• Monthly
  • $25
  • $50
  • $100
  • $other
  • use PayPal

Spring Donation Drive

CounterPunch is a lifeboat piggybank-icon of sanity in today’s turbulent political seas. Please make a tax-deductible donation and help us continue to fight.
FacebookTwitterRedditEmail

Why the DNC Emails Were Leaked Not Hacked

It has been several weeks since the New York Times reported that “overwhelming circumstantial evidence” led the CIA to believe that Russian President Vladimir Putin “deployed computer hackers” to help Donald Trump win the election. But the evidence released so far has been far from overwhelming.

The long anticipated Joint Analysis Report issued by the Department of Homeland Security and the FBI on Dec. 29 met widespread criticism in the technical community. Worse still, some of the advice it offered led to a very alarmist false alarm about supposed Russian hacking into a Vermont electric power station.

Advertised in advance as providing proof of Russian hacking, the report fell embarrassingly short of that goal. The thin gruel that it did contain was watered down further by the following unusual warning atop page 1: “DISCLAIMER: This report is provided ‘as is’ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within.”

Also, curiously absent was any clear input from the CIA, NSA or Director of National Intelligence James Clapper. Reportedly, Mr. Clapper will get a chance tomorrow to brief an understandably skeptical Donald Trump, who has called the briefing delay “very strange,” even suggesting that top intelligence officials “need more time to build a case.”

Mr. Trump’s skepticism is warranted not only by technical realities, but also by human ones, including the dramatis personae involved. Mr. Clapper has admitted giving Congress on March 12, 2013, false testimony regarding the extent of NSA collection of data on Americans. Four months later, after the Edward Snowden revelations, Mr. Clapper apologized to the Senate for testimony he admitted was “clearly erroneous.” That he is a survivor was already apparent by the way he landed on his feet after the intelligence debacle on Iraq.

Mr. Clapper was a key player in facilitating the fraudulent intelligence. Defense Secretary Donald Rumsfeld put Mr. Clapper in charge of the analysis of satellite imagery, the best source for pinpointing the location of weapons of mass destruction — if any.

When Pentagon favorites like Iraqi émigré Ahmed Chalabi plied U.S. intelligence with spurious “evidence” on WMD in Iraq, Mr. Clapper was in position to suppress the findings of any imagery analyst who might have the temerity to report, for example, that the Iraqi “chemical weapons facility” for which Mr. Chalabi provided the geographic coordinates was nothing of the kind. Mr. Clapper preferred to go by the Rumsfeldian dictum: “The absence of evidence is not evidence of absence.” (It will be interesting to see if he tries that out on the president-elect Friday.)

A year after the war began, Mr. Chalabi told the media, “We are heroes in error. As far as we’re concerned we’ve been entirely successful.” By that time it was clear there were no WMD in Iraq. When Mr. Clapper was asked to explain, he opined, without adducing any evidence, that they probably were moved into Syria.

With respect to the alleged interference by Russia and WikiLeaks in the U.S. election, it is a major mystery why U.S. intelligence feels it must rely on “circumstantial evidence,” when it has NSA’s vacuum cleaner sucking up hard evidence galore. What we know of NSA’s capabilities shows that the email disclosures were from leaking, not hacking.

Here’s the difference:

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or other cyber-protection systems and then extracts data. Our own considerable experience, plus the rich detail revealed by Edward Snowden, persuades us that, with NSA’s formidable trace capability, it can identify both sender and recipient of any and all data crossing the network.

Leak: When someone physically takes data out of an organization — on a thumb drive, for example — and gives it to someone else, as Edward Snowden and Chelsea Manning did. Leaking is the only way such data can be copied and removed with no electronic trace.

Because NSA can trace exactly where and how any “hacked” emails from the Democratic National Committee or other servers were routed through the network, it is puzzling why NSA cannot produce hard evidence implicating the Russian government and WikiLeaks. Unless we are dealing with a leak from an insider, not a hack, as other reporting suggests. From a technical perspective alone, we are convinced that this is what happened.

Lastly, the CIA is almost totally dependent on NSA for ground truth in this electronic arena. Given Mr. Clapper’s checkered record for accuracy in describing NSA activities, it is to be hoped that the director of NSA will join him for the briefing with Mr. Trump.

 

William Binney (williambinney0802@comcast.net) worked for NSA for 36 years, retiring in 2001 as the technical director of world military and geopolitical analysis and reporting; he created many of the collection systems still used by NSA. Ray McGovern (rrmcgovern@gmail.com) was a CIA analyst for 27 years; he briefed the president’s daily brief one-on-one to President Reagan’s most senior national security officials from 1981-85.

bernie-the-sandernistas-cover-344x550

Weekend Edition
May 17, 2019
Friday - Sunday
Melvin Goodman
Trump and the Middle East: a Long Record of Personal Failure
Joan Roelofs
“Get Your Endangered Species Off My Bombing Range!”
Jeffrey St. Clair
Roaming Charges: Slouching Towards Tehran
Paul Street
It’s Even More Terrible Than You Thought
Rob Urie
Grabby Joe and the Problem of Environmental Decline
Ajamu Baraka
2020 Elections: It’s Militarism and the Military Budget Stupid!
Andrew Levine
Springtime for Biden and Democrats
Richard Moser
The Interlocking Crises: War and Climate Chaos
Ron Jacobs
Uncle Sam Needs Our Help Again?
Eric Draitser
Elizabeth Warren Was Smart to Tell FOX to Go to Hell
Peter Bolton
The Washington Post’s “Cartel of the Suns” Theory is the Latest Desperate Excuse for Why the Coup Attempt in Venezuela has Failed
Doug Johnson Hatlem
Analysis of Undecideds Suggests Biden’s Support May be Exaggerated
Peter Lackowski
Eyewitness in Venezuela: a 14-year Perspective
Karl Grossman
Can Jerry Nadler Take Down Trump?
Howie Hawkins
Does the Climate Movement Really Mean What It Says?
Gary Leupp
Bolton and the Road to the War He Wants
Jill Richardson
Climate Change was No Accident
Josh Hoxie
Debunking Myths About Wealth and Race
David Barsamian
Iran Notes
David Mattson
Social Carrying Capacity Politspeak Bamboozle
Christopher Brauchli
The Pompeo Smirk
Louis Proyect
Trotsky, Bukharin and the Eco-Modernists
Martha Burk
Will Burning at the Stake Come Next?
John W. Whitehead
The Deadly Perils of Traffic Stops in America
Binoy Kampmark
The Christchurch Pledge and a Regulated Internet
David Rosen
Florida’s Sex Wars: the Battle to Decriminalize Sex Work
Ralph Nader
Trump: Importing Dangerous Medicines and Food and Keeping Consumers in the Dark
Brett Haverstick
America’s Roadless Rules are Not Protecting Public Wildlands From Development
Alan Macleod
Purity Tests Can be a Good Thing
Binoy Kampmark
Modern Merchants of Death: the NSO Group, Spyware and Human Rights
Kim C. Domenico
Anarchism & Reconciliation, Part II
Peter LaVenia
Game of Thrones and the Truth About Class (Spoiler Warning)
Manuel E. Yepe
The Options Trump Puts on the Table
Renee Parsons
The Pompeo/Bolton Tag Team
David Swanson
Where Lyme Disease Came From and Why It Eludes Treatment
Cesar Chelala
Lowering Your Risk of Alzheimer’s Disease
Kollibri terre Sonnenblume
Our Problems are Deeper than “Capitalism” (and “Socialism” Alone Can’t Solve Them)
Chris Zinda
Delegislating Wilderness
Robert Koehler
War’s Unanswered Questions
Robert P. Alvarez
Let Prison Inmates Vote
Barbara Nimri Aziz
A Novel We Can All Relate To
David Yearsley
Carmen’s Mother’s Day Lessons
Charles R. Larson
Review: Ziya Tong’s “The Reality Bubble”
Elliot Sperber
Pharaoh’s Dream
Elizabeth Keyes
Somewhere Beyond Corporate Media Yemenis Die
FacebookTwitterRedditEmail