Red Pilled World

"The red pill represents embracing the painful truth of reality, and rejecting the blissful ignorance of illusion fed to us by the mainstream media."

Wednesday, July 26, 2017

Former NSA Technical Director Bill Binney confirms the DNC files were transferred by a DNC insider.

As reported previously, a recent metadata report concluded the Guccifer 2.0 DNC files were copied too fast to have been transferred over the internet. This means they must have been transferred by a DNC insider, destroying the fake 'Russian hacking' narrative pushed by the CIA and much of the mainstream media.

Respected former NSA Technical Director Bill Binney of the steering group, Veteran Intelligence Professionals for Sanity (VIPS) has confirmed the findings of this metadata study in a memorandum to President Trump.

Binney's letter to President Trump goes into detail, but perhaps the most significant quote is:

"The principles of physics don't lie."
"Someone working in the EDT time zone with a computer directly connected to the DNC server ... copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack."

The full memorandum is published below:

"Mr. President:

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on March 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justify” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12 & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack.

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.

“Obfuscation & De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review.

Putin and the Technology

We also do not know if you have discussed cyber issues in any detail with President Putin. In his interview with NBC’s Megyn Kelly, he seemed quite willing – perhaps even eager – to address issues related to the kind of cyber tools revealed in the Vault 7 disclosures, if only to indicate he has been briefed on them. Putin pointed out that today’s technology enables hacking to be “masked and camouflaged to an extent that no one can understand the origin” [of the hack] … And, vice versa, it is possible to set up any entity or any individual that everyone will think that they are the exact source of that attack.”

“Hackers may be anywhere,” he said. “There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia. Can’t you imagine such a scenario? … I can.”

Full Disclosure: Over recent decades the ethos of our intelligence profession has eroded in the public mind to the point that agenda-free analysis is deemed well nigh impossible. Thus, we add this disclaimer, which applies to everything we in VIPS say and do: We have no political agenda; our sole purpose is to spread truth around and, when necessary, hold to account our former intelligence colleagues.

We speak and write without fear or favor. Consequently, any resemblance between what we say and what presidents, politicians and pundits say is purely coincidental. The fact we find it is necessary to include that reminder speaks volumes about these highly politicized times. This is our 50th VIPS Memorandum since the afternoon of Powell’s speech at the UN. Live links to the 49 past memos can be found at https://consortiumnews.com/vips-memos/.

FOR THE STEERING GROUP, VETERAN INTELLIGENCE PROFESSIONALS FOR SANITY

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA’s Signals Intelligence Automation Research Center
Skip Folden, independent analyst, retired IBM Program Manager for Information Technology US (Associate VIPS)
Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)
Michael S. Kearns, Air Force Intelligence Officer (Ret.), Master SERE Resistance to Interrogation Instructor
John Kiriakou, Former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee
Linda Lewis, WMD preparedness policy analyst, USDA (ret.)
Lisa Ling, TSgt USAF (ret.) (associate VIPS)
Edward Loomis, Jr., former NSA Technical Director for the Office of Signals Processing
David MacMichael, National Intelligence Council (ret.)
Ray McGovern, former U.S. Army Infantry/Intelligence officer and CIA analyst
Elizabeth Murray, former Deputy National Intelligence Officer for Middle East, CIA
Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)
Cian Westmoreland, former USAF Radio Frequency Transmission Systems Technician and Unmanned Aircraft Systems whistleblower (Associate VIPS)
Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA
Sarah G. Wilton, Intelligence Officer, DIA (ret.); Commander, US Naval Reserve (ret.)
Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat"

- - - - - - - - - -

Once again, perhaps the most significant quotes from Bill Binney's letter to President Trump are:

"The principles of physics don’t lie."

"Someone working in the EDT time zone with a computer directly connected to the DNC server ... copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack."


Put simply, anyone who continues to believe that Russia was responsible for the DNC leaks is denying the laws of physics.

#DNCLeaks

No comments:

Post a Comment

Tags

Trump (29) Obama (27) Donald Trump (23) Hillary Clinton (20) Barack Obama (17) Fake news (17) President Trump (15) CNN (13) censorship (13) biased media (12) hypocrisy (12) twitter (12) Seth Rich (11) Wikileaks (11) memes (10) quotes (10) CNN is fake news (9) Democrat hypocrisy (9) James Comey (9) Obama scandal (9) #TheTrumpEffect (8) DNC leaks (8) Drain The Swamp (8) The Trump Effect (8) #DrainTheSwamp (7) Failing New York Times (7) George Orwell's 1984 (7) biased MSM (7) Bill Clinton (6) Russia (6) jobs (6) #BoycottNFL (5) Amazon (5) Crooked Hillary (5) Democrats (5) FBI (5) Facebook (5) President Trump statements (5) Travel ban (5) polls (5) speeches (5) #MAGA (4) Books (4) DNC (4) French election (4) Julian Assange (4) Kim Dotcom (4) NFL protests (4) Obamagate (4) Reddit (4) Redpilled (4) Statements (4) biased news (4) #MediaLiesAgain (3) 4D chess (3) Berkeley (3) CIA's fake Russian hacking claims (3) Democrat violence (3) Harvey Weinstein (3) Hurricane Harvey (3) Islamic terrorism (3) Leftist hypocrisy (3) MSNBC (3) Saudi Arabia (3) Seymour Hersh (3) Sweden (3) Trump effect (3) Violent left (3) Virtue signaling (3) Washington Post (3) brainwashed left (3) wiretapping (3) wiretapping scandal (3) women's rights (3) #CNNBlackmail (2) #LockHerUp (2) #TooMuchWinning (2) Alt-left (2) America (2) Berkeley protests (2) CIA (2) CNN Blackmail (2) Charity events (2) Chelsea Clinton (2) Clinton Foundation (2) Clinton corruption (2) Debbie Wasserman Schultz (2) Dishonest left (2) Emmanuel Macron (2) Employment (2) Ending human trafficking (2) Erasing history (2) Fake news by omission (2) Gay rights (2) Google (2) Google censorship (2) Goolag (2) Guccifer 2.0 (2) Hollywood (2) How to block twitter spammers (2) Humor (2) Hypocritical Left (2) Illegal immigration (2) John Brennan (2) Leaks (2) Liberal tears (2) Lock her up (2) Loretta Lynch (2) Media Lies Again (2) North Korea (2) Obama's failures (2) Obama's hypocrisy (2) Paul Farhi (2) Red pills (2) Sean Hannity (2) Socialism (2) Syria (2) Thomas Wictor (2) Voter ID (2) Washington Post is fake news (2) Who Killed Seth Rich (2) executive order (2) protests (2) redpilled dictionary (2) social media (2) tax returns (2) "Because you'd be in jail!" (1) #BoycottTwittersAdvertiser (1) #FireDepp (1) #HillaryThankYouNotes (1) #Memes (1) #ProtectTheBecks (1) #TheArtOfWar (1) #WhenWeGoHighTheyGoLow (1) 1984 (1) Abraham Lincoln (1) Al-Qaeda (1) Alexandra Mezher (1) Antifa hypocrisy (1) April Fools' Day prank (1) Associated Press (1) BBC (1) BTFO (1) Ben Swann (1) Berkeley riots (1) Bill Binney (1) Bill Clinton hypocrisy (1) Border wall (1) Boycott (1) Boycott Heineken. #BoycottHeineken (1) Carmen Yulin (1) Cesar Paz (1) Charles Schumer (1) Charlottesville (1) Cheshire Police (1) Chick-fil-A (1) China (1) Christopher A.Wray (1) Cinco De Mayo (1) Consumer Sentiment Index (1) Corrupt media (1) Crazy left (1) DNC fraud lawsuit (1) Dangerous (1) Democrat sheep (1) Dickinson (1) Doublethink (1) Dow Jones (1) Election hacking (1) Election night (1) Elizabeth Lee Beck (1) Elizabeth Warren (1) End human trafficking (1) Equality (1) Evan McMullin (1) Extremism on twitter (1) Facebook torture victim (1) Fact checking websites (1) Fakespot (1) Finland (1) Freedom Watch (1) Gab.ai (1) George Takei (1) Germany (1) Give a man a fish (1) GoFundMe (1) Gold Star Mothers and Families Day (1) Google Translate (1) Google discrimination (1) Happy Birthday President Trump (1) Heineken (1) Hillary thank you notes (1) Historical statues (1) Hungary (1) Hurricane Maria (1) Immigration (1) Intolerant liberals (1) Islam (1) JFK files (1) JK Rowling (1) Jake Tapper (1) James Mattis (1) Jared Kushner (1) Jill Stein (1) Jim Acosta (1) John Bonifield (1) John McCain (1) John Podesta (1) Johnny Depp (1) Johnny Douchebag (1) Joy Villa (1) Kellyanne Conway (1) Leaked audio (1) Liberal logic (1) London mayor (1) MOAB (1) MSNBC is fake news (1) Manafort (1) Marine Le Pen (1) Matt Gaetz (1) Media collusion (1) Meeting on the tarmac (1) Memorial Day (1) Michael Flynn (1) Michael Stürzenberger (1) Michelle Obama (1) Middle East (1) Mika Brzezsinski (1) Mike Pence (1) Milo (1) Milo Yiannopoulos (1) Misleading media (1) Misleading news (1) Mothers Day (1) Mount Rushmore (1) NBC (1) NBC is fake news (1) Nancy Pelosi (1) Nasdaq (1) National Anthem (1) National Preparedness Month (1) National debt (1) National security (1) Netflix (1) Newt Gingrich (1) Nobel Peace Prize (1) North West Trump Alliance For Change (1) Obama corruption (1) Obamacare (1) Orlando (1) Otto Warmbier (1) Pandas4Bernie (1) Patriotism (1) Paul Farhi is a fake journalist (1) Paul Krugman (1) Petitions (1) Presidential debates (1) Project Veritas (1) Protect The Becks (1) Proverbs (1) Puerto Rico (1) Qatar scandal (1) Racism of low expectations (1) Racist CNN (1) Racist liberals (1) Reality Winner (1) Redacted (1) Redpilled stories (1) Reebok (1) Reebok hypocrisy (1) Refugees (1) Richard Nixon (1) Robert Mueller (1) SJW (1) SJWs (1) Sadiq Khan (1) Scott Adams (1) Shia LaBeouf (1) Smirnoff (1) Sneaky Diane (1) Sneaky Diane Fennstein (1) Snowflakes (1) Socialism always fails (1) Spez (1) Stand with these patriotic families (1) Starbucks (1) Stephen Colbert (1) Steve Reichert (1) Stop Arming Terrorists Act (1) Supreme Court (1) Susan Rice (1) Swedenitis (1) Tesla (1) Texas (1) The Art Of War (1) The Independent (1) The Ten Cannots (1) Things every child needs to hear (1) Tim Kaine (1) Tokyo Rose recording (1) Tolerance (1) Tolerant democrats (1) Too Much Winning (1) Transparency (1) Trump campaign (1) Trump quotes (1) Trump speeches (1) Tulsi Gabbard (1) Twitter censorship (1) US economy (1) USAA (1) United Nations (1) Useful idiots (1) Verified Nobodies (1) Vinnie James (1) What Happened (1) Whistle blowers (1) White House (1) Wikipedia (1) William J. H. Boetcker (1) Yevgeniy Nikulin (1) antifa (1) campaign rallies (1) covfefe (1) ctrl-left (1) dangerous left (1) deleted emails (1) groupthink (1) gullible MSM (1) heroes (1) taqiya (1) the wall (1) trolling (1) twitter bots (1) webcam (1)