'Smoking Gun' Hunter Biden Email '100% Authentic,' Forensic Analysis Confirms
Cybersecurity expert concludes emails published by New York Post are genuine
A forensic analysis of the "smoking gun" email published by the New York Post from Hunter Biden's laptop has confirmed that the file is "100% authentic."
The email, received by Hunter Biden in April 2015 from a Burisma executive discussing an introduction to then-Vice President Joe Biden, was examined by a cybersecurity expert, according to The Daily Caller.
The contents of Hunter Biden's hard drive are at the center of a New York Post investigation, and the files from the laptop have now been confirmed as unquestionably authentic.
The Daily Caller reportedly obtained a full copy of Hunter’s alleged laptop from former New York Mayor Rudy Giuliani on Wednesday.
Robert Graham, the founder of the cybersecurity firm Errata Security, was provided with a copy of the email and its metadata for forensic analysis.
The email in question shows Hunter Biden discussing having arranged a meeting between his then-vice president father and his Ukraine business partner.
Graham, who has been cited as a cybersecurity expert in The Washington Post, the Associated Press, Wired, Engadget, and other news and technology outlets, told the Daily Caller that he used a cryptographic signature found in the email’s metadata to validate that Vadym Pozharsky, an advisor to Burisma’s board of directors, emailed Hunter Biden on April 17, 2015.
In the email, Pozharsky thanked Hunter Biden for “inviting me to DC and giving an opportunity to meet your father and spent [sic] some time together.”
The New York Post first reported the email in October, describing it as a “smoking gun” showing that Hunter Biden had introduced his father to the Burisma executive in 2015.
The email was sent less than a year before Joe Biden pressured former Ukrainian President Petro Poroshenko to fire a prosecutor who was reportedly investigating Hunter's gas company in return for a $1 billion loan guarantee.
Graham previously told the DCNF that emails sent from Gmail, such as Pozharski’s message to Hunter Biden, can be “absolutely verified beyond a shadow of a doubt” by testing its contents against the unique DKIM signature found in its metadata.
Graham used the DKIM signature within the email to verify with a private key on Google’s servers that the sender, recipient, subject, date, and body of the message that the DCNF obtained from Giuliani were unchanged from when the email was originally sent in April 2015.
Graham said the only way the email could have been faked is if someone hacked into Google’s servers, found the private key, and used it to reverse engineer the email’s DKIM signature.
Email metadata on its own does not provide any indication of whether hacking had anything to with the email’s release, Graham noted.
“Of course, committing criminal hacking doesn’t make true information any less true, so no matter how illegitimately they gathered emails, the contents are provably legitimate,” Graham said.
Joe Biden’s presidential campaign said in a statement that his schedule indicates that no such "official" meeting, as alleged in the email, took place.
However, the campaign later told Politico that they could not rule out the possibility he had a cursory encounter with the Burisma executive.
The email came from a computer that Hunter Biden reportedly dropped off at a Delaware-based computer repair shop in April 2019.
The repair shop owner provided Giuliani a copy of the hard drive after it went unclaimed.
Giuliani had initially refused to provide the Daily Caller with a copy of the hard drive in mid-October, saying that questions surrounding the veracity of its contents were “pettifogging nonsense” pushed by the “liberal press.”