Devolution Part 11: Crowdstrike - By PatelPatriot
(patelpatriot.substack.com)
Comments (5)
sorted by:
Great article. I read through a number of the congressional testimonies surrounding the DNC hack. A question I have that I could never find an answer - in the summer of 2015, the FBI had evidence that the DNC servers were compromised. The FBI agent that contacted the DNC to alert them of this (I think it was Sep2015) was never identified, never interviewed nor was the evidence they had ever reviewed.
As to Crowdstrike, once they were installed in May of 2016 and they put their surveillance software in place on the DNC network, then they would have been able to detect the Seth Rich leak. That would mean Shawn Henry probably knows quite a bit about who killed Seth.
And so, once again, we see the intricate web woven....
Thanks for sharing!
I've been laying this out for friends all week. But holy shit is his write up well done.
This article is huge - should be stickied. Don't miss the discussion at the end about Crowdstrike involvement with election security! All these people saying "stay focused on Arizona" - this article presents likely organizational effort that lead to the Great Steal of 2020 :
"By now you see where I am going with this. Our federal government has contracted the Center for Internet Security (CIS) to provide cybersecurity for hundreds, if not thousands, of U.S. SLTT organizations. The CIS uses CrowdStrike to provide that cybersecurity.
The same CrowdStrike with ties to the Obama administration.
The same CrowdStrike who lied and covered up the DNC hack that was one of launching pads for the Trump-Russia narrative.
The same CrowdStrike which, I believe, fabricated the data behind the Alfa Bank story.
CrowdStrike’s cybersecurity product includes “a downloadable object-code component (‘Software Component’).” This means that any state or local government who used the CIS to provide cybersecurity, allowed CrowdStrike’s software to be downloaded directly into their machines and systems.
Maybe it’s just me, but I would think that if a bad actor (like China) wanted to hack our entire election system, gaining access to it through a few entities like Perkins Coie and CrowdStrike might be the perfect way to do it.
Despite a laundry list of conflicts of interest on behalf of both entities, our nation is being told, repeatedly, to simply ignore those conflicts and “trust” that nothing nefarious occurred in the 2020 election-- when CrowdStrike themselves had direct access to voting machines throughout the country."
Re Solarwinds hack:
"The hack that started sometime in March of 2020 but wasn’t discovered until December of 2020 allowed hackers access to Dominion Voting Systems and therefore also to CrowdStrike who had software on hundreds, if not thousands, of Dominion machines.
I’m not a huge fan of speculation so you’ll have to forgive me because I’m about to ask some speculative questions. What if the Solarwinds hack wasn’t a foreign adversary or some random hacking group? What if “the most sophisticated hack ever seen” was actually done by CYBERCOM and our military and this is how they caught the election theft? What if this is how they accquired information on CrowdStrike while looking into things…as far back as 2016?
As much as I can’t help but to speculate about what all of this might possibly mean, one doesn’t need to indulge in speculation to see a clear pattern telling us that something much larger—and more dangerous to the DS-- is at play here. The sheer length of the Durham investigation tells us definitively that although the media has tried to sweep these events under the rug, they have not gone away... quite the opposite, in fact.
These crimes are back in the spotlight. The political establishment may finally see some justice for what they have put Donald Trump through and for what they have put us through. Grab your popcorn folks."
Huuuuge!