Feds Bugged Sharyl Attkisson's Computer
"Worse than anything Nixon ever did."
The intrusions into former CBS News correspondent Sharyl Attkisson's computers constitute the narrative spine of the reporter's new book "Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama's Washington." The book starts with not really a word, but a sound: "Reeeeeeeeeee."
That's the noise that Attkisson's Apple computer was making at 3:14 one morning. A Toshiba laptop computer issued by CBS News did the same thing a day earlier, around 4 a.m. All this goes down in October 2012, right in the midst of the Benghazi story. A person who's identified as "Jeff" warns Attkisson: "I've been reading your reports online about Benghazi. It's pretty incredible. Keep at it. But you'd better watch out." "Jeff," like several of the names in "Stonewalled," is a pseudonym. …
Next big moment: Attkisson gets her computer checked out by someone identified as "Number One," who's described as a "confidential source inside the government." A climactic meeting takes place at a McDonald's outlet at which Attkisson and "Number One" "look around" for possibly suspicious things. Finding nothing, they talk. "First just let me say again I'm shocked. Flabbergasted. All of us are. This is outrageous. Worse than anything Nixon ever did. I wouldn't have believed something like this could happen in the United States of America." That's all coming from "Number One."
The breaches on Attkisson's computer, says this source, are coming from a "sophisticated entity that used commercial, nonattributable spyware that's proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA)." Attkisson learns from "Number One" that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the "intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool."
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
http://www.youtube.com/watch?v=nmJKY59NX8o
"That's right buddy, you show that turd who's boss!"
Color me completely unsurprised.
I'm inclined to believe her but she sounds like my crazy sister when describing her phone ringtone anomalies.
The government planted files deep in her computer with the idea of using them as a pretense against her at a later date. God damn it, why is there no outrage over this?
Because a Democrat is president?
He could be hunting down people in the street, a la The Most Dangerous Game, and the media wouldn't care.
"He could be hunting down people in the street, a la The Most Dangerous Game, and the media wouldn't care."
Well, he's just helping the hungry out by reducing the surplus population. Why do you hate the poor so much? /derp
Doubtful, the Obama Administration had been nothing but truthful & transparent in all their dealings.
He's lucky they didn't kill him like Michael Hastings.
And Breitbart.
FAKE SCANDAL!!! Move along - nothing to see here.
Yeah right. Life is hard Sasob?
Who is Number One?
"intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool."
There are several layers of not making sense in that description. Hacking into a person's Skype account doesn't give you access to the microphone on their machine. And if they already had access to the microphone through spyware, the Skype account would be irrelevant.
Unless they were activating the mike and then calling her via Skype, but she would have to answer the call to make that work.
Skype runs automatically in the background. So perhaps it's just a case of getting the app to activate without going to full screen or turning on the camera. If the camera were active the camera light would normally trigger.
Start working at home with Google! It's by-far the best job I've had. Last Wednesday I got a brand new BMW since getting a check for $6474 this - 4 weeks past. I began this 8-months ago and immediately was bringing home at least $77 per hour. I work through this link, go? to tech tab for work detail
---------------------- http://www.jobs700.com
Can you have some spare time to sit back in your chair having your laptop with you and making some money online for some interesting online work said Jenny Francis in the party last nightsee more what is for you there to increase your pocket money??.
http://shorx.com/clickforsurvey
This protocol provides a detailed procedure for total protein extraction for western blot analysis from achieved samples following TRIzol isolation of RNA.Total Protein Extraction by TRIzol