#Spyculture – Vizio Pays Millions for Secretly Monitoring Customers’ Viewing Habits

Source: RTAmerica
February 19, 2017

Mike Papantonio highlights a $2.2 million settlement by television maker, Vizio, for using software to spy on the viewing habits of their customers.

Is The NSA The Real President Of The United States?

spying2
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
February 16, 2017

The US intelligence community continues its war to kick Donald Trump to the curb and destroy his presidency.

Obviously, the NSA, the CIA, and their silent partners want to continue to run this country.

So they spy and leak, spy and leak.

We’ll get to the guts of the problem in a minute, but first a word from Bill Binney.

Breitbart: “William Binney, a former highly placed NSA official turned whistleblower, contended in an exclusive interview today that the National Security Agency (NSA) is ‘absolutely’ monitoring the phone calls of President Donald Trump.”

“Binney was an architect of the NSA’s surveillance program. He became a famed whistleblower when he resigned on October 31, 2001 after spending more than 30 years with the agency.”

“Asked whether he believes the NSA is tapping Trump, Binney replied: ‘Absolutely. How did they get the phone call between the president and the president of Australia? Or the one that he made with Mexico? Those are not targeted foreigners’.”

“Binney further contended the NSA may have been behind a data leak that might have revealed that Michael Flynn, Trump’s national security adviser, allegedly misled Vice President Mike Pence and other Trump administration officials about the contents of his phone calls with Russia’s ambassador to Washington.”

“Regarding Flynn’s case, Binney stated of the NSA”:

“’If they weren’t behind it, they certainly had the data. Now the difference here is that FBI and CIA have direct access inside the NSA databases. So, they may be able to go directly in there and see that material there. And NSA doesn’t monitor that. They don’t even monitor their own people going into databases’.”

“So, they don’t monitor what CIA and FBI do. And there’s no oversight or attempted oversight by any of the committees or even the FISA court. So, any way you look at it, ultimately the NSA is responsible because they are doing the collection on everybody inside the United States. Phone calls. Emails. All of that stuff’.”

“Utilizing data provided by whistleblower Edward Snowden, the Guardian and Washington Post in June 2013 released a series of articles reporting that the NSA was collecting the telephone records of millions of Americans.”

“…’they [the NSA, Binney said]] are given too much money anyway. When they are given too much money, they get to do wild and crazy things. And this is wild and crazy. Violations of the Constitution’s 4th, 5th, and 6th amendments’.”

—end of Breitbart clip—

—Nearly two years ago, on April 19, 2014, I wrote: “Taking the overall [NSA] scheme to another level, consider this: those same [NSA] heavy hitters who have unfettered access to financial information can also choose, at opportune moments, to expose certain scandals [e.g., Michael Flynn] and crimes. In this way, they can, at their whim, cripple governments [e.g., the Trump administration]…”

Now we come to the guts of the problem. Here is my complete article from April 10, 2014:

The Surveillance State has created an apparatus whose implications are staggering. It’s a different world now. And sometimes it takes a writer of fiction to flesh out the larger landscape.

Brad Thor’s novel, Black List, posits the existence of a monster corporation, ATS, that stands alongside the NSA in collecting information on every move we make. ATS’ intelligence-gathering capability is unmatched anywhere in the world.

On pages 117-118 of Black List, Thor makes a stunning inference that, on reflection, is as obvious as the fingers on your hand:

“For years ATS had been using its technological superiority to conduct massive insider trading. Since the early 1980s, the company had spied on anyone and everyone in the financial world. They listened in on phone calls, intercepted faxes, and evolved right along with the technology, hacking internal computer networks and e-mail accounts. They created mountains of ‘black dollars’ for themselves, which they washed through various programs they were running under secret contract, far from the prying eyes of financial regulators.”

“Those black dollars were invested into hard assets around the world, as well as in the stock market, through sham, offshore corporations. They also funneled the money into reams of promising R&D projects, which eventually would be turned around and sold to the Pentagon or the CIA.”

“In short, ATS had created its own license to print money and had assured itself a place beyond examination or reproach.”

In real life, whether the prime criminal source is one monster- corporation or a consortium of companies, or elite banks, or the NSA itself, the outcome would be the same.

It would be as Thor describes it.

We think about total surveillance as being directed at private citizens, but the capability has unlimited payoffs when it targets financial markets and the people who have intimate knowledge of them.

“Total security awareness” programs of surveillance are ideal spying ops in the financial arena, designed to suck up millions of bits of inside information, then utilizing them to make investments and suck up billions (trillions?) of dollars.

It gives new meaning to “the rich get richer.”

Taking the overall scheme to another level, consider this: those same heavy hitters who have unfettered access to financial information can also choose, at opportune moments, to expose certain scandals and crimes (not their own, of course).

In this way, they can, at their whim, cripple governments, banks, and corporations. They can cripple investment houses, insurance companies, and hedge funds. Or, alternatively, they can merely blackmail these organizations.

We think we know how scandals are exposed by the press, but actually we don’t. Tips are given to people who give them to other people. Usually, the first clue that starts the ball rolling comes from a source who remains in the shadows.

What we are talking about here is the creation and managing of realities on all sides, including the choice of when and where and how to provide a glimpse of a crime or scandal.

It’s likely that the probe Ron Paul had been pushing—audit the Federal Reserve—has already been done by those who control unlimited global surveillance [NSA]. They already know far more than any Congressional investigation will uncover. If they know the deepest truths, they can use them to blackmail, manipulate, and control the Fed itself.

The information matrix can be tapped into and plumbed, and it can also be used to dispense choice clusters of data that end up constituting the media reality of painted pictures which, every day, tell billions of people “what’s news.”

In this global-surveillance world, we need to ask new questions and think along different lines now.

For example, how long before the mortgage-derivative crisis hit did the Masters of Surveillance know, from spying on bank records, that insupportable debt was accumulating at a lethal pace? What did they…

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Left Right Paradigm, India Kicks Out Bill & Melinda Gates Foundation – #NewWorldNextWeek

Source: TheCorbettReport
James Corbett
February 13, 2017

Welcome to New World Next Week – the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: 92% Of Berlin Left-Wing Activists Live With Their Parents
http://bit.ly/2kUOzMb

“92 Per Cent Of The Radically Left-Wing Ones Still Live With Mummy”
http://bit.ly/2kJFxzz

“If You Are Not a Liberal at 25, You Have No Heart. If You Are Not a Conservative at 35 You Have No Brain”
http://bit.ly/2gXJOx2

Is the Agenda a New Civil War?
http://bit.ly/2kGxV0A

Police Paid Informants £19.5M In Five Years
http://bit.ly/2kJzoDo

Story #2: Firm That Helped Feds Crack iPhone Gets Hacked, Tools Leaked Online
http://bit.ly/2kV7PJl

#MorningMonarchy: Israeli Phone Hacking Firm Cellebrite Confirms “Information Security Breach” (Jan. 17, 2017 ~ Coverage @ 23:58)
http://bit.ly/2ktNV7B

Derrick Broze Explains Jeff Sessions’ War on Encryption
http://bit.ly/2lpT7He

Ohio Man’s Pacemaker Data Betrays Him In Arson, Insurance Fraud Case
http://bit.ly/2k4NWAC

#MorningMonarchy: The Pacemaker Panopticon
http://bit.ly/2kool1i

Story #3: Gates Foundation Mission Shut Down In India For Big Pharma Ties
http://bit.ly/2kPYK5e

Beware Americans Bearing Gifts: NGOs as Trojan Horses
http://bit.ly/2kQ5cJp

The Biometric ID Grid: A Country-by-Country Guide


Source: James Corbett
corbettreport.com
January 31, 2017

In last week’s report on India’s demonetization disaster I began to connect the dots between demonetization, the push for a cashless society, and the biometric identification schemes that will eventually tie everyone’s fingerprints, iris scans, and other identifying details to every transaction they ever make.

Well, that game of “connect the dots” just became even easier to play.

First, it was reported last week that a key panel advising the government on its implementation of the “digital payments ecosystem” (that is being pushed and funded by USAID) is now recommending that India links its national biometric ID database directly to tax returns.

And now comes word that India is “working on a biometrics-backed payment system that will be connected to a user’s unique ID number, or Aadhaar.” (Who could have seen that coming?)

No, it doesn’t take a Nostradamus to understand where this is all heading: From the cashless society and the biometric ID grid to the cashless biometric grid. And we already know about the cashless society. Now it’s time to collect the data on the biometric ID grid.

And let’s not be naive: As I’ve demonstrated before, this is a coordinated plan to institute a worldwide biometric id system to track every human on the planet.

But given how fast and furious these new biometric databases are coming online, no one person can possibly keep track of them all. That’s why I’m calling on Corbett Report members to help assemble this information. Like last year’s open source investigation into the War on Cash, this country-by-country guide will be updated with input from the Corbett Report community. Members of the site are invited to log in and leave links to information about the biometric ID grid in their country in the comments section below.

The Biometric ID List

Afghanistan – In 2016 the US bragged about their role in helping the Afghan Ministries of Defense and Interior roll out biometric ID systems for their workers. Also in 2016 the Afghanistan Telecom Regulatory Authority revealed that they wanted to “start linking biometrics to new SIM card registrations, to improve national security.” As has been widely reported, the US military has been waging “biometric warfare” in the country as part of its invasion, occupation and (de)stabilization effort since at least 2010. The Afghanistan National Security Forces has now deployed their own Automated Biometric Information System with fingerprint, iris, and facial scan capabilities and is “compatible with the U.S. DoD ABIS and the FBI Integrated Automated Fingerprint Identification System.”

Albania – In 2009 Albania began issuing a new type of biometric identity card. The card is in compliance with ICAO standards and contains an embedded chip that stores fingerprints and a digital photograph along with biographical information.

Australia – Australia has been issuing biometric passports since 2005 and the Department of Immigration and Border Protection (DIBP) has been running biometrics collection centres for years to issue visas tied to visitors’ biometric details. But now, Australia is about to lead us into a Brave New World with a world first: The DIBP is going to introduce the first “self-processing system” for travelers at Australian airports later this year using biometric details instead of a passport. Australian schools have implemented fingerprint scans as a method of tracking attendance at schools despite a strong backlash from parents that led to similar programs being suspended in the past.

BahamasLast month the Bahamas began issuing biometric passports. In keeping with international standards, the passports will require a digital photograph and fingerprints from the passport holder.

Bermuda – From June 2016 Bermuda has outsourced printing of its passports to the UK so that Bermuda’s “citizens” could enjoy the “benefits” of biometric passport technology, “which includes the highest level of internationally recognised security standards.”

Bolivia – In 2009 Bolivia’s elections were held using an electoral voter list created by using biometric data. In 2016 the Bolivian government began a 12-month program to perform a biometric census on the country’s foreign population.

Bulgaria – Bulgaria began issuing biometric identity cards (mandatory for all citizens) in March 2010. Bulgaria also issues biometric passports and driver’s licenses containing embedded biometric data.

Brazil – Brazil began issuing biometric identity cards in 2011 with the intention of issuing cards as part of its Registro de Identidade Civil, which intends to capture the biometric details of all 150 million citizens by 2020. Also in 2011 the Brazilian Electoral Justice approved the roll out of a biometric voter registration system that requires voters to register their fingerprints in order to vote (which is mandatory).

Canada – Under NEXUS, the joint Canada-US “preferred traveler” program, iris scans are used to identify passengers. In 2015 the Canadian government expanded biometric screening, including fingerprints and digital photos, to visitors from all 151 visa-required countries.

Chad – The European Union is funding a program in Chad to register the biometric details of refugees and returnees fleeing war-torn neighboring countries.

Chile – In 2013 Chile rolled out its new national ID and passport infrastructure including an eID card which “is based on a multi-biometric system comprised of an Automated Fingerprint Identification System (AFIS) and a Facial Recognition System.” The country aims to issue all of its 18+ million citizens with a card by 2022.

China – In 2016 China debuted its first airport biometric entry system. The system takes travelers’ photos at security checkpoints within the airport, linking their faces to their boarding passes.

Finland – Finland introduced biometric residence permit cards in 2012. The cards include a chip that stores a digital photograph and two fingerprints.

France – France has issued only biometric passports since 2009. The passport requires the collection of a biometric digital photo and eight fingerprints.

Germany – Germany introduced biometric passports in 2005 and biometric residence permits in 2011, both of which require a biometric digital photograph and two fingerprints to be collected and stored on an embedded chip. Germany’s identity card does require a biometric photo, but so far fingerprint collection is optional.

Greece – In compliance with the dictates of Washington, the Greek government is set to issue new biometric IDs this year. As Greek Report notes: “Failure to create the new IDs in a timely manner could lead to a suspension in the visa-free travel to the US that Greeks currently enjoy.”

India – India has been fingerprinting and iris scanning its population for years in its quest to construct the largest biometric ID database in the world. The plan to collect and store biometric details on all 1.2 billion Indian citizens is proceeding apace, and has so far registered over 1.1 billion people, including over 99% of all Indians over 18.

Iraq – In 2016 the Iraqi government began a national identity card system that uses biometric identifiers. This system has been widely criticized for legally allowing discrimination of minorities.

Israel – In 2009 the Knesset enacted the controversial Biometric Database Law to pave the way for the implementation of a national biometric ID database. Last July it was reported that the “pilot program” had come to an end and all Israeli residents would be forced to register their biometric details with the government. In December it was announced that the mandatory implementation of the database was being delayed and that fingerprints may no longer be required.

Japan – In 2007 the Japanese government began requiring fingerprints and digital photographs from all foreign travelers. Now, the government is considering implementing a biometric ID payment system which will “allow” (sic) tourists to “register their fingerprints or finger vein patterns among other personal information with the service and then deposit a set amount of money in a connected account,” from which they can make purchases while in the country.

Kenya – In 2012 Kenya began biometric voter registration and in 2015 the government implemented a biometric registration system for all citizens aged 12 and over. The registration includes fingerprint collection and is tied to a national database.

Kuwait – In 2015 Kuwait passed a law requiring all citizens and visitors to submit to DNA testing for a national database. After a wave of protest, legal challenges, and opposition from the emir of Kuwait the parliament announced in October 2016 that they would “scale down” and potentially revoke the law.

Luxembourg – In accordance with EU standards Luxembourg issues biometric passports with a chip containing a digital photograph, two fingerprints and an image of the holder’s signature.

Mexico – In 2011 the Mexican government began a program to issue biometric identification cards to all children between 4 and 17 years old. The cards contain a digital photograph, a fingerprint and an iris scan. The scheme is part of a broader National Population Register that will eventually extend to adults and contain the biometric details of the entire population of Mexico.

Netherlands – Since 2009 the Netherlands has issued biometric passports containing an embedded chip with a digital photograph and fingerprints. Four Dutch citizens challenged the legality of the practice of collecting fingerprints but it was approved by the European Court of Justice. Although only two fingerprints are stored on the passport’s chip, four fingerprints are taken and stored by the local government in a central database that is also used to pursue criminal investigations.

New Zealand – New Zealand’s Inland Revenue Department rolled out “Voice ID” in 2011 to register “customers’” voice prints and identify them in future interactions. By 2015 1.4 million of the country’s 6.1 million taxpayers had registered their voice prints with the “service.”

Nigeria – Nigeria is contracting with Bio-Metrica to collect citizens’ fingerprint and facial biometrics for the nation’s 2018 census.

Paraguay – In 2009 Paraguay revamped its passports and mandatory identity cards for its New Identification System by adding biometric details including a thumbprint and digital photograph.

Peru – Last year Peru announced a 3-year program to issue 1.6 million biometric passports noting that these biometric documents are “required to consolidate the Schengen visa waiver process.”

Philippines – In 2014 the Commission on Elections announced that biometric registration would be mandatory for all voters in the Philippines’ 2016 election. However, “technical problems” meant the government had to allow some voters with incomplete or corrupted biometric data to vote anyway. Voters continue to register for polls, with the Philippines’ Commission on Elections allocating US$201,000 last month to voter registration machines (VRMs) and peripherals.

Saudi Arabia – In 2015 Saudi Arabia finalized its Automated Central System to collect and store the biometric details (including fingerprints) of all citizens and expatriates. Also in 2015 the country’s biometric border security system was launched.

Sierra Leone – Just last week the Sierra Leone government confirmed receipt of 4,066 biometric registration kits that will be used to register voters for the 2018 elections. The aim is to construct a single, biometric voter register “that will capture every resident in Sierra Leone.”

South Korea – In 2012 the Korean government began collecting fingerprints and digital photographs of all foreign visitors (except foreign government officials/international organization representatives and their accompanying immediate family members as well as persons under 17 years of age).

Switzerland – Switzerland launched its biometric passport in 2010 after a referendum was held to approve the measure. The referendum passed with 50.14% of the vote, making it one of the closest referendums in Swiss history. The passports adopt the “international standard” of collecting two fingerprints (one from each index finger) and a digital photograph of the holder’s unsmiling face.

Trinidad and Tobago – In 2012 it was reported that the country was moving to fully implement biometric passports within five years. In 2013 the Ministry of the People and Social Development announced they were launching a fingerprint-based biometric smart card for citizens to access social benefits, citing fraud and security as reasons for the switch. The very next year the company that was manufacturing the cards warned that the system was vulnearable to identity theft and left the door open for frauds and scams. The cards were rolled out in 2015. Last year Major General Edmund Dillon, the Minister of National Security, announced the government was considering the implementation of biometric border screening at the country’s two international airports in keeping with a “United Nations security resolution requiring the implementation of security mechanisms to stop terrorists from returning to the country from abroad, with passenger screening systems being an important component of such efforts.”

Ukraine – A law passed by the Yanukovych government in 2012 requires all Ukrainian citizens, regardless of age, to obtain a biometric passport.

United Kingdom – The UK under the Labour government of Tony Blair and later Gordon Brown attempted to implement a national identity register and ID card system that would have required the logging of an extensive amount of personal and biometric information in a central database. However, the program caused waves of protest and the government eventually gave in to the public outcry, scrapping the plan for the national registry and instead only implementing the biometric id scheme for foreign nationals. The UK does issue biometric passports and recent polling suggests UK adults “are now willing to embrace biometric identity for online banking.”

United States – President Trump’s new Executive Order on “terrorist” (sic) entry calls on the Department of Homeland Security to “expedite the completion and implementation of a biometric entry-exit tracking system for all travelers to the United States.” (This comes as no surprise to those who warned that Trump’s transition team was swarming with biometric industry workers and lobbyists.) The United States already takes digital fingerprints of all foreign tourists (except Canadians) and stores them in a database for 75 years.  The DoD has announced plans to replace Common Access Card access to information systems with biometric authentication. The US issues biometric passports and coordinates with the Canadian government on the biometric NEXUS preferred traveler program (see Canada).

Uruguay – In 2013 the Uruguayan government opened a open call for tenders for a new eID “solution.” In 2014 Gemalto won the tender and began work on the new biometric eID cards that can store up to four fingerprints.

Yemen – In 2014 it was announced that the country of Yemen would be deploying M2SYS Technology’s TrueVoter biometric voting platform for the upcoming constitutional referendum and national elections. The system is capable of fingerprint, iris, palm print, finger vein, palm vein, and facial recognition, but only fingerprint and facial recognition are collected by the Yemeni government.

Zambia – In 2015 Zambia announced that they would be phasing in biometric National Registration Cards for the 2016 election.

Zimbabwe – The government of Zimbabwe has ruled out biometric or electronic voting in the country’s 2018 elections, but will proceed with biometric voter registration this year.

The Biometric ID Grid: An Open Source Investigation

Source: CorbettReport
James Corbett
February 1, 2017

READ THE REPORT HERE: https://www.corbettreport.com/?p=21603

The biometric ID grid is closing in as country after country implements biometric passports, biometric id databases and, yes, biometric payment systems. If you’re interested in contributing to this open source investigation and leaving info about your country, please read the report on CorbettReport.com:

https://www.corbettreport.com/?p=21603

Actual Hacking: Every Reporter Needs To Understand Sharyl Attkisson’s Case Against The US Government

QuestionEverything2
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
January 31, 2017

Sharyl Attkisson was a star investigative reporter for CBS News. After two decades at the network, she resigned on March 10, 2014.

Among the controversial stories she covered: the Fast and Furious gun-walking program, in which the government “purposely allowed licensed firearms dealers to sell weapons to illegal straw buyers, hoping to track the guns to Mexican drug cartel leaders and arrest them” (LA Times, 10/3/11); the Benghazi attacks and murders; the CDC fraud in grossly overestimating the number of Swine Flu cases in America.

Attkisson now hosts a weekly television news program, Full Measure, for the Sinclair Broadcast Group. She writes at sharylattkisson.com.

Attkisson is also engaged in a struggle with the federal government.

Attkisson writes: “I just filed my latest appeal to the FBI’s improper withholding of my FBI file. You may not know it, but every American citizen—even a lowly reporter—is entitled to see his FBI file, if one exists.”

I queried Attkisson about this yesterday, and she replied: “I find it unacceptable that the federal government, and specifically the nation’s top law enforcement agency (DOJ), would be party to improperly—and I believe unlawfully—withholding public and personal materials that we (not they) own.”

For some reason, Attkisson isn’t permitted to see her FBI file. Why? The answer may lie in the government’s role as a hacker. A hacker of Attkisson’s computers.

Attkisson writes at her website: “I have a separate federal lawsuit underway against the federal government over illegal surveillance of my work and home computers by intruders using software proprietary to a U.S. intelligence agency. The intrusions were detected and confirmed by three independent forensics exams in 2013.”

“So far, the government has not cooperated with my lawsuit. For example, without even filing the required motion, government officials failed to show up for a properly-noticed deposition in the case.”

Here, from a press release, are details about the hack of Attkisson’s computers:

“On December, 27, 2014, Investigative Journalist Sharyl Attkisson filed administrative claims under the Federal Tort Claims Act against the U.S. Department of Justice, the U.S. Postal Service, and certain unnamed employees and/or agents of the federal government. Shortly thereafter, a lawsuit was filed in the District of Columbia alleging certain violations of Attkisson’s constitutional rights based on information implicating the federal government in illegal electronic monitoring and surveillance of her home and business computers and phones.”

“As outlined in the claims, three separate computer forensics exams revealed that intruders used sophisticated, remote capabilities to monitor Attkisson’s work. The intruders installed and periodically ‘refreshed’ software used to exfiltrate data, obtain Attkisson’s passwords to various personal and work accounts, access the CBS News computer system, and monitor Attkisson’s audio using a Skype account. Forensics also revealed evidence of U.S. government-related involvement in the surveillance.”

“Through a Freedom of Information Act request, Attkisson learned that the F.B.I. opened a case on her computer intrusions in 2013, listing her as the victim, but the agency failed to interview her in the investigation or even notify her that one had been opened. To date, U.S. government officials have failed to fully cooperate with Attkisson’s efforts to learn about the intrusions, and have failed to fully respond to numerous requests to help provide information necessary to learn the truth. As a consequence of the government’s choice to ignore Attkisson’s requests, Attkisson and her family have chosen the only available option left to them.”

Yesterday, I asked Attkisson: in your opinion, why were your computers hacked?

She wrote: “On the lawsuit over the hacking: The reason I had my computers analyzed in the first place is because government sources had approached me and told me I was likely being ‘surveilled’ due to the reporting I had been conducting, especially some of my CBS News stories that were published online. They specifically mentioned my Benghazi reporting, which I began in fall of 2012. The forensics analyses were able to determine multiple unauthorized remote intrusions of my computers using software (proprietary to a federal government agency) that occurred prior to my Benghazi reporting, however. One such intrusion, for example, occurred in February 2012 (we have the date, time and method of entry) and another in July 2012. Stories I covered during this time period included Green Energy Waste stories that the Obama administration worked very hard to stop from airing on CBS, as well as Fast and Furious reports, among others. Among other details, the forensics exams were able to determine that the intruders not only accessed the CBS system, and used Skype to surreptitiously listen in on conversations, but also examined several files and photos related to Fast and Furious.”

“In addition to two separate forensics exams that I had conducted, CBS hired a forensics company that confirmed the remote intrusions. The analyst informed CBS, among other things, ‘I have definitive evidence that shows commands were run from Sharyl’s user account that she did not personally authorize during the timeframe of concern’ and ‘This history has been deliberately removed from Sharyl’s hard drive’ by a third party.”

—Read Attkisson’s next paragraph carefully. It’s explosive. It indicates Dept. of Justice (DOJ) lying and cover-up:

“A fourth forensics exam conducted by DOJ Inspector General of a different computer (only my personal computer that I asked them to examine in hopes they would recognize the government software, CBS would not give them the CBS computers in question) also confirmed the suspicious activities and that a third party deliberately removed files from my personal computers to cover their tracks. However, this information was omitted from a summary the DOJ IG released, which instead made it incorrectly sound as though intrusions had been ruled out. (The DOJ IG will not lawfully respond to FOIA requests for the documentation showing the investigators confirming the suspicious activities. I know the documents exist because the investigators let me review them during the investigation and briefed me on their findings.)”

“The 2012 intrusion dates I mentioned were NOT the sum total of intrusions—they were two dates we know of during which software was planted in my computers. The software was then used on an ongoing basis to access files, watch my keystrokes, etc.”

CBS agrees that Attkisson’s computers were hacked. Here is an excerpt from an August 7, 2013, article posted at the CBS news site:

“CBS News announced Friday that correspondent Sharyl Attkisson’s computer was hacked by ‘an unauthorized, external, unknown party on multiple occasions,’ confirming Attkisson’s previous revelation of the hacking.”

“CBS News spokeswoman Sonya McNair said that a cybersecurity firm hired by CBS News ‘has determined through forensic analysis’ that ‘Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions in late 2012’.”

“Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion. CBS News is taking steps to identify the responsible party and their method of access.”

“Several months ago, Attkisson had reported suspected intrusions of her computers, including her CBS News work computer, prompting CBS News to hire a firm to look into the hacking.”

My comment: As indicated at the beginning of this article, Attkisson is unable to see her FBI file. The FBI won’t show it to her. This is a breach of law. They won’t show it to her because it would reveal the FBI and DOJ stance on her investigative work at CBS. They didn’t like her work. They considered it a threat. They considered it an exposure of truths they wanted kept under wraps, relating to Fast and Furious, Benghazi, Green Energy Waste, etc.

That FBI file would lend further strength to Attkisson’s claim that the Dept. of Justice has been lying about what they found when they investigated the hacking of her computers.

For example: They found that some of their own people (FBI/DOJ) and/or people at other government agencies had done the hacking.

Major media consider this story “dead until further notice.” But independent journalists all over the world shouldn’t. They should cover it aggressively and keep the pot boiling, and make sure the public understands what is at stake: the right to report actual news, free from government interference and intimidation.

And the right to call government on the carpet, in court, under oath, to account for their crimes.

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.