Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

CBS News confirms multiple breaches of Sharyl Attkisson’s computer
wapo ^

Posted on 06/14/2013 7:58:50 AM PDT by sunmars

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-113 last
To: sunmars; LucyT

IP Address: 23.67.156.110


101 posted on 06/14/2013 1:28:36 PM PDT by Brown Deer (Pray for 0bama. Psalm 109:8)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sunmars

Welcome to North Korea, when you speak out against the Obama Administration, you get your computers hacked and your life made a living hell


102 posted on 06/14/2013 2:43:46 PM PDT by Sarah Barracuda
[ Post Reply | Private Reply | To 1 | View Replies]

To: TornadoAlley3

Just finished the book. Absolutely awesome.


103 posted on 06/14/2013 5:02:40 PM PDT by HollyB
[ Post Reply | Private Reply | To 71 | View Replies]

To: sunmars
Nothing to see here...JUST USING PRISM IN REVERSE....

Stand by for various incriminating evidence to arrive unexpectedly in citizens computers.

104 posted on 06/14/2013 5:07:56 PM PDT by spokeshave (The only people better off today than 4 years ago are the Prisoners at Guantanamo.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sunmars

Ever since Fast and Furious, she’s been in their sights.


105 posted on 06/14/2013 5:28:58 PM PDT by Rocky (Obama is pure evil.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief; MestaMachine; Rushmore Rocks; Oorang; sweetiepiezer; txnuke; Velveeta; aragorn; ...
”Image

“A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.

"This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion."

Article, then # 64, # 90 , # 96.

Thanks, Maggie.

106 posted on 06/14/2013 5:31:49 PM PDT by LucyT ("Once you've gone round the bend you've gone as far as you can go. ")
[ Post Reply | Private Reply | To 2 | View Replies]

To: BuckeyeTexan; butterdezillion

It wouldn’t surprise me if every single conservative site on the web is being channeled through nsa via a “man-in-the-middle” attack, with every bit of what is typed being channeled through their servers. If they are as good as China and Russia, and i hope they are or we’re toast, there are very few diagnostic tools that would pick it up. Virtualized rootkits are the norm for state-run malware attacks now, despite what your local “computer expert” tells you. Do not believe them; most of them mean well but they just cannot fathom the complexity because they’ve never seen it. And they’ve never “seen it” because most AV software out there has been compromised and can be easily hooked by the malware.

The funny thing is, most people who have been relegated to Matrix Living will never even realize it.


107 posted on 06/14/2013 5:33:17 PM PDT by Nita Nupress
[ Post Reply | Private Reply | To 32 | View Replies]

To: spokeshave
Stand by for various incriminating evidence to arrive unexpectedly in citizens computers.

Anytime they want to get you, it'll be a small matter of downloading a couple of incriminating documents onto your computer, a few questionable sites listed in your history and a couple numbers from the watch list supposedly called from your cell and they've got'cha. You'd be one of the lucky ones if all you get is a one way train ride.

108 posted on 06/14/2013 5:58:51 PM PDT by bgill (This reply was mined before it was posted.)
[ Post Reply | Private Reply | To 104 | View Replies]

To: sunmars

As Gomer Pyle would say, ‘Surprise, surprise’!


109 posted on 06/14/2013 6:16:13 PM PDT by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 1 | View Replies]

To: jeffc

More like East Germany.


110 posted on 06/14/2013 7:26:56 PM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 95 | View Replies]

To: sunmars
To our knowledge, the Justice Department has never ‘compromised’ Ms. Atkisson’s computers, or otherwise sought any information from or concerning any telephone, computer or other media device she may own or use,” Dean Boyd, a DOJ spokesperson, told POLITICO on Tuesday night.

http://www.politico.com/blogs/media/2013/05/doj-we-havent-compromised-sharyl-attkissons-computers-164537.html

111 posted on 06/14/2013 7:40:14 PM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sunmars
What was going on in “late 2012″? Well, that would have been the controversy over the terrorist attack on our consulate in Benghazi. And, checking the record, we see that Attkisson had a very interesting scoop on October 20th, relying on anonymous military sources that called into question the Obama administration’s claim that they couldn’t have responded in time to assist in the attack: +++++++++++ Are these the guys who spoke to Fox or does obama have some poor innocent military personnal in a dungeon somewhere?
112 posted on 06/14/2013 9:05:49 PM PDT by Linda Frances (Woe to those who call evil good and good evil, who put darkness for light and light for darkness)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jeffc
I wonder if this is what it felt like to live in the 1770's.......

More like the 1930s, I think. Many feel something is not right. Many wonder why "somebody" doesn't do "something".

Many think when the lies are exposed, the leader will fall, but the lies grow bigger and he gets stronger.

"What rough beast, its hour come 'round at last, slouches towards Bethlehem to be born?"

113 posted on 06/20/2013 9:56:40 AM PDT by Jim Noble (When strong, avoid them. Attack their weaknesses. Emerge to their surprise.)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-113 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson