A few days ago a suspicious email and archive popped up by a hacker going by the handle “JAsIrX”. On twitter I relayed the alarming contents immediately as the archive of confidential looked comprehensive and accurate. I write this to tell you, I may have made a terrible error, as did the Trojans so long ago when presented with temptation…
The email itself had a valid header and experts analysed it, showing that it proved internal exchange within BritAm’s network.
For those unaware, here is the content of the email included in the archive:
“Phil We’ve got a new offer. It’s about Syria again. Qataris propose an attractive deal and swear that the idea is approved by Washington. We’ll have to deliver a CW to Homs, a Soviet origin g-shell from Libya similar to those that Assad should have. They want us to deploy our Ukrainian personnel that should speak Russian and make a video record. Frankly, I don’t think it’s a good idea but the sums proposed are enormous. Your opinion? Kind regards David”
When you put it all together, it seems like a closed case. A strong conspiracy is revealed with a British private military company (PMC) being contracted out by Qatar to create a chemical weapon (CW) false flag, around December when Obama was busy harping on about the very topic…
At least, on the surface! The hack definitely happened as BritAm’s website went down. Files were definitely leaked, no company would purposely leak out its employee’s passports and other personal information. But let us ask some important questions:
a) Why did only one email get leaked?
Of the entire 200 megabyte archive, only one email is leaked out, directed to the company’s manager. Usually with large leaks, a more complete archive of emails is leaked from the target’s database. Why did the hacker choose only to leak this particular email? How they he sift it out of the rest? Which leads to the second question.
b) Why BritAm?
The hacker claimed that they found the data on a Malaysian based server that had faulty intrusion detection software. Isn’t it odd that they would be looking around there in the first place and be motivated to target this company. Could it be chance? Of course. But more likely it was a well researched “leak”, much like the Stratfor attack that was conducted by the FBI (since AnonymouSabu was working as an agent of theirs at the time he helped hack it) timed in response to its realistic articles about Syria… and this again leads to the penultimate, but very important question.
c) Why now?
If you can entertain for a minute that this hack was indeed well-planned and not accidental as the hacker claimed, you would ask then, why would they release it now? If it was unplanned, they would have no reason to delay its release. In fact, there is a very good reason:
The Syrian Electronic Army (SEA) has recently released a large amount of emails directly from Qatar’s email servers. Earlier the SEA hacked into the Saudi defense ministry’s servers and was able to completely transfer the database and access the content management system. The leaks so far are damning and have been confirmed by the Al Akhbar Lebanese newspaper as being “genuine”. The media, has mostly ignored this massive leak, including alternate media, who would normally be swarming around any mention of a “leak”… Instead, some very odd things have been happening.
Suddenly, a few days after the announcement and release of the hack, Anonymous has decided to launch a “warhead” campaign, complete with a slick media campaign and loud promises… a clear attempt to OVERSHADOW the massive and real SEA leaks. This “chemical weapon” loud horn is sounded by the leak, gathering much more attention than minutes between gulf leaders (puppet Arabs of America). Putting these together, we can ask one final and simple question.
d) What is the purpose of this leak?
Why the leak, with a single email? Why now? Why only one email? It’s clear. A single email is very easy to dismiss as fake. In fact, during the Stratfor hack, anonymouSabu’s henchmen planted an email by CEO George Friedman claiming he had resigned, when in fact he had done no such thing. When you control a server you are able to fabricate any kind of email you want to “leak”. Only a long conversation with realistic time stamps follow ups and reference emails to check for the writer’s style, can possibly be used to confirm the authenticity of an email.
And BritAm has been silent!
Which means that this leak can be quickly dismissed as nothing more than a fabrication. The hack will of course be acknowledged as in the case of Stratfor. Who will you believe, BritAm or the hacker?
That’s the problem. Soon, by undermining the validity of the leak in the minds of the media consumers, it will by extension, undermine the validity of the SEA leaks even though the latter is comprehensive and includes signed, scanned documents and a huge amount of cross references. That won’t matter, a single “fake” can spoil all the real leaks.
But not this time! By anticipating this strategy and demanding a complete archive from “JAsIrX” before discussing the leak any further, we can burn this possible Trojan horse before it enters our gates.
Very intelligent analysis indeed!!
[…] The BritAm trojan horse. […]
Reblogged this on Friends of Syria.
I have looked at all these documents, all the Iraqi stuff is 100% genuine and relate to daily operations for security teams looking after oil workers…. The Iran documents are purely training exercises for Saudi military using real threat scenarios. The only 2 mails in such a large file hack seems to really be the questionable thing, the guys mentioned in the mails are highly experienced military personnel and for sure would not communicate in this manner. This leak is not what it may appear….. and will put a lot of innocent people at risk….. I am one of them
If you wish to get in contact with me via a secure medium, it may be helpful. There must be a reason why BritAm was targeted in particular. Unfortunately, the nature of geopolitics means that even allies are “burnable”, the prize here is ultimately the destruction of Syria through a chemical weapons false flag.
Excellent analysis. Thank you for brining SEA to my attention. I will look into it.
Are the emails intercepted from Qatar and Saudi available in English? Or is there a summary available of what the contents were?
There are traces of the Russian
1. http://img38.imageshack.us/img38/4161/rus34xabk.jpg
2. Correct image, in the russian region (Syrian Issue) – http://ic.pics.livejournal.com/ntv/14201556/606606/606606_original.png
To: Phillip Doughty
Incorrect from “JAsIrX” followed distribution
To: ‘Phillip Doughty’
3. Incorrect date string
for ; Mon, 24 Dec 2012 23:57:18 +0800 (SGT)
Received: (qmail 18137 invoked from network); 24 Dec 2012 15:57:27 -0000
The letter should be in the region of GMT-0000 !!! in December 23
4. Edited fake-mail (not professional job)
5. Files in archives (dating) can be compared to the date of this publication and shows an early stage of preparation for the possibility chemical action.
http://www.independent.co.uk/news/world/middle-east/chemical-weapons-were-used-on-homs-syrias-military-police-defector-tells-of-nerve-gas-attack-8431380.html
[…] afirmó más tarde el correo electrónico era una broma pesada perpetuada por el ejército Electrónico sirio, un grupo sombreado de hackeres de pro-Assad que supuestamente cortaron la cuenta de Twitter de un […]
[…] https://syriancommando.wordpress.com/2013/01/29/britam-trap/ […]
[…] The BritAm trojan horse | The Syrian Commandohttp://syriancommando.wordpress.com/2013/01/29/britam-trap/A few days ago a suspicious email and archive popped up by a hacker going by the handle “JAsIrX”. On twitter I relayed the alarming contents immediately as the archive of confidential looked compre… […]