Mystery Cyber Hack on Rush is Creepy Stuff

Listen to the Christian Patriot Politicast of this column

[slaudio:, Listen to the author read this article]

File photo of an iPhone (Source: Wikimedia Commons)

It was a creepy story, but not a surprising one, considering the profusion of computer hacking and surveillance that occurs in our world today.  If you are a regular listener to his nationally syndicated radio program, you may have heard Rush Limbaugh relate his experience driving in to work on Tuesday morning.  You may know that Rush is a huge fan of Apple products, and he buys the very latest Apple gadgets as soon as they are released.

So, he has his Apple iPhone with the snazzy, Buck Rogers-esque voice transcription software, which records spoken words and turns them into digital text.  It did not take waiting until the 25th Century to have such marvelous technology, and this kind of thing is probably the very least of what is out there.  I have long believed that if you can imagine it, it has probably already been done, and I am certain that the average Joe Schmoe, like me, is completely clueless as to what our government and military are able to do.

On the way to work, Rush tried to use his voice transcription software to send a message to his wife, Kathryn.  As he reported on his show on Tuesday,

“I’m maybe a quarter of a mile from home on the way in to work, I attempt dictation, and nothing happens. I hit the microphone button and I get the three beeps and no connection. It’s not working. So I say, ‘Ah, damn it, the system’s down. Something’s wrong with the servers,’ but I keep trying. The third attempt… I was trying to respond to some stuff Kathryn had sent me. She needed an answer on some stuff. So I said whatever it was my answer was the third time, and what came back to me? This is what you’re not gonna believe. What showed up on my iPhone was ‘Obama’s minions are taking over and there’s nothing you can do about it,’ and I hadn’t said anything like that!”

Cue the Twilight Zone theme music.

Technology is a double-edged sword that can cut for good or for evil, and when you are dealing with a federal government that has been infested with communists at the highest levels, as we have today, then you have the scary prospect of those in power using technology for very evil purposes, indeed.  Of course, when it comes to computer hacking, there are an endless number of possible culprits.  It is just that we know the Obama administration would love nothing more than to silence the powerful voices of those like Rush Limbaugh who forcefully declare the naked truth about the tyrannical Obama and his fellow-traveling, commie hordes.  Naturally, the first thing we think here is that whoever did this is likely tied to the Obama administration, or at the very least, sympathetic to it.

Rush was rightly perplexed and disturbed by this mysterious invasion of his personal electronic space, and he tried to find an explanation, as he reported on his show,

“So I sent this story. I typed this story I just told you and I sent it to a bunch of computer people. I said, ‘What could possibly explain this?’ And the answers I got back ranged from, ‘You’ve been hacked,’ to, ‘Somebody got into your car,’ to, ‘Somebody’s tampered with the Bluetooth module.’

It was, ‘Somebody’s done something. They’re sending you a message that they can do it,’ or, ‘Your Bluetooth module is so totally defective that you need a new one,’ or, ‘There’s something wrong with the LTE hotspot.’ There was no answer that was satisfactory. This has never happened. But that first message that came back was: ‘Obama’s minions are taking over.’ As I say, I can’t prove this, because I didn’t keep the transcriptions. I deleted them. I don’t even know if I actually deleted them. I just didn’t send them. (They are not on the phone. I went and looked.)”

Somebody’s done something, and they’re sending you a message.  That may be an understatement.  Not only is Rush getting a message, but the entire talk radio world and its millions of citizen listeners are also getting a message.  If “they” can do it to Rush, they can do it to any of us.  For that matter, if they can hack into super-secure Pentagon computers, which they have, then hacking the computers and smart phones of average Americans is likely as easy as walking through an open door.

Of course, we should realize that our own government has the ability to monitor the contents of our hard drives, each website we visit, and every single keystroke we type on our computers, our so-called “smart” phones—anything.  This is actually a timeless truth declared in Scripture: nothing is hidden that will not be revealed.  Now, when Jesus made that declaration, he was talking about words spoken in “secret” and thoughts hidden in the hearts of men, which are all in plain sight before God, but it is still a universal truth that applies in the modern cyber world, as well.

The disturbing thing here is that our online activities in our “private” emails or “private” social network pages, and even our offline Internet-connected-computer activities, are able to be laid bare by the cyber-snoops for the nefarious members of this communist regime in Washington or any other cyber-hacking entity.

To those of us with a fertile imagination, the possibilities are chilling.  What is to stop the regime’s hacker henchmen from literally putting words in our cyber mouths?  How could we ever prove that we did not say or do the things of which we could be falsely accused, such as issuing threats against the lives of government officials?  You saw how easily someone changed Rush’s spoken words into something not even remotely related to what he actually said.  Could this be a foreshadowing of one way in which American patriots will be falsely accused of being criminal enemies of the state to be imprisoned?

Ultimately, I suppose if “they” want to get us in that way, there is not a whole lot we can do to stop it, short of ceasing to use any electronics and computer devices.  Just because these possibilities exist does not mean we should be careless.  For instance, if you have traded in your old cellular telephone for one of the new phones that has Internet connectivity—the smart phones—you should treat that smart phone with the same security precautions you would for your home laptop or PC.

Not everyone considers this, but you should always password protect your smart phone.  Though not an assurance against hacking, it is better than nothing.  Another tip is to learn how to remotely scrub the data from your phone, in the event it is lost or stolen.  There are instructions for doing these things available on the Internet.

As I wrote this column on Wednesday while also listening to Rush, he finally made a brief mention of the Tuesday iPhone incident.  He said he has not yet heard back from Apple on what might have caused this.  The culprits in Rush’s phone hack will likely remain a mystery, but the message is chillingly clear:  we can get to you, no matter who you are.


  1. thisoldspouse says:

    Rush’s first mistake is in trusting Apple, a completely Leftist, homo-ingratiated organization.  I am not an Apple person, and will never be as long as they purvey perversion.

  2. The Ignorant Fisherman says:

    Gina, I missed Rush on Tuesday and did not know this…wow!
    Good insight on Almighty God has the goods on all… that alone should horrify all the lost and Obama’s minions (Matt. 10:26, Rev. 20:11-15)!  Everything we are doing is being observed and being documented. I truly believe that. Just imagine if the Gestapo had this kind of power back in the day…. Scary days indeed…
    “Fear them not therefore: for there is nothing covered, that shall not be revealed; and hid, that shall not be known. Matt 10:26” – Rev. 20:11-15)

    • WXRGina says:

      It was a freaky-creepy story Rush told, David!  If you didn’t, you can read the whole transcript from that segment Rush did.  It’s linked up in the column.

      • Theignorantfishermen says:

        Gina, thanks I will have to listen to it..I am a 24/7 subscriber… which Obama’s minions probably already know… lol

  3. WXRGina says:

    You’re quite right, of course, John.  Getting rid of all electronics would only limit potential stuff from that one area, but in no way would “protect” us from anyone who is truly out to “get us.”

  4. Jsehart says:

    Where I work at they don’t allow us to have phones in the building because there are a lot more security risks involved with smart-phones then just changing a message. If not properly protected they can become an eavesdropping device…and I work for the government.

  5. retiredday says:

    Gina, I read your article and was speechless.  To us retired folk, who anticipated a sense of security and stability in our old age, this kind of story just piles on the threatening aspects of society today: a major technological invasion of privacy, the assault on freedom, the ruination of the economy, the destruction of morality, the unrelenting attack on the Bible and Bible believers, and on and on.

    At a time in my life when I’d rather just enjoy the simple pleasures of life, I am forced to stay in the fray, speaking truth to a generation who seems to have little regard for the way things were just a half a century ago.  When a nation can accept the fact that the government can have access to every bit of personal information about them, the body politic is seriously ill and has forgotten what being healthy feels like.

    The ignorant compliance of the masses is overwhelming.

    • WXRGina says:

      It really is disheartening, even overwhelming, Mike. The good thing is that we know the Lord has our backs, no matter what bad things come our way. No amount of technology could ever out-do Him, either, since He is the Author of all knowledge. 🙂

  6. Alanbreland says:

    This is just a great example of the jobs Obama is creating. Why are people so negitive?

  7. Bob Ellis says:

    Yes they do. Microsoft, Google and almost all major companies these days are ensconced on the Left, but Apple has definitely taken some overtly hostile steps against decency and the family.