{"id":14173,"date":"2020-01-13T14:07:16","date_gmt":"2020-01-13T18:07:16","guid":{"rendered":"http:\/\/www.wasobamaborninkenya.com\/blog\/?p=14173"},"modified":"2020-01-13T14:11:42","modified_gmt":"2020-01-13T18:11:42","slug":"attkisson-files-lawsuit-naming-rosenstein-other-former-government-agents-in-computer-intrusion-case","status":"publish","type":"post","link":"https:\/\/www.wasobamaborninkenya.com\/blog\/attkisson-files-lawsuit-naming-rosenstein-other-former-government-agents-in-computer-intrusion-case\/","title":{"rendered":"Attkisson Files Lawsuit Naming Rosenstein, Other Former Government Agents in Computer Intrusion Case"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"539\" src=\"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2020\/01\/Screenshot_2020-01-13-Attkisson-Files-Lawsuit-Naming-Rosenstein-Other-Former-Government-Agents-in-Computer-Intrusion-Case-....png\" alt=\"\" class=\"wp-image-14174\" srcset=\"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2020\/01\/Screenshot_2020-01-13-Attkisson-Files-Lawsuit-Naming-Rosenstein-Other-Former-Government-Agents-in-Computer-Intrusion-Case-....png 525w, https:\/\/www.wasobamaborninkenya.com\/blog\/wp-content\/uploads\/2020\/01\/Screenshot_2020-01-13-Attkisson-Files-Lawsuit-Naming-Rosenstein-Other-Former-Government-Agents-in-Computer-Intrusion-Case-...-292x300.png 292w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><figcaption> <em>Source: Sharyl Attkisson <a rel=\"noreferrer noopener\" href=\"https:\/\/sharylattkisson.com\/2020\/01\/former-govt-agent-admits-illegally-spying-on-sharyl-attkisson\/\" target=\"_blank\">website<\/a>, graphic from first page of lawsuit announced January 9, 2020<\/em> <\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"> <strong>\u201cFRAUD, STEALTH, AND SUBTERFUGE\u201d <\/strong><\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>The Post &amp; Email<\/strong>, by Sharon Rondeau, January 12, 2020<\/p>\n\n\n\n<p><strong>Excerpt:<\/strong><\/p>\n\n\n\n<p><em>(Jan. 12, 2020) \u2014 In a tweet on Sunday evening, investigative journalist  Sharyl Attkisson, currently host of the Sunday news magazine \u201c<a rel=\"noreferrer noopener\" href=\"http:\/\/fullmeasure.news\/\" target=\"_blank\">Full Measure<\/a>\u201d and formerly of CBS News, tweeted a link to an <a rel=\"noreferrer noopener\" href=\"https:\/\/sharylattkisson.com\/2020\/01\/former-govt-agent-admits-illegally-spying-on-sharyl-attkisson\/#comments\" target=\"_blank\">announcement<\/a> on her website of a new lawsuit she <a rel=\"noreferrer noopener\" href=\"https:\/\/amgreatness.com\/2020\/01\/09\/new-lawsuit-claims-rod-rosenstein-led-task-force-that-spied-on-sharyl-attkissons-computers\/\" target=\"_blank\">filed<\/a>  last week on behalf of herself and family members against former Deputy  Attorney General Rod Rosenstein, and four other former government  agents and up to 50 unnamed Justice Department employees as defendants. <\/em><\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>View the complete article including image, links and comments at:<\/strong><\/p>\n\n\n\n<p> <a href=\"https:\/\/www.thepostemail.com\/2020\/01\/12\/attkisson-files-lawsuit-naming-rosenstein-other-former-government-agents-in-computer-intrusion-case\/\">https:\/\/www.thepostemail.com\/2020\/01\/12\/attkisson-files-lawsuit-naming-rosenstein-other-former-government-agents-in-computer-intrusion-case\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cFRAUD, STEALTH, AND SUBTERFUGE\u201d The Post &amp; Email, by Sharon Rondeau, January 12, 2020 Excerpt: (Jan. 12, 2020) \u2014 In a tweet on Sunday evening, investigative journalist Sharyl Attkisson, currently host of the Sunday news magazine \u201cFull Measure\u201d and formerly &hellip; <a href=\"https:\/\/www.wasobamaborninkenya.com\/blog\/attkisson-files-lawsuit-naming-rosenstein-other-former-government-agents-in-computer-intrusion-case\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":["post-14173","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/14173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/comments?post=14173"}],"version-history":[{"count":2,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/14173\/revisions"}],"predecessor-version":[{"id":14176,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/posts\/14173\/revisions\/14176"}],"wp:attachment":[{"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/media?parent=14173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/categories?post=14173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wasobamaborninkenya.com\/blog\/wp-json\/wp\/v2\/tags?post=14173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}