Get PJ Media on your Apple

The PJ Tatler

by
Bryan Preston

Bio

June 17, 2013 - 1:52 pm

CBS reporter Sharyl Attkisson has provided more details on the hacking of her work and home computers. Attkisson told CBS Philadelphia reporter Dom Giordano that the computers that were hacked were only used for her reporting work, and for a few personal financial purposes. As a national broadcast network reporter, Attkisson’s salary is likely well above that of most Americans, yet the hacker or hackers showed no interest in her financial life at all.

“The intruders did have access to personal information including passwords to my financial accounts and so on, but didn’t tamper with those, so they weren’t interested in stealing my identity or doing things to my finances. So people can decide on their own what they might have been trying to do in there,” Attkisson said.

Through forensics, investigators have ruled out malware or any phishing schemes. There was a person or group of people accessing Attkisson’s computers, and they had the ability to turn the machines on and off remotely.Attkisson first became suspicious when the machines were turning on or waking up from sleep state at odd times.

Attkisson says she was working on just two things when her machines were hacked: Fast and Furious, and Benghazi.

Bryan Preston has been a leading conservative blogger and opinionator since founding his first blog in 2001. Bryan is a military veteran, worked for NASA, was a founding blogger and producer at Hot Air, was producer of the Laura Ingraham Show and, most recently before joining PJM, was Communications Director of the Republican Party of Texas.

Comments are closed.

All Comments   (6)
All Comments   (6)
Sort: Newest Oldest Top Rated
More likely she let it 'go to sleep' by itself after a time of inactivity. When in 'sleep' or 'hibernate', it can be awakened by multiple actions, keystrokes, mouse movement, and perhaps incoming data packets ....
She could have just closed the lid, thinking that turned it "Off", while it may have done the suspend or hibernate function.
From what I've read and heard, she has a very good idea of who was doing the poking around. I would bet on a close relationship to someone at 1600 Pennsylvania Avenue, Washington, D.C.

tom
1 year ago
1 year ago Link To Comment
Maybe it was HAL
1 year ago
1 year ago Link To Comment
If you have your computer set for "wake on lan", then yes, it can be remotely turned on.
1 year ago
1 year ago Link To Comment
I've wondered if the intruders set the computers to turn on or wake up at certain times when they expected Attkisson would be asleep or away from them. That isn't difficult to do. They could have set the machines to turn on or wake from sleep state at, say, 3 am and then commenced snooping around.
1 year ago
1 year ago Link To Comment
Her actual words were unclear as to what exactly was happening. Imprecise terminology can confuse things. Maybe, though, it is just that I do not know enough. Can someone remotely turn on your computer, if it physically off? Don't think so. Does she leave it on at night, and just log off, in order to allow an automatic back-up? In that case, yes, someone could access it, right?
1 year ago
1 year ago Link To Comment
I think power switches have become so software-controlled I wouldn't rule it out. There just really isn't such a thing as "physically off" anymore unless you open the case and pull cables.
1 year ago
1 year ago Link To Comment
View All