"It profits me but little that a vigilant authority always protects the tranquillity of my pleasures and constantly averts all dangers from my path, without my care or concern, if this same authority is the absolute master of my liberty and my life."

--Alexis de Tocqueville, Democracy in America

Wednesday, October 29, 2014

"Worse than anything Nixon ever did."


























Hard to even know what to say about this story about former CBS reporter Sharyl Attkisson, and what happened to her when she was breaking the Benhazi cover-up story:

Next big moment: Attkisson gets her computer checked out by someone identified as “Number One,” who’s described as a “confidential source inside the government.” A climactic meeting takes place at a McDonald’s outlet at which Attkisson and “Number One” “look around” for possibly suspicious things. Finding nothing, they talk. “First just let me say again I’m shocked. Flabbergasted. All of us are. This is outrageous. Worse than anything Nixon ever did. I wouldn’t have believed something like this could happen in the United States of America.” That’s all coming from “Number One.” 
The breaches on Attkisson’s computer, says this source, are coming from a “sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA).” Attkisson learns from “Number One” that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the “intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool.” 
To round out the revelations of “Number One,” he informs Attkisson that he’d found three classified documents deep inside her operating system, such that she’d never know they were even there. “Why? To frame me?” Attkisson asks in the book. 
So CBS News hires an independent computer analyst whom Attkisson identifies as “Jerry Patel,” also a pseudonym. He finds a massive amount of suspicious activity in the computer, including the removal of all kinds of log messages. The author describes the scene as “Patel” does his work: “Now he’s breathing heavily. It alarms me because it alarms him and he’s not easily alarmed. His voice becomes more formal and he launches into what sounds like a speech for posterity. ‘In my professional opinion, someone has accessed this box … I see evidence that shows a deliberate and skilled attempt to clean the log files of activity.’” Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.”

Too easy:   if this were a Republican administration, we'd already have impeachment articles drawn up.

Closer to the truth:  we are in the first moments of what will be a long war between citizens and the soft totalitarianism of the vast federal bureaucracy.  

No comments:

Post a Comment