View allAll Photos Tagged Crowdstrike,

via

 

(Consortiumnews.com)

 

In a memo to President Trump, a group of former U.S. intelligence officers, including NSA specialists, cite new forensic studies to challenge the claim of the key Jan. 6 “assessment” that Russia “hacked” Democratic emails last year.

 

MEMORANDUM FOR: The President

 

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

 

SUBJECT: Was the “Russian Hack” an Inside Job?

 

Executive Summary

 

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.

 

Director of National Intelligence James Clapper (right) talks with President Barack Obama in the Oval Office, with John Brennan and other national security aides present. (Photo credit: Office of Director of National Intelligence)

 

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

 

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see hereand here].

 

Independent analyst Skip Folden, a retired IBM Program Manager for Information Technology US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.

 

The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.

 

NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].

 

Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”

 

Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

 

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

 

-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and

 

-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”

 

* * *

 

Mr. President:

 

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justfy” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.

 

Secretary of State Colin Powell addressed the United Nations on Feb. 5. 2003, citing satellite photos which supposedly proved that Iraq had WMD, but the evidence proved bogus.

 

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

 

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.

 

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

 

Copied, Not Hacked

 

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

 

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”

 

Democratic presidential nominee Hillary Clinton at the third debate with Republican nominee Donald Trump. (Photo credit: hillaryclinton.com)

 

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

 

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

 

The Time Sequence

 

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

 

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

 

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

 

We do not think that the June 12 & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

 

The Key Event

 

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack.

 

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.

 

“Obfuscation & De-obfuscation”

 

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

 

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

 

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.

 

WikiLeaks founder Julian Assange at a media conference in Copenhagen, Denmark. (Photo credit: New Media Days / Peter Erichsen)

 

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

 

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

 

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

 

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

 

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review.

 

Putin and the Technology

 

We also do not know if you have discussed cyber issues in any detail with President Putin. In his interview with NBC’s Megyn Kelly, he seemed quite willing – perhaps even eager – to address issues related to the kind of cyber tools revealed in the Vault 7 disclosures, if only to indicate he has been briefed on them. Putin pointed out that today’s technology enables hacking to be “masked and camouflaged to an extent that no one can understand the origin” [of the hack] … And, vice versa, it is possible to set up any entity or any individual that everyone will think that they are the exact source of that attack.”

 

“Hackers may be anywhere,” he said. “There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia. Can’t you imagine such a scenario? … I can.”

 

Full Disclosure: Over recent decades the ethos of our intelligence profession has eroded in the public mind to the point that agenda-free analysis is deemed well nigh impossible. Thus, we add this disclaimer, which applies to everything we in VIPS say and do: We have no political agenda; our sole purpose is to spread truth around and, when necessary, hold to account our former intelligence colleagues.

 

We speak and write without fear or favor. Consequently, any resemblance between what we say and what presidents, politicians and pundits say is purely coincidental. The fact we find it is necessary to include that reminder speaks volumes about these highly politicized times. This is our 50th VIPS Memorandum since the afternoon of Powell’s speech at the UN. Live links to the 49 past memos can be found at https://consortiumnews.com/vips-memos/.

 

FOR THE STEERING GROUP, VETERAN INTELLIGENCE PROFESSIONALS FOR SANITY

 

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA’s Signals Intelligence Automation Research Center

 

Skip Folden, independent analyst, retired IBM Program Manager for Information Technology US (Associate VIPS)

 

Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

 

Larry C Johnson, CIA & State Department (ret.)

 

Michael S. Kearns, Air Force Intelligence Officer (Ret.), Master SERE Resistance to Interrogation Instructor

 

John Kiriakou, Former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

 

Linda Lewis, WMD preparedness policy analyst, USDA (ret.)

 

Lisa Ling, TSgt USAF (ret.) (associate VIPS)

 

Edward Loomis, Jr., former NSA Technical Director for the Office of Signals Processing

 

David MacMichael, National Intelligence Council (ret.)

 

Ray McGovern, former U.S. Army Infantry/Intelligence officer and CIA analyst

 

Elizabeth Murray, former Deputy National Intelligence Officer for Middle East, CIA

 

Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)

 

Cian Westmoreland, former USAF Radio Frequency Transmission Systems Technician and Unmanned Aircraft Systems whistleblower (Associate VIPS)

 

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

 

Sarah G. Wilton, Intelligence Officer, DIA (ret.); Commander, US Naval Reserve (ret.)

 

Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat

 

fromhttps://stonecoldtruth.com/intel-vets-challenge-russia-hack-evidence/ rogerstone1.blogspot.com/2017/08/intel-vets-challenge-rus...

Photo was taken on the Crowdstrike 24 hours of Spa racing at Spa-Frnachorchamps

George Kurtz / Colin Braun

Crowdstrike / DXDT Racing Mercedes-AMG GT3

Garage 59

CROWDSTRIKE 24 HOURS OF SPA

Photo was taken on the Crowdstrike 24 hours of Spa racing at Spa-Frnachorchamps

Mathieu Jaminet, Matt Campbell, Frédéric Makowiecki

Dmitri Alperovitch

Co-Founder and Chief Technology Officer, CrowdStrike

 

Rachael Falk

CEO, Cyber Security Cooperative Research Centre

 

Adam Hickey

Deputy Assistant Attorney General of the National Security Division, U.S. Department of Justice

 

Gaurav Keerthi

Assistant Chief Executive, Cyber Security Agency of Singapore

 

Madan Oberoi

Executive Director, Technology and Innovation, INTERPOL

2025 CrowdStrike 24 Hours of Spa (Belgium)

2025 GT World Challenge

Round 5 // Endurance Cup - June 24th - 29th, 2025

Andrea Caldarelli, Matteo Cairoli, Mirko Bortolotti

GT America Road America 2022

I’ve been to a company function last week. Thankfully a day before the Crowdstrike debacle. My hotel room had many windows and I couldn’t resist making some night shots.

George Kurtz, Ben Hanley, Matt McMurry, Esteban Gutierrez, Crowdstrike Racing by APR

via

 

FRUSTRATED THAT THE HOUSE AND SENATE INTELLIGENCE COMMITTEES CAN’T FIND ANY PROOF OF TRUMP-RUSSIAN COLLUSION, OBAMA AND THE DEMOCRATS ARE SUING THE TRUMP CAMPAIGN AND MYSELF IN AN EFFORT TO HARASS AND DISTRACT

 

By Roger Stone

 

Yesterday I accepted service from an Obama controlled left wing front group called “Protect our Democracy”, who is suing the Trump campaign and myself, claiming that I violated the civil rights of three DNC donors who were identified by WikiLeaks. This is based on the false premise that I colluded with the Russians to hack the DNC email servers and deliver the material to Julian Assange.

 

Ironically, the lawsuit for invasion of privacy contained my home address in the caption that was posted online and emailed to virtually every reporter in America. Frankly I am tired of the death threats and daily vituperation my family is subjected to on social media and the net but I’ll never stop speaking out.

 

This ridiculous lawsuit offers no evidence nor proof of these wild allegations but merely strings together a series of publicly reported falsehoods regarding my contacts and alleged advance knowledge of the Wiki Leaks disclosures. It’s actually hard to believe that any reputable lawyer would put their name on this preposterous lawsuit and not realize that they are courting sanctions.

 

The left knows that any time and energy I have to spend to defend this bogus lawsuit is focus I cannot put on defeating the Deep State Coup D’état now taking place with the Generals seizing control of the White House and Robert Muller as the designated Lord High Executioner. This lawsuit is designed to be a pain in the ass, a distraction and an absurd abuse of the Judicial process.

 

The lawyers putting their name on this piece of crap include a former Federal Judge and several partners of prestigious white-shoe law firms. I can predict that each of them will be subject to complaints to their respective State Bars over this frivolous abuse of due process. These complaints cannot just be dismissed and hearings and bar investigation will be real.

 

It is notable that this nuisance lawsuit treats the claim that the DNC servers were hacked as an indisputable fact when in fact, only last week a number of experienced intelligence agency veterans came forward to say that the technological evidence indicates that the purloined material was not hacked at all but was most likely loaded to thumb drives and removed from the premises.

 

The British Diplomat Craig Murray publicly claimed that he received this data in a parking lot near Washington’s American University and passed it on to Wiki Leaks. Julian Assange has publicly confirmed this. There has been widespread speculation than the person who handed the thumb drive to Murray is none other than Seth Rich.

 

Why do all of those who think the polite thing to do is to stop asking who murdered Seth Rich ignore the fact that Julian Assange publicly offered a $25,000 reward for information that led to the capture of Rich’s murderer? Although Assange has declined to confirm that Seth Rich was indeed a source, it is notable that he has posted the links to numerous third-party stories that make this claim.

 

The Obama funded lawsuit relies upon the hacking of the DNC, and is therefore based on something that actually never happened. Isn’t it curious that DNC never let the FBI examine the so called hacked email servers? Instead the DNC used a private contractor, CrowdStrike to perpetuate an entirely false narrative about Russians hacking the DNC.

 

It doesn’t matter how many mindless Intelligence Agency bureaucrats or idiotic members of the House and Senate Intelligence Committees repeat the mantra “the Russians hacked the Democratic National Committee.” None of them can produce any actual proof that this happened. Neither can the lawyers behind this ludicrous harassment lawsuit.

 

Their lawsuit is a steaming bowl of shit. Post hoc ergo propter hoc, “after this, therefore because of this” is a fallacy as a legal premise. That I had some knowledge of the events that unfolded does not in any way prove that I made those things happen or that I colluded with agents of the Russian State or anyone else to tip the election to Donald Trump.

 

This poorly drafted harassment lawsuit recycles again the false claim that my tweets somehow prove that I had advance knowledge of the hacking of John Podesta’s email simply because I predicted that his business dealings with his brother Tony and the Clintons with the oligarchs around Putin were going to get scrutiny. In fact, the Uranium deal, the Joule banking deal and the lucrative Gazprom contract were all reported by the mainstream media in the fall.

 

Note I tweeted it the day my friend Paul Manafort stepped down over trumped up charges that he had done something improper in the campaigns of Victor Yanukovych. I knew from an opposition report by Dr. Jerome Corsi that I had read on August 1st, that Podesta was in tight with Putin and had money laundered funds from the Russian Mafia. I even wrote about it.

 

WikiLeaks themselves posted on their Twitter feed on July 21st the bold declaration that they had the goods on Hillary Clinton and that they would publish them in October. I most certainly had an independent source, a journalist who knows Assange confirmed that the tweet was accurate. I have at various times described this journalist as a “go between” “emissary” and “mutual friend.” Throughout August and September this journalist continued to assure me that WikiLeaks had and would publish devastating information that would severely harm Hillary Clinton’s prospects in the election. He was right.

 

None of this, however, proves that I had advanced knowledge of the content, format or source of any of the material, nor did I have any knowledge of where it came from. I speculated that much of the material would be related to the Clinton Foundation which actually turned out to be partially true.

 

Those who criticized WikiLeaks and Julian Assange for publishing material from whistle blowers or classified material are strongly urged to read the court’s decision in USA v. New York Times in The Pentagon Papers case. The Washington Post routinely publishes purloined material that’s classified. Bob Woodward has made a career of it. Julian Assange is a journalist who belongs to no party or ideology. He clearly sees the evil of the Deep State and the bi-partisan duopoly that has managed America for the last 30 years and presided over the erosion of our civil liberties and the destruction of our economy.

 

CIA Mike Pompeo continues to smear Julian Assange as a “Russian asset” which is false. Sources tell me that the Justice Department has convened a secret Grand Jury in order to secure an indictment against Julian Assange, although what law he has allegedly broken is not clear. It’s a slippery slope when you start jailing journalists.

 

This liberal hit job lawsuit against me and the Trump Campaign also recycles the misinformation about a now public exchange with Guccifer 2.0 a hacker the Intelligence Agency insists, again without proof that he is a Russian cut out. In fact, there is direct evidence showing that the computer program allegedly used by Guccifer 2.0 is actually registered to a Democratic National Employee. The simple fact is that my only exchange with Guccifer 2.0 was over the direct message function of Twitter and came almost six weeks after Wikileaks published the DNC material which Guccifer claims he hacked. Therefore, collusion by me would be impossible without a time machine. Any inference that this constituted collusion is disproved by the timing, content and context of the actual exchange

 

I have released the entire exchange publicly and it is banal and innocuous. In fact, when Guccifer 2.0 sends me a link to some kind of vote targeting program, which I later learned was stolen by some Florida Political Consultant, I entirely disregarded it as “pretty standard” and forwarded it to no one. He asks how he can help me and I ignore the offer.

 

Factcheck.org which is funded by the Walter Annenberg Foundation confirmed that there was no evidence that I knew about the hacking of Podesta’s emails or that I had advance knowledge of the content of the WikiLeaks Clinton October disclosures. They correctly point out the “coincidence” that was footnoted by the timing of some of my tweets.

 

This lawsuit which the Obama’s “Project for Democracy” is actively using for fund raising merely recycles the demonstrably false claims of the buffoons on the House and Senate Intelligence Committees. The lawsuit itself proves less than nothing. It’s clear that the Democrats, frustrated by the failure of either Congressional Committee to find evidence of collusion between the Russians and the Trump Campaign, would now like use this baseless lawsuit to conduct a “fishing expedition” and distract me from the fight to Make America Great Again.

 

Unfortunately, I have no choice but to defend against the suit by retaining an attorney admitted to the DC Bar. The costs of a long-drawn-out harassment lawsuit are more than my family can bare when coupled with the ongoing legal costs of negotiations with the House and Senate Intelligence Committees, neither of whom want to allow me to testify in public for fear that I will humiliate them and expose the entire canard of Russian collusion. That’s why my friends have set up the Roger Stone Legal Defense Fund which you can find at: http://www.whoframedrogerstone.com/.

 

Sources:

 

www.whoframedrogerstone.com/

 

unitedtoprotectdemocracy.org/privacylawsuit/

 

www.philly.com/philly/news/politics/FactCheck-Misrepresen...

 

stonecoldtruth.com/russian-mafia-money-laundering-the-cli...

 

consortiumnews.com/2017/07/24/intel-vets-challenge-russia...

 

fromhttps://stonecoldtruth.com/who-framed-roger-stone/ rogerstone1.blogspot.com/2017/08/who-framed-roger-stone.html

041

Fortune Brainstorm Tech 2019

TUESDAY, JULY 16, 2019

Aspen, CO

 

12:45 PM

LUNCH ROUNDTABLES

CYBERSECURITY: PROTECTING THE INTERNET ECONOMY

The institutions and critical infrastructure upon which we depend are under endless siege by hackers, spies, and other adversaries. But there’s hope for defenders yet. Learn how key executives are coping with an onrush of threats.

Dmitri Alperovitch, CTO, CrowdStrike

Mike Brown, Director, Defense Innovation Unit, U.S. Department of Defense

Dorian Daley, Executive Vice President and General Counsel, Oracle

Tim Junio, CEO, Expanse

Moderator: Robert Hackett, FORTUNE

 

Photograph by Stuart Isett for Fortune Magazine

The #46 BMW M4 GT3 in action during the 2023 Spa 24 hours

MUNICH/GERMANY - JANUARY, 22: (L-R) Tom Upchurch (WIRED UK), Svitlana Zalishchuk (Ukraine), Safak Pavey (Republic of Turkey), Merle Maigre (NATO Cooperative Cyber Defence Centre of Excellence), Dimitri Alperovitch (Crowdstrike) in conversation at a panel discussion during DLD18 (Digital-Life-Design) Conference at the Bayerischer Staatsbank on January 22th, 2018 in Munich, Germany (Photo: picture alliance / Gandalf Hammerbacher) | Verwendung weltweit

Fireworks display during the Crowdstrike 24 hours of Spa.

1 2 3 4 6 ••• 77 78