{"id":9664,"date":"2020-03-22T14:43:49","date_gmt":"2020-03-22T18:43:49","guid":{"rendered":"http:\/\/stateofthenation.co\/?p=9664"},"modified":"2020-03-22T14:45:56","modified_gmt":"2020-03-22T18:45:56","slug":"crowdstrikes-inexplicable-confusion-about-11-key-points-proves-complicity-in-the-hack","status":"publish","type":"post","link":"https:\/\/stateofthenation.co\/?p=9664","title":{"rendered":"CrowdStrike&#8217;s Inexplicable Confusion About 11 Key Points Proves Complicity in the Hack"},"content":{"rendered":"<h2 class=\"entry-header\">WHY IS CROWDSTRIKE CONFUSED ON ELEVEN KEY DETAILS ABOUT THE DNC HACK?<\/h2>\n<p><!--more-->by Larry C Johnson<\/p>\n<div class=\"entry-content\">\n<div class=\"entry-body\">\n<p>Here is the bottom-line\u2014despite being hired in late April (or early May) of 2016 to stop an unauthorized intrusion into the DNC, CrowdStrike, the cyber firm hired by the DNC&#8217;s law firm to solve the problem, failed abysmally. More than 30,000 emails were taken from the DNC server between 22 and 25 May 2016 and given to Wikileaks. Crowdstrike blamed Russia for the intrusion but claimed that only two files were taken. And CrowdStrike inexplicably waited until 10 June 2016 to reboot the DNC network.<\/p>\n<p>CrowdStrike, a cyber-security company hired by a Perkins Coie lawyer retained by the DNC, provided the narrative to the American public of the alledged hack of the DNC, But the Crowdstrike explanation is inconsistent, contradictory and implausible. Despite glaring oddities in the CrowdStrike account of that event, CrowdStrike subsequently traded on its fame in the investigation of the so-called Russian hack of the DNC and became a publicly traded company. Was CrowdStrike\u2019s fame for \u201cdiscovering\u201d the alleged Russian hack of the DNC a critical factor in its subsequent launch as a publicly traded company?<\/p>\n<p>The Crowdstrike account of the hack is very flawed. There are 11 contradictions, inconsistencies or oddities in the public narrative about CrowdStrike\u2019s role in uncovering and allegedly mitigating a Russian intrusion (note&#8211;the underlying facts for these conclusions are found in\u00a0<a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;ved=2ahUKEwjmneHP6p_oAhXqV98KHQvTCOAQFjAAegQIBBAB&amp;url=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fnational-security%2Frussian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump%2F2016%2F06%2F14%2Fcf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html&amp;usg=AOvVaw3uI6IBOmONfYBvy5sjzH6T\">Ellen Nakashima&#8217;s Washington Post story<\/a>,\u00a0<a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;ved=2ahUKEwjIp93j6p_oAhWLdt8KHdW0DDUQFjABegQICRAB&amp;url=https%3A%2F%2Fwww.esquire.com%2Fnews-politics%2Fa49902%2Fthe-russian-emigre-leading-the-fight-to-protect-america%2F&amp;usg=AOvVaw3MqmL9cwE-4yUU_ujzKxY2\">Vicki Ward&#8217;s Esquire story<\/a>, the\u00a0<a href=\"https:\/\/www.justice.gov\/storage\/report.pdf\">Mueller Report<\/a>\u00a0and the\u00a0<a href=\"https:\/\/www.crowdstrike.com\/blog\/bears-midst-intrusion-democratic-national-committee\/\">blog of Crowdstrike<\/a> founder Dmitri Alperovitch):<\/p>\n<\/div>\n<div class=\"entry-more\">\n<ol>\n<li>Two different dates\u201430 April or 6 May\u2014are reported by Nakashima and Ward respectively as the date CrowdStrike was hired to investigate an intrusion into the DNC computer network.<\/li>\n<li>There are on the record contradictions about who hired Crowdstrike. Nakashima reports that the DNC called Michael Sussman of the law firm, Perkins Coie, who in turn contacted Crowdtrike\u2019s CEO Shawn Henry. Crowdstrike founder Dmitri Alperovitch tells Nakashima a different story, stating our \u201cIncident Response group, was called by the Democratic National Committee (DNC).<\/li>\n<li>CrowdStrike claims it discovered within 24 hours the \u201cRussians\u201d were responsible for the \u201cintrusion\u201d into the DNC network.<\/li>\n<li>CrowdStrike\u2019s installation of\u00a0<a href=\"https:\/\/www.crowdstrike.com\/endpoint-security-products\/crowdstrike-falcon-faq\/\">Falcon<\/a>\u00a0(its proprietary software to stop breaches) on the DNC on the 1st of May or the 6th of May would have alerted to intruders that they had been detected.<\/li>\n<li>CrowdStrike officials told the Washington Post\u2019s Ellen Nakashima that they were, \u201cnot sure how the hackers got in\u201d and didn\u2019t \u201chave hard evidence.\u201d<\/li>\n<li><a href=\"https:\/\/www.crowdstrike.com\/blog\/bears-midst-intrusion-democratic-national-committee\/\">In a blog posting<\/a>\u00a0by CrowdStrike\u2019s founder, Dmitri Alperovitch, on the same day that Nakashima\u2019s article was published in the Washington Post, wrote that the intrusion into the DNC was done by two separate Russian intelligence organizations using malware identified as Fancy Bear (APT28) and Cozy Bear (APT29).<\/li>\n<li>But, Alperovitch admits\u00a0<strong>his team found no evidence<\/strong>\u00a0the two Russian organizations were coordinating their \u201cattack\u201d or even knew of each other\u2019s presence on the DNC network.<\/li>\n<li>There is great confusion over what the \u201chackers\u201d obtained. DNC sources claim the hackers gained access to the entire database of opposition research on GOP presidential candidate Donald Trump. DNC sources and CrowdStrike claimed the intruders, \u201cread all email and chat traffic.\u201d Yet, DNC officials insisted, \u201cthat no financial, donor or personal information appears to have been accessed or taken.\u201d However, CrowdStrike states, \u201cThe hackers stole two files.\u201d<\/li>\n<li>Crowdstrike\u2019s Alperovitch, in his blog posting, does not specify whether it was Cozy Bear or Fancy Bear that took the files.<\/li>\n<li>Wikileaks published DNC emails in July 2016 that show the last message taken from the DNC was dated 25 May 2016. This was much more than \u201ctwo files.\u201d<\/li>\n<li>CrowdStrike, in complete disregard to basic security practice when confronted with an intrusion, waited five weeks to disconnect the DNC computers from the network and sanitize them.<\/li>\n<\/ol>\n<p>Let us start with the very contradictory public accounts attributed to Crowdstrke\u2019s founder, Dmitri Alperovitch. The 14 June 2016 story by Ellen Nakashima of the Washington Post and the October 2016 piece by Vicki Ward in Esquire magazine offer two different dates for the start of the investigation:<\/p>\n<p><strong>When did the DNC learn of the \u201cintrusion\u201d?<\/strong><\/p>\n<p>Ellen Nakashima claims it was the end of April:<\/p>\n<p>\u201cDNC leaders were\u00a0<strong>tipped to the hack in late April<\/strong>. Chief executive Amy Dacey got a call from her operations chief saying that their information technology team had noticed some unusual network activity. . . . That evening, she spoke with Michael Sussmann, a DNC lawyer who is a partner with Perkins Coie in Washington. Soon after, Sussmann, a former federal prosecutor who handled computer crime cases, called Henry, whom he has known for many years. Within 24 hours, CrowdStrike had installed software on the DNC\u2019s computers so that it could analyze data that could indicate who had gained access, when and how.<\/p>\n<p>Ward\u2019s timeline, citing Alperovitch, reports the alert came later, on 6 May 2016:<\/p>\n<p>At six o&#8217;clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. . . . late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon &#8220;lit up,&#8221; the email said, within ten seconds of being installed at the DNC: Russia was in the network.<\/p>\n<p>This is a significant and troubling discrepancy because it marks the point in time when CrowdStrike installed its Falcon software on the DNC server. It is one thing to confuse the 30th of April with the 1st of May. But Alperovitch gave two different reporters two different dates.<\/p>\n<p><strong>What did the \u201chackers\u201d take from the DNC?<\/strong><\/p>\n<p>Ellen Nakashima&#8217;s reporting is contradictory and wrong. Initially, she is told that the hackers got access to the entire Donald Trump database and that all emails and chats could be read. But then she is assured that only two files were taken. This was based on Crowdstrike&#8217;s CEO&#8217;s assurance, which was proven subsequently to be spectacularly wrong when Wikileaks published 35,813 DNC emails. How did Crowdstrike miss that critical detail? Here is Nakashima&#8217;s reporting:<\/p>\n<p>Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.<\/p>\n<p>The intruders so thoroughly compromised the DNC\u2019s system that they also were able to read all email and chat traffic, said DNC officials and the security experts. . . .<\/p>\n<p>The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.<\/p>\n<p>One group, which CrowdStrike had dubbed Cozy Bear, had gained access last summer (2015) and was monitoring the DNC\u2019s email and chat communications, Alperovitch said.<\/p>\n<p>The other, which the firm had named Fancy Bear, broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm.\u00a0<strong>The hackers stole two files,<\/strong>\u00a0Henry said. And they had access to the computers of the entire research staff \u2014 an average of about several dozen on any given day. . . .<\/p>\n<p>CrowdStrike is continuing the forensic investigation, said Sussmann, the DNC lawyer. \u201cBut at this time, it appears that no financial information or sensitive employee, donor or voter information was accessed by the Russian attackers,\u201d he said.<\/p>\n<p>The DNC emails that are posted on the Wikileaks website and the metadata shows that these emails were removed from the DNC server starting the late on the 22nd of May and continuing thru the 23rd of May. The last tranche occurred late in the morning (Washington, DC time) of the 25th of May 2016. Crowdstrike\u2019s CEO, Shawn Henry, insisted on the 14th of June 2016 that \u201cONLY TWO FILES\u201d had been taken. This is demonstrably not true. Besides the failure of Crowdstrike to detect the removal of more than 35,000 emails, there is another important and unanswered question\u2014why did Crowdstrike wait until the 10th of June 2016 to start disconnecting the DNC server when they allegedly knew on the 6th of May that the Russians had entered the DNC network?<\/p>\n<p><strong>Crowdstrike accused Russia of the DNC breach but lacked concrete proof.<\/strong><\/p>\n<p>Ellen Nakashima\u2019s report reveals that Crowdstrike relied exclusively on circumstantial evidence for its claim that the Russian Government hacked the DNC server. \u00a0According to Nakashima:<\/p>\n<p>CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with \u201cspearphishing\u201d emails. These are communications that appear legitimate \u2014 often made to look like they came from a colleague or someone trusted \u2014 but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. \u201c<strong>But we don\u2019t have hard evidence,<\/strong>\u201d Alperovitch said.<\/p>\n<p>There is a word in English for the phrases, &#8220;Not sure&#8221; and &#8220;No hard evidence\u201d&#8211;that word is, &#8220;assumption.&#8221; Assuming that the Russians did it is not the same as proving, based on evidence, that the Russians were culpable. But that is exactly what CrowdStrike did.<\/p>\n<p>The so-called &#8220;proof&#8221; of the Russian intrusions is the presence of Fancy Bear and Cozy Bear?<\/p>\n<p>At first glance,\u00a0<a href=\"https:\/\/www.crowdstrike.com\/blog\/bears-midst-intrusion-democratic-national-committee\/\">Dmitri Alperovitch\u2019s blog postin<\/a>g describing the Fancy Bear and Cozy Bear \u201cintrusions\u201d appears quite substantive. But cyber security professionals quickly identified a variety of shortcomings with the Alperovitch account. For example,\u00a0this malware is not unique nor proprietary to Russia. Other countries and hackers have access to APT28 and have used it.<\/p>\n<p>Skip Folden offers one of the best comprehensive analyses of the problems with the\u00a0<a href=\"http:\/\/g-2.space\/muellerreport\/\">Alperovitch explanation<\/a>:<\/p>\n<p><strong>No basis whatsoever<\/strong>:<\/p>\n<p>APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as \u2018proof\u2019 of Russia \u2018hacking\u2019 by Russian Intelligence agencies GRU and FSB respectively.<\/p>\n<p>There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.<\/p>\n<p>On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only \u201cmedium-level of confidence that Fancy Bear is GRU\u201d and \u201clow-level of confidence that Cozy Bear is FSB.\u201d These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) \/ 2].<\/p>\n<p><strong>Exclusivity<\/strong>:<\/p>\n<p>None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student &#8211; or prosecutor.<\/p>\n<p><strong>Using targets<\/strong>:<\/p>\n<p>Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, \u201cBoth groups have historically targeted &#8230;,\u201d is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.<\/p>\n<p><strong>Key Logger Consideration<\/strong>:<\/p>\n<p>On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates \/ times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.<\/p>\n<p>The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.<\/p>\n<p><strong>Foreign intelligence source<\/strong>:<\/p>\n<p>Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence \/ custody validity at Russian site.<\/p>\n<p>Stated simply, Dmitri Alperovitch&#8217;s conclusion that &#8220;the Russians did it&#8221; are not supported by the forensic evidence. Instead, he relies on the assumption that the presence of APT28 and APT29 prove Moscow&#8217;s covert hand. What is even more striking is that the FBI accepted this explanation without demanding forensic evidence.<\/p>\n<p>Former FBI Director James Comey and former NSA Director Mike Rogers testified under oath before Congress that neither agency ever received access to the DNC server. All information the FBI used in its investigation was supplied by CrowdStrike.\u00a0<a href=\"https:\/\/thehill.com\/policy\/national-security\/313555-comey-fbi-did-request-access-to-hacked-dnc-servers\">The Hill reported<\/a>:<\/p>\n<p>The FBI requested direct access to the Democratic National Committee\u2019s (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.<\/p>\n<p>The bureau made \u201cmultiple requests at different levels,\u201d according to Comey, but ultimately struck an agreement with the DNC that a \u201chighly respected private company\u201d would get access and share what it found with investigators.<\/p>\n<p>The foregoing facts raise major questions about the validity of the Crowdstrike methodology and conclusions with respect to what happened on the DNC network. This is not a conspiracy theory. It is a set of facts that, as of today, have no satisfactory explanation. The American public deserve answers.<\/p>\n<p>___<br \/>\n<a href=\"https:\/\/turcopolier.typepad.com\/sic_semper_tyrannis\/2020\/03\/why-is-crowdstrike-confused-on-eleven-key-details-about-the-dnc-hack-by-larry-c-johnson.html\">https:\/\/turcopolier.typepad.com\/sic_semper_tyrannis\/2020\/03\/why-is-crowdstrike-confused-on-eleven-key-details-about-the-dnc-hack-by-larry-c-johnson.html<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>WHY IS CROWDSTRIKE CONFUSED ON ELEVEN KEY DETAILS ABOUT THE DNC HACK?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9664","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation.co\/index.php?rest_route=\/wp\/v2\/posts\/9664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation.co\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation.co\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9664"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation.co\/index.php?rest_route=\/wp\/v2\/posts\/9664\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation.co\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}