...To this "old spy," all signs in the DNC email leak pointed to Russia - By Malcolm Nance
SATURDAY, JUL 8, 2017 09:00 AM EDT
The day democracy got hacked: To this old spy, all signs in the DNC email leak pointed to Russia
Someone was playing 3-dimensional chess with our democracy. Experience taught me there could be only one source
MALCOLM NANCE
<< Excerpted with permission from "The Plot to Hack America" by Malcolm Nance. Copyright 2016, Skyhorse Publishing, Inc. Available for purchase on Amazon, Barnes & Noble and IndieBound. >>
Beginning in March and April 2016, an unknown person or persons hacked into the computer servers of the Democratic National Committee. Over time it became clear that the hackers were targeting very specific information in the DNC filesthe opposition research the Democrats had dug up on their Republican opponent Donald J. Trump. Once they had the information they wanted, the cyber-spies rooted around in the computers for several months thereafter, stealing other files such as personal emails, digital voice mails, and sensitive personal information on donors. This included the donors bank account, credit card, and social security numbers. The DNC discovered the intrusion while performing a security check, and shut their network down. However, the damage was done.
For an old spy and codebreaker like myself, nothing in the world happens by coincidence. Intelligence officers are a peculiar lot. Whether they are active or retired, their brains are wired for a completely different way of seeing the world around them. Some come from the Human Intelligence world, where they learn to read, manipulate, and distrust everyone in order to social engineer intelligence from people who do not want to give them anything. Others are forged in the signals intelligence world, where all data is just a massive electronic puzzle to be constantly analyzed, turned over, and fused together into an exploitable product, or into a final code to be decrypted or broken. Some, like myself, come from both worlds, and are at turns analytical and skeptical of seemingly obvious information. This hybrid mindview doesnt approach the world as streams of linear data; it attempts to analyze information like a constantly flowing game of three-dimensional chess. All the moves are technically the same as in regular chess, but the traditional allowances of forward and backwards one square, or a lateral or L-shaped pattern, are too limiting for those trained to sniff out hostile intent; we require additional ways of processing information to be satisfied. Up vertically, down every angle of the compass rose and then across every median, line of longitude, latitude, and every other angle of measure are just about right . . . then we add layers of frequency analysis figuring out the timing, spacing, depth and distance between each item we call data points. When an event has been then identified on the continuum of intelligence, we compare it with everything that has ever occurred in history to see if it resembles other patterns played by another spy who employed that process. We then process the context and precedence of each observed activity against common sense to determine if an event chain is coincidence, or if it bears the marks of hostile intent. Ian Fleming, the old British Secret Intelligence Service officer who created the fictional character of James Bond, characterized the amazing events in his books with an observation in his 1959 book Goldfinger: Once is happenstance. Twice is coincidence. Three times is enemy action.
Times have changed since Mr. Flemings Dictum. In light of current trends in the intelligence business, I like to characterize this phenomenon as Nances Law of Intelligence Kismet: Coincidence takes a lot of planning.
Reading about the DNC hack was not initially alarming; hackers had also penetrated the Obama and McCain campaigns in 2008. The DNC hack was newsworthy but not really noteworthy until it was paired with two additional events. At the time of the hacks I was writing a massive tome on hackers associated with ISIS and al-Qaeda, so I was attuned to any information about electronic data theft. Then on June 1, 2016 one of my military hacker friends pointed out that an entity who called himself Guccifer 2.0 had opened a WordPress page and was dumping information stolen from the DNC hack.
Guccifer 2.0 claimed he had all the hacked material from the DNC and would be releasing it through his webpage. The name Guccifer struck a nerve, as the real Guccifer, a prolific Romanian hacker, had just been extradited to the United States. Guccifer 2.0 was a copy-cat, and a lazy one at that. My hyper-suspicious intelligence mind started kicking into gear and the game of multidimensional chess was on.
more
http://www.salon.com/2017/07/08/the-day-democracy-got-hacked-to-this-old-spy-all-signs-in-the-dnc-email-leak-pointed-to-russia/
tblue37
(65,357 posts)nolabear
(41,963 posts)ewagner
(18,964 posts)This book has to be made into a TV documentary and played on every channel.
Only if people see how the manipulation is being done will we have any chance of defeating it.
LiberalArkie
(15,715 posts)Debbie said so.
He even had to fire his database coordinator for doing it.
SunSeeker
(51,557 posts)Glad Bernie had the decency to apologize for his campaign's role in the attack.
murielm99
(30,741 posts)but it is okay for Bernie?
He turned around and sued, trying to blame the victim. His database coordinator "had" to be fired? Oh, the poor, poor thing.
Igel
(35,309 posts)One was accessing a database on-site.
The other was spear phishing.
It's not the case that there can be only one.