• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Podcast
  • Full Measure
  • Blog
  • Donate
  • "Slanted" Preorder here

Sharyl Attkisson

Untouchable Subjects. Fearless, Nonpartisan Reporting.

  • US
  • World
  • Business
  • Health
    • Vaccine, Medical links
  • Special Investigations
    • Attkisson v. DOJ
    • Benghazi
    • "Collusion v. Trump" TL
    • Fake News
    • Fast and Furious
    • Media Mistakes on Trump
    • Obama Surveillance TL
    • Obamacare

News

Notifying CBS About the Government Computer Intrusions

The following is the seventh in a series of excerpts from my New York Times bestseller “Stonewalled,” which recounts the government intrusions of my computers. More excerpts to follow.[hr]
page299image5824160page299image5824368Number One has firsthand experience in covert government surveillance. “Reporters used to be off-limits,” he opines. “Even when we had a court order on a bad guy, if a reporter even lived anywhere in the vicinity, we stayed away. You just didn’t go near journalists. It was sacrosanct. Obviously, that’s changed.”

I tell him about the extra fiber optics line on the back of my house.

“It’s possible somebody was using that,” he tells me. “But taps aren’t usually done at people’s homes anymore. It’s all done through Verizon. They cooperate. There’s no need to come to your house; we can get everything we want through the phone company.”

[hr]A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

This is months before Edward Snowden would reveal exactly that, building on revelations by New York Times reporter Risen and others who had written as far back as 2005 of phone companies assisting the government with surveillance.

I gather my laptop and notes, get a Coke to go, and know that the next step I need to take is notifying my supervisor at CBS News. The implications far surpass my own computer and personal life. The infiltration includes the CBS email system and the news division’s proprietary software used in writing scripts and organizing the daily news broadcasts. The intruders could have accessed the entire CBS corporate system. This is huge. I can’t reveal to CBS who’s helping me or exactly how I know what I know, but they’re aware that I have well-placed sources.

| NOTIFYING CBS

I walk straight into the CBS News Washington bureau and look for my bureau chief, Chris Isham. Isham is a longtime investigative reporter with plenty of knowledge about the way the government operates. He’ll understand more than most the implications of what I’m about to tell him. He invites me into his office and closes the door. He sits on a short couch, and I plop into an adjacent chair with my notes and fill him in.

“I can’t be the only one they’re doing this to,” I conclude.
“I know,” he agrees. “You can’t be.”
But Isham doesn’t want to sound the corporation’s alarm bells yet.

[hr]Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

He explains that since my sources have to be protected, even from CBS, we will reach out to a trusted, private analysis firm and see if they can duplicate the findings of an intrusion on the CBS computer. If so, he says, we can then go to CBS News chairman Jeff Fager and CBS News president David Rhodes with the information.

But there’s a challenge with this plan: I notice that that typewritten note from Number One says my computer is now “clean.” Does that mean everything has been wiped from it?

I communicate with Number One to ask the question. The next day, he returns with an answer. The inside government analyst did wipe the computer.

“Why did he do that?” I ask Number One. I’m forever grateful for the help he’s given. Without it I probably wouldn’t even know today that I’d been the subject of a criminal intrusion. But why did he wipe the evidence?

“I don’t know. I’m not sure in the beginning we really expected to find anything. And I guess we never talked about what the procedure would be if we did,” says Number One.

It’s true. In fact, I’m pretty sure none of us in the group actually expected any real evidence to be discovered. We never played out the scenario.

“Maybe he thought he was doing me a favor,” I suggest. “Maybe he thought he was helping me by cleaning up my computer and get- ting it running smoothly again.” Cleaned up. Running smoothly, say the notes on the typewritten paper.

Duplicating the evidence now will take a miracle.[hr]To be continued…[hr]

Read excerpt #1 here: The Computer Intrusions: Up at Night

Read excerpt #2 here: Big Brother: First Warnings

Read excerpt #3 here: The Computer Intrusions: Disappearing Act

Read excerpt #4 here: The Incredible, Elusive "Verizon Man"

Read excerpt #5 here: I Spy: The Government's Secrets

Read excerpt #6 here: The Computer Intrusions: The Discovery [hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

Government Computer Intrusions: The Discovery

The following is the sixth in a series of excerpts from my New York Times bestseller “Stonewalled,” which recounts the government intrusions of my computers. More excerpts to follow.[hr]

Referring to the typed notes,

Number One tells me that my computer was infiltrated by a sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA). This particular intrusion came in silently at- tached to an otherwise innocuous email that I received and opened in February 2012. The intrusion was “redone” in July through a BGAN satellite terminal. I don’t even know what a BGAN satellite terminal is, but I later look it up online and find this ad:

“BGAN Portable Satellite Internet & Phone. Connect a Laptop, Smartphone or Any Wireless Device to a satellite terminal for High- Speed Internet and phone from anywhere on the planet. Terminals are small enough to be carried inside of a laptop case, yet deliver broadband up to 492 Kbps. . . . BGAN is the hands down winner for carry portability, and ease of setup by anyone.”

[hr]A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

Number One continues.

The intrusion was “refreshed” another time using Wi-Fi at a Ritz Carlton hotel. The uninvited programs were running constantly on my laptop. They included a keystroke program that monitored every- thing I typed, visited online, and viewed on my screen. They accessed all of my email including my CBS work account. They obtained the passwords to my financial accounts and other applications, some of which are noted on the typewritten paper that I’m staring at. I’m told that I should assume my smartphones are also afflicted.

[hr]Read excerpt #1 here: The Computer Intrusions: Up at Night

Read excerpt #2 here: Big Brother: First Warnings

Read excerpt #3 here: The Computer Intrusions: Disappearing Act

Read excerpt #4 here: The Incredible, Elusive "Verizon Man"

Read excerpt #5 here: I Spy: The Government's Secrets[hr]

Continuing on, the intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool. As I understand it, the intrusion stopped abruptly about the time that I noted my computers quit turn- ing on at night. Did the intruders know by reading my emails and listening to me on the phone in early December that I was on to them? Did they remotely attempt to stop the programs at that time and cover their tracks, resulting in the end of the overnight computer activity?

Number One goes on to say that this was probably not a court- sanctioned action. He says the government’s legal taps are usually of much shorter duration and they don’t end abruptly as this one did. I’m also told flatly that my surveillance doesn’t match up with a PATRIOT Act order. An insider checked for me. I have many questions, but Number One can’t answer them. He’s just the messenger.

There’s one more finding. And it’s more disturbing than every- thing else.

“Did you put any classified documents on your computer?” asks Number One.

“No,” I say. “Why?”

“Three classified documents were on your computer. But here’s the thing. They were buried deep in your operating system. In a place that, unless you’re some kind of computer whiz specialist, you wouldn’t even know exists.”

“Well, I certainly didn’t put anything there.”

[hr]Click here to support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

“Just making an educated guess, I’d say whoever got in your computer planted them.”

That’s worth pausing to let the chill run all the way up the back of my neck to the part of my brain that thinks, Why? To frame me? A source? My heart accelerates. I’m thinking it, but it’s Number One who finally breaks the silence to say it.

“They probably planted them to be able to accuse you of having classified documents if they ever needed to do that at some point.”

So a government-related entity has infiltrated my computer, email, and likely my smartphones, and that included illegally planting clas- sified documents in a possible attempt to lay the groundwork to even- tually entrap or frame me . . . or someone who talks to me? As it begins to sink in, I think of the whistleblowers and sources who have spoken to me over the past two years, often confidentially. By having well-placed sources help me discover this infiltration, did I just dodge a bullet? Did I get them before they got me?

[hr]To be continued…

[hr]Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

 

I Spy: The Government's Secrets

The following is the fifth in a series of excerpts from my New York Times bestseller “Stonewalled,” which recounts the government intrusions of my computers. More excerpts to follow.[hr]

| I Spy |

The Government’s Secrets

On January 8, 2013, I’m on my way to meet the contact who will be part of the process that gets my computer analyzed by a confidential source inside the government. I refer to my direct contact as “Number One.” He’s suggested a rendezvous at a McDonald’s in Northern Virginia. When I enter with my laptop tucked under one arm, I scan the patrons and correctly guess which one is my guy. I slip into his booth and we shake hands across the table. No need for formal intro- ductions. After a little small talk, he addresses the issue at hand. He’s a matter-of-fact kind of guy.[hr]

Read excerpt #1 here: The Computer Intrusions: Up at Night

Read excerpt #2 here: Big Brother: First Warnings

Read excerpt #3 here: The Computer Intrusions: Disappearing Act

Read excerpt #4 here: The Incredible, Elusive "Verizon Man"

[hr]“I’ll tell you one thing. People would be shocked to know what this administration is doing in terms of spying on the American pub- lic.” That’s uncannily close to what Jeff had said to me just a few weeks before. And the two men don’t know each other. But both are connected to government three-letter agencies.

Number One explains his arrangements to have my computer analyzed. What I’ll receive is a verbal report. Because of who’s help- ing me, it can’t be anything formal or written. I understand the terms.

The next day, I’m working at my desk at CBS News when my mobile phone rings. It’s Number One.[hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions

[hr]“I thought I’d give you an update,” he says. “Our friend started looking at the product. He’s not finished yet but it’s proving very . . . interesting.”

He stops.
“Did he find something?” I ask, filling the silence.
“Yes. It’s positive.”
Positive. For what? Positive that nothing is wrong? Positive for some sort of spyware?
“Really?” I say.
“Yeah,” Number One continues. “I wouldn’t have believed it. It’s

pretty shocking. We’re all kind of in a state of shock right now. I don’t want to say too much on the phone. In fact, I’d advise you to start using a burner phone. Do you know what that is?”

I do. The kind of phone that drug dealers and terrorists use so they can’t easily be followed. He says I should use burner phones and switch them out frequently. At least every month. And don’t use them from my house.

“I’ll be able to give you more information tomorrow,” he says.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

We meet at the same place. We settle into a McDonald’s booth and look around. For what, I don’t know, but we look. Number One hands me my laptop and a piece of paper containing some typed notes. For both of us, our worldview has changed just a little.

“First just let me say again I’m shocked. Flabbergasted. All of us are. This is outrageous. Worse than anything Nixon ever did. I wouldn’t have believed something like this could happen in the United States of America,” says Number One.

He’s impassioned. My attention level escalates. Just two days ago, I’d been fully prepared to be told there was nothing suspicious in my computer. Or maybe that all the evidence was gone. I might be told that the idea of the computer being tapped was the stuff of science fiction or an Orwellian novel. I never thought I’d hear what I was hearing.[hr]

To be continued…[hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

The Computer Intrusions: The Incredible, Elusive "Verizon Man"

The following is the fourth in a series of excerpts from my New York Times bestseller “Stonewalled,” which recounts the government intrusions of my computers. More excerpts to follow.[hr]

“Be sure and call me anytime if you need anything or have any questions,” says the man who hands me the Verizon business card with his name and phone number handwritten on it.

I begin by asking him if he has a record of the work that Verizon has done at our house in the past year. That might help tell us whether a previous technician left the cable. He says he has no access to such records and that the main office wouldn’t have any, either. He’ll just need to take a look at the box himself. As I lead him to the back of the house, I text Jeff to come over.

The technician takes one look at the cable and says it doesn’t belong.[hr]

Click here to support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

“Yeah, that shouldn’t be there.”
“Why’s it here, then?” I ask.
“Well, we deal with a lot of third-party contractors. It probably got left here when some work was done and a contractor was supposed to pick it up but didn’t. Something like that,” he says. “I’ll just remove it.”

He goes out to his truck to get some tools and Jeff arrives. We watch together as he removes the cable, coils it up, and prepares to take it with him.

“Just leave that here,” I say.
“Why?”
“I just want to keep it,” I tell him. I figure when I drop off my computer for analysis in a few days, I’ll send along the mystery cable, too. The Verizon technician seems hesitant but puts down the cable on top of the air-conditioning fan next to us. We continue to chat and I make a mental note: Don’t leave the cable there. If you do, it might disappear. The Verizon man really seems to want to take it. Am I imagining that?[hr]

Read excerpt #1 here: The Computer Intrusions: Up at Night

Read excerpt #2 here: Big Brother: First Warnings

Read excerpt #3 here: The Computer Intrusions: Disappearing Act[hr]

Jeff and I walk the technician back to his truck. Jeff has a few more questions for him but it’s chilly outside and I leave the two of them to finish their conversation.

A couple of days later, I’m driving to work when I remember the cable. I call my husband at home.

“Go get that cable off the air-conditioning fan,” I tell him.
I listen as he walks outside with the phone to look. “It’s gone.” “Gone? Are you sure?”
“Yeah, it’s nowhere around here,” he says. Also gone are several

other pieces of wire that Jeff had pulled up from the ground in front of the Verizon man.

“Well what happened to it?”

“The Verizon guy must’ve come back and taken it,” my husband speculates.

Later, at the office, I decide to call the Verizon technician and ask him myself. I want to know if he took the cable after I’d said to leave it, and why. More important, I hope he still has it so that I can have it examined. I have that handwritten business card he gave me. I call the phone number on it, it rolls me to his voice mail, and I leave a message. But he doesn’t call back. That day or any other. I call almost every day, sometimes twice a day, for the next month. But the once- helpful Verizon man never responds.

At least I still have my photographs.

And an expert source who’s willing to peer inside my laptop and see what secrets it might reveal about covert attempts to monitor my work.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

To be continued…[hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

 

The Computer Intrusions: Disappearing Act

The following is the third in a series of excerpts from my New York Times bestseller "Stonewalled," which recounts the government intrusions of my computers. More excerpts to follow.[hr]

| DISAPPEARING ACT

In late December 2012, I take up my friend’s offer to have my computer examined by an inside professional. Arrangements are made for a meeting.
In the meantime, Jeff wants to check out the exterior of my home. To examine the outside connections for the Verizon FiOS line and see if anything looks out of order.
“If you’re being tapped, it’s probably not originating at your house, but I’d like to take a look anyway,” he says.[hr]

Read excerpt #1 here: The Computer Intrusions: Up at Night

Read excerpt #2 here: Big Brother: First Warnings [hr]
“Sure, why not.” I don’t think he’ll find anything but there’s no harm in having him look. Maybe I should be more concerned. What if the government is watching me? What if they’re trying to find out who my sources are and what I may be about to report next?

“I did find some irregularities,” Jeff tells me on the phone after in- specting the outside of my home. “It could be nothing, but I’d rather discuss it in person.” We meet at my house and he walks me to a spot in the backyard just outside my garage. His primary concern is a stray cable dangling from the FiOS box attached to the brick wall on the outside of my house. It doesn’t belong.
“What is it?” I ask.
He picks up the loose end and untwists a cap exposing a tiny glass dome underneath. “It’s an extra fiber optics line,” he tells me. “In ad- dition to your regular line.”
“What’s it for?”
“I’m not an expert, but someone could remove the cap and attach a receiver and download data. Or they could put a tiny transmitter here,” he points to a place under the cap, “and send information to a receiver off site once a day, once a week, or whenever. You need to have this checked out.”
I photograph the cable and decide to begin by asking Verizon reps if they installed the extra line for some unknown reason. For the mo- ment, I’m operating under the assumption that the company will be able to explain everything. So on New Year’s Eve 2012, I place the call to Verizon and describe the mystery cable.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

“Can you tell me if this is something you installed?” I ask. I tell the representative that Verizon has made repeated troubleshooting visits to my house in the past year. Maybe a spare line got left behind.
The Verizon rep puts me on hold for long periods as she contacts one department, then another in hopes of answering my question. Fi- nally, she tells me authoritatively: “That’s nothing that we would have installed or left there. You need to contact law enforcement.”
“Can I email you a photograph and have your technicians look to be sure?” I ask.
I’m not convinced it’s time to call the cops. What would they do, anyway, other than tell me that they don’t know why the cable is there and recommend that I call Verizon? My husband, a former law enforcement official, agrees. Besides, in the unlikely event that there’s a legal tap on my phone, neither Verizon nor the police would tell me.
But the Verizon rep won’t let me send the photo for technicians to review. She insists they have no process that allows a customer to email a picture. For the moment, I give up. We’ll wait until the holi- days are over and get some advice on what we should do.[hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions

[hr]An hour later, my phone rings. A woman identifying herself as a Verizon supervisor says she’s following up on my call and wants to dispatch a technician to my house the next day to take a look. That’s New Year’s Day. I find that unnecessary and somewhat surprising. It’s not always easy to get a service call scheduled quickly, let alone on a holiday when I didn’t even ask for one.
“You don’t have to send anybody out on New Year’s Day,” I tell the supervisor. “Why don’t you let me just email this photograph and you might be able to save yourself the trouble. Maybe it’s just a piece of equipment your technicians installed or left here. Can’t someone look at the picture and see if they can tell?”
“No,” she insists. “We’ll just send a technician out tomorrow.”
I report this to Jeff, who also finds it curious that Verizon would rush out a technician, unsolicited, on New Year’s Day.
“Mind if I come by when he arrives?” he asks.
“That would be great.”
So I begin the first day of 2013 by answering a knock on the door.
The Verizon technician introduces himself and hands me a business card with his first name and phone number handwritten on it.

[hr] To be continued...[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.[hr]

 

Recreational Pot: Lessons Learned

This week, we head to the first state to allow recreational pot stores: Colorado. With so many states being lobbied to make marijuana legal, what can be learned from Colorado's experience? On Full Measure have the upside as well as the unintended consequences you might not have thought about.[hr]

Watch us on TV or replays online anytime, livestream Sundays at 9:30a ET www.fullmeasure.news

[hr]We'll also hear from a Washington Post columnist, Ruben Naravette, who says the media has gotten into the game--becoming the news story, debating issues, taking matters personally. He'll tell where he thinks we've gone off the rails.

President Donald J. Trump

And as President Trump threatens to eliminate automatic citizenship for the children of illegal immigrants born in the US, Rep. Henry Cuellar (D-Texas) explains the difference between the Dream Act and DACA.[hr]

Watch us on TV or replays online anytime, livestream Sundays at 9:30a ET www.fullmeasure.news

[hr]More original stories you won’t see anywhere else. Watch on TV or online at www.fullmeasure.news!

Full Measure TV station list here: https://sattkisson.wpengine.com/full_measure_station-list/[hr]

Order the New York Times bestseller “The Smear” today online or borrow from your library

Big Brother: First Warnings

The following is the second in a series of excerpts from my New York Times bestseller "Stonewalled," which recounts the government intrusions of my computers. More excerpts to follow.[hr]

| FIRST WARNINGS

Months before the rest of the world becomes aware of the government’s so-called snooping scandal I already know it’s happening to me.
Snooping scandal.[hr]Read excerpt #1 here: The Computer Intrusions: Up at Night[hr]
As serious as the implications are, the media manages to give it
a catchy little name. Not so much intruding, trespassing, invading, or spying. Snooping. You know, like a boyfriend snoops around on his girlfriend’s Facebook account. Or kids snoop through the closets for Christmas packages. It’s like dubbing HealthCare.gov’s disastrous launch a “glitch.”
In the fall of 2012, Jeff (not his real name), a well-informed acquaintance, is the first to put me on alert. He’s connected to a three-letter agency. He waves me down when he sees me on a public street.
“I’ve been reading your reports online about Benghazi,” he tells me. “It’s pretty incredible. Keep at it. But you’d better watch out.”
I take that as the sort of general remark people often make in jest based on the kind of reporting I do. As in: You’d better watch out for Enron, they have powerful connections. You’d better watch out for the pharmaceutical companies, they have billions of dollars at stake. You’d better watch out for Obama’s Chicago mafia. I hear it all the time.
But Jeff means something more specific.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.

[hr]“You know, the administration is likely monitoring you—based on your reporting. I’m sure you realize that.” He makes deep eye contact for emphasis before adding, “The average American would be shocked at the extent to which this administration is conducting surveillance on private citizens. Spying on them.” In these pre–NSA snooping scandal, pre–Edward Snowden days, it sounds far-fetched. In just a few months, it will sound uncannily prescient.
“Monitoring me—in what way?” I ask.
“Your phones. Your computers. Have you noticed any unusual happenings?”
Yeah, I have. Jeff’s warning sheds new light on all the trouble I’ve been having with my phones and computers. It’s gotten markedly worse over the past year. In fact, by November 2012, there are so many disruptions on my home phone line, I often can’t use it. I call home from my mobile phone and it rings on my end, but not at the house. Or it rings at home once but when my husband or daughter answers, they just hear a dial tone. At the same time, on my end, it keeps ringing and then connects somewhere, just not at my house. Sometimes, when my call connects to that mystery-place-that’s-not- my-house, I hear an electronic sounding buzz. Verizon can’t explain the sounds or the behavior. These strange things happen whether I call from my mobile phones or use my office landlines. It happens to other people who try to call my house, too. When a call does manage to get through, it may disconnect in mid-conversation. Sometimes we hear other voices bleed through in short bursts like an AM radio being tuned.

One night, I’m on my home phone, reviewing a story with a CBS lawyer in New York and he hears the strange noises.
“Is (click) your phone tapped (clickity-click-bzzt)?” he asks. “People (clickity-bzzt) seem to think so (click-click),” I say. “Should we speak (click-click) on another line?”
“I don’t think a mobile phone is any better (bzzzzzt) for privacy,”
I tell him.

Our computers and televisions use the same Verizon fiber optics FiOS service as does our home phone and they’re acting up, too. And the house alarm sounds at a different time every night. When I scroll through the reason code to reset the alarm panel, it always indicates the same problem: trouble with the phone line. Two a.m. one night. Three forty-seven a.m. the next. No rhyme or reason.
The television is misbehaving. It spontaneously jitters, mutes, and freeze-frames. My neighbors aren’t experiencing similar interruptions. I try switching out the TV, the FiOS box, and all the cables. Verizon has done troubleshooting ad nauseam during the past year and a half. To no avail.

Then, there are the computers. They’ve taken to turning them- selves on and off at night. Not for software updates or the typical, automatic handshakes that devices like to do periodically to let each other know “I’m here.” This is a relatively recent development and it’s grown more frequent. It started with my personal Apple desktop. Later, my CBS News Toshiba laptop joined the party. Knowing little about computer technology, I figure it’s some sort of automated phishing program that’s getting in my computers at night, trolling for passwords and financial information. I feel my information is sufficiently secure due to protections on my system, so I don’t spend too much time worrying about it. But the technical interruptions get to the point where we can’t expect to use the phones, Internet, or television normally.

Around Thanksgiving, a friend tries to make a social call on my home phone line. I see his number on the caller ID but when I pick up, I hear only the familiar clicks and buzzes. He calls back several times but unable to get a clear connection, he jumps in his car and drives over.
“What’s wrong with your phone?” he asks. “It sounds like it’s tapped or something.”
“I don’t know,” I answer. “Verizon can’t fix it. It’s a nuisance.”
“Well, if it’s a tap, it’s a lousy one. If it were any good, you’d never know it was there.”

Numerous sources would tell me the same thing in the coming months. When experts tap your line, you don’t hear a thing. Unless they want you to hear, for example, to intimidate you or scare off your sources.
Well, it’s silly to think that my phones could really be tapped. Or my computers, for that matter. Nonetheless, I tell the friend who’d tried to call my house about the computer anomalies, too.
“If you want to get your computer looked at, I might know someone who can help you out,” he offers. Like so many people in Northern Virginia, he has a trusted connection who has connections to Washington’s spook agencies. I say I’ll think about it.

On one particular night, the computer is closed and on the floor next to my bed. I hear it start up and, as usual, I shake myself awake. I lift my head and see that the screen has lit up even though the top is shut. It does its thing and I roll over and try to go back to sleep. But after a few seconds, I hear the “castle lock” sound. That’s what I call the sound that’s triggered, for example, when I accidentally type in the wrong password while attempting to connect to the secure CBS system.
They’re trying to get into CBS, I think to myself. Hearing the castle lock, I figure they’ve failed. Gotten locked out. Nice try. Only later do I learn that they had no trouble accessing the CBS system. Over and over.

When I describe the computer behavior, my contacts and sources ask me when I first noticed it. I don’t know. I didn’t pay much attention at the time. On the Apple, I figure it was at least 2011. Maybe 2010. My husband would sleep through it. Later, I’d remark to him that the computer woke me up last night.
“Do you think people can use our Internet connection to get into our computers at night and turn them on to look through them?” I’d ask him, thinking only of amateur hackers and spammers.
“Of course they can,” he’d say matter-of-factly.[hr]

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions[hr]

The second week of December 2012, my Apple desktop has just had a nighttime session. A night or two later, it’s my CBS News laptop. I look at the clock next to the bed. The green glow of 5:02 a.m. blinks back at me. Later than usual. Considering the discussions I’m now having with my contacts who think I may be tapped, I decide it might be useful to start logging these episodes. But no sooner do I begin this task than the computers simply . . . stop. It’s as if they know I’ve begun tracking them and the jig’s up. The first time I attempt to formally log the activity would be the very last time I’d notice them turning on at night. This time frame, when I noticed the activity halts, December 10 through December 12, 2012, later becomes an important touchstone in the investigation.

[hr] To be continued...[hr]
Order the New York Times bestseller "The Smear" today online or borrow from your library

The Computer Intrusions: Up at Night

The following is an excerpt from my New York Times bestseller "Stonewalled," which recounts the government intrusions of my computers. More excerpts to follow.[hr]

| Big Brother |
My Computer’s Intruders
"Reeeeeeeeeee.”
The noise is coming from my personal Apple desktop computer in
the small office adjacent to my bedroom. It’s starting up. On its own.
“Reeeeeee . . . chik chik chik chik,” says the computer as it shakes itself awake.
The electronic sounds stir me from sleep. I squint my eyes at the clock radio on the table next to the bed. The numbers blink back: “3:14 a.m.”
Only a day earlier, my CBS-issued Toshiba laptop, perched at the foot of my bed, had whirred to life on its own. That too had been untouched by human hands. What time was that? I think it was 4 a.m.
Some nights, both computers spark to life, one after the other. A cacophony of microprocessors interrupting the normal sounds of the night. After thirty seconds, maybe a minute, they go back to sleep. I know this is not normal computer behavior.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.

[hr]My husband, a sound sleeper, snores through it all. Half asleep, I try to remember how long ago my computers first started going rogue. A year? Two? It no longer startles me. But it’s definitely piquing my curiosity.
It’s October 2012, and I’ve been digging into the September 11
terrorist attacks on Americans at the U.S. mission in Benghazi, Libya. It’s the most interesting puzzle I’ve come across since the Fast and Furious gunwalking story, which led to international headlines and questions that remain unanswered.
Solving these kinds of puzzles is probably the challenge that drives me most. There’s nothing like an unsolved mystery to keep me at the computer or on the phone until one or two in the morning. Most mysteries can be solved, you just have to find the information. But too often, the keepers of the information don’t want to give it up . . . even when the information belongs to the public.
Now my computers offer a new mystery to unravel. I already had begun mentioning these unusual happenings to acquaintances who work in secretive corners of government and understand such things. Connections I’d met through friends and contacts in the northwest Virginia enclaves. Here, so many work for—or recently retired from—one of the “alphabet agencies.” CIA. FBI. NSA. DIA. They’re concerned about what I’m experiencing. They think something’s going on. Somebody, they tell me, is making my computers behave that way.[hr]

CBS News confirms Attkisson's work computer remotely attacked.

[hr]They’re also worried about my home phone. It’s practically unusable now. Often, when I call home, it only rings once on the receiving end. But on my end, it keeps ringing and then connects somewhere else. Nobody’s there. Other times, it disconnects in the middle of calls. There are clicks and buzzes. My friends who call hear the strange noises and ask about them. A CBS lawyer reviewing a story with me asks, half-jokingly, “Is your phone tapped?” My whole family’s tired of it. Verizon has been to the house over and over again but can’t fix whatever’s wrong.
On top of that, my home alarm system has begun chirping a nightly warning that my phone line is having “trouble” of an unidentified nature. It chirps until I get out of bed and reset it. Every night. Different times.
I’m losing sleep.

[hr]Click here to support: Sharyl Attkisson 4th Amendment Litigation Fund[hr]
I’m the one who tries to get information from the keepers and I can
be relentless. That kind of tenacity doesn’t always make friends, not even at CBS News, which has built an impressive record for dogged reporting in the tradition of Edward R. Murrow, Eric Sevareid, and Mike Wallace. But that’s okay. I’m not in journalism to make friends.
My job is to remind politicians and government officials as to who they work for. Some of them have forgotten. They think they person- ally own your tax dollars. They think they own the information their agencies gather on the public’s behalf. They think they’re entitled to keep that information from the rest of us and—make no mistake— they’re bloody incensed that we want it.
The Benghazi mystery is proving especially difficult. The feds are keeping a suspiciously tight clamp on details. They won’t even say how long the attacks went on or when they ended. What they do reveal some- times contradicts information provided by their sister agencies. And some of the most basic, important questions? They won’t address at all.
For months, the Obama administration has dismissed all questions as partisan witch-hunting. And why not? That approach has proven successful, at least among some colleagues in the news media. They’re apparently satisfied with the limited answers. They aren’t curious about the gaping holes. The contradictions. They’re part of the club that’s decided only agenda-driven Republicans would be curious about all of that. These journalists don’t need to ask questions about Benghazi at the White House press briefings, at Attorney General Eric Holder’s public appearances, or during President Obama’s lim- ited media availabilities. It might make the administration mad. It might even prompt them to threaten the “access” of uncooperative journalists. Other journalists simply think it would be rude—maybe even silly—to waste time pursuing a topic of such little consequence.
There are so many more important things going on in the world. But still, I’m curious.
What did the president of the United States do all that night
during the attacks? With Americans under siege and a U.S. ambas- sador missing—later confirmed dead—what actions did the com- mander in chief take? What decisions did he make?
I’m making slow but steady progress in finding answers to some of the mysteries. Some of my sources are in extremely sensitive positions. They say lies are being told. They’re angry. They want to set the re- cord straight. But they can’t reveal themselves on television. It would end their careers and make them pariahs among their peers. Little by little, with their help, I’m piecing together bits of the puzzle.
Those involved in the U.S. response to the attacks tell me that the U.S. government was in sheer chaos that night. Those with knowledge of military assets and Special Forces tell me that resources weren’t fully utilized to try to mount a rescue while the attacks were under way. Those with firsthand knowledge say that the government’s interagency Counterterrorism Security Group wasn’t convened, even though presidential directive requires it. Others whisper of the State Department rejecting security requests and overlooking warning signs in the weeks leading up to the attacks.[hr]

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.

[hr]There are those in government who don’t like it that the sources are talking to me. “Why are they speaking to reporters,” they grumble to each other, “revealing our dirty laundry, telling our secrets?” These are powerful people with important connections.
I start to think that may be why my computers are losing so much sleep at night.[hr]

More excerpts to come... [hr]

Order the New York Times bestseller "The Smear" today online or borrow from your library
« Previous Page
Next Page »

Primary Sidebar

Coming Soon

Subscribe

Get the Latest Stories Straight to Your Inbox

Follow Sharyl Attkisson

  • Facebook
  • Instagram
  • RSS
  • Twitter
  • YouTube

Recent Comments

  • Mickey Pullen on Hydroxychloroquine: Politicizing Medicine (PODCAST)
  • Mike Marinak on Hydroxychloroquine: Politicizing Medicine (PODCAST)
  • Debunking “The Hotchkiss Republicans Report” - The Hotchkiss Record on "Collusion against Trump" timeline

Subscribe

Get the Latest Stories Straight to Your Inbox

Footer

Pages

  • Home
  • About
  • Podcast
  • Support
  • Contact

2ndary Pages

  • Full Measure Stations
  • Privacy Policy
  • Terms of Use
  • Subscribe to SharylAttkisson.com

SPECIAL INVESTIGATIONS

  • Attkisson v. DOJ/FBI
  • Benghazi
  • Fake News
  • Fast & Furious
  • Obamacare

Ad

Ad