hollywood when suddenly, out of nowhere, it sped up. According to an eye-witness, the car accelerated rapidly, bounced several times then fishtailed out of control before it slammed into a palm tree and burst into flames, ejecting its engine some 200 feet away.
A witness, Jose Rubalcalva, whose house stood adjacent to the crash, told Ana Kasparian of the The Young Turks news network that no one could approach the burning car because it kept exploding. In a simulated full-frontal crash of a 2013 C250 coupe, the car doesn’t explode on impact nor does it launch its engine 200 feet.
In fact, said Nael Issa, a Mercedes Benz dealer in Long Beach, “The car has a crumble zone, so when it crashes it goes in like an accordion. And in some cases the engine drops down, so it doesn’t go into you.”
and a VERY INTERESTING bit of info that I don't believe has appeared on this thread yet:
'According to L.A. Weekly, just hours before the deadly crash Hastings had asked to borrow his neighbor's Volvo because he suspected his own car's computer system had been hacked...' _________________ 'And he (the devil) said to him: To thee will I give all this power, and the glory of them; for to me they are delivered, and to whom I will, I give them'. Luke IV 5-7.
Lately it feels like everybody has figured out how to hack a car.
How hard is it to hack a car?
Very. The teams of researchers working on each hack — yes, it took teams — spent months solving difficult problems. They had to heavily modify the software running on the in-car computer so that it would give them access to the commands necessary to interact with the car.
In other words, these were not your average script-kiddie grease monkeys.
You’re probably OK. For a hack to be successful, each car had to be elaborately prepped first.
Hackers Cut a Corvette’s Brakes Via a Common Car Gadget
Can a Mercedes Car be Hacked
Giancarlo Perlas February 26, 2014
“Can a Mercedes car be hacked?” With the advent of new technologies and the growing reliance of cars to computers, this question has been bugging a lot of people. In this article, we will discuss the likelihood of a Mercedes car to be hacked or operated by a hacker remotely to separate myth from fact.
Hacking a Mercedes Car is Possible
It should be noted that no victims of car hacking have surfaced yet, [Ed note: ignoring the list within this website of course ] but according to an old article from Car and Driver, researchers at the Center for Automotive Embedded Systems Security (CAESS—a joint-venture between the University of California San Diego and the University of Washington) claimed that it is possible by simply plugging a device into the car’s OBD-II port.
The source also cited another research that claimed to have been able to hack another car’s systems using a malware slipped through its MP3 and a code transmitted through its Wi-Fi connection. It explained that although the infotainment system of the car is independent from the systems controlling the brakes and other vital functions of the car, the intertwining of the two would mean that just one breach in component of the latter could spell disaster.
Last August, Forbes released a video in YouTube of how a car can be hacked which can be seen below:
[Ed note: mention of DARPA in first few seconds]
["It's quite terrifying when you don't have brakes, right?" ha-ha-ha, they laughed]
From the video, you can see that the indicators, safety functions and even the steering of the car can be manipulated by using a computer connected in the CAN (controller area network) bus of the car.
It can be nightmarish if you are behind the steering wheel and suddenly it steers on its own or someone suddenly activates the airbag.
On the side of automakers, they are denying the chances of hackers being able to operate their cars completely just by going into its system. They claim that they are making sure that they are always a step ahead of hackers and they are continuously putting enhancements in their cars’ security systems to deter a potential hacker from gaining control of the entire vehicle.
Going back to the video, hacking a car and taking control of its driving and safety operations involves a lot of work that includes dismantling the dashboard in order to connect the computer to the CAN bus of the vehicle. It may be hard to pull but this just goes to show that a car can surely be taken over by a hacker.
As for the issue of a remote hacking, we are yet to see someone demonstrate how it can be done. But with what we witnessed in the video, it may become possible in the near future if hackers can keep pace with the software engineers of automakers.
Organised crime knew all about it.
But Volkswagen lawyers made sure car owners wouldn't find out about the security flaw.
Organised Crime = Mafia = Intelligence Services?
Audi, Porche, Toyota & Mercedes were caught previously trying to hide killer car hacking technology.
German car firms at the centre of the deception & cover up AGAIN
Car-hacking scandal: How a security loophole left thousands of vehicles vulnerable to thieves
Organised criminals are finding hi-tech new ways to take control of vehicles
By DAVID CONNETT Tuesday 18 August 2015
Tens of thousands of cars are vulnerable to thieves using electronic hacking, according to researchers whose findings were suppressed by a major manufacturer for two years.
The full details of the security loophole, which can now be revealed, show a widely used electronic security device designed to prevent thieves from breaking in and driving off with vehicles could easily be disabled by criminals.
Most modern cars cannot be “hot-wired” as they are powered by electronics. But organised criminals are finding hi-tech new ways to take control of vehicles. The problem is acute in London, where four out of 10 car thefts feature electronic hacking.
Three university researchers from Britain and Holland discovered that immobilisers fitted to more than 100 car makes had weak security that could be defeated – in some cases within a few minutes. But when they tried to publish their findings, Volkswagen took High Court legal action to stop them.
Critics claim the move could have a “chilling effect” on security research in the UK but VW defended it, stressing the firm went to “great lengths” to prevent “unauthorised individuals [gaining] access to our cars.”
The researchers, Birmingham University’s Flavio Garcia and Roel Verdult and Baris Ege, from Radbound University in Nijmegen, fought the ban, saying they identify security flaws so they can be fixed. They said their research started after police claimed cars were being stolen “and nobody can explain how”.
Beetle cars by German car maker Volkswagen (VW) Beetle cars by German car maker Volkswagen (VW)
Despite this a High Court judge agreed to the ban – saying he believed publication would “facilitate car crime”.
The researchers denied their paper teaches people to steal vehicles, and argued that the ban on publication denied the car-buying public crucial information about the security of their vehicles.
Following more than a year of negotiations between the academics and VW, the full details have now been published. The researchers say only one sentence has been removed from the original research. It reveals how they identified “several weaknesses” in a Swiss-made security device called a Megamos Crypto system.
The device is used by a total of 26 car manufacturers including Audi, Fiat, Honda, Volvo as well as Volkswagen. Many top-range brands including Bentley, Ferrari, Porsche and Maserati are among those known to use them.
The manufacturer of the system claims to have sold over 100 million radio frequency identification chips which are designed to verify the identity of the ignition key being used to start the car engine. If thieves get into the vehicle without the right key, the engine should refuse to start.
The researchers showed how it was possible electronically to listen to signals sent between the security system and the key fob. By doing this, they were able to discover the vehicle’s secret code within 30 minutes.
The academics warn the security devices were vulnerable to “close-range wireless communication” attacks and said situations such as valet parking and car rental where attackers could have access to both the immobiliser and the keys were a particular danger. They recommend the car industry use more sophisticated systems which are harder to defeat.
A VW Passat, left, and a Golf Cabrio car wait in the storage building of the Volkswagen company in Wolfsburg, Germany A VW Passat, left, and a Golf Cabrio car wait in the storage building of the Volkswagen company in Wolfsburg, Germany
The researchers say they believe that some modifications have now been implemented on new models.
According to industry experts, the security flaw could cost manufacturers millions to fix. The radio frequency identity chips in the key fobs – as well as the equipment that responds in the engine starting system – will both require re-engineering or replacing.
A spokesman for Volkswagen said: “Volkswagen has an interest in protecting the security of its products and its customers. We would not make available information that might enable unauthorised individuals to gain access to our cars. In all aspects of vehicle security, we go to great lengths to ensure the security and integrity of our products against external malicious attack.”
The RAC says electronic security has led to a dramatic improvement in levels of car theft, which has fallen 70 per cent in the last 40 years.
Last year near 70,000 cars were taken in the UK. Experts warn that the overall decrease hides a spike in electronic keyless thefts.
How the scam works
The Megamos Crypto immobiliser is designed to stop a thief breaking in and “hot-wiring” a car. A device called a transponder in the key fob sends an identification code to the immobiliser informing it the correct driver is present.
Scammers overcome this by electronically eavesdropping on the key fob signal and then using a commercially available computer programme to analyse it and emulate it. The immobiliser then decodes the signal and, if it is correct, starts the engine.
Researchers found the chips use relatively simple encryption. By listening to them talk to each other twice, anyone could quickly discover the pattern and copy the key. _________________ --
'Suppression of truth, human spirit and the holy chord of justice never works long-term. Something the suppressors never get.' David Southwell
Martin Van Creveld: Let me quote General Moshe Dayan: "Israel must be like a mad dog, too dangerous to bother."
Martin Van Creveld: I'll quote Henry Kissinger: "In campaigns like this the antiterror forces lose, because they don't win, and the rebels win by not losing."
Joined: 25 Jul 2005 Posts: 14847 Location: St. Pauls, Bristol, England
Posted: Sat Jan 07, 2017 9:55 pm Post subject:
Wikileaks: CIA's Brennan on 'witch hunt' when Hastings was killed
BY RALPH LOPEZ DEC 26, 2014 IN WORLD
A 2010 email released by Wikileaks from a top-level CIA contractor asserts that CIA Director John Brennan, the subject of a story by now deceased journalist Michael Hastings, was on a "witch hunt" against "investigative journalists" perceived as hostile.
Hastings, a reporter for the Rolling Stone who ruffled many feathers in his career, was killed in an unusual high-speed car accident in which the vehicle exploded on impact with a tree, and perhaps before. Hastings' wife confirmed to San Diego 6 News Television, soon after the uncharacteristic high-speed automobile crash, that Hastings' next "big story," as he called it, was to be on Brennan.
The email, written by Stratfor President Fred Burton and reported by San Diego 6, reads:
Brennan is behind the witch hunts of investigative journalists learning information from inside the beltway sources.
Note -- There is specific tasker from the WH to go after anyone printing materials negative to the Obama agenda (oh my.) Even the FBI is shocked. The Wonder Boys must be in meltdown mode...
The story on Brennan was never published.
Stratfor was once called "The Shadow CIA" by Barron's. In 2012 WikiLeaks began publishing “The Global Intelligence Files,” over five million e-mails from the Texas-based company.
The email has never been disavowed by Stratfor. When San Diego 6 reporter Kim Dvorak asked the CIA for comment on the email in the context of the Hastings' death, in an August, 2013 report, a CIA spokesman responded:
“Without commenting on information disseminated by WikiLeaks, any suggestion that Director Brennan has ever attempted to infringe on constitutionally-protected press freedoms is offensive and baseless.”
Michael Hasting was killed on June 18, 2013, when the new Mercedes C250 SUV he had just leased hit a tree after running numerous red lights at over 100 mph in Los Angeles. A surveillance video at a pizza shop captured a fiery, violent explosion, which is uncharacteristic of high-speed impacts. Generations of advances in safety design have made accidents exhibiting these characteristics unheard of.
Typically, high speed impacts, even in past generations of automobiles, are characterized by a violent, horrific-sounding crunching of metal and glass, but no gas explosion. Fire can follow, but ignition usually takes place after the initial impact, as fuel vapors heat up and come into contact with hot surfaces. According to the National Fire Protection Association, only 3% of cars catch on fire as the result of crash impacts, and impact explosions are not a statistical category.
The pizza shop video shows a fireball which explodes outward for hundreds of feet in all directions and immediately lights up the night sky. Skeptics of the official LAPD conclusion, that no foul play was involved, cite a witness who said that "It sounded like a bomb going off in the middle of the night."
Witnesses also reported the car was already on fire before it hit the tree.
Hastings crash video taken from pizza shop surveillance camera
Hours before he died, Hastings sent out a series of frantic emails to friends and colleagues, indicating that be believed he was being investigated by the FBI and sounding "panicked," according to his friend Sgt. Joe Biggs, whom he had met in Afghanistan.
In an in-depth interview with San Diego 6 reporter Kim Dvorak, and Hastings friend Sgt. Biggs, Biggs tells RT interviewer Abby Martin that he had received an email indicating that police had been present at Hastings' house that day, and that Hastings had been seen looking underneath his car. The San Diego journalist Kim Dvorak expresses her belief, after extensive investigation, that the Hastings crash was not a simple one-car accident, and may have involved foul play. She notes the police are withholding evidence such as the "black box" onboard the vehicle, which would have recorded all electronic events involving the car's controls.
San Diego 6 report
After Hastings' death, his notes on the Brennan story were suppressed, according to WesternJournalism.com, and in any event the Rolling Stone never published the story despite pledges to do so.
After at first saying that “At no time was Michael Hastings, or anything related to his work as a journalist, ever under investigation by the FBI,” the FBI subsequently revised its statement to: “At no time was journalist Michael Hastings ever under investigation by the FBI.” Freedom of Information Act requests from reporters revealed that the FBI had indeed cataloged some of Hastings' articles, and discussed him in heavily redacted documents.
Brennan was architect of CIA "Disposition Matrix" capture/kill list
CIA Director Brennan made news during his confirmation hearings in early 2013, when he was nominated for the position by Obama. Of particular concern to some senators was Brennan's role in creating the “Disposition Matrix,” an Obama administration project started in 2010, described by government officials as a "next-generation capture/kill list."
Brennan also served under the George W. Bush administration, first as chief-of-staff to CIA Director George Tenet, then as deputy executive director of the CIA.
Of the “Disposition Matrix” run by the executive branch National Counterterrorism Center (NCTC,) and heavily shaped by Brennan in his role as Obama National Security Advisor, Glenn Greenwald for the UK Guardian wrote:
What has been created here - permanently institutionalized - is a highly secretive executive branch agency that simultaneously engages in two functions: (1) it collects and analyzes massive amounts of surveillance data about all Americans without any judicial review let alone search warrants, and (2) creates and implements a "matrix" that determines the "disposition" of suspects, up to and including execution, without a whiff of due process or oversight.
Before his Senate confirmation vote for CIA Director, Kentucky Senator Rand Paul mounted a filibuster against Brennan's confirmation, saying:
“No one politician should be allowed to judge the guilt, to charge an individual, to judge the guilt of an individual and to execute an individual. It goes against everything that we fundamentally believe in our country."
Brennan was eventually confirmed by a vote of 63-34.
RT interview of San Diego 6 reporter Kim Dvorak and Hastings friend Sgt. Joe Biggs
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum