Crowdstrike

January 14, 2020 – Adam Schiff transmits newly “coordinated” evidence to Jerry Nadler to be included in the impeachment articles

“Yesterday’s ridiculous, albeit proactive, New York Times narrative about Russians hacking Burisma now makes sense.  Today the Lawfare team (Mary McCord et al) within Adam Schiff’s impeachment crew sends additional files of evidence (pdf below) to be included in the impeachment articles constructed by HJC Chairman Jerry Nadler.

It is all coordinated. The “new evidence” relates to information turned over by Lev Parnas, an SDNY indicted former associate of Trump’s personal attorney Rudy Giuliani.  The Lawfare purpose is to bolster their premise that President Trump was trying to force Ukraine President Volodymyr Zelensky to investigate Joe Biden’s corrupt activity around the Ukrainian company Burisma.

The Lawfare crew behind Schiff waited until the last minute to push the new “evidence” because they didn’t want republicans to deconstruct it during the impeachment evidence-gathering phase. Additionally, the Lawfare crew anticipates a Trump impeachment defense surrounding actual evidence of the Biden corruption, which makes the Trump request to Zelensky valid.

So the proactive democrat strategy was/is to use the New York Times presentation of Russia hacking Burisma to negate the provenance of the evidence against the Bidens.  In essence, to cast doubt upon any documents that would show Joe and Hunter Biden participating in an actual influence and money-laundering scheme.

The SDNY created legal leverage upon Lev Parnas using the familiar strategy of charging “FARA violations”, as noted in the background of the House explanation.

The purpose was/is to extract anything from Parnas that could be twisted or construed to show evidence that Rudy Giuliani was working on behalf of President Trump to pressure Ukraine into investigating Burisma, Joe Biden and Hunter Biden.

To counter any evidence that would highlight the truth that Hunter and Joe Biden were indeed participating in a pay-to-play influence and money laundering scheme for personal financial benefit, the same democrat operatives created a 2020 Russian ‘hacking claim’ using former Crowdstrike employee Blake Darché and his colleague Oren Falkowitz.

NYT – […] The hackers fooled some of them into handing over their login credentials, and managed to get inside one of Burisma’s servers, Area 1 said.

“The attacks were successful,” said Oren Falkowitz, a co-founder of Area 1, who previously served at the National Security Agency. Mr. Falkowitz’s firm maintains a network of sensors on web servers around the globe — many known to be used by state-sponsored hackers — which gives the firm a front-row seat to phishing attacks, and allows them to block attacks on their customers. (link)

Blake Darche’ and Oren Falkowitz formed a new cyber-security company named “Area-1 Security”.  It is an analysis from this group that the New York Times uses to push the Russian hacking of Burisma narrative.  It’s all the same players, just switching around the subject.

  • The 2016 Lawfare group is now 2020’s Just Security;
  • the 2016 CrowdStrike group is now 2020’s Area-1 Security;
  • and the 2016 Russia DNC hack is now the 2020 Russia Burisma hack… 

It’s the same players, the same story, the same approach.

Go deep on Oleg Falkowitz and Oren Falkowitz HERE

In February 2008, Oleg Falkowitz was hired as the Iran Mission Manager and Special Assistant For Policy and Cybersecurity at the Office of the Director of National Intelligence.

In February 2009, Oleg Falkowitz left his position at the Office of the Director of National Intelligence.

In August 2010, Oleg Falkowitz was hired as Director of Technology and Data Science Program (J2 — Intelligence) at the United States Cyber Command.

In July 2012, Oleg Falkowitz left his position at both the United States Cyber Command and the National Security Agency.

The same month, Oren Falkowitz co-founded the organisation sqrrl and became the Chief Executive Officer.

In January 2013, Falkowitz left his position at sqrrl.

In November 2013, Oren Falkowitz, Blake Darché and Phil Syme founded the organisation Area 1 Security.

Blake Darché published the article “Once a Target, Always a Target” in Medium, which was about “Cozy Bear”.

Between July 17–19, 2017, Oren Falkowitz, John Brennan, Andrea Mitchell and David Sanger attended the Fortune Brainstorm Tech Conference in Aspen, CO.

LINK to Background


(Conservative Treehouse, 1/14/2020)  (Archive)

January 10, 2020 – A whistleblower comes forward and tells Sharyl Attkisson that Rod Rosenstein and former FBI now Crowdstrike’s Shawn Henry spied on her and planted spyware on her computer systems

Rod Rosenstein (l) Sharyl Attkisson (c) and Shawn Henry (Credit: public domain)

“A very interesting development in the ongoing effort of former CBS investigative journalist, Sharyl Attkisson, to resolve the issue of who spied on her, planted spyware and infiltrated her computer systems for illegal surveillance.  [Attkisson website here]

According to a recent court filing [Source Here] a person who was engaged in the “wrongful activity” has come forward to provide Ms. Attkisson with details about the operation.  As a result of those whistle-blower revelations Attkisson is able to name specific individuals who were running the operation:

Former DOJ Deputy AG Rod Rosenstein is named as the person who was in charge of the operation; and the former head of the FBI DC field office, Shawn Henry is also outlined.

Mr. Henry is the head of Crowdstrike, a contractor for the government and a politically connected data security and forensic company.  Those who have followed the aspects related to the FBI use of the NSA database to illegally monitor U.S. persons; and those who followed the DNC cover story of Russia “hacking”; will be familiar with Crowdstrike.

According to the updated lawsuit (full pdf below) Rod Rosenstein, as the U.S. Attorney for Maryland, was in charge of the Obama 2011 and 2012 operation to monitor journalists specific to Ms. Attkissons reporting on Fast-n-Furious and Benghazi.

What I find additionally interesting is the overall timeline in the bigger picture.

In the April 2017 release from FISC Judge Rosemary Collyer outlining the abuses of the FISA-702 process by FBI “contractors”, where the NSA database was being used for unlawful surveillance of U.S. persons, Collyer specifically noted the findings of her review of the period from November ’16 to May ’17 (85% non compliant rate) was likely to have been happening since 2012. [Go Deep]

The “IRS Scandal” where the DOJ was creating a list of U.S. persons for political targeting, and requested CD ROM’s of tax filings, was the lead-up to the 2012 exploitation of the NSA database. [The Secret Research Project] So there’s a larger picture of government surveillance under the Obama administration that becomes more clear.

Political spying 1.0 was actually the weaponization of the IRS. This is where the term “Secret Research Project” originated as a description from the Obama team. It involved the U.S. Department of Justice under Eric Holder and the FBI under Robert Mueller. It never made sense why Eric Holder requested over 1 million tax records via CD ROM, until overlaying the timeline of the FISA abuse:

The IRS sent the FBI “21 disks constituting a 1.1 million page database of information from 501(c)(4) tax exempt organizations, to the Federal Bureau of Investigation.” The transaction occurred in October 2010 (link)

Why disks? Why send a stack of DISKS to the DOJ and FBI when there’s a pre-existing financial crimes unit within the IRS. All of the evidence within this sketchy operation came directly to the surface in early spring 2012.

This is the same time-frame when DNI James Clapper falsely denied to congress about the U.S. government -through the NSA- collecting metadata on all U.S. electronic communication.  This is the same time-frame where CIA Director John Brennan was monitoring the computer networks of congressional intelligence oversight staff.

When you overlay the new information from the Attkisson lawsuit, what emerges is the picture of an intentional effort by the Obama administration to weaponize the ability to collect electronic information on domestic political opposition.  It’s one long continuum.” (Read more: The Conservative Treehouse, 1/10/2020)  (Archive)

July 23, 2019 – The DNC and CrowdStrike refuse to provide records about alleged Russian email hack

(Graphic credit: The Rebel Media)

“Last night, attorneys for the Democratic National Committee and CrowdStrike formally objected to subpoenas from Ed Butowsky, refusing to provide any records about whether DNC emails were leaked internally or hacked by Russians. The FBI also missed a deadline yesterday for providing records about Seth Rich.

Surprise, surprise. Three years after the purported Russian attack on DNC servers, and nobody outside the DNC or its contractors has seen those servers. Why not?

Frankly, I expected the DNC and CrowdStrike to balk, and I’ll be filing motions to compel in the next few weeks.

You will recall that Roger Stone forced federal prosecutors to admit in late May that neither the FBI nor Special Counsel Robert Mueller had investigated the DNC servers that allegedly were hacked by Russians. Instead, Mueller and the FBI relied exclusively on a redacted report from CrowdStrike.

To my knowledge, the U.S. Department of Justice had never before handed off a computer crime investigation to a third-party contractor hired by the alleged victim. Instead, the FBI (or some other law enforcement agency) had always investigated those crimes. Obviously, the DNC doesn’t want any independent investigation of its claims that Russian hackers — as opposed to a DNC employee like Seth Rich — were responsible for transferring DNC emails to Wikileaks.” (Read more: LawFlog, 7/23/2019)

July 2, 2019 – Subpoenas issued for FBI, Crowdstrike, and DNC records on “Russian hacking” and Seth Rich

Two years ago, Texas attorney, Ty Clevenger, appeared on Tucker Carlson’s show:

Ty Clevenger: Originally I thought there was some Obama holdover in the FBI that was trying to cover this up. But as you know last week Senator Graham and Senator Grassley released a letter indicating that the former FBI Director James Comey had already decided to exonerate Mrs. Clinton before she was even interviewed. And so at this point, I believe the FBI is trying to cover its own rear-end. I think they know this thing is going to look terrible for them. They deep-sixed this. They white-washed it. And they don’t want the documents coming out showing how badly they covered it up…

On July 2, 2019, “Ty Clevenger filed a series of subpoenas in the lawsuit filed against Matt Couch, and America First Media.

Per Attorney Ty Clevenger:

This afternoon I issued subpoenas to the FBI, CrowdStrike, and the Democratic National Committee for their records on murdered DNC employee Seth Rich. The subpoenas further demand all evidence that Russian hackers were responsible for obtaining DNC emails in 2016 that were later published by Wikileaks.

Two weeks ago, attorneys representing Roger Stone forced prosecutors to admit that Special Counsel Robert Mueller and Obama-era intelligence officials never examined the DNC servers that purportedly were hacked by the Russians. Instead, Mueller and Obama officials relied on redacted draft reports prepared by CrowdStrike, Inc., a private company hired by the law firm Perkins Coie, the same law firm that hired Fusion GPS and Christopher Steele.

(…) You can read the FBI subpoena by clicking here, the CrowdStrike subpoena by clicking here, and the DNC subpoena by clicking here. The case is Edward Butowsky v. Michael Gottlieb, et al., Case No. 4:19-cv-00180 (E.D.Tex.). (Read more: The DCPatriot, 7/02/2019)

May 31, 2019 – The DOJ admits the FBI has never seen an unredacted version of the Crowdstrike report on the DNC Russian hacking claim

“The foundation for the Russian election interference narrative is built on the claim of Russians hacking the servers of the Democrat National Committee (DNC), and subsequently releasing damaging emails that showed the DNC worked to help Hillary Clinton and eliminate Bernie Sanders.

Despite the Russian ‘hacking’ claim the DOJ previously admitted the DNC would not let FBI investigators review the DNC server.  Instead the DNC provided the FBI with analysis of a technical review done through a cyber-security contract with Crowdstrike.

The narrative around the DNC hack claim was always sketchy; many people believe the DNC email data was downloaded onto a flash drive and leaked.  In a court filing (full pdf below) the scale of sketchy has increased exponentially.

Suspecting they could prove the Russian hacking claim was false, lawyers representing Roger Stone requested the full Crowdstrike report on the DNC hack.  When the DOJ responded to the Stone motion they made a rather significant admission.  Not only did the FBI not review the DNC server, the FBI/DOJ never even saw the Crowdstrike report.

Yes, that is correct.  The FBI and DOJ were only allowed to see a “draft” report prepared by Crowdstrike, and that report was redacted… and that redacted draft is the “last version of the report produced”; meaning, there are no unredacted & final versions.

Whiskey-Tango-Foxtrot!

This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party….. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor.

The entire apparatus of the U.S. government just took their word for it…

…and used the claim therein as an official position…

…which led to a subsequent government claim, in court, of absolute certainty that Russia hacked the DNC.

Think about that for a few minutes.

The full intelligence apparatus of the United States government is relying on a report they have never even been allowed to see or confirm; that was created by a paid contractor for a political victim that would not allow the FBI to investigate their claim.

The DNC server issue is foundation, and cornerstone, of the U.S. government’s position on “Russia hacking” and the election interference narrative; and that narrative is based on zero factual evidence to affirm the U.S. government’s position.” (Read more: Conservative Treehouse, 6/15/2019)

April 18, 2019 – Mueller’s own report undercuts its core Russia-meddling claims

(Credit: Carlo Allegri/Reuters)

“While the 448-page Mueller report found no conspiracy between Donald Trump’s campaign and Russia, it offered voluminous details to support the sweeping conclusion that the Kremlin worked to secure Trump’s victory. The report claims that the interference operation occurred “principally” on two fronts: Russian military intelligence officers hacked and leaked embarrassing Democratic Party documents, and a government-linked troll farm orchestrated a sophisticated and far-reaching social media campaign that denigrated Hillary Clinton and promoted Trump.

But a close examination of the report shows that none of those headline assertions are supported by the report’s evidence or other publicly available sources. They are further undercut by investigative shortcomings and the conflicts of interest of key players involved:

  • The report uses qualified and vague language to describe key events, indicating that Mueller and his investigators do not actually know for certain whether Russian intelligence officers stole Democratic Party emails, or how those emails were transferred to WikiLeaks.
  • The report’s timeline of events appears to defy logic. According to its narrative, WikiLeaks founder Julian Assange announced the publication of Democratic Party emails not only before he received the documents but before he even communicated with the source that provided them.
  • There is strong reason to doubt Mueller’s suggestion that an alleged Russian cutout called Guccifer 2.0 supplied the stolen emails to Assange.
  • Mueller’s decision not to interview Assange – a central figure who claims Russia was not behind the hack – suggests an unwillingness to explore avenues of evidence on fundamental questions.
  • U.S. intelligence officials cannot make definitive conclusions about the hacking of the Democratic National Committee computer servers because they did not analyze those servers themselves. Instead, they relied on the forensics of CrowdStrike, a private contractor for the DNC that was not a neutral party, much as “Russian dossier” compiler Christopher Steele, also a DNC contractor, was not a neutral party. This puts two Democrat-hired contractors squarely behind underlying allegations in the affair – a key circumstance that Mueller ignores.
  • Further, the government allowed CrowdStrike and the Democratic Party’s legal counsel to submit redacted records, meaning CrowdStrike and not the government decided what could be revealed or not regarding evidence of hacking.
  • Mueller’s report conspicuously does not allege that the Russian government carried out the social media campaign. Instead it blames, as Mueller said in his closing remarks, “a private Russian entity” known as the Internet Research Agency (IRA).
  • Mueller also falls far short of proving that the Russian social campaign was sophisticated, or even more than minimally related to the 2016 election. As with the collusion and Russian hacking allegations, Democratic officials had a central and overlooked hand in generating the alarm about Russian social media activity.
  • John Brennan, then director of the CIA, played a seminal and overlooked role in all facets of what became Mueller’s investigation: the suspicions that triggered the initial collusion probe; the allegations of Russian interference; and the intelligence assessment that purported to validate the interference allegations that Brennan himself helped generate. Yet Brennan has since revealed himself to be, like CrowdStrike and Steele, hardly a neutral party — in fact a partisan with a deep animus toward Trump.

Uncertainty Over Who Stole the Emails

The Mueller report’s narrative of Russian hacking and leaking was initially laid out in a July 2018 indictment of 12 Russian intelligence officers and is detailed further in the report.  According to Mueller, operatives at Russia’s main intelligence agency, the GRU, broke into Clinton campaign Chairman John Podesta’s emails in March 2016. The hackers infiltrated Podesta’s account with a common tactic called spear-phishing, duping him with a phony security alert that led him to enter his password. The GRU then used stolen Democratic Party credentials to hack into the DNC and Democratic Congressional Campaign Committee (DCCC) servers beginning in April 2016. Beginning in June 2016, the report claims, the GRU created two online personas, “DCLeaks” and “Guccifer 2.0,” to begin releasing the stolen material. After making contact later that month, Guccifer 2.0 apparently transferred the DNC emails to the whistleblowing, anti-secrecy publisher WikiLeaks, which released the first batch on July 22 ahead of the Democratic National Convention.

The report presents this narrative with remarkable specificity: It describes in detail how GRU officers installed malware, leased U.S.-based computers, and used cryptocurrencies to carry out their hacking operation. The intelligence that caught the GRU hackers is portrayed as so invasive and precise that it even captured the keystrokes of individual Russian officers, including their use of search engines.

In fact, the report contains crucial gaps in the evidence that might support that authoritative account. Here is how it describes the core crime under investigation, the alleged GRU theft of DNC emails:

Between approximately May 25, 2016 and June 1, 2016, GRU officers accessed the DNC’s mail server from a GRU-controlled computer leased inside the United States. During these connections, Unit 26165 officers appear to have stolen thousands of emails and attachments, which were later released by WikiLeaks in July 2016. [Italics added for emphasis.]

Mueller Report, March 2019, p. 41.

The report’s use of that one word, “appear,” undercuts its suggestions that Mueller possesses convincing evidence that GRU officers stole “thousands of emails and attachments” from DNC servers. It is a departure from the language used in his July 2018 indictment, which contained no such qualifier:

Netyksho/GRU Indictment, July 2018, p. 11.

“It’s certainly curious as to why this discrepancy exists between the language of Mueller’s indictment and the extra wiggle room inserted into his report a year later,” says former FBI Special Agent Coleen Rowley. “It may be an example of this and other existing gaps that are inherent with the use of circumstantial information.  With Mueller’s exercise of quite unprecedented (but politically expedient) extraterritorial jurisdiction to indict foreign intelligence operatives who were never expected to contest his conclusory assertions in court, he didn’t have to worry about precision. I would guess, however, that even though NSA may be able to track some hacking operations, it would be inherently difficult, if not impossible, to connect specific individuals to the computer transfer operations in question.”

The report also concedes that Mueller’s team did not determine another critical component of the crime it alleges: how the stolen Democratic material was transferred to WikiLeaks. The July 2018 indictment of GRU officers suggested – without stating outright – that WikiLeaks published the Democratic Party emails after receiving them from Guccifer 2.0 in a file named “wk dnc linkI .txt.gpg” on or around July 14, 2016. But now the report acknowledges that Mueller has not actually established how WikiLeaks acquired the stolen information: “The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016.”

Mueller Report, p. 47.

Another partially redacted passage also suggests that Mueller cannot trace exactly how WikiLeaks received the stolen emails. Given how the sentence is formulated, the redacted portion could reflect Mueller’s uncertainty:

Mueller Report, p. 45.

Contrary to Mueller’s sweeping conclusions, the report itself is, at best, suggesting that the GRU, via its purported cutout Guccifer 2.0, may have transferred the stolen emails to WikiLeaks. ”

Aaron Mate’ addresses each of the bullet points above in much greater detail at: (RealClearInvestigations, 7/05/2019) 

July 13, 2018 – Mueller’s indictment of Russian intelligence officers, contradicts evidence in the public domain

“On July 13th, 2018, an indictment was filed by Special Counsel Robert Swan Mueller III.

This author is responding to the indictment because it features claims about Guccifer 2.0 that are inconsistent with what has been discovered about the persona, including the following:

Evidence was found over 500 days ago relating to the Guccifer 2.0 persona that showed they had deliberately manipulated files to have Russian metadata. We know the process used to construct the documents was not due to accidental mistakes during the creation process.

The original template document that Guccifer 2.0 used has been identified. It is also the source of the presence of Warren Flood’s name and can be found attached to one of Podesta’s emails (it has RSIDs matching with Guccifer 2.0’s first couple of documents).

The Trump opposition research, which CrowdStrike claimed was targeted at the DNC, apparently in late April 2016, isn’t what Guccifer 2.0 actually presented to reporters. It also didn’t come from the DNC but was an attached file on one of John Podesta’s emails – not the DNC’s. This specific copy appears to have been edited by Tony Carrk shortly before it was sent to Podesta. The fact that Guccifer 2.0’s initial releases were Podesta email attachments was even conceded by a former DNC official.

It appears that Guccifer 2.0 fabricated evidence on June 15, 2016, that coincidentally dovetailed with multiple claims made by CrowdStrike executives that had been published the previous day.

Guccifer 2.0 went to considerable effort to make sure Russian error messages appeared in copies of files given to the press.

Evidence – which Guccifer 2.0 couldn’t manipulate due to being logged by third parties – suggests he was operating in the US.

Additional evidence, which Guccifer 2.0 would have been unlikely to realize “he” was leaving, indicated that the persona was archiving files in US time zones before release, with email headers giving him away early on.

Virtually everything that has been claimed to indicate Guccifer 2.0 was Russian was based on something he chose to do.

Considering that Guccifer 2.0 had access to Podesta’s emails, yet never leaked anything truly damaging to the Clinton campaign even though he would have had access to it, is highly suspicious. In fact, Guccifer 2.0 never referenced any of the scandals that would later explode when the DNC emails and Podesta email collections were published by WikiLeaks.” (Read more: Adam Carter, Disobedient Media, 7/15/2018)

April 28, 2018 – FBI delays release of communications with firm that examined DNC servers

Crowdstrike Logo (Credit: Crowdstrike)

“The Federal Bureau of Investigation (FBI) has pushed back the estimated completion date of a Freedom of Information Act (FOIA) request for documents pertaining to its communications with the security firm that examined the Democratic National Committee’s hacked servers to October.

The Washington Free Beacon submitted the FOIA request in July 2017 with the FBI seeking all communication between the bureau and CrowdStrike, Inc., the California-based cyber security firm that examined the DNC’s servers following the infiltration that led to the release of John Podesta’s emails. The FBI said in December the documents should be available by March.

The FBI, which was never granted access to the DNC’s servers for inspection, instead relied on the third-party firm that was brought in by the DNC for information regarding the compromised network who concluded that Russia was behind the hack.

The FBI previously awarded an unrelated $150,000 contract to CrowdStrike in July 2015. Details and communications between the firm and the bureau regarding that past contract were requested as part of the FOIA.” (Read more: The Washington Free Beacon, 04/28/2018)

April 2018 – The National Republican Campaign Committee is hacked after retaining DNC cybersecurity provider, Crowdstrike

(Credit: Alex Wong/Getty Images)

“The House GOP campaign arm suffered a major hack during the 2018 election, exposing thousands of sensitive emails to an outside intruder, according to three senior party officials.

The email accounts of four senior aides at the National Republican Congressional Committee were surveilled for several months, the party officials said. The intrusion was detected in April by an NRCC vendor, who alerted the committee and its cybersecurity contractor. An internal investigation was initiated and the FBI was alerted to the attack, said the officials, who requested anonymity to discuss the incident.

However, senior House Republicans — including Speaker Paul Ryan (R-Wis.), House Majority Leader Kevin McCarthy (R-Calif.) and Majority Whip Steve Scalise (R-La.) — were not informed of the hack until POLITICO contacted the NRCC on Monday with questions about the episode. Rank-and-file House Republicans were not told,

(…) The hack was first detected by an MSSP, a managed security services provider that monitors the NRCC’s network. The MSSP informed NRCC officials and they, in turn, alerted Crowdstrike, a well-known cybersecurity firm that had already been retained by the NRCC.” (Read more: Politico, 12/04/2018)

October 25, 2017 – Editorial: When Scandals Collide

Andrew C. McCarthy

By: Andrew McCarthy

(…) “we have learned finally, courtesy of the Washington Post, that Fusion GPS, the research firm that produced the notorious “Trump Dossier,” was funded by the Hillary Clinton presidential campaign and the Democratic National Committee. Of course, the Clinton campaign and the DNC always want layers of deniability and obfuscation – and let’s note that it has served them well – so they hire lawyers to do the icky stuff rather than doing it directly. Then, when the you-know-what hits the fan, outfits like Fusion GPS try to claim that they can’t share critical information with investigators because of (among other things) attorney-client confidentiality concerns.

Here, the Clinton campaign and the DNC retained the law firm of Perkins Coie; in turn, one of its partners, Marc E. Elias, retained Fusion GPS. We don’t know how much Fusion GPS was paid, but the Clinton campaign and the DNC paid $9.1 million to Perkins Coie during the 2016 campaign (i.e., between mid-2015 and late 2016).

In its capacity as attorney for the DNC, Perkins Coie – through another of its partners, Michael Sussman – is also the law firm that retained CrowdStrike, the cyber security outfit, upon learning in April 2016 that the DNC’s servers had been hacked.

A friend draws my attention to an intriguing coincidence.

Interesting: Despite the patent importance of the physical server system to the FBI and Intelligence-Community investigation of Russian meddling in the 2016 election, the Bureau never examined the DNC servers. Evidently, the DNC declined to cooperate to that degree, and the Obama Justice Department decided not to issue a subpoena to demand that the servers be turned over (just like the Obama Justice Department decided not to issue subpoenas to demand the surrender of critical physical evidence in the Clinton e-mails investigation).

Instead, the conclusion that Russia is responsible for the invasion of the DNC servers rests on the forensic analysis conducted by CrowdStrike. Rather than do its own investigation, the FBI relied on a contractor retained by the DNC’s lawyers.” (Read more: National Review, 10/25/2017)