Whistling for another world 363

The first “whistleblower” mobilized by the tireless plotters again the President of the United States in their latest conspiracy, was faulted for not having first-hand knowledge of what he was snitching, and reproached for huddling with the lynch-mob Democrats in Congress round the cauldron in which his evil lies were brewed. So another one has been produced, nice and fresh, who, they say, has first-hand knowledge of the same alleged wrongdoing by the President, and has not been in the huddle. And if he is faulted for anything, another one will be found, and if necessary there will be another, and another.

The attorney “representing” – ie. recruiting – these snooping liars, set up an organization named Whistleblower Aid. It advertised for whistleblowers who could and would snitch on the Trump administration.

Jim Hayek writes about it at American Truth. We select parts of his article:

Mark Zaid, the activist attorney representing the so-called whistleblower at the center of the impeachment movement targeting President Donald Trump, says he is representing a second so-called whistleblower who spoke to the Intelligence Community’s inspector general about Trump’s phone call with the Ukrainian president. Missing from the avalanche of news media coverage about Zaid’s two anonymous clients rocking the nation’s capital is that at the beginning of Trump’s presidency Zaid co-founded Whistleblower Aid, a small nonprofit that blasted advertisements around D.C. actively seeking whistleblowers during the Trump administration.

Whistleblower Aid is heavily tied to far-left activist organizations and Democratic politics.

ABC News broke the story on Sunday about the existence of the second so-called whistleblower speaking about Trump’s call with Ukrainian President Volodymyr Zelensky.

The network reported :

Zaid tells ABC News’ Chief Anchor George Stephanopoulos that the second person — also described as an intelligence official — has first-hand knowledge of some of the allegations outlined in the original complaint and has been interviewed by the head of the intelligence community’s internal watchdog office, Michael Atkinson.

Zaid says both officials have full protection of the law intended to protect whistleblowers from being fired in retaliation. While this second official has spoken with the IG — the internal watchdog office created to handle complaints — this person has not communicated yet with the congressional committees conducting the investigation.

In a tweet on Sunday, Zaid confirmed his firm is representing another so-called whistleblower. This one “has firsthand knowledge”, he tweeted without elaborating.

In his twitter profile, Zaid describes himself as a “non-partisan” attorney “handling cases involving national security, security clearances, govt investigations, media, Freedom of Information Act, & whistleblowing”. Missing from his twitter profile and from much of the the news media coverage about Zaid’s role representing the so-called whistleblowers in the impeachment scandal is that he co-founded Whistleblower Aid. That detail is also not mentioned in Zaid’s bio on his attorney website.

The Whistleblower Aid activists against President Trump “did not sit around waiting for whistleblowers”. From its inception “it actively sought to attract the attention of Trump administration government employees”. That’s what it was for. It was not secretive about its function and aims. Its ads for snitchers appeared on Metro trains, on”mobile billboards that circled government offices for 10 hours a day“. It’s workforce “handed out whistles on street corners as a gimmick to gain attention”.

Zaid doubles as Executive Director and founder of the James Madison Project, which says it seeks to promote government accountability. The Project features on its four-person advisory board John Podesta, who led Hillary Clinton’s 2016 presidential campaign, served as Chief of Staff to Bill Clinton and founded the Soros-funded Center for American Progress

Zaid’s co-founder  of Whistleblower Aid is John Tye. “He himself is a whistleblower. He is a former State Department official who went public in 2014 about U.S. government electronic surveillance practices”.

Tye’s bio on Whistleblower Aid’s proudly proclaim that he has worked for far-left groups.

The bio reads:

Mr. Tye has worked at the Southern Poverty Law Center, Avaaz, and also Southeast Louisiana Legal Services … He was on the board of directors of the American Civil Liberties Union of Louisiana.

The Southern Poverty Law Center is known for its anti-conservative stance and controversially publishes a “hate map” listing groups that warn about radical Islam such as Jihad Watch, the Clarion Project, the Center for Security Policy

Tye’s other former employer, the American Civil Liberties Union (ACLU), is financed heavily by billionaire activist and Democratic Party mega-donor George Soros and is known for its hyper-partisan liberal activism. 

Avaaz, a radical group where Tye served as campaign and legal director, describes itself as a “global web movement to bring people-powered politics to decision-making everywhere.” The group has repeatedly engaged in anti-Israel activism.

Channeling the mantra of radical community organizer Saul Alinsky, Avaaz says it aims to “organize citizens of all nations to close the gap between the world we have and the world most people everywhere want.”

Amazingly, absurdly, these insurgent plotters and liars really believe that “people everywhere” want to live under Communism!

Avaaz was founded in 1997 by the Soros-funded, partisan MoveOn.org organization and by the Soros-funded Res Publica activist group. Tax forms from Soros’s Open Society document donations to Res Publica specifically earmarked for support to Avaaz. Res Publica oversees Avaaz activism.

Avaaz’s former general counsel and campaign director, Ian Bassin, in 2017 formed United to Protect Democracy. The latter is a grouping of former top lawyers for the Obama administration working to utilize legal advocacy methods to oppose Trump’s policies. [It] works in partnership with the Brennan Center for Justice, located at NYU School of Law. The Brennan Center is heavily financed by Soros’s Open Society Foundations and is the recipient of numerous Open Society grants.

(The Brennan Center for Justice is named after Supreme Curt Justice William Brennan – not John Brennan the Communist-voting probable Muslim, erstwhile head of the CIA, appointed by Obama.)

Also in the web of conspiring organizations is “CrowdStrike, the outside firm utilized to conclude that Russia hacked the Democratic National Committee’s servers since the DNC would not allow the U.S. government to inspect the servers”.

CrowdStrike founder Dmitri Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council.

The Atlantic Council is funded by and works in partnership with Burisma, the [UKRAINIAN] natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden.

Breitbart News reported that a staffer for Rep. Adam Schiff’s House Permanent Select Committee on Intelligence took a trip to Ukraine last month sponsored and organized by the Atlantic Council think tank. Schiff’s office denied any impropriety.

The Schiff staff member, Thomas Eager, is also currently a fellow at the Atlantic Council’s Eurasia Congressional Fellowship. Burisma in January 2017 signed a “cooperative agreement” with the Council to sponsor the organization’s Eurasia Center.

Besides Burisma funding, the Council is also financed by Google as well as Soros’s Open Society Foundations, the Rockefeller Brothers Fund, Inc. and the U.S. State Department.

Google Capital also led a $100 million funding drive that financed Crowdstrike directly.

Google, Soros’s Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower’s complaint alleging Trump was “using the power of his office to solicit interference from a foreign country” in the 2020 presidential race.

The charges in the July 22 report referenced in the so-called whistleblower’s document and released by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower’s own claims

One key section of the so-called whistleblower’s document claims that “multiple U.S. officials told me that Mr. Giuliani [Rudy Giuliani, President Trump’s lawyer] had reportedly privately reached out to a variety of other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the Security Service of Ukraine Ivan Bakanov”.

This was allegedly to follow up on Trump’s call with Ukrainian President Volodymyr Zelensky in order to discuss the “cases” mentioned in that call, according to the so-called whistleblower’s narrative. The complainer was clearly referencing Trump’s request for Ukraine to investigate the Biden corruption allegations.

Joe Biden, when he was vice-president, corruptly threatened to withhold billions in aid to Ukraine unless the Ukrainian government stopped an investigation into the corrupt company Burisma, which was paying enormous sums of money to his son Hunter Biden in order to get Joe Biden to do just that.

But the Bidens are allowed to be corrupt by the Democratic Party. All Democrats, and their media lackeys, are allowed to be corrupt.

Corruption is only bad when President Trump is accused of it. Accusations against President Trump do not have to be true. Any number of whistleblowers recruited by Whistleblower Aid will bring stories to the Democrats to make it seem that the President is corrupt. And the ghost of Saul Alinsky will applaud them.

The Russian hacking that never happened 192

The Nation weekly journal is generally on the side of the Others: the Democrats, the socialists, the statists, the Islam-promoters, the politically correct, the “social justice warriors”.

So if THEY say that there was no Russian hacking of the DNC during the 2016 election year and can prove it – which it seems they can and have – then the conspiracy to spin a “narrative” that presidential candidate Donald Trump plotted with “the Russians” to keep Hillary Clinton out of the White House, is over.

We quote the meaty parts of the article by Patrick Lawrence at The Nation:

It is now a year since the Democratic National Committee’s mail system was compromised — a year since events in the spring and early summer of 2016 were identified as remote hacks and, in short order, attributed to Russians acting in behalf of Donald Trump. A great edifice has been erected during this time. President Trump, members of his family, and numerous people around him stand accused of various corruptions and extensive collusion with Russians. Half a dozen simultaneous investigations proceed into these matters. Last week news broke that Special Counsel Robert Mueller had convened a grand jury, which issued its first subpoenas on August 3. Allegations of treason are common; prominent political figures and many media cultivate a case for impeachment.

The president’s ability to conduct foreign policy, notably but not only with regard to Russia, is now crippled. Forced into a corner and having no choice, Trump just signed legislation imposing severe new sanctions on Russia and European companies working with it on pipeline projects vital to Russia’s energy sector. Striking this close to the core of another nation’s economy is customarily considered an act of war, we must not forget. In retaliation, Moscow has announced that the United States must cut its embassy staff by roughly two-thirds. All sides agree that relations between the United States and Russia are now as fragile as they were during some of the Cold War’s worst moments. To suggest that military conflict between two nuclear powers inches ever closer can no longer be dismissed as hyperbole.

All this was set in motion when the DNC’s mail server was first violated in the spring of 2016 and by subsequent assertions that Russians were behind that “hack” and another such operation, also described as a Russian hack, on July 5. These are the foundation stones of the edifice just outlined. The evolution of public discourse in the year since is worthy of scholarly study: Possibilities became allegations, and these became probabilities. Then the probabilities turned into certainties, and these evolved into what are now taken to be established truths. By my reckoning, it required a few days to a few weeks to advance from each of these stages to the next. This was accomplished via the indefensibly corrupt manipulations of language repeated incessantly in our leading media.

Lost in a year that often appeared to veer into our peculiarly American kind of hysteria is the absence of any credible evidence of what happened last year and who was responsible for it. It is tiresome to note, but none has been made available. Instead, we are urged to accept the word of institutions and senior officials with long records of deception. These officials profess “high confidence” in their “assessment” as to what happened in the spring and summer of last year—this standing as their authoritative judgment. Few have noticed since these evasive terms first appeared that an assessment is an opinion, nothing more, and to express high confidence is an upside-down way of admitting the absence of certain knowledge. This is how officials avoid putting their names on the assertions we are so strongly urged to accept — as the record shows many of them have done.

We come now to a moment of great gravity.

There has been a long effort to counter the official narrative we now call “Russiagate”.  This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:

  • There was no hack of the Democratic National Committee’s system on July 5 last year — not by the Russians, not by anyone else. Hard science now demonstrates it was a leak — a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.
  • Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.

This article is based on an examination of the documents these forensic experts and intelligence analysts have produced, notably the key papers written over the past several weeks, as well as detailed interviews with many of those conducting investigations and now drawing conclusions from them. …

 

Qualified experts working independently of one another began to examine the DNC case immediately after the July 2016 events. Prominent among these is a group comprising former intelligence officers, almost all of whom previously occupied senior positions. Veteran Intelligence Professionals for Sanity (VIPS), founded in 2003, now has 30 members, including a few associates with backgrounds in national-security fields other than intelligence. The chief researchers active on the DNC case are four: William Binney, formerly the NSA’s technical director for world geopolitical and military analysis and designer of many agency programs now in use; Kirk Wiebe, formerly a senior analyst at the NSA’s SIGINT Automation Research Center; Edward Loomis, formerly technical director in the NSA’s Office of Signal Processing; and Ray McGovern, an intelligence analyst for nearly three decades and formerly chief of the CIA’s Soviet Foreign Policy Branch. Most of these men have decades of experience in matters concerning Russian intelligence and the related technologies. …

Until recently there was a serious hindrance to the VIPS’s work, and I have just suggested it. The group lacked access to positive data. It had no lump of cyber-material to place on its lab table and analyze, because no official agency had provided any. …

Based on the knowledge of former officials such as Binney, the group knew that (1) if there was a hack and (2) if Russia was responsible for it, the NSA would have to have evidence of both. Binney and others surmised that the agency and associated institutions were hiding the absence of evidence behind the claim that they had to maintain secrecy to protect NSA programs. … [but] “Everything that they say must remain classified is already well-known,” Binney said …

Research into the DNC case took a fateful turn in early July, when forensic investigators who had been working independently began to share findings and form loose collaborations wherein each could build on the work of others. In this a small, new website called www.disobedientmedia.com proved an important catalyst. Two independent researchers selected it, Snowden-like, as the medium through which to disclose their findings. One of these is known as Forensicator and the other as Adam Carter. On July 9, Adam Carter sent Elizabeth Vos, a co-founder of Disobedient Media, a paper by the Forensicator that split the DNC case open like a coconut.

By this time Binney and the other technical-side people at VIPS had begun working with a man named Skip Folden. Folden was an IT executive at IBM for 33 years, serving 25 years as the IT program manager in the United States. He has also consulted for Pentagon officials, the FBI, and the Justice Department. Folden is effectively the VIPS group’s liaison to Forensicator, Adam Carter, and other investigators, but neither Folden nor anyone else knows the identity of either Forensicator or Adam Carter. … Unanimously, however, all the analysts and forensics investigators interviewed for this column say Forensicator’s advanced expertise, evident in the work he has done, is unassailable. They hold a similarly high opinion of Adam Carter’s work.

Forensicator is working with the documents published by Guccifer 2.0, focusing for now on the July 5 intrusion into the DNC server. The contents of Guccifer’s files are known — they were published last September — and are not Forensicator’s concern. His work is with the metadata on those files. These data did not come to him via any clandestine means. Forensicator simply has access to them that others did not have. It is this access that prompts Kirk Wiebe and others to suggest that Forensicator may be someone with exceptional talent and training inside an agency such as the FBI. “Forensicator unlocked and then analyzed what had been the locked files Guccifer supposedly took from the DNC server,” Skip Folden explained in an interview. “To do this he would have to have ‘access privilege’, meaning a key.” …

Forensicator’s first decisive findings, made public in the paper dated July 9, concerned the volume of the supposedly hacked material and what is called the transfer rate — the time a remote hack would require. The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.

These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed. Compounding this contradiction, Guccifer claimed to have run his hack from Romania, which, for numerous reasons technically called delivery overheads, would slow down the speed of a hack even further from maximum achievable speeds.

What is the maximum achievable speed? Forensicator recently ran a test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second — half what the DNC operation would need were it a hack. Other investigators have built on this finding. Folden and Edward Loomis say a survey published August 3, 2016, by www.speedtest.net/reports is highly reliable and use it as their thumbnail index. It indicated that the highest average ISP speeds of first-half 2016 were achieved by Xfinity and Cox Communications. These speeds averaged 15.6 megabytes per second and 14.7 megabytes per second, respectively. Peak speeds at higher rates were recorded intermittently but still did not reach the required 22.7 megabytes per second.

“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer,” Folden said. “Based on the data we now have, what we’ve been calling a hack is impossible.” Last week Forensicator reported on a speed test he conducted more recently. It tightens the case considerably. “Transfer rates of 23 MB/s (Mega Bytes per second) are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance,” he wrote. “Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).”

Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern Daylight Time Zone at approximately 6:45 pm. This confirms that the person entering the DNC system was working somewhere on the East Coast of the United States. In theory the operation could have been conducted from Bangor or Miami or anywhere in between — but not Russia, Romania, or anywhere else outside the EDT zone. Combined with Forensicator’s findings on the transfer rate, the time stamps constitute more evidence that the download was conducted locally, since delivery overheads — conversion of data into packets, addressing, sequencing times, error checks, and the like — degrade all data transfers conducted via the Internet, more or less according to the distance involved.

In addition, there is the adulteration of the documents Guccifer 2.0 posted on June 15, when he made his first appearance. This came to light when researchers penetrated what Folden calls Guccifer’s top layer of metadata and analyzed what was in the layers beneath. They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting.“It’s clear,” another forensics investigator self-identified as HET, wrote in a report on this question, “that metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.

To be noted in this connection: The list of the CIA’s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to. (The tool can also “de-obfuscate” what it has obfuscated.) It is not known whether this tool was deployed in the Guccifer case, but it is there for such a use. …

VIPS has assembled a chronology that imposes a persuasive logic on the complex succession of events just reviewed. It is this:

  • On June 12 last year, Julian Assange announced that WikiLeaks had and would publish documents pertinent to Hillary Clinton’s presidential campaign.
  • On June 14, CrowdStrike, a cyber-security firm hired by the DNC, announced, without providing evidence, that it had found malware on DNC servers and had evidence that Russians were responsible for planting it.
  • On June 15, Guccifer 2.0 first appeared, took responsibility for the “hack” reported on June 14 and claimed to be a WikiLeaks source. It then posted the adulterated documents just described.
  • On July 5, Guccifer again claimed he had remotely hacked DNC servers, and the operation was instantly described as another intrusion attributable to Russia. Virtually no media questioned this account.

It does not require too much thought to read into this sequence. With his June 12 announcement, Assange effectively put the DNC on notice that it had a little time, probably not much, to act preemptively against the imminent publication of damaging documents. Did the DNC quickly conjure Guccifer from thin air to create a cyber-saboteur whose fingers point to Russia? There is no evidence of this one way or the other, but emphatically it is legitimate to pose the question in the context of the VIPS chronology. WikiLeaks began publishing on July 22. By that time, the case alleging Russian interference in the 2016 elections process was taking firm root. In short order Assange would be written down as a “Russian agent”.

By any balanced reckoning, the official case purporting to assign a systematic hacking effort to Russia, the events of mid-June and July 5 last year being the foundation of this case, is shabby to the point taxpayers should ask for their money back. The Intelligence Community Assessment [ICA], the supposedly definitive report featuring the “high confidence” dodge, was greeted as farcically flimsy when issued January 6. Ray McGovern calls it a disgrace to the intelligence profession. It is spotlessly free of evidence, front to back, pertaining to any events in which Russia is implicated. James Clapper, the former director of national intelligence, admitted in May that “hand-picked” analysts from three agencies (not the 17 previously reported) drafted the ICA. There is a way to understand “hand-picked” that is less obvious than meets the eye: The report was sequestered from rigorous agency-wide reviews. This is the way these people have spoken to us for the past year.

Behind the ICA lie other indefensible realities. The FBI has never examined the DNC’s computer servers — an omission that is beyond preposterous. It has instead relied on the reports produced by Crowdstrike, a firm that drips with conflicting interests well beyond the fact that it is in the DNC’s employ. Dmitri Alperovitch, its co-founder and chief technology officer, is on the record as vigorously anti-Russian. He is a senior fellow at the Atlantic Council, which suffers the same prejudice. Problems such as this are many.

In effect, the new forensic evidence considered here lands in a vacuum. We now enter a period when an official reply should be forthcoming. What the forensic people are now producing constitutes evidence, however one may view it, and it is the first scientifically derived evidence we have into any of the events in which Russia has been implicated. … The cost of duplicity has rarely been so high.

How has the Democratic Part reacted to the revelation, in a usually supportive magazine, that they have been proved to have lied?

Flat denial, and accusation that the revelation is itself  a “conspiracy  theory”:

[The Nation’s] Editor’s note: After publication, the Democratic National Committee contacted The Nation with a response, writing, “U.S. intelligence agencies have concluded the Russian government hacked the DNC in an attempt to interfere in the election. Any suggestion otherwise is false and is just another conspiracy theory like those pushed by Trump and his administration. It’s unfortunate that The Nation has decided to join the conspiracy theorists to push this narrative.” 

We await with keen interest – animated we confess by more than a little Schadenfreude – the reaction of: the Mainstream Media, Hillary Clinton, Chuck Schumer, Nancy Pelosi, Maxine Waters, Robert Mueller, James Comey, Julian Assange, Guccifer 2.o, Vladimir Putin, Uncle Tom Cobley and all.

George Soros and the “Russian” hackers 7

About that fake “Trump in league with the Russians” story put out by the Democrats to illegitimize this presidency: it seems the Democrats commissioned a crooked cyber company to impersonate Russian hackers.

And what is more, that crooked cyber company has links to none other than the earthly satan, George Soros.

William Craddick writes at Disobedient Media:

The cyber firm Crowdstrike has been one of the main proponents of allegations that Russia interfered in the 2016 American presidential elections using their cyber capabilities. The analysis performed by Crowdstrike was relied on almost exclusively by the Democratic National Committee (DNC) to establish their claims of “Russian hacking”. 

It has subsequently been revealed that Crowdstrike has in the past both misrepresented data in an attempt to frame the Russian governmentfor cyber attacks and also failed to account for known capabilities of third parties which enable them to impersonate Russian hackers.

The founder of Crowdstrike is also tied to the Atlantic Council, a think tank supported by George Soros which has been accused of accepting funds in exchange for support of favored policy positions as well as promoting disinformation and propaganda attacks against anti-establishment figures.

On June 14, 2016, Crowdstrike published a study commissioned by the DNC, in which they accused the Russian government of breaching the DNC’s computer systems. The DNC’s choice to rely on Crowdstrike exclusively was incredibly controversial. CNN reported that the DNC actually refused to grant the FBI access to their servers despite the agency’s explicitly stating that they could conduct a satisfactory investigation if they were forced to rely on third party data. The report by Crowdstrike stood as one of the first definitive authorities which [claimed to have] found evidence of Russian cyber infiltration or electronic meddling in the 2016 elections. Rather than confirm the notion that Russia interfered in American elections, a number of other developments since Crowdstrike’s report have cast increasing doubt on their claims and in fact have suggested that they may be part of a widespread attempt to push disinformation for financial gain and benefit to the groups clients and affiliates.

Alarming indicators that Crowdstrike may have been promoting the idea of “Russian hacking” out of ulterior motives began to emerge almost immediately after their report was released. On July 28th, 2016, The Washington Post reported that Crowdstrike was one of a number of cyber security firms making a large profit thanks to widespread fears about Russian hackers. …

Crowdstrike’s analysis also ignored known capabilities, since publicized by Wikileaks in their Day Zero and Marble releases from the Vault 7 series, … that allow programmers to mask the identity of their malware and masquerade it as belonging to foreign intelligence agencies and mimic their online attack methods. They have also shown that many programmers have the ability to create an appearance of  “false attribution” which gives the impression that the malware was created by another country, even mimicking the native language of the host country they intend to attribute the attack to.

On December 22nd, 2016, Crowdstrike ran another report, alleging that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s civil war with Russian-backed separatists. The report was intended to buttress its claims of Russian hacking in the presidential election. The report was immediately contested by Yaroslav Sherstyuk, maker of the Ukrainian military app in question, who called the company’s report “delusional”.

On March 23rd, 2017, Voice of America(VOA) ran a damning piece, citing British think tank the International Institute for Strategic Studies (IISS) which stated that CrowdStrike erroneously used IISS data as proof of the intrusion. Furthermore, the IISS disavowed any connection to the CrowdStrike report. The Ukrainian Ministry of Defense also claimed that the combat losses and hacking never happened, meaning that Crowdstrike had apparently fabricated facts and details in the report completely.

Crowdstrike told VOA that they stood by their findings. But the next day VOA noted that Crowdstrike had altered their report, deleting key assertions they had made in the report about Ukrainian army losses, claims that a malware infection contributed to artillery losses and a link to IISS data which they had cited. The humiliating redactions apparently came after Crowdstrike had spoken with an IISS research associate for defense and military analysis.

The apparent misrepresentation of data which had been intended to support Crowdstrike’s claims of Russian hacking creates serious questions about the merits of their claims that Russia was behind alleged hacks of the DNC’s computer systems earlier that year.

Further investigation has revealed that Crowdstrike has deep ties to a think tank which has a history of pay-to-play practices and a track record of seeking to foment confrontation between the United States and Russia.

Crowdstrike founder Dmitri Alperovitch acts as a Senior Fellow for the Atlantic Council. In February, Disobedient Media reported that the Atlantic Council has a troubling history of taking money from foreign special interest groups and government agencies in return for pushing propaganda to support various initiatives around the globe. …

In May 2016, a report by the Associated Press identified the Atlantic Council as one of a number of think tanks which had received funding from the Ploughshares Fund, which was a major player in efforts to sell the Iranian nuclear deal to the American public. The Ploughshares Fund is financed by George Soros’ Open Society Foundation. …

The organization has also promoted unsourced and unfounded claims that Russia was responsible for “hacking” the 2016 U.S. presidential elections despite the fact that this conspiracy theory has been resoundingly debunked by various authorities in the intelligence community and by multiple media sources. The Atlantic Council, unfazed by the evidence that their claims of hacking were false, have continued to promote these falsehoods in the aftermath of the election in what appeared to be a possible effort to undermine American democratic institutions.

The tight relationship between Crowdstrike and a think tank which also has a long track record of promoting unproven claims about Russian hacking, their failure to account for false attribution techniques commonly used by programmers to frame other countries for hacking attacks and their history of making factually untrue and misleading claims about Russian hacking creates concerns about their ability to objectively report on whether or not the DNC’s servers were breached by a foreign actor during the 2016 elections.

Their association with the DNC comes at a time when the party has been attempting to craft a narrative of alleged Russian hacking to support their election bids in the upcoming 2018 U.S. midterm elections and delegitimize the victories of their political opponents in 2016.

The Atlantic Council’s past relationship with George Soros is also problematic given that Soros has deep financial ties to groups organizing resistance movements as part of an attempt to enact regime change in the United States.

As former CIA Director Michael Morell, James Clapper and the Office of the Director of National Intelligence have all clearly stated that there is not, nor has ever been any evidence that Russian hacking affected any election results in the 2016 U.S. Presidential Elections, the efforts of Crowdstrike to promote claims to the contrary raises serious questions about their research as well as the intentions of the DNC in preventing neutral federal regulatory agencies from examining their servers firsthand to verify the claims.

So the Democrats paid a gang of known cyber crooks, with a chief who has a history of being paid by George Soros, to fake “evidence” that Russia hacked the 2016 elections in order to help Donald Trump win the presidency.

Such is the murky depth to which the Democrats – and their toady media which spread the fake claims – have sunk.