Did the Russian government interfere with the U.S. presidential election?
According to the U.S. government at various points in recent weeks, Russian agents “hacked into the communications of the Democratic National Committee, election-related computer systems in Arizona and Illinois, and the private emails of influential individuals, notably Clinton campaign chairman John Podesta — and then malignly leaked the contents onto the internet,” writes Andrew Cockburn, Washington Editor of Harper’s Magazine.
“This, according to legions of anonymous officials quoted without challenge across the media, was clearly an initiative authorized at the highest level in Moscow. To the Washington Post, the hacks and leaks were unquestionably part of a ‘broad covert Russian operation in the United States to sow public distrust in the upcoming presidential election and in U.S. political institutions.’”
Former Democratic presidential candidate Hillary Clinton made the same claim during the first presidential debate on September 26. Russian president Vladimir Putin, she said, had “let loose cyberattackers to hack into government files, to hack into personal files, hack into the Democratic National Committee. And we recently have learned that, you know, that this is one of their preferred methods of trying to wreak havoc and collect information.”
In a “closer examination of what few facts are known about the hack,” however, Cockburn found:
In early October, this assessment was endorsed by James Clapper, the director of national intelligence, and the Department of Homeland Security. Though it expressed confidence that the Russian government had engineered the D.N.C. hacks, their curiously equivocal joint statement appeared less certain as to Moscow’s role in the all-important leaks, saying only that they were “consistent with the methods and motivations of Russian-directed efforts.” As for the most serious intrusion into the democratic process — the election-system hacks — the intelligence agencies took a pass. Although many of those breaches had come from “servers operated by a Russian company,” the statement read, the United States was “not now in a position to attribute this activity to the Russian Government.”
The company in question is owned by Vladimir Fomenko, a twenty-six-year-old entrepreneur based in Siberia. In a series of indignant emails, Fomenko informed me that he merely rents out space on his servers, which are scattered throughout several countries, and that hackers have on occasion used his facilities for criminal activities “without our knowledge.” Although he has “information that undoubtedly will help the investigation,” Fomenko complained that nobody from the U.S. government had contacted him. He was upset that the FBI had “found it necessary to make a loud statement through the media” when he would have happily assisted them. Furthermore, these particular “criminals” had stiffed him $290 in rental fees.
As it happened, a self-identified solo hacker from Romania named Guccifer 2.0 had made public claim to the D.N.C. breaches early on, but this was generally written off as either wholly false or Russian disinformation. …
CrowdStrike, the cybersecurity firm that first claimed to have traced an official Russian connection — garnering plenty of free publicity in the process — asserted that two Russian intelligence agencies, the FSB and the GRU, had been working through separate well-known hacker groups, Cozy Bear and Fancy Bear. The firm contended that neither agency knew that the other was rummaging around in the D.N.C. files. Furthermore, one of the hacked and leaked documents had been modified “by a user named Felix Dzerzhinsky, a code name referring to the founder of the Soviet Secret Police.” (Dzerzhinsky founded the Cheka, the Soviet secret police and intelligence agency, in 1917.) Here was proof, according to another report on the hack, that this was a Russian intelligence operation.
“OK,” wrote Jeffrey Carr, the CEO of cybersecurity firm Taia Global, in a derisive blog post on the case. “Raise your hand if you think that a GRU or FSB officer would add Iron Felix’s name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker.” As Carr, a rare skeptic regarding the official line on the hacks, explained to me, “They’re basically saying that the Russian intelligence services are completely inept. That one hand doesn’t know what the other hand is doing, that they have no concern about using a free Russian email account or a Russian server that has already been known to be affiliated with cybercrime. This makes them sound like the Keystone Cops. Then, in the same breath, they’ll say how sophisticated Russia’s cyberwarfare capabilities are.”
In reality, Carr continued, “It’s almost impossible to confirm attribution in cyberspace.” For example, a tool developed by the Chinese to attack Google in 2009 was later reused by the so-called Equation Group against officials of the Afghan government. So the Afghans, had they investigated, might have assumed they were being hacked by the Chinese. Thanks to a leak by Edward Snowden, however, it now appears that the Equation Group was in fact the NSA. “It doesn’t take much to leave a trail of bread crumbs to whichever government you want to blame for an attack,” Carr pointed out.
William Binney — whose expertise on such matters stems from three decades of employment at the NSA, where he served as a technical director before blowing a whistle on the agency’s data-mining activities — is also skeptical of the Russian attribution. “Saying it does not make it true,” he told Cockburn. “They have to provide proof. . . . So let’s see the evidence.”
Cockburn places “the so-called Russian hacks, as promoted by interested parties in politics and industry, firmly in the tradition of Cold War threat inflation,” a distraction” that consists merely of “loudly asserting a sinister Russian connection.” The rest of his article provides a detailed summary of the machinations of the parties to this tradition from the mid-20th century to the present.
—Posted by Alexander Reed Kelly
The Fox News Prostitutes
Insane Bond, Stock, Real Estate Markets - Greg Hunter, Mike Maloney Video
Jason A Blows Your Mind: WTH Is Going On? This Is so Not Normal Yet it's Happening Nationwide! WTH (Mature Video) Jason A Mr Doom
Hold On! State of Emergency, Evacuations: Massive, Massive & Serious Storm Update Three Tornadoes on the Loose (Updated Massive Storm Video)
The Final Word on Alex Jones
Terrifying Warning for Americans
Operation Gotham Shield Update and the "Media Blackout" (Video)
Here's a Very Difficult Video to Watch - But Watch You Must - The Liberal Cancer of America
Serious Combat Readiness: Russia Puts Air Defense on High Alert (Video)
The Relentless Push Towards War: This Time with North Korea. Why?
Why Does Jared Kushner Look Like He Is Getting Ready to Play the Role of the Biblical Antichrist?
Staged ISIS Bombing Video. If This Doesn't Wake You Up, Nothing Will.
Major Leak at Oroville Damn Detected
Russian Military Ship Sinks After Collision
Huge Superstorm Forms Over US. Geoengineering?
Hackers Exploited Word Flaw for Months While Microsoft Investigated
Freemasons Won’t Tell You That They Worship Lucifer As The ‘Light Bearer Of The World’
Pastor Steve Cioccolanti Explains Sheol [Hell] and Seoul from the Israeli Bible
Willie Nelson Halts Concert in Texas – Country Legend was ‘Disoriented’
Israel Bombs Road To Damascus..Airport
'Shocking Footage' of Something You Have to See! (2017-2018) Jason A.
British Police Making Terror Arrests on ‘Near Daily Basis’ as Expert Estimates 10,000 UK Jihadis
Alien (1979) – The Deeper Meaning You Missed – Jay Dyer
U.S. Bumblebee Gets Federal Protection … Finally
The Bullpen Report: Why Cishek Could Be Worth Stashing, Eyeing J. Wilson & More
9 Health Benefits of Walking Barefoot and Connecting With the Earth
EPA and Energy Star Teamed to Ban Real Energy Saving Technology
American Politics Reflects Communist Rivalries
Cop Blocker Arrested for Crossing Street at DUI Checkpoint in Manchester (Video)
The Spiritual Lover of the Inner Silence