Since Intelligence Community Inspector General Atkinson opened the door for anyone to report anything without having firsthand knowledge, I think I have a far more substantive complaint than the current alleged whistleblower.
The Intelligence Community claim that the DNC emails were taken via a Russian spearphishing attack is a lie. All 35,813 DNC emails posted on Wikileaks are in a FAT format according to the metadata. This means the emails were downloaded onto a recordable media, such as a thumb drive.
James Clapper, the U.S. Director of National Intelligence, released a document in January 2017 with the title, Assessing Russian Activities and Intentions in Recent US Elections. This document has been described in the media as an “Intelligence Community Assessment” aka “ICA.” But it includes the contribution of only three agencies—the Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA). Two other members of the Intelligence Community that had key expertise on this subject matter—the Bureau of Intelligence and Research (INR) at the U.S. Department of State and the Defense Intelligence Agency (DIA)--and should have been involved in this assessment were excluded from contributing to and “coordinating” on this document.
(Note—the term “coordination” is a term used in the Intel Community as shorthand for describing the process that the analyst, who drafts this kind of report, follows prior to submitting the draft for publication. Once a draft is prepared the analyst must share it with those agencies/intel sources cited in the report and request their concurrence with the statements and conclusions. For example, if a CIA analyst is the lead writer and refers to or cites a piece of intelligence produced by the NSA, the analyst is supposed to get his or her counterpart at the NSA to review and approve what has been drafted or suggest alternative language or refuse to clear the use of the material in the report.)
A key conclusion of the ICA Key Judgments focuses on the actions of the Russia’s military intelligence organization, the GRU.
We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks.
But two key members of the Intelligence Community with expertise on the GRU—INR and DIA—were not asked to contribute nor coordinate on this so-called Community Assessment.
The main narrative of this Intel Communisty Assessment (aka ICA) bears the title, Russia’s Influence Campaign Targeting the 2016 US Presidential Election. ICA specifically blames Russia’s GRU for taking the emails from the DNC server:
In July 2015, Russian intelligence gained access to Democratic National Committee (DNC) networks and maintained that access until at least June 2016.
The General Staff Main Intelligence Directorate (GRU) probably began cyber operations aimed at the US election by March 2016. We assess that the GRU operations resulted in the compromise of the personal e-mail accounts of Democratic Party officials and political figures. By May, the GRU had exfiltrated large volumes of data from the DNC.
If you go to the Wikileaks site you can see for yourself that the emails taken from the DNC cover the period from January 2015 to May 25, 2016. The ICA claims that “Russian intelligence gained access to the DNC networks” starting in July 2015 but offers no evidence or citation to support this conclusion. Taken at face value, this claim raises additional questions. For example, when did the U.S. intelligence community discover or learn that the Russians were attacking the DNC network starting in July 2015? Was it July 2015 or was it after the Washington Post reported in June 2016 that Russia had hacked the DNC?
If the U.S. Intelligence Community learned in real time in July of 2015 of this Russian military cyber offensive, then we have prima facia evidence of a major intelligence failure by the U.S. Intelligence Community. How so? One of our political parties was under attack by a foreign intelligence organization and the Obama Administration took no action to stop or disrupt this attack.
The failure to act could be explained by the fact that the IC only discovered the penetration of the DNC after the fact. If they only learned about the GRU activity in the wake of the Crowdstrike announcement in June 2016 about Russian penetration that this occurred then they are acknowledging that NSA has the technical systems in place to retroactively search NSA records and track certain activity by the Russians.
Here is what we know for certain--at no time in the 11 months between July 2015 and June 2016 did the Intelligence Community warn the DNC that they were the target of a Russian intelligence operation. And in May of 2016, when the DNC claims it was alerted to the GRU intrusion by a private contractor (Crowdstrike), neither the NSA nor the CIA nor the FBI spoke up to corroborate the Crowdstrike claim.
We also know that everything the FBI and NSA claim to know about the DNC servers came from Crowdstrike. FBI Director Jim Comey testified to the House Intelligence Committee in March 2017 and stated the following:
“we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system."
Same with the NSA. NSA Director Admiral Mike Rogers and FBI Director Comey at the same March 2017 hearing told Congressman Hurd of Texas the following:
HURD: Director Rogers, did the NSA ever get access to the DNC hardware?
ROGERS: The NSA didn't ask for access. That's not in our job...
HURD: Good copy. So director FBI notified the DNC early, before any information was put on Wikileaks and when -- you have still been -- never been given access to any of the technical or the physical machines that were -- that were hacked by the Russians.
COMEY: That’s correct although we got the forensics from the pros that they hired which – again, best practice is always to get access to the machines themselves, but this – my folks tell me was an appropriate substitute.
If the DNC really was attacked by a foreign government, why did the DNC keep U.S. law enforcement and intelligence agencies at arms length? This reaction is not consistent with a victim of a foreign attack. This is akin to a person being robbed in their home and refusing to let the police come in and collect evidence in order to identify the culprits and punish those responsible.
The lack of cooperation between DNC/Crowdstrike and the U.S Government is especially troubling because a senior executive at Crowdstrike was a former senior Agent of the FBI with cyber security responsibilities. Not a single member of the U.S. Intelligence Community did anything to stop or limit this alleged GRU attack.
In line with the claim in the January 2017 ICA, Special Prosecutor Robert Mueller also claimed that the alleged attack on the DNC was conducted using a “spearphishing” attack but provided more details:
Two military units of the GRU carried out the computer intrusions into the Clinton Campaign, DNC, and DCCC: Military Units 26165 and 74455. 110 Military Unit 26165 is a GRU cyber unit dedicated to targeting military, political , governmental , and non-governmental organizations outside of Russia, including in the United States. 111 The unit was sub-divided into departments with different specialties. One department, for example, developed specialized malicious software "malware", while another department conducted large-scale spearphishing campaigns. 112 (see p. 36 of the Mueller Report). . . .
GRU officers also sent hundreds of spearphishing emails to the work and personal email accounts of Clinton Campaign employees and volunteers. Between March 10, 2016 and March 15, 2016 , Unit 26165 appears to have sent approximately 90 spearphishing emails to email accounts at hillaryclinton.com. Starting on March 15, 2016, the GRU began targeting Google email accounts used by Clinton Campaign employees, along with a smaller number of dnc.orgemail accounts. 117
The GRU spearphishing operation enabled it to gain access to numerous email accounts of Clinton Campaign employees and volunteers, including campaign chairman John Podesta , junior volunteers assigned to the Clinton Campaign's advance team, informal Clinton Campaign advisors, and a DNC employee. 118 GRU officers stole tens of thousands of emails from spearphishing victims, including various Clinton Campaign-related communications.
The claim that the GRU obtained DNC emails via spearphishing is demonstrably false. If the DNC emails had been obtained via “spearphishing” then the documents would have been transferred via the internet and the metadata contained in the DNC emails would show specific markers consistent with such a transfer. But the metadata in the DNC emails tells a radically different story.
Before delving into the forensic evidence it is important to review how the alleged hack of the DNC was discovered and reported. Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:
- It was 29 April 2016, when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
- According to CrowdStrike founder, Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
- Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
- The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
- 10 June 2016--CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire’s Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
- On June 14, 2016, Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC—Crowdstrike--, wrote:
- Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
- The intruders so thoroughly compromised the DNC’s system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
- The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
- 15 June, 2016, an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. However, the meta data in the documents posted by Guccifer 2.0 appear to be deliberately crafted to show "Russian" involvement.
- The DNC emails that were released on July 22, 2016 by Wikileaks covered the period from January 2015 thru 25 May 2016.
The public has been sold a fabricated story that does not pass the common sense smell test--i.e., that an allegedly competent cyber security company discovered on May 6, 2016 that the Russians were in the DNC network but Crowdstrike did not act to remove the Russians until 35 days later (i.e., June 10, 2016). Crowdstrike's behavior defies common sense--who waits more than a month to shutdown a network that you claim was penetrated by a foreign power? You find a robber in your home and you wait a month to call the police or chase the criminal out? No serious, competent cyber security expert would countenance such misconduct.
There is forensic evidence that rebuts the Crowdstrike story of a Russian hack. The meta-data in the emails posted on Wikileaks provides clear evidence that the emails were not taken from the DNC via a spearphishing attack. If the Russians had actually "entered" the network, as claimed by Crowdstrike, by using a bogus email to bait an unsuspecting user to click on a link or reply then the emails from the DNC server, the metadata in the messages posted at Wikileaks would not be in FAT format. It is essential to recall that Crowdstrike claimed this hack was done using malware christened as "Fancy Bear" and "Cozy Bear." But the meta data tells a different story.
The metadata in the DNC emails at Wikileaks are in FAT format. This means that those messages were downloaded onto a physical device, such as a thumb drive.
An examination of the Wikileaks DNC files shows that the emails posted on 22 July 2016 were created on 23 and 25 May. Currently, there are other DNC emails posted at Wikileaks that have a last modified date stamp of 26 August. The fact that the metadata in all of these messages are in a FAT system format means that the data was transfered to a storage device, such as a thumb drive, before being sent to Wikileaks.
The truth lies in the “last modified” time stamps contained in the metadata on each DNC email posted on Wikileaks. Every single one of these time stamps end in even numbers. If you are not familiar with the FAT file system, you need to understand that when a date is stored under this system the data rounds the time to the nearest even numbered second.
Bill Binney has examined all 35,813 DNC email files stored on Wikileaks and found that all files "last modified" time stamps ended in an even number—2, 4, 6, 8 or 0. There are 10,520 emails with the last modified date of 23 May 2016. There are 11,936 emails with the last modified date of 25 May 2016. If a system other than FAT had been used, there would have been an equal probability of the time stamp ending with an odd number. But that is not the case with the data stored on the Wikileaks site. All end with an even number.
If the DNC emails had been stolen via a spearhphising attack, then the last modified time stamp would show odd numbers as well as even numbers. But that is not the case. There is no evidence apart from assertions by Robert Mueller and the Intelligence Community that Russian operatives spearphised their way into the DNC network. Let me repeat that--there is not one shred of evidence provided by either Robert Mueller or the U.S. Intelligence Community to support their claim that Russia was behind the DNC hack.
If the DNC network actually was penetrated by a spearphishing attack, i.e., an internet based hack of the DNC computer network, then the National Security Agency would have that evidence. The technical systems to accomplish this task have been in place since 2002. The NSA had an opportunity to make it clear that there was irrefutable proof of Russian meddling, particularly with regard to the DNC hack, when it signed on to the January 2017 “Intelligence Community Assessment,” regarding Russian interference in the 2016 Presidential election. They made no such claim.
Thanks to Edward Snowden we know that the NSA has been collecting the full content of U.S. domestic e-mail, without a warrant since 2002. The communications collected include the full content and associated metadata of phone calls, e-mail, text messages, and web queries performed by almost all United States citizens. (Metadata consists of information about other data. For e-mail, it would include information such as the name of the sender and recipient; the date and time it was sent; and the internet service provider used to send the message.)
These records are collected inside the United States, as well as at overseas locations. The data is then stored in data centers located at Fort Meade, Maryland; Bluffdale, Utah; and at other sites in the United States. Since 2001, NSA collection has expanded to collect everything on the fiber Communications inside the US. This is achieved within the “Upstream” NSA Program. This program includes subprograms for each communications company assisting them. For example, Fairview is the name for the AT&T Program, Stormbrew is the name for the Verizon program, etc.
The Snowden documents make it clear how this collection is occurring. For example, one of the documents taken by Edward Snowden is labeled "Fairview at a Glance." Fairview is the NSA program responsible for the upstream collection of data from the AT&T telecommunications system. This slide shows the locations where the NSA has tapped into the AT&T system to collect data from the system. As the slide indicates, the vast majority of the data collected is domestic communications. Conversations with foreigners are represented by the green dots, which mark international fiber optic cables coming in from offshore. The slide shows that the NSA is collecting both "content" and "metadata" as part of the Fairview program.
Another document revealed by Edward Snowden is labeled "US-983 Stormbrew." It is a photograph of the tap points for the NSA's Stormbrew program. Stormbrew is the program responsible for the upstream collection of data from the Verizon telecommunications network. As indicated by the photo, collection from Verizon is also occurring within the United States.
A document from the Snowden collection, labeled "Blarney Access," shows the tap points for the NSA's Blarney program. Blarney is the program responsible for the upstream collection of data from 30+ providers of internet service, domestic long-distance service, and data centers. Once the data is collected, the NSA breaks it down into various subcategories, which are made searchable through various query-programs.
The information released by Edward Snowden leaves no doubt that the NSA had systems and programs in place that collected any emails taken over the internet by a Russian intelligence operation. Moreover, if such an attack by Russia actually had taken place then the NSA also has the ability to trace the route or routes that those emails transitted.
There also is the question of how Wikileaks obtained this information. Both British and U.S. intelligence agencies made it a priority to monitor and collect all electronic communication going into Wikileaks in the aftermath of the classified information illegally taken by Bradley “Chelsea” Manning. In theory this intelligence community collection should provide some clue about the last communications point before the emails entered the Wikileaks system. But no such evidence has been proffered to the public.
Julian Assange, the founder of Wikileaks, has repeatedly and consistently insisted that Russia was not the source and, according to the Ellen Ratner, the sister of his lawyer, the source was someone within the Democratic campaign of Hillary Clinton.
This complaint does not reach any conclusion about the specific identity of the person or persons who leaked the DNC emails to Wikileaks. But the U.S. Government claim that Russia hacked the DNC is a lie. The evidence presented in public makes clear that Russia did not obtain those emails via spearphishing.
Larry..I have been following your Open Work since your Days of Going Public about the Players involved in the 9/11 Attacks..The WMD claims..The Invasion of Iraq..and The Motives of Domestic and Foreign Officials..and Organizations...You are Honest..a Very Talented Analyist..and often so Well Researched...and Far ahead of the Curve...That very few People..even in the IC...Can keep up with you..You know who the Bad guys are..The level of Intrigue...and Espionage Involved...and What The Real Means and Methods And Who Used Them and Why..Cyber Espionage..You have done everything you can to Expose It..Most is Internal..Good Work...Larry
Posted by: Jim Ticehurst | 03 October 2019 at 08:05 PM
jim ticehurst
His ego is big enough. Don't inflate it any more than it is. I have to live with him. (internet and telephone)
Posted by: turcopolier | 03 October 2019 at 08:28 PM
Larry, you don't get files of any format from spear phishing. All you get is access. The fact that DNC emails provided by the Guccifer 2.0 entity were, at some time, copied to a drive, volume or partition (maybe even a thumb drive) formatted in FAT32 does not rule out Russian hackers or local leakers. The files could have been copied to a hidden partition created by hackers within the DNC network t for later tar balling and transfer. That's just another theory just like the Forensicator's thumb drive theory. In fact the thumb drive theory posits that the thumb drive was a bootable Linux drive. Since when does Linux run on FAT32? They're both theories, not proof. Another theory is that all those files were deliberately manipulated through date/time changes, file format changes and other manipulation by whoever is behind the Guccifer 2.0 entity just to obfuscate the issue. Just another theory.
Posted by: The Twisted Genius | 03 October 2019 at 08:58 PM
David, I have discussed this with Bill. Since this material was provided after the death of Seth and after Julian published the initial tranche his belief is that this indicates someone else was involved beyond Seth.
Posted by: Larry Johnson | 03 October 2019 at 09:29 PM
For the love of God. Are you being deliberately obtuse? If the Crowd Strike story was true (it is not, it is a total fabrication) they would have shutdown the servers on the 7th of May and installed new malware detection software. THEY DID NOT DO THIS. THEY WAITED MORE THAN 40 DAYS (SUPPOSEDLY) TO DO THAT. Please deal with the facts. Not with your blind hatred of Trump.
Posted by: Larry Johnson | 03 October 2019 at 09:33 PM
Joe, et al, Yes, I, too, recall reading things on Pinchuk & his support of the Clinton "Foundation" way before Russiagate via Helmer. Stench was overwhelming even then.
Posted by: JerseyJeffersonian | 03 October 2019 at 09:44 PM
All
I hope everyone knows I was joking about Larry. He is a splendid fellow and the closest of friends.
Posted by: turcopolier | 04 October 2019 at 07:47 AM
A server is just a computer. The various parts inside the computer case can be replaced/upgraded as necessary. Hard drives are the interesting part(s) of any computer/server. The hard drives are where the files are and it takes at most 5 minutes to remove and replace a hard drive. So the correct questions would be 1) Are the
current hard drives the hard drives that were in the servers when they files were taken. 2) Are there any tape or offsite or other backups of, or images of the original hard drives.
Posted by: CK | 04 October 2019 at 10:42 AM
akaPatience,
Unfortunately I am in transit, and so cannot comment as extensively as I would like on a range of matters brought up in this thread.
However, there is one critical point of fact. As Ty Clevenger, who submitted the complaint which was the basis of the ‘sundance’ post to which you link, noted in a ‘mea culpa’ on his ‘Lawflog’, the suggestion that Ellen Ratner had told Ed Butowsky that Assange had identified both Rich brothers as sources was a mistake made by him.
What he says is that Butowsky was already on public record as saying that he first learned that Aaron Rich was involved along with Seth from the boys’ parents. This was obviously an error very embarrassing to Assange, given that he would have been putting Seth’s brother very clearly at risk.
It was corrected in the ‘Second Amended Complaint’ submitted on 31 July – after the ‘sundance’ post.
In my view this document – freely available if one puts ‘Butowsky v Gottlieb Courtlistener’ into Google – should be read with care by anyone seriously interested in getting to the truth about ‘Russiagate.’
Those who are still attempting to defend the hokum put out by Alperovitch, Mueller et al should either provide a reasoned critique of the version Butowsky has provided, or fall silent.
There is another key claim he is making which should be central to informed public discussion of this whole farrago.
Like others, I had assumed that the account of Rich’s role in supplying the materials from the DNC published by ‘WikiLeaks’, and the role of the FBI in covering this up, which was supplied by Seymour Hersh in the extended conversation with Butowsky which has been available on the net for a long time, came from a genuine ‘whistleblower’ who was likely to be telling the truth.
What Butowsky is now saying is that in a separate conversation, Hersh told him his source was Andrew McCabe.
If this is so, I think we have seriously to consider the possibility that a journalist with a very well-merited reputation was being successfully manipulated by some of the conspirators in a bid to obscure the most damaging parts of the truth by a kind of ‘limited hangout.’
Unfortunately I am relying on memory, but if I recall right a key suggestion by Hersh in the conversation was that Seth Rich approached ‘WikiLeaks’ with a sample of emails in late spring/early summer 2016 – the dividing line given being, I think, 22 June.
My strong suspicion is that surveillance on Assange and virtually anybody who could be in direct or indirect contact with him had established significantly before this that materials from the DNC were likely to be published by ‘WikiLeaks.’ It is likely that both GCHQ and MI6 were intimately involved in this.
The identity of the source, however, is only likely to have been established significantly later. Quite possibly, it was only possible to identify Seth Rich following the calling in of the laptops on 10 June. That said, key figures in the conspiracy are likely to have well aware of the actual position significantly before his murder, a month later.
It is my quite strongly held view that Butowsky has already provided enough documentary evidence in support of his version for the onus of proof to be very heavily on those who want to defend the conventional ‘narrative’ according to which he is some kind of malign ‘conspiracy theorist.’
Further, I think it highly unlikely that he would ‘gone public’ with claims about what figures like Hersh, Ellen Ratner, and Rich’s father said to him if he thought they had any realistic chance of exposing him as a liar. And more generally, my very strong sense of the man – not least from the impression left by his discussion with Hersh – is that, with Butowsky, what you see is what you get.
Perhaps, when all the ‘smoke’ is cleared away, he will have been seen to have a role in this whole sorry affair different from, but as heroic as, that of Colonel Picquart in the Dreyfus scandal.
Posted by: David Habakkuk | 04 October 2019 at 12:27 PM
Thanks for your reply, and observations.
I had "in-the-building" contact with their professionals back in the 1970s,
and based on that I would never underestimate their ability to organize and analyze data, nor their ability to acquire the money to store a lot of data.
Of course, there is so much now flowing over the net, it may be beyond their ability to store.
A real problem they must have, though, is a human problem: How to interpret what they are seeing and reading?
There is a large amount of subjectivity in interpreting text, and I am sure that is driving them bonkers.
Another point on NSA:
I was rather gobsmacked when I read the background of their new Director of Cybersecurity, Anne Neuberger.
Among other things, both her parents were among the hostages at Entebbe!
Just what we DON'T need, in my opinion: people with family ties to countries such as Israel.
Dual loyalties may be a radioactive subject, but that doesn't lessen its reality.
Just my opinion.
More on her background:
This is a far cry from what was once the ideal at NSA, a person such as Dr. Tordella (NSA bio, Wikipedia).He was all but revered when I was there.
I wonder if their criteria for leadership have changed from those years.
Posted by: Keith Harbaugh | 04 October 2019 at 12:27 PM
For those interested in the Clinton connections see: http://johnhelmer.org/?s=Bill+Clinton
While all of these connections have been in "plain" view for years by those following the few solid investigative journalist sources, I think little or none of this reporting has surfaced in mainstream media.
This may be why the same crowd (Lawfare, etc.) trying to use "Ukraine" to entrap Trump after their Russiagate scam failed has used a topic that could surface the potentially very damaging Clintons/Biden, etc. connections with highly corrupt oligarchs like Pinchuk..
It feels to me that Pelosi/Nadler have leaped before looking..
Posted by: Joe100 | 04 October 2019 at 01:04 PM
David
Don’t you find it interesting that Hersh has been so quiet for couple years on this story?
Posted by: Jack | 05 October 2019 at 04:15 AM
Why isn't DOJ going after former vp (small letters) Joe Biden for 'money laundering' with his strong arm tactics on the Ukraine?
Biden blackmailed Ukrainians using his position with U.S. Taxpayer monies to force the firing of the Ukrainian Attorney General for investigation of the Biden bribes. The sad thing is that Biden's criminal extortion was out in the open, flagrant, blaring. Biden even boasted about his criminal racketeering in public. Rico statute. Burisma Oil transferred to Biden via Biden's son Hunter Biden. More than $166 grand a month from 2014 into 2015. Even after the Ukrainian AG's firing, the Biden extortion money continued to flow in.
Biden, like Hillary Clinton considers himself 'untouchable'. My Christmas wish is that DOJ will put Joe and Huter Biden in their proper fashion suits, federal orange.
Posted by: j | 05 October 2019 at 01:00 PM
j,
Why did Obama let him get away with it?
Posted by: Fred | 05 October 2019 at 01:40 PM
Jack,
I find it extremely interesting. As I said, I am in transit, and am also trying to assimilate a lot of new information.
Hopefully, there will be further discussion of these matters in the not too distant future, and I may be able to produce a more considered contribution then.
But, briefly, it is not evident to me, yet at least, that the failure of either Hersh or Ellen Ratner publicly to support Butowsky’s claims gives me any reason to revise my judgement that the latter’s accounts are both provided in good faith and essentially accurate.
Accordingly, I think it likely that the claim that Hersh identified McCabe as his high level source is accurate.
If this is so, a $60,000 – or perhaps $600,000 – question is what was one of the ‘prime suspects’ in “Russiagate’ doing when he sold this version to someone who has been one of the best-informed, and most courageous, ‘conduits’ for elements in the U.S. Intelligence and military apparatus who are deeply unhappy with the directions in which their country’s foreign and security policies have gone.
A further question then becomes why did Hersh believe, or at least profess to believe, McCabe.
Of course, I may well be barking up the wrong tree. But I think it would be helpful if the claims made in the various lawsuits filed on behalf of Butowsky by Ty Clevenger and Steven S. Biss were seriously evaluated, rather than ignored or misrepresented.
Posted by: David Habakkuk | 05 October 2019 at 03:18 PM
David,
If Ed Butowsky claims that Sy identified McCabe as his source, Butowsky is lying. Under no circumstances would Sy ever identify a source (as least a living one). I've played golf regularly with Sy over the last 10 years. Never once has he offered up the name of a source.
Posted by: Larry Johnson | 05 October 2019 at 05:00 PM
Very few want to get to the truth. Definitely not the mainstream media. No wonder the Average Joe has no idea about this defamation law suit by Butowsky.
Take a look at NBC's hysterical Chuck Todd:
https://twitter.com/brianstelter/status/1179889352693952513?s=20
He says Trump calling on China and Ukraine to investigate Biden is an "attack on democracy". Yet he was the same guy peddling Russia Collusion based an administration and Democratic party campaign using foreign intelligence to actually interfere in an election.
I hope Butowsky is vindicated in the federal court in Texas.
Posted by: blue peacock | 05 October 2019 at 05:20 PM
Complicit in Racketeering.
All White House Administrations view the Teflon rule as their own, sure appears that way. The only one with the Teflon application that I can see is the number one position, not the number 2. Number 2 can always claim that number 1 made them do it. Their get of jail free card, or so they think anyways. Number 1 using number 2 as their pleasurable deniability or fall guy rule.
Posted by: j | 05 October 2019 at 05:28 PM
Keith,
"Though her parents are not Israeli, they were held by the hijackers for a week along with Israeli passengers because they were Jewish."
https://www.timesofisrael.com/orthodox-jewish-woman-named-cybersecurity-chief-for-us-spy-agency/
"A member of one of the 100 wealthiest families in the United States, Neuberger transitioned from the private sector into government service following the September 11 attacks."
I'm sure that will trigger more people than her religion.
"She told The Wall Street Journal that the directorate will more actively use signals intelligence gleaned from expanded operations against adversaries. As part of its mission, the directorate will work to protect the US from foreign threats by sharing insight into specific cyber threats with other federal agencies as well as the private sector."
Now that sounds both good and bad. Just how do you vet the people in the "private sector" and just which people/companies are those going to be? I believe there was a big problem with private contracts and government intelligence in the last election.
Posted by: Fred | 05 October 2019 at 05:56 PM
J,
VP Agnew resigned because of his financial crimes, which Nixon did not direct him to commit. Baltimore still seems to be rather lucrative for politicians, though now they are in the other party. Quid Pro Joe is out of office. Maybe he can cut a plea deal to avoid jail, just like Spiro and Jeffrey Epstein.
Posted by: Fred | 05 October 2019 at 06:01 PM
Ah yes, but that was the days when J. Edgar was alive and politicians were scared beejez of JE because he probably had something on them he could always flash in front of them to send them like a roach scurrying for shade.
This whole Russia, excuse me Ruskie-gate stuff has shown just how corrupted that DOJ and the FBI have become. Politicians are understood to be corrupt to begin with, but the American people don't expect their hallways of justice to be corrupted as well. They're hoping somebody will be honest.
Congress today and for many years has appeared no better than an Organized Crime Organization, the major parties being different sides of the same corrupted coin.
Narcissism goes to the head of most White House Administrations as they forget who/whom they're supposed to be working for -- Mom and Pop America.
The Constitution is designed by our nation's founders to be a protection guide to protect Mom and Pop America. These days only the CJCS General Mark A. Milly seems to be the lone individual in D.C. who understands their oath to the Constitution and what it entails.
Posted by: j | 05 October 2019 at 07:27 PM
Larry,
The so-called 'whistle-blower' committed a crime it would appear.
https://thefederalist.com/2019/10/04/report-anti-trump-whistleblower-concealed-contacts-with-house-democrats-from-inspector-general/#.XZeaH__Hp1I.twitter
Federal orange for the so-called 'whistle-blower' is in order, Oui?
Posted by: j | 05 October 2019 at 08:12 PM
David, Sy Hersh has stated that he made up the story purely in an attempt to elicit information from Butowsky. He further stated he didn't talk to anybody from the FBI concerning Seth Rich.
Posted by: The Twisted Genius | 06 October 2019 at 12:17 AM
Twisted. That is total bullshit. Sy has never said that he "made up the story." He doesn't do that. And yes, unlike you, I've known Sy as a friend for almost forty years. Stop making things up or repeating talking points from God knows where. If you listen to the illegal recording that Butowsky made it is Sy talking honestly about what he believes. But, as he noted in that conversation, he was not prepared to write. Did not have enough corroborating sources. Seriously, I thought you were better than this.
Posted by: Larry Johnson | 06 October 2019 at 09:38 AM
Larry,
Still in transit, sitting in Madrid airport. I hope to produce some considered responses when back in London.
However, if TTG wants to claim that Hersh has said he was spinning fiction, he should provide us with a link to where -- supposedly -- this repudiation of the contents of the tape was made. It is not at all my recollection of the statements I have seen quoted on the net.
To anyone who knows anything about Hersh -- one does not need to be a personal friend, as you are -- this attribution to him of a particularly devious Machiavellianism sounds wildly out of character.
Likewise, I cannot see how anyone who has listened to the tape with any care could conceivably think this a plausible interpretation.
It does seem to me that, given that the tape -- whatever one thinks about the Machiavellianism clearly displayed by Butowsky in making it -- has emerged as a fundamental document in 'Russiagate', it would greatly help if a more adequate transcript was available than the only one I have been able to find on the net.
Meanwhile, while I have no doubt that Hersh was providing Butowsky with an entirely accurate account of what he thought had happened, a central question is whether he was right to think it accurate.
It is very difficult for even the best and most experienced of journalists, as also of intelligence analysts, accurately to gauge what is reliable and unreliable information 100% of the time.
Posted by: David Habakkuk | 06 October 2019 at 10:12 AM