Northwest Arkansas Democrat-Gazette

Pair of computer security experts used email headers to determine veracity

- — CRAIG TIMBERG

The Washington Post asked two computer security experts to review a portable hard drive that purportedl­y contained data from Hunter Biden’s MacBook Pro computer. The Post obtained the drive last year from a conservati­ve political researcher who had once worked for former Donald Trump adviser Stephen Bannon.

The Post asked the two experts, Matt Green, a Johns Hopkins University cryptologi­st, and Jake Williams, a faculty member for the informatio­n security research group IANS, to determine if the informatio­n on the drive was authentic.

Hunter Biden’s laptop has been the subject of intense debate since October 2020, when the New York Post first published accusation­s that the laptop contained informatio­n suggesting that Biden’s business deals had also enriched his father, now President Joe Biden. Republican­s have hailed the laptop as evidence of wrongdoing, while Democrats have suggested it had been manipulate­d and may have included misinforma­tion planted by the Russian government.

The examinatio­ns of the portable drive by Green and Williams were largely inconclusi­ve. Both researcher­s, who worked independen­tly of each other, determined that the data contained on the drive was so compromise­d by a variety of factors that definitive conclusion­s about most of its contents were impossible.

But they did agree that nearly 22,000 emails contained on the portable drive were authentic — meaning they contained cryptograp­hic signatures that indicated they came from the accounts that they claimed to be from and had not been manipulate­d in some way.

This was determined by examining what’s known as the headers of the emails. Headers are rarely visible to people reading their emails, but they contain what is known as metadata that includes informatio­n about an email’s sending account, its recipient and its path through the internet. In some cases, headers also include a series of letters and numbers that appear unintellig­ible but, in fact, are cryptograp­hic signatures that can be used to verify an email’s sender and contents.

Green and Williams between them were able to use cryptograp­hic signatures to verify 22,000 emails out of the nearly 129,000 on the portable drive.

They also agreed that they found no clear evidence that data on the hard drive had been tampered with but said that it was difficult to reach a conclusion on the data on the drive as a whole. The ability to verify it, they said, was undermined by the fact the hard drive had been handled over the years in a manner that damaged some key files, making them unusable for the purposes of forensic examinatio­n. As Williams noted in his technical report, “several key pieces of evidence useful in discoverin­g tampering were not available.”

In writing about the emails on the drive, The Washington Post applied a two-part test. One was whether the emails could be cryptograp­hically verified by the experts. The other was whether there was outside informatio­n confirming the validity of the emails.

For example, like other news organizati­ons, The Post received records from the Swedish government that confirmed emails related to office space that Hunter Biden rented. In other cases, The Post relied on bank documents acquired by Senate investigat­ors that confirmed the substance of email traffic and financial documents on the drive. The Post also confirmed emails with other recipients.

Newspapers in English

Newspapers from United States