NSA Leaks Seemingly Contradict Obama’s Public Promises On ‘Russian Election Hacking’

Last night, courtesy of an NSA contractor named Reality Winner who was arrested for leaking top secret intelligence to The Intercept, we learned that Russian Military Intelligence was supposedly conducting hacking operations on U. S. election infrastructure pretty much right up until election day. And while those Russian military hackers were smart enough to launch a coup of the most advanced democracy on the face of the planet, luckily they were also dumb enough to leave plenty of clues behind to allow the NSA to track their digital footprints all the way back to the Kremlin.
Here is an excerpt from our post on the topic last night (see “FBI Arrests NSA Contractor Who Leaked Top Secret “Russian Hacking” Document To The Intercept“):
According to the Intercept, the report is “the most detailed U. S. government account of Russian interference in the election that has yet come to light. It is said to reveal that that Russian hacking may have penetrated further into U. S. voting systems than was previously understood” and “states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.”
The NSA document alleges the GRU hacked the voting systems company using a false Google alert requiring a target to enter login credentials. According to the report, it also attempted a parallel campaign using a false email account meant to be confused with a second company. And yet, despite all that “sophistication”, Russia’s smartest, government hackers somehow left a trail so obvious that it would allow the NSA to conclude in under a month, that Russia’s GRU was behind it. Which is also where the story become questionable because at roughly the same time, another set of alleged Russian hackers, the Shadow Brokers, was in possession (and trying to sell) weaponized CIA methods, allowing any potential hacker to adopt the identity of anyone else, even the CIA or NSA.

This post was published at Zero Hedge on Jun 6, 2017.