Reply to thread

Just


Just a clip from wiki.


CrowdStrike helped investigate the Democratic National Committee cyber attacks and a connection to Russian intelligence services. On March 20, 2017, James Comey testified before congress stating, "CrowdStrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services."[44


Some more from Crowdstrike regarding their contract with the government.


CrowdStrikeBLOG





CrowdStrike’s work with the Democratic National Committee: Setting the record straight

June 5, 2020

 Editorial Team From The Front Lines

Intrusion into the Democratic National Committee

June 5, 2020 UPDATE

Blog update following the release of the testimony by Shawn Henry, CSO and President of CrowdStrike Services, before the House Intelligence Committee that was recently declassified.

What was CrowdStrike’s role in investigating the hack of the DNC?

CrowdStrike was contacted on April 30, 2016 to respond to a suspected breach. We began our work with the DNC on May 1, 2016, collecting intelligence and analyzing the breach. After conducting this analysis and identifying the adversaries on the network, on June 10, 2016 we initiated a coordinated remediation event to ensure the intruders were removed and could not regain access. That remediation process lasted approximately 2-3 days and was completed on June 13, 2016.

Why did the DNC contact CrowdStrike?

The DNC contacted CrowdStrike to respond to a suspected cyber attack impacting its network. The DNC was first alerted to the hack by the FBI in September 2015. According to testimony by DNC IT contractor Yared Tamene Wolde-Yohannes, the FBI attributed the breach to the Russian Government in September 2015 (page 7).

Why did the DNC hire CrowdStrike instead of just working with the FBI to investigate the hack?

The FBI doesn’t perform incident response or network remediation services when organizations need to get back to business after a breach.

CrowdStrike is a leader in protecting customers around the world from cyber threats. It is common for organizations to hire third-party industry experts, like CrowdStrike, to investigate and remediate cyber attacks when they suspect a breach even if they are collaborating with law enforcement.


Here again is a wiki bit about who they are.

You will note they have the expertise to investigate anything related to electronics etc, including voting machines. There's no logical reason for an already contractor to be ignored over the issue.


[URL unfurl="true"]https://en.m.wikipedia.org/wiki/Dominion_Voting_Systems[/URL]


I also note what your saying, at this point, is supported by nothing. You did say "someone said" . Always a reliable source.

Secondly, you are implying there was something corrupt going on and again no evidence.

I also remind you Crowdstrike, who were contract to the govt in 2011, did work for the GOP as far as I can tell.


I'll leave you to check that and read the relevant docos.


Here's spread release that's interesting.


[URL unfurl="true"]https://www.realclearinvestigations.com/articles/2020/05/13/hidden_over_2_years_dem_cyber-firms_sworn_testimony_it_had_no_proof_of_russian_hack_of_dnc_123596.html[/URL]


Back
Top