Spy Versus Lie

I’m always skeptical about memoirs and tell-all’s, because the writer is highly motivated to lie. In the former case, self-promotion is at the heart of a memoir and no one promotes the negative things about themselves. The tell-all is the dead tree version of click bait. The writer says bad things about people or reveals embarrassing things about a public institution in order to sell books. In both cases, the bullshit ratios are way out of whack.

Sharyl Attkisson left CBS claiming they are a bunch of lefty hacks, something we all knew for decades. Her tell-all is being flogged by Drudge. He has a link to this story in America’s Paper of Record.

A former CBS News reporter who quit the network over claims it kills stories that put President Obama in a bad light says she was spied on by a “government-related entity” that planted classified documents on her computer.

In her new memoir, Sharyl Attkisson says a source who arranged to have her laptop checked for spyware in 2013 was “shocked” and “flabbergasted” at what the analysis revealed.

“This is outrageous. Worse than anything Nixon ever did. I wouldn’t have believed something like this could happen in the United States of America,” Attkisson quotes the source saying.

Maybe. It is also possible she is just like most users and foolishly loaded all sorts of spyware on her laptop. Most people have no idea how their PC works. Apple users are the worst because they think they know how it works, even though they don’t. People see this stuff on TV and they think “hackers” can magically take over your PC.

She speculates that the motive was to lay the groundwork for possible charges against her or her sources.

Attkisson says the source, who’s “connected to government three-letter agencies,” told her the computer was hacked into by “a sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency or the National Security Agency.”

The breach was accomplished through an “otherwise innocuous e-mail” that Attkisson says she got in February 2012, then twice “redone” and “refreshed” through a satellite hookup and a Wi-Fi connection at a Ritz-Carlton hotel.

The spyware included programs that Attkisson says monitored her every keystroke and gave the snoops access to all her e-mails and the passwords to her financial accounts.

This is pretty common stuff. The #1 way people load malware onto their PC is by opening an attachment. Once it is loaded, it sits there calling home and updating itself. It’s why you should never put your personal stuff on a laptop, by the way.

“The intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool,” she wrote in “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.”

This I doubt. This is the sort of thing you see on TV, not in real life. Loading spyware to take over a webcam is one level of clever. Stealing a Skype password and then re-engineering the program to function as a listening devise is quite another. It’s not impossible, but to deploy that type of resource on this woman sounds unlikely to me. There’s a small number of people able to do this work and they are in high demand.

Attkisson says her source — identified only as “Number One” — told her the spying was most likely not court-authorized because it went on far longer than most legal taps.

But the most shocking finding, she says, was the discovery of three classified documents that Number One told her were “buried deep in your operating system. In a place that, unless you’re a some kind of computer whiz specialist, you wouldn’t even know exists.”

“They probably planted them to be able to accuse you of having classified documents if they ever needed to do that at some point,” Number One added.

Again, this reads like a bad TV script. There are no hidden places in your operating system. There are places where code can be hidden away, but not documents. The value in hiding docs on her computer is also questionable. If you can go to these lengths to frame her, you can just have her killed in an accident, which is much easier than this.

If you cover the foreign policy operations in Washington or Europe, you are being followed, wiretapped and scrutinized. This has been true for a long time. Counter intelligence is a part of every nation’s toolkit and that naturally sweeps up the reporters. Most of the people talking to reporters are mid-level bureaucrats lacking the security clearances to access the good stuff. It’s very rare for a high level career spook to be known to the press, much less have a relationship.

Where the high level leaks come from are from the political class. The guys like Richard Armitage who are part of the permanent Washington policy elite. They are the guys spilling the beans to reporters about some program or policy. A gal like Attkisson is not privy to those people. She’s meeting the low-level nobodies at the Starbucks so they can dish the local scuttlebutt. They may know some things so this sort of reporting can leave a mark, but it is not worth the trouble of deploying A-level technicians to exploit her laptop.

9 thoughts on “Spy Versus Lie

  1. UPDATE 2014-10-31: At the WaPo web site today you can view an iPhone video Attkisson recorded of someone remotely accessing her laptop and deleting parts of a document she was working on for CBS, her employer at the time, on Benghazi I think it was. A brief view of the keyboard and also the audio clip indicate she was not touching the keyboard, as you watch the cursor race across the screen and selectively delete parts of her document. She had no control of her laptop and was able to stop the cyberattack only by disconnecting her machine from the WiFi network. This came at the time the White House Press office was actively lobbying CBS to kill her coverage of the Benghazi coverup by the Obama administration. The WH plumbers busy at work? I think so…

  2. Never underestimate the ability of an alphabet agency to pour enormous resources into the small fish. Anything and everything is justified if someone thinks one knows something they do not.

    Some even have black helicopters follow. Usually, that is just the reaction to a harmless mistake. Breeds paranoia among the confused.

    More game theory, factored in. Unknown unknowns, and such.
    That is Roswell. Shoot down your own damned weather balloon, blame it on aliens. Then not. Black Budget Cartoons.

    Just because “they” do not know what they are doing does not mean they are not busy trying. Success is not defined as goal oriented when deep ops are involved.

  3. I believe her account. The current administration was also spying on James Rosen, and who knows who else. Gobsmacker is right: few people are masters of their machines. And those who ARE, are in a position to use that to their advantage. Five years ago my brother, who works in computer networking, took control of my computer (with my consent), to help me solve a particularly difficult computer issue. My point in recounting this is that he isn’t a hacker and doesn’t have the advanced skillset necessary to “spy” on someone’s computer without their knowledge, yet he accessed my computer remotely. But there are people who do have these skills, and some of them work for our government. Doesn’t sound so kooky to me.

  4. “There are no hidden places in your operating system. There are places where code can be hidden away, but not documents.”

    Please. Stop. This is unnecessary. You needn’t take every statement she makes literally just to poke fun at her. There are “dark” places, like the OS dynamic libraries for one example, where documents could be hidden and where most users never go. It’s true of Windows, it’s equally true of Apple OS X. Few people are masters of their machines. You probably use the TV set in your living room constantly. If it broke down, would you know how to go inside it to fix it? Do you know how to read complex wiring diagrams? I doubt it. Moreover, if I were to take everything you write on this blog literally, I would never stop laughing. Give the broad a break.

    • Please. Stop. This is unnecessary. You needn’t take every statement she makes literally just to poke fun at her. There are “dark” places, like the OS dynamic libraries for one example, where documents could be hidden and where most users never go. It’s true of Windows, it’s equally true of Apple OS X.

      That’s the point. She’s saying the sorts of things computer hackers on TV say, not the sort of things said in real life. I’ll allow for the possibility that her “three letter agency guy” is shining her on, but I also suspect she may be a kook.

  5. How unsophisticated is a fifty-three year old woman be who has lived the life inside the Beltway for years to finally discover that Obummer and her own profession are morally and intellectually corrupt?

  6. “a sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency or the National Security Agency.”

    How can commercial non-attributable spyware be proprietary to a government agency? I reckon that’s what’s known as a non sequitur.

Comments are closed.