Russian Hacking Hoax Tied To Ukrainian Atlantic Council
EXPOSED: UKRAINIAN ATLANTIC COUNCIL CONNECTION AND THE RUSSIAN HACKING HOAX
by Anonymous Patriots
In January 2017, after much hullabaloo from the Democrats about Russian hacking of the 2016 election, the Anonymous Patriots set out to get the record straight about who was hacking who. Using basic internet research, along with our ability to separate fake media narrative from actual truth, we posted a citizen intelligence report entitled:
In this article, we disclosed that Dmitri Alperovitch is the Russian DNC hacker. Yet to date, the corporate media remains silent on our report and intelligence agencies have not updated the lame report that they originally provided as evidence of Russian hacking (see PDF link below). While the Deep State operatives in the media and intelligence agencies continue to suppress vital intelligence that the American people need to make America great again, the American Intelligence Media has moved on to disclose more about Alperovitch and the Crowdstrike operations.
In the audio below we have provided an overview of additional information that gives a full understanding of the hacking narrative. After you listen to Thomas and John, you may want to deepen your own intelligence analysis by reviewing the supporting links that we have provided.
As you heard in the audio, Barack Obama’s favorite cyberwarlord was Dmitri Alperovitch, whose loyalty to the United States is certainly questionable. Is it odd to you that Alperovitch, known as the best criminal Russian hacker in the world, was at one time arrested by the FBI? If James Comey is the “D.C. Fixer” for the political elite, then Dimitri Alperovitch is the “Cyber-Fixer” for the Deep State. Whether it’s Russian, Korean, or Chinese “hacking” in American, it is always Dmitri who is the only expert the Deep State calls on to quickly examine the evidence and then hide or destroy it.
Also discussed at length in the audio above is connection between the Ukrainian Atlantic Council to the DNC, Clintons, NATO, Evelyn Farkas, George Soros, and the globalist gangsters. The anti-Russian propaganda of NATO’s Cold War machine (Atlantic Council) used Dmitri Alperovitch’s Crowdstrike to disrupt the U. S. Presidential election and Ukrainian/Russian relations. Additional resources to support the audio discussion are:
WHAT IS CROWDSTRIKE? FIRM HIRED BY DNC HAS TIES TO HILLARY CLINTON, A UKRAINIAN BILLIONAIRE AND GOOGLE
The official Director of National Intelligence Agency report on Russian hacking (meddling) in the U. S. presidential election is hyperlinked below – thirteen pages of a big “nothing burger” that does not have a single piece of evidence. This is an embarrassing waste of U.S. taxpayer dollars.
NOTE THAT THE ENTIRE “EVIDENCE” ON RUSSIAN HACKING OF THE DNC SERVER IS ONE PARAGRAPH CONTAINING ZERO EVIDENCE.
Background to “Assessing Russian Activities and Intentions
in Recent US Elections”: The Analytic Process and Cyber
Another fake intelligence report claims to describe how Dmitri Alperovitch’s Cozy Bear and Fancy Bear work in cyberspace. This report is another sad, expensive report that is nothing more than a disinformation piece produced and published by two U.S. intelligence agencies – the FBI and Department of Homeland Security – to propagandize Americans. What the report actually describes is well-known and freely available Ukrainian malware that is old and has nothing to do with Russia.
The report does not prove that Russia hacked the 2016 U.S. election, but it does reveal that the PHP malware sample that the government provided from the CrowdStrike report is:
- An old version of malware. The sample was version 3.1.0 and the current version is 3.1.7 with 4.1.1 beta also available.
- Freely available to anyone who wants it.
- The authors claim they are Ukrainian, not Russian.
- The malware is an administrative tool used by hackers to upload files, view files on a hacked website, download database contents and so on. It is used as one step in a series of steps that would occur during an attack.
Wordfence (cyber analysis company) analyzed the IP addresses available in the declassified report and demonstrated that they are in 61 countries, belong to over 380 organizations and many of those organizations are well known website hosting providers from where many attacks originate. There is nothing in the IP data that points to Russia specifically.
Furthermore, the report claims to contain technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence services to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.
IF YOU READ THIS REPORT, REMEMBER THAT IT IS PROPAGANDA, AND THE AUTHORS ASSUME THAT YOU KNOW NOTHING ABOUT ANYTHING AND COUNT ON YOU “BELIEVING” MULTIPLE U.S. INTELLIGENCE AGENCIES WHO REALLY WORK FOR THE DEEP STATE AND NOT THE AMERICAN PEOPLE.