DARPA PM Kathleen Fisher, High Assurance Systems

Listen to the first two minutes of this video to see how your car can be hacked into.  You will be surprised.


Listen further and you will hear her say both the Reaper and Predator drones suffer from virus’ in their
ground control systems.  That is an interesting way of saying that a back door is built into the software to allow these planes to be taken over or controlled remotely, by someone not sitting at the designated controls.  This is a feature and not a bug if this is designed into the system.  In fact, everywhere she says virus or the system was taken over, she means that a back door was built into the system.  Yes, maybe a virus has infected a system, but how did it get there.  Someone with intimate knowledge of the software integrated it, either as designed or as an add on.  She is trying to scare the public with the word virus, inferring we need protection from this when it was built in and the manufacturer knows about it.  In many cases the NSA or another agency is responsible.

The NSA is way ahead of the curve on remote access and can break into most systems due to manufacturers working in conjunction with them.  In other words, the NSA already has the codes to access remote controls, and take over systems.  You should already know this and if it comes as a surprise, you weren’t paying attention.  Yes they can do these things and they want you to think they need this power, now that we found out they have it.  The real question is, to we need protection from them and have they gone too far.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

OUR GREATER DESTINY

He who fails to assert his rights has none.

A.C.T.I.V.E. TI Awareness Coalition and Registry

Stalking and Electronic Assault Advocacy

proparanoid

Dealing with Privacy and Security in the face of the New World Order

Pinecone Utopia

Comforting the disturbed, disturbing the comfortable

Co-Creating Our Future on Planet Earth

Creating Unity from our human diversity.

Magnus Olsson TI

Brain Implant, Brainchip

Fight "Gang Stalking"

Expose illegal stalking by corrupt law enforcement personnel

Daniel J Towsey Autobiographies

POEMS - Adventures - True Stories

2015: Covert Assaults Satyagraha

Reports on Ongoing Covert War and Covert Directed Energy Weapons Testing in the US and Worldwide on US Citizens and Worldwide

JohnAllman.UK

Cet animal est très méchant. Quand on l'attaque, il se défend.

TI=HT

Targeted Individuals are Human Trafficked as Biomedical Slaves, with rights identical to yours.

Keep the Ethical Light Burning

Seeking justice for survivors of nonconsensual human experimentation

JONATHAN TURLEY

Res ipsa loquitur ("The thing itself speaks")

jenniferlayres

Liberty and Justice for All

Targeted Individuals Europe

Support and awareness regarding crimes against humanity in the western world

%d bloggers like this: