In all, the data referenced may well be objective proof that hacks occurred. However, they fall short of being objective proof of Russian government hacks. \u00a0They also are not definitive proof of Russian governmental control over the Two Bears.<\/p>\n
VIPS points out that the National Security Agency (NSA) “is able to identify both the sender and recipient when hacking is involved.” \u00a0As a result, “any data that is passed from the servers of the DNC or of [Mrs.] Clinton is collected by the NSA.” \u00a0And further, “these data transfers carry destination addresses . . . which enable the transfer to be traced and followed through the network.”<\/p>\n
VIPS details how emails are broken down into “packets.” \u00a0These packets are passed into the network and then re-assembled where they are received. \u00a0All of the packets carry identifying numbers and “the originator and ultimate receiver internet protocol number.” \u00a0With that in mind:<\/p>\n
\nWhen email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the sever or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.<\/p>\n
These collection resources are extensive. . .; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. \u00a0Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.<\/p>\n<\/blockquote>\n
WikiLeaks maintains\u00a0that the Russian government is not the source of the emails that it published. \u00a0 Readers will reach their own conclusion as to the degree of deference appropriate to WikiLeaks’ claim.<\/p>\n
Is It Leaks, Not Russian Government Hacks?<\/h3>\n
With the foregoing in mind, VIPS concludes:<\/p>\n
\nThe bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC [Mrs. Clinton] or any other servers were routed through the network<\/strong>. \u00a0This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.<\/p>\n<\/blockquote>\nVIPS then directly addressed statements attributed to the CIA and other intelligence “sources” referenced in the press:<\/p>\n
\nThe various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating — saying things like “our best guess” or “our opinion” or “our estimate” etc. — shows that the emails alleged to have been “hacked” cannot be traced across the network. \u00a0Given NSA’s extensive trace capability, we conclude that RNC and HRC servers alleged to have been hacked were, in fact, not hacked.<\/strong><\/p>\n<\/blockquote>\nContrary to Press Reports, Disclosure of Proof of Hacking Would Not Jeopardize U.S. Intelligence Sources<\/h3>\n
Reports in the New York Times state that U.S. intelligence agencies are unwilling to provide direct proof of Russian hacks. \u00a0This unwillingness is attributed to a claimed risk that such disclosures might\u00a0risk compromising U.S. data collection efforts. \u00a0Other press reports have repeated these claims. \u00a0Yet, VIPS directly debunks this claim:<\/p>\n
\nThe evidence [of hacking] that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods<\/strong>. . . . As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. \u00a0Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. \u00a0In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking<\/strong>.<\/p>\n<\/blockquote>\nThe Need for Evidence to be Seen By All<\/h3>\n
There is one simple way to resolve the uncertainties highlighted by this debate. \u00a0The U.S. government should release all evidence of Russian government hacks, given the claimed assault on the American election process. \u00a0It would be cyber warfare, after all, whose target is the American constitutional process. \u00a0This is one case, perhaps above all others, where the American people have an absolute right to know. \u00a0This information, if it exists, should be placed in the Marketplace of Ideas as soon as possible. \u00a0There is no plausible reason not to.<\/p>\n