Aletho News

ΑΛΗΘΩΣ

Pelosi & husband invest up to $1 million in CrowdStrike, tech firm that launched Russiagate – report

RT | October 10, 2020

Newly-filed financial disclosures show House Speaker Nancy Pelosi and her husband have invested up to $1 million in CrowdStrike, American cybersecurity technology company and the originator of ‘Russian hacking’ claims.

Financial disclosures show Pelosi (D-California) and her husband Paul buying CrowdStrike shares on September 3, according to a RealClearInvestigations report by journalist Aaron Mate. Since then, the stock went from $129.25 a share to $142.97.

Reached for comment, Pelosi’s spokesman Drew Hammill insisted she was “not involved” in her husband’s investments and “not aware of the investment until the required filing was made.” Pelosi invests in publicly traded companies all the time and “fully complies with House Rules and the relevant statutory requirements,” Hammill added.

CrowdStrike seems like a lucrative investment prospect, according to Mate’s report. The company’s valuation went from $1 billion in 2017 to $6.7 billion in 2019, when they went public – and then almost doubled to $11.4 billion. Its revenue rose from $52.75 million in 2017 to $481.41 million in 2020, Mate reports.

The company was hired by the DNC to address the breach of its email system in 2016. It blamed “Russia” for the alleged hack, but never provided the actual servers to the FBI, offering instead images and redacted reports.

CrowdStrike President Shawn Henry testified to the House Intelligence Committee in December 2017 that the company never had “concrete evidence” the data was actually “exfiltrated” from the servers. Instead, he said, they “saw activity that we believed was consistent with activity we’d seen previously and had associated with the Russian Government.”

This testimony was kept classified until May this year, when it was released to the public under pressure from Acting Director of National Intelligence Richard Grenell. In the intervening years, the claim that ‘Russia hacked the DNC’ became an article of faith in Washington, underlying the investigation into President Donald Trump’s “collusion” with the Kremlin led by Robert Mueller.

Prior to joining CrowdStrike, Henry worked under Mueller at the FBI. The company’s co-founder and chief technology officer, Dmitry Alperovitch, used to be a senior fellow at the Atlantic Council, the pro-NATO think tank which thrives on hostility towards Russia.

In addition to feeding the Russiagate frenzy and profiting from it, CrowdStrike also donated to Democrats – about $100,000 to the Democratic Governors Association in 2016 and 2017, according to Mate.

October 10, 2020 Posted by | Corruption, Deception | , | Leave a comment

Six big lies you have been told about ‘Russiagate’

By Nebojsa Malic | RT | May 12, 2020

Russian ‘meddling’ in the 2016 US presidential election has become an article of faith, not just among Democrats but many Republicans as well, thanks to the endless repetition of vague talking points, none of which hold water.

It all began with the Democratic National Committee (DNC) claiming in June 2016 that Russia hacked their computers, after documents were published revealing the party’s rigging of the primaries. This was followed by Hillary Clinton accusing her rival for the presidency Donald Trump that he was “colluding” with Russia by asking Moscow for her emails – the ones she deleted from a private server she used to conduct State Department business, that is.

With a little help of the mainstream media, which overwhelmingly endorsed Clinton and predicted her victory, her efforts to cover up her email scandal turned into Russia “hacking our democracy,” eventually spawning the ‘Russiagate’ investigation led by Special Counsel Robert Mueller and a series of failed attempts to derail Trump’s election and oust him from the White House.

Lie #1: Russia hacked the DNC 

The infamous US intelligence community assessment (ICA) of January 2017, and the Senate Intelligence Committee report based on it – as well as ‘analysis’ by actual election meddlers, among others – all claimed that the Russian government and President Vladimir Putin personally were behind the “hack” and publication of DNC documents. These have always been assertions, and no evidence was ever provided.

Last week’s declassification of 50+ interviews in the probe conducted by the House Intelligence Committee revealed that the cybersecurity firm CrowdStrike, brought in by the DNC lawyers to fix the “hack,” did not have evidence either.

CrowdStrike’s president, ex-FBI official Shawn Henry, testified that they “saw activity that we believed was consistent with activity we’d seen previously and had associated with the Russian Government.” [emphasis added]

In the same testimony, Henry also testified that CrowdStrike never had any evidence the data was actually “exfiltrated,” i.e. stolen from the DNC servers.

CrowdStrike’s feelings about the hack remain the only “evidence” so far, since the FBI never asked them or the DNC for the actual server, as Henry also confirmed. Meanwhile, former NSA official and whistleblower William Binney argued back in November 2017 that actual evidence showed a leak from the inside, not a hack.

Lie #2: Russia hacked Podesta’s emails and published them in collusion with WikiLeaks

There is likewise zero proof that the Russian government had anything to do with the private email account of John Podesta, Clinton’s campaign chair, which a staffer admitted had been compromised when someone fell for a phishing scam.

Instead, the key argument that WikiLeaks was somehow ‘colluding’ with Russia over the publication of the emails rests on a conspiracy theory promoted by the Clinton campaign staff, after RT reported on a fresh batch of emails before WikiLeaks got around to tweeting about them – but after they were published on the website and available to anyone willing to do actual journalism.

In fact, the existence of RT has been a major “argument” of Russiagaters; a third of the ICA intended to show ‘Russian meddling’ consisted of a four-year-old appendix about RT that was in no way relevant to the 2016 situation but lamented its coverage of fracking and ‘Occupy Wall Street’ protests, for example.

Lie #3: The Steele ‘pee tape’ dossier was irrelevant

As it later emerged, Clinton’s claims about ‘Russian collusion’ were based on a dodgy dossier her campaign commissioned through the DNC and a firm called Fusion GPS from a British spy named Christopher Steele. It said that the Kremlin was blackmailing Trump with a tape of depraved sex acts in a Moscow hotel, with prostitutes supposedly paid to urinate on a bed President Barack Obama had slept on.

It was clearly ridiculous and entirely evidence-free. Democrats claimed it played no role in Russia investigations. Yet the FBI paid Steele for information from the dossier, and used it to justify a FISA warrant for the surveillance of Trump campaign aide Carter Page – and with him the campaign itself – starting right before the election, and renewed three times.

By January 2020, the DOJ had formally disavowed the dossier and all four FISA warrants, along with any information obtained from them, saying “there was insufficient predication to establish probable cause.”

Lie #4: General Michael Flynn treasonously colluded with Russia and lied about it to the FBI

Trump’s first national security adviser was hounded out of the White House after less than two weeks on the job, after media leaks insinuated he had improperly discussed sanctions with Russian ambassador Sergey Kislyak, violating the Logan Act, and then lied to the FBI about it.

After FBI Director James Comey was fired by Trump in May 2017, he told the media the president had urged him to drop the investigation of Flynn, which was quickly construed as “obstruction” and used as one of the pretexts to appoint Robert Mueller as special counsel into ‘Russiagate.’

When actual evidence was finally coaxed out of prosecutors, however, it showed that the FBI sought to frame Flynn in a perjury trap, and that the people involved were Comey himself, his deputy Andrew McCabe, disgraced lovers Peter Strzok and Lisa Page, and others. All charges against Flynn were dropped.

Flynn didn’t even lie to Strzok and the other agent interviewing him – and the memo of that conversation had been first heavily edited, then destroyed. Basically, everything about the Flynn case has been as false as ABC’s December 2017 bombshell report about his “collusion” with Russia that got Brian Ross fired.

Lie #5: Mueller found collusion, or at least Russian meddling

When Mueller’s final report came out, in the spring of 2019, it found zero evidence of “collusion” but insisted there had been Russian “meddling” in the election. The only trouble was that he had no proof of meddling, basing it entirely on the above-mentioned intelligence “assessments” and his own indictments.

A Russian company named in one of the indictments actually contested it in US court and won. First, a federal judge slapped down Mueller’s prosecutors for violating rules by presenting allegations as “established” and “confirmed” facts and ruling that no link was actually established behind a catering company accused of “sowing discord” on social media – a far cry from hacking the DNC! – and the Russian government.

The DOJ quietly dropped that particular case in March, just as coronavirus shutdowns were starting across the US, using “recent events” and a change in classification of some of its evidence as a face-saving excuse.

Lie #6: Paul Manafort was Trump’s conduit to Russia

Paul Manafort, who ran Trump’s campaign between March and August 2016, was convicted of multiple counts of conspiracy against the US and sentenced to a lengthy prison term. However, despite repeated attempts by the media to present him as some kind of liaison between Trump and Russia, the entirety of things that got him in trouble with the law had to do with tax evasion on money he made lobbying for and in… Ukraine.

During the two trials against Manafort, it emerged that he and his business partner Rick Gates had worked with Podesta’s brother Tony to fleece Ukrainian oligarchs for years, and stash the profits in tax havens.

The Ukrainian officials who leaked the so-called “black ledger” implicating Manafort to the US media were even convicted of election meddling by a court in Kiev, and the whole thing may have been solicited by a Ukrainian-American DNC contractor… The US media have been curiously uninterested in that particular “collusion,” needless to say.

Peel back all these layers of misinformation, like an onion, and what’s left is an empty talking point, endlessly repeated by Democrats like Adam Schiff (D-California), that “Russia hacked our democracy.”

The charge is vague enough that it can mean anything, and deliberately so. No evidence is ever offered, because there isn’t any – as the years of investigations and boxes full of documents have clearly shown.

May 12, 2020 Posted by | Civil Liberties, Deception, Russophobia | , , | 2 Comments

Crowdstrike admits ‘no evidence’ Russia stole emails from DNC server

Pushback with Aaron Maté | May 11, 2020

Crowdstrike, the firm that accused Russia of stealing DNC emails in 2016, has made a bombshell admission. In newly released Congressional testimony, Crowdstrike president Shawn Henry said that “we did not have concrete evidence” that alleged Russian hackers actually took the emails from DNC servers. “There’s circumstantial evidence, but no evidence that they were actually exfiltrated,” Henry said.

Aaron Maté breaks down Henry’s testimony and why it adds new doubt about the core allegation at the heart of Russiagate.

May 12, 2020 Posted by | Deception, Russophobia, Video | , , | Leave a comment

WHY IS CROWDSTRIKE CONFUSED ON ELEVEN KEY DETAILS ABOUT THE DNC HACK?

By Larry C Johnson | Sic Semper Tyrannis | March 17, 2020

Here is the bottom-line—despite being hired in late April (or early May) of 2016 to stop an unauthorized intrusion into the DNC, CrowdStrike, the cyber firm hired by the DNC’s law firm to solve the problem, failed abysmally. More than 30,000 emails were taken from the DNC server between 22 and 25 May 2016 and given to Wikileaks. Crowdstrike blamed Russia for the intrusion but claimed that only two files were taken. And CrowdStrike inexplicably waited until 10 June 2016 to reboot the DNC network.

CrowdStrike, a cyber-security company hired by a Perkins Coie lawyer retained by the DNC, provided the narrative to the American public of the alledged hack of the DNC, But the Crowdstrike explanation is inconsistent, contradictory and implausible. Despite glaring oddities in the CrowdStrike account of that event, CrowdStrike subsequently traded on its fame in the investigation of the so-called Russian hack of the DNC and became a publicly traded company. Was CrowdStrike’s fame for “discovering” the alleged Russian hack of the DNC a critical factor in its subsequent launch as a publicly traded company?

The Crowdstrike account of the hack is very flawed. There are 11 contradictions, inconsistencies or oddities in the public narrative about CrowdStrike’s role in uncovering and allegedly mitigating a Russian intrusion (note–the underlying facts for these conclusions are found in Ellen Nakashima’s Washington Post story, Vicki Ward’s Esquire story, the Mueller Report and the blog of Crowdstrike founder Dmitri Alperovitch):

  1. Two different dates—30 April or 6 May—are reported by Nakashima and Ward respectively as the date CrowdStrike was hired to investigate an intrusion into the DNC computer network.
  2. There are on the record contradictions about who hired Crowdstrike. Nakashima reports that the DNC called Michael Sussman of the law firm, Perkins Coie, who in turn contacted Crowdtrike’s CEO Shawn Henry. Crowdstrike founder Dmitri Alperovitch tells Nakashima a different story, stating our “Incident Response group, was called by the Democratic National Committee (DNC).
  3. CrowdStrike claims it discovered within 24 hours the “Russians” were responsible for the “intrusion” into the DNC network.
  4. CrowdStrike’s installation of Falcon (its proprietary software to stop breaches) on the DNC on the 1st of May or the 6th of May would have alerted to intruders that they had been detected.
  5. CrowdStrike officials told the Washington Post’s Ellen Nakashima that they were, “not sure how the hackers got in” and didn’t “have hard evidence.”
  6. In a blog posting by CrowdStrike’s founder, Dmitri Alperovitch, on the same day that Nakashima’s article was published in the Washington Post, wrote that the intrusion into the DNC was done by two separate Russian intelligence organizations using malware identified as Fancy Bear (APT28) and Cozy Bear (APT29).
  7. But, Alperovitch admits his team found no evidence the two Russian organizations were coordinating their “attack” or even knew of each other’s presence on the DNC network.
  8. There is great confusion over what the “hackers” obtained. DNC sources claim the hackers gained access to the entire database of opposition research on GOP presidential candidate Donald Trump. DNC sources and CrowdStrike claimed the intruders, “read all email and chat traffic.” Yet, DNC officials insisted, “that no financial, donor or personal information appears to have been accessed or taken.” However, CrowdStrike states, “The hackers stole two files.”
  9. Crowdstrike’s Alperovitch, in his blog posting, does not specify whether it was Cozy Bear or Fancy Bear that took the files.
  10. Wikileaks published DNC emails in July 2016 that show the last message taken from the DNC was dated 25 May 2016. This was much more than “two files.”
  11. CrowdStrike, in complete disregard to basic security practice when confronted with an intrusion, waited five weeks to disconnect the DNC computers from the network and sanitize them.

Let us start with the very contradictory public accounts attributed to Crowdstrke’s founder, Dmitri Alperovitch. The 14 June 2016 story by Ellen Nakashima of the Washington Post and the October 2016 piece by Vicki Ward in Esquire magazine offer two different dates for the start of the investigation:

When did the DNC learn of the “intrusion”?

Ellen Nakashima claims it was the end of April:

DNC leaders were tipped to the hack in late April. Chief executive Amy Dacey got a call from her operations chief saying that their information technology team had noticed some unusual network activity. . . . That evening, she spoke with Michael Sussmann, a DNC lawyer who is a partner with Perkins Coie in Washington. Soon after, Sussmann, a former federal prosecutor who handled computer crime cases, called Henry, whom he has known for many years. Within 24 hours, CrowdStrike had installed software on the DNC’s computers so that it could analyze data that could indicate who had gained access, when and how.

Ward’s timeline, citing Alperovitch, reports the alert came later, on 6 May 2016:

At six o’clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. . . . late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon “lit up,” the email said, within ten seconds of being installed at the DNC: Russia was in the network.

This is a significant and troubling discrepancy because it marks the point in time when CrowdStrike installed its Falcon software on the DNC server. It is one thing to confuse the 30th of April with the 1st of May. But Alperovitch gave two different reporters two different dates.

What did the “hackers” take from the DNC?

Ellen Nakashima’s reporting is contradictory and wrong. Initially, she is told that the hackers got access to the entire Donald Trump database and that all emails and chats could be read. But then she is assured that only two files were taken. This was based on Crowdstrike’s CEO’s assurance, which was proven subsequently to be spectacularly wrong when Wikileaks published 35,813 DNC emails. How did Crowdstrike miss that critical detail? Here is Nakashima’s reporting:

Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.

The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts. . . .

The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

One group, which CrowdStrike had dubbed Cozy Bear, had gained access last summer (2015) and was monitoring the DNC’s email and chat communications, Alperovitch said.

The other, which the firm had named Fancy Bear, broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files, Henry said. And they had access to the computers of the entire research staff — an average of about several dozen on any given day. . . .

CrowdStrike is continuing the forensic investigation, said Sussmann, the DNC lawyer. “But at this time, it appears that no financial information or sensitive employee, donor or voter information was accessed by the Russian attackers,” he said.

The DNC emails that are posted on the Wikileaks website and the metadata shows that these emails were removed from the DNC server starting the late on the 22nd of May and continuing thru the 23rd of May. The last tranche occurred late in the morning (Washington, DC time) of the 25th of May 2016. Crowdstrike’s CEO, Shawn Henry, insisted on the 14th of June 2016 that “ONLY TWO FILES” had been taken. This is demonstrably not true. Besides the failure of Crowdstrike to detect the removal of more than 35,000 emails, there is another important and unanswered question—why did Crowdstrike wait until the 10th of June 2016 to start disconnecting the DNC server when they allegedly knew on the 6th of May that the Russians had entered the DNC network?

Crowdstrike accused Russia of the DNC breach but lacked concrete proof.

Ellen Nakashima’s report reveals that Crowdstrike relied exclusively on circumstantial evidence for its claim that the Russian Government hacked the DNC server. According to Nakashima:

CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with “spearphishing” emails. These are communications that appear legitimate — often made to look like they came from a colleague or someone trusted — but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. “But we don’t have hard evidence,” Alperovitch said.

There is a word in English for the phrases, “Not sure” and “No hard evidence”–that word is, “assumption.” Assuming that the Russians did it is not the same as proving, based on evidence, that the Russians were culpable. But that is exactly what CrowdStrike did.

The so-called “proof” of the Russian intrusions is the presence of Fancy Bear and Cozy Bear?

At first glance, Dmitri Alperovitch’s blog posting describing the Fancy Bear and Cozy Bear “intrusions” appears quite substantive. But cyber security professionals quickly identified a variety of shortcomings with the Alperovitch account. For example, this malware is not unique nor proprietary to Russia. Other countries and hackers have access to APT28 and have used it.

Skip Folden offers one of the best comprehensive analyses of the problems with the Alperovitch explanation:

No basis whatsoever:

APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as ‘proof’ of Russia ‘hacking’ by Russian Intelligence agencies GRU and FSB respectively.

There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.

On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only “medium-level of confidence that Fancy Bear is GRU” and “low-level of confidence that Cozy Bear is FSB.” These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) / 2].

Exclusivity:

None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student – or prosecutor.

Using targets:

Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, “Both groups have historically targeted …,” is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.

Key Logger Consideration:

On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates / times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.

The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.

Foreign intelligence source:

Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence / custody validity at Russian site.

Stated simply, Dmitri Alperovitch’s conclusion that “the Russians did it” are not supported by the forensic evidence. Instead, he relies on the assumption that the presence of APT28 and APT29 prove Moscow’s covert hand. What is even more striking is that the FBI accepted this explanation without demanding forensic evidence.

Former FBI Director James Comey and former NSA Director Mike Rogers testified under oath before Congress that neither agency ever received access to the DNC server. All information the FBI used in its investigation was supplied by CrowdStrike. The Hill reported:

The FBI requested direct access to the Democratic National Committee’s (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.

The bureau made “multiple requests at different levels,” according to Comey, but ultimately struck an agreement with the DNC that a “highly respected private company” would get access and share what it found with investigators.

The foregoing facts raise major questions about the validity of the Crowdstrike methodology and conclusions with respect to what happened on the DNC network. This is not a conspiracy theory. It is a set of facts that, as of today, have no satisfactory explanation. The American public deserve answers.

March 18, 2020 Posted by | Deception, Russophobia | , , , | Leave a comment

Did John Brennan’s CIA Create Guccifer 2.0 and DCLeaks?

By Larry C Johnson | Sic Semper Tyrannis | December 20, 2019

Special Counsel Robert Mueller’s report insists that Guccifer 2.0 and DCLeaks were created by Russia’s military intelligence organization, the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks were created by Brennan’s CIA and this action by the CIA should be a target of U.S. Attorney John Durham’s investigation. Let me explain why.

Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence community contributed to and coordinated on the ICA–the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following explanation about methodology:

When Intelligence Community analysts use words such as “we assess” or “we judge,” they are conveying an analytic assessment or judgment

To be clear, the phrase,“We assess”, is intel community jargon for “opinion”. If there was actual evidence or source material for a judgment the writer of the assessment would state, “According to a reliable source” or “knowledgeable source” or “documentary evidence.”

Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

    • Guccifer 2.0, who claimed to be an independent Romanian hacker, made multiple contradictory statements and false claims about his likely Russian identity throughout the election. Press reporting suggests more than one person claiming to be Guccifer 2.0 interacted with journalists.
    • Content that we assess was taken from e-mail accounts targeted by the GRU in March 2016 appeared on DCLeaks.com starting in June.

We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks. Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries.

Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU–Guccifer 2.0 persona and DCLeaks.com.

Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan.Here’s Mueller’s take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):

DCLeaks

“The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.

Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the“Clinton Campaign and prior political jobs, and fundraising files and information.140

GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141 The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142

GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account dcleaksproject@gmail.com to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144

The dcleaks.com website remained operational and public until March 2017.”

Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as “Fancy Bear”) were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including “some hundred sheets,” “illuminati,” and “worldwide known.” Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146

That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks.

The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election.

Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide “exclusive access to some leaked emails linked [to] Hillary Clinton’s staff.”148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 “That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate’s opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153”

Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What is not true is that these entities were GRU assets.

In October 2015 John Brennan reorganized the CIA. As part of that reorganization he created a new directorate–DIRECTORATE OF DIGITAL INNOVATION. Its mission was to “manipulate digital footprints.” In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.

We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents:

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States’ Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency’s software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple’s iOS and Google’s Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6

One of the tools in Vault 7 carries the innocuous name, MARBLE. Hackernews explains the purpose and function of MARBLE:

Dubbed “Marble,” the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
The CIA’s Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA,” says the whistleblowing site.

“… for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains.

So guess what gullible techies “discovered” in mid-June 2016? The meta data in the Guccifer 2.0 communications had “Russian fingerprints.”

We still don’t know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0—the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it—left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country’s lost Soviet era.

Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name “Феликс Эдмундович.” That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, “Феликс Эдмундович” is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)

Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are not clowns. This was a clumsy attempt to frame the Russians.

Why would the CIA do this? The CIA knew that Podesta’s emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.

The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.

It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC “hack.”

Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:

  1. It was 29 April 2016, when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
  2. According to CrowdStrike founder, Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    • Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike’s experts believed was affiliated with the FSB, Russia’s answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016–CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire’s Vicky Ward that: ‘Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office.”
  5. On June 14, 2016, Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC—Crowdstrike–, wrote:
    • Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    • The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    • The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016, an internet “personality” self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. The people/entity behind Guccifer 2.0:
  • Used a Russian VPN service provider to conceal their identity.
  • Created an email account with AOL.fr (a service that exposes the sender’s IP address) and contacted the press (exposing his VPN IP address in the process).
  • Contacted various media outlets through this set up and claimed credit for hacking the DNC, sharing copies of files purportedly from the hack (one of which had Russian error messages embedded in them) with reporters from Gawker, The Smoking Gun and other outlets.
  • Carried out searches for terms that were mostly in English, several of which would appear in Guccifer 2.0’s first blog post. They chose to do this via a server based in Moscow. (this is from the indictment,
    “On or about June 15, 2016, the Conspirators logged into a Moscow-based server used and managed by Unit 74455”)
  • Created a blog and made an initial blog post claiming to have hacked the DNC, providing links to various documents as proof.
  • Carelessly dropped a “Russian Smiley” into his first blog post.
  • Managed to add the name “Феликс Эдмундович” (which translates to Felix Dzerzhinsky, also known as “Iron Felix”) to the metadata of several documents. (Several sources went beyond what the evidence shows and made claims about Guccifer 2.0 using a Russian keyboard, however, these claims are just assumptions made in response to the presence of cyrillic characters.)

The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the New York Times and Washington Post. But the “forensic” fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable event.

Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction.

It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or Guccifer 2.0 try to contact Assange.

The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham’s team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into  as a potential act of “Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU.

December 21, 2019 Posted by | Deception, Russophobia | , , , , | Leave a comment

Cyber sleuths responsible for Russiagate now warn of ‘Iranian hackers’

RT | June 21, 2019

Iranian hackers are threatening US computer systems, cybersecurity firms FireEye and CrowdStrike claimed just as tensions between Washington and Tehran pulled back from the brink of war.

“Really, we’re seeing increased cyber activity that seems to be focused on the West,” Adam Meyers, vice president of Intelligence at CrowdStrike, told Politico. “In early June, mid-June is when it really started to kick off.”

Ben Read, senior cyber-espionage analyst at FireEye, confirmed the timeline and told the paper that the latest campaign is led by a government-connected Iranian hacker group known as APT33 or “Refined Kitten.”

Wired magazine carried a story on Thursday also alleging Iranian attacks, based on information from CrowdStrike and another firm, Dragos – this time targeting the US Department of Energy with phishing emails pretending to come from the White House Council of Economic Advisers.

“The Department of Energy is aware of the reports of APT33 activity and for security reasons we do not comment on current cyber activity directed at the Department’s networks,” the agency said in a statement.

CrowdStrike is the contractor that accused Russia of hacking the Democratic National Committee in 2016. Federal investigators just took their word for it, never actually examining the DNC computers.

FireEye also accused Russia of trying to hack Democrats, this time during the 2018 midterms. The firm also picked Hillary Clinton – of the private email server in attic fame – as the keynote speaker at their upcoming cybersecurity conference in October.

Allegations of Iranian cyber-warfare came as almost everyone in Washington expected some form of US military action against Tehran following the shooting down of a US spy drone over the Strait of Hormuz on Thursday.

A shooting war seemed to have been avoided in the nick of time, however, with President Trump saying on Friday that he changed his mind about a “disproportionate” response just minutes before the operation was underway.

June 21, 2019 Posted by | Deception, Fake News, Mainstream Media, Warmongering | , , | Leave a comment

DNC Emails–A Seth Attack Not a Russian Hack

Publius Tacitus | October 23, 2018

If Russia had actually “hacked” the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the “theft” and to portray Donald Trump as Putin’s lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich “dropped boxed” the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.

If Seth Rich was just a normal kid in the wrong place at the wrong time, his murder and untimely death would only have been a minor blip in the news cycle. Blip or not, it was a terrible loss for his family and friends. But Seth was not an ordinary kid. He worked for the Democratic National Committee aka the DNC and described himself as an “experienced and impassioned data analyst” keen on making the world a better place.Rich met a sudden and brutal end in a neighborhood near the U.S. Capitol in Washingtion, DC in the early hours of July 10, 2016. The initial report about the murder did not raise any political antanae in the United States. The CNN reporting of the murder was representative of the coverage at the time:

A Democratic National Committee employee died this weekend after he was shot in Northwest Washington.

Seth Rich, 27, suffered multiple gunshot wounds early Sunday morning in Washington’s Bloomingdale neighborhood, according to law enforcement officials.

D.C. police said officers who had been patrolling the area responded to the sound of shots fired, ultimately finding Rich at the scene both “conscious and breathing.” He was then transported to an area hospital, where police said he “succumbed to his injuries and was pronounced dead.”

Rich worked as voter expansion data director for the DNC since 2014, the DNC confirmed. A 2011 graduate of Creighton University, Rich’s resume is filled with various jobs in Democratic politics and political consulting.

But the circumstances and facts surrounding the murder were strange. Seth was shot in the back. Nothing was taken from his body—not his watch, not his wallet and not his credit cards. There was no obvious answer to the questions—who shot Seth and why?

The interest in Seth’s death took a dramatic turn when Wikileaks dumped the contents of DNC emails on its website on July 22, 2016. In order to put the Wikileaks theory regarding Seth’s death in proper perspective, we must review events in the prior months connected to the Hillary Clinton and DNC email controversies.

Seth Rich will go down in history, fairly or unfairly, linked to the debate surrounding Hillary Clinton’s missing and/or classified emails. During her time as Secretary of State, Hillary used a private server and sent thousands of messages over that server. This included emails containing Top Secret material.

In May 2016, the State Department Inspector General added further fuel to the controversy by concluding that Hillary had violated State Department protocols and policies:

The Inspector General was unable to find evidence that Clinton had ever sought approval from the State Department staff for her use of a private email server, determining that if Clinton had sought approval, Department staff would have declined her setup because of the “security risks in doing so.”[54] Aside from security risks, the report stated that “she did not comply with the Department’s policies that were implemented in accordance with the Federal Records Act.”[57]

Public interest in Hillary’s emails grew on June 12, 2016 when Wikileaks founder, Julian Assange, stated during an ITV interview that his outfit had more Hillary emails:

“We have upcoming leaks in relation to Hillary Clinton … We have emails pending publication, that is correct,” Assange said.

Two days later (June 14) came news that the DNC computers had been “hacked” by the Russians. Ellen Nakamura, a Washington Post reporter who had been briefed by a computer security company hired by the DNC—Crowdstrike–, wrote:

Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.

The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts.

The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.

The Nakamura piece marked the first salvo in the Russian hacking meme. But the claim was not backed up by independently verified forensic evidence—it rested solely on the conclusions of a computer security company—Crowdstrike. The pro-Ukrainian politics of Crowdstrike’s founder, Dmitri Alperovitch, and his strident opposition to Russia cast a pall of bias over the findings of Crowdstrike. No U.S. Federal Law Enforcement official or agency was given access to the DNC servers. Neither the FBI nor Homeland Security were permitted to examine the servers and the alleged evidence of a hack.

Crowdstrike revealed that not one but two groups of hackers believed to be based in Russia had done just that. The intruders, according to Crowdstrike and the DNC officials who spoke to the Washington Post, fully accessed the campaign organization’s emails and chats, and stole opposition research on Republican presidential front-runner Donald Trump. . . .

In a blog post detailing the attack, Crowdstrike pointed to two groups of known Russian government-aligned hackers, one dubbed Cozy Bear and another called Fancy Bear. According to Crowdstrike, the two teams seemingly worked independently, either unaware of each others’ existence or even vying for dominance within the strange, internally competitive intelligence apparatus of Vladimir Putin’s regime.

The most bizarre aspect of Crowdstrike’s claim is that it started its “investigation” of the so-called hacking on the 7thof May and supposedly immediately discovered it was “the Russians.” Yet Crowdstrike waited more than a month to do what should have been done on 7 May—shutdown the network. Vicky Ward reported in Esquire on 24 October 2016 that Crowdstrike waited until June 10 to take steps to protect the DNC network:

Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office.

For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.

This was a classic case of closing the barn door after the horse had escaped. Crowdstrike started work in early May 2016 but failed to prevent the DNC emails from making their way to Wikileaks. The DNC emails that were released on July 22, 2016 by Wikileaks covered the period from January 2015 thru 25 May 2016. Crowdstrike started work on 7 May at the DNC. If this was truly a hack from an outside computer network then it should have been impossible for any outsider to electronically hack the DNC network. But the information on the DNC network was taken around the close of business on the 25thof May.

The day after Ellen Nakamura reported that the Russians had hacked the DNC, Guccifer 2.0 surfaced and took credit for the hack. Guccifer 2.0 made a point of specifically denying that he was Russian in an interview with Motherboard:

“I don’t like Russians and their foreign policy. I hate being attributed to Russia,” he said, adding that he was from Romania, just like the first Guccifer.

Guccifer 2.0 said he hacked into the DNC in the summer of 2015. He claimed that he used an unknown vulnerability in NGP VAN, which is a software provider for the DNC, to hack into the DNC servers, which have a Windows architecture. (There’s no evidence whatsoever that the hacker really broke through via NGP VAN.)

“Then I installed my Trojans on several PCs. I had to go from one PC to another every week so CrowdStrike couldn’t catch me for a long time,” he said. “I know that they have cool intrusion detection system. But my heuristic algorithms are better.”

Guccifer’s claim to be something other than Russian immediately was derided by those invested in the blame Russia meme. Motherboard, for example, published a piece on June 16 labeling Guccifer 2.0 as a Russian front, but that conclusion was based solely on circumstantial, stylistic evidence:

. . . considering a long trail of breadcrumbs pointing back to Russia left by the hacker, as well as other circumstantial evidence, it appears more likely that Guccifer 2.0 is nothing but a disinformation or deception campaign by Russian state-sponsored hackers to cover up their own hack—and a hasty and sloppy one at that.

Guccifer 2.0 surfaced again the end of June with more documents:

On June 30, Guccifer 2.0 posted additional documents from the Democratic National Committee’s servers on the WordPress blog. The post again denied Russian links, and spoke admiringly of Julian Assange, the founder of WikiLeaks; Edward J. Snowden, the former intelligence analyst who leaked archives of surveillance documents; and Chelsea Manning, the Army private who sent a huge trove of military and diplomatic documents to WikiLeaks in 2010.

Guccifer 2.0 faded into the woodwork when Wikileaks released the DNC emails on the 22 of July. Although Wikileaks protected the source of the DNC material, Julian Assange insisted that Russia had anything to do with putting the DNC trove into his hands.

Following the Wikileaks dump, Donald Trump made news on the campaign trail by sarcastically calling on the Russians to provided Hillary’s missing 30,000 emails:

“Russia, if you’re listening, I hope you’ll be able to find the 30,000 emails that are missing,” he said, referring to deleted emails from the private account Hillary Clinton used as secretary of State. “I think you’ll probably be rewarded mightily by our press.”. . .

“If Russia or China or any other country has those emails, I’ve got to be honest with you. I’d love to see them,” he said later, declining to back down.

Experts suspect that Russian agents  are behind the hack and release of Democratic officials’ emails last week that showed officials discussing ways to undermine Bernie Sanders’ primary campaign against Clinton.

Trump often has praised Putin and has claimed to have met him, but on Wednesday, he denied that they have met. He also denied multiple media reports that he is in debt to Russian lenders.

Trump clearly was joking. He was riffing on the fact that the DNC emails had been published on Wikileaks and that Russia was being blamed. But the Democrats, never known for their keen sense of humor, seized on this moment as an opportunity to introduce the meme that Trump and Russia were collaborating to stop Hillary’s quest for the Presidency. The Hillary team understood the fundamentals of good drama–i.e., a solid story needs a good villain. Donald and Vladimir Putin became the villains of this tale:

Hillary Clinton . . . accused Russian intelligence services of hacking into the Democratic National Committee computers and she said her Republican rival Donald Trump has shown support for Russian president Vladimir Putin.

“We know that Russian intelligence services hacked into the DNC and we know that they arranged for a lot of those emails to be released and we know that Donald Trump has shown a very troubling willingness to back up Putin, to support Putin,” Ms Clinton said in an interview with Fox News, as reported by Reuters.

US officials and cyber security experts have previously said they believed Russia had something to do with the release of the emails in order to influence the election.

In reviewing the media coverage of the DNC “hack” during June and July the name of Seth Rich does not surface even as a minor concern. This all changed on August 9, 2016 when Wikileak’s Julian Assange announced via Twitter “a $20,000 reward for information leading to a conviction in Rich’s killing on July 10 in the 2100 block of Flagler Place NW.” Assange subsequently discussed the murder of Seth Rich during an interview with Dutch TV:

WikiLeaks editor Julian Assange suggested that the Democratic National Committee staffer shot dead last month in Washington, DC, was killed because he was a “source.”

“Whistleblowers go to significant efforts to get us material and often very significant risks. As a 27-year-old, works for the DNC, was shot in the back, murdered just a few weeks ago for unknown reasons as he was walking down the street in Washington,” he told Dutch TV, referring to Seth Rich, who was gunned down in the early morning hours of July 10 while walking to his apartment in Bloomingdale.

The interviewer followed up by asking, “That was just a robbery, I believe. Wasn’t it?”

The WikiLeaks founder cryptically replied, “No, there’s no finding … I’m suggesting that our sources take risks.”

Rather than address the substance and facts of what Wikileaks and Assange were saying and doing with respect to Seth Rich, most of the media concentrated on dismissing the Seth Rich story as a crazed conspiracy theory.

The only media outlet that tried to tell this story–Fox News–soon found itself in a media and legal maelstrom. Fox released a well-sourced article in May 2017. Written by Malia Zimmerman, the article reported that Seth had downloaded the Wikileaks documents, uploaded them to a DropBox account and passed them on to Julian Assange. Malia wrote:

The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street last July just steps from his home in the cozy Washington DC’s Columbia Heights neighborhood, leaked thousands of highly controversial emails to WikiLeaks that were generated internally between DNC party leaders, Fox News has confirmed after a 10-month investigation.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with Wikileaks through Gavin MacFayden, a famous American investigative reporter and director of Wikileaks.

“I have seen and read the emails between Seth Rich and Wikileaks,” the federal investigator told Fox News, confirming the MacFayden connection. But he said the whole case was put to rest after the FBI initial audit, and agents were told not to investigate further. The emails sit inside the FBI today, said the federal agent, who asked to remain a confidential source.

The Fox News piece was solid and well sourced. In addition to the Federal agent who confirmed Seth Rich had made contact with Wikileaks using a cut out, two other people with direct access to Julian Assange also told Fox reporters that Seth was the source for the DNC emails.

The DNC sprang into action and moved aggressively to shut down the Fox story. Fox, along with Malia Zimmerman and Ed Butowsky, were sued by the Rich family and by investigator Rod Wheeler claiming that some or all elements of the story were false. The lawyers behind these suits were tied to the Democrats. In the face of this pressure, Fox News folded like a cheap tent in a hurricane and pulled the Malia Zimmerman story.

Too bad Fox lacked the courage to back Malia Zimmerman because the lawsuit fell apart. The cases were dismissed in August 2018:

A federal judge in Manhattan dismissed a lawsuit Thursday that was brought against Fox News by the parents of Seth Rich, the young Democratic aide whose unsolved murder was turned into fodder for a lingering right-wing conspiracy theory.

In his dismissal of the lawsuit, Judge George B. Daniels said he sympathized with Mr. Rich’s parents, but added that they had not been personally defamed by the story — despite the fact that it included “false statements or misrepresentations.”

Who killed Seth Rich remains a mystery. It is unfortunate that the Fox News story intermingled the speculation that Seth’s murder was a deliberate hit with the actual factual statements identifying him as the source of the DNC emails.

But now there is new information that may corroborate what the human sources quoted in the Fox article claimed about Seth’s role in getting the DNC documents to Wikileaks. Borne from a FOIA request filed in November 2017 by attorney Ty Clevenger, who requested any information regarding Seth Rich and and Julian Assange. The NSA informed Clevenger in a letter dated 4 October 2018 that:

Your request has been processed under the provisions of the FOIA. Fifteen documents (32 pages) responsive to your request have been reviewed by this Agency as required by the FOIA and have found to be currently and properly classified in accordance with Executive Order 13526. These documents meet the criteria for classification as set forth in Subparagraph (c) of Section 1.4 and remains classified TOP SECRET and SECRET.

If NSA had come back and said, “No, we do not have anything pertaining to Seth Rich,” that would have been news. It would have been especially unwelcome news for those who believe that Seth was the source on the DNC emails. But now the opposite is true. The NSA says that it has documents that are classified TS and S. What do those documents say or prove? That remains to be seen.

But there is other evidence that buttresses the claim that the DNC emails were physically downloaded and then transferred to Wikileaks rather than being taken via an electronic intrusion of the DNC network. This is not a matter of opinion. It is a simple matter of science and math.

As noted earlier, Guccifer 2.0 took credit in mid-June 2016 for “hacking” the DNC and published documents as proof of his culpability. Those documents contain meta data. Bill Binney, who served with distinction as a Technical Director at the NSA, has written extensively on this issue:

We stand by our main conclusion that the data from the intrusion of July 5, 2016, into the Democratic National Committee’s computers, an intrusion blamed on “Russian hacking,” was not a hack but rather a download/copy onto an external storage device by someone with physical access to the DNC.

That principal finding relied heavily on the speed with which the copy took place – a speed much faster than a hack over the Internet could have achieved at the time – or, it seems clear, even now. Challenged on that conclusion – often by those conducting experiments within the confines of a laboratory – we have conducted and documented additional tests to determine the speeds that can be achieved now, more than a year later.

To remind: We noted in the VIPS memo that on July 5, 2016, a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 megabytes of data in 87 seconds onto an external storage device. That yields a transfer rate of 22.7 megabytes per second. (https://consortiumnews.com/2017/09/20/more-holes-in-russia-gate-narrative/)

The meta data does not prove that Seth Rich did it or that it occurred at the DNC headquarters. But the meta data does conclusively show that the material provided by Guccifer 2.0, which the US DOJ now insists was a Russian front, could not have been obtained via a computer hack.

So what do we know for certain?

First, no one in the Federal Governemnt—law enforcement or intelligence—was granted access to examine the computer servers and files on the DNC server even after the DNC claimed they had been hacked by a foreign government.

Second, the steps that Crowdstrike allegedly took to shutdown computer hacking by Russia do not match the timeline of the actual download of the documents from the DNC server.

Third, Seth Rich worked at the DNC and had access to the computer server and systems.

Fourth, Wikileaks founder Julian Assange identified Seth Rich as a “source” and posted a $20,000 reward for information concerning his murder.

Fifth, a Federal law enforcement agent told two witnesesses that Seth Rich had email exchanges with Wikileaks.

Sixth, two people with direct access to Julian Assange told three separate sources that Seth Rich was the source of the DNC material published by Wikileaks.

Seventh, the documents published by Guccifer contain meta data that establish that the documents were physically downloaded onto a device like a thumb drive.

Eighth, the NSA has confirmed that it has Top Secret and Secret documents responsive to a FOIA request for information concerning contact between Seth Rich and other people including Julian Assange.

October 24, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Russophobia, Timeless or most popular | , , , , | Leave a comment

The Democratic Money Behind Russia-gate

By Joe Lauria | Consortium News | October 29, 2017

The two sources that originated the allegations claiming that Russia meddled in the 2016 election — without providing convincing evidence — were both paid for by the Democratic National Committee, and in one instance also by the Clinton campaign: the Steele dossier and the CrowdStrike analysis of the DNC servers. Think about that for a minute.

We have long known that the DNC did not allow the FBI to examine its computer server for clues about who may have hacked it – or even if it was hacked – and instead turned to CrowdStrike, a private company co-founded by a virulently anti-Putin Russian. Within a day, CrowdStrike blamed Russia on dubious evidence.

And, it has now been disclosed that the Clinton campaign and the DNC paid for opposition research memos written by former British MI6 intelligence agent Christopher Steele using hearsay accusations from anonymous Russian sources to claim that the Russian government was blackmailing and bribing Donald Trump in a scheme that presupposed that Russian President Vladimir Putin foresaw Trump’s presidency years ago when no one else did.

Since then, the U.S. intelligence community has struggled to corroborate Steele’s allegations, but those suspicions still colored the thinking of President Obama’s intelligence chiefs who, according to Director of National Intelligence James Clapper, “hand-picked” the analysts who produced the Jan. 6 “assessment” claiming that Russia interfered in the U.S. election.

In other words, possibly all of the Russia-gate allegations, which have been taken on faith by Democratic partisans and members of the anti-Trump Resistance, trace back to claims paid for or generated by Democrats.

If for a moment one could remove the sometimes justified hatred that many people feel toward Trump, it would be impossible to avoid the impression that the scandal may have been cooked up by the DNC and the Clinton camp in league with Obama’s intelligence chiefs to serve political and geopolitical aims.

Absent new evidence based on forensic or documentary proof, we could be looking at a partisan concoction devised in the midst of a bitter general election campaign, a manufactured “scandal” that also has fueled a dangerous New Cold War against Russia; a case of a dirty political “oppo” serving American ruling interests in reestablishing the dominance over Russia that they enjoyed in the 1990s, as well as feeding the voracious budgetary appetite of the Military-Industrial Complex.

Though lacking independent evidence of the core Russia-gate allegations, the “scandal” continues to expand into wild exaggerations about the impact of a tiny number of social media pages suspected of having links to Russia but that apparently carried very few specific campaign messages. (Some pages reportedly were devoted to photos of puppies.)

‘Cash for Trash’

Based on what is now known, Wall Street buccaneer Paul Singer paid for GPS Fusion, a Washington-based research firm, to do opposition research on Trump during the Republican primaries, but dropped the effort in May 2016 when it became clear Trump would be the GOP nominee. GPS Fusion has strongly denied that it hired Steele for this work or that the research had anything to do with Russia.

Then, in April 2016 the DNC and the Clinton campaign paid its Washington lawyer Marc Elias to hire Fusion GPS to unearth dirt connecting Trump to Russia. This was three months before the DNC blamed Russia for hacking its computers and supposedly giving its stolen emails to WikiLeaks to help Trump win the election.

“The Clinton campaign and the Democratic National Committee retained Fusion GPS to research any possible connections between Mr. Trump, his businesses, his campaign team and Russia, court filings revealed this week,” The New York Times reported on Friday night.

So, linking Trump to Moscow as a way to bring Russia into the election story was the Democrats’ aim from the start.

Fusion GPS then hired ex-MI6 intelligence agent Steele, it says for the first time, to dig up that dirt in Russia for the Democrats. Steele produced classic opposition research, not an intelligence assessment or conclusion, although it was written in a style and formatted to look like one.

It’s important to realize that Steele was no longer working for an official intelligence agency, which would have imposed strict standards on his work and possibly disciplined him for injecting false information into the government’s decision-making. Instead, he was working for a political party and a presidential candidate looking for dirt that would hurt their opponent, what the Clintons used to call “cash for trash” when they were the targets.

Had Steele been doing legitimate intelligence work for his government, he would have taken a far different approach. Intelligence professionals are not supposed to just give their bosses what their bosses want to hear. So, Steele would have verified his information. And it would have gone through a process of further verification by other intelligence analysts in his and perhaps other intelligence agencies. For instance, in the U.S., a National Intelligence Estimate requires vetting by all 17 intelligence agencies and incorporates dissenting opinions.

Instead Steele was producing a piece of purely political research and had different motivations. The first might well have been money, as he was being paid specifically for this project, not as part of his work on a government salary presumably serving all of society. Secondly, to continue being paid for each subsequent memo that he produced he would have been incentivized to please his clients or at least give them enough so they would come back for more.

Dubious Stuff

Opposition research is about getting dirt to be used in a mud-slinging political campaign, in which wild charges against candidates are the norm. This “oppo” is full of unvetted rumor and innuendo with enough facts mixed in to make it seem credible. There was so much dubious stuff in Steele’s memos that the FBI was unable to confirm its most salacious allegations and apparently refuted several key points.

Perhaps more significantly, the corporate news media, which was largely partial to Clinton, did not report the fantastic allegations after people close to the Clinton campaign began circulating the lurid stories before the election with the hope that the material would pop up in the news. To their credit, established media outlets recognized this as ammunition against a political opponent, not a serious document.

Despite this circumspection, the Steele dossier was shared with the FBI at some point in the summer of 2016 and apparently became the basis for the FBI to seek Foreign Intelligence Surveillance Act warrants against members of Trump’s campaign. More alarmingly, it may have formed the basis for much of the Jan. 6 intelligence “assessment” by those “hand-picked” analysts from three U.S. intelligence agencies – the CIA, the FBI and the NSA – not all 17 agencies that Hillary Clinton continues to insist were involved. (Obama’s intelligence chiefs, DNI Clapper and CIA Director John Brennan, publicly admitted that only three agencies took part and The New York Times printed a correction saying so.)

If in fact the Steele memos were a primary basis for the Russia collusion allegations against Trump, then there may be no credible evidence at all. It could be that because the three agencies knew the dossier was dodgy that there was no substantive proof in the Jan. 6 “assessment.” Even so, a summary of the Steele allegations were included in a secret appendix that then-FBI Director James Comey described to then-President-elect Trump just two weeks before his inauguration.

Five days later, after the fact of Comey’s briefing was leaked to the press, the Steele dossier was published in full by the sensationalist website BuzzFeed behind the excuse that the allegations’ inclusion in the classified annex of a U.S. intelligence report justified the dossier’s publication regardless of doubts about its accuracy.

Russian Fingerprints

The other source of blame about Russian meddling came from the private company CrowdStrike because the DNC blocked the FBI from examining its server after a suspected hack. Within a day, CrowdStrike claimed to find Russian “fingerprints” in the metadata of a DNC opposition research document, which had been revealed by an Internet site called DCLeaks, showing Cyrillic letters and the name of the first Soviet intelligence chief. That supposedly implicated Russia.

CrowdStrike’s Dmitri Alperovitch

CrowdStrike also claimed that the alleged Russian intelligence operation was extremely sophisticated and skilled in concealing its external penetration of the server. But CrowdStrike’s conclusion about Russian “fingerprints” resulted from clues that would have been left behind by extremely sloppy hackers or inserted intentionally to implicate the Russians.

CrowdStrike’s credibility was further undermined when Voice of America reported on March 23, 2017, that the same software the company says it used to blame Russia for the hack wrongly concluded that Moscow also had hacked Ukrainian government howitzers on the battlefield in eastern Ukraine.

“An influential British think tank and Ukraine’s military are disputing a report that the U.S. cyber-security firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election,” VOA reported. Dimitri Alperovitch, a CrowdStrike co-founder, is also a senior fellow at the anti-Russian Atlantic Council think tank in Washington.

More speculation about the alleged election hack was raised with WikiLeaks’ Vault 7 release, which revealed that the CIA is not beyond covering up its own hacks by leaving clues implicating others. Plus, there’s the fact that WikiLeaks founder Julian Assange has declared again and again that WikiLeaks did not get the Democratic emails from the Russians. Buttressing Assange’s denials of a Russian role, WikiLeaks associate Craig Murray, a former British ambassador to Uzbekistan, said he met a person connected to the leak during a trip to Washington last year.

And, William Binney, maybe the best mathematician to ever work at the National Security Agency, and former CIA analyst Ray McGovern have published a technical analysis of one set of Democratic email metadata showing that a transatlantic “hack” would have been impossible and that the evidence points to a likely leak by a disgruntled Democratic insider. Binney has further stated that if it were a “hack,” the NSA would have been able to detect it and make the evidence known.

Fueling Neo-McCarthyism

Despite these doubts, which the U.S. mainstream media has largely ignored, Russia-gate has grown into something much more than an election story. It has unleashed a neo-McCarthyite attack on Americans who are accused of being dupes of Russia if they dare question the evidence of the Kremlin’s guilt.

Just weeks after last November’s election, The Washington Post published a front-page story touting a blacklist from an anonymous group, called PropOrNot, that alleged that 200 news sites, including Consortiumnews.com and other leading independent news sources, were either willful Russian propagandists or “useful idiots.”

Last week, a new list emerged with the names of over 2,000 people, mostly Westerners, who have appeared on RT, the Russian government-financed English-language news channel. The list was part of a report entitled, “The Kremlin’s Platform for ‘Useful Idiots’ in the West,” put out by an outfit called European Values, with a long list of European funders.

Included on the list of “useful idiots” absurdly are CIA-friendly Washington Post columnist David Ignatius; David Brock, Hillary Clinton’s opposition research chief; and U.N. Secretary General Antonio Guterres.

The report stated: “Many people in Europe and the US, including politicians and other persons of influence, continue to exhibit troubling naïveté about RT’s political agenda, buying into the network’s marketing ploy that it is simply an outlet for independent voices marginalised by the mainstream Western press. These ‘useful idiots’ remain oblivious to RT’s intentions and boost its legitimacy by granting interviews on its shows and newscasts.”

The intent of these lists is clear: to shut down dissenting voices who question Western foreign policy and who are usually excluded from Western corporate media. RT is often willing to provide a platform for a wider range of viewpoints, both from the left and right. American ruling interests fend off critical viewpoints by first suppressing them in corporate media and now condemning them as propaganda when they emerge on RT.

Geopolitical Risks

More ominously, the anti-Russia mania has increased chances of direct conflict between the two nuclear superpowers. The Russia-bashing rhetoric not only served the Clinton campaign, though ultimately to ill effect, but it has pushed a longstanding U.S.-led geopolitical agenda to regain control over Russia, an advantage that the U.S. enjoyed during the Yeltsin years in the 1990s.

After the collapse of the Soviet Union in 1991, Wall Street rushed in behind Boris Yeltsin and Russian oligarchs to asset strip virtually the entire country, impoverishing the population. Amid widespread accounts of this grotesque corruption, Washington intervened in Russian politics to help get Yeltsin re-elected in 1996. The political rise of Vladimir Putin after Yeltsin resigned on New Year’s Eve 1999 reversed this course, restoring Russian sovereignty over its economy and politics.

That inflamed Hillary Clinton and other American hawks whose desire was to install another Yeltsin-like figure and resume U.S. exploitation of Russia’s vast natural and financial resources. To advance that cause, U.S. presidents have supported the eastward expansion of NATO and have deployed 30,000 troops on Russia’s border.

In 2014, the Obama administration helped orchestrate a coup that toppled the elected government of Ukraine and installed a fiercely anti-Russian regime. The U.S. also undertook the risky policy of aiding jihadists to overthrow a secular Russian ally in Syria. The consequences have brought the world closer to nuclear annihilation than at any time since the Cuban missile crisis in 1962.

In this context, the Democratic Party-led Russia-gate offensive was intended not only to explain away Clinton’s defeat but to stop Trump — possibly via impeachment or by inflicting severe political damage — because he had talked, insincerely it is turning out, about detente with Russia. That did not fit in well with the plan at all.


Joe Lauria is a veteran foreign-affairs journalist. He has written for the Boston Globe, the Sunday Times of London and the Wall Street Journal among other newspapers. He is the author of How I Lost By Hillary Clinton published by OR Books in June 2017. He can be reached at joelauria@gmail.com and followed on Twitter at @unjoe.

October 29, 2017 Posted by | Deception, Fake News, Russophobia, Timeless or most popular | , , , | 1 Comment

The Mad Chase for Russia-gate Prey

By Daniel Lazare | Consortium News | June 30, 2017

June is turning out to be the cruelest month for the Russia-gate industry. The pain began on June 8 when ex-FBI Director James Comey testified that a sensational New York Times article declaring that “members of Donald J. Trump’s 2016 presidential campaign and other Trump associates had repeated contacts with senior Russian intelligence officials” was “in the main … not true.”

Then came Republican Karen Handel’s June 20 victory in a special election in Georgia’s sixth congressional district, sparking bitter recriminations among Democrats who had hoped to ride to victory on a Russia-gate-propelled wave of resistance to Trump.

More evidence that the strategy was not working came a day later when the Harris Poll and Harvard’s Center for American Political Studies produced a devastating survey showing that 62 percent of voters see no evidence that the Trump campaign colluded with Russia, while 54 percent believe the “Deep State” is trying to unseat the President by leaking classified information. The poll even showed a small bounce in Trump’s popularity, with 45 percent viewing him favorably as opposed to only 39 percent for his defeated Democratic rival Hillary Clinton.

The mainstream news media also came in for some lumps. On June 23, CNN retracted a story that had claimed that Congress was looking into reports that the Trump transition team met secretly with a Russian investment fund under sanction from the U.S. government. Three days later, CNN announced that three staffers responsible for the blooper – reporter and Pulitzer Prize-nominee Thomas Frank; Pulitzer-winner Eric Lichtblau, late of the New York Times ; and Lex Haris, executive editor in charge of investigations – had resigned.

Adding to CNN’s embarrassment, Project Veritas, the brainchild of rightwing provocateur James O’Keefe, released an undercover video in which a CNN producer named John Bonifield explained that the network can’t stop talking about Russia because it boosts ratings and then went on to say about Russia-gate:

“Could be bullshit, I mean it’s mostly bullshit right now.  Like, we don’t have any big giant proof. But … the leaks keep leaking, and there are so many great leaks, and it’s amazing, and I just refuse to believe that if they had something really good like that, that wouldn’t leak because we’ve been getting all these other leaks. So I just feel like they don’t really have it but they want to keep digging. And so I think the president is probably right to say, like, look, you’re witch-hunting me, like, you have no smoking gun, you have no real proof.”

Project Veritas also released an undercover video interview with CNN contributor Van Jones calling the long-running probe into possible collusion between Trump’s 2016 campaign and Russia a “nothing-burger,” a position similar to the skepticism that Jones has displayed in his on-air comments.

True, the Bonifield video was only a medical reporter sounding off about a story that he’s not even covering and doing so to a dirty-trickster who has received financing from Trump and who, after another undercover film stunt, was ordered in 2013 to apologize and pay $100,000 to an anti-poverty worker whose privacy he had invaded.

Good for Ratings

But, still, Bonifield’s “president-is-probably-right” comment is hard to shake. Ditto Van Jones’ “nothing-burger.” Unless both quotes are completely doctored, it appears that the scuttlebutt among CNNers is that Russia-gate is a lot of hot air but no one cares because it’s sending viewership through the roof.

And if that’s what CNN thinks, then it may be what MSNBC’s Rachel Maddow thinks as she also plays the Russia card for all it’s worth. It may also be what The Washington Post has in the back of its mind even while hyperventilating about Russian President Vladimir Putin’s “crime of the century, an unprecedented and largely successful destabilizing attack on American democracy.”

The New York Times also got caught up in its enthusiasm to hype the Russia-gate case on June 25 when it ran a story slamming Trump for “refus[ing] to acknowledge a basic fact agreed upon by 17 American intelligence agencies that he now oversees: Russia orchestrated the attacks [on Democratic emails], and did it to help get him elected.”

The “17-intelligence-agency” canard has been a favorite go-to assertion for both Democrats and the mainstream news media, although it was repudiated in May by President Obama’s Director of National Intelligence James Clapper and CIA Director John Brennan.

So, on June 29, the Times apparently found itself with no choice but to issue a correction stating: “The [Russia-hacking] assessment was made by four intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation and the National Security Agency. The assessment was not approved by all 17 organizations in the American intelligence community.”

This point is important because, as Consortiumnews.com and other non-mainstream news outlets have argued for more than a month, it is much easier to manipulate a finding by hand-picking analysts from a small number of intelligence agencies than by seeking the judgments and dissents from all 17.

Despite the correction, the Times soon returned to its pattern of shading the truth regarding the U.S. intelligence assessment. On June 30, a Times article reported: “Mr. Trump has repeatedly cast doubt on the unanimous conclusion of United States intelligence agencies that Russia sought to interfere in the 2016 race.”

The Times’ phrase “unanimous conclusion” conveys the false impression that all 17 agencies were onboard without specifically saying so, although we now know that the Times’ editors are aware that only selected analysts from three agencies plus the DNI’s office were involved.

In other words, the Times cited a “unanimous conclusion of United States intelligence agencies” to mislead its readers without specifically repeating the “all-17-agencies” falsehood. This behavior suggests that the Times is so blinded by its anti-Trump animus that it wants to conceal from its readers how shaky the whole tale is.

Holes from the Start

But the problems with Russia-gate date back to the beginning. Where Watergate was about a real burglary, this one began with a cyber break-in that may or may not have occurred. In his June 8 testimony before the Senate Intelligence Committee, Comey conceded that the FBI never checked the DNC’s servers to confirm that they had truly been hacked.

COMMITTEE CHAIRMAN RICHARD BURR: Did you ever have access to the actual hardware that was hacked?  Or did you have to rely on a third party to provide you the data that they had collected?

COMEY: In the case of the DNC, and, I believe, the DCCC [i.e. the Democratic Congressional Campaign Committee], but I’m sure the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work.  But we didn’t get direct access.

BURR: But no content?

COMEY: Correct.

BURR: Isn’t content an important part of the forensics from a counterintelligence standpoint?

COMEY: It is, although what was briefed to me by my folks — the people who were my folks at the time – is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016.

The FBI apparently was confident that it could rely on such “a high-class entity” as CrowdStrike to tell it what it needed to know. Yet neither the Democratic National Committee nor CrowdStrike, the Irvine, California, cyber-security firm the DNC hired, was remotely objective.

Hillary Clinton was on record calling Putin a “bully” whose goal was “to stymie, to confront, to undermine American power” while Dmitri Aperovitch, CrowdStrike’s chief technical officer, is a Russian émigré who is both anti-Putin personally and an associate of the Atlantic Council, a pro-Clinton/anti-Russian think tank that is funded by the Saudis, the United Arab Emirates and the Ukrainian World Congress. The Atlantic Council is one of the most anti-Russian voices in Washington.

So, an anti-Putin DNC hired an anti-Putin security specialist, who, to absolutely no one’s surprise, “immediately” determined that the break-in was the work of hackers “closely linked to the Russian government’s powerful and highly capable intelligence services.”

Comey’s trust in CrowdStrike was akin to cops trusting a private eye not only to investigate a murder, but to determine if it even occurred. Yet the mainstream media’s pack journalists saw no reason to question the FBI because doing so would not accord with an anti-Trump bias so pronounced that even journalism profs have begun to notice.

Doubts about CrowdStrike

Since CrowdStrike issued its findings, it has come under wide-ranging criticism. Cyber experts have called its analysis inconsistent because while praising the alleged hackers to the skies (“our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis”), CrowdStrike says it was able to uncover their identity because they made kindergarten-level mistakes, most notably uploading documents in a Russian-language format under the name “Felix Edmundovich,” a reference to Felix E. Dzerzhinsky, founder of the Soviet secret police.

“Raise your hand if you think that a GRU or FSB officer would add Iron Felix’s name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker,” wisecracked cyber-skeptic Jeffrey Carr.

Others noted how easy it is for even novice hackers to leave a false trail. In Seattle, cyber-sleuths Mark Maunder and Rob McMahon of Wordfence, makers of a popular computer-security program, discovered that “malware” found in the DNC was an early version of a publicly available program developed in the Ukraine – which was strange, they said, because one would expect Russian intelligence to develop its own tools or use ones that were more up to date.

But even if the malware was Russian, experts pointed out that its use in this instance no more implicates Russian intelligence than the use of an Uzi in a bank robbery implicates Mossad.

Other loose threads appeared. In January, Carr poured cold water on a subsequent CrowdStrike report charging that pro-Russian separatists had used similar malware to zero in on pro-government artillery units in the eastern Ukraine.

The Ukrainian ministry of defense and the London think tank from which CrowdStrike obtained much of its data agreed that the company didn’t know what it was talking about. But if CrowdStrike was wrong about the Ukraine case, how could everyone be sure it was right about the DNC?

In March, Wikileaks went public with its “Vault 7” findings showing, among other things, that the CIA has developed sophisticated software in order to scatter false clues – which inevitably led to dark mutterings that maybe the agency had hacked the DNC itself in order to blame it on the Russians.

Finally, although Wikileaks policy is never to comment on its sources, Julian Assange, the group’s founder, decided to make an exception.

“The Clinton camp has been able to project a neo-McCarthyist hysteria that Russia is responsible for everything,” he told journalist John Pilger in November. “Hillary Clinton has stated multiple times, falsely, that 17 U.S. intelligence agencies had assessed that Russia was the source of our publications. That’s false – we can say that the Russian government is not the source.”

Craig Murray, an ex-British diplomat who is a Wikileaks adviser, disclosed that he personally flew to Washington to meet with a person who was either the original source or an associate of the source. Murray said the motive for the leak was “disgust at the corruption of the Clinton Foundation and the tilting of the primary election playing field against Bernie Sanders.”

Conceivably, such contacts could have been cutouts to conceal from WikiLeaks the actual sources. Still, Wikileaks’ record of veracity should be enough to give anyone pause. Yet the press either ignored the WikiLeaks comments or, in the case of The Washington Post, struggled to prove that WikiLeaks was lying.

Unstable Foundation

The stories that have been built upon this unstable foundation have proved shaky, too. In March, the Times published a front-page exposé asserting that Trump campaign manager Paul Manafort “had regular communications with his longtime associate – a former Russian military translator in Kiev who has been investigated in Ukraine on suspicion of being a Russian intelligence agent.” But if the man was merely a suspected spy as opposed to a convicted one, then what’s the problem?

The article also noted that Jason Greenblatt, a former Trump lawyer who is now a special White House representative for international negotiations, met last summer with Rabbi Berel Lazar, “the chief rabbi of Russia and an ally of Russia’s president, Vladimir V. Putin.” But an Orthodox Jew paying a call on Russia’s chief rabbi is hardly extraordinary. Neither is the fact that the rabbi is a Putin ally since Putin enjoys broad support in the Russian Jewish community.

In April, the Times published another innuendo-laden front-page story about businessman Carter Page whose July 2016 trip to Moscow proved to be “a catalyst for the F.B.I. investigation into connections between Russia and President Trump’s campaign.”

Page’s sins chiefly consist of lecturing at a Moscow academic institute about U.S.-Russian relations in terms that The New York Times believed “echoed the position of President Vladimir V. Putin of Russia” and, on another occasion, meeting with a suspected Russian intelligence agent in New York.

“There is no evidence that Mr. Page knew the man was an intelligence officer,” the article added. So is it now a crime to talk with a Russian or some other foreign national who, unbeknownst to you, may turn out to be an intelligence agent?

Then there is poor Mike Flynn, driven out as national security adviser after just 24 days in office for allegedly misrepresenting conversations with Russian Ambassador Sergey Kislyak – exchanges during the Trump transition that supposedly exposed him to the possibility of Russian blackmail although U.S. intelligence was monitoring the talks and therefore knew their exact contents. And, since the Russians no doubt assumed as much, it’s hard to see what they could have blackmailed him with. [See Consortiumnews.com’sTurning Gen. Flynn into Road Kill.”]

Yet the mainstream media eagerly gobbled up this blackmail possibility while presenting with a straight face the claim by Obama holdovers at the Justice Department that the Flynn-Kislyak conversations might have violated the 1799 Logan Act, an ancient relic that has never been used to prosecute anyone in its entire two-century history.

So, if the scandal is looking increasingly threadbare now, could the reason be that there was little or nothing to it when it was first announced during the final weeks of the 2016 campaign?

Although it’s impossible to say what evidence might eventually emerge, Russia-gate is looking more and more like a Democratic version of Benghazi, a pseudo-scandal that no one could ever figure out but which wound up making Hillary Clinton look like a persecuted hero and the Republicans seem like obsessed idiots.

As much as that epic inquiry turned out to be mostly a witch-hunt, Americans are beginning to sense the same about Washington’s latest game of “gotcha.”

The United States is still a democracy in some vague sense of the word, and “We the People” are losing patience with subterranean maneuvers on the part of the Democrats, the neoconservatives, and the intelligence agencies seeking to reverse a presidential election.

Like Benghazi or possibly even the Birthergate scam about President Obama’s Kenyan birthplace, the whole convoluted Russia-gate tale grows stranger by the day.


Daniel Lazare is the author of several books including The Frozen Republic: How the Constitution Is Paralyzing Democracy (Harcourt Brace).

June 30, 2017 Posted by | Deception, Mainstream Media, Warmongering, Russophobia | , , , | Leave a comment

Norway blames ‘Russian hackers’ after defense & security officials fall victim to phishing attack

RT | February 4, 2017

Government officials in Norway have been breached by a phishing attack which authorities promptly pinned on ‘Russian hackers,’ claiming the hack was allegedly traced back to the same culprits that compromised the DNC servers in the US last year.

Nine personal civil-servant email accounts have been compromised, the Norwegian Police Security Service (PST) announced, just days after the agency coincidentally identified possible Russian spying as the greatest potential threat to the country.

The Labor Party and “a handful of other Norwegian targets” were subjected to email attacks that allegedly took place last autumn, the Dagbladet reported. The defense and foreign ministries as well as security service staff were among those targeted, the BBC reports citing local media.

“The attacks had a signature that indicates those behind the hacking can be identified as APT29,” PST spokesman Martin Berntsen told the Associated Press. “They can be traced back to Russia,” he stated without elaborating further, while conceding that no classified information has been compromised.

CrowdStrike, a cybersecurity company hired by the Democratic National Committee (DNC) to investigate the June 2016 data breach, was first to accuse APT29 – which they named “Cozy Bear” and “Fancy Bear” – of being Russian government entities. However, CrowdStrike has never offered any proof for this assertion.

Spear phishing – the forging of trusted communication to access private data – isn’t a Russian know-how but a popular and quite unsophisticated fraud technique that is widely used around the world to hijack electronic accounts.

Labour’s leader, Jonas Gahr Store, also confirmed the breach of his party’s emails, after being notified of the hack by PST on Wednesday.

“I can confirm that we are informed by PST that Labour’s parliamentary group was subjected to an attempted digital attack by a group that PST ties to foreign intelligence,” Store’s press spokeswoman Camilla Ryste, told Nettavisen, The Local reports.

The new revelations follow PST’s latest threat assessment on national security published Wednesday, where Norway said that Russian intelligence poses the greatest challenge for the country.

“It is primarily Russia that has intentions and capacity to do intelligence activities with big damage potential for Norway and Norwegian interests,” the annual report from the Police Security Service (PST) reads.

“Intelligence pressure from foreign states, especially from the Russian side, has been high and stable over the years,” PST Chief Benedicte Bjornland said in the report, according to The Local. “The reason why we increase [the risk] now is that there is a tougher security situation. This means that the intelligence activities of Russia, in particular, have the potential to be more dangerous now than before.”

The Russian embassy in Norway called the Russian threat a “myth” blaming Oslo of staging a “witch hunt” instead of dealing with real threats like terrorism.

“Unfortunately, it seems like some are uninterested in normalization of our relationship and strive persistently to return to the times of the Cold War,” the embassy said on Facebook.

See also:

Norway surprised by Russia’s entry visa rejections to delegates blacklisted months ago

February 4, 2017 Posted by | Fake News, Mainstream Media, Warmongering | , , | Leave a comment

Anti-Russia smear campaign also targets Trump

By Finian Cunningham | RT | June 18, 2016

Sensational reports of Russian government spies hacking into the Democrat party’s computers weren’t the usual anti-Moscow smear job. Republican presidential contender Donald Trump also took a hit in the double whammy.

The abrasive business tycoon may have a popular following among grass roots voters, but he has managed to garner powerful enemies within the American establishment. Not least large sections of the corporate news media, the military and foreign policy arms of US government.

Government-owned news outlet Voice of America reports this week that Republican leaders are “wringing their hands” over Trump and seeking to nix his presidential nomination. This impetus against the billionaire politician has grown in the wake of last week’s mass shooting in Orlando, Florida, when Trump “doubled down” on controversial anti-Muslim rhetoric, which is seen as divisive and alienating voters.

Trump’s enemies in the media are topped by the Washington Post after he banned the newspaper from covering his campaign. In an unprecedented move, he revoked official accreditation to the paper’s reporters after he slammed the Post for “phony and dishonest” coverage. The paper has prominently featured columns that purport to “debunk” many of Trump’s political claims and statements.

Trump made another powerful enemy when he scoffed at the US-led military umbrella NATO, deriding the 28-member military bloc as an “obsolete” organization. He also said he would slash US financial and military commitments if elected president. Trump stepped on serious toes there since NATO can be seen as a lynchpin of American imperial power projection and a crucial financial pump for the Pentagon and its military-industrial complex.

Earlier this month, CNN ran an “exclusive” op piece to NATO. Headlined “Inside NATO as it faces fire from Trump”, the organization was given ample space to justify its existence as “cutting edge” and “transforming” for its stated purpose of maintaining global security. Trump’s name wasn’t mentioned explicitly by NATO officials, but it was obvious that he had rankled the alliance, and it was out to burnish its image, which CNN generously indulged.

Now let’s deal with the smear job at issue. On Tuesday, the Washington Post splashed with this story: “Russian government hackers penetrated DNC, stole opposition research on Trump”.

The Post’s “national security” reporter Ellen Nakashima writes: “Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.”

The first thing to note is the poor journalistic standard, whereby the headline of a news report is presented as a fact – “Russian government hackers penetrated DNC” – when the information is actually only a claim “according to committee officials and security experts”, as the first paragraph discloses.

And on reading the article it turns out that the claim made against the Russian government is underwhelming. The entire article is based on the hearsay of the private security firm employed by the Democrat party. There is no evidence presented to substantiate the assertion that the alleged hackers were linked to Russian military intelligence (GRU) or its state security service (FSB).

This is true to form for that Washington Post reporter. Last year, Nakashima published several articles in which she similarly claimed that Russia and Chinese government hackers had broken into the White House network and other federal databases. Again, those articles were based on unverified claims by anonymous officials and private security firms.

For the record, the Russian government flatly denied having anything to do with the latest computer hack at the DNC. “I completely rule out a possibility that the [Russian] government or the government bodies have been involved in this,” said Dmitry Peskov, the Kremlin’s spokesman.

A second telling aspect about the story was that on the same day that the Washington Post led on it, all the major US media, and some prominent British ones too, also ran with it. All with nearly the same wording of the factually sounding headline imputing the Russian government. That kind of wall-to-wall, uniform coverage is indicative that the story was primed by a governmental agency for media broadcast. In short, a disinformation campaign.

The obvious target here is Russia. Not for the first time has the Kremlin been accused with breaching US computer networks and generally being a sinister specter threatening national security – as if Washington is not also carrying out the same espionage and worse. The hacker story is but just one more twist in Washington’s overarching anti-Russia narrative, including accusations that it is destabilizing European states, annexed Crimea, is invading Ukraine, and bombing hospitals and civilians in Syria.

Russian spies allegedly interfering in American domestic politics and a presidential election by hacking into the Democrat National Committee is aimed at whipping up Cold War public resentment towards Moscow.

But perhaps the bigger target of the disinformation is Donald J Trump.

Notice how the alleged Russian hack was coupled prominently with “stealing opposition research on Trump”. And, pointedly, all the media headlines also featured this aspect. Patently, the Trump detail was intended as a “talking point”, as they say in state intelligence parlance.

The Trump campaign reportedly brushed off the “news” that personal information had been accessed by hackers. His campaign team breezily referred reporters to contact federal investigators.

However, here’s the thing. By making it appear that the Russians have the goods, or the dirt, on Trump the intended effect is that he would be viewed as “compromised” in the eyes of American voters. He would be, according to this logic, a national security risk if elected president, vulnerable to being manipulated, blackmailed or some other form of coercion – by America’s number one global enemy, Russia.

The Washington Post is not the only one with a confluence of interest in running the Russian hacker/Trump damaged story. The private security firm, CrowdStrike, that the DNC contracted to purportedly hunt for the Russian spyware is linked to NATO and the US foreign policy establishment. And it is CrowdStrike’s assessment upon which the entire story in the Washington Post and all the other media outlets is based.

Dmitri Alperovitz, CrowdStrike’s chief technology officer, is quoted frequently as the main source of the story, and as saying they have “high confidence” it was Russian hackers, “but we don’t have hard evidence”.

In what seems a clumsy disclosure, the Washington Post article makes a passing reference to Alperovitz being “a senior fellow at the Atlantic Council”.

The Atlantic Council, based in Washington DC, is a high-profile international think tank that publishes papers, holds seminars and hosts leading American and European public figures to present a solidly “Atlanticist” US foreign policy. The Atlantic Council is tightly aligned with the US-led NATO military alliance and is regularly briefed by NATO leaders, including former commander General Philip Breedlove and current secretary general Jens Stoltenberg. It is an avid cheer leader for the anti-Russian narrative that dominates US policy towards Moscow.

In sum, the latest media smear job on Russia was a double dirty trick. With Donald Trump also on the receiving end.

Read more:

Russian spies again? DNC says Russian hackers breached its files

June 18, 2016 Posted by | Deception | , , , , , , , , | Leave a comment