Skip to main content

Did Russian Intelligence Hack the DNC Servers?

By Peter Van Buren

Short answer: nobody knows, but the media is treating it as a fact based primarily on a single technical source employed by the Democratic National Committee. I read the source’s publicly available explanation. Here’s what I found.

A Quick Taste of Media Conclusions

Despite a line in paragraph five saying “Proving the source of a cyberattack is notoriously difficult,” the New York Times offers the following statements.
“researchers have concluded that the national committee was breached by two Russian intelligence agencies;”
“Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects;”
“Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.”
“It is unclear how WikiLeaks obtained the email trove. But the presumption is that the intelligence agencies turned it over, either directly or through an intermediary. Moreover, the timing of the release, between the end of the Republican convention and the beginning of the Democratic one, seems too well planned to be coincidental.”

There’s more, but you get the picture. The article also quotes Clinton staffers citing unnamed experts and researchers.

Who Are These Experts?

The only experts cited work for a company hired by the Democratic National Committee to investigate the hack. There is no indication of any neutral third party investigation. The company, Crowdstrike, issued a publicly available report on what they found.

The report title makes clear the company’s conclusion: Bears in the Midst: Intrusion into the Democratic National Committee.

What Does the Report Say?

The report has some technical explanations, but focuses on conclusions that seem to be at best presumptions, despite the media treating them as fact.
The key presumptive conclusion seems to be that the sophistication of the hacks points to a nation-state actor. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities.”
The hackers, two separate entities Crowdstrike says worked independently, used techniques known to be used by Russians. Better yet, with no evidence at all presented, Crowdstrike concludes, “Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.” Also, for one of the alleged hackers, “Extensive targeting of defense ministries and other military victims has been observed, the profile of which closely mirrors the strategic interests of the Russian government.”
By the end of the report Crowdstrike is just plain out called the hackers “Russian espionage groups.”

FYI: Fidelis, another cybersecurity company, was hired by Crowdstrike to review the findings. Fidelis worked exclusively and only with data provided by Crowdstrike (as did several other companies.) Fidelis They concluded the same two hackers, COZY BEAR and FANCY BEAR APT, committed the intrusion, but made no comments on whether those two were linked to the Russian government.

Um, Valid Conclusions?

Despite the citing with certainty of experts and researchers by the media and the Clinton campaign, the only such expert who has made any findings public has basically thrown out little more than a bunch of presumptions and unsubstantiated conclusions.

Left undiscussed are:
the commonality of hackers using “false flags,” say where an Israeli hackers will purposely leave behind false clues to make it seem that a Hungarian did the work. As one commentator put it sarcastically “The malware was written in Russian? It was a Russian who attacked you.
Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”
the question of if the hackers were “Russians,” can anyone tie them to the Russian government? Joe Black Hat breaking into some system in Ireland may indeed be an American person, but it is quite a jump to claim he thus works for the American government.
there is also a significant question of motive. For Putin to be the bad guy here, we have to believe that Putin wants Trump in power, bad enough to risk near-war with the U.S. if caught in the hack, and bad enough to really p.o. Clinton who will be nominated this week anyway, and hoping of course that evidence of dirty tricks by the DNC released in July will be enough to defeat her in November. That’s a real s-t-r-e-t-c-h, Sparky.
other than those private persons who hack for their own entertainment or personal political beliefs, most work for money. They steal something and sell it. Information from the DNC system would find an easy buyer.
Who might be interested in buying these emails? Along the range of actors who would benefit from exposing these emails, why would the Russians come out on top? Perhaps the Republicans? China? Pretty much any of the many enemies the Clintons have amassed over the years? Hell, even Bernie Sanders, whose complaints about the DNC were validated by the email release. The suspects based on motive alone make up a very long list.

Learning More

For some intelligent analysis suspicious that the DNC hack was a Russian intelligence job, try this.

For some more technical information on one of the alleged DNC infiltrators, here you go.

Peter Van Buren, a 24-year veteran of the State Department, spent a year in Iraq. Following his book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People, the Department of State began proceedings against him. Through the efforts of the Government Accountability Project and the ACLU, Van Buren instead retired from the State Department on his own terms.

His second book, Ghosts of Tom Joad, A Story of the #99Percent (2014) is fiction about the social and economic changes in America between WWII and the decline of the blue collar middle class in the 1980’s.

If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says: It is vital to cast a skeptical eye over whatever evidence is presented to support the claim, made by Hillary Clinton’s aide Robby Mook, that this is all part of a Russian plot to sabotage the Democrats and help Donald Trump win the election.

'I don't want to use 4-letter words': Russian FM slams reporter over DNC leak claims

Comments

Popular posts from this blog

Why States Still Use Barrel Bombs

Smoke ascends after a Syrian military helicopter allegedly dropped a barrel bomb over the city of Daraya on Jan. 31.(FADI DIRANI/AFP/Getty Images) Summary Barrel bombs are not especially effective weapons. They are often poorly constructed; they fail to detonate more often than other devices constructed for a similar purpose; and their lack of precision means they can have a disproportionate effect on civilian populations. However, combatants continue to use barrel bombs in conflicts, including in recent and ongoing conflicts in Africa and the Middle East, and they are ideally suited to the requirements of resource-poor states. Analysis Barrel bombs are improvised devices that contain explosive filling and shrapnel packed into a container, often in a cylindrical shape such as a barrel. The devices continue to be dropped on towns all over Syria . Indeed, there have been several documented cases of their use in Iraq over the past months, and residents of the city of Mosul, which was re

Russia Looks East for New Oil Markets

Click to Enlarge In the final years of the Soviet Union, Soviet leader Mikhail Gorbachev began orienting his foreign policy toward Asia in response to a rising Japan. Putin has also piloted a much-touted pivot to Asia, coinciding with renewed U.S. interest in the area. A good expression of intent was Russia's hosting of the Asia-Pacific Economic Cooperation summit in 2012 in Vladivostok, near Russia's borders with China and North Korea. Although its efforts in Asia have been limited by more direct interests in Russia's periphery and in Europe, Moscow recently has been able to look more to the east. Part of this renewed interest involves finding new export markets for Russian hydrocarbons. Russia's economy relies on energy exports, particularly crude oil and natural gas exported via pipeline to the West. However, Western Europe is diversifying its energy sources as new supplies come online out of a desire to reduce its dependence on Russian energy supplies . This has

LONDON POLICE INDIRECTLY ENCOURAGE CRIMINALS TO ATTACK RUSSIAN DIPLOMATIC PROPERTY

ILLUSTRATIVE IMAGE A few days ago an unknown perpetrator trespassed on the territory of the Russian Trade Delegation in London, causing damage to the property and the vehicles belonging to the trade delegation , Russian Foreign Ministry Spokeswoman Maria Zakharova said during the September 12 press briefing. The diplomat revealed the response by the London police was discouraging. Police told that the case does not have any prospects and is likely to be closed. This was made despite the fact that the British law enforcement was provided with video surveillance tapes and detailed information shedding light on the incident. By this byehavior, British law inforcements indirectly encourage criminals to continue attacks on Russian diplomatic property in the UK. Zakharova’s statement on “Trespassing on the Russian Trade Mission premises in London” ( source ): During our briefings, we have repeatedly discussed compliance with the Vienna Convention on Diplomatic Relations, specif