Image 01 Image 03

Attkisson hack

Attkisson hack

Sharyl Attkisson of CBS News, who has been one of the few mainstream media reporters to push hard on the Benghazi cover up, for which she was attacked by Obama defenders along with Jonathan Karl and Stephen Hayes.

Several weeks ago it was revealed that her computer was compromised.

CBS issued a statement today about its findings.

https://twitter.com/SharylAttkisson/status/345550851974246402
https://twitter.com/SharylAttkisson/status/345550891807551489
https://twitter.com/SharylAttkisson/status/345551044312436737
https://twitter.com/SharylAttkisson/status/345551242325540865
https://twitter.com/SharylAttkisson/status/345551303067459585
https://twitter.com/SharylAttkisson/status/345551509263622145
https://twitter.com/SharylAttkisson/status/345551943667695617

DONATE

Donations tax deductible
to the full extent allowed by law.

Comments

Henry Hawkins | June 14, 2013 at 12:10 pm

Man, what’s a guy gotta do to get a h/t off the tip line…

Naw, time’s are too close.

Anyway, vis-à-vis Todashaev, if the FBI come knocking, Ms. Attkisson, DON’T ANSWER THE DOOR.

Well, at least we know it wasn’t the government doing the spying, because they already had everything using the NSA – no need to hack into her computer. That just leaves CBS as the only suspect. 🙂

Gee …. SURPRISED? Not me. This country is going down hill faster than a speeding bullet.

Subotai Bahadur | June 14, 2013 at 1:50 pm

radiofreeca | June 14, 2013 at 12:18 pm

Well, at least we know it wasn’t the government doing the spying, because they already had everything using the NSA – no need to hack into her computer. That just leaves CBS as the only suspect. 🙂

Actually, the intrusion makes sense from the government’s point of view. They have the data flows in and out of the computer online by any means. However, what her work product is would be something that would be composed on the computer; how she put together the information, what conclusions she was drawing, and how she was getting ready to present them on the air.

Yes, they could have tried to draw whatever conjecture that they could from the data in transit, AND definitely used it to trace her contacts to silence them by whatever means they chose. But to see ahead of time what she was going to say would require getting into her word processor files that may or may not [and likely not until it was close to completion] be transmitted into the PRISM vacuum cleaner.

One could easily see someone at NSA or Heimatsicherheitsdienst getting a panicked order from the White House political operation to find out what she was saying so that they could get ahead of it or discredit her.

Keep in mind, that while it is a serious, difficult, and delicate matter detecting and proving the intrusion and taking of files; the actual operation probably is largely automated and would take a matter of seconds extended to minutes only if they decided to have a human pick and choose which files to take in real time instead of just copying everything for later analysis.

As already noted in a number of places today, if they can secretly remove copies of data and cover their tracks, they can at will insert incriminating data the same way.

Which should be kept in mind in the event of any prosecutions by the coercive organs of the State against any of the Left’s political opponents.

Good thing that we have a government restricted by the law, Constitution, and ethics. /s

Subotai Bahadur

    abenson229 in reply to Subotai Bahadur. | June 14, 2013 at 2:50 pm

    “As already noted in a number of places today, if they can secretly remove copies of data and cover their tracks, they can at will insert incriminating data the same way.”

    Which is much worse in some ways. “Oh ho…he criticized the President did he? Let’s just see if we can’t plant some kiddie porn and make a phone call to the police then…”

    But of course THAT would never happen…

      princepsCO in reply to abenson229. | June 14, 2013 at 4:16 pm

      Sooo true…it’s not only what the Feds can see but what they can ‘do’ to you that is the most concerning. How many times do we hear a law enforcement type comment on the computer contents of suspects? And how many times do we hear them arrest someone for kidde porn and the public immediately brands a scarlet letter on that person’s character, regardless of any trial or evidence to the contrary? From now on, I won’t trust any LEO action against an ‘alleged’ criminal that involves a computer or telephone….

      I have zero trust in any employee of the Federal gov’t., from the lowest janitor in the EPA to the halls of power in DC. Polls show that people trust the military but ever since the repeal of Posse Comitatus I don’t trust anyone over the rank of Captain.

      Republicans haven’t acquitted themselves at all; where’s the repeal of the Patriot Act, and all funding for the IRS conferences?? Where’s the outrage by EVERY elected Republican over the pending legalization of immigration criminals?

      If ObamaCare and the IRS are still running things in 2017, I’m leaving as soon as I can figure out where I can go and not fear for my sanity….if I can even get out.

The OBOZO totalitarian police state in action.

“Correlation is not Causation” they repeated for the umpteenth time trying to keep up with all the correlations.

A new bumper sticker for Ithica….

“Stuxnet Sharyl for Obama”

Conservative Beaner | June 14, 2013 at 6:27 pm

I wonder if the hackers had help from the CBS IT department.

Ruh roh… As long as we’re dipping our toes in the roiling waters of the Sea of Paranoia, isn’t it odd(-ish) how easily “someone” came up with “the goods” on General Petraeus and General Allen (wonder what he did to get the Inquisition treatment)? Just who would be that “someone?”

Sure, correlation is not causation. Post hoc ergo propter hoc. And stuff. But there’s got to be a tipping point.

Juba Doobai! | June 14, 2013 at 9:35 pm

I wonder if someone from Google helped Obama out with this?

    Subotai Bahadur in reply to Juba Doobai!. | June 14, 2013 at 10:57 pm

    Without a doubt they are involved in the spying on Americans in general. Remember that “Don’t be Evil!”-mottoed Google helped the Chinese Public Safety Bureau [read Secret Police] design and implement the “Great Firewall of China” so that the PSB could catch and imprison or execute dissidents. All it took was the promise of the favor of the regime. And cash. Sound familiar?

    But NSA and/or the Heimatsicherheitsdienst have the specialized expertise to go into a specific reporter’s computer to get the files on the stories they are doing about the government. The key indicator is the very good efforts to cover their tracks. Most hackers leave big, muddy, footprints as they stomp around. The quality of the stealth would indicate a high probability of a government, or quasi-governmental actor. Given that we now know that regime is operating outside the law and constitution against its perceived political enemies; that increases the probability almost to certainty.

    The initial penetration was likely through the Microsoft back door in their operating systems [nsa.dll although the name may have changed in the newer windows versions].

    Subotai Bahadur

[…] the home computer system of reporter Sharyl Attkisson was hacked and information taken.  It occurred during late 2012, when she was in the midst of a deep investigation into the events surrounding the Benghazi […]