FacebookTwitterGoogle+RedditEmail

Why the DNC Emails Were Leaked Not Hacked

by

It has been several weeks since the New York Times reported that “overwhelming circumstantial evidence” led the CIA to believe that Russian President Vladimir Putin “deployed computer hackers” to help Donald Trump win the election. But the evidence released so far has been far from overwhelming.

The long anticipated Joint Analysis Report issued by the Department of Homeland Security and the FBI on Dec. 29 met widespread criticism in the technical community. Worse still, some of the advice it offered led to a very alarmist false alarm about supposed Russian hacking into a Vermont electric power station.

Advertised in advance as providing proof of Russian hacking, the report fell embarrassingly short of that goal. The thin gruel that it did contain was watered down further by the following unusual warning atop page 1: “DISCLAIMER: This report is provided ‘as is’ for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within.”

Also, curiously absent was any clear input from the CIA, NSA or Director of National Intelligence James Clapper. Reportedly, Mr. Clapper will get a chance tomorrow to brief an understandably skeptical Donald Trump, who has called the briefing delay “very strange,” even suggesting that top intelligence officials “need more time to build a case.”

Mr. Trump’s skepticism is warranted not only by technical realities, but also by human ones, including the dramatis personae involved. Mr. Clapper has admitted giving Congress on March 12, 2013, false testimony regarding the extent of NSA collection of data on Americans. Four months later, after the Edward Snowden revelations, Mr. Clapper apologized to the Senate for testimony he admitted was “clearly erroneous.” That he is a survivor was already apparent by the way he landed on his feet after the intelligence debacle on Iraq.

Mr. Clapper was a key player in facilitating the fraudulent intelligence. Defense Secretary Donald Rumsfeld put Mr. Clapper in charge of the analysis of satellite imagery, the best source for pinpointing the location of weapons of mass destruction — if any.

When Pentagon favorites like Iraqi émigré Ahmed Chalabi plied U.S. intelligence with spurious “evidence” on WMD in Iraq, Mr. Clapper was in position to suppress the findings of any imagery analyst who might have the temerity to report, for example, that the Iraqi “chemical weapons facility” for which Mr. Chalabi provided the geographic coordinates was nothing of the kind. Mr. Clapper preferred to go by the Rumsfeldian dictum: “The absence of evidence is not evidence of absence.” (It will be interesting to see if he tries that out on the president-elect Friday.)

A year after the war began, Mr. Chalabi told the media, “We are heroes in error. As far as we’re concerned we’ve been entirely successful.” By that time it was clear there were no WMD in Iraq. When Mr. Clapper was asked to explain, he opined, without adducing any evidence, that they probably were moved into Syria.

With respect to the alleged interference by Russia and WikiLeaks in the U.S. election, it is a major mystery why U.S. intelligence feels it must rely on “circumstantial evidence,” when it has NSA’s vacuum cleaner sucking up hard evidence galore. What we know of NSA’s capabilities shows that the email disclosures were from leaking, not hacking.

Here’s the difference:

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or other cyber-protection systems and then extracts data. Our own considerable experience, plus the rich detail revealed by Edward Snowden, persuades us that, with NSA’s formidable trace capability, it can identify both sender and recipient of any and all data crossing the network.

Leak: When someone physically takes data out of an organization — on a thumb drive, for example — and gives it to someone else, as Edward Snowden and Chelsea Manning did. Leaking is the only way such data can be copied and removed with no electronic trace.

Because NSA can trace exactly where and how any “hacked” emails from the Democratic National Committee or other servers were routed through the network, it is puzzling why NSA cannot produce hard evidence implicating the Russian government and WikiLeaks. Unless we are dealing with a leak from an insider, not a hack, as other reporting suggests. From a technical perspective alone, we are convinced that this is what happened.

Lastly, the CIA is almost totally dependent on NSA for ground truth in this electronic arena. Given Mr. Clapper’s checkered record for accuracy in describing NSA activities, it is to be hoped that the director of NSA will join him for the briefing with Mr. Trump.

 

William Binney (williambinney0802@comcast.net) worked for NSA for 36 years, retiring in 2001 as the technical director of world military and geopolitical analysis and reporting; he created many of the collection systems still used by NSA. Ray McGovern (rrmcgovern@gmail.com) was a CIA analyst for 27 years; he briefed the president’s daily brief one-on-one to President Reagan’s most senior national security officials from 1981-85.

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

Weekend Edition
June 23, 2017
Friday - Sunday
Jeffrey St. Clair
Democrats in the Dead Zone
Gary Leupp
Trump, Qatar and the Danger of Total Confusion
Andrew Levine
The “Democracies” We Deserve
Jeffrey St. Clair - Joshua Frank
The FBI’s “Operation Backfire” and the Case of Briana Waters
Rob Urie
Cannibal Corpse
Joseph G. Ramsey
Savage Calculations: On the Exoneration of Philando Castile’s Killer
John Wight
Trump’s Attack on Cuba
Dave Lindorff
We Need a Mass Movement to Demand Radical Progressive Change
Brian Cloughley
Moving Closer to Doom
David Rosen
The Sex Offender: the 21st Century Witch
John Feffer
All Signs Point to Trump’s Coming War With Iran
Jennifer L. Lieberman
What’s Really New About the Gig Economy?
Pete Dolack
Analyzing the Failures of Syriza
Vijay Prashad
The Russian Nexus
Mike Whitney
Putin Tries to Avoid a Wider War With the US
Gregory Barrett
“Realpolitik” in Berlin: Merkel Fawns Over Kissinger
Louis Yako
The Road to Understanding Syria Goes Through Iraq
Graham Peebles
Grenfell Tower: A Disaster Waiting to Happen
Ezra Rosser
The Poverty State of Mind and the State’s Obligations to the Poor
Ron Jacobs
Andrew Jackson and the American Psyche
Pepe Escobar
Fear and Loathing on the Afghan Silk Road
Andre Vltchek
Why I Reject Western Courts and Justice
Lawrence Davidson
On Hidden Cultural Corruptors
Christopher Brauchli
The Routinization of Mass Shootings in America
Missy Comley Beattie
The Poor Need Not Apply
Martin Billheimer
White Man’s Country and the Iron Room
Joseph Natoli
What to Wonder Now
Tom Clifford
Hong Kong: the Chinese Meant Business
Thomas Knapp
The Castile Doctrine: Cops Without Consequences
Nyla Ali Khan
Borders Versus Memory
Binoy Kampmark
Death on the Road: Memory in Tim Winton’s Shrine
Tony McKenna
The Oily Politics of Unity: Owen Smith as Northern Ireland Shadow Secretary
Nizar Visram
If North Korea Didn’t Exist US Would Create It
John Carroll Md
At St. Catherine’s Hospital, Cite Soleil, Haiti
Kenneth Surin
Brief Impressions of the Singaporean Conjucture
Paul C. Bermanzohn
Trump: the Birth of the Hero
Jill Richardson
Trump on Cuba: If Obama Did It, It’s Bad
Olivia Alperstein
Our President’s Word Wars
REZA FIYOUZAT
Useless Idiots or Useful Collaborators?
Clark T. Scott
Parallel in Significance
Louis Proyect
Hitler and the Lone Wolf Assassin
Julian Vigo
Theresa May Can’t Win for Losing
Richard Klin
Prog Rock: Pomp and Circumstance
Charles R. Larson
Review: Malin Persson Giolito’s “Quicksand”
David Yearsley
RIP: Pomp and Circumstance
FacebookTwitterGoogle+RedditEmail