Note: this isn’t our normal fare on WUWT, but we do occasionally carry political pieces. What makes this interesting is that Steve McIntyre (ClimateAudit) is involved in researching it. -Anthony
Guest Essay Leo Goldstein, Science for Humans and Freedom Institute
The CrowdStrike Con
CrowdStrike is the network security company, that was called by the DNC when it suspected a breach in its network in early May of 2016. CrowdStrike announced that there were at least two breaches by “two separate Russian intelligence-affiliated adversaries” — Fancy Bear (APT28) and Cozy Bear (APT29). CrowdStrike even suggested that Fancy Bear belongs to GRU (Russian military intelligence) and Cozy Bear belongs to FSB (Federal Security Service, replacement of KGB). The DNC was satisfied with CrowdStrike service and refused to let the FBI examine its servers, surprising even James Comey. All data and alleged malware samples that were given to the FBI, CIA, NSA, DNI, other security companies, and the public came from CrowdStrike. There is something fishy in this, isn’t it? Especially when we learn that
In my opinion: CrowdStrike is a fraud
From its beginning in 2012, CrowdStrike has been using fraudulent attribution methodology to attract publicity, to confuse customers, and to alarm potential customers. Alarmism and fraud were hallmarks of Obama’s administration. CrowdStrike’s close relationship with the Obama administration, especially FBI Director Robert Mueller (until 2013), and rotating door between them ensured not only impunity, but quick success. CrowdStrike was valued at $3B in the last investment round, and closed around June 16.
Since around 2005, corporations and government agencies faced a new kind of cyberthreat: external intrusions into their networks followed by data theft. Technological solutions have failed. The intrusions usually started when hackers obtained some insider’s password or tricked a user into installing malware on his or her computer inside of the network. Malware components are frequently the same or similar, because hackers sell code to each other and frequently open source it. The hackers are caught only rarely. A hacker anywhere in the world can use an intermediate computer anywhere else in the world. The Obama administration had other priorities than securing U.S. networks.
Volunteers and security companies classified hackers’ methods and malware families. In 2011, Dmitri Alperovitch, a former VP of threat research in McAfee, came up with a trick. He announced: “You don’t have a malware problem, you have an adversary problem.” He claimed that advanced malware families are unique to hacker groups, and that the hacker groups can be identified by the kind of malware they use. This was a false statement. Alperovitch doubled down by claiming that he could identify a foreign government behind most intrusions. Thus, he moved the discussion from the technical realm into the political one. In his first attribution he pointed finger at China. Later, Alperovitch even claimed to know which unit of PLA had committed intrusion, and the DOJ indicted its officers!
It was patently absurd and Alperovitch had to struggle. He started one company, then joined the board of another one until he met a person who fell for his trick: Shawn Henry. He was the executive assistant director to Robert Mueller, who appointed him in 2010. By that time, Mueller already had a solid track record of incompetence and self-service: he missed 9/11 and botched an anthrax investigation, but mastered the use of “process crimes” against white collar defendants (such as Martha Stuart), and created a cachet of FBI cadres personally loyal to him. In March 2012, Mueller’s appointee Shawn Henry retired from the FBI to join Alperovitch and George Kurtz in CrowdStrike. With such connections, the business was booming. Shawn Henry is current president of CrowdStrike Services & CSO.
Alperovitch also became a media star. When a big data loss is announced, nobody wants to listen to technical details. People want to know whodunnit. Honest cybersecurity experts did not know. Alperovitch claimed he did and was always able to point a finger at the governments of China, Russia, Iran, or North Korea. Some of these attributions might have been accidentally correct. It is possible that CrowdStrike clients liked this approach as well. Being hacked by China or Russia sounds better than being hacked by an unknown guy in the Bahamas or some other exotic location. Of course, CrowdStrike was embraced by the Obama administration, and enjoyed all the perks that came from this embrace.
Alperovitch did not make a secret of his method. When CrowdStrike encountered a new type of malware, the first thing it did was a national attribution, which was reflected in the name of the group, and alleged having exclusive possession of it. For example, alleged Russian groups were given a name ending with Bear. Thus, the national attribution is made first and could not be changed no matter how much contrary evidence accumulates later.
The revolving door between CrowdStrike and Obama administration also deserves mention. For example, Steven Chabinsky, a Deputy Assistant Director of the FBI Cyber Division under Robert Mueller, was hired by Crowdstrike in September 2012. He became CrowdStrike’s general counsel and chief risk officer. On April 13, 2016, he has been appointed by Obama to the Commission on Enhancing National Cybersecurity (press release). It was two or three weeks before the DNC invited CrowdStrike to investigate and/or to make a cover story of the DNC data leak.
The Hillary Campaign
Note that the date when CrowdStrike was called in and other factual details differ between the stories told by CrowdStrike in 2016 and by the DNC in a lawsuit filed on April 20, 2018 (Democratic National Committee v. the Russian Federation, General Staff of the Armed Forces of the Russian Federation … Donald J. Trump for President Inc. …). The date was May 6 according to CrowdStrike and April 28 according to the DNC. This is how dumb the Democratic Party became; not surprising that it has selected Michael Mann as the climate advisor and Dmitri Alperovitch as the cybersecurity advisor. According to CrowdStrike, within 10 seconds its software “found” the culprit. The lot fell on the Russian government.
The DNC was unmoved. It knew that Putin preferred Democrats to Republicans. The Obama administration had just accommodated Putin’s unprovoked aggression against Ukraine. Putin annexed the Crimean Peninsula and occupied the most industrially developed areas of Ukraine without much reaction from the U.S. Compare that to the U.S. reaction in 2008 when Russia clashed with Georgia after the latter shelled Russian forces there. George W. Bush sent a destroyer with “humanitarian aid,” which I think was an overreaction. Trump promised, and proved, to be a stronger president than Bush. Hillary was not just accommodating to Russia. On the photos of Hillary and Putin together, she looks like his girlfriend. Not to mention Uranium One and other love stories.
Hillary knew that Putin would hold her back. On June 14, 2016, the DNC coordinated a Washington Post article about a security breach in the DNC and a simultaneous publication of alleged technical details by CrowdStrike. Both laid blame squarely on the Russian government. The Russian government denied responsibility, as expected. The WaPo article claimed that no donor information had been accessed and only a few documents had been stolen, including an opposition research on Trump. The next day the mentioned opposition research was posted on the web by somebody calling himself Guccifer 2.0.
When journalists looked at this document they discovered an error message in Russian. The fifth estate (acting more like the fifth column) wrote that that was a proof that the Russian government had been behind the intrusion. The ultra-sophisticated GRU hackers made a mistake by copying and pasting the content of the original file on a computer with default Russian language settings! The journalists writing on the subject did not give a thought to the fact that Russian is the native language to tens of millions of people outside of Russia. Those who did probably decided not to write about it at all.
The opposition research file with “Russian fingerprints” might had been forged by the DNC or CrowdStrike and fed to the purported hackers with two purposes: to bring attention to the content (i.e., smears) against Trump, and to prove the “Russian connection.” That suggests that somebody involved (in the DNC or CrowdStrike) did not believe in the Russian connection from the beginning.
By its own admission, CrowdStrike watched over the activities of two teams of alleged Russian government hackers from May 6 until early June. Such behavior doesn’t make sense. Even given the infinite trust Hillary had in Putin, the DNC’s IT department should have shut down the Internet connection immediately, then changed all passwords and sanitized all computers. Apparently, in 2016 Obama’s friends felt they didn’t need to make their lies believable. If somebody didn’t believe, it was his problem.
But the only meaningful question is who released the DNC’s dirty laundry to the public, not whether the DNC had been hacked, by whom, or how many times. Some think the documents were originally leaked by DNC staffer Seth Rich, who was later murdered. The first document dump had a bad surprise for the DNC – files with the names and other information of the donors. Something went not according to plan.
Between June 18 and July 14, Guccifer 2.0 published multiple documents from the DNC network, and these documents were doing real harm to Hillary. At this point, even somebody trusting CrowdStrike would understand that the documents were not coming from the Russian government. Remember how Russia released the eavesdropping recording from the U.S. Embassy in Ukraine, following 2014 invasion of Crimea? It posted a single recorded conversation between the top U.S. diplomat for Europe Victoria Nuland and the Ambassador to Ukraine Geoffrey Pyatt on YouTube, then used a third party to bring attention to that video. The advantages of a small release: no risk that the important document gets lost among many unimportant ones; the sources and methods are less likely to be compromised; other documents remain hidden for future use, and the target is kept in dark about the extent of the data loss. The bulk release is typical of individual leakers or hackers. The DNC probably cultivates atmosphere of blind trust, because Hillary seemed to continue believing that Russia had leaked those documents.
Hillary felt betrayed by Putin. Hell hath no fury like hers. Hillary and the Democratic Party started accusing Russia and Putin of all thinkable and unthinkable crimes, attempting to re-start the Cold War with a single purpose – to remain in power. That brings to mind the words of one of the largest Democrat donors and climate alarmists Tom Steyer in an interview with Rolling Stone: “Maybe we can have, like, a nuclear war and then we get a real course correction.” Two years have passed, but who knows how long they’ve been dreaming about a nuclear war. Before Trump, Steyer was equally obsessed with carbon dioxide.
Within less than six months from July to December 2016, the electronic media, joined at the hips with the DNC, entirely rewrote the history of Hillary-Putin relationships. Even many conservative writers forgot that Hillary started to malign Russia and Putin in July 2016 after the alleged hacking and leaking of the DNC documents. Hillary had excellent relationships with Putin before the leak. The DNC leak caused Hillary’s hostility towards Putin and Russia, not the other way around. That’s easy to see with Google Trends, as shown below.
The “consensus” around the DNC leaks attribution was manufactured through circular reasoning. CrowdStrike published samples of malware, which it had allegedly found on the DNC servers, and some security firms supported its baseless attribution claims to scare up some business and to stay in good grace with putative winners of future elections. Later, Obama’s cadres in the DNI, CIA, and FBI used the same compromised data to compose an intelligence community assessment, falsely claiming that the Russian government interfered in the 2016 elections against Hillary. An unclassified version of it has been published on January 6, 2017. The FBI and CIA expressed high confidence in the assessment, but the NSA distinguished itself by expressing only moderate confidence.
Steve McIntyre Weighs in
Steve McIntyre performed some analyses and wrote about the DNC leak in ClimateAudit. I cannot express it better, so I quote:
https://climateaudit.org/2017/09/02/email-dates-in-the-wikileaks-dnc-archive/
Yesterday, Scott Ritter published a savage and thorough critique of the role of Dmitri Alperovitch and Crowdstrike, who are uniquely responsible for the attribution of the DNC hack to Russia. Ritter calls it “one of the greatest cons in modern American history”. Ritter’s article gives a fascinating account of an earlier questionable incident in which Alperovitch first rose to prominence – his attribution of the “Shady Rat” malware to the Chinese government at a time when there was a political appetite for such an attribution.
There were no fewer than 14409 emails in the Wikileaks archive dating after Crowdstrike’s installation of its security software. In fact, more emails were hacked after Crowdstrike’s discovery on May 6 than before. Whatever actions were taken by Crowdstrike on May 6, they did nothing to stem the exfiltration of emails from the DNC.
Isn’t it fun to work with a security company like this? I couldn’t care less what security companies the DNC uses to secure its own network, but Obama’s administration gave CrowdStrike government contracts. It also allowed countless leaks of confidential information from supposedly secure government networks – hardly a coincidence.
https://climateaudit.org/2018/03/24/attribution-of-2015-6-phishing-to-apt28/
In two influential articles in June 2016, immediately following the Crowdstrike announcement, SecureWorks (June 16 here and June 26 here) purported to connect the DNC hack to a 2015-6 phishing campaign which they attributed to APT28. …
Attribution of the phishing campaign to APT28 was therefore done on the basis of infrastructure connections. But while there is an infrastructure association to APT28 but there is also an association to a prominent crimeware gang.
APT stands for Advanced Persistent Threat. APT28 is Fancy Bear.
https://climateaudit.org/2017/10/06/whiskers-on-software-part-1/
In Crowdstrike’s original announcement that “Russia” had hacked the DNC, Dmitri Alperovitch said, on the one hand, that the “tradecraft” of the hackers was “superb” and their “operational security second none” and, on the other hand, that Crowdstrike had “immediately identified” the “sophisticated adversaries … I draw the contrast to draw attention to the facial absurdity of Crowdstrike’s claim that the tradecraft of the DNC hackers was “superb” – how could it be “superb” if Crowdstrike was immediately able to attribute them?
In fact, when one looks more deeply into the issue, it would be more accurate to say that the clues left by the DNC hackers to their “Russian” identity were so obvious as to qualify for inclusion in the rogue’s gallery of America’s Dumbest Criminals, criminals like the bank robber who signed his own name to the robbery demand.
To make matters even more puzzling, an identically stupid and equally provocative hack, using an identical piece of software, had been carried out against the German Bundestag in 2015.
Bundestag fire!
https://climateaudit.org/2017/10/10/part-2-the-tv5-monde-hack-and-apt28/
“Re-reading the two stages of contemporary articles, the first analyses of malware, linking back to malware known in Arabic language forums, to IP addresses in Iraq and Algeria and to jihadi-sympathizing hackers, are much more specific than the subsequent analyses attributing the hack to APT28, which did not present a single technical detail (hash, IP address etc.) It is also frustrating and troubling that the proponents of APT28 attribution did not discuss and refute the seemingly plausible connections to jihadi sources. It is also troubling that so much emphasis in contemporary discussion of FireEye’s analysis incorrectly associated the Cyrillic characters previously described by FireEye in October 2014 with the TV5 Monde incident.
Second, the confidence of attribution to APT28 was dramatically aggrandized in subsequent reporting, fostered in part by inaccurate original reporting. Contrary to newspaper reports, Trend Micro did not attribute the seizure of TV5 facilities to APT28. Its assessment was indeterminate, weakly preferring that the seizure was separate from APT28 eavesdropping.”
https://climateaudit.org/2017/10/02/guccifer-2-from-january-to-may-2016/
“To my eye, there is convincing evidence that G2 actually hacked Democrat Party computers from at least January 2016 on. This is inconsistent with Adam Carter’s theory that G2 was a false flag operation by Crowdstrike and the DNC – the metadata points to too early a start to support such a theory. G2 metadata also points too early for G2 to be a false flag by Fancy Bear/APT28 who are said to have gained access only in April 2016.”
See more at https://climateaudit.org/?s=crowdstrike and https://climateaudit.org/?s=guccifer.
Details
History Rewriting
The following Google Trends graph shows the ratio of Google searches for Putin and Russia over time. The number of searches is a proxy for the ratio of mentions in the media. The media was totally on Hillary’s side. She controlled the media narrative on Russia and Putin. The red line for Russia stays low in the range of 30-40% from the beginning of 2016 until the week of July 24. Discovery of the data leak is not noticeable. Even announcement of DNC hacking by Russia on June 14 coincides with only little bump for Russia searches. The lines for both Putin and Russia go up on the week of July 24, after Hillary became angry with continuing publication of the leaked documents and decided to connect Putin to Trump, and to malign them together. From the early October until after the elections the searches for Russia and Putin stay at abnormally high level. Searches for Putin reach peak on the election week, starting at November 6.
Anybody can search MSM websites and see many articles from August – November of 2016, alleging that Trump is associated with Putin and that Hillary would “hold Putin accountable” for something.
Note also that John Brennan made a friendly visit to his colleagues in Moscow in March 2016. That shows that neither the Obama administration nor Brennan considered Russia an adversary at that time. Just few months later, all hell had broken loose. The article The Kremlin Really Believes That Hillary Wants to Start a War With Russia (Foreign Policy, September 7, 2016) is a reminder:
“If Hillary Clinton is elected president, the world will remember Aug. 25 as the day she began the Second Cold War.
In a speech last month nominally about Donald Trump, Clinton called Russian President Vladimir Putin the godfather of right-wing, extreme nationalism. To Kremlin-watchers, those were not random epithets. Two years earlier, in the most famous address of his career, Putin accused the West of backing an armed seizure of power in Ukraine by “extremists, nationalists, and right-wingers.” Clinton had not merely insulted Russia’s president: She had done so in his own words.
Worse, they were words originally directed at neo-Nazis. In Moscow, this was seen as a reprise of Clinton’s comments comparing Putin to Hitler. It injected an element of personal animus into an already strained relationship — but, more importantly, it set up Putin as the representative of an ideology that is fundamentally opposed to the United States.
… To Russian ears, Clinton seemed determined in her speech to provide this missing ingredient for bipolar enmity, painting Moscow as the vanguard for racism, intolerance, and misogyny around the globe.
The nation Clinton described was unrecognizable to its citizens. Anti-woman? Putin’s government provides working mothers with three years of subsidized family leave. Intolerant? The president personally attended the opening of Moscow’s great mosque. Racist? Putin often touts Russia’s ethnic diversity. To Russians, it appeared that Clinton was straining to fabricate a rationale for hostilities.
…
That fear [that Hillary might attempt a “regime change” in Russia] was heightened when Clinton surrogate Harry Reid, the Senate minority leader, recently [August 30, 2016] accused Putin of attempting to rig the U.S. election through cyberattacks. That is a grave allegation — the very kind of thing a President Clinton might repeat to justify war with Russia.”
At that time, Putin might have switched his preference from Hillary to Trump. Russian officials probably expressed such preference unofficially — exactly as Hillary wanted. That doesn’t mean Putin was aiding Trump. The Russian government should have thought there was a change in American policy, largely independent of who would win elections. Everyone was sure Hillary would win. Putin did not have a chance to change that. It would be unwise for Putin to even attempt – almost inevitable failure would earn him shrill retaliation, and almost impossible success would only make the adversary stronger. But the show was probably convincing enough even for honest intelligence officers.
Relationships with Russia were already bad in September, but that wasn’t enough for Democrats. To support Hillary, the Obama administration (with John Kerry as Secretary of State) turned minor disagreements with Russia into a conflict. October 12, 2016, CNN:
“It’s not a new Cold War. It’s not even a deep chill. It’s an outright conflict.
US-Russia relations have deteriorated sharply amid a barrage of accusations and disagreements, raising the stakes on issues ranging from the countries’ competing military operations in Syria, disputes over Eastern European independence and escalating cyber breaches.
Washington publicly accused the Kremlin of cyberattacks on election systems and the democracy itself last Friday. That came after talks on a Syria ceasefire broke down as US officials suggested Russia be investigated for war crimes in the besieged city of Aleppo. Moscow has steadfastly denied that it’s meddling in the US presidential election. … Democratic presidential nominee Hillary Clinton has pointed to the hacks as evidence that Russia favors her GOP opponent, Donald Trump. Appearing at an investment forum in Moscow on Wednesday, Russian President Vladimir Putin dismissed that charge. … Meanwhile, Moscow abruptly left a nuclear security pact, citing US aggression, and moved nuclear-capable Iskandar missiles to the edge of NATO territory in Europe. Its officials have openly raised the possible use of nuclear weapons.
And that’s just the highlight reel.”
At the time, the MSM attributed that confrontation to Russian military activity in Syria. In fact, the Democratic Party was fanning flames of war to stay in power. Besides the Democrats’ obscurantism, obsession with political power, and “by any means necessary” attitude, much of this madness has been driven by puny conmen like Michael Mann and Dmitri Alperovitch.
Attribution Fallacies
Attribution of sophisticated network intrusions to specific actors is universally accepted as a very difficult problem. CrowdStrike and similar “solutions peddlers” usually build their case on a chain of very weak assumptions. Russia is home to some of the most sophisticated computer hackers in the world. The first target on which they try their exploits is Russian banks. Their skills and malware code become available to the Russian government when they are caught, or even before that. But they are also available to anybody in the world ready to pay cash. The following parameters and assumptions cannot be used for attribution of intrusions to specific actors.
A) Malware Origin
- Malware is frequently attributed to Russia because Russian words or Cyrillic fonts are found in it, or in earlier versions of it. But Russian is the mother language for many people born and living in Ukraine, Belarus, Kazakhstan, Estonia, Latvia, and Lithuania, and tens of millions of emigrants all over the world, including the U.S.
- An even more stupid and incompetent attribution attempt is the use of malware compilation time and finding that malware has been compiled at the working hours (like 8am to 6pm) for Moscow. In fact:
- Software compilation and build can be scheduled for any time.
- Software companies do builds either continuously or overnight.
- Programmers and hackers rarely work at traditional 9-to-6 schedules.
- Computers building malware can be set to any time, language, and country settings.
- Russia spans eleven hourly time zones, so almost any time is working hours somewhere in Russia.
There is nothing easier for a sophisticated hacker group than to build malware on a computer with Russian settings and/or other Russian fingerprints to lead investigators astray. An analyst sees what a sophisticated adversary wants him to see.
B) Targets
Theoretically, in some cases it’s possible to make an attribution of hacking with certain malware type to a specific government based on the attacked targets. This approach was used to allege that malware from APT28 and APT29, allegedly found on the DNC network, belongs to the Russian government because it was used in the past to attack its targets of interest. But this claim is based on data cherry-picking. The same malware was known to attack all kinds of targets, from banks to national Olympic committees. The majority of reported targets were in Russia. Russia attacks Russia – how foolish is that? Wide range of targets demonstrates activities of multiple hacking groups, some of which possibly working for governments. Security researchers engaged in attribution typically make their mind up early, and then look only at the cases that confirm their hypothesis. Security companies are interested only in attacks on large or rich organizations that can be convinced to purchase their services, and such organizations are easy to declare to be of interest to Russia. Most cyber-attacks are not reported at all. But even the cherry-picked list of incidents suggests that the attribution is incorrect.
C) It’s hard to believe that a government-backed hackers’ group would be using the same malware for years, long after it had been detected, analyzed, and publicly attributed to it. Here, I mean that malware remains the same even after enhancements and modifications – if it can be identified as a derivative of the original. I would expect any such group to continuously develop new and more effective “products” that bear no resemblance to the previous ones. At least, they can change existing code to remove the published identifiers. CrowdStrike and few copycats presumedly tracked APT28 and APT29 from 2008.
D) Circular referencing and bandwagon effect.
The MSM frequently alleges that the “DNC hack” has been confirmed by multiple private security companies, and then by the Intelligence Community Assessment (ICA) from January 6, 2017. In fact, all these confirmations based on data from the same source – CrowdStrike. Some companies and government agencies also relied on its analysis. Other companies jumped on the train with similar flawed attribution methodologies – a bandwagon effect. Actual reports from companies other than CrowdStrike included limitations, qualifications, conditions, and/or limited confidence in the findings. Of course, these nuances were lost in the general media coverage. The readers and viewers were left with wrong impression that all these assessments were independent and unconditional. After ICA publication, cybersecurity companies started to refer to ICA as the ultimate source of authority. In fact, even Obama’s request for ICA was highly prejudicial, demanding “intelligence report assessing Russian activities and intentions in recent U.S. elections.” Thus, Obama has already decided that significant “Russian activities in recent U.S. elections” had taken place, and the intelligence agencies were requested to elaborate on the thesis. Some say that ICA was prepared in violation of existing rules, and was unduly influenced by John Brennan, who had been acting against Trump since at least August 2016. (https://americaoutloud.com/u-s-intelligence-communitys-contrived-intelligence-assessment/)
The following is an example of a circular evidence trail by a security professional and a corporate officer who does agree with the attribution of the DNC leak to Russian government:
Difficulty Level – EXTREME: Why is attribution such a challenge?
“When I was serving in cybersecurity in the Department of the Defense, the main lesson I learned was that you can never truly achieve a high-level of confidence in who is attacking you without the triangulation of multiple intelligence sources.
… when you look closely at the evidence that both of these outstanding organizations found in their investigations, they could all potentially be ‘false flags,’ planted by an advance targeted threat actor emulating the capabilities of these supposed Russian actors.”
So what switched him from skepticism to alarmism?
“… the public case made that Russian influence is behind the activity at the DNC has a few holes, but our government, on both sides of the political aisle, seem to be very sure of that conclusion. Based on sheer faith, I will take our government at its word …”
That’s it – sheer faith! The sheer faith is supported by an analysis made by SecureWorks and ICA, which used purported evidence received from CrowdStrike. The sheer faith leads him to affirm the initial detection and attribution by CrowdStrike. BTW, the Republican side of the aisle is represented by Senator Burr, RINO-NC.
Most attribution theories cannot be tested. In the science, such theories are called unfalsifiable, and, therefore, unscientific. But in one rare case, CrowdStrike theory alleging Russian hacking of Ukrainian howitzer control software has been checked – and found false. CrowdStrike retracted its claims in this specific case without any other consequences.
John Brennan, Obama’s CIA Director
The January 2017 assessment makes heavy emphasis on supposedly superb “sources, tradecraft, and analytic work” used by the FBI and CIA. But the words of John Brennan show a different picture.
Brennan Delivers Remarks at the Center for Strategic & International Studies Global Security Forum 2015:
“When CIA analysts look for deeper causes of this rising instability, they find nationalistic, sectarian, and technological factors that are eroding the structure of the international system. They also see socioeconomic trends, the impact of climate change, and other elements that are cause for concern. Let me touch upon a couple of them.
…
Mankind’s relationship with the natural world is aggravating these problems and is a potential source of crisis itself. Last year was the warmest on record, and this year is on track to be even warmer.
Extreme weather, along with public policies affecting food and water supplies, can worsen or create humanitarian crises. Of most immediate concern, sharply reduced crop yields in multiple places simultaneously could trigger a shock in food prices with devastating effect, especially in already fragile regions such as Africa, the Middle East, and South Asia. Compromised access to food and water greatly increases the prospect for famine and deadly epidemics.”
This passage demonstrates traitorcraft rather than tradecraft. Sources are replaced by UN agencies’ policy papers and analytic work is replaced by credo quia absurdum. But James Clapper is even worse.
James Clapper, Obama’s DNI Director
James Clapper appears clean before his appointment as DNI Director in 2010. For six years, Clappers signed the Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence. In Obama’s second term, Clapper started including in them the alleged climate change threat. Climate change was mentioned:
2014 statement (Clapper): once
2015 statement (Clapper): 4 times
2016 statement (Clapper): 8 times, including the following passage:
“Environmental Risks and Climate Change
Extreme weather, climate change, environmental degradation, related rising demand for food and water, poor policy responses, and inadequate critical infrastructure will probably exacerbate—and potentially spark—political instability, adverse health conditions, and humanitarian crises in 2016. Several of these developments, especially those in the Middle East, suggest that environmental degradation might become a more common source for interstate tensions. We assess that almost all of the 194 countries that adopted the global climate agreement at the UN climate conference in Paris in December 2015 view it as an ambitious and long-lasting framework.
- The UN World Meteorological Organization (WMO) report attributes extreme weather events in the tropics and sub-tropical zones in 2015 to both climate change and an exceptionally strong El Niño that will probably persist through spring 2016. An increase in extreme weather events is likely to occur throughout this period, based on WMO reporting. Human activities, such as the generation of greenhouse gas emissions and land use, have contributed to extreme weather events including more frequent and severe tropical cyclones, heavy rainfall, droughts, and heat waves, according to a November 2015 academic report with contributions from scientists at the National Oceanic and Atmospheric Administration (NOAA). Scientists have more robust evidence to identify the influence of human activity on temperature extremes than on precipitation extremes.
- The Paris climate change agreement establishes a political expectation for the first time that all countries will address climate change. The response to the deal has been largely positive among government officials and nongovernmental groups, probably because the agreement acknowledges the need for universal action to combat climate change along with the development needs of lower-income countries. However, an independent team of climate analysts and the Executive Secretary of the UN climate forum have stated that countries’ existing national plans to address climate change will only limit temperature rise to 2.7 degrees Celsius by 2100.”
This asinine opinion, attributed to the intelligence community by James Clapper, adds injury to insult by referring to UN bodies four times, each time taking them as sources of authority.
The following statements were made by Clapper in person at Intelligence and National Security Alliance (https://www.insaonline.org) conference in September 2016 (https://archive.is/J32Hm):
“In the coming decades, an underlying meta‐driver of unpredictable instability will be, I believe, climate change. Major population centers will compete for ever‐diminishing food and water resources and governments will have an increasingly difficult time controlling their territories.”
“Well, I alluded to that briefly in my remarks, and I do think climate change is going to be an underpinning for a lot of national security issues. The effect on climate, which drives so many things ‐‐ availability of basics like water and food, and other resources, which are increasingly going to become matters of conflict, and already are, between and among countries. And so this is going to give rise to national security insight that we’ll need to understand this and hopefully help anticipate it. So I think climate change over time is going to have a (inaudible) effect on our national security picture.”
Thus, James Clapper lost his mind and/or integrity even before he gave DNI approval to CrowdStrike claims. He continues leveraging climate alarmism to against national security — https://climateandsecurity.org/tag/james-clapper/.
Remarks
Frauds like CrowdStrike were common under Obama’s administration. Theranos, a purported blood testing innovator, raised more than $700 Million between 2011 and 2017 and was valued at $9B at some point. In 2011, the Theranos founder recruited George Shultz, a Secretary of State in Reagan administration and currently “a senior statesman with a climate solution,” as a board member. He brought on more high level political figures. Theranos’ founder Elizabeth Holmes even secured support from Bill Clinton. She also wanted to save the planet from climate change! Theranos never had a working product, technology, or even competent R&D, but politics easily prevailed over technology and science in those years. Investment poured in, Walgreens signed a contract and built in-store booths for Theranos’ blood tests. In 2015, Obama’s FDA approved the non-existent Theranos’ blood testing device! Fortune wrote that Ms. Holmes, a university drop out, was an inventor in 26 patents issued to Theranos. Today, Theranos’ fraud is revealed, but Ms. Holmes walked away with hardly a slap on the wrist.
Google (Alphabet) is an investor in CrowdStrike, having participated in at least three investment rounds in 2015, 2017, and June 2018. Google fails to disclose this and other conflicts of interest in search results related to the companies in which it invests.
Google, Facebook, and Twitter had an opportunity and incentives to use their knowledge and experience in cyber security to explain to the public and Congress the folly of the Russian attribution of the DNC leak and related conspiracy theories when they were called to testify before Congress. They had access to the same information that I do, and Google also had insider’s information about CrowdStrike. Nevertheless, they chose to lie to Congress and the public, and put their weight behind the conspiracy theories, even to the point of accepting a partial blame for the alleged “Russian” actions.
In 2011, Dmitri Alperovitch founded Asymmetric Cyber Operations LLC. Then he joined the board of CounterTack, a cybersecurity firm. MSM usually omits these details of his career.
In February 2017, CrowdStrike sued testing company NSS Labs, apparently to prevent the publication of the NSS Labs test results for a CrowdStrike product. The lawsuit was dismissed.
Following the apparent success of the CrowdStrike fraud, other security companies started to make dubious attributions. Examples are FireEye (FYEY) and SecureWorks (SCWX). When describing APTs, SecureWorks advices incorrectly to “Focus on the ‘who’ not the ‘what’.” For most organizations, the question who is unhelpful, because the answer is anybody or everybody. The network security should be able to handle a threat from anybody, proportionally to the value of the information on the network. This is the same as in the physical security. We don’t ask who when we lock the doors. We lock the doors to protect against all thieves, rather than asking who.
Alperovitch is a fellow of Atlantic Council. I don’t think this is a major factor – his motives are financial gain, and, possibly, media attention.
Here, the word hacker is used in its common meaning — somebody who accesses computer systems without authorization. Initially, it meant something like a darn good programmer, especially in the Linux community.
Other sources of data and analysis of the DNC leaks:
Opinion:
Disclosure
I hold short positions in (bet against) the Google stock.
Other reading
- Jeffrey Carr, The DNC Breach and the Hijacking of Common Sense, June 19-21, 2016
“Attribution is hard enough without cybersecurity companies picking the evidence they need to support the conclusion that they want with threat actor models that are completely devoid of common sense. We can do better.”
- Jeffrey Carr, Faith-based Attribution, July 10, 2016
“It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method. Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong.”
“When it comes to cybersecurity estimates of attribution, no one holds the company that makes the claim accountable because there’s no way to prove whether the assignment of attribution is true or false unless …”
- Jeffrey Carr, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort, December 2016
“A common misconception of “threat group” is that refers to a group of people. It doesn’t.”
“Unlike Crowdstrike, ESET doesn’t assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason.”
“In fact, the source code for X-Agent, which was used in the DNC, Bundestag, and TV5Monde attacks, was obtained by ESET as part of their investigation!”
- Bitdefender, APT28 Under the Scope, 2015
“We have reasons to believe that the operators of the APT28 network are either Russian citizens or citizens of a neighboring country that speak Russian.”
The emphasis is mine. Attacked countries, in the decreasing order of vulnerabilities according to the report: Ukraine, Spain, Russia, UK, Romania, Bulgaria, US, Canada, Portugal, Italy, and Mexico. Why would Russia attack Russia?
- Forbes, Security Advice From The CEO Of The World’s Newest Unicorn – CrowdStrike, May 2017
CrowdStrike CEO George Kurtz about their attribution of the alleged DNC breach: “That work raised our profile considerably, solving a high profile problem, separating us from a crowded field in the security space.”
Given such stunning success, it is quite natural that CrowdStrike doesn’t want to admit to the fraud in their detection and attribution!
“Crowdstrike became one of the most famous brands in the cybersecurity industry last year after securing a contract with the Democratic National Committee.”
“At the start of 2014, President Obama assigned his trusted counselor, John D. Podesta, to lead a review of the digital revolution, its potential and its perils. When Mr. Podesta presented his findings five months later, he called the internet’s onslaught of big data ‘a historic driver of progress.’”
What a joke!
Discover more from Watts Up With That?
Subscribe to get the latest posts sent to your email.

Perhaps the Dems should have hired a crack IT team from, let’s say, Pakistan.
Presuming they (the DNC) would be interested in admitting the truth.
I cracked a rib laughing so hard at that idea
Correction. The Georgian military started shelling civilian areas, after being promised backing from the US state dept
A lot to read there. What’s missing as usual more important : no mention of Obama’s Maidan cookie revolution by Nuland and Christopher Steele ( the very same). Nuland et al boasting how they funded a Bandera putsch, regime change with an openly nazi regime now in place.
Crimea decided to vote back to Russia, there was no annexation, no military assault. In other words the neocons were nicely made complete fools of. No doubt some will try to used this to sabotage Helsinki, but how about another game-changer anyone?
Kiev has hit the headlines again with news that Soros OSF had 150 people in the overthrow .
“Black Cube” turns up again, maybe worth tracing with the above….
And no mention of Vaul 7 , the CIA’s toolkit for just such obfuscation and attribution., and Marble Framework? Ask William Binney and Ray Mc Govern, VIPS veterans.
I saw an interview on the news some time ago. A man that looked at the DNC server said that the download speed was much too fast to have used the internet. I can only assume that interview is out there somewhere. That may explain one breach. It is so easy to plant clues. Download speed is hard to fake.
The internet doesn’t have a “speed”. It has whatever you are willing to pay for.
False.
That was William Binney, NSA whistleblower, designer of Thin Thread, VIPS veteran.
Easy to find. USB stick bandwidth against any kind of WLAN or LAN wins. Count the GB.
How many USB sticks have you used that can transfer data at 1 gigabyte per second?
<—- looks at 10 Gbps switch in rack.
Have a look at this: https://www.thenation.com/article/a-leak-or-a-hack-a-forum-on-the-vips-memo/#vips-dissent
There is a link to it from the original article at the nation: https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/
It includes the dissenting position from other members of the same group, VIPS.
Have you considered what they have to say?
I saw that interview, and the man talking said that it wasn’t possible to move data between countries at a speeds slower that what I’ve moved data between countries. After that point his other credentials and experience didn’t really count. I already knew that his basic position was wrong.
He may know a lot about many things, but modern internet infrastructure isn’t one of them.
Do you suppose that the DNC was running off an ADSL modem?
We Are a Nation (U.S.) of laws. No one is above the law. If we continue down the path where “Elected Elites” and un-elected Bureaucrats are not brought to justice “Equal Under the Law” means nothing, we have no laws .
The USA is a nation of lawyers.
You have to have a lawyer.
Lawyers are unequal.
Good luck.
To a large extent the expression “We Are a Nation (U.S.) of laws” has the addendum “but many (most) are ignored”. It is the consistent application of the laws which is important.
Or as has been said many times, everyone is equal but some are more equal than others.
It was clear watching the Strzok congressional hearing yesterday, that the Dems don’t want the Mueller investigation to ever end, at least not until after the Midterm elections. Because Russia is really all they have at this point. That, and fake pictures of separated immigrant toddlers.
Initially, it meant something like a darn good programmer, especially in the Linux community.
Actually it started out just like it is now … somebody who accesses computer systems without authorization … there where hackers long before Linux was even a twinkle in anyone’s eye …
simple example the movie War Games (1983) … Linux created 1991 …
but the rest of the article is spot on … well done …
Many years ago, I read a really good book: The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage.
I highly recommend it if you are interested in the topic.
https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787
How deeply disturbing.
Just when it looks like Trump is the problem, facts emerhe and prove him correct.
These corrupt, mentally inbred wealthy bureaucrats need to go.
ASAP.
“wealthy bureaucrats need to go.”
Go where? With that kind of money they go where they wish.
lol, good piint.
“Jail” comes to mind.
Almost rhymes with “hell”
https://krebsonsecurity.com/tag/crowdstrike/
krebs has mentioned oddities with them before
“12 RUSSIANS CHARGED WITH HACKING DNC, STATE ELECTIONS” – Drudge.
Be interesting to see how this meshes with this article.
My, how convenient with Trump and Putin meeting this week
One could almost conclude that there’s money to be made in endless war.
Wasn’t Gowdy yelling at people recently to get on with making indictments immediately?
I don’t know, but how convenient it is that they indicted residents of a foreign country where they have no authority.
The last time they indicted Russians in this affair, the Russians asked for disclosure. I wonder how that finally turned out?
Convenient that they’re in a foreign country? Who woulda thunk it, that Russian hackers would be in Russia?
Gowdy meant real indictments about real crimes, and not trumped up evidence/crimes.
Lol, how long did Gowdy investigate Benghazi without result?
Lol, did you really think Loretta Lynch would ever indict HRC, despite the numerous felonies she committed, if so you are truly delusional.
Phil: Not without result, he got the usual result of a congressional investigation into mendacious people in a corrupt administration that the press protects.
Gowdy was calling on Mueller to show evidence Trump has committed a crime or otherwise, shut the investigation down.
They have nothing on Trump. They can’t even run a successful frame job on him using the power of the U.S. government. Although it would have been successful except for the fact that Trump is as clean as the wind-driven snow, and they can’t nail him on anything.
But, I suppose Mueller can drag the investigation on endlessly if that’s his aim. I saw today where Mueller’s public support had dropped seven points in the last week, and that drop took place among Democrats who were polled (Republicans already have a very low opinion of the Mueller investigation). Even Democrats are starting to see there is no “there” there.
How long did watergate take? How long did Gowdy spend investigating Benghazi?
What’s that? Much much longer than Mueller has taken so far, in the first case to bring down a president, and in Gowd’s case, much much longer to not end up with anyone being indicted.
And he’s the one complaining loudest!
Sorry, *Gowdy’s
This is more interesting:
Muller indicts company not in business.
https://www.dailywire.com/news/30556/disaster-mueller-indicted-russian-company-didnt-ryan-saavedra
Exactly! This latest lot of indictments is more of the same. What would be really funny would be if the Russians turned up to defend themselves and we then get a repeat of the prosecution (Mueller) running away from court when told to put up.
Thanks for posting this — perfectly appropriate. Will draw trolls out of the shadows, but exposure of trolls to sunlight is never a bad thing.
Here’s the indictment
https://www.justice.gov/file/1080281/download
That certainly makes for interesting reading.
Well, just finished reading it… wow, things are about to get interesting! Like, really interesting.
Maybe not;
https://theconservativetreehouse.com/2018/07/13/rosenstein-delivers-indictments-for-12-russians-then-buries-in-lock-box-of-doj-national-security-division/
Lol, it’s an indictment. Not a list of evidence. And exactly what the the National Security Division for if not stuff like this?
What’s an indictment?
How is “an indictment” different from the rambling of another random ideatorial blog writer?
Hmm.. Trump was told a week ago by Rosenstein that this was about to happen. I can’t help but wonder if the timing of this article by Ari Halperin, sorry, Leo Goldstein, has anything to do with that?
Coincidence? Quite possibly. But it certainly does make you think.
“Coincidence? Quite possibly. But it certainly does make you think.”
You mean because you suspect that Ari Halperin has an inside line to Trump/Mueller/Rosenstein and he’s desperate to counter this indictment with his article?
I was thinking more along of the lines of a useful nutcase being tipped off by pro Trump forces, that this might be a good time to muddy the waters.
Because in your view, the waters are so clear they need to be muddied?
Do the waters have to be crystal clear before muddying the waters becomes useful? Most people aren’t aware of most of the stuff we’ve been talking about here.
“Do the waters have to be crystal clear before muddying the waters becomes useful? ”
Well if the waters are already muddy…
Yeah, cause there are only two states. Crystal clear and muddy. And they apply equally to people regardless of knowledge and insight.
“Yeah, cause there are only two states. Crystal clear and muddy.”
But you argued the following:
“Do the waters have to be crystal clear before muddying the waters becomes useful?”
Asking if the waters “have to be crystal clear before…” presupposes they aren’t, hence don’t you contradict yourself?
Moreover, I’ve read through your various other comments regarding Ari (Leo Goldstein) Halperin. You don’t offer any substantive criticism of the article’s conclusions itself, rather, you seem to object on the basis that the author is untrustworthy. In other words, you attack the man rather than his argument, a textbook example of the ad hominem logical fallacy.
In which case, why shouldn’t I believe Mr. Halperin and conclude it is you who is attempting to “muddy the waters?” Mr. Halperin has presented substantive evidence for his claims, none of which (in my opinion) is unreasonable. You, on the other hand, have argued against the man rather than his argument. Hence, as it stands now the waters are clear on Mr. Halperin’s side and it would appear the best evidence anyone has regarding your side is that you’ve contradicted yourself (now twice).
By claiming it’s the author who’s attempting to muddy the waters without objecting to any of his conclusions substantively, with all due respect, you seem to have made yourself an hypocrite, while at the same time contradicting your own argument. Who would believe you or take you seriously in such a case?
I recommend you pen your own article contradicting the claims of the author’s with your own evidence and submit it for review here. I’m sure Mr. Watts would consider it.
There is no Mr. Halperin. It’s a made up name. His name is Leo Goldstein.
You suggest that my view is that the waters are so clear that they need to be muddied.
“Because in your view, the waters are so clear they need to be muddied?”
I say that muddying the waters is still a useful tactic even if they weren’t crystal clear to start with. It’s all relative. If you are targeting an audience that doesn’t have all the information or understanding, then what is clear is less important than what they believe.
What they come to believe may not be what has the strongest evidence, because in less than perfectly clear water, it’s easier to lean towards what you already thought was true than what the evidence really supports..
Or something. I’m not that eloquent right now.
Especially if they are about to get some new information. It doesn’t even matter what it is, so long as it dilutes whatever understanding might be gained from the new information coming out.
Again, it may be coincidence, but it sure is convenient timing.
Phil says, “I was thinking of a useful nutcase….” Now Phil, nobody thinks you’re useful.
So you think Leo is a tool of Trump, deployed now because it “may be a good time” to “muddy the waters”. You think Trump would use a climate skeptic blog to launch this disinformation campaign, for maximum saturation. And Leo is a conspiracy nut? Was “projecting” one of Saul Alinsky’s rules, Phil?
Well, were talking about a guy who managed to run the headline here
“Ooops! Not all 31 scientific societies actually signed the AAAS ‘consensus’ letter”
With the sole bit of actual evidence for his lengthy arguments being that not everyone he emailed actually responded to him. No one said to him “you’re right, we didn’t sign that”. The organizations that did respond said “yes, we signed it”. Others didn’t answer.
Conclusion… Not everyone signed it!
Not very scientific. He doesn’t say it casts doubt. His headline directly states that not all of the 31 scientific societies actually signed the letter.
The Obama administration had just accommodated Putin’s unprovoked aggression against Ukraine.
_____________________________________________________
Unprovoked?
When ex-DDR citizen Angela ‘Angie’ Merkel commanded by Obama government and CIA was leading in Georgia tank gunning the sleeping city of Tzchinvaly.
Provoking Russia with embodying the failed, corrupted states Romania and Bulgaria into the EU – which the EU till today neither needs nor can bear. To be honest.
The same with the golden gates of Kiev and and black sea ports of Crimea.
Unprovoked? You’re telling me.
How dare the EU provoke the Mother Russia by inviting two independent countries that were not even part of the USSR to join it?
How dare Britain run for the exit. Someone is just not getting it. Brexit+, Trump, just dared Peace, imagine that, without permission from London. And to add insult to injury, will make a deal with Russia, a good thing!
Mrs. May’s Gov’t is running for the exit. Does anyone in the new EU states read the papers? Who knows what Romania or Bulgaria make of this as they take deliveries of Patriot missile batteries.
I thought Trump gave Teresa May a pretty good vote of confidence today.
From the ultra-left thenation.com, they wrote an article that says a bunch of highly qualified experts looked into the DNC hack on July 5th. One of their results (from the article:
“There was no hack of the Democratic National Committee’s system on July 5 last year—not by the Russians, not by anyone else. Hard science now demonstrates it was a leak—a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system.”
Some more excerpts:
“Qualified experts working independently of one another began to examine the DNC case immediately after the July 2016 events. Prominent among these is a group comprising former intelligence officers, almost all of whom previously occupied senior positions. Veteran Intelligence Professionals for Sanity (VIPS), founded in 2003, now has 30 members, including a few associates with backgrounds in national-security fields other than intelligence. The chief researchers active on the DNC case are four: William Binney, formerly the NSA’s technical director for world geopolitical and military analysis and designer of many agency programs now in use; Kirk Wiebe, formerly a senior analyst at the NSA’s SIGINT Automation Research Center; Edward Loomis, formerly technical director in the NSA’s Office of Signal Processing; and Ray McGovern, an intelligence analyst for nearly three decades and formerly chief of the CIA’s Soviet Foreign Policy Branch. Most of these men have decades of experience in matters concerning Russian intelligence and the related technologies. This article reflects numerous interviews with all of them conducted in person, via Skype, or by telephone.”
“Forensicator’s first decisive findings, made public in the paper dated July 9, concerned the volume of the supposedly hacked material and what is called the transfer rate—the time a remote hack would require. The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.
These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed.”
https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/
Since I’ve saved this article, theNation (last time i looked at the story on their web site about 5 or so weeks ago) has added many paragraphs to it that seems to try and dispel or lessen the imp ace of the original article.
This is a cluster-eff for the dems that hasn’t gone away yet.
FWIW, I’ve been enjoying lots of popcorn on this event over the last 8 or so months!
Thanks Anthony and Steve McIntyre for even more good popcorn enjoyment time! : )
“Since I’ve saved this article, theNation (last time i looked at the story on their web site about 5 or so weeks ago) has added many paragraphs to it that seems to try and dispel or lessen the imp ace of the original article.”
Have you followed the link from that article to the statements from the dissenting members of VIPS, the organization who released the document you link to at the nation?
https://www.thenation.com/article/a-leak-or-a-hack-a-forum-on-the-vips-memo/#vips-dissent
Surely you aren’t just going to take the bit you like the sound of and completely dismiss the other part?
This is stuff from members of the organization who produced the document you are relying on here. Not people from the nation. I assume you’ll take it equally seriously.
This article is excellent, especially since Rosenstein just this day indicted a bunch of specific Russians. Again, this is all circular reasoning. They are in the indictment accused of hacking into state elections. How? Since when have even electronic voting setups been connected to a network? I seem to recall that 3 states made this claim way back when, then more piled on, then they all went away when it was pointed out to them that what they claimed was an electronic impossibility.
Why not read the indictment? It’s all spelled out. The interference with elections is in paragraphs 69 onwards.
I read the entire indictment. It isn’t “spelled out” at all. It’s told as a story that makes claims without any evidence.
That’s why people facetiously say that prosecutors can indict ham sandwiches via the grand jury process.
Oops – I didn’t check who wrote the first post and who responded – now corrected.
Anyway, George O’Har claimed it can’t be true because it was an “electronic impossibility”. He obviously hadn’t read the indictment.
Now Sycomputing is just saying that the indictment doesn’t contain all the backing evidence. We’ll see.
“Now Sycomputing is just saying that the indictment doesn’t contain all the backing evidence. We’ll see.”
Actually if you’d read the indictment as you said you had, then you wouldn’t question my contention that the evidence backing the claims isn’t there.
If it is there, where is it?
If by “[w]e’ll see,” you mean during or after the prosecutorial phase, then we won’t see unless a miracle occurs and Russia extradites these individuals to the United States for trial.
Given the miracle doesn’t happen (and he’s betting it won’t), Mueller will have maintained some semblance of justifying his existence, since he won’t ever be forced to present any actual evidence that ties any of the so-called, “Conspirators” to the “crimes” he claims they committed. He will always be able to claim, “See! They did it.”
Moreover, there will always be (at least in the Tin Foil Hat Progressive crowd and those of their betters who prey upon their mental illness regarding Donald Trump) the shadow of “collusion” or whatever other nifty little nefarious nonsense these ilk will eagerly choose to believe by faith.
Of course all the evidence isn’t there. It is an indictment. Not the prosecution case.
I strongly expect the evidence (or lack of it) will come out at some point. That’s what I meant by ‘we’ll see’. My view is that the FBI won’t create something out of nothing in such a sensitive case. The Tin Foil brigade are those who think they would.
“My view is that the FBI won’t create something out of nothing in such a sensitive case.”
But they’ve already created lots of somethings out of nothing. All of the indictments so far have one, some or all of the following characteristics:
1) Nothing whatsoever to do with Donald Trump and Russian “collusion,” which, ostensibly, was the reason Mueller was appointed.
2) They’re against foreign actors having nothing to do with Donald Trump and Russian “collusion,” and that cannot be prosecuted unless the foreign actors submit to the prosecution.
3) They’re against American actors for “crimes” having nothing to do with the 2016 election campaign, i.e., Donald Trump and Russian “collusion.”
But you would argue the above isn’t the FBI creating something out of nothing?
Mueller’s remit is to investigate “Russian interference with the 2016 Presidential Election”. Possible collusion is also listed, but is not the only or even the main purpose of the investigation.
You must be Rosenstein’s cousin or something AndyL
Rosenstein also said there was no evidence that the Russian hacking had any effect on the vote.
“evidence”
There is a huge difference in actually interfering with an election, such as vote tampering and such, and adding political commentary against a candidate. No where, NO WHERE, was any vote changed, denied or otherwise interfered with. If the Russians, or anyone else for that matter, express opinion, release documents or do anything to try to influence the opinions of voters that is perfectly legit. Politicians and supports of a candidate have been doing it forever, even to the point of making misleading statements or being loose with the truth. If those things were criminal, then every politician would be in jail (not a bad idea though).
Here we go everyone. Look at how the Democrats are playing this ongoing game, …http://www.foxnews.com/politics/2018/07/13/democrats-urge-trump-to-cancel-putin-summit-after-indictment-russian-intel-officers.html
Another phony indictment to back up this phony Russian collusion story, and all timed to try and disrupt what the President is doing at the moment. They are fricking relentless in their deceit.
I think I agree with this. It looks like the timing was done to wreck Trump’s meeting with Putin.
I do not see anything in the Winnipeg papers.
There is no way Hillary Clinton would have started a war with Russia. She’s stupid, but she’s not that stupid.
The idea that Hillary is hawkish is ridiculous. This is just a lie put out by her minions to make her look tough and presidential. She was all for cutting and running out of Iraq before the Bush “Surge” got things under control. Just like every other Liberal appeaser Democrat.
This is a very good post, but needs a one page summary with bullets. It’s way too long for anyone to appreciate and fully understand.
Regarding the July 24 2016 spike in Google Trends: I found a plausible explanation: There was a major publishing by WikiLeaks of the emails from the DNC email leak on July 22, after they were published by DCLeaks in June and earlier in July. This was not mentioned in the Mike Jonas timeline of relevant events. This had to do with emails with dates from January to May 2016. The Wikipedia article for “2016 Democratic National Committee email leak” in combination with this WUWT article gives me an impression that there are sides of the story that are not being told by everyone I hear telling the story.
Regarding: “Intolerant? The president personally attended the opening of Moscow’s great mosque.”:
Russia under Putin is only selectively tolerant. Note a Russian law enacted a little over 2 years ago regarding homosexuality. And Putin seems to not have much of a problem with Russia’s heavily-Muslim Chechnya recently engaging in a pogrom against gay people. Chechnya’s head, Ramzan Kadyrov, said that Chechnya has no gay men, because their own families would kill them. Oh so like Iran! The recent Russian law makes me skeptic of the Russian statement that “Officials in Moscow were sceptical”, copied/pasted from the Wikipedia article on Anti-gay purges in Chechnya.
And then there is this:
“The FBI’s Washington Field Office is offering a reward of up to $10,000 for information leading to the recovery of stolen weapons. On Sunday, July 10, 2016, between 12:00 a.m. and 2:00 a.m., unknown subjects burglarized an FBI special agent’s vehicle and removed a secured gun lock box which contained weapons and other equipment. The vehicle was parked in the H Street Corridor near H and Seventh Streets, N.E., in Washington, D.C. The lock box, which contained the items listed below, was fitted for authorized use in a government vehicle.
– Glock-22 handgun .40 caliber, Serial Number RYE448”
source: https://www.fbi.gov/contact-us/field-offices/washingtondc/news/press-releases/fbi-offers-up-to-10000-reward-to-recover-stolen-weapons
And this:
“Julian Assange, the WikiLeaks editor, further stoked speculation that Rich might have been involved in the DNC hack by referencing the murder, unprompted, on a Dutch news program.
“Our whistleblowers go to significant efforts to get us material and often [face] very significant risks. A 27-year-old that works for the DNC was shot in the back, murdered just a few weeks ago for unknown reasons, as he was walking down the street in Washington, D.C.,” Assange said.”
source: https://www.washingtonpost.com/lifestyle/style/seth-rich-wasnt-just-another-dc-murder-victim-he-was-a-meme-in-the-weirdest-presidential-election-of-our-times/2017/01/18/ee8e27f8-dcc0-11e6-918c-99ede3c8cafa_story.html
Nothing Julian Assange has ever said or posted via his Wikileaks site has turned out to be wrong or fake. Nothing.
The Deep State is covering up a horrible crime, a murder of a young man, who likely was sending DNC materials Rich gathered from the DNC servers to Wikileaks via a Courier.
Kim Dotcom of NZ also has said this same thing.
https://twitter.com/kimdotcom/status/969402082385002496?lang=en.
The Washington DC police are not investigating the Seth Rich murder. It has gone cold. They wll not release the autopsy, but “unnamed sources” have siad the autopsy recovered at least one .40 caliber bullet consistent with being fired from a Glock model 22, .40 caliber.
If indeed Rich was downloading stuff from the DNC server and funneling it to Wikileaks in June 2016, then the FBi and CrowdStrike were likely aware of some of this suspicious activity. The CIA certainly is monitoring everything it can from Julian Assange and his Wikileaks associates.
When you get into the FBI weapons locker theft from the FBI agents official vehicle, it becomes even more suspicious. The FBI agent whose weapons were allegedly stolen was having an overnight visit with a ladyfriend about 2 miles from where Rich was murdered but within easy walking distance of the bars and hang-outs Rich used that night. Interestingly, the car alarm was not activated by the break in and it would have taken considerable force to completely remove the bolted, locked weapons locker from the vehicle. That was not a mere act of vandalism.
more info: http://www.washingtonpost.com/wp-dyn/content/article/2007/01/18/AR2007011801209.html
The name of the FBI agent Matthew Laidr. His ladyfriend, Anne Marie Malacha was a Senior Vice President at Dezenhall, a well-known public relations firm and crisis management consultant headquartered in Washington, D.C.
Malacha’s firm has it mission statement as:
“Dezenhall’s mission is to help our clients survive a reputational crisis, an adverse public policy change, unwanted or unwarranted government scrutiny, a competitor attack or a public disclosure that threatens their ability to operate. We are known for managing acute corporate and litigation controversies, mounting effective marketplace defenses, driving policy and regulatory changes that are advantageous to our clients’ bottom lines and turning back chronic, agenda-driven attacks that threaten reputations, brands and industries at large.
We believe in discretion at all times. Our clients face some of the most intense – and often unfair – controversies in their personal or corporate histories. We work to help our clients resolve issues before they become public controversies. For that reason, we hold the counselor-client relationship as a sacred trust: we do not disclose our client list, announce our new business wins or publicly discuss client case histories without permission.
Dezenhall’s was likely contracted by either the Hillary campaign or the DNC to help find and ID the internal hacker and not let this damage her fight with Bernie Supporters at the upcoming DNC Presidential nominating convention.
So were the two people following Seth Rich SA Laird and Ms Malacha. A moment of panic when they realized Seth Rich was on to them following him that night?
Tin hats for sale in the aisle on the right
So who murdered Seth Rich?
Two shots to the back.
A street thug who took nothing from him?
There are video snips from security cameras showing the legs of two people who appear to be following him that night. He was certainly likely under surveillance by the FBI as a potential inside source of DNC leaks.
His attempt to call his father at 2am indicates he was worried about something. He probably realized he was under surveillance.
And then there’s John Podesta’s email where he vows that insiders caught leaking should be made an example of.
Autopsy reports are normally not released except by request of next of kin or to comply with a subpoena, although they generally become public record 50 years later. And what would happen if this one gets released to the public? It would get treated like Obama’s birth certificate if it supported the Washington DC police department’s position that the murder was a mere robbery attempt going wrong, or didn’t support Democratic party skullduggery as the reason for the murder.
In my post with 4 URL links, the fourth one is obviously incorrect, it links to an 2007 theft. I made a mistake and grabbed an older Google search link when switching back and forth between open tabs.
The correct URL to the WaPo article on the FBI weapons theft is here:
https://www.washingtonpost.com/local/fbi-searching-for-weapons-stolen-in-northeast-washington/2016/07/22/1d8d2b5e-5011-11e6-a422-83ab49ed5e6a_story.html
Haven’t charges now been laid against against 12 Russians. Where is that heading?
No where. It is just another political stunt by Mueller and gang at the time when Trump is meeting with Putin. It is like AGW…. those that want to believe do and you cannot change their mind no mater what the facts are. But unlike AGW, this is about the overthrow of a constitutionally elected President.
It works both ways:
those that want to believe do and those that don’t want to believe don’t.
“You cannot change their mind no mater what the facts are” – the last bit is certainly true.
AndyL: “It works both ways” indeed! What works best?
Both the same. Too much partisanship resulting in people believing conspiracies rather than evidence.
There are a number of IT security issues which could be seen as scams. Google’s attempt to force all webmasters to use HTTPS encryption is one such. Notably, many of the press releases advocating this have come from the encryption certificate issuers themselves. Which is not unlike Greenpeace fossil fuel protests being backed by wind turbine consortia.
As with climate change, this takes a minor risk or effect and conflates it into a massive one. Theoretically, data carriers could carry out malicious acts on data in transit, but in practice there are very few recorded instances of such. Probably, because most data carriers are trustworthy. (surprise)
On a broader scale there are enough serious security issues in IT that spending so much money and effort on this trivial risk is extremely bad policy. (And if it is allegedly so serious, how come we’ve been using the Web since 1993 without it coming to the fore earlier?)
Meanwhile, there are negative consequences. The existence of Let’s Encrypt makes subterfuge such as spoof sites easy. Previously the crook would have had to buy a certificate in order to use SSL, and it’s unlikely a cert would have been issued for a domain name that’s an obvious attempt to spoof a known brand. So in fact this ‘HTTPS everywhere’ initiative actually makes banking and e-commerce sites LESS safe to use.
There is also, of course, the cost. I wouldn’t even like to hazard a guess at the global expenditure on HTTPS and certificates.
If you raise this issue on any IT security site, you just get Google’s own spiel parroted back at you. Often, with some anger that you dared question it. Which is very like the response you get from climate alarmists, is it not?
Interesting article, and more interesting comments! Admit to being completely lost as to what is or is not really happening. To see if I can find any solid footing, I started by reading the actual indictment issued on July 13, 2018 (link in the comments, or google it…be sure you are looking at the actual document).
First flag…page 6, paragraph 21. Basically it is alleged that the GRU sent a spoofing email to the Chairman of the Clinton Campaign instructing them to change their password via an embedded link. Apparently they did so, allowing the GRU access to 50k or so emails.
Wow…let me get this right…a person selected to Chair the Presidential Campaign for one of the most import positions on the planet apparently did not have the common sense to not fall for one of the most common and widely advertised methods for gaining access to personal information? You do not need a GRU to orchestrate this….a hack shop in a kids basement would suffice. Maybe that is the whole point.
Assuming the allegation is true….it would be all downhill from there. Unfortunately does not do anything to bolster my confidence in the folks involved.
There are many contributors and commentors on WUWT that likely have the ability to make some sense of the whole mess….please don’t be shy! I really don’t even know where to start…given the above indictment item.
I still haven’t figured out if those angry at the alleged Russian hacking are angry at the hacking or that their friends in the DNC got exposed. The release of the information contained in the “stolen” documents has never been attacked as untrue. So I suppose the national media is angry because hackers did the job they should have been doing.
*everybody* should be angry at the hacking
And “everyone” should be angry at the sloppy protections used by those who were hacked. I find more fault with failing to protect your servers than with those who are attempting the hacking.
That’s like saying the biggest issue with Watergate was that they didn’t have better locks.
” I find more fault with failing to protect your servers than with those who are attempting the hacking.”
Me, too. Instead of worrying about the Russian hacking, they should be securing their servers.
Every national actor on the planet, including the USA, is hacking and cracking constantly and the idea that requesting the hackers to stop will accomplish anything is just silly.
Computer security should not be based on wishful thinking.
And why are our electric utilities hooked up to the internet? We’re getting lazy.
Tom: I agree. And US Government should take the lead with strong and urgent action.
Podesta got the phishing email to change his password, as you describe. Podesta then checked with his IT security person about the link, and the security person told him *not* to click on it, but the reply to Podesta used confusing language and Podesta thought the security person meant it was okay to click on it and he did, and the hacker was in!
A really dumb mistake.
I shouldn’t have to ask “an IT person”. He should know that going directly to the right website known by the user is the good solution in each and every case.