Select Page

More Evidence of the Russian Meddling Lie


The American public, with the enthusiastic support of most of the media, have been sold a big lie about Russian meddling in the 2016 Presidential election. As I have noted in previous pieces, there was nothing new nor special nor unique about Russian espionage activities inside the United States, including information and computer network operations, in 2016. Russian espionage and covert action against the United States has been a matter of fact since 1919. And the United States has been similarly engaged in such activities inside Russia. 

What made 2016 unique and dangerous is that US law enforcement and intelligence agencies decide to use the ruse of Russia as a weapon to attack the candidacy and then the Presidency of Donald Trump. This attack entailed creating evidence that Trump was soliciting Russian assistance and the creation of the myth that Russia hacked the DNC. Anyone who challenges this lie is branded immediately as a Russian stooge and puppet of Putin. 

We have very specific evidence regarding the fraud perpetrated about the so-called “hacking” of the DNC. Bill Binney and I have posted two pieces–one showing that the forensic evidence in the metadata of the DNC documents posted at Wikileaks could not have transferred over the internet and one showing that Guccifer 2.0 was the creation of some person or entity other than Russia.

There is another piece of public evidence that provides circumstantial evidence that the intelligence community case against Russia with respect to the allegation of extraordinary meddling is a fabrication. I am referring to the January 2017 Intelligence Community Assessment–Assessing Russian Activities and Intentions in Recent US Elections.

I want to focus on one of the more important Key Judgements:

We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks.

It is natural and understandable to assume that this judgment is based on real intelligence held in classified channels. But it is not. Bill Binney and I have shown that Guccifer 2.0 was a fabrication. But we also have the testimony of NSA Director Admiral Mike Rogers and FBI Director Jim Comey on the “evidence” underlying the so-called hack. This key judgment was based on unverified and uncorroborated information provided by CrowdStrike.

Three months after the ICA was published, Rogers and Comey testified before the House Intelligence Committee. They were asked specifically about the proof that the DNC was hacked by the Russians. Here is the key part of that testimony:

HURD: So there was about a year between the FBI’s first notification of some potential problems with the DNC network and then that information getting on — getting on Wikileaks.

COMEY: Yes, sir.

HURD: Have you been able to — when did the DNC provide access for — to the FBI for your technical folks to review what happened?

COMEY: Well we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system.

HURD: Director Rogers, did the NSA ever get access to the DNC hardware?

ROGERS: The NSA didn’t ask for access. That’s not in our job…

HURD: Good copy. So director FBI notified the DNC early, before any information was put on Wikileaks and when — you have still been — never been given access to any of the technical or the physical machines that were — that were hacked by the Russians.

COMEY: That’s correct although we got the forensics from the pros that they hired which — again, best practice is always to get access to the machines themselves, but this — my folks tell me was an appropriate substitute.

HURD: The — at what point did the company and the DNC use — share that forensic information to you?

COMEY: I don’t remember for sure. I think June. I could be wrong about that. . . .

HURD: So — so that was — how long after the first notification of — that the FBI did of the DNC?

COMEY: Ten months.

HURD: Ten months? So the FBI notified the DNC of the hack and it was not until 10 months later that you had any details about what was actually going on forensically on their network?

COMEY: That’s correct, assuming I have the dates about right. But it was — it was some months later.

Neither the FBI nor the NSA got “direct access to the machines”. Their words, not mine.

And where did the forensic data come from? CrowdStrike.

So much for the intelligence community relying on real intelligence. They were given information from a cyber security firm that waited at least 5 weeks before allegedly taking steps to disconnect the DNC computers from the infected network.

Even in an unclassified setting, Admiral Rogers and Director Comey could have stated that they had other information from intelligence sources that corroborated the CrowdStrike findings. They did not testify to this. This is more than curious, it is a tacit admission that they were relying on information from a firm hired by the Democrats and the law firm working for Hillary Clinton. This is not an independent, reliable source of information.

This fact alone does not prove the lie. But when considered as part of the entire evidence available, including the metadata from the documents posted at Wikileaks, the case for fabrication grows.

Reprinted with permission from Sic Semper Tyrannis.

Read the original article.

About The Author

Larry C. Johnson

The Ron Paul Institute for Peace and Prosperity is a project of Dr. Paul’s Foundation for Rational Economics and Education (F.R.E.E.), founded in the 1970s as an educational organization. The Institute continues and expands Dr. Paul’s lifetime of public advocacy for a peaceful foreign policy and the protection of civil liberties at home. Visit

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.


Bringing together a variety of news and information from some of today’s most important libertarian thought leaders. All feeds are checked and refreshed every hour and pages auto-refresh every 15 minutes. External images are deleted after 30 days.

Time since last refresh: 0 second

Publish Your Own Article

Follow The Libertarian Hub

Please consider donating using any of the cryptocurrencies below or use the Brave browser to tip using Basic Attention Tokens (BAT). Your anonymous contributions help keep this website running for everyone to enjoy!


Take Control of Your Domain Names
The Ultimate Managed Hosting Platform

Weekly Newsletter

Newsletter Signup

Subscribe to our newsletter to receive a weekly email report of the top five most popular articles on the Libertarian Hub!

Weekly Newsletter SignupTop 5 Stories of the Week

Subscribe to our newsletter to receive a weekly email report of the top five most popular articles on the Libertarian Hub!