Mikhail Naumovich Alperovitch (born 1951)

Partners - Married to Tatiana Alperovitch

Children - Dmitri Alperovitch (born b1980)

2017 article from State of the Nation

Source article : [HW0001][ GDrive ]

“If someone steals your keys to encrypt the data, it doesn’t matter how secure the algorithms are.” — Dmitri Alperovitch, founder of CrowdStrike

[...]

[Dmitri] Alperovitch and the DNC

After CrowdStrike was hired as an independent “vendor” by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called Falcon that monitors the networks of its clients in real time. According to Alperovitch, Falcon “lit up,” within ten seconds of being installed at the DNC. Alperovitch had his “proof” in TEN SECONDS that Russia was in the network. This “alleged” evidence of Russian hacking has yet to be shared with anyone.

[...]

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this “false-flag cyber-attack” on the DNC – or at least, Alperovitch “reported” there was an attack. The second hacker, the supposed Russian military (GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also had done “nothing” but observe.

[...]

Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike’s claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch’s suggestion of installing Falcon, the system that failed to stop cyberattacks at the DNC, on all congressional laptops.

Key Point: Once Falcon was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.

[...]

Dmitri – Front Man for His Father’s Russian Espionage Mission

After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America. Only the CIA can transform a Russian into an American with a top-secret clearance overnight.

We can see on Michael Alperovitch’s Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day.

Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. The cryptologist who assigns the encryption codes controls the system from that point on.

Key Point: Cryptologists are well known for leaving a “back-door” in the base-code so that they can always have over-riding control.

Michael Alperovitch essentially has the “codes” for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media. There is hardly any powerful agency or company that he has not written the “codes” for. One might ask, why do American companies and the U.S. government use his particular codes? What are so special about Michael’s codes?

Stolen Russian Codes

In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. All of the attempts to attack Russia’s military and intelligence agencies failed miserably. Russia laughed at Obama’s attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama’s cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia’s cyber-defenses were impenetrable due to the sophistication of their encryption codes.

Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. It was these very codes that he shared with the CIA on his first trip to America. These codes got him spirited into America and “turned into” the best cryptologist in the world. Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA.

KEY POINT: It is crucial to understand at this junction that the CIA is not solely working for America. The CIA works for itself and there are three branches to the CIA – two of which are hostile to American national interests and support globalism.

Michael and Dmitri Alperovitch work for the CIA (and international intelligence corporations) who support globalism. They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed “attackers” have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the “usual culprits” when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri’s “suspicions” are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri’s suspicions.

Michael Alperovitch – Russian Spy with the Crypto-Keys

Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures. Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA’s own private key, so that trust in the user key relies on one’s trust in the validity of the CIA’s key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market.

Michael’s past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni Novgorod – National Research University (UNN), also known as Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master’s Degree become a leading nuclear physicist who comes to “visit” America. In Michael’s Linked In page there is a long list of his skills and there is no mention of nuclear physics.

[...]

Michael Alperovitch’s Linked In Page

Education:

Gorky State University, Russia, MS in Applied Mathematics

Work History:

  • Sr. Security Architect : VT IDirect -2014 – Designing security architecture for satellite communications including cryptographic protocols, authentication.
  • Principal SME (Contractor) : DISA-Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014 – Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing.
  • Technical Lead (Contractor) : U.S. Department of the Treasury – 2011 – Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication.
  • Principal Software Engineer : Comtech Mobile Datacom – 2007-2010 – Subject matter expert on latest information security practices, including authentication, encryption and key management.
  • Sr. Software Engineer : TriCipher – 2006-2007 – Designed and developed security architecture for TriCipher Armored Credential Authentication System.
  • Lead Software Engineer : BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.
  • Principal Software Research Engineer : Pathfire, Inc. – 2001-2002 – Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.

[...]

1990 - Michael is sent to Maryland (USA) as part of a nuclear-safety training program for scientists (and "simulation program"

"In 1990, [Dmitri Alperovitch's] father was sent to Maryland as part of a nuclear-safety training program for scientists. Per Soviet custom, Dmitri stayed in the USSR to ensure that his parents didn't defect. [Dmitri Alperovitch] lived with his grandparents, and when his parents returned, after a year, they brought him his Brst computer, an IBM PC." Source : [HP0001][ GDrive ]

Upon his return, we discover that Mikhail Alperovitch was working on a nuclear power plant simulation project. See [HB0008][ GDrive ]

The company that Mikhail worked at was "most likely" going to be GSE Systems, Inc.

A Google Search - "nuclear power plant simulation maryland" leads us to the following results shown below, with two companies present. One is "WSC - Western Services Corporation", which was founded in 1995 (see https://scs.org/wp-content/uploads/2017/02/Session-3-Ashy-Oussama.pdf ) - Since Mikhail came to Maryland in 1990, it cant be WSC. It is was thus most likely the other company, which is GSE Systems, Inc. .

1990/1991 - Ukraine separates from Russia

See https://en.wikipedia.org/wiki/Ukraine#Independence

1992 (Early) - Returns to (Russia?) from Maryland, where he had worked on a nuclear power plant simulation project

  • "In the early 1992, when Michael Alperovitch returned from a trip to Maryland, where he had worked on a nuclear power plant simulation project" [HB0008][ GDrive ]

1994 - Michael "granted a visa to Canada"

Source : [HP0001][ GDrive ]

"In 1994, his father was granted a visa to Canada, "

1995 - Michael moves the Alperovitch family to Chattanooga, Tennessee (USA), to work at the TVA

Source : [HP0001][ GDrive ]

"In 1994, his father was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority. The work was not particularly challenging, so Michael began studying cryptography on the side. While Dmitri was still in high school, he and his father started an encryption-technology business. Dmitri says he loved the beauty of the math but also saw cryptography's fatal \aw: "If someone stole your keys to encrypt the data, it didn't matter how secure the algorithms were." "

1990s (Mid) - No work in nuclear power or Mikhail Alperovitch - (source : 2018 Forbes Article )

Source : [HP0002][ GDrive ]

"Dmitri [Alperovitch] immigrated to America in the 1990s from the Soviet Union while in his mid-teens. His family settled in Chattanooga, Tennessee [...] . [Michael Alperovitch, Dmitti's father], a nuclear physicist, wasn’t able to get a job in nuclear power, given the lack of new plants being built in the U.S. However, he became interested in cryptography. ”

Encryption Software, Inc. of Georgia (USA)

Source article : [HG0001][ GDrive ]

1999 (July) - Residing at Rossville, Georgia

Source article : [HL0001][ GDrive ]

" 208 Park Lake Rd, Rossville Georgia 30741-4724, USA July 1 1999 "

Rossville, Georgia is on the border with Tennessee, and is very close to Chattanooga

1999 (Dec) - Purchase to (595) Bellemont Court, (Duluth), Georgia

Source : [HN0001][ GDrive ]


https://pdfs.semanticscholar.org/45ef/c85c2a92fe00dae5477f918795d9fd23e6e5.pdf

2011-05-ijcsi-org-ecc-over-rsa-for-asymmetric-encryption.pdf


● The Top Secret Messenger software was developed by Encryption Software Inc. It encrypts the messages of some of the most popular instant messaging programs today, like ICQ and MSN. It can also be used with e-mail clients such as Microsoft Outlook and Outlook Express to encrypt e-mail messages. This product uses both private and public key cryptosystems, including a 307-bit key for its implementation of the ECC.


"Elliptic curves were proposed for use as the basis for discrete logarithm-based cryptosystems almost 20 years ago, independently by Victor Miller of IBM and Neal Koblitz of the University of Washington . At that time, elliptic curves were already being used in various cryptographic contexts.

Elliptic curves are rich mathematical structures that have shown usefulness in many different types of applications. ECC, like RSA has the role in digital signatures, secure key distribution, and encryption. ECC has the upper hand in the efficiency of algorithm. Some devices have limited processing capacity, storage, power supply, and bandwidth like the newer wireless devices and cellular telephones. When used, efficiency of the resource use is very important in these devices. ECC provides encryption functionality requiring a smaller percentage of the resources required by RSA and other algorithms, so it is used in these types of devices. In most cases, the longer the key length, the more protection that is provided, but ECC can provide the same level of protection with a smaller key size than RSA. Since smaller keys as in ECC require fewer resources of the device to perform the mathematical tasks. ECC cryptosystems use the properties of elliptic curves in their public key systems. The elliptic curves provide ways of constructing groups of elements and specific rules of how the elements within these groups combine. The properties between the groups are used to build cryptographic algorithms."

2004 : "Top Secret Messenger"

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=2ahUKEwiY3IqutPXmAhVMMt8KHYx8BpI4ChAWMAF6BAgFEAI&url=https%3A%2F%2Fsceweb.uhcl.edu%2Fyang%2Fteaching%2Fcsci5931webSecuritySpr04%2FImtiazOralPresentation.ppt&usg=AOvVaw1NIMAjDHmksL_fFn9wAwia \

2004-03-24-security-risks-instant-messaging-workplace-imtiaz-paniwala-preso.ppt /

"Top Secret Messenger :Top Secret Messenger (TSM) is product developed by Encryption Software, Inc. It provides a powerful public-key encryption platform, TSM provides integrated add-on for popular instant messengers thus integrating the new IM technology with existing system applications"

http://www.edpci.com/Newsletter/NL4.html

Top Secret Messenger (Encryption Software Inc; $15; Windows (Outlook), plus...): http://www.encrsoft.com

2006 (Aug 31) - Alperovitch Purchased 7903 Plum Creek Drive , Gaithersburg, MD 20879-

Source : [HW0007][ GDrive ]

08/31/2006 : 7903 Plum Creek Drive Gaithersburg, MD 20879-5630 Find on map >> Owner: TATIANA ALPEROVITCH & MIKHAIL ALPEROVITCH Land value: $202,200 Improvement value: $347,200 Total value for property: $549,400 Assessments for tax year: 2015 Property use: Residential Property class: Standard Unit Land size: 13,671 square feet Building area: 2,903 square feet Number of full bathrooms: 3 Number of half bathrooms: 1 Number of stories: 2.0 Year property was built: 1995 Basement: Yes Exterior: Siding Garage: 1 Attached Last sales: Date: 08/31/2006 Price: $640,000 Seller: KRIESE, BRIAN M & D P

2017 (Feb) - Selling 7903 Plum Creek Drive, Gaithersburg, MD

Source : [HN0003][ GDrive ]

"2017 sales : GAITHERSBURG AREA : Plum Creek Dr., 7903-Mikhail and Tatiana Alperovitch to German A. Benitez, $625,000. "

2018 -Residence in Bradenton, Florida

Source : [HW0005][ GDrive ]

"The parcel owner is Alperovitch, Mikhail N. According to Bradenton public records 17005 1St Ave E, Bradenton total assessed value is $457,931. It is 107.3% higher than average parcel value in Bradenton. Building on this parcel was built in 2013 and its assessed value is $35,710. Assessed value of the land is $35,000."

THIS SECTION - BOOK REFERENCES

Book reference - From [2018] "The Perfect Weapon : War, Sabotage, and Fear in the Cyber Age"

Crown/Archetype, Jun 19, 2018 - 400 pages - By David E. Sanger

Google Link - [HB0001][ GDrive ]

NOTES:

  • Dmitri Alperovitch "spent his childhood and early teen years in Moscow, in the waning days of the Soviet Union.