October 8, 2019
British Operatives Try To Capture Wife Of CIA Station Chief After Barr Demands Spygate Information
By: Sorcha Faal, and as reported to her Western Subscribers
A highly classified “Of Special Importance” heavily redacted new Foreign Intelligence Service (SVR) report circulating in the Kremlin today states that a British Secret Service (MI5) operation to capture and imprison for blackmail purposes the wife of the Central Intelligence Agency (CIA) station chief to the United Kingdom failed when she was flown out of the UK under United States diplomatic cover—an MI5 operation began on 27 August when a motorcycle ridden by British teenager Harry Dunn inexplicably veered in front of a car being driven by former US State Department official Anne Sacoolas near immediately after she left an RAF base in Northamptonshire—who is the wife of CIA station chief Jonathan Sacoolas who is not, nor has ever been a diplomat—who himself, on 29 July, joined US Attorney General William Barr when he met with top British spy agency officials demanding to know the part they played in the coup attempt against President Donald Trump—with Barr specifically demanding to know why MI6 operatives Charles Backford and Justin Hartman were in Ukraine in 2016, and why they were secretly funding a young Ukrainian technical college student named Jaroslav Volodimirovich Panchenko (aka Roman Alexeev)—who went by the computer name of “Profexer”—and within days of Trump taking office in January-2017—saw this young student fearfully fleeing to Ukrainian police forces, and shortly thereafter his going under full FBI protection. [Note: Some words and/or phrases appearing in quotes in this report are English language approximations of Russian words/phrases having no exact counterpart.]
Ukraine Poltava National Technical University student Jaroslav Volodimirovich Panchenko (above) remains the most feared person within American shadow government Deep State.
According to the portions of this heavily redacted SVR document approved for general release, this past fortnight has seen leftist-socialist forces in the United States intelligence, lawmaking and media establishments pushing their nation to the brink of a full impeachment hysterical meltdown due to their outrageously claiming that President Trump asked the Ukrainian president to “do me a favor” and dig up political dirt on his political opponent Joe Biden—but whose exact transcript of this call shows this never happened at all, as Trump simply stated: “I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike”.
Unknown to the masses of the leftist brainwashed and indoctrinated American peoples about Trump mentioning the name CrowdStrike during a phone call with Ukraine’s president, this report explains, is that this cybersecurity technology company based in Sunnyvale-California headed by Russian-born American computer security industry executive Dmitri Alperovitch laid the foundation upon which the entire fairy tale Russiagate collusion hoax narrative against President Trump was built on—and was based the CrowdStrike document published on 15 June 2016 in the midst of the US presidential election titled “Bears in the Midst: Intrusion into the Democratic National Committee” which stated:
CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016.
On June 15, 2016 a blog post to a WordPress site authored by an individual using the moniker Guccifer 2.0 claimed credit for breaching the Democratic National Committee.
This blog post presents documents alleged to have originated from the DNC.
Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents’ authenticity and origin.
Regardless, these claims do nothing to lessen our findings relating to the Russian government’s involvement, portions of which we have documented for the public and the greater security community.
As to why this private CrowdStrike company headed by Russian-born American executive Dmitri Alperovitch—who is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire Victor Pinchuk, and also happened to donate at least $10 million to the Clinton Foundation—was even allowed to investigate the most important computer hacking case in American history, this report continues, no one has ever been able to explain—most particularly because cases of this magnitude having the power to overturn an American presidential election, beyond all doubt, lies fully within the purview of US intelligence agencies—but in this case, extraordinarily saw Hillary Clinton and her Democratic National Committee refusing to turn their supposed hacked computer server over to the FBI.
Even though this supposed Russian-hacked DNC-Hillary Clinton computer server has never been produced for independent professional US government examination, this report details, the CrowdStrike document claiming it was so did provide a treasure trove of forensic facts poured over and examined by nearly all of the world’s top computer experts—and whose conclusions about led them to declare that CrowdStrike’s claims of Russian hacking are either outright false or are based on evidence that only shows run-of-the-mill attacks by some anonymous basement hacker—with their specially stating “New Russian Hacks? No, Old Ukrainian Malware Found.”—and saw top international cybersecurity firm Wordfence exactly stating: “The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.”—with this now identified “old Ukrainian malware” further being proved was a software tool created by Ukraine student Jaroslav Volodimirovich Panchenko using the name Roman Alexeev and computer moniker “Profexer”—a software tool called GRIZZLYSTEPPE that the Hillary Clinton paid for CrowdStrike document following US government said was part of the arsenal used by Russian hackers suspected of hacking into the Democratic National Committee—but which computer experts countered with true facts that led them to state:
The only trouble is nothing in the GRIZZLYSTEPPE report said which of those technical indicators were found in the DNC hack.
In fact, Prefexer’s “P.A.S. Web shell” tool — a program designed to insert a digital backdoor that lets attackers control a hacked Web site remotely — was specifically not among the hacking tools found in the DNC break-in.
As to who exactly paid this young Ukrainian student to create this software tool that CrowdStrike then claimed was used by the Russians to hack into the DNC computers during the 2016 US presidential election between Donald Trump and Hillary Clinton, this report further notes, former Ukrainian Security Services officer Vasily Nikolaevich Prozorov revealed when he defected to Russia with thousands of top secret documents—among which identified British MI6 operatives Charles Backford and Justin Hartma as being the payees to this student—and all of which were turned over to Trump-loyal forces within the American intelligence community early last year when all three of Russia’s top intelligence chiefs made their historic and unprecedented trip to Washington D.C.
Also being kept hidden from the American people about these momentous issues by their leftist Deep State aligned political and mainstream media operatives, this report concludes, is that this CrowdStrike document was descended upon, examined and dissected by hundreds of highly-trained former CIA, FBI, National Security Agency, US military intelligence officers, technical experts, and analysts from the powerful Veteran Intelligence Professionals for Sanity organization whose yearly reports go directly to the White House desk of every President—and who, in their exhaustive July 2017 memorandum to President Trump, shockingly exposed the greatest crime of deception ever perpetrated on the United States with their initial declaration and timeline evidence stating:
Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computer.
After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device.
The Time Sequence
June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”
June 14, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.
June 15, 2016: “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”
We do not think that the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.
The Key Event
July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is much faster than what is physically possible with a hack.
It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device.
“The truth is incontrovertible. Malice may attack it, ignorance may deride it, but in the end, there it is.”
October 8, 2019 © EU and US all rights reserved. Permission to use this report in its entirety is granted under the condition it is linked to its original source at WhatDoesItMean.Com. Freebase content licensed under CC-BY and GFDL.
[Note: Many governments and their intelligence services actively campaign against the information found in these reports so as not to alarm their citizens about the many catastrophic Earth changes and events to come, a stance that the Sisters of Sorcha Faal strongly disagree with in believing that it is every human being’s right to know the truth. Due to our mission’s conflicts with that of those governments, the responses of their ‘agents’ has been a longstanding misinformation/misdirection campaign designed to discredit us, and others like us, that is exampled in numerous places, including HERE.]
[Note: The WhatDoesItMean.com website was created for and donated to the Sisters of Sorcha Faal in 2003 by a small group of American computer experts led by the late global technology guru Wayne Green(1922-2013) to counter the propaganda being used by the West to promote their illegal 2003 invasion of Iraq.]
[Note: The word Kremlin (fortress inside a city) as used in this report refers to Russian citadels, including in Moscow, having cathedrals wherein female Schema monks (Orthodox nuns) reside, many of whom are devoted to the mission of the Sisters of Sorcha Faal.]