• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Podcast
  • Full Measure
  • Blog
  • Donate
  • "Slanted" Preorder here

Sharyl Attkisson

Untouchable Subjects. Fearless, Nonpartisan Reporting.

  • US
  • World
  • Business
  • Health
    • Vaccine, Medical links
  • Special Investigations
    • Attkisson v. DOJ
    • Benghazi
    • "Collusion v. Trump" TL
    • Fake News
    • Fast and Furious
    • Media Mistakes on Trump
    • Obama Surveillance TL
    • Obamacare

News

Cybersecurity and The Awan Brothers

Note: Since this report first aired on Full Measure, the Justice Department allowed Imran Awan to avoid jail time by entering a guilty plea to making a false statement on a loan application. The agency did not pursue charges related to the Inspector General's findings or the original FBI indictment including improper or unauthorized access to the official computer accounts of multiple members of Congress and providing false information on tax returns.

When it comes cybersecurity scandals, as tough as Congress is on private companies like Equifax and Facebook, you might be surprised to learn that they've been quietly dealing with a scandal of their own. Some claim it's the most important investigation you've never heard of in Washington D.C. It involves the FBI, an Inspector General, 42 members of Congress, and five Pakistani American IT workers.

http://fullmeasure.news/news/cover-story/cybersecurity-04-26-2018

Deeper analysis

It’s July 2014 and one member of my team, Don Allison of KoreLogic, has been working on my computer puzzles for more than a year. I’ve come to understand why he came so highly recommended. The work has been difficult and tedious. But there’s no great hurry. Patience must be exercised. His task has been to unmask some of the most sophisticated computer intrusion efforts in existence. And he’s gathering clues and intel. Revealing new information, even now, about the surveillance of both my work and personal computers by an outside presence.

Regarding my work laptop, Don tells me that his analysis shows CBS had the means and opportunity through corporate software to perform its own inside, complete remote acquisition and forensic analysis of the laptop as well as other platforms on their network as soon as I first informed them of the intrusion. If they did so, they didn’t tell me about it. Don can see that one party looking through my laptop showed particular interest in my Benghazi reporting work, opening and reading a key file.

Don is also able to provide the best forensics detail yet of my per- sonal desktop iMac. It reveals a sophisticated set of intrusions that were at least as invasive as the ones into my work laptop. The interlopers were able to co-opt my iMac and operate it remotely, as if they were sitting in front of it. They used a program to control parameters that allow for complete remote graphical access as one of the authorized users of the system.

The unauthorized presence had complete control.

It has access to emails, personal files, Internet browsing, pass- words, execution of programs, financial records, and photographs of not just me but of my family members as well.

The illegal infiltration included the ability to capture passwords and account information for my extended computing footprint as well, such as my external accounts with Hotmail, Facebook, Twitter, online banking credentials, and CBS corporate systems.

The invaders were able to access anything connected to my com- puter systems and they used their technology and expertise to comb through the photo records on my BlackBerry, specifically snooping through materials I had photographed regarding my Fast and Furiousresearch.

While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s crucial evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government. Don says the importance of this link can’t be understated.

“Let me put it this way,” he tells me. “This ISP address is better evidence of the government being in your computer than the govern- ment had when it accused China of hacking into computers in the U.S.”

“The greatest fear that I have regarding the outcome for America of these disclosures is that nothing will change.”

—Edward Snowden to the Guardian, June 2013

Justice Dept. IG investigates the computer intrusions

Above image: Dept. of Justice building in Washington DC

| THE JUSTICE DEPARTMENT IG

When the two agents from the Department of Justice Inspector Gen- eral’s office pull into my driveway, on January 15, 2014, I try to size them up. White guys, nice looking, early forties, impeccable dark suits, colorful ties. No rumpled collars here. One of them, Digital Forensics and Technology Investigations Unit Director Keith Bonanno, comes from a buttoned-down bureaucratic background. The other, Special Agent Harry Lidsky, looks more like a cop or spook.

They’re here to pick up my personal Apple iMac desktop computer for a forensics analysis. It’s been one year since Number One first con- firmed the intrusion on my CBS laptop. The IG can’t have my work laptop since that belongs to CBS. But the iMac is all mine and there may be evidence on it, too. I’ve decided to let them examine it.

I’m taking a chance entrusting my computer to a team that’s con- nected to the agency that may hold responsibility for my intrusions. But it’s okay. My personal forensics team is conducting its own anal- ysis. I continue to believe worst case scenario is the IG finds nothing. Best case? Maybe they turn up something we don’t yet have.

Bonanno drags in a rolling briefcase and the two men step into my liv- ing room. I have a little help to size them up: my husband, who’s the most accurate profiler I know, and a friend who’s taken an interest in the case.

Bonanno and Lidsky also want to look at my Verizon box where the mysterious, dangling cable was found and removed before it dis- appeared a little more than a year ago. The three of us take the two of them outside to the Verizon box and Bonanno takes pictures while they ask what the cable looked like and how it came to disappear. I explain that after the Verizon man removed it, I asked him to leave it, but it was gone when I later went back to retrieve it.

“I have photographs of it,” I tell the agents.

We go inside and I show them the pictures of the cable. They say they’ve never seen anything like that.

We make small talk. Before the IG, Bonanno says he worked at the Department of Transportation. Lidsky’s former DEA and CIA. When he mentions the CIA, my friend says, “There are a lot of us ex-agency around . . .” alluding to his own status as a one-time CIA officer.

“What did you do there—if you can tell me?” asks Lidsky. “Intelligence,” answers my friend.
So they’ve got one and we’ve got one, I think referring to the CIA backgrounds.

After conducting a brief interview, Bonanno and Lidsky have me sign a piece of paper authorizing them to take my iMac. Then, they pack up their gear and my computer, and head out.

| LESSONS LEARNED

On November 20, 2013, I re-interview Fast and Furious whistleblower John Dodson. Pretty soon it’ll be three years since he first came forward and exposed the government’s gunwalking secrets on the CBS Evening News. He’s written a new book about the whole experience (published by a division of CBS partner Simon & Schuster). There are still many unanswered questions. During our interview, Dodson reflects on his own situation and how it applies to the scandals that have happened since.

ATF Special Agent John Dodson

He sees Benghazi, the IRS targeting of conservative groups, and the government spying stories as variations on the same theme.

“It’s so reminiscent of everything that happened in Fast and Fu- rious,” Dodson tells me. “It’s the same thing repeating itself over and over again. You know I refer to it as the self-licking ice-cream cone of the federal government. It’s there to simply enjoy itself while the rest of us have to pay for it.”

ATF originally tries to block the book’s publication, saying it would hurt morale and damage ATF’s working relationships with the DEA and the FBI. When the American Civil Liberties Union and Senator Grassley stood up for Dodson’s right to publish, ATF relented and cleared the book for publication.

I contact ATF for comment on the Dodson book, and spokes- woman Ginger Colbrun, who succeeded the Fast and Furious era’s Scot Thomasson, reacts frostily. It’s the Tuesday before Thanks- giving.

“How are you?” I’m attempting to start off with a moment of small talk. “Do you have to work the holiday?” I ask, referring to the holiday the day after tomorrow.

“I answered the phone, didn’t I?” Colbrun snaps back. Not a very professional response from a publicly paid PR official working on be- half of the public. Okay, this isn’t going to be friendly. Maybe not even courteous. She’s following in Thomasson’s footsteps.

Colbrun says the agency has no interest in doing an interview about Dodson. Her tone indicates ATF still views Dodson as the en- emy rather than a whistleblower who helped halt a misguided and harmful policy. No matter what mea culpa government officials have made for the benefit of the public or Congress, their basic attitudes haven’t changed. In a less political world, Dodson might be rewarded for his honesty. Instead, he’s odd man out. Colbrun conveys no sense of gratitude to or pride in Dodson. No sense of embarrassment over the government lies told to me, Congress, and the public along the way. No sense of regret for lives lost. They’re just mad at Dodson for telling the truth. Mad at me for reporting it.

Interestingly, Justice Department has barred Dodson from accept- ing payment for his book, claiming it would violate ethics rules. Dod- son states, “I do find it hard to reconcile how the very same agencies who thought of, approved, and employed the strategies used in Fast and Furious only to later attempt to cover it up by lying to Congress and the American people, ignoring the rule of law, withholding docu- ments, and smearing whistleblowers, now asserts themselves to be the sole authorities who preside over this or any other ‘ethical inquiry.’ The conflict is obvious.”

Today, Dodson wants to stand as an example to others who see wrongdoing: you can step forward and expose it.

“[My story] shows that they can’t totally take away your empow- erment. You can make a difference,” Dodson tells me in an interview. “And there’s a lot of people out there that were in my position, that know things that are going on in the NSA, in the State Department, in the CIA or IRS. . . . It is their greatest fear, as a government, that we ever realize how much of that power we actually have. And whatthey have is, you know, given to them by us.”

All I know is that, so far, the main impact of the exposure of the government’s dirty little surveillance secrets is that the government has doubled down on leakers and whistleblowers. A chilling effect has been administered with surgical precision on anyone who might have thought about stepping forward.

Ghost Soldiers

Your tax dollars are paying for soldiers in Afghanistan who don't exist.

Watch our Full Measure investigation at the link below:

http://fullmeasure.news/news/cover-story/ghost-soldiers-07-30-2017

Our new fight in Vietnam

Above image: Hội An, a UNESCO World Heritage Site in Vietnam

This week on Full Measure, Scott Thuman takes us to Vietnam. We lost a war against communism there decade ago, with China supporting the North Vietnamese. Today, we're back in Vietnam fighting China again, but on economic grounds. We'll explain why it matters.

Privates First Class Carl Baden (New Orleans, Louisiana) and Arcadio Carrion (Puerto Rico) of Company B, 3rd Battalion, 47th Infantry, 9th Infantry Division, laying in the mud waiting for artillery to knock out the 50 Cal. Machine gun bunker that has them pinned down in a tree line at My Tho. April 4, 1968 Credit: SP4 Dennis J. Kurpius, 221st Signal Company

[hr]Watchdogs at the Project on Government Oversight will take us inside the government's secretive Office of Legal Counsel as they try to uncover hidden documents and rulings that could impact all of us.

And we'll have a fascinating story of a man who's archiving all of those charts that members of Congress take onto the House floor to make their point. They range from funny -- to ineffective. He'll show us his favorites.

More original reporting you won't see anywhere else! We won't rehash news you've already seen all week. See viewing options below!

“Full Measure with Sharyl Attkisson” is broadcast Sundays to 43 million 
Sinclair TV households on ABC, CBS, NBC, FOX, CW and Telemundo stations.
How to watch:
????  TV Listings & Times: Click Here
????  On Demand Anywhere Anytime: Download the free STIRR app on your phone 
Also available on Roku  Apple TV and FireTV. And visit STIRR.com
The first run of the program each week will be 10am ET on STIRR
????️Online: Livestream: www.fullmeasure.news/live 9:30a ET Sundays
The program will be posted at www.fullmeasure.news after 10a ET Sundays

Robot Tax

A look into the near future. More and more robots are doing the work. Find out who's advocating for a "robot tax"-- and who's not.

Watch the Full Measure investigation below:

The Dark Side of Wikipedia

It's billed as the "Encyclopedia that Anyone Can Edit."

In reality, it's far from it. How information is secretly manipulated on Wikipedia.

Watch our Full Measure investigation at the link below:

http://fullmeasure.news/news/cover-story/the-dark-side-of-wikipedia

The Year of Mass Surveillance Exposed

It takes audacity.

To be so bold after all the public scandals, long after they know I discovered their presence in my private and work computers. It reminds me of an impetuous child sticking out his tongue while standing behind his mother’s skirt. It’s the mission of cowards. Of people who have little confidence in their own abilities and believe their only hope at maintaining control is to intimidate and steal and suppress information. What power that they have isn’t earned; it’s what they’re able to grab for a short time while they have access to all the toys. We only have ourselves to blame. They wouldn’t be able to do this unless we—the public, Congress, and the news media—allowed it. But we do and they know they can act with impunity.

| THE YEAR OF MASS SURVEILLANCE EXPOSED

In October 2013, one of my sources who currently works in the gov- ernment says that his federal bosses have pulled his phone records to see if he’s talking out of school. Not because he’s leaked classified information or done anything wrong. Quite the contrary: he knows of others in his agency who have committed ethical and possibly legal violations. So they’re snooping into his phone records. How does he know? They told him so. They want him to know. That way, maybe he’ll keep his mouth shut. After reviewing his calls, including some to an official on Capitol Hill, they approach him and say, “You’re talking to them?”

My name and number aren’t in the records that they checked. The source and I have figured out an alternate way to communicate. But the government monitoring of its employees, citizens, and news media—to protect its own political interests, not to protect us from terrorists—is becoming a fact of life. If nobody stands up to stop it, we’ll all have to just get used to being watched by our government.

As 2013, the year of mass-surveillance-secrets-exposed, draws to a close, we’re not finished learning about the government’s reach into our private lives. In an article in the Washington Post on December 4, Snowden’s doc- uments reveal the NSA is collecting nearly five billion records a day on cell phone locations around the world, “enabling the agency to track the movements of individuals—and map their relationships—in ways that would have been previously unimaginable.” According to an NSA official quoted in the article, the agency is “tapping into the cables that connect mobile networks globally.” Even when you’re not using your phone, it’s broadcasting its location. “The government is tracking people from afar into confidential business meetings or personal visits to medical facilities, hotel rooms, private homes and other traditionally protected spaces,” reports the Post. Other highlights include the fact that this particular NSA database is more than twice the size of the text content of the Library of Congress print collection, and that there’s so much material the NSA has had trouble ingesting, processing, and storing it.

Though this is as big as any Snowden revelation so far, the re- action from most of the public, the press, and Congress seems a bit bored. These complex surveillance systems have been difficult to explain, digest, and comprehend. If you ask most ordinary Americans, they might be able to tell you the government has gotten caught invading the public’s privacy, but they probably couldn’t tell you much more than that. Some of us in the media haven’t done an adequate job explaining all of this in a clear and accurate fashion.

Also, there have been so many staggering revelations in a short period of time, people have become desensitized. We’ve suffered through all the stages: outrage, denial, rejection. I wonder if the public has reached a complacent sort of acceptance.

[hr]Read excerpt #1 here: The Computer Intrusions: Up at Night

#2: Big Brother: First Warnings

#3: The Computer Intrusions: Disappearing Act

#4: The Incredible, Elusive "Verizon Man"

#5: I Spy: The Government's Secrets

#6: Computer Intrusions: The Discovery

#7: Notifying CBS About the Government Computer Intrusions

#8: The MCALLEN Case: Computer Intrusion Confirmed 

#9: The Disruptions Continue

#10: Revelations in the Government Computer Intrusion

#11: Obama Leak “Witch Hunt”

#12: Obama’s War on Leaks 

#13: The Computer Intrusions Become Public

#14: The Govt. Computer Intrusions: Word Spreads

#15: My Computer Intrusion and the National Connection 

#16: URGENT dispatch

#17: Clapper’s False Testimony

#18: Government Spying First Revealed

#19: How the FBI Missed the Boston Marathon Bombers

#20: The media operation against Snowden and the government computer intrusions

#21: Government Surveillance and Two-Tiered Justice

#22: Other Reporters Weigh in

#23: The CBS Connection

#24: Spy Class 101

#25: Flaps and Seals

#26: Justice Dept. on the Hotseat

#27: Audacity

« Previous Page
Next Page »

Primary Sidebar

Coming Soon

Subscribe

Get the Latest Stories Straight to Your Inbox

Follow Sharyl Attkisson

  • Facebook
  • Instagram
  • RSS
  • Twitter
  • YouTube

Recent Comments

  • Mickey Pullen on Hydroxychloroquine: Politicizing Medicine (PODCAST)
  • Mike Marinak on Hydroxychloroquine: Politicizing Medicine (PODCAST)
  • Debunking “The Hotchkiss Republicans Report” - The Hotchkiss Record on "Collusion against Trump" timeline

Subscribe

Get the Latest Stories Straight to Your Inbox

Footer

Pages

  • Home
  • About
  • Podcast
  • Support
  • Contact

2ndary Pages

  • Full Measure Stations
  • Privacy Policy
  • Terms of Use
  • Subscribe to SharylAttkisson.com

SPECIAL INVESTIGATIONS

  • Attkisson v. DOJ/FBI
  • Benghazi
  • Fake News
  • Fast & Furious
  • Obamacare

Ad

Ad