LOOK ==>>

NSA Whistleblower: Not So Fast On Claims Russia Behind Hillary Clinton Email Hack

Global Research, July 27, 2016
Washington’s Blog 26 July 2016
Clinton

The mainstream media alleges that Russia was behind the hack of Hillary Clinton’s emails.

The media is parading out the usual suspects alleged experts to back up this claim.

Washington’s Blog asked the highest-level NSA whistleblower in history,William Binney – the NSA executive who created the agency’s mass surveillance program for digital information, who served as the senior technical director within the agency, who managed six thousand NSA employees, the 36-year NSA veteran widely regarded as a “legend” within the agency and the NSA’s best-ever analyst and code-breaker, who mapped out the Soviet command-and-control structure before anyone else knew how, and so predicted Soviet invasions before they happened (“in the 1970s, he decrypted the Soviet Union’s command system, which provided the US and its allies with real-time surveillance of all Soviet troop movements and Russian atomic weapons”) – what he thinks of such claims:
Edward Snowden says the NSA could easily determine who hacked Hillary Clinton’s emails:

But mainstream media say it couldn’t:   http://www.businessinsider.com/dnc-hack-russian-government-2016-7

The mainstream media is also trumpeting the meme that Russia was behind the hack, because it wants to help Trump get elected. In other words, the media is trying to deflect how damaging the email leaks are to Clinton’s character by trying to somehow associate Trump with Putin. See e.g. http://www.nytimes.com/2016/07/26/us/politics/kremlin-donald-trump-vladimir-putin.html

Who’s right?all innuendo.

Binney explained to us:
 My problem is that they have not listed intruders or attempted intrusions to the DNC site.  I suspect that’s because they did a quick and dirty look for known attacks.

Of course, this brings up another question; if it’s a known attack, why did the DNC not have software to stop it?  You can tell from the network log who is going into a site.  I used that on networks that I had.  I looked to see who came into my LAN, where they went, how long they stayed and what they did while in my network.

Further, if you needed to, you could trace back approaches through other servers etc. Trace Route and Trace Watch are good examples of monitoring software that help do these things.  Others of course exist … probably the best are in NSA/GCHQ and the other Five Eyes countries.  But, these countries have no monopoly on smart people that could do similar detection software.

Question is do they want to fix the problems with existing protection software.  If the DNC and OPM are examples, then obviously, they don’t care to fix weakness probably because the want to use these weaknesses to their own advantage.literally lead to war.

So we should be skeptical of such serious and potentially far-reaching allegations – which may be true or may be false – unless and until they are proven.

READ ENTIRE ARTICLE HERE

Share

Comments are closed.

Listen Live with Player Below

Archives

September 2017
S M T W T F S
« Aug    
 12
3456789
10111213141516
17181920212223
24252627282930

User Login