I have conducted extensive research on the media reports, forensic evidence, statements and indictments of the 12 Russians alleged to have hacked Podesta, the DNC, and the DCCC.
By: Lycaon @Cynacin 
The information is frequently contradictory, self-refuting, and suspicious.
In April 2016, Obama, the DNC and the Clinton campaign paid Perkins Coie nearly a million dollars who then paid Fusion GPS to research “Links between Trump and Russia”.
FALCON is an endpoint protection / anti-virus program, NOT a Digital Forensics and Evidence Collection program. Such a program, if used after compromise, needs to be executed from external media. According to their statements, this did not occur.
Crowdstrike has since claimed that they provided the FBI with exact system images however, the response timetable and their statements about installing FALCON contradict that claim. Imaging and collecting evidence the proper way would have taken significantly more time.
Any evidence collected after installing FALCON would have been tainted and inadmissible. This likely explains the DNC’s refusal to provide the FBI with physical access to their servers.
On June 12, 2016 Julian Assange publicly announced upcoming leaks concerning Hillary Clinton. The Obama administration had been spying on journalists with malware installed on their computers, so it’s likely they knew about the leaks beforehand. 
As the story goes, the GRU operatives allegedly created Guccifer 2 days after the Washington Post published an article fingering Russia for the attacks.
Everything in the Donald Trump Opposition research released by Guccifer 2 had already been publicly alleged EXCEPT accusations about Trump having corrupt ties to Russia.
On October 31st, about a week before the November election, SLATE published an article alleging that a Trump server was communicating secretly with Alfa Bank.
Claiming experienced, highly skilled hackers with Russian intel were so startled by a WaPo article that they decided to buy a Russian VPN service, create a fake persona, then forget to the connect to the VPN is utterly and completely ridiculous.
The documents from G2 were opened on a RU-lang system and barely edited (such as by adding a space to a line), then saved. This left Russian-language forensic artifacts on the files.
@with_integrity has covered this :
One June 3rd, prior to the June 14 WaPo article announcing the hacking, Rob Goldstone reached out to the Trump campaign to set up a meeting for Natalia Veselnitskaya with Donald J. Trump Jr.
Matt Tait claims that his “timely research” into Guccifer 2 lead him to being contacted on Twitter by a man identified as “Peter Smith”, supposedly a well-connected Republican who needed assistance verifying stolen documents from Hillary Clinton.
Mr. Tait’s “recruitment” by the “Russians” – who claimed to be deeply connected to Trump’s campaign and the Republican party – was of interest to the Special Counsel. Tait would provide oral testimony to Robert Mueller.
Crowdstrike claims that their cloud-based software “instantly lit up” and they knew right away it was the Russian government. Clearly a fictitious statement. 😂
Even with AI, cyber attack attribution is extremely difficult, sometimes impossible.
One of the features of Crowdstrike’s endpoint security agent is Data Loss Prevention (DLP). DLP detects potential data exfiltration from insider threats, such as an employee copying sensitive files to a portable USB drive.
Insider Threats account for nearly 75% of all Security Breach incidents.
Crowdstrike did the opposite.
That evidence is tainted and pretty much worthless.
 Lycaon @Cynacin twitter
 The Federalists
 Sharyl Attkisson
 Computer Weekly
 Washington Post
 Paul Vixie Twitter
 Threat Connect
 Web Archive
 Adam Carter Twitter
 NY Times
 LawFare Blog
 LawFare Blog
 Business Insider
 Twitter Search