The tree of liberty must be refreshed…

Hillary Clinton will not be our next President.

clinton-huma

First came the email scandal where Hillary personally decided to use here own homebrewed server to run clintonmail.com . This allowed her to hide her emails as secretary of state from being recorded as government communications and for making her accountable for her actions. She allowed our governments secrets to be taken out of their “secure” email system and either be printed or sent to her aids who then would “declassify them by removing markings and transfer them to google, Yahoo or Clinton mail. This in and of itself was a crime as knowingly removing 1 secret document is grounds for conviction and prison as many of our military members know.
Once discovered John Podesta, Cheryl Mills and others conspired to “dump them” in order to not to produce them under subpoena. They went to great lengths to delete up to 32,000 emails that Hillary said only covered Yoga and family. They went as far as to use “BleachBit” to erase the hard drives and hammers to destroy the devices. Hillary repeatedly lied repeatedly that she only wanted to use 1 device for convenience instead of a “Secure” communication device. It turns out she had more than 13 devices. More lies. And just before James Comey told us how guilty Hillary was in the email scandal, Bill swooped into Phoenix AZ. on a 120 degree day to “bump into Loretta Lynch in her private jet. They met for over half an hour discussing “family”. Well I am sure the only family Bill discussed was his wife and how he could keep her out of jail. The next day Hillary had her “FBI meeting” where immunity was handed out and Hillary conveniently “Forgot” most of the answers to the questions asked.

Then I sat and watched James Comey beautifully lay out a case against Hillary on how she misled the government. How she illegally took secret items out of their secure areas. Ignored marking on classified documents that she said she never had. It was a complete description of a person going to trial and then jail. Then he said “but” and let her off the hook. That was when America knew something was rotten in Denmark.

Then it was learned that through the Clinton Foundation Bill and Hillary had become multi millionaires in short order by running a charity. Hillary and Bill would collect from $300,000 up to several millions for meeting with and talking to people. This is now been exposed as a potentially criminal “Pay to Play” organization that included selling off over 10% of Americas Uranium reserves to Russia that Hillary’s State dept had to approve.

The Clinton’s collected Millions of dollars from foreign countries that have not always been friendly to the United States including many that were involved in executing the 9/11 attacks and with terrible human rights records which include the killing of homosexuals and women who are treated as property. The Clinton’s also made millions for them and their friends in smuggling weapons to the middle east eventually making their way to ISIS to be used against Americans, Iraqis and other nations. I could go on for pages covering the unethical and illegal acts the Clinton’s and their Cabal committed.

Now most of you have been following the Wikileaks that have been going on against the Democrats. It started first with the DNC and led to the firing of Debbie Wasserman – Schultz and now Donna Brazil who lied about fixing the election for Hillary Clinton.

Then they went after John Podesta Hillary Clinton’s director and long time Clinton General who runs her organization.His leaked emails have exposed the underbelly of the Clinton organization. Out of ignorance the Democrats blamed the Russians of hacking the DNC, Podesta and the other systems. They also stupidly tried to say that the Russians were working with Donald Trump. This was not true.

Wikileaks has also exposed the Justice department for unethical behavior including the bribery of a senior FBI agent by another Clintonista Terry Mcauliff the governor of Virginia. He funded the agents wife (Jill McAbe) by donating over $500,000 to her Senate campaign even though she had no political background. First it turned out that Clinton raised over a million dollars for the PAC that funded the donation. If not a bribe it was quite a conflict as Agent McBabe was working on the Clinton foundation case and told low level agents to “Stand Down” If not a crime it is a clear conflict of interest.

Then we come to the “Weiner factor” Andrew Weiner and his wife (now separated) Huma who is Clinton’s closest aid became the focus of the investigation that has now been reopened.

Tonight a video was posted that brings it all together. A organization of “Honest” United States Intelligence officers appear to be taking credit for providing Wikileaks with all their data and hacked emails. My guess is that they had all this info at their fingertips but were blocked from using it by the Clinton’s and Attorney General Loretta Lynch.

In it it is stated that we cannot afford this criminality to continue and America cannot afford to have Hillary as President. Evidently over the next few days they say evidence will be presented that will prove the criminality of not just the Clinton’s, but all those associate in their criminal activities up to and including the President.

Am I skeptical? Yes. But we need to see what happens next.If my suspicions are true and my Pirate senses are correct the criminals in D.C. better watch out. The good guys are back and it is going to get ugly.

This Thomas Jefferson quote came to mind just now:

The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants. Thomas Jefferson

The time is now, please watch the video below.

Stand up for what is right.

 

 

Advertisements

Forget emails, FBI now may have Clinton Abedin Text messages

10/31/2016

If recent news is correct and the 650,000 emails on Anthony Weiners computer is an ongoing backup of wife Huma’s phone then there may be gold in them there hills.

According to Anthony Weiner the 650,000 emails on his computer came from backups of Humas phone there may be more evidence there in addition to the emails.

Unless they are deleted or told not to backup all text messages are backed up. Think about it. IF Hillary used text as most of us do, we may be sitting on a treasure trove of TEXT messages from and to Hillary Clinton and her top advisers.

The Piratearian

Must attribute if resent or retweeted

hillary-clinton-email-un-20150310

Copywrite 10/31/2016

 

Has Hillary walked into a FBI trap?

The Piratearian Updated 11/2/2016

This week is about to get very bad for Hillary Clinton.
James Comey has laid a trap and the democrats have walked right into it.

http://www.realclearpolitics.com/video/2016/11/02/fbi_sources_tell_fox_news_indictment_likely_in_clinton_foundation_case.html

 

Last Friday James Comey dropped a bomb that the FBI was reopening its investigation in the Clinton email scandal based on new evidence discovered in a “unrelated” case.
This “unrelated” case ended up being very related. The case he spoke of was the FBI investigation of Anthony Weiner husband of Huma Abedin.

clinton-huma

FBI forensic evidence was found on a laptop shared by Weiner and Abedin. This led to the discovery of “10’s of thousands” of Abedin work related emails.

Ms. Abedin was Hillary’s closest adviser.
Routinely Hillary would forward to Huma emails to print because Hillary could not figure out how to print and did not like to work off of a computer. This will show that Hillary removed multiple “top secret” and “Classified” emails from a secure system. This is a crime. Ms. Abedin it is rumored also worked with Cheryl Mills to reclassify emails or strip them of their markings which is another crime. Huma also signed documents upon leaving the state dept that she had surrendered all documents related to her service.
Ms. Abedin and Mills were also Clinton’s interface with the Clinton foundation and would decide who got favors or to meet with Clinton. It has been shown that preference was given to Clinton Foundation Donors who had donated large sums of cash to the foundation or paid Bill, Hillary and Chelsea obscene amounts of cash for speaking engagements or “pay to play”. This also included foreign governments and corporations including Muslim organizations and countries.  It is also widely known that Ms. Abedin has worked for and her family works for radical Muslim organizations. (If it is shown that Ms. Abedin shared any of these Clinton emails with her family or foreign organizations this is another crime not only by Abedin but by Hillary Clinton who let the classified information be stolen.)

This is very significant because these emails are related to 2 or more different FBI investigations.
The Clinton email scandal, an ongoing investigation into the Clinton foundation based on RICO charges and maybe foreign espionage.

On July 5th this Pirate watched as James Comey laid out the evidence the FBI had gathered to date on Hillary Clinton. As he spoke I knew that he had enough to bring charges against Hillary Clinton for lying, destruction of evidence, mishandling government property and more. Then at the last moment he announced that he “did not believe that any prosecutor would convict her.” This was because he was under pressure from Loretta Lynch to say this.  Later under oath in front of a congressional panel Director Comey testified that he had evidence that Clinton WAS guilty of many crimes.

hillary-clinton-email-un-20150310

Just days before Ms. Lynch met with Bill Clinton on a tarmac in Phoenix, AZ. in a “secret” meeting that was discovered by a local reporter. In this meeting President Clinton either threatened Ms. Lynch or made promises to bribe her. Either way the fix was in.

Over the next few months there was public outrage and rebellion inside the FBI as 1000’s of career agents who knew there was plenty of evidence to prosecute her protested not only to Comey but as “unnamed sources.”

More evidence also came out from Wikileaks that showed that the Clinton criminal enterprise was misleading the public, telling the media how to rig polls, hiring criminals to disrupt Trump rallies and exposing that Podesta was aware of a upcoming assassination or as he stated “Wet Works” just days before Justice Scalia was found dead / murdered.

The final straw was when it was discovered that Hillary Clinton had raised over a Million Dollars for a PAC run by Terry McAuliffe the governor of Virginia and a close Clinton Allie.
McAuliffe then donated over $500,000 to the campaign fund of a senior FBI agent Andrew McAbe who would be the key agent on the Clinton email investigation and may have been the source in the FBI who granted approval for many forms of immunity for almost every Clinton aid in the investigation. In my opinion this pushed Comey over the edge and led to the trap being laid.

Once the announcement of the reopening was made the Clinton campaign went ballistic.
They are now demanding that the FBI release more information. I think that this week the FBI will announce more info. If I am correct Comey will come out and disclose some of what was found on the Weiner computer was Hillary Clinton Classified information. He will also announce the investigation of the Clinton foundation and his recommendation that it be presented to either a Grand Jury or a Special Prosecutor.

What is not in doubt is that the Clinton’s are running a criminal organization and are not honest. They also have no regard for security procedures and are only interested in enriching themselves.

Based on evidence there is no way that Hilary Clinton can be allowed to become President of the United States.

http://www.zerohedge.com/news/2016-10-30/doug-band-john-podesta-if-story-gets-out-we-are-screwed

http://www.zerohedge.com/news/2016-10-30/former-fbi-asst-director-accuses-clintons-being-crime-family

http://www.usatoday.com/story/news/nation/2016/10/29/who-huma-abedin-hillary-clintons-right-hand-woman/92956668/

http://www.zerohedge.com/news/2016-10-29/fbi-found-tens-thousands-emails-belonging-huma-abedin-weiners-laptop

 

Hillaries Smoking GUN Proof of BRIBES

Here is EVIDENCE that Hillary and her staff solicited donations in a PAY for PLAY scheme. HUMA was actively involved in solicitations for HILLARY while at State working for Clinton and solicited MILLIONS for the CLINTON FOUNDATION!

Re: FYI CGI Africa

Jason Amerine Why is this war hero being investigated?

Why is this war hero being investigated?

Lt. Col. Jason Amerine, pictured in 2001, played a key role in overthrowing the Taliban in Afghanistan.

Story highlights

  • Lt. Col. Jason Amerine, who helped liberate Afghanistan, faces probe in hostage disclosure
  • Peter Bergen: It appears to be a case of a war hero being investigated for doing the right thing

Peter Bergen is CNN’s national security analyst, a vice president at New America and a professor of practice at Arizona State University. He is the author of “Manhunt: The Ten-Year Search for bin Laden — From 9/11 to Abbottabad.”

(CNN)Lt. Col. Jason Amerine, a Special Forces war hero who played an instrumental role in the overthrow of the Taliban in the months after 9/11, is under investigation over a purported unauthorized disclosure relating to a U.S. hostage held overseas that was made to U.S. Rep. Duncan Hunter’s office.

Hunter, a California Republican, has been a vocal advocate in Congress for pushing efforts to help free American hostages held by al Qaeda and the Taliban.

Peter Bergen

A plan was developed in the Pentagon by Amerine, most recently a planner on the U.S. Army staff, to secure the release of those American hostages, according to a staff member on Hunter’s committee.

The plan was to release Haji Bashir Noorzai, a prominent member of the Taliban who is in prison in the States on drug trafficking charges, in exchange for U.S. Army Sgt. Bowe Berghdal, who was held by the Taliban until last year as well as other Taliban hostages. They were: Caitlin Coleman, a U.S. citizen, and her husband, Canadian citizen Joshua Boyle, and Warren Weinstein, an American aid worker held by al Qaeda who was inadvertently killed in a CIA drone strike in January.

It’s not clear how far, if anywhere, this plan of action went.

The Washington Post reported Tuesday that the Army Criminal Investigation Command is probing what Amerine may have disclosed to members of Congress months ago. Chris Grey, a spokesman for the Criminal Investigation Command told the Post that, “As a matter of policy, we do not confirm the names of individuals who may or may not be under investigation to protect the integrity of a possible ongoing investigation, as well as the privacy rights of all involved.” He also said, “We reject any notion that Army CID initiates felony criminal investigations for any other purpose than to fairly and impartially investigate credible criminal allegations that have been discovered or brought forward.”

CNN first reported the investigation of Amerine in April.

In a Facebook post this month, Amerine made his first public comments about the investigation, writing: “I have been under criminal investigation for the last four months for whistleblowing to Congress over our completely dysfunctional system for recovering hostages. The FBI formally complained to the Army about me reporting to Congress about their failed efforts to recover Warren Weinstein, Caitlin Coleman and the child she bore in captivity…If I learned nothing in my 22 years of service I learned that we never leave people behind.”

What makes the investigation of Amerine so strange is that he is a bona fide war hero. According to research that I conducted for “The Longest War,” a history of the war on terror, in the months after the 9/11 attacks, then-Capt. Jason Amerine was the leader of the U.S. Special Forces team embedded with Hamid Karzai, the future leader of Afghanistan, in Tarin Kowt, the provincial capital of the Afghan province of Uruzgan.

Bergen: Secrets of the bin Laden treasure trove

On November 16, 2001, the people of Tarin Kowt rose up against the Taliban and chased them out. A day later Karzai headed into the town in a 20-vehicle convoy and set up shop in the governor’s mansion. Arriving around midnight, Karzai met with local Pashtun tribal leaders, who welcomed him and told him with some trepidation that there was a column of some 100 vehicles approaching from Kandahar and containing up to 500 Taliban who would reach the town by the next day intent on taking it back.

The 100-vehicle convoy sent to retake Tarin Kowt for the Taliban was Taliban leader Mullah Mohammed Omar‘s last shot at hanging on to power.

Amerine started to plan how to repel the much larger Taliban force, while his combat controller sent out an urgent warning to U.S. Navy and Air Force aircraft in the area that they would be needed shortly.

Remembering the hostages killed in the U.S. drone strike

Remembering the hostages killed in the U.S. drone strike 02:25
PLAY VIDEO

Amerine gathered as many of Karzai’s guerrillas as he could. His plan was to stake out some higher ground with those guerillas outside Tarin Kowt and call in airstrikes from there onto the fast-approaching Taliban convoy.

Around two hours after Amerine was first alerted to the approaching Taliban column, Navy F/A-18 fighters spotted a group of about 10 four-wheel drives and started bombing them. Three hours later, at 5 a.m., the larger convoy of dozens of Taliban vehicles came into view.

Heavily outnumbered, Karzai’s group of Afghan guerrillas took flight and sped back to Tarin Kowt, followed by Amerine and his Special Forces team. Back in Tarin Kowt, Amerine told Karzai, “The Taliban are coming, there are a lot of them. These (Afghan) fighters we are with don’t understand our capabilities; they kind of ran. I need to take these vehicles and get out there and keep doing what I’m doing.”

Amerine drove back outside the town at around 7 a.m. to direct deadly accurate bombing runs on the approaching Taliban convoy. Three hours later the battle was over, and what remained of the convoy was in full retreat.

Bergen: Could Warren Weinstein have been saved?

Hank Crumpton, who was running the CIA’s operation in Afghanistan, recalls that the battle was decisive because Karzai was the only man who could unify the country’s fractious ethnic factions: “Karzai was the lynchpin between north and south. The Uzbeks, the Tajiks, the Hazara, they all respected Karzai. They knew that he understood the concept of a nation-state.”

But the importance of the Tarin Kowt battle was not well understood at the time because the vast majority of the international media covering the war were concentrated in the north of the country and focusing on the fall of Kabul five days earlier.

Following the news of the debacle at Tarin Kowt, Mullah Omar finally abandoned Kandahar, the city he had controlled absolutely for seven years.

Karzai arrived just outside Kandahar on December 5 to begin the discussions of the terms of the Taliban surrender agreement. The following day, around 9 a.m., the Afghan leader was talking with a local tribal chief when suddenly there was an enormous bang and the doors and windows of the building he was in blew out.

A U.S. investigation later determined that the cause of the explosion was a 2,000-pound American bomb that had fallen 2 kilometers short of its intended target, instead landing on Karzai and his security detail. Three American Special Forces soldiers were killed.

Amerine, who had grown close to Karzai in the weeks he had protected him, was wounded in the leg and evacuated.

Karzai would go on, of course, to become the first democratically elected Afghan President.

President Barack Obama has ordered a review of U.S. government policies as they relate to hostages. The recent history of American hostage recoveries has mostly been one of failure. Journalists James Foley, Steve Sotloff and aid workers Kayla Mueller, Peter Kassig and Weinstein have all been killed.

Does the White House need a ‘hostage czar’?

Families of hostages have also complained about a lack of communication with them, a lack of coordination between the agencies responsible for securing the release of their family members, and even threats of prosecution if they entered into negotiations with the terrorists holding their loved ones.

The hostage review process, the final findings of which are likely to be made in coming weeks, will surely help to solve some of these problems.

Hunter released a statement in April, saying, “The only government organization seriously developing options to recover Weinstein and others in the Afghanistan/Pakistan region was within the Pentagon — led by war hero Jason Amerine.”

Since the Army is saying little, it is not exactly clear what the grounds are for its investigation of Amerine. That said, it’s strange that this officer appears to be being penalized for simply doing the right thing: coming up with novel ideas about how to return American hostages home and communicating with members of Congress who have taken an interest in the issue.

Exposed: Muslim Brotherhood Operatives in the U.S.

 

Exposed: Muslim Brotherhood Operatives in the U.S.

November 1, 2013 By  8 Comments

 

Muslim-Brotherhood-EgyptEl Watan, one of Egypt’s most widely circulated and read newspapers, published a report discussing the Muslim Brotherhood’s influence over the United States, especially in the context of inciting pro-Brotherhood policies against Egypt’s popular June 30 Revolution, which resulted in the ousting of Muhammad Morsi and the Brotherhood from power.

Titled (in translation), “With Names, Identities, and Roadmap…  El WatanExposes Brotherhood Cells in America,” it’s written by investigative journalist Ahmed al-Tahiri, who begins the report by saying:

In the context of El Watan’songoing investigation concerning the Brotherhood’s cells and lobby inside America that support the regime of the ousted [Morsi], and which intensified their activities to attack and defame the June 30 Revolution, informed sources have disclosed to El Watannewspaper the names and cell entities of the Brotherhood and their roadmap of activities all throughout the United States of America.

The sources said that these organizations, which are spread throughout the States, agitated for and were supportive of the decisions taken by Muhammad Morsi’s project to “Brotherhoodize” and consolidate power [in Egypt] and gave a favorable opinion to the general American public that Morsi’s decisions were welcomed by the public [in Egypt]. Following the June 30 Revolution, these groups launched a malicious war in order to incite the American administration to take hostile decisions against Egypt, with the aim of bringing back the Brotherhood to the power.

El Watan then goes on to name names, saying that the following activists and entities are Brotherhood operatives working within the United States (reproduced verbatim):

• Union of Egyptian Imams in North America, represented by Sheikh Muhammad al-Bani

• The Egyptian American Foundation for Development

• Dr. Khalid Lamada, New York

• Dr. Hassan al-Sayah, Virginia

• The Egyptian Network in America, led by Dr. Muhammad Helmi

• Dr. Akram al-Zand, Sa’ad Foundation

• Muhammad al-Khashab, Head of ART channels in America

• Sameh al-Henawi, member, Business Association of America

• Dr. Hany Saqr, member, Egyptian Association in America

• Dr. Khalid Hassan, Maryland

• Dr. Muhammad Abdel Hakem, Seattle

• Dr. Ahmed Ismat al-Bendari, President, Islamic Society of America

• Walid Yusari, Chicago

• Ahmed Shadid, New Jersey

• Ahmed al-Hatab, Indiana

• Dr. Muhammad Morjan, Boston

• Ramadan Ridwan, Houston

• Ahmed Fayez, Las Vegas

• Dr. Amru Abbas, member, Egyptian Foundation in Michigan

• Dr. Safi al-Din Hamed, Pennsylvania

• Dr. Hamdy Radwan, North Carolina

• Ahmed Shehata, Director, Egyptian American Organization for Democracy and Human Rights

• Dr. Iman Shehata, New York

• Dr. Muhammad Amru Attawiya, member, Organization of Islamic Relief in the United States

• Dr. Khalid al-Sayes, member, Rebuilding of Egypt Foundation

• Dr. Tariq Hussein, member, American Islamic Relations Council (CAIR)

• Dr Hisham al-Gayar, member, Egyptian Foundation, Michigan

• Amin Mahmoud, Maryland

As a most recent example, El Watan quotes from an American op-ed published on October 16 (just two days before the publication of the El Watan report itself).  Titled “Egypt: 100 days later” and written by Ahmed Shehata of the Egyptian American Organization for Democracy and Human Rights, the piece appeared in The Hill, the Capitol’s most widely circulated newspaper, published specifically for Congress.

The op-ed is certainly a prime example of pro-Muslim Brotherhood propaganda that actually tries to “shame” U.S. policymakers into returning the Brotherhood back to power in the name of “democracy.”

Key excerpts follow:

While the U.S. must consider its own interests in the region, it is baffling and disheartening to think the current administration would choose to discount the suffering that continues to occur on a daily basis as well as the complete violation of democratic principles which it espouses to the rest of the world….  As this past week marked 100 days since the coup and the lives of the Egyptian people continue to be sacrificed, the United States cannot be silent any longer for the sake of their own interests and convenience….  To that end, Egypt represents a golden opportunity for the U.S. to uphold democratic values by pushing for the reinstatement of the democratically elected government, despite their shortcomings. This would aid tremendously in showing the world that, above any one particular physical interest, stands the mantle of freedom and the rule of law.

Anyone familiar with the real happenings of Egypt knows that Shehata’s assertions are complete opposites of the truth: the military ousted the Brotherhood in response to the will of millions of Egyptians—the people, thedemos, as in democracy—who took to the streets protesting against the totalitarian Morsi government.  Moreover, it is the Muslim Brotherhood and their supporters who have been committing numerous human rights atrocities—including the slaughter and persecution of Christians, the torture and murder of many Egyptians (including before the revolution), and the destruction and torching of some 85 Christian churches.

Shehata seems to think that, if the Muslim Brotherhood and their supporters terrorize, murder, destroy, persecute, and betray their nation—which is precisely why tens of millions of average Egyptians rose up against them (though you might not know that following Al Jazeera-led Western media that distorted the popularity of the revolution)—as long as they won “elections” (which from the start many authorities insisted they didn’t), then that is all that matters; and, if need be, the U.S. must war with Egypt’s military and people on behalf of the ousted terrorists—all in the name of “democracy” and “human rights,” as Shehata’s U.S.-based Brotherhood front is laughably called.

That such a shameless piece of Muslim Brotherhood propaganda can be published in the most influential and widely read Capitol Hill publication certainly goes a long way in validating El Watan’s claims that the Brotherhood has its tentacles all around the United States’ points of influence.

Was Michael Hastings car “Hacked” by those who did not want him to write an article about Obama?

Michael Hastings was a reporter. Just before his death he let friends know he was on a huge story that would lead to Obama.

He said he was being followed by the FBI

His car accelerated to over 100 MPH on a city street. His Mercedes suddenly veered into a tree on a quiet street with no traffic. Hastings was known as such a safe driver he was told he drove like” Grandma”.

Against the wishes of the family the government had his body cremated.

There is sufficient evidence that his car was hacked.

I am sure the black box was “destroyed” in the accident.

What you read about below is true. IF our government / Obama is using these “hacks” to kill Americans
we need to stop it now.

Hackers Reveal Nasty New Car Attacks–With Me Behind The Wheel (Video)

This story appears in the August 12, 2013 issue of Forbes.

Charlie Miller (left) and Chris Valasek behind their Prius’ dismantled dashboard. Credit: Travis Collins

Stomping on the brakes of a 3,500-pound Ford Escape that refuses to stop–or even slow down–produces a unique feeling of anxiety. In this case it also produces a deep groaning sound, like an angry water buffalo bellowing somewhere under the SUV’s chassis. The more I pound the pedal, the louder the groan gets–along with the delighted cackling of the two hackers sitting behind me in the backseat.

Luckily, all of this is happening at less than 5mph. So the Escape merely plows into a stand of 6-foot-high weeds growing in the abandoned parking lot of a South Bend, Ind. strip mall that Charlie Miller and Chris Valasek have chosen as the testing grounds for the day’s experiments, a few of which are shown in the video below. (When Miller discovered the brake-disabling trick, he wasn’t so lucky: The soccer-mom mobile barreled through his garage, crushing his lawn mower and inflicting $150 worth of damage to the rear wall.)
“Okay, now your brakes work again,” Miller says, tapping on a beat-up MacBook connected by a cable to an inconspicuous data port near the parking brake. I reverse out of the weeds and warily bring the car to a stop. “When you lose faith that a car will do what you tell it to do,” he adds after we jump out of the SUV, “it really changes your whole view of how the thing works.”

This fact, that a car is not a simple machine of glass and steel but a hackable network of computers, is what Miller and Valasek have spent the last year trying to demonstrate. Miller, a 40-year-old security engineer at Twitter, and Valasek, the 31-year-old director of security intelligence at the Seattle consultancy IOActive, received an $80,000-plus grant last fall from the mad-scientist research arm of the Pentagon known as the Defense Advanced Research Projects Agency to root out security vulnerabilities in automobiles.

The duo plans to release their findings and the attack software they developed at the hacker conference Defcon in Las Vegas next month–the better, they say, to help other researchers find and fix the auto industry’s security problems before malicious hackers get under the hoods of unsuspecting drivers. The need for scrutiny is growing as cars are increasingly automated and connected to the Internet, and the problem goes well beyond Toyota and Ford. Practically every American carmaker now offers a cellular service or Wi-Fi network like General Motors’ OnStar, Toyota’s Safety Connect and Ford’s SYNC. Mobile-industry trade group the GSMA estimates revenue from wireless devices in cars at $2.5 billion today and projects that number will grow tenfold by 2025. Without better security it’s all potentially vulnerable, and automakers are remaining mum or downplaying the issue.

As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision. “Imagine you’re driving down a highway at 80 ,” Valasek says. “You’re going into the car next to you or into oncoming traffic. That’s going to be bad times.”

A Ford spokesman says the company takes hackers “very seriously,” but Toyota, for its part, says it isn’t impressed by Miller and Valasek’s stunts: Real carhacking, the company’s safety manager John Hanson argues, wouldn’t require physically jacking into the target car. “Our focus, and that of the entire auto industry, is to prevent hacking from a remote wireless device outside of the vehicle,” he writes in an e-mail, adding that Toyota engineers test its vehicles against wireless attacks. “We believe our systems are robust and secure.”

Anatomy of an auto hack: With just a laptop connected to its diagnostics port, Valasek and Miller turned an innocent Prius into the world’s worst amusement park ride. Here what they could do.(Click to enlarge)

But Miller and Valasek’s work assumed physical access to the cars’ computers for a reason: Gaining wireless access to a car’s network is old news. A team of researchers at the University of Washington and the University of California, San Diego, experimenting on a sedan from an unnamed company in 2010, found that they could wirelessly penetrate the same critical systems Miller and Valasek targeted using the car’s OnStar-like cellular connection, Bluetooth bugs, a rogue Android app that synched with the car’s network from the driver’s smartphone or even a malicious audio file on a CD in the car’s stereo system. “Academics have shown you can get remote code execution,” says Valasek, using hacker jargon for the ability to start running commands on a system. “We showed you can do a lot of crazy things once you’re inside.”

One of the UCSD professors involved in those earlier tests, Stefan Savage, claims that wireless hacks remain possible and affect the entire industry: Given that attacks on driving systems have yet to be spotted outside of a lab, manufacturers simply haven’t fully secured their software, he says. “The vulnerabilities that we found were the kind that existed on PCs in the early to mid-1990s, when computers were first getting on the Internet,” says Savage.

As cars approach Google’s dream of passenger-carrying robots, more of their capabilities also become potentially hackable. Miller and Valasek exploited Toyota’s and Ford’s self-parking functions, for instance, to hijack their vehicles’ steering. A car like the 2014 Mercedes Benz S-Class, which can negotiate stop-and-go traffic or follow a leader without input, may offer a hacker even more points of attack, says Gartner Group analyst Thilo Koslowski. “The less the driver is involved, the more potential for failure when bad people are tampering with it,” he says.

In the meantime, Miller and Valasek argue that the best way to pressure car companies to secure their products is to show exactly what can be done with a multi-ton missile on wheels. Better to experience the panic of a digitally hijacked SUV now than when a more malicious attacker is in control. “If the only thing keeping you from crashing your car is that no one is talking about this,” says Miller, “then you’re not safe anyway.”

Follow me on Twitter, and check out my book, This Machine Kills Secrets: How WikiLeakers, Cypherpunks and Hacktivists Aim To Free The World’s Information.