Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Laptop-of-Death

Rss Feed Group items tagged

Paul Merrell

Newest Remote Car Hacking Raises More Questions About Reporter's Death - WhoWhatWhy - 0 views

  • As readers of WhoWhatWhy know, our site has been one of the very few continuing to explore the fiery death two years ago of investigative journalist Michael Hastings, whose car left a straight segment of a Los Angeles street at a high speed, jumped the median, hit a tree, and blew up.Our original report described anomalies of the crash and surrounding events that suggest cutting-edge foul play—that an external hacker could have taken control of Hastings’s car in order to kill him. If this sounds too futuristic, a series of recent technical revelations has proven that “car hacking” is entirely possible. The latest just appeared this week.
  • Hackers, seeking to demonstrate the vulnerability of automobiles to remote attacks, were able to largely take over the Jeep Cherokee driven by a writer for the tech magazine Wired:Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.They were able to make his car decelerate suddenly, causing the writer to “narrowly avert death” at the hands of a semi-trailer coming up behind him.In an earlier demonstration, they had been able to do similar things with other vehicles:In the summer of 2013, I drove a Ford Escape and a Toyota Prius around a South Bend, Indiana, parking lot while they sat in the backseat with their laptops, cackling as they disabled my brakes, honked the horn, jerked the seat belt, and commandeered the steering wheel.
  • All of this is increasingly drawing the attention—and action— of the authorities. U.S. Senators Richard Blumenthal (D-CT) and Edward J. Markey (D-MA), members of the Commerce, Science and Transportation Committee, introduced legislation Tuesday seeking to establish federal standards for security and privacy of drivers in today’s computer-laden cars.What we do not hear is any discussion about whether the risk has gone beyond the realm of possibility…to a reality.
  • ...2 more annotations...
  • Back when Michael Hastings died, former counterterrorism czar Richard Clarke—by all accounts a sober, no-nonsense man—said that the Hastings’s crash was “consistent with a car cyber attack” and that it was likely that intelligence agencies knew “how to remotely seize control of a car.”It is worth noting, too, that the day before his death, Hastings had “urgently” requested to borrow his neighbor’s car—he wanted to get out of town, but he feared his own car was being tampered with.How is it then that “mainstream” publications, including even Wired, do not talk about the very odd circumstances surrounding the death of a journalist who had made powerful enemies? Did the fact that he had caused a famed general to be fired, that he was investigating the CIA chief, that he told colleagues he himself was being investigated by the FBI—did none of this at least raise the slightest suspicion on the part of our journalistic community? How about the fiery explosion when his car hit a palm tree—which automotive experts say should not normally take place; what about the fact that the engine flew out of the vehicle and landed a considerable distance away–which, again, we are told, is highly unusual?
  • As with so many of these things, the authorities raced to conclude that it was all an unfortunate accident and that there was no more to the story. And virtually the entirety of journalism—Left, Right and Center, Mainstream and “Alternative”—accepted this conclusion without so much as a hint of skepticism.So, now that it has been dramatically demonstrated that accidents can be caused remotely by those targeting a driver, will we see other media stepping up to take a good hard look at the key question: What really happened to Michael Hastings? We hope so, but we aren’t taking any bets.
Paul Merrell

Planting False Evidence on Iran | Consortiumnews - 0 views

  • A month after former CIA officer Jeffrey Sterling was convicted on nine felony counts with circumstantial metadata, the zealous prosecution is now having potentially major consequences — casting doubt on the credibility of claims by the U.S. government that Iran has work on a nuclear weapons program.With negotiations between Iran and the United States at a pivotal stage, fallout from the trial’s revelations about the CIA’s Operation Merlin is likely to cause the International Atomic Energy Agency to re-examine U.S. assertions that Iran has pursued nuclear weapons.
  • In its zeal to prosecute Sterling for allegedly leaking classified information about Operation Merlin — which provided flawed nuclear weapon design information to Iran in 2000 — the U.S. government has damaged its own standing with the IAEA. The trial made public a treasure trove of information about the Merlin operation.Last week Bloomberg News reported from Vienna, where IAEA is headquartered, that the agency “will probably review intelligence they received about Iran as a result of the revelations, said the two diplomats who are familiar with the IAEA’s Iran file and asked not to be named because the details are confidential.”The Bloomberg dispatch, which matter-of-factly referred to Merlin as a “sting” operation, quoted a former British envoy to the IAEA, Peter Jenkins, saying: “This story suggests a possibility that hostile intelligence agencies could decide to plant a ‘smoking gun’ in Iran for the IAEA to find. That looks like a big problem.”
  • Investigative journalist Marcy Wheeler, my colleague at ExposeFacts, has written an extensive analysis of the latest developments. The article on her EmptyWheel blog raises key questions beginning with the headline “What Was the CIA Really Doing with Merlin by 2003?”An emerging big irony of United States of America v. Jeffrey Alexander Sterling is that the government has harmed itself in the process of gunning for the defendant. While the prosecution used innuendos and weak circumstantial evidence to obtain guilty verdicts on multiple felonies, the trial produced no actual evidence that Sterling leaked classified information. But the trial did provide abundant evidence that the U.S. government’s nuclear-related claims about Iran should not be trusted.In the courtroom, one CIA witness after another described Operation Merlin as a vitally important program requiring strict secrecy. Yet the government revealed a great deal of information about Operation Merlin during the trial — including CIA documents that showed the U.S. government to be committed to deception about the Iranian nuclear program.
  • ...1 more annotation...
  • If, as a result, the International Atomic Energy Agency concludes that U.S. assertions about an alleged Iranian nuclear weapons program lack credibility, top officials in Washington will have themselves to blame.
1 - 2 of 2
Showing 20 items per page