We recommend you watch the short video at the bottom to get the background to fully understand why the FBI hired Crowdstrike. Starting at the end sometimes helps us understand the beginning.

The biggest question everyone has in respects to the alleged hack of the DNC (and RNC) servers is why the FBI never got the server. In an article titled “Did Perkins Coie BLOCK access to DNC & HRC server?” I explained the legal gymnastics that demonstrated the lengths they are will to go to challenge it in the courts, which should have held NO WATER. There is no excuse that the FBI did not examine the DNC server or take possession of it.

In fact, you are about to realize that the FBI Midyear Exam had one purpose – Exonerate Hillary Clinton. During the Fourth of July weekend, James Comey made a public statement in regards to Hillary’s emails. He began his presser on JULY 5, 2016 in a tone and using verbiage that was reminiscent of Bill Clinton’s, “I did not have sexual relations with that woman” statement. Notably, the FBI released PAYMENT to CROWDSTRIKE two days later.

This will be an unusual statement in at least a couple ways. First, I am going to include more detail about our process than I ordinarily would, because I think the American people deserve those details in a case of intense public interest. Second, I have not coordinated or reviewed this statement in any way with the Department of Justice or any other part of the government. They do not know what I am about to say.

James Comey Statement July 5, 2016

The statement BELOW by Comey is by FAR the most important one, and can be fully appreciated by watching the link to the YOUTUBE explanatory video (in this article) I have created for you showing a timeline of who they were looking for, what lengths they went to in order to find them, and WHY. You will be able to UNDERSTAND why they never revealed they had HIRED Crowdstrike, and what was so important about those emails…It was not just emails, it was a process of over eight years of OBFUSCATING truth.

The FBI also discovered several thousand work-related e-mails that were not in the group of 30,000 that were returned by Secretary Clinton to State in 2014. We found those additional e-mails in a variety of ways. Some had been deleted over the years and we found traces of them on devices that supported or were connected to the private e-mail domain. Others we found by reviewing the archived government e-mail accounts of people who had been government employees at the same time as Secretary Clinton, including high-ranking officials at other agencies, people with whom a Secretary of State might naturally correspond.

James Comey Statement July 5, 2016

In his statement, Comey began to defend the deletion of emails and claimed Hillary didn’t use a Gmail account – which she did. He claimed the emails were lost, but they know they weren’t – and they quickly realized in 2016 that the people who may have the emails or sourced the emails are the same individuals that tipped Congress off. This is why John Brennan spied on Congress and the Senate, this is why they “hacked” the OPM and fed the data to Clearforce. They had to assess every single person on their database that would be flagged as a potential capable or part of a group of people that could have done it. All the data was fed EXCEPT for those John Brennan sealed (bleached) under “State Secret Privilege”.

To be clear, this is not to suggest that in similar circumstances, a person who engaged in this activity would face no consequences. To the contrary, those individuals are often subject to security or administrative sanctions. But that is not what we are deciding now.

James Comey Statement July 5, 2016

From my intimate knowledge of John Brennan’s methods, DNC and RNC servers were not really hacked. In fact, I explained that on my radio show right before the “Twitter” hack, almost like I knew. How do I know it was NOT really a hack? Numbers and pending criminal investigative subpoenas. Twitter was being served criminal investigative subpoenas they could not deny, and it has nothing to do with the content in DMs or tweets – it has EVERYTHING to do with DEVICE IDs. Do you think that Hillary Clinton really tweets? Joe Biden? John Brennan? Your device ID can provide your identity, timestamps, and geolocation stamps. A pen register is issued on a device not a phone number. That would include surveillance of texts (including Signal), social media, emails, etc. How else do I know? Seventh Floor MSM know that 130 is an indicator of an inside job. Passport hack “…along with 130 celebrities..”, Hollywood hack “…hacked 130 emails of celebrities”, “Twitter hack”,…130 Twitter accounts…”.


Crowdstrike was HIRED by the FBI for two reasons:

  1. Deleting any emails of Hillary Clinton that were still alive on servers that could be subpoenaed for public interest
  2. Framing Russia to discredit any information that they might leak and claim it’s manufactured
  3. *** This was a by-product linking Russia to President Trump when they realized the “whistleblowers” of 2003-2012 may be providing him information on their crimes.

For the techie fanatics to understand how the server imaging was determined, one must go back to Operation Olympic Games when the CIA was tasked to create a tool to gather intel without being seen. It is alleged that it was “replicated” by unknown individuals and named duQu, and without evidence the Cybercommunity deemed as RUSSIAN. Something many don’t know is that CONTRACTORS who create a product OWN the intellectual property to that product, hence why Patrick Bergy has been filing lawsuits against General Jones and former CIA Director General Hayden for stealing his tech and profiting off the weapon that was intended for our enemies that is being USED against the people. As it’s predecessor Stuxnet, duQu lives on PORTABLE devices of HIGH capacity. Hard Drives that were portable and or high capacity SD drives.

On July 8, 2015 the FBI hired Crowdstrike for an “URGENT” critical project. A staffer for John McCain had entrusted us with this information in October of 2016. We had met discussing Harry Reid’s discussions with Mother Jones about the dossier and the recent FISA court participants pertaining to that. Crowdstrike was HIRED and PAID to FIND all of Hillary Clinton’s MISSING emails that trace back to senders and receivers on the DNC and RNC servers, and those that may or may not have been forwarded, at least that was what we were told. In fact John McCain, Lindsey Graham, and others had discussed openly the possibilities of the Ukrainian MOU’s (Memorandum Of Understanding) coming to surface and how they would place someone in the NSA to flag and monitor. That someone is evidently Robert Storch.

After combing through Purchase Orders paid with Federal Tax dollars we discovered this :

Armed with the PIID, we were able to find the details of this purchase.

Below are screenshots of the Purchase Order: PIID: DJF151200P0007649. It indicates that the FBI paid Crowdstrike $150,000.00 U.S. Federal Taxpayer dollars on July 7, 2016, 2 days after disgraced former FBI Director Comey “exonerated” Hillary Clinton.

The FBI and the Justice Department NEVER gave a reason as to WHY they accepted the DNC and RNC “report” by Crowdstrike. They never even mentioned that they had hired them. They also never mentioned that they had hired them with the scope of finding and obliterating Hillary Clinton’s emails. They never mentioned how they had Crowdstrike attempt to determine WHO and WHERE the information was sent to from the corrupt IMAGING drives. If you label things RUSSIAN then you can bury it under State Secret Privilege – the most abused tenant in our intelligence community. That is where things are incinerated – forever.

Why did the FBI not tell us they had HIRED Crowdstrike?

The FBI could have come clean and told the world they were working with Crowdstrike and this is why they “TRUSTED” them. They could have come clean, but they didn’t. If Crowdstrike was to assist in locating, tracking, and eradicating Hillary Clinton’s emails, and to find and locate WHERE the data was uploaded to via corrupt software on the storage devices, that would make them INELIGIBLE to be the company to analyze the hacks of both the DNC and RNC servers. There would be no checks and balances. In fact, the testimony of Mr. Tamene tells you exactly how they “groomed” him for access and set him up. Imagine, no evidence was found of “hacking” at the DNC until Crowdstrike was hired? Read the transcript for yourself. If you are wondering who the FBI agent involved in this is, wonder no more. Peter Strzok was involved in everything. He was and has always been a CIA asset in the FBI. Imagine how many more exist…even today.

It is apparent from the Interview Transcript of Yared Tamene Wolde-Yohannes (August 30, 2017) a story unfolds where an FBI agent groomed him, asked him for emails and headers, then offered him false and highly redacted information to determine the location and or existence of certain emails.


WHY they hired Crowdstrike and why they tried to cover Hillary Clinton’s emails was because they were still looking for the creators of Stux and now duQu. They had obtained Stux under Bush – and used it during the Obama administration to “spy” and gather data, but they were aware that someone else was looking during the 2008 presidential election campaigns. This is WHY Brennan was spying on Congress.

Here is the explanatory video of what lengths they went to in order to hide the truth, and why they are so hell-bent on REMOVING President Trump from office. The DNC hack wasn’t about President Trump – the Russia narrative was created in order to blame an enemy, then claiming what they release from their findings as false information. Framing President Trump was a byproduct of their narrative and because they realized that maybe those within the intelligence community who may still have all that information would give it to him. The breadcrumbs of TRUTH are found in the State Secrets Privilege files (if there are any left) and General Flynn would have blown the top off. Imagine just how many are still sitting in positions bleaching, burning, and altering information. If they can monitor the world who is to say that no one is monitoring them?


 Like my work you can tip me or support me via PAYPALVENMO and CASH APP or support me on Subscribestar!

100% People Funded

Thank you for your support!



Leave a Reply

Sign Up for Our Newsletters

Subscribe to newsletters to get latest posts in your email.