Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Ex-CBS reporter: Government agency bugged my computer
NY Post ^ | October 27, 2014 | Kyle Smith and Bruce Golding

Posted on 10/27/2014 6:39:08 AM PDT by detective

A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a “government-related entity” that planted classified documents on her computer.

In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was “shocked” and “flabbergasted” at what the analysis revealed.

(Excerpt) Read more at nypost.com ...


TOPICS: Breaking News; Crime/Corruption; Government; News/Current Events; Politics/Elections
KEYWORDS: alreadyposted; attkisson; attkissonframed; bigbother; bigbrother; braking; cbs; cultureofcorruption; dnctalkingpoints; howmanymoretimes; lapdogmedia; obama; obamalegacy; obamascandals; obamunism; orwelliannightmare; pelosicongress; policestate; pravdamedia; reporter; sharylattkisson; stalinisttactics; surveillancestate
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 121-126 next last
To: goodnesswins

Hello.:)


61 posted on 10/27/2014 9:42:00 PM PDT by fatima (Free Hugs Today :))
[ Post Reply | Private Reply | To 7 | View Replies]

To: for-q-clinton
Haha... looks like someone knows how to install malware on a mac via email. Your world must be falling apart,

Are you nine years old? Geez. Some people like macs, some like windows, some like linux. What is it to you? Why are you hijacking an important thread with such fatuous rubbish?

62 posted on 10/27/2014 9:52:39 PM PDT by Bronzewound (Lost Hope & Loose Change)
[ Post Reply | Private Reply | To 58 | View Replies]

To: Swordmaker
For your reference:

The highly sophisticated hacking of Sharyl Attkisson's computers

And an inspection revealed that an extra fiber-optics line had been installed in Attkisson’s home without her knowledge.
63 posted on 10/27/2014 9:53:01 PM PDT by PA Engineer (Liberate America from the Occupation Media.)
[ Post Reply | Private Reply | To 59 | View Replies]

To: PA Engineer

Whoa


64 posted on 10/27/2014 9:56:28 PM PDT by goodnesswins (R.I.P. Doherty, Smith, Stevens, Woods)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Swordmaker
With physical access, on any computer, they can do anything.

Really spooky activity. From the article:

Further scrutiny of her personal desktop proves that “the interlopers were able to co-opt my iMac and operate it remotely, as if they were sitting in front of it.” And an inspection revealed that an extra fiber-optics line had been installed in Attkisson’s home without her knowledge.

65 posted on 10/27/2014 10:00:52 PM PDT by Bronzewound (Lost Hope & Loose Change)
[ Post Reply | Private Reply | To 59 | View Replies]

To: Swordmaker
Big TY!
66 posted on 10/27/2014 10:03:28 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 56 | View Replies]

To: for-q-clinton
Haha... looks like someone knows how to install malware on a mac via email. Your world must be falling apart,

It isn't and still isn't. The memory locations for email are non-executable. There is no way possible for anything in email to execute for-q-clinton. I am familiar with the code and architecture of the Mac. YOU ARE NOT.

Many of the best minds in the world have been trying to do what you claim for 15 years and NOT succeeding. That is history. I really do not believe that suddenly someone has found a way to install software through email on a Mac. . . not with the protections in place. . . and not without the cooperation of someone at the keyboard. And if they have someone at the keyboard, they don't need email.

The fact they had to destroy 48 hours of log-in records shows they have somehow created a user on her computer. . . not an email malware. That, again implies physical access with an administrator access. My guess is she has been operating as an administrator. and seldom shut her user partition down.

Where are her backups? Her TimeMachine backups. These are dead easy to manage and she wasn't using them? Stupid user shows me that she was not protecting her computer. Her password was probably "Password", or her birthday.

I can, however, believe what Sheryl Attkisson said about someone breaking into her home and going through her computer. Apple Macs HAVE been compromised with physical access. That is certainly possible. Once they have had that kind of access, and they are famous for that kind of operation, they they have access. I also believe she could have been using a Windows install on her Mac because CBS issues Windows laptops to their employees and she may have installed Parallels or VMWare to make things easier by having Microsoft Word, Excell, and Powerpoint on both with the same versions. That opens a lot of doors.

What I cannot believe is that it was done with an "innocuous" email. That is not at all possible.

67 posted on 10/27/2014 10:05:52 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 58 | View Replies]

To: Swordmaker

Bump


68 posted on 10/27/2014 10:09:38 PM PDT by Jet Jaguar (Resist in place.)
[ Post Reply | Private Reply | To 59 | View Replies]

To: for-q-clinton
Haha... looks like someone knows how to install malware on a mac via email. Your world must be falling apart

Exactly how much of an idiot do you want to look like, for-q-clinton???

And an inspection revealed that an extra fiber-optics line had been installed in Attkisson’s home without her knowledge.
I did not say a physical hacking was not possible and if they installed a freaking unauthorized fiber optic line into her home, you idiot, they had MORE then just physical access to her computer; they had free access to everything at her house! There was no simple remote "hacking" by an stupid "innocuous" email. They installed it manually. Now YOU give it a rest.
69 posted on 10/27/2014 10:15:59 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 58 | View Replies]

To: PA Engineer
And an inspection revealed that an extra fiber-optics line had been installed in Attkisson’s home without her knowledge.

I remember a day when something like this would have made a very large, if not banner headline.

70 posted on 10/27/2014 10:19:19 PM PDT by Bronzewound (Lost Hope & Loose Change)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Bronzewound

I agree. Now we have the tree falling in the forest sound thing going on.


71 posted on 10/27/2014 10:30:29 PM PDT by PA Engineer (Liberate America from the Occupation Media.)
[ Post Reply | Private Reply | To 70 | View Replies]

To: for-q-clinton

She said elsewhere that her personal iMac was running Windows under Bootcamp - so it was a Windows machine for all intents and purposes. She’s switched to Mac OS X on her iMac and gotten a Mac laptop since. Remember, the NSA is complaining that they *can’t* get into Mac OS X and iOS machines...


72 posted on 10/27/2014 10:41:11 PM PDT by Spktyr (Overwhelmingly superior firepower and the willingness to use it is the only proven peace solution.)
[ Post Reply | Private Reply | To 57 | View Replies]

To: PA Engineer; for-q-clinton; Spktyr; rdb3; Bronzewound
And an inspection revealed that an extra fiber-optics line had been installed in Attkisson’s home without her knowledge.

How long do you think for-q-clinton will keep beating this dead horse, hoping it will gallop to the finish line?

However, my point about the ease of sneaking compromising and incriminating documents onto ALL of our computers stands. I thank him for that, because had he not brought my attention to thinking about it, I would not have realized how easy it is for anything to be placed in our computers for later revelation by someone who KNOWS where to look, when we haven't a clue it's there! Steganography allows ANYTHING to be hidden inside the most innocent of graphics and all they have to do is claim that WE were the ones hiding it there! We would be the ones then placed in the unenviable position of proving our innocence!

Many years ago, one of my professional clients called me because his receptionist's computer (a Windows XP machine) had slowed to a dead crawl. It literally took 45 minutes to boot to a usable state and then it was 20-40 seconds between clicking and the click taking effect. I came and looked at it and discovered it had been hijacked as a "kiddieporn" server!!!!

Had he taken it into normal computer repair shop, he would most likely probably have been hauled in by the police, trying to explain where all that stuff came from. because the staff at one of those places would have called the cops. I promptly deleted it. . . restored his system and got it running normally. Ran up-to-date anti-virus and anti-Trojan ware, yet, 15 minutes later, it was ALL back, taking over the computer again! It was one of the first Root Kit malware. I had to wipe the hard drive to a low level format and re-install everything to get rid of the damn thing. That DID come in on an innocuous email that was not even opened by anyone at the office!

I found another infected Windows PC–recognized it instantly–a couple of weeks later in, shall we say, a very sensitive location that shall go forever nameless, whose removed hard drive wound up in even a more sensitive location under seal with my sealed, sworn statement of what was on it. . . and which I will say no more about!

The exact same thing happened two months earlier to a businessman in England. . . but he made the major mistake of taking it to a big-name shop for repair. 100,000 pounds later, minus his business, his wife, his family, his house, his cars, and his reputation, a forensic computer specialist finally testified he had nothing to do with it and that it came in on a malicious email!. The Crown Court apologized for its error.

This malicious document thing is insidious for us.

73 posted on 10/27/2014 10:44:15 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Spktyr
She said elsewhere that her personal iMac was running Windows under Bootcamp - so it was a Windows machine for all intents and purposes. She’s switched to Mac OS X on her iMac and gotten a Mac laptop since. Remember, the NSA is complaining that they *can’t* get into Mac OS X and iOS machines...

Given the circumstances, and the year, 2012, I suspect they could have gotten into the iMac and installed something as well as into a Windows PC. They did, after all, have physical access. I can think of about four ways to do it. She could have nailed it down but most users don't take those steps.

I had a hint about it being Windows because of the speed of the file deletions she mentioned. That kind of visual representation is only something you see on a Windows display.

74 posted on 10/27/2014 10:50:03 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 72 | View Replies]

To: Swordmaker
> How long do you think for-q-clinton will keep beating this dead horse, hoping it will gallop to the finish line?

Nah, I think even our resident "nine-year-old" anti-Apple troll finally recognizes this isn't about Apple or Mac or OS-X, but about yet another compromised Windows PC, and some much more insidious things (like that fiber line).

"Gallop to the finish line"? Ain't no galloping on the menu... that horse is dead, Jim, and the finish line is nowhere in sight. That's not to say a truly dedicated troll can't keep making an even bigger fool of himself, but maybe he'll finally show some sense. Maybe...

75 posted on 10/27/2014 10:57:31 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 73 | View Replies]

To: Lazamataz
The only reason they don't come after us, is we do not matter enough.



Much Wisdom there Laz

76 posted on 10/28/2014 12:03:19 AM PDT by itsahoot (Voting for a Progressive RINO is the same as voting for any other Tyrant.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Darksheare
“Election fraud instead of voter fraud “

They are one and the same.

Semantics, but there is a difference. Voter fraud is illegal voters and requires people to actually show up and vote.

Election fraud can be done with the click of a mouse, which is why Voter ID does not matter, it is just a smoke screen for their real agenda.

77 posted on 10/28/2014 12:08:40 AM PDT by itsahoot (Voting for a Progressive RINO is the same as voting for any other Tyrant.)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Swordmaker

But you earlier grabbed the line about it was installed via an email. So which is it?


78 posted on 10/28/2014 4:05:30 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 73 | View Replies]

To: kabar

And who is going to appoint a special prosecutor? Eric Holder? The useless congress? Not gonna happen. I never would have believed the United States of America could have such a corrupt administration and nothing would be done about it.


79 posted on 10/28/2014 4:26:00 AM PDT by ilovesarah2012
[ Post Reply | Private Reply | To 3 | View Replies]

To: McGruff
Number One? it sounds more like Number 2. This entire administration has been a Patrick McGoohan screaming nightmare.

80 posted on 10/28/2014 5:12:35 AM PDT by jmcenanly ("The more corrupt the state, the more laws." Tacitus, Publius Cornelius)
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 121-126 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson