Yesterday, as if to say, "Please, don't forget about the New Cold War when you are tearing down all those monuments to the Lost Cause," The New York Times published the frontpager, "In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking," by its two journeymen Russophobes, Andrew Kramer and Andrew Higgins.
The story is laughable. A malware architect in Ukrainian custody is cooperating with FBI. We are asked to believe that portions of code the Ukrainian, known as Profexer, authored ended up on DNC servers. We are also asked to believe that somehow it was Russian agents who put the code there.
There is no evidence that Profexer worked, at least knowingly, for Russia’s intelligence services, but his malware apparently did.
That a hacking operation that Washington is convinced was orchestrated by Moscow would obtain malware from a source in Ukraine — perhaps the Kremlin’s most bitter enemy — sheds considerable light on the Russian security services’ modus operandi in what Western intelligence agencies say is their clandestine cyberwar against the United States and Europe.
It does not suggest a compact team of government employees who write all their own code and carry out attacks during office hours in Moscow or St. Petersburg, but rather a far looser enterprise that draws on talent and hacking tools wherever they can be found.
Also emerging from Ukraine is a sharper picture of what the United States believes is a Russian government hacking group known as Advanced Persistent Threat 28 or Fancy Bear. It is this group, which American intelligence agencies believe is operated by Russian military intelligence, that has been blamed, along with a second Russian outfit known as Cozy Bear, for the D.N.C. intrusion.
Rather than training, arming and deploying hackers to carry out a specific mission like just another military unit, Fancy Bear and its twin Cozy Bear have operated more as centers for organization and financing; much of the hard work like coding is outsourced to private and often crime-tainted vendors.
“There is not now and never has been a single piece of technical evidence produced that connects the malware used in the D.N.C. attack to the G.R.U., F.S.B. or any agency of the Russian government,” said Jeffrey Carr, the author of a book on cyberwarfare. The G.R.U. is Russia’s military intelligence agency, and the F.S.B. its federal security service.
United States intelligence agencies, however, have been unequivocal in pointing a finger at Russia.The whole thing screams false flag. One interesting takeaway though is that the press, at least The New York Times, is starting to hedge with several statements ascribing the Russian hack theory solely to U.S. intelligence agencies. This is a recent change. For many months there was merely the bald assertion that "the Russians did it." Clearly when the "Russia hack" narrative collapses, as it already is, the media doesn't want to be forced to issue a series of retractions a la the Iraq War.
Assange says he has proof that DNC documents WikiLeaks published last year did not come from Russia. Combined with the studiously ignored story that the DNC documents were leaked not hacked, the casus belli of the deep state's New Cold War is disintegrating.