Anonymous ID: bc3342 Oct. 8, 2020, 9:05 p.m. No.10991788   🗄️.is 🔗kun   >>1824 >>1832

FREE ASSANGE

 

https://creativedestructionmedia.com/investigations/2020/10/07/cd-media-exclusive-meet-alice-the-dnc-hacker-that-clears-julian-assange/

 

Her hacking nom de guerre is Alice. All her hacking group’s names are based in Lewis Carroll’s In through the Looking Glass. Her real name is Irina Shevchenko. She was born in Ukraine. She lives in Ukraine. She works in Kiev. She is Ukrainian. Shevchenko worked with the Ukrainian government through the Ukrainian Ministry of Information Policy. Irina worked with the Ukrainian SBU

Anonymous ID: bc3342 Oct. 8, 2020, 9:08 p.m. No.10991824   🗄️.is 🔗kun   >>1830 >>1832 >>1838

>>10991788

 

Irina Shevchenko worked for Alexandra Chalupa’s Oppo Research team for Team Clinton and the DNC and Information Operations implicating the Russian government.

 

After establishing what Shevchenko was doing and her relationship to the Ukrainian government through the Ukrainian IO teams through primary evidence quotes, I’ll show once again Crowdstrike and Dimitry were working hand in glove with the hackers and developing the Russian influence story.

 

But the big takeaway from all of this is Hillary Clinton ordered the DNC hack to happen. This one point exonerates Julian Assange from liability for the files WikiLeaks released. She didn’t want Julian Assange or Wikileaks in a position to leak any more information about her “incoming” administration.

 

Her group, Shaltay Boltay (Humpty Dumpty/Anonymous International) was part of the SCL-IOTAGlobal team put together under the Ukrainian Ministry of Information’s Dimitry Zolotukhin and Christina Dobrovolska. They were part of a larger Ukrainian hacking IO group called Cyber-Hunta with partner group Ukraine Cyber Alliance. These groups were subordinate to the InformNapalm group in Ukraine.

 

This West Point report shows clearly these groups are Ukrainian Information Operations actors.

 

“The StopFake project at Kyiv Mohyla and InformNapalm further add to the success of counter-IO operations in Ukraine across all levels.”- DEFENDING THE BORDERLAND Ukrainian Military Experiences with IO, Cyber, and EW By Aaron F. Brantly, Nerea M. Cal and Devlin P. Winkelstein– Army Cyber Institute at West Point

 

Shevchenko’s group, Shaltay Boltay started building the Russian influence part for SCL in 2014 from Kiev as a part of the InformNapalm group. Robert Mueller’s investigation, all subsequent investigations, media reports, and accusations are based in the Shaltay Boltay fabrication about the Internet Research Agency linked to Russian oligarch Yevgeny Prigozhin and based in Saint Petersburg, Russia influencing the 2016 election.

 

Shevchenko’s group Shaltay Boltay worked the MH-17 Information Operation which fed the investigators fabricated evidence and shut down any real hope for closure.

 

InformNapalm UCA (Ukrainian Cyber Alliance) member RUH8 made the following remarks after Shaltay Boltay leader Anikeevleft Kiev and was arrested in Moscow in October 2016. This is important not just because it shows the relationship but even identifies the charges Anikeev was brought up on in Russia.

 

“Sometimes they get hacking help from their Russian friends, he says. “There are people there who are so angry at their own government that they are risking spy charges and passing information to us,” RUH8 explains.”- Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin-RFERL

 

For ten years prior to the 2014 Ukrainian coup, the groups that formed into Ukraine’s IO and OSINT team had a working relationship under Shaltay Boltay leader Vladimir Anikeev. The group worked together stealing credit cards and running IO blackmail schemes on businessmen and government officials alike.

 

Alice aka Irina Shevchenko was the lead hacker of the group.

 

According to the official story, Alice would go to high-end coffee shops and pretend to be using her laptop. She cloned the devices of the customers around her and passed the information to the Shaltay Boltay boys who would analyze it for incriminating evidence that could be used for blackmail. The data would be sold online for Bitcoins if the victim didn’t comply and Alice would cash it in Kiev.

 

They identified themselves as Crowdstrike’s Fancy Bear/Cozy Bear in October 2016 when Ukraine’s CyberHunta hacked teammate Shaltay Boltay using what was then Fancy Bear proprietary tools. No one had the tools except Crowdstrike and the Ukrainian Fancy Bear groups

Anonymous ID: bc3342 Oct. 8, 2020, 9:09 p.m. No.10991830   🗄️.is 🔗kun   >>1836

>>10991824

 

This was done after Shaltay Boltay only released ½ of the Surkov secretary hack files and Anikeev was arrested in Russia. The Fancy Bear hack was noted in En Route with Sednit Part 1: Approaching the Target Version 1.0 • October 2016 by ESET LLC. Two days after the Shaltay Boltay server was hacked, Ukrainian InformNapalm released the 2nd half of the Surkov files to the Atlantic Council for verification.

 

Ukrainian Fancy Bear exposed themselves to the world.

 

(Vladimir) Anikeev is believed to be “Lewis”, the spokesperson for Anonymous International. FSB recently decided to confuse the matters by using the discovery on Anikeev’s computer of #SurkovLeaks files, which had been obtained and published by #UCA (Ukrainian Cyber Alliance), and had already been in the public domain. As the speaker for #UCA, I categorically deny any connections between Ukrainian Cyber Alliance and Anonymous International. I will now try to unravel this KGB tangle. According to RUH8 “Shaltai Boltai people post “samples” of letters of influential, but nonpublic people, virtually without comment. And they also offer information for sale. But did any of the allegedly sold correspondences surface anywhere? Why not? Because a complete dump would inflict a tremendous damage on Moscow, whereas the real goal is to pull some strings and rein in a competitor for power.” .–RUH8 InformNapalm

 

Now we have the Ukrainian Fancy Bear hackers with a Russian criminal team-mate that was charged with treason in Russia. According to the the FSB was able to retrieve Shaltay Boltay’s archive server from Kiev.

 

All the InformNapalm groups worked as Ukrainian state IO, hackers, and OSINT for SCL from 2014- today. They worked with Ukraine’s SBU which was given over to Pravy Sektor by Valentyn Nalyvaichenko following the 2014 overthrow of Victor Yanukovych and are mostly Pravy Sektor nationalists.

 

Initial reports out of Russian media tied Mikhailov to a group of hackers in Ukraine and Thailand called Shaltay Boltay, which means Humpty Dumpty. The group is reportedly affiliated with Anonymous, who released damaging documents on high-level Russians in 2014 and the Kremlin alleges that the arrests are related to this act, as Markov told The Daily Beast that Mikhailov: “definitely controlled Shaltay Boltay,” which “cooperated with the Ukrainian SBU [security service], which is the same as working for the CIA; he worked with them, which is obviously treason.”-Paste Magazine

 

This is the team of credit card thieves Alexandra Chalupa hired to do Oppo research on Donald Trump? If you look back to 2016, the IO machine was almost on hiatus through the election.

 

Let’s jump ahead for a moment. In December 2017, Shawn Henry, CEO of Crowdstrike while being interviewed by House Intelligence Committee members could not say for sure there was ever evidence that anything was taken during the DNC hack.

 

The question is why? It’s going to be obvious soon but why hack into the server and not take anything?

 

At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her-not the other way around-and she wanted ‘to see who was talking to who, who was leaking to who.”-Jonathan Allen and Amy Parnes. Shattered: Inside Hillary Clinton’s Doomed Campaign

 

Alexandra Chalupa’s Ukrainian cyber team that was doing the Oppo research also doubled as IT professionals for the DNC. This motley team of petty thieves was given state sized tools to play with for SCL’s IO program in Ukraine which was pointed at the US the entire time. Think Vault 7 size tools. Other than Crowdstrike, they are the only group proven to have the Fancy Bear proprietary tools that identify the group.

Anonymous ID: bc3342 Oct. 8, 2020, 9:10 p.m. No.10991836   🗄️.is 🔗kun

>>10991830

Hillary Clinton demands the server is accessed and leakers are found. Irina Shevchenko is the best hacker and coder out of the groups and she’s the go-to girl when the Ukrainians need help. It’s either her or the rabid nationalists with the emotional acuity of 10-year-olds that make up the rest of the team. She decides to use the state sized tools she was given because it means a faster turnaround for the answers Clinton wants. Nothing was taken. Irina Shevchenko of Shaltay Boltay/Ukraine’s CyberHunta/InformNapalm/SCL contractor working for Alexandra Chalupa for Team Hillary was doing her job.

 

She probably billed Hillary and the DNC for the time and trouble the hack took her.

 

The FBI protected these groups and when interviewing one of the subgroups allegedly offered a US passport, money, an apartment, and work if the interviewee would pin the hack on Donald Trump and Vladimir Putin. Six of the eight servers linked to the hack belong to Shaltay Boltay.

 

Since we know Crowdstrike had nothing and ramped up the war on Donald Trump we can safely assert the entire episode was to control the election results and the just released CIA documents prove the point.

 

“If the U.S. government had come out and done what they did in December 2016 [in releasing an intelligence-community assessment on the interference] in July, it would’ve had an even bigger effect,” said Dmitri Alperovitch, the Russian American founder of the cybersecurity firm CrowdStrike, which was brought in by the DNC to analyze the hack.”- the Atlantic

 

A little over a month ago I was contacted by Yaacov Apelbaum, the CTO at XRVision. From his LinkedIn profile- Holder of 13 U.S. technology patents and published author. Demonstrable expertise in all aspects of cybersecurity, cutting edge R&D, security architecture, and real-time systems. Premium proficiency in intelligence platforms, Big Data and AI-based analytics, and delivery of some of the world’s largest mission critical and high-volume transnational cloud-based solutions.

 

He contacted me to compare notes on the DNC hack. His trajectory mirrored mine but his source material was from a different angle. He ended up with the same conclusions. It’s a worthwhile read that breaks it down easily.

 

From the first DNC hack expose article I wrote in January 2017 it’s been clear and documented that Crowdstrike and Alperovitchhad had an ongoing relationship with the DNC hackers.

 

The following from his article shows how deep Alperovitch’s relationship extends to them.

 

Dmytro immediately told his users not to download the malicious add-on and sent a copy of the phishing email for analysis to a friend, Andriy Baranovych, a Ukrainian hacker that goes by the alias “Sean Townsend”, AKA “Ross Hatefield”, member of “RUH8”. According to Dobronravin and Dmytro, none of their users downloaded the malware because GMail flagged it as suspicious.

 

Andriy Baranovych, who contracted for Ukrainian intelligence (FSU) and did some work for Alexandra Chalupa/DNC, also just happened to be a friend of Dmitri Alperovitch, the CTO of Crowdstrike and forwarded the code/story to Alperovitch.- Yaacov Apelbaum