5 votes

Hacked! CBS Computers: Turning 'themselves' ON at night then OFF

Poltergeists invade MSM !

Just days after CBS News confirmed that reporter Sharyl Attkisson’s computer had indeed been hacked, Attkisson spoke to Dom Giordano about the investigation.

“This suspicious activity has been going on for quite some time – both on my CBS computer and my personal computer,” Attkisson said. “CBS then hired its own independent cyber security firm, which has been conducting a thorough forensic exam … they were able to rule out malware, phishing programs, that sort of thing.”

Attkisson described some of the bizarre things that were happening with her computer.

“There were just signs of unusual happenings for many months, odd behavior like the computers just turning themselves on at night and then turning themselves back off again. I was basically able to verify and obtain information from my sources on the suspicious activity and I reported it to CBS News in January because of course it included CBS equipment and systems.”
http://philadelphia.cbslocal.com/2013/06/17/sharyl-attkisson...



Trending on the Web

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

NSA, jou got some s'plaining

NSA, jou got some s'plaining to dooo!

Gilligan's picture

That's probably Intel VPRO technology ...

that is built into their newer processor chips. It provides "out of band" total hardware access to "system administrators" (Big Brother, imho). And it scares the hell out of me. Here's a good article about it:

http://www.tgdaily.com/hardware-opinion/39455-big-brother-po...

And here's a video of them using Intel VPRO to turn computers on & off as they describe:

http://youtu.be/wlj7u3tOQ9s

Google is government.

thank you...

assuming it 'wasn't' the vpro... could it be 'done' on an older processor? by software/coding alone? or could it be done with a hardware trigger inserted/concealed... I have heard of 'devices' being covertly disguised within 'replaced' power cords/keyboards etc.
Your thoughts?

Gilligan's picture

sure, that could be done, too, but it would take access to the

computer to install it. And the NSA probably doesn't have the time or money to install such devices on individual computers. VPRO can probably make it a lot easier for them!

Devices such as keyloggers, for example, can be concealed completely inside an innocuous-looking connector:

http://www.smartz.com/blog/2011/02/01/hardware-based-keylogg...

Similar things to turn on/off older computers would be trivial to make, using a radio-frequency signal, or the X10 home automation protocol, or similar ways.

Software solutions probably exist, but they would likely depend on M$ WinBlows. Heck, I wouldn't be surprised if they are BUILT-IN to M$ 'Blows, which I wouldn't touch with a ten-foot pole.

Google is government.

It's in there

Lots of BIOSs have Wake On Lan features designed to do exactly this: bring the machine up in response to specific input by an application over a network. "Power on" and "power off" states aren't controlled by the button anymore and with many of these devices you can't tell by looking at them.

This woman says computers would turn on and off. I suspect they were never off.

Be brave, be brave, the Myan pilot needs no aeroplane.

thx.. again...

One more question (please) :)...
assuming you were her... how would you go about looking for 'footprints'??? If not hardware...I assume they would have to be digital. Right? Would you have to go into her IP and look at their traffic logs?? or would you look on her drive? Just curious.

Packet sniffer

Installing a packet sniffer between the effected machine and the outside world is a standard place to start. Hopefully the effected machine isn't down long enough to be noticed by the attacker. The sniffer will simply record all traffic on that network segment. From there all known-good traffic is ruled out, all protocols to all ports to all times until you hopefully isolate what is theoretically effecting that machine.

Of course it might not be a network attack, the problem may have made it onto the effected machine from a thumb drive, an SD card, what have you.

Be brave, be brave, the Myan pilot needs no aeroplane.