MISDepartment was aware of “APT28”

One of the key allegations in the Russian hoax is that the DNC has been hacked by a Russian government hacking groups, such as a “group” named Fancy Bear by Crowdstrike and APT28 by FireEye. I fell for this trick, and have been using notation like Fancy Bear / APT28. Fancy Bear and APT28 are the same only in one sense – they don’t exist as groups of people or organizations. If the names are used as names of malware families and/or intrusion scenarios (“what we call collectively APT28,” in the words of Guillaume Poupard, the head French cyber security agency ANSSI), they refer to different things, not necessarily well defined. Continue reading MISDepartment was aware of “APT28”

In American Thinker: The External Roots of Spygate

My article The External Roots of Spygate is published in the American Thinker.

On another topic – the putative “Russian government hacker group” Fancy Bear / APT 28 / GRU Military Units 26165 and/or 74455, according to the mythologies of CrowdStrike (CRWD) / FireEye (FEYE) / Robert Mueller & Angry Democrats (MAD), respectively. From Wired (August 2017):

Since as early as last fall, the Russian hacker group known as APT28, or Fancy Bear, has targeted victims … including its breach of the Democratic National Committee ahead of last year’s election. Last month, FireEye says those hackers, believed to be associated with the Russian military intelligence service GRU, have begun to use EternalBlue, the leaked NSA hacking tool

Anybody applying methodology of CrowdStrike and FireEye would identify “Fancy Bear / APT28” as an American government hacking group with much higher confidence than they have identified it as a Russian one. This is a contradiction, proving that their identification/attribution methodology is wrong.