Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Red Badger

I realize I’m not the most gifted with computers.

But how does one know someone tried planting porn or anything on someone’s computer and how would someone know it’s coming from the FBI?

Would the FBI have stealth ability?

Also, I’ve noticed Atkinson has a habit of announcing computer issues, invasions, hacking………..perhaps she’s paranoid? I don’t know. But other well known, even better “targets” against the deep state don’t seem to have as many problems with computers as her.


12 posted on 05/12/2022 6:08:36 AM PDT by David Chase
[ Post Reply | Private Reply | To 1 | View Replies ]


To: David Chase

They spied on her before...She found out. Maybe she has a source inside FBI etc...


15 posted on 05/12/2022 6:10:53 AM PDT by hollywood12345
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

Shes not paranoid. Her computers were examined by professionals. Obama targeted her because she’s a good investigative journalist and he is not a good person. Have no idea about computers, but she is credible.


18 posted on 05/12/2022 6:12:39 AM PDT by vivenne (")
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

“Would the FBI have stealth ability?”

Yes.


27 posted on 05/12/2022 6:26:12 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

I’m not sure how they would know especially since we don’t know what the word “intended” means. Does it mean they actually try to drop files and some software stopped that (firewall sw), or did they discover the files afterwards? A PC has hundreds of thousands to millions of files. Even if you do incremental backups nightly there are thousands of Windows and application files that change. No one looks at the details and says “Hey, where did those new jpegs come from...”


29 posted on 05/12/2022 6:29:02 AM PDT by BiglyCommentary
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

Sharyl is definitely not paranoid & has had very high level analysis done on her computer & evidently on her husband’s as well. You should read her book “Stonewalled” for the details. Deep in the operating system of her computer were planted 3 classified document that could be used against her if & whenever needed - sounds like the child porn plant was a similar situation. Her work situation was also compromised, phones tapped, etc - verified by experts.

At the time, the Obama regime was very unhappy with her - she was reporting on stories such as Fast & Furious, Benghazi, etc. & they wanted to shut her up, big time.

“Stonewalled”: Chapters 1 & 6 to see what was being done to her. Planting child porn on the husband’s computer is beyond evil. She’s got a big lawsuit against certain people in the government responsible for going after her - Rod Rosenstein ring a bell?

If you go to her website, she updates the lawsuit status.


30 posted on 05/12/2022 6:32:39 AM PDT by Qiviut (#standup "Don't let your children die on the hill you refuse to fight on.")
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

I’ve had the ‘impression’ that the FBI hides information it considers harmful to the left, loses information that could put a Democrat in jail, intentionally abuses its discretion in determining what has a “reasonable expectation of criminal intent” [wrt a Democrat’s very seeming criminality] and works overtime to entrap conservatives that they have determined are “homeland terrorists” without justification. They are evil crooks.


44 posted on 05/12/2022 6:43:04 AM PDT by Gaffer
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

Oh please, cut that out. This woman is not an idiot.


45 posted on 05/12/2022 6:43:43 AM PDT by dforest (We have to put a stop to this now.)
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

Being caught with K porn instantly destroys the recipients credibility and legitimacy and it’s 99% impossible to argue that somebody else caused that material to land on your computer. It’s the perfect device not just for discrediting someone, but immediately forcing them into very serious legal jeopardy and deep into six figures of legal defense. As such, it’s very hard to imagine the FBI and plenty of other intel agys do not have that capability. Knowing what we know.

Going back to Windows XP days and even before, there were network/ethernet cards that could remotely turn on a computer that was plugged into the AC line but otherwise shut off. Today, people do not have to buy separate network cards, they are universally built into (”integrated with”) the motherboard. Same with video, anyone using normal office-grade video need not buy a sepearate video card, video is built into the m-board.

I don’t know if a typical integrated network “card” bought today or 2-3-4 years ago (it’s still often called a “card” even tho it’s not a separate physical card that you have to buy and install in a slot) has that remote turn-on capability. I’d be surprised if that capability was not there. It’s not rocket science to implement.

I believe S. Atkisson was sitting at her computer multiple times during the past several years and witnessed her computer “turning itself” on and of course booting up. If the FBI can do that, there’s utterly zero question they can implant software that would make it look like the operator of that PC visited and downloaded K porn. As destructive as the mere allegation that someone is involved with K porn is, I can’t imagine they lack the ability to attack someone that way.


68 posted on 05/12/2022 7:18:11 AM PDT by Attention Surplus Disorder (Apoplectic is where we want them)
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase

I believe Sharyl Atkinson is one of a handful of honest reporters we have. Thus, I believe what she is saying. On top of that, I’m sure the FBI could put ANYTHING on ANYBODY’s computer if they wanted to, including your.

So, I will give her the benefit of the doubt.


79 posted on 05/12/2022 7:45:14 AM PDT by Cen-Tejas
[ Post Reply | Private Reply | To 12 | View Replies ]

To: David Chase
I realize I’m not the most gifted with computers.

But how does one know someone tried planting porn or anything on someone’s computer and how would someone know it’s coming from the FBI?

1. Disconnect your computer from the internet.

This includes removing any Ethernet cables and turning off your Wi-Fi connections. Some of the more obvious signs of active intrusion would be your mouse moving without your control, apps opening in front of your eyes, or files actively being deleted.

Slow internet or unfamiliar programs are not necessarily the result of someone gaining remote access to your computer.

2. Check the list of recently accessed files and apps. Both Windows PCs and Macs make it easy to view a list of the last files you've accessed, as well as your most recently-used apps. If you see something unfamiliar in these lists, someone may have access to your computer.

Windows: To see recently-opened files, press the Windows Key + E to open the File Explorer. At the bottom of the main panel, check the section called "Recent files" to see if there's anything you don't recognize. You can also view recently-opened apps at the top of the Start menu.

Mac: Click the Apple menu at the top-left corner of the screen and select Recent Items. You can now click Applications to see recently-used apps, Documents to see files, and Servers to see a list of remote outgoing connections

3. Open your Task Manager or Activity Monitor.

These utilities can help you determine what is currently running on your computer. Windows – Press Ctrl + Shift + Esc.

Mac – Open the Applications folder in Finder, double-click the Utilities folder, and then double-click Activity Monitor

Look for remote access programs in your list of running programs.

Now that Task Manager or Activity Monitor is open, check the list of currently-running programs, as well as any programs that look unfamiliar or suspicious.

These programs are popular remote access programs that may have been installed without your permission: VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, and TeamViewer.

Look for any programs that seem suspicious or that you don't recognize either. You can perform a web search for the process name if you aren't sure what a program is.

Look for unusually high CPU usage. You'll see this in the Task Manager or the Activity Monitor.

While high CPU usage is common, and is not indicative of an attack, high CPU usage while you're not using your computer could indicate that processes are running in the background, which you may have not authorized. Be aware that high CPU usage could just be a program updating or a torrent downloading in the background that you forgot about.

Would the FBI have stealth ability?

yup but everything is detectable if you look. Also activity on your computer when you're not using it... like on vacation or out of the house that has "something running on it."

Also, I’ve noticed Atkinson has a habit of announcing computer issues, invasions, hacking………..perhaps she’s paranoid? I don’t know. But other well known, even better “targets” against the deep state don’t seem to have as many problems with computers as her.

She probably had a VPN and is paranoid for a reason.

Remember that compromising your opponent is fair ..... for example... say you had an island, found young women/boys that were manipulated by drugs or violence and had sex with politicians, judges, leaders of industry, attorneys, armed forces flag officers, etc......videotaped them and then let them know that you are trying to help them by not releasing the videos but would like a little favor......

Do you ever wonder how "conservatives" always seem to get "enlightened" when they've been in DC for any length of time....

Usually a dead girl or a live boy is the story....... ask Joseph Scarborough about Lori Klausutis..... lots of coincidences involved in politics... some of them fatal.

95 posted on 05/12/2022 10:48:14 AM PDT by Dick Vomer (2 Timothy 4:7 deo duce ferro comitantes)
[ Post Reply | Private Reply | To 12 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson