Posted on 10/27/2014 6:39:08 AM PDT by detective
A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a government-related entity that planted classified documents on her computer.
In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was shocked and flabbergasted at what the analysis revealed.
(Excerpt) Read more at nypost.com ...
Actually, Sharyl was running Windows on that Mac. Thats what I heard.
And Lord Holder will appoint the prosecutor...and the victims will be us...
The reason you appoint a special prosecutor is to get someone outside of government.
A special prosecutor generally is a lawyer from outside the government appointed by an attorney general or, in the United States, by Congress to investigate a government official for misconduct while in office. A reasoning for such an appointment is that the governmental branch or agency may have political connections to those it might be asked to investigate. Inherently, this creates a conflict of interest and a solution is to have someone from outside the department lead the investigation.
Not to worry, dude. Darrell Issa is going to get right on it.
Sir.
The only lawyers who do the special prosecutor thing are desperately trying to get their name in the paper. They also answer to someone in the government.
The only way it works is if they are part of the .gov going after another part
Follow the NY Post link to read the entire article.
Amazon link to Sharyl's new book.
Sharyl
Attkisson
Ping!
Want on or off this new ping list? Just drop me a FReep mail.
http://www.freerepublic.com/focus/f-news/3219999/posts?page=14#14
I guess Linux isn’t safe?
Maybe use an old analog typewriter, then scan it in and upload....
Takes time, but harder to hack....
I remember some country’s reporters / government guys / ?? did that very thing ... went to the old style machines because they weren’t hackable....
Um, no. She had Windows machines but *now* bought a Mac to replace them.
Nice try, fro-q-Clinton, but her own statements seem to deny that.
"The breach was accomplished through an otherwise innocuous e-mail that Attkisson says she got in February 2012, then twice redone and refreshed through a satellite hookup and a Wi-Fi connection at a Ritz-Carlton hotel."
Since you don't use a Mac you don't know much about some of the reasons why this isn't possible. Emails on a Mac have never been intimately connected with the Operating System as they were in Windows. Attachments cannot be run from an email. It would have to be deliberately downloaded by the user to the downloads folder at which point the OS vets it for known trojan malware. From there, another deliberate act by the user is required to either mount a virtual drive for installation, or run an installer, bot actions require an administrator's user name and password. If it modifies ANYTHING in the user accessible portion of operating system, the user must again enter the admin's name and password. But to hide something "deep in the operating system" requires a UNIX Super User's access, which is not even activated on a Mac as shipped!
No one has found a way to install malware on a Mac without the active participation of a user with an administrator password. Finally, she refers to other Microsoft applications such as Skype. . . and that leads me to believe her laptop is a Windows computer.
I heard she had a mac...looks like there are some serious security issues on it for them to remotely install malware! Or installed by just clicking on a link in an email.
Nice try, fro-q-Clinton, but her own statements seem to deny that.
"The breach was accomplished through an otherwise innocuous e-mail that Attkisson says she got in February 2012, then twice redone and refreshed through a satellite hookup and a Wi-Fi connection at a Ritz-Carlton hotel."
Since you don't use a Mac you don't know much about some of the reasons why this isn't possible. Emails on a Mac have never been intimately connected with the Operating System as they were in Windows. Attachments cannot be run from an email. It would have to be deliberately downloaded by the user to the downloads folder at which point the OS vets it for known trojan malware. From there, another deliberate act by the user is required to either mount a virtual drive for installation, or run an installer, bot actions require an administrator's user name and password. If it modifies ANYTHING in the user accessible portion of operating system, the user must again enter the admin's name and password. But to hide something "deep in the operating system" requires a UNIX Super User's access, which is not even activated on a Mac as shipped!
No one has found a way to install malware on a Mac without the active participation of a user with an administrator password. Finally, she refers to other Microsoft applications such as Skype. . . and that leads me to believe her laptop is a Windows computer.
Now, that being said, there IS a way to sneak any documentsfor later discovery when the time is "convenient" to be foundonto anyone's computer, Windows, LINUX, or Mac, who is not paying attention to their email in this day and age. If one does not toss everything on a regular basis, like most of us, junk builds up. All of us get stuff with graphics in it that seem innocuous such as that cute cat photo you thought came from your Aunt Ginny. . . or those really cool pictures of your high school classmates at the last reunion someone sent you. Or somebody found a pic of you in that 1954 Hudson hornet, your first car you owned. You didn't download them, or maybe you did, but you kept the emails, knowing you could find them again. In any case, the photos attachments are in your email databases.
Buried inside those graphic files are As I said, nice try at FUD. . . but no banana. --------------
Now, that being said, there IS a way to sneak any documentsfor later discovery when the time is "convenient" to be foundonto anyone's computer, Windows, LINUX, or Mac, who is not paying attention to their email in this day and age. If one does not toss everything on a regular basis, like most of us, junk builds up. All of us get stuff with graphics in it that seem innocuous such as that cute cat photo you thought came from your Aunt Ginny. . . or those really cool pictures of your high school classmates at the last reunion someone sent you. Or somebody found a pic of you in that 1954 Hudson hornet, your first car you owned. You didn't download them, or maybe you did, but you kept the emails, knowing you could find them again. In any case, the photos attachments are in your email databases.
Buried inside those graphic files are steganographic additions hidden within the picture. That steganographic addition can contain anything the person wants, say a "TOP SECRET" or "CLASSIFIED" CIA file, and not affect the image quality or even the file size. Later, it can be "found" by someone who knows exactly where to look.
Then there are the regular emails that come in with the 70k Zip attachments we all ignore. You know, the ones that claim to contain the secret formula for losing weight, or those great nude photos of Jennifer Anniston, that are only 70k in size, so no one bothers to open them, figuring they can't be safe. . . and eventually we just ignore them, skipping over them. A lot just pile up, unopened, undeleted. . . but STILL in the email database "deep in the operating system" where who knows where they'll eventually be found. . . and what is really hidden in them. We Mac users have long assumed they carry Windows malware, but now I wonder.
So, unless you are very diligent and delete everything, they could put anything on your computer that while not a malware APP, it could be a malicious stealthy dirty bomb document!
So many of my clients have literally thousands of unread emails in their inboxes like this. . . and read emails they're keeping just because. I'm guilty too.
I have been going through my email and deleting everything I know is not securely safe, unneeded, suspicious, junk I've ignored, etc.
Nice try...I heard it on Fox news today..She clearly said my mac was infected. Now she may have been running windows...I’m not sure. but your “evidence” of saying it couldn’t be done on a mac is BS. As been proven time and time again...in which you then say you never said it couldn’t be done.
However, my reply to him got me to thinking that all of us who speak up about the malfeasence of the Obama administration are ALL vulnerable to this sort of "malicious hidden document" attack! Therefore, it is the second half of that reply I think all Freepers, no, ALL CONSERVATIVES, really NEED to consider and take sodme action on. Please, seriously think about your email files you've receive and are keeping. I certainly am. Are they full of the type I described. I see that level of email bankruptcy daily with hundreds, if not thousands of junk emails in their inbox files among my clients. DO SOMETHING about it. Do not ignore your back-ups, either!PING!
If you want on or off the Mac Ping List, Freepmail me.
http://www.foxnews.com/politics/2014/10/27/highly-sophisticated-hacking-sharyl-attkisson-computers/
See she had a Mac. So shut it!
Haha... looks like someone knows how to install malware on a mac via email. Your world must be falling apart,
However, she says:
"ATTKISSON: Let me just say, whoever did it, to come into a private citizen's home, whether I'm a journalist or not, and look in my family's computer and look in my work computer and go through it like they did,
This was right after the forensic researchers went through it. I'd say it looks as if someone had physical access. If she left her computers running, then they could install anything hardware or software. CBS issues Windows computers, so I'd bet she was using a Windows install as well on the Mac . . . my point was it wasn't done by an innocuous email.
With physical access, on any computer, they can do anything.
Jesus Christ: You cant impeach Him and He aint going to resign.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.