It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by JBA2848
I am still wondering are these bullet holes? They don't seem to be for trim or any thing? They don't seem to be dented from hitting something?
edit on 24-6-2013 by JBA2848 because: (no reason given)
Originally posted by bbracken677
...I went back and looked again...I think I am seeing what you are referring to and I believe what you see as photoshopping I would attribute to the use of different f-stop exposures which result in major differences in perspective and exposure. The difference between an f-stop of 1.4 used with, say a 28mm lense vs an f-stop of 22 used with a telephoto lens can be remarkable. One will result in a foreshortened background and the other will achieve the opposite.
If you notice, the pictures that are of the same direction were taken at markedly different times of the day and lighting.
Originally posted by JBA2848
...Here is your tree. The Fence and arch is blocked by the van. And you have the light pole. The trees seem to have more leafs and hides the double windows. They seem to have stretched the picture in some way to fit the wide screen format. I used the height above the light pole as a marker and the distance left and right from the arch as a marker. And tried to get as much of the street as I could.
Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarketold The Huffington Post on Monday that the fatal crash of journalist Michael Hastings’ Mercedes C250 coupe last week is “consistent with a car cyber attack.”
“There is reason to believe that intelligence agencies for major powers” — including the United States — know how to remotely seize control of a car,” Clarke said.
Originally posted by WanDash
Also - from the other side (north-bound) of the street, you can view across to the houses on the south-bound side of the street, and confirm the house Water-hose Man was standing in front of...and the Psychic sign...
So Google drives Hyundai's...
Modern vehicles consist of between 30 and 100 embedded control units which are essentially small computers connected via CAN bus. [ CAN bus (for controller area network) is a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer. - donnafritz from Wikipedia] These cars were required by law to have a diagnostic port typically located under the steering wheel that allows mechanics to download diagnostic information and to perform software updates. In the first paper, the researchers from UCSD and the University of Washington showed that if they could touch the CAN bus to that diagnostic port, they could take over all of the functionality of the car that's controlled by software. And in an modern automobile, that's pretty much everything: the breaks are controlled by software because of anti-lock breaking,the acceleration is controlled by software because of cruise control, and those fancy cars that can park themselves, even the steering is under software control. The reaction to this first paper was somewhat muted, perhaps because the researchers had access to that diagnostic port, they were inside the car, and so already had physical access to the breaks, acceleration, and steering. They responded with a second paper, in which they showed a variety of ways of touching that CAN bus without physically touching the car. These attacks involved infecting the computers and repair shop, and then having that infection spread to the car through diagnostic port or hacking into the blue tooth system, or using the cell phone network to break into the telematics unit that's normally used to provide roadside assistance. The most ingenious attack, though used the stereo system in the car. The researchers were able to craft an electronic version of a song that played just fine in your household stereo system or on your personal computer. But when you put that on a CD and played it in the car CD player, it took over total control of your automobile. Yeah right – pretty scary, huh? These vulnerabilities arise because the cyber components of the interface of these cars are built from the same kinds of buddy components that are in your personal computers, and the control systems that are actually running the car have no notion that there can be an attacker sitting on the CAN bus. [...]
So commercial automobiles are not the only kind on non-traditional computer that are vulnerable to attack. We have to worry about all these other kinds of systems as well. Everything from SCADA systems that control the power grid and canal systems, to medical devices like the insulin pump shown on the slide, to computer peripherals, communication devices, and various kinds of vehicles. Researchers and/or attackers have shown that systems in each of these categories are vulnerable to attack. For example, for SCADA systems, the attacks on the Muruchi-Shire sewage plant in Australia -- say that ten times fast -- and the Ginot(sp?) canal system in France show that even supposedly air gap systems are vulnerable to remote attack, and that those attacks can cause physical damage while hiding the evidence of the attack from local monitoring.
Rest of lecture at
- See more at: www.tytnetwork.com...
I'm a computer programmer, I'm no conspiracy theorist or anything, but I think no item should be left unturned when investigating this. If the investigators don't think of potential hypothetical scenarios, they will not be able to investigate for it. Here is a scenario…
All modern cars now days run on code, the code or "software" in his car could have been altered to ensure that once over a particular speed, it auto accelerates at full speed while the breaks are disabled and the car ends up crashing at some point. if you pull the handbrake, you'll end up going sideways and crashing, if you don't do that, you'll end up hitting something at very high speed. Notice how the car exploded? That is not normal, and only "normal" for it to happen in the movies.
They should look for signs of accessing the computer in the car (usually underneath the drivers seat) either using forced entry, cutting bits and pieces out from underneath the car to access it, or by getting a new key from the car distributor (sales outlet where he brought his car). Since the gov can print copies of passports without issue, and produce the necessary points of ID, it's easy to get a copy of the key from the car dealer (criminals even do this, that's how they steal new model cars now). If they did this, it would leave a trace, if they used forced entry by cutting underneath the car, that would leave a trace.
Also, the computer program may still be on the cars computer, but could also been auto deleted as soon as a crash was detected (since the car knows when it has entered a crash, it can trigger many things to occur before the car and its contents are destroyed, this information would be available to the central computer). Now, the investigator would need to check for deleted files as well as securely deleted files (files that are deleted in a way to prevent undeleting). If the investigator doesn't know to check for these items, they will NEVER know or be able to isolate this possibility.
Remember, the gov always has methods of killing people that it has not yet disclosed to the public, it is for this reason they can get away with it without it looking suspicious. To equalize the playing field, we have to think about these possibilities and ensure they are part of the investigation. Otherwise, we'll only know in 70 years when its too late and the items are declassified.
The last point I wanted to make was, they probably had access to his computer just like they had access to the women's computer at CNN I think it was. If they saw a story coming, or a story that he was working on or was about to break, then they may have killed him for that. There is a reason Glenn Greenwald lives in Brazil, to stay the hell away from US law enforcement and their ability to harm him in any way. I think we need to determine if he was working on a big story, but if they had access to his computer, it would have been irrecoverably deleted most likely.
Do I believe this happened? Unlikely, but even if there is a 1% possibility, its worth investigating for. What do you guys think?
I'm mainly worried that the investigator is not going to know to look for these types of things, because they probably know very little about computers.
- See more at: www.tytnetwork.com...
Hastings died last week when his 2013 Mercedes C250 coupe collided with a tree in Los Angeles, California on the morning of June 18. He was reportedly traveling at a high rate of speed and failed to stop at a red light moments before the single-car crash. He was only 33. Speaking to Huffington Post this week, Clarke said that a cyberattack waged at the vehicle could have caused the fatal collision. "What has been revealed as a result of some research at universities is that it's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. "You can do some really highly destructive things now, through hacking a car, and it's not that hard." "So if there were a cyberattack on the car — and I'm not saying there was," Clarke continued, "I think whoever did it would probably get away with it." The Los Angeles Police Department said they don’t expect foul play was involved in the crash, but an investigation has been opened nonetheless. In an email reportedly sent by Hastings hours before the crash, he told colleagues that he thought he was the target of a federal investigation. “Hey [redacted], the Feds are interviewing my ‘close friends and associates,’” Hastings wrote 15 hours before the crash. Michael Hastings (Paul Morigi / Getty Images for The Guardian / AFP) Michael Hastings (Paul Morigi / Getty Images for The Guardian / AFP) “Also: I’m onto a big story, and need to go off the rada[r] for a bit,” he added. “All the best, and hope to see you all soon.”
Originally posted by bbracken677
Originally posted by wulff
Absolutely, I have wondered for years why automakers are so supposedly working on safer cars but still allow 10 to 20 gallons of gasoline to be hung on a car with two straps and a tank thickness like a coffee can!
Thickness of a coffee can? Obviously you have never attempted to drill into one. I have and it is nothing like a coffee can.
I just love it when people make claims and then turn and look at their rear-ends to see what just came out. [/quote
I was exaggerating to make a point, as a matter of fact YES, I have drilled into one (I added a return line for converting to carb car to EFI )
They still are way to thin, I have a new one in my garage to replace one that was 'oil-canning' and developed a leak.
My hobby is building high performance cars and I grew up around them!
The fuel tank is one area (other than the stupid 70's GM scam the media tried) are not protected like they should be, a girlfriend of mine had a car that she bought back east and didn't know the 2 thin straps that held the tank was rusted, she filled it up (for a change) and hit a bump, it fell to the pavement and ruptured spewing fuel across the road, she had the brains to stop and shut it off and unbelievably there was no fire (the heavy rain probably helped).
No, this is one thing that never seems to get the attention it deserves. STOCK GAS TANKS ARE DANGEROUS! This is why my 10 second Camaro has a fuel cell!edit on 26-6-2013 by wulff because: (no reason given)