• All governments lie, but disaster lies in wait for countries whose officials smoke the same hashish they give out.

  • I.F. Stone

vrijdag 20 januari 2017

Another Demand for Proof

Another Demand for Proof That 

Alleged Russian Hacking Aided Trump 

Campaign 

Posted on Jan 19, 2017
By Veteran Intelligence Professionals for Sanity / Common Dreams

Truthout.org / CC BY-NC-SA 2.0

MEMORANDUM FOR: President Barack Obama

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: A Key Issue That Still Needs to be Resolved

As President-elect Donald Trump prepares to take the oath of office Friday, a pall hangs over his upcoming presidency amid an unprecedentedly concerted campaign to delegitimize it. Unconfirmed accusations continue to swirl alleging that Russian President Vladimir Putin authorized “Russian hacking” that helped put Mr. Trump in the White House.
As President for a few more days, you have the power to demand concrete evidence of a link between the Russians and WikiLeaks, which published the bulk of the information in question. Lacking that evidence, the American people should be told that there is no fire under the smoke and mirrors of recent weeks.
We urge you to authorize public release of any tangible evidence that takes us beyond the unsubstantiated, “we-assess” judgments by the intelligence agencies. Otherwise, we – as well as other skeptical Americans – will be left with the corrosive suspicion that the intense campaign of accusations is part of a wider attempt to discredit the Russians and those – like Mr. Trump – who wish to deal constructively with them.
Remember the Maine?
Alleged Russian interference has been labeled “an act of war” and Mr. Trump a “traitor.” But the “intelligence” served up to support those charges does not pass the smell test. Your press conference on Wednesday will give you a chance to respond more persuasively to NBC’s Peter Alexander’s challenge at the last one (on Dec. 16) “to show the proof [and], as they say, put your money where your mouth is and declassify some of the intelligence. …”
You told Alexander you were reluctant to “compromise sources and methods.” We can understand that concern better than most Americans. We would remind you, though, that at critical junctures in the past, your predecessors made judicious decisions to give higher priority to buttressing the credibility of U.S. intelligence-based policy than to protecting sources and methods. With the Kremlin widely accused by politicians and pundits of “an act of war,” this is the kind of textbook case in which you might seriously consider taking special pains to substantiate serious allegations with hard intelligence – if there is any.
During the Cuban missile crisis, for instance, President Kennedy ordered us to show highly classified photos of Soviet nuclear missiles in Cuba and on ships en route, even though this blew sensitive detail regarding the imagery intelligence capabilities of the cameras on our U-2 aircraft.
President Ronald Reagan’s reaction to the Libyan terrorist bombing of La Belle Disco in Berlin on April 5, 1986, that killed two and injured 79 other U.S. servicemen is another case in point. We had intercepted a Libyan message that morning: “At 1:30 in the morning one of the acts was carried out with success, without leaving a trace behind.” (We should add here that NSA’s dragnet SIGINT capability 30 years later renders it virtually impossible to avoid “leaving a trace behind” once a message is put on the network.)
President Reagan ordered the U.S. Air Force to bomb Col. Muammar Qaddafi’s palace compound to smithereens, killing several civilians. Amid widespread international consternation and demands for proof that Libya was responsible for the Berlin attack, President Reagan ordered us to make public the encrypted Libyan message, thereby sacrificing a collection/decryption capability unknown to the Libyans – until then.
As senior CIA veteran Milton Bearden has put it, there are occasions when more damage is done by “protecting” sources and methods than by revealing them.
Where’s the Beef?
We find the New York Times- and Washington Post-led media Blitz against Trump and Putin truly extraordinary, despite our long experience with intelligence/media related issues. On Jan. 6, the day after your top intelligence officials published what we found to be an embarrassingly shoddy report purporting to prove Russian hacking in support of Trump’s candidacy, the Times banner headline across all six columns on page 1 read: “PUTIN LED SCHEME TO AID TRUMP, REPORT SAYS.”
The lead article began: “President Vladimir V. Putin of Russia directed a vast cyberattack aimed at denying Hillary Clinton the presidency and installing Donald J. Trump in the Oval Office, the nation’s top intelligence agencies said in an extraordinary report they delivered on Friday to Mr. Trump.” Eschewing all subtlety, the Times added that the revelations in “this damning report … undermined the legitimacy” of the President-elect, and “made the case that Mr. Trump was the favored candidate of Mr. Putin.”
On page A10, however, Times investigative reporter Scott Shane pointed out: “What is missing from the public report is what many Americans most eagerly anticipated: hard evidence to back up the agencies’ claims that the Russian government engineered the election attack. That is a significant omission.”
Shane continued, “Instead, the message from the agencies essentially amounts to ‘trust us.’ There is no discussion of the forensics used to recognize the handiwork of known hacking groups, no mention of intercepted communications between the Kremlin and the hackers, no hint of spies reporting from inside Moscow’s propaganda machinery.”
Shane added that the intelligence report “offers an obvious reason for leaving out the details, declaring that including ‘the precise bases for its assessments’ would ‘reveal sensitive sources and methods and imperil the ability to collect critical foreign intelligence in the future.’”
Shane added a quote from former National Security Agency lawyer Susan Hennessey: “The unclassified report is underwhelming at best. There is essentially no new information for those who have been paying attention.” Ms. Hennessey served as an attorney in NSA’s Office of General Counsel and is now a Brookings Fellow in National Security Law.
Everyone Hacks
There is a lot of ambiguity – whether calculated or not – about “Russian hacking.” “Everyone knows that everyone hacks,” says everyone: Russia hacks; China hacks; every nation that can hacks. So do individuals of various nationalities. This is not the question.
You said at your press conference on Dec. 16 “the intelligence that I have seen gives me great confidence in their [U.S. intelligence agencies’] assessment that the Russians carried out this hack.” “Which hack?” you were asked. “The hack of the DNC and the hack of John Podesta,” you answered.
Earlier during the press conference you alluded to the fact that “the information was in the hands of WikiLeaks.” The key question is how the material from “Russian hacking” got to WikiLeaks, because it was WikiLeaks that published the DNC and Podesta emails.
Our VIPS colleague William Binney, who was Technical Director of NSA and created many of the collection systems still in use, assures us that NSA’s “cast-iron” coverage – particularly surrounding Julian Assange and other people associated with WikiLeaks  – would almost certainly have yielded a record of any electronic transfer from Russia to WikiLeaks. Binney has used some of the highly classified slides released by Edward Snowden to demonstrate precisely how NSA accomplishes this using trace mechanisms embedded throughout the network. [See: “U.S. Intel Vets Dispute Russia Hacking Claims,” Dec. 12, 2016.]

    NEXT PAGE >>> 

Geen opmerkingen:

Een reactie plaatsen