This editorial appears in the March 8, 2019 issue of Executive Intelligence Review.

EDITORIAL

Bill Binney and Larry Johnson Shred Robert Mueller’s Russian Hack Fable

[Print version of this editorial]

March 4: LaRouche PAC TV has just conducted a 45-minute interview with Bill Binney.

Feb. 26—Bill Binney, the former Technical Director of the NSA, and Larry Johnson, formerly of the CIA, wrote the article reprinted below. In a sane nation, it would have been published widely in prominent media, discussed, and debated. Binney and Johnson would have been immediately contacted by Special Counsel Mueller, because what they have written destroys the entire narrative of Russian cyberwar to swing the 2016 election to Donald Trump. Congress would be beating down their doors to learn more. In a sane nation, people would be pursuing truth based on scientific proofs. That is not the nation of the present. In our view, to reassert its sanity, the nation must now demand that Robert Mueller refute, beyond a reasonable doubt, what is presented by Binney and Johnson. That is the resounding demand which must meet the specious fake report he is about to present to the Attorney General.

Guccifer 2.0 Is a Fable

Bill Binney and members of the Veteran Intelligence Professionals for Sanity (VIPS) published a study back in 2017 showing that Guccifer 2.0, the online persona who first claimed responsibility for the alleged Democratic National Committee (DNC) hack, was a fabrication. Their study was based on a metadata analysis of the documents released by Guccifer 2.0. The metadata gave evidence that the files were downloaded at speeds consistent with, and in a manner consistent with copying to a thumb-drive or a storage device, rather than through an internet hack.

As a result, the President or someone close to him asked Mike Pompeo, at that time the head of the CIA, to meet with Binney. Binney demonstrated to Pompeo that the President was being systematically lied to by the intelligence agencies about the Russian cyberwar election-meddling fable, which has now been used to cripple the Trump Presidency for over two years. Binney offered to assist in an investigation to unearth the truth as to the perpetrators of the lie, but he never heard a word back thereafter. When Patrick Lawrence reported on the VIPS study in The Nation magazine (which has since prepended a long editorial note), his journalistic career came under sustained attack, as did the VIPS study more generally.

No Hack, a Leak: Not the Russians

Now Binney has examined the metadata of the actual DNC files published by WikiLeaks and demonstrated that they are also consistent with transfer to a thumb-drive or another storage device rather than a Russian internet-based hack. Although this story has received some attention (as on the Gateway Pundit and ZeroHedge), it must receive the broadest possible circulation.

Unlike the claims by the intelligence community and Mueller, this analysis by Binney and Johnson is a public, verifiable forensic analysis of the WikiLeaks releases, which established that Hillary Clinton was attempting to rig the Democratic primaries against Bernie Sanders and that Hillary Clinton was a craven pawn of Wall Street. Both the Obama Administration’s January 2017 Intelligence Community Assessment and Robert Mueller’s indictment of twelve Russian military intelligence agents for perpetrating the hacks of the DNC and John Podesta, rely on findings (lacking available supporting data) reported by CrowdStrike, a private firm, heavily linked to the war hawks in the Atlantic Council and the Democratic National Committee.

As is well known, the FBI never examined the DNC computers or the computer of John Podesta and instead adopted the analysis of the DNC vendor, CrowdStrike, to make claims of the highest possible impact on the national security of the citizens of the United States.

As former NSA Technical Director Binney knows and states publicly, if the Russian hack occurred as the intelligence community assessments and Robert Mueller claim, the NSA would have been able to trace it and attribute it specifically as to times and places. This has never happened, simply because the hacking scenario advocated by Mueller and the Obama intelligence community never happened.

This is a matter of war and peace, because the Russian hack false narrative is a central element in fomenting a new and very dangerous Cold War between the United States and Russia.

Why the DNC Was Not Hacked by the Russians

We reprint below a copy of the full article by William Binney, former Technical Director, NSA and Larry C. Johnson, former State Department Counter Terrorism and CIA, first published Feb. 13, 2019.

The FBI, CIA and NSA claim that the DNC emails published by WikiLeaks on July 26, 2016 were obtained via a Russian hack, but more than three years after the alleged “hack” no forensic evidence has been produced to support that claim. In fact, the available forensic evidence contradicts the official account that blames the leak of the DNC emails on a Russian internet “intrusion.” The existing evidence supports an alternative explanation—the files taken from the DNC between May 23-25, 2016 and were copied onto a file storage device, such as a thumb drive.

If the Russians actually had conducted an internet-based hack of the DNC computer network, then the evidence of such an attack would have been collected and stored by the National Security Agency. The technical systems to accomplish this task have been in place since 2002. The NSA had an opportunity to make it clear that there was irrefutable proof of Russian meddling, particularly with regard to the DNC hack, when it signed on to the January 2017 “Intelligence Community Assessment,” regarding Russian interference in the 2016 Presidential election:

We also assess Putin and the Russian Government aspired to help President-elect Trump’s election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him. All three agencies agree with this judgment. CIA and FBI have high confidence in this judgment; NSA has moderate confidence.

‘Moderate’ vs. ‘Full’ Confidence

The phrase, “moderate confidence” is intelligence speak for “we have no hard evidence.” Thanks to the leaks by Edward Snowden, we know with certainty that the NSA had the capability to examine and analyze the DNC emails. NSA routinely “vacuumed up” email traffic transiting the U.S. using robust collection systems (whether or not anyone in the NSA chose to look for this data is another question). If those emails had been hijacked over the internet, then NSA also would have been able to track the electronic path they traveled over the internet. This kind of data would allow the NSA to declare without reservation or caveat that the Russians were guilty. The NSA could admit to such a fact in an unclassified assessment without compromising sources and methods. Instead, the NSA only claimed to have moderate confidence in the judgement regarding Russian meddling. If the NSA had hard intelligence to support the judgement the conclusion would have been stated as “full confidence.”

We believe that Special Counsel Robert Mueller faces major embarrassment if he decides to pursue the indictment he filed—which accuses 12 Russian GRU military personnel and an entity identified as, Guccifer 2.0, for the DNC hack—because the available forensic evidence indicates the emails were copied onto a storage device.

According to a DOJ press release on the indictment of the Russians, Mueller declares that the emails were obtained via a “spear-phishing” attack:

In 2016, officials in Unit 26165 began spear-phishing volunteers and employees of the presidential campaign of Hillary Clinton, including the campaign’s chairman. Through that process, officials in this unit were able to steal the usernames and passwords for numerous individuals and use those credentials to steal email content and hack into other computers. They also were able to hack into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC) through these spear-phishing techniques to steal emails and documents, covertly monitor the computer activity of dozens of employees, and implant hundreds of files of malicious computer code to steal passwords and maintain access to these networks.

The officials in Unit 26165 coordinated with officials in Unit 74455 to plan the release of the stolen documents for the purpose of interfering with the 2016 presidential election. Defendants registered the domain DCLeaks.com and later staged the release of thousands of stolen emails and documents through that website. On the website, defendants claimed to be “American hacktivists” and used Facebook accounts with fictitious names and Twitter accounts to promote the website. After public accusations that the Russian government was behind the hacking of DNC and DCCC computers, defendants created the fictitious persona Guccifer 2.0. On the evening of June 15, 2016 between 4:19PM and 4:56PM, defendants used their Moscow-based server to search for a series of English words and phrases that later appeared in Guccifer 2.0’s first blog post falsely claiming to be a lone Romanian hacker responsible for the hacks in the hopes of undermining the allegations of Russian involvement.

FAT Files Aren’t Hacked Files

Notwithstanding the DOJ press release, an examination of the WikiLeaks DNC files does not support the claim that the emails were obtained via spear-phishing. Instead, the evidence clearly shows that the emails posted on the WikiLeaks site were copied onto an electronic media, such as a CD-ROM or thumb-drive before they were posted at WikiLeaks. The emails posted on WikiLeaks were saved using the File Allocation Table (FAT) computer file system architecture.

An examination of the WikiLeaks DNC files shows they were created May 23, 25, and 26, respectively. The fact that they appear in a FAT-system format indicates the data was transferred to a storage device, such as a thumb drive.

How do we know? The truth lies in the “last modified” time stamps on the WikiLeaks files. Every single one of these time stamps ends in an even number. If you are not familiar with the FAT-file system, you need to understand that when a date is stored under this system the data rounds the time to the nearest even numbered second.

We have examined 500 DNC email files stored on WikiLeaks and all 500 files end in an even number—2, 4, 6, 8 or 0. If a system other than FAT had been used, there would have been an equal probability of the time stamp ending with an odd number. But that is not the case with the data stored on the WikiLeaks site. All end with an even number.

The DNC emails are in 3 batches (times are GMT).

Date | Count | Min Time | Max Time | FAT | Min ID | Max ID

2016-05-23 | 10520 | 02:12:38 | 02:45:42 | x | 3800 | 14319

2016-05-25 | 11936 | 05:21:30 | 06:04:36 | x | 1 | 22456

2016-08-26 | 11357 | 14:11:36 | 20:06:04 | x | 22457 | 44053

The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power—in other words, an infinitely high order.

This data alone does not prove that the emails were copied at the DNC headquarters. But it does show that the data/emails posted by WikiLeaks did go through a storage device, like a thumb-drive, before WikiLeaks posted the emails on the World Wide Web.

This fact alone is enough to raise reasonable doubts about Mueller’s indictment accusing twelve Russian soldiers as the culprits for the leak of the DNC emails to WikiLeaks. A savvy defense attorney will argue, and rightly so, that someone copied the DNC files to a storage device (e.g., USB thumb-drive) and transferred that to WikiLeaks.

We also tested the hypothesis that WikiLeaks could have manipulated the files to produce the FAT result by comparing the DNC email files with the Podesta emails (aka Larter file) that was released September 21, 2016. The FAT file format is NOT present in the Podesta files. If WikiLeaks employed a standard protocol for handling data/emails received from unknown sources, we should expect the File structure of the DNC emails to match the file structure of the Podesta emails. The evidence shows otherwise.

There is further compelling technical evidence that undermines the claim that the DNC emails were downloaded over the internet as a result of a spear-phishing attack. Bill Binney, a former Technical Director of the National Security Agency, along with other former intelligence community experts, examined emails posted by Guccifer 2.0 and discovered that those emails could not have been downloaded over the internet as a result of a spear-phishing attack. It is a simple matter of mathematics and physics.

Shortly after WikiLeaks announced it had the DNC emails, Guccifer 2.0 emerged on the public stage, claiming that “he” hacked the DNC and that he had the DNC emails. Guccifer 2.0 began in late June 2016 to publish documents as proof that “he” had hacked from the DNC.

Taking Guccifer 2.0 at face value—i.e., that his documents were obtained via an internet attack—Bill Binney conducted a forensic examination of the metadata contained in the posted documents based on internet connection speeds in the United States. This analysis showed that the highest transfer rate was 49.1 megabytes per second, which is much faster than possible from a remote online connection. The 49.1 megabytes speed coincides with the download rate for a thumb-drive.

Forensic Testing of Internet

Transmission Rates

Binney, assisted by other colleagues with technical expertise, extended the examination and ran various forensic tests from the Netherlands, Albania, Belgrade and the UK. The fastest rate obtained—from a data center in New Jersey to a data center in the UK—was 12 megabytes per second, which is less than a fourth of the rate necessary to transfer the data, as it was listed from Guccifer 2.0.

The findings from the examination of the Guccifer 2.0 data and the WikiLeaks data do not prove who copied the information to a thumb-drive, but it does provide an empirical alternative explanation that undermines the Special Counsel’s claim that the DNC was hacked. According to the forensic evidence for the Guccifer 2.0 data, the DNC emails were not taken by an internet spear-phishing attack. The data breach was local. It was copied from the network.

There is other circumstantial evidence that buttresses the conclusion that the data breach was a local effort that copied data.

First, there is the Top-Secret information leaked by Edward Snowden. If the DNC emails had been hacked via spear-phishing (as alleged by Mueller) then the data would have been captured by the NSA by means of the Upstream program (Fairview, Stormbrew, Blarney, Oakstar) and the forensic evidence would not modify times—the data would be presented as sent.

Bizarre Timelines

Second, we have the public reporting on the DNC and CrowdStrike, which provide a bizarre timeline for the alleged Russian hacking.

It was April 29, 2016, when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible.

According to CrowdStrike founder, Dimitri Alperovitch, his company first detected the Russians mucking around inside the DNC server May 6, 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:

Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike’s experts believed was affiliated with the FSB, Russia’s answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.

And what did CrowdStrike do about this? Nothing. According to Michael Isikoff, CrowdStrike claimed their inactivity was a deliberate plan to avoid alerting the Russians that they had been “discovered.” This is nonsense. If a security company detected a thief breaking into a house and stealing its contents, what sane company would counsel the client to do nothing in order to avoid alerting the thief?

We know from examining the WikiLeaks data that the last message copied from the DNC network is dated Wed., May 25, 2016 08:48:35. No DNC emails were taken and released to WikiLeaks after that date.

CrowdStrike waited until June 10, 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire magazine’s Vicky Ward that:

Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office.

Why does a cyber security company wait 45 days after allegedly uncovering a massive Russian attack on the DNC server to take concrete steps to safeguard the integrity of the information held on the server? This makes no sense.

DNC Emails Were Downloaded & Copied

A more plausible explanation is that it was discovered that emails had been downloaded from the server and copied onto a device like a thumb-drive. But the culprit had not yet been identified. We know one thing for certain—CrowdStrike did not take steps to shut down and repair the DNC network until 18 days after the last email was copied from the server.

The final curiosity is that the DNC never provided the FBI access to its servers in order for qualified FBI technicians to conduct a thorough forensic examination. If this had been a genuine internet hack, it would be very easy for the NSA to identify when the information was taken and the route it moved after being hacked from the server. The NSA had the technical collection systems in place to enable analysts to know the date and time of the messages. But that has not been done.

Taken together, these disparate data points combine to paint a picture that exonerates alleged Russian hackers and implicates persons within our law enforcement and intelligence community taking part in a campaign of misinformation, deceit and incompetence. It is not a pretty picture.