Despite the stunningly anticlimactic outcome of the Mueller report and his subsequent appearance on Capitol Hill, which was intended from the first to be a matter of spectacle rather than substance, new allegations of Russian interference continue to arrive on front pages and in news broadcasts. The latest came the day after Mueller's testimony, when the Senate Intelligence Committee reported that Russia intruded into the election systems of all 50 states during the 2016 campaigns. The report offered no supporting evidence, per usual. It was heavily redacted at the request of the relevant intelligence agencies, again per usual.
Question of Evidence
This brings us to the question of evidence. To go back to the initial allegations of Russian interference three years ago, at no point since have any of these commonly accepted charges been accompanied by hard, legally and logically sound evidence to back them up. This astonishing lacuna, while intently papered over in the media, on Capitol Hill, at the Justice Department, in the intelligence apparatus, and among law-enforcement agencies, has rendered the Russia-gate orthodoxy vulnerable from the first. It now emerges that the evidence problem is worse than even the most committed critics of the Russia-gate narrative had thought.
This came to light this spring, during the pre-trial discovery phase of the case against Roger Stone, the onetime Trump aide charged with obstructing justice and misleading Congress. When Stone's attorneys requested Crowdstrike's final report on the DNC email theft, which they said was relevant to his defense, prosecutors returned with the stunning revelation that Crowdstrike, the DNC's cyber-security firm, never submitted a final report. "The government does not possess the information the defendant seeks," the Justice Department responded via a court filing.
The Federal Bureau of Investigation's failure to take possession of the DNC's email servers from Crowdstrike after the mid-2016 intrusion, a shocking case of official malfeasance, has long been dismissed as an unimportant detail. We now know that the FBI, the Justice Department and the Mueller investigation relied on nothing more than three Crowdstrike drafts, all of them redacted by Crowdstrike to build the case for Russia's culpability in the theft of the DNC's email.
Not only did the FBI fail to establish a proper chain of evidentiary custody after the incident at the DNC; it is now clear the bureau knows of the email theft only what Crowdstrike chose to tell it. There is no evidence that the FBI asked the NSA for its records of the incident. Nor is there any indication that Crowdstrike has ever given the FBI or prosecutors in the Stone case the data it used to produce its never-completed report. "Crowdstrike appears to have destroyed evidence or is hiding it," Bill Binney said in a telephone interview.
The corporate media continue to pretend in their press reports and news broadcasts that the official investigation of the DNC email incident was conducted according to the highest standard of legitimacy. Democrats on Capitol Hill, still pursuing their own investigations, never question the validity of the officially constructed case alleging Russia's responsibility. The revelation of negligence the Stone trial brings to light, which amounts to corruption, could hardly expose this prolonged charade more starkly.
Forensic investigators, meantime, continue to gather evidence supporting the leak-not-hack case made in VIPS50. The gap thus widens between the official story of the DNC mail incident and the case supported by forensic research done by VIPS and other independent investigators working in association with it.
Last February these investigators discovered that email pilfered in 2016 and subsequently conveyed to WikiLeaks had been stored according to a system called File Allocation Table, or FAT. The FAT system time-stamps data according to their last modifications and, because it is less precise than other storage systems, it rounds up time stamps to the next even number. If the FAT system is used to store data, it is a strong indication that the data were stored on a memory key or another such portable device.
In the 35,816 email messages investigators examined, the FAT system assigned even-numbered time stamps to all of them. Binney, a mathematician by training, puts the chance of this occurring without the use of a portable storage device at 1 in 2 to the 35,816th power, meaning it is a virtual impossibility.
The FAT numbering pattern detected in the email messages tested does not indicate at what stage or where a portable device was used. It shows only that such a device was used at some point in the handling of the data; a portable device may or may not have been used to execute the initial download. But the presence of the FAT system in the metadata of the emails tested adds another layer of circumstantial evidence supporting the VIPS case that the theft of DNC mail was a leak executed locally via a portable device and not a remote hack conducted through the internet. At the very least, it is an additional line of inquiry the FBI, the intelligence agencies, and the Mueller investigation have left unexamined.
VIPS Dissenters
Among the critics of VIPS50, none has influenced public opinion as much as the dissenters within the group's membership. The presence of these dissenters has been evident since VIPS50 went through repeated drafts over a period of nearly two weeks. This is a group of honorable, in many cases brave people. But they advanced no coherent objections to the VIPS document prior to its publication, and this remained the case for some time after Consortium News posted it on July 24, 2017. Having begun reporting on VIPS50 shortly after that date, I found, and continue to find, the dissenters' position heavily infected with personal animosities and political leanings having no bearing on the validity of the VIPS50 findings.
A number of dissenters signed a contribution to a forum The Nation hosted after the magazine published a piece I wrote on VIPS50 in August 2017. This was the first time the dissenters publicly presented substantive objections to VIPS50, and they focused on the core of the VIPS case. This case continues to rest primarily on the speed at which a mail theft could be executed in mid-2016. The transfer speed, identified by an analysis of metadata found on documents stolen at that time, was considerably faster than the rate possible over the internet at the time of the intrusion, indicating a leak by someone using a portable storage device and with direct access to the DNC's servers.
The dissenting group took specific issue with these findings. "Data-transfer speeds across networks and the Internet measured in megabits per second (or megabytes per second) can easily achieve rates that greatly exceed the cited reference in the VIPS memo," the dissidents wrote.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).