How to Make Sense of the Wikileaks Clinton Campaign Email Document Dump and Controversy

It is becoming increasingly difficult to distinguish fact from fiction in the coverage of Wikileaks' ongoing publication of internal emails from Hillary Clinton's presidential campaign, known as the Podesta emails. There are internet hoaxsters pushing fake emails that are not contained in the actual published files. There are junk reports from prominent newsy websites that are based on obvious misreadings of the files in question. There is Clinton campaign and Democratic party spin seeking to distract from the content of the published emails. There is Trump campaign and Republican party spin exaggerating the content and import of what has been revealed by the leaked documents. And so on. In this article, we'll provide a bit of context on the leak itself, cover some examples of how it is being exploited by hoaxsters, how it is helping to reveal the incompetence of newsy sources of information, and how it is playing out within the context of the presidential campaign itself. We'll conclude with some tips on how to sift through the bullshit.


The Leaks

This article focuses specifically on coverage of the Podesta emails. But it is important to point out the context in which these files have been published. The first thing to note is that there is not just one leak that has resulted in the publication of Democrats' internal documents. Back in June, a hacker or hacker group known as Guccifer 2.0 began releasing a large set of internal files from the Democratic National Committee.

It is speculated that Guccifer 2.0 is a front for Russian hackers, if not a state-sponsored Russian cyberwar group, mostly on the basis of circumstantial evidence. The Guccifer 2.0 documents can be found here. Emails obtained by Guccifer 2.0 were, it appears, also obtained and published by Wikileaks. The Wikileaks DNC email database can be found at the link.

(The name 'Guccifer 2.0' itself is an obvious allusion to a Romanian hacker who called himself Guccifer and released documents on prominent Republican and Democratic party officials in 2013. Guccifer was eventually tracked down and jailed in 2014.)

Then in early October, Wikileaks began publishing a large set of files from the email account of John Podesta, a long-time Democratic party insider, and current chairman of Hillary Clinton's presidential campaign. This set of documents is known as The Podesta Emails.

The Podesta Emails are not directly related to the larger Hillary Clinton email controversy, which resulted from her use of a private email server during her time as Secretary of State. Emails from that controversy were made public by congressional inquiries and Freedom of Information Act requests. Many, if not most, of those emails have also been published by Wikileaks in its Hillary Clinton Email Archive.

Disinformation

Shortly after Wikileaks began publishing the Podesta email document dump, reports quickly began circulating online purporting to have found "smoking gun" evidence of one sort or another in the files. One of the most prominent of these was a report alleging that Clinton had called Democratic voters a "bucket of losers," in a clear allusion to her comments calling Trump supporters a "basket of deplorables." This claim can be demonstrated to be clearly false with a simple search for the term against the Wikileaks documents themselves. As a testament to their gullibility and refusal to do even basic research, numerous websites still have articles online breathlessly reporting the false claims as if they were true, without correction.

Misinformation

Misinformation campaigns based on the Podesta emails have been equally as successful as the disinformation campaigns waged by the hoaxsters. One widely circulated report claimed that the Podesta emails contained solid evidence of racist comments made by Hillary Clinton. "Racist Hillary DUMPS on African Americans, Calls Them Professional Never-Do-Wells," read one headline at a self-declared right wing news site. That sounds pretty serious! Moreover, the author of the article proclaims that the email confirmed everything she already believed! Yet, as with the hoaxsters, this claim is easily debunked with a minimum of effort. A search for the offending terms among the Wikileaks documents does indeed turn up an email using the offending terms. But anyone who is neither an idiot nor a knave should be able to quickly debunk the claim by reading the email's header, which reveals that it is not from inside the Clinton campaign. It was in fact sent from orca100@upcmail.nl, and addressed to a wide array of media outlets and political insiders. In other words, the purveyors of the "smoking gun" claim are either morons who are incapable of reading an email, or they are just click-bait artists trying to earn a few pennies off bombastic headlines.

Trump Gets Trolled 

Earlier this week, another story that was similarly based on an obvious faulty reading of an email from the Podesta files was published by the Russian state media outlet Sputnik News. The author(s) of the article misread an email in the Podesta files, and did not realize that it was just a forward, and not a personal email. This article was picked up by the Trump campaign, and the Republican candidate read from it at a campaign rally later that day. The embarrassing incident was reported widely in the media when the offending article was debunked later in the day.

Clinton Campaign Spin

The Clinton campaign, for its part, has clearly been put off balance by the publication of the hacked documents, judging from the contradictory statements they have made in its wake. Podesta first claimed that the Wikileaks documents were in fact fake. "They've put out documents that are purported to be from my account," he stated on a Sunday morning talk show. Then later on Twitter, he seemed to walk back this claim, asserting that fake documents had been inserted into the file dump, according to Politico. Finally, by Wednesday, Podesta admitted that his account had in fact been compromised and the the FBI announced that it was investigating the hack. Podesta has now gone on the attack himself, fingering Russia as the source of the hack and claiming coordination with the Trump campaign: "Russian interference in this election and their apparent attempt to influence it on behalf of Mr. Trump . . . should be of utmost concern to all Americans," said Podesta, according to CBS News.

This line of attack builds upon existing campaign narratives that have been articulated by Hillary Clinton herself. As she stated at the second presidential debate: "Putin and the Russian government are directing the attacks, the hacking on American accounts to influence our election. And Wikileaks is part of that, as are other sites . . . we don't even know if it's accurate information . . . believe me, they're not doing it to get me elected. They're doing it to try to influence the election for Donald Trump."

But Podesta appears to have bigger problems than the Russians. The Clinton campaign chairman's Twitter account was apparently compromised by someone from 4chan's /pol/ board earlier today. Politico reports:"Podesta's Twitter account sent out a strange tweet reading: "I've switched teams. Vote Trump 2015.Hi pol." The tweet was quickly deleted, but the Clinton campaign confirmed the account had been hacked."

For an in-depth analysis of the Democratic response to the hacks and leaks, see Glenn Greenwald's article at The Intercept: "In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots."

Conclusion

We live in a new information environment. Barack Obama was hailed as the first president of the social media age. The next president may be the first to inhabit an age of generalized, asymmetrical, information warfare. The Wikileaks Podesta emails file dump has completely muddied the waters in an already dirty presidential campaign. Widely read political news sources have been humiliated by transparent hoaxes. Others have had their shoddy reporting exposed for all to see. One major presidential campaign has been humiliated by spouting faulty Russian state news reports, while the other is getting pwned by 4chan.

Asking yourself a couple simple questions can help dispose of all the bullshit that is tripping people up right and left. Where's the evidence? Where's the corroborating evidence? The great thing about Wikileaks is that any assertions made on the basis of its documents can be verified or debunked by simply searching its archives and reading the primary source materials in question.

For more, check out our previous post on how to spot a fake news article and identify a hoax news website.

20 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. Great post. I’d like to mark like this too attractive event and real hard work to make an enormous article. Extremely attractive blog. A lot of blogs, I see these days don't really present anything that I'm interested in custom essay writing service .but I'm most definitely interest in this one. I am in reality happy with article quality and direction. This post is spot on in enlightening how some ideology applies to any writing position. Thanks a lot for preservation huge stuff. I am extremely a good deal thankful used designed for this position.

    ReplyDelete
  3. Wow very nice. I like it. Thanks for sharing.

    ReplyDelete
  4. This comment has been removed by the author.

    ReplyDelete
  5. Look here for some information about phone tracking applications

    ReplyDelete
  6. I don't know what to say, I liked your article and I hope you will have many entries or more, thanks for taking the time to show us.
    Friv Unblocked
    Y8 Unblocked
    Kizi Unblocked

    ReplyDelete
  7. Wow really interesting article, may later be able to share other helpful information are more interesting. Thank you.
    Slope Unblocked
    Miniclip Unblocked
    Abcya 2
    Friv 11

    ReplyDelete
  8. This is a great web site, Good sparkling user interface and, very informative blogs. I have found it enormously useful. Thanks you very good !
    Kizi 9
    Kizi 8
    Kizi 7

    ReplyDelete
  9. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article.
    Back Office Services

    ReplyDelete
  10. QUICK LOAN CONTACT US

    Are you in need of Urgent Loan Here all problem regarding Loan is solve between a short period of time with a low interest rate of 2% and duration more than 20 years what are you waiting for apply now and solve your problem or start a business with Loan paying of various bills I think you have come to the right place just email us.

    housingfinance22@gmail.com
    Contact us on whatspp +447513195409
    Mr Osman Ibrahim

    ReplyDelete
  11. We gives out both business and personal loans no collateral required. now term cash of all amounts I think you have come to the right place. We offer Cash at low interest rate of 2%. Interested people should please contact us on For immediate response to your application, process takes just 2/3 Days. contact us now

    housingfinance22@gmail.com
    Contact us on whatspp +447513195409
    WEBSITE: http://www.indbullsfin.com/index.pyc
    Mr Osman Ibrahim

    ReplyDelete
  12. Excelllent blog on: How to Make Sense of the Wikileaks Clinton Campaign Email Document Dump and Controversy
    Keep Blogging More:
    myTectra: Devops Training in Bangalore
    itEanz: Devops Training

    If you are Looking for Interview Questions for Popular IT Courses Refer the link Below
    Devops Interview Questions
    Informatica Interview Questions
    Docker Interview Questions
    Hive Interview Questions
    Talend Interview Questions
    As400 Interview Questions

    ReplyDelete
  13. thank you it was very helpfull
    please check here to learn new thing to develope in computer
    here!!!!!

    ReplyDelete
  14. Very helpful article it was a pleasure reading it.
    myTectra is the Marketing Leader In Banglore Which won Awards on 2015, 2016, 2017 for best training in Bangalore:
    python interview questions

    python online training

    ReplyDelete

  15. Dear Sir / Madam, Email: infosunloanservice24@gmail.com
    Do you need financing?
    Do you need a loan
    , business or personal loan?
    Do you want to refinance your business?

    I am giving you loan for your new year or business to make your family happy so please contact email (infosunloanservice24@gmail.com)


    international financial service rendered to the general public with maximum satisfaction, maximum risk free. Join
    the most trusted financial institution and secure a legitimate financial empowerment to add meaning to your
    business/personal life. We offer loan at 3% interest rate only. We also lend in USA DOLLARS, EURO, POUNDS and Indian Rupees,
    Please contact us today for more details on how to get started with your desire loan amount.
    Our branches: USA,UK, Europe, India, and all Asian country
    Kindly Contact Us Via This Email: infosunloanservice24@gmail.com.. whatsapp contact number +919738155308

    ReplyDelete
  16. ★HIRE A LEGIT HACKER★

    🔍🔍Are you Seeking for the Best Legit Professional Hackers online??❓💻💻💻
    Congratulations Your search ends right here with us. 🔍🔍🔍🔍

    🏅COMPOSITE HACKS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
    We Are One Of The Leading Hack Teams in The United States🇺🇸🇺🇸 With So many Accolades From The IT Companies🏆🏅🥇. In this online world there is no Electronic Device we cannot hack. Having years of experience in serving Clients with Professional Hacking services, we have mastered them all. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scamers that are advertising false professional hacking services via False Testimonies, and sort of Fake Write Ups.❌❌❌❌

    🏅COMPOSITE HACKS is the Answers to your prayers. We Can help you recover the password of your email, Facebook or any other accounts, Facebook Hack, Phone Hack (Which enables you to monitor your kids/wife/husband/boyfriend/girlfriend, by gaining access to everything they are doing on their phone without their notice), You Wanna Hack A Website or Database? You wanna Clear your Criminal Records?? Our Team accepts all types of hacking orders and delivers assured results to alleviate your agonies and anxieties. Our main areas of expertise include but is never confined to:

    ✅Website hacking 💻,
    ✅Facebook and social media hacking📲
    ✅Database hacking, & Blog Cleaning⌨️
    ✅Phone and Gadget Hacking📲
    ✅ CREDIT CARD Loading 💳 💳 ( Strictly USA & UK Credit Cards Only)
    ✅ PayPal Loading & Money Flipping 💰
    ✅Clearing Of Criminal Records❌
    ✅Location Tracking
    ✅ and many More✅

    🏅We have a trained team of seasoned professionals under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. 📲💻

    🏅 COMPOSITE HACKS understands your requirements to hire a professional hacker and can perceive what actually threatens you and risk your business⚔️, relationships or even life👌🏽. We are 100% trusted professional hacking Organization and keep your deal entirely confidential💯. We are aware of the hazards involved. Our team under no circumstances disclose information to any third party❌❌. The core values adhered by our firm is based on trust and faith. Our expert hacking online Organization supports you on time and reply to any query related to the unique services we offer
    Time also depends on what exactly you want to hack and how serious you are. Enough time with social engineering is required for hacking. So if you want to bind us in a short time, then just DONT contact us because we can't hack within 10-15minutes, *sorry*.
    I have seen FAKE HACKERS claiming they can hack in 10min , but there is no REAL HACKER who can say this (AVOID THEM) 💯

    💰PAYMENT: PLEASE, Think Of how much you’ll be paying for your job and DONT just Contact Us If You are Willing To waste our time by offering Unreasonable Amounts because we will give you your Job Invoice Based on what you want to hack and the hack tools we are going to use.
    We accept various secure payment methods that maintains your anonymity.

    🏅COMPOSITE HACKS is available for customer care 24/7, all day and night. We understand that your request might be urgent, so we have a separate team of allocated hackers who interact with our Clients round the clock⏰. You are with the right people so just get started.💯✅

    📲 CONTACT:
    E-mail: compositehacks@gmail.com
    Hire a Hacker!
    Want faster service? Contact us!
    HackerOne©️LLC 2018.
    All Rights Reserved ®️

    ★We Treat Every Request With Utmost Confidentiality★ 🙌🏽

    ReplyDelete