Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Sharyl Attkisson Just Released a Creepy Video of Her Computer...
The Blaze ^ | 10/31/2014 | Jon Street

Posted on 10/31/2014 4:07:07 PM PDT by Beave Meister

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 last
To: Steely Tom
The “air gap firewall” is used when you absolutely, positively do not want your computer infected with malware from “the wild” (meaning the internet). To implement the air-gap firewall, you simply unplug the network cable from the computer you wish to protect. It’s foolproof.

The director of security at a government group I work at described how a critical nuclear component was manufactured by a Windows XP old 586 with no security updates or any way to add data to it. All USB and wireless ports were removed. No floppy, CD, or DVD disk drive. Nothing but a keyboard and mouse (and those had to be specially-requested on a one-time-use basis, and justified through several layers of security). The room it was in was a Faraday cage.

He said the thing was still churning along 12 years later with never an intrusion or hack. :)

41 posted on 10/31/2014 4:53:44 PM PDT by Lazamataz (First we beat the Soviet Union. Then we became them. We have no 'news media', only a Soviet Pravda.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Beave Meister

Lets all remember to say a prayer for her safety.


42 posted on 10/31/2014 4:53:50 PM PDT by Bellflower (The LORD is Holy, separated from all sin, perfect, righteous, high and lifted up.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bellflower

Good Grief!! This is something out the pages of Hitler’s playbook. Total control over everything. Whoever did this should spend the rest of his or her time breaking rocks at Leavenworth.


43 posted on 10/31/2014 5:09:36 PM PDT by RichardW
[ Post Reply | Private Reply | To 42 | View Replies]

To: lacrew

Yes! Like family...

“David Rhoades, the current president of CBS News, is the brother of Ben Rhoades, a White House national security advisor...”

http://www.breitbart.com/Big-Journalism/2013/09/07/mainstream-media-honchos-related-towhite-house-officials


44 posted on 10/31/2014 5:13:10 PM PDT by fuzzylogic (welfare state = sharing consequences of poor moral choices among everybody)
[ Post Reply | Private Reply | To 8 | View Replies]

To: pieceofthepuzzle; Lazamataz
As soon as you introduce a wireless connection anywhere on a network, that network is no longer completely secure.

In government networks on which classified information passes, everything is connected by a cable. Nowadays, that means an optical cable because those are even more secure from external eavesdropping than are traditional copper connections.

There are additional physical and electrical barriers in place as well.

Typically, a bunch of computers within a secure facility will be connected into a network, but there is no connection between that network and any "outside" networks at all. At least that is my experience, others (such as Laz) may know different.

Anyone who effected such a connection would be in a lot of trouble, and all project(s) that "lived" on the computers in that network would be halted while an investigation was undertaken; this investigation might well involve outside agencies, and could take weeks or months to complete.

45 posted on 10/31/2014 5:19:42 PM PDT by Steely Tom (Thank you for self-censoring.)
[ Post Reply | Private Reply | To 28 | View Replies]

To: RinaseaofDs

Could you provide some substantive evidence for that claim?

I don’t believe that to be true, it’d be very hard to conceal.

fyi...I work on embedded software, work with companies that develop circuit boards. You’d need to allocate some radio bandwidth that isn’t interfered with, have drivers in the OS running to drive the HW, with higher levels of software to interface with the OS....and do it all without somebody noticing? Not likely.

This incident sounds like they were able to infect her machine (maybe by remote hacking, maybe they had contact with her machine) with something that gave them the ability to instantiate a remote desktop session, take over the machine as an outside user as though being at the computer. This is done by IT departments every day to assist remote users.


46 posted on 10/31/2014 5:24:29 PM PDT by fuzzylogic (welfare state = sharing consequences of poor moral choices among everybody)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Beave Meister

Are people aware that there is a black box in every new car. A friends daughter got hit by a man who died in the crash and they told them that the accident is under investigation and that the black boxes in the cars are being studied and will reveal important details about the accident. I am shocked that cars all have black boxes, but she didn’t seem to care.


47 posted on 10/31/2014 5:30:18 PM PDT by Bellflower (The LORD is Holy, separated from all sin, perfect, righteous, high and lifted up.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Billthedrill

Does nothing against physical access/entry.


48 posted on 10/31/2014 5:38:58 PM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 14 | View Replies]

To: Obama_Is_Sabotaging_America

Issa, at the end of his term as chairman, going out with a whimper ...


49 posted on 10/31/2014 5:47:20 PM PDT by maggief
[ Post Reply | Private Reply | To 5 | View Replies]

To: fuzzylogic

The drivers do not have to be in the resident/legitimate OS. Nor does access to any data need to be obtained via the resident/legitimate OS. You are thinking far too conventionally.


50 posted on 10/31/2014 5:47:35 PM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 46 | View Replies]

To: FreedomStar3028

Theoretically, she could be clicking to try and stop it, but as a natural skeptic, I am with you. Some of that could have just been a stuck keyboard key and she doesn’t realize it. I’ve had similar behavior with stuck keys.


51 posted on 10/31/2014 5:50:36 PM PDT by bolobaby
[ Post Reply | Private Reply | To 39 | View Replies]

To: AdmSmith; AnonymousConservative; Berosus; bigheadfred; Bockscar; cardinal4; ColdOne; ...

Probably just sunspots.


52 posted on 10/31/2014 5:57:51 PM PDT by SunkenCiv (https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | View Replies]

To: bolobaby

That is exactly what it is. She has a stuck backspace key, it looks like, and she’s trying to pass it off as a government hack? Weak.


53 posted on 10/31/2014 6:01:53 PM PDT by Conscience of a Conservative
[ Post Reply | Private Reply | To 51 | View Replies]

To: Beave Meister

Bump


54 posted on 10/31/2014 6:02:58 PM PDT by Jet Jaguar (Resist in place.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Henry Hnyellar

No I’m not, to do anything super useful the HW/SW would need to be in something more than device firmware. I’m well aware of security aspects of software, I deal with them everyday.

I’m an embedded expert and Chief Architect (no hack)...you would only be able to do something very minimal with what you suggest, the software would have to be in some implanted device but would need cooperation with the higher sw stacks to do anything more than some I/O monitoring/injection. It would still be very limited.

Please provide sources to the claim, I’m well aware of how devices work, what firmware does, along with kernel drivers, interrupt routines, user-space frameworks, applications, networks, etc...there’s isn’t a level of sw I’ve not worked with. The idea that an implanted chip on a board, with no higher level sw support, can “do anything from 2 miles away” is nonsense.


55 posted on 10/31/2014 6:03:23 PM PDT by fuzzylogic (welfare state = sharing consequences of poor moral choices among everybody)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Sherman Logan

Given that they apparently installed a separate fiber-optic line to her computer, even that might not have been effective.
(i.e. they had some form of physical access.)


56 posted on 10/31/2014 6:24:46 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: SunkenCiv

Thanks for the ping.


57 posted on 11/01/2014 9:52:00 AM PDT by GOPJ ( Are You More Likely to be Infected or Beheaded Today Than You Were 6 Years Ago? freeperPROCON)
[ Post Reply | Private Reply | To 52 | View Replies]

To: GOPJ

My pleasure!


58 posted on 11/02/2014 4:31:14 AM PST by SunkenCiv (https://secure.freerepublic.com/donate/)
[ Post Reply | Private Reply | To 57 | View Replies]

To: lacrew

tons of insider connections to the Democrat Corruption machine. Insider as in actual family ties.

The nepotism runs deep with these vipers.


59 posted on 11/02/2014 2:50:48 PM PST by FreeAtlanta (Liberty or Big Government - you can't have both.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Beave Meister

Republicans are in line with this abuse, too. It’s sickening.


60 posted on 11/02/2014 3:14:52 PM PST by SaraJohnson
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson