This version is annotated/enhanced/with Video—see the Addendum please. Help us disseminate this information as widely as possible.
William Binney, the U.S. National Security Agency’s former technical director for global analysis, has, for the past year, been globe-trotting to investigate the actual evidence regarding the official Russiagate investigations, and he finds that the Special Counsel, Robert Mueller, who is prosecuting Russia’s Government, can only accuse Russian officials, not convict any of them on at least the important charges, because conclusive evidence exists and has already been made public online, making clear that the important accusations against those officials are false. However, Binney can’t get any of the U.S. major ‘news’media’s interest in this fact, nor even into openly discussing it with them. Apparently, they don’t want to know. Binney is knocking on their doors, and they refuse to answer. Patrick Lawrence, at the non-mainstream U.S. newsmedium Consortium News, headlined on Monday August 13th, “‘Too Big to Fail’: Russia-gate One Year After VIPS Showed a Leak, Not a Hack” and he reported what Binney has found and has been trying to get the major U.S. ‘news’media to present to the American public. The “VIPS” there is Veteran Intelligence Professionals for Sanity, and they are 17 whistleblowing former high officials of the CIA, NSA, State Department, and other U.S. officials with top secret national-security clearances, who jointly signed and published on 24 July 2017, their report, which likewise was at Consortium News, “Intel Vets Challenge ‘Russia Hack’ Evidence”, in which they confirmed the validity of a 9 July 2017 report that had been published by Elizabeth Vos of Disobedient Media . com, which was titled “New Research Shows Guccifer 2.0 Files Were Copied Locally, Not Hacked” and which I then reported in more ordinary language seven days later under the headline “Russiagate Exposed: It’s a Fraud”. I quoted there the analysis’s basic finding “that the DNC computer network which the media tells us and the DNC tells us was hacked by the Russians, … was physically accessed by someone within close proximity of the DNC” and not outside the United States (Russia or anywhere else). The original research-report had been done by an anonymous person who called himself “the forensicator,” and he had sent it to Adam Carter, another highly technically knowledgeable person, who happened to be at Disobedient Media, and who then worked with Vos to prepae her article on it. Binney, as the nation’s now-retired top NSA expert in the analysis of such matters, then followed up, during the past year, in order to probe more deeply, by contacting various individuals who had been involved behind the scenes; and Patrick Lawrence’s article was a report of what Binney had found. It’s this: The forensic scientists working with VIPS continued their research and experiments after VIPS50 was published. So have key members of the VIPS group, notably William Binney, the National Security Agency’s former technical director for global analysis and designer of programs the agency still uses to monitor internet traffic. Such work continues as we speak, indeed. This was always the intent: “Evidence to date” was the premise of VIPS50. Over the past year there have been confirmations of the original thesis and some surprises that alter secondary aspects of it. Let us look at the most significant of these findings. At the time I reported on the findings of VIPS and associated forensic scientists, that the most fundamental evidence that the events of summer 2016 constituted a leak, not a hack, was the transfer rate—the speed at which data was copied. The speed proven then was an average of 22.7 megabytes per second. … The fastest internet transfer speed achieved, during the New Jersey–to–Britain test, was 12.0 megabytes of data per second. Since this time it has emerged from G-2.0’s metadata that the detected average speed—the 22.7 megabytes per second—included peak speeds that ran as high as 49.1 megabytes per second, impossible over the internet. “You’d need a dedicated, leased, 400–megabit line all the way to Russia to achieve that result,” Binney said in a recent interview. … That remains the bedrock evidence of the case VIPS and others advance without qualification. “No one—including the FBI, the CIA, and the NSA—has come out against this finding,” Binney said Monday. … The identity of Guccifer 2.0, who claimed to be a Romanian hacker but which the latest Mueller indictment claims is a construct of the GRU, Russian military intelligence, has never been proven. The question is what G–2.0 did with or to the data in question. It turns out that both more, and less, is known about G–2.0 than was thought to have been previously demonstrated. This work has been completed only recently. It was done by Binney in collaboration with Duncan Campbell, a British journalist who has followed the Russia-gate question closely. Peak Speed Established Binney visited Campbell in Brighton, England, early this past spring. They examined all the metadata associated with the files G–2.0 has made public. They looked at the number of files, the size of each, and the time stamps at the end of each. It was at this time that Binney and Campbell established the peak transfer rate at 49.1 megabytes per second. … “Now you need to prove everything you might think about him,” Binney told me. “We have no way of knowing anything about him or what he has done, apart from manipulating the files. … The conclusions initially drawn on time and location in VIPS50 are now subject to these recent discoveries. “In retrospect, giving ‘equal importance’ status to data pertaining to the locale was mistaken,” Ray McGovern, a prominent VIPS member, wrote in a recent note. “The key finding on transfer speed always dwarfed it in importance.” … How credible are those indictments in view of what is now known about G–2.0? Binney told me: “Once we proved G–2.0 is a fabrication and a manipulator, the timing and location questions couldn’t be answered but really didn’t matter. I don’t right now see a way of absolutely proving either time or location. But this doesn’t change anything. We know what we know: The intrusion into the Democratic National Committee mail was a local download—wherever ‘local’ is.” That doesn’t change. As to Rosenstein, he’ll have a lot to prove.” However, yet another technically knowledgeable analyst of the available evidence, George Eliason, claims that to assert that there were only “leaks” and not also “hacks” would clearly be wrong, because there were both. On August 14th, he bannered at Washington’s Blog, “Beyond The DNC Leak: Hacks and Treason” and he wrote: There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks. All are separate events. Here’s what’s different in the information I’ve compiled. The group I previously identified as Fancy Bear was given access to request password privileges at the DNC. And it looks like the DNC provided them with it. I’ll show why the Podesta email hack looks like a revenge hack. The reason Republican opposition research files were stolen can be put into context now because we know who the hackers are and what motivates them. At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators. This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I’m curious what information Wikileaks might have. Eliason’s analysis doesn’t support Robert Mueller’s indictments any more than the others do. All are essentially incompatible with the accusations (including ones which now have become also indictments) from Mueller. Moreover, as Patrick Lawrence noted, “Indictments are not evidence and do not need to contain evidence. That is supposed to come out at trial, which is very unlikely to ever happen. Nevertheless, the corporate media has treated the indictments as convictions.” Maybe that’s the biggest crime of all.
Published on Sep 11, 2017
ERIC ZUESSE, Senior Contributing Editor • Investigative historian Eric Zuesse is the author, most recently, of They’re Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010, and of CHRIST’S VENTRILOQUISTS: The Event that Created Christianity. Besides TGP, his reports and historical analyses are published on many leading current events and political sites, including The Saker, Huffpost, Oped News, and others.
What will it take to bring America to live according to its own self image?
[premium_newsticker id=”154171″]
A thin line exists between evil and greed. The US police/security state and MICC passes out billions of dollars annually to main stream and big tech social media to support their saying: ‘We will not have done our job until all you believe is what we tell you’. Presently the morons believe (as reported by MSM) the US must rescue a CIA agent, disguised as an American preacher, from Turkey or face WWIII!
Exactly. Who sends these suspicious Americans all ove rthe place? “Tourists” to get lost in North Korea, while probing her border vulnerabilities. Same thing in Iran, and so on. It’s transparent BS. All CIA stuff. If they are just imbeciles or patsies, they are used to create casus belli.