THE HACKING CONTROVERSY… 

Summary of knowns/ unknowns   December 16, 2016

By Lt Col Howard

http://ltgjcmilopsg3.blogspot.com/2016/12/the-hacking-controversy-summary-of.html

ALL PARTIES AGREE:     Podesta’s email inbox was hacked when he responded to a phishing email requesting that he enter his email credentials.

1.     The White House and the  upper echelons  of US intelligence agencies now publicly claim that that they believe the hack of Podesta’s email inbox originated somewhere in Russia.

2.     An outside contractor [Dmitr Alperovich] specializing in computer  security claims the following: ”The phishing email itself bore hallmarks of prior Russian espionage attempts and the bit.ly link in the phishing email directed him to a server used by the “Fancy Bear” cyber espionage group, which is widely considered by cyber experts to be affiliated with the Russian FSB. The same “Fancy Bear” group has been implicated in attacks aimed at dissidents in Ukraine and Georgia, as well as military attaches in Western Europe and dissident Russian journalists.”

3.     The maximum statement to this belief can be found during the interview of Angela Stent on the PBS news hour, December 15, 2016

http://www.pbs.org/newshour/bb/putin-involved-u-s-election-disruption/    [transcript below].

4.     The Russian government disputes that they were actively involved.

5.     FBI Director James Comey has suggested that the hack might have been carried out by a private individual operating from within Russia.

6.     Julian Assange,in an interview with Sean Hannity  December 15, 2016 states that “no state actor was involved.” They then play the statement by national security director James Clapper which supports this view. [James Clapper’s statement begins approximately at the 2.3 minute point].

https://www.youtube.com/watch?v=6R-D1fvMtbk&pbjreload=10&ab_channel=TracyD.

Also,Assange participated in a virtual seminar with several hundred hackers who quizzed him intensively and were satisfied with his explanations of how he obtained the materials. Viewing the tapes creates a presumption that Russia, in fact, had nothing to do with their acquisition   nor with dissemination.

7.     The best review of the entire actual situation is:  MILITARY INTELLIGENCE  Monday, November 7, 2016 WHAT IS PUTIN’s REAL GAME

8.     To put  these specific hacking’s into  perspective, in the year 2o16 ,there have been many hundreds of hackings, intrusions, compromises, hijackings, etc.   The following site presents a very vivid graphic  illustration of the scope and magnitude of the hacking phenomena: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Here is a sample of 5 other links:

https://www.entrepreneur.com/slideshow/279740

https://www.identityforce.com/blog/

https://www.checkmarx.com/

www.darkreading.com/cloud/

www.businessinsider.com/yahoo-

9. There is significant skepticism with the current White House operation.

a.     To pass Obamacare, the political consultant/architect was Jonathan Gruber,the Obamacare Architect: “Yeah, We Lied to The “Stupid” American People to Get It Passed”

https://www.youtube.com/watch?v=G790p0LcgbI&ab_channel=AmericanCommitment

b.     Ben Rhodes’ Iran Deal ( “wag the dog”) echo chamber operation) which was  explicitly intended to mislead the US public in order to sell this administration’s desired  Iran agreement [ The aspiring novelist who became Obama’s foreign-policy guru  by David Samuels  New York Times May 5, 2016]

Below, is an excerpt from the New York Times which reproduces in Ben Rhodes’ own words Rhodes’s  campaign to sell the Iran

“We created an echo chamber,’ he admitted, when I asked him to explain the onslaught of freshly minted experts cheerleading for the deal. ‘They were saying things that validated what we had given them to say.”

c.      Intelligence analysts  have complained that their  output is being distorted by the political echelon [50 Spies Say ISIS Intelligence Was Cooked

http://www.thedailybeast.com/articles/2015/09/09/exclusive-50-spies-say-isis-intelligence-was-cooked.html];

d.  The false certainty of the US intelligence community that  Saddam Hussein  actually possessed nuclear weapons

PARTIAL TRANSCRIPT:ANGELA STENT OF GEORGETOWN UNIVERSITY

ABOUT PUTIN AND THE U.S. OPTIONS FOR RESPONSE. PBS NEWSHOUR 12-15-16

HARI SREENIVASAN:We look at Putin’s role now with Angela Stent.  She served in the State Department during the Clinton administration.  She’s now a professor at Georgetown University.

Does it make sense that Vladimir Putin would have a role?…

 Can something like this — it’s a big government, like all governments are — can something like this happen without his knowledge or approval?

ANGELA STENT:  I think he must have known on some level that this was happening.  I mean, hackers couldn’t just have done this freelance without at least having a sense that this was permitted.  Whether he personally directed it, I think that’s much more difficult to say.  I haven’t seen the evidence.  None of us have.  We’ve had contradictory statements from our own officials.

So, I think we’d have to know more about the personal direction.  But, clearly, there was an environment that encouraged this to happen.

HARI SREENIVASAN:  Well, what about the assessment by the intelligence community that this was an effort to help Trump win?  Was it, as you said, perhaps revenge against Hillary Clinton, or was it that other element, too, to actually help Donald Trump?

ANGELA STENT: Well, clearly on the campaign trail, Donald Trump consistently praised Vladimir Putin.  It was only world leader that he consistently praised.  He said we need to do a deal with Russia.  We shouldn’t have such bad relations with Russia.

Whereas Hillary Clinton took a pretty tough line, as she had since leaving secretary of state.  So, I think it’s credible to believe the Russians wanted Donald Trump to win.  I’m not sure they expected him to win, but I think they saw an opportunity there.  Also, really, to help muddy the waters here and to have Americans questioning what was really going on.

HARI SREENIVASAN:  What could the U.S. do in response?

ANGELA STENT:  It’s very difficult to respond in kind.  I mean, we may be retaliating in ways that we don’t know.  It would be very hard to prosecute the hackers themselves.  And to do what they did, which is to then hack into people’s e-mails, and then release information that might help another candidate in an election.

I mean, Vladimir Putin is going to run for president in 2018, but it’s not going to be a competitive election.  So, we can’t — we couldn’t respond in kind anyway.

And so, I think, you know, that — there’s the possibility of sanctions that’s talked about in the Congress.  I’m not sure that that would do any good.  And I don’t think a Trump administration would want those sanctions.

So, I actually think one of the things that we should do, once the next administration is in office, is to try and work out with the Russians, as we have with the Chinese, at least some kind of a cyber agreement, some rules of the game, which — which we don’t have now with the Russians.  I’m not saying this would prevent this from happening again, but I think we need to at least try and work on out rules of the game with them.

HARI SREENIVASAN:  I was going to say, do these kind of agreements hold?

ANGELA STENT:  Well, with the Chinese, there are different views on this.  I mean, some aspect of it, apparently, have worked.  Others haven’t.  It’s really the best one can do because we’re in a very shadowy world there.

I mean, it’s very hard to know exactly who did the hacking and then, you know, who directed them.  As I said, it’s very difficult to prosecute.

December 17, 2016 | 15 Comments »

Subscribe to Israpundit Daily Digest

Leave a Reply

15 Comments / 15 Comments

  1. “Conclusive Proof Russia Hacked The Democrats

    *Every leaked John Podesta email included a different borscht recipe.
    *Strong Evidence suggests Hillary Clinton’s private server contained a bootleg cut of Rocky IV in which Drago wins.
    *Every night, the White House has GrubHub-ordered goulash deliveries showing up that no one ordered.
    *Last time Obama checked, all the nuclear code passwords had been changed to ‘YakovSmirnoff5″
    *Trump says, they didn’t

    http://www.madmagazine.com/blog/2016/12/16/conclusive-proof-russia-hacked-the-democrats

  2. @ yamit82:
    In the end the whole circus will turn into a giant pie in the face spectacle at best or later on, a giant file against the Hawaiian fellow..
    At any rate… It must have been the one arm man or the Russians, who knows… Maybe Bush is at fault.

  3. @ LtCol Howard:

    Why is Obama’s DHS hacking multiple states’ election systems?
    Read more at http://www.patdollard.com/breaking-2-more-states-join-georgia-in-saying-their-election-systems-were-hacked-by-obama/#Tzgslo5E21jyghSZ.99

    SCANDAL: 2 More States Join Georgia In Saying Their Election Systems Were Hacked By Obama
    Read more at http://www.patdollard.com/breaking-2-more-states-join-georgia-in-saying-their-election-systems-were-hacked-by-obama/#Tzgslo5E21jyghSZ.99

  4. @ LtCol Howard:

    The FBI knows full well that the best hackers and most State backed cyber warfare pros #1 would have no problem hacking into DNC or HRC’s servers no would most cyber criminals and the best of them would leave no hacking footprints or markers and if they do leave some markers it’s a good bet they are a false flag….American intel known for their failures does not inspire one to trust especially since they have long been politicized at the top and it appears so have all the rest including the FBI and Justice system. If you want the truth hook up your filters and search the alt net for some information…. If your filters are good you might get to some of the real truth behind these revelations of who hacked and why etc.

  5. @ yamit82:
    A government sponsored hacking is virtually impossible to prevent at personal level or trace otherwise, so if the CIA is telling us that they did, BS.
    And it comes with the package that every country with a semblance of intelligence gathering capability hack and spies on everyone and the circle is closed.
    I received a brilliant joke on the subject.
    A picture of a cunningly smiling Mr. Putin includes the following remark by him;
    “If I could influence your elections you would not have had to endure Obama for 8 years”… 🙂

  6. @ SHmuel HaLevi 2:

    Everybody is Hacking everybody else some for nefarious criminal motivations some for Industrial theft, some just for the malicious fun out it and some for military state secrets. The good hackers won’t leave traces back to themselves but might leave false flag markers to implicate third parties…. As shown by Stuxnet

    We Know American Intel agencies have been hacking everyone including Israel and I assume Israel is hacking everyone as well including America so all this faux anger and upset is total BS distractions from what is really going on out there. It does bother me that Western software security companies were hired and accepted payment to find and eradicate Trojan worms infections of our worst enemies.

    I have been hacked a few times but I keep no personal data on computer and now all important data I want to keep is off disk so I can delete my OS and replace now with min of distress

    What bothers me more is censorship by FB. I was banned FB jail for 24 hrs for speaking truth, they are going after Jews with a vengeance and leaving Jew haters and Muzzies free to publish…. That is the real danger not hacking.

  7. Lets see if this comment is not lost in cyber cloud…
    I was hacked three time this year/ My RFI Site was hacked seven times. Many US central government operations got hacked as well. Not an exceptional happening.
    Even this Blog was severely taped.
    The real sing song is predicated upon the fact that the Hussein folk got clobbered by the voters and the look for excuses.

  8. I don’t buy the assumption that Putin wanted Trump to win just because he wants good relations with Russia, etc.

    Why would Putin NOT want Clinton to win? She has time and again shown that she is for sale and therefore more controllable than Trump.

    And if the Russians were indeed the hackers,they must have realized the seriousness of trying to influence the US elections – so why would they leave a trail that led straight back to them? Why be so obvious?

    My guess is that Brennan is behind all of this and at the behest of his boss, Obama and Hillary. Everyone else is trapped inside another echo chamber similar to the one described in the article in reference to Ben Rhoades and the selling of the Iran deal or Gruber and his slight of hand in selling Obamacare.

    It’s all BS aimed at calling into question the legitimacy of the Trump presidency into question.

    We’re not stupid. We’ve watched these people and their water-carriers lie to us for years, but now we should believe them!?! Not happening!

  9. It is said that Seth Rich was murdered for leaking emails, he was a member of the dem campaign team… ruled a robbery attempt with nothing stolen, shots in the back.

    iNteresting for me is that I beleive Trump and the skeptics more than the Pres, the CIA, the FBI, the DOJ and the MSM…. I wonder why his version makes more sense to me than theirs?

  10. Thank you for the link to Judge Napolitano.
    I am trying to document this CIA role in reviewing the White House talking points relating to the Benghazi cover-up. Any help would be appreciated.

    Also the Department of Energy and the CIA maintained that certain tubes manufactured for Saddam Hussein were intended for artillery use. In fact, they were a test of design/manufacturing capability for centrifuges. This was the technique used by Dr. Kahn in providing Pakistan with nuclear capabilities and by the CIA itself in the global Explorer project