News that doesn't receive the necessary attention.

Monday, July 24, 2017

DNC emails were leaked--not hacked--per investigation of forensic evidence. Leaker was on US East Coast. June 12, Assange announces intent to publish DNC emails. June 15: Media reports DNC contractor CrowdStrike says Russian gov. took emails-7/24/17 Veteran Intelligence Professionals in memo to Pres. Trump, following earlier memo to former Pres. Obama on same subject

7/24/17, "Intel Vets Challenge ‘Russia Hack’ Evidence," Consortium News

"In a memo to President Trump, a group of former U.S. intelligence officers, including NSA specialists, cite new forensic studies to challenge the claim of the key Jan. 6 “assessment” that Russia “hacked” Democratic emails last year."

"MEMORANDUM FOR: The President
FROM: Veteran Intelligence Professionals for Sanity (VIPS)
SUBJECT: Was the “Russian Hack” an Inside Job?

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hackOf equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].

Independent analyst Skip Folden, a retired IBM Program Manager for Information Technology US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.
 
The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.

NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].

Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC…to WikiLeaks.”

Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and
 
-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”
*  *  *
Mr. President:

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justfy” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda. 

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hackingThe pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits. 

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.” 

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12 and 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack. 

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.
 
“Obfuscation and De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.
 
The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review.

Putin and the Technology

We also do not know if you have discussed cyber issues in any detail with President Putin. In his interview with NBC’s Megyn Kelly, he seemed quite willing – perhaps even eager – to address issues related to the kind of cyber tools revealed in the Vault 7 disclosures, if only to indicate he has been briefed on them. Putin pointed out that today’s technology enables hacking to be “masked and camouflaged to an extent that no one can understand the origin” [of the hack] … And, vice versa, it is possible to set up any entity or any individual that everyone will think that they are the exact source of that attack.”

“Hackers may be anywhere,” he said. “There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia. Can’t you imagine such a scenario?…I can.”

Full Disclosure: Over recent decades the ethos of our intelligence profession has eroded in the public mind to the point that agenda-free analysis is deemed well nigh impossible. Thus, we add this disclaimer, which applies to everything we in VIPS say and do: We have no political agenda; our sole purpose is to spread truth around and, when necessary, hold to account our former intelligence colleagues.

We speak and write without fear or favor. Consequently, any resemblance between what we say and what presidents, politicians and pundits say is purely coincidental. The fact we find it is necessary to include that reminder speaks volumes about these highly politicized times. This is our 50th VIPS Memorandum since the afternoon of Powell’s speech at the UN. Live links to the 49 past memos can be found at https://consortiumnews.com/vips-memos/."

"FOR THE STEERING GROUP, VETERAN INTELLIGENCE PROFESSIONALS FOR SANITY 

William Binney, former NSA Technical Director for World Geopolitical and Military Analysis; Co-founder of NSA’s Signals Intelligence Automation Research Center
Skip Folden, independent analyst, retired IBM Program Manager for Information Technology US (Associate VIPS)
Matthew Hoh, former Capt., USMC, Iraq and Foreign Service Officer, Afghanistan (associate VIPS)
Michael S. Kearns, Air Force Intelligence Officer (Ret.), Master SERE Resistance to Interrogation Instructor
John Kiriakou, Former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee
Linda Lewis, WMD preparedness policy analyst, USDA (ret.)
Lisa Ling, TSgt USAF (ret.) (associate VIPS)
Edward Loomis, Jr., former NSA Technical Director for the Office of Signals Processing
David MacMichael, National Intelligence Council (ret.)
Ray McGovern, former U.S. Army Infantry/Intelligence officer and CIA analyst
Elizabeth Murray, former Deputy National Intelligence Officer for Middle East, CIA
Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)
Cian Westmoreland, former USAF Radio Frequency Transmission Systems Technician and Unmanned Aircraft Systems whistleblower (Associate VIPS)
Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA
Sarah G. Wilton, Intelligence Officer, DIA (ret.); Commander, US Naval Reserve (ret.)
Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat"
image_pdf
.......................
.............................

Added: July 9, 2017 article by Craig Murray

7/9/2017, "‘Russiagate’: The Stink Without a Secret," WashingtonsBlog.com, by Craig Murray 

"By Craig Murray, former British intelligence officer, former UK ambassador to Uzbekistan, and Rector (i.e. Chancellor) of the University of Dundee. Originally published at CraigMurray.org.uk."

"After six solid months of coordinated allegation from the mainstream media allied to the leadership of state security institutions, not one single scrap of solid evidence for Trump/Russia election hacking has emerged
.
I do not support Donald Trump. I do support truth. There is much about Trump that I dislike intensely. Neither do I support the neo-liberal political establishment in the USA. The latter’s control of the mainstream media, and cunning manipulation of identity politics, seeks to portray the neo-liberal establishment as the heroes of decent values against Trump. Sadly, the idea that the neo-liberal establishment embodies decent values is completely untrue.

Truth disappeared so long ago in this witch-hunt that it is no longer even possible to define what the accusation is. Belief in “Russian hacking” of the US election has been elevated to a generic accusation of undefined wrongdoing,
a vague malaise we are told is floating poisonously in the ether, but we are not allowed to analyze. 

What did the Russians actually do?

The original, base accusation is that it was the Russians who hacked the DNC and Podesta emails and passed them to WikiLeaks. (I can assure you that is untrue). 

The authenticity of those emails is not in question. What they revealed of cheating by the Democratic establishment in biasing the primaries against Bernie Sanders, led to the forced resignation of Debbie Wasserman Shultz as chair of the Democratic National Committee. They also led to the resignation from CNN of Donna Brazile, who had passed debate questions in advance to Clinton. Those are facts. They actually happened. Let us hold on to those facts, as we surf through lies. There was other nasty Clinton Foundation and cash for access stuff in the emails, but we do not even need to go there for the purpose of this argument.

The original “Russian hacking” allegation was that it was the Russians who nefariously obtained these damning emails and passed them to WikiLeaks. The “evidence” for this was twofold. A report from private cyber security firm Crowdstrike claimed that metadata showed that the hackers had left behind clues, including the name of the founder of the Soviet security services. The second piece of evidence was that a blogger named Guccifer2 and a website called DNCLeaks appeared to have access to some of the material around the same time that WikiLeaks did, and that Guccifer2 could be Russian.

That is it. To this day, that is the sum total of actual “evidence” of Russian hacking. I won’t say hang on to it as a fact, because it contains no relevant fact. But at least it is some form of definable allegation of something happening, rather than “Russian hacking” being a simple article of faith like the Holy Trinity.

But there are a number of problems that prevent this being fact at all. Nobody has ever been able to refute the evidence of Bill Binney, former Technical Director of the NSA who designed its current surveillance systems. Bill has stated that the capability of the NSA is such, that if the DNC computers had been hacked, the NSA would be able to trace the actual packets of that information as those emails traveled over the Internet, and give a precise time, to the second, for the hack. The NSA simply do not have the event – because there wasn’t one. I know Bill personally and am quite certain of his integrity.

As we have been repeatedly told, “17 intelligence agencies” sign up to the “Russian hacking”, yet all these king’s horses and all these king’s men have been unable to produce any evidence whatsoever of the purported “hack”. Largely because they are not in fact trying. Here is another actual fact I wish you to hang on to: The Democrats have refused the intelligence agencies access to their servers to discover what actually happened. I am going to say that again.

The Democrats have refused the intelligence agencies access to their servers to discover what actually happened.

The heads of the intelligence community have said that they regard the report from Crowdstrike – the Clinton aligned private cyber security firm – as adequate. Despite the fact that the Crowdstrike report plainly proves nothing whatsoever and is based entirely on an initial presumption there must have been a hack, as opposed to an internal download.

Not actually examining the obvious evidence has been a key tool in keeping the “Russian hacking” meme going

On 24 May the Guardian reported triumphantly, following the Washington Post, that 

“Fox News falsely alleged federal authorities had found thousands of emails between Rich and WikiLeaks, when in fact law enforcement officials disputed that Rich’s laptop had even been in possession of, or examined by, the FBI.”

It evidently did not occur to the Guardian as troubling, that those pretending to be investigating the murder of Seth Rich have not looked at his laptop.

There is a very plain pattern here of agencies promoting the notion of a fake “Russian crime”, while failing to take the most basic and obvious initial steps if they were really investigating its existence. I might add to that, there has been no contact with me at all by those supposedly investigating. I could tell them these were leaks not hacks. WikiLeaks The clue is in the name.

So those “17 agencies” are not really investigating but are prepared to endorse weird Crowdstrike claims, like the idea that Russia’s security services are so amateur as to leave fingerprints with the name of their founder. If the Russians fed the material to WikiLeaks, why would they also set up a vainglorious persona like Guccifer2 who leaves obvious Russia pointing clues all over the place?

Of course we need to add from the WikiLeaks “Vault 7” leak release, information that the CIA specifically deploys technology that leaves behind fake fingerprints of a Russian computer hacking operation.

Crowdstrike have a general anti-Russian attitude. They published a report seeking to allege that the same Russian entities which “had hacked” the DNC were involved in targeting for Russian artillery in the Ukraine. This has been utterly discredited.

Some of the more crazed “Russiagate” allegations have been quietly dropped. The mainstream media are hoping we will all forget their breathless endorsement of the reports of the charlatan Christopher Steele, a former middle ranking MI6 man with very limited contacts that he milked to sell lurid gossip to wealthy and gullible corporations. I confess I rather admire his chutzpah.

Given there is no hacking in the Russian hacking story, the charges have moved wider into a vague miasma of McCarthyite anti-Russian hysteria. Does anyone connected to Trump know any Russians? Do they have business links with Russian finance?

Of course they do. Trump is part of the worldwide oligarch class whose financial interests are woven into a vast worldwide network that enslaves pretty well the rest of us. As are the Clintons and the owners of the mainstream media who are stoking up the anti-Russian hysteria. It is all good for their armaments industry interests, in both Washington and Moscow.

Trump’s judgment is appalling. His sackings or inappropriate directions to people over this subject may damage him.

The old Watergate related wisdom is that it is not the crime that gets you, it is the cover-up. But there is a fundamental difference here. At the center of Watergate there was an actual burglary. At the center of Russian hacking there is a void, a hollow, and emptiness, an abyss, a yawning chasm. There is nothing there. 

Those who believe that opposition to Trump justifies whipping up anti-Russian hysteria on a massive scale, on the basis of lies, are wrong. I remain positive that the movement Bernie Sanders started will bring a new dawn to America in the next few years. That depends on political campaigning by people on the ground and on social media. Leveraging falsehoods and cold war hysteria through mainstream media in an effort to somehow get Clinton back to power is not a viable alternative. It is a fantasy and even were it practical, I would not want it to succeed."







.....................

No comments:

Followers

Blog Archive

About Me

My photo
I'm the daughter of an Eagle Scout (fan of the Brooklyn Dodgers and Mets) and a Beauty Queen.