I realize I’m not the most gifted with computers.
But how does one know someone tried planting porn or anything on someone’s computer and how would someone know it’s coming from the FBI?
Would the FBI have stealth ability?
Also, I’ve noticed Atkinson has a habit of announcing computer issues, invasions, hacking………..perhaps she’s paranoid? I don’t know. But other well known, even better “targets” against the deep state don’t seem to have as many problems with computers as her.
They spied on her before...She found out. Maybe she has a source inside FBI etc...
Shes not paranoid. Her computers were examined by professionals. Obama targeted her because she’s a good investigative journalist and he is not a good person. Have no idea about computers, but she is credible.
“Would the FBI have stealth ability?”
Yes.
I’m not sure how they would know especially since we don’t know what the word “intended” means. Does it mean they actually try to drop files and some software stopped that (firewall sw), or did they discover the files afterwards? A PC has hundreds of thousands to millions of files. Even if you do incremental backups nightly there are thousands of Windows and application files that change. No one looks at the details and says “Hey, where did those new jpegs come from...”
Sharyl is definitely not paranoid & has had very high level analysis done on her computer & evidently on her husband’s as well. You should read her book “Stonewalled” for the details. Deep in the operating system of her computer were planted 3 classified document that could be used against her if & whenever needed - sounds like the child porn plant was a similar situation. Her work situation was also compromised, phones tapped, etc - verified by experts.
At the time, the Obama regime was very unhappy with her - she was reporting on stories such as Fast & Furious, Benghazi, etc. & they wanted to shut her up, big time.
“Stonewalled”: Chapters 1 & 6 to see what was being done to her. Planting child porn on the husband’s computer is beyond evil. She’s got a big lawsuit against certain people in the government responsible for going after her - Rod Rosenstein ring a bell?
If you go to her website, she updates the lawsuit status.
I’ve had the ‘impression’ that the FBI hides information it considers harmful to the left, loses information that could put a Democrat in jail, intentionally abuses its discretion in determining what has a “reasonable expectation of criminal intent” [wrt a Democrat’s very seeming criminality] and works overtime to entrap conservatives that they have determined are “homeland terrorists” without justification. They are evil crooks.
Oh please, cut that out. This woman is not an idiot.
Being caught with K porn instantly destroys the recipients credibility and legitimacy and it’s 99% impossible to argue that somebody else caused that material to land on your computer. It’s the perfect device not just for discrediting someone, but immediately forcing them into very serious legal jeopardy and deep into six figures of legal defense. As such, it’s very hard to imagine the FBI and plenty of other intel agys do not have that capability. Knowing what we know.
Going back to Windows XP days and even before, there were network/ethernet cards that could remotely turn on a computer that was plugged into the AC line but otherwise shut off. Today, people do not have to buy separate network cards, they are universally built into (”integrated with”) the motherboard. Same with video, anyone using normal office-grade video need not buy a sepearate video card, video is built into the m-board.
I don’t know if a typical integrated network “card” bought today or 2-3-4 years ago (it’s still often called a “card” even tho it’s not a separate physical card that you have to buy and install in a slot) has that remote turn-on capability. I’d be surprised if that capability was not there. It’s not rocket science to implement.
I believe S. Atkisson was sitting at her computer multiple times during the past several years and witnessed her computer “turning itself” on and of course booting up. If the FBI can do that, there’s utterly zero question they can implant software that would make it look like the operator of that PC visited and downloaded K porn. As destructive as the mere allegation that someone is involved with K porn is, I can’t imagine they lack the ability to attack someone that way.
I believe Sharyl Atkinson is one of a handful of honest reporters we have. Thus, I believe what she is saying. On top of that, I’m sure the FBI could put ANYTHING on ANYBODY’s computer if they wanted to, including your.
So, I will give her the benefit of the doubt.
But how does one know someone tried planting porn or anything on someone’s computer and how would someone know it’s coming from the FBI?
1. Disconnect your computer from the internet.
This includes removing any Ethernet cables and turning off your Wi-Fi connections. Some of the more obvious signs of active intrusion would be your mouse moving without your control, apps opening in front of your eyes, or files actively being deleted.
Slow internet or unfamiliar programs are not necessarily the result of someone gaining remote access to your computer.
2. Check the list of recently accessed files and apps. Both Windows PCs and Macs make it easy to view a list of the last files you've accessed, as well as your most recently-used apps. If you see something unfamiliar in these lists, someone may have access to your computer.
Windows: To see recently-opened files, press the Windows Key + E to open the File Explorer. At the bottom of the main panel, check the section called "Recent files" to see if there's anything you don't recognize. You can also view recently-opened apps at the top of the Start menu.
Mac: Click the Apple menu at the top-left corner of the screen and select Recent Items. You can now click Applications to see recently-used apps, Documents to see files, and Servers to see a list of remote outgoing connections
3. Open your Task Manager or Activity Monitor.
These utilities can help you determine what is currently running on your computer. Windows – Press Ctrl + Shift + Esc.
Mac – Open the Applications folder in Finder, double-click the Utilities folder, and then double-click Activity Monitor
Look for remote access programs in your list of running programs.
Now that Task Manager or Activity Monitor is open, check the list of currently-running programs, as well as any programs that look unfamiliar or suspicious.
These programs are popular remote access programs that may have been installed without your permission: VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, and TeamViewer.
Look for any programs that seem suspicious or that you don't recognize either. You can perform a web search for the process name if you aren't sure what a program is.
Look for unusually high CPU usage. You'll see this in the Task Manager or the Activity Monitor.
While high CPU usage is common, and is not indicative of an attack, high CPU usage while you're not using your computer could indicate that processes are running in the background, which you may have not authorized. Be aware that high CPU usage could just be a program updating or a torrent downloading in the background that you forgot about.
Would the FBI have stealth ability?
yup but everything is detectable if you look. Also activity on your computer when you're not using it... like on vacation or out of the house that has "something running on it."
Also, I’ve noticed Atkinson has a habit of announcing computer issues, invasions, hacking………..perhaps she’s paranoid? I don’t know. But other well known, even better “targets” against the deep state don’t seem to have as many problems with computers as her.
She probably had a VPN and is paranoid for a reason.
Remember that compromising your opponent is fair ..... for example... say you had an island, found young women/boys that were manipulated by drugs or violence and had sex with politicians, judges, leaders of industry, attorneys, armed forces flag officers, etc......videotaped them and then let them know that you are trying to help them by not releasing the videos but would like a little favor......
Do you ever wonder how "conservatives" always seem to get "enlightened" when they've been in DC for any length of time....
Usually a dead girl or a live boy is the story....... ask Joseph Scarborough about Lori Klausutis..... lots of coincidences involved in politics... some of them fatal.