Sorry, Russia-gaters;
WikiLeaks Got the DNC Emails From Insider, not Russia.. VIPSers Binney & Johnson use the
forensics that the FBI avoided doing,, March 02, 2019 "Information Clearing House" - Thinking back,
President Barack Obama dropped a huge hint two days before he left office,
using his last press conference to point out that the “conclusions of the
intelligence community” regarding how WikiLeaks received the DNC emails were
“inconclusive.” The nerve! Daring to say that just 13 days after
the U.S. intelligence Gang of Four briefed Obama up and down on their
evidence-free “assessment” that WikiLeaks got the DNC emails via a Russian
hack.
This was one
time Obama summoned the courage to face down James
(the-Russians-are-almost-genetically-driven-to-deceive) Clapper and other
intelligence chiefs. After all, Obama is a lawyer. He “does
evidence.” In contrast, ex-CIA Director John Brennan, told Congress that
he does not “do evidence.”
Back in the day,
the intelligence community “did evidence.” As soon as the
evidence-impoverished “Intelligence Community Assessment” was published on
January 6, 2017, members of Veteran Intelligence Professionals for Sanity
(VIPS) smelled a rat. That same day, former NSA Technical Director
William Binney and Ray published “The Dubious Case on Russian Hacking,”
Monday, March 4, 2019
Julian Assange Warns 🚨Trumps Mass Arrests Are Coming In Mar 2019 ! Confirmation Final Step
5:03 PM
No comments
Then
came “The Gaping Holes of Russia-gate,”
Even
Michael Cohen admitted yesterday that he had no “direct evidence that Mr. Trump
or his campaign colluded with Russia.” But, he added, “I have my
suspicions.” We intelligence analysts, back in the day, did not “do
suspicions.”
There
are 1,001 other reasons to impeach President Donald Trump, if Nancy Pelosi had
the courage. But politics, not the Constitution, reigns supreme in the
people’s House to which Founders bestowed an orderly political process to get
rid of such a president. Shame on them all.
Ray
came to Washington from his native Bronx in the early Sixties as an Army
infantry/intelligence officer and then served as a CIA analyst for 27 years,
from the administration of John F. Kennedy to that of George H. W. Bush. Ray’s
duties included chairing National Intelligence Estimates and preparing
the President’s Daily Brief, which he briefed one-on-one to President
Ronald Reagan’s five most senior national security advisers from 1981 to 1985.
Why
The DNC was not hacked by the Russians
Why does a
cyber security company wait 45 days after allegedly uncovering a massive
Russian attack on the DNC server to take concrete steps to safeguard the
integrity of the information held on the server?
Via Sic Semper Tyrannis. Authored by William Binney,
former Technical Director NSA and Larry Johnson, former State CT and CIA
The FBI, CIA and NSA claim that the DNC emails published by
WIKILEAKS on July 26, 2016 were obtained via a Russian hack, but more than
three years after the alleged “hack” no forensic evidence has been produced to
support that claim. In fact, the available forensic evidence contradicts the
official account that blames the leak of the DNC emails on a Russian internet
“intrusion”. The existing evidence supports an alternative
explanation–the files taken from the DNC between 23 and 25May 2016 and were
copied onto a file storage device, such as a thumb drive.
If the Russians actually
had conducted an internet based hack of the DNC computer network then the
evidence of such an attack would have been collected and stored by the National
Security Agency. The technical systems to accomplish this task have been in
place since 2002. The NSA had an opportunity to make it clear that there was
irrefutable proof of Russian meddling, particularly with regard to the DNC
hack, when it signed on to the January 2017 “Intelligence Community
Assessment,” regarding Russian interference in the 2016 Presidential election:
·
We
also assess Putin and the Russian Government aspired to help President-elect
Trump’s election chances when possible by discrediting Secretary Clinton and
publicly contrasting her unfavorably to him. All three agencies agree with this
judgment. CIA and FBI have high confidence in this judgment; NSA has moderate confidence.
The phrase, “moderate confidence” is intelligence speak for “we
have no hard evidence.” Thanks to the leaks by Edward Snowden, we know with
certainty that the NSA had the capability to examine and analyze the DNC
emails. NSA routinely “vacuumed up” email traffic transiting the U.S. using
robust collection systems (whether or not anyone in the NSA chose to look for
this data is another question). If those emails had been hijacked over the
internet then NSA also would have been able to track the electronic path they
traveled over the internet. This kind of data would allow the NSA to declare
without reservation or caveat that the Russians were guilty. The NSA could
admit to such a fact in an unclassified assessment without compromising sources
and methods. Instead, the NSA only claimed to have moderate confidence in the
judgement regarding Russian meddling. If the NSA had hard intelligence to
support the judgement the conclusion would have been stated as “full
confidence.”
We believe that Special Counsel Robert Mueller faces major
embarrassment if he decides to pursue the indictment he filed–which accuses 12
Russian GRU military personnel and an entity identified as, Guccifer 2.0, for
the DNC hack—because the available forensic evidence indicates the emails were
copied onto a storage device.
According to a DOJ press
release on the
indictment of the Russians, Mueller declares that the emails were obtained via
a “spearphising” attack:
In 2016, officials in
Unit 26165 began spearphishing volunteers and employees of the presidential
campaign of Hillary Clinton, including the campaign’s chairman. Through that
process, officials in this unit were able to steal the usernames and passwords
for numerous individuals and use those credentials to steal email content and
hack into other computers. They also were able to hackinto the computer networks of the
Democratic Congressional Campaign Committee (DCCC) and the Democratic National
Committee (DNC) through these spearphishing techniques to steal emails and
documents,covertly
monitor the computer activity of dozens of employees, and implant hundreds of
files of malicious computer code to steal passwords and maintain access to
these networks.
The officials in Unit 26165 coordinated with officials in Unit
74455 to plan the release of the stolen documents for the purpose of
interfering with the 2016 presidential election. Defendants registered the
domain DCLeaks.com and later staged the release of thousands of stolen emails
and documents through that website. On the website, defendants claimed to be
“American hacktivists” and used Facebook accounts with fictitious names and
Twitter accounts to promote the website. After public accusations that the
Russian government was behind the hacking of DNC and DCCC computers, defendants
created the fictitious persona Guccifer 2.0. On the evening of June 15, 2016
between 4:19PM and 4:56PM, defendants used their Moscow-based server to search
for a series of English words and phrases that later appeared in Guccifer 2.0’s
first blog post falsely claiming to be a lone Romanian hacker responsible for
the hacks in the hopes of undermining the allegations of Russian involvement.
Notwithstanding the DOJ press release, an examination of the
Wikileaks DNC files do not support the claim that the emails were obtained via
spearphising. Instead, the evidence clearly shows that the emails posted on the
Wikileaks site were copied onto an electronic media, such as a CD-ROM or thumbdrive
before they were posted at Wikileaks. The emails posted on Wikileaks were saved
using the File Allocation Table (aka FAT) computer file system architecture.
An examination of the Wikileaks DNC files shows they were created
on 23, 25 and 26 May respectively. The fact that they appear in a FAT system
format indicates the data was transfered to a storage device, such as a thumb
drive.
How do we know? The truth lies in the “last modified” time stamps
on the Wikileaks files. Every single one of these time stamps end in even
numbers. If you are not familiar with the FAT file system, you need to
understand that when a date is stored under this system the data rounds the
time to the nearest even numbered second.
We have examined 500 DNC email files stored on Wikileaks and all
500 files end in an even number—2, 4, 6, 8 or 0. If a system other than FAT had
been used, there would have been an equal probability of the time stamp ending
with an odd number. But that is not the case with the data stored on the Wikileaks
site. All end with an even number.
The DNC emails are in 3 batches (times are GMT).
Date
Count Min Time Max Time
FAT Min Id Max Id
2016-05-23 10520 02:12:38
02:45:42 x 3800 14319
2016-05-25 11936 05:21:30
06:04:36 x
1 22456
2016-08-26 13357 14:11:36
20:06:04 x 22457 44053
The random probability that FAT was not used is 1 chance in 2
to the 500th power or approximately 1 chance in 10 to the 150th power – in
other words, an infinitely high order.
This data alone does not prove that the emails were copied at the
DNC headquarters. But it does show that the data/emails posted by Wikileaks did
go through a storage device, like a thumbdrive, before Wikileaks posted the
emails on the World Wide Web.
This fact alone is enough to raise reasonable doubts about
Mueller’s indictment accusing 12 Russian soldiers as the culprits for the leak
of the DNC emails to Wikileaks. A savvy defense attorney will argue, and
rightly so, that someone copied the DNC files to a storage device (Eg., USB
thumb drive) and transferred that to Wikileaks.
We also tested the hypothesis that Wikileaks could have
manipulated the files to produce the FAT result by comparing the DNC email
files with the Podesta emails (aka Larter file) that was released on 21
September 2016. The FAT file format is NOT present in the Podesta files. If
Wikileaks employed a standard protocol for handling data/emails received from
unknown sources we should expect the File structure of the DNC emails to match
the file structure of the Podesta emails. The evidence shows otherwise.
There is further compelling technical evidence that undermines the
claim that the DNC emails were downloaded over the internet as a result of a
spearphising attack. Bill Binney, a former Technical Director of the National
Security Agency, along with other former intelligence community experts,
examined emails posted by Guccifer 2.0 and discovered that those emails could
not have been downloaded over the internet as a result of a spearphising
attack. It is a simple matter of mathematics and physics.
Shortly after Wikileaks
announced it had the DNC emails, Guccifer 2.0 emerged on the public stage, claimimg that “he”
hacked the DNC and that he had the DNC emails. Guccifer 2.0 began in late June
2016 to publish documents as proof that “he” had hacked from the DNC.
Taking Guccifer 2.0 at
face value—i.e., that his documents were obtained via an internet attack—Bill
Binney conducted a forensic examination of the metadata contained in the posted
documents based on internet connection speeds in the United States. This
analysis showed that the highest transfer rate was 49.1 megabytes per second,
which is much faster than possible from a remote online connection. The 49.1
megabytes speed coincides with the download rate for a thumb drive.
Binney, assisted by
other colleagues with technical expertise, extended the examination and ran
various tests forensic from the Netherlands, Albania, Belgrade and the UK. The
fastest rate obtained — from a data center in New Jersey to a data center in
the UK–was 12 megabytes per second, which is less than a fourth of the rate
necessary to transfer the data, as it was listed from Guccifer 2.
The findings from the examination of the Guccifer 2.0 data and the
Wikileaks data does not prove who copied the information to a thumbdrive, but
it does provide and empirical alternative explanation that undermines the
Special Counsel’s claim that the DNC was hacked. According to the forensic
evidence for the Guccifer 2.0 data, the DNC emails were not taken by an
internet spearphising attack. The data breach was local. It was copied from the
network.
There is other circumstantial evidence that buttresses the
conclusion that the data breach was a local effort that copied data.
First there is the Top Secret information leaked by Edward
Snowden. If the DNC emails had been hacked via spearphising (as alleged by
Mueller) then the data would have been captured by the NSA by means of the
Upstream program (Fairview, Stormbrew, Blarney, Oakstar) and the forensic
evidence would not modify times – the data would be presented as sent.
Second, we have the public reporting on the DNC and Crowdstrike,
which provide a bizarre timeline for the alleged Russian hacking.
It was 29 April 2016, when the DNC claims it became aware its
servers had been penetrated (see
https://medium.com/homefront-rising/dumbstruck-how-crowdstrike-conned-america-on-the-hack-of-the-dnc-ecfa522ff44f).
No claim yet about who was responsible.
According to CrowdStrike
founder, Dimitri Alperovitch, his company first detected the Russians mucking
around inside the DNC server on 6 May 2016. A CrowdStrike intelligence
analyst reportedly told Alperovitch that:
Falcon had identified not one but two Russian intruders: Cozy
Bear, a group CrowdStrike’s experts believed was affiliated with the FSB,
Russia’s answer to the CIA; and Fancy Bear, which they had linked to the GRU,
Russian military intelligence.
And what did CrowdStrike do about this? Nothing. According to
Michael Isikoff, CrowdStrike claimed their inactivity was a deliberate plan to
avoid alerting the Russians that they had been “discovered.” This is nonsense.
If a security company detected a thief breaking into a house and stealing its
contents, what sane company would counsel the client to do nothing in order to
avoid alerting the thief?
We know from examining the Wikileaks data that the last message
copied from the DNC network is dated Wed, 25 May 2016 08:48:35. No DNC
emails were taken and released to Wikileaks after that date.
CrowdStrike waited until
10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch
told Esquire’s Vicky Ward that:
Ultimately, the teams decided it was necessary to replace the
software on every computer at the DNC. Until the network was clean, secrecy was
vital. On the afternoon of Friday, June 10, all DNC employees were instructed
to leave their laptops in the office.
Why does a cyber security company wait 45 days after allegedly
uncovering a massive Russian attack on the DNC server to take concrete steps to
safeguard the integrity of the information held on the server? This makes no
sense.
A more plausible explanation is that it was discovered that emails
had been downloaded from the server and copied onto a device like a thumbdrive.
But the culprit had not yet been identified. We know one thing for
certain—CrowdStrike did not take steps to shutdown and repair the DNC network
until 18 days after the last email was copied from the server.
The final curiosity is that the DNC never provided the FBI access
to its servers in order for qualified FBI technicians to conduct a thorough
forensic examination. If this had been a genuine internet hack, it would be
very easy for the NSA to identify when the information was taken and the route
it moved after being hacked from the server. The NSA had the technical
collection systems in place to enable analysts to know the date and time of the
messages. But that has not been done.
Taken together, these disparate data points combine to paint a
picture that exonerates alleged Russian hackers and implicates persons within
our law enforcement and intelligence community taking part in a campaign of
misinformation, deceit and incompetence. It is not a pretty picture.
The Dubious Case on Russian ‘Hacking’
Still not showing evidence, U.S. intelligence chief James
Clapper told senators he’s really sure Russia was the source of “hacked”
Democratic emails, but the case remains weak, say ex-intelligence officials
William Binney and Ray McGovern.
By William Binney and Ray McGovern
It has been several weeks since the New York Times reported that
“overwhelming circumstantial evidence” led the CIA to
believe that Russian President Vladimir
Putin “deployed computer hackers” to help Donald Trump win the
election. But the evidence released so far has been far from overwhelming.
The long anticipated Joint
Analysis Report issued by the Department of Homeland Security and
the FBI on
Dec. 29 met widespread criticism in the technical community. Worse still, some
of the advice it offered led to a very
alarmist false alarmabout supposed Russian hacking into a Vermont electric power
station.
Advertised in advance as providing proof of Russian hacking, the
report fell embarrassingly short of that goal. The thin gruel that it did
contain was watered down further by the following unusual warning atop page 1:
“DISCLAIMER: This report is provided ‘as is’ for informational purposes only.
The Department of Homeland Security (DHS) does not provide any warranties of
any kind regarding any information contained within.”
Also, curiously absent was any clear input from the CIA, NSA or
Director of National Intelligence James Clapper.
Reportedly, Mr. Clapper will get a chance on Friday to brief an understandably
skeptical Donald Trump, who has called the briefing delay “very strange,” even
suggesting that top intelligence officials “need more time to build a case.”
Clapper’s Checkered History
Mr. Trump’s skepticism is warranted not only by technical
realities, but also by human ones, including the dramatis personae involved.
Mr. Clapper has admitted giving Congress on March 12, 2013, false
testimony regarding the extent of the National Security Agency’s
collection of data on Americans. Four months later, after the Edward Snowden
revelations, Mr. Clapper apologized to the Senate for testimony he admitted was
“clearly erroneous.” That he is a survivor was already apparent by the way he
landed on his feet after the intelligence debacle on Iraq.
Mr. Clapper was a key player in facilitating the fraudulent
intelligence. Defense Secretary Donald Rumsfeld put Mr. Clapper in charge of
the analysis of satellite imagery, the best source for pinpointing the location
of weapons of mass destruction — if any.
When Pentagon favorites like Iraqi émigré Ahmed Chalabi plied
U.S. intelligence with spurious “evidence” on WMD in Iraq, Mr. Clapper was in
position to suppress the findings of any imagery analyst who might have the
temerity to report, for example, that the Iraqi “chemical weapons facility” for
which Mr. Chalabi provided the geographic coordinates was nothing of the kind.
Mr. Clapper preferred to go by the Rumsfeldian dictum: “The absence of evidence
is not evidence of absence.” (It will be interesting to see if he tries that
out on the President-elect Friday.)
A year after the war began, Mr. Chalabi told the
media, “We are heroes in error. As far as we’re concerned we’ve
been entirely successful.” By that time it was clear there were no WMD in Iraq.
When Mr. Clapper was asked to explain, he opined, without adducing any
evidence, that they probably were moved into Syria.
With respect to the alleged interference by Russia and WikiLeaks
in the U.S. election, it is a major mystery why U.S. intelligence feels it must
rely on “circumstantial evidence,” when it has NSA’s vacuum cleaner sucking up
hard evidence galore. What we know of NSA’s capabilities shows that the email
disclosures were from leaking, not hacking.
Here’s the difference:
Hack: When someone in a remote
location electronically penetrates operating systems, firewalls or other
cyber-protection systems and then extracts data. Our own considerable experience,
plus the rich detail revealed by Edward Snowden, persuades us that, with NSA’s
formidable trace capability, it can identify both sender and recipient of any
and all data crossing the network.
Leak: When someone physically takes
data out of an organization — on a thumb drive, for example — and gives it to
someone else, as Edward Snowden and Chelsea Manning did. Leaking is the only
way such data can be copied and removed with no electronic trace.
Because NSA can trace exactly where and how any “hacked” emails
from the Democratic National Committee or other servers were routed through the
network, it is puzzling why NSA cannot produce hard evidence implicating the
Russian government and WikiLeaks. Unless we are dealing with a leak from an
insider, not a hack, as other reporting suggests. From a technical perspective
alone, we are convinced that this is what happened.
Lastly, the CIA is almost totally dependent on NSA for ground
truth in this electronic arena. Given Mr. Clapper’s checkered record for accuracy
in describing NSA activities, it is to be hoped that the director of NSA will
join him for the briefing with Mr. Trump.
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment