{"id":62536,"date":"2017-01-07T18:42:50","date_gmt":"2017-01-07T22:42:50","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=62536"},"modified":"2019-10-17T15:46:09","modified_gmt":"2019-10-17T19:46:09","slug":"dnc-russian-hackers-found","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=62536","title":{"rendered":"DNC Russian Hackers Found!"},"content":{"rendered":"<h1>You Won\u2019t Believe Who They Really Work For<\/h1>\n<p><!--more--><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-07-at-5.38.20-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-62537\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-07-at-5.38.20-PM.png\" width=\"640\" height=\"362\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-07-at-5.38.20-PM.png 947w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-07-at-5.38.20-PM-300x170.png 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2017\/01\/Screen-Shot-2017-01-07-at-5.38.20-PM-768x435.png 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<hr \/>\n<h4 style=\"padding-left: 150px;\">&#8220;If someone steals your keys to encrypt the data,<br \/>\nit doesn\u2019t matter how secure the algorithms are.&#8221;<\/h4>\n<hr \/>\n<p style=\"padding-left: 150px;\"><strong>&#8212;\u00a0Dmitri Alperovitch, founder of CrowdStrike<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">By the Anonymous Patriots<br \/>\n<a href=\"https:\/\/stateofthenation2012.com\/?p=62536\">SOTN Exclusive<\/a><\/span><\/p>\n<p><b>Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama.<\/b><span style=\"font-weight: 400;\"> In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. \u00a0Only one \u201csuper-hero cyber-warrior\u201d seems to \u201chave the codes\u201d to figure out \u201cif\u201d a system was hacked and by \u201cwhom.\u201d \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dmitri\u2019s company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others. <\/span><\/p>\n<p><b>CrowdStrike&#8217;s philosophy is: <\/b><b><i>&#8220;You don&#8217;t have a malware problem; you have an adversary problem.&#8221;<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">CrowdStrike has played a critical role in the development of America&#8217;s cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike&#8217;s president of services. <strong>The company is crawling with former U.S. intelligence agents. <\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During that time, he \u201cdiscovered\u201d the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee. <\/span><b>He was the only person to notice the biggest cyberattack in history!<\/b><span style=\"font-weight: 400;\"> \u00a0Nothing suspicious about that.<\/span><\/p>\n<p><b>Alperovitch and the DNC<\/b><\/p>\n<p><span style=\"font-weight: 400;\">After CrowdStrike was hired as an independent \u201cvendor\u201d by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called <\/span><strong><i>Falcon<\/i><\/strong><span style=\"font-weight: 400;\"> that monitors the networks of its clients in real time. According to Alperovitch, <\/span><i><span style=\"font-weight: 400;\">Falcon<\/span><\/i><span style=\"font-weight: 400;\"> &#8220;lit up,&#8221; within ten seconds of being installed at the DNC. Alperovitch had his \u201cproof\u201d in TEN SECONDS that Russia was in the network. This \u201calleged\u201d evidence of Russian hacking has yet to be shared with anyone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As Donald Trump has pointed out, the FBI, the agency that should have been immediately involved in hacking that effects \u201cNational Security,\u201d has yet to even examine the DNC system to begin an investigation. Instead, the FBI and 16 other U.S. \u201cintelligence\u201d agencies simply \u201cagree\u201d with Obama\u2019s most trusted \u201ccyberwarfare\u201d expert Dmitri Alperovitch\u2019s \u201cTEN SECOND\u201d assessment that produced no evidence to support the claim.\u00a0<\/span><\/p>\n<p><b>Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers<\/b><span style=\"font-weight: 400;\">. In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alperovitch failed to mention in his conclusive \u201cTEN SECOND\u201d assessment that Guccifer 2.0 had already hacked the DNC and made available to the public the documents he hacked \u2013 before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents to the public. Alperovitch\u2019s assessment also goes directly against Julian Assange\u2019s repeated statements that the DNC leaks did not come from the Russians. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike na\u00efvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. Julian Assange <\/span><i><span style=\"font-weight: 400;\">implied<\/span><\/i><span style=\"font-weight: 400;\"> in an interview that the murdered Democratic National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website posted just days before the party&#8217;s convention. Seth was on his way to testify about the DNC leaks to the FBI when he was shot dead in the street. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this \u201cfalse-flag cyber-attack\u201d on the DNC \u2013 or at least, Alperovitch \u201creported\u201d there was an attack. The second hacker, the supposed Russian military (GRU \u2013 like the U.S. DoD) hacker, had just entered the system two weeks before and also had done \u201cnothing\u201d but observe. \u00a0<\/span><\/p>\n<p><b>It is only Alperovitch\u2019s word that reports that the Russian FSB was \u201clooking for files on Donald Trump.\u201d<\/b><span style=\"font-weight: 400;\"> It is only this false claim that spuriously ties Trump to the \u201calleged\u201d attack. It is also only Alperovitch who believes that this hack that was supposedly \u201clooking for Trump files\u201d was an attempt to \u201cinfluence\u201d the election. No files were found about Trump by the second hacker, as we know from Wikileaks and <\/span><span style=\"font-weight: 400;\">Guccifer 2.0<\/span><span style=\"font-weight: 400;\">\u2019s leaks. To confabulate that \u201cRussian\u2019s hacked the DNC to influence the elections\u201d is the claim of one well-known Russian spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct \u2013 <strong>even though there is no evidence and no investigation was ever conducted<\/strong>. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch\u2019s company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag report? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made CrowdStrike\u2019s report look foolish, Alperovitch decided the situation was far worse than he had reported. <\/span><b>He single-handedly concluded that the Russians were conducting an \u201cinfluence operation\u201d to help win the election for Trump<\/b><span style=\"font-weight: 400;\">. \u00a0This false assertion had absolutely no evidence to back it up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a massive cache of emails that had been \u201cstolen\u201d (not hacked) from the DNC. Reporters soon found emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three other officials, to resign. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just days later, it was discovered that the Democratic Congressional Campaign Committee (DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately \u201cbelieved\u201d that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0&#8217;s website. This time Guccifer released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike\u2019s claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch\u2019s suggestion of installing <\/span><i><span style=\"font-weight: 400;\">Falcon<\/span><\/i><span style=\"font-weight: 400;\">, the system that failed to stop cyberattacks at the DNC, on all congressional laptops. \u00a0<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Key Point: <\/span><b>Once <\/b><b><i>Falcon<\/i><\/b><b> was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.<\/b><\/p>\n<p><b>Alperovitch\u2019s \u201cUnbelievable\u201d History<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so Dmitri claims). \u00a0Dmitri\u2019s father was supposedly involved at the highest levels of Russian nuclear science. \u00a0He also claims that his father taught him to write code as a child. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 1990, his father was sent to Maryland as part of a nuclear-safety training program for scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While Dmitri Alperovitch was still in high school, he and his father started an encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to work at an antispam software firm. It was at this time that he realized that cyber-defense was more about psychology than it was about technology. A very odd thing to conclude.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dmitri Alperovitch posed as a \u201cRussian gangster\u201d on spam discussion forums which brought his illegal activity to the attention of the FBI \u2013 as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski&#8217;s sting operation which took two years, but it ultimately brought about fifty-six arrests. \u00a0Dmitri Alperovitch then became a pawn of the FBI and CIA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee&#8217;s clients and involved the Chinese government. Three days after his supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed just \u201ctwo hours\u201d to identify North Korea as the adversary. Executives at Sony asked Alperovitch to go public with the information immediately, but it took the FBI another three weeks before it confirmed the attribution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Alperovitch then developed a list of \u201cusual suspects\u201d who were well-known hackers who had identifiable malware that they commonly used. Many people use the same malware and Alperovitch\u2019s obsession with believing he has the only accurate list of hackers in the world is plain idiocy exacerbated by the U.S. government\u2019s belief in his nonsense. \u00a0Alperovitch even speaks like a \u201cnut-case\u201d in his personal Twitters, which generally have absolutely no references to the technology he is supposedly the best at in the entire world.<\/span><\/p>\n<p><b>Dmitri &#8211; Front Man for His Father\u2019s Russian Espionage Mission<\/b><\/p>\n<p><span style=\"font-weight: 400;\">After taking a close look at the disinformation around Dmitri and his father, it is clear to see that <\/span><b>Michael Alperovitch became a CIA operative<\/b><span style=\"font-weight: 400;\"> during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. <\/span><b>Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America<\/b><span style=\"font-weight: 400;\">. Only the CIA can transform a Russian into an American with a top-secret clearance overnight. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We can see on Michael Alperovitch\u2019s Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. <\/span><b>The cryptologist who assigns the encryption codes controls the system from that point on<\/b><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Key Point: <\/span><b>Cryptologists are well known for leaving a \u201cback-door\u201d in the base-code so that they can always have over-riding control.<\/b><span style=\"font-weight: 400;\"> \u00a0<\/span><\/p>\n<p><b>Michael Alperovitch essentially has the \u201ccodes\u201d for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media<\/b><span style=\"font-weight: 400;\">. There is hardly any powerful agency or company that he has not written the \u201ccodes\u201d for. \u00a0One might ask, why do American companies and the U.S. government use his particular codes? \u00a0What are so special about Michael\u2019s codes?<\/span><\/p>\n<p><b>Stolen Russian Codes<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. \u00a0All of the attempts to attack Russia\u2019s military and intelligence agencies failed miserably. Russia laughed at Obama\u2019s attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama\u2019s cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia\u2019s cyber-defenses were impenetrable due to the sophistication of their encryption codes. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. <\/span><b>It was these very codes that he shared with the CIA on his first trip to America<\/b><span style=\"font-weight: 400;\">. These codes got him spirited into America and \u201cturned into\u201d the best cryptologist in the world. <\/span><b>Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA<\/b><span style=\"font-weight: 400;\">. \u00a0<\/span><\/p>\n<p style=\"padding-left: 30px;\">KEY POINT: It is crucial to understand at this junction that <strong>the CIA is not solely working for America<\/strong>. \u00a0The CIA works for itself and there are three branches to the CIA \u2013 two of which are hostile to American national interests and support globalism.<\/p>\n<p><b>Michael and Dmitri Alperovitch work for the CIA<\/b><span style=\"font-weight: 400;\"> (and international intelligence corporations) <\/span><b>who support globalism<\/b><span style=\"font-weight: 400;\">. They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed \u201cattackers\u201d have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the \u201cusual culprits\u201d when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri\u2019s \u201csuspicions\u201d are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri\u2019s suspicions.<\/span><\/p>\n<p><b>Michael Alperovitch &#8211; Russian Spy with the Crypto-Keys<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of\u00a0<\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/Digital_certificates\"><span style=\"font-weight: 400;\">digital certificates<\/span><\/a><span style=\"font-weight: 400;\">\u00a0which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. <\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/Public_key_cryptography\"><span style=\"font-weight: 400;\">Public key cryptography<\/span><\/a><span style=\"font-weight: 400;\">\u00a0is a\u00a0<\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/Cryptographic\"><span style=\"font-weight: 400;\">cryptographic<\/span><\/a><span style=\"font-weight: 400;\">\u00a0technique that enables entities to\u00a0<\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/Secure_communication\"><span style=\"font-weight: 400;\">securely communicate<\/span><\/a><span style=\"font-weight: 400;\">\u00a0on an insecure public network (the Internet), and reliably verify the identity of an entity via\u00a0<\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/Digital_signatures\"><span style=\"font-weight: 400;\">digital signatures<\/span><\/a><span style=\"font-weight: 400;\">. Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA&#8217;s own private key, so that trust in the user key relies on one&#8217;s trust in the validity of the CIA&#8217;s key. <\/span><b>Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Michael\u2019s past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was\u00a0State University of Gorky. Now it is known as \u00a0Lobachevsky State University of Nizhni Novgorod &#8211; National Research University (UNN), also known as\u00a0Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master&#8217;s Degree become a leading nuclear physicist who comes to \u201cvisit\u201d America. In Michael\u2019s Linked In page there is a long list of his skills and there is no mention of nuclear physics.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also on Michael Alperovitch\u2019s Linked In page we find some of his illustrious history that paints a picture of either the most brilliant mind in computer security, encryption, and cyberwarfare, or a CIA\/FBI backed Russian spy. Imagine that out of all the people in the world to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S. military satellites, the flow of network news, cell phone encryption, the <\/span><a href=\"http:\/\/www.linkedin.com\/company\/pathfire?trk=ppro_cprof\"><span style=\"font-weight: 400;\">Pathfire<\/span><\/a><span style=\"font-weight: 400;\"> (media control) Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher\u00a0Armored Credential System among many others<\/span><span style=\"font-weight: 400;\">, <strong>the government hires a Russian spy<\/strong>. Go figure. <\/span><\/p>\n<p><b>Michael Alperovitch\u2019s Linked In Page<\/b><\/p>\n<p><b>Education:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Gorky State University, Russia, MS in Applied Mathematics<\/span><\/p>\n<p><b>Work History:<\/b><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/title\/sr.-security-architect?trk=pprofile_title\"><i><span style=\"font-weight: 400;\">Sr. Security Architect<\/span><\/i><\/a><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/idirect?trk=ppro_cprof\"><span style=\"font-weight: 400;\">VT IDirect<\/span><\/a><span style=\"font-weight: 400;\"> -2014\u00a0&#8211; Designing security architecture for satellite communications including cryptographic protocols, authentication. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Principal SME (Contractor)<\/span><\/i><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/disa?trk=ppro_cprof\"><span style=\"font-weight: 400;\">DISA<\/span><\/a><span style=\"font-weight: 400;\">-Defense Information Systems Agency (Manager of the Global Information Grid) \u2013 2012-2014\u00a0&#8211; Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Technical Lead (Contractor)<\/span><\/i><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/us-treasury?trk=ppro_cprof\"><span style=\"font-weight: 400;\">U.S. Department of the Treasury<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 2011 &#8211;\u00a0Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication. <\/span><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/title\/principal-software-engineer?trk=pprofile_title\"><i><span style=\"font-weight: 400;\">Principal Software Engineer<\/span><\/i><\/a><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/comtech-mobile-datacom?trk=ppro_cprof\"><span style=\"font-weight: 400;\">Comtech Mobile Datacom<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 2007-2010 &#8211; Subject matter expert on latest information security practices, including authentication, encryption and key management. <\/span><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/title\/sr.-software-engineer?trk=pprofile_title\"><i><span style=\"font-weight: 400;\">Sr. Software Engineer<\/span><\/i><\/a><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/tricipher?trk=ppro_cprof\"><span style=\"font-weight: 400;\">TriCipher<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 2006-2007\u00a0&#8211; Designed and developed security architecture for TriCipher Armored Credential Authentication System. <\/span><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/title\/lead-software-engineer?trk=pprofile_title\"><i><span style=\"font-weight: 400;\">Lead Software Engineer<\/span><\/i><\/a><\/p>\n<p><span style=\"font-weight: 400;\">BellSouth \u2013 2003-2006\u00a0&#8211; Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Principal Software Research Engineer<\/span><\/i><\/p>\n<p><a href=\"http:\/\/www.linkedin.com\/company\/pathfire?trk=ppro_cprof\"><span style=\"font-weight: 400;\">Pathfire<\/span><\/a><span style=\"font-weight: 400;\"> \u2013 2001-2002\u00a0\u2013 Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. \u00a0Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.<\/span><\/p>\n<p><b>Obama \u2013 No Friend of America<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Obama is no friend of America in the war against cyber-attacks. The very agencies and departments being defended by Michael Alperovitch\u2019s \u201csingular and most brilliant\u201d ability to write encryption codes have all been successfully attacked and compromised since Michael set up the codes. But we shouldn\u2019t worry, because if there is a cyberattack in the Obama administration, Michael\u2019s son Dmitri is called in to \u201cprove\u201d that it isn\u2019t the fault of his father\u2019s codes. It was the \u201cdamn Russians\u201d, or even \u201cPutin himself\u201d who attacked American networks. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful cyberattack against America without Michael and Dmitri\u2019s help. Those same 17 U.S. intelligence agencies were not able to effectively launch a successful cyberattack against Russia. It seems like the Russian\u2019s have strong codes and America has weak codes. \u00a0We can thank Michael and Dmitri Alperovitch for that. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a \u201cfrontman\u201d for his father\u2019s encryption espionage mission. \u00a0<\/span><\/p>\n<p><b>Is it any wonder that Trump says that he has \u201chis own people\u201d to deliver his intelligence to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama administration<\/b><span style=\"font-weight: 400;\">? Isn\u2019t any wonder that citizens have to go anywhere BUT the MSM to find real news or that the new administration has to go to independent news to get good intel?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is hard to say anything more damnable than to again quote Dmitri on these very issues: <\/span><br \/>\n<i><span style=\"font-weight: 400;\">&#8220;If someone steals your keys to encrypt the data, it doesn\u2019t matter how secure the algorithms are.&#8221; \u00a0\u00a0<\/span><\/i><span style=\"font-weight: 400;\">Dmitri Alperovitch, founder of CrowdStrike<\/span><\/p>\n<p>Originally posted at: <a href=\"https:\/\/stateofthenation2012.com\/?p=62536\">https:\/\/stateofthenation2012.com\/?p=62536<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You Won\u2019t Believe Who They Really Work For<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,1],"tags":[],"class_list":["post-62536","post","type-post","status-publish","format-standard","hentry","category-featured-posts","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/62536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=62536"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/62536\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=62536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=62536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=62536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}