Aletho News

ΑΛΗΘΩΣ

Did Russian Intelligence Hack the DNC Servers?

By Peter Van Buren | We Meant Well | July 26, 2016

Short answer: nobody knows, but the media is treating it as a fact based primarily on a single technical source employed by the Democratic National Committee. I read the source’s publically available explanation. Here’s what I found.

A Quick Taste of Media Conclusions

Despite a line in paragraph five saying “Proving the source of a cyberattack is notoriously difficult,” the New York Times offers the following statements.

— “researchers have concluded that the national committee was breached by two Russian intelligence agencies;”

— “Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects;”

— “Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.”

— “It is unclear how WikiLeaks obtained the email trove. But the presumption is that the intelligence agencies turned it over, either directly or through an intermediary. Moreover, the timing of the release, between the end of the Republican convention and the beginning of the Democratic one, seems too well planned to be coincidental.”

There’s more, but you get the picture. The article also quotes Clinton staffers citing unnamed experts and researchers.

Who Are These Experts?

The only experts cited work for a company hired by the Democratic National Committee to investigate the hack. There is no indication of any neutral third party investigation. The company, Crowdstrike, issued a publicly available report on what they found.

The report title makes clear the company’s conclusion: Bears in the Midst: Intrusion into the Democratic National Committee.

What Does the Report Say?

The report has some technical explanations, but focuses on conclusions that seem to be at best presumptions, despite the media treating them as fact.

— The key presumptive conclusion seems to be that the sophistication of the hacks points to a nation-state actor. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities.”

— The hackers, two separate entities Crowdstrike says worked independently, used techniques known to be used by Russians. Better yet, with no evidence at all presented, Crowdstrike concludes, “Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.” Also, for one of the alleged hackers, “Extensive targeting of defense ministries and other military victims has been observed, the profile of which closely mirrors the strategic interests of the Russian government.”

— By the end of the report Crowdstrike is just plain out called the hackers “Russian espionage groups.”

FYI: Fidelis, another cybersecurity company, was hired by Crowdstrike to review the findings. Fidelis worked exclusively and only with data provided by Crowdstrike (as did several other companies.) Fidelis They concluded the same two hackers, COZY BEAR and FANCY BEAR APT, committed the intrusion, but made no comments on whether those two were linked to the Russian government.

Um, Valid Conclusions?

Despite the citing with certainty of experts and researchers by the media and the Clinton campaign, the only such expert who has made any findings public has basically thrown out little more than a bunch of presumptions and unsubstantiated conclusions.

Left undiscussed are:

— the commonality of hackers using “false flags,” say where an Israeli hacker will purposely leave behind false clues to make it seem that a Hungarian did the work. As one commentator put it sarcastically “The malware was written in Russian? It was a Russian who attacked you. Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”

— the question of if the hackers were “Russians,” can anyone tie them to the Russian government? Joe Black Hat breaking into some system in Ireland may indeed be an American person, but it is quite a jump to claim he thus works for the American government.

— there is also a significant question of motive. For Putin to be the bad guy here, we have to believe that Putin wants Trump in power, bad enough to risk near-war with the U.S. if caught in the hack, and bad enough to really p.o. Clinton who will be nominated this week anyway, and hoping of course that evidence of dirty tricks by the DNC released in July will be enough to defeat her in November. That’s a real s-t-r-e-t-c-h, Sparky.

— other than those private persons who hack for their own entertainment or personal political beliefs, most work for money. They steal something and sell it. Information from the DNC system would find an easy buyer.

— Who might be interested in buying these emails? Along the range of actors who would benefit from exposing these emails, why would the Russians come out on top? Perhaps the Republicans? China? Pretty much any of the many enemies the Clintons have amassed over the years? Hell, even Bernie Sanders, whose complaints about the DNC were validated by the email release. The suspects based on motive alone make up a very long list.

Learning More

For some intelligent analysis suspicious that the DNC hack was a Russian intelligence job, try this.

For some more technical information on one of the alleged DNC infiltrators, here you go.

July 27, 2016 - Posted by | Deception | ,

2 Comments »

  1. Far be it for the U.S. to interfere with foreign governments and their elections.

    Abraham Lincoln said, “America will never be destroyed from the outside. If we falter and lose our freedoms, it will be because we destroyed ourselves.”

    The traitors within are far more dangerous.

    If it was the Russians, they did us a favor. Pity that the proven corruption of the election primaries isn’t a focus for the majority. Mercans would rather focus on an outside enemy than recognize our legal and moral imperatives to clean house here at home.

    Comment by rediscover911com | July 27, 2016 | Reply

  2. Excellent post — thanks, Peter Van Buren and Aletho News! I made a point at a homepage site yesterday, and I’m surprised I haven’t seen it by someone with more credibility and clout than I: when discussing a foreign power’s attempt to “sway” another nation’s election process or another issue under massive internal contention, the gold (Jewish gold) standard was met in (?) May 2015 when the psychotic B. Netanyahu attempted to “sway” the US’ leadership (sic) and dumbed-down public via his joint-houses appearance on Capitol Hill re the ongoing Iran nuclear-area negotiations. B. Obama has already condemned Russia in this case without a smidgen of supportable evidence; how many balls/nuts did he have vis-à-vis the Nut Netanyahu?

    Comment by roberthstiver | July 28, 2016 | Reply


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s