UPDATE: Here’s a report from Jack Posobiec. A staffer is currently under medical supervision and the headquarters have been shut down for the remainder of the campaign.
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (90)
sorted by:
...I wouldn't be surprised, but couldn't they just hack into their computers?
Forensic footprints vs installing in situ a back door to facilitate the gift that keeps on giving. Comms, email streams, proprietary info & data, the program that migrates into all devices accessing the gateway. If an OTC program like Spector Pro is available, imagine what the Stasi have.
...the problem is now the offices have been abandoned...
...so any info that is collected is either dated or compromised...
The "program" if used, is in the network now. Any device virtually logging on to the virtual server gets the program surreptitiously installed as a permission popup. It does not matter if there is no physical address. The program cannot be detected by a security scan. It runs in the background on the devices involved. The cloud accounts are the source for installation on any new device accessing the cloud acct affected. Whoever did the packages matters less than they involved the Stasi against We the People. THAT is most unfortunate. So, the odds that the EfBEye "sent'' the pkgs, is the most likely answer.
...it comes down to why do the packages at all...
...unless this is a "self inflicted wound"...