The Obama Link to Russian Interference Hoax and Failed Coup

“Russians” did not hack the DNC system. However, Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U. S. government or a corporation. Only one “super-hero cyber-warrior” seems to “have the codes” to figure out “if” a system was hacked and by “whom.”

aim4truth.org/2017/02/19/russian-hackers-found/

“In lieu of substantive evidence provided to the public that the alleged hacks which led to Wikileaks releases of DNC and Clinton Campaign Manager John Podesta’s emails were orchestrated by the Russian Government, CrowdStrike’s bias has been cited as undependable in its own assessment, in addition to its skeptical methods and conclusions. The firm’s CTO and co-founder, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire Victor Pinchuk, who also happened to donate at least $10 million to the Clinton Foundation.

In 2013, the Atlantic Council awarded Hillary Clinton it’s Distinguished International Leadership Award. In 2014, the Atlantic Council hosted one of several events with former Ukrainian Prime Minister Arseniy Yatsenyuk, who took over after pro-Russian President Viktor Yanukovych was ousted in early 2014, who now lives in exile in Russia.”

Comey Congressional Testimony – Relied on CrowdStrike and Never Secured Servers Into Evidence:

BURR: And the FBI in this case, unlike other cases that you might investigate, did you ever have access to the actual hardware that was hacked, or did you have to rely on a third party to provide you the day that that they had collected?

COMEY: In the case of the DNC, and I believe the D triple C, but I’m sure the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high class entity, that had done the work but we didn’t get direct access.

BURR: But no content.

COMEY: Correct.

BURR: Isn’t content an important part of the forensics from a counter-intelligence standpoint?

We are primarily funded by readers. Please subscribe and donate to support us!

COMEY: It is but what was briefed to me by the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion


New Evidence Suggests Crowdstrike May Have Planted Malware On DNC Servers

On the surface, it looks like the malware was likely to have been communicating with known Fancy Bear infrastructure due to the presence of an IP address that was well known to the infosec industry.

However, there’s a little problem with this assumption.

That particular IP address was detected as being part of Fancy Bear in 2015 and the IP address was suspended/unassigned on May 20, 2015 by CrookServers.


Not only was it pointless to include it operationally, retaining it unnecessarily would be an obvious operational security risk for attackers and would inherently make the malware more detectable and make it easy for people to tie it to Fancy Bear.

This would have been counterproductive and a needless risk being taken by Fancy Bear which begs the question – was it really Fancy Bear?


The IP address, according to those articles, was disabled in June 2015, eleven months before the DNC emails were acquired – meaning those IP addresses, in reality, had no involvement in the alleged hacking of the DNC.
www.thegatewaypundit.com/2017/12/plot-thickensnew-evidence-suggests-crowdstrike-may-planted-malware-dnc-servers/

h/t duFontaine.

Views:

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.