Posted on 05/12/2022 6:02:51 AM PDT by Red Badger
Sharyl Attkisson Says FBI Intended to Plant Child Porn on Husband's Computer pic.twitter.com/3Sa71NKqgq
— Breitbart News (@BreitbartNews) May 11, 2022
Stunning testimony today from Sharyl Attkisson.
VIDEO AT LINK.................
Sharyl Attkisson: "Rather than demanding accountability, I think we've slipped into a sort of 1984 style of acceptance." pic.twitter.com/JbafKxKJVI
— The Post Millennial (@TPostMillennial) May 10, 2022
Related background info: Jonathan Schulte was also charged with possession of K-porn:
Good guy or bad guy? I’m lately inclined to believe he’s good. As far as I know he’s still fighting charges in court.
Is this happening to her today, or is this just being made public today.
Isn’t she just talking about what was going on previously?
When you have to depend on the MSM, which depends on Twitter, to get your information, all concept of timing is lost.
Or playing up the apoplexy for the larger show.
I am surprised that there are so many on FR that have no understanding of modern day technology.
I certainly am not qualified to teach a course, and I wish an expert would comment.
But for a clue: Pull up your command line. Type “top” and watch what happens.
Every contact or connection your computer is making is displayed in real time. You will see it changing constantly.
This is basic stuff and it will not tell you the FBI is tapping your machine, but it gives you an idea where the expert might start.
Each of the IP’s can then be backtracked to determine what organization or what computer made the connection.
Obviously the government spy agencies have a means of disguise, but there are organizations that can overcome that tactic.
Computer security is a big industry. There are people that know how to break into your computer and many others who know how to detect break-ins, defeat them and report them.
Obviously Atkisson has employed one for her defense.
The deep state has the goods on all the elected people in Washington. They simply blackmail anyone who crosses them. Only Trump wouldn’t comply and when the blackmail came he said let her buck! That is why the numerous coup attempts and out right election fraud in 2020.
The bureaucracy is in charge of the country. Unelected, unaccountable, out of control, unethical as a crack addicted used car salesman, criminal thugs and dumber than a glob of goat snot. They have destroyed the country in their quest for power and retaining it. When and if a reckoning comes they should be top priority on the list for justice being served.
Well said and all true.
Rebuild? Why?
Lol, your concern is duly noted.
Plus, she's an example to others.
I go one such site when I tried to go to coasttocoastam.com maybe 25 years ago. I missed the am part of the url and got a naked bodies site. Fortunately it was adults which could ding up in the unlikely event that I were to run for office but wouldn’t get me arrested by feds. Now I have software that blocks these sites and emails with porn urls.
Don’t you want somebody observing the mass-shooters and terrorists? How else are we going to know who they are so quick after the incident?
The upper echelon SHOULD be in PRISON!
We owe the former Soviet Union a nonstop series of apologies.
Good to protect your self. :)
But how does one know someone tried planting porn or anything on someone’s computer and how would someone know it’s coming from the FBI?
1. Disconnect your computer from the internet.
This includes removing any Ethernet cables and turning off your Wi-Fi connections. Some of the more obvious signs of active intrusion would be your mouse moving without your control, apps opening in front of your eyes, or files actively being deleted.
Slow internet or unfamiliar programs are not necessarily the result of someone gaining remote access to your computer.
2. Check the list of recently accessed files and apps. Both Windows PCs and Macs make it easy to view a list of the last files you've accessed, as well as your most recently-used apps. If you see something unfamiliar in these lists, someone may have access to your computer.
Windows: To see recently-opened files, press the Windows Key + E to open the File Explorer. At the bottom of the main panel, check the section called "Recent files" to see if there's anything you don't recognize. You can also view recently-opened apps at the top of the Start menu.
Mac: Click the Apple menu at the top-left corner of the screen and select Recent Items. You can now click Applications to see recently-used apps, Documents to see files, and Servers to see a list of remote outgoing connections
3. Open your Task Manager or Activity Monitor.
These utilities can help you determine what is currently running on your computer. Windows – Press Ctrl + Shift + Esc.
Mac – Open the Applications folder in Finder, double-click the Utilities folder, and then double-click Activity Monitor
Look for remote access programs in your list of running programs.
Now that Task Manager or Activity Monitor is open, check the list of currently-running programs, as well as any programs that look unfamiliar or suspicious.
These programs are popular remote access programs that may have been installed without your permission: VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, and TeamViewer.
Look for any programs that seem suspicious or that you don't recognize either. You can perform a web search for the process name if you aren't sure what a program is.
Look for unusually high CPU usage. You'll see this in the Task Manager or the Activity Monitor.
While high CPU usage is common, and is not indicative of an attack, high CPU usage while you're not using your computer could indicate that processes are running in the background, which you may have not authorized. Be aware that high CPU usage could just be a program updating or a torrent downloading in the background that you forgot about.
Would the FBI have stealth ability?
yup but everything is detectable if you look. Also activity on your computer when you're not using it... like on vacation or out of the house that has "something running on it."
Also, I’ve noticed Atkinson has a habit of announcing computer issues, invasions, hacking………..perhaps she’s paranoid? I don’t know. But other well known, even better “targets” against the deep state don’t seem to have as many problems with computers as her.
She probably had a VPN and is paranoid for a reason.
Remember that compromising your opponent is fair ..... for example... say you had an island, found young women/boys that were manipulated by drugs or violence and had sex with politicians, judges, leaders of industry, attorneys, armed forces flag officers, etc......videotaped them and then let them know that you are trying to help them by not releasing the videos but would like a little favor......
Do you ever wonder how "conservatives" always seem to get "enlightened" when they've been in DC for any length of time....
Usually a dead girl or a live boy is the story....... ask Joseph Scarborough about Lori Klausutis..... lots of coincidences involved in politics... some of them fatal.
Where would they be without the helpful agents of the FBI?
So now Hunter Biden can blame the FBI for his laptop.
I’m sure they would gladly take the blame.
You don’t think Trump and his family were spied on?
Lots of Neo-Cons and Soros trolls inhabit FR.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.