Posted on 10/27/2014 6:39:08 AM PDT by detective
A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a government-related entity that planted classified documents on her computer.
In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was shocked and flabbergasted at what the analysis revealed.
(Excerpt) Read more at nypost.com ...
Hello.:)
Are you nine years old? Geez. Some people like macs, some like windows, some like linux. What is it to you? Why are you hijacking an important thread with such fatuous rubbish?
Whoa
Really spooky activity. From the article:
Further scrutiny of her personal desktop proves that the interlopers were able to co-opt my iMac and operate it remotely, as if they were sitting in front of it. And an inspection revealed that an extra fiber-optics line had been installed in Attkissons home without her knowledge.
It isn't and still isn't. The memory locations for email are non-executable. There is no way possible for anything in email to execute for-q-clinton. I am familiar with the code and architecture of the Mac. YOU ARE NOT.
Many of the best minds in the world have been trying to do what you claim for 15 years and NOT succeeding. That is history. I really do not believe that suddenly someone has found a way to install software through email on a Mac. . . not with the protections in place. . . and not without the cooperation of someone at the keyboard. And if they have someone at the keyboard, they don't need email.
The fact they had to destroy 48 hours of log-in records shows they have somehow created a user on her computer. . . not an email malware. That, again implies physical access with an administrator access. My guess is she has been operating as an administrator. and seldom shut her user partition down.
Where are her backups? Her TimeMachine backups. These are dead easy to manage and she wasn't using them? Stupid user shows me that she was not protecting her computer. Her password was probably "Password", or her birthday.
I can, however, believe what Sheryl Attkisson said about someone breaking into her home and going through her computer. Apple Macs HAVE been compromised with physical access. That is certainly possible. Once they have had that kind of access, and they are famous for that kind of operation, they they have access. I also believe she could have been using a Windows install on her Mac because CBS issues Windows laptops to their employees and she may have installed Parallels or VMWare to make things easier by having Microsoft Word, Excell, and Powerpoint on both with the same versions. That opens a lot of doors.
What I cannot believe is that it was done with an "innocuous" email. That is not at all possible.
Bump
Exactly how much of an idiot do you want to look like, for-q-clinton???
And an inspection revealed that an extra fiber-optics line had been installed in Attkissons home without her knowledge.I did not say a physical hacking was not possible and if they installed a freaking unauthorized fiber optic line into her home, you idiot, they had MORE then just physical access to her computer; they had free access to everything at her house! There was no simple remote "hacking" by an stupid "innocuous" email. They installed it manually. Now YOU give it a rest.
I remember a day when something like this would have made a very large, if not banner headline.
I agree. Now we have the tree falling in the forest sound thing going on.
She said elsewhere that her personal iMac was running Windows under Bootcamp - so it was a Windows machine for all intents and purposes. She’s switched to Mac OS X on her iMac and gotten a Mac laptop since. Remember, the NSA is complaining that they *can’t* get into Mac OS X and iOS machines...
How long do you think for-q-clinton will keep beating this dead horse, hoping it will gallop to the finish line?
However, my point about the ease of sneaking compromising and incriminating documents onto ALL of our computers stands. I thank him for that, because had he not brought my attention to thinking about it, I would not have realized how easy it is for anything to be placed in our computers for later revelation by someone who KNOWS where to look, when we haven't a clue it's there! Steganography allows ANYTHING to be hidden inside the most innocent of graphics and all they have to do is claim that WE were the ones hiding it there! We would be the ones then placed in the unenviable position of proving our innocence!
Many years ago, one of my professional clients called me because his receptionist's computer (a Windows XP machine) had slowed to a dead crawl. It literally took 45 minutes to boot to a usable state and then it was 20-40 seconds between clicking and the click taking effect. I came and looked at it and discovered it had been hijacked as a "kiddieporn" server!!!!
Had he taken it into normal computer repair shop, he would most likely probably have been hauled in by the police, trying to explain where all that stuff came from. because the staff at one of those places would have called the cops. I promptly deleted it. . . restored his system and got it running normally. Ran up-to-date anti-virus and anti-Trojan ware, yet, 15 minutes later, it was ALL back, taking over the computer again! It was one of the first Root Kit malware. I had to wipe the hard drive to a low level format and re-install everything to get rid of the damn thing. That DID come in on an innocuous email that was not even opened by anyone at the office!
I found another infected Windows PCrecognized it instantlya couple of weeks later in, shall we say, a very sensitive location that shall go forever nameless, whose removed hard drive wound up in even a more sensitive location under seal with my sealed, sworn statement of what was on it. . . and which I will say no more about!
The exact same thing happened two months earlier to a businessman in England. . . but he made the major mistake of taking it to a big-name shop for repair. 100,000 pounds later, minus his business, his wife, his family, his house, his cars, and his reputation, a forensic computer specialist finally testified he had nothing to do with it and that it came in on a malicious email!. The Crown Court apologized for its error.
This malicious document thing is insidious for us.
Given the circumstances, and the year, 2012, I suspect they could have gotten into the iMac and installed something as well as into a Windows PC. They did, after all, have physical access. I can think of about four ways to do it. She could have nailed it down but most users don't take those steps.
I had a hint about it being Windows because of the speed of the file deletions she mentioned. That kind of visual representation is only something you see on a Windows display.
Nah, I think even our resident "nine-year-old" anti-Apple troll finally recognizes this isn't about Apple or Mac or OS-X, but about yet another compromised Windows PC, and some much more insidious things (like that fiber line).
"Gallop to the finish line"? Ain't no galloping on the menu... that horse is dead, Jim, and the finish line is nowhere in sight. That's not to say a truly dedicated troll can't keep making an even bigger fool of himself, but maybe he'll finally show some sense. Maybe...
Much Wisdom there Laz
They are one and the same.
Semantics, but there is a difference. Voter fraud is illegal voters and requires people to actually show up and vote.
Election fraud can be done with the click of a mouse, which is why Voter ID does not matter, it is just a smoke screen for their real agenda.
But you earlier grabbed the line about it was installed via an email. So which is it?
And who is going to appoint a special prosecutor? Eric Holder? The useless congress? Not gonna happen. I never would have believed the United States of America could have such a corrupt administration and nothing would be done about it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.