Sharryl Attkisson to Sue Obama DOJ
UPDATE - PLEASE NOTE THIS IS AN OLD STORY FROM 2015.
SORRY ABOUT THAT. MY MISTAKE.
Sharyl Attkisson is suing Obama's DoJ for 35 million, for years 2011-2013, for spying on her. I bet she gets it too!
Imagine what it must be like to watch your computer turn itself on and off.She also watched a different computer that she used delete files by itself.The five-time Emmy Award winner 7recipient of the Edward R. Murrow award for investigative reportingannounced in January she is suing the Justice Department and seeking $35M in damages for illegally hacking her computers & monitoringher work between 2011 & 2013.
Three separate computer forensic exams of her computers revealed what appears to be stunning evidence pointing straight to the Obama administration.
“The most important & irrefutable finding is: forensic evidence of agovernment-owned I.P. (internet protocol) address accessing mycomputer,” Attkisson told WND.
She said she was told that was “better evidence than the U.S. hadwhen it accused China of various acts of hacking into our govt, which the govt accepts as proven.”
Her computers were examined by three independent forensics examiners including: a confidential source, an examiner hired by CBS News, & anexaminer hired by her attorney.
What they found is just stunning.
Attkisson provided an itemized overview of some of their findings, & described what a confidential source & examiner hired by her attorney found:
“A government-owned I.P. address was used to access my computer.”
“We are able to see instances of exact date and time that theintruders entered my computers, and the methods they used to do so.”
“They used commercial, non-attributable software proprietary to the CIA, FBI, NSA or DIA.”
“The malware was constantly running on my computers. It included a feature that logged my keystrokes, accessed all my emails and collected my passwords.”“Skype was surreptitiously used to listen in on audio.”
“My smartphone was also infected.”
“Three classified documents had been put on my computer.”
“Once sources notified me that I was likely being surveilled, and Idiscussed this in emails, the intruders took steps to erase evidence of their presence. However, the deletions themselves create a record of evidence.”