• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
  • Donate
  • Start
    • Contact
    • We Need Your Support (Donate)
    • Newsletter Signup
      • Daily
      • Weekly
    • Into the Storm (Hosted by Justin Deschamps)
    • Follow Our Social Media
    • Best Telegram Channels & Groups
    • Discernment 101
    • Media Archive (Shows, Videos, Presentations)
    • Where’s The Hope
  • Browse
    • Editor’s Top Content (Start Here)
    • Best Categories
      • Consciousness
      • Conspiracy
      • Disclosure
      • Extraterrestrials
      • History
      • Health
      • NWO Deep State
      • Philosophy
      • Occult
      • Self Empowerment
      • Spirituality
    • By Author
      • Justin Deschamps
        • Articles
        • Into The Storm (on EdgeofWonder.TV)
        • Awarewolf Radio (Podcast)
      • Adam AstroYogi Sanchez
      • Amber Wheeler
      • Barbara H Whitfield RT and Charles L Whitfield MD
      • Chandra Loveguard
      • Conscious Optimist
      • Marko De Francis
      • Lance Schuttler
        • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
      • Ryan Delarme
      • Will Justice
  • Products
    • EMF Harmonized (Cell Phone, Wi-Fi, Radiation Protection
    • Earth Science & Energy
    • Free Energy
    • AI and Transhumanism
    • Space
    • Nikola Tesla
    • ET
      • Ancient Technology
      • Crop Circles
      • UFOs
    • Conspiracy
      • Anti NWO Deep State
      • Domestic Spying
      • Freemasonry
      • Law & Legal Corruption
      • Mass Mind Control
      • NWO Conspiracy
      • Police State and Censorship
      • Propaganda
      • Snowden Conspiracy
      • Social Engineering
    • Misc.
      • Council on Foreign Relations
      • Music Industry
      • Paranormal
      • Pedagate and Pedophilia
      • Q Anon
      • Secret Space Program
      • White Hat
  • Sign Up
  • Election Fraud
  • Partners
    • EMF Harmonized
    • Ascent Nutrition

Stillness in the Storm

An Agent for Consciousness Evolution

  • Our Story
  • Support Us
  • Contact
  •  Monday, February 2, 2026
  • Store
  • Our Social
    • BitChute
    • CloutHub
    • Gab
    • Gab TV
    • Gettr
    • MeWe
      • MeWe Group
    • Minds
    • Rumble
    • SubscribeStar
    • Telegram
      • Best Telegram Channels and Groups
    • Twitter (Justin Duchamps)
    • YouTube

Conspiracy Fact: Cars Already on the Road Can Be Hacked and Taken over, Used to Kill Millions, According to Expert

Monday, February 4, 2019 By Stillness in the Storm Leave a Comment

Spread the love

(Michelle Simmons) Your laptops, computers, smartphones, or smart appliances are not the only things that are susceptible to hacking. Modern cars could be remotely hacked by terrorists and turned into lethal weapons, a computer scientist has warned.

Related Largest Cache Of Hacked Data In History Discovered: Over 770 Million Email Addresses, 21 Million Passwords

Source – Natural News

by Michelle Simmons, January 5th, 2019

The warning was made by Justin Cappos from New York University. Cappos has stated that cyber criminals working for enemy states could hack and remotely control any car built after 2005 to turn them into weapons that could kill millions of people. Even some cars that were manufactured as far back as 2000 could be susceptible to hacking.

“Many of our enemies are nuclear powers, but any nation with the ability to launch a cyberstrike could kill millions of civilians by hacking cars. It’s daunting,” Cappos expressed.

Cappos explained that once hackers are connected to the network, they can communicate with any device and can send messages to the brakes to stop and turn off the power steering. He added that car components would not be able to identify where the messages were coming from and would not be able to tell if these messages were true. (Related: Police could take over your self-driving car.)

He told The Times, as cited by The Daily Mail, that hackers may already be creating accidents now, with the authorities being unaware. With this warning, he urged the government ministers to update their security and to implement laws that will require car manufacturers to issue software updates. Furthermore, unless car manufacturers fix the problem in the next five years, these attacks are inevitable. He also added that this issue should be treated as an urgent matter because the lives of millions of people are at risk.

“If there was a war or escalation with a country with strong cybercapability, I would be very afraid of hacking of vehicles,” he said.

Buy Book Targeted Individuals, Mind Control, Directed Energy Weapons: Untouched Torture, Misshape Human Body, Nano Psychotronics Weapons

The car flaw that turns off its safety features

About four years ago, researchers demonstrated they could hack a moving Jeep on a highway by delivering false messages to its internal network, enabling them to make the vehicle turn sharply while it was moving down a country road or allow the researchers to speed up or remotely step on the vehicle’s brakes. In fact, a new technique on hacking cars has been revealed, according to a report by Wired.com. Researchers from security firm Trend Micro, along with researchers at LinkLayer Labs and the Polytechnic University of Milan, discovered that there is an underlying security issue in the Controller Area Network (CAN) protocol that is used by car components to communicate and deliver messages to each other within the network of the car. This network would enable a hacker who got in the car internals to turn off key automated components, such as the safety features of cars.

Federico Maggi, from Trend Micro and one of the authors of the research, said that the air bags, anti-lock brakes, or the locks of the doors could be disabled by hackers. He also added that the hacked vehicle could be stolen.

“It’s practically impossible to detect at the moment with current technology,” he said.

The researchers also explained that it is a “denial of service” attack that shuts down the components and that this hacking technique is not a fully remote attack, as the hacker needs to have initial access to the network of the car, like through another vulnerability in its infotainment system’s Wi-Fi or cellular connection or through an insecure gadget plugged into the on-board diagnostic (OBD) port under the car’s dashboard.

“It doesn’t depend on a specific vulnerability in some piece of software. It’s a vulnerability in the design of the CAN standard itself,” Maggi explained.

Buy Book Tricks of an IRS Cheat And Other Scandals You Should Know About Uncle Sam and Your Money

Stillness in the Storm Editor: Why did we post this?

Researchers and insiders have suggested for years that technology we use today has backdoors that hackers and intelligence agents can use for various purposes. Edward Snowden stands as one of the vindicated sources in this matter, as his testimony unquestionably confirmed that the NSA has the power to spy on people through their webcams. The question becomes, where does this back-door-access problem end? The preceding article alerts the public to one such example of hacking via car computer processors. Allegedly, several prominent figures, such as Michael Hastings, were alleged to have been killed by a high-level hack on his vehicle. This information is important because it alerts the public to the fact a breach of trust has occurred on the part of the government with the people, which is vitally important to comprehend so as to develop the urge for freedom and the seeking of justice.

– Justin

Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.


Stillness in the Storm Editor’s note: Did you find a spelling error or grammar mistake? Send an email to [email protected], with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading.

Source:

http://www.naturalnews.com/2019-01-05-cars-already-on-the-road-can-be-hacked.html

Filed Under: Conspiracy, Corruption, News, NWO Deep State, Uncategorized Tagged With: cyber security, cyber-capability, deep state, hidden technology, human technology, natural news, NWO

Notices and Disclaimers

We need $2000 per month to pay our costs. Help us one time or recurring. (DONATE HERE)

To sign up for RSS updates, paste this link (https://stillnessinthestorm.com/feed/) into the search field of your preferred RSS Reader or Service (such as Feedly or gReader).

Subscribe to Stillness in the Storm Newsletter

“It is the mark of an educated mind to be able to entertain a thought without accepting it.” – Aristotle

This website is supported by readers like you.

If you find our work of value, consider making a donation. 

Stillness in the Storm DISCLAIMER: All articles, videos, statements, claims, views and opinions that appear anywhere on this site, whether stated as theories or absolute facts, are always presented by Stillness in the Storm as unverified—and should be personally fact checked and discerned by you, the reader. Any opinions or statements herein presented are not necessarily promoted, endorsed, or agreed to by Stillness, those who work with Stillness, or those who read Stillness. Any belief or conclusion gleaned from content on this site is solely the responsibility of you the reader to substantiate, fact check, and no harm comes to you or those around you. And any actions taken by those who read material on this site is solely the responsibility of the acting party. You are encouraged to think carefully and do your own research. Nothing on this site is meant to be believed without question or personal appraisal.

Content Disclaimer: All content on this site marked with “source – [enter website name and url]” is not owned by Stillness in the Storm. All content on this site that is not originally written, created, or posted as original, is owned by the original content creators, who retain exclusive jurisdiction of all intellectual property rights. Any copyrighted material on this site was shared in good faith, under fair use or creative commons. Any request to remove copyrighted material will be honored, provided proof of ownership is rendered. Send takedown requests to [email protected].

What is our mission? Why do we post what we do?

Our mission here is to curate (share) articles and information that we feel is important for the evolution of consciousness. Most of that information is written or produced by other people and organizations, which means it does not represent our views or opinions as managing staff of Stillness in the Storm. Some of the content is written by one of our writers and is clearly marked accordingly. Just because we share a CNN story that speaks badly about the President doesn’t mean we’re promoting anti-POTUS views. We’re reporting on the fact as it was reported, and that this event is important for us to know so we can better contend with the challenges of gaining freedom and prosperity. Similarly, just because we share a pro/anti-[insert issue or topic] content, such as a pro-second amendment piece or an anti-military video doesn’t mean we endorse what is said. Again, information is shared on this site for the purpose of evolving consciousness. In our opinion, consciousness evolves through the process of accumulating knowledge of the truth and contemplating that knowledge to distill wisdom and improve life by discovering and incorporating holistic values. Thus, sharing information from many different sources, with many different perspectives is the best way to maximize evolution. What’s more, the mastery of mind and discernment doesn’t occur in a vacuum, it is much like the immune system, it needs regular exposure to new things to stay healthy and strong. If you have any questions as to our mission or methods please reach out to us at [email protected].

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Search Our Archives

FUNDRAISER!

Latest Videos

Guarding Against Bio Tech and EMF - Fix The World Project | Just In Stillness

From around the web

News “they” don’t want you to see

Newsletter

You can unsubscribe anytime. For more details, review our Privacy Policy.

Thank you!

You have successfully joined our subscriber list.

.

We Need Your Support

Support our work!

Weekly Newsletter Sign UP

Only want to see emails once a week? Sign up for the Weekly Newsletter here: SIGN UP. (Make sure you send an email to [email protected] to confirm the change or it won’t work).

Latest Videos

Footer

  • Menus
  • Internship Program
  • RSS
  • Social Media
  • Media
  • Privacy Policy

Copyright © 2026 · Privacy Policy · Log in · Built by

This website wouldn't be the same without the ethical web hosting provided by Modern Masters. Modern Masters ethically serves small businesses in metaphysical, paranormal, healing, spirituality, homesteading, acupuncture and other related fields. Get the perfect website for your sacred work at Modern Masters.