The following is the seventh in a series of excerpts from my New York Times bestseller โStonewalled,โ which recounts the government intrusions of my computers. More excerpts to follow.[hr]
I tell him about the extra fiber optics line on the back of my house.
โItโs possible somebody was using that,โ he tells me. โBut taps arenโt usually done at peopleโs homes anymore. Itโs all done through Verizon. They cooperate. Thereโs no need to come to your house; we can get everything we want through the phone company.โ
[hr]A diverseย group of Constitutional free press and privacyย advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions.ย Clickย here to support.[hr]
This is months before Edward Snowden would reveal exactly that, building on revelations by New York Times reporter Risen and others who had written as far back as 2005 of phone companies assisting the government with surveillance.
I gather my laptop and notes, get a Coke to go, and know that the next step I need to take is notifying my supervisor at CBS News. The implications far surpass my own computer and personal life. The infiltration includes the CBS email system and the news divisionโs proprietary software used in writing scripts and organizing the daily news broadcasts. The intruders could have accessed the entire CBS corporate system. This is huge. I canโt reveal to CBS whoโs helping me or exactly how I know what I know, but theyโre aware that I have well-placed sources.
| NOTIFYING CBS
I walk straight into the CBS News Washington bureau and look for myย bureau chief, Chris Isham. Isham is a longtime investigative reporter with plenty of knowledge about the way the government operates. Heโll understand more than most the implications of what Iโm about to tell him. He invites me into his office and closes the door. He sits on a short couch, and I plop into an adjacent chair with my notes and fill him in.
โI canโt be the only one theyโre doing this to,โ I conclude.
โI know,โ he agrees. โYou canโt be.โ
But Isham doesnโt want to sound the corporationโs alarm bells yet.
[hr]Support the Attkisson v. DOJ/FBIย Fourth Amendment Litigation Fundย to fight the government computer intrusions[hr]
He explains that since my sources have to be protected, even from CBS, we will reach out to a trusted, private analysis firm and see if they can duplicate the findings of an intrusion on the CBS computer. If so, he says, we can then go to CBS News chairman Jeff Fager and CBS News president David Rhodes with the information.
But thereโs a challenge with this plan: I notice that that typewritten note from Number One says my computer is now โclean.โ Does that mean everything has been wiped from it?
I communicate with Number One to ask the question. The next day, he returns with an answer. The inside government analyst did wipe the computer.
โWhy did he do that?โ I ask Number One. Iโm forever grateful for the help heโs given. Without it I probably wouldnโt even know today that Iโd been the subject of a criminal intrusion. But why did he wipe the evidence?
โI donโt know. Iโm not sure in the beginning we really expected to find anything. And I guess we never talked about what the procedure would be if we did,โ says Number One.
Itโs true. In fact, Iโm pretty sure none of us in the group actually expected any real evidence to be discovered. We never played out the scenario.
โMaybe he thought he was doing me a favor,โ I suggest. โMaybe he thought he was helping me by cleaning up my computer and get- ting it running smoothly again.โย Cleaned up. Running smoothly, say the notes on the typewritten paper.
Duplicating the evidence now will take a miracle.[hr]To be continuedโฆ[hr]
Read excerpt #1 here:ย The Computer Intrusions: Up at Night
Read excerpt #2 here:ย Big Brother: First Warnings
Read excerpt #3 here: The Computer Intrusions: Disappearing Act
Read excerpt #4 here: The Incredible, Elusive "Verizon Man"
Read excerpt #5 here: I Spy: The Government's Secrets
Read excerpt #6 here: The Computer Intrusions: The Discoveryย [hr]
Leave a Reply