Posted on 10/31/2014 4:07:07 PM PDT by Beave Meister
Former CBS News Correspondent Sharyl Attkisson who claims the government hacked her computer, TV and phone while she reported on the Benghazi terror attack has released a new video showing what could be evidence of the government taking over her computer.
That very night, with [White House spokesman Eric] Schultz, [White House Press Secretary Jay] Carney and company freshly steaming over my Benghazi reporting, Im home doing final research and crafting questions for the next days interview with [Thomas] Pickering. Suddenly data in my computer file begins wiping at hyperspeed before my very eyes. Deleted line by line in a split second: its gone, gone, gone, Attkisson writes in her book.
In the book, Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obamas Washington, Attkisson explains the difficulties she faced while trying to get at the truth of exactly what happened on the night of September 11, 2012 in Benghazi, Libya, where four American diplomats died, including U.S. Ambassador to Libya Christopher Stevens.
(Excerpt) Read more at theblaze.com ...
Instead of depending on software or hardware to protect your system from intruders, you just leave an air gap between your system and any connection to anything else. IOW, no connection, no problem.
I’m not saying it’s 100% foolproof, but I suspect it would take very sophisticated equipment indeed to beat.
Pretty simple, to my mind anyway. Have a separate system on which you do all the work you want to keep secret.
When you want to make public any of this work, load it onto a USB drive and download it onto your other, connected system.
Not if you unplug it.
So true and proof that they are covering for him
Come to think of it, that might not work with a laptop. Unplug it AND take the battery out.
The “air gap firewall” is used when you absolutely, positively do not want your computer infected with malware from “the wild” (meaning the internet).
To implement the air-gap firewall, you simply unplug the network cable from the computer you wish to protect.
It’s foolproof.
I'm sorry to be so uninformed about this stuff, but are you saying that a wireless router - without an ethernet cable - is safe, as long as you use the standard firewall protocols?
Old school time.
Really old school.
In a sane world, this would be bigger than Watergate...
Yes it is.
This is how the democrats are doing business. The most corrupt government in our nation’s history and nothing is happening to them.
Media only idolizes the reporters who got Nixon to resign.
It could have been a virus because she was running Boot Camp/Windows. OTOH the fact that she found an intruding fiber optic cable suggests the possibility that her Mac was physically tampered with, making malware a distinct possibility, Unix operating system or no.
Not necessarily true. NSA had chips planted on MB’s that allow them to remotely access computers from as far away as two miles.
bookmark
Actually, I’ve been trying to make this very point to my brother who keeps getting malware on his machine. I always use a separate machine to surf the web. It has nothing on it but the bare essentials.
As I’ve said, no system is foolproof, but I was talking about unmodified systems, not something where they break in and install hardware.
But Ms. Attkisson has a simple solution at her disposal: Buy a laptop. Never connect it to the internet. Transport files to and from other locations or computers on writeable CD's, then lock the CD's from further writes.
If it’s getting power and it’s connected to the web short answer is, yes it’s possible.
You can clearly hear clicks and button presses every time something happens. I think at first it was real. But there’s no way she hasn’t gone to an IT guy, or gotten a new laptop by now. I think it’s a hoax video. But maybe not. I can hear clicks and button presses every time something is deleted. Explanations?
When your PC is in sleep mode your session is written to RAM (memory). It is theoretically possible to remotely access your machine and copy the contents of RAM. It would depend on how your machine is set up - including if your NIC card/modem/WiFi is configured to “wake on LAN” or respond to a remote command to power up.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.