When your government goes Stasi on you

The Constitution and its succeeding Amendments mean something to Americans although it’s no longer unfathomable to see the deconstruction of our freedoms at every turn.

It’s been occurring at an increasing and dizzying pace although it’s easy not to see any of it.

Sharyl Attkisson, a former CBS reporter during the Obama Administration tells her story in her bestseller “Stonewalled.” It highlights how she was hacked while working at the media giant and how it continued after she left big media. She’s also the best-selling author of another excellent book, “The Smear” detailing how people are led what to think about issues and inevitably how they vote.

It’s striking how the mentality of power and ideology above all has led to an exceeding attack on thought and freedoms Americans believe are their birthright. When so many believe themselves political operatives to manipulate others to their seedy ends, from a cave dweller in Hoboken or an employee of Theftbook, Goolag and Twatter along with the upper echelons of their executive management; how does a citizen sort through the noise?

The most likely answer? They don’t as a movie now appearing on Netflix highlights in shocking detail called “The Creepy Line.” Orwellian thought control isn’t a threat to our future, it’s robustly here and the intent is total control over every aspect of political thought and outcome in line with the massive criminality being exposed in the Russia Collusion Hoax. (Notice how “the press” works to suppress information/facts coming out?)

If you can subvert free and fair elections as witnessed by the massive sedition in the 2016 national election by weaponized government agencies or better yet, control what people think before election polls even open, what kind of totalitarian society and/or idiocracy will result?

You can sum up all these efforts rather simply, “Just be evil.”

Excerpt from Attkisson’s other bestseller on censorship and illegal government domestic spying, “Stonewalled.”

The following is the 9th in a series of excerpts from my New York Times bestseller “Stonewalled,” which recounts the government intrusions of my computers. More excerpts to follow.

It’s February 4, 2013. Three and a half months before revelations about the Obama administration’s seizure of AP phone records and those of the FOX News reporter. Almost exactly four months before the news that the NSA is secretly collecting Verizon phone records, as revealed by Edward Snowden.

When you challenge powerful institutions in the twenty-first century, you conduct your business with the notion ever present in the back of your mind that somebody’s listening. Tapping your phone. Reading your computer files. Trying to learn what your sources are telling you. Finding a way to stop you. These thoughts float through your mind, escalating in direct proportion to the strength of the story and the power held by whomever it challenges. You think of it, but you don’t really believe it’s actually happening. You certainly don’t think someone will turn up one day and hand you proof.

Support the Attkisson v. DOJ/FBI Fourth Amendment Litigation Fund to fight the government computer intrusions

In fairness, I’ve begun telling my sensitive sources that our communications aren’t secure. Funny thing is, none of them is surprised. They tell me they already assumed they were under government surveillance. But we do start crafting more secure ways to exchange information. For example, as I make contact with important confidential sources about the Benghazi attacks, I set up meetings on the phone but then later change the time and place in a way that can’t be monitored. Of course, the intruders now know that I know. And I know that they know that I know. And so on. It’s the loop of the paranoid wrapped in suspicion codified by truth.

CBS has remained strangely unfazed by the official news from Patel confirming what I’d told them: that an intruder has been in my computers and in the company’s news and corporate system. I’d thought that the moment they got the corroboration, it would set off processes and inquiries. That corporate forensics experts would descend upon me and my house, looking to secure my personal and professional information, to protect my sources and look for the origin. That my colleagues would be officially notified so that they, too, could make their sources aware and a damage assessment could be made.

But none of these things happens.

A diverse group of Constitutional free press and privacy advocates is supporting Attkisson v. Dept. of Justice/FBI to fight the government computer intrusions. Click here to support.

CBS does ask Patel to conduct further investigation, but there seems to be no particular urgency, and he comes to the Washington bureau to pick up my laptop. We’ve kept it off the CBS system since the day Number One first gave me the news. I sign the chain-of-custody document and hand over the computer. I wonder if the intruders have already penetrated my newly issued CBS News laptop. When I earlier recounted to Number One how I heard the castle lock sound one night and assumed the intruder had been locked out of the CBS system, he practically chuckled, like a patient elder speaking to an ingénue.

“You may have heard that sound but I hate to disappoint you—we can cut through that firewall like butter. It’s not an impediment.”

Patel and his company are working for CBS. They’re clearly tasked with protecting the network’s security, not mine. But they do sit down with me and Isham and have a serious conversation to say that I should find ways to better protect my computer privacy. Aware of the persistent interruptions in my FiOS service, they tell me that I should have my Verizon FiOS box replaced again, and relocated inside the house.

Read excerpt #1 here: The Computer Intrusions: Up at Night
#2: Big Brother: First Warnings
#3: The Computer Intrusions: Disappearing Act
#4: The Incredible, Elusive “Verizon Man”
#5: I Spy: The Government’s Secrets
#6: Computer Intrusions: The Discovery
#7: Notifying CBS About the Government Computer Intrusions
#8: The MCALLEN Case: Computer Intrusion Confirmed

“Insist on it,” one of the experts tells me. “Don’t take no for an answer. Don’t let them leave the house until they replace it and move it.” Add to the glitches a new one: our Internet has begun disconnecting anytime a landline is in use. My kid’s on her iPad, the phone rings, I answer it, and blop, she’s bumped offline. I’m doing business on my Apple desktop, I pick up the phone to make a call, and blop, my Internet connection drops. You don’t realize how often you use the phone and the Internet at the same time until you can’t. So in early February 2013, a Verizon technician visits our home and two supervisors show up, too. A three-fer. The tech sits upstairs and works on my Apple desktop beside the router. The male supervisor comes, takes a look around, and leaves. The female supervisor chats up me and my husband downstairs in the kitchen.

We mull over the familiar disturbances and I direct them to replace the whole outdoor box and move it inside. They tell me it’s not necessary. I keep thinking of Patel saying, “Don’t take no for an answer.” So I tell the Verizon pair that I have a security expert who insists this step be taken. But they’re formidable. It’s not necessary, they say. They know their business. As adamant as I am about moving the box, they’re just as adamant about not doing so. If I’m concerned about security, they say, there are lots of private consultants whom I can hire to help me. The tech gives me a name and number for one of them. He says there are many folks in Northern Virginia who need those special types of services. When the Verizon pair departs, our Internet is working, but the other same old problems persist.

This story dedicated to my friends, Laz and Spaceman.

Leave a Reply