Hunt for Facebook Killer Steve Stephens is Over … Found in Erie, PA Dead … Commits Suicide After Confronted by Police
THE HUNT FOR FACEBOOK KILLER IS OVER AS EXPECTED …
Steve Stephens, the Cleveland Facebook killer committed suicide after troopers stopped car in Erie, PA. McDonald’s workers had tipped off the police that Stephens was in area at their drive thru. It is reported that Stephens shot himself after troopers pursued his car and stopped him. As per the NY Times, as his car spun to a stop, “Stephens pulled a pistol and shot himself in the head.” Good riddance and I guess the once saving grace here is that no other individuals were harmed by this murderous sicko and Stephens spared the tax payers and the grieving family of 74 year old Mr. Godwin.
Teper said a “concerned citizen on Buffalo Road” contacted law enforcement at 11:10 a.m. and that Stephens was sighted at a McDonald’s in Harborcreek. He would not identify the concerned citizen and said he did not know whether the person would receive a reward for the information.
He said Stephens shot himself after troopers pursued his car and stopped him in what is called a P.I.T. maneuver, or precision immobilization technique, in which police cause a car to go sideways and stop.
The chase, which Teper said never went above 50 miles per hour, involved four state police vehicles and was joined by members of the Wesleyville Police Department, he said.
“Facebook Killer” Steve Stephens was spotted just after 11 a.m. this morning by an alert citizen near the intersection of Buffalo Road and Downing Avenue in Erie County, Pennsylvania, which is less than two miles from PSP Troop E headquarters.
PSP troopers immediately began to canvas the area for Stephens and located him in his vehicle a short time later. Troopers in marked patrol units initiated a pursuit that lasted approximately two miles. The troopers attempted a PIT maneuver to disable Stephens’ vehicle, a white Ford Fusion. As the vehicle was spinning out of control from the PIT maneuver, Stephens pulled a pistol and shot himself in the head.
Today at approximately 11am, Cleveland Division of Police Command was notified that Pennsylvania State Police had, through a tip from a citizen, located the suspect vehicle wanted in the homicide of Robert Godwin, Sr. Pennsylvania State Police, in marked patrol vehicles, attempted to stop the vehicle. The suspect fled in the white Ford Fusion and, after a short pursuit, the suspect took his own life. No injuries to members of the community or to law enforcement were reported. The suspect, Steve Stephens was pronounced deceased on scene.
Please see update from Pennsylvania State Police here. Requests for information directly relating to the incident involving the Pennsylvania State Police should be directed to the Pennsylvania State Police.
This investigation remains in the early stages. Reward monies in this case were offered through Crime Stoppers. The City of Cleveland and the Cleveland Division of Police are not involved in any reward monies that may be paid to individuals who provided the tips leading to the suspect’s location.
The Dana Pretzer Show – Thursday, April 6, 2017 – Please Join Dana Pretzer Tonight at 9 PM ET with Attorney & Author Michael Cicchini & Constable Jeffrey Bartsch
THE DANA PRETZER SHOW
- Attorney Michael Cicchini, the author of Convicting Avery: The Bizarre Laws and Broken System Behind Making a Murderer
- Constable Jeffrey Bartsch, Police Officer and Mental Health Advocate, Honoring A Hero … A Ride to Remember!
- I had the honor of getting to know Cst. Derek Pineo in 2007 at RCMP Depot in 2007. Tragically, Derek lost his life on duty on July 20, 2012 when his police cruiser collided with a moose near Wilkie, SK. Derek was 38 years old. In 2016, I rode the 1st annual Saskatchewan Ride to Remember law enforcement cycling event from Saskatoon Police HQ to the Regina Parliament grounds approx 320km to honor fallen officers who lost their lives in the line of duty. At the end of the ride, we took part in the Saskatchewan Police & Peace Officer’s Memorial situated at the Saskatchewan Parliament grounds. The focus of my ride in 2016 was to honor Derek. This year in 2017, upon speaking with Derek’s wife Natasha, we would like to invite and bring Derek’s son, Kayleb to ride alongside the Ride to Remember to honor his dad.
ABSOLUTE PRIVACY, I AM WORRIED ABOUT ANY PRIVACY …
Yesterday at the Boston Conference on Cyber Security, FBI Director James Comey said, “there is no such thing as absolute privacy in America.” This comes in the wake of the recent WikiLeaks data dump exposing CIA documents and the processes they use to spy on individuals using smart phones and TV’s. Comey and the intelligence community can down talk this all they want, but the fact of the matter is that most people do not expect “absolute privacy,” they expect the federal government to abide by the US Constitution. One has to wonder whether we can expect any privacy in this day and age.
Private citizens who have committed no crimes do not expect their data, conversations, emails, tweets, instant messages, whatever to be ease-dropped on by the government.
FBI Director James Comey warned Wednesday that Americans should not have expectations of “absolute privacy,” adding that he planned to finish his term leading the FBI.
“There is no such thing as absolute privacy in America; there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. He made the remark as he discussed the rise of encryption since 2013 disclosures by former National Security Agency contractor Edward Snowden revealed sensitive US spy practices.
“Even our communications with our spouses, with our clergy members, with our attorneys are not absolutely private in America,” Comey added. “In appropriate circumstances, a judge can compel any one of us to testify in court about those very private communications.”
But, he also said Americans “have a reasonable expectation of privacy in our homes, in our cars, in our devices.
“It is a vital part of being an American. The government cannot invade our privacy without good reason, reviewable in court,” Comey continued.
MAKES ONE ALMOST WANT TO GO BACK TO A ROTARY DIAL LAND LINE OR BETTER YET, TELEGRAPH AND A PHILCO BLACK & WHITE TV WITH RABBIT EARS ANTENNA…
In the wake of the latest Wikileaks dump, several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims. Companies like Apple looked quell worries from their users by issuing a statement to TechCrunch designed to alleviate concerns that the company’s products might still be vulnerable to a laundry list of CIA exploits. In short, Apple maintains that many of the iOS vulnerabilities the CIA previously relied upon have already been patched.
Apple’s statement was the most detailed, saying it had already addressed some of the vulnerabilities.
“The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way,” it said.
“Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
“We always urge customers to download the latest iOS to make sure they have the most recent security update.”
Samsung – whose F8000 series of televisions was reportedly compromised via a USB connection-based hack co-developed with the UK’s MI5 agency – was briefer.
“Protecting consumers’ privacy and the security of our devices is a top priority at Samsung,” it said.
“We are aware of the report in question and are urgently looking into the matter.”
The leaks also claimed that the CIA had created malware to target PCs running Microsoft’s Windows operating system.
“We are aware of the report and are looking into it,” a spokesman from Microsoft said.
Google declined to comment about allegations that the CIA was able to “penetrate, infest and control” Android phones due to its discovery and acquisition of “zero day” bugs – previously unknown flaws in the operating system’s code.
Likewise, the Linux Foundation has yet to publicly react to claims the agency had created “attack and control systems” that could hijack computers powered by Linux-based software.
The World Wide Web Foundation – which campaigns for internet privacy – said the US government needed to issue a detailed response.
WikiLeaks Publishes ‘Biggest Ever Leak of Secret CIA Documents’ & Exposes CIA Hacking Processes Through Smartphones & TV’s
AND WE ARE SUPPOSED TO BE WORRIED ABOUT THE RUSSIANS?
Yesterday Wikileaks unloaded the the biggest ever leak of CIA secret documents and detailed the tools it uses to break into phones, communication apps and other electronic devices. WikiLeaks named the leak the “Vault 7”. The leak is not only that of secret CIA documents but also how CIA hackers target smart phones, computers and Samsung F8000 TV’s.
Just how much information does the CIA have a regular, normal citizens who have never committed a crime and have never been charged with anything? Who is to say that info is not going to be used against a private citizen for political purposes? We still do have a US Constitution in this country, right?
The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices.
The leak, named “Vault 7” by WikiLeaks, will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age. It follows disclosures about Afghanistan and Iraq by army intelligence analyst Chelsea Manning in 2010 and about the National Security Agency and Britain’s GCHQ by Edward Snowden in 2013.
The new documents appear to be from the CIA’s 200-strong Center for Cyber Intelligence and show in detail how the agency’s digital specialists engage in hacking. Monday’s leak of about 9,000 secret files, which WikiLeaks said was only the first tranche of documents it had obtained, were all relatively recent, running from 2013 to 2016.
The revelations in the documents include:
- CIA hackers targeted smartphones and computers.
- The Center for Cyber Intelligence, based at the CIA headquarters in Langley, Virginia, has a second covert base in the US consulate in Frankfurt which covers Europe, the Middle East and Africa.
- A programme called Weeping Angel describes how to attack a Samsung F8000 TV set so that it appears to be off but can still be used for monitoring.
CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.