Trump’s New Appellate Argument about His 100 Million Imaginary Friends

Judge Tanya Chutkan issued her order denying Trump a stay of her gag order on October 29.

That was admittedly a Saturday. Nevertheless, it took Trump four days before he ran to the DC Circuit to cry about an emergency infringement on the First Amendment rights of him and his mob.

He took those four days even as he demanded that the DC Circuit — which had been expecting Trump’s initial brief on November 8 — rule on this motion by November 10.

The Court should stay the Gag Order pending appeal. In addition, President Trump respectfully requests that the Court enter a temporary administrative stay pending resolution of this motion and issue its ruling by November 10, 2023. If the Court denies this motion, President Trump requests that the Court extend its administrative stay for seven days to allow him to seek relief from the U.S. Supreme Court.

During those four days that Trump didn’t file for a stay, John Lauro found time to file three different things (one, two, three) in Judge Chutkan’s docket. In those four days, Trump posted a slew of attacks on Joe Biden, the 2020 election, and his prosecution (though admittedly many of the recent posts targeted Arthur Engoron), many of them attacks that — he claims — this gag prevents him from making.

I’ll leave it to smarter people to explain the posture that leaves this case.

What I’m more interested in are the arguments that Trump makes that should not withstand prolonged scrutiny, at least not at the DC Circuit, arguments that are surely designed to trigger the interest of Sam Alito and Clarence Thomas.

In his appeal, Trump argues — substantially for the first time — that his gag subjects him to viewpoint discrimination. There’s a very short section dedicated to the topic, citing an inapt precedent.

7. The Gag Order reflects forbidden viewpoint discrimination.

By forbidding speech that “target[s]” certain individuals, the Gag Order prohibits only (vaguely defined) negative speech about them. See infra, Part I.C. In Matal v. Tam, the Supreme Court held that prohibiting only negative or “disparaging” speech constitutes forbidden viewpoint discrimination. 582 U.S. 218, 243 (2017) (plurality opinion). Such a prohibition “constitutes viewpoint discrimination—a form of speech suppression so potent that it must be subject to rigorous constitutional scrutiny.” Id. at 247 (Kennedy, J., concurring in part and concurring in the judgment). To prohibit “disparaging” speech “reflects the Government’s disapproval of a subset of messages it finds offensive. This is the essence of viewpoint discrimination.” Id. at 249; see also R.A.V., 505 U.S. at 391- 92. The Gag Order violates these principles

Trump lards the rest of the discussion with claims that a gag tied to the crimes alleged against Trump amounts to censorship of right wing views.

Based this speculation, the district court entered a sweeping, viewpoint-based prior restraint on the core political speech of a major Presidential candidate, based solely on an unconstitutional “heckler’s veto.” The Gag Order violates the First Amendment rights of President Trump and over 100 million Americans who listen to him.

[snip]

President Trump’s viewpoint and modes of expression resonate powerfully with tens of millions of Americans. The prosecution’s request for a Gag Order bristles with hostility to President Trump’s viewpoint and his relentless criticism of the government—including of the prosecution itself. The Gag Order embodies this unconstitutional hostility to President Trump’s viewpoint. It should be immediately stayed.

[snip]

As a viewpoint-based prior restraint on the core political speech of a Presidential candidate to an audience of over 100 million Americans, the Gag Order is virtually per se invalid.

There are nine appearances of the word “viewpoint” in the entire appendix. All appear in Trump’s filings bidding for a stay, not his underlying opposition to the gag. But all of those also appear as part of an argument about political speech — an important argument, but one largely divorced from the circumstance of this gag, not as a free-standing argument about the free speech of nutjob right wingers.

That argument is closely related to (and builds on) another argument that Trump belatedly raised: that gagging his speech harms the First Amendment rights of his 100 million followers.

4. The Gag Order violates the rights of tens of millions of Americans to receive President Trump’s speech.

The First Amendment’s “protection afforded is to the communication, to its source and to its recipients both.” Va. State Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc., 425 U.S. 748, 756 (1976) (citing many cases); Packingham v. North Carolina, 582 U.S. 98, 104 (2017) (recognizing the right to “speak and listen, and then … speak and listen once more,” as a “fundamental principle of the First Amendment”); Red Lion Broad. Co. v. F.C.C., 395 U.S. 367, 390 (1969). A restriction on President Trump’s speech inflicts a reciprocal injury on the rights of over 100 million Americans who listen to him, irrespective of their political beliefs.

This right of listeners to receive President Trump’s message has its “fullest and most urgent application precisely to the conduct of campaigns for political office,” especially for the Presidency. Susan B. Anthony List, 573 U.S. at 162. Ford emphasized that, if Congressman Ford were silenced, “reciprocally, his constituents will have no access to the views of their congressman on this issue of undoubted public importance.” 830 F.2d at 601. Likewise, Brown stated that “[t]he urgency of a campaign … may well require that a candidate, for the benefit of the electorate as well as himself, have absolute freedom to discuss his qualifications….” 218 F.3d at 430.

In Trump’s appeal, he doesn’t cite evidence supporting this number, but — as I already noted — the underlying motion relies on garbage double counting of bots on the Twitter platform Trump no longer uses. Given that this argument is based on fraudulent numbers, it amounts to a defense of the First Amendment rights to listen of Trump’s imaginary friends, including the Russian bots the now-deceased Yevgeniy Prigozhin deployed to fuck with US politics.

The problem with this argument is, as DOJ noted in its response to Trump’s bid for a gag, Trump misrepresented the record on that point.

11 The defendant did not invoke these interests in his response to the Government’s motion for an order under Local Criminal Rule 57.7(c). And while the defendant claims to have invoked these interests at the hearing, only to have been unfairly interrupted by the Court (ECF No. 110 at 17), his citations mischaracterize the record. For example, he asserts (id.) that the Court interrupted him in response to his statement, “And what the government is proposing here is an order not just directed against President Trump but against the American electorate that wants to hear from President Trump under these circumstances.” The Court did not, in fact, interject in response to that point. See ECF No. 103 at 44. Rather, it was only several sentences later, after defense counsel returned to his oft-repeated talking point that “[t]his is the first time we’ve had a sitting administration prosecute a political opponent” that the Court responded, “I’m going to interrupt you. . . . You have said that. You have said it repeatedly. I have heard it.” Id. Likewise, the defendant asserts (ECF No. 110 at 17) that, when counsel said, “The American people are entitled to understand that and understand the consequences of that,” the Court simply responded, “No.” The Court did no such thing. After defense counsel’s comment, the Court asked why the defendant “is entitled to suggest that an appropriate punishment would be death.” ECF No. 103 at 59-60. When defense counsel invoked the First Amendment in response, the Court said, “No. As part of that. But again, the First Amendment protections must yield to the administration of justice and the protection of witnesses.” Id.

In a footnote of Judge Chutkan’s order denying the stay, she agreed.

Defendant’s Motion argues that his speech restrictions are inconsistent with the “right of listeners to receive President Trump’s message.” Motion to Stay at 15. Defendant did not squarely raise that argument in his opposition brief to the government’s original motion; the closest he came to identifying any authority for it was an unrelated “see also” citation to United States v. Ford, 830 F.2d 596, 598 (6th Cir. 1987), a case that he now quotes to support his right-of-listeners argument. Compare ECF No. 60 at 5, with Motion to Stay at 16. But the court expressly addressed and distinguished that case. Order at 2–3. In any event, the argument does not alter the fundamental principle that First Amendment rights, whether those of the speaker or the listener, may be curtailed to preclude statements that pose sufficiently grave threats to the integrity of judicial proceedings.

Undeterred by that footnote, Trump argues that Chutkan’s failure to address something he didn’t raise is her reversible error, not a waiver on his part.

Though the issue was raised repeatedly, A159-60, A165, A178; A47, A62-63, the district court gave the First Amendment rights of President Trump’s audiences no meaningful consideration. The Gag Order does not mention them, see A1-3, and the district court declined to consider them when President Trump raised them, e.g., A47, A62-63. That is reversible error.

I’ve linked two of the spots in the record, above, where John Lauro imagines he raised this — A47, which he cites twice, was in the oral arguments, not the underlying brief. None was a substantive argument about his imaginary 100 million friends. Here’s the appendix if you want to see if you can find what other things he is citing to.

There are other problems with this appeal. Trump doesn’t address the part of Chutkan’s order that explicitly permits Trump to attack, “the current administration or the Department of Justice.” Trump does not engage, at all, with the evidence DOJ submitted of expected trial witnesses testifying under oath about how mobs started threatening them after Trump tweeted mean things. Notably, Trump’s citations to the government’s examples of threats that Trump made between August 2 and September 26 doesn’t cite to the footnotes in the government response that reference the threat — made the day after the linked threat, “if you come after me I’m coming after you” — to Judge Chutkan herself.

By the time the Gag Order was entered, the case had been pending for almost three months, and President Trump had often spoken about it. The prosecution provided seventeen examples of public statements by President Trump between August 2 and September 26, 2023, that it considered objectionable. A140-46; A190- 91. However, it did not produce any evidence that any prosecutor, witness, or court staffer experienced “threats” or “harassment” after President Trump’s speech. Likewise, it did not produce any evidence that any witness or prosecutor felt threatened or intimidated by President Trump’s speech—however subjectively—during three months of President Trump’s public commentary on the case. See A140-46; A190-91.

Lauro claims DOJ didn’t present any evidence that anyone, including court staffers but not the judge herself, felt intimidated by threats that followed on Trump’s incitement and simply ignores that footnote. But someone in Judge Chutkan’s chambers alerted the Marshals after that threat, and the FBI deemed it sufficiently dangerous to arrest Abigail Jo Shry for making it.

So there are other problems with this appeal, exhibiting the same obstinate refusal to address the record as it stands that Judge Chutkan described in her opinion refusing the stay.

But the key dynamic, in my opinion, is that Trump is trying to refashion his argument to trigger the known biases of Sam Alito and Clarence Thomas. But he’s doing so — launching a bid to protect the First Amendment rights of his imaginary friends — after the fact.

This is not a frivolous argument. The legal arguments should bear the weight of the historic decision that ultimately will result.

But instead of making serious arguments, John Lauro has pitched the Supreme Court’s right wing justices an argument about Trump’s imaginary Twitter friends.

Update: A DC Circuit panel of 3 Democratic appointees (Obama, Obama, Biden) has stayed the gag and ordered and set an expedited briefing that is quick enough SCOTUS is unlikely to have any reason to intervene.

PER CURIAM ORDER [2025399] filed considering motion to stay case [2025149-2], ORDERED that the district court’s October 17, 2023, order be administratively stayed pending further order of the court. Further ordered that his case be expedited. setting briefing schedule: APPELLANT Brief due 11/08/2023, at 5:00 p.m.. APPENDIX due 11/08/2023, at 5:00 p.m.. APPELLEE Brief due on 11/14/2023, at 5:00 p.m., APPELLANT Reply Brief due 11/17/2023, at 12:00 p.m., scheduling oral argument on Monday, 11/20/2023. Before Judges: Millett, Pillard and Garcia. [23-3190] [Entered: 11/03/2023 05:06 PM]

Gary Shapley’s Handlers Revisit Past Leak Investigations into Chuck Grassley’s Staff

According to a press release on the website for Empower Oversight–the group handling Gary Shapley’s now-debunked media tour–Empower’s founder, Jason Foster, was the subject of an FBI subpoena to Google in 2017.

Google first alerted Foster to the September 12, 2017 subpoena on October 19, 2023. That’s one of the reasons I find this FOIA so interesting. The notice came more than six years after the subpoena, suggesting FBI likely continued to investigate someone tied to the investigation for at least a year longer than statutes of limitation would normally extend.

Empower seems to suggest there’s a tie between the subpoena and one served on Google pertaining to Kash Patel’s personal email two months later, on November 20, 2017, as does Margot “Federalist Faceplant” Cleveland in this propaganda piece reporting on the subpoenas. While Empower says that this subpoena asked for information on other staffers, it only cites Kash to substantiate its claim that other staffers had also gotten notice of a past subpoena (Cleveland does report that a HPSCI staffer was also included).

Empower Oversight has information indicating that the other accounts listed in the subpoena belonged to other staffers, both Republicans and Democrats, for U.S. House and Senate committees also engaged in oversight investigations of the Justice Department at the time pursuant to their authorities under the U.S. Constitution.

[snip]

Other former staffers have publicly referenced receiving similar notices, including former U.S. House of Representatives Permanent Select Committee on Intelligence (“HPSCI”) staffer Kashyap Patel.

They’re from the same grand jury (16-3). But they not only have different file numbers, but the one on Kash’s subpoena — that is, the later subpoena, by two months — has a lower file number, 2017R01887, as compared to 2017R01896.

Kash is suing roughly the same people over his subpoena as Empower is FOIAing: Empower is asking about former DC US Attorney Jessie Liu, Rod Rosenstein, his one-time Principal Associate Robert Hur (currently the Special Counsel investigating Joe Biden’s classified documents), and Ed O’Callaghan, who replaced Hur, along with then DOJ Spox Sarah Isgur. Kash is suing Liu, Rosenstein, Hur, and O’Callahan, plus FBI Director Chris Wray and the two AUSAs behind the subpoena.

There are problems with both of their target sets. For example, Liu wasn’t even sworn in as US Attorney until September 25, 2017 — after the Foster subpoena (though before the Kash one). So Empower’s suggestion that Liu had some influence on the subpoena on him is nonsense. Rosenstein wasn’t sworn in until April 26, 2017, almost five months after the request for conversations with the press starts.

Similarly, Ed O’Callaghan, whom Kash describes as, “the Principal Associate Deputy Attorney General for Mr. Rosenstein at the time in question,” didn’t move from the National Security Division to Rosenstein’s office until April 2018, after Hur was confirmed as US Attorney for Maryland and long after both the subpoena implicating Kash and his blow-up with Rosenstein. Though if these were really sensitive leak investigations, NSD may have had a role in them. (Empower includes NSD within its FOIA.)

Those details don’t seem to matter for their projects: both men appear to be using the subpoenas as an excuse to settle scores.

Kash, ever the conspiracy theorist, brought a Bivens claim insinuating that Rosenstein and others violated Kash’s Fourth Amendment rights because DOJ served a subpoena — something not requiring probable cause under the Fourth Amendment — to obtain the subscriber information for a list of around 14 identifiers, of which his personal email was just one. There’s nothing on the face of the subpoena to suggest that DOJ knew his email was tied to someone who was a Congressional staffer at the time of the subpoena (though again, Federalist Faceplant seems to know at least one other person listed was a staffer). In fact, the subpoena asked for contact information going back to April 2016, a year before Kash moved from DOJ to HPSCI, so it could have pertained to a leak internal to DOJ.

Nevertheless, Kash spins a tale where the November 2017 subpoena is in some way connected with what he claims is Rosenstein’s threat, over a month later, to subpoena HPSCI staffers.

5. The illegitimate grounds for the subpoena were made clear when, shortly after the FBI and DOJ previewed what would become the “Nunes Memo,” which outlined significant issues with FBI’s and the DOJ’s manner of opening and conducting the Crossfire Hurricane investigation, then-Deputy Attorney General Rod Rosenstein (“DAG Rosenstein”) threatened to subpoena the records of the House Permanent Select Intelligence Committee staff, including Mr. Patel, during a closed-door meeting about producing documents requested by the Committee for their investigation into DOJ’s and the FBI’s, its subagency, conduct in the Crossfire Hurricane investigation.

6. The Department of Justice attempted to defend against the allegation of this threat to Legislative Branch employees, but admitted, at a minimum, that DAG Rosenstein did threaten to subpoena records of Congressional staff in contempt proceedings over the DOJ’s noncompliance with multiple subpoenas. Regardless, this characterization was disputed by multiple Committee staffers, and the matter was referred to the House General Counsel and Speaker of the House as a threat to subpoena records of staffers to halt their investigation.

7. DAG Rosenstein made this threat in January of 2018, approximately one month after his Department of Justice had already subpoenaed Mr. Patel’s email records from Google. This confrontation establishes that DAG Rosenstein and other Defendants were searching for a reason to subpoena Mr. Patel’s official accounts as well as the personal ones that DOJ was already improperly pursuing.

Contrary to Kash’s claim, DOJ didn’t concede Rosenstein threatened to subpoena the HPSCI records. According to a Fox News article Kash himself cites in his suit, DOJ said that Rosenstein was advising staffers to retain their emails so he could use them to defend against any accusation of contempt. Though Rosenstein did threaten to ask the House General Counsel to investigate Kash and whoever else was involved.

A DOJ official told Fox News that Rosenstein “never threatened anyone in the room with a criminal investigation.” The official said the department and bureau officials in the room “are all quite clear that the characterization of events laid out here is false,” adding that Rosenstein was responding to a threat of contempt.

“The Deputy Attorney General was making the point—after being threatened with contempt — that as an American citizen charged with the offense of contempt of Congress, he would have the right to defend himself, including requesting production of relevant emails and text messages and calling them as witnesses to demonstrate that their allegations are false,” the official said. “That is why he put them on notice to retain relevant emails and text messages, and he hopes they did so. (We have no process to obtain such records without congressional approval.)”

Further, the official said that when Rosenstein returns to the United States from a work trip, “he will request that the House General counsel conduct an internal investigation of these Congressional staffers’ conduct.”

This all seems like a retroactive attempt to politicize the investigation into some contact Kash had, potentially even before he joined HPSCI with a lawsuit claiming a violation of the Fourth Amendment under Bivens for a subpoena for toll records that a former DOJ prosecutor, especially, should know are not entitled to any expectation of privacy.

Foster’s claim, which is only a FOIA, not a lawsuit, is a bit less ridiculous (so long as you ignore his demand for communications involving Liu before she started as US Attorney and Rosenstein before he was DAG).

He seems certain that the subpoena for his phone (which he says was used by his spouse) pertained to a leak investigation. He’s filing it to find out if Rosenstein’s office ever got the same scrutiny in leak investigations that (he seems sure) some Congressional staffers got in 2017.

It begs the question of whether DOJ was equally zealous in seeking the communication records of its own employees with access to any leaked information.

[snip]

(5) All communications exchanged between members of the press and DAG Rosenstein, Robert Hur, Edward O’Callaghan, Sarah Isgur, aka Sarah Isgur Flores, and/or Jessie Liu for the period from December 1, 2016 to September 26, 2017, regarding (a) communications between Michael Flynn and Sergey Kislyak, (b) Carter Page, (c) Joe Pientka, (d) Bill Priestap, (e) congressional oversight requests, (f) Senator Charles Grassley, (g) Jason Foster, and/or (h) the Crossfire Hurricane investigation.

(6)All grand jury subpoenas issued for personal communications of DAG Rosenstein, Robert Hur, Edward O’Callaghan, and/or Jessie Liu between May 1, 2017 and May 1, 2018.

(7) All communications exchanged between the U.S. Attorney’s Office for the District of Columbia, the National Security Division, the Deputy Attorney General’s Office and/or the FBI and Verizon between March 15, 2016, and the present regarding obtaining communications data associated with devices that Verizon serviced for U.S. House Representatives or U.S. Senate. [my emphasis]

The time range of the Foster subpoena, December 1, 2016 to May 1, 2017, covers the period of the known leaks about Mike Flynn and Carter Page — the former, especially, one of the leaks Republicans have never stopped bitching because it wasn’t charged. Yet here, a key Republican is complaining there was “no legitimate predicate” in investigating people who were briefed on information that subsequently got leaked.

There appears to have been an extensive and far-reaching effort to use grand jury subpoenas and perhaps other means to gather the personal communications records of innocent congressional staffers and their families with little or no legitimate predicate.

Empower’s mention of Carter Page also situates the subpoena temporally. The subpoena that included a number associated with Foster was served in precisely the same time period that — the Statement of the Offense and sentencing memo for James Wolfe case show — FBI was investigating the leak of the Carter Page FISA. DOJ opened that investigation in April 2017. They had shown enough probable cause against Wolfe to obtain a warrant to covertly image his cell phone by October 2017. No one complained that Wolfe was prosecuted for his presumed role in leaking some of these stories, and his prosecution alone shows that the subpoena had predicate.

Foster may have other specific stories in mind too: In addition to the leaked stories about Flynn undermining US foreign policy with the Russian Ambassador, the FOIA asks about other Russian investigation stories, including Joe Pientka, whose role in briefing Mike Flynn Grassley made into a personal crusade.

Curiously, the Steele dossier is not on here, even though that was another personal crusade of Chuck Grassley.

All that said, the timeline included in the FOIA is broader than that. Here’s how the various timelines overlap, or don’t:

  • Scope of Foster subpoena: December 1, 2016 through May 1, 2017
  • Rosenstein sworn in as DAG: April 26, 2017
  • Date of Foster subpoena: September 12, 2017
  • Jessie Liu sworn in as US Attorney: September 25, 2017
  • Scope of Foster’s FOIA for DAG communications with the press: December 1, 2016 through September 26, 2017
  • Date of Kash subpoena: November 20, 2017
  • Scope of Kash subpoena: May 1, 2016 through November 20, 2017
  • Scope of Foster’s FOIA for grand jury subpoenas targeting DAG: May 1, 2017 through May 1, 2018
  • Scope of Foster’s FOIA for Verizon records of Congressional staffers March 15, 2016 through October 24, 2023

Foster is FOIAing Rosenstein’s office, first, for conversations with the press — including about him — starting on December 1, 2016, before Trump was inaugurated and months before Rosenstein was sworn in on April 26, 2017. He is FOIAing conversations with the press that continue through the day after Liu was sworn in September 2017, still months before O’Callaghan was part of DAG.

Then he’s asking for any grand jury subpoenas (which he knows would be protected under grand jury secrecy rules and so won’t get) from the end date of the subpoena targeting him, after which point both the Flynn and Page investigations were underway, until May 1, 2018 — still four months before Legistorm shows Foster leaving his SJC job on September 4, 2018, but perhaps not coincidentally ending before the time when the Mueller investigation started to more closely probe fellow SJC staffer Barbara Ledeen’s role in Mike Flynn’s 2016 rat-fucking and two weeks shy of an interview when Mueller asked Flynn about Ledeen’s investigation of the investigation. A September 17, 2018 interview asked very specific questions about people leaking claimed details of the investigation to Flynn, as well as Flynn’s contacts with unidentified Congressional staffers.

Again, this request is a test about whether Rosenstein’s office was targeted for leaks, but the leaks that Foster suggest this subpoena pertains to — Mike Flynn’s contacts with Sergey Kislyak and Carter Page’s FISA — happened before any of these people were in DAG. Foster seems interested in leaks about leak investigations, not the leaks themselves.

It’s the final bullet I find the most interesting though. None of the subpoenas he raises in his FOIA — not the subpoena of Kash’s personal email, not the subpoena of his own Google voice phone, and not the subpoena to Apple targeting HPSCI members — target official phone records. But Foster FOIAs for official records as well: All communications between DC USAO, NSD, DAG, and FBI with Verizon — communications that might be something other than a grand jury subpoena — about obtaining phone records for the Congressional devices serviced by Verizon. He’s asking for a much broader period of time, too: March 15, 2016 — early enough to include the start date of Kash’s subpoena, but also to include some of Barbara Ledeen’s rat-fucking with Mike Flynn — through the present, late enough to include any contacts in which Chuck Grassley staffers used their official devices to share information about the Hunter Biden investigation with the press.

This last request is not about Rosenstein; Rosenstein was only DAG for two of the seven and a half years covered by this part of the FOIA.

This FOIA is, on its face, totally uncontroversial (though it attempts to do with a FOIA what DOJ IG is already doing, which it notes). It purports to test whether Rod Rosenstein exempted his own top deputies from the kind of investigative scrutiny to which Rosenstein — always a leak hawk — subjected Congressional staffers. Hell, I’m fairly certain Rosenstein and his top deputies were key undisclosed sources for a bunch of bullshit comments (though most of them were false, and therefore not criminal leaks). Some of those anonymous comments were to the same stable of journalists who also happen to serve as mouthpieces for Chuck Grassley propaganda (and as such, Foster may have specific reason to believe that Rosenstein teed up journalists’ questions to or about him).

And the FOIA for contacts with Verizon gets at important separation of powers issues: under what terms the Executive Branch can investigate the official business of the Legislative Branch, including times when the Legislative Branch is screaming for investigations into leaks that probably (and provably, in the case of Carter Page) include Legislative Branch staffers.

But it also serves as a fishing expedition, by the entity that championed the now debunked claims of Gary Shapley, into potential investigations into transparent ongoing efforts by Chuck Grassley to release details of criminal investigations in the guise of oversight.

In a meeting agenda sent September 3, 2020, Joseph Ziegler included the Senate investigation led by Chuck Grassley and Ron Johnson among topics for discussion.

No later than December 2020, a document shared by Empower Oversight client Gary Shapley reveals, the IRS agents running this investigation cared more about catering to demands from Congress, including from Chuck Grassley, than preserving the investigation.

The USAO and FBI received congressional inquiries concerning this investigation and have repeatedly ignored their requests, openly mocking the members of congress who made the request.

Another document shared by Empower Oversight client Gary Shapley shows that, in May 2021, the IRS agents running the investigation continued to be aware of — and interested in catering to — requests from Congress.

The USAO and FBI received congressional inquiries concerning this investigation and it’s believed they have ignored their requests.

A document released by Empower Oversight client Gary Shapley reflecting a January 6, 2023 call with IRS’ Deputy Field Officer Michael Batdorf alerting him — among other things — that he expected the Delaware US Attorney to make “nefarious” allegations against him, also recorded that by the time, two days after he notified IRS and DOJ IG Inspectors General he was seeking formal whistleblower status which happens to have happened on the day the GOP took the House, his attorney had already, “participated in calls and/or meetings” with “the Congressional Judiciary committees.”

DFO asked about the process and Shapley responded that the Congressional Judiciary committees, OSC, IRS OGC and TIGTA have been notified and have participated in calls and/or meetings with my counsel.

Yet when one of Shapley’s attorneys, Mark Lytle, formally contacted the Chairs and Ranking Members of those same “Congressional Judiciary committees,” the Chairs and Ranking Members of the relevant finance committees, along with Chuck Grassley on April 19, 2023, he did not treat those contacts with the judiciary committees as protected disclosures. The letter mentions that Grassley is a member of the Finance Committee, but doesn’t mention that Grassley is a member and former Chair of the Judiciary Committee.

That was the first moment, publicly at least, that Empower Oversight client Gary Shapley sought protection to share IRS protected information with Congress. That is, even according to Lytle, if Shapley shared any IRS protected information — to say nothing of grand jury protected information — prior to that, by the plain terms of his letter it was not under a grant of protection.

A month after Gary Shapley’s claims — facilitated by Empower Oversight — were soundly debunked by his own documentation and his colleagues, Empower Oversight filed a FOIA that would, among other things, attempt to learn whether the FBI was conducting any investigation of leaks to the press from Chuck Grassley’s staffers, covering the period in 2016 when a Chuck Grassley staffer attempted to reach out to hostile intelligence services to find dirt on Hillary Clinton, the period when a Grassley staffer was seeding press stories — some that were fabrications — about the Russian investigation, and the period of time when those investigating Hunter Biden were more solicitous of requests from members of Congress like Chuck Grassley than they were in protecting the ongoing investigation.

Trump Is Going Through the Motions to Dismiss until He Resumes the Presidency

One of the reasons I suspect that Trump-leaning Republicans replaced Kevin McCarthy with a key player in Trump’s last attempted coup is because Trump shows no signs of any plan to try to win his Federal criminal trials.

For some time, it has appeared (to me at least) that he has approached these cases with the belief that if he can use them as a campaign prop with which to get reelected, then he can simply pardon himself or remain President indefinitely to beat the Federal rap. That’s one of the reasons, I think, why he is treating many of his DC court filings as stunts, especially his extensive fundraising and messaging campaign around the gag order.

Delay, disinform, then dismiss.

I get that. I expected that. Yet, I still expected him to present the best legal case he could as insurance in case winning or stealing the election and self-pardoning doesn’t work.

He has lawyers capable of making very competent legal arguments.

So I’m frankly shocked by how inadequate his Motions to Dismiss have been. I wrote them up here and made this nifty table summarizing the arguments.

This is not just a legal observation — though some of his purportedly legal arguments, most notably his selective prosecution motionare legally shitty. Don’t take my word for it: take Carissa Byrne Hessick’s expert opinion, who says, “his motion is embarrassingly awful & should clearly be denied under current law.”

This is not just a legal observation. Partly, it’s box-ticking one. As I show below, Trump isn’t even addressing all the allegations against him.

As DOJ noted in the response to Trump’s MTD for Absolute Immunity, Trump totally misrepresented the indictment. As DOJ laid out, the indictment consists of four charges — three of them, conspiracy charges (18 USC 371, 1512(k), and 241). For each of those charges, DOJ alleged that Trump used five means of pursuing that conspiracy, laid out as five bullet points in the indictment. Those five bullets read:

a. The Defendant and co-conspirators used knowingly false claims of election fraud to get state legislators and election officials to subvert the legitimate election results and change electoral votes for the Defendant’s opponent, Joseph R. Biden, Jr., to electoral votes for the Defendant. That is, on the pretext of baseless fraud claims, the Defendant pushed officials in certain states to ignore the popular vote; disenfranchise millions of voters; dismiss legitimate electors; and ultimately, cause the ascertainment of and voting by illegitimate electors in favor of the Defendant. [state]

b. The Defendant and co-conspirators organized fraudulent slates of electors in seven targeted states (Arizona, Georgia, Michigan, Nevada, New Mexico, Pennsylvania, and Wisconsin), attempting to mimic the procedures that the legitimate electors were supposed to follow under the Constitution and other federal and state laws. This included causing the fraudulent electors to meet on the day appointed by federal law on which legitimate electors were to gather and cast their votes; cast fraudulent votes for the Defendant; and sign certificates falsely representing that they were legitimate electors. Some fraudulent electors were tricked into participating based on the understanding that their votes would be used only if the Defendant succeeded in outcome-determinative lawsuits within their state, which the Defendant never did. The Defendant and co-conspirators then caused these fraudulent electors to transmit their false certificates to the Vice President and other government officials to be counted at the certification proceeding on January 6. [fake electors]

c. The Defendant and co-conspirators attempted to use the power and authority of the Justice Department to conduct sham election crime investigations and to send a letter to the targeted states that falsely claimed that the Justice Department had identified significant concerns that may have impacted the election outcome; that sought to advance the Defendant’s fraudulent elector plan by using the Justice Department’s authority to falsely present the fraudulent electors as a valid alternative to the legitimate electors; and that urged, on behalf of the Justice Department, the targeted states’ legislatures to convene to create the opportunity to choose the fraudulent electors over the legitimate electors. [Jeffrey Clark]

d. The Defendant and co-conspirators attempted to enlist the Vice President to use his ceremonial role at the January 6 certification proceeding to fraudulently alter the election results. First, using knowingly false claims of election fraud, the Defendant and co-conspirators attempted to convince the Vice President to use the Defendant’s fraudulent electors, reject legitimate electoral votes, or send legitimate electoral votes to state legislatures for review rather than counting them. When that failed, on the morning of January 6, the Defendant and co-conspirators repeated knowingly false claims of election fraud to gathered supporters, falsely told them that the Vice President had the authority to and might alter the election results, and directed them to the Capitol to obstruct the certification proceeding and exert pressure on the Vice President to take the fraudulent actions he had previously refused. [PenceCard]

e. After it became public on the afternoon of January 6 that the Vice President would not fraudulently alter the election results, a large and angry crowd–including many individuals whom the Defendant had deceived into believing the Vice President could and might change the election results–violently attacked the Capitol and halted the proceeding. As violence ensued, the Defendant and co-conspirators exploited the disruption by redoubling efforts to levy false claims of election fraud and convince Members of Congress to further delay the certification based on those claims. [mob] [red brackets my own]

Here’s how DOJ described the indictment in their response to Trump’s Absolutely Immunity filing.

A grand jury charged the defendant in a four-count indictment. ECF No. 1. The defendant moved to dismiss the indictment on the ground that he “is absolutely immune from prosecution.” Mot. 1. When considering a motion to dismiss, the Court must view the indictment “as a whole[,] and the allegations must be accepted as true.” United States v. Weeks, 636 F. Supp. 3d 117, 120 (D.D.C. 2022) (internal quotation marks omitted).

Count One, which charges a conspiracy to defraud the United States, in violation of 18 U.S.C. § 371, alleges that the defendant, then a candidate seeking re-election to the presidency, conspired with, among others, several individuals outside the Executive Branch to “overturn the legitimate results of the 2020 presidential election by using knowingly false claims of election fraud to obstruct the federal government function by which those results are collected, counted, and certified.” ECF No. 1 at ¶¶ 1, 7, 8. The indictment further alleges that the defendant aimed at accomplishing the conspiracy’s objectives in five ways: [state] using deceit toward state officials to subvert the legitimate election results in those states, id. at ¶¶ 13-52; [fake electors] using deceit to organize fraudulent slates of electors in seven targeted states, and cause them to send false certificates to Congress, id. at ¶¶ 53-69; [Jeffrey Clark] leveraging the Department of Justice to use deceit to get state officials to replace the legitimate electoral slate with electors who would cast their votes for the defendant, id. at ¶¶ 70-85; [PenceCard] attempting to enlist the Vice President to fraudulently alter the election results during the certification proceeding on January 6, 2021, and directing supporters to the Capitol to obstruct the proceeding, id. at ¶¶ 86-105; and [mob] exploiting the violence and chaos that transpired at the United States Capitol on January 6, 2021, id. at ¶¶ 106-124. Counts Two and Three, which incorporate allegations from Count One, charge conspiracy and substantive violations of 18 U.S.C. § 1512(c)(2) for corruptly obstructing the certification of the presidential election results on January 6, 2021. Id. at ¶¶ 125-28. Count Four, which likewise incorporates the allegations from Count One, alleges that the defendant conspired to violate one or more person’s constitutional right to vote and have one’s vote counted. Id. at ¶¶ 129-30. [red brackets my own]

Get used to this paragraph: you’re going to see some version of it in the response to many if not all of the MTDs submitted last week.

To address the charges, you need to explain why each of those five means don’t substantiate, either alone or in combination, the elements of the offense of the charges. Effectively, Trump has to show how these five means don’t prove the three different ways they have been charged criminally.

One reason you have to address the alleged means of conspiracy is that First Amendment protected activities, if they are part of a conspiracy, may be included as overt acts in that conspiracy. Scores of January 6 defendants have already made the same First Amendment argument Trump is, including some members of the Proud Boys and Oath Keepers who, like Trump, didn’t breach the Capitol. But if DOJ can prove speech was part of a conspiracy, that speech can come in as evidence of that conspiracy. Trump’s MTD on Constitutional Grounds, for example, which is substantially the same argument about the First Amendment that has already failed for other Jan6ers, names each of the crimes alleged.

These points are not in dispute. Nonetheless, in an astonishing display of doublethink, the prosecution simultaneously claims that President Trump—simply by speaking his mind and petitioning for a redress of grievances—also somehow conspired to “defraud the United States,” “oppress rights,” and “obstruct an official proceeding.” Id. at ¶ 5–6, 125–130.

Then, purportedly citing to the five bullets that describe the means, he spins the five means as giving voice to concerns about election integrity, not his unlawful goal of trying to invalidate the votes of 81 million Biden voters.

As the indictment itself alleges, President Trump gave voice to these concerns and demanded that politicians in a position to restore integrity to our elections not just talk about the problem, but investigate and resolve it. See id. at ¶ 10(a) (state legislators and election officials) act) [sic]; ¶ 10(b) (Vice President and other government officials); ¶ 10(c) (state officials); ¶ 10(d) (vice president); ¶ 10(e) (members of Congress).

This passage replaces the instrumentality alleged with the targets of what Trump calls persuasion. Trump correctly describes one target of the state means (but not the coercion involved). But then he spins the creation of fraudulent documents as, instead, an attempt to persuade Mike Pence. He redefines the hijacking of DOJ in order to make a seemingly authoritative false statement as an attempt to persuade state officials (long after the involvement of state officials was concluded). He describes efforts to get Pence to violate the law as instead an attempt to persuade him. And he calls a violent mob threatening to assassinate members of Congress as, instead, an attempt to persuade those members.

Trump is a con man. And his First Amendment argument is a breathtaking claim that the means he uses to sustain his con — including fraud and coercion backed by violence — are merely free speech.

To some degree, this quick sleight of hand doesn’t matter: In the discussion of the First Amendment that follows, he never returns to address the charges against him. As a result, Trump’s First Amendment argument is sloppy fluff compared to the First Amendment January 6 challenges that have gone before and will be before the DC Circuit by the time Trump goes to trial.

Having at least acknowledged the existence of all five “means” bullet points in his MTD on Constitutional Grounds (even if he redefined them as targets of persuasion), the section of Trump’s MTD on Statutory Grounds addressing 371 pretends the indictment names just three means, not five.

As relevant here, the indictment alleges three types of conduct that supposedly involved making a false statement: (1) claims that the 2020 Presidential election was rigged or tainted by fraud or other irregularities, made both in public and in communications with public officials; [state] (2) organizing and submitting contingent slates of electors to the President of the U.S. Senate and the Archivist of the United States; [fake electors] and (3) making public claims about the scope of the Vice President’s legal authority with respect to the election certification. [PenceCard] [red brackets my own]

Trump doesn’t even pretend to address two of the five means alleged involve a conspiracy to defraud the government: the Jeffrey Clark and mob means. In the sections addressing 1512 and 241, Trump never revisits those other two means (or, in any specificity, the three he does include).

And that’s how, in the section on 1512 (an area where he could, but does not, piggyback on two years of determined work from other January 6 defense attorneys, including several who are members of his larger defense team), he claims he did nothing that could have obstructed the official proceeding — the January 6 vote certification — that he never even identifies.

As discussed above, lobbying members of Congress and state officials to act in a certain way when they conduct an official proceeding does not “obstruct” or “impede” that official proceeding. Nothing about lobbying Congress to act a certain way “places an obstacle” or “impediments,” “hinders … from action,” “gets in the way of the progress of,” “holds up,” or “blocks” Congress from acting. See id. at 1132, 1159. On the contrary, lobbying Congress to act in a certain way presupposes that Congress will conduct an official proceeding, and it seeks to persuade Congress to act in a certain way during that official proceeding. That is the antithesis of “obstructing” or “impeding” the proceeding.

Think about that! If Trump bothered to mention the vote certification, he would literally be claiming that he had absolutely nothing to do with its interruption on January 6, 2021. Nothing.

Even the illegal order to Pence, clearly identified as item 3 in Trump’s 371 section and a primary focus of both Judge David Carter’s opinion finding it likely this did amount to obstruction and the January 6 Report, is gone here. Jeffrey Clark never gets put back in. Most importantly, the obvious means of sending thousands of angry Trump supporters, many armed, to Congress to chase lawmakers out of their chambers remains absent from Trump’s discussion.

This is why (as I noted earlier) I think Trump is simply trying to make his incitement of actual mobsters go away with the Motion to Strike. His legal arguments ignore the incitement of the mob entirely, even after his recusal stunt introduced evidence of someone convicted under 1512, Robert Palmer, who said he committed crimes “at the behest” of Trump, even after his gag fight introduced evidence of a Jan6er stalking Obama immediately after Trump sent him.

To the extent that Trump’s MTDs don’t result in the wholesale dismissal of his indictment (and DOJ argued that by allegedly conspiring with five people outside of government, most of the allegations against Trump couldn’t be treated as official acts even if he did win the Absolute Immunity argument) Trump’s failure to address some of the means he allegedly used will lead to the failure of these efforts.

With the exception of the MTDs for Absolute Immunity (arguing that as a former President Trump, can’t be charged for things he did as President) and Selective Prosecution, these MTDs don’t attempt to argue that the entire indictment should be dismissed. And where in some cases he could make compelling arguments — I think the Jeffrey Clark means, for example, is particularly prone to legal challenge, though Trump barely addresses it — so long as you leave one of the means intact, you won’t succeed in dismissing the indictment.

In practice, the scope of what Trump actually addresses in his MTDs looks something like this:

Not only doesn’t Trump ever address the indictment as alleged (DOJ notes that a Motion to Dismiss must accept the facts alleged as true), but in none of these MTDs does he address all the means alleged. The only place he fully deals with the Jeffrey Clark allegation (which, again, I think is the most susceptible to legal challenge) is in the Absolute Immunity filing that is weak for other reasons. The only place he deals with the mob means is in the Motion to Strike, his legal effort to sweep his role in the violence all under the rug.

If his effort to do that — to remove the descriptions of his own role in the violence from the indictment with his Motion to Strike — fails, then that means alleged in the indictment will survive no matter what else happens.

To be sure, these MTDs have no bearing on whether he’ll ultimately be successful. Trump doesn’t need any of these MTDs to succeed to be acquitted. There will be a contentious fight about admissible evidence and arguments, where this First Amendment argument will be even more contentiously argued than it is here. The fight over advice of counsel arguments has already started, And ultimately he only needs to find one MAGAt willing to ignore all evidence to keep on a jury.

But the big gaps in Trump’s MTD arguments, to say nothing of the way he spins having his campaign submit fraudulent documents to NARA and Congress, seem to reflect points where even his lawyers recognize his case is so weak they just won’t bother — they’ll just try to sweep it all under the rug some other way, like that Motion to Strike.

Again, even if this goes to trial in March as currently scheduled, Trump needs only persuade one voter. If he can use these court filings as a means to delay that trial and as campaign props to win the election, these weak points won’t matter.

Update: Corrected trial date, which is scheduled to start on March 4, per Sean Sullivan.

Hunter Biden[‘s “Laptop”] Goes to SCOTUS: How Judge Doughty Helped China and Iran Attack the US

Hunter Biden is going to SCOTUS!!!

Or rather, the “Hunter Biden” “laptop” is.

Last Friday, SCOTUS granted a stay and certiori for DOJ’s appeal of the Missouri v. Biden case, a right wing lawsuit claiming that the government has forced social media companies to “censor” right wingers (Terry Doughty opinion; 5th Circuit Opinion). While much of the lawsuit focuses on efforts, including those starting under a guy named Trump, to help social media companies limit COVID-related disinformation (Surgeon General Vivek Murthy is the lead appellant), a key part of the claim that the government has coerced social media companies pertains to the FBI.

The Fifth Circuit opinion upholding parts of Judge Doughty’s opinion admitted that, “we cannot say that the FBI’s messages were plainly threatening in tone or manner” but suggested nevertheless that they “’might be inherently coercive if sent by . . . [a] law enforcement officer’” anyway.

Because the people pushing this suit, including now-Missouri Senator Eric Schmitt and now-Louisiana Governor-elect Jeff Landry, are nuts, the “Hunter Biden” “laptop” has come to embody that coercion. The Fifth Circuit adopted that focus (and several inaccurate claims about it) as well. And, in turn, Sam Alito included that focus, citing the Fifth Circuit, in his snotty dissent.

This case began when two States, Missouri and Louisiana, and various private parties filed suit alleging that popular social media companies had either blocked their use of the companies’ platforms or had downgraded their posts on a host of controversial subjects, including “the COVID–19 lab leak theory, pandemic lockdowns, vaccine side effects, election fraud, and the Hunter Biden laptop story.” Id., at *1. According to the plaintiffs, Federal Government officials “were the ones pulling the strings,” that is, these officials “‘coerced, threatened, and pressured [the] social-media platforms to censor [them].’”

This argument, as currently framed, is about whether Judge Doughty properly enjoined the FBI from certain kinds of contacts with social media companies because of the “Hunter Biden” “laptop.”

The Injunction

The injunction on the FBI, imposed largely because of right wing beliefs about the “Hunter Biden” “laptop,” may also explain why three Republican justices granted cert. The prohibition on certain kind of FBI contacts with social media companies may be among the most urgent injury the US government faces under the injunction. That’s partly because Judge Doughty specifically enjoined Elvis Chan, the Assistant Special Agent in Charge of cybersecurity investigations out of San Francisco, and so a key person involved in preventing and responding to cyberattacks targeting or using the infrastructure of social media companies located in Silicon Valley.

Alito’s dissent claims that DOJ only cared about Joe Biden’s bully pulpit, which is not included in the injunction. But in its appeal, DOJ noted that, as written, the injunction might lead the FBI to hesitate before alerting social media companies to potentially harmful content.

And given the court’s suggestion that any request from a law-enforcement agency is inherently coercive, see id. at 232a233a, the FBI would likewise need to tread carefully in its interactions with social-media companies, potentially eschewing communications that protect national security, public safety, or the security of federal elections. For example, particularly in the early stages of an investigation, law-enforcement officials may be uncertain whether a social-media post involves unprotected criminal activity (such as a true threat). But the injunction leaves them guessing what quantum of certainty they must possess before they can inform social-media companies about the post, potentially leading to disastrous delays.

To be sure, Judge Doughty’s injunction included a bunch of carve outs that, right wingers like Alito claim, ensures their efforts to force Twitter to publish Hunter Biden’s dick pics don’t make the country less safe. The carve outs are:

(1) informing social-media companies of postings involving criminal activity or criminal conspiracies;

(2) contacting and/or notifying social-media companies of national security threats, extortion, or other threats posted on its platform;

(3) contacting and/or notifying social-media companies about criminal efforts to suppress voting, to provide illegal campaign contributions, of cyber-attacks against election infrastructure, or foreign attempts to influence elections;

(4) informing social-media companies of threats that threaten the public safety or security of the United States;

(5) exercising permissible public government speech promoting government policies or views on matters of public concern;

(6) informing social-media companies of postings intending to mislead voters about voting requirements and procedures;

(7) informing or communicating with social-media companies in an effort to detect, prevent, or mitigate malicious cyber activity;

(8) communicating with social-media companies about deleting, removing, suppressing, or reducing posts on social-media platforms that are not protected free speech by the Free Speech Clause in the First Amendment to the United States Constitution. [my emphasis]

The carve outs — to the extent that they apply to the FBI, as most by definition do — actually demonstrate the problem with this ruling (and may explain the stakes of the focus on the “Hunter Biden” “laptop”).

Five kinds of interaction with social media

To see why, it’s useful to understand what the plaintiffs actually complained about (which largely tracks Matt Taibbi’s misrepresentations in his Twitter Files propaganda), which are shown in the unshaded rows in the table below.

CISA

First, there’s the Cybersecurity & Infrastructure Security Agency. It was set up within DHS specifically to provide an alternative to the FBI, a non-law enforcement agency that could help protect critical infrastructure, including elections, from cyber as well as brick-and-mortar threats. In addition to its efforts to combat disinformation about elections, for example, CISA has also helped some states harden their election systems against hacking attempts, run active shooter drills with election officials, and helped state election officials recover after natural disasters.

As part of its election role, though, CISA aspired to provide authoritative information to election partners (including social media companies) about both intentional and unintentional incorrect information about elections. The example former CISA Director Chris Krebs provided to the January 6 Committee was an Iranian campaign, active in the days after the Hunter Biden story, to pose as members of the Proud Boys and intimidate people of color not to vote. But in the same way that CISA would help protect pipelines against international or domestic attackers, CISA would track and provide official debunking to incorrect information from both international and domestic sources. Republicans especially hate CISA because Krebs affirmed that the 2020 election had been conducted securely (after which Trump summarily fired him by Tweet). But they also object to the “switchboarding” role that CISA has served, getting reports on incorrect information (which of course could include domestic actors) from election officials, along with corrections, and sharing them with social media companies.

At first, the Fifth Circuit reversed Doughty’s injunction on CISA, but then arbitrarily added them back in, a flaky move that may have contributed to SCOTUS’ decision to review the Fifth Circuit’s actions.

Election Command Post

Then there’s the intervention that might be the most controversial, but which in this litigation got replaced by the right wing obsession with the “Hunter Biden” “laptop.” In the days immediately preceding the 2020 election, FBI agents passed on social media identifiers that misstated the time, place, or means of voting. Per the testimony of Agent Chan, these had been vetted by Public Integrity lawyers at Bill Barr’s DOJ and deemed to be “criminal in nature.” This is the primary instance where the FBI shared information about US persons that might be taken down. It’s also a use case that Matt Taibbi wildly misrepresented, both as to the genesis of the data and the potential existence of ongoing criminal investigations into the activity. And it’s one instance where, under Doughty’s carve out #6, you could see the FBI hesitating before sharing: because while the identifiers in question did mislead about “voting requirements and procedures,” the FBI would’t be able to establish intent without more work (including more intrusive legal process on the accounts). So there’d be no way for the FBI to flag these accounts until it had done more work to determine intent, after which the damage would have been done. This should be where discussions at SCOTUS focus. But they’re not. Instead, Alito is talking about the “Hunter Biden” “laptop.”

FITF: Strategic and Tactical

Finally, there is the FBI’s Foreign Influence Task Force, now led by Laura Dehmlow (the other FBI official specifically enjoined; in 2020 she was the Unit Chief of the Chinese group at FITF). FITF aims to combat malign foreign influence operations, defined as efforts by foreign actors, hiding their foreign identity, to target those inside the US. While such efforts can target elections, they can also be part of traditional espionage and hacking efforts or attempts by authoritarian governments to crack down on US-based dissidents.

FITF interacts (or did, before the injunction) with social media companies in two ways. They hold general meetings — often attended by Chan and Dehmlow — to discuss general tips and techniques about foreign actors, what they called “strategic” information sharing. And they hold one-on-one meetings with social media platforms to discuss specific activity on their platforms — what the FBI calls “tactical.” The leading source of such tactical information, per Dehmlow’s testimony to the House Judiciary Committee, is “another government agency,” often classified information downgraded to share with partners, though Chan described that FBI agents involved in specific counterintelligence or criminal investigations might also share information.

We know that the plaintiffs in this lawsuit misrepresented this sharing. In addition to general descriptions of this information sharing from depositions, we have rather specific evidence about the subject of these FITF briefings in 2020. LinkedIn emails that Doughty claims to rely on, for example, show that the August 2020 agenda for the FITF meeting covered the Internet Research Agency — the Internet trolls that Republicans like to claim were the only way Russia has interfered in elections — but also described a Russian software and influence campaign targeting Ukraine. It shows a specific briefing on APT31, which Mandiant describes as, “a China-nexus cyber espionage actor focused on obtaining information that can provide the Chinese government and state-owned enterprises with political, economic, and military advantages.” That briefing also covered Iran, Venezuela, and North Korea.

While the September 2020 briefing reviewed a fake right wing news site run by IRA (the FBI had just targeted a similar left wing fake news site as well), it discussed three things pertaining to Iran: some influence campaign (as noted, in October CISA would share details of a very sophisticated campaign in 2020 hijacking Proud Boy identities to discourage voters of color), a recent indictment of hackers with ties to IRGC who had targeted (among other things) an American satellite company, and a toolset of some Iranian hackers.

The agenda for the October meeting was not as detailed as the August and. September ones, but a follow-up shows that one item pertained to a Global (meaning something other than Chinese or Russian) campaign targeting Trump, Republicans, and Biden.

This is the kind of information sharing that Judge Doughty’s injunction threatens to end: efforts (among other things) to prevent Iranian and Chinese hacking of US technology companies.

While the subjects of FITF briefing might include Americans — such as the freelancers paid by the IRA’s fake news site or the Trump associates, like Roger Stone and Hannity, who engaged with fake IRA Twitter accounts — they are targeted at selectors that the FBI has “high confidence” are foreigners pretending to be American.

Criminal Process

Thanks to Matt Taibbi’s propaganda, right wingers have completely ignored the role of criminal process in all this, even though Agent Chan repeatedly described in his deposition that, “The majority of my role is dealing with cyber investigations.” There is clear overlap between the things right wingers complain about and known criminal investigations. As I have noted, for example, right in the middle of the 2020 pre-election period, DOJ rolled out a GRU indictment which included the 2017 hack-and-leak operation targeting Emmanuel Macron, in which key members of the far right, including Jack Posobiec, were involved.

Chan described several times that his team not only investigated part of the 2016 hack, but still had an active investigation into those actors. That’s important not only because he would have firsthand knowledge of the kinds of attribution social media companies (and Google and Microsoft) had in 2016, but for another reason: On October 19, 2020, DOJ indicted a bunch of GRU hackers, including one charged in the 2016 hack-and-leak campaign, for a variety of additional hacks, including the hack-and-leak targeting Emmanuel Macron. The Macron campaign, specifically, included both Google and Twitter components. So in the very same weeks when — right wingers complain — Elvis Chan was in close contact with Twitter about the ongoing election, he or his subordinates were likely working with prosecutors in Pittsburgh on an indictment implicating both Google and Twitter.

Emmanuel Macron is not mentioned in the Chan deposition.

The investigation into Douglass Mackey, for intentional disinformation targeting Blacks and Latinos regarding the means of voting, would have been active in this period as well. Those disinformation efforts were substantially orchestrated in Twitter DM threads.

While Agent Chan likely had no involvement in the Mackey case, he has investigated GRU for years, so likely would have been aware of the investigative steps leading up to the 2020 indictment. The press release for that indictment specifically commended the cooperation of Google, Facebook, and Twitter in the investigation.

In other words, not only did FBI provide notice of disinformation from US persons pertaining to content vetted by DOJ attorneys as potential crimes, but some of the contacts FBI had with Twitter in the period would involve far right wing involvement with actual crimes.

Rudy Giuliani and Steve Bannon and FITF

The right wing has focused on FITF rather than other aspects of their complaint because, at an FITF briefing with Twitter shortly after the NYPost story on the “Hunter Biden” “laptop,” someone at Twitter asked about it and an FBI person present said, “the laptop is real,” and then, in a briefing with Facebook, someone asked about it and Dehmlow responded “no comment.” Based on that exchange (and three erroneous details), Judge Doughty finds great fault with the FBI.

The FBI’s failure to alert social-media companies that the Hunter Biden laptop story was real, and not mere Russian disinformation, is particularly troubling. The FBI had the laptop in their possession since December 2019 and had warned social-media companies to look out for a “hack and dump” operation by the Russians prior to the 2020 election. Even after Facebook specifically asked whether the Hunter Biden laptop story was Russian disinformation, Dehmlow of the FBI refused to comment, resulting in the social-media companies’suppression of the story. As a result, millions of U.S. citizens did not hear the story prior to the November 3, 2020 election. Additionally, the FBI was included in Industry meetings and bilateral meetings, received and forwarded alleged misinformation to social-media companies, and actually mislead [sic] social-media companies in regard to the Hunter Biden laptop story. The Court finds this evidence demonstrative of significant encouragement by the FBI Defendants.

On top of the three errors Doughty makes (which I’ll get to), there are several problems here. First, confirming that the FBI knew the laptop was real, as the FBI did, was a privacy violation! Hunter Biden is the one who has complaint for the disclosure of an ongoing criminal investigation (which is, according to Agent Chan, why Dehmlow responded no comment to the Facebook question), not the right wing.

More importantly, based on what is publicly known, Hunter Biden would normally not be included FITF briefing. He’s a US citizen. While several of his international relationships (with Burisma, with Romania, and with CEFC) were being investigated as potential FARA violations in 2020 and after, with the important exception of a slight delay in Burisma’s announcement of his appointment in 2014, Hunter’s ties to such entities were not covert. Nor is there any allegation he disseminated false information about those entities online, especially on Facebook and Twitter. CEFC might have been the subject of FITF focus, but more for its covert role in recruiting James Woolsey.

One person who might be included in FITF briefings in summer 2020, though, is Guo Wengui. Unlike Hunter Biden, he’s not a US citizen; he is (or was, before his indictment in March) present in the US as an asylum seeker. And as public reports from July 2020 described, the source of funding for his propaganda efforts was under FBI investigation, precisely the kind of covert relationship of interest to FITF. That reporting suggested that Guo might secretly be funded by the Chinese state to track Chinese dissidents, something Dehmlow has explicitly included within FITF’s mandate. In a filing in the current investigation against Guo, SDNY has pointed to evidence obtained in a more recent search of Guo’s property pertaining to a 2018 meeting between the UAE and China. In other words, in 2020, the FBI was actively investigating whether China and/or the Emirates funded propaganda put out by Guo, with Steve Bannon’s involvement, precisely the kind of secret foreign backing of influence campaigns that FITF focuses on. So while Hunter Biden shouldn’t have come up as a subject of FITF briefing, Bannon’s partnership with Guo might have.

We don’t know whether that happened. But one person whose propaganda campaign definitely was a subject of FITF briefing is Andrii Derkach. Between the August and September face-to-face meetings, on September 10, 2020, a Unit Chief (presumably the Russian Unit Chief) at FITF  sent a link to LinkedIn noting Treasury’s sanctioning of Derkach, explaining, “just want to let you know about someone we have discussed in previous briefings.” Obviously, the link was public, as was a WaPo story that same day tying Derkach to Rudy’s efforts to push criminal investigations related to Joe Biden. But the FBI sent the link, referencing back to prior discussions, to flag it for LinkedIn.

In other words, the far right is complaining that the FBI didn’t offer up details about an ongoing criminal investigation into Hunter Biden, but they’ve never complained that the FBI didn’t offer up details about a national security investigation into Steve Bannon’s propaganda partner (one who, subsequent reporting has confirmed, played a key role in altering and disseminating Hunter Biden dick pics). Nor have they complained that FBI didn’t offer up details about the counterintelligence investigation into the alleged Russian agent conducting an influence operation targeting Rudy at this meeting. Rudy and Bannon were named in the NYPost story in question, yet the right wing isn’t wailing that the FBI didn’t describe ongoing FBI investigations, investigations directly relevant to the mission of FITF, in the briefing after its release.

Doughty’s Three Errors

Which brings us, finally, to three errors that Doughty makes — at least one of which is already before SCOTUS — in sustaining his complaint that the FBI must be enjoined because they didn’t offer up more information about a criminal investigation into Hunter Biden.

First, in his opinion written in July, Doughty points to Yoel Roth’s 2020 FEC testimony, which is where Roth first explained that Twitter took down the initial NYPost link under its hack-and-leak policy.

(10) Yoel Roth (“Roth”), the then-Head of Site Integrity at Twitter, provided a formal declaration on December 17, 2020, to the Federal Election Commission containing a contemporaneous account of the “hack-leak-operations” at the meetings between the FBI, other natural-security agencies, and social-media platforms.405 Roth’s declaration stated:

Since 2018, I have had regular meetings with the Office of the Director of National Intelligence, the Department of Homeland Security, the FBI, and industry peers regarding election security. During these weekly meetings, the federal law enforcement agencies communicated that they expected “hack-and-leak” operations by state actors might occur during the period shortly before the 2020 presidential election, likely in October. I was told in these meetings that the intelligence community expected that individuals associated with political campaigns would be subject to hacking attacks and that material obtained through those hacking attacks would likely be disseminated over social-media platforms, including Twitter. These expectations of hack-and-leak operations were discussed through 2020. I also learned in these meetings that there were rumors that a hack-and-leak operation would involve Hunter Biden. 406 [emphasis original]

In his testimony, Agent Chan disputed the notion that that the FBI suggested a hack-and-leak would involve Hunter Biden, because Joe Biden’s son had not come up in meetings before the NYPost story he attended.

[I]n my estimation, we never discussed Hunter Biden specifically with Twitter. And so the way I read that is that there are hack-and-leak operations, and then at the time — at the time I believe he flagged one of the potential current events that were happening ahead of the elections.

That’s consistent with what Roth has said since, in House Oversight Testimony, clarifying that he heard the rumors about a hack-and-leak involving Hunter Biden from other social media companies, not the FBI.

I think it actually should have been two separate sentences. It is true that in meetings between industry and law enforcement, law enforcement discussed the possibility of a hack and leak campaign in the lead up to the election. And in one of those meetings, it was discussed, I believe, by another company that there was a possibility that that hack and leak could relate to Hunter Biden and Burisma. I don’t believe that perspective was shared by law enforcement. They didn’t endorse it. They didn’t provide that information in that.

But Doughty nevertheless relies on the outdated misinterpretation to blame the FBI for Twitter’s conclusions.

As noted, there’s no mention of one reason why this conclusion would be sound — the public reporting on Andrii Derkach, which was part of FITF briefing. Nor is there mention of the GRU hack of Burisma reported by a Silicon Valley InfoSec company earlier that year.

This lawsuit has thrived even after Agent Chan debunked one conspiracy theory about the social media’s throttling of the NYPost story, the false assumption that the FBI affirmatively told Twitter and Facebook that a hack-and-leak would involve Hunter Biden.

It has done so, in part, because of a truly bizarre — and erroneous — complaint from Doughty: That Chan and others at the FBI and CISA warned social media companies of hack-and-leak campaigns, like the GRU one of Macron indicted just days after the NYPost Hunter Biden story October 2020. Social media companies took the “Hunter Biden” “laptop” story down, the logic goes, because the FBI coerced them to change their moderation policies to prohibit publication of hacked materials.

In Doughty’s version, the social media companies responded to this pressure in 2020, just in time to use it to justify taking down the NYPost story.

Social-media platforms updated their policies in 2020 to provide that posting “hacked materials” would violate their policies. According to Chan, the impetus for these changes was the repeated concern about a 2016-style “hack-and-leak” operation.402 Although Chan denies that the FBI urged the social-media platforms to change their policies on hacked material, Chan did admit that the FBI repeatedly asked the social-media companies whether they had changed their policies with regard to hacked materials403 because the FBI wanted to know what the companies would do if they received such materials.404 [my emphasis]

In the Fifth Circuit’s telling, that change seems to date to 2022, two years after the “Hunter Biden” “laptop” story.

For example, right before the 2022 congressional election, the FBI tipped the platforms off to “hack and dump” operations from “statesponsored actors” that would spread misinformation through their sites. In another instance, they alerted the platforms to the activities and locations of “Russian troll farms.” The FBI apparently acquired this information from ongoing investigations.

Per their operations, the FBI monitored the platforms’ moderation policies, and asked for detailed assessments during their regular meetings. The platforms apparently changed their moderation policies in response to the FBI’s debriefs. For example, some platforms changed their “terms of service” to be able to tackle content that was tied to hacking operations. [my emphasis]

In fact, the Fifth Circuit builds most of its claim of FBI coercion on this change in terms of service (again, seemingly in 2022), which it ties to content take downs, the sole potential hack-and-leak example of which is that first article on the “Hunter Biden” “laptop.”

Fourth, the platforms clearly perceived the FBI’s messages as threats. For example, right before the 2022 congressional election, the FBI warned the platforms of “hack and dump” operations from “state-sponsored actors” that would spread misinformation through their sites. In doing so, the FBI officials leaned into their inherent authority. So, the platforms reacted as expected—by taking down content, including posts and accounts that originated from the United States, in direct compliance with the request. Considering the above, we conclude that the FBI coerced the platforms into moderating content. But, the FBI’s endeavors did not stop there.

We also find that the FBI likely significantly encouraged the platforms to moderate content by entangling itself in the platforms’ decision-making processes. Blum, 457 U.S. at 1008. For example, several platforms “adjusted” their moderation policies to capture “hack-and-leak” content after the FBI asked them to do so (and followed up on that request). Consequently, when the platforms subsequently moderated content that violated their newly modified terms of service (e.g., the results of hack-and-leaks), they did not do so via independent standards.

It’s a crazy enough argument on its face (especially the Fifth Circuit’s suggestion that a change in 2022 led to the throttling of a 2020 story). But it also gets the timing — and therefore the cause-and-effect — wrong. The actual change to Twitter’s policy, for example, was in March 2019, based off discussions before that. Either FBI planned their malicious coercion long before they got the laptop from JPMI, or the claim is utterly nonsensical.

DOJ called out this error in its SCOTUS response.

Similarly, respondents’ claim that the platforms “updated their policies in 2020” with respect to “‘hacked materials,’” such as “‘the laptop story,’” “after the FBI’s ‘impetus,’” Opp. 17, 19 (brackets and citations omitted), cannot be squared with the platforms’ own testimony that their actions with respect to the “laptop story” were based on policies adopted in 2018, C.A. ROA 18,498-18,499, 18,505.

In other words, the main claim that the Fifth Circuit made about coercion — which, again, was ultimately a claim about coercing social media companies to do something that prevented one story from going viral — got the timing and therefore any possible causality wrong.

Finally, there’s the source of Doughty’s claim of animus on the part of the FBI, his claim that they deliberately withheld information that (he imagines) would have led Facebook and Twitter to act differently.

The mention of “hack-and-leak” operations involving Hunter Biden is significant because the FBI previously received Hunter Biden’s laptop on December 9, 2019, and knew that the later-released story about Hunter Biden’s laptop was not Russian disinformation. 408

Doughty bases this claim on a November 2, 2022 Miranda Devine (!!!) column. The column is, predictably, riddled with debunked propaganda, including the shoddy Intercept piece that kicked off this campaign, the lawsuit itself (making it a self-licking ice cream cone), and a preview of John Paul Mac Isaac’s then unpublished book (though not the line where an FBI agent told JPMI’s father, “You may be in possession of something you don’t own”).

The paragraph from which Doughty bases his claim that FBI “knew that the later-released story about Hunter Biden’s laptop was not Russian disinformation” appears to be this one:

We know the FBI at the time was spying on Rudy Giuliani’s online cloud with a covert surveillance warrant. Therefore, it had access to his emails in August 2020 from computer store whistleblower John Paul Mac Isaac and to my text messages discussing when The Post would publish the story. It sure looks as if the FBI deliberately pre-censored a legitimate story for a political aim.

Of course, the paragraph doesn’t mention Russian disinformation, nor does JPMI’s role in the process rule out Russian disinformation (a point I laid out here).

Plus, the paragraph is factually wrong. Per failed redactions in a Lev Parnas filing and other filings in that Special Master docket, FBI obtained a warrant Rudy’s iCloud account and emails on November 4, 2019, before John Paul Mac Isaac was subpoenaed by the FBI, and nine months before JPMI reached out to Rudy. Rudy’s phones were seized with an April 21, 2021 warrant, long after the controversy in question (though at least several of those phones were corrupted). While it’s certainly likely that DOJ obtained a second warrant for Rudy’s emails after that, it would not have happened in 2020. In other words, there is no known legal process that obtained Rudy’s emails that would have included JPMI’s emails to him before the NYPost story came out.

Plus, JPMI’s emails to Rudy would only be in the scope of the known warrant against Rudy … if the laptop were part of a Ukranian effort to deal dirt to cause legal problems for Joe Biden and his family.

Devine may base her claim, at least in part, elsewhere. Her column also alludes to the disgruntled FBI agents who attacked Tim Thibault.

This year, whistleblowers have come forward to finger various FBI employees engaged in the cover-up. Timothy Thibault, the recently retired assistant special agent in charge of the FBI’s Washington, DC, field office, was the agency point man to manage Tony Bobulinski, Hunter’s business partner who went to the FBI with evidence of the Biden influence-peddling operation. Thibault allegedly ordered the investigation closed and has refused to cooperate with GOP members of the House Judiciary Committee.

This, too, is false. Thibault’s House Judiciary Committee interview reveals that his only involvement with the Tony Bobulinski interview was to address Bobulinski’s request to turn over just some of the material on some of his devices.

But Devine’s reliance on such disgruntled agents is interesting for another reason: because they are likely disgruntled at least partly because of warnings against the involvement of Steve Bannon associate Peter Schweizer in the Hunter Biden investigation. The disgruntled agents falsely claimed, elsewhere, that Thibault, on his own, shut down Schweizer as a source. Yet according to Thibault’s testimony, he did so only after two warnings. First, the lead FBI agent on the Hunter investigative team told Thibault that getting contents of the laptop from Schweizer, which they had already gotten, “could cause problems when you get to prosecution … and [] open doors for defense attorneys.” And shortly thereafter — so temporally in the same time period as the first NYPost story — FITF raised concerns about the Bannon associate. A week after the NYPost story, around October 21, FITF provided Thibault a classified briefing (from which they excluded the line FBI agents, in part because the daughter of one was posting related content on Daily Caller). That briefing described more context about FITF’s concerns.

In spite of all the obvious problems with Devine’s propaganda, it formed a key part of Doughty’s claim that FBI coercion, rather than an independent series of decisions about hosting potentially stolen content, resulted in the throttling of the first NYPost story.

And based on that shoddy case — based on the feverish conspiracy theories about the “Hunter Biden” “laptop” sustained by Eric Schmitt and Jeff Landry and Miranda Devine — Judge Doughty made it significantly riskier for Agent Chan and others to work with social media companies to do things like prevent Iranian hacks of US satellite companies.

Buried in DOJ’s Absolute Immunity Response, a Comment on Trump’s Suspected Zenith Crimes

Earlier this month, Trump’s DC team filed a motion to dismiss his January 6 indictment based on a claim of absolute immunity, an argument that Presidents cannot be prosecuted for things they did while President.

To get a sense of how shoddy Trump’s argument was, you need only compare the number of citations to these cases:

  • Nixon v. Fitzgerald, which found Presidents had absolute immunity against civil lawsuits for things that fall within their official duties
  • US v. Nixon, which found that the same President who had absolute immunity from civil suit could not use Executive Privilege to withhold evidence from a criminal prosecution
  • Trump v. Vance, which held that Trump, while still President, was not immune from a criminal subpoena
  • Thompson v. Trump, in which SCOTUS upheld a DC Circuit Opinion that upheld a Tanya Chutkan opinion that the events of January 6 overcame any Executive Privilege claim Trump might make to withhold documents from Congress, a far higher bar than withholding them from the FBI

Trump’s absolute immunity claim was a shoddy argument, but you never know what this SCOTUS would rubber stamp, even considering its cert denial in Thompson v. Trump and questions about whether Clarence Thomas (who did not recuse in that case, but did in John Eastman’s appeal of a crime-fraud ruling against him) would be shamed into recusing in this one.

Shoddy argument and all, there was never going to be a way to carry out the first-ever prosecution of a former President without defeating an absolute immunity claim.

In general, DOJ’s response is much more adequate than Trump’s motion to the task of laying out one side of an argument that will ultimately be decided by a very partisan Supreme Court. But it is written as the first response in what will be, whatever the outcome, a historic ruling.

Before it spends ten pages addressing Trump’s application of Nixon v. Fitzgerald, it spends ten pages laying out the constitutional framework in question. In a section addressing Trump’s claim that his impeachment acquittal on January 6 charges meant he could not be charged for related crimes, DOJ notes that Trump argued at the time, that as a former President, the Senate no longer had jurisdiction to hold an impeachment trial. Then it cites the many Republican Senators who used that stance to justify their own acquittal votes. It notes that the Nixon pardon and the Clinton settlement both presumed potential exposure to prosecution once they became former Presidents.

Out of necessity, the Fitzgerald section adopts an analogy from that precedent to this one: In the same way that Fitzgerald likened the President to prosecutors and judges who enjoy immunity for their official acts, Fitzgerald did not immunize those same prosecutors and judges from other crimes. At a time of increased focus on undeclared gifts that Clarence Thomas has accepted from people with matters before the court and after a Sam Alito interview — with someone who has matters before the court — in which he claimed separation of powers prohibited Congress from weighing in on SCOTUS ethics, DOJ cited the 11th Circuit opinion holding that then-Judge Alcee Hastings could be prosecuted. That is, whatever the outcome of this dispute, it may have implications for judges just as it will for Presidents.

Only after those lengthy sections does DOJ get into the specifics of this case, arguing:

  • By misrepresenting the indictment in a bid to repackage it as acts that fit within the President’s official duties, Trump has not treated the allegations as true, as Motions To Dismiss must do
  • Trump’s use of the Take Care Clause to claim the President’s official duties extend to Congress and the states is not backed by statute
  • Because Trump is accused of conspiring with people outside of the government — unsurprisingly, DOJ ignores the Jeffrey Clark allegations in this passage (CC4), but while it invokes Rudy Giuliani (CC1), John Eastman (CC2), Kenneth Chesebro (CC5), and Boris Epshteyn (CC6), it is curiously silent about the allegations pertaining to Sidney Powell (CC3) — the case as a whole should not be dismissed

In total, DOJ’s more specific arguments take up just six pages of the response. I fear it does not do as much as it could do in distinguishing between the role of President and political candidate, something that will come before SCOTUS — and could get there first — in the civil suits against Trump.

And its commentary on Trump’s attempt to use the Take Care Clause to extend the President’s authority into areas reserved to the states and Congress is, in my opinion, too cursory.

The principal case on which the defendant relies (Mot. 35-36, 38, 43-44) for his expansive conception of the Take Care Clause, In re Neagle, 135 U.S. 1 (1890), cannot bear the weight of his arguments. In Neagle, the Supreme Court held that the Take Care Clause authorized the appointment of a deputy marshal to protect a Supreme Court Justice while traveling on circuit even in the absence of congressional authorization. Id. at 67-68; see Logan v. United States, 144 U.S. 263, 294 (1892) (describing Neagle’s holding); Youngstown Sheet & Tube, 343 U.S. at 661 n.3 (Clark, J., concurring) (same). Before reaching that conclusion, the Court in Neagle posed as a rhetorical question—which the defendant cites several times (Mot. 35, 38, 43, 44)—whether the president’s duty under the Take Care Clause is “limited to the enforcement of acts of congress or of treaties of the United States according to their express terms; or does it include the rights, duties, and obligations growing out of the constitution itself, our international relations, and all the protection implied by the nature of the government under the constitution?” 135 U.S. at 64. From the undisputed proposition that the president’s powers under Article II are not limited only to laws and treaties, it does not follow, as the defendant seems to imply, that every “right, duty, or obligation[]” under the Constitution is necessarily coterminous with the president’s powers under the Take Care Clause. Under that theory, for example, the president could superintend Congress’s constitutional obligation to keep a journal of its proceedings, U.S. Const. art. I, § 5, cl. 3, or the judiciary’s duty to adjudicate cases and controversies, U.S. Const. art. III, § 2, cl. 1.

The 11th Circuit and then SCOTUS will be facing a similar, albeit better argued, Take Care Clause argument when they review Mark Meadows’ bid to remove his Georgia prosecution. You’d think DOJ could do better — or at the very least note that Trump abdicated all premise of upholding the Take Care Clause during a crucial 187 minutes when his mob was attacking the Capitol.

All that said, I’m as interested in this response for the associated arguments — the seemingly hypothetical ones — such as the one (already noted) that in weighing this argument, the Supreme Court may also have to consider, again, whether they themselves are immune from prosecution for bribery.

It’s not just Clarence Thomas whose actions this fight could implicate.

In two places, DOJ uses hypotheticals to talk about other Presidential actions that might be crimes, rather than focus on the specifics of the case before Judge Chutkan.

For example, DOJ points to the possibility that a President might trade a pardon — a thing of value — as part of a quid pro quo to obtain false testimony or prevent true testimony.

For example, where a statute prohibits engaging in certain conduct for a corrupt purpose, the statute’s mens rea requirement tends to align, rather than conflict, with the president’s Article II duty to “take Care that the Laws be faithfully executed,” U.S. Const. art. II, § 3, which would weigh heavily against the need for immunity. To illustrate, although the president’s power to grant pardons is exclusive and not subject to congressional regulation, see United States v. Klein, 80 U.S. (13 Wall.) 128, 147-48 (1872), criminal immunity should not shield the corrupt use of a presidential pardon—which plainly constitutes “anything of value” for purposes of the federal bribery statute, see 18 U.S.C. § 201(b)(3)—to induce another person to testify falsely or not to testify at all in a judicial, congressional, or agency proceeding.

Less than five years ago, of course, Roger Stone was telegraphing that prosecutors had offered him leniency if he would testify about dozens of conversations that he had with Trump during the 2016 election. Less than five years ago, the newly cooperative Sidney Powell first asked Trump to hold off on pardoning Mike Flynn, only to welcome a Trump pardon of Flynn while Powell and Flynn plotted ways to steal the election. Less than five years ago, Trump gave a last minute pardon to Steve Bannon, who currently faces four months of prison time because he refused to testify to Congress.

I’m not saying DOJ will revisit these pardons, all of which fit squarely within such a quid pro quo description. I’m noting that if the argument as a whole survives, this part of it may also survive.

The same is true of an even splashier passage. A paragraph describing the implications of Trump’s claim to absolute immunity lays out what some commentators have taken as hyperbolic scenarios of presidential corruption.

The implications of the defendant’s unbounded immunity theory are startling. It would grant absolute immunity from criminal prosecution to a president who accepts a bribe in exchange for a lucrative government contract for a family member; a president who instructs his FBI Director to plant incriminating evidence on a political enemy; a president who orders the National Guard to murder his most prominent critics; or a president who sells nuclear secrets to a foreign adversary. After all, in each of these scenarios, the president could assert that he was simply executing the laws; or communicating with the Department of Justice; or discharging his powers as commander-in-chief; or engaging in foreign diplomacy—and his felonious purposes and motives, as the defendant repeatedly insists, would be completely irrelevant and could never even be aired at trial. In addition to the profoundly troubling implications for the rule of law and the inconsistency with the fundamental principle that no man is above the law, that novel approach to immunity in the criminal context, as explained above, has no basis in law or history.

These seemingly extreme cases of crimes a President might commit, crimes that everyone should agree would face prosecution, include (these are out of order):

  • A President ordering the National Guard to murder his critics
  • A President ordering an FBI agent to plant evidence on his political enemy
  • A bribe paid in exchange for a family member getting a lucrative contract
  • A President selling nuclear secrets to America’s adversaries

Like the pardon discussion above, these hypotheticals — as Commander-in-Chief, with the conduct of foreign policy, with the treatment of classified materials — invoke actions where DOJ typically argues that the President is at the zenith of his power.

We have no reason to believe that Trump ordered the National Guard, specifically, to murder his critics. But we do know that on January 3, 2021, Trump proposed calling out 10,000 members of the National Guard to “protect” his people and facilitate his own march on the Capitol.

And he just cut me off, and he goes, well, we should call in the National Guard.

And then I think it was Max who said something to the effect of, Well, we should only call in the Guard if we expect a problem. And then the President says, no, we should call in the Guard so that there aren’t – so that there isn’t a problem. You know, we need to make sure people are protected.

And he said – he looked over at Max, and I don’t know if somebody was standing behind him or not. He just looked the other way from me and says, you know,  want to call in 10,000 National Guard. And then  opened my folder and wrote down 10,000 National Guard, closed my folder again.

We know that days later Mark Meadows believed the Guard would be present and Proud Boy Charles Donohoe seemed to expect such protection.

Similarly, we don’t know of a specific instance where Trump ordered an FBI agent to plant information on his political enemy. But we do know that as part of a Bill Barr-directed effort to reverse the Mike Flynn prosecution in 2020, misleading dates got added to the notes of Trump’s political enemies, Peter Strzok and Andrew McCabe.

Days after those misleading dates were made public via Sidney Powell, Trump used the misleading dates in a packaged debate attack on Joe Biden.

President Donald J. Trump: (01:02:22)
We’ve caught them all. We’ve got it all on tape. We’ve caught them all. And by the way, you gave the idea for the Logan Act against General Flynn. You better take a look at that, because we caught you in a sense, and President Obama was sitting in the office.

We know of no instance where Trump accepted a bribe in response to which a family member got a US government contract. We do, however, know of an instance where the Trump Administration gave the Saudis something of value — at the least, cover for the execution of Jamal Khashoggi — which everyone seems to believe has a tie to Jared’s lucrative $2 billion contract with the Saudi government.

As to selling nuclear secrets to a foreign adversary? Well, we know Trump had some number of nuclear secrets in his gaudy bathroom and then in his leatherbound box. We have no fucking clue what happened to the secrets that Walt Nauta allegedly withheld from Evan Corcoran’s review that got flown to Bedminster just before a Saudi golf tournament, never to be seen again.

All of which is to say that these edge cases — examples of Presidential misconduct that some commentators have treated as strictly hypothetical — all have near analogues in Trump’s record.

This response is a response about a very specific indictment, an indictment that describes actions Trump took as a candidate, often with those outside government, in ways that usurped the authorities reserved to states and Congress.

But in several points in the filing, DOJ invites review of other potential crimes, crimes conducted at the zenith of Presidential power, but crimes that may — must — otherwise be illegal, if no man is above the law.

Release the Kraken: Sidney Powell Pleading Guilty

Sidney Powell is pleading guilty to six counts of conspiring to interfere with election administration in Fulton County. These will be misdemeanors treated under the First Offender Act. She will be sentenced to six years of probation.

She is required to testify against any and all co-defendants in the case.

Gary Shapley’s “Red Line” Tantrum Actually Started Two Weeks Earlier

Days before an October 7, 2022 meeting at which, Gary Shapley has claimed for months, his “red line” was crossed, the thing he has used to excuse months of leaking as “whistleblowing,” he scripted the things — including a demand for a Special Counsel to make the decision that David Weiss announced having made in the meeting — that Shapley claimed to record in real time at the meeting.

Indeed, the documents House Ways and Means released last month purporting to support their complaints about the Hunter Biden prosecution show that Shapley’s tantrum had been going on for weeks and had started in significant part because the charges he was demanding wouldn’t be rolled out in advance of the 2022 election.

It has already been established that no other attendee at the October 7, 2022 meeting has backed Gary Shapley’s version of that meeting. No other attendee remembered David Weiss conveying that he didn’t have the authority to make this charging decision regarding Hunter Biden on his own. Most attendees have charitably explained that Shapley didn’t understand what he was hearing, particularly with regards to Special Attorney versus Special Counsel status. In his testimony to the House Judiciary Committee, Matthew Graves attributed Shapley’s claims to, “the garble that can happen when you layer hearsay on top of hearsay on top of hearsay. And when you look at a lot of this, it’s someone said that someone said that someone said.”

Even just Shapley’s own notes undermine his claim. As I have noted, between his hand-written contemporaneous notes and his emailed memorialization, Shapley reordered how things happened at the meeting, moving the reasons Weiss gave on October 7 for why he wouldn’t charge 2014 and 2015 — the charges against Hunter Biden that would have to be charged in DC — after Shapley’s own claim that David Weiss didn’t have the authority to make that prosecutorial decision.

Per his contemporaneous notes, the first thing discussed after the discussion about the leak was Weiss’ rationale for not charging 2014 and 2015, the two more substantive years that would have to be charged in DC. Once you’ve explained that, then whether or not Weiss got Special Attorney status for DC is significantly moot (2016 was only ever treated as a misdemeanor).

In his email to his boss, though, Shapley moved that discussion to after his argument, covering the DC charges, the LA charges, and the involvement of DOJ Tax Attorney, that Weiss didn’t have authority to charge. If Weiss had already explained his prosecutorial decision about the most problematic Burisma years — something Shapley’s hand-written notes record him has having done — then none of the other complaints about these years (that Weiss or Lesley Wolf let the Statutes of Limitation expire, that Weiss didn’t get Special Attorney authority in DC) matter. Shapely reorders his notes to hide the fact that the DC decision didn’t matter.

Shapley’s hand-written notes record Weiss sharing a prosecutorial decision — not to charge the 2014 and 2015 tax years. By making a decision not to charge in DC, Weiss was exercising the prosecutorial authority Shapley claimed Weiss said he didn’t have. Once you describe Weiss making a prosecutorial decision, then any claim that he didn’t have prosecutorial authority crumbles.

It crumbles even more given a few other details.

Shapley’s retroactive memorialization of the October 7, 2022 expresses great fury over Weiss’ decision not to charge the 2014 and 2015 years, as well as the delay of charges until after the election.

But Shapley learned of this weeks and even months earlier. 

On July 29, for example, Joseph Ziegler asked Lesley Wolf about timing. Per Shapley’s own memorialization, she said Weiss was aiming to indict before the end of September, but Wolf herself expressed doubt that would happen. That comment on timing, coupled with her stated disinclination to toll the 2014 tax year, was a pretty solid indication that she was disinclined to charge 2014.

Zeigler

Any dates or goals?

Wolf

David has indicated that the end of September would be his goal to charge. The is reflective of keeping everything on track. They do not want to get any closer to a mid-term. If doesn’t happen by end of September it would have to wait until November after the elections. She stated she does not think that is likely to by charged by September.

Sol on 2014 blows on November 8, 2022.

X Factor on timing will include any delay defense counsel has requested and that they would be amenable to toll statutes. She is not leaning toward tolling again…but it is possible.

Current plan is that the prosecution recommendation will be collaborative with DOJ Tax and USAO.

[snip]

They will communicate any decisions on specific tax years and decision to charge or not charge to the prosecution team in advance of any final document. [my emphasis]

On August 16, the IRS investigators had a meeting with David Weiss, one that Wolf happily arranged on August 8. Because Wolf and other DOJ personnel could’t attend, that would be a second meeting the IRS had with David Weiss alone.

On August 11, DOJ Tax tried to set up a meeting for the following day, an invitation which Ziegler accepted; Shapley was not invited. There’s no memorialization of this meeting, at which DOJ Tax probably explained why it viewed the 2014/2015 tax years as weaker charges.

On August 15, in advance of the meeting with Weiss, Shapley reminded  Darrell Waldon and Michael Batdorf about the forthcoming meeting with Weiss. Only Michael Batdorf, the second-level supervisor who testified that Shapley had a habit of, “a tendency to go to level like grade 7 five-alarm fire on everything,” responded. Shapley’s August 17 memorialization of the August 16 meeting, shared with those supervisors again, showed that Weiss was “leaning” towards only charging the CA charges, 2017 to 2019. Shapley recorded Weiss aiming to charge by the end of September, but said himself it’d be “October/November” (even though, in July, Wolf had said that if it wasn’t charged by September, it would be after November).

Here’s what Shapley said about 2014 and 2015 in that email:

We again pushed back on not charging 2014/2015. DOJ Tax continues the position that the defenses (load/taxes paid by another person on half the income) would make it too complex for the jury. I believe their position is unsupportable–both considering precedent and evidence. I made it clear that not only do we disagree with that position but that we could provide countless prosecution recommendations that included diverted income to nominees and various loan claims to support our position. The USA agrees with us but then talks to DOJ Tax and they convince him otherwise. This has happened a couple times. As a result, we will continue to communicate our position to ensure this moves forward consistent with how other tax cases would be treated with similar fact patterns.

I explained that 2014 is not charged how it would severely diminish of the overall conduct and would essentially sanitize some major issues to include the Burisma/Ukraine unreported income. I also explained that if 2014 is not charged and/or included in a statement of facts in a guilty plea, that the unreported income from Burisma that year would go untaxed. I believe leaving out 2014/2015 would deliver a message that is contrary to IRS’s efforts to promote voluntary compliance. [my emphasis]

Some of this is about getting taxes paid — the explanation Shapley would repeat in his memorialization of the October 7 meeting. But some of it is about tying Hunter’s tax crimes to Burisma.

Once again, Batdorf was the only who responded. He said he would escalate Shapley’s concerns still further, so the Chief and Deputy Chief of IRS could “at least show full support for the 2014/2015 years.” In Waldon’s testimony, he expressed being surprised at the October 7 meeting, because “I was not fully aware of a decision regarding some of the investigative years,” (49) a view that may stem from Shapley’s efforts in August to reverse this decision.

On August 18, Mark Daly from DOJ tax sent the investigative team (but not Shapley) an email that seems consistent with presenting to grand juries in both Delaware and Los Angeles in September — but not DC, once again consistent with a decision not to charge 2014 and 2015. Of note: this email was saved on June 27 of this year, before Ziegler and Shapley testified to the Oversight Committee on July 19 and Ziegler offered to go back to find more materials. Ziegler appears to have already taken steps to share information that he feigned was just a response to Congressional inquiries.

Shapley appears to have memorialized an August 25 email from Lesley Wolf asking a newly added FBI agent, along with Ziegler and Mark Daly, not to use email to coordinate between meetings. Shapley wasn’t a recipient of this particular email. It’s an example of the double set of books Shapley confessed to in his original deposition.

On September 20, 2022, over a week before the interview of James Biden (Hunter’s uncle and sometime business partner and Joe’s brother) and the day after Martin Estrada was confirmed as US Attorney for Los Angeles, Shapley emailed Weiss, cc’ing no one else, asking for a call in the following two days. The next day, September 21 at 1:23PM, Weiss said he would set up a meeting “in the near term,” including IRS and FBI, to provide an update. This email thread, which Shapley would pick up over a month later, would become the one where Shapley’s paranoia about Weiss cutting off communication with Shapley first expressed. As we’ll see, this Shapley request to Weiss was also the ultimate genesis of the October 7 meeting.

Just over two hours after Weiss promised an update shortly on September 21, Shawn Weede, Weiss’ Criminal Chief, wrote to set up the meeting Weiss had promised, proposing the meeting for September 28 (still one day before the interview of James Biden). Shapley responded 22 minutes later, noting that he would be in the Netherlands on the day of the proposed meeting, but would be willing to call in.

The next day, at 11:15AM, Weede wrote back to say a “sanitized” meeting was unworkable, and so proposed the meeting for the week of October 3, after Shapley got back.

Also on September 22, Shapley memorialized a meeting that started at 2:30PM noting that Lesley Wolf and DOJ Tax’s Mark Daly joined the meeting late, but without documenting anyone else who attended. The memorialization was closely focused on briefings of Estrada’s office on the case (though Shapley refers to Estrada as “her”). It also clearly records DOJ tax still conducting their review, as well as a decision not to charge either the gun charge and/or anything else until after the election — precisely the eventuality that Wolf had warned would happen almost two months earlier.

Gun charge will likely not be indicted in October.

[snip]

USAO and DOJ Tax made the decision not to charge until after the election. They said why should they shoot themselves in the foot by charging before.

Within an hour after the start of the call, Shapley was going ballistic about precisely that eventuality. Starting at 3:34PM, Shapley alerted Batdorf — but not his immediate supervisor, Waldon,

Big news on Sportsman. Joe Ziegler and I need to speak with you as soon as possible.

In a follow-up, Shapley explained that the “bad news” he had was precisely what he had been warned about in July, that the charges would be delayed until after the election.

Bad news. Continued inappropriate decisions affecting timing. i.e. Election. We can talk later if you are busy….I believe their actions are simply wrong and this is a huge risk to us right now.

Note: There was no risk to the IRS of delay after the election. It would mean the 2014 charges would toll (unless Hunter’s lawyers agreed to waive tolling, as they had before), but that’s another thing Shapley was warned about. A significant part of Shapley’s tantrum seems to stem from a personalized concern that charges would not come out before the election.

Batdorf ended the exchange by instructing, “Please ensure your ASAC and SAC are updated as well.”

Shapley did that, but not until almost two hours later, in a 5:28PM email to Darrell Waldon (his ASAC), Lola Watson (his SAC), and Michael Batdorf. Without noting that he had already bypassed chain of command, Shapley complained,

During todays SM call there was some information provided to the team concerning decisions made by the USAO and DOJ that need to be discussed. For example, the AUSA stated that they made a decision not to charge until after the election. In itself, the statement is inappropriate let alone the actual action of delaying as a result of the election. There are other items that should also be discussed that are equally inappropriate.

None of those other items “that should be discussed” were obviously reflected in his memorialization of that call.

At least on paper, this tantrum, made two weeks before a pre-election leak to the WaPo, was about something he had been warned of in July, not news at all, but one tied — explicitly in his mind — to the election, not timing per se.

Side note: Unlike Ziegler’s, many of the documents Shapley shared are stripped of all metadata. Not this email, though. This email — which he shared twice (Attachment 5, Attachment 24) — both reflect a creation date of September 20 (this is European notation), over eight hours apart, with the second reflecting Tristan Leavitt as document author.

That would mean these documents were saved after Darrell Waldon (September 8) and Michael Batdorf (September 12) testified. There’s good reason to believe these documents were chosen with some knowledge of the IRS supervisors’ testimony.

To make it plain: For months, Gary Shapley claimed that his red line was crossed on October 7, 2022. But the emails he himself turned over show that’s not true. His red line was crossed on September 22, 2022, and the red line had a lot to do with making charges public in advance of the election.

Importantly, that means his red line was crossed before the leak to the WaPo, not afterwards.

The day after Shapley’s tantrum started — which no one at DE USAO or FBI would have known about — the FBI ASAC seconded the plan to wait until Shapley returned before holding the meeting that would become the October 7 one, noting that then Weiss could be present.

Meanwhile, on September 28, Waldon emailed Ziegler and all the other people Shapley had involved in his tantrum, noting that he was trying to arrange a meeting with Weiss and Poole. Ziegler responded to everyone, on the morning of September 29, promising any update from prosecutors in CA. Waldon responded asking Ziegler to call him. And Ziegler responded, suggesting they should do a pitch on the 2014 and 2015 years to DC prosecutors: “we also need to request the presentation of 2014 and 2015 to the criminal chief / US attorney in DC – similar to what we would do in California for 2017 2018 and 2019.” Again: Waldon seems to have been surprised when, at the October 7 meeting, Weiss announced that the decision had been made.

That was at 11:11AM on September 29. At 2:25PM, Ziegler went into the interview with James Biden, Hunter’s uncle. Lesley Wolf and two other prosecutors who, like Ziegler, would not be at the October 7 meeting, also participated in the interview. The interview focused largely on the 2017 to 2019 years (though also asked questions that might reflect a campaign finance investigation into Kevin Morris), but which Ziegler now points to as critical testimony supporting his argument for felony charges in 2018. Shapley was already a week into a tantrum about charges not being filed before the election before this interview.

Seven minutes after the James Biden interviewed finished — based on public records, at least, the last major investigative step in the investigation, Weede proposed and the ASAC confirmed a meeting for October 7 at 11AM. The FBI ASAC confirmed as well. Then the next day, a Friday, the ASAC followed up to confirm once again, management and investigators would be present. She followed up again at end of day Monday, October 3, confirming she and her boss, Thomas Sobocinski would attend. Weede confirmed. The ASAC touched base once again on Tuesday morning.

Only at that point, on October 4 — with no record in the thread that Shapley had told his own boss, Waldon, that this meeting was in the works, did he respond to the ASAC alone, asking for her top three items “so we can be on the same page.”

His own list might was effectively a first draft of the things he would record as having happened in notes and a memorialization email days later: Special Counsel, the delay until after the election, and venue.

At 2:26PM, WaPo posted the story that preempted prosecutors’ decision to wait until after the election before charging — the decision Shapley first learned of in July but staged a tantrum about more recently.

At 4:34, the ASAC responded, asking if Shapley’s ASAC (Waldon) would attend, and describing her own agenda as:

  • Delays
  • Venue
  • Communication
  • Anything further that develops by tomorrow

Of course: that “anything further that develops” had already developed: the story in the WaPo.

Shapley responded a minute later, saying, he had just tried to call her, but that yes, both Shapley and his SAC would attend.

Nine minutes after that exchange occurred with no mention of the WaPo story, Shapley informed his bosses about it.

Just an FYI that there was a media leak today purportedly from the “agent” level on Sportsman. I imagine it will be a topic of discussion at tomorrows meeting in Delaware. I spoke with Justin Cole about this to provide anything he may need.

I have no additional insight that is anything but a rumor.

Federal agents see chargeable tax, gun-purchase case against Hunter Biden – Espotting.com

Just keeping you informed.

[Link to original WaPo story, but note that Shapley shared an Espotting link]

As I’ve noted, Shapley’s reference to rumors is inconsistent with his past statements about the leak.

As all that was going on, the other DE AUSA besides Wolf, Carly Hudson, wrote Ziegler at 10:07AM on October 6, asking him what he was supposed to remind her about — something he heard immediately after the James Biden interview on September 29.

David asked me to remind him what you [s]aid “regarding the call you received from management after the James Biden meeting.”  I’m not 100% sure what he means.  Would you mind reminding me about that call so I can remind him?

Ziegler didn’t respond until 6:51PM, well after the WaPo had published the story. Ziegler explained that IRS management had been informed that DOJ Tax didn’t anticipate charging until 2023; they weren’t done with the approval process.

They heard from DOJ-Tax that they don’t expect the case to be indicted until 2023 as they still have various levels of approval. I think this is what you are asking about.

There’s no documentary record of it, but it would be inconceivable that Ziegler hadn’t shared this with Shapley when he heard it, on September 29. Which is to say that Shapley knew there were reasons — beyond the fact that James Biden wasn’t interviewed until September 29 and beyond the election — why Hunter wasn’t going to be charged until after the election.

Nevertheless, going into a meeting he would much later pitch as his “red line,” a meeting that ended up significantly focused on a pre-election leak promising charges, Shapley would claim the election was what was causing the delay.

Bret Baier’s False Claim, the Escort Service, and Former Fox News Pundit Keith Ablow

Deep into one version of what is referred to as the “Hunter Biden” “laptop,” (according to reports done for Washington Examiner by Gus Dimitrelos*) there’s a picture of a check, dated November 14, 2018, for $3,400, paid to a woman with a Slavic name. The check bears a signature that matches others, attributed to Hunter Biden, from the “laptop” also attributed to him. Along with a line crossing out Hunter’s ex-spouse’s name on the check, the check was marked on the memo line: “Blue Water Wellness” along with a word that is illegible–possibly “Rehab.”

The check appears in a chat thread, dated November 26, 2018, apparently initiated to set up tryst with an escort in New York  City. Just over 12 hours after setting up that tryst, the Russian or Ukrainian woman who manages the escort service, Eva, wrote back, asking Hunter if he was in New York, because she had a problem with his check, that $3,400 check dated twelve days earlier. Hunter was effusively apologetic, and offered to pay the presumed sex worker via wire, because it’s the only way he could be 100% certain it would get to her. Shortly thereafter, he sent two transfers from his Wells Fargo account, $3,200 plus $30 fees, directly to the woman’s bank account, and $800 via Zelle drawn on Wells Fargo.

Those transfers from Hunter Biden’s Wells Fargo account to a presumed sex worker with a Slavic name took place between the day, October 31, 2018, when IRS Agent Joseph Ziegler, newly arrived on IRS’ international tax squad, launched an investigation into an international online sex business and the day, December 10, 2018, when Ziegler would piggyback off that sex business investigation to launch an investigation into Hunter Biden. The Hunter Biden investigation was initially based off a Suspicious Activity Report from Wells Fargo sent on September 21, 2018 and from there, quickly focused on Hunter’s ties to Burisma, precisely the investigation the then President was demanding.

Understand: The entire five year long investigation of Hunter Biden was based off payments involving Wells Fargo quite similar to this one, the check for $3,400 to a sex worker associated (in this case, at least) with what Dimitrelos describes as an escort service.

Research on the company yielded bank reports indicating that [Hunter Biden] made payments to a U.S. contractor, who also had received payments from that U.K. company.

Only, this particular payment — the need to wire the presumed sex worker money to cover the check — ties the escort service to one of the businesses of former Fox News pundit Keith Ablow: Blue Water Wellness, a float spa just a few blocks down the road from where Ablow’s psychiatric practice was before it got shut down amid allegations of sex abuse of patients and a DEA investigation. Emails obtained from a different version of the “laptop” show that on November 13, Blue Water Wellness sent Hunter an appointment reminder, albeit for an appointment on November 17, not November 14. That appointment reminder is the first of around nine appointment reminders at the spa during the period.

The tryst with the presumed sex worker with the Slavic name does appear to have happened overnight between November 13 and 14.  Between 1:58 and 6:33AM, there were two attempts to sign into Hunter’s Venmo account from a new device, five verification codes sent to his email, and two password resets, along with the addition of the presumed sex worker to his Zelle account at Wells Fargo, which he would use to send her money over a week later. All that makes it appear like they were together, but Hunter didn’t have his phone, the phone he could use to pay her and so tried to do so from a different device. Maybe, he gave up, and simply wrote her a check, from the same account on which that Zelle account drew.

None of which explains why he appears to have written “Blue Water Wellness” on a check to pay a presumed sex worker. Maybe he was trying to cover up what he was paying for. Maybe he understood there to be a tie. Or maybe it was the advertising Blue Water did at the time.

Deep in a different part of the laptop analyzed by Dimitrelos, though, a deleted invoice shows that Hunter met with former Fox News pundit Keith Ablow on the same day as Hunter apparently wrote that check to the presumed sex worker. The deleted invoice reflects two 60-minute sessions billed by Baystate Psychiatry, the office just blocks away from the float spa.

Emails obtained from a different version of the “Hunter Biden” “laptop” show that at some point on November 26, 2018, as Hunter first arranged a tryst in New York City and then, no longer in New York, sent a wire directly from Wells Fargo to the presumed sex worker, someone accessed Hunter’s Venmo account from a new device — successfully this time — one located in Newburyport, MA, where former Fox News pundit Keith Ablow’s businesses were.

There are a number of things you’d need to do to rule out the possibility of Russian involvement in the process by which a laptop purportedly belonging to Hunter Biden showed up at the Wilmington repair shop of John Paul Mac Isaac, from there to be shared with Rudy Giuliani, who then shared it with three different Murdoch outlets and a ton of other right wing propagandists, many of them members of Congress.

One of those would be to rule out that any of the sex workers tied to this escort service had a role in compromising Hunter Biden’s digital identity, thereby obtaining credential information that would make it easy to package up a laptop that would be especially useful to those trying to destroy the life of the son of Donald Trump’s opponent. There’s no evidence that any of the sex workers were involved, but throughout 2018, there are a number of device accesses involving Hunter’s Venmo account, the iCloud account packaged up on “the laptop,” and different Google accounts — including between the day on November 13 when Hunter appears to have met the woman with the Slavic name and the date on November 26 when he wired her money — that should at least raise concerns that his digital identity had been compromised. I’ve laid out just a fraction of them in this post and this post, both of which focus on the later period when Hunter was in the care of the former Fox News pundit.

If you wanted to compromise Hunter Biden, as certain Russian-backed agents in Ukraine explicitly did, doing so via the sex workers, drug dealers, and fellow junkies he consorted with in this period would be painfully easy. Indeed, in Hunter’s book, he even described other addicts walking off with his, “watch or jacket or iPad—happened all the time.” Every single one of those iPads that walked away might include the keys to Hunter’s digital life, and as such, would be worth a tremendous amount of money to those looking to score their next fix. To rule out Russian involvement, you’d have to ID every single one of them and rule out that they were used for ongoing compromise of Hunter or, barring that, you’d have to come up with explanations, such as the likelihood that Hunter was trying to pay a sex worker but didn’t have his phone with him and so used hers, for the huge number of accesses to his accounts, especially the iCloud account ultimately packaged up.

Of course, explaining how a laptop purportedly belonging to Hunter Biden showed up at Mac Isaac’s shop would also require explaining how a laptop definitely belonging to Hunter Biden came to be left in former Fox News pundit Keith Ablow’s possession during precisely the same period when (it appears) Hunter Biden’s digital life was getting packaged up, a laptop Ablow did nothing to return to its owner and so still had when the DEA seized it.

Bret Baier lied about the Hunter Biden laptop

Given the unanswered questions about the role of a former Fox News pundit in all this, you’d think that Fox personalities would scrupulously adhere to the truth about the matter, if for no other reason than to avoid being legally implicated in any conspiracies their former colleague might have been involved with, or to avoid kicking off another expensive defamation lawsuit.

Sadly, Bret Baier couldn’t manage to stick to the truth in his attempt to sandbag former CIA Director Leon Panetta on Friday. Baier debauched the gravity of an appearance purportedly focused on the Hamas attack and aftermath,  with what he must have thought was a clever gotcha question about a letter Leon Panetta signed in October 2020 stating the opinion that the emails being pitched by Murdoch outlet New York Post, “has all the classic earmarks of a Russian information operation.” The letter not only expressed an opinion, but it cited four specific data points and two observations about known Russian methods, all of which were and remain true to to this day.

And in the process, Bret Baier made a false claim.

Bret Baier made a false claim and all of Fox News’ watchers and all the other propagandists made the clip of Bret Baier making a false claim go viral, because they apparently either don’t know or don’t care that Baier couldn’t even get basic facts right. They are positively giddy that Baier used the tragedy of a terrorist attack to demonstrate his own ignorance or willful deceit about Fox’s favorite story, Hunter Biden’s dick pics.

From the get-go, Baier adopted a rhetorical move commonly used by Murdoch employees and frothy right wingers sustaining their blind faith in “the laptop:” He conflated “the laptop” with individual emails.

Baier: I’d be remiss if I didn’t ask you about that letter you signed onto from former intelligence officials saying that the laptop and the emails had all the classic earmarks of a Russian information operation. Obviously the New York Post and others saying the Hunter Biden letter was the real disinformation all along. Um, that letter was used in the debate, I haven’t asked you this. But do you have regrets about that, now looking back, knowing what you know now? [my emphasis]

The spooks’ letter Panetta signed addressed emails, not “the laptop.” The only use of the word “laptop” in the letter was in labeling this a potential “laptop op,” a way to package up emails meant to discredit Joe Biden. The letter even includes “the dumping of accurate information” among the methods used in Russian information operations.

Having conflated emails and “the laptop,” Baier then asked whether Panetta thinks “it,” now referring just to “the laptop,” not even the hard drives of copies from the laptop in question, was real.

Panetta: Well, you know, Bret, I was extremely concerned about Russian interference and misinformation. And we all know it. Intelligence agencies discovered that Russia had continued to push disinformation across the board. And my concern was to kind of alert the public to be aware that these disinformation efforts went on. And frankly, I haven’t seen any evidence from any intelligence that that was not the case.

Baier: You don’t think that it was real?

Having first conflated emails and the laptop, then substituted the laptop for the emails addressed in the letter, Baier then falsely claimed that, “Hunter Biden said it was his laptop.”

Panetta: I think that, I think that disinformation is involved here. I think Russian disinformation is part of what we’re seeing everywhere. I don’t trust the Russians. And that’s exactly why I was concerned that the public not trust the Russians either.

Baier: I don’t want to dwell on this because we have bigger things to talk about. Bigger urgency. But obviously, Hunter Biden said it was his laptop, and this investigation continues. [my emphasis]

I understand how frothy right wingers misunderstand what Hunter Biden has said about the data associated with “the laptop,” but Baier presents as a journalist, and you’d think he’d take the time to read the primary documents.

Hunter Biden admits some data is his, but denies knowledge of the “laptop”

The claim that Hunter Biden has said “the laptop” was his arises from three lawsuits: first, from Hunter Biden’s response and counterclaim to John Paul Mac Isaac’s lawsuit, then of Hunter’s lawsuit against Garrett Ziegler, and finally, the lawsuit against Rudy Giuliani.

Regarding the first of those filings, Hunter Biden based his countersuit against JPMI on an admission that JPMI came into possession of electronically stored data, at least some of which belonged to him. But he specifically did not admit that JPMI “possessed any particular laptop … belonging to Mr. Biden.”

5. In or before April 2019, Counterclaim Defendant Mac Isaac, by whatever means, came into possession of certain electronically stored data, at least some of which belonged to Counterclaim Plaintiff Biden.1

1 This is not an admission by Mr. Biden that Mac Isaac (or others) in fact possessed any particular laptop containing electronically stored data belonging to Mr. Biden. Rather, Mr. Biden simply acknowledges that at some point, Mac Isaac obtained electronically stored data, some of which belonged to Mr. Biden.

Regarding JPMI’s claims that Hunter dropped off the laptop,

169. HUNTER knowingly left his laptop with Plaintiff on April 12, 2019.

170. Soon thereafter HUNTER returned to Plaintiff’s shop to leave an external hard drive to which Plaintiff could transfer the data from HUNTER’s laptop.

171. HUNTER never returned to Plaintiff’s shop pick up his laptop

Hunter denied sufficient knowledge to answer all of them.

169. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 169.

170. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 170.

171. Mr. Biden admits that, if he ever had visited before, he did not return to Plaintiff’s shop.

In response to JPMI’s claim that Hunter knew of the phone call his lawyer, George Mesires, made to JPMI in October 2020 and the email follow-up that in any case doesn’t substantiate what JPMI claimed about the phone call,

31. On October 13, 2020, Plaintiff received a call from Mr. George Mesires,1 identifying himself as HUNTER’s attorney, asking if Plaintiff still had possession of his client’s laptop and following up thereafter with an email to the Plaintiff. Copy of email attached as EXHIBIT C.

[snip]

174. HUNTER’s attorney, George Mesires contacted Plaintiff on October 13, 2020 about the laptop.

Hunter admitted that Mesires was his attorney but denied knowing anything more.

31. Mr. Biden admits that Mr. George Mesires was his attorney. Mr. Biden is without knowledge sufficient to admit or deny the remaining allegations in paragraph 31.

[snip]

174. Mr. Biden admits that Mr. Mesires was his attorney. Mr. Biden is without knowledge sufficient to admit or deny the remaining allegations in paragraph 174.

In response to JPMI’s claim that Hunter Biden said something about the laptop without mentioning JPMI,

172. When asked about the laptop in a television interview broadcast around the world, HUNTER stated, “There could be a laptop out there that was stolen from me. It could be that I was hacked. It could be that it was the – that it was Russian intelligence. It could be that it was stolen from me. Or that there was a laptop stolen from me.” See https://edition.cnn.com/2021/04/02/politics/hunterbiden-laptop/index.html.

173. HUNTER knew it was his laptop.

Hunter Biden admitted he made the comment that didn’t mention JPMI — a comment on which JPMI based a $1.5M defamation claim!! — but again denied knowing whether or not the laptop was his.

172. Admitted and Mr. Biden further answers that the statement makes no mention of or even a reference to Plaintiff.

173. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 173.

Of some interest, in response to JPMI’s claim that the information that appeared in the NYPost came from Hunter, who voluntarily left his laptop with JPMI,

67. The information contained in the NY POST exposé came from HUNTER who voluntarily left his laptop with the Plaintiff and failed to return to retrieve it.

Hunter outright denied the claim.

67. Denied.

Hunter Biden claimed that Rudy hacked Hunter’s data

That last claim — the outright denial that the data in the NYPost story came from Hunter — is of particular interest given something Denver Riggleman recently said. He described that the Hunter Biden team now has the data that JPMI shared with others — apparently thanks to this countersuit — and they’ve used it to compare with the data distributed forward from there.

Also, we know now, since the Hunter Biden team has the John Paul Mac Isaac data that was given to Rudy Giuliani and given to CBS, we also know that that data had no forensic chain of custody and it was not a forensic copy of any type of laptop, or even multiple devices that we can see. It was just a copy-paste of files, more or less.

[snip]

We know that there’s different data sets in different portions of the Internet attributed to Hunter’s data — or, to Hunter’s laptop.

[nip]

Now that we do have forensic data — Hunter Biden team has more foensic data than anybody else out there — we can actually start to compare and contrast. And that’s why you see the aggressiveness from the Hunter Biden legal team.

The lawsuit against Rudy and Costello claims that at some point, Rudy and Costello did things that amount to accessing Hunter’s data unlawfully. Hacking.

23. Following these communications, Mac Isaac apparently sent via FedEx a copy of the data he claimed to have obtained from Plaintiff to Defendant Costello’s personal residence in New York on an “external drive.” Once the data was received by Defendants, Defendants repeatedly “booted up” the drive; they repeatedly accessed Plaintiff’s account to gain access to the drive; and they proceeded to tamper with, manipulate, alter, damage and create “bootable copies” of Plaintiff’s data over a period of many months, if not years. 2

24. Plaintiff has discovered (and is continuing to discover) facts concerning Defendants’ hacking activities and the damages being caused by those activities through Defendants’ public statements in 2022 and 2023. During one interview, which was published on or about September 12, 2022, Defendant Costello demonstrated for a reporter precisely how Defendants had gone about illegally accessing, tampering with, manipulating and altering Plaintiff’s data:

“Sitting at a desk in the living room of his home in Manhasset, [Defendant Costello], who was dressed for golf, booted up his computer. ‘How do I do this again?’ he asked himself, as a login window popped up with [Plaintiff’s] username . . .”3

By booting up and logging into an “external drive” containing Plaintiff’s data and using Plaintiff’s username to gain access Plaintiff’s data, Defendant Costello unlawfully accessed, tampered with and manipulated Plaintiff’s data in violation of federal and state law. Plaintiff is informed and believes and thereon alleges that Defendants used similar means to unlawfully access Plaintiff’s data many times over many months and that their illegal hacking activities are continuing to this day.

[snip]

26. For example, Defendant Costello has stated publicly that, after initially accessing the data, he “scrolled through the laptop’s [i.e., hard drive’s] email inbox” containing Plaintiff’s data reflecting thousands of emails, bank statements and other financial documents. Defendant Costello also has admitted publicly that he accessed and reviewed Plaintiff’s data reflecting what he claimed to be “the laptop’s photo roll,” including personal photos that, according to Defendant Costello himself, “made [him] feel like a voyeur” when he accessed and reviewed them.

27. By way of further example, Defendant Costello has stated publicly that he intentionally tampered with, manipulated, and altered Plaintiff’s data by causing the data to be “cleaned up” from its original form (whatever this means) and by creating “a number of new [digital] folders, with titles like ‘Salacious Pics’ and ‘The Big Guy.’” Neither Mac Issac nor Defendants have ever claimed to use forensically sound methods for their hacking activities. Not surprisingly, forensic experts who have examined for themselves copies of data purportedly obtained from Plaintiff’s “laptop” (which data also appears to have been obtained at some point from Mac Isaac) have found that sloppy or intentional mishandling of the data damaged digital records, altered cryptographic featuresin the data, and reduced the forensic quality of data to “garbage.”

2 Plaintiff’s investigation indicates that the data Defendant Costello initially received from Mac Isaac was incomplete, was not forensically preserved, and that it had been altered and tampered with before Mac Issac delivered it to Defendant Costello; Defendant Costello then engaged in forensically unsound hacking activities of his own that caused further alterations and additional damage to the data he had received. Discovery is needed to determine exactly what data of Plaintiff Defendants received, when they received it, and the extent to which it was altered, manipulated and damaged both before and after receipt.

3 Andrew Rice & Olivia Nuzzi, The Sordid Saga of Hunter Biden’s Laptop, N.Y. MAG. (Sept. 12, 2022), https://nymag.com/intelligencer/article/hunter-biden-laptop- investigation.html.

I don’t think Hunter’s team would have compared the data Rudy shared with the NYPost before Hunter denied, outright, that “The information contained in the NY POST exposé came from HUNTER.” But based on what Riggleman claimed, they have since, and did compare it, before accusing Rudy and a prominent NY lawyer of hacking Hunter Biden’s data.

Hunter Biden’s team admits they don’t know the precise timing of this: “the precise timing and manner by which Defendants obtained Plaintiff’s data remains unknown to Plaintiff.” DDOSecrets points to several emails that suggest Rudy and Costello did more than simply review available data, however. For example, it points to this email created on September 2, 2020, just after the former President’s lawyer got the hard drive.

September 2, 2020: A variation of a Burisma email from 2016 is created and added to the cache. The email and file metadata both indicate it was created on September 2, 2020.

But the lawsuit, if proven, suggests the possibility that between the time JPMI shared the data with Rudy and the time Rudy shared it with NYPost, Rudy may have committed federal violations of the Computer Federal Fraud and Abuse Act — that is, Hunter alleges that between the time JPMI shared the data and the time NYPost published derivative data, Rudy may have hacked Hunter Biden’s data.

If he could prove that, it means the basis Twitter gave for throttling the NYPost story in October 2020 — they suspected the story included materials that violated Twitter’s then prohibition on publishing hacked data — would be entirely vindicated.

For example, on October 14th, 2020, the New York Post tweeted articles about Hunter Biden’s laptop with embedded images that look like they may have been obtained through hacking. In 2018, we had developed a policy intended to, to prevent Twitter from becoming a dumping ground for hacked materials. We applied this policy to the New York Post tweets and blocked links to the articles embedding those source materials. At no point did Twitter otherwise prevent tweeting, reporting, discussing or describing the contents of Mr. Biden’s laptop.

[snip]

My team and I exposed hundreds of thousands of these accounts from Russia, but also from Iran, China and beyond. It’s a concern with these foreign interference campaigns that informed Twitter’s approach to the Hunter Biden laptop story. In 2020, Twitter noticed activity related to the laptop that at first glance bore a lot of similarities to the 2016 Russian hack and leak operation targeting the dnc, and we had to decide what to do, and in that moment with limited information, Twitter made a mistake under the distribution of hacked material policy.

If Hunter can prove that — no matter what happened in the process of packaging up this data before it got to JPMI, whether it involved the compromise of Hunter’s digital identity before JPMI got the data, which itself would have been a hack that would also vindicate Twitter’s throttling of the story  — it would mean all the data that has been publicly released is downstream from hacking.

For Twitter, it wouldn’t matter whether the data was hacked by Russia or by Donald Trump’s personal lawyer, it would still violate the policy as it existed at the time.

Importantly, this remains a claim about data, not about a laptop. The lawsuit against Rudy and Costello repeats the claim made in the JPMI counterclaim: while JPMI had data, some of which belongs to Hunter, Hunter is not — contrary to Bret Baier’s false claim — admitting that, “Hunter Biden said it was his laptop.”

2. Defendants themselves admit that their purported possession of a “laptop” is in fact not a “laptop” at all. It is, according to their own public statements, an “external drive” that Defendants were told contained hundreds of gigabytes of Plaintiff’s personal data. At least some of the data that Defendants obtained, copied, and proceeded to hack into and tamper with belongs to Plaintiff.1

1 This is not an admission by Plaintiff that John Paul Mac Isaac (or others) in fact possessed any particular laptop containing electronically stored data belonging to Plaintiff. Rather, Plaintiff simply acknowledges that at some point, Mac Isaac obtained electronically stored data, some of which belonged to Plaintiff.

In two lawsuits, Hunter Biden explicitly said that he was not admitting what Baier falsely claimed he had.

I know this is Fox News, but Baier just blithely interrupted a sober discussion about a terrorist attack to make a false claim about “the laptop.”

Hunter Biden claims that Garrett Ziegler hacked Hunter’s iPhone

Hunter Biden’s approach is different in the Garrett Ziegler lawsuit, in which he notes over and over that Ziegler bragged about accessing something he claimed to be Hunter Biden’s laptop, but which was really, “a hard drive that Defendants claim to be of Plaintiff’s ‘laptop’ computer.” By the time things got so far downstream to Ziegler, there was no pretense this was actually a laptop, no matter what Baier interrupted a discussion about terrorism to falsely claim.

But that paragraph explicitly denying admission about this being a laptop is not in the Ziegler suit.

There’s a likely reason for that. The core part of the claim against Ziegler is that Ziegler unlawfully accessed a real back-up of Hunter Biden’s iPhone, which was stored in encrypted form in iTunes — just as I laid out had to have happened months before that lawsuit.

28. Plaintiff further is informed and believes and thereon alleges that at least some of the data that Defendants have accessed, tampered with, manipulated, damaged and copied without Plaintiff’s authorization or consent originally was stored on Plaintiff’s iPhone and backed-up to Plaintiff’s iCloud storage. On information and belief, Defendants gained their unlawful access to Plaintiff’s iPhone data by circumventing technical or code-based barriers that were specifically designed and intended to prevent such access.

29. In an interview that occurred in or around December 2022, Defendant Ziegler bragged that Defendants had hacked their way into data purportedly stored on or originating from Plaintiff’s iPhone: “And we actually got into [Plaintiff’s] iPhone backup, we were the first group to do it in June of 2022, we cracked the encrypted code that was stored on his laptop.” After “cracking the encrypted code that was stored on [Plaintiff’s] laptop,” Defendants illegally accessed the data from the iPhone backup, and then uploaded Plaintiff’s encrypted iPhone data to their website, where it remains accessible to this day. It appears that data that Defendants have uploaded to their website from Plaintiff’s encrypted “iPhone backup,” like data that Defendants have uploaded from their copy of the hard drive of the “Biden laptop,” has been manipulated, tampered with, altered and/or damaged by Defendants. The precise nature and extent of Defendants’ manipulation, tampering, alteration, damage and copying of Plaintiff’s data, either from their copy of the hard drive of the claimed “Biden laptop” or from Plaintiff’s encrypted “iPhone backup” (or from some other source), is unknown to Plaintiff due to Defendants’ continuing refusal to return the data to Plaintiff so that it can be analyzed or inspected. [my emphasis]

Hunter Biden’s team has backup for this assertion, thanks to the notes Gary Shapley took in an October 22, 2022 meeting about what was an actual laptop JPMI handed over to the FBI. On that laptop — which the FBI had confirmed was associated with Hunter Biden’s iCloud account and which it tied to data that could all be falsifiable to someone in possession of the laptop, which had means to intercept and redirect emails and calls to Hunter’s real devices, but which the FBI still had not validated 10 months after obtaining it — the iPhone content was encrypted.

Laptop — iphone messages were on the hard drive but encrypted they didn’t get those messages until they looked at laptop and found a business card with the password on it so they were able to get into the iphone messages [my emphasis]

Even the FBI needed to find a password to access the iPhone content that Ziegler has bragged about accessing. (Note: there have been four known accesses to this data, and every single one of them claims to have used a different means to break the encryption, which in my mind raises real questions about the nature of the business card). But the FBI had a warrant. Ziegler did not.

There are still a great deal of questions one would have to answer before entirely ruling out that Russians were involved in the process of packaging up Hunter Biden’s digital identity; the possible role of a Russian escort service is only one of at least three possible ways Russia might be involved. Yet Bret Baier is unwilling to pursue those questions — starting with the unanswered questions about the role that Baier’s former Fox News colleague played.

But with all those unanswered questions, Baier was nevertheless willing to interrupt a discussion about terrorism to make false claims about what is known.

Update: I’ve taken out that this was specifically a Russian escort service. Some outlets claim Eva is Ukrainian. Dimitrelos does claim that Hunter searched for “Russian escort service,” though.

Update: Added the Bluewater Wellness Intramuscular Injection ad from October 2018.

Update: Added the observation about a newly created email from DDOSecrets.

Update: I was reminded of Bret Baier’s opinion in the same days when Leon Panetta was expressing his doubts about this story.

During a panel on his Thursday evening show, Baier addressed the Post‘s story and the decision by both Twitter and Facebook to limit sharing of the story on their respective platforms because of concerns about spreading misinformation. The move elicited fierce pushback from conservatives and sparked a vote on a Congressional subpoena of Twitter CEO Jack Dorsey.

“The Biden campaign says the meeting never happened, it wasn’t on the schedules, they say,” Baier noted. “And the email itself says ‘set up’ for a meeting” instead of discussing an actual meeting.

Baier then played an audio clip from a SiriusXM radio interview of Giuliani, where he appeared to alter the original details of who dropped off the laptop from which the emails in question were purportedly obtained. The computer store owner who gave a copy of the laptop’s hard drive to Giuliani was also heard explaining how he is legally blind and couldn’t for certain identify just who delivered the computer to him.

” Let’s say, just not sugarcoat it. The whole thing is sketchy,” Baier acknowledged. “You couldn’t write this script in 19 days from an election, but we are digging into where this computer is and the emails and the authenticity of it.”

Featured image courtesy of Thomas Fine.


*As I have noted in the past, Dimitrelos prohibited me from republishing his reports unless I indemnify him for the privacy violations involved. I have chosen instead — and am still attempting — to get permission from Hunter Biden’s representatives to reproduce redacted parts of this report that strongly back Hunter’s claim of being hacked.

Twenty-Five: The Trump Family Member and Other Attorney-Client Delusions

On January 9, I did a post noting that at least 25 of the known witnesses or subjects of the January 6 investigation into Trump were attorneys.

In a filing yesterday, DOJ said the same thing: At least 25 witnesses, including one member of Trump’s family, withheld testimony or documents based on an attorney-client claim.

During the course of the Government’s investigation, at least 25 witnesses withheld information, communications, and documents based on assertions of the attorney-client privilege under circumstances where the privilege holder appears to be the defendant or his 2020 presidential campaign. These included co-conspirators, former campaign employees, the campaign itself, outside attorneys, a non-attorney intermediary, and even a family member of the defendant.

To be clear, we’re measuring two different things: for example, while the two Pats — Cipollone and Philbin — as well as Mike Pence’s counsel, Greg Jacob, withheld testimony in their first grand jury appearances, that was based at least partly on an Executive Privilege claim, one prosecutors ultimately overcame, not exclusively on their role as White House lawyers.

And I know I missed a bunch of people who invoked attorney-client privilege. For example, Bernie Kerik — who I didn’t count in my list — withheld documents until forced to share them in the Ruby Freeman lawsuit, based on a claim that his work as a researcher was attorney work product. The Georgia indictment alerted me that I had missed accused Trump co-conspirator Robert Cheeley — and there are probably attorneys in all the other swing states I missed too. I didn’t count the campaign itself. I sure as hell didn’t count any family member (I wonder if the big gap in the January 6 indictment where Ivanka should be is there based off a claim she was acting at the direction of Eric Herschmann, though Herschmann seems to have offered far more cooperation than Ivanka did).

However you count it, though, it’s a breathtaking number, one rarely taken into account by the TV lawyers wailing because it took so long to charge Trump.

And charge Trump alone.

That’s something I kept thinking about as I read this filing: Thus far, not even Trump’s alleged co-conspirators — all of whom might make an attorney-client claim (even Mike Roman might be that non-lawyer intermediary, though I think it more likely Boris Ephsteyn is CC6) have been charged.

The government’s argument itself makes a lot of sense. For example, it enumerates that Trump or his attorneys have claimed they’ll rely on an advice of counsel defense at least seven times.

1 Fox News, Aug. 1, 2023, at minute 3:03, available at https://www.foxnews.com/video/6332255292112.

2 CNN, Aug. 1, 2023, at minute 2:20, available at https://www.youtube.com/watch?v=GW7Bixvkpc0.

3 NPR All Things Considered, Aug. 2, 2023, available at https://www.npr.org/2023/08/02/1191627739/trump-charges-indictment-attorney-jan-6-probe.

4 Meet the Press (NBC), Aug. 6, 2023, available at https://www.nbcnews.com/meet-thepress/meet-press-august-6-2023-n1307001.

5 Face the Nation (CBS), Aug. 6, 2023, at minute 24:11, available at https://www.cbsnews.com/news/face-the-nation-full-transcript-2023-08-06/.

6 CNN, Aug. 6, 2023, at minute 7:58, available at https://www.cnn.com/videos/politics/2023/08/06/sotu-lauro-full.cnn.

7 Donald Trump interview with Tucker Carlson, Aug. 23, 2023, at minute 34:35, available at https://twitter.com/TuckerCarlson/status/1694513603251241143?lang=en.

The government lays out precedent stating that Trump would have to waive privilege over and share communications that support his advice-of-counsel defense, but also communications over which he and the lawyer are currently shielding behind a privilege claim that would undermine it.

In invoking the advice-of-counsel defense, the defendant waives attorney-client privilege on all communications concerning the defense. See White, 887 F.2d at 270; United States v. Crowder, 325 F. Supp. 3d 131, 137 (D.D.C. 2018). Accordingly, once the defense is invoked, the defendant must disclose to the Government (1) all “communications or evidence” the defendant intends to rely on to establish the defense and (2) any “otherwise-privileged communications” the defendant does “not intend to use at trial, but that are relevant to proving or undermining” it. Crowder, 325 F. Supp. 3d at 138 (emphasis in original). See United States v. Stewart Rhodes, 22- cr-15 (D.D.C.), ECF No. 318 at 2 (quoting Crowder); Dallman, 740 F. Supp. 2d at 814 (waiver is for “information defendant submitted to the attorney on which the attorney’s advice is based, the attorney’s advice relied on by the defendant, and any information that would undermine the defense”); United States v. Hatfield, 2010 WL 183522, at *13 (E.D.N.Y. Jan. 8, 2010) (“This disclosure should include not only those documents which support [defendants’] defense, but also all documents (including attorney-client and attorney work product documents) that might impeach or undermine such a defense.”); United States v. Scali, 2018 WL 461441, at *8 (S.D.N.Y. Jan. 18, 2018) (quoting Hatfield).

Given that Trump would have to identify exhibits on which he would rely for an advice of counsel defense by December 18, the government argues, he should have to also identify the specifics of any advice of counsel defense by that date as well.

Given the potential number of attorneys and breadth of advice involved, the defendant’s notice should describe with particularity the following: (1) the identity of each attorney who provided advice; (2) the specific advice given, including whether the advice was oral or written; (3) the date on which the advice was given; and (4) the information the defendant communicated or caused to be communicated to the attorney concerning the subject matter of the advice, including the date and manner of the communication.

It makes this argument while also noting something that doesn’t, per se, support its case: that DOJ has already told Trump what these 25 people — and it invokes John Eastman, the person most often mentioned in Trump’s public claims of a advice of counsel defense, by caption — have identified in privilege logs.

In addition to having publicly advanced the defense, the defendant knows what information the Government has—and does not have—that might support or undermine the defense. The Government produced in discovery the privilege logs for each witness who withheld material on the basis of a claim of privilege on behalf of the defendant or his campaign, and in some cases the defendant’s campaign was directly involved in discussions regarding privilege during the course of the investigation. In other instances, the Government produced court orders requiring the production of material claimed to be privileged. Compelling the defendant to provide notice, and thereby discovery, would be reciprocal of what the Government already has produced. For example, defense counsel publicly identified one attorney on whose advice the defense intends to rely at trial, and the Government has produced in discovery substantial evidence regarding that attorney and his advice, including relevant search warrant returns.8 Any material relevant to that attorney’s advice that remains shielded by the attorney-client privilege should be produced to the Government at the earliest date to avoid disruption of the trial schedule.

8 That same attorney asserted an attorney-client privilege with the defendant and his campaign to shield material from disclosure to Congress. See Eastman v. Thompson, Case No. 8:22-cv-00099 (C.D. Cal.), ECF No. 260 at 15 (“The evidence clearly supports an attorney-client relationship between President Trump, his campaign, and [plaintiff] during January 4-7, 2021.”). [my emphasis]

Whatever else this motion is — and on its face it makes a lot of sense — it would also provide a means for DOJ to sort through some of the privilege logs it is looking at, and at least in the case of Eastman (if Trump indeed invoked his counsel as a defense) to breach those privilege claims and even obtain communications it does not yet have. Particularly given Clarence Thomas’ recusal on Eastman’s recently rejected cert petition, Eastman might have unidentified communications of particular interest.

Advance notice would also force Trump to rule out relying on the advice of others, like Rudy or Sidney Powell, as a defense, something that might make charges against them more viable.

I don’t imagine that DOJ would add any of Trump’s co-conspirators to his indictment so long as Trump’s trial happened before the election. They could always charge others separately, but so long as Trump had a chance of returning to the presidency, the only reason to do so would be if there were a legitimate hope of flipping the person or if it would make Trump’s alleged crimes more damaging politically. Trump has pardoned his way out of problems in the past and DOJ has to assume he would again, given the opportunity.

But in addition to making a solid case that Judge Chutkan should make Trump declare his intentions in December, this filing also admits that attorney-client privilege claims continue to blind DOJ to some of the universe of related communications pertaining to January 6.

“POTUS is very emotional and in a bad place.” Donald Trump’s Classified Discovery

As part of Trump’s attempt (with some, albeit thus far limited, success — Judge Chutkan already gave Trump a small extension, and Judge Cannon has halted CIPA deadlines) to stall both his federal prosecutions by complaining about the Classified Information Protection Act, both sides have submitted recent filings that provide some additional details about the classified discovery in his two cases.

Among other things, the filings seem to suggest that Donald Trump was caught storing other documents about US nuclear programs at his beach resort, in addition to the one charged as count 19 of his indictment.

January 6 Election Intelligence

In Trump’s January 6 prosecution, the government’s response to Trump’s bid to delay the CIPA process described the classified evidence Trump’s team had reveiwed in the case this way:

Defense counsel responded that they anticipated review the week of September 25, and later the date was finalized for September 26. Due to the classification levels of certain of the discovery material, the CISO conducted additional read-ins that morning for Mr. Blanche, the Required Attorneys, and the Required Paralegal, and the defense was provided the classified discovery around 10:35 a.m., except for one further controlled document that was provided around 2:30 p.m.

The classified discovery reviewed by the defense consisted of approximately 975 pages of material: (1) a 761-page document obtained from the Department of Defense, the majority of which is not classified;1 (2) an FBI-FD 302 of the classified portion of a witness interview for which the Government already provided a transcript of the unclassified portion, as well as attachments, totaling 52 pages; (3) a 12-page document currently undergoing classification review by the Department of Defense; (4) the 118-page classified transcript the Government described at the CIPA § 2 hearing on August 28; and (5) a further controlled document that is a classified version of a publicly-available document produced in unclassified discovery that contains the same conclusions.2

1 The Government did not include this document in its page estimate at the CIPA § 2 hearing, only later determining that in an abundance of caution the entire document should be produced in classified discovery, even though—as indicated by page and portion markings—the majority of it is not classified. In its cover letter accompanying the classified discovery production, the Government made clear its willingness to discuss producing the unclassified pages and portions in unclassified discovery.

2 See Bates SCO-03668433 through SCO-03668447 (produced to the defense in the first unclassified discovery production on August 11, 2023).

Trump’s reply appears to have described what two of these — item 1 and item 5 (and possibly also item 3, which may have been included as part of item 1) — were.

Item 5 consists of the classified version of the Intelligence Community’s Foreign Threats to the 2020 Election publicly released in March 2021.

The Special Counsel’s Office alleges that the Director of National Intelligence “disabused” President Trump “of the notion that the [USIC’s] findings regarding foreign interference would change the outcome of the election.” (Indictment ¶ 11(c)). The Office points out that these “findings” are set forth in a “publicly-available version of the same document that contains the same ultimate conclusions.” (Opp’n at 12). This is a reference to the unclassified version of the National Intelligence Council’s March 2021 Report titled “Foreign Threats to the 2020 US Federal Elections” (the “Report”).3

3 The unclassified Report is available at: https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf

Trump is demanding that DOJ provide details of every actual compromise during the 2020 election — things like Iran’s effort to pose as Proud Boys to suppress Democratic votes — in order to support his claim that the classified evidence in this case is more central than it is.

Item 1 appears to include a bunch of materials that Mark Milley had preserved about the fragile state of the country and — even more so — Trump after the attack.

The Special Counsel’s Office has sufficient access to the files of the Department of Defense (“DOD”) to produce to President Trump two documents, totally [sic] approximately 773 pages, that the Office “obtained” from DOD. (Opp’n at 5). It appears, however, that there is a larger set of relevant DOD holdings, which the Office must review and make any necessary productions required by Rule 16, Brady, Giglio, and the Jencks Act.

In November 2021, General Mark Milley told the House’s January 6 Select Committee that “we have a boatload of documentary stuff . . . both classified and unclassified stuff. And I will make sure that you get whatever we have. And it’s a lot.” (Tr. 10).6 In response to a question about a particular document, General Milley volunteered that he had overclassified a large volume of relevant material:

I classified the document at the beginning of this process by telling my staff to gather up all the documents, freeze-frame everything, notes, everything and, you know, classify it. And we actually classified it at a pretty high level, and we put it on JWICS, the top secret stuff. It’s not that the substance is classified. It was I wanted to make sure that this stuff was only going to go people who appropriately needed to see it, like yourselves. We’ll take care of that. We can get this stuff properly processed and unclassified. (Tr. 169).

In addition to the above-referenced classified documents “obtained” from DOD, the Special Counsel’s Office has produced nearly a million pages of documents from the House Select Committee. But it is not clear that those materials include any of the classified documents referenced by General Milley during his testimony, or whether the Office has even reviewed those materials.

6 The transcript is available at: https://www.govinfo.gov/content/pkg/GPO-J6-TRANSCRIPTCTRL0000034620/pdf/GPO-J6-TRANSCRIPT-CTRL0000034620.pdf.

What Trump accuses Milley of overclassifying appears to have been, instead, classified to prevent detrimental things said about Trump — including by his Chief of Staff — from being shared publicly. As Milley described to the January 6 Committee. he made a point of preserving all of it because he understood the significance of January 6.

So what I saw unfold on the 6th was disturbing, to say the least, and I think it was an incredible event. And I want to make sure that whatever information I have and I can help you determine facts, atmospherics, opinions, whatever, determine lines of inquiry. In any manner, shape, or form that I or the Joint Staff can help, I want to make sure that we do that, because I think the role of the committee is critical to prevent this from ever happening again.

[snip]

We also have — and I want to make sure that you know that we have and we’ll provide it to you, the Joint Staff — we have a boatload of documentary stuff. I think we provided a bunch of emails, which is good. We have both classified and unclassified stuff. And I will make sure that you get whatever we have. And it’s a lot. We have it in binders.

Immediately following the 6th, I knew the significance, and I asked my staff, freeze all your records, collate them, get them collected up. I had one of the staff, a J7, you 10 know, package it up, inventory it, put it all in binders and 11 all that kind of stuff. So we have that, and you’re welcome to all of it, classified and unclassified. And I want to make sure that everything is properly done for the future. That’s very important to me.

The materials include — again, per Milley’s testimony — commentary from people like Mark Meadows and Christopher Miller about Trump’s state on January 7.

General Milley. So where was I? Oh. Anyway, so general themes: steadiness overseas, constantly watching Iran, North Korea, China, Russia, terrorists. Venezuela, by the way, was another one. So there’s a series of these potential overseas crises. In several of the calls — and my theme was I sounded like a broken record: Steady, breathe through your nose, we’re going to land the — we’re going to 4 land this thing, peaceful transfer of power. That was a constant message of mine. And both Pompeo and Meadows didn’t push back on that at all. It was “roger that” sort of thing.

So, now, there was a couple of calls where, you know, Meadows and/or Pompeo but more Meadows, you know, how is the President doing? Like, Pompeo might say, “How is the President doing,” and Meadows would say, “Well, he’s in a really dark place,” or “he’s” — you know, those kind of words. I’d have to go back to some notes to get the exact phrasing, but that happened a couple different times.

I’m looking for — on this timeline, like, here is one, for example, on the 7th of January, so this is the day after, right? “It’s just us now.” And I can’t remember if it was Pompeo or Meadows that said that, but I didn’t say it. “It’s just us now.” In other words, it’s just the three of us to land this thing. I’m, like, come on, man. This is — there’s millions of people here. But anyway. I’m not trying to be overly dramatic, but these are quotes. “POTUS is very emotional and in a bad place.” Meadows . So that – – that’s an example. Same day, different meeting with Acting SecDef Miller.” POTUS not in a good spot.” Whatever that means.

Ms. Cheney. Uh-huh.

General Milley. You know, these aren’t my words. These are other people’s words. Kellogg, same day, seventh phone call: “Ivanka was a star.” “She’s keeping her father calm.” “Everyone needs to keep a cool head.” So it’s the — you know, it’s comments. These are just phrases, but there’s–

Ms. Cheney. Yeah.

General Milley. there’s conversations like that, and, you know, for me, as the Chairman, I’m, like, hmmm. So all I’m trying to do is watch my piece of the pie. I’m not in charge of anything. I just give advice and just trying to keep it steady.

Ms. Cheney. I know we have to take a break, General Milley, and the camera is not working here, so I can’t see you guys, but are the notes that you’re reading from, are those notes that we have? Are they in the exhibits, or are those notes that we can get if we don’t?

General Milley. No. We can — I can provide them. I’ll swear to it, you know, that kind of thing if I need to do an affidavit on whatever you want.

[Redacted] And I think this is in a classified production.

General Milley. Those notes came from the timeline that I produced to the Joint Staff, essentially.

Ms. Cheney. Yeah.

General Milley. On this timeline, it’s actually classified, but, again, almost all of the substance is it not classified. The document I classified the document at the beginning of this process by telling my staff to gather up all the documents, freeze-frame everything, notes, everything and, you know, classify it. And we actually classified it at a pretty high level, and we put it on JWICS, the top secret stuff. It’s not that the substance is classified. It was I wanted to make sure that this stuff was only going to go people who appropriately needed to see it, like yourselves.

We’ll take care of that. We can get this stuff properly processed and unclassified so that you can have it —

[Redacted] That would be great.

Trump is demanding this stuff under Rule 16 (the defendant’s own statements), Brady (exculpatory evidence), Giglio (deal made with other witnesses), and Jencks Act (statements by potential government witnesses). Trump is asking for all memorializations that Milley or anyone else made of things Trump said — and he’s preparing to claim that that amounts to exculpatory evidence.

And both the review of this memorialization and the court filings happened after Trump threatened to execute Milley on September 22, Trump’s treatment of it — and his claim that Milley overclassified it — can’t be taken in isolation from it, especially given the inclusion of the Iran attack document, which Trump was showing off at Mar-a-Lago even before Milley’s January 6 testimony — in the superseding stolen documents indictment.

That is, having discovered that Milley preserved the crazy things Trump said and the crazy Trump’s most loyal aides said about Trump, Trump wants to make that a centerpiece of his graymail attempt, preparing a claim that the very act of memorializing all this amounts to disloyalty, all while arguing that he needs it to discredit Milley or Meadows or anyone else involved if they testify at trial.

Stolen Documents

In the stolen documents case, classified material is obviously more central to Trump’s alleged crimes and the sensitivity of the materials involved is much greater. Even though there have been some sound educated guesses as to what the charged documents include, it’ll be months before we get real detail at trial.

Nevertheless, the competing claims about classified discovery have provided some new details about the documents charged against Trump — specifically, regarding ten documents that, for two separate reasons, held up reviews by Trump’s lawyers. at the SCIFs in Florida being used for the case.

As Trump laid out in his reply to his bid to delay the trial, at first five, then another four of the documents charged against him were not placed in the SCIF in Miami Trump has been using, because they are so sensitive — though are available in a SCIF in DC. In addition, there was one document that only recently became available in that SCIF.

Nine of the documents charged in the 32 pending § 793(e) counts, as well as “several uncharged documents,” are not available to the defense in this District. (Opp’n at 6).4 The document relating to Count 19 was made available to President Trump for the first time late in the afternoon of October 3, only after counsel left the District following two days of review at the temporary Miami SCIF.

4 As we understand it, documents relating to Counts 6, 22, 26, and 30 have been relocated to the District of Columbia at the request of the documents’ “owners.” (See Opp’n at 6-7 n.4). The documents relating to Counts 5, 9, 17, 20, and 29 are not available to President Trump or counsel at any location.

The one document that only recently became available is the single charged document classified under the Atomic Energy Act — here, marked as FRD or “Formerly Restricted Document.”

  • Document 19: [S/FRD] Undated document concerning nuclear weaponry of the United States; seized in August 8, 2022 search.

As noted here, because it was classified under the Atomic Energy Act, Trump could not declassify it unilaterally, which is undoubtedly why it was charged.

As the government described in its response to this CIPA request on September 27, the presence of one particular charged document and several uncharged documents which required some specific clearance had meant Trump’s lawyers couldn’t get into the SCIF at all, until the Information Security Officer withdrew them, which she or he did on September 26.

The Government has recently been informed that multiple defense counsel for Trump now have the necessary read-ins to review all material in the Government’s September 13 production, with the exception of a single charged document and several uncharged documents requiring a particular clearance that defense counsel do not yet possess. The Government understands that the presence of these documents in the set of discovery available in the defense SCIF in Florida had prevented the defense from gaining access to a safe containing a subset of classified discovery when the defense reviewed the majority of the September 13 production during the week of September 18, 2023. On September 26, at the Government’s request, the CISO removed the documents requiring the particular clearance from the safe so that the remainder of the subset would be fully available to Trump’s counsel.

If, as seems likely, document 19 was the one had to be withdrawn until all lawyers got an additional clearance, it suggests the other uncharged documents were also classified under the AEA. If so, it would mean FBI discovered additional US nuclear documents, potentially included ones that remain restricted, found at Mar-a-Lago but have not been charged.

These are the five that were always given that special handling, treating them as too sensitive to be placed in the SCIF in Miami.

  • Document 5: [TS//[REDACTED]/[REDACTED]//ORCON/NOFORN] Document dated June 2020, concerning nuclear capabilities of a foreign country; seized in August 8, 2022 search.
  • Document 9: [TS//[REDACTED]/[REDACTED]//ORCON/NOFORN/FISA] Undated document concerning military attacks by a foreign country; seized in August 8, 2022 search.
  • Document 17: [TS//[REDACTED]/TK/ORCON/IMCON/NOFORN] Document dated January 2020 concerning military capabilities of a foreign country; seized in August 8, 2022 search.
  • Document 20: [TS//[REDACTED]//ORCON/NOFORN] Undated document concerning timeline and details of attack in a foreign country; seized in August 8, 2022 search.
  • Document 29: [TS//[REDACTED]//SI/TK//ORCON/NOFORN] Document dated October 18, 2019, concerning military capabilities of a foreign country.

And these are the four that were initially placed in the Miami SCIF, but later withdrawn after a request by the document originators.

  • Document 6: [TS//SPECIAL HANDLING] Document dated June 4, 2020, concerning White House intelligence briefing related to various foreign countries; seized in August 8, 2022 search.
  • Document 22: [TS//[REDACTED]//RSEN/ORCON//NOFORN] Document dated August 2019, concerning military activity of a foreign country; turned over on June 3, 2022.
  • Document 26: [TS//[REDACTED]//ORCON//NOFORN/FISA] Document dated November 7, 2019, concerning military activity of foreign countries and the United States; turned over on June 3, 2022.
  • Document 30: [TS//[REDACTED]//ORCON/NOFORN/FISA] Document dated October 15, 2019, concerning military activity in a foreign country; turned over on June 3, 2022.

Here’s how Jack Smith’s team described these documents.

As noted above, a small collection of highly sensitive and classified materials that Trump retained at the Mar-a-Lago Club are so sensitive that they require special measures (the “special measures documents”), including enhanced security protocols for their transport, review, discussion, and storage. The special measures documents constitute a tiny subset of the total array of classified documents involved, which is itself a small subset of the total discovery produced. From the outset of this case, the SCO and the CISO have been aware of some of the special measures documents, but only recently, the SCO and the CISO learned that others—still constituting a small fraction of the overall discovery—fall into that category as well.

[snip]

To be sure, the extreme sensitivity of the special measures documents that Trump illegally retained at Mar-a-Lago presents logistical issues unique to this case. But the defendants’ allegations that those logistical impediments are the fault of the SCO are wrong. The defendants’ claim that the SCO has failed “to timely remedy the situation,” ECF No. 167 at 2, or “to make very basic arrangements in this District,” id. at 4, proceeds from the false premise that the SCO controls the situation—it does not. Nonetheless, the SCO has also offered to—and did—make a facility available to the defense in Washington, D.C., that can accommodate the review and discussion of all the discovery in this case, including the special measures documents.

What’s interesting about this collection is how they compare and contrast with others of the 32 documents charged.

For example, these documents are not being treated with greater sensitivity because they were subject to Special Handling requirements likely related to contents of the Presidential Daily Briefs; several other charged documents (eg, 1, 2, and 4), in addition to document 6, were subject to Special Handling.

Matt Tait and Brian Greer had speculated that some of these — documents 26, 29, and 30 — might be part of a cluster of related documents, but others that similarly date to October and November 2019 are not being treated with this same special handling.

Most of these documents include special compartments (reflected by the [REDACTED] classification mark(s)), but document 6 does not. That said, all the documents with such redacted compartments are being treated with that special handling. So perhaps the most likely explanation is that document 6 reflects Trump getting briefed on something outside the scope of a formal document, which therefore didn’t have the appropriate compartment marks.

Whatever explains it, someone doesn’t trust these documents to be stored in a SCIF in Miami.