**Posted by Phineas
A few weeks ago, I mentioned CBS reporter Sharyl Attkisson’s strong suspicions that her home and work computers had been accessed by unknown persons. Coming in the wake of revelations about the government’s seizure of phone records for journalists and editors at the Associated Press and a secret warrant for phone records and email belonging to Fox reporter James Rosen charging him with being an unindicted co-conspirator under the Espionage Act of 1917, Attkisson’s accusations couldn’t be dismissed as paranoia or mere attention-seeking.
In fact, she was right:
“A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed commands that appeared to involve search and exfiltration of data.
This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion.
CBS News is taking steps to identify the responsible party and their method of access.”
Now, as an expert contacted by the Post’s Erik Wemple points out, this doesn’t necessarily mean it was the government:
Eugene H. Spafford, a Purdue University professor and specialist in computer security, said that Attkisson’s initial statements about computer intrusions left open a wide field of possibilities, from viruses to botnet activity to acquaintances to criminal gangs to the government.
And an investigative reporter as determined as Attkisson, who’s looked into many sensitive topics –such as Fast and Furious… hmmm…– could well have alarmed many different types of people who might want to find out what she knows, who she’s talking to, etc.
But, in late 2012, Attkisson was writing a series of articles on the Benghazi massacre that weren’t toeing the government line. Indeed, she was asking some tough questions, especially about the lack of a military rescue mission:
CBS News has been told that, hours after the attack began, an unmanned Predator drone was sent over the U.S. mission in Benghazi, and that the drone and other reconnaissance aircraft apparently observed the final hours of the protracted battle.
The State Department, White House and Pentagon declined to say what military options were available. A White House official told CBS News that, at the start of the attack, Chairman of the Joint Chiefs Martin Dempsey and Defense Secretary Leon Panetta “looked at available options, and the ones we exercised had our military forces arrive in less than 24 hours, well ahead of timelines laid out in established policies.”
But it was too late to help the Americans in Benghazi. The ambassador and three others were dead.
(hat tip: Ed Morrissey for the reminder of this)
That highlighted paragraph indicates anonymous sources. And if the government was forcing access to James Rosen’s phone records and emails (and his parents’ emails), and CBS was talking to anonymous sources giving out information embarrassing to the Obama administration, then it’s not at all hard to look at the break-in into Attkisson’s computers and wonder if something similar happened here.
It will be interesting to see what CBS discovers, and I suspect the relevant committee’s of Congress will have even more work when they do find out who was behind it.
(Crossposted at Public Secrets)