Good find - it was an interesting read to learn more about Alperovitch. I read through the testimonies about the DNC servers and this telling is pretty much in line with them. I still want to know what made the FBI alert the DNC about 'unusual activity emanating from their servers in September of 2015 and the agent that made the contact should have been questioned under oath.
None of this precludes Seth Rich copying the data and delivering to WikiLeaks. In fact, once Crowdstrike got involved and installed their monitoring tools, they would have had better control over such a hack and probably knew exactly when it happened, what they took and who did it (or at least the logins used).
I would like to see Alperovitch interviewed - I didn't know the depth of his technical background, I thought he was more a high level business person. I would be interested to hear him talk about some of the CIA tools that mimic entities like Cozy Bear and Fancy Bear.
I thought the article was interesting about how they named the threats they discovered. Why haven't we heard about Panda x or Kitten y or Chollima z, where x, y, z are other names? Surely there were some Pandas.
EarnYourVote ago
Good find - it was an interesting read to learn more about Alperovitch. I read through the testimonies about the DNC servers and this telling is pretty much in line with them. I still want to know what made the FBI alert the DNC about 'unusual activity emanating from their servers in September of 2015 and the agent that made the contact should have been questioned under oath.
None of this precludes Seth Rich copying the data and delivering to WikiLeaks. In fact, once Crowdstrike got involved and installed their monitoring tools, they would have had better control over such a hack and probably knew exactly when it happened, what they took and who did it (or at least the logins used).
I would like to see Alperovitch interviewed - I didn't know the depth of his technical background, I thought he was more a high level business person. I would be interested to hear him talk about some of the CIA tools that mimic entities like Cozy Bear and Fancy Bear.
Q20191776 ago
I thought the article was interesting about how they named the threats they discovered. Why haven't we heard about Panda x or Kitten y or Chollima z, where x, y, z are other names? Surely there were some Pandas.
derram ago
https://archive.fo/Mp4WL :
"At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email."
'Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. '
'Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearing house. '
'The head of cybersecurity at Google told Alperovitch that Gmail accounts belonging to human-rights activists in China had been breached. '
'Before Alperovitch founded CrowdStrike, the idea that attribution ought to be a central defense against hackers was viewed as heresy. '
This has been an automated message.