Category Archives: DNC leaks

CrowdStrike, MIS Department, and the DNC

Hillary presidential campaign chairwoman Donna Brazile’s book Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House can be retold in one sentence:

The Russians have hacked the elections and poisoned my dog Chip.

Nevertheless, the book reveals some information concealed by Hillary and the DNC loyalists in FBI.

  • In August, seeing CrowdStrike’s helplessness, the DNC invited real cyber security people to form a competent network security team that the book calls the Hacker House, or HH. This contradicts the DNC official story that CrowdStrike was doing a fabulous job
  • HH found out that the DNC network was unprotected, and that anybody could have hacked into it 
  • HH informed DNC and Hillary’s campaign leadership of this fact and spent most of its time training DNC networking administrators
  • HH was asked, but refused to support allegations that the DNC network had been penetrated by “Russians.” HH also had run-ins with CrowdStrike.
  • The DNC, Hillary, and the Obama administration disregarded and suppressed this information. They continued their electoral campaign strategy: worsening relations with Russia, accusing Trump of collusion with Putin, and using the FBI, CIA, DHS, and ODNI to sabotage Trump’s campaign.  During the transition period, John Brennan and other Obama/Clinton loyalists used false allegations of the “Russian hacking” to attempt something like a coup d’état. The coup was not a complete failure – the angry Democrats have nearly wrestled control of the DOJ away from the elected president.

Continue reading CrowdStrike, MIS Department, and the DNC

A Review of the “Intelligence Community Assessment”

2018-10-03 update: I have just noticed that the declassified ICA text was published only a few hours before the joint session of Congress that certified Trump as the next president. James Clapper spent the previous day falsely alleging that the Assessment had been done by the U.S. Intelligence Community, pushed an exaggerated version of its conclusions, and leaked parts of it to the media. In his testimony before the Senate Armed Services Committee, Clapper made repeated assaults on the president-elect. When referring to Trump’s sober reaction to the alleged assessment, Clapper uttered the following: “I’ve received many expressions of concern from foreign counterparts of what has been interpreted as disparagement of the intelligence community.” The Assessment and even the published-the-next-day ICA text were still classified and hidden from the president-elect! Now that seems like a last ditch effort to prevent Trump’s inauguration. BTW, who were his ‘foreign counterparts’ and why was he so concerned about their opinions?

Attached is a review of the declassified version of the notorious Intelligence Community Assessment, published on 01/06/2017. The declassified ICA text (“the ICA text” or “the text”, referring to the public version of the alleged assessment) regurgitates the Democratic talking points and allegations that Putin ordered interference in the 2016 elections, including claims that the alleged interference was directed against electing Hillary and in favor of electing Trump as president. The latter statement was supported only by the FBI and CIA, not by the NSA. The ICA demonstrated an extreme partisan bias in favor of Hillary Clinton and the Democratic Party. The ICA text contains no declassified information. It repeats the same allegations over and over either without evidence, or with evidence refuting them. A quarter of the text is devoted to proving the obvious: that RT is controlled or directed by the Russian government.

Download

Continue reading A Review of the “Intelligence Community Assessment”

Voodoo Attributions in Cyber Security

The Official Attribution of Network Breaches is Based on Conspiracy Theories

The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.

APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security

What is the ‘Advanced Persistent Threat’?

APT [Advanced Persistent Threat] is a term to refer to Chinese espionage
without saying Chinese espionage. Full stop.
Scott J Roberts
, APT is a Who not a What …

The full quote:

“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1Anchor Panda, and Elderwood, as well as other private designations.

APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”

Continue reading What is the ‘Advanced Persistent Threat’?

Russian Bears with Donkey Ears

The “assessment” that the Russian government hacked the DNC and leaked its emails was wrong. It’s almost impossible to attribute a network breach to a sophisticated hackers group.

When #CrowdStrike and FireEye started making the fraudulent attribution on cyber security events, many other companies followed. The Obama regime has corrupted and dumbed down the DHS, DNI, and FBI. They bought this fraud, and then added some.

In 2016, Hillary and the DNC were deceived by CrowdStrike into believing that Russia was behind the leaks of their emails that shouldn’t have been written in the first place. Together with Obama they forced that deception on the FBI and intelligence. Then they blamed Russia for their election defeat!

Most successful network security breaches are conducted by criminal hackers, many of whom are based or originate from Russia and Eastern Europe. Most unsuccessful attempts are conducted by amateurs. Organizations should protect their networks, rather than blame nation states.

Read Jeffrey Carr, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort or Robert Graham, Dear Obama, From Infosec – both are (or were) anti-Trump.

All “Evidence” of “Russian Meddling” Came from the DNC

What a tangled web we weave …

Continues Origin of Operation “Crossfire Hurricane”

Update: Steele might have learnt what the DNC wanted him to write about Trump directly from the DNC, rather than indirectly through MSM. DOJ official Bruce Ohr reportedly communicated with Steele in the time when his wife Nellie Ohr worked for Fusion GPS that hired and worked with Steele.

The leaked “opposition research” (mostly smear) on Trump consisted of 230 pages. Only one short paragraph was devoted to allegations about Trump’s relations and attitudes towards Russia. Thus, neither the DNC nor Hillary campaign believed around May 2016 that there was even a small impropriety in Trump’s connections with Russia.  The opposition research file was apparently dated December 2015, but the DNC allowed it to leak between late April to early June of 2016 (likely on June 12-14), then advertised it in the WaPo article on June 14, 2016.

The liberal media attitude toward Putin changed from lukewarm to hostile almost overnight between July 16 and July 21, simultaneously with the creation and adoption of the Trump-Putin conspiracy theory as a major part of the Democratic Party line. Continue reading All “Evidence” of “Russian Meddling” Came from the DNC

CrowdStrike: Crooked, Shrill, Unashamed

Since the misattribution of a suspected breach into the DNC network in early 2016 to Russia, CrowdStrike has been boosted by:

  • DNC loyalists in the FBI, CIA, DHS, and DNI
  • the fawning coverage by mainstream media
  • NBC News employing Shawn Henry, a CrowdStrike top officer and former executive assistant to FBI Director Robert Mueller, as a cyber security consultant
  • $300M investments by Google and Silicon Valley VCs

Continue reading CrowdStrike: Crooked, Shrill, Unashamed

Why has FBI Accepted DNC’s “Russian Hacking” Claims?

The conservative media keeps tripping itself over lies invented by the left-stream media. I cannot blame it.  People know the left-stream media lies, but still read it and take in much of what is written there.  This time, conservatives fell for the fake news that Guccifer 2.0 (who took credit for release of the damning internal DNC documents) revealed as a GRU officer.

On or around March 21, 2018, The Daily Beast, a leftist tabloid on the lower end of the spectrum, published an “exclusive”: “‘Lone DNC Hacker’ Guccifer 2.0 Slipped Up and Revealed He Was a Russian Intelligence Officer.”  Continue reading Why has FBI Accepted DNC’s “Russian Hacking” Claims?