Why this blog?
Until this moment I have been forced to listen while media and politicians alike have told me "what Canadians think". In all that time they never once asked.
This is just the voice of an ordinary Canadian yelling back at the radio -
"You don't speak for me."
email Kate
Goes to a private
mailserver in Europe.
I can't answer or use every tip, but all are appreciated!
Katewerk Art
Support SDA
Paypal:
Etransfers:
katewerk(at)sasktel.net
Not a registered charity.
I cannot issue tax receipts
Favourites/Resources
Instapundit
The Federalist
Powerline Blog
Babylon Bee
American Thinker
Legal Insurrection
Mark Steyn
American Greatness
Google Newspaper Archive
Pipeline Online
David Thompson
Podcasts
Steve Bannon's War Room
Scott Adams
Dark Horse
Michael Malice
Timcast
@Social
@Andy Ngo
@Cernovich
@Jack Posobeic
@IanMilesCheong
@AlinaChan
@YuriDeigin
@GlenGreenwald
@MattTaibbi
Support Our Advertisers

Sweetwater

Polar Bear Evolution

Email the Author
Wind Rain Temp
Seismic Map
What They Say About SDA
"Smalldeadanimals doesn't speak for the people of Saskatchewan" - Former Sask Premier Lorne Calvert
"I got so much traffic after your post my web host asked me to buy a larger traffic allowance." - Dr.Ross McKitrick
Holy hell, woman. When you send someone traffic, you send someone TRAFFIC.My hosting provider thought I was being DDoSed. - Sean McCormick
"The New York Times link to me yesterday [...] generated one-fifth of the traffic I normally get from a link from Small Dead Animals." - Kathy Shaidle
"You may be a nasty right winger, but you're not nasty all the time!" - Warren Kinsella
"Go back to collecting your welfare livelihood. - "Michael E. Zilkowsky
My guess would be implanted malware that scans for key words and deletes associated text when the keywords are detected. Either that, or real time remote intervention. Both ways, the intevener isn’t even trying to be undetected by the targeted person, though.
For the record I have some serious skepticism about this report.
– If we take for granted it was a malicious, then the _only_ way for both the user and the attacker to see what was going on is for the attacker to have used the RDP protocol.
– It’s the RDP protocol. When the remote user has control, the local user does not. There are several times in the video when Sheryl takes control. The only point of this protocol is for demonstration and lazy admins.
– If you have a backdoor into a network, can enable Remote Management on a Mac, and have the users password to connect, why not just enable SSH and connect via that way. No user would notice.
– If this is a legit intrusion it’s the most ham handed crack I’ve every seen outside of employee intrusions into their business. In other words, it is not up to gov’t standard. Hell, it’s barely the neighbours son level.
– Editing an MS document that the user had open….yeah, no one would notice that, eh?
– The only deletions are single character or selected paragraphs.
Conclusion: I’m much more inclined to believe a stuck backspace key.
I am inclined to agree, Lance. But her point is that the “hacker” wanted her to see the text disappear; it was meant as a warning. Atkisson used a Mac, but I have worked with Windows laptops when a tech had remote access enabled, and I was still able to move the cursor with the touchpad.
Still, the take-away for us? Anyone who places a value on their data security should have at least one off-line computer with its networking capabilities crippled in hardware, so that it cannot be put on-line, no way, no how. And use CD-ROM or thumb drives to move sensitive documents to it from other machines, and vice versa.
The only limitation of Government (CIA,FBI,SS) abuse is the integrity of the individuals. The Obama administration has zero integrity.
This woman can have a great career at Fox News.
I don’t think Lance has used a lot of commercially available remote control tools. I use several commercial products every week and I have no problem taking control at any time. A specially crafted remote control tool would make it even easier to gain control at will.
Again, the behavior seen on-screen was pretty clearly intended to be observed by the target as a method to serve warning and intimidate the target.
I have NEVER seen a “stuck backspace key” skip around the screen, issue mouse-clicks and perform the cursor movements observed in the video.
Perhaps we need to reconsider the Suspension of disbelief again to ignore what was plainly observed in the video. There seems be a coordinated plan to insist that what was clearly observed was not what was clearly observed…
Not a top notch exhibit of computer hacking, but as a tactic to show who’s who, it works… maybe even more importantly it shows to the others in the media biz, “we know”
A completely disconnected computer, perhaps holding onto that 5 years old relic and filling its storage with your data, reports, and photos of loved ones, is making sense.
*not in the cloud.
I just played with RDP here. Yes, it allows the user to move the mouse and enter keys. My 2nd pt was based on old versions, apparently.
Turn up the sound on the video or your speakers. You can hear her making those mouse-clicks. She’s moving the stuff around the screen, not the supposed cracker.
The intimidation theory is further-fetched than the intrusion theory.
You forgot the NSA and the DNC.
http://www.makeuseof.com/tag/stop-erratic-cursor-behaviour-typing-mac/
Remember what they used to call ‘sneaker net’ ….. you would run a floppy disk from one computer to another …. time for that to make a comeback …..
I believe the Obola administration attacked her computer,
or had it hacked.
Same thing happened to a friend of mine on an Israeli blog.
He commented on the number,
and destructive power of nuclear weapons stored in Israel.
The computer screen flicked on/off, back and forth,
between the blog and his personal information.
After the fear of seeing his computer controlled,
they deleted his blog comment and the Microsoft Office page he had written on.
I wonder if she every considered using data recovery program like “recover my files” and such for times like this?
As well, people don’t realize you can unplug the network cable or turn off your wireless.
Apple Macs don’t use RDP, lance. That’s a Microsoft-specific technology. And there’s tons of both legitimate and malicious remote control/botnet software that would allow the behaviour shown in this video.
That said, this doesn’t look like a hack, or an intimidation attempt. Simply bricking the hard drive would have the same effect and cost Atkisson more money.
If this started happening to me I’d unplug the network cable or turn off the wifi.
well now, all the “experts” in here don’t agree, so what’s new:-)))
as to the not professional comment in here, could it be that is the exact intent of whom ever did this. If it is not professional then ppl will deem it as not done by the gov’t, and the cover up is complete. Yah just got to love the gullible, they come in all shades and sizes and political leanings
Does any one in here even question why all those chem weapons, and a possible nuke lab, found in Iraq by the Bush team was never reported. Yah, that’s it folks, the Bush admin was as big in cover ups as the incumbent is, they all are. Well except maybe JFK, but he won’t let any secrets slip out!!
PS: Lance, maybe you should take up dog grooming
A stuck backspace key would simply delete character by character. It cannot highlight sections of text.
Ditto, or +1, or whatever the latest phrase is. She had an auto backup.
The theory assumes the delete (man or robot) knew what she was writing in real time. It would have been much easier to copy all her files then reformat her hard drive.
Why would Bush cover up evidence for the very reason he invaded Iraq?
I know the “WMD” was a pretext, the war was simply a completion of business from the Kuwait invasion. Lefty Collin Powell, like the Obomber, thinks that half measures are adequate. Wrong. When your enemy is down, make sure he is out, or he will come back to haunt you. isn’t that right, Obomber? How’s that IS working for you? Wanker!
Thanks to all for all the posts on this.
A question that is not answered is, who planted the classified documents found in a remote nook of Atksson’s hard drive? Presumably a forensic examination would explain this? Certainly Obama’s employees have acted with extreme malice towards others, like tea party orgs, whom he considered enemies to be punished.
Would people sophisticated enough to do this screw up Obamacare implementation as badly as they did?
But then again, maybe the only good IT people they had were assigned to mess around with reporters’ computers!
“it is not up to gov’t standard. Hell, it’s barely the neighbours son level.”
Probably just a couple of low-level employees from the Cincinnati office.
The NSA in action. can’t wait till automated cars where some head honcho decides who crashes & who doesn’t
Actually in the future the automated cars will just lock the doors and deliver you to where the authorities want you to be…
CBS already confirmed last year that she was hacked.
You can believe this video was an instance of it or not, but CBS’s IT experts confirmed the hack. Only question now is who did it.
http://www.cbsnews.com/news/cbs-news-confirms-sharyl-attkissons-computer-hacked/
There are plenty of remote presence protocols other than RDP. Sophisticated malware would likely implement its own.
As to the lack of subtlety, perhaps that was entirely the point. Perhaps she was very much meant to see it, you know, “You’ll shut your mouth if you know what’s good for you.”
no assumption needed, the fact is they can and have been able to do many things for a long time. And the they were not just after “delete”, but also wanted a psychological impact, which they got. This impact is for several purposes, intimidation of not just the target, but also those around her.
And if you think once Bush found the WMD that he would announce it, then you are naïve. Bush and company (his father and grand father) had a hand in the Kennedy assassination, and they know secrecy. By announcing the “find” it may have prompted questions about “source”, which as we know was NSA, and with that cat out of the bag every one would be alerted. Also, if they didn’t know something, and they let it out, it would have given the enemy insight as how to avoid discover. Intel is a strange and contradictory business.
Robert, there seems to be the consideration amongst right winger that if some one presents themselves as rite winger that they are better than the others, which is not necessarily so. Bush the 1st is very good buddies with slick willy Clinton. Read up about Mena Arkansas and you will see why.
MissAnthropy, I just read your post after I composed mine, and you seem to think as I do:-)))
http://www.wired.com/2014/11/airhopper-hack
the naysayers may wish to read this