I’m Reading the Mueller Report So You Don’t Have To (but you should), pt. 2

Mueller Report, pages 38-65:

I will preface this by saying that this is as terrifying a piece of writing as I have ever read. Mueller undersold his own report. We were attacked by the Russian government and military. This is not conjecture. It is fact.

We left off with Phase One of the attack on our country’s election, using the IRA’s social media campaign.

Phase Two of the attack involved units of the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU) -and a coordinated hacking attack on a wide range of targets inside the United States.

Beginning in March of 2016, two military units of the GRU hacked the computers and email accounts of organizations, employees, and volunteers working on the Clinton Campaign as well as the Chairman, John Podesta.

In April, the GRU hacked into the networks of the Democratic Congressional Campaign committee (DCCC) and the Democratic National Committee (DNC), targeting hundreds of email accounts used by Campaign employees, advisors and volunteers.

The intrusions were determined not to be crimes of opportunity, but rather the result of specific targeting.

Customized malware known as “X-Agent” and “X-Tunnel” were implanted on DCCC and DNC networks that allowed the GRU military units to log keystrokes, take screenshots, and gather other data, as well as create an encrypted connections between the victim computers and the GRU computers.

The GRU set up a group of computers outside the DCCC and DNC networks to communicate with the malware, then relayed messages to a second set of GRU controlled computers known as the “AMS Panel” which were located in Arizona.

The GRU stole hundreds of thousands of documents and later released the stolen Clinton Campaign and DNC documents through fictitious personas “DCLeaks” and “Guccifer 2.0” and later through WikiLeaks.

The releases were designed and timed to interfere with the 2016 U.S. presidential election and undermine the Clinton Campaign.

DCLeaks was registered by the GRU through an anonymous registry service and paid for with Bitcoin. They started posting stolen documents starting in June 2016, some password protected only to be unlocked when the timing was appropriate.

The GRU also used the DCLeaks Facebook page to communicate privately with reporters and bloggers to give them early access to the stolen materials.

The GRU used its Guccifer 2.0 identity to publicly release the stolen DNC and DCCC documents directly to reporters in late June 2016.

The GRU was also in contact with REDACTED, a former Trump Campaign member, through Guccifer 2.0, sending several private messages about the stolen documents.

To expand the interference, the GRU military units transferred their stolen materials to WikiLeaks, who, along with its founder Julian Assange, had privately expressed opposition to candidate Clinton well before the release of stolen documents.

In March of 2016, WikiLeaks released a searchable archive of 30,000 Clinton emails obtained through FOIA.

In June 2016, the GRU used DCLeaks persona to contact WikiLeaks about possible coordinated releases of stolen emails. Around the same time, WikiLeaks started communicating with Guccifer 2.0 suggesting that they send any new material to WikiLeaks for higher impact.

In October 2016, WikiLeaks released the first emails stolen from the Podesta account, and in total, eventually released over 50,000 stolen documents just from Podesta alone.

As reports emerged linking the DNC and DCCC hacks to the Russian government and military, WikiLeaks and Assange made several statements designed to obscure the source of the materials.

Assange and WikiLeaks falsely implied that the source was Seth Rich, the former DNC staffer who was killed in July 2016, then spun the story to amplify the angle that Rich was murdered to prevent him from releasing more info to WikiLeaks.

When Trump made his “Russia if you’re listening, I hope you’re able to find the 30,000 emails that are missing” statement, within five hours, the GRU targeted Clinton’s personal office, including an account belonging to Clinton aide REDACTED.

In addition to targeting individuals involved in the Clinton Campaign, the GRU also targeted individuals and entities involved in the administration of elections, including U.S. state and local entities, state boards of elections, secretaries of state, county governments, as well as inviduals working for those entities.

The GRU also targeted, and gained access to through the installation of malware, private technology firms responsible for manufacturing and administering election related software and hardware including voter registration software and electronic polling stations – this continued through November of 2016.

In one instance, the GRU compromised the network of the Illinois State Board of Elections and gained access to the information of millions of registered voters.

The Trump Campaign showed interest in the WikiLeaks releases of hacked materials through the summer and fall of 2016, and much of this is REDACTED.

Michael Cohen recalled an incident in Trump’s office in Trump Tower regarding the WikiLeaks release of stolen emails, but is REDACTED. Manafort also spoke with Trump REDACTED, and separately told Gates to keep in touch with REDACTED about future WikiLeaks release.

There is a lot of REDACTED material related to Corsi in this section. Corsi was the originator of the Swift Boat campaign against John Kerry, and was involved with the Obama Birther conspiracy. Corsi told the SCO that Trump expressed interest in his writings.

According to Ted Malloch (a friend of British Brexit Party leader Nigel Farage), Corsi asked Malloch to put him in touch with Assange, and suggested that Farage might be able to help. Malloch told investigators that he and Corsi had multiple discussions about WikiLeaks, and REDACTED had made a connection with Assange and that the hacked Podesta emails would be released prior to election day, to be helpful to the Trump Campaign.

When the Washington Post published the Access Hollywood video of Trump’s derogatory comments about women, less than one hour later, WikiLeaks released the first set of Podesta emails.

More later.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s