How to Instantly Prove (Or Disprove) Russian Hacking of U.S. Election

George Washington's picture

It’s newsworthy that CIA head Mike Pompeo recently met with Bill Binney – who designed the NSA’s electronic surveillance system – about potential proof that the DNC emails were leaked rather than hacked.

It’s also noteworthy that the usual suspects – Neocon warmongers such as Max Boot – have tried to discredit both Binney and Pompeo.

But there’s a huge part of the story that the entire mainstream media is missing …

Specifically, Binney says that the NSA has long had in its computers information which can prove exactly who hacked the DNC … or instead prove that the DNC emails were leaked by a Democratic insider.

Remember – by way of background – that the NSA basically spies on everyone in America … and stores the data long-term.

After the story of Pompeo’s meeting with Binney broke, Binney told Washington’s Blog:

Here’s what they would have from the programs you list [i.e. NSA’s Fairview, Stormbrew and Blarney spying programs, which Edward Snowden revealed] plus hundreds if not thousands of trace route programs embedded in switches in the US and around the world.

 

First, from deep packet inspection, they would have the originator and ultimate recipient (IP) of the packets plus packet series 32 bit number identifier and all the housekeeping data showing the network segments/path and time to go though the network.  And, of course, the number of packet bits. With this they would know to where and when the data passed.

 

From the data collection, they would have all the data as it existed in the server taken from.  That’s why I originally said if the FBI wanted Hillary’s email, all they have to do is ask NSA for them.

 

All this is done by the Narus collection equipment in real time at line rates (620 mbps [mega bits per second,] for the STA-6400 and 10 gbps [giga bits per second] for the Insight equipment).

Binney explained what these numbers mean:  Each Narus Insight device can monitor and record around 1,250,000 emails each second … or more than 39 trillion emails per year.

Wired reported in 2006:

Whistle-blower Klein allegedly learned that AT&T was installing Narus boxes in secure, NSA-controlled rooms in switching centers around the country.

Binney told us there are probably 18 or so Narus recording systems throughout the U.S. deployed by the NSA at AT&T facilities, drawing our attention to the following NSA document leaked by Edward Snowden:

Fairview At a Glance - Snowden

And this AT&T graphic:

AT&T Global Internet Centers

(Binney has figured out their locations from publicly-available sources. He has also mapped out similar monitoring systems at Verizon facilities.)

Binney also sent me hard-to-find company literature for Narus.  Here are some interesting excerpts:

NarusInsight …

  • Provides full visibility into network traffic
  • Analyzes at macro or micro level targeting specific or aggregate full-packet data for forensic analysis

And:

Universal data collection from links, routers, soft switches, IDS/IPS, databases, etc. provides total network view across the world’s largest IP networks.

Binney also pointed me towards a couple of network engineering principles that show that figuring out who hacked the emails (or proving they were leaked) is well within NSA’s capabilities.

Initially, when data is transmitted online, it is sent using the TCP/IP Packet format.  Put simply, data is not sent in a vacuum, but rather as part of a bundle containing a lot of other information.

Here’s the TCP part of the bundle:

And here’s the IP part of the bundle:

So any data analyst can learn a tremendous amount about the source address of the sender, the destination address of the receiver and a boatload of other information by using a “packet sniffer” to  inspect the “packets” of information being sent over the web.

Additionally, it’s simple to conduct “traceroute” searches. “Traceroute” is a computer network diagnostic tool for displaying the route and measuring transit delays of packets across an Internet Protocol network.

Wired reported in 2006:

Anything that comes through (an internet protocol network), we can record,” says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. “We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls.”

So NSA can easily basic packet sniffers and traceroutes, And see this.

Remember, Edward Snowden says the NSA could easily determine who hacked the Democratic National Committee’s emails:

If Russia hacked the #DNC, they should be condemned for it. But during the #Sony hack, the FBI presented evidence.

***

Even if the attackers try to obfuscate origin, #XKEYSCORE makes following exfiltrated data easy. I did this personally against Chinese ops. 5:58 AM - Jul 25, 2016

Binney told us:

Snowden is right and the MSM is clueless.

 

***

 

Do they have evidence that the Russians downloaded and later forwarded those emails to wikileaks? Seems to me that they need to answer those questions to be sure that their assertion is correct.

 

***

You can tell from the network log who is going into a site.  I used that on networks that I had.  I looked to see who came into my LAN, where they went, how long they stayed and what they did while in my network.

 

Further, if you needed to, you could trace back approaches through other servers etc. Trace Route and Trace Watch are good examples of monitoring software that help do these things.  Others of course exist … probably the best are in NSA/GCHQ and the other Five Eyes countries.  But, these countries have no monopoly on smart people that could do similar detection software.

He explained:

If it were the Russians, NSA would have a trace route to them and not equivocate on who did it.  It’s like using “Trace Route” to map the path of all the packets on the network.  In the program Treasuremap NSA has hundreds of trace route programs embedded in switches in Europe and hundreds more around the world.  So, this set-up should have detected where the packets went and when they went there.

He added:

As Edward Snowden said, once they have the IP’s and/or other signatures of 28/29 [the supposed Russian hacking groups] and DNC/HRC/etc. [i.e. the DNC and Hillary Rodham Clinton], NSA would use Xkeyscore to help trace data passing across the network and show where it went. [Background.]

 

In addition, since Wikileaks is (and has been) a cast iron target for NSA/GCHQ/etc for a number of years there should be no excuse for them missing data going to any one associated with Wikileaks.

 

***

 

Too many words means they don’t have clear evidence of how the data got to Wikileaks.

And he stressed:

If the idiots in the intelligence community expect us to believe them after all the crap they have told us (like WMD’s in Iraq and “no we don’t collect data on millions or hundreds of millions of Americans”) then they need to give clear proof of what they say. So far, they have failed to prove anything.

 

Which suggests they don’t have proof and just want to war monger the US public into a second cold war with the Russians.

After all, there’s lots and lots of money in that for the military-industrial-intelligence-governmental complex of incestuous relationships.

 

***

 

If you recall, a few years ago they pointed to a specific building in China that was where hacks on the US were originating. So, let’s see the same from the Russians. They don’t have it. That’s why they don’t show it. They want to swindle us again and again and again. You can not trust these intelligence agencies period.

And he told Newsweek:

U.S. officials “know how many people [beyond the Russians] could have done this but they aren’t telling us anything. All they’re doing is promoting another cold war.”

 

Binney … compared allegations about Russian hacks to previous U.S. fabrications of intelligence to justify the invasion of Iraq in 2003 and the bombing of North Vietnam in 1964.

 

“This is a big mistake, another WMD or Tonkin Gulf affair that’s being created until they have absolute proof” of Russian complicity in the DNC hacks, he charged during a Newsweek interview. He noted that after the Kremlin denied complicity in the downing of a Korean Airlines flight in 1983, the U.S. “exposed the conversations where [Russian pilots] were ordered to shoot it down.” Obama officials “have the evidence now” of who hacked the DNC, he charged. “So let’s see it, guys.“

NSA either doesn’t have solid evidence of Russian hacking of DNC emails – which means the Russians didn’t do it – or those with the power to demand NSA produce the evidence simply haven’t asked the right questions.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
DesertRat1958's picture

The author is living in fantasy land. The NSA computers will say what ever they want them to. Without some independent third party forensic examination of all their hard drives etc what you see is what they want you to see.

vaporland's picture

on the other hand, if the data was copied from a DNC server directly onto a USB keychain drive and then hand delivered to Wikileaks, the NSA would have no record of that.

and the timestamps of the files indicates that they were not copied over the internet but locally from a server onto a external storage device.

 

 

VWAndy's picture

 They would still know what computer was used to download it to the thumbdrive is my understanding.

343 Guilty Spark's picture

The NSA would not have that information as that would never hit the network.  The DNC may or may not have that information as it would require programs to monitor USB activities.  That is not normally done on computer networks where people can use USBs (for data storage/transfer), normally.

VWAndy's picture

 A public order to the NSA would get results fast. Trump could do it and the NSA would have to comply on the spot.

Neochrome's picture

I have a question for NSA: What exactly you do around here?

BetweenThe Coasts's picture

"What exactly you do around here?"

Binney is a genuine hero and he built the NSA digital spying capability. Watch the documentry about both Binney and what the NSA really does around here at http://agoodamerican.org/

HRClinton's picture

What do they do?

Keyboard games, endless meetings, presentations, listen in on something interesting. Look for Russians, but ignore the Chinese and Israelis. Hell, they send raw data to Israel. 

Oh, one other thing: they collect nice paychecks, employment benefits, and make nice 401k contributions. They would never, ever use their insider Intel to do insider trading though, right? .

VWAndy's picture

 IP theft mostly is my guess.

VWAndy's picture

 Still thinking there are two parties? All this left vs right stuff is for show. Its pretty much just a comedy shtick.

  One giant never ending chainyank. An its global too. Team fiat has their shit together.

jacketch's picture

NSA and CIA are too busy mining krypto to worry about such mundane topics.

HRClinton's picture

Funny, but I was thinking the same thing:

If I ran an IT dept, I'd set up everyone's computers to mine at night. Electricity is cheaper then too.

Doing that, beats the heck out of any 401k contribution, that's for sure.

VWAndy's picture

 It might be easier for them to simply swipe everyones krypto. They already have the keys to every computer.

expert diaper changer's picture

This crime will never be investigated. There are too many senators and Representatives involved in the Russian, KSA, Clinton and Congress corruption scheme and all of the evidence is now being collected and hidden by Mueller. It is a replay of ENRON and all the other corruption scandals during the last 50 years. The ONLY solution is to start executing a few of them for corruption, like the Chinese do. Remember the tainted milk scandal in China, that guy was executed within weeks and that was the end of that episode of corruption. After he was executed the Chinese asked American Lawmakers, point blank, now what are you going to do about corruption on your side? There was deafening silence from our Congress. The Chinese merely said, "I Thought so"

 

RationalLuddite's picture

In all seriousness - yes, the consequences need to be made direct and brutal, but i fear the west lacks the moral clarity or even pragmatic intelligence to follow through 

As George observes - crucify a few of the right people and watch how quickly your problems evaporate https://youtu.be/qDO6HV6xTmI

Solio's picture

The greater the crime(s) the greater the obfuscation by all means.

redmudhooch's picture

Who cares? We all know the truth, we have since it all happened....

Let the Ziospook-MSM keep up the fear-mongering to the crickets.

No one is listening to them. (((They))) are irrelevant now.

I would like to know what role Israel played in the whole thing though.

But they'll never tell us that.

Jo A-S's picture

Wish that it was true that the MSM is not listened to.  MSM still has a large number of believers.  In the UK, the BBC especially is believed by most of the population....

RationalLuddite's picture

Yes - in conversations with radoms (tradesmen coming to the office, business associates etc) it is unfortunately clear to me that the MSM still dictatws what perhaps 50% generally believe.  Awful to aknowledge. Depressing to accept in a way. But true.

 

Alternatively let your schadenfreude run freeeeee and revel in the stupidity of the manipulation primed fools all around you :)

Glass half full approach 

Truthseeker20's picture

When are they going to look into israel hacking our elections? Trump is 100 percent for israel so they would love for him to win.

squid's picture

Fire them all.

 

Squid

Peter Royce Clayon da Turd's picture

If I was to hack anything of this nature, and had the funds to do it right, I'd set up a temp location in Malaysia or South Africa, infiltrate my special people (using false passports naturally) in as tourists, and work at it from there. But the Russians MUST be amateurs in this sort of thing, right...?

silverer's picture

Which makes me wonder if anybody at all in DC wants truth and justice, or is virtually 99% in a compromised position or on the take?

GreatUncle's picture

Think it is kid of obvious and your 1% don't is a misappropriated faith ... try 100% and totally comprimised.

That is what corruption does if you do not root it out as soon as you know see it.

 

HRClinton's picture

Thanks for the Morning Laugh.

any_mouse's picture

NSA could do some serious coin mining.

Probably could front run the competition. Delay blockchain packets in a switch.

Too busy spying for Mossad and Greater Zion.

Reaper's picture

Who do the spy agencies serve?   The nature of spying is lying.    Spying power corrupts.   Who protects us from our spies?  Who's dumb enough to trust any spies?   Are our "Exceptional" hacks smarter than Russian hacks?  Liars = lies.

Peter Royce Clayon da Turd's picture

You know who they serve and why. I know who they serve and why. Perhaps even half of the 77% of democrat BA earners who don't believe gender is determined at birth know who they serve.
We also have enough of us armed with pitchforks to end it, but the simpletons are busy with their Iphones and soccer and whatever the Godless-Homers out there are doing these days. And the average monkey-boy is too busy blaming the Jews for everything right here on ZH. No wonder the elites do as they do - because they can. We are all so busy fighting among ourselves, we let them off the hook.
We are going to see a world that makes Orwell look like a Dr.Seuss book.

chestergimli's picture

The elites ARE the Khazarian Talmudist Jews.

Expat's picture

LOL.  As if Congress or anyone else wants to divulge what the NSA does.

Nice try.

hooligan2009's picture

seems like a simple, clear and concise FOIA is all that is required of NSA.

keep up the good work GW - QUALITY STUFF!

Dodgy Geezer's picture

 

Here’s what they would have from the programs you list [i.e. NSA’s Fairview, Stormbrew and Blarney spying programs, which Edward Snowden revealed] plus hundreds if not thousands of trace route programs embedded in switches in the US and around the world.

 First, from deep packet inspection, they would have the originator and ultimate recipient (IP) of the packets plus packet series 32 bit number identifier and all the housekeeping data showing the network segments/path and time to go though the network. 

 

1. Any sensible leaker will know all of this, and won't use a simple network connection which can be easily traced. There are many ways to hide your tracks on the internet.

2. These leaks attempting to smear the Russians have two main aims:

1 - to draw attention away from the real culprits

2 - to make the American people come together under a 'threat' from an enemy, and consent to be led by the elite

 

In particular, it is greatly in the CIA/NSA's interest to revive the bogeyman of the Russian threat - that is what their existence is predicated on. If there was no threat, they would have no job.  Now, here comes the interesting bit - over in Russia, they have the same problem. the FSB (KGB as was) and the SVR also need to justify their budget and protect their jobs.  The last thing either side want is peace and mutual trust.

I do not believe that the Russians 'interfered' with the US elections in any important way, and and 'adverts' which were commission from Russian sources were certainly not official policy. However, I would not be surprised to find the SVR providing the CIA with fabricated evidence that the Russians did, indeed, arrange for Trump to be elected. 

It would be a win-win for both sides. The Russians would gain a huge amount of acclamation and admiration for their 'presumed' ability to damage American interests, the Democrats will get a perfect excuse for why they failed to win the election, the security services of both sides will get increased importance, and a new set of responsibilities (and budget) for running covert public relations attacks and defences - which are completely unauditable, of course, so can be easily justified as money well spent.... 

ebear's picture

With Russia under constant attack, I seriously doubt FSB needs to do anything to justify their jobs.

RationalLuddite's picture

Exactly. They just need to turn up daily for incoming hostile business from the alphabet agencies and remaining NGOs

Mike Masr's picture

Fuck the liars in our intelligence community!

Has anyone forgotten that these are the fucking warmongering deep-state liars that told the world that Saddam Hussein had weapons of mass destruction, WMD's so we could go to war with Iraq?

The US has been meddling and interfering in other countries elections and internal affairs for decades.This includes US meddling in Russia's 2012 Presidential election using NGO's. Remember the massive street protests and riots in Moscow? If there was a gold medal given for meddling and interfering the US would win Gold every year!!!

Not only does the US meddle and interfere in other countries elections and internal affairs we take it ONE STEP FURTHER by overthrowing democratically elected governments we simply don't like, and then we install a servile govt & puppet leaders. In Washinton DC this is casually referred to as "regime change". 

This is a case of don't do what we do, only do what we tell you to do.

The moral of the story is it’s perfectly okay and morally right when our fucked up neocons do it. Our neocons and deep-state doesn't like it when they suspect it's been done to us.

All of this Russian interference talk is a collossal fucking joke. This is hypocrisy and duplicity at its finest!

doctor10's picture

all that means is the Deep State can conveniently edit and route something wherever they want to!

no law or court works anywhere in the world once that becomes common knowledge

Dontblamethegoat's picture

It's sad so few people care about these truths anymore ...

redmudhooch's picture

Not true, people are awakening now, lots of people.

Can't you tell?

gmrpeabody's picture

No, actually I can't. Nobody I know seems to give a damn..., unless they are never Trumpers, in which case this is all good fun.

Ex-Oligarch's picture

If by "sad" you mean "infuriating" I agree.

nmewn's picture

"NSA either doesn’t have solid evidence of Russian hacking of DNC emails – which means the Russians didn’t do it – or those with the power to demand NSA produce the evidence simply haven’t asked the right questions."

And its not like the NSA, CIA, FBI etc. want to have yet another "national conversation" about their Soviet/Stasi-style criminal paranoia in vacuuming up of all that data either.

I mean, the parallels might be too striking ;-)

Gonzogal's picture

The "powers that be" already have attempted to pre-empt any "discussion" of reality by already having claimed that "Russia hacked the NSA"  http://www.zerohedge.com/news/2017-10-05/putin-strikes-again-russian-hac...

wildbad's picture

I have a better way...

Hey! Its all demonocratic bullshit! Quit chasing the red herring. Quit talking and writing about it.

If these CNN shills are really just talking to themselves then believe your own statements and stop fucking sqwaking like crows every time bezos or slim or CNN says something stupid.

ignore the idiots

ThanksChump's picture

That's all well and good, but Russians made my bread stale.

 

How long must we endure such torture??

BetweenThe Coasts's picture

The Russians ate my homework assignment.

any_mouse's picture

You are not getting the GMO bread that doesn't go stale or get moldy.

Side effect, the body cannot digest it, either.

Dame Ednas Possum's picture

His name was Seth Rich.

The Dems murdered him.

spieslikeus's picture

If Seth Rich leaked the emails to Wikileaks, why won't Assange simply say as much? The guy's dead FFS, no need to protect a 'source' is there?

Dark star's picture

And the Department of Justice is protecting his murderers, which is even worse.