{"id":60799,"date":"2016-12-18T17:10:49","date_gmt":"2016-12-18T21:10:49","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=60799"},"modified":"2016-12-18T17:10:49","modified_gmt":"2016-12-18T21:10:49","slug":"russia-did-not-hack-hard-evidence-shows-a-leak-from-inside-the-beltway","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=60799","title":{"rendered":"Russia Did Not Hack&#8212;Hard Evidence Shows A Leak From Inside The Beltway"},"content":{"rendered":"<h2 class=\"itemTitle\">NSA Whistleblower Destroys Obama&#8217;s Russia Hacking Narrative &#8211; &#8220;Hard Evidence Points To An Inside Leak, Not Hacking&#8221;<\/h2>\n<p><!--more--><span class=\"itemAuthor\">by Newsroom<a href=\"http:\/\/www.superstation95.com\/index.php\/world\/author\/973-newsroom\" rel=\"author\"><br \/>\n<\/a>SuperStation95<br \/>\n<\/span><br \/>\nA group of retired senior intelligence officials, including the NSA whistleblower William Binney (former Technical Director, World Geopolitical &amp; Military Analysis, NSA), have posted an open letter on <a href=\"http:\/\/consortiumnews.com\/2016\/12\/12\/us-intel-vets-dispute-russia-hacking-claims\/\">consortiumnews.com<\/a> that destroys the Obama administration&#8217;s &#8220;Russian hacking&#8221; narrative.\u00a0 Within the letter, Binney argues that, thanks to the NSA&#8217;s &#8220;extensive domestic data-collection network,&#8221; any data removed remotely from Hillary Clinton or DNC servers would have passed over fiber networks and therefore would have been captured by the NSA who could have then analyzed packet data to determine the origination point and destination address of those packets.\u00a0 <strong>As Binney further notes, the only way the leaks could have avoided NSA detection is if they were never passed over fiber networks but rather downloaded to a thumb drive by someone with internal access to servers.<\/strong><\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p>We have gone through the various claims about hacking. For us, it is child\u2019s play to dismiss them. <strong>The email disclosures in question are the result of a leak, not a hack<\/strong>. Here\u2019s the difference between leaking and hacking:<\/p>\n<p>&nbsp;<\/p>\n<p>Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.<\/p>\n<p>&nbsp;<\/p>\n<p>Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it \u2013 and know both sender and recipient.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In short, since leaking requires physically removing data \u2013 on a thumb drive, for example \u2013 <strong>the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Again, <strong>NSA is able to identify both the sender and recipient when hacking is involved.<\/strong> Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA\u2019s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. <strong>These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) \u2013 or any other server in the U.S. \u2013 is collected by the NSA.<\/strong>\u00a0 These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.zerohedge.com\/sites\/default\/files\/images\/user230519\/imageroot\/2016\/12\/16\/2016.12.16%20-%20NSA%20Whistleblower_0.JPG\" alt=\"Binney\" width=\"600\" height=\"365\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Binney further notes that the manner in which the media&#8217;s &#8220;sources&#8221; are equivocating by using phrases like &#8220;our best guess&#8221; implies that the NSA has not been able to trace the Hillary or DNC &#8220;hacks&#8221; across fiber networks.\u00a0 And, since the NSA tracks basically every packet that travels across U.S. networks, Binney concludes that it&#8217;s effectively impossible that the WikiLeaks data came from a &#8220;hack.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><a href=\"http:\/\/www.fincabayano.net\/en\/survival.htm?utm_source=link&amp;utm_medium=superstation95&amp;utm_campaign=superstation95\" target=\"_blank\" rel=\"alternate\">Bug Out While You Still Can! Learn More&#8230;<\/a><\/li>\n<\/ul>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p><strong>The bottom line is that the NSA would know where and how any \u201chacked\u201d emails from the DNC, HRC or any other servers were routed through the network.<\/strong> This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.<\/p>\n<p>&nbsp;<\/p>\n<p>The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating \u2013 saying things like <strong>\u201cour best guess\u201d<\/strong> or <strong>\u201cour opinion\u201d<\/strong> or \u201c<strong>our estimate\u201d<\/strong> etc. \u2013 <strong>shows that the emails alleged to have been \u201chacked\u201d cannot be traced across the network. <\/strong>Given NSA\u2019s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider<\/strong> \u2013 as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.<\/p><\/blockquote>\n<p>Asked why intelligence sources would be leaking such dangerous allegations without proof, Binney echoed our thoughts that they&#8217;re simply <strong>&#8220;concocting these things to support the existing administration and to also support the move toward a new Cold War.\u201d<\/strong>\u00a0 Per <a href=\"http:\/\/www.rt.com\/op-edge\/370465-russia-hacking-claims-nsa-binney\/\">RT<\/a>:<\/p>\n<blockquote>\n<div class=\"quote_start\"><\/div>\n<div class=\"quote_end\"><\/div>\n<p>\u201cCertainly, that\u2019s behind some of it. Hillary Clinton and a number of people were going that way, and certainly the military intelligence complex fosters that because that <strong>means for a \u201cnew Cold War\u201d trillions of dollars going into the coffers of those people,<\/strong> they would certainly be advocates for this thing. There is a lot of vested interest to keep this kind of thing going,\u201d Binney added.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u201cIf the CIA is alleging a different story, they need to produce the evidence like they did on the Chinese hack,\u201d<\/strong> Binney said. \u201cThere is no reason to withhold this kind of information, especially if they can prove it and so far as I can see they won\u2019t even brief the House Intelligence Committee on the evidence they are using to make this statement. <strong>That tells me that what they are saying is a pack of crap.\u201d<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u201cThat are just concocting these things to support the existing administration and to also support the move toward a new Cold War.\u201d<\/strong><\/p><\/blockquote>\n<p>Alas, who needs &#8220;hard evidence&#8221; when baseless narratives are so much fun?<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.superstation95.com\/index.php\/world\/2704\">http:\/\/www.superstation95.com\/index.php\/world\/2704<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSA Whistleblower Destroys Obama&#8217;s Russia Hacking Narrative &#8211; &#8220;Hard Evidence Points To An Inside Leak, Not Hacking&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-60799","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/60799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60799"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/60799\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=60799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=60799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}