Here I am Again, My Friends!

I really hope you’ve missed me a lot. Though I see they didn’t let you forget my name. The U.S. intelligence agencies have published several reports of late claiming I have ties with Russia.

I’d like to make it clear enough that these accusations are unfounded. I have totally no relation to the Russian government. I’d like to tell you once again I was acting in accordance with my personal political views and beliefs.

The technical evidence contained in the reports doesn’t stand up to scrutiny. This is a crude fake.

Any IT professional can see that a malware sample mentioned in the Joint Analysis Report was taken from the web and was commonly available. A lot of hackers use it. I think it was inserted in the report to make it look a bit more plausible.

I already explained at The Future of Cyber Security Europe conference that took place in London in last September, I had used a different way to breach into the DNC network. I found a vulnerability in the NGP VAN software installed in the DNC system.

It’s obvious that the intelligence agencies are deliberately falsifying evidence. In my opinion, they’re playing into the hands of the Democrats who are trying to blame foreign actors for their failure.

The Obama administration has a week left in office and I believe we’ll see some more fakes during this period.

I guess you have a lot of questions for me. So, feel free to send them via DM.

183 thoughts on “Here I am Again, My Friends!

  1. stay strong!

    this is getting traction — BREAKING Guccifer – Hand Written Letter To Fox Says Hillary Clinton A “High Priest Satanic Goddess”

    Like

  2. 1. Warren Flood’s name gave away the use of a computer by a DNC insider/contractor.
    2. Consistent negative press outcome and false attributions to Wikileaks on key dates gave us clues of an intent to undermine Wikileaks.
    3. Fabricated “Russian Fingerprints” exposed fakeness of Russian hacker persona and suggested the effort to attribute to Wikileaks was to preemptively discredit the leaks they would later publish..
    4. Your use of “told”, “tell”, “say”, “said”, definite/indefinite article use and command of prepositions expose you as being someone that natively speaks in English as does the terminology and phrasing you had used in much of your informal communications – it also helped that Dmitri’s advice was followed with very little consistency.
    5. Specious claims about hackers still being on the network as of 11th June after installing Falcon across the DNC network exposed the nature of the WAPO article (propaganda piece driven by CrowdStrike/DNC statements) from June 14th and made it obvious that excuses were being made for emails being dated as late as May so that the leaks could be attributed to hacking. (So, Henry/Alperovitch probably found the leak source between 12th-14th of June)
    6. The fact there was a month delay before mentioning the “Trump Opposition Research” being targeted and that it wasn’t mentioned until after Assange announced the HRC-related leaks were coming.
    7. The fact there’s no evidence to support your claims about that file being targeted and the fact it’s unlikely you’d know it was targeted if you couldn’t even say who targeted it or exactly when. – It suggests there’s an alternate reason for mentioning that file’s description – one possibility being a switch or ‘transfer’ device to give credibility to whoever might appear soon afterwards presenting that very same document.
    8. Guccifer 2.0 turning up the next day, using that document (a tainted copy of the one originally authored by Lauren Dillon) as his first document to release AND used it as a lure to suck in all the gullible press – as if the whole thing was planned.
    9. The fact you fooled giants in the cyber-security industry as well as various intelligence agencies suggests that G2 was really someone (or some people) that were really aligned with either HRC or the DNC and had both cyber-security and counter-intelligence skills. The comprehensive masquerade I dismantled also supports this notion.
    10. Your efforts to poison-the-well with Seth are obvious when the fake fingerprint clue is considered from the start.
    11. The fact your hacker persona’s breach claims were never independently verifiable (and quite a few got debunked) shows you were not a real hacker, you were getting the files because you were being given access to them (this also explains why you could only get DNC files despite your tall tales about being an amazing hacker using zero-day ‘sploits).
    12. The DNC’s rejection of FBI offers to help (when they directly have the tools of the state, etc. to aide in identifying and tracking a hacker down) gives good reason to suspect that things were not as they reported.
    13. The fact Falcon was installed on the DNC’s network yet CrowdStrike did not produce details pertaining to the actual exfiltration of email data and instead posted APT-group identifiers without context.
    14. Guccifer 2.0 appears to have had physical LAN access when collating certain files. (Yup, not published yet but I promise you that it’s coming).

    Good game Shawn.

    Like

  3. is it true that he has been arrested and is pleading guilty coz that sounds like a set up that Crowdstrike is behind the ‘made in Russia’ hacking of the voter registration lists, mailings, to make Russia look bad..I THINK DMITRI ALPEROVITVITCH IS RUSSIAN EX-SECRET SERVICE AND HE HAD A GRUDGE IN UKRAINE AND HE’S GOT ONE HERE TOO. I HOPE YOU ARE OK MY FRIEND GET A GOOD LAWYER.

    Like

Leave a Reply to georgeingram1 Cancel reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s