Journalist Michael Hastings is dead at 33

Moderators: Elvis, DrVolin, Jeff

Re: Journalist Michael Hastings is dead at 33

Postby nashvillebrook » Mon Jul 22, 2013 7:58 pm

Here's the starroute post, btw:

http://www.democraticunderground.com/10023089991

starroute (10,586 posts)
8. Another element is the murky online war between Anons and RW bloggers

That war had begun on Twitter even before the HBGary hack, when some particularly prankish members of Anonymous discovered how easy it was to goad right-wing bloggers into making racist remarks on Twitter. But after the Team Themis stuff came out, those blog-level battles got hauled into the developing conflict.

On one side were Anonymous and its associates -- particularly Velevet Revolution, whose StopTheChamber.com was one of the explicit targets of the Team Themis proposal. On the other were the right-wingers and their friends, many of them associated with the Breitbart empire, which had its own history of using dirty tricks to infiltrate and discredit left-wing groups and individuals (James O'Keefe, for example) and had already taken an interest in Velvet Revolution as a possible way of smearing the left.

Most of what followed is better understood as farce than as anything more serious. It got tangled up for a while with the Anthony Weiner scandal and the controversy over the many sock puppets and false internet identities that played a role in bringing Weiner down, and it took on any number of other strange twists and turns.

But it also pulled in Barrett Brown -- particularly through one exceedingly peculiar incident where prominent right-wing blogger and Los Angeles Assistant District Attorney John Patrick Frey, who had been deeply involved in the Weiner uproar, appealed to Brown to have Anonymous discredit the lawyer for former Breitbart associate Nadia Naffe, who had brought a lawsuit against Frey, and also to retaliate against a liberal blogger who had criticized him.

This happened last September, just as Brown was getting into serious trouble with the FBI, and there were people suggesting at the time that it might have had something to do with Brown's flipping out on the FBI guy and subsequent arrest. I don't know -- I gave up following the zaniness around that point, because it was devolving into an endless round of name-calling. But I find it strange that it never seems to get mentioned in the current stories, which focus entirely on the high-profile players like Booz Allen and Glenn Greenwald.
nashvillebrook
 
Posts: 635
Joined: Thu Aug 18, 2005 2:19 pm
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby 8bitagent » Mon Jul 22, 2013 10:59 pm

From the Cannonfire article
Long after the rest of the world stopped caring about Anthony Weiner and his famous peepee, a small group of right-wingers and left-wingers remained fixated on certain unsolved aspects of that scandal. We've talked about this group in previous posts. The die-hard "Weinergaters" engaged in a very weird twilight war, forever accusing each other of hacking and identity theft and impersonation and sockpuppetry and worse sins. They often claimed that the FBI was going to arrest their enemies any day now -- on God-only-knows what charge.


It's interesting, the Breitbart crowd. Breitbart seemed so full of hate on a Rush on steroids level, yet he had a devoted following. Even people opposed to Breitbart's politics claimed he was "assassinated".
I've heard of the Anthony Weiner thing, but why was that scandal so important to people? I mean compared to anti gay Republicans trying to hide gay sex stuff, I don't get the big deal.
I mean shit, it's nothing compared to the few researchers (deep 9/11 researchers) following up on the Ptech stuff and all the other hidden gems of nine eleven.

Its possible, that if Hastings was killed in a cyber car attack, it is part of a larger cyber shadow war.

I still maintain that there is a cyber element to the 9/11 operation http://911blogger.com/node/20677
(angel is next, ptech/mitre backdoors, phantom injects, flight controls, etc)
"Do you know who I am? I am the arm, and I sound like this..."-man from another place, twin peaks fire walk with me
User avatar
8bitagent
 
Posts: 12244
Joined: Fri Aug 24, 2007 6:49 am
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby Pele'sDaughter » Tue Jul 23, 2013 12:35 pm

http://rt.com/usa/car-recording-edr-device-429/

So what happened to the one is his car and what would the data show.
Don't believe anything they say.
And at the same time,
Don't believe that they say anything without a reason.
---Immanuel Kant
User avatar
Pele'sDaughter
 
Posts: 1917
Joined: Thu Sep 13, 2007 11:45 am
Location: Texas
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby rollingstone » Tue Jul 23, 2013 3:17 pm

SUNDAY, MARCH 27, 2011
Sock Puppet Planet: The Secret State's Quest for 'Persona Management Software'
Not since AT&T whistleblower Marc Klein's 2006 revelations that U.S. telecommunications giants were secretly collaborating with the government to spy on Americans, has a story driven home the point that we are confronted by a daunting set of invisible enemies: the security and intelligence firms constellating the dark skies of the National Security State.

As echoes from last month's disclosures by the cyber-guerrilla collective Anonymous continue to reverberate, leaked HBGary emails and documents are providing tantalizing insight into just how little daylight there is between private companies and the government.

The latest front in the ongoing war against civil liberties and privacy rights is the Pentagon's interest in "persona management software."

A euphemism for a suite of high-tech tools that equip an operative--military or corporate, take your pick--with multiple avatars or sock puppets, our latter day shadow warriors hope to achieve a leg up on their opponents in the "war of ideas" through stealthy propaganda campaigns rebranded as "information operations."


A Pervasive Surveillance State

The signs of a pervasive surveillance state are all around us. From the "persistent cookies" that track our every move across the internet to indexing dissidents already preemptively detained in public and private data bases: threats to our freedom to speak out without harassment, or worse, have never been greater.

As constitutional scholar Jack Balkin warned, the transformation of what was once a democratic republic based on the rule of law into a "National Surveillance State," feature "huge investments in electronic surveillance and various end runs around traditional Bill of Rights protections and expectations about procedure."

"These end runs," Balkin wrote, "included public private cooperation in surveillance and exchange of information, expansion of the state secrets doctrine, expansion of administrative warrants and national security letters, a system of preventive detention, expanded use of military prisons, extraordinary rendition to other countries, and aggressive interrogation techniques outside of those countenanced by the traditional laws of war."

Continuing the civil liberties' onslaught, The Wall Street Journal reported last week that Barack Obama's "change" regime has issued new rules that "allow investigators to hold domestic-terror suspects longer than others without giving them a Miranda warning, significantly expanding exceptions to the instructions that have governed the handling of criminal suspects for more than four decades."

The Journal points out that the administrative "revision" of long-standing rules and case law "marks another step back from [Obama's] pre-election criticism of unorthodox counterterror methods."

Also last week, The Raw Story revealed that the FBI has plans to "embark on a $1 billion biometrics project and construct an advanced biometrics facility to be shared with the Pentagon."

The Bureau's new biometrics center, part of which is already operating in Clarksburg, West Virginia, "will be based on a system constructed by defense contractor Lockheed Martin."

"Starting with fingerprints," The Raw Story disclosed, the center will function as "a global law enforcement database for the sharing of those biometric images." Once ramped-up "the system is slated to expand outward, eventually encompassing facial mapping and other advanced forms of computer-aided identification."

The transformation of the FBI into a political Department of Precrime is underscored by moves to gift state and local police agencies with electronic fingerprint scanners. Local cops would be "empowered to capture prints from any suspect, even if they haven't been arrested or convicted of a crime."

"In such a context," Stephen Graham cautions in Cities Under Siege, "Western security and military doctrine is being rapidly imagined in ways that dramatically blur the juridical and operational separation between policing, intelligence and the military; distinctions between war and peace; and those between local, national and global operations."

This precarious state of affairs, Graham avers, under conditions of global economic crisis in the so-called democratic West as well as along the periphery in what was once called the Third World, has meant that "wars and associated mobilizations ... become both boundless and more or less permanent."

Under such conditions, Dick Cheney's infamous statement that the "War on Terror" might last "decades" means, according to Graham, that "emerging security policies are founded on the profiling of individuals, places, behaviours, associations, and groups."

But to profile more effectively, whether in Cairo, Kabul, or New York, state security apparatchiks and their private partners find it necessary to squeeze ever more data from a surveillance system already glutted by an overabundance of "situational awareness."

"Last October," Secrecy News reported, "the DNI revealed that the FY2010 budget for the National Intelligence Program (NIP) was $53.1 billion. And the Secretary of Defense revealed that the FY2010 budget for the Military Intelligence Program (MIP) was $27.0 billion, the first time the MIP budget had been disclosed, for an aggregate total intelligence budget of $80.1 billion for FY 2010."

This excludes of course, the CIA and Pentagon's black budget that hides a welter of top secret and above Special Access Programs under a dizzying array of code names and acronyms. In February, Wired disclosed that the black budget "appears to be about $56 billion, the same as last year," but this "may only be the tip of an iceberg of secret funds."

While the scandalous nature of such outlays during a period of intense economic and social attacks on the working class are obvious, less obvious are the means employed by the so-called "intelligence community" to defend an indefensible system of exploitation and corruption.

Which brings us back to the HBGary hack.

"Operation MetalGear"

While media have focused, rightly so, on the sleazy campaign proposed to Bank of America and the U.S. Chamber of Commerce by the high-powered law firm and lobby shop Hunton & Williams (H&W) to bring down WikiLeaks and tar Chamber critics, the treasure trove of emails leaked by Anonymous also revealed a host of Pentagon programs pointed directly at the heart of our freedom to communicate.

In fact, The Tech Herald revealed that while Palantir and Berico sought to distance themselves from HBGary and Hunton & William's private spy op, "in 2005, Palantir was one of countless startups funded by the CIA, thanks to their venture funding arm, In-Q-Tel."

"Most of In-Q-Tel's investments," journalist Steve Ragan wrote, "center on companies that specialize in automatic collection and processing of information."

In other words Palantir, and dozens of other security start-ups to the tune of $200 million since 1999, was a recipient of taxpayer-funded largess from the CIA's venture capitalist arm for products inherently "dual-use" in nature.

"Palantir Technologies," The Tech Herald revealed, was "the main workhorse when it comes to Team Themis' activities."

In proposals sent to H&W, a firm recommended to Bank of America by a Justice Department insider, "Team Themis said they would 'leverage their extensive knowledge of Palantir's development and data integration environments' allowing all of the data collected to be 'seamlessly integrated into the Palantir analysis framework to enhance link and artifact analysis'."

Following the sting of HBGary Federal and parent company HBGary, Anonymous disclosed on-going interest and contract bids between those firms, Booz Allen Hamilton and the U.S. Air Force to develop software that will allow cyber-warriors to create fake personas that help "manage" Pentagon interventions into social media platforms like Facebook, Twitter and blogs.

As Ragan points out, while the "idea for such technology isn't new," and that "reputation and persona management techniques have been used by the government and the private sector for years," what makes these disclosures uniquely disturbing are apparent plans by the secret state to use the software for propaganda campaigns that can just as easily target an American audience as one in a foreign country.


While neither HBGary nor Booz Allen secured those contracts, interest by HBGary Federal's disgraced former CEO Aaron Barr and others catering to the needs of the militarist state continue to drive development forward.

Dubbed "Operation MetalGear", Anonymous believes that the program "involves an army of fake cyber personalities immersed in social networking websites for the purposes of manipulating the mass population via influence, crawling information from major online communities (such as Facebook), and identifying anonymous personalities via correlating stored information from multiple sources to establish connections between separate online accounts, using this information to arrest dissidents and activists who work anonymously."

As readers recall, such tools were precisely what Aaron Barr boasted would help law enforcement officials take down Anonymous and identify WikiLeaks supporters.

According to a solicitation (RTB220610) found on the FedBizOpps.Gov web site, under the Orwellian tag "Freedom of Information Act Support," the Air Force is seeking software that "will allow 10 personas per user, replete with background, history, supporting details, and cyber presences that are technically, culturally and geographacilly [sic] consistent."

We're informed that "individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries."

Creepily, "personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information."

Aiming for maximum opacity, the RFI demands that the licence "protects the identity of government agencies and enterprise organizations." An "enterprise organization" is a euphemism for a private contractor hired by the government to do its dirty work.

The proposal specifies that the licensed software will enable "organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization."

While Barr's premature boasting may have brought Team Themis to ground, one wonders how many other similar operations continue today under cover of the Defense Department's black budget.

Corporate Cut-Outs

Following up on last month's revelations, The Guardian disclosed that a "Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an 'online persona management service' that will allow one US serviceman or woman to control up to 10 separate identities based all over the world."

That firm, a shadowy Los Angeles-based outfit called Ntrepid is devoid of information on its corporate web site although a company profile avers that the firm "provides national security and law enforcement customers with software, hardware, and managed services for cyber operations, analytics, linguistics, and tagging & tracking."

According to Guardian reporters Nick Fielding and Ian Cobain, Ntrepid was awarded a $2.76M contract by CENTCOM, which refused to disclose "whether the multiple persona project is already in operation or discuss any related contracts."

Blurring corporate lines of accountability even further, The Tech Herald revealed that Ntrepid may be nothing more than a "ghost corporation," a cut-out wholly owned and operated by Cubic Corporation.

A San Diego-based firm describing itself as "a global leader in defense and transportation systems and services" that "is emerging as an international supplier of smart cards and RFID solutions," Cubic clocks in at No. 75 on Washington Technology's list of 2010 Top Government Contractors.

Founded by Walter J. Zable, the firm's Chairman of the Board and CEO, Cubic has been described as one of the oldest and largest defense electronics firms on the West Coast.

Chock-a-block with high-level connections to right-wing Republicans including Darrell Issa, Duncan Hunter and Dan Coates, during the 2010 election cycle Cubic officers donated some $90,000 to Republican candidates, including $25,000 to the National Republican Congressional Committee and some $30,000 to the National Republican Senatorial Committee, according to the Center for Responsive Politics' OpenSecrets.org.

With some $1 billion in 2009 revenue largely derived from the Defense Department, the company's "Cyber Solutions" division "provides specialized cyber security products and solutions for defense, intelligence and homeland security customers."

The RFI for the Air Force disclosed by Anonymous Ragan reports, "was written for Anonymizer, a company acquired in 2008 by intelligence contractor Abraxas Corporation. The reasoning is that they had existing persona management software and abilities."

In turn, Abraxas was purchased by Cubic in 2010 for $124 million, an acquisition which Washington Technology described as one of the "best intelligence-related" deals of the year.

As The Tech Herald revealed, "some of the top talent at Anonymizer, who later went to Abraxas, left the Cubic umbrella to start another intelligence firm. They are now listed as organizational leaders for Ntrepid, the ultimate winner of the $2.7 million dollar government contract."

Speculation is now rife that since "Ntrepid's corporate registry lists Abraxas' previous CEO and founder, Richard Helms, as the director and officer, along with Wesley Husted, the former CFO, who is an Ntrepid officer as well," the new firm may be little more than an under-the-radar front for Cubic.

Amongst the Security Services offered by the firm we learn that "Cubic subsidiaries are working individually and in concert to develop a wide range of security solutions" that include: "C4ISR data links for homeland security intelligence, surveillance and reconnaissance missions;" a Cubic Virtual Analysis Center which promises to deliver "superior situational awareness to decision makers in government, industry and nonprofit organizations," human behavior pattern analysis, and other areas lusted after by securocrats.

The Guardian informs us that the "multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces."

"Since then," Fielding and Cobain wrote, "OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East."

While CENTCOM's then-commander, General David Petraeus told the Senate Armed Services Committee last year that the program was designed to "counter extremist ideology and propaganda," in light of HBGary revelations, one must ask whether firms involved in the dirty tricks campaign against WikiLeaks have deployed versions of "persona management software" against domestic opponents.

While we cannot say with certainty this is the case, mission creep from other "War on Terror" fronts, notably ongoing NSA warrantless wiretapping programs and Defense Department spy ops against antiwar activists, also involving "public-private partnerships" amongst security firms and the secret state, should give pause.
rollingstone
 
Posts: 14
Joined: Sat Jul 20, 2013 1:10 pm
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby elfismiles » Tue Jul 23, 2013 4:27 pm

Sadly, it's fate was likely sealed...

Image

Pele'sDaughter » 23 Jul 2013 16:35 wrote:http://rt.com/usa/car-recording-edr-device-429/

So what happened to the one is his car and what would the data show.
User avatar
elfismiles
 
Posts: 8512
Joined: Fri Aug 11, 2006 6:46 pm
Blog: View Blog (4)

Re: Journalist Michael Hastings is dead at 33

Postby Forgetting2 » Tue Jul 23, 2013 4:33 pm

I wonder if Mercedes would have that data automatically transmitted, and if they did how long they'd keep it... and if they'd admit it if they still did or ever did have it. (I think there was something upthread about this.)
You know what you finally say, what everybody finally says, no matter what? I'm hungry. I'm hungry, Rich. I'm fuckin' starved. -- Cutter's Way
User avatar
Forgetting2
 
Posts: 406
Joined: Sat Jun 03, 2006 4:19 pm
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby nashvillebrook » Tue Jul 23, 2013 7:31 pm

8bitagent » 23 Jul 2013 02:59 wrote:From the Cannonfire article
Long after the rest of the world stopped caring about Anthony Weiner and his famous peepee, a small group of right-wingers and left-wingers remained fixated on certain unsolved aspects of that scandal. We've talked about this group in previous posts. The die-hard "Weinergaters" engaged in a very weird twilight war, forever accusing each other of hacking and identity theft and impersonation and sockpuppetry and worse sins. They often claimed that the FBI was going to arrest their enemies any day now -- on God-only-knows what charge.


It's interesting, the Breitbart crowd. Breitbart seemed so full of hate on a Rush on steroids level, yet he had a devoted following. Even people opposed to Breitbart's politics claimed he was "assassinated".
I've heard of the Anthony Weiner thing, but why was that scandal so important to people? I mean compared to anti gay Republicans trying to hide gay sex stuff, I don't get the big deal.
I mean shit, it's nothing compared to the few researchers (deep 9/11 researchers) following up on the Ptech stuff and all the other hidden gems of nine eleven.

Its possible, that if Hastings was killed in a cyber car attack, it is part of a larger cyber shadow war.

I still maintain that there is a cyber element to the 9/11 operation http://911blogger.com/node/20677
(angel is next, ptech/mitre backdoors, phantom injects, flight controls, etc)



These two statements kinda answer each other, I think. Weinergate actually wasn't that earth shattering (the part about a pol texting his parts). What was compelling to the folks who went deep into it was the appearance that it was propelled by hackers who seemed to have remarkable access, who used fairly sophisticated sock-puppetry tactics, and who also had the ability to launch the narrative into media.

You mention Ptech here and rollingstone below mentions the HBGary persona management system...and for some reason these two reminded me of Promis and Danny Casolaro...that, deadly fights over spooky software systems have a shared history.
nashvillebrook
 
Posts: 635
Joined: Thu Aug 18, 2005 2:19 pm
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby 8bitagent » Wed Jul 24, 2013 8:33 am

nashvillebrook » Tue Jul 23, 2013 6:31 pm wrote:
8bitagent » 23 Jul 2013 02:59 wrote:From the Cannonfire article
Long after the rest of the world stopped caring about Anthony Weiner and his famous peepee, a small group of right-wingers and left-wingers remained fixated on certain unsolved aspects of that scandal. We've talked about this group in previous posts. The die-hard "Weinergaters" engaged in a very weird twilight war, forever accusing each other of hacking and identity theft and impersonation and sockpuppetry and worse sins. They often claimed that the FBI was going to arrest their enemies any day now -- on God-only-knows what charge.


It's interesting, the Breitbart crowd. Breitbart seemed so full of hate on a Rush on steroids level, yet he had a devoted following. Even people opposed to Breitbart's politics claimed he was "assassinated".
I've heard of the Anthony Weiner thing, but why was that scandal so important to people? I mean compared to anti gay Republicans trying to hide gay sex stuff, I don't get the big deal.
I mean shit, it's nothing compared to the few researchers (deep 9/11 researchers) following up on the Ptech stuff and all the other hidden gems of nine eleven.

Its possible, that if Hastings was killed in a cyber car attack, it is part of a larger cyber shadow war.

I still maintain that there is a cyber element to the 9/11 operation http://911blogger.com/node/20677
(angel is next, ptech/mitre backdoors, phantom injects, flight controls, etc)



These two statements kinda answer each other, I think. Weinergate actually wasn't that earth shattering (the part about a pol texting his parts). What was compelling to the folks who went deep into it was the appearance that it was propelled by hackers who seemed to have remarkable access, who used fairly sophisticated sock-puppetry tactics, and who also had the ability to launch the narrative into media.

You mention Ptech here and rollingstone below mentions the HBGary persona management system...and for some reason these two reminded me of Promis and Danny Casolaro...that, deadly fights over spooky software systems have a shared history.


Yeah definitely. It was actually both through Indira Singh and Michael Rupert's writings on Ptech in the context of Promis that I found out about that.

This shit's so weird...a Saudi al Qaeda linked company with back channel software on virtually all of the US government's computers as of 9/11/2001...
(CBS News 2002)

The Cannon article makes a big deal about HBGary. But they got royally hacked and their leader made to look like a fool. Andrew Breitbart passed away of severe cardiomegaly at the young age of 43(one can't help but wonder if holding so much hate and grudges is too healthy on top of having a condition) In other words, the right wing hackers...if such a thing even exists, probably were not feeling too good by that time. The 1:10 ratio makes sense. 10 sockpuppets/fake accounts/opinion fluffers for every one actual human being at a keyboard. And I thought I had no life!
"Do you know who I am? I am the arm, and I sound like this..."-man from another place, twin peaks fire walk with me
User avatar
8bitagent
 
Posts: 12244
Joined: Fri Aug 24, 2007 6:49 am
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby elfismiles » Wed Jul 24, 2013 10:22 am

Just came across this tidbit from Lt. Fred Corral again about Hastings fingerprints obtained from the FBI.

Presumably, Hastings and his wife have/had evidence of his interactions with whomever it was that convinced him he was under investigation by the FBI (or more likely someone who was impersonating an FBI agent). Hopefully she and friends are following up on that. And assuming the FBI are telling the truth they should be looking into who was impersonating one of their own.

Hunter » 20 Jun 2013 21:04 wrote:So the FBI identified his body huh? Heh.

http://blogs.laweekly.com/informer/2013 ... _crash.php

The remains of 33-year-old Michael Mahon Hastings were identified through fingerprint records "obtained from the FBI," coroner's Lt. Fred Corral told us:

<snip>

Oh, and yes, WikiLeaks says he told a lawyer for the organization he was being investigated by the FBI shortly before his death.
User avatar
elfismiles
 
Posts: 8512
Joined: Fri Aug 11, 2006 6:46 pm
Blog: View Blog (4)

Re: Journalist Michael Hastings is dead at 33

Postby elfismiles » Wed Jul 24, 2013 10:33 am


Michael Hastings Probed the CIA Before Fatal Hollywood Crash
By Dennis Romero Tue., Jun. 18 2013 at 10:48 PM

Michael Hastings, the Buzzfeed writer who appeared to have died in a fiery Hollywood crash early today, had reported extensively on the CIA and was rumored to be continuing work on that beat at the time of his demise.

That Hastings had the Central Intelligence Agency in his sights is no surprise to those who knew his work. In March he gave what could now be seen as an eerie interview to Current TV about his recent Rolling Stone coverage of a CIA operative, Andrew Warren, who grew to believe he was being followed:

He started drinking heavily. He started abusing these drugs, Xanax and Valium, he started hearing voices. He believed he was being followed. He might have actually been being followed. Maybe, probably not, you don't know. It gets into this very strange ...
"Well, he's CIA, he might have been followed," says host Cenk Uygur.

Hastings: "He might have been followed for sure. For sure."

The subject "starts leading this double life," Hastings said. "No one knows he's undercover."

Leon Panetta was asked about Warren at his Senate confirmation as CIA director and said he should be fired. Soon after, he was.

Hastings said that Warren's career unraveled, in part, because he was the only black officer in the agency. "If he was a white guy from Yale or Harvard," he told Current, "he would not be in jail right now."

Indeed, Hastings suggests in his April 7 Rolling Stone piece about Warren that it was his knowledge of "severe" interrogation techniques used by the CIA in the war on terror that helped lead to his demise.

In 2008 the agent was recalled to the United States to face allegations that he "drugged and raped an Algerian woman while serving there as station chief," reads the piece.

Warren was fired and jailed, but not without controversy.

Buzzfeed announced in October that Hastings "will bring his hard-hitting reporting on national security and politics to the BuzzFeed Los Angeles Bureau while contributing to entertainment coverage as a Correspondent-at-Large."

Indeed, the shadowy world of intelligence and off-the-record American aggression was a favorite topic of the journalist. Last year he wrote this Rolling Stone story "killer drones" in Afghanistan.

...

http://blogs.laweekly.com/informer/2013 ... h_fire.php


Hunter » 21 Jun 2013 13:48 wrote:
"He took his first trip to the Middle East, for a four-week program in Egypt, in 1993. The next year, he received a fellowship to spend the following two summers at Yarmouk University in Jordan, where he continued his Arabic studies. In 1996, after receiving his master's, he got a job as a language analyst for the National Security Agency. Warren was then hired by the CIA, according to court documents. By 1997, he'd gone into training, and in 1999 Warren's appointment as a foreign service officer was published in the Congressional Record."

http://www.rollingstone.com/politics/ne ... z2Wr7PE3dL
User avatar
elfismiles
 
Posts: 8512
Joined: Fri Aug 11, 2006 6:46 pm
Blog: View Blog (4)

Re: Journalist Michael Hastings is dead at 33

Postby justdrew » Thu Jul 25, 2013 2:18 am



Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel
This story appears in the August 12, 2013 issue of Forbes.

Stomping on the brakes of a 3,500-pound Ford Escape that refuses to stop–or even slow down–produces a unique feeling of anxiety. In this case it also produces a deep groaning sound, like an angry water buffalo bellowing somewhere under the SUV’s chassis. The more I pound the pedal, the louder the groan gets–along with the delighted cackling of the two hackers sitting behind me in the backseat.

Luckily, all of this is happening at less than 5mph. So the Escape merely plows into a stand of 6-foot-high weeds growing in the abandoned parking lot of a South Bend, Ind. strip mall that Charlie Miller and Chris Valasek have chosen as the testing grounds for the day’s experiments, a few of which are shown in the video below. (When Miller discovered the brake-disabling trick, he wasn’t so lucky: The soccer-mom mobile barreled through his garage, crushing his lawn mower and inflicting $150 worth of damage to the rear wall.)

“Okay, now your brakes work again,” Miller says, tapping on a beat-up MacBook connected by a cable to an inconspicuous data port near the parking brake. I reverse out of the weeds and warily bring the car to a stop. “When you lose faith that a car will do what you tell it to do,” he adds after we jump out of the SUV, “it really changes your whole view of how the thing works.”

This fact, that a car is not a simple machine of glass and steel but a hackable network of computers, is what Miller and Valasek have spent the last year trying to demonstrate. Miller, a 40-year-old security engineer at Twitter, and Valasek, the 31-year-old director of security intelligence at the Seattle consultancy IOActive, received an $80,000-plus grant last fall from the mad-scientist research arm of the Pentagon known as the Defense Advanced Research Projects Agency to root out security vulnerabilities in automobiles.

The duo plans to release their findings and the attack software they developed at the hacker conference Defcon in Las Vegas next month–the better, they say, to help other researchers find and fix the auto industry’s security problems before malicious hackers get under the hoods of unsuspecting drivers. The need for scrutiny is growing as cars are increasingly automated and connected to the Internet, and the problem goes well beyond Toyota and Ford. Practically every American carmaker now offers a cellular service or Wi-Fi network like General Motors’ OnStar, Toyota’s Safety Connect and Ford’s SYNC. Mobile-industry trade group the GSMA estimates revenue from wireless devices in cars at $2.5 billion today and projects that number will grow tenfold by 2025. Without better security it’s all potentially vulnerable, and automakers are remaining mum or downplaying the issue.

As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision. “Imagine you’re driving down a highway at 80 ,” Valasek says. “You’re going into the car next to you or into oncoming traffic. That’s going to be bad times.”

A Ford spokesman says the company takes hackers “very seriously,” but Toyota, for its part, says it isn’t impressed by Miller and Valasek’s stunts: Real carhacking, the company’s safety manager John Hanson argues, wouldn’t require physically jacking into the target car. “Our focus, and that of the entire auto industry, is to prevent hacking from a remote wireless device outside of the vehicle,” he writes in an e-mail, adding that Toyota engineers test its vehicles against wireless attacks. “We believe our systems are robust and secure.”

But Miller and Valasek’s work assumed physical access to the cars’ computers for a reason: Gaining wireless access to a car’s network is old news. A team of researchers at the University of Washington and the University of California, San Diego, experimenting on a sedan from an unnamed company in 2010, found that they could wirelessly penetrate the same critical systems Miller and Valasek targeted using the car’s OnStar-like cellular connection, Bluetooth bugs, a rogue Android app that synched with the car’s network from the driver’s smartphone or even a malicious audio file on a CD in the car’s stereo system. “Academics have shown you can get remote code execution,” says Valasek, using hacker jargon for the ability to start running commands on a system. “We showed you can do a lot of crazy things once you’re inside.”

One of the UCSD professors involved in those earlier tests, Stefan Savage, claims that wireless hacks remain possible and affect the entire industry: Given that attacks on driving systems have yet to be spotted outside of a lab, manufacturers simply haven’t fully secured their software, he says. “The vulnerabilities that we found were the kind that existed on PCs in the early to mid-1990s, when computers were first getting on the Internet,” says Savage.

As cars approach Google’s dream of passenger-carrying robots, more of their capabilities also become potentially hackable. Miller and Valasek exploited Toyota’s and Ford’s self-parking functions, for instance, to hijack their vehicles’ steering. A car like the 2014 Mercedes Benz S-Class, which can negotiate stop-and-go traffic or follow a leader without input, may offer a hacker even more points of attack, says Gartner Group analyst Thilo Koslowski. “The less the driver is involved, the more potential for failure when bad people are tampering with it,” he says.

In the meantime, Miller and Valasek argue that the best way to pressure car companies to secure their products is to show exactly what can be done with a multi-ton missile on wheels. Better to experience the panic of a digitally hijacked SUV now than when a more malicious attacker is in control. “If the only thing keeping you from crashing your car is that no one is talking about this,” says Miller, “then you’re not safe anyway.”
By 1964 there were 1.5 million mobile phone users in the US
User avatar
justdrew
 
Posts: 11966
Joined: Tue May 24, 2005 7:57 pm
Location: unknown
Blog: View Blog (11)

Re: Journalist Michael Hastings is dead at 33

Postby Bruce Dazzling » Fri Jul 26, 2013 12:53 pm

Hacker dies days before he was to reveal how to remotely kill pacemaker patients
Published time: July 26, 2013 15:07
Russia Today


Security researcher Barnaby Jack has passed away in San Francisco, only days before a scheduled appearance at a Las Vegas hacker conference where he intended to show how an ordinary pacemaker could be compromised in order to kill a man.

Jack, who previously presented hacks involving ATMs and insulin pumps at the annual Black Hat conference in Vegas, was confirmed dead Friday morning by the San Francisco Medical Examiner’s office, Reuters reported. He passed away Thursday this week, but the office declined to offer any more details at this time.

Jack’s death came one week to the day before he was scheduled to detail one of his most recent exploits in a Black Hat talk called “Implantable Medical Devices: Hacking Humans.”

“I was intrigued by the fact that these critical life devices communicate wirelessly. I decided to look at pacemakers and ICDs (implantable cardioverter defibrillators) to see if they communicated securely and if it would be possible for an attacker to remotely control these devices,” Jack told Vice last month.

After around six months of research, Jack said he developed a way to hack one of those devices remotely and send it a high-voltage shock from upwards of 50 feet away.

“If the devices can be accessed remotely, there's always a potential for abuse,” he told Vice tech reporter William Alexander.

In a blog post earlier this year, Jack said he was influenced by a recent episode of the television program "Homeland," in which a terrorist remotely hacked the pacemaker of the United States vice president.

“In my professional opinion, the episode was not too far off the mark,” he wrote.

When Alexander asked Jack if a government official outfitted with a pacemaker would be vulnerable to assassination from a hacker, the researcher remarked, “I wouldn't feel comfortable speculating about such a scenario.”

“Although the threat of a malicious attack to anyone with an implantable device is slim, we want to mitigate these risks no matter how minor,” he wrote on his blog post. At the time, Jack said the vulnerability was being discussed with medical device manufacturers.

“Over the past year, we’ve become increasingly aware of cyber security vulnerabilities in incidents that have been reported to us,” William Maisel, deputy director for science at the FDA’s Center for Devices and Radiological Health, told Reuters. “Hundreds of medical devices have been affected, involving dozens of manufacturers.”

At previous Black Hat talks, Jack detailed how he emulated a stunt found in the movie Terminator 2 that allowed him to remotely hack an automatic teller machine. In addition to being able to read credit card numbers and PINs inputted by another user, Jack also showed how a USB drive could be implanted in an ATM which would override the machine’s firmware and allow a hacker to take control.

In another presentation, Jack said he could hack insulin pumps to order the machines to deliver lethal doses to patients, in turn killing them.

“We notified the manufacturer of the vulnerability and it will be fixed with the next insulin pump revision,” he told Vice.

Jack’s most recent employer, security firm IOActive, said in a statement, “Lost but never forgotten our beloved pirate, Barnaby Jack has passed. He was a master hacker and dear friend. Here’s to you Barnes!”

Black Hat is scheduled to begin Wednesday in Las Vegas, with a presentation by NSA Chief Gen. Keith Alexander. It will be immediately followed by the Def Con hacker conference, which will be taking place just down the road. Researchers at Def Con plan to demonstrate various high-profile hacks, including how modern cars can be compromised.
"Arrogance is experiential and environmental in cause. Human experience can make and unmake arrogance. Ours is about to get unmade."

~ Joe Bageant R.I.P.

OWS Photo Essay

OWS Photo Essay - Part 2
User avatar
Bruce Dazzling
 
Posts: 2306
Joined: Wed Dec 26, 2007 2:25 pm
Location: Yes
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby Freitag » Fri Jul 26, 2013 8:28 pm

Re: Skynet

This quote jumped out at me today, from a crime article:

Police said troopers activated a license plate reader system, which identified Ferrante's vehicle along a highway, and then set up a road block for him.

Link


They say there's no expectation of privacy on the roadway, or in public, because in theory a cop could be there observing you. But I feel like I'm the only one who sees a big difference between there potentially being a cop on any corner, and there actually being a cop (camera) on every corner.
User avatar
Freitag
 
Posts: 615
Joined: Sun Jun 05, 2011 12:49 am
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby nashvillebrook » Sat Jul 27, 2013 12:29 pm

Here's the crash video from the pizza place security cam. Notice the little flash of light at 15 seconds just before the big explosion that starts at 17-18 secs. And, obviously -- check out the enormity of the explosion.

The car appears in the footage at around 13-14 secs.

LA Weekly blog post on the new footage found here --> http://blogs.laweekly.com/informer/2013/07/michael_hastings_crash_video.php


nashvillebrook
 
Posts: 635
Joined: Thu Aug 18, 2005 2:19 pm
Blog: View Blog (0)

Re: Journalist Michael Hastings is dead at 33

Postby 8bitagent » Sat Jul 27, 2013 12:59 pm

Interesting. THIS is the pizza footage? You can barely see anything. How was that guy so sure the car hit a sprinkler and that's what causes the pre explosion?

Yep, I see it at 15 second mark

Hastings' family has told Rolling Stone that they do not believe he was assassinated. "I don't believe it's a conspiracy," his brother Jeff Hastings said. "There's no part of me that's troubled by that."


Just like Teddy believing Bobby and Jack weren't done in by a conspiracy. Well they are the family, it is their right to think nothing of these things
"Do you know who I am? I am the arm, and I sound like this..."-man from another place, twin peaks fire walk with me
User avatar
8bitagent
 
Posts: 12244
Joined: Fri Aug 24, 2007 6:49 am
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 171 guests