Uber Drivers Forum banner
1 - 7 of 7 Posts

·
Premium Member
Joined
·
5,637 Posts
Discussion Starter · #1 ·
http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Trust those driverless cars?

And from the same release:

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

Yeah, I'm sure whomever creates the software will make it completely secure. oh wait....there's no such thing.
 

·
Banned
Joined
·
4,953 Posts
Yeah, I'm sure whomever creates the software will make it completely secure. oh wait....there's no such thing.
If complete security is what you want, you might want to choose a different planet. We could go back to horse and buggy to be safe? Wait... but then someone could just loosen your buggy wheel and spook the horse. Undetectable.
 

·
Premium Member
Joined
·
63,019 Posts
That's old, self driving cars will make such hits trivial not just for the CIA but darknet hitmen as well, hackers will replace them.
Hacker Hit Men hired via bit coin on the dark web . . .
Man killed today by his " Smart House" film at 11:00

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Trust those driverless cars?

And from the same release:

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

Yeah, I'm sure whomever creates the software will make it completely secure. oh wait....there's no such thing.
C.I.A. can't operate domestically.
Which is why I never speak of them. I like some of their projects and I am a fan.
Homeland . . . . I just don't trust Homeland.

http://www.zerohedge.com/news/2017-03-07/wikileaks-hold-press-conference-vault-7-release-8am-eastern

Also cars, suggesting that the CIA may have a role in the death of Michael Hastings:

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

Trust those driverless cars?

And from the same release:

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

Yeah, I'm sure whomever creates the software will make it completely secure. oh wait....there's no such thing.
To understand the Michael Hastings situation one must understand the last project he was working on.
The Govt. has " Alphabet agencies" just as Google has " Alphabet agencies".

Always remember,
Just because your govt. And politicians can be purchased,does not mean all of its organizations can be.

The more politicians holding the purse strings,the more convoluted an Organizations Mission Statement may become.
Therin lies the dangers to all.
 

·
Banned
Joined
·
1,939 Posts
Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
Claims? lol, everyone and his mother knows this, they had an elite hacker group that created a whole bunch of insane warez, they got hacked and their weaponry was promptly auctioned on the darknet.

If you search hard enough you can find their airgap viruses that write themselves in the ROM of a BIOS, this affects cars directly, it doesn't help the fact car BIOS hacking is a lot easier than a normal motherboard's.
 

·
Premium Member
Joined
·
63,019 Posts
What alarms me is when the Justice Dept. Smuggles guns to Mexico for a set up operation that backfires in their face.
I am sure other agencies did not appreciate such an inversion into the regional dynamics and the attention that such a blunder focused.
Why ,under what excuse ,would the U.S.Justice Dept. Be performing " undercover" operations across foreign turf ?
Where was the Democrats outcry for such illegal,dangerous,manipulative behavior !?!?

Boundaries are instilled for a reason

The Constitution is a fence for Government.
 

·
Registered
Joined
·
1,601 Posts
There goes the 4th amendment. James comey today says "No such thing as privacy in america" First amendment is getting attacked. Now just waiting for second amendment.

Why dont we have no laws for the rich and powerful
 
1 - 7 of 7 Posts
Top