Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Sharyl Attkisson Just Released a Creepy Video of Her Computer...
The Blaze ^ | 10/31/2014 | Jon Street

Posted on 10/31/2014 4:07:07 PM PDT by Beave Meister

Former CBS News Correspondent Sharyl Attkisson — who claims the government hacked her computer, TV and phone while she reported on the Benghazi terror attack — has released a new video showing what could be evidence of the government taking over her computer.

“That very night, with [White House spokesman Eric] Schultz, [White House Press Secretary Jay] Carney and company freshly steaming over my Benghazi reporting, I’m home doing final research and crafting questions for the next day’s interview with [Thomas] Pickering. Suddenly data in my computer file begins wiping at hyperspeed before my very eyes. Deleted line by line in a split second: it’s gone, gone, gone,” Attkisson writes in her book.

In the book, Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington, Attkisson explains the difficulties she faced while trying to get at the truth of exactly what happened on the night of September 11, 2012 in Benghazi, Libya, where four American diplomats died, including U.S. Ambassador to Libya Christopher Stevens.

(Excerpt) Read more at theblaze.com ...


TOPICS: Chit/Chat
KEYWORDS: attkisson; benghazi; cbs; corruption; democrats; doj; ericholder; holder; irs; liberals; libya; obama; policestate; scandles; sharylattkisson; surveillancestate; thomaspickering
Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 next last
To: pieceofthepuzzle

Instead of depending on software or hardware to protect your system from intruders, you just leave an air gap between your system and any connection to anything else. IOW, no connection, no problem.

I’m not saying it’s 100% foolproof, but I suspect it would take very sophisticated equipment indeed to beat.


21 posted on 10/31/2014 4:25:47 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 13 | View Replies]

To: Covenantor
So essentially what you are saying is that as long as you are online in any way, you can't really protect yourself entirely. Scary, and sad. Out of curiosity, can your computer be hacked when it is ‘sleeping’?
22 posted on 10/31/2014 4:26:29 PM PDT by pieceofthepuzzle
[ Post Reply | Private Reply | To 17 | View Replies]

To: rockrr

Pretty simple, to my mind anyway. Have a separate system on which you do all the work you want to keep secret.

When you want to make public any of this work, load it onto a USB drive and download it onto your other, connected system.


23 posted on 10/31/2014 4:27:29 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 19 | View Replies]

To: pieceofthepuzzle

Not if you unplug it.


24 posted on 10/31/2014 4:27:55 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 22 | View Replies]

To: lacrew

So true and proof that they are covering for him


25 posted on 10/31/2014 4:28:53 PM PDT by WhyisaTexasgirlinPA (Tactical Firearms,Katy Tx: "the two enemies of guns, rust and politicians")
[ Post Reply | Private Reply | To 8 | View Replies]

To: Sherman Logan

Come to think of it, that might not work with a laptop. Unplug it AND take the battery out.


26 posted on 10/31/2014 4:29:05 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 24 | View Replies]

To: pieceofthepuzzle

The “air gap firewall” is used when you absolutely, positively do not want your computer infected with malware from “the wild” (meaning the internet).

To implement the air-gap firewall, you simply unplug the network cable from the computer you wish to protect.

It’s foolproof.


27 posted on 10/31/2014 4:30:33 PM PDT by Steely Tom (Thank you for self-censoring.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Steely Tom
“To implement the air-gap firewall, you simply unplug the network cable from the computer you wish to protect.”

I'm sorry to be so uninformed about this stuff, but are you saying that a wireless router - without an ethernet cable - is safe, as long as you use the standard firewall protocols?

28 posted on 10/31/2014 4:33:20 PM PDT by pieceofthepuzzle
[ Post Reply | Private Reply | To 27 | View Replies]

Old school time.

Really old school.


29 posted on 10/31/2014 4:33:49 PM PDT by combat_boots (The Lion of Judah cometh. Hallelujah. Gloria Patri, Filio et Spiritui Sancto!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: lacrew

In a sane world, this would be bigger than Watergate...


Yes it is.

This is how the democrats are doing business. The most corrupt government in our nation’s history and nothing is happening to them.


30 posted on 10/31/2014 4:34:23 PM PDT by boycott
[ Post Reply | Private Reply | To 8 | View Replies]

To: Beave Meister

Media only idolizes the reporters who got Nixon to resign.


31 posted on 10/31/2014 4:35:10 PM PDT by RginTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: liege; Swordmaker
It couldn’t have been a virus or malware doing that because it was a Mac. Chilling stuff.
It could have been a virus because she was running Boot Camp/Windows. OTOH the fact that she found an intruding fiber optic cable suggests the possibility that her Mac was physically tampered with, making malware a distinct possibility, Unix operating system or no.

32 posted on 10/31/2014 4:36:10 PM PDT by conservatism_IS_compassion ("Liberalism” is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Sherman Logan

Not necessarily true. NSA had chips planted on MB’s that allow them to remotely access computers from as far away as two miles.


33 posted on 10/31/2014 4:39:05 PM PDT by RinaseaofDs
[ Post Reply | Private Reply | To 7 | View Replies]

To: Beave Meister

bookmark


34 posted on 10/31/2014 4:39:26 PM PDT by GOP Poet
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sherman Logan

Actually, I’ve been trying to make this very point to my brother who keeps getting malware on his machine. I always use a separate machine to surf the web. It has nothing on it but the bare essentials.


35 posted on 10/31/2014 4:46:01 PM PDT by rockrr (Everything is different now...)
[ Post Reply | Private Reply | To 23 | View Replies]

To: RinaseaofDs

As I’ve said, no system is foolproof, but I was talking about unmodified systems, not something where they break in and install hardware.


36 posted on 10/31/2014 4:47:55 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 33 | View Replies]

To: Beave Meister
Yes, they are brazen. Yes, they are in your face.

But Ms. Attkisson has a simple solution at her disposal: Buy a laptop. Never connect it to the internet. Transport files to and from other locations or computers on writeable CD's, then lock the CD's from further writes.

37 posted on 10/31/2014 4:48:39 PM PDT by Lazamataz (First we beat the Soviet Union. Then we became them. We have no 'news media', only a Soviet Pravda.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pieceofthepuzzle

If it’s getting power and it’s connected to the web short answer is, yes it’s possible.


38 posted on 10/31/2014 4:50:13 PM PDT by Covenantor ("Men are ruled...by liars who refuse them news, and by fools who cannot govern." Chesterton)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Beave Meister

You can clearly hear clicks and button presses every time something happens. I think at first it was real. But there’s no way she hasn’t gone to an IT guy, or gotten a new laptop by now. I think it’s a hoax video. But maybe not. I can hear clicks and button presses every time something is deleted. Explanations?


39 posted on 10/31/2014 4:50:14 PM PDT by FreedomStar3028 (Somebody has to step forward and do what is right because it is right, otherwise no one will follow.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pieceofthepuzzle

When your PC is in sleep mode your session is written to RAM (memory). It is theoretically possible to remotely access your machine and copy the contents of RAM. It would depend on how your machine is set up - including if your NIC card/modem/WiFi is configured to “wake on LAN” or respond to a remote command to power up.


40 posted on 10/31/2014 4:51:01 PM PDT by rockrr (Everything is different now...)
[ Post Reply | Private Reply | To 22 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson