{"id":30488,"date":"2018-02-16T13:33:50","date_gmt":"2018-02-16T21:33:50","guid":{"rendered":"https:\/\/www.antiwar.com\/blog\/?p=30488"},"modified":"2018-02-16T13:33:50","modified_gmt":"2018-02-16T21:33:50","slug":"russians-spooked-by-nukes-against-cyber-attack-policy","status":"publish","type":"post","link":"https:\/\/www.antiwar.com\/blog\/2018\/02\/16\/russians-spooked-by-nukes-against-cyber-attack-policy\/","title":{"rendered":"Russians Spooked by Nukes-Against-Cyber-Attack Policy"},"content":{"rendered":"<p>Moscow is showing understandable concern over the lowering of the threshold for employing nuclear weapons to include retaliation for cyber-attacks, a change announced on Feb. 2 in the U.S. Nuclear Posture Review (NPR).<\/p>\n<p>Explaining the shift in US doctrine on first-use, the NPR cites the efforts of potential adversaries \u201cto design and use cyber weapons\u201d and explains the change as a \u201chedge\u201d against non-nuclear threats. In response, Russia described the move as an \u201cattempt to shift onto others one\u2019s own responsibility\u201d for the deteriorating security situation.<\/p>\n<p>Moscow\u2019s concern goes beyond rhetoric. Cyber-attacks are notoriously difficult to trace to the actual perpetrator and can be pinned easily on others in what we call \u201cfalse-flag\u201d operations. These can be highly destabilizing \u2013 not only in the strategic context, but in the political arena as well.<\/p>\n<p>Russian President Vladimir Putin has good reason to believe he has been the target of a false-flag attack of the political genre. We judged this to be the case a year and a half ago, and said so. Our judgment was fortified last summer \u2013 thanks to forensic evidence challenging accusations that the Russians hacked into the Democratic National Committee and provided emails to WikiLeaks. (Curiously, the FBI declined to do forensics, even though the \u201cRussian hack\u201d was being described as an \u201cact of war.\u201d)<\/p>\n<p><!--more--><\/p>\n<p>Our conclusions were based on work conducted over several months by highly experienced technical specialists, including another former NSA technical director (besides co-author Binney) and experts from outside the circle of intelligence analysts.<\/p>\n<p>On August 9, 2017, investigative reporter Patrick Lawrence <a href=\"https:\/\/www.thenation.com\/article\/a-new-report-raises-big-questions-about-last-years-dnc-hack\/\">summed up<\/a> our findings in The Nation. \u201cThey have all argued that the hack theory is wrong and that a locally executed leak is the far more likely explanation,\u201d he explained.<\/p>\n<p>As we wrote in an open letter to Barack Obama dated January 17, three days before he left office, the NSA\u2019s programs are fully capable of capturing all electronic transfers of data. \u201cWe strongly suggest that you ask NSA for any evidence it may have indicating that the results of Russian hacking were given to WikiLeaks,\u201d our letter said. \u201cIf NSA cannot produce such evidence \u2013 and quickly \u2013 this would probably mean it does not have any.\u201d<\/p>\n<p><strong>A \u2018Dot\u2019 Pointing to a False Flag?<\/strong><\/p>\n<p>In his article, Lawrence included mention of one key, previously unknown \u201cdot\u201d revealed by WikiLeaks on March 31, 2017. When connected with other dots, it puts a huge dent in the dominant narrative about Russian hacking. Small wonder that the mainstream media immediately applied white-out to the offending dot.<\/p>\n<p>Lawrence, however, let the dot out of the bag, so to speak: \u201cThe list of the CIA\u2019s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called <a href=\"https:\/\/wikileaks.org\/vault7\/releases\/#Marble\">Marble Framework<\/a> that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to.\u201d<\/p>\n<p>If congressional oversight committees summon the courage to look into \u201cObfus-Gate\u201d and Marble, they are likely to find this line of inquiry as lucrative as the Steele \u201cdossier.\u201d In fact, they are likely to find the same dramatis personae playing leading roles in both productions.<\/p>\n<p><strong>Two Surprising Visits<\/strong><\/p>\n<p>Last October CIA Director Mike Pompeo invited one of us (Binney) into his office to discuss Russian hacking. Binney told Pompeo his analysts had lied and that he could prove it.<\/p>\n<p>In retrospect, the Pompeo-Binney meeting appears to have been a shot across the bow of those cyber warriors in the CIA, FBI, and NSA with the means and incentive to adduce \u201cjust discovered\u201d evidence of Russian hacking. That Pompeo could promptly invite Binney back to evaluate any such \u201cevidence\u201d would be seen as a strong deterrent to that kind of operation.<\/p>\n<p>Pompeo\u2019s closeness to President Donald Trump is probably why the heads of Russia\u2019s three top intelligence agencies paid Pompeo an unprecedented visit in late January. We think it likely that the proximate cause was the strategic danger Moscow sees in the nuclear-hedge-against-cyber-attack provision of the Nuclear Posture Statement (a draft of which had been leaked a few weeks before).<\/p>\n<p>If so, the discussion presumably focused on enhancing hot-line and other fail-safe arrangements to reduce the possibility of false-flag attacks in the strategic arena &#8211; by anyone \u2013 given the extremely high stakes.<\/p>\n<p>Putin may have told his intelligence chiefs to pick up on President Donald Trump\u2019s suggestion, after the two met last July, to establish a U.S.-Russian cyber security unit. That proposal was widely ridiculed at the time. It may make good sense now.<\/p>\n<p><strong>Ray McGovern, a CIA analyst for 27 years, was chief of the Soviet Foreign Policy Branch and briefed the President&#8217;s Daily Brief one-on-one from 1981-1985. William Binney worked for NSA for 36 years, retiring in 2001 as the technical director of world military and geopolitical analysis and reporting; he created many of the collection systems still used by NSA.<\/strong><\/p>\n<p><i>Ray McGovern (<a href=\"mailto:rrmcgovern@gmail.com\">rrmcgovern@gmail.com<\/a>) was a CIA analyst for 27 years; from 1981 to 1985 he briefed the <em>President\u2019s Daily Brief <\/em>one-on-one to President Reagan\u2019s most senior national security officials. <\/i><i>William Binney (<a href=\"mailto:williambinney0802@comcast.net\">williambinney0802@comcast.net<\/a>) worked for NSA for 36 years, retiring in 2001 as the technical director of world military and geopolitical analysis and reporting; he created many of the collection systems still used by NSA. Reprinted with permission from <a href=\"http:\/\/consortiumnews.com\/\">Consortium News<\/a>.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Moscow is showing understandable concern over the lowering of the threshold for employing nuclear weapons to include retaliation for cyber-attacks, a change announced on Feb. 2 in the U.S. Nuclear Posture Review (NPR). Explaining the shift in US doctrine on first-use, the NPR cites the efforts of potential adversaries \u201cto design and use cyber weapons\u201d [&hellip;]<\/p>\n","protected":false},"author":357,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"coauthors":[],"class_list":["post-30488","post","type-post","status-publish","format-standard","hentry","category-news"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"meta_box":{"disable_donate_message":"","custom_donate_message":"","subtitle":""},"_links":{"self":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/30488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/users\/357"}],"replies":[{"embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/comments?post=30488"}],"version-history":[{"count":2,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/30488\/revisions"}],"predecessor-version":[{"id":30490,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/30488\/revisions\/30490"}],"wp:attachment":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/media?parent=30488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/categories?post=30488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/tags?post=30488"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/coauthors?post=30488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}