CrowdStrike founder Dmitri Alperovitch (center) at the US-NATO Atlantic Council, 2014 (AC)
The “Russian hacking” NATO psyop has finally been solved.
To professional analysts, it has long been clear that the “Russiagate” saga – including the “Russian hacking” claims, the Trump-Russia collusion claims, as well as the “Skripal poisoning incident” and the more recent “Navalny poisoning incident” – has been a US and NATO psychological operation aimed at containing a resurgent Russia and a somewhat unpredictable US President.
Several aspects of the “Russian hacking” psychological operation had already been uncovered by independent researchers like Stephen McIntyre, “Adam Carter” and “The Forensicator”. In early November, however, British researcher David J. Blake essentially solved the “Russian hacking” psyop, down to the operational level, as described in his new book “Loaded for Guccifer 2.0”.
Blake shows how the “Russian hacking” psyop was initiated by the US and NATO in 2014 in response to Russia’s reaction to the US regime change in Ukraine, when Russia retook control of the Crimean Peninsula and supported the de-facto secession of Russian-speaking eastern Ukraine.
The US/NATO psyop was inspired by the actual amateur hackers “CyberBerkut” in Ukraine and “Guccifer” in Romania. Blake shows how in 2014, NATO created a “Cyber Defence Trust Fund” and used this entity to initiate false-flag “hacking operations” against the US and other NATO members that would then be falsely “attributed” to alleged Russian “state-sponsored hacking groups”.
Regarding the most prominent case, the alleged “hacking” of the US Democratic Party (DNC) and the 2016 Hillary Clinton presidential campaign, Blake shows how the emails and documents in question were in fact exfiltrated by the FBI and FBI cybersecurity contractor CrowdStrike, whose founder, Dmitri Alperovitch, is a Senior Fellow at the US-NATO think tank Atlantic Council. (1)
Blake shows how the mysterious persona of Guccifer 2.0, who claimed the hack, was played by none other than Alperovitch himself, while the technical infrastructure, including the notorious website dcleaks.com, was provided by US and NATO intermediaries in NATO member Romania.