Why Reality Winner’s NSA Report Means Nothing

The document published in The Intercept does not claim that voting machines were hacked. It states that spear-phishing emails were sent to election officials and there was an attack on a voting software supplier. The leaked document states that the new information about GRU (Russian military foreign-intelligence) interference “became available in April 2017,” and the report was submitted on May 5, 2017.

Reality Winner, the accused leaker of an NSA document about hypothesized Russian hacking into voting machines, provided little in regard to actually proving that there was an attempt by Russia to hack the election. The Intercept reported that “Russian military intelligence executed a cyber attack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election.”

There are good reasons to be skeptical that Russians were responsible if this alleged attack actually took place. As John McAffee stated in an interview with Larry King, “Any hacker capable of breaking into something is extraordinarily capable of hiding their tracks. If I were the Chinese and I wanted to make it look like the Russians did it I would use Russian language within the code.” Also, WikiLeaks Vault 7 “Marble,” proves that attribution cannot be proven conclusively.

If the CIA can do it, then so can any hacker. The CIA lost control of their entire cyber weapons arsenal in 2016.

As Zero Hedge reports “The NSA document alleges that GRU hacked the voting systems company using a false Google alert requiring a target to enter login credentials. According to the report, it also attempted a parallel campaign using a false email account meant to be confused with a second company.  And yet, despite all that “sophistication”, Russia’s smartest, government hackers somehow left a trail so obvious that it would allow the NSA to conclude in under a month, that Russia’s GRU was behind it. Which is also where the story become questionable because at roughly the same time, another set of alleged Russian hackers, the Shadow Brokers, was in possession (and trying to sell) weaponized CIA methods, allowing any potential hacker to adopt the identity of anyone else, even the CIA or NSA.”

One mystery surrounding the theory that Guccifer 2.0 was constructed by the DNC is why the now-inactive Twitter account is still public. Guccifer 2.0 claimed that he would be monitoring “the elections from inside the system.” This furthers the DNC narrative that Russians were inside the system. Adam Carter, on his g-2.space website, points out that sloppy fingerprints were intentionally left behind pointing to Guccifer 2.0 being a Russian agent.

Julian Assange has given his support to Reality Winner. This should not come as a surprise because WikiLeaks has always encouraged leaking and whistleblowing. It would be hypocritical of Assange to condemn Winner because she stepped forward with information. Though the report itself is laughable, WikiLeaks will always stand up for leakers regardless of political position.

However, WikiLeaks also pointed out that Winner posted a personalized autographed picture of Anderson Cooper to her Facebook page.

It must also be noted that Winner has expressed strongly worded concerns about Trump publicly on social media, which can be seen here. It is questionable why she was allowed to hold a security clearance given her extreme bias, as pointed out by Kim Dotcom.

Winner was caught because The Intercept posted a picture of the printed version of the document. This printed version has yellow dots that indicate the printer used as well as when and where documents are printed. This makes it easy to track down who used the printer at that time. Instructions for how to view the encoded informaion in them yourself can be seen by checking out Errata Security’s website here.

There are many reasons to be skeptical of the document and the motivations to create it, but that will not stop the media from using it as evidence to further their narrative. Many will believe it without question because it reinforces their beliefs.





Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s