Mystery Cyber Hack on Rush is Creepy Stuff

Listen to the Christian Patriot Politicast of this column

Install Microsoft Silverlight

File photo of an iPhone (Source: Wikimedia Commons)

It was a creepy story, but not a surprising one, considering the profusion of computer hacking and surveillance that occurs in our world today.  If you are a regular listener to his nationally syndicated radio program, you may have heard Rush Limbaugh relate his experience driving in to work on Tuesday morning.  You may know that Rush is a huge fan of Apple products, and he buys the very latest Apple gadgets as soon as they are released.

So, he has his Apple iPhone with the snazzy, Buck Rogers-esque voice transcription software, which records spoken words and turns them into digital text.  It did not take waiting until the 25th Century to have such marvelous technology, and this kind of thing is probably the very least of what is out there.  I have long believed that if you can imagine it, it has probably already been done, and I am certain that the average Joe Schmoe, like me, is completely clueless as to what our government and military are able to do.

Ted Cruz 2016


On the way to work, Rush tried to use his voice transcription software to send a message to his wife, Kathryn.  As he reported on his show on Tuesday,

“I’m maybe a quarter of a mile from home on the way in to work, I attempt dictation, and nothing happens. I hit the microphone button and I get the three beeps and no connection. It’s not working. So I say, ‘Ah, damn it, the system’s down. Something’s wrong with the servers,’ but I keep trying. The third attempt… I was trying to respond to some stuff Kathryn had sent me. She needed an answer on some stuff. So I said whatever it was my answer was the third time, and what came back to me? This is what you’re not gonna believe. What showed up on my iPhone was ‘Obama’s minions are taking over and there’s nothing you can do about it,’ and I hadn’t said anything like that!”

Cue the Twilight Zone theme music.

Technology is a double-edged sword that can cut for good or for evil, and when you are dealing with a federal government that has been infested with communists at the highest levels, as we have today, then you have the scary prospect of those in power using technology for very evil purposes, indeed.  Of course, when it comes to computer hacking, there are an endless number of possible culprits.  It is just that we know the Obama administration would love nothing more than to silence the powerful voices of those like Rush Limbaugh who forcefully declare the naked truth about the tyrannical Obama and his fellow-traveling, commie hordes.  Naturally, the first thing we think here is that whoever did this is likely tied to the Obama administration, or at the very least, sympathetic to it.

Woodrow Wilcox


Rush was rightly perplexed and disturbed by this mysterious invasion of his personal electronic space, and he tried to find an explanation, as he reported on his show,

“So I sent this story. I typed this story I just told you and I sent it to a bunch of computer people. I said, ‘What could possibly explain this?’ And the answers I got back ranged from, ‘You’ve been hacked,’ to, ‘Somebody got into your car,’ to, ‘Somebody’s tampered with the Bluetooth module.’

It was, ‘Somebody’s done something. They’re sending you a message that they can do it,’ or, ‘Your Bluetooth module is so totally defective that you need a new one,’ or, ‘There’s something wrong with the LTE hotspot.’ There was no answer that was satisfactory. This has never happened. But that first message that came back was: ‘Obama’s minions are taking over.’ As I say, I can’t prove this, because I didn’t keep the transcriptions. I deleted them. I don’t even know if I actually deleted them. I just didn’t send them. (They are not on the phone. I went and looked.)”

Somebody’s done something, and they’re sending you a message.  That may be an understatement.  Not only is Rush getting a message, but the entire talk radio world and its millions of citizen listeners are also getting a message.  If “they” can do it to Rush, they can do it to any of us.  For that matter, if they can hack into super-secure Pentagon computers, which they have, then hacking the computers and smart phones of average Americans is likely as easy as walking through an open door.

Of course, we should realize that our own government has the ability to monitor the contents of our hard drives, each website we visit, and every single keystroke we type on our computers, our so-called “smart” phones—anything.  This is actually a timeless truth declared in Scripture: nothing is hidden that will not be revealed.  Now, when Jesus made that declaration, he was talking about words spoken in “secret” and thoughts hidden in the hearts of men, which are all in plain sight before God, but it is still a universal truth that applies in the modern cyber world, as well.

The disturbing thing here is that our online activities in our “private” emails or “private” social network pages, and even our offline Internet-connected-computer activities, are able to be laid bare by the cyber-snoops for the nefarious members of this communist regime in Washington or any other cyber-hacking entity.

To those of us with a fertile imagination, the possibilities are chilling.  What is to stop the regime’s hacker henchmen from literally putting words in our cyber mouths?  How could we ever prove that we did not say or do the things of which we could be falsely accused, such as issuing threats against the lives of government officials?  You saw how easily someone changed Rush’s spoken words into something not even remotely related to what he actually said.  Could this be a foreshadowing of one way in which American patriots will be falsely accused of being criminal enemies of the state to be imprisoned?

Ultimately, I suppose if “they” want to get us in that way, there is not a whole lot we can do to stop it, short of ceasing to use any electronics and computer devices.  Just because these possibilities exist does not mean we should be careless.  For instance, if you have traded in your old cellular telephone for one of the new phones that has Internet connectivity—the smart phones—you should treat that smart phone with the same security precautions you would for your home laptop or PC.

Not everyone considers this, but you should always password protect your smart phone.  Though not an assurance against hacking, it is better than nothing.  Another tip is to learn how to remotely scrub the data from your phone, in the event it is lost or stolen.  There are instructions for doing these things available on the Internet.

As I wrote this column on Wednesday while also listening to Rush, he finally made a brief mention of the Tuesday iPhone incident.  He said he has not yet heard back from Apple on what might have caused this.  The culprits in Rush’s phone hack will likely remain a mystery, but the message is chillingly clear:  we can get to you, no matter who you are.

This article is printed with the permission of the author(s). Opinions expressed herein are the sole responsibility of the article’s author(s), or of the person(s) or organization(s) quoted therein, and do not necessarily represent those of American Clarion or Dakota Voice LLC.

Comment Rules: Please confine comments to salient ones that add to the topic; Profanity is not allowed and will be deleted; Spam, copied statements and other material not comprised of the reader’s own opinion will be deleted.

Similar Posts:

Gina Miller, a native of Texas and current resident of the Mississippi Gulf Coast, is a radio/television voice professional.
Gina Miller
View all articles by Gina Miller
Leave a comment with your Facebook login
Print Friendly


  • thisoldspouse

    Rush’s first mistake is in trusting Apple, a completely Leftist, homo-ingratiated organization.  I am not an Apple person, and will never be as long as they purvey perversion.

    • WXRGina

      Then there’s that…

  • The Ignorant Fisherman

    Gina, I missed Rush on Tuesday and did not know this…wow!
    Good insight on Almighty God has the goods on all… that alone should horrify all the lost and Obama’s minions (Matt. 10:26, Rev. 20:11-15)!  Everything we are doing is being observed and being documented. I truly believe that. Just imagine if the Gestapo had this kind of power back in the day…. Scary days indeed…
    “Fear them not therefore: for there is nothing covered, that shall not be revealed; and hid, that shall not be known. Matt 10:26” – Rev. 20:11-15)

    • WXRGina

      It was a freaky-creepy story Rush told, David!  If you didn’t, you can read the whole transcript from that segment Rush did.  It’s linked up in the column.

      • Theignorantfishermen

        Gina, thanks I will have to listen to it..I am a 24/7 subscriber… which Obama’s minions probably already know… lol

        • WXRGina

          Ah! You are a big fan, David, with your subscriber status! :-)

  • WXRGina

    You’re quite right, of course, John.  Getting rid of all electronics would only limit potential stuff from that one area, but in no way would “protect” us from anyone who is truly out to “get us.”

  • Jsehart

    Where I work at they don’t allow us to have phones in the building because there are a lot more security risks involved with smart-phones then just changing a message. If not properly protected they can become an eavesdropping device…and I work for the government.

  • retiredday

    Gina, I read your article and was speechless.  To us retired folk, who anticipated a sense of security and stability in our old age, this kind of story just piles on the threatening aspects of society today: a major technological invasion of privacy, the assault on freedom, the ruination of the economy, the destruction of morality, the unrelenting attack on the Bible and Bible believers, and on and on.

    At a time in my life when I’d rather just enjoy the simple pleasures of life, I am forced to stay in the fray, speaking truth to a generation who seems to have little regard for the way things were just a half a century ago.  When a nation can accept the fact that the government can have access to every bit of personal information about them, the body politic is seriously ill and has forgotten what being healthy feels like.

    The ignorant compliance of the masses is overwhelming.

    • WXRGina

      It really is disheartening, even overwhelming, Mike. The good thing is that we know the Lord has our backs, no matter what bad things come our way. No amount of technology could ever out-do Him, either, since He is the Author of all knowledge. :-)

  • Alanbreland

    This is just a great example of the jobs Obama is creating. Why are people so negitive?

    • WXRGina

      HAHAHAHAHA!!!! Good point, Alan!

  • Bob Ellis

    Yes they do. Microsoft, Google and almost all major companies these days are ensconced on the Left, but Apple has definitely taken some overtly hostile steps against decency and the family.