Rudy Giuliani Claims He’s Shooting Blank Documents

Ruby Freeman and her daughter Shaye Moss have, as Beryl Howell invited them to do, moved to compel Rudy Giuliani to comply with discovery in their defamation lawsuit. The two 2020 Georgia election workers sued for the damage caused by the lynch mob Rudy summoned by falsely claiming they were attempting to steal votes after he saw a video showing Moss passing her mother a ginger mint.

The motion and all its exhibits are here.

What seems to be happening is that Rudy, having had his phones seized in 2021 and successfully avoided — thus far — charges for his Ukraine influence-peddling, is deliberately slow-walking discovery here to avoid identifying any devices or records that prosecutors can use in that investigation, the Georgia investigation, or Jack Smith’s January 6 one, all while sustaining a story that is already starting to fall apart.

As described in the motion to compel, Rudy’s non-compliance has included:

  • Refusing to turn over any phone or financial records
  • Refusing to explain what accounts and devices he has included in his searches
  • Failing to search for texts and messaging apps from the phones seized in 2021
  • Providing discovery based on much earlier requests from the January 6 Committee and Dominion’s lawsuit against him, rather than the requests from Freeman’s lawyers
  • Providing documents on Hunter Biden along with one Pentagon City Costco receipt
  • Others — like Bernie Kerik and Christina Bobb — similarly refusing to comply
  • Claiming, then disclaiming, reliance on “unknown GOP operatives” for the false claims made about Freeman
  • Refusing to describe how he became aware of the surveillance footage on which he based his false claims about Freeman and Moss

As a reminder, back on April 21, 2021, DOJ obtained a warrant for around 18 of Rudy’s phones in conjunction with the investigation into Rudy’s Ukrainian influence peddling that Bill Barr had successfully obstructed. By September of that year, DOJ had convinced Judge Paul Oetken to have Special Master Barbara Jones to review all the contents on his phones, not just that pertaining to the Ukraine warrants. Since then, I’ve been arguing that DOJ could — and at this point, almost certainly has — obtained that content for use in the January 6 investigation.

Dominion sued Rudy back in 2021. The January 6 Committee subpoenaed Rudy in January 2022 and interviewed him in May 2022. Those are the discovery requests on which Rudy is attempting to rely in this suit, rather than doing searches specific to the requests made by Freeman’s lawyers.

But after May 2022, Rudy’s exposure in Georgia went up. In addition to Freeman’s lawyers filing their amended complaint on May 10, 2022, Fani Willis convened her grand jury on May 2, 2022, subpoenaed Rudy to testify in June 2022, and he testified in August. It is virtually certain that Rudy gave answers to Willis — at the very least, about what he knew of Trump’s call to Brad Raffensperger on January 2 — that subsequent testimony has since disputed and on which topic he has since amended his interrogatory response.

The materials in this motion reveal that Rudy’s lawyer in this matter (Joe Sibley — who represented Christina Bobb in a J6C deposition that conflicts with Rudy’s answers here, though Robert Costello was present for Rudy’s March deposition) at first promised thousands of documents to Freeman’s lawyers, while claiming that most documents would be unavailable because of the Special Master process tied to the Ukraine investigation. Last July 12, Rudy provided 1,269 documents he had also turned over to Dominion’s much earlier request, which Freeman’s lawyers describe as, “his first and only substantial document production to date.”

Then, on August 3, Robert Costello made a showy announcement that SDNY had ended the Special Master process, which is not the same thing as getting a letter that he’s not a subject of that investigation anymore. Shortly thereafter, Freeman’s attorneys pointed out that the excuse Rudy had been using to limit his discovery in this case was no longer operative. He had the phones that — he claimed — included all his communications from the period during which he had started the conspiracy theories about Freeman.

After that showy announcement from Costello on August 3, things changed dramatically. In September, Sibley told Freeman’s lawyers there were 18,000 documents relevant to discovery in the materials seized from his phone. A month later, he said there were 400. In October, Rudy turned over 177 of those documents, 51 of which were blank. Since then, Sibley seems to have provided answer after answer that amounted to throwing up his hands when describing the state of Rudy’s discovery.

Rudy is quite literally attempting to claim he can only shoot blank documents in hopes of getting through this discovery process.

In his March 2023 deposition, Rudy claimed that the physical phones returned by SDNY — which he says only happened in August — were “wiped out.” What actually seems to have happened is that he hasn’t figured out how to access the content saved to the cloud by discovery vendor TrustPoint, and may not have tried to access the phones themselves, which I believe Costello had publicly claimed to have been returned earlier last year.

But far and away the best way to understand his answers are that, first of all, he and Bobb gave materially inconsistent answers while being represented by Sibley, most notably on the topic of whether they participated in the Brad Raffensperger call, which Bobb said they did and Rudy originally claimed — and presumably claimed to Fani Willis’ grand jury — that they had not.

Just as importantly, Rudy may be aware of both messaging apps and phone accounts that he’s not certain prosecutors in SDNY, Georgia, or DC have identified, so he’s refusing to be forthcoming about all the devices and phone accounts he used. There are probably communications from his phones that Costello successfully claimed were privileged during the SDNY Special Master process, which would be obviously crime-fraud excepted in any proceeding before someone who knows the January 6 investigation well. Prosecutors in both SDNY and DC will be able to tell after a quick review of exhibits included with this motion to compel whether Rudy’s claims about the status of the phone content from TrustPoint are accurate.

And therein lies the risk of the game that Rudy is playing.

This would be an obviously bullshit response before any judge, including Carl Nichols (who is presiding over the much more leisurely Dominion suit against Rudy).

But by luck of the draw, he’s attempting this stunt before Beryl Howell, who even on good days does not suffer fools at all, much less gladly, and who until just a month ago was the Chief Judge presiding over all the grand jury proceedings in DC, including the January 6 investigation. She’s one of just two or three judges who knows whether DOJ asked for and obtained a warrant to get the stuff from Rudy’s phones in SDNY. If they did (and I’d bet a very good deal of money they did), she would have seen an affidavit explaining in what form DC USAO understood that phone content to be, and if they did, she has likely overseen discussions about any further attorney-client protections DOJ had to adhere to. If DC USAO obtained warrants for other cloud content, she might also know about any accounts that Rudy is not disclosing to Freeman, including those whose email and phone accounts Rudy consistently used as a proxy. She likely has a sense of how many phone accounts DOJ has identified for Rudy, none of the call records of which would be subject to attorney-client protection. She may know of other aliases that Rudy used in his assault on the election.

Rudy is pulling this contemptuous stunt in front of the one judge who may know the extent to which he’s bullshitting.

Which may be why, at a few points in Freeman’s Motion to Compel, her attorneys note that they’re only asking for modest relief, basically just leverage to get Rudy to actually answer the questions, as well as attorney fees for their time he has wasted.

But Judge Howell? Well, if she wants to use her discretion to provide expanded relief, Freeman’s lawyers say, they’d be open to that too.

The relief Plaintiffs seek in this Motion is narrow, while recognizing that the Court in its discretion may enter additional forms of relief, including sanctions. Plaintiffs reserve all rights relating to seeking expanded forms of relief in the future.

At this point, there are at least two criminal investigations into Rudy and two civil suits — January 6, Georgia, Dominion, and this suit. Even before reviewing his J6C transcript, it’s easy to identify plenty of ways his evolving answers here, amended in part because of inconsistent testimony given before the J6C, conflict with what he must have answered before the Georgia grand jury, which could start issuing indictments any day.

Juggling all that legal exposure would be difficult for a sober, organized man with little real legal exposure.

For Rudy, though, this insane approach may be, at best, a futile attempt to limit the damage this civil case can do to his criminal exposure.

Share this entry

Jack Teixeira: Leak Dumps Don’t Care about (the Story You Tell about) Motive

Dan Froomkin says reporters should call Jack Teixeira’s release of highly classified documents “theft,” not a leak, distinguishing “public-spirited” leakers from “self-serving … thieves.” Spencer Ackerman muses that Teixeira, “leaked for that most ineffable thing, something nonmaterial but nevertheless hyper-real in the logic of the poster, and particularly the right-wing-chud poster: clout.” Charlie Savage suggests something distinguishes this case, legally, from those of everyone else (among a limited subset) who took classified information. Glenn Greenwald has been all over the map, in one breath calling this, “a bullshit leak, despite some relevant docs, the impact of which has been severely overblown from the start,” but then applauding Tucker Carlson’s focus on the altered casualty numbers in Ukraine and Tucker’s claims that even Fox has factchecked as an example of, “the significant revelations these leaks provide.”

Now he’s just making shit up about WaPo and NYT hunting down Teixeira, shit that a quick reading of the arrest affidavit readily debunks, shit that ignores that WaPo’s source(s) for hundreds of still-unpublished documents, at least, are one or more of the Discord chat kids, to whom WaPo has given source protection (that will be utterly meaningless in the face of the subpoenas already served).

A bunch of people who made their careers because a young, narcissistic IT guy stole a shit-ton of records about which he had little personal expertise — some incredibly important, a great many useful only to America’s adversaries — seem to be uncertain what to make of Jack Teixeira, who, early reports at least suggest, is an even younger narcissistic IT guy who stole a smaller shit-ton of records about which he had even less personal expertise, some newsworthy, some useful primarily to America’s adversaries.

We will likely have the rest of Teixeira’s young life to get a better understanding of why he allegedly did what he did, which may well be very different than what he told the kids in the Discord chat rooms about why he did what he did, who in any case are entirely unreliable narrators. But then, they may be no more unreliable, as narrators, than Greenwald is about Edward Snowden, and for a similar reason: because their identity is wrapped up in a certain narrative about this dude.

Since this age of the leak dump started, journalists have been sustaining self-serving stories about what leak dumps really are.

That Ackerman treats Josh Schulte’s hack-and-dump in the same breath as the leak dumps of Chelsea Manning or Edward Snowden, calling Teixeira’s leaks, “something different than the Snowden leaks, Manning leaks or, say, the Vault 7 hack,” is a great example of that. At trial, Schulte didn’t so much claim he was a whistleblower as he was a scapegoat, someone the CIA already hated to blame for an embarrassing compromise. But in his second trial, in the course of representing himself, he performed precisely what the government said he was: a narcissistic coder — KingJosh, he called himself — exacting revenge for the escalating personnel problems he caused after his manager moved his desk. “I think you are playing into the government’s theory of the case,” Judge Jesse Furman warned in a sidebar during Schulte’s cross-examination of a former supervisor, “by making clear to the jury that even today you remain aggrieved by you as being mistreated.”

Vault 7 was not a noble leak. It was an epic act of nihilism. A man-boy retaliating because he couldn’t get his way at work.

And except for security researchers in the business of attributing CIA hacks, the Vault 7 files weren’t all that newsworthy, either — though they did give Julian Assange a way to pressure the Trump Administration. Plus, the fate of both the Vault 7 files during the nine months between leak and publication, during a period when Assange was a key part of a Russian influence operation, as well as the Vault 8 source code included in Schulte’s guilty verdict, remains unknown. In a letter attempting to exonerate himself (even while exposing the protected identities of several colleagues), Schulte himself described the value that the source code would have for Russia, particularly during that nine month window before the CIA learned Schulte had hacked them:

So much still unknown, and with potential (yet unconfirmed) link between wikileaks and Russia–Did the Russians have all the tools? How long? It seems very unlikely that an intelligence service would ever leak a nation’s “cyber weapons” as the media calls them. These tools are MUCH more valuable undiscovered by the media or the nation that lost them. Now, you can secretly trace and discover every operation that nation is conducting.

I don’t imagine that these issues were what Ackerman had in mind, when comparing Schulte to Manning and Snowden, but perhaps he should give some thought to why he believes otherwise.

Meanwhile, Marjorie Taylor Greene is already creating a heroic myth about Teixeira not all that dissimilar from the myths WikiLeaks spun about Schulte that Ackerman appears to still believe.

Maybe, like Chelsea Manning, a struggle with his own demons made Teixeira more apt to leverage classified records to win the adulation of a bunch of teenagers. Or maybe, like Schulte, he really is the racist shithole he sounds like.

Or both.

We may never learn how much damage these leaks did such that we could adequately balance their value against their cost. We will undoubtedly get inflammatory claims from prosecutors if Teixeira is ever sentenced, which may or may not be backed by some damage assessment that will get declassified in a decade or three.

Because it’ll be some time before we really understand this guy, because journalists seem to be struggling to understand how to treat him, I thought it worthwhile to lay out some lessons I have learned from covering leak-dumps for 15 years, lessons that have resulted in a radically different view than the Manichean belief in good dumps or bad dumps others have.

Leak dumps don’t care about all that.

In what follows, I’m not questioning the value of (some) of Snowden’s and Manning’s leaks. I’m saying that some of the people most closely involved haven’t taken a step back, in the decade since, to see what we’ve learned since, including some things these celebrated leakers have in common with what we know, so far, of Teixeira.

It’s worth distinguishing leaks from people knowledgable about what they’re leaking

Those who’ve worked on past leak dumps like to compare the leakers with Daniel Ellsberg, a comparison Ellsberg has welcomed.

But for most, there’s something that clearly distinguishes this later group of leakers: many don’t have expertise on the specific files they’re leaking.

Indeed, several of these leakers obtained new jobs while they were already contemplating leaking (or, in Snowden’s case, long after he had started collecting documents to leak). Several took files entirely unrelated to their jobs.

By comparison, Ellsberg was a PhD who leaked the Rand study he worked on himself.

To the extent that prior leak dumpers leaked files they didn’t have specific reason to want to expose, they often did so out of a generalized malaise, usually stemming from America’s war on terror policies. While I think Manning and Daniel Hale’s reaction to the war on terror was just and righteous, and while Teixeira thus far seems like a badly misguided conspiracy theorist, the type of motivation, a general malaise about American conduct, may not be that dissimilar.

Similarly, Teixeira clearly doesn’t have the knowledge or maturity to make an ethical decision to leak these documents. But it’s not clear some of his predecessors did either.

False claims about authentic documents are still false claims

Over the years, Greenwald and others — most recently #MattyDickPics Taibbi — have completely collapsed the distinction between “true” and “authentic.” There’s a good deal of Snowden reporting, for example, that remains uncorrected. Ackerman even repeated one such error, from the Guardian’s report on PRISM, in his 2021 book — “the NSA could conduct what internal documents described as ‘legally-compelled collection’ from the servers—the exact form of access remains unknown”—of PRISM participants. [my emphasis] This description of getting data directly from tech companies’ servers came from a guy who was overselling the program, effectively a Deep State hypester snookering civil libertarian journalists to buy into his hype.

As Bart Gellman described in his own book, not only was the direct access misleading, but it distracted from the more important policy points of the Section 702 collection.

Companies that had declined to comment in advance, or had said nothing of substance, now issued categorical denials that any U.S. agency had “direct access” to their servers. I scrambled to reconcile those statements with the NSA program manager’s explicit words—repeated twice—in the authoritative PRISM overview. Later that night I found a clue in another document from the Snowden archive. There, in a description of a precursor to PRISM, I found a variation on Rick’s formula. “For Internet content selectors, collection managers sent content tasking instructions directly to equipment installed at company-controlled locations,” it said. That sounded as though the U.S. government black box was on company property but might not touch the servers themselves. I updated my story to disclose the conflicting information and the new evidence.

[snip]

The “direct access” question became a big distraction, rightly essential to the companies but not so much to the core questions of public policy.”

The Snowden reporters were under a real time crunch and unbelievable security pressure to report, so have a good excuse, but others don’t.

#MattyDickPics blithely started reporting on Twitter without first bothering to get the least understanding of what he was looking at and he still has never gotten records showing what requests Trump made of Twitter, the only thing close to real censorship in question. Yet because he has some screen caps to wave around, vast swaths of people believe his false claims.

The same is true of the “laptop.” Virtually the entire Republican Party has refused to distinguish between authentic emails on a hard drive allegedly obtained from a Hunter Biden laptop, and the authenticity of the laptop itself, even after people in Rudy’s orbit started altering that hard drive. To say nothing of whether provably authentic emails say what the GOP breathlessly claims they do, which so far, they have not.

As noted, Tucker has already magnified (with Greenwald applauding) two of the false claims about the documents that Teixeira released: the doctored casualty numbers put out by Russia, and misrepresentations about the role of Special Operations forces in Ukraine, which have been debunked by the same Fox News reporter that Tucker tried to get fired one of the previous times she corrected the network’s false claims.

Notably, I think one thing that is contributing to more accurate reporting based on these files is more hesitation from responsible outlets to publish or magnify the files themselves, while still using them as a basis for stories, though as WaPo races to beat its competitors that may be changing.

Documents can serve to distract

And that’s because authentic documents have, from the start of these leak dumps, often served to distract attention from the actual content.

As I noted the other day, FBI’s cooperating troll witness in the Douglass Mackey trial, Microchip, described unashamedly how the trolls ensuring the John Podesta emails would go viral in the last weeks of the 2016 election knew there was no there, there. But they also knew that so long as they could invent some kind of controversy out of them, they could suck the air out of substantive political coverage.

Q What was it about Podesta’s emails that you were sharing?

A That’s a good question.

So Podesta ‘s emails didn’t, in my opinion, have anything in particularly weird or strange about them, but my talent is to make things weird and strange so that there is a controversy. So I would take those emails and spin off other stories about the emails for the sole purpose of disparaging Hillary Clinton.

T[y]ing John Podesta to those emails, coming up with stories that had nothing to do with the emails but, you know, maybe had something to do with conspiracies of the day, and then his reputation would bleed over to Hillary Clinton, and then, because he was working for a campaign, Hillary Clinton would be disparaged.

Q So you’re essentially creating the appearance of some controversy or conspiracy associated with his emails and sharing that far and wide.

A That’s right.

Q Did you believe that what you were tweeting was true?

A No, and I didn’t care.

Q Did you fact- check any of it?

A No.

Q And so what was the ultimate purpose of that? What was your goal?

A To cause as much chaos as possible so that that would bleed over to Hillary Clinton and diminish her chance of winning.

In this model — the exact model adopted by the Twitter Files (and, frankly, virtually all of Trump’s tweets) — the actual documents themselves are just a hook for viral dissemination of the false claims made about the documents, just like most of the Twitter Files are.

Microchip even admitted that disinformation can increase buzz.

Q As you sit here today, back in that time period, did you like to get a rise out of people?

A Sure, yeah.

Q And that’s one of the reasons you posted things on Twitter; correct?

A Correct.

Q Was it your belief back then that disinformation increases buzz? A Um, disinformation sometimes does increase buzz, yes.

The claims about the documents don’t work like truth claims do; instead, they serve to short-circuit rational thought, making it far easier to believe conspiracy theories or intentional disinformation.

We’re seeing some of that now from the disinformation crowd, starting with Tucker and Greenwald.

You can’t always tell who is in a chat room

The Discord kids told WaPo there were “roughly two dozen” active members of the Discord chat room where Teixeira allegedly first released the documents, about half of whom were overseas, including in Ukraine and elsewhere in post-Soviet countries.

Of the roughly 25 active members who had access to the bear-vs-pig channel, about half were located overseas, the member said. The ones who seemed most interested in the classified material claimed to be from mostly “Eastern Bloc and those post-Soviet countries,” he said. “The Ukrainians had interest as well,” which the member chalked up to interest in the war ravaging their homeland.

But the affidavit to search Teixeira’s house says there were twice that many members, approximately 50. WSJ reports that the group was more pro-Russian than the Discord kids have thus far admitted. So while initial reports suggest this was not espionage, it’s far too early to tell either what Teixeira’s motive was or whether he was cultivated by someone else in his server, encouraged to leak certain kinds of documents just as Chelsea Manning was encouraged to seek out certain things over a decade ago.

That’s why I harped on this earlier: I’ve learned, both stuff that’s public and not, about how easily sophisticated actors can manipulate precisely the kinds of people, usually young men, who inhabit these kinds of chat rooms.

Foreign intelligence services have been searching out these opportunities, eliciting both criminal hacking and leaks, for at least a decade.

For example, the LulzSec hackers knew there were Russians in their chat rooms, but didn’t much care. But it might explain why some documents hacked as part of the Syria Leaks that would be particularly damaging to Russia never got published by WikiLeaks, even though multiple sets of the documents were shared with the outlet.

Even the FBI, with subpoena power, may have troubles identifying everyone who participated in a chat room. And if the FBI can’t do it, the teenagers involved likely can’t either. That’s especially true as operational security increases. Which means they may have no idea who they were really talking to, no matter what they tell the WaPo and FBI.

So while Teixeira paid for with this server with his own credit card, it has been shut down long enough that FBI may never be able to figure out who else was in the chat room, much less their real identity. So we may never know what happened before someone decided to ruin their lives by leaking documents with what inevitably will be inadequate operational security.

Which, in the case of Teixeira’s leaks, means we may not know all the people who got advance access to documents months before their publication on Twitter and Telegram alerted the IC about them, to say nothing of whether those people were nudging Teixeira for certain kinds of leaks.

No one controls what happens with dump leaks

Back in 2021, former Principal Deputy Director of National Intelligence Sue Gordon and former DOD Chief of Staff Eric Rosenbach seemingly confirmed that the files released by Shadow Brokers in 2016 and 2017 were obtained after two NSA employees, Nghia Pho and Hal Martin, brought them home from work; there’s no evidence that Pho, at least, ever tried to share them and no proof Martin did either.

In two separate incidents, employees of an NSA unit that was then known as the Office of Tailored Access Operations—an outfit that conducts the agency’s most sensitive cybersurveillance operations—removed extremely powerful tools from top-secret NSA networks and, incredibly, took them home. Eventually, the Shadow Brokers—a mysterious hacking group with ties to Russian intelligence services—got their hands on some of the NSA tools and released them on the Internet. As one former TAO employee told The Washington Post, these were “the keys to the kingdom”—digital tools that would “undermine the security of a lot of major government and corporate networks both here and abroad.”

If that’s right, it means the last most damaging leak to DOD wasn’t intentionally leaked at all, which makes it not dissimilar from the way that Teixeira reportedly intended just to share it with the guys in his Discord server. It was exfiltrated from NSA’s secure servers by employees (in Pho’s case, purportedly for work reasons), then stolen, then released.

In the wake of that discovery, DOJ seems to have started pushing to hold leakers accountable for the unintended consequences of their leaks. In a declaration accompanying Terry Albury’s sentencing, for example, Bill Priestap raised the concern that by loading some of the files onto an Internet-accessible computer, Albury could have made them available to entities he had no intention of sharing them with.

The defendant had placed certain of these materials on a personal computing device that connects to the Internet, which creates additional concerns that the information has been or will be transmitted or acquired by individuals or groups not entitled to receive it.

But it’s a lesson journalists don’t take seriously, except (in most cases) their own operational security. What happened to the source code of CIA hacking tools Schulte took? What happened to the damning files on Russia from the Syria leaks? Did Chelsea Manning envision the State cables she leaked would be shared with someone like Israel Shamir, who reportedly shared them, in turn, with Alexander Lukashenko’s regime in advance — the same kind of advance knowledge that Schulte himself reflected on?

Even the laudable, distinguishing aspect of Snowden’s leaks, that he gave them to journalists to determine what was in the public interest (an approach he abandoned when he described CIA infrastructure in his own book), is a double-edged sword. He made multiple copies of his files — most of which weren’t in the public interest — and handed the files to others, including at least one person, Greenwald, that Snowden knew had started out with epically shitty OpSec. We would never know if someone got some the Snowden files as a result unless, like Shadow Brokers or Teixeira’s leaks, someone started sharing them openly on Telegram.

The damage assessment and the reporting goes on

We are nine days into the public part of this leak and, thanks to WaPo reporters’ success at befriending the Discord kids, WaPo has obtained hundreds of otherwise unpublished documents. In addition to about eight background stories on the leaks and charges against Teixeira, WaPo currently has Discord Leak stories on: Taiwan’s military vulnerability, China’s surveillance balloonsSurveillance on Mexican cartels. There’s nothing that makes WaPo’s reporting more or less credible, more or less honorable, because Teixeira released these to show off to his buddies (if that is why he released them).

The Discord Leaks are a leak dump. They may have more in common with past leak dumps than a lot of past leak dump journalists would like to admit. Importantly, no matter what journalists would like to tell themselves, Teixeira’s motive, if he is the source, will have virtually no impact on the damage he does to US national security or the value those documents offer to the public good, both of which will be driven by the content of the documents and the details of any advance notice adversaries may have gotten.

And legally, Teixeira is going to be treated just like Chelsea Manning and Josh Schulte — which is to say, harshly, unless he decides to flip before prosecutors can build charges on another twenty documents and has information of value to prosecutors. That’s not surprising in the least. But — short of proving he knowingly shared these documents with an agent of a foreign power — nor will it be tied to his motive.

Leak dumps don’t care about motive.

Update: PwnAllTheThings’ analysis of the damage caused by the Discord leaks is worth reading. Along with noting that at least one human source has been put in danger by these leaks (as well as a bunch of SIGINT collection), he describes how these releases could have gotten a bunch of Ukrainians killed.

We don’t know yet if Teixeira wanted lots of Ukrainians to die as a result of his leak. But we definitely know he didn’t care if they did, and they certainly had the potential to cause colossal amounts of death—both military and civilian—in Ukraine, even if that huge potential was never fully realized.

Share this entry

Problems With The Standard Story Of The Revolutionary War And The Constitution

Index to posts in this series

The standard story of the origin of our nation tells us that the Declaration of INdependence asserts that all men are created equal and naturally endowed with certain rights including the right to life, liberty and the pursuit of happiness; that the Revolutionary War was fought to uphold these principles; and that the principles are instantiated in the Constitution. We didn’t always live up to those principles but we’ve always worked towards them, and we get closer all the time. P. 9 et seq. In the first post in this series, we saw that the Declaration doesn’t fit well with the standard story. What about the Revolutionary War and the Constitution?

The Revolutionary War

Roosevelt doesn’t think there was a single cause for the War.

Different people sought independence for different reasons, and likely they sometimes said what they thought would advance their cause rather than what they truly believed. History requires interpretation, and a claim to possession of the one singular truth is a hallmark of ideology. P. 55.

The Declaration explains the decision of the Colonists to throw off English rule. It claims that governments derive their just powers from the consent of the governed. The Declaration complains that the King cut off trade between the Colonies and the rest of the world. It claims that the King ignores the laws and even the courts of the Colonists. The King attacks the Colonies directly, keeps a standing army in the Colonies, and quarters troops on the population. The King imposes taxes on the Colonies even though they are not represented in Parliament. The King stirs up the “merciless savages” to attack and murder the Colonists. The only reference to slavery is oblique: the King “… has excited domestic insurrections amongst us….”

No doubt one or more of these claims were a factor for some of the Colonists. The principle of consent itself may have motivated some of them. The listed claims may have motivated others. Perhaps some were motivated by a desire to bring about equality or at least to end slavery (Thomas Paine and Benjamin Franklin, for example.) Roosevelt points out that protecting slavery may have brought others into the war:

There isn’t much evidence supporting the idea that slavery was an issue. Of course just as people say things they don’t believe to advance their cause, others may keep quiet about their actual reasons if they would hurt the cause. There was little to be gained by saying we’re rebelling because we want to enslave people. Roosevelt suggests that

… for some of the Patriots, a desire to preserve slavery was one reason—and maybe a strong one—to declare independence[.] On its face, this is pretty plausible. Just as it seems unlikely that northern Patriots had slavery at the front of their minds, it is unlikely the southern ones didn’t have it at least at the back of theirs. P. 53.

In any event it’s hard to argue that the War was fought over the principle of equality for anyone except white men and especially white men with property. A telling detail: the British offered slaves freedom if they fought for the King. After the War the Colonists demanded the return to slavery of those people. The British refused.

Nor was the Revolution fought to advance a broad principle of equality. Roosevelt says that the statement that all men are created equal is a reference to the fictional state of nature assumed to exist in the beginning. The broader concept of equality would have to wait for the French Revolution and the Declaration of the Rights of Man and of the Citizen in 1789. It asserts that “Men are born and remain free and equal in rights.” This is a statement about real people living in real societies, not imaginary savages in the wild.

The Constitution

The Constitution was necessary because the Articles of Confederation failed to create a strong enough central government. The states were fighting among themselves, refusing to adhere to treaties, imposing trade restrictions and refusing to pay the debts incurred in the Revolutionary War. The preamble states the reasons for adoption of the Constitution, starting with “to produce a more perfect union”, and ending with “to secure the blessings of liberty to ourselves and our posterity.” Roosevelt says that the chief goal of the Constitution was unity, with liberty at the bottom of the list.

If the Constitution were actually about individual human rights, it would include provisions that protected the rights of individuals. It doesn’t. The Founders Constitution restricts the Federal Government’s right to intrude on the specific rights in the Bill of Rights, but the states were free to intrude as much as their own constitutions allowed. It took the 14th Amendment to change that, and to make the Federal Government the guarantor of individual rights against itself and against the states.

As to slavery, there are three provisions that directly or indirectly support its continuation: the Three-Fifths Clause, a provision barring the Federal Government from ending the international slave trade until 1808, and the Fugitive Slave Clause. Each of these cemented the power of the slave states.

The Three-Fifths Clause redressed the population imbalance between the slave states and the rest, allowing slaves to be counted at ⅗ of a person for purposes of calculating the number of Representatives allocated to each state. It worked with the provision giving each state two senators to insure a balance in the legislature between slave and free states. In addition it gave the slave states an edge in the Electoral College with respect to population. Thomas Jefferson would have lost the election of 1800 to John Adams without the Three-Fifths Clause. Ten of the first 12 presidents were slavers. P. 76.

The prohibition on ending the slave trade before 1808 enabled slavers to rebuild their holdings by importation after losses in the Revolutionary War. The British offered freedom to any slave who fought for the King, and thousands of slaves accepted this offer. Others escaped their bonds. The Colonists demanded return of these escapees, but the British refused. The outcome is that slave population rose from 697,497 in the first census of 1790 to 1,191,362 in the 1810 census.

The Fugitive Slave Clause says that slaves who escaped to a free state did not gain their freedom, and that the free state was required to return them to their enslavers. This was a big win for the slavers. Under the Articles, each state determined how it would treat slaves in their territory; in fact that rule remained in effect as to slaves brought to free states by their masters. The Constitution stripped the States of their right to decide the question of slavery as to escapees, which today we would call a violation of States Rights.

As South Carolina delegate Charles Cotesworth Pinckney boasted upon his return from the Constitutional Convention, “We have obtained a right to recover our slaves in whatever part of America they may take refuge, which is a right we had not before.” P. 79.

Discussion

1. The standard story has a central place in our understanding of ourselves as Americans, regardless of other political views. Other nations have national stories, but it seems like we put a lot of emphasis on this story and the two documents, more than citizens of other countries do.

2. One consistent element of our self-image as Americans is that we consent to our government. In prior posts I’ve discussed the theoretical idea of the social contract. That’s not what I’m talking about. We believe that government only works if people consent to it.

Apparently that belief is not shared by a substantial of Republicans today. In this they are like the secessionist Confederates, as Heather Cox Richardson shows.

“We do not agree with the authors of the Declaration of Independence, that governments ‘derive their just powers from the consent of the governed,’” enslaver George Fitzhugh of Virginia wrote in 1857. “All governments must originate in force, and be continued by force.” There were 18,000 people in his county and only 1,200 could vote, he said, “But we twelve hundred . . . never asked and never intend to ask the consent of the sixteen thousand eight hundred whom we govern.”

3. Regardless of what Jefferson meant with the phrase all men are created equal, today we flatly mean that we’re all born equal, we’re all entitled to equal rights, and that one function of government is to guarantee that equality.

Apparently that belief is not shared by a substantial number of Republicans.

Share this entry

It Is A Mad Mad World

So, while some digital jackass named “Microchip” is dominating so much discussion here, let us talk about other things.

When I was a kid, I read Mad Magazine.

If I had to ride my training wheels bicycle there to the local store, I did. There were Playboys there on the shelf, and I did not even know that yet. I went for Mad. Alfred E. Neuman.

There were a lot of “illustrators” of Mad over the years, too many to go into currently, but (thank you Scribe) Al Jaffee was one of the most important.

“Microchip” is a blip, Al Jaffee spanned, and influenced, in a very good way, generations.

Share this entry

“I wanted to infect everything:” The Curiously Expert Pathologies of FBI Informant, Microchip

I’ve now read the substantive transcripts in the trial of Douglass Mackey, the far right troll who was convicted last month of conspiring to violate the voting rights of Hillary voters in the 2016 election.

As I noted in my first write-up of the verdict, the case has lessons that remain quite pressing, as loud boys on, who own, and claim to be interested in regulating Twitter attempt to make the site more welcoming to far right election disinformation. I plan to write that up.

Before I do, though, I want to talk about Microchip, the cooperating witness who pled guilty to the same conspiracy as part of a cooperation agreement in 2022.

We first learned the FBI had a cooperating witness on March 8 of this year, when Judge Nicholas Garaufis ordered the government to unseal its request to keep its informant’s identity secret. The filings in that discussion did not describe much about the timing or scope of his cooperation, other than that those he is targeting have the technical skills that might lead to him being hacked if he were discovered.

The fact of the CW’s cooperation is sure to be seen by many in that community as a profound betrayal, with the result that, at a minimum, online harassment is bound to follow the CW should his or her identity become a matter of public record. That harassment can have negative consequences in and of itself. In addition, to claim that intense online attacks do not endanger a person’s physical safety is to ignore the reality of our current world, as evinced in common newspaper headlines. See, e.g., Sheera Frenkel, The Storming of Capitol Hill Was Organized on Social Media, N.Y. TIMES, Jan. 6, 2021, available at https://www.nytimes.com/2021/01/06/us/politics/protesters-storm-capitol-hillbuilding.html; Eric Lipton, Man Motivated by “Pizzagate” Conspiracy Theory Arrested in Washington Gunfire, N.Y. TIMES, Dec. 5, 2016, available at https://www.nytimes.com/2016/12/05/us/pizzagate-comet-ping-pong-edgar-maddisonwelch.html. It is simply (and regrettably) a fact of the times that many acts of politically motivated violence in current society arise from campaigns of online harassment.

Beyond the risk to the CW, the potential consequences include the disruption of the CW’s ongoing work with the FBI. It is certainly true that the nature of this work is online and anonymous, but, if the CW’s name and location were to become known, the CW would become a target for all who believe that they might be under investigation (whether they are or not). Given the technical proficiency of those with whom the CW associates, it is not difficult to envision multiple scenarios in which the CW’s online work could be jeopardized by way of a cyberattack (at a minimum).

Microchip’s identity can’t be that well protected. As soon as this pre-trial discussion was posted, Mackey’s lawyer, Andrew Frisch, contacted the government to tell them he had learned of the informant’s real identity independently (possibly via Anthime “Baked Alaska” Gionet) and at least one researcher I’ve spoken with since seems to have a plausible theory as to his real identity.

But I assumed, based on those filings, that Microchip had flipped in advance of Mackey’s arrest.

The actual details are more complicated — and a bit unpersuasive, as AUSA William Gullotta got Microchip to explain in his testimony on March 23.

The thing I find most unbelievable is Microchip’s claim that he only joined Twitter — in any capacity — in July 2015, just months before he started playing a central and expert role in expanding the reach of anti-Hillary trolling.

Q When did you start using Twitter?

A Back in around July of 2015.

Q When did you start using the alias Microchip on Twitter?

A Anywhere from November 2015 through March 2016, somewhere around there.

I find this claim so surprising because, in his description of his trolling, Microchip described the kind of Twitter expertise that normally takes years to build. And two 2017 articles celebrating Microchip’s expertise (Buzzfeed, Politico) describe that he exhibited expertise from the start of his identity in November 2015.

For example, Microchip described how — the implication is all of his engagement was Microchip — he used various levels of operational security to succeed in creating new accounts anonymously, from the start.

Q When you would set up your accounts, did you set them up anonymously?

A I did.

Q How do you go about doing that?

A Using virtual private networks or proxy IP address services.

Q What’s a virtual private network?

A It’s, basically, somebody who sets up servers across the world in different locations and then you can tie into that service so you appear as if you are at that location and then they feed the internet through that.

Q So it would mask your true location from Twitter?

A That’s right.

Q What other information did you need to provide to Twitter to set up a new account?

A Yes, you need an email address or a phone number or both.

Q So would you just set up anonymous email addresses —

A Oh, yeah, through Google, Gmail, you set up a account and then you set up a Google Voice account and then if you need to change a phone number on that, you pay ten bucks and you get a new phone Number.

His description of various means to exploit Twitter to inject extremist views into the mainstream come off as pathological … but extremely savvy.

Q And why would you want it to be on a trending list?

A Because I wanted our message to move from Twitter into regular society and part of that would be — well it’s based on the idea that, you know, back then maybe — I don’t know, 10 to 30 percent of the US population was on Twitter, but I wanted everybody to see it, so I had figured out that back then, news agencies, other journalists would look at that trending list and then develop stories based on it.

Q What does it mean to hijack a hashtag?

A So I guess I can give you an example, is the easiest way. It’s like if you have a hashtag — back then like a Hillary Clinton hashtag called “I’m with her,” then what that would be is I would say, okay, let’s take “I’m with her” hashtag, because that’s what Hillary Clinton voters are going to be looking at, because that’s their hashtag, and then I would tweet out thousands of — of tweets of — well, for example, old videos of Hillary Clinton or Bill Clinton talking about, you know, immigration policy for back in the ’90s where they said: You know, we should shut down borders, kick out people from the USA. Anything that was disparaging of Hillary Clinton would be injected into that — into those tweets with that hashtag, so that would overflow to her voters and they’d see it and be shocked by it.

Q Is it safe to say that most of your followers were Trump supporters?

A Oh, yeah.

Q And so by hijacking, in the example you just gave a Hillary Clinton hashtag, “I am with her,” you’re getting your message out of your silo and in front of other people who might not ordinarily see it if you just posted the tweet?

A Yeah, I wanted to infect everything.

Q Was there a certain time of day that you believed tweeting would have a maximum impact?

A Yeah, so I had figured out that early morning eastern time that — well, it first started out with New York Times. I would see that they would — they would publish stories in the morning, so the people could catch that when they woke up. And some of the stories were absolutely ridiculous — sorry. Some of the stories were absolutely ridiculous that they would post that, you know, had really no relevance to what was going on in the world, but they would still end up on trending hashtags, right? And so, I thought about that and thought, you know, is there a way that I could do the same thing.

And so what I would do is before the New York Times would publish their — their information, I would spend the very early morning or evening seeding information into random hashtags, or a hashtag we created, so that by the time the morning came around, we had already had thousands of tweets in that tag that people would see because there wasn’t much activity on Twitter, so you could easily create a hashtag that would end up on the trending list by the time morning came around.

Perhaps most chilling is his description of how participants in this anti-Hillary trolling knew there was nothing to the John Podesta emails they made the focus of their October 2016 trolling.

It didn’t matter. They didn’t care.

They were aiming to cause chaos to hurt Hillary’s chances of winning.

Q What was it about Podesta’s emails that you were sharing?

A That’s a good question.

So Podesta ‘s emails didn’t, in my opinion, have anything in particularly weird or strange about them, but my talent is to make things weird and strange so that there is a controversy. So I would take those emails and spin off other stories about the emails for the sole purpose of disparaging Hillary Clinton.

T[y]ing John Podesta to those emails, coming up with stories that had nothing to do with the emails but, you know, maybe had something to do with conspiracies of the day, and then his reputation would bleed over to Hillary Clinton, and then, because he was working for a campaign, Hillary Clinton would be disparaged.

Q So you’re essentially creating the appearance of some controversy or conspiracy associated with his emails and sharing that far and wide.

A That’s right.

Q Did you believe that what you were tweeting was true?

A No, and I didn’t care.

Q Did you fact- check any of it?

A No.

Q And so what was the ultimate purpose of that? What was your goal?

A To cause as much chaos as possible so that that would bleed over to Hillary Clinton and diminish her chance of winning.

Microchip was actually one of the people who, on October 30, 2016, brought the idea of getting Hillary voters to vote from home from 4Chan to the War Room where anti-Hillary trolls workshopped ways to make it more realistic and ensure that Trump voters wouldn’t also fall for the meme.

Text telling Hillary voters to tweet Hillary on November 8.

And, as he described it, during 2016, Microchip was paying up to $500 a month, between two services, to use bots to expand the reach of right wing trolling.

A Yeah, so one of the first services to kind of seed the followers was a service called Add Me Fast, A-D-D, M-E, F-A-S-T, and that service is kind of like a peer networking service where I would insert the tweet into that service, somebody else would insert a tweet and then, we would retweet each other’s information, right? And you could gain points doing that and, if you accumulate points, you can then expend those on likes, followers, retweets. So that service, I would spend sometimes $300 a month on it. That would give you around a thousand to three thousand retweets, likes, or follows.

[snip]

Another step is using Fast Followerz and that’s F-A-S-T and then F-O-L-L – – Q O-W-E-R-S? A Yeah, but it’s with a “Z,” it’s with a Z at the end. .com, yeah. And that service you spends like, a monthly fee of, you know, a hundred to two hundred, sometimes three hundred bucks a month. And they have control of all the bots, so you don’t actually retweet anything, but you put in your Twitter handle or you put in a tweet that you want to get retweeted, and the service that I would use would be 50 to a hundred followers, something like that, a day, and then those followers would also retweet or “like” my tweets anywhere from three to five times.

No one explained where Microchip came up with $500 a month to make anti-Hillary trolling go viral.

On cross-examination, however, Mackey’s lawyer, Frisch, did get Microchip to admit that when he started cooperating with the FBI on this case in 2021, he had both IRS and bankruptcy debts.

Also on cross, Microchip described that he’s not paid for any of the assistance he provides to the FBI — though as he prepared for the trial in February, he described liking the “structure” working with the FBI provided his life.

Q Without telling us what you’re doing, how often do you do this work for the FBI?

A As often as needed, essentially.

Q You’re not getting paid for it; right?

A That’s right.

Q In fact — in fact, you met with the FBI on or about February 23, 2023, earlier, about a month ago; do you remember that? Mr. Paulson was there, Mr. Gullotta was there. All three prosecutors were there.

A Yeah, I think that was here in Brooklyn.

Q And you asked — you said — you said — do you recall saying that you wanted to keep working with the FBI because the FBI provided a structure that was valuable to you?

[Frisch refreshes his memory with his 302]

Q And that’s what you said; right?

A Yes.

While the trial showed that Mackey was important to the effort to suppress the votes of Black and Latino Hillary voters because he had so much reach, particularly among the more general public in 2016, Microchip — who claims to have been a newB Twitter user in July 2015 — seems to have played a more important role in professionalizing all aspects of the anti-Hillary campaign.

Mackey made these memes popular; Microchip made them work.

Which makes the timeline more curious. By all appearances, the FBI knew of Microchip long before they charged Mackey, starting in 2018 (about eight months after Mackey was first IDed). That’s when he first offered to cooperate with the FBI.

A No. I talked to the FBI about being useful to them when they came and actually talked to me the first time. I discussed with the FBI in the car at my residence at the time. We actually sat in the car outside of my home, and I talked to them about my use of technology and how it could possibly be useful to whatever they might be working on.

They seem to have paid him a visit, as well, as they prepared to charge Mackey in December 2020. But even in spite of the fact that his key role in preparing anti-Hillary memes would have been readily obvious in warrants served on Twitter in advance of charging Mackey, the FBI didn’t charge Microchip along with Mackey in January 2021.

And only as they looked closer after he reached out did they decide they needed him to plead guilty.

Timeline

July 2015: Microchip joins Twitter

November 2015: Microchip starts to create his persona

April 5, 2017: Buzzfeed article quoting Microchip claiming, “it’s all us, not Russians” describing he turned to Twitter in response to November 2015 terror attacks in Paris

August 9, 2017: Politico article describing Microchip as an “early player” in hard-right Twitter chatrooms starting in November 2015

December 17, 2018: FBI questions Microchip about July 2018 online threat

December 15, 2020: Second contacts with FBI, including Megan Rees (about which Microchip tells Baked Alaska), Microchip lawyers up

January 27, 2021: Mackey arrest

February 4, 2021: Microchip’s lawyer reaches out to FBI, broaches cooperation

April 22, 2021: Formal proffer with government

June 2021: First of several agreements to toll statutes of limitation

April 14, 2022: Guilty plea

Share this entry

Dear Jeff Gerth: Peter Strzok Is Not a Media Critic

I really hope that after this and one more post on CJR’s series performing “Russiagate,” I’ll be done for good. CJR is not going to correct, much less retract, a piece that makes clear errors and relies on an undisclosed Russian intelligence product. So all that’s left is to describe what CJR might have done — as editor Kyle Pope has said was his goal — to say something new about the journalism on the Russian investigation, which I’ll do in a follow-up.

But Jeff Gerth said something in last week’s Zoom conference that revealed a(nother) serious cognitive problem with his project. [Since CJR did not record the event, Dan Froomkin downloaded the closed captions to provide an approximation, which I’ve posted here.] When invited to address any question that the moderator, Berkeley School of Journalism Dean, Geeta Anand, had not asked, Gerth addressed why he (claimed to) focus so closely on the NYT.

[Jeff Gerth] 14:03:21
Well, I wanted to address a question that I’ve been asked quite a bit that didn’t come up here, which is why I focused so much on the New York Times.

[Jeff Gerth] 14:03:34
And so my answer to that question is threefold.

[Jeff Gerth] 14:03:39
One. It’s the most influential. No widely read news outlet.

[Jeff Gerth] 14:03:46
Certainly in America, perhaps in the World number 2. It’s the only news organization whose coverage of the Trump Russia matter was repeatedly criticized by the FBI in internal documents that later became public.

[Jeff Gerth] 14:04:11
And obviously, if other news organizations have been criticized by the FBI in documents, I would have reported on that as well.

[Jeff Gerth] 14:04:20
But the New York Times stood out. That regard. So that’s a second reason.

[Jeff Gerth] 14:04:26
And the third reason is, that the times provided a valuable window into their editorial and repertory decision making by allowing a filmmaker into the newsroom for a year and a half, and then you know the fruits of it became a 4 part series that aired in 2

[Jeff Gerth] 14:04:50
1,018, and so that offered invaluable.

[Jeff Gerth] 14:04:57
Raw material for any journalist. Looking at at this story, and a lot of the documentarians work feature.

[Jeff Gerth] 14:05:09
The stories that I was interested in, as well as the stories that the FBI was internally being quite critical of, as well.

[Jeff Gerth] 14:05:19
So those those are the the main reasons why there’s so much in the piece about the New York Times. [my emphasis]

Now, as I have shown, Gerth actually didn’t focus on the NYT. His main villains — those who chased the Steele dossier — published elsewhere. And he ignored almost all of NYT’s Pulitzer winning coverage of Russia. He ignored a September 2016 story revealing how often Julian Assange’s Wikileaks releases served Russia’s political interests. He ignored a December 2016 epic that described the Russian hack-and-leak from the DNC perspective, one that completely debunks Gerth’s claims that the hack-and-leak had limited impact on Hillary’s campaign. He ignored other 2016 Pulitzer-winning stories — on Russia hunting down its enemies in other countriesRussia’s use of disinformationthe elite hackers Russia was recruiting, and Russia’s cultivation of the far right — that show the framework with which NYT’s editors came to their 2017 coverage. He ignored a 2017 report on the Russian contacts that Jared Kushner omitted from his application for clearance. He ignored a 2017 report that Trump knew Mike Flynn had been an unregistered agent for Turkey before Trump appointed him to be National Security Adviser. He may or may not have ignored a 2017 story on how Trump bragged to Sergey Lavrov that he fired Jim Comey to end the Russian investigation, but if he mentioned it, he ignored the Comey part, which undermined Gerth’s own wildly generous interpretation of Trump’s related comments to Lester Holt. Gerth included two (one, two) of three stories on the June 9 meeting, but not the one revealing that Trump had drafted Don Jr’s false statement about the meeting. That’s particularly problematic given that Gerth’s treatment of an interview NYT did with Trump (the only story linked in this paragraph that wasn’t part of NYT’s two Pulitzer winning packages) focused on the dossier and not the discussion Trump had with Putin about the topic he used for his cover story about the June 9 meeting.

This would have been a very different series had Gerth really focused on the NYT, as he claims to think he did.

But something Gerth said really surprised me. A key to his purported reason to (claim to) focus on the NYT is that, he describes, the FBI “criticized” NYT’s coverage. NYT was, “the only news organization whose coverage of the Trump Russia matter was repeatedly criticized by the FBI in internal documents that later became public,” Gerth said. The documentary The Fourth Estate focused on, “the stories that the FBI was internally being quite critical of,” Gerth claimed.

He even asserted that the NYT was the only outlet on whose coverage the FBI was closely focused. “If other news organizations have been criticized by the FBI in documents, I would have reported on that as well.” That claim would be quite a shock to Andy McCabe, whose focus on the WSJ coverage of the Clinton Foundation showed up in two DOJ IG Reports and provided the bogus excuse for his firing. And if Gerth had covered the Mike Flynn case with any level of attention, he would also know that the FBI launched an investigation into some of Sara Carter’s inaccurate reporting, which had been fed to her by Senate Judiciary Committee staffer Barbara Ledeen. Bizarrely, in his coverage of the dossier, Gerth made no mention of the sustained FBI discussions of the September 2016 Michael Isikoff story based on Christopher Steele’s reporting, even though they appear in the DOJ IG Report on the Carter Page FISAs; he discussed the Isikoff story at length, but not the FBI effort to confirm whether Steele or Glenn Simpson was Isikoff’s source.

Gerth doesn’t even account for all the discussions of news coverage in Peter Strzok’s texts, though one such text appears to be one of the two instances of “criticism” of the NYT he speaks of.

My own coverage of Strzok’s sustained attention to such stories — as well as Mueller’s attempts to track how investigative subjects worked the press, including Konstantin Kilimnik — is what made Gerth’s claims so confusing to me.

It led me to suspect Gerth totally misunderstood the purpose of Strzok’s annotation, and thereby saw it as something different than the attempts to stave off clear errors in Devlin Barrett or Sara Carter’s reporting, the woefully belated effort to attribute the Yahoo reporting, to say nothing of efforts to learn how Roger Stone and Kilimnik were planting false stories as part of their attempts to cover their tracks.

The FBI has no business in doing press criticism (though it does attempt to correct dangerously incorrect reporting). It does, however, have reason to track classified or investigative leaks and public claims made by subjects of their investigation. Which is what the reams full of records on Strzok’s work show him doing.

In my own coverage of the Strzok annotation on which Gerth hangs most of his claim of FBI criticism of the NYT, I surmised that it arose out of his focus on leaks. Some of it clearly seems to reflect concern that the NSA might be not be turning over everything it had found. And Strzok’s observation that the NYT falsely believed an investigation into Stone had already been opened may have come in handy nine months later, when they learned from Ann Donaldson that Richard Burr had provided Don McGahn that same false information just weeks later. Indeed, the identification of a common false belief shared by the NYT and SSCI’s Chair might explain why DOJ refused to share the most sensitive details of the Russian investigation with the committee.

I asked Strzok why he had done the annotation. He explained: “Critique played no role — nobody’s got time for that. My purpose was to figure out who’s talking and whether they had info they weren’t sharing with us and/or whether they were leaking to shape the public political narrative.”

In other words, it was perfectly consistent with all the other known efforts by the FBI to track public reports on ongoing investigations. It was an effort to understand what partners and subjects of the investigation were sharing with reliable journalists. And while the annotation shows two clearly incorrect beliefs on the part of the NYT — that an investigation into Stone had already been opened and that the FBI specifically already had call record returns on Trump’s associates — many of the other observations could have multiple explanations, including that the NYT learned of ties, later confirmed, between Trump’s people and Russian spooks before the FBI did. If that’s the explanation, NYT should be lauded, not criticized.

Those stories in which NYT was so far ahead of the FBI are absolutely ripe for review. I don’t fault Gerth’s focus on them; I fault his silence and at times misrepresentation about the rest of NYT’s coverage. But if you’re going to look at those four stories (one, two. threefour) alleging many ties between Trump and Russia — if you’re going to imagine you’re anchoring an entire 23,000 word piece on the NYT based on the FBI attention to several of those stories — you need, first, to understand what you’re looking at.

Gerth imagined he was looking at the FBI doing media criticism. In a sense, he may have been right. What distinguishes Strzok’s apparent effort to understand an outlier NYT story from Gerth’s attempt to understand the Russia coverage is that Strzok had a better handle on the known facts and he tried to understand why reports deviated from those known facts.

Gerth, over and over, simply imposed his own conclusions onto the things that he saw.

LINKS

CJR’s Error at Word 18

The Blind Spots of CJR’s “Russiagate” [sic] Narrative

Jeff Gerth’s Undisclosed Dissemination of Russian Intelligence Product

Jeff Gerth Declares No There, Where He Never Checked

“Wink:” Where Jeff Gerth’s “No There, There” in the Russian Investigation Went

Columbia Journalism Review–and Now Columbia School of Journalism–Have a Russian Intelligence Problem

Dear Jeff Gerth: Peter Strzok Is Not a Media Critic

My own disclosure statement

An attempted reconstruction of the articles Gerth includes in his inquiry

A list of the questions I sent to CJR

Share this entry

“Forthwithier:” Peter Navarro Attempts to Pull a Fast One on His Incriminating Use of ProtonMail

Peter Navarro appears to be attempting to stall out a month-long order to avoid turning over ProtonMail content he has been trying to withhold from DOJ since last July.

In the guise of doing a more thorough search for materials he should have turned over under the Presidential Records Act, he has not turned over 200 to 250 already identified ProtonMail records that, last year, his attorney said would incriminate him if he turned them over.

I wrote about the lawsuit DOJ filed to force Navarro to turn over the records last August. In effect, after Navarro lawyered up last year and DOJ told them they were going to sue, Navarro’s lawyer went through his emails, identified 200 to 250 ProtonMail records that should have been turned over, but said he would not on the grounds that it would amount to self-incrimination. So DOJ sued to get them.

In March, Judge Colleen Kollar-Kotelly ruled for the government and ordered Navarro to turn over the documents he had already identified to be covered by the Presidential Record Act, “forthwith.”

ORDERED, that Defendant shall produce to Plaintiff the 200 to 250 documents that his counsel has identified as Presidential records forthwith.

In a status report submitted yesterday describing all the new files Navarro is looking for, DOJ included a footnote making it clear Navarro still has not complied with the March 9 order.

1 As of the filing of this status report, Plaintiff advises that it has not received any of the 200 to 250 documents that Defendant’s counsel has identified as Presidential records, nor has Defendant obtained a stay of this Court’s order from the D.C. Circuit.

Navarro has appealed and is asking for a stay of Judge KK’s order; his reply brief for that stay is due Monday. He has clearly ignored a pending order for over a month in hopes that the DC Circuit — a panel consisting of Patricia Millett, Robert Wilkins, and Neomi Rao — will give allow him to delay turning over the 200 to 250 documents his lawyer has said include evidence of a crime.

Share this entry

Columbia Journalism Review–and Now Columbia School of Journalism–Have a Russian Intelligence Problem

On Tuesday, Columbia Journalism Review quietly staged the Zoom conference intended to address the many problems with Jeff Gerth’s series on “Russiagate” [sic], which I wrote about in a long series. After they rescheduled the original date because of an illness, they did not alert those who had previously signed up, meaning a number of people missed it. Nor did they record the event. It had the feel of a formality designed to claim they had listened, without actually doing so.

Nothing demonstrates the inadequacy of the event so well as the fact that no one — not moderator and Berkeley School of Journalism Dean Geeta Anand, not Columbia Journalism School Dean Jelani Cobb, and not CJR Editor Kyle Pope — addressed the fact that Jeff Gerth had cited an unreliable Russian intelligence product as part of his attack on Hillary Clinton without informing readers he had done so.

I described that he had done so in this post, but I’m going to try to simplify this still further in hopes Columbia will understand how inexcusable this is — how badly this violates every tenet of ethical journalism.

As part of his description of Hillary’s response to being victimized in a hack-and-leak campaign, Gerth described that Clinton approved a plan to vilify Trump by making Russian interference itself a scandal.

The disclosures, while not helpful to Clinton, energized the promotion of the Russia narrative to the media by her aides and Fusion investigators. On July 24, Robby Mook, Hillary’s campaign manager, told CNN and ABC that Trump himself had “changed the platform” to become “more pro-Russian” and that the hack and dump “was done by the Russians for the purpose of helping Donald Trump,” according to unnamed “experts.”

Still, the campaign’s effort “did not succeed,” campaign spokeswoman Jennifer Palmieri would write in the Washington Post the next year. So, on July 26, the campaign allegedly upped the ante. Behind the scenes, Clinton was said to have approved a “proposal from one of her foreign-policy advisers to vilify Donald Trump by stirring up a scandal claiming interference by Russian security services,” according to notes, declassified in 2020, of a briefing CIA director John Brennan gave President Obama a few days later. [my emphasis]

The claim is a central part of Gerth’s narrative, which adopts many of the theories John Durham floated in his two failed prosecutions, suggesting that the press’ concerns about Trump and Russia stemmed exclusively from efforts — the dossier and the Alfa Bank anomaly — generated by Hillary, and not by Carter Page’s weird behavior in Moscow, Paul Manafort’s ties to oligarchs with ties to Russia, or all the lies Trump’s people told in 2017 about their own ties to Russia.

The claim is a central part of Jeff Gerth’s narrative, and it is based on a Russian intelligence product of uncertain reliability.

These are the notes of Brennan’s briefing to Obama. Here, though not in an earlier part of this section, Gerth quotes directly from the notes (though Gerth cuts the words “alleged approval”).

This is the letter John Ratcliffe wrote to Lindsey Graham about the briefing before he declassified the notes themselves. The letter quotes the notes and unlike Gerth, he does not cut the words, “alleged approval,” so there can be no doubt that that’s what Ratcliffe was addressing. Ratcliffe’s letter explicitly says that the Intelligence Community “does not know the accuracy of the allegation” or whether it was “exaggeration or fabrication.”

  • In late July 2016, U.S. intelligence agencies obtained insight into Russian intelligence analysis alleging that U.S. Presidential candidate Hillary Clinton had approved a campaign plan to stir up a scandal against U.S. Presidential candidate Donald Trump by tying him to Putin and the Russians’ hacking of the Democratic National Committee. The IC does not know the accuracy of this allegation or the extent to which the Russian intelligence analysis may reflect exaggeration or fabrication.
  • According to his handwritten notes, former Central Intelligence Agency Director Brennan subsequently briefed President Obama and other senior national security officials on the intelligence, including the “alleged approval by Hillary Clinton on July 26, 2016 of a proposal from one of her foreign policy advisors to vilify Donald Trump by stirring up a scandal claiming interference by Russian security services.”

It’s bad enough that Gerth takes out the use of “alleged” included in the notes itself and in Ratcliffe’s description of the report.

But it is inexcusable that Gerth does not tell readers this claim comes from a Russian intelligence report, one that even John Ratcliffe warned might not be reliable, might even be a fabrication! Gerth describes that “Clinton was said” to have formulated this plan, without telling readers that Russian spooks were the ones who said it. He simply adopts the accusation made by Russian spies without notice he had done so.

Before writing this up, I asked Kyle Pope about this twice, first in my general list of questions, then in a specific follow-up.

Finally, you did not answer this question.

Do you believe your treatment of the John Brennan briefing should have revealed the briefing was based on a Russian intelligence document? Do you believe you should have noted the John Ratcliffe warning that, “The IC does not know the accuracy of this allegation or the extent to which the Russian intelligence analysis may reflect exaggeration or fabrication”? Is there a reason you’re certain the date was July 26 when it’s not clear whether it says 26 or 28?

Is it your view that CJR owes its readers neither notice that it is relying on a Russian intelligence report for its interpretations about Hillary Clinton’s motives nor reveal that the IC would not vouch for the accuracy of that report?

I got no answer. Since Tuesday’s event, I’ve since asked for comment from Dean Cobb, who provided no response, as well as Dean Anand (whose assistant said she may get back to me later).

Jeff Gerth, and through him, CJR, and through CJR, the Columbia Journalism School apparently believe it is sound journalism, in a piece that demands greater transparency from others commenting on sloppy reporting about Russia’s campaign to interfere in the 2016 election, to quote from a description of a Russian intelligence report that may have been part of that campaign to interfere in the 2016 election, without disclosing that he was doing so.

There are unretracted clear errors throughout Gerth’s piece that also went unremarked in Tuesday’s event; rather than explaining why those errors remain uncorrected in a piece complaining about the errors of others, Gerth twice claimed his was a, “very factual chronological story” with no pushback. When I asked about them before doing my piece, Pope dismissed those errors as merely a matter of opinion.

But about this undisclosed use of a Russian intelligence product that could be a fabrication, there is no dispute. It’s right there in the warning Ratcliffe gave before he released the notes. “The IC does not know the accuracy of this allegation or the extent to which the Russian intelligence analysis may reflect exaggeration or fabrication.” But that didn’t stop Gerth from using it. He used it anyway, with no disclosure about who made this allegation or the IC warning about its uncertain reliability.

And Columbia University’s journalism establishment stubbornly stands by that non-disclosure.

Links

CJR’s Error at Word 18

The Blind Spots of CJR’s “Russiagate” [sic] Narrative

Jeff Gerth’s Undisclosed Dissemination of Russian Intelligence Product

Jeff Gerth Declares No There, Where He Never Checked

“Wink:” Where Jeff Gerth’s “No There, There” in the Russian Investigation Went

Columbia Journalism Review–and Now Columbia School of Journalism–Have a Russian Intelligence Problem

Dear Jeff Gerth: Peter Strzok Is Not a Media Critic

My own disclosure statement

An attempted reconstruction of the articles Gerth includes in his inquiry

A list of the questions I sent to CJR

Share this entry

The Testimony Jack Smith Gets This Week Builds on Work from Over a Year Ago

Starting on Tuesday, Jack Smith’s prosecutors started getting return grand jury appearances for a set of key Trump aides who had invoked Executive Privilege in earlier appearances. In the days ahead, that same January 6 grand jury will get the testimony of Dan Scavino, Stephen Miller, Mark Meadows and — unless Trump succeeds with some kind of last minute challenge — Mike Pence.

Starting tomorrow, Secret Service agents will testify in the stolen documents case. That comes after (according to CNN), witnesses who gave voluntary testimony last summer have made subsequent appearances before the grand jury and Evan Corcoran provided crime-fraud excepted documents and testimony to the same grand jury. Multiple other lawyers already testified before the grand jury.

While there are a few outstanding items, such as the exploitation of Scott Perry’s phone, the DC Circuit decision on the application of 18 USC 1512(c)(2) to January 6, finding a way to obtain any remaining classified documents Trump has been hoarding, a verdict in the Proud Boys trial (which may dictate charging decisions for others) — all of which efforts have been pending for over six months, before Smith was appointed — the twin investigations headed by Jack Smith appear to be headed to imminent resolutions.

In recent weeks, the same TV lawyers who were wailing last summer about the January 6 investigation into Trump (the stolen documents investigation, while already laying the groundwork for charging a former President under the Espionage Act, still remained entirely unknown), have suggested that Alvin Bragg’s indictment of Trump might, “might light a fire under other prosecutors and advance the proposition that even ex-presidents must follow the law.”

It’s an obscene suggestion, that Jack Smith or his AUSAs or Merrick Garland needed some push to pursue the investigation into Donald Trump, when instead the TV lawyers simply needed a push to review what steps the investigation was actually pursuing. That’s because all of the recent developments in the Jack Smith case — the crime-fraud ruling, the Executive Privilege waiver, the testimony of Mike Pence — very obviously build on work done last year, well before Garland appointed Jack Smith. Some of those steps were even public at the time last summer when the very same TV lawyers were wailing. All of the climactic steps occurring in recent weeks were easily foreseeable by August.

Prosecutors have been building to this moment for a long time.

As I noted here, investigations in the era of cloud computing usually follow a clear logic:

  • Use subpoenas to obtain metadata to identify key subjects
  • Use metadata to obtain cloud warrants of subjects
  • Use cloud warrants to obtain warrants for phones (a necessary step if encrypted apps were used in furtherance of a crime, as was the case in the lead-up to January 6)
  • Use overt subpoenas for other witnesses to obtain evidence
  • Obtain grand jury testimony from witnesses

By the time the first overt subpoenas and warrants go out — which in the January 6 case was May 2022, though in the case of Sidney Powell was September 2021 — DOJ will already have obtained metadata and cloud content from key subjects of the investigation. Only after DOJ works through that covertly obtained evidence does it start doing the things that alert subjects to the scope of the investigation by subpoenaing other witnesses or seizing phones.

Even in a garden variety investigation, it can take six months from the date of seizure of a subject’s phone until an arrest. This was true even in the militia conspiracy cases, where arrests were an attempt to stave off further violence, in part because FBI was exploiting so many phones.

In the case of sensitive witnesses like lawyers, presidential advisors, and members of Congress, it takes a number of extra steps to get grand jury testimony or access content.

In Rudy Giuliani’s case, a privilege review of his phone content took nine months (though that review incorporated content relating to January 6, so it has been done since January 2022). In Enrique Tarrio’s case (largely due the security he used on his phone), it took over a year to access the content on his phone. In Scott Perry’s case, prosecutors are still working on it seven months later. In James O’Keefe’s unrelated case, Project Veritas still has one more chance to prevent prosecutors from getting evidence the FBI seized in November 2021, almost 17 months ago. You can’t skip privilege reviews, because if you do, key evidence will get thrown out during prosecution, rendering any downstream evidence useless as well.

In cases of privilege, DOJ first gets grand jury testimony where the witness invokes privilege, and then afterwards makes a case that the needs of the investigation overcome any privilege claim. DOJ first started pursuing privileged testimony regarding events involving Mike Pence with grand jury testimony from Pence aides Greg Jacob and Marc Short last July, then with testimony from the two Pats, Cipollone and Philbin, in August. It got privilege-waived testimony from Pence’s aides in October and from the two Pats on December 2. That process undoubtedly laid the groundwork for this week’s DC Circuit ruling that people like Mark Meadows and Dan Scavino must likewise testify to the grand jury.

By the time DOJ first overtly subpoenaed material in the fake electors plot last May, it had done the work to obtain cloud content from John Eastman and Jeffrey Clark. If DOJ had obtained warrants for the already seized phone content from Rudy — which is likely given the prominence of Victoria Toensing from the start of the fake elector subpoenas — then it would have built on content it obtained a year earlier in another investigation.

Some of this undoubtedly benefitted from the January 6 Committee’s work. I would be shocked, for example, if DOJ didn’t piggyback on Judge David Carter’s March 28, 2022 decision ruling some of John Eastman’s communications to be crime-fraud excepted. As NYT reported in August, in May 2022, DOJ similarly piggybacked on J6C’s earlier subpoenas to the National Archives (and in so doing avoided any need to alert Joe Biden to the criminal, as opposed to congressional, investigation); this is consistent with some of what Mueller did in the Russian investigation. Cassidy Hutchinson’s testimony, obtained via trust earned by Liz Cheney, has undoubtedly been critical. But the January 6 Committee also likely created recent delays in the January 6 and Georgia investigation, thanks to the delayed release of transcripts showing potentially exculpatory testimony.

But much of it preceded the January 6 Committee. I’ve shown, for example, that DOJ had a focus on Epshteyn before J6C first publicly mentioned his role in the fake electors plot. Toensing’s involvement came entirely via the DOJ track.

The path that brought us here went from the covert steps in advance of the May 2022 Clark and Eastman warrants (possibly including Rudy Giuliani warrants), to testimony from Trump’s aides, to testimony from White House Counsels, to Meadows and Pence and the rest of them.

There’s not a shred of evidence that DOJ’s prosecutors or Garland were afraid of taking these steps (FBI might be another issue). Instead, there’s a clear timeline of public steps DOJ has taken to get us to this point, which necessarily built on non-public things DOJ did to get to the point of obtaining warrants for the email accounts of several lawyers (and whatever covert steps it took with non-lawyers that won’t be public for years).

A timeline of the stolen document investigation is here.

Some key dates in the January 6 investigation are:

January 4, 2021: DC authorities seize Enrique Tarrio’s phone

January 25, 2021: Stop the Steal VIP Brandon Straka arrested; DOJ IG opens probe into Jeff Clark and others

February 17, 2021: First allegedly cooperative interview with Straka

March 17, 2021: DOJ makes first tie between Oath Keepers investigation and Roger Stone

March 25, 2021: Second allegedly cooperative interview with Straka

April 21, 2021 (Lisa Monaco’s first day on the job): DOJ obtains warrant targeting Rudy Giuliani’s cell phones in Ukraine investigation

June 23, 2021: First Oath Keeper who interacted with Stone enters into cooperation agreement

August 19, 2021: Alex Jones sidekick Owen Shroyer, who participated in Friends of Stone list and served as a communication hub between Proud Boys and others, arrested

September 2021: DOJ subpoenas records from Sidney Powell grift

September 3, 2021: SDNY makes an ultimately successful bid to review all content on Rudy’s devices for privilege (making such content available if and when DOJ obtains January 6 warrant targeting Rudy)

Fall 2021: Thomas Windom appointed to form fake elector team

October 28, 2021: Merrick Garland tells Sheldon Whitehouse DOJ is following the money of January 6

November 2, 2021: Special Master Barbara Jones releases first tranche of materials from Rudy’s phones, including content through seizure

November 22, 2021: Trump appointee Carl Nichols asks James Pearce whether 18 USC 1512(c)(2) might be applied to someone like Trump (he would go on to issue an outlier opinion rejecting the application)

By December 2021: JP Cooney starts long-invisible investigation into financial side of January 6

December 2021: NARA and Mark Meadows begin process of completing his record of PRA-covered communications

December 10, 2021: Judge Dabney Friedrich (a Trump appointee) upholds application of 18 USC 1512(c)(2) to January 6

January 5, 2022: Merrick Garland reiterates that DOJ is investigating the financial side of January 6

Mid-January 2022: DOJ finally obtains contents of Tarrio’s phone

January 19, 2022: Jones releases remaining content from Rudy’s phones; SCOTUS declines to review DC Circuit rejection of Trump’s Executive Privilege claims with respect to January 6 subpoenas

January 5, 2022: Lisa Monaco confirms DOJ is investigating fake electors plot

February 18, 2022: In civil cases, Judge Amit Mehta rules it plausible that Trump and militias conspired to obstruct vote certification, as well that he aided and abetted assaults

March 2, 2022: Oath Keeper in charge of Stone security on January 6, Joshua James, enters into cooperation agreement

March 28, 2022: Judge David Carter issues crime-fraud ruling covering John Eastman’s communications with and on behalf of Trump

May 2022: DOJ subpoenas all NARA records provided to J6C

May 26, 2022: Subpoenas for fake electors plot including Rudy, John Eastman, Boris Epshteyn, Bernie Kerik, and Jenna Ellis, among others; warrants for email accounts of Jeffrey Clark, John Eastman, Ken Klukowski, and one non-lawyer

June 6, 2022: DOJ charges Proud Boy leaders with seditious conspiracy

June 21, 2022: Second set of fake electors subpoenas, adding Mike Roman and others, warrants for NV GOP officials and GA official

June 22, 2022: DOJ searches Jeffrey Clark’s home and seizes his phone

June 28, 2022: DOJ seizes John Eastman’s phone

June 23, 2022: DOJ completes exploitation (but not scoping) of Shroyer’s phone

June 24, 2022: Ali Alexander grand jury appearance

June 27, 2022: Then Chief Judge Beryl Howell permits prosecutors to obtain emails between Scott Perry and Clark and Eastman

July 22, 2022: Marc Short appears before grand jury

August 9, 2022: Scott Perry’s phone seized

August 2022: Mark Meadows provides previously withheld PRA covered materials to NARA

Early September, 2022: Pre-election legal process includes seizure of Boris Epshteyn and Mike Roman’s phones, subpoenas to key aides including Dan Scavino, Bernie Kerik, Stephen Miller, Mark Meadows, subpoenas pertaining to Trump’s PAC spending,

October 13, 2022: Marc Short and Greg Jacob make second, privilege-waived grand jury appearance

November 18, 2022: Merrick Garland appoints Jack Smith

December 2, 2022: Pats Cipollone and Philbin make second, privilege-waived grand jury appearance

December 2022: Rudy Giuliani subpoena asks for information on his payment

February 9, 2023: Mike Pence subpoenaed

February 23, 2023: DC Circuit hears Scott Perry’s challenge to order providing access to his phone content

March 9, 2023: Judge Kollar-Kotelly orders Peter Navarro to turn over PRA-covered contents from Proton Mail account

March 28, 2023: Chief Judge Jeb Boasberg rules Mike Pence must testify (though protects some areas on Speech and Debate grounds)

April 4, 2023: DC Circuit declines to stay Beryl Howell ruling ordering testimony from Mark Meadows and others

Share this entry

The Espionage Act Evidence WaPo Spins as Obstruction Evidence

The WaPo, with Devlin Barrett as lead byline and Mar-a-Lago Trump-whisperer Josh Dawsey next, has a report describing either new evidence or more evidence of obstruction in the stolen documents case.

Some of it, such as that investigators “now suspect that boxes including classified material were moved from Mar-a-Lago storage area after the subpoena was served,” is not new — not to investigators and not to the public. The version of the search affidavit released on September 14 showed that on June 24 investigators subpoenaed the surveillance footage for the storage room and at least one other, still-redacted location, going back to January 10, 2022, long before subpoena for documents with classification marks was served on May 11. So unless Trump withheld surveillance footage, then DOJ has known since early July 2022 on what specific dates boxes were moved. And a redacted part of the affidavit explains the probable cause the FBI had in August that there might be classified documents in Trump’s residential suite.

In other words, much of what WaPo describes is that DOJ has obtained substantial evidence since August to prove the probable cause suspicions already laid out in their August warrant affidavit. You don’t search the former President’s beach resort without awfully good probable cause, and they were able to show substantial reason to believe that Trump had boxes moved to his residence after he received the May 11 subpoena, where he sorted out some he wanted to keep, eight months ago.

They’ve just gotten a whole lot more proof that they were right, since.

Other parts of the story do describe previously unknown (to us, at least) details, and those may be significantly more important for Trump’s fate. The most intriguing, to me, is that witnesses are being asked about Trump’s obsession with Mark Milley.

Investigators have also asked witnesses if Trump showed a particular interest in material relating to Gen. Mark A. Milley, the chairman of the Joint Chiefs of Staff, people familiar with those interviews said. Milley was appointed by Trump but drew scorn and criticism from Trump and his supporters after a series of revelations in books about Milley’s efforts to rein in Trump toward the end of his term. In 2021, Trump repeatedly complained publicly about Milley, calling him an “idiot.”

The people did not say whether investigators specified what material related to Milley they were focused on. The Post could not determine what has led prosecutors to press some witnesses on those specific points or how relevant they may be to the overall picture that Smith’s team is trying to build of Trump’s actions and intent.

Remember that reports on investigations, especially ones that include Mar-a-Lago court reporters, often amount to witnesses attempting to share questions they’ve been asked with other witnesses or lawyers. Trump’s team has no idea what kinds of classified items were seized. This detail suggests that among the classified documents seized are a document or documents pertaining to Milley.

According to Bobs Woodward and Costa in Peril, Milley called China twice in the last months of the Trump administration to reassure his counterpart that the US was not going to attack China without some build-up first.

On Friday, October 30, four days before the election, Chairman Milley examined the latest sensitive intelligence. What he read was alarming: The Chinese believed the United States was going to attack them.

Milley knew it was untrue. But the Chinese were on high alert, and whenever a superpower is on high alert, the risk of war escalates. Asian media reports were filled with rumors and talk of tensions between the two countries over the Freedom of Navigation exercises in the South China Sea, where the U.S. Navy routinely sails ships in areas to challenge maritime claims by the Chinese and promote freedom of the seas.

There were suggestions that Trump might want to manufacture a “Wag the Dog” war before the election so he could rally the voters and beat Biden.

[snip]

This was such a moment. While he often put a hold on or stopped various tactical and routine U.S. military exercises that could look provocative to the other side or be misinterpreted, this was not a time for just a hold. He arranged a call with General Li.

Trump was attacking China on the campaign trail at every turn, blaming them for the coronavirus. “I beat this crazy, horrible China virus,” he told Fox News on October 11. Milley knew the Chinese might not know where the politics ended and possible action began.

To give the call with Li a more routine flavor, Milley first raised mundane issues like the staff-to-staff communications and methods for making sure they could always rapidly reach each other.

Finally, getting to the point, Milley said, “General Li, I want to assure you that the American government is stable and everything is going to be okay. We are not going to attack or conduct any kinetic operations against you.

“General Li, you and I have known each other for now five years. If we’re going to attack, I’m going to call you ahead of time. It’s not going to be a surprise. It’s not going to be a bolt out of the blue.

The two Bobs also described how, in the days after January 6, Milley reviewed nuclear launch procedures with senior officers of the National Mission Command Center to make sure he would be in the loop if Trump ordered the use of nukes.

Without providing a reason, Milley said he wanted to go over the procedures and process for launching nuclear weapons.

Only the president could give the order, he said. But then he made clear that he, the chairman of the JCS, must be directly involved. Under current procedure, there was supposed to be a voice conference call on a secure network that would include the secretary of defense, the JCS chairman and lawyers.

“If you get calls,” Milley said, “no matter who they’re from, there’s a process here, there’s a procedure. No matter what you’re told, you do the procedure. You do the process. And I’m part of that procedure. You’ve got to make sure that the right people are on the net.”

If there was any doubt what he was emphasizing, he added, “You just make sure that I’m on this net. “Don’t forget. Just don’t forget.”

He said that his statements applied to any order for military action, not just the use of nuclear weapons. He had to be in the loop.

Since these details about Milley came out, Trump and his frothers have claimed Milley committed treason, in concert with Nancy Pelosi (who had expressed concerns to Milley about the safety of America’s nuclear arsenal).

The attack on Milley is the same kind of manufactured grievance — often cultivated by investigation witness Kash Patel (who was DOD Chief of Staff during the transition) — as the Russian investigation. That other inflated grievance led Trump to compile a dumbass binder of sensitive documents that didn’t substantiate his grievances. If Trump did the same with Milley, either before or after he left office, those documents might include highly sensitive documents, including SIGINT reports about China’s response to Milley’s contacts.

If DOJ were ever to charge Trump for refusing to give back classified documents under 18 USC 793(e), DOJ would select a subset of the documents to charge, probably from among those seized in August. They would pick those that, if declassified for trial, would not do new damage to national security, documents that would allow prosecutors to tell a compelling story at trial. And given WaPo’s report, there’s good reason to think there’s a story they think they could tell about documents that may be part of Trump’s grievance campaign against Milley.

WaPo also described that witnesses are being asked whether Trump shared documents, including a map, with donors.

As investigators piece together what happened in May and June of last year, they have been asking witnesses if Trump showed classified documents, including maps, to political donors, people familiar with those conversations said.

According to the story, communications from Trump’s former Executive Assistant, Molly Michael, have been key for investigators.

[A]uthorities have another category of evidence that they consider particularly helpful as they reconstruct events from last spring: emails and texts of Molly Michael, an assistant to the former president who followed him from the White House to Florida before she eventually left that job last year. Michael’s written communications have provided investigators with a detailed understanding of the day-to-day activity at Mar-a-Lago at critical moments, these people said.

Michael is likely the person in whose desk drawer at least two of the classified documents seized in August were found: the two “compiled” with messages from a pollster, a faith leader, and a book author, the kind of document you would show to donors. That document, which combines two classified documents obtained before Trump left the White House with messages from after he left, is the kind of smoking gun that shows Trump didn’t just hoard documents because of ego (as Barrett reported even after the existence of this document was made public), but because he was putting classified documents to his own personal use. We learned back in November that there was evidence that Trump had used two classified documents in what sounds like a campaign document. Perhaps one of those classified documents was a map (of Israel? of Ukraine?).

Whatever it is, this is the kind of story prosecutors might like to tell at stolen classified document trials, not just because it would show Trump putting the nation’s secrets to his own personal gain and sharing classified documents with people who never had clearance, but because it would be proof that people on Trump’s team knew of and accessed documents after they lost their need to access such documents. This document would go a long way to proving that Trump didn’t just hoard classified documents out of negligence (which is currently the explanation why both Joe Biden and Mike Pence did), but because he wanted to make use of what he took.

Molly Michael is also the person who ordered a more junior aide to make a digital copy of Trump’s schedules from when he was President, an order that led to documents with classification markings being loaded to a laptop and likely to the cloud. That’s another example of the kind of exploitation of classified documents that would make a good story at trial.

It’s also the kind of story that could expose Michael herself to Espionage Act charges, such that she might work hard to minimize her own exposure. And yes, because she was Trump’s Executive Assistant, both at the White House and after he moved back to Mar-a-Lago, she likely can explain a lot about how Trump used documents he took from the White House and brought to Mar-a-Lago, including documents used as part of his political campaigning afterwards.

Without conceding it was incorrect, WaPo notes that in November, after it was already public that Trump had self-interested reason to refuse to return documents, it reported it was all just ego (it now attributes that conclusion entirely to what Trump told his aides, not — as claimed in the first line of last fall’s story — what “Federal agents and prosecutors have come to believe”).

Such alleged conduct could demonstrate Trump’s habits when it came to classified documents, and what may have motivated him to want to keep the papers. The Post has previously reported that Trump told aides he did not want to return documents and other items from his presidency — which by law are supposed to remain in government custody — because he believed they belonged to him.

Even in a story describing prosecutors collecting evidence about at least two stories about classified records that they might tell at a trial, the WaPo remarkably suggests to readers that obstruction is the primary crime being investigated here.

The application for court approval for that search said agents were pursuing evidence of violations of statutes including 18 USC 1519, which makes it a crime to alter, destroy, mutilate or conceal a document or tangible object “with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency.”

A key element in most obstruction cases is intent, because to bring such a charge, prosecutors have to be able to show that whatever actions were taken were done to try to hinder or block an investigation. In the Trump case, prosecutors and federal agents are trying to gather any evidence pointing to the motivation for Trump’s actions.

[snip]

Investigators have also amassed evidence indicating that Trump told others to mislead government officials in early 2022, before the subpoena, when the National Archives and Records Administration was working with the Justice Department to try to recover a wide range of papers, many of them not classified, from Trump’s time as president, the people familiar with the investigation said. While such alleged conduct may not constitute a crime, it could serve as evidence of the former president’s intent.

By treating this as only an obstruction investigation, WaPo incorrectly claims that lying to NARA (as opposed to the FBI) could not be part of a crime.

Here’s my attempt to lay out the elements of offense of both crimes — what prosecutors would have to prove at trial (I wrote more about the elements of an 18 USC 793e charge here and here).

To prove obstruction, DOJ would focus on the things of which — WaPo describes — Jack Smith’s team has developed substantial proof. Most conservatively, they would pertain to a grand jury investigation, because that application would be uncontroversial. After DOJ sent Trump a grand jury subpoena (which would be presented at trial as proof that Trump had notice of the grand jury investigation, his knowledge of which Evan Corcoran’s recent testimony would further corroborate), Trump took steps to hide documents and thereby prevent full compliance with that subpoena, and so thwarted a grand jury investigation. That’s your obstruction charge.

DOJ could charge a second act of obstruction tied to NARA’s effort to recover documents as part of its proper administration of the Presidential Records Act. But such an application would be guaranteed to be appealed. So the safer route would be to charge behavior that post-dates Trump’s knowledge of the grand jury investigation (and indeed, WaPo describes a close focus on events that took place starting last May).

But Trump’s longer effort to deceive the government in order to hoard documents is proof of 18 USC 793(e). To prove that, DOJ would need to prove that the government, whether NARA or FBI, told Trump he was not authorized to have documents covered by the Presidential Records Act, a subset of which would include documents with classification marks. They would need to show that Trump had been told about why he needed to protect classified records, which Trump’s former White House counsels and Staff Secretary have described (and documented) doing. For good measure they would show that Jay Bratt affirmatively told Trump that he had been (and, the August search would prove, was still) storing classified documents in places not authorized for such storage.

To prove 18 USC 793(e) at trial, you would need to describe specific documents Trump refused to give back and explain to a jury why they fit the definition of National Defense Information, material that remained closely held that, if released, could do damage to the US. That may be why they’re asking questions about Trump’s obsession with Milley or sharing maps with donors: because it’s part of the story that prosecutors would tell at trial, if they were to charge 18 USC 793.

All of which is to say that WaPo not only reported that DOJ has collected more evidence to prove what DOJ already suspected when they did the search on August 8, but they’ve been collecting information that would go beyond that, to a hypothetical Espionage Act charge.

Charging a former President with violating the Espionage Act is still an awfully big lift, and in the same way that charging obstruction for impeding NARA’s proper administration of the Presidential Records Act would invite an appeal, charging 18 USC 793(e) in DC would invite a challenge on venue (and charging it in Florida would risk spending the next three years fighting Aileen Cannon). But in addition to developing more evidence to prove the suspicions that they already substantiated in August, WaPo describes Jack Smith’s team asking the kinds of questions — about specific documents that might be charged as individual violations of the Espionage Act — that you’d ask before charging it.

Asking whether Trump (or Molly Michael or anyone else from Trump’s PAC) showed donors a classified map in a package also showing polling and a faith leader’s support for Trump’s policy in an attempt to raise money doesn’t get you evidence of obstruction. If the map is classified, though, it gets you proof that Trump not only knew he had classified documents, but had turned to profiting off of them.

That’s not a guarantee they’re going to charge 18 USC 793e. It’s a pretty good sign they’re collecting evidence that might support that charge.

Update: CNN has a much more measured story, describing how Jack Smith’s team is locking in the voluntary testimony they got last summer.

The new details come amid signs the Justice Department is taking steps typical of near the end of an investigation.

The recent investigative activity before a federal grand jury in Washington, DC, also includes subpoenaing witnesses in March and April who had previously spoken to investigators, the sources said. While the FBI interviewed many aides and workers at Mar-a-Lago nearly a year ago voluntarily, grand jury appearances are transcribed and under-oath – an indication the prosecutors are locking in witness testimony.

[snip]

The grand jury activity – expected to continue to occur at a frequent clip in the coming weeks – builds upon several known reactions Trump and others around him had to the DOJ’s attempt to reclaim classified records last year, and which prompted the FBI to obtain a judge’s approval to search Mar-a-Lago in August for classified records.

Some of the evidence the DOJ has used to persuade a judge to allow that search is still under seal.

It also notes that Smith is still pursuing how a box including documents with classification marks came to be brought back to Mar-a-Lago after the search.

Since then, the Justice Department has pushed for answers around how a box with classified records ended up in Trump’s office after the FBI search took place.

Share this entry