You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Government
THEY HAVE IT ALL: Ex-NSA Analyst Bill Binney Says Stellarwind Database Has Every Erased Mueller Team Text Message, Hillary Clinton Email
2020-09-16
I know nothing about these guys, but here's the article. If true, why all the fuss over the last few years?
[QMNews] Claims that Special Counsel Robert Mueller’s investigative team "accidentally wiped" two dozen cellphones — so evidence of their treachery could not be known — met their match in former NSA Director Bill Binney who told the world yesterday in an interview that, indeed, they have it all.

Binney, one of the original National Security Agency analysts and longtime whistleblower, said that if the DoJ really wants to know what was on those phones, "all they have to do is go to NSA Stellarwind Database and pull them out as all SMS going over the cell network are captured & stored forever."

The 2009 Inspector General report into the project is below.

[Click the link to see a pdf viewer of report]

Binney also said that the missing 30,000 emails from Hillary Clinton’s laptop could be found in Stellarwind as well as all of the communications regarding the alleged ’Russian Collusion’ hoax that led to the investigation into the Trump Administration.

Those communications were alleged to have come from a source in Russia but after careful analysis it was determined that it was all but impossible due to the transfer rate. His conclusion was that the data was simply taken from WikiLeaks, the documents were pulled apart and then false evidence, including Russian words and Cryllic characters, were added to the pages, then released by Guccifer 2.0.

Binney noticed upon analysis of the data of the Russian communication that the data was being manipulated out of sync, according to an eye opening interview with L. Todd Wood’s Creative Destruction Media.

"The data from the 1st of September merged into the time holes of the 5 July data. Which meant it was shuffling like one of the cards. You have one file, he separated in two, then they had a range change on the date and the hour. this guy is fabricating the data, he’s playing with the data, he’s playing with us."

Binney said he reviewed the Vault 7 material (descriptions of CIA hacking tools published by WikiLeaks), which said that there’s a program called Marble Framework, which the CIA can use to modify an attack and make it look like someone else did the attack.

The countries that had the capability to do that were Russia, China, North Korea, Iran and Arab countries. Also Vault 7 said that the Marble Framework program was used one time in 2016.

"All the evidence was pointing back to CIA as the originator Guccifer 2.0. And that Guccifer 2.0 was inside the CIA," Binney said.

A long made claim by Binney was that the technical analysis of the file transfers in the WikiLeak files showed they could not have been made via transatlantic internet, but, more likely, a local thumb drive.

"All we had to do was assess the difference in time between the files and see how many characters were passed and we calculate the transfer rate. And when we did that we got rates between 14 and 49.1 megabytes per second. That’s between 19 and 49.1 million characters per second. And we knew that the international web across the Atlantic to Europe, somewhere in Eastern Europe could not handle that kind of rate transfer."

Binney also talked about The Hammer, a project by former NSA chief James Clapper that he also exposed via a fellow whistleblower inside the CIA. Where records of every phone and internet tap the government makes are kept to keep watch on the watchers, The Hammer was a separate protocol they created, meaning there would be no evidence of who was being watched by Big Brother.

"The Hammer was set up inside the CIA by, according to the whistleblower, by former Director of National Intelligence James Clapper and former CIA chief John Brennan. It was done so that they could spy on anybody they wanted to, without anybody in the intelligence community or the US government or any other government knowing they were doing it," Binney said in the CDMedia interview.

Binney explained that anybody that goes into the NSA data, including the Five Eyes, the five global English-speaking intelligence agencies, is tracked and recorded onto a network log.

"Also if you do an unmasking, you have to make a request and that’s recorded, who did it, what time, what the subject was and what the justification was and what person they were after," he said.

"But if you set up your own separate one, nobody knows what you’re doing. And that’s exactly what this whistleblower is claiming. I’m pointing to that group as the group that was probably the originator of Guccifer 2.0 and also this fabrication of the entire story of Russiagate."

Watch the full interview of Bill Binney by CDMedia Editor & Publisher L. Todd Wood, on the subject of Julian Assange’s freedom, below:

[Click the link to see the video if so inclined]
Posted by:gorb

#23  https://www.wireshark.org/
Posted by: 3dc   2020-09-16 20:52  

#22  An amendment to my previous post. Within TCP/IP for transport you have TCP and UDP the first is end to end error checking, the second is best case.

Each of these has a little over 65,000 port identifiers. Where I said identifiable protocol, replace protocol with port.
Posted by: H-T-A   2020-09-16 19:15  

#21  So, sorry, no Shillary e-mail, at least not according to this information.

Sorry, it doesn't have to be SMS to get hoovered up. Everything that passes through an Internet peering point gets hoovered based on protocol.

Mail is SMTP, POP3 and a few others. All the messaging services like iMessage...etc have an identifiable destination protocol that the traffic can be filtered by and marked for collection.

There is a lot more detail associated with the collection of data, but I won't go into as most people don't need to know and probably would not understand. William Binney knows of what he speaks.
Posted by: H-T-A   2020-09-16 19:12  

#20  Edward Snowden is in Russia for talking about this database.
Posted by: Ebbomoger Speaking for Boskone4589   2020-09-16 16:49  

#19  FOIA doesn't cover golf conversations
Posted by: Procopius2k   2020-09-16 13:33  

#18  That's why Baraq did so much of his business on the golf course. You didn't think he was a great golfer, did you?
Posted by: Abu Uluque   2020-09-16 12:32  

#17  Binney also said that the missing 30,000 emails from Hillary Clinton’s laptop could be found in Stellarwind as well as all of the communications regarding the alleged ’Russian Collusion’ hoax that led to the investigation into the Trump Administration.

Nero, did Binney get this wrong?
Posted by: JohnQC   2020-09-16 12:29  

#16  To the "why don't they" comments, notice the quote:

"all they have to do is go to NSA Stellarwind Database and pull them out as all SMS going over the cell network are captured & stored forever."

The operative acronym is SMS - short messaging service - that is, texts. E-mail and anything else that is routed over the general Internet goes over a packet data service that is not SMS-based. So, sorry, no Shillary e-mail, at least not according to this information.
Posted by: Nero   2020-09-16 12:18  

#15  How is that Seth Rich investigation going? Seems like murder is a pretty serious proof of how earnest and ruthless the players on one side of this are, and we are asking about expecting FOIA and endless “investigation “ on the other? Seems like we continue to want to bring a file folder and subpoena to a gunfight. We seem to be unwilling to face the extent of the cancer in parts of our government.
Posted by: NoMoreBS   2020-09-16 11:50  

#14  Retrieval? This isn't grandma's attic.
Posted by: Clem   2020-09-16 10:43  

#13  Lots of The Hammer tech and the googol technology for storing page clicks and analysing trends have a big overlap.
Posted by: Bright Pebbles   2020-09-16 10:37  

#12  This is why Uncle Paulie never used a phone.
Posted by: Raj   2020-09-16 09:55  

#11  /\ Concur, and once the data is released it is oftentimes redacted (alleged National Security concerns) to the point of useless. IMA going with John's run the clock out 'rope-a-dope strategy.'

Multi-tiered justice system at work. Place Chappaquiddick bridge submerged Oldsmobile Delta-88 graphic here.


Posted by: Besoeker   2020-09-16 08:35  

#10  /\I dunno AlanC. Even, if this info could be obtained by FOIA, it would take forever to get it. Judicial Watch filed a FOIA to obtain 87 pages of a document from the DOJ and it took a year to obtain. I think this is the Washington, DC rope-a-dope strategy for keeping DS info squirreled away.
Posted by: JohnQC   2020-09-16 08:30  

#9  Ref #7: So, if it is correct that the Stellarwind Database scoops up all the crap, why isn't it used to settle issues such as Hillary's erased emails

Good question:

(a.) Doing so would comprise methods and capabilities and represent an admission of domestic collection. (b.) Not the job of the intelligence community (IC). (c.) Doing so would appear to run counter to the current political leanings of the IC.
Posted by: Besoeker   2020-09-16 08:27  

#8  Now, is it retreiveable via an FOIA?
Posted by: AlanC   2020-09-16 08:12  

#7  So, if it is correct that the Stellarwind Database scoops up all the crap, why isn't it used to settle issues such as Hillary's erased emails, the Mueller phone data that was erased, the missing Page-Strzok communications, Flynn missing 302, etc. and get on with justice? Why wasn't it used to put an end to Russiagate from the git go and save putting the country through the constant shit show?
Posted by: JohnQC   2020-09-16 08:11  

#6  There is also the problem of 'too much data'.

Sorting via AI is possible but that takes a fair amount of time to set up.
Posted by: lord garth   2020-09-16 07:47  

#5  /\ Excellent point. The IC has sophisticated 'key word' reach back tools that can rack & stack topical data very rapidly. Well, it was sophisticated 15 years ago.
Posted by: Besoeker   2020-09-16 07:34  

#4  Not to overlook Rantburg's archive and our postings. Hi guys, how's it going o/

Problem is retrieval. Think the last scene of Raiders of the Lost Ark.
Posted by: Procopius2k   2020-09-16 07:28  

#3  This is a revelation?
Posted by: Clem   2020-09-16 07:24  

#2  Binney explained that anybody that goes into the NSA data, including the Five Eyes, the five global English-speaking intelligence agencies, is tracked and recorded onto a network log.

Tracking can also provide insights into requester intelligence gaps and requirements. eBay tracks and forwards like items of interest, or newly posted items to the requester. Why wouldn't the IC do likewise. What am I missing.
Posted by: Besoeker   2020-09-16 07:12  

#1  Tragic accident wiping out Stellarwind Database in 5 .. 4 .. 3
Posted by: g(r)omgoru   2020-09-16 06:36  

00:00