

Recently, VIPS released its initial investigative findings, and they are stunning.įirst, VIPS has concluded that the DNC data were not hacked by the Russians or anyone else accessing the server over the internet. As the French would say, these are l’hommes serieux, as are the other computer-system designers, program architects and analysts with whom they are investigating the Clinton-DNC hack story. In its ongoing analysis of the purported DNC hack, VIPS has brought to bear the impressive talents of more than a dozen experienced, well-credentialed experts, including William Binney, a former NSA technical director and co-founder of the NSA’s Signals Intelligence Automation Research Center Edward Loomis, former NSA technical director for the Office of Signals Processing and Skip Folden, former manager of IBM’s information technology. In short, VIPS can hardly be described as either a right-wing cabal or as carrying water for the Republican Party. Similarly, VIPS has condemned the use of “enhanced interrogation techniques” on suspected terrorists. For example, in the run-up to the invasion of Iraq, VIPS courageously and correctly challenged the accuracy and veracity of the CIA’s intelligence estimates that Saddam Hussein possessed weapons of mass destruction and that he posed a threat to the United States. The answers to those questions are beginning to emerge thanks to an exacting forensic examination of the available evidence by the Veteran Intelligence Professionals for Sanity, an organization of former CIA, FBI, National Security Agency, and military intelligence officers, technical experts, and analysts.īy way of background, VIPS has a well-established record of debunking questionable intelligence assessments that have been slanted to serve political purposes. Why would the purported victim of a crime refuse to cooperate with law enforcement in solving that crime? Is it hiding something? Is it afraid the server’s contents will discredit the Russia-hacking story? Without explanation, it continues to deny law enforcement access to its server. For, when the Department of Homeland Security and the FBI learned of the hacking claim, they asked to examine the server. This has resulted in investigations by Congress and a special counsel into President Trump, his family and his campaign staff for supposed collusion with the Russians.īut in their frenzied coverage, the media have downplayed the very odd behavior of the DNC, the putative target of the alleged hack. Since then, the mainstream media have created a climate of hysteria in which this unsubstantiated theory has been conjured into accepted truth. Thus was laid the cornerstone of the Trump-Russia-collusion conspiracy theory. Jennifer Palmieri, Clinton’s public relations chief, said in a Washington Post essay in March that she worked assiduously during the Democratic nominating convention to “get the press to focus on … the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary.” Clearly, the Clinton campaign needed to lessen the political damage. Much to the embarrassment of Hillary Clinton, the released files showed that the DNC had secretly collaborated with her campaign to promote her candidacy for the Democratic presidential nomination over that of Bernie Sanders. He then posted online DNC computer files that contained metadata that indicated Russian involvement in the hack. The next day, a self-described Romanian hacker, Guccifer 2.0, claimed he was a WikiLeaks source and had hacked the DNC’s server. Two days later, CrowdStrike, a computer security company working for the Democratic National Committee, announced that it had detected Russian malware on the DNC’s computer server. On June 12, 2016, WikiLeaks announced it would soon release stolen computer files that pertained to Hillary Clinton’s presidential campaign.

Former FBI Director James Comey testifying during a Senate Select Committee on Intelligence hearing in June.
