It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
TYT can report that at the same time CrowdStrike was working on behalf of the DNC, the company was also under contract with the FBI for unspecified technical services. According to a US federal government spending database, CrowdStrike’s “period of performance” on behalf of the FBI was between July 2015 and July 2016. CrowdStrike’s findings regarding the DNC server breach — which continue to this day to be cited as authoritative by everyone from former FBI Director James Comey, to NBC anchor Megyn Kelly — were issued in June 2016, when the contract was still active.
CrowdStrike’s general counsel and chief risk officer, has been appointed by the President to the Commission on Enhancing National Cybersecurity. Under the Commission, Chabinsky and 11 other industry leaders have been directed by the White House to recommend “bold, actionable steps that the government, private sector, and the nation as a whole can take to bolster cybersecurity in today’s digital world.”
Google financing CrowdStrike advertises on its website that it is “proud to have received major funding from some of the world’s most prestigious technology providers and investment firms” – most prominently Google Capital, which “led (a) $100M investment in CrowdStrike.”
CrowdStrike co-founder Alperovitch, meanwhile, has a bad taste for Russia, according to the Esquire profile: Alperovitch knows a thing or two about what the Russians call “active measures,” in which propaganda is used to undermine a target country’s political systems. He was born in 1980 in Moscow, in an era when people were afraid to discuss politics even inside their homes. His father, Michael, was a nuclear physicist who barely escaped being sent to Chernobyl as part of a rescue mission in 1986. Many of Michael’s close friends and colleagues died of radiation poisoning within months of flying to the burning power plant. The takeaway for Dmitri was that “life is cheap in the Soviet Union.”
stateofthenation2012.com...
Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. Only one “super-hero cyber-warrior” seems to “have the codes” to figure out “if” a system was hacked and by “whom.” Dmitri’s company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others.
CrowdStrike’s philosophy is: “You don’t have a malware problem; you have an adversary problem.” CrowdStrike has played a critical role in the development of America’s cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike’s president of services. The company is crawling with former U.S. intelligence agents.
Dmitri Alperovitch posed as a “Russian gangster” on spam discussion forums which brought his illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski’s sting operation which took two years, but it ultimately brought about fifty-six arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.
After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America. Only the CIA can transform a Russian into an American with a top-secret clearance overnight.
originally posted by: 3NL1GHT3N3D1
a reply to: JinMI
Everything, actually.
originally posted by: 3NL1GHT3N3D1
They want you focused on Russia and Trump so you won't look behind you.
Cybersecurity firm CrowdStrike has had to retract portions of a report supporting its allegations of Russian cyberattacks – and is also refusing to address Congress about its findings on Moscow's election hacking.
The errors prompted both the Ukrainian military and a prominent British think tank to issue public statements disputing CrowdStrike's data.
www.reddit.com...
THIS IS AN EMAIL BETWEEN PODESTA AND A COMPUTER SCIENTIST: en.wikipedia.org... I believe that this is a more serious situation than perhaps Secretary Clinton and her aides realize.Fortunately, there is a positive step that can and should be taken. The problem. There is a very real risk that the system was broken into, possibly by Republican operatives (or China or some other country or organization). If this has happened and if there is anything that might appear problematic in those emails, whether or not it actually is, the relevant emails might be released to the press shortly before the election. Even if the system was not broken into, there is the threat that opponents might release forged emails that are difficult to impossible to distinguish from real ones. In addition, there are questions that any computer security expert will ask, such as was the system backed up regularly. If so, then it might be possible at least to respond to forged emails. Of course the claim that the server has been wiped clean (was that also done with any backups that were created?) suggests that there may not be adequate backups.
Incidentally, depending on how the deletions on the server were done, it might be possible for the email to be recovered by a forensics expert. What should be done. Unfortunately, nothing can be done to prevent the risks described above. Given that, it's important to know how real those risks might be. Therefore, I recommend that a forensics investigator be hired to examine the server and any backups and logs that might still exist to see if there may have been a break-in. Jeremy Epstein is a prominent computer security expert who has recommended a company called Mandiant. (Neither Jeremy nor I have any involvment with Mandiant of any kind, including financial). According to Jeremy, they are frequently brought in after major corporate breakins. They are verydiscrete and, in his view, competent. I can put anyone who is interested in touch with Jeremy, whoives in Virginia. In my opinion it is critical that a highly qualified forensics expert examine the system as soon aspossible. It is important to know if there may be a problem or if an attack may have occurred, so that there can be a well thought out response prepared beforehand. Finally, if nothing serious is uncovered by a forensics examination, that does not prove that nothing happened. Regrettably, the absence of proof of a break-in is not proof of the absence of a break-in.
THIS EMAIL WAS SENT 2015-04-15 DURING THE BENGAHZI #STORM! ZOMG!!! ZOMG: The companies are Fidelis Cybersecurity and Mandiant. They base their analysis on five malware samples used in the hacking attack. Fidelis executive Michael Buratowski says, “Based on our comparative analysis, we agree with CrowdStrike and believe that the Cozy Bear and Fancy Bear…groups were involved in successful intrusions at the DNC [Democratic National Committee] . […] The malware samples matched the description, form and function that was described in the CrowdStrike blog post. In addition, they were similar and at times identical to malware that other [research firms] have associated to these actor sets.” www.thompsontimeline.com... Mandiant is one of the firms blaming RUSSIA! Coincidence? I think not!