Hackers Remotely Kill a Jeep on the Highway: Live Demo!


For those who think that self driving cars and cars that rely on computers and Autonomy to pilot you to your destination without you being involved in the process beware you need to see this.

Its been a long time coming, and well known by many of us, for a long time that hackers could gain control of a car remotely via an exploit inside of the vehicles computer components. At first it was a isolated threat because of the limitations of Wifi and Bluetooth but now that cars are equip with GSM (cellphone) connections, it is possible to “reach out and crash someone” via a remote command.

Video demo at the bottom of this post!

As the number of connected devices explodes — from roughly 2 billion in 2010, the year of the Texas Auto Center incident, to an estimated 25 billion by 2020 — security researchers have repeatedly shown that most online devices can be hacked. Some have begun calling the “Internet of Things,” known by the abbreviation IOT, the “Internet of Targets.”

Security experts detect disturbing echoes from previous eras of rapid innovation, notably the 1990s when the World Wide Web connected hundreds of millions of people to a thrilling new online universe. Warnings about looming dangers went unheeded until viruses and cyberattacks became commonplace a few years later.

Widespread hacks on cars and other connected devices are destined to come, experts say, as they already have to nearly everything else online. It’s just a question of when the right hacking skills end up in the hands of people with sufficient motives.

Cars sold today are computers on wheels, with dozens of embedded chips running millions of lines of code. These vehicles can talk to the outside world through remote key systems, satellite radios, telematic control units, Bluetooth connections, dashboard Internet links and even wireless tire-pressure monitors. Security experts call these systems “attack surfaces,” meaning places where intrusions can start.

The next wave of attacks, researchers say, could include malicious software delivered over the Internet to disable your car’s engine, with the sender offering to revive your vehicle for a few hundred dollars. Or the new generation of wireless links between cars and their surroundings — designed to improve traffic flow and avert crashes — could enable drive-by hacks. Imagine a single infected WiFi beacon on a stretch of highway delivering a virus to every passing vehicle. STOP THE MADNESS PEOPLE!

SOURCE: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

The demo below!

Hackers Remotely Kill a Jeep on the Highway (5min)

Follow Up info

Senate Bill Seeks Standards For Cars’ Defenses From Hackers




Another AI pioneer warns smart computers could doom mankind

Leading artificial intelligence pioneer Stuart Russell has compared artificial intelligence to the development of nuclear weapons. He particularly fears what will happen if AI is used in weapons and military systems. Films such as Terminator have given what some believe is a glimpse of what could happen

Professor Russell, who is a researcher at the University of California in Berkeley and the Centre for the study of Existential Risk at Cambridge University, compared the development of AI to the work that was done to develop nuclear weapons.

In April Professor Russell raised concerns at a United Nations meeting in Geneva over the dangers of putting military drones and weapons under the control of AI systems.

~ Stuart Russell

‘To those who say, well, we may never get to human-level or super intelligent AI, I would reply: It’s like driving straight toward a cliff and saying, ‘Let’s hope I run out of gas soon!’

‘Here’s what Leo Szilard wrote in 1939 after demonstrating a [nuclear] chain reaction: ‘We switched everything off and went home. That night, there was very little doubt in my mind that the world was headed for grief.’

‘How will we ensure that the rise of the machines is entirely under human control? And what will the world be like if truly intelligent computers come to coexist with humankind?’

Professor Russell said computer scientists needed to modify the goals of their research to ensure human values and objectives remain central to the development of AI technology.

See the full article here: http://www.dailymail.co.uk/sciencetech/article-3165356/Artificial-Intelligence-dangerous-NUCLEAR-WEAPONS-AI-pioneer-warns-smart-computers-doom-mankind.html

TheDataBlitz previous reporting in depth (see also)

https://thedatablitz.wordpress.com/2015/04/19/important-people-warning-about-ai-artificial-intelligence/ (April 19 2015)


Stuart Russell Credentials and Information

Professor of Computer Science and Smith-Zadeh Professor in Engineering, University of California, Berkeley
Adjunct Professor of Neurological Surgery, University of California, San Francisco

SOURCE: https://www.cs.berkeley.edu/~russell/

Professor Russell’s Main website

Artificial Intelligence: A Modern Approach


Science Fiction is ever so quickly becoming Science Fact! (sub story below) right from the DOD!

http://science.dodlive.mil/2013/06/25/artificial-intelligence-in-mental-healthcare/ (be sure to read this!)

TheDataBlitz; reporting real, cutting edge, relevant events, and news that matters.

NO Place to HIDE: ARGUS IS / Kestrel Technologies

Image above is the actual seal of this organization!

In the near future it will become normal for local and federal governments to have these kinds of capabilities ,all to keep you safe.

Total Information Awareness (TIA) is what they need in order to do it. Dose that sound safe.

TIA was a program of the US Information Awareness Office. It was operated from February until May 2003, before being renamed as the Terrorism Information Awareness Program.

Based on the concept of predictive policing, TIA aimed to gather detailed information about individuals in order to anticipate and prevent crimes before they are committed. As part of efforts to win the War on Terror, the program searched for all sorts of personal information in the hunt for terrorists around the globe. According to Senator Ron Wyden (D-Ore.), TIA was the “biggest surveillance program in the history of the United States 

SOURCE: https://en.wikipedia.org/wiki/Total_Information_Awareness


ARGIS – IS (1.8 gigapixel camera World’s highest resolution video surveillance platform)

The ARGUS-IS, or the Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System, is a Defense Advanced Research Projects Agency (DARPA) project contracted to BAE Systems.

It delivers unprecedented situational awareness using onboard, embedded image processing algorithms.

This system is so advanced that it allows for one camera to provide such detailed video that users can collect “pattern-of-life” data and track individual people inside the footage anywhere within the field of regard.

This is accomplished by utilizing air assets (manned aircraft, drones, blimps, aerostats) to persistently loiter and record video of an area 36 square miles in diameter with enough detail to track individual pedestrians, vehicles or other objects of interest as long as the air asset remains circling above

ARGUS-IS has been classified as a Wide Area Persistent Surveillance system .

(Basicly DVR a whole population from above indefinitly for future review. Hmm where was so and so on july 4th 2015, say at about 3:45pm. Sounds safe dosent it…….)

Other WAPS systems are already being used for domestic law enforcement across the USA including Persistent Surveillance in Dayton, Ohio, Vigilant Stare as well as Pixia’s Hiper Stare. While the government has not admitted to deploying ARGUS over the USA, it has shown video in which ARGUS was used within the United States.

Here is a near official video of this technology at work


* Next We have another technology know as “Kestrel” *


Kestrel is another wide-area persistent surveillance system used on aerostats at U.S. forward operating bases in Afghanistan to monitor the surrounding areas.

The system is equipped with electro-optical and infrared cameras, providing day/night force protection and overwatch to troops.

Kestrel employs six cameras housed in a gimbal, providing a 360-degree panoramic view of “a city-sized area” in medium resolution.

The system allows operators to track multiple suspects at once and can automatically monitor user-designated zones or Geo Fences. Kestrel transmits imagery to the user in real time and can also record up to 30 days of events. Of cource the duration of time can easly be expanded to indefinitly with any of these systems if needed, with more storage space

SOURCE: https://en.wikipedia.org/wiki/Kestrel_%28surveillance_system%29


Here is a demonstration of this technology at play.

Here is an Operator Interface view of tis system


(from, TheDataBlitz)

You already live in 1984 see….lol!

Now; let get this information to others and put a stop to this kind of excepted surveillance by talking with others and getting active in our local communities to interface with the branches of government that accept this approach and make peaceful positive change through debate and reasonable discussions.





The “Hacking Team” Data Breach in full Spectrum / Get the Facts about this major event here.

Last year, a hacker who only went by the name “PhineasFisher” hacked the controversial surveillance tech company Gamma International, a British-German surveillance company that sells the spyware software FinFisher. He then went on to leak more than 40GB of internal data from the company, which has been long criticized for selling to repressive governments.

Once Again (he or she) has breached another major player of the surveillance, and hacking industries plaguing the world today. Be sure to watch the short promotional video for this company at the bottom of this post. (1m33sec)

The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, has been seriously hacked.

* Someone has made 400GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download in full below…..;)

Torrent Links:
Source Codes:

The repository location included signing keys and core components of spying utilities for different operating systems (Linux, iOS, OS X, Windows, Android, BlackBerry, Symbian).

Hacking Team’s business is pretty much over.

Magnet download link available in comment section of this page

Here are the big players in this industry of oppressive surveillance

Hacking Team

Hacking Team describes its lawful interception products as “offensive technology” and has been called into question over deliveries to Morocco and the United Arab Emirates. The company’s “Remote Control System,” called DaVinci, is able, it says, to break encryption on emails, files and Internet telephony protocols…. Read More

Blue Coat

American Company Blue Coat, specialized in online security, is best known for its Internet censorship equipment. This equipment also allows for the supervision of journalists, netizens and their sources. Its censorship devices use Deep Packet Inspection, a technology employed by many western Internet Service Providers to manage network traffic and suppress unwanted connections…. Read More


Trovicor is one of the largest providers of lawful interception equipment worldwide, claiming to equip more than 100 countries. The company has been questioned, in particular during a hearing before the European Parliament Subcommittee on Human Rights in 2010, with respect to engagement in Iran, but also in Bahrain and Syria, where torture and imprisonment of journalists and dissidents occurs on a regular basis, helped by Western technology.

Read More


 Amesys sold its EAGLE spyware to Libya while Muammar Gaddafi was still in power. It was used to spy on journalists and human rights activists there. As a result, the company is now being sued in France by the International Federation for Human Rights (FIDH) for complicity in torture. The lawsuit is still pending…. Read More

Gamma International

Gamma International offers advanced spyware, which has repeatedly been discovered in countries who mistreat journalists, like Bahrain and the United Arab Emirates. The Finfisher Technology sold by Gamma International is able to read encrypted files, emails and listen in to voice over IP calls. Among the targeted was Ala’a Shehabi, a journalist, university lecturer and activist from Bahrain, now living in London…. Read More

Get an even more in-depth view of this information in this link below


They’ve been selling RCS, exploit kits and more shady darkweb tools exclusively to governments, and have done some pretty shady deals – including selling to Sudan who are basically committing genocide and Saudi Arabia. Reports Without Borders lists them as an enemy of the Internet

Impressive Coverage of this, By Cora Currier and Morgan Marquis-Boire at “The Intercept”


We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”

To sum things up its, an Era of the digital mercenaries!

Hacking Team Commercial: Galileo RCS “the hacking suite for governmental interception”

BlitZzzzz………….. (`~’)






SIPRI Infograph compares Nuclear Forces World Wide

(Stockholm International Peace Research Institute) SIPRI

Note: The five nuclear powers and members of the UN Security Council — US, Russia, China, Britain and France — along with Germany, are in ongoing talks with Iran to persuade the Islamic Republic not to develop nuclear weapons in exchange for the lifting of international sanctions.

The SIPRI Yearbook is known worldwide as an authoritative and independent source for politicians, diplomats, journalists, scholars, students and citizens on armaments, disarmament and international security. It provides an overview of developments in international security, weapons and technology, military expenditure, the arms trade and arms production, and armed conflicts, along with efforts to control conventional, nuclear, chemical and biological weapons.

The first edition of the SIPRI Yearbook was released in 1969, with the aim of producing ‘a factual and balanced account of a controversial subject-the arms race and attempts to stop it’. The 46 editions of the Yearbook published so far have gathered important data on world military spending, the arms trade and nuclear forces, among other topics.

Over the years these data sets have been refined and new data sets added, thereby improving the accuracy of key source materials. Together with SIPRI’s rigorous editorial standards, this continual qualitative improvement in the data makes the SIPRI Yearbook a ‘unique and indispensable’ reference work.

The SIPRI Yearbook is published in print and online by Oxford University Press (OUP).


Confirmation of image above here: http://www.sipri.org/media/pressreleases/2015/yb-june-2015

more: http://www.sipri.org/media/newsletter/essay/june-15-NPT

Artificial intelligence Information and how it effects you.

AI, senses will be better than Humans: Zuckerberg reveals Facebook’s AI, VR and Internet.org plans

Zuck says Facebook’s in the midst of building AI systems “that are better than humans at our primary senses.” They’re designing one to be able to detect everything in an image or video: people, objects, animals, backgrounds and locations, among others.

The CEO thinks that VR glasses would be part of our every day lives in time, giving us the ability to share “experiences with those we love in completely immersive and new ways.” He also revealed that the company is working on drones, satellites and even lasers to expand its Internet.org project.

In a Q&A on his profile today, Mark Zuckerberg explained how he and his team are preparing Facebook for the future. In it, he revealed that he believes the ultimate communication technology will allow us to send thoughts to each other. “You’ll just be able to think of something and your friends will immediately be able to experience it too if you’d like,” One World mind, Toltec.

STOP THE MADNESS: Commit ONLINE Suicide! Sounds as crazy as these technologies.


Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete all your energy sucking social-networking profiles, kill your fake virtual friends, and completely do away with your Web2.0 alterego.

Meet your Real Neighbors again!

Full article here: http://www.engadget.com/2015/07/01/zuckerberg-facebook-qna/

Full article 2: http://bits.blogs.nytimes.com/2015/06/30/zuckerberg-takes-questions-in-facebook-session-marred-by-tech-troubles/?_r=0

https://research.facebook.com/ai (Main Page for this Technology.) ……..have a nice day and Happy 4th of July.


Take a Look:Google’s Artifical Neural Network Thinks Art

Researchers at Google posted some insight into what’s going on with their AI research for image classification and speech recognition, including artificial neural networks (ANNs). While it’s still difficult to pinpoint what’s going to work and what isn’t, there’s an intriguing byproduct—artistic imagery that Google calls “Inceptionism.”

In theory, ANNs learn much like human neural networks do, by sending messages to each other as they learn to process data. The Google post about the ANN explains: “The network typically consists of 10-30 stacked layers of artificial neurons. Each image is fed into the input layer, which then talks to the next layer, until eventually the ‘output’ layer is reached. The network’s ‘answer’ comes from this final output layer.” The artificial neural network is shown literally millions of examples, and the parameters are adjusted until correct classifications are reached.

Inceptionism noun (dictionary.com)

1: beginning; start; commencement.

2: (in science fiction) the act of instilling an idea into someone’s mind by entering his or her dreams.

Merriam ( http://www.merriam-webster.com/dictionary/inception )

1: the time at which something begins

2:  an act, process, or instance of beginning :  commencement

SOURCE: (1) http://www.techwell.com/2015/06/take-look-google-s-artificial-neural-network-thinks-art

(2) http://googleresearch.blogspot.com/2015/06/inceptionism-going-deeper-into-neural.html

Science Fiction has become Fact :/>……

Protect your self from these services……

Share this data with everyone……

Self-driving cars may have to be programmed to kill you

“There is a runaway trolley barrelling down the railway tracks. Ahead, on the tracks, there are five people tied up and unable to move. The trolley is headed straight for them. You are standing some distance off in the train yard, next to a lever. If you pull this lever, the trolley will switch to a different set of tracks. However, you notice that there is one person on the side track. You have two options: 1. Do nothing, and the trolley kills the five people on the main track or 2. Pull the lever, diverting the trolley onto the side track where it will kill one person. Which is the correct choice?”

(Note from TDB)






SOURCE: http://www.independent.co.uk/life-style/gadgets-and-tech/news/selfdriving-cars-may-have-to-be-programmed-to-kill-you-10326472.html