By Roger Stone
Crowdstrike, the tech-security firm who claimed that a glitch in their systems caused a virtual meltdown of all U.S. airlines, many banks, retailers, the rail system, and other U.S. entities–causing absolute chaos on the day after the Republican National Convention closed, is well known to me. Based on everything I know and everything I present here, Crowdstrike cannot be trusted in any of their public claims, and there is a possibility that this major outage was staged to distract attention from troubling details emerging regarding the attempted assassination of President Donald Trump, the rapid deterioration of President Joe Biden that led him to withdraw from the presidential race this past Sunday, and the afterglow of a very successful Republican National Convention.
Crowdstrike was at the center of the Russian Collusion hoax in 2016 after the Democratic National Committee hired the firm to investigate the purported hacking of the DNC servers during the Trump / Clinton presidential election. The company refused to turn over the full report of the DNC computer intrusion to the FBI, or my attorney’s. The fact that they were responsible for the recent computer “glitch” that helped Biden dodge the negative media coverage he was getting, and caused such big problems for people at the RNC convention, seems very coincidental, and should trigger a detailed investigation into the company, their latest software update – and the lies they have told the public in the past.
People immediately thought such a widespread computer outage must be a targeted terrorist attack on our nations infrastructure, or the beginning of the apocalypse – or World War III, but after the smoke cleared, it was clear that the cyber security firm, Crowdstrike, was responsible.
Trump has called-out Crowdstrike in the past for being a tool of the Democrat Party, and for helping the DNC promote the false Russian Collusion hoax during the 2016 presidential election, so when it was revealed that the company was behind the recent computer outages, during the RNC convention, many people in the MAGA movement were immediately suspicious.
The company claims the software glitch was an innocent mistake, but Crowdstrikes history of lying to the public during other supposed cyber attacks is reason to question their assessment. Since their leadership comes from the upper echelon of the FBI, it is doubtful that anything will be done to quell their disinformation.
Crowdstrikes main product is a program code-named Falcon. The software “provides real-time indicators of attack, hyper-accurate detection and automated protection” from cybersecurity threats.
Earlier in the week, Crowdstrike announced that it would be updating its Falcon software, saying it would provide “unprecedented speed and precision” to detect security breaches, but on Friday, millions of people were unable to work, travel or get government services or assistance after Crowdstrike implemented the automatic software update that crashed their customers computers – and left many of the participants of the Republican National Committee convention stranded for days after their flights were canceled by the widespread computer outages.
In a statement about the outage, a CrowdStrike spokesperson said there was likely an issue with the Falcon cybersecurity software update that caused their clients computers to crash. It’s been reported that the mass computer meltdown has affected over 8.5 million computers.
Officials with the Department of Justice and the Treasury Department told POLITICO that their computer systems were also affected, and the Social Security Administration said it had to close its offices to the public. Former White House national cyber director, Kemba Walden, said it was fair to assume that other federal agencies were also impacted due to the widespread usage of Microsoft Windows and the Crowdstrike software. Electric vehicle maker Tesla temporarily halted production at some of its manufacturing facilities on Friday. Elon Musk wrote on X that the outages had caused a “seizure” to the automotive supply chain. He said, “We just deleted Crowdstrike from all our systems.”
Fixing the infected computers will be a time consuming and expensive process for the thousands of business who will have to hire IT technicians to debug their computers. Companies that do not have in-house IT staff may have to wait for weeks before they can get someone to navigate their encryption, remove the corrupted file, and get their computers back online. The financial impact of the worldwide crash of Microsoft computers must be in the billions. It has caused immeasurable harm and expense to a large percentage of the American population.
Crowdstrike was founded in 2011, in Silicone Valley, by two McAfee anti-virus company co-workers, Dmitri Alperovitch and George Kurtz, with funding from Google and other Silicone Valley venture capitalists. Kurtz was Chief Technology Officer at McAfee until he resigned soon after his team installed a faulty security update, in April of 2010, which caused millions of computers worldwide to crash and enter a continuous reboot cycle. The McAfee software ‘glitch’ is eerily similar to the Crowdstrike software ‘glitch’ – and it also required a complicated manual fix. The incident cost McAfee so much money that it was forced to sell the company to Intel.

Crowdstrike founder Dmitri Alperovitch was born in Russia but immigrated to the United States when he was 13, after his father, a nuclear physicist, fled their homeland. Alperovitch now spends much of his money and effort promoting the Ukrainian war and attacking Russia wherever he can. He was, until recently, a Senior Fellow at the Atlantic Council, an organization focused on destabilizing the Russian Federation. The Atlantic Councils stated objective is to help Ukraine defend itself against Kremlin aggression.
Did Crowdstrike lie about North Korea being behind the SONY hack?
In 2014, right before SONY Released the film, The Interview, staring Seth Rogan, about a fictional CIA plot to kill Kim Jong Un, North Korea’s supreme leader, Crowdstrike issued a report claiming North Korea hacked into SONY’s computers and downloaded files of employee salaries, internal communications, evaluations, social security numbers and other personal and embarrassing information that was posted on the internet, as retribution for Sony releasing the film.
The Washington Post reported, “The attack brought Sony, one of Hollywood’s biggest studios, to a near-standstill last week, forcing employees to use paper and pens instead of their computers. Hackers also deleted files from hard drives, uploaded several unreleased films to the Internet and leaked sensitive personal information regarding thousands of SONY employees.”
Crowdstike made the ridiculous claim that Kim Jong Un was the main suspect of the SONY hack because the North Korea government was outspoken about their displeasure with the movie being released.
Another preposterous claim by Crowdstrike was that North Korea was a suspect because the hacker downloaded a few movies and distributed them to the public on the internet, but did not release The Interview.
Crowdstrike also claimed that the North Korean government was using proxies to send their malware, as proof the North Korea was behind the hacks. Proxies are people or computer servers that are being used by an anonymous source, to obfuscate their real identity. All hackers use a proxy server and spoof their IP addresses.
Crowdstrike additionally claimed in their report that the SONY hacker used IP addresses that were used to distribute malware from North Korea to South Korea in the past, and that was proof that they were behind the hack. But no real hacker would ever use their own IP address to send an online attack or do a hack. It would be like a bank robber giving the bank their home addresses. Could it be possible that the cybersecurity firm, Crowdstrike, has never heard of IP spoofing?
Crowdstrike argued that another “indicator” they used to determined that North Korea was responsible for the hack was because the malware code that was used in the SONY hack had similarities to other online hacks that had been attributed to North Korea in the past. They said they cannot reveal any other information to the public, due to security issues, but there are many cyber security experts that disagree with their assessment.
Jason Healey, director of the Atlantic Council’s Cyber Statecraft Initiative, and a colleague of Dmitri Alperovitch, stated that the hack sounds like one of SONY’s own movie plots. He said “As crazy as the North Koreans are, most of us would have completely dismissed this as a ridiculous plot for a Hollywood movie.” He is correct. Most people who understand computers do not believe the Crowdstrike report. None of their ‘evidence’ is proof on anything. Anyone who understands computers realizes the Crowdstrike report is a sham.
Cloudflare principle security researcher Mark Rogers was interviewed by PBS about the SONY hack and he was very skeptical about the validity of the Crowdstrike report. He said, “the biggest problem with this is that a lot of this information is based on evidence that is not accessible to a lot of folks. So if you look at the information that the FBI put out you will notice, on it’s own, it’s largely speculative and it is not backed up by any real solid evidence. It is very difficult to be swayed by an argument when someone says to you that we have absolute proof because we have signal intelligence that tell us this is it, but we can’t tell you about it. When we talk about putting the blame on a foreign government we have to be pretty careful about it. I’m no fan of the North Korean regime, and to be honest, if they are found to be responsible I hope this gets hung around their neck, but I think we have to make sure that we have absolute solid evidence and I believe that evidence should be dealt with in a transparent way.”
Stephen Colbert jokingly proclaimed on his TV show that the SONY hacker “has to be North Korea. The only other person with that capability is a 12-year-old with BitTorrent.”
Did Crowdstrike lie about the Russians hacking Ukraine?
In 2016, Crowdstrike released a startling report that claimed a Russian Intelligence Services (GRU) affiliated group, code-named Fancy Bear, had hacked a Ukrainian military app (ArtOS) that helps Ukrainian soldiers, operating Howitzer cannons, pinpoint their targets quicker. The report said the Russians are using the hacked app to kill Ukrainian soldiers, but the Crowdstrike report was confirmed to be full of lies.

The maker of the Ukrainian military app, Yaroslav Sherstyuk, called the company’s report “delusional.” He said Crowdstrike never even contacted him, before or after its report was published.
Pavlo Narozhnyy, a technical adviser to Ukraine’s military, said that is was theoretically possible that the app could have been compromised – but he insisted that any infection of that magnitude would have been detected. Narozhnyy claims he personally knows hundreds of gunmen in the war zone and none of them have mentioned any troop deaths that have been attributed to the app.
The International Institute for Strategic Studies, a world-leading authority on global security, political risk and military conflict, complained that Crowdstrike had misinterpreted their data on war casualties. The institute flatly rejected the assertion that there were artillery combat losses due to the app being hacked. When asked about their data being used in the Crowdstrike report, the institute said, “The Crowdstrike report uses our data, but the inferences and analysis drawn from that data belong solely to the report’s authors. The inference they make that reductions in Ukrainian D-30 artillery holdings between 2013 and 2016 were primarily the result of combat losses is not a conclusion that we have ever suggested ourselves, nor one we believe to be accurate.”
The Crowdstrike report was so flawed that The Ukrainian Ministry of Defense was forced to issue a statement saying artillery losses are “several times smaller than the number reported by Crowdstrike and are not associated with Russian hacking.”
Although the Crowdstrike report was debunked by the Ukrainian government, think tanks and politicians familiar with the war – the media still reported the fake Crowdstrike story.
In a December 22 story by The Washington Post, that was intended to gain support for the Ukraine war, Alperovitch said, “The fact that they would be tracking and helping the Russian military kill Ukrainian army personnel in eastern Ukraine and also intervening in the U.S. election is quite chilling.”
Crowdstrike founder Dmitri Alperovitch tried to spin a fanciful tale to reporters of how the same group of Russian agents who hacked the Ukrainian Military app have also, coincidentally, hacked the DNC and were trying to give that info to Wikileaks, though me, to undermine the Clinton campaign. That story was also a lie.
Did Crowdstrike lie about the Russian Collusion Hoax?
The raid on my home was a travesty of justice. There was no underlying crime so there could be no overlapping crime, and the justice department knew it but raided my home anyway. It was early in the morning on January 25th, 2019, when a full tactical squad of more than 12 FBI goons stormed the house with a search warrant to confiscate my computers, electronic devices and other personal belongings. While fighting the charge of lying to Congress, about a crime that did not exist, my attorney requested the unredacted Crowdstrike report that supposedly proved that the Russians were behind the DNC hack.
The search warrants issued in my case, and other related Russian Collusion hoax cases, were predicated on their being evidence that the Russians hacked the DNC servers, and then gave those stolen emails to WikiLeaks, through me. My lawyers filed a motion in court challenging the notion that the Russians hacked the DNC and requested to see the unredacted Crowdstrike Report, which was the only direct piece of evidence tying the Russians to the DNC hack. What we found out was that the FBI never took possession of the DNC servers or computers – nor did then even analyze them. If fact, the FBI didn’t even get a full report from Crowdstrike on the details of the hacking. Instead, Crowdstrike provided the feds with a redacted copy of their written report that is filled with circumstantial evidence that the Russians hacked the DNC – with no real proof.
Crowdstrike said they were contacted by Hillary Clinton’s campaign lawyer, Michael Sussmann, on May 4, 2016, about a possible computers breach of the DNC servers. Crowdstrike installed their Falcon software on the infected servers the very next day and claim they immediately detected signs that the Russians were the perpetrators. Sussmann just happens to be the person who hired Fusion GPS to hire Christopher Steele, to create the fake Trump–Russia dossier on behalf of the Clinton Campaign and DNC. Sussmann was also responsible for orchestrating the fake story about Russia’s Alpha Bank being connected to Trump.
For some strange reason, Alperovitch and Crowdstrike President Shawn Henry spent six weeks “monitoring” the hackers movements who they claimed were found roaming freely in the DNC servers, before expelling them on June 10-12. It seems implausible that they would let the Russians remain in the DNC database for six weeks.
My defense lawyers filed a motion to compel the Justice Department to produce unredacted versions of Crowdstrike’s reports to the DNC about Russian hacking, but the government told the judge that they did not have an unredacted copy.
Hillary Clinton’s attorney, who was representing the DNC, also refused to turn over the unredacted Crowdstrike report due to attorney-client privilege – and the judge agreed.
In the redacted DNC report, Crowdstrike used the same flawed reasoning that they have used in previous cyber investigations, to incorrectly assign blame of a hacking incident by analyzing “indicators” of the types of malware, techniques, and patterns of behavior that certain hackers use. This kind of ‘analysis’ seems to be based on pure speculation, not science or data.
Crowdstrike had blamed the alleged DNC hack on the Russians because they have apparently used the same or similar type of malware in the past that Crowdstrike claims to have found on the DNC servers. But this malware is also known to have been used by actors unaffiliated with Russian intelligence, so their conclusion that the Russians were behind the theft of DNC files, because ‘Russian’ malware was detected, is a false indicator.
Another invalid indicator that Crowdstrike used to try to confirm that the Russians were behind the hack was based on the time that the malware was sent, which corresponded with someone working normal business hours in Moscow. This is another false indicator that can easily be manipulated by a real hacker.
Dmitri Alperovitch seems to be picking perpetrators by pure speculation and his own personal feelings. He stated in an interview that there was no doubt Russia was responsible for the DNC hack because he can’t think of any other actor who would want to do it. He said, “There’s no plausible actor that has an interest in all those victims other than Russia.” No wonder his ‘indicator’ system for finding hackers is flawed.
After years of wrangling over the hidden Crowdstrike report, it was finally revealed in testimony in front of lawmakers that the FBI never did an independent examination of the DNC servers. Crowdstrike and the DNC only permitted the Department of Justice and FBI to see a redacted draft copy of their report on who hacked the DNC.
Shawn Henry, who once led the F.B.I.’s cyber division under Robert Mueller, and is now president of Crowdstrike Services, admitted under oath before the House Intelligence Committee that the FBI never examined the servers at the DNC. The FBI just accepted Crowdstrike’s conclusions, from people who are affiliated with the DNC and the Hillary Clinton campaign, that the DNC was hacked by the Russians. This launched the biggest political witch hunt in a generation, without any independent confirmation, and based on nothing more than invalid indicators and the hunch of a Russian born serial liar, and his colleagues from the FBI.