WHO WAS MICHAEL HASTINGS?
Michael Hastings (33) was an American investigative journalist who worked for the Rolling Stone and BuzzFeed; he exhibited qualities of an American patriot by combatting corruption and providing unbias research into his investigations.
In 2005, Hastings covered the Iraq War while stationed in the NATO-Green Zones within Baghdad. His fiancée, a spokesperson for the National Democratic Institute, Andrea Parhamovich, was killed on January 17, 2007, during an ambush on her convoy.
Hastings became a vocal critic of the Obama administration’s “war on journalists.” His 2010 story for the Rolling Stone profiling General Stanley McChrystal inevitably forced the General’s resignation, and Hastings developed into a household name. He married journalist and former speechwriter, Elise Jordan, in 2011.
2013 became a year of progression for Hastings, but not without massive pressure from the outside world. His opposition to the Democratic Party and President Obama’s surveillance (big brother) network marked a target on his back. Hastings’ last article “Why Democrats Love To Spy On Americans” provided context into the Obama administrations spying capabilities and the loopholes used to enforce them. An excerpt from the article states:
“Unsurprisingly, the White House has dug in, calling their North Korea-esque tools ‘essential’ to stop terrorism and loathe to give up the political edge they’ve seized for Democrats on national security issues under Obama’s leadership. The AP spying scandal — which the administration attempted to downplay at the time, even appointing Eric Holder to lead his own investigation into himself —was one of the unexpected consequences of one of two leak investigations that Obama ordered during the 2012 campaign.”
THE CASE SUMMARY
THE WAR ON JOURNALISM President Obama’s administration had a distaste for negative press and combated against it by refusing interview requests with conservative-based networks like Fox News. The administration regularly invaded the privacy of journalists and media groups.
MONDAY: MAY 13, 2013
The Associated Press released a statement that the United States Department of Justice subpoenaed phone records for twenty of their journalists during two months in 2012. This stemmed from a May 7, 2012 article published by the Associated Press about a classified C.I.A. operation.
FRIDAY: MAY 17, 2013
The Washington Post reported that the United States Department of Justice had monitored Fox News reporter James Rosen’s digital records, including phone calls and emails. Attorney General Eric Holder, under the direction of President Obama in 2009, had issued a warrant on all files Rosen possessed in-relation to a leak of information orchestrated by state Department contractor Stephen Jin-Woo Kim. Stephen Jin-Woo Kim told Rosen for one of his 2009 news stories classified knowledge of a nuclear bomb test North Korea had planned. In the warrants issued, Rosen was listed as a possible co-conspirator under the Espionage Act of 1917 by the Justice Department.
In 2014, Stephen Jin-Woo Kim pleaded guilty to a single felony count of disclosing national defense information to an unauthorized person. Attorney General Eric Holder and the Obama administration were hard-pressed to explain their actions and the consequences of challenging the constitutional first amendment of the United States.
The F.B.I. opened a case on Sharyl Attkisson, an Emmy Award-winning investigative reporter. The F.B.I. monitored Attkisson and contacted her employer, CBS News, about her online interactions via her personal/work computer.
According to CBS News: “Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012…This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion.”
Attkisson’s publicly stated she was targeted for her reporting on the “Fast and Furious” operation conducted by the A.T.F. (Bureau of Alcohol, Tobacco, Firearms, and Explosives). During the operation, license gun dealers sold weapons illegally to Mexican cartels. The A.T.F. lost track of the firearms, and two of the guns ended up at the scene of slain Border Patrol agent Brian Terry.
TUESDAY: JUNE 18, 2013
Michael Hastings demonstrated all attributes of a dedicated investigator on the verge of the ultimate case before his fiery death involving his Mercedes C250 coupe on a Los Angeles street at 4:25 a.m. Witnesses said that sparks and flames burst from the car shortly before it crashed into a palm tree. Video from a nearby security camera confirmed the statement.
The Los Angeles Coroner’s Office performed Hastings’ autopsy, and two days after his death, the L.A.P.D. released a statement that Hastings’ crash was the result of an accident. Hastings had received a threatening voicemail before his death. On the day of his death, he sent an email to coworkers notifying them of an ongoing investigation into his life by the F.B.I.
Conspiracy blogs and radio hosts all posed the same question: Hastings was investigating C.I.A. Director Brennan before his death, what did he have on Brennan?
WEDNESDAY: JUNE 19, 2013
Wikileaks added to the conspiracy surrounding Michael’s death with his tweet.
THURSDAY: JUNE 20, 2013
The F.B.I. released a statement on the investigation of Michael Hastings (something they rarely submit to).
MONDAY: JUNE 24, 2013
Richard Clarke, a former cybersecurity expert under the George W. Bush administration, didn’t see Michael’s crash as a regular mishap. He stated the auto-wreckage was “consistent with a cyber attack,” presenting a theory that the Government could be the culprit.
Speaking to Huffington Post, Clarke said that a cyberattack waged at the vehicle could have caused the fatal collision.:
TUESDAY: MARCH 7, 2017
The release of WikiLeaks “Vault7” confirmed the lengths of the Government’s surveillance program and the CIA’s systematic approach to cyber warfare. The “Vault7” leak is a blueprint for the hacking capabilities of the Central Intelligence Agency (including the ability to override a car’s computer system).
1. Harpy Eagle –
- Project Protocol for infiltration of the Apple Airport Extreme & Airport Time Capsule.
- Allows remote installation of rootkit via the flash storage.
2. Sparrowhawk –
- Receives and processes keystrokes from personal computers, and assembles them in a merged format across Unix systems.
- Gain remote access to Samsung Smart TV’S.
- Turn on or leave WiFi turned on in Fake-Off mode.
- WiFi interface is disabled in Fake-Off mode.
- In Fake-Off mode, the Samsung and SmartHub logos are not shown.
- Activate microphone and video capability.
- CIA hackers have penetrated antivirus programs such as AVG.
- AVG stocks have been at a constant freefall since the news.
- Allows access to hack and control your phone.
From the Wikileaks description:
“These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.”
|Weaponized/Delivered Name||Proof-of-Concept Name||Contract/Partner||Description||Affected Devices||Type|
|B12||SwampMonkey||Fangtooth||System->Root Priv Used in conjunction with NightMonkey||Priv|
|BaronSamedi||Anglerfish||remote access (libxml2)||Remote access|
And let’s not forget to mention the ability to hack your car.
– Press Graye