A National Security Agency whistleblower said Wednesday there is a possibility that the NSA itself hacked the Democratic National Committee's emails and gave the files to WikiLeaks founder Julian Assange.

"The first thing I would look at is, think about the attack," said Bill Binney, who was the NSA's technical director for intelligence before his resignation in 2001, on Fox News' "Fox & Friends" program. "Therefore, a lot of people know it ... I know that a lot of people in our government like to make the Russians enemies. If you use them as the primary culprit, then it diverts attention from the basic issues."

Further, he said, the NSA has access not only to the DNC's emails, but even Hillary Clinton's. "They have the emails," the whistleblower said. "They collect them through the Fairview program."

According to The New York Times, Fairview was a secret surveillance program that started in 1985, to collect internet communications.

Several former intelligence officials have confirmed that AT&T was the NSA's partner in the program, the Times reported.

"They collect content. It's all there," Binney told Fox News about the NSA. "They have it already available and the FBI has direct access to those databases."

He insisted that there are ways to prove who leaked the DNC emails.

"All they have to do is go in the network log and analyze to see who was accessing it," said Binney. "The IP addresses and all the MAC numbers coming in tell you the devices and where they are in the world. You can look around and find out who really did it and that's what they need to prove."

The mode of attack on the DNC server, though, was one that was used by Russian hackers in the past, said Binney, but still, that means "many people know about it and have their way to do it. I think they could execute it, too."

Also, he said that since the type of attack is known, "the service providers that provide security for your networks should be able to defend against it. That raises the other question, why isn't it that they weren't defended?"

The servers may not have been protected because intelligence agencies "like to have views into devices or through systems, networks and firewalls and things like that," Binney continued. "So, that means that they would like to have those weaknesses sustained ... if you don't fix things, you know, you stay weak and exposed. And that's really what's been going on."