Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Attkisson: Hacker Highly Skilled, Used Very Sophisticated Methods
Breitbart ^ | 6/17/13 | John Nolte

Posted on 06/17/2013 9:33:36 AM PDT by Nachum

CBS News investigative reporter Sharyl Attkisson appeared on "CBS This Morning" to discuss the hacking of her computer, which CBS News say they have verified through what Attkisson describes as an "independent cyber-security firm." She added that whoever did the hack was "highly skilled and used very sophisticated methods." Throughout the reign of Barack Obama, Attkisson has distinguished herself in media as the rare reporter actually willing to do more than protect, cheerlead, and play stenographer for the White House.

(Excerpt) Read more at breitbart.com ...


TOPICS: News/Current Events
KEYWORDS: attkisson; benghazi; hacker
Gee, I wonder who could do that?
1 posted on 06/17/2013 9:33:36 AM PDT by Nachum
[ Post Reply | Private Reply | View Replies]

To: Jet Jaguar; NorwegianViking; ExTexasRedhead; HollyB; FromLori; EricTheRed_VocalMinority; ...

The list, Ping

Let me know if you would like to be on or off the ping list

http://www.nachumlist.com/


2 posted on 06/17/2013 9:34:12 AM PDT by Nachum (The Obama "List" at www.nachumlist.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

As soon as she began publishing stories about fast and furious would be my guess as to when this hacking began. My sense is DOJ was interested in her sources within the government, especially in ATF and the legislative branch.


3 posted on 06/17/2013 9:40:10 AM PDT by Mouton (108th MI Group.....68-71)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

Exploiting a Windows operating system is neither hard nor sophisticated. In the case of buffer and unpatched database exploits, there are more holes than one could possibly count.

Most corporate entities don’t have sufficient security for their systems, esp. once you get inside. If a hacker managed to brute force a password or use DDOS find open ports, once they’re inside, the kingdom is theirs.


4 posted on 06/17/2013 9:40:36 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

Attkisson: Hacker Highly Skilled, Used Very Sophisticated Methods

And your tax dollars likely paid the hacker to hack you.
Convenient, isn't it?
5 posted on 06/17/2013 9:41:58 AM PDT by RandallFlagg (IRS = Internal Revenge Service)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nachum

I believe that she was an obama worshiperand enabler and that she worked for an obama worshiper and enabler organization. If this is how obama does his friends, what do you expect him to do to his enemies. And you can bet your ass this was done at either obama’s order or his expectation.But then agan, when one rides a tighr, sometimes the tighr turns and eats said rider.


6 posted on 06/17/2013 9:45:16 AM PDT by sport
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mouton

I wonder how this correlates with the screaming match she got from the White House dude, where he said the Benghazi issue was over.

The computer turning itself on and off sounds familiar. I had that happen to me a couple of times. In my instance, I think it was to get rid of what I had just typed, to set me back in finishing an affidavit I was working on. In her case, anything that let her know she was being watched is probably more likely to be for intimidation purposes.


7 posted on 06/17/2013 9:53:12 AM PDT by butterdezillion (,)
[ Post Reply | Private Reply | To 3 | View Replies]

To: sport

Perhaps Attkisson was hoping that the tiger would eat her last.


8 posted on 06/17/2013 10:00:27 AM PDT by C210N (When people fear government there is tyranny; when government fears people there is liberty)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Mouton

Memo to Cheryl:

Next time write your Benghazi articles on an Underwood Pica Upright, and leave a bunch of misleading disinfo on your computer for the NSA hacks to find.


9 posted on 06/17/2013 10:01:32 AM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 3 | View Replies]

To: Nachum; LucyT; azishot; MestaMachine

With the multitude of scandals, revelations and whistle-blowing, I’m sure the commies in charge hire commie “contractors” for their dirty, unconstitutional jobs.

As long as taxpayers’ money is plenty, you’ll get no whistle-blowing and you’ll never be able to trace hacking back to the regime and it’s cronies.

However, the opposite isn’t true, i.e., hacking commies will be found in a NY minute from the NSA-collected data. This would be advertised, mega-horned by the MSM (who at last found something to “report”) and quite likely a speech from 0b0z0 about finding the needle in haystack!


10 posted on 06/17/2013 10:02:45 AM PDT by melancholy (Professor S. Alinsky, Fleet Maintenance, White Hive Trolley Bosses)
[ Post Reply | Private Reply | To 1 | View Replies]

To: C210N

They all do, don’t they?


11 posted on 06/17/2013 10:06:23 AM PDT by sport
[ Post Reply | Private Reply | To 8 | View Replies]

To: Nachum

If they were that skilled and that sophistacated, no one would ever know.


12 posted on 06/17/2013 10:14:21 AM PDT by PUGACHEV
[ Post Reply | Private Reply | To 1 | View Replies]

To: PUGACHEV

Maybe they wanted her to know they were looking...


13 posted on 06/17/2013 3:44:33 PM PDT by sandboxshooter (Iraq, Afghanistan, War)
[ Post Reply | Private Reply | To 12 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson