Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the breadcrumb-navxt domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Notice: Undefined index: url in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-content/plugins/wp-socializer/core/metadata.php on line 42

Notice: Undefined index: url in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-content/plugins/wp-socializer/core/metadata.php on line 42

Notice: Undefined index: url in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-content/plugins/wp-socializer/core/metadata.php on line 42

Notice: Undefined index: url in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-content/plugins/wp-socializer/core/metadata.php on line 42

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/functions.php:6114) in /hermes/bosnacweb01/bosnacweb01bb/b1012/ipg.opinionsthoughtscom/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":211,"date":"2016-12-24T05:37:30","date_gmt":"2016-12-24T05:37:30","guid":{"rendered":"http:\/\/www.opinionsthoughts.com\/?p=211"},"modified":"2017-01-17T15:21:42","modified_gmt":"2017-01-17T20:21:42","slug":"russian-government-hacks-something-else","status":"publish","type":"post","link":"https:\/\/www.opinionsthoughts.com\/?p=211","title":{"rendered":"Is it Russian Government Hacks, Someone Else or Inside Leaks?"},"content":{"rendered":"

The CIA has supposedly determined that Russian government hacks, as directed by Russian President Vladimir Putin, were the source for publication of Democratic National Committee (DNC) emails and related emails. \u00a0 Comments from a variety of private security firms buttress these claims. \u00a0However, in an open letter dated December 12, 2016<\/a>, the Veteran Intelligence Professionals for Sanity<\/a> (VIPS)\u00a0claimed that the emails were leaked, not hacked.<\/p>\n

VIPS is no ordinary group of citizens with an opinion. \u00a0Rather, it includes\u00a0a group of highly accomplished retired and senior intelligence personnel. \u00a0 It’s steering committee includes intelligence luminaries including\u00a0Thomas Drake (former senior executive with the NSA), Mike Gravel (former adjutant, top secret control officer and special agent of the Counter Intelligence Corps, as well as a former U.S. Senator), and famed NSA whistle blower William Binney (former technical director, world geopolitical and military analysis in the NSA), among others.<\/p>\n

\"VIPS
Renowned whistle blower William Binney<\/figcaption><\/figure>\n

So which is it, Russian government hacks, third party hacks or insider leaks? \u00a0Here’s what the two sides are telling us to date.<\/p>\n

A Hack Versus a Leak<\/h3>\n

Let’s start with a simple review of the difference between a hack and a leak (per VIPS). \u00a0A “hack” occurs “when someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.” \u00a0On the other hand, a leak is an event “when someone physically takes data out of any organization and gives it to another person or organization.”<\/p>\n

The Case for Russian Government Hacks: Private Security Firms’ Analysis<\/h3>\n

Several private security firms have cited certain specific facts to prove that hacks of the DNC occurred. \u00a0However, “proof” that these were Russian government hacks are more nuanced. \u00a0Our debate contrasts the recited “facts”, with the claim of Russian government responsibility.<\/p>\n

On June 16, 2016, SecureWorks<\/a>\u00a0released a public summary revealing a spear-phishing campaign that they stated targeted both Mrs. Clinton’s campaign and\u00a0the DNC. \u00a0SecureWorks provided technical details of the spear phishing efforts in the June 16 release<\/a>. \u00a0 SecureWorks also offered two opinions in its report “with moderate confidence,” that (1) “the [hacking] group is operating from the Russian Federation”, and (2) the group “is gathering intelligence on behalf of the Russian government.”<\/p>\n

Private security firm CrowdStrike (co-founded by Dmitri Alperovitch<\/a>), hired by the DNC in May, 2016, also claims to have collected evidence that two groups they labelled Crazy Bear and Fancy Bear had hacked into the DNC. \u00a0Here’s Crowdstrike’s take <\/a>on Cozy Bear and Fancy Bear:<\/p>\n

\n

Our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist\/terrorist groups we encounter on a daily basis. Their tradecraft is superb, operational security second to none and the extensive usage of \u2018living-off-the-land\u2019 techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities including deliberate targeting and \u2018access management\u2019 tradecraft \u2013 both groups were constantly going back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels and perform other tasks to try to stay ahead of being detected. Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government\u2019s powerful and highly capable intelligence services.<\/p>\n<\/blockquote>\n

\"CyberStrike's
CyberStrike’s Dmitri Alperovitch<\/figcaption><\/figure>\n

So who are Cozy Bear and Fancy Bear (the “Bears”)? \u00a0Cozy Bear is claimed to be tied to FSB, Russia’s internal security service. \u00a0Similarly, Fancy Bear is claimed to be more generally tied to the Russian government. \u00a0However, no one has provided definitive proof of these claimed connections.<\/p>\n

Proof of Russian Government Hacks?<\/h3>\n

The private security firms point to\u00a0information found in code and malware as proof of the hackers national origin. \u00a0For example, security firm FireEye<\/a> cites Russian\u00a0language settings in code used by Fancy Bear in certain hacks. \u00a0There is also evidence that indicates some code was written in the same time zone as Moscow and St. Petersburg. \u00a0Of course, any hacker could have used the Russian language as misinformation to implicate Russia in the hacks.<\/p>\n

Additional evidence<\/a>\u00a0alleged to prove\u00a0Russian government hacks includes<\/a>: (1) malware identified on DNC computers that was programmed to communicate directly with an IP address known to be used by Fancy Bear; and (2) use of\u00a0a deliberately misspelled domain name connected to an IP address also used by Fancy Bear to certain email phishing attacks against the DNC.<\/p>\n

Editors Observation<\/strong><\/span>: \u00a0Readers might juxtapose comments such as those from CyberStrike, who acknowledge their opponents as “some of the best adversaries . . . [whose] tradecraft is superb [and] operational security second to none,” with claims that such groups would leave these\u00a0easily discoverable and directly incriminating pieces of evidence behind. \u00a0On the one hand, best-in-the-world hackers; on the other hand, bumblers and stumblers.<\/p>\n

Do the Hacked Targets Prove Russian Government Complicity?<\/h3>\n

Cyber experts including FireEye have repeatedly referenced the identity of the targets of the two Bears as key evidence to support a claim of Russian government hacks. \u00a0For example, they and others point to prior\u00a0cyber attacks targeting the Ukrainian power grid, Georgian financial institutions and government websites, and Estonian government and financial systems, as evidence of Russian government complicity. \u00a0In each instance, Russia’s defense interests are readily identifiable. \u00a0We accept the reasonableness of this inference in these specific instances.<\/p>\n

Editors Comment<\/strong>: Cyber attacks on targets within Russia’s natural sphere of immediate influence are one thing. \u00a0These attacks could easily have been the result of Russian government hacks. \u00a0From Russia’s perspective, there was little if any probability of a meaningful counter-attack.<\/p>\n

However, we should be careful before extrapolating too much from Russia’s\u00a0willingness to launch those attacks. \u00a0At the least, Russia must have acted with full deliberation before deciding to\u00a0similarly attack the United States. \u00a0We presume that the United States and Russia regularly conduct cyber-probing of various data points for a variety of reasons. \u00a0But a hack that might strike at the fabric of an American election for President is quite another thing. \u00a0It would constitute, in our view, an attack of a much greater magnitude.<\/p>\n

The United States is of course fully capable of launching a variety of highly destructive retaliatory attacks. \u00a0Russian government hacks targeting an American election might force the United States to respond. \u00a0This inference challenges the validity of the conclusion that Russia’s end-goal was to interfere in the U.S. election. \u00a0Had the Russians elected to pursue such a goal, they must also have assumed there would be a reasonably high probability of U.S. retaliation, ultimately leading to a cycle of retaliation between the two countries.<\/p>\n

At a minimum, this leads to the critical question: what ultimate goal of a Russian end-game would warrant Russia running the risk of a retaliatory wave that it would not be able to control? \u00a0The consequences of such actions would be unknowable and game theory might not lead to outcomes with reasonable certainties.<\/p>\n

Kaspersky Lab claims Cozy Bear responsibility for the 2015 hacks of White House and State Department unclassified networks. \u00a0However, we doubt that an attack of that nature would warrant a material response from the U.S. \u00a0A similar conclusion would have been reached by the Russian government.<\/p>\n

Proving Russian Government Sponsorship is Not so\u00a0Simple<\/h3>\n

The type of “proof” of Russian government hacks offered by FireEye is conclusory. \u00a0It consists of circumstantial inferences drawn by claimed experts. \u00a0However, this type of proof is not of a quality that would be direct evidence of complicity. \u00a0Moreover, a\u00a0hacker wishing to hide his identity\u00a0would be wise to plant evidence pointing to Russia. \u00a0Western analysts predisposed to find Russian government complicity could be\u00a0nudged further in that direction by little slices of misinformation supporting their biases.<\/p>\n

As noted by the Institute for Critical Infrastructure Technology<\/a>\u00a0(ICIT), a cyber security think tank:<\/p>\n

\n

Malicious actors can easily position their breach to be attributed to Russia. \u00a0It’s common knowledge . . . \u00a0that all one needs to do is compromise a system geolocated in Russia (ideally in a government office) and use it as a beachhead for attack so that indicators of compromise lead back to Russia. \u00a0For additional operational security, use publicly available whitepapers and reports to determine the tool, techniques and procedures of a well-known nation-state sponsored advanced persistent threat (APT), access Deep Web forums such as Alphabay to acquire a malware variant or exploit kit utilized in prolific attacks, and then employ the malware in new campaigns that will inevitably be attributed to foreign intelligence operations.<\/p>\n

Want to add another layer? \u00a0Compromise a Chinese system, leap-frog onto a hacked Russian machine, and then run the attack from China to Russia to any country on the globe. . . . This process is so common and simple that it’s virtually “Script Kiddie 101” among malicious cyber upstarts.<\/p>\n<\/blockquote>\n

ICIT doesn’t stop there. \u00a0They point out:<\/p>\n

\n

Incident Response techniques and processes are not comprehensive or holistic enough to definitely attribute an incident to a specific threat actor from the multitude of script kiddies, hacktivists, lone-wolf threat actors, cyber-criminals, cyber-jihadists, hail-Mary threats, and nation-state sponsored advanced persistent threats, who all possess the means, motive and opportunity, to attack minimally secured, high profile targets. \u00a0Organizations such as the DNC, RNC, Whitehall and the German Bundestag have all been targeted in cyber attacks launched with the possible intention of influencing global politics. . . . It would be easy to baselessly declare that all of the attacks were launched by Russia based on the malware employed;<\/strong> however, other threat actors such as Anonymous, Comment Crew, Desert Falcon, etc. could easily emulate the tools, tactics and procedures of a Russian nation-state APT attack.<\/p>\n<\/blockquote>\n

There is ample technical evidence to support the theory that Russian-speaking hackers were responsible for a number of attacks related to the U.S. election, according to Cybersecurity consultant Jeffrey Carr<\/a>. \u00a0However, “there is ZERO technical evidence to connect those Russian-speaking hackers to . . . [any] Russian government department.”<\/p>\n

In all, the data referenced may well be objective proof that hacks occurred. However, they fall short of being objective proof of Russian government hacks. \u00a0They also are not definitive proof of Russian governmental control over the Two Bears.<\/p>\n

\u00a0The Case for Leaks<\/h3>\n

VIPS points out that the National Security Agency (NSA) “is able to identify both the sender and recipient when hacking is involved.” \u00a0As a result, “any data that is passed from the servers of the DNC or of [Mrs.] Clinton is collected by the NSA.” \u00a0And further, “these data transfers carry destination addresses . . . which enable the transfer to be traced and followed through the network.”<\/p>\n

VIPS details how emails are broken down into “packets.” \u00a0These packets are passed into the network and then re-assembled where they are received. \u00a0All of the packets carry identifying numbers and “the originator and ultimate receiver internet protocol number.” \u00a0With that in mind:<\/p>\n

\n

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the sever or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.<\/p>\n

These collection resources are extensive. . .; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. \u00a0Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.<\/p>\n<\/blockquote>\n

WikiLeaks maintains\u00a0that the Russian government is not the source of the emails that it published. \u00a0 Readers will reach their own conclusion as to the degree of deference appropriate to WikiLeaks’ claim.<\/p>\n

Is It Leaks, Not Russian Government Hacks?<\/h3>\n

With the foregoing in mind, VIPS concludes:<\/p>\n

\n

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC [Mrs. Clinton] or any other servers were routed through the network<\/strong>. \u00a0This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.<\/p>\n<\/blockquote>\n

VIPS then directly addressed statements attributed to the CIA and other intelligence “sources” referenced in the press:<\/p>\n

\n

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating — saying things like “our best guess” or “our opinion” or “our estimate” etc. — shows that the emails alleged to have been “hacked” cannot be traced across the network. \u00a0Given NSA’s extensive trace capability, we conclude that RNC and HRC servers alleged to have been hacked were, in fact, not hacked.<\/strong><\/p>\n<\/blockquote>\n

Contrary to Press Reports, Disclosure of Proof of Hacking Would Not Jeopardize U.S. Intelligence Sources<\/h3>\n

Reports in the New York Times state that U.S. intelligence agencies are unwilling to provide direct proof of Russian hacks. \u00a0This unwillingness is attributed to a claimed risk that such disclosures might\u00a0risk compromising U.S. data collection efforts. \u00a0Other press reports have repeated these claims. \u00a0Yet, VIPS directly debunks this claim:<\/p>\n

\n

The evidence [of hacking] that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods<\/strong>. . . . As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. \u00a0Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. \u00a0In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking<\/strong>.<\/p>\n<\/blockquote>\n

The Need for Evidence to be Seen By All<\/h3>\n

There is one simple way to resolve the uncertainties highlighted by this debate. \u00a0The U.S. government should release all evidence of Russian government hacks, given the claimed assault on the American election process. \u00a0It would be cyber warfare, after all, whose target is the American constitutional process. \u00a0This is one case, perhaps above all others, where the American people have an absolute right to know. \u00a0This information, if it exists, should be placed in the Marketplace of Ideas as soon as possible. \u00a0There is no plausible reason not to.<\/p>\n

<\/i><\/a><\/span>\n<\/i><\/a><\/span>\n<\/i><\/a><\/span>\n<\/i><\/a><\/span>\n<\/i><\/a><\/span><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"

The CIA has supposedly determined that Russian government hacks, as directed by Russian President Vladimir Putin, were the source for publication of Democratic National Committee (DNC) emails and related emails. \u00a0 Comments from a variety of private security firms buttress these claims. \u00a0However, in an open letter dated December 12, 2016, the Veteran Intelligence Professionals … Continue reading “Is it Russian Government Hacks, Someone Else or Inside Leaks?”<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[8],"tags":[18],"class_list":["post-211","post","type-post","status-publish","format-standard","hentry","category-debates","tag-russian-hacking"],"jetpack_publicize_connections":[],"yoast_head":"\nIs it Russian Government Hacks, Someone Else or Inside Leaks?<\/title>\n<meta name=\"description\" content=\"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.opinionsthoughts.com\/?p=211\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is it Russian Government Hacks, Someone Else or Inside Leaks?\" \/>\n<meta property=\"og:description\" content=\"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.opinionsthoughts.com\/?p=211\" \/>\n<meta property=\"og:site_name\" content=\"A Marketplace for Ideas\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-24T05:37:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-17T20:21:42+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg\" \/>\n<meta name=\"author\" content=\"Quinctius\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Quinctius\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211\"},\"author\":{\"name\":\"Quinctius\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/bb77281c6eeb8e17300dde8c0573894b\"},\"headline\":\"Is it Russian Government Hacks, Someone Else or Inside Leaks?\",\"datePublished\":\"2016-12-24T05:37:30+00:00\",\"dateModified\":\"2017-01-17T20:21:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211\"},\"wordCount\":2411,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg\",\"keywords\":[\"Russian Hacking\"],\"articleSection\":[\"Debates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.opinionsthoughts.com\/?p=211#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211\",\"url\":\"https:\/\/www.opinionsthoughts.com\/?p=211\",\"name\":\"Is it Russian Government Hacks, Someone Else or Inside Leaks?\",\"isPartOf\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg\",\"datePublished\":\"2016-12-24T05:37:30+00:00\",\"dateModified\":\"2017-01-17T20:21:42+00:00\",\"description\":\"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.opinionsthoughts.com\/?p=211\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage\",\"url\":\"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg\",\"contentUrl\":\"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/?p=211#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.opinionsthoughts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is it Russian Government Hacks, Someone Else or Inside Leaks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#website\",\"url\":\"https:\/\/www.opinionsthoughts.com\/\",\"name\":\"A Marketplace for Ideas\",\"description\":\"Opinions, Thoughts, and Ideas\",\"publisher\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.opinionsthoughts.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#organization\",\"name\":\"Opinions, Thoughts\",\"url\":\"https:\/\/www.opinionsthoughts.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/js-mill-e1482245764745.jpg?fit=183%2C203&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/js-mill-e1482245764745.jpg?fit=183%2C203&ssl=1\",\"width\":183,\"height\":203,\"caption\":\"Opinions, Thoughts\"},\"image\":{\"@id\":\"https:\/\/www.opinionsthoughts.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/bb77281c6eeb8e17300dde8c0573894b\",\"name\":\"Quinctius\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f0bfe8d3b4e8849e83fb85991cce4da?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f0bfe8d3b4e8849e83fb85991cce4da?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Quinctius\"},\"url\":\"https:\/\/www.opinionsthoughts.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is it Russian Government Hacks, Someone Else or Inside Leaks?","description":"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.opinionsthoughts.com\/?p=211","og_locale":"en_US","og_type":"article","og_title":"Is it Russian Government Hacks, Someone Else or Inside Leaks?","og_description":"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.","og_url":"https:\/\/www.opinionsthoughts.com\/?p=211","og_site_name":"A Marketplace for Ideas","article_published_time":"2016-12-24T05:37:30+00:00","article_modified_time":"2017-01-17T20:21:42+00:00","og_image":[{"url":"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg"}],"author":"Quinctius","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Quinctius","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.opinionsthoughts.com\/?p=211#article","isPartOf":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211"},"author":{"name":"Quinctius","@id":"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/bb77281c6eeb8e17300dde8c0573894b"},"headline":"Is it Russian Government Hacks, Someone Else or Inside Leaks?","datePublished":"2016-12-24T05:37:30+00:00","dateModified":"2017-01-17T20:21:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211"},"wordCount":2411,"commentCount":0,"publisher":{"@id":"https:\/\/www.opinionsthoughts.com\/#organization"},"image":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage"},"thumbnailUrl":"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg","keywords":["Russian Hacking"],"articleSection":["Debates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.opinionsthoughts.com\/?p=211#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.opinionsthoughts.com\/?p=211","url":"https:\/\/www.opinionsthoughts.com\/?p=211","name":"Is it Russian Government Hacks, Someone Else or Inside Leaks?","isPartOf":{"@id":"https:\/\/www.opinionsthoughts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage"},"image":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage"},"thumbnailUrl":"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg","datePublished":"2016-12-24T05:37:30+00:00","dateModified":"2017-01-17T20:21:42+00:00","description":"Claimed Proof of Russian Government Hacks of Democratic National Committee Emails is Far From Clear. It Could be Third Parties, or the Result of Leaks.","breadcrumb":{"@id":"https:\/\/www.opinionsthoughts.com\/?p=211#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.opinionsthoughts.com\/?p=211"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opinionsthoughts.com\/?p=211#primaryimage","url":"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg","contentUrl":"http:\/\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/William-Binney.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.opinionsthoughts.com\/?p=211#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.opinionsthoughts.com\/"},{"@type":"ListItem","position":2,"name":"Is it Russian Government Hacks, Someone Else or Inside Leaks?"}]},{"@type":"WebSite","@id":"https:\/\/www.opinionsthoughts.com\/#website","url":"https:\/\/www.opinionsthoughts.com\/","name":"A Marketplace for Ideas","description":"Opinions, Thoughts, and Ideas","publisher":{"@id":"https:\/\/www.opinionsthoughts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.opinionsthoughts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.opinionsthoughts.com\/#organization","name":"Opinions, Thoughts","url":"https:\/\/www.opinionsthoughts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opinionsthoughts.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/js-mill-e1482245764745.jpg?fit=183%2C203&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.opinionsthoughts.com\/wp-content\/uploads\/2016\/12\/js-mill-e1482245764745.jpg?fit=183%2C203&ssl=1","width":183,"height":203,"caption":"Opinions, Thoughts"},"image":{"@id":"https:\/\/www.opinionsthoughts.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/bb77281c6eeb8e17300dde8c0573894b","name":"Quinctius","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opinionsthoughts.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f0bfe8d3b4e8849e83fb85991cce4da?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f0bfe8d3b4e8849e83fb85991cce4da?s=96&d=wp_user_avatar&r=g","caption":"Quinctius"},"url":"https:\/\/www.opinionsthoughts.com\/?author=1"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8bq7U-3p","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/posts\/211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=211"}],"version-history":[{"count":25,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions"}],"predecessor-version":[{"id":552,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions\/552"}],"wp:attachment":[{"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opinionsthoughts.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}