How to Instantly Prove (Or Disprove) Russian Hacking of U.S. Election

It’s newsworthy that CIA head Mike Pompeo recently met with Bill Binney – who designed the NSA’s electronic surveillance system – about potential proof that the DNC emails were leaked rather than hacked.

It’s also noteworthy that the usual suspects – Neocon warmongers such as Max Boot – have tried to discredit both Binney and Pompeo.

But there’s a huge part of the story that the entire mainstream media is missing …

Specifically, Binney says that the NSA has long had in its computers information which can prove exactly who hacked the DNC … or instead prove that the DNC emails were leaked by a Democratic insider.

Remember – by way of background – that the NSA basically spies on everyone in America … and stores the data long-term.

After the story of Pompeo’s meeting with Binney broke, Binney told Washington’s Blog:

Here’s what they would have from the programs you list [i.e. NSA’s Fairview, Stormbrew and Blarney spying programs, which Edward Snowden revealed] plus hundreds if not thousands of trace route programs embedded in switches in the US and around the world.


First, from deep packet inspection, they would have the originator and ultimate recipient (IP) of the packets plus packet series 32 bit number identifier and all the housekeeping data showing the network segments/path and time to go though the network.  And, of course, the number of packet bits. With this they would know to where and when the data passed.


From the data collection, they would have all the data as it existed in the server taken from.  That’s why I originally said if the FBI wanted Hillary’s email, all they have to do is ask NSA for them.


All this is done by the Narus collection equipment in real time at line rates (620 mbps [mega bits per second,] for the STA-6400 and 10 gbps [giga bits per second] for the Insight equipment).

Binney explained what these numbers mean:  Each Narus Insight device can monitor and record around 1,250,000 emails each second … or more than 39 trillion emails per year.

Wired reported in 2006:

Whistle-blower Klein allegedly learned that AT&T was installing Narus boxes in secure, NSA-controlled rooms in switching centers around the country.

Binney told us there are probably 18 or so Narus recording systems throughout the U.S. deployed by the NSA at AT&T facilities, drawing our attention to the following NSA document leaked by Edward Snowden:

Fairview At a Glance - Snowden

And this AT&T graphic:

AT&T Global Internet Centers

(Binney has figured out their locations from publicly-available sources. He has also mapped out similar monitoring systems at Verizon facilities.)

Binney also sent me hard-to-find company literature for Narus.  Here are some interesting excerpts:

NarusInsight …

  • Provides full visibility into network traffic
  • Analyzes at macro or micro level targeting specific or aggregate full-packet data for forensic analysis


Universal data collection from links, routers, soft switches, IDS/IPS, databases, etc. provides total network view across the world’s largest IP networks.

Binney also pointed me towards a couple of network engineering principles that show that figuring out who hacked the emails (or proving they were leaked) is well within NSA’s capabilities.

Initially, when data is transmitted online, it is sent using the TCP/IP Packet format.  Put simply, data is not sent in a vacuum, but rather as part of a bundle containing a lot of other information.

Here’s the TCP part of the bundle:

And here’s the IP part of the bundle:

So any data analyst can learn a tremendous amount about the source address of the sender, the destination address of the receiver and a boatload of other information by using a “packet sniffer” to  inspect the “packets” of information being sent over the web.

Additionally, it’s simple to conduct “traceroute” searches. “Traceroute” is a computer network diagnostic tool for displaying the route and measuring transit delays of packets across an Internet Protocol network.

Wired reported in 2006:

Anything that comes through (an internet protocol network), we can record,” says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. “We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls.”

So NSA can easily basic packet sniffers and traceroutes, And see this.

Remember, Edward Snowden says the NSA could easily determine who hacked the Democratic National Committee’s emails:

If Russia hacked the #DNC, they should be condemned for it. But during the #Sony hack, the FBI presented evidence.
Even if the attackers try to obfuscate origin, #XKEYSCORE makes following exfiltrated data easy. I did this personally against Chinese ops. 5:58 AM - Jul 25, 2016

Binney told us:

Snowden is right and the MSM is clueless.




Do they have evidence that the Russians downloaded and later forwarded those emails to wikileaks? Seems to me that they need to answer those questions to be sure that their assertion is correct.



You can tell from the network log who is going into a site.  I used that on networks that I had.  I looked to see who came into my LAN, where they went, how long they stayed and what they did while in my network.


Further, if you needed to, you could trace back approaches through other servers etc. Trace Route and Trace Watch are good examples of monitoring software that help do these things.  Others of course exist … probably the best are in NSA/GCHQ and the other Five Eyes countries.  But, these countries have no monopoly on smart people that could do similar detection software.

He explained:

If it were the Russians, NSA would have a trace route to them and not equivocate on who did it.  It’s like using “Trace Route” to map the path of all the packets on the network.  In the program Treasuremap NSA has hundreds of trace route programs embedded in switches in Europe and hundreds more around the world.  So, this set-up should have detected where the packets went and when they went there.

He added:

As Edward Snowden said, once they have the IP’s and/or other signatures of 28/29 [the supposed Russian hacking groups] and DNC/HRC/etc. [i.e. the DNC and Hillary Rodham Clinton], NSA would use Xkeyscore to help trace data passing across the network and show where it went. [Background.]


In addition, since Wikileaks is (and has been) a cast iron target for NSA/GCHQ/etc for a number of years there should be no excuse for them missing data going to any one associated with Wikileaks.




Too many words means they don’t have clear evidence of how the data got to Wikileaks.

And he stressed:

If the idiots in the intelligence community expect us to believe them after all the crap they have told us (like WMD’s in Iraq and “no we don’t collect data on millions or hundreds of millions of Americans”) then they need to give clear proof of what they say. So far, they have failed to prove anything.


Which suggests they don’t have proof and just want to war monger the US public into a second cold war with the Russians.

After all, there’s lots and lots of money in that for the military-industrial-intelligence-governmental complex of incestuous relationships.




If you recall, a few years ago they pointed to a specific building in China that was where hacks on the US were originating. So, let’s see the same from the Russians. They don’t have it. That’s why they don’t show it. They want to swindle us again and again and again. You can not trust these intelligence agencies period.

And he told Newsweek:

U.S. officials “know how many people [beyond the Russians] could have done this but they aren’t telling us anything. All they’re doing is promoting another cold war.”


Binney … compared allegations about Russian hacks to previous U.S. fabrications of intelligence to justify the invasion of Iraq in 2003 and the bombing of North Vietnam in 1964.


“This is a big mistake, another WMD or Tonkin Gulf affair that’s being created until they have absolute proof” of Russian complicity in the DNC hacks, he charged during a Newsweek interview. He noted that after the Kremlin denied complicity in the downing of a Korean Airlines flight in 1983, the U.S. “exposed the conversations where [Russian pilots] were ordered to shoot it down.” Obama officials “have the evidence now” of who hacked the DNC, he charged. “So let’s see it, guys.“

NSA either doesn’t have solid evidence of Russian hacking of DNC emails – which means the Russians didn’t do it – or those with the power to demand NSA produce the evidence simply haven’t asked the right questions.


nmewn Wed, 11/15/2017 - 06:39 Permalink

"NSA either doesn’t have solid evidence of Russian hacking of DNC emails – which means the Russians didn’t do it – or those with the power to demand NSA produce the evidence simply haven’t asked the right questions."And its not like the NSA, CIA, FBI etc. want to have yet another "national conversation" about their Soviet/Stasi-style criminal paranoia in vacuuming up of all that data either.I mean, the parallels might be too striking ;-)

wildbad nmewn Wed, 11/15/2017 - 06:59 Permalink

I have a better way...

Hey! Its all demonocratic bullshit! Quit chasing the red herring. Quit talking and writing about it.

If these CNN shills are really just talking to themselves then believe your own statements and stop fucking sqwaking like crows every time bezos or slim or CNN says something stupid.

ignore the idiots

In reply to by nmewn

Mike Masr Wed, 11/15/2017 - 06:49 Permalink

Fuck the liars in our intelligence community! Has anyone forgotten that these are the fucking warmongering deep-state liars that told the world that Saddam Hussein had weapons of mass destruction, WMD's so we could go to war with Iraq? The US has been meddling and interfering in other countries elections and internal affairs for decades.This includes US meddling in Russia's 2012 Presidential election using NGO's. Remember the massive street protests and riots in Moscow? If there was a gold medal given for meddling and interfering the US would win Gold every year!!! Not only does the US meddle and interfere in other countries elections and internal affairs we take it ONE STEP FURTHER by overthrowing democratically elected governments we simply don't like, and then we install a servile govt & puppet leaders. In Washinton DC this is casually referred to as "regime change".  This is a case of don't do what we do, only do what we tell you to do. The moral of the story is it’s perfectly okay and morally right when our fucked up neocons do it. Our neocons and deep-state doesn't like it when they suspect it's been done to us. All of this Russian interference talk is a collossal fucking joke. This is hypocrisy and duplicity at its finest!

Dodgy Geezer Wed, 11/15/2017 - 07:03 Permalink

 Here’s what they would have from the programs you list [i.e. NSA’s Fairview, Stormbrew and Blarney spying programs, which Edward Snowden revealed] plus hundreds if not thousands of trace route programs embedded in switches in the US and around the world. First, from deep packet inspection, they would have the originator and ultimate recipient (IP) of the packets plus packet series 32 bit number identifier and all the housekeeping data showing the network segments/path and time to go though the network.  1. Any sensible leaker will know all of this, and won't use a simple network connection which can be easily traced. There are many ways to hide your tracks on the internet.2. These leaks attempting to smear the Russians have two main aims: 1 - to draw attention away from the real culprits 2 - to make the American people come together under a 'threat' from an enemy, and consent to be led by the elite In particular, it is greatly in the CIA/NSA's interest to revive the bogeyman of the Russian threat - that is what their existence is predicated on. If there was no threat, they would have no job.  Now, here comes the interesting bit - over in Russia, they have the same problem. the FSB (KGB as was) and the SVR also need to justify their budget and protect their jobs.  The last thing either side want is peace and mutual trust.I do not believe that the Russians 'interfered' with the US elections in any important way, and and 'adverts' which were commission from Russian sources were certainly not official policy. However, I would not be surprised to find the SVR providing the CIA with fabricated evidence that the Russians did, indeed, arrange for Trump to be elected. It would be a win-win for both sides. The Russians would gain a huge amount of acclamation and admiration for their 'presumed' ability to damage American interests, the Democrats will get a perfect excuse for why they failed to win the election, the security services of both sides will get increased importance, and a new set of responsibilities (and budget) for running covert public relations attacks and defences - which are completely unauditable, of course, so can be easily justified as money well spent.... 

Reaper Wed, 11/15/2017 - 07:45 Permalink

Who do the spy agencies serve?   The nature of spying is lying.    Spying power corrupts.   Who protects us from our spies?  Who's dumb enough to trust any spies?   Are our "Exceptional" hacks smarter than Russian hacks?  Liars = lies.

Peter Royce Cl… Reaper Wed, 11/15/2017 - 08:55 Permalink

You know who they serve and why. I know who they serve and why. Perhaps even half of the 77% of democrat BA earners who don't believe gender is determined at birth know who they serve.
We also have enough of us armed with pitchforks to end it, but the simpletons are busy with their Iphones and soccer and whatever the Godless-Homers out there are doing these days. And the average monkey-boy is too busy blaming the Jews for everything right here on ZH. No wonder the elites do as they do - because they can. We are all so busy fighting among ourselves, we let them off the hook.
We are going to see a world that makes Orwell look like a Dr.Seuss book.

In reply to by Reaper

any_mouse Wed, 11/15/2017 - 07:54 Permalink

NSA could do some serious coin mining.

Probably could front run the competition. Delay blockchain packets in a switch.

Too busy spying for Mossad and Greater Zion.

Peter Royce Cl… Wed, 11/15/2017 - 08:42 Permalink

If I was to hack anything of this nature, and had the funds to do it right, I'd set up a temp location in Malaysia or South Africa, infiltrate my special people (using false passports naturally) in as tourists, and work at it from there. But the Russians MUST be amateurs in this sort of thing, right...?

redmudhooch Wed, 11/15/2017 - 09:09 Permalink

Who cares? We all know the truth, we have since it all happened....Let the Ziospook-MSM keep up the fear-mongering to the crickets.No one is listening to them. (((They))) are irrelevant now.I would like to know what role Israel played in the whole thing though.But they'll never tell us that.

RationalLuddite Jo A-S Wed, 11/15/2017 - 13:02 Permalink

Yes - in conversations with radoms (tradesmen coming to the office, business associates etc) it is unfortunately clear to me that the MSM still dictatws what perhaps 50% generally believe.  Awful to aknowledge. Depressing to accept in a way. But true. Alternatively let your schadenfreude run freeeeee and revel in the stupidity of the manipulation primed fools all around you :)Glass half full approach 

In reply to by Jo A-S

expert diaper … Wed, 11/15/2017 - 10:21 Permalink

This crime will never be investigated. There are too many senators and Representatives involved in the Russian, KSA, Clinton and Congress corruption scheme and all of the evidence is now being collected and hidden by Mueller. It is a replay of ENRON and all the other corruption scandals during the last 50 years. The ONLY solution is to start executing a few of them for corruption, like the Chinese do. Remember the tainted milk scandal in China, that guy was executed within weeks and that was the end of that episode of corruption. After he was executed the Chinese asked American Lawmakers, point blank, now what are you going to do about corruption on your side? There was deafening silence from our Congress. The Chinese merely said, "I Thought so" 

VWAndy Wed, 11/15/2017 - 10:11 Permalink

 Still thinking there are two parties? All this left vs right stuff is for show. Its pretty much just a comedy shtick.  One giant never ending chainyank. An its global too. Team fiat has their shit together.

HRClinton Neochrome Wed, 11/15/2017 - 10:40 Permalink

What do they do?Keyboard games, endless meetings, presentations, listen in on something interesting. Look for Russians, but ignore the Chinese and Israelis. Hell, they send raw data to Israel. Oh, one other thing: they collect nice paychecks, employment benefits, and make nice 401k contributions. They would never, ever use their insider Intel to do insider trading though, right? .

In reply to by Neochrome