Judge Crotty Should Let Joshua Schulte Test His Theory of Defense Forensically

At a hearing on July 25, accused Vault 7 leaker Joshua Schulte’s lawyer, Sabrina Shroff, argued that it’s possible if the government provides some forensic evidence that the CIA maintains is too classified to share, this case might avoid trial, either by identifying alternate culprits or leading her to advise her client to plead.

Mr. Kamaraju says that I would be forced anyway to then make a Section 5 motion to show relevance, etc. Well, maybe not. Maybe if I got the forensics, I would be able to say, hey, I think the government is completely wrong, Mr. Schulte is completely innocent, and you should go back and relook at your charging decisions because of X, Y, and Z in the forensics.

On the flip side, I could look at the forensics and say to my client, you know, maybe this isn’t the strongest case. Maybe we shouldn’t be going to trial. Not all discovery is asked for or relevant because it is only going to be used at trial. We asked for discovery because it is proper Rule 16 information that the defendant should have that would tell him about the charges and help him make proper decisions in the most serious or the most benign of cases.

At issue, per an order Judge Paul Crotty issued days before the hearing (but which got released publicly afterwards) is evidence that would exist if a narrative Schulte seeded before he left the CIA were true. In addition to all the email he wrote at CIA (the government is giving him what he wrote, but not the responses), he wants “a complete forensic copy of the Schulte Workstation and DevLAN, so that his expert can conduct a comprehensive forensic analysis.” Ultimately, Crotty did not grant Schulte’s request, noting that he “has been accused of leaking information he obtained from his employment at CIA both before he was arrested and from his cell at MCC after his arrest.” Instead, he directed the defense to “submit[] a more tailored request [that] provides good reason for further forensic discovery in a motion to compel. In this context, it would also be helpful, for example, if Schulte would communicate his thinking of how others are responsible for the theft.”

Yet that didn’t work, at least not immediately. In the aftermath of that order, Schulte’s team said the Wall Counsel hasn’t responded substantively to a previously written request. That seems to be a justifiable complaint about the difficulties of working with Classified Information Protect Act and Wall Counsel (to say nothing of really complex technical issues which none of the lawyers fully understand). It’s like a giant game of telephone and Schulte’s right to a fair trial is at stake.

Which is why the government should take this offer from Shroff more seriously than they appear to have done: giving Schulte’s expert direct access to the full set of data he seeks.

We have offered to limit the access to either counsel or go even further and limit the access to just the expert. We have even offered that the CIA need not give it to us. We would go to the CIA or the expert would go to the CIA to review the forensics.

Even while it could use CIPA to limit what they give Schulte’s team, it would serve the government to give his expert this access.

I say that, first of all, because of who Schulte’s expert is: Columbia University CompSci professor Steve Bellovin. He’s not just some forensics guy with clearance. He’s someone who has served in governmental positions (most notably as PCLOB’s tech expert for a year). That means he has already seen government spying in action, and what he’d see here would be a server that got replaced, probably before April, and some hacking tools and targets there were in no way exceptional.

Just as importantly, Bellovin is well-respected in the activist community, both on technical matters and judgment. If Bellovin were to test Schulte’s alternative explanation for the leak of the Vault 7 files and Schulte subsequently pled (suggesting that Shroff had counseled that he not take his theories to trial), it would suggest that Schulte’s story didn’t hold up to Bellovin’s scrutiny.

If that happened, it would be a key statement about not just what Schulte has claimed, but about what WikiLeaks did, in releasing the files in 2017.

As the government tells it, Schulte got in a fight with a colleague in December 2015, which led him to sour on the CIA as early as February 2016. When the agency didn’t respond in the way he wanted to Schulte’s claim that the colleague had threatened him, he started to retaliate in April 2016 by first copying the backup server holding all the CIA’s hacking tools, then sending it to WikiLeaks. In short, the government’s story is that Schulte simply burned the CIA’s hacking capabilities to the ground because he felt like they wronged him, a fairly breathtaking claim for one of the most damaging leaks to the government in history.

Schulte’s story is harder to suss out for a number of reasons: the defense has avoided putting this in writing, in part in an attempt to protect their theory of defense, some of what Schulte has argued is classified and still sealed, and other parts consist of rants he has published online or in dockets, not coherent arguments. Plus, some of Schulte’s claims are clearly lies, most demonstrably his claim that, “Federal Terrrorists [sic] had no evidence of plaintiff actually using cell phone” before they got a warrant relying on an affidavit that included pictures of him using the phone he had in MCC.

Schulte’s theory, as available, consists of three parts:

  • More people had access to the backup server from which the files were stolen than the government claims
  • The files were relatively easier to steal from an offsite backup server than the onsite one the government alleges Schulte stole them from
  • The likely culprits used security vulnerabilities he (claims to have) identified to CIA managers to steal the files

Evidence he’s making the first argument appears in his lawsuit against the Attorney General, where he claims the government has lied about the number of people who could access the server with the hacking tools.

AG lies about the number of people who had access to the classified information

Given a passage from the government’s response to his motion to suppress, Schulte must be referring to the claim that 200 people had access to the servers themselves, not the claim that 3-5 people had access to the backup server from which FBI claims the files were stolen. Schulte’s sealed filing appears to have argued that a second CIA group had access to the server.

Schulte does not dispute that the CIA Group was responsible for using and maintaining the LAN, that as of March 2016 fewer than 200 employees were assigned to the CIA Group, or that only these employees had access to the LAN. (See id. ,r 8(b)). Rather, Schulte argues that Agent Donaldson failed to note in the Covert Affidavit that a second CIA group (“CIA Group-2”), [redacted], allegedly also had access to the LAN.

For what it’s worth, the government disputes this claim outright. They introduce and conclude an otherwise redacted discussion by twice asserting this claim is false.

Schulte’s assertions about CIA Group-2’s access to the LAN are untrue [seven lines redacted] In short, Schulte is simply wrong.

Schulte’s claim that the files were more easily stolen from an offsite backup server may be more of a throwaway, based on what the government provided in discovery, reflecting what a contractor said almost a year into the investigation. (Remember that the government is not meaning to restate Schulte’s theories here, but instead to refute his claim that the initial affidavit against him included reckless errors.)

Schulte does not challenge that the Classified Information was taken from a back-up file, but instead argues that the back-up files were also stored at an offsite location (the “Offsite Server”), based on a network diagram of the LAN, and that, in one CIA Group contractor’s opinion, the “easiest” way to steal those back-up files was from the Offsite Server. None of this information, however, renders Agent Donaldson’s assessment misleading. Initially, while it is true that the back-up files were also stored in an Offsite Server, Agent Donaldson never suggested that the only place that the back-up files existed was the Back-up Server. Nor did Agent Donaldson opine in the abstract on the easiest method of exfiltrating the Classified Information from the LAN. Rather, he merely stated that it was “likely” that the Classified Information had come from the Back-Up Server, an eminently reasonable conclusion, given that the Back-Up Server contained the back-up files that mirrored the Classified Information, and Schulte–whom the FBI properly identified as a likely perpetrator of the theft–had access to it. Gates, 462 U.S. at 230-31 (courts do not isolate each factor of suspicion but look at the totality of the circumstances). The opinion of the contractor–who did not have access to all of the information and who had no relevant investigatory experience–in no way undermines that assessment, particularly when (i) that opinion is contradicted by [redacted], a LAN system administrator and a witness upon whom Schulte relies in his motion, who stated that “the easiest way to steal the data leaked by WikiLeaks” was for someone with administrative access to the LAN to “simply remov[e] the backup file from the network application” (i.e., the Back-Up Server) (Shroff C. Decl., Ex. I); and (ii) even if the contractor’s opinion was relevant, it was not conveyed to the FBI until February 2018, nearly a year after the date of the Covert Affidavit, see Garrison, 480 U.S. at 85.

Significantly, the government bases its claim that Schulte leaked classified information from jail in part on him sharing a “Network Structure Document” with someone (probably a reporter); given that some of the other information he is alleged to have leaked in violation of classification or protective orders was meant to sustain his claims of innocence, this probably does too. If so, that would suggest he was floating this theory about a year ago.

Finally, in his Presumption of Innocence blog, Schulte maintains that the CIA network was vulnerable in ways that he claims he raised with the CIA before he left.

I reported numerous security vulnerabilities that I discovered within our network and particularly issues with system administration, backup, and protection of some of our prominent tool sets. I was continually met with pushback and retaliatory responses that ultimately forced me to resign. My final acts were to file complaints with the OIG and the House Select Committee on Intelligence to hopefully prevent future retaliatory actions against others.

So while the government claims that Schulte retaliated by leaking the CIA’s hacking tools because the CIA wasn’t treating him with the respect he thought he deserved, Schulte appears to be claiming that possibly members of CIA’s Group-2 or perhaps even outsiders stole the files via vulnerabilities he identified before he left.

While not exactly the same, WikiLeaks made related claims when they released the files, in part as rationale for publishing them.

Compare what we can make out of Schulte’s defense with what WikiLeaks published in its “press release” accompanying the first Vault 7 release. WikiLeaks describes CIA “losing control” of its hacking tools, not someone leaking them.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

While it mentions former US government hackers (which could include Schulte), it also invokes contractors (the press release elsewhere mentions Hal Martin), and contractors were the presumed source for Vault 7 files at the time. While WikiLeaks acknowledges that the files came from “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina [sic]” the description of the archive circulating in unauthorized fashion suggests that WikiLeaks is claiming the files were more broadly accessible.

The “press release” also suggests CIA’s hacking division had 5,000 users, implying all were involved in the production of hacking tools.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware.

While that may or may not be the CIA Group-2 Schulte claims had access to the servers, it certainly suggests a far larger universe of potential sources for the stolen files than the 200 the government claims, much less the around 5 SysAdmins who had privileges to the backup server.

The purported motive for releasing these tools — both that of the source and of Assange — is partly the insecurity of having such tools lying around.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’.

[snip]

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them.

[snip]

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

In other words, WikiLeaks justified posting development notes for a significant portion of CIA’s hacking tools — and ultimately the source code for one — to prevent “teenage hackers” from obtaining such weapons and using them. (By this February, a security researcher had made his own hacking module based off what WikiLeaks had released.) A key part of that claim is the risk that CIA itself had not sufficiently secured its own tools, that they were “circulat[ing] … in an unauthorized manner.” That is, WikiLeaks purports to be the fulfillment of and remedy for precisely the risk Schulte claims — in his Presumption of Innocence blog — he warned the CIA about.

Except the government claims that’s not true.

It is true, as the affidavit in dispute in Schulte’s motion to suppress lays out, that Schulte wrote a “draft resignation letter” purporting to warn about these dangers and, on his last day, sent the CIA’s Inspector General a letter raising the same issues. The government reviews what he did at length in their response to his motion to suppress.

Agent Donaldson discussed the circumstances of Schulte’s resignation from the CIA in November 2016, including a letter and email he wrote complaining about his treatment. (Id. ,i,i 19-20). On October 12, 2016, Schulte sent an email to another CIA Group employee with the subject line “ROUGH DRAFT of Resignation Letter *EYES ONLY*,” which attached a three-page, single-spaced letter (the “Letter”). (Id. ,i 19(a)). In the Letter, Schulte stated that the CIA Group management had unfairly “veiled” CIA leadership from various of Schulte’s “concerns about the network security of the CIA Group’s LAN” and that “[t]hat ends now. From this moment forward you can no longer claim ignorance; you can no longer pretend that you were not involved.” (Id. ~ 19(a)(ii)). The Letter also stated that Schulte was resigning because management had “‘ignored'” issues he had raised about ‘”security concerns,”‘ including that the LAN was ‘”incredibly vulnerable’ to the theft of sensitive data.” (Id. ~ 19(a)(iii)). In particular, Schulte stated that the “inadequate CIA security measures had ‘left [the CIA Group’s LAN] open and easy for anyone to gain access and easily download [from the LAN] and upload [sensitive CIA Group computer code] in its entirety to the [public] internet.”‘ (Id.~ 19(a)(iv)).

[snip]

However, on November 10, 2016, Schulte’s last day at the CIA, Schulte sent an internal email to the CIA’s Office of Inspector General (“OIG”), which Schulte marked “Unclassified,” advising that he had been in contact with the U.S. House of Representatives’ Permanent Select Committee on Intelligence regarding his complaints about the CIA (the “OIG Email”). (Id ~ 19(c)). The OIG Email raised many of the same complaints in the Letter, including “the CIA’s treatment of him and its failure to address the ‘security concerns’ he had repeatedly raised in the past.” (Id ~ 19(c)(i)). Although Schulte had labeled the OIG Email “Unclassified,” the CIA determined that the OIG Email did in fact contain classified information. (Id.~ 19(c)(iii)). Schulte nevertheless printed and removed the email from the CIA when he left that day. (Id ~ 19( c )(ii)).

As the government response notes, the affidavit describes that Schulte never actually sent the resignation letter.

Agent Donaldson noted that Schulte did not appear to send the Letter. (Id. ~ 19(b)).

A later discussion of the resignation letter as part of a summary of the probable cause against Schulte goes still further, claiming that there is no record that Schulte raised security concerns with CIA management (which is presumably one reason he asked for all his emails).

(iv) drafted a purported “resignation email,” in which he claimed essentially that he had warned CIA management about security concerns with the LAN7 that were so significant that the LAN’s contents could be posted online–precisely what happened four months later (see id. ,r 19);

7 There is no record of Schulte reporting any such security concerns to CIA management.

The government makes Schulte’s allegedly false claim to have raised concerns about the security of the CIA tools a key part of its short summary of the probable cause against Schulte, insinuating that Schulte wrote both the resignation letter and the letter to the IG (which he wrote five and six months, respectively, after the government alleges he stole the files) as a way to create a cover story for the leaked documents.

Thus, even if the Covert Affidavit was rewritten to Schulte’s (incorrect) specifications, it would still establish probable cause by showing that Schulte was a CIA employee with a grudge against the CIA and a track record of improperly accessing and taking classified information, who left the CIA claiming that classified information from the LAN would one day be sprayed across the Internet and who worried about the investigation when his “prophecy” came to pass.

Of course, the government — especially intelligence agencies like the NSA and CIA — always dismiss the claims to be whistleblowers of leakers. The CIA claimed Jeffrey Sterling only leaked details of the Merlin operation because he was disgruntled about an EEOC complaint they had denied. NSA denied that Edward Snowden had raised concerns — first at CIA about its security, then at NSA about the boundaries of EO 12333 and Section 702. In the former case, however, the government knows of at least three other people who thought Sterling’s concerns had merit, and the actual details around Merlin’s own activities were a clusterfuck. In the latter, even a really problematic HPSCI report acknowledges that both incidents occurred, and NSA ultimately released enough of the backup to show that the NSA undersold the latter instance (though Snowden’s claims were not as substantive as he claimed).

Thus far, Schulte has presented no such counterevidence (indeed, the docket does not show his team submitted a reply to the government’s response before their August 16 deadline, though a reply could be held up in classification review). [Update: This letter asking to sever the MCC charges from the WikiLeaks charges says they’re still working on their replies.]

There may be a very good reason why Schulte’s defense didn’t go there: because one of the lies the government claims he told to FBI Agents on March 20 and 21, 2017 involves making CIA systems more vulnerable to the theft of data.

On or about March 20 and 21, 2017, Schulte … denied ever making CIA systems vulnerable to the theft of data.

Aside from this mention, this allegation doesn’t otherwise appear in public documents I’m aware of. But the implication is that before Schulte wrote two documents that — the government claims — served to establish a cover story claiming he leaked the documents because CIA’s server was vulnerable to theft, he tampered with the CIA’s server to make it more vulnerable to theft.

There actually is evidence that the server was vulnerable to theft. In Crotty’s opinion, he overruled the government’s effort to withhold some internal reports on the leak under CIPA. He explained,

These documents [redacted] might help Schulte advance a theory that DevLAN’s vulnerabilities could have allowed someone else to have taken the leaked data. They also support the defense’s theory that Schulte’s behavior while an employee of the CIA was consistent with someone who was trying to help the agency address security flaws, rather than someone who was a disgruntled employee.

That’s why it’d be worthwhile for Bellovin to have access to the server directly: to test not just how vulnerable the servers really were (I bet he’d be willing to help improve their security along the way!), but also to test himself whether there’s any evidence that someone besides Schulte exploited those vulnerabilities.

The government’s reliance on CIPA in this case is an attempt to try Schulte for an unbelievably sensitive leak without (as Crotty laid out) giving him opportunity to leak some more.

But the case goes beyond Schulte’s actions, to implicate WikiLeaks’ actions (court filings make it clear that WikiLeak’s claims around this leak were false in another manner, one which I’m not describing at the government’s request). And while details of CIA’s unexceptional hacking program are useful for researchers to have, it would matter if the stated rationale for releasing them was bullshit manufactured after the fact. That’s all the more true if WikiLeaks — which used to boast its perfect record on verification — knew the claim to be false, particularly given how and when it released these files, with an attempt to extort the US government and in the wake of the Russian hacks, at a time CIA would have needed these tools to prevent follow-ups.

Three months after Schulte’s trial (if this does go to trial), the government will be embroiled in attempting to extradite Julian Assange under charges that are rightly being attacked as an assault on the press. The government is never going to reveal all it knows about Assange (including, pertinent to this case, whether there’s any evidence Assange used some of the CIA’s own tools for his own benefit). Bellovin, if he were permitted to review the CIA server, would never be in a position to reveal what he learned; but his role in this case provides a rare opportunity for a trusted outsider to weigh in on a controversial case.

Effectively, a guy who authored CIA’s obfuscation tool and purportedly planned an information war from jail — complete with fake FBI and CIA personas — may have created the vulnerability he claimed to be exposing by leaking the files. If Bellovin were able to test that possibility, it would go a long way to shift an understanding about WikiLeaks recent intentions with the US government.

Maria Butina’s Lawyer Changes His Story about Her Romance with Paul Erickson

There are a number of inconsistencies and sketchy claims (about who he thinks was targeted by the FBI and the timing of his disclosures) in former Overstock CEO Patrick Byrne’s claims (Sara Carter’s story, NYT story, Fox Interview, Seth Hettena Q&A, Chris Cuomo interview) that he had been a “non-standard” informant for the FBI about Maria Butina.

The short version is that she sought him out in July 2015, telling him Aleksandr Torshin had asked her to do so, then started a sexual relationship with him, then later turned her attention to networking with presidential campaigns. All along the way, Byrne claims, he kept the FBI informed and acted on their requests regarding his relationship with Butina. Then, 9 months after she was arrested, in April 2019 and at a period too late to help her sentencing, he reached out to the FBI and first without counsel (in spite of his claim to Fox that a big Republican lawyer told him he’d go to jail for the rest of his life over this) and then with a lawyer told the FBI what had happened. He attributes coming forward to a conversation with Warren Buffet, though Buffet claims not to know what he was involved with.

I may return to the oddities in Byrne’s story.

For now, however, I’d like to examine what her lawyer Robert Driscoll has claimed about Byrne.

In a letter to John Durham, DOJ’s IG, and OPR (shared with Carter), Driscoll  suggested that he should have been provided details of what Byrne shared with the FBI as Brady information.

By email, letter, phone, and in person, the defense repeatedly pressed the government for any Brady material and was not provided any. In particular, we suggested to the government a strong suspicion that counterintelligence or other FBI investigators used confidential informants (“CIs”) in their investigation of Maria, and that information provided by such witnesses to the government might be relevant to guilt or sentencing. Moreover, we suggested that the government had presented Maria with one or more “dangles” — that is, orchestrated opportunities to provide the government  information unwittingly while being observed.

In writing, the government denied the existence of any such Brady material. Orally, during debrief sessions with Maria, I directly told the government that I believed Patrick Byrne, Chief Executive of Overstock.com, who had a sporadic relationship with Maria over a period of years prior to her arrest, was a government informant. My speculation was flatly denied. My associate Alfred Carry made similar assertions in a separate debrief that he covered and was also rebuffed.

Mr. Byrne has now contacted me and has confirmed that he, indeed, had a “non-standard arrangement” with the FBI for many years, and that beginning in 2015 through Maria’s arrest, he communicated and assisted government agents with their investigation of Maria. During this time, he stated he acted at the direction of the government and federal agents by, at their instruction, kindling a manipulative romantic relationship with her. He also told me that some of the details he provided the government regarding Maria in response was exculpatory — that is, he reported to the government that Maria’s behavior with him was inconsistent with her being a foreign agent and more likely an idealist and age-appropriate peace activist.

[snip]

Byrne evidently informed the government of many meetings with political and other figures that Maria had mentioned to him, often in advance of the meetings themselves. The government did not try to intervene or try to stop any meetings, nor did they express any concern. (This undercuts the government’s position at sentencing that Maria’s activities involved collection of information that could be of “substantial intelligence value to the Russian government” or pose a “serious potential to harm U.S. foreign policy interests and national security” as those same activities were observed and permitted for years.)

At some point prior to the 2016 election, when Byrne’s contact with Maria diminished or ceased, the government asked and encouraged him to renew contact with her and he did so, continuing to inform the government of her activities. Byrne states he was informed by government agents that his pursuit and involvement with Maria (and concomitant surveillance of her) was requested and directed from the highest levels of the FBI and intelligence community.

As time passed, Byrne became more and more convinced that Maria was what she said she was–an inquisitive student in favor of better U.S.-Russian relations–and not an agent of the Russian government or someone involved in espionage or illegal activities. He states he conveyed these thoughts and the corroborating facts and observations to the government.

Now, I absolutely don’t rule out the government withholding information that would be helpful to the defense. They do that far too often, and there are good reasons to doubt the prosecutors in this case. But Driscoll’s claim that this might be a Brady violation is premised on two things: first, that the FBI really considered Byrne an informant — which is what they denied when asked directly — and that the FBI considered anything he gave them to be exculpatory.

In fact, the story Byrne told is actually quite damning to Butina. From the very start, according to what he told Sara Carter, Butina was pursuing him, not vice versa. She told him, from the very start, she had been sent by Torshin and explained (credibly, given Putin’s interests) they were interested in Byrne because of his involvement in blockchain technology. And her offer of a trip to Russia with networking there matched her M.O. in approaching the NRA.

Byrne revealed details about his intimate relationship with the Russian gun right’s activist Butina. Byrne was a keynote speaker on July, 8, 2015 at Freedom Fest, a yearly Libertarian gathering that hosts top speakers in Las Vegas. Shortly after his address, Butina approached him. She told him she was the leader of a gun right’s organization in Russia. He congratulated her, spoke to her shortly, but then “brushed her off.”

The young redheaded Russian graduate student then approached him again over the course of the conference and explained that she worked for the Vice Chairman of the Central Bank of Russia and sent by them to make contact with Byrne.

She also said “Did you know you’re a famous man in Russia in certain circles? We watch your Youtube videos, we know about your relationship with Milton Friedman.”

She said she was appointed to lead Russia’s gun right’s group by Lieutenant-General Mikhail Kalashnikov, who was a Russian general, most notably known for his AK-47 machine gun design. Byrne says he considered the designation by Kalashnikov a significant honor, a signal of a kind he knows some mythical figures make on their way out. Byrne then had an “extensive conversation about Russian history and political situation.  Butina told him that the purpose of her visit was primarily to extend an invitation to Byrne to come to Russia to speak at the Central Bank. After that, there would be a trip to a major resort to meet with various intellectuals and dignitaries from the Russian power structure. Butina told Byrne the event would offer him the opportunity to meet senior Russian officials and oligarchs. She wanted to see Byrne again to start preparing him for such a trip.

Even more significantly, as Byrne tells it, after Butina first suggested she was using a romantic relationship with him as cover to explain their communications, she’s the one who first pushed sex.

He rented a hotel room with two bedrooms because he was under the impression that the romantic texts were simply her way to cover for communicating with him. However, she arrived at the hotel beforehand, occupied the room before Byrne’s arrival, and when he arrived,  she made clear that her flirtatious texts were not simply a disguise.

And Byrne claims he grew quite alarmed by Butina’s interest in networking with political campaigns.

“Eventually, her conversations became less about philosophy and it became clear that she was doing things that made me quite uncomfortable,” stated Byrne. “She was basically schmoozing around with the political class and eventually she said to me at one point I want to meet anyone in the Hillary campaign, the Cruz, the Rubio campaigns.”

Butina had also told Byrne, that Torshin, the Russian politician who she had been assisting while she was in the U.S., had sent her to the United States to meet other libertarians and build relations with political figures.

Byrne also claims he told Butina she needed to disclose her activities to the government, something that directly contradicts what Butina claimed repeatedly during the sentencing process, that, “If I had known to register as a foreign agent, I would have done so without delay.”

Byrne said he warned Butina: “Maria the United States is not like Russia, and knowing powerful people ‘like oligarchs and politicians’ won’t help if the FBI believes a line has been crossed.” Byrne believed Butina was naive but not blameless. He said during the interview, “If you’re reporting to any Russian official  as you’re doing this stuff and not disclosing yourself here, there are these men in black here and they don’t really give a shit who you know here -that’s not going to save you.”

It is true that Butina repeatedly told him she wasn’t a spy and Byrne ultimately became convinced that was true. But even in his description of that, he told Carter that he believed Butina was being used by US and Russian intelligence, not that he believed she had no tie to intelligence.

Although Byrne was concerned about Butina’s possible motives, he eventually became convinced that she was an intellectual being used by both the Russians and American intelligence apparatus. She was stuck between two highly contentious and secretive governments, he claimed. He relayed those concerns to the FBI, he said.

If that’s what he told the FBI, it does nothing to make her any less of an unregistered agent of Russia.

Very significantly, though, Butina’s involvement with Byrne during the period she was supposedly in a meaningful romantic relationship with Paul Erickson refutes the claims her attorneys have made about that relationship.

As I have laid out, from the very start, Driscoll portrayed the government’s claim that she caught Paul Erickson in a honey pot as sexism, with mixed success.

Then there’s the specific government insinuation that Butina was engaged in a honey pot operation. It substantiates this two ways — first, by suggesting she’s not that into Erickson.

Further, in papers seized by the FBI, Butina complained about living with U.S. Person 1 and expressed disdain for continuing to cohabitate with U.S. Person 1.

It also alleges she offered sex for favors.

For example, on at least one occasion, Butina offered an individual other than U.S. Person 1 sex in exchange for a position within a special interest organization.

Driscoll pretty convincingly argues the government misinterpreted this last bit.

The only evidence the government relied on for its explosive claim was an excerpt from an innocuous three-year-old text exchange (attached as Exhibit 3) sent in Russia between Ms. Butina and DK, her longtime friend, assistant, and public relations man for The Right to Bear Arms gun rights group that she founded.

DK, who often drove Ms. Butina’s car and thus was listed on the insurance, took the car for its annual government-required inspection and insurance renewal, and upon completion, texted (according to government translators), “I don’t know what you owe me for this insurance they put me through the wringer.” Ms. Butina jokingly replied, “Sex. Thank you so much. I have nothing else at all. Not a nickel to my name.” DK responded: “Ugh . . . ( ”—that is, with a sad face emoticon.

Aside from the fact that Maria is friends with DK’s wife and child and treats DK like a brother, the reference to sex is clearly a joke.

We still haven’t seen the government response to this, but what Driscoll presents does support his claim this is a “sexist smear.”

But Driscoll’s dismissal of the other claim — that Butina disdained living with Erickson — is far less convincing.

[I]n response to her girlfriend’s own complaints about her boyfriend’s failure to call in three weeks (accompanied by an angry face emoji) that Maria responds that her own boyfriend (Mr. Erickson) has been “bugging the sh*t out of me with his mom” and that she has “a feeling that I am residing in a nursing home.” “Send a link to the dating app[,]”

Driscoll spins this as an attack on Erickson’s now late mother, but doesn’t address the central allegation that she likened living with her much older boyfriend to living in a nursing home. Nor that she started the exchange by saying “let’s go have some fun with guys!!!” because she was “Bored. So there.” Furthermore, Butina seemed concerned that her use of Tinder would become public because she logged in using Facebook.

Though he has been sharing schmaltzy videos of Butina and Erickson with ABC, Driscoll also doesn’t address the fact that as early as May, Butina was proffering to flip on Erickson in fraud charges in South Dakota, which would have the effect of putting her in a position to negotiate permanent visa status independent of him, while limiting her own legal exposure.

Even in her sentencing memo — long after he knew of her relationship with Byrne, according to his public statements — Driscoll claimed she moved to the US in 2016 so she could be in the same hemisphere as Erickson.

On a personal level, Erickson and Maria kept in touch after the 2013 meeting and she began a romantic relationship with him in the following year.

[snip]

She also wished to be in the same hemisphere as her romantic interest. So Maria and Erickson explored both educational and business opportunities for her. This is the genesis of the Description of the Diplomacy Project proposal referenced in the Statement of Offense.

Among the events Butina planned to attend as part of that Diplomacy Project was the July 8-11 Freedom Fest convention where she first sought out Byrne. And before she moved to the US, she was already involved sexually with Byrne, according to his claims.

The portrayal of Butina’s relationship with Erickson as true romance has long been suspect — not only did she offer to flip on him in May 2018 (in exchange for which she might have gotten a permanent visa), but she did flip on him months before her plea deal. But if Byrne’s claims are true, it suggests she was using sexual relationships to help network in the US, and it further suggests Driscoll knew that when making claims about the import of her relationship with Erickson. If the FBI did obtain information from Byrne they chose (justifiably or not) not to release to defense attorneys, it might explain why they believed she was operating as a honey pot: because that’s what Byrne told them happened to him.

In his public comments to the NYT, Driscoll explained that Butina didn’t want to settle down (the implication is, with Byrne; he has claimed she wanted to settle down with Erickson).

“I think she admired him, but I don’t think she was looking to settle down,” Mr. Driscoll said.

In his comments to Carter, he suggests that he suspects there were other sources for the FBI.

Driscoll said there was suspicion that the FBI did not disclose all the information it had on Butina and he stated that he believed “Patrick is not the only one” who was giving information to the FBI.

“We’ve thought of several possibilities and some we are more confidant than others. I’m firmly convinced,” said Driscoll, who shared numerous letters and emails with this reporter that he exchanged with the FBI.

A seemingly disturbed homeless man, Hamdy Alex Abouhussein, who has asked to submit an amicus brief in Butina’s appeal (the public defender whom Judge Tanya Chutkan appointed to make sure that Driscoll had no conflicts when she pled guilty, AJ Kramer, is representing her in her appeal) claimed (incorrectly) that he’s the reason Butina got thrown into solitary and that FBI used Butina as a dangle to entrap him. So he also claims to have tried to provide exculpatory information.

Plainly, one cannot tell exactly when, before accepting Butina’s guilty plea, did Judge Chutkan learn of the jail’s blocking of Abouhussein’s letters to Butina, including his pictures, or the FBI dangle operation. Moreover, as the plea hearing transcript shows, Butina responded to the Judge’s sequence of questions about effectiveness of each of her then-three attorneys3, including the just-appointed for the plea negotiations role, A.J. Kramer4, who was yet to meet Abouhussein (they met outside the courtroom after the plea hearing, see pre-plea email from Abouhussein to Kramer, exh 2). Upon information and belief, Butina approved her attorneys’ performance only because they, under DOJ’s duress and a gag order, never informed her of the FBI dangle operation and surrendered to the prosecutors’ intimidation by keeping the dangle operation out of the public eye and trial record5. Admittedly, choice was either a rock or a hard place.

However, Judge Chutkan did sentence Butina to 18 months in prison after the notice of Abouhussein’s Amicus Brief Docket No. 77 was entered, which means Judge Chutkan was t/me/y presented with the “FBI dangle” and “letters blocked by Butina’s jail” Brady issues. Per Rule 51, this Honorable Court now has a lawful duty to investigate the issue of the FBI’s dangle operation that intentionally built up an oligarch-connected naive student as a false spy before casting her sex lure to hook the homeless Abouhussein, who was attending a public event at the Heritage Foundation to eat the free lunch as usual. Had he swallowed the lure6, any Grand Jury would indict this HamdySandwitch of a spy couple with ties to Putin, which explains Prosecutors’ honeypot sex allegations tainting Butina upon her arrest. Only in America!

So, yeah, there are other allegations, but Driscoll is right to suggest Byrne is more credible than, at least, this one.

But if Byrne’s story is credible, then it’s not clear that it helps Butina, at all, because it undermines the story her defense has been telling for a year.

Given her repeated assertions she’s happy with Driscoll’s representation, it’s unclear the basis for Butina’s appeal. I think the government operated in bad faith when they asked for 18 months, but that’s not a basis for an appeal. I think Driscoll made a mistake both by not arguing more forcibly that given the most relevant comparable sentence on 18 USC 951 charges, that of Carter Page recruiter Evgeny Buryakov’s 30 month sentence, a 9 month sentence would have been proportionate for someone like Butina who was neither recruiting nor operating covertly.

I also think that if Driscoll really cared about the declaration from former Assistant Director of FBI’s Counterintelligence Division, Robert Anderson Jr at her sentencing, he should have questioned what documents Anderson relied upon to judge that Butina was a spotter for Russian intelligence instead of deciding that, “I’m happy to leave the record as it is.” But if Driscoll had reason to believe the FBI had really damning information from Byrne that undercut his claims about Butina’s romance with Erickson, it might explain why he didn’t ask those questions.

The other day, Butina’s lawyer for her appeal AJ Kramer asked for an extension on his deadline to submit Butina’s appeal, which could mean he wants to add claims of Brady violations in her appeal (though he says he needs more time to consult the public record, and Driscoll and his associate Alfred Carry, by Driscoll’s own admission, never put their request for information about Byrne in writing).

But given Byrne’s public claims, it’s not actually clear that will help her case, as it mostly provides an explanation for why the FBI was so insistent on some of the allegations it did make.

Chuck Grassley and Ron Johnson Waste Taxpayer Dollars Looking for Foreign Hackers the One Place They Aren’t

Last Wednesday, majority staffers for the Senate Finance and Homeland Security Committees wrote Chuck Grassley and Ron Johnson a memo that purports to update those Committee chairs of the status of an investigation into —  well, the purpose of the investigation is actually not clear, but ultimately it’s an investigation designed to keep hopes of finding some smoking gun in Hillary’s servers that several other investigations haven’t found, an investigation that Grassley has been pursuing for four years.

As the memo describes, the most recent steps in this “investigation” involve some interviews that were completed and all related backup documentation obtained in April, four months ago.

We pursued this issue by requesting interviews with the two ICIG officials. On December 4, 2018, your staff, along with staff from Senators Feinstein and McCaskill, interviewed ICIG employees Mr. Rucker and Ms. McMillian. On December 20, 2018, you transmitted a copy of an interview summary of the Majority’s questions and the witness’s answers to the ICIG for a classification review. On January 30, 2019, the ICIG provided classified and unclassified versions of the interview summary, and the Office of Senate Security redacted the classified information. On February 28, 2019, the ICIG provided documentary evidence including copies of emails and notes from meetings. On April 9, 2019, the DOJ IG and ICIG provided a summary of their findings related to these Chinese hacking allegations.

The staffers use these investigative steps, completed four months ago, to make two insinuations: that State tried to classify Hillary’s emails as deliberative rather than classified (something long known, and easily explained by the known debate over retroactive classification for the emails).

In addition, the staffers report that one but not a second Intelligence Committee Inspector General employee remarked that FBI Agents seemed non-plussed by their concerns that China had hacked Hillary. The description of that claim in the topline of the memo drops Peter Strzok’s name as its hook.

[A]ccording to one ICIG official, some members of the FBI investigative team seemed indifferent to evidence of a possible intrusion by a foreign adversary into Secretary Clinton’s non-government server. The interview summary makes clear exactly what information Mr. Rucker and Ms. McMillian knew regarding the alleged hack of the Clinton server, as well as the information they shared with the FBI team, including Peter Strzok, the Deputy Assistant Director of the FBI’s Counterintelligence Division in charge of the Clinton investigation.

Wow, that Peter Strzok is some devious asshole, showing no concern about Hillary being hacked by a foreign government, huh? Presumably, that’s the headline the taxpayer funded staffers wanted: BREAKING Peter Strzok doesn’t care about foreign hacking or State trying to protect Hillary.

To the credit of press outlets that did cover this report, they did get what the more relevant conclusion to these documents is: After spending a year double-checking the work of the FBI, these Senate staffers found that the FBI was right when it said it had found no evidence Hillary’s server had been hacked.

What the backup actually shows is that an ICIG Inspector, Phil Rucker, found an “anomaly” while reviewing Hillary Clinton’s emails, an unknown Gmail for a company called Carter Heavy Industries in her email headers, which he thought could have been used to steal her emails as sent. At a meeting largely designed to explain the ICIG efforts to review Hillary’s email for classified information to Strzok, who had just been promoted to the DAD position at FBI a week earlier, Rucker shared what he found with Strzok and the FBI agent he had already been liaising with, Dean Chappell. The FBI already knew of it, and that same day would confirm the explanation: that tech contractor Paul Combetta had used a dummy email to copy over Hillary’s emails as he migrated Hillary’s email onto a Platte River server.

When interviewed about all this three years later, after Peter Strzok had become the villain in Donald Trump’s Deep State coup conspiracy, Rucker accused Strzok of being “aloof and dismissive” of his concerns.

Mr. Rucker said that Mr. Chappell was normal and professional as he had come to know him to be, but that he didn’t know anything about Mr. Strzok prior to the meeting. Mr. Rucker said that Mr. Strzok seemed to be “aloof and dismissive.” He said it was as if Mr. Strzok felt dismissive of the relationship between the FBI and ICIG and he was not very warm. He said that Mr. Strzok didn’t ask many questions including any about SAP related issues. He said the meeting lasted approximately 30 to 60 minutes and that only people from the FBI attended; there were no employees from DOJ. Mr. Rucker said that he knows that an FBI attorney was present, but he cannot remember the person’s name or even whether it was a man or a woman.

[snip]

Mr. Rucker said that he discussed SAP with the FBI. He said he discussed another of Secretary Clinton’s emails that they were never able to quite figure out. He said he verbally presented this information to Mr. Strzok which lasted only for a minute or so. He said that he doesn’t think he mentioned Carter Heavy Industries by name, but only the appearance of a Gmail address that seemed odd. He said that Mr. Strzok seemed “nonplused” by the info, and that he didn’t ask any follow-up questions. He said that Mr. Chappell seemed familiar with the discovery and he felt like Mr. Chappell was walling Mr. Rucker off intentionally as an investigator would, to protect the investigation.

That last detail — that Chappell seemed familiar with the discovery — is key. In fact, the emails sent in advance of the February 18, 2016 meeting reveal that several weeks earlier, Rucker had already shared this anomaly with Chappell, and Chappell had told him then that he already knew about it.

Along with making accusations about Strzok, Rucker changed his story about how strongly he believed that he had found something significant. The day before Chappell told him the FBI was already aware of the email, Rucker had emailed him that the anomaly was probably nothing.

Additionally, he wanted me to run something that I found in my research of the email metadata past you or someone on the team. It’s probably nothing, but we would rather be safe than sorry.

But when interviewed last year by Senate staffers seeking more evidence against Strzok, Rucker claimed that until a news report explained the anomaly in 2018, he had 90% confidence he had found evidence that China had hacked Hillary’s home server, and still had 80% confidence after learning the FBI had explained it.

Rucker: Mr. Rucker said that he didn’t find any evidence in the remainder of the email review they conducted, but that based on the subpoena issued by the FBI in June 2016 which he learned about this year through a news article, it decreased his confidence level from 90% to 80%.

Meanwhile, the one other ICIG employee interviewed last year, Jeanette McMillan, described what Rucker claimed was dismissiveness as adopting a poker face.

[T]hey provided the information to Mr. Strzok who found it strange. Even before their meeting with Mr. Strzok, Dean Chappell of the FBI informed them that he was aware of the Carter Heavy Industries email address. She said that she doesn’t know whether Mr. Chappell knew before they dropped off the original packet in January 2016, or if he learned of it afterward. News of this email address being found on Secretary Clinton’s emails wasn’t shocking to them, she said, but they took It seriously.

[snip]

[T]he FBI employees in attendance were “poker faced.”

In other words, what the backup released last week actually shows is a tremendous waste of time trying to second guess what the FBI learned with the backing of subpoenas and other investigative tools. To cover over this waste of time, Grassley and Johnson instead pitch this as a shift in their investigation, this time to examine claims that Strzok wasn’t concerned about State arguing that emails weren’t classified (and probably an attempt to examine the document, believed to be a fake, suggesting Loretta Lynch would take care of the Hillary Clinton investigation).

Staff from the Intelligence Community Inspector General’s office (ICIG) witnessed efforts by senior Obama State Department officials to downplay the volume of classified emails that transited former Secretary Hillary Clinton’s unauthorized server, according to a summary of a bipartisan interview with Senate investigators.

In fact, in the “summary” released, McMillan told Senate investigators that, “If anything, there were problems at State with upgrading of information,” exactly the opposite of what Grassley and Johnson claim in their press release.

And that word — summary — should raise a lot of questions. It’s not a transcript; in most cases, the report is a paraphrase of what the witnesses said. Moreover, it’s only a “summary” of what Majority staffers asked. Minority staff questions were not included at all, as best demonstrated by this nearly hour-long gap in the “summary.”

Because of the way Grassley brought this “investigation” with him when he assumed the Chairmanship of the Finance Committee, this release — from Chuck Grassley as Finance Committee Chair and Ron Johnson as Homeland Security Chair — effectively did not involve the Ranking members of the committees that did the work — Dianne Feinstein as Judiciary Ranking member and Claire McCaskill as HSGAC Ranking member.

To put what a colossal misuse of taxpayer funds this is, consider, first of all, that Grassley has been pursuing this for over four years.

Last fall, Majority staffers actually asked Rucker how ICIG came to be involved in the Hillary investigation.

How did ICIG come to be involved with the Secretary Clinton email investigation?

Rucker: – Mr. Rucker said ·that on March 12, 2015, the Senate sent a letter to ICIG requesting assistance regarding a Russian hacker who allegedly broken into Sidney Blumenthal’s email account. He said that the Sidney Blumenthal emails looked legitimate and were not at the SSRP level. He said that [redacted], a former CIA employee who worked with Blumenthal, was the author of most of the material. That was determined in part, he said, based on his writing style. Shortly after wards, he said, ICIG received another Senate request for assistance, this timein relation to the email practices of several former Secretaries of State including Secretary Clinton. He said that through ICIG, he was brought in to assist State in reviewing the email information in June 2015.

But they knew the answer to that. As their own staffers tacitly reminded Grassley and Johnson, Grassley has been pursuing this since 2015.

Your investigation began in March 2015 with an initial focus on whether State Department officials were aware of Secretary Clinton’s private server and the associated national security risks, as well as whether State Department officials attempted to downgrade classified material within emails found on that server. For example, in August 2015, Senator Grassley wrote to the State Department about reports that State Department FOIA specialists believed some of Secretary Clinton’s emails should be subject to the (b)(1), “Classified Information” exemption whereas attorneys within the Office of the Legal Advisor preferred to use the (b)(5), “Deliberative Process” exemption. Whistleblower career employees within the State Department also reportedly notified the Intelligence Community that others at State involved in the review process deliberately changed classification determinations to protect Secretary Clinton.1 Your inquiry later extended to how the Department of Justice (DOJ) and Federal Bureau of Investigation (FBI) managed their investigation of the mishandling of classified information.

That means that this effort — to misrepresent an interview conducted in December as a way to introduce new (and obviously bogus) allegations against Strzok — is a continuation of Barbara Ledeen’s efforts to prove some foreign government had hacked Hillary’s home server, as laid out in the Mueller Report.

Ledeen began her efforts to obtain the Clinton emails before Flynn’s request, as early as December 2015.268 On December 3, 2015, she emailed Smith a proposal to obtain the emails, stating, “Here is the proposal I briefly mentioned to you. The person I described to you would be happy to talk with you either in person or over the phone. The person can get the emails which 1. Were classified and 2. Were purloined by our enemies. That would demonstrate what needs to be demonstrated.”269

Attached to the email was a 25-page proposal stating that the “Clinton email server was, in all likelihood, breached long ago,” and that the Chinese, Russian, and Iranian intelligence services could “re-assemble the server’s email content.”270 The proposal called for a three-phase approach. The first two phases consisted of open-source analysis. The third phase consisted of checking with certain intelligence sources “that have access through liaison work with various foreign services” to determine if any of those services had gotten to the server. The proposal noted, “Even if a single email was recovered and the providence [sic] of that email was a foreign service, it would be catastrophic to the Clinton campaign[.]” Smith forwarded the email to two colleagues and wrote, “we can discuss to whom it should be referred.”271 On December 16, 2015, Smith informed Ledeen that he declined to participate in her “initiative.” According to one of Smith’s business associates, Smith believed Ledeen’s initiative was not viable at that time.272

[snip]

In September 2016, Smith and Ledeen got back in touch with each other about their respective efforts. Ledeen wrote to Smith, “wondering if you had some more detailed reports or memos or other data you could share because we have come a long way in our efforts since we last visited … . We would need as much technical discussion as possible so we could marry it against the new data we have found and then could share it back to you ‘your eyes only.'”282

Ledeen claimed to have obtained a trove of emails (from what she described as the “dark web”) that purported to be the deleted Clinton emails. Ledeen wanted to authenticate the emails and solicited contributions to fund that effort. Erik Prince provided funding to hire a tech advisor to ascertain the authenticity of the emails. According to Prince, the tech advisor determined that the emails were not authentic.283

Remember, Ledeen was willing to reach out to hostile foreign intelligence services to find out if they had hacked Hillary, and she joined an effort that was trawling the Dark Web to find stolen emails. She did that not while employed in an oppo research firm like Fusion GPS, funded indirectly by a political campaign, but while being paid by US taxpayers.

Chuck Grassley is now Chair of the Finance Committee, the Committee that should pursue new transparency rules to make it easier to track foreign interference via campaign donations. Ron Johnson is and has been Chair of the Homeland Security Committee, from which legislation to protect elections from foreign hackers should arise.

Rather than responding to the real hacks launched by adversaries against our democracy, they’re still trying to find evidence of a hack where there appears to have been none, four years later.

Update: For some reason I counted 2015-2019 as five years originally. That has been fixed.

Roger Stone Once Again Limits His Denials

In addition to the government showing that Roger Stone is a disorganized crime figure the other day, Roger Stone submitted a curious filing of his own, in yet another apparent attempt to feed denialist propaganda.

A week earlier, the government made a detailed argument that Stone, in his sustained bid to make his trial an attempt to challenge the government evidence that Russia hacked the DNC, misunderstood what the case was about. All that matters, the government argues, is whether Stone’s lies materially affected the House Intelligence investigation into the Russian tampering.

Stone’s false statements also had a natural tendency to (and in fact did) affect HPSCI’s investigative steps, priorities, and direction—regardless of Russia’s 2016 activities. See United States v. Safavian, 649 F.3d 688, 691-92 (D.C. Cir. 2011) (statements material if they “were capable of influencing the course of the FBI’s investigation”). For example, HPSCI did not subpoena the written communications that Stone claimed not to exist, and HPSCI did not investigate the other intermediary (Person 1) when Stone claimed that Person 2 was his sole intermediary. Moreover, Organization 1’s activities and coordination with Stone were relevant to evaluating the Intelligence Community’s work, to assessing any risks that Organization 1 may pose, and to considering any future actions that should be taken to deter coordination with state and non-state actors seeking to influence American elections. None of these understandings of materiality depends in any way on whether Russia in fact participated in the hacks or transmitted the hacked materials to Organization 1, and therefore Stone’s evidence on that subject is not relevant to the materiality inquiry.4

As part of that discussion, in a footnote, they engage in some counterfactuals to show how, even if some alternative scenarios, including the main one suggested by Stone, were true, his lies would still be material.

4 Even under Stone’s crabbed view of materiality and HPSCI’s investigation, Stone’s statements were still material, regardless of Russia’s exact role. Stone now primarily focuses only on evidence about whether Russia transferred the stolen files. But even if Organization 1 received the files elsewhere, it does not follow that Organization 1 has no connection to Russia’s election interference. For example, Organization 1 could theoretically have received the files from someone who received them from Russia; Russia could theoretically have coordinated its other election interference activities with Organization 1’s posting of stolen documents even if Russia was not Organization 1’s source; and individuals associated with the Trump Campaign could theoretically have played a role coordinating the two. Under any view, Stone’s communications with and about Organization 1 were material, regardless of Russia’s exact role.

As you read this “theoretical” scenario, remember that the campaign considered reaching out to WikiLeaks after the John Podesta files got released. And Roger Stone was — at least in 2018 — among those Trump flunkies who were trying to get Julian Assange a pardon.

The government presents this as theoretical, but it demonstrates, correctly, that WikiLeaks’ role in the operation matters whether or not the person who dealt them one or another set of files was a Russian intelligence officer.

Stone spends much of his response claiming (nonsensically) that because the government wants to introduce a Julian Assange video to establish dates for the public record surrounding certain details (in that case, when it was publicly knowable that WikiLeaks would release more files), it makes the issue of how Russia got the files to WikiLeaks central. In the hands of better lawyers — or at least, lawyers who weren’t playing for a pardon — this argument might have merit. In Stone’s case it doesn’t, in part because he failed to describe what evidence he wanted to introduce, and in part because he doesn’t understand what files Bill Binney, one of his intended witnesses, is talking about (they’re not the John Podesta emails, and so are irrelevant to Stone’s lies).

The government objects to Roger Stone presenting two witnesses who will testify, and demonstrate, that WikiLeaks did not receive the relevant DNC and DCCC data from the Russian state. That evidence will establish that the relevant data was “leaked” to WikiLeaks, not transferred to WikiLeaks by the Russian State. The government claims such evidence will be irrelevant, unfairly prejudicial, and cause delay and would turn the subject matter into a “mini-trial.” The government states: “If a person chooses to make false statements to the government, he or she takes the risk that the false statement is material.” (Motion at 14). But, the government takes the same risk: that the alleged false statements might be deemed immaterial by the jury. 1

Stone should be permitted to present evidence that his answers did not materially affect the congressional investigation because the Indictment makes clear that the investigation was of a “Russian state hack.”

But along the way, Stone includes his own footnote where he (perhaps in an effort to present a quote that denialists like Aaron Maté can quote without context, as Maté has done repeatedly as the useful idiot of both Stone and Concord Management) misrepresents the government’s theoretical as instead genuine curiosity.

1 The government wonders if the Russian state hacked and stole the relevant data and then someone else coordinated the delivery of the data to WikiLeaks. See Dkt. #172 n. 4. The government, nor the Mueller report proved or disproved this scenario. But if WikiLeaks did not receive the data from the Russian state then Stone’s communications with WikiLeaks were immaterial.

Stone is absolutely right that the government doesn’t prove or disprove this scenario. The Mueller Report notes explicitly that,

The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016. For example, public reporting identified Andrew Müller-Maguhn as a WikiLeaks associate who may have assisted with the transfer of these stolen documents to WikiLeaks.

The prosecutors in his case aren’t tasked with answering that question. Indeed, if pressed, they could argue that Stone’s lies might well have served to hide firsthand knowledge of how the Podesta emails did get to WikiLeaks, which would make them even more material.

From a legal standpoint, Stone’s argument is unlikely to work, even if it were argued with more legal rigor.

What I’m interested in, however, is how Stone homes in on just one part of the scenario, the hand-off of files to WikiLeaks. The government actually laid out three parts to its theoretical: WikiLeaks got the files stolen by Russia from a cut-out, but also coordinated with Russia on “other election interference activities,” and individuals associated with the Trump campaign played a role coordinating the handoff of the files and WikiLeaks’ other coordination with Russia.

  • Organization 1 could theoretically have received the files from someone who received them from Russia;
  • Russia could theoretically have coordinated its other election interference activities with Organization 1’s posting of stolen documents even if Russia was not Organization 1’s source;
  • Individuals associated with the Trump Campaign could theoretically have played a role coordinating the two.

It’s a series of tantalizing hypotheticals! And while the first two (the second of which is pretty oblique) could independently be true, the last one implies the two would not be independent, but that, instead, someone “associated” with the Trump campaign coordinated the first two steps.

But of course, the government presents all this as a theoretical possibility, not (as Stone falsely claims) as a question they’re seeking, here, to answer.

Stone, however, only deals with the first part of that scenario: “the Russian state hacked and stole the relevant data and then someone else coordinated the delivery of the data to WikiLeaks.” He doesn’t address the possibility that WikiLeaks had some other kind of role. And he definitely doesn’t address the possibility that someone “associated” with the Trump campaign had a role in coordinating the two. In a gesture towards addressing a government hypothetical (in part) that some individual associated with the Trump campaign might have coordinated other election year activities, Stone suggests that the only way the communications of a Trump associate with WikiLeaks would be material would be if the communications involved actual transfer of emails.

This is something Stone has long been doing — making narrowly tailored denials that don’t address some tantalizing possibilities: in this case, that Stone had a role arranging something else with WikiLeaks.

And all the while, Stone drops a suggestion that overstates the uncertainty of what the government knows.

Judicial Watch Sues DOJ and Obtains Proof that Mark Meadows and His Propagandists Are Conspiracist Idiots

Just over a year ago, on August 11, 2018, the President accused the “Fake News Media” of refusing to cover “Christopher Steele’s many meetings with Deputy A.G. [sic] Bruce Ohr and his beautiful wife, Nelly [sic].” It was the first of around 26 attacks Trump launched against the Ohrs on Twitter over the year.

Trump reported that the FBI received documents from Ohr, which was true; the FBI asked for them as part of vetting the Steele dossier and understanding how it related to Fusion GPS’ other work. Trump complained that Nellie Ohr investigated members of his family for pay (true) and then fed it to her husband who gave it to the FBI; Trump didn’t reveal that FBI asked for the documents and that Steele’s efforts and Nellie’s were separate.  The President claimed that Ohr “told the FBI it (the Fake Dossier) wasn’t true, it was a lie and the FBI was determined to use it anyway,” which was an exaggeration (Ohr said he believed that Steele believed his sources were telling him the truth, but Ohr described that all sorts of conspiracy theories could be spread from the Kremlin). Trump misquoted Ohr sharing with the FBI Steele’s concern that his sources would be exposed in the wake of the Jim Comey firing as a suggestion that Ohr was worried he, personally, would be exposed, which then got further misquoted by Fox propagandists. Trump accused the Ohrs of profiting off the dossier several times, “Bruce & Nelly Ohr’s bank account is getting fatter & fatter because of the Dossier that they are both peddling.”

Over the course of that year, Trump called for Bruce Ohr to be fired at least six times. “How the hell is Bruce Ohr still employed at the Justice Department? Disgraceful! Witch Hunt!”

And yet, documents obtained under FOIA released by Judicial Watch in recent days (Ohr’s 302s, Ohr’s comms) show that virtually all the allegations made to fuel this year long campaign targeting Bruce Ohr are false. It is true that Bruce Ohr had ties to Christopher Steele going back almost a decade and was part of a network of experts combatting organized crime who compared notes (as was his wife Nellie, if the organized crime in question pertained to Ukraine or Russia). It is true that Ohr met with Steele in July 2016 and learned four things, two from the dossier (some version of Russian kompromat on Trump and allegations about Carter Page)  and two not (Oleg Deripaska’s misleading claim to be prepping a legal attack on Paul Manafort and something related to Russian doping), which he passed on to the FBI. He also met and passed on information from Glenn Simpson later that fall, though given the team he met with at DOJ, the information may not have been sourced from the dossier and may have focused on the crimes Manafort has since pled guilty to. Neither of those meetings, however, are covered by the FOIAed documents. Moreover, Judicial Watch has not yet obtained documents from after May 2017, which (based on texts between the two that have been released) could show Steele trying to grill Ohr for details about ongoing investigations into his work. Maybe some day Judicial Watch will find a document that substantiates their attacks.

What the documents released so far don’t show is that Ohr served as some kind of “back channel” to the FBI via which Steele submitted new allegations. As I noted, Ohr’s 302s suggest there were three phases of communications covered by the 302s involving Steele (and Simpson) and Ohr. During the first — November 22 to December 20 — Ohr appeared to be helping the FBI understand Simpson’s project and Steele’s data collection process. He offered critical comments about Steele’s sourcing (noting that lots of fantastic stories come out of the Kremlin), appeared to prod Simpson for what he knew about Steele’s sourcing and then shared that information with the FBI, when he didn’t know answers to FBI questions (most notably, about whether Steele was involved in a key Michael Isikoff story), Ohr asked Simpson and reported the answer back to the FBI. Ohr offered up details about who else might have been briefed by Steele and why Steele was speaking to so many people.

Ohr would have done none of this if he were aiming to serve as a back channel to ensure Steele could continue to feed information to the FBI. The fact that members of the frothy right have, in recent days, focused on previously unknown details that Ohr shared with FBI’s Bill Priestap (such as when Victoria Nuland got briefed by Steele) is a testament to the fact that Ohr was not trying to hide a network of Steele contacts, but instead was helping FBI to understand them. Ohr cannot, simultaneously, be a source for unique knowledge for the FBI and at the same time be part of a Deep State plot aiming to feed the FBI new intelligence from Steele via as many different channels as possible.

Importantly, the main incidences where Ohr gave the FBI materials originating from Fusion — the materials include a timeline on Paul Manafort’s ties to oligarchs, a table showing Trump’s ties with suspect Russians, 137 pages of narrative backup for some of the table (part of which appears at PDF 216 to 299; Judicial Watch did not release this research as an independent link, presumably because it damages their narrative), and the latest version of the dossier from Simpson — came during that vetting period. Indeed, at the meeting where Ohr obtained a copy of the dossier from Fusion — according to his congressional testimony, at least, the only time he ever handled it — was the same meeting where he tried to get Simpson to tell him who Steele’s sources were (see PDF 33), information he passed onto the FBI. What the frothy right should do, if it had a single honest journalist left, would be to admit that Mark Meadows had them chasing a hoax for a year, but now that they can see the underlying evidence, it’s clear Meadows was wrong, lying, or perhaps opposed to the FBI doing the same kind of vetting that he imagines he himself to be doing.

Similarly, the frothy right is spinning what Nellie Ohr’s research shows in utterly deceitful ways. For much of the last year, the story was that Nellie’s work was an integral part of Steele’s dossier, a story that formed a critical part of any claim that Bruce Ohr would have some incentive to prop up the credibility of the dossier (which, as noted, the record shows he didn’t do). Her research shows that, in reality, there is little overlap between her research and Steele’s. There are over 75 names listed in her table of sketchy ties with Russia. The only identifiable overlap with the dossier are the Agalarovs, Mike Flynn, Paul Manafort, Sergei Millian (to the extent he really is one of the subsources for the dossier), and Carter Page. The Flynn and Manafort (and to some degree the Page) stuff goes beyond what is in the dossier.

In addition Nellie’s research includes others who should have been included in any solid HUMINT on what Trump was up to, starting with Felix Sater and Konstantin Kilimnik (but also including Michael Caputo and Giorgi Rtskhiladze). Chuck Ross notes these names in a piece on Nellie’s research, but doesn’t acknowledge the ways their inclusion undermines the conspiracy theories he has been peddling. I said in January 2018 that this open source research would probably have been more valuable for the election than the dossier, and I stand by that.

And look at the dates on Nellie Ohr’s research and the number of reports for each date (something else that Ross ignores the significance of):

  1. November 23, 2015 (12)
  2. December 14, 2015 (19)
  3. February 12, 2016 (8)
  4. February 13, 2016 (1)
  5. February 27, 2016 (1)
  6. March 4, 2016 (5)
  7. April 14, 2016 (2)
  8. April 22, 2016 (5)
  9. May 7, 2016 (1)
  10. May 13, 2016 (2)
  11. May 20, 2016 (1)
  12. May 27, 2016 (2)
  13. June 3, 2016 (1)
  14. June 10, 2016 (1)
  15. June 17, 2016 (4)
  16. June 24, 2016 (2)
  17. June 25, 2016 (3)
  18. July 1, 2016 (4)
  19. July 6, 2016 (3)
  20. July 9, 2016 (1)
  21. September 19, 2016 (2)
  22. September 22, 2016 (1)

Perhaps half of Nellie’s Ohr’s dated reports in this table date to before the Democrats started paying Fusion (that was sometime in April or May 2016, with Steele coming on around June 2016), and well more than half of the actual dated reports are from the primary period. That means that GOP billionaire Paul Singer, and not the Democrats, paid for much of the Nellie Ohr research in the table that the GOP is squawking about.

The GOP is squawking less about Nellie Ohr’s Manafort timeline (which is odd considering some of what Steele shared through Ohr consisted of Manafort details not reported in the dossier). But it’s worth mentioning that some of the same frothy right propagandists complaining here were instrumental in magnifying oppo research targeting John Podesta in 2016. The folks who made much of John Podesta’s stolen emails can’t complain about public source research focusing on Manafort’s corruption.

And for all the frothy right’s focus on Nellie Ohr’s interactions with Bruce’s colleague Lisa Holtyn (with whom Nellie clearly had a direct professional and personal relationship), they don’t mention this email to Holtyn, which suggests that Nellie has absolutely no clue about the connection that Fusion had with this anti-Magnitsky event that Natalia Veselnitskaya and Rinat Akhmetshin were involved in.

That provides some support to Simpson’s claim to Congress that the people working on the Trump oppo research were compartmented from those working on the Baker-Hostetler project tied to the June 9 meeting (though Nellie was never the most likely overlap).

As to two smoking guns that Mark Meadows claimed to have found when he referred Nellie Ohr for criminal prosecution earlier this year, the first is that at Holtyn’s suggestion, Nellie met, informally, with two organized crime prosecutors,  Joe Wheatley and Ivana Nizich, presumably to give them background on certain aspects of Russian and Ukrainian organized crime. Judicial Watch has focused on the set-up of the meeting, in which Bruce noted it should not be a conflict since Nellie would not be paid. They haven’t noted that Holtyn describes (PDF 31) her colleagues’ interest in the topic to be “some things that they are working on currently” which, if it’s a specific case, she’s careful not to mention directly, but sounds more like enterprise investigation. That kind of meeting is utterly consistent with Nellie’s claim to have no knowledge of ongoing investigations, Russian or otherwise.

Moreover, the aftermath of the meeting (PDF 24) certainly reflects that informal nature.

Meadows claims that this exchange (Nizich and Wheatley continued to exchange information from Nellie afterwards, but this is the only written discussion of a meeting) proves Nellie Ohr lied in this exchange with Democratic staffers Arya Hariharan and Susanne Sachsman Grooms last October.

Q You’ve never worked for the Department of Justice, correct?

A Correct.

Q You don’t currently work for them?

A Correct.

Q So you would not have any knowledge of what is going on in an ongoing investigation?

A Correct.

Ms. Sachsman Grooms. Just to make that one crystal clear, did you, at the time, that you were working for Fusion GPS have any knowledge of the Department of Justice’s investigations on Russia?

Ms. Ohr. No.

As to Meadows’ second allegation, he says that by sharing research on Zakhariy Kalashov, a Russian mobster, with Wheatley and Nizich, Nellie proved knowledge of an ongoing investigation and (he insinuates though doesn’t say directly) shared her Fusion research with people outside of Fusion and her spouse. (Best as I can tell, Judicial Watch hasn’t released this yet, but they have a habit of sitting on documents so it’s unclear if DOJ has released it to them.) If that’s true, Meadows must know Kalashov has some tie to Trump, which is not alleged in any of Nellie’s work for Fusion.

If it were true, I’m pretty sure it would have become a campaign issue.

Meadows has, at several times in his efforts to delegitimize the information sharing by a small network of people who compare notes on Russian organized crime, gotten shockingly close to suggesting that daring to investigate Russian criminals — whether they have any tie to Donald Trump or not — should itself be criminalized. This is one such instance.

But that’s not the most remarkable piece of evidence included these latest releases Judicial Watch that demolishes the attacks on the Ohrs.

That majority of the documents involving Nellie Ohr turned over to Judicial Watch involve not — as you might expect if you read the frothy right — evidence of a Deep State plot. Rather, they are tedious discussions of Ohr’s travel plans, which he either forwarded to Nellie (perhaps because she scandalously likes to know what country her spouse is in or even likes to pick him up from the airport) or discussed the inclusion of Nellie on trips where spouses were invited. Bruce Ohr spends a lot of time figuring out what kind of per diem he’s permitted and seems to travel on a range of airlines (meaning he’s not maximizing frequent flier miles from his work travel, as most business travelers, myself included, like to do). But the most remarkable bit of tedium regarding travel — for a trip to Riga — shows that Bruce Ohr went to some effort to ensure he only claimed €105 a night reimbursement for hotel, rather than €120, because the additional €15 was a charge associated with Nellie’s inclusion (on the same trip, he also didn’t submit for reimbursement for parking at the airport).

This is a couple that has been accused, by the President of the United States — a guy who never met a grift he didn’t love — of sharing information on Russian criminals not because they want to keep the country safe, but to make their bank account “fatter & fatter.”

It turns out, instead, that they’re the kind of people who make sure taxpayers don’t pay an extra €30 for an overseas business trip.

Of course the frothy right hasn’t admitted how obscene it was for Donald Trump to accuse the Ohrs of self-dealing.

Who knows? Maybe Judicial Watch will one day discover the smoking gun that Meadows has been claiming to have found against the Ohrs. Maybe the details surrounding the 2016 communications or Steele’s efforts to undermine the investigation into his work will actually make the Ohrs into the villains they’ve been cast as for the last year.

And certainly, all that’s a different question than Simpson’s candor or the overall wisdom of Steele’s project.

But as far as the Ohrs go, what the evidence that Judicial Watch worked hard to liberate proves is that the President and Congressman Meadows owe this couple an apology — and the frothy right should stop prostrating themselves by parroting what Meadows tells them is there and begin describing all the ways these documents prove their past reporting to be a hoax.

Freedom And Equality: Relational Equality Against Social Hierarchies

Introduction and Posts in This Series with additional resources

The first two posts in this series discuss the idea of freedom from domination as used by Elizabeth Anderson in a chapter she wrote for The Oxford Handbook of Freedom and Equality, which you can find online through your public library, I hope. With this post, I begin looking at the concept of equality as she uses it. In subsequent posts I will examine her thinking on managing the relation between freedom and equality.

Anderson says that the type of equality relevant for political purposes is relational equality, as opposed to material equality. Material equality is the idea that we should all have the same quantity of resources, and no one actually advocates this, or anything like it, despite right-wing shrieks about socialism.

Relational equality is defined against social hierarchy. To get a better understanding of this idea, I turn to another chapter by Anderson, Equality, published in The Oxford Handbook of Political Philosophy. Anderson argues for an understanding of equality as an “ideal of social relations”. In contemporary thought, including not least contemporary philosophical thought, equality is considered as a principle governing distribution of economic goods. The discussion is often based on the ideas of John Rawls in A Theory of Justice. Rawls has been interpreted as requiring some level of equality of distribution, leading to tedious (my word) discussions of what, how much, and who is deserving of such redistribution.

Anderson argues that relational equality is a much more accurate description of what egalitarians actually work for, what they actually are doing.

A Side Note On Method

Anderson considers herself a pragmatist in the tradition of John Dewey. Another of Dewey’s disciples, Richard Rorty, wrote

Dewey’s philosophy is a systematic attempt to temporalize everything, to leave nothing fixed. This means abandoning the attempt to find a theoretical frame of reference within which to evaluate proposals for the human future.*

This means precisely that human beings created all the moral and ethical principles that we use to measure good and evil, right and wrong, moral and immoral, decent and indecent, acceptable and unacceptable, edible or inedible, taboo and prized acts, included and excluded groups, and every other pairing of measures. Every social structure is created by humans. There is no external, no objective set of principles for any of these purposes. There are only human beings struggling with themselves and others to structure their mutual existence. It means that human beings create their own future.

That’s not to say that we don’t have standards for making decisions. We most certainly do. But we have to recognize that others are perfectly capable of forming other coherent standards that disagree with ours, and that living with others necessitates accommodation to their plans. It doesn’t mean that we don’t have absolutes in our lives, but it may mean that we do not attempt to impose those on others.

Anderson works from the principle that social choices are matters of argument among members of society. She says that choosing between relational equality and social hierarchies is a matter of values. She sets out the values she thinks are important and argues about which is superior in terms of those values. This kind of argument appears regularly in her work.

Social Hierarchy

By “social hierarchy”, I refer to durable group inequalities that are systematically sustained by laws, norms, or habits.

Anderson adds that social hierarchies are durable, they persist through generations. They are group-based: one group is superior, the other inferior. They are typically based on broad categories, race, gender, sexuality, citizenship and so on. She identifies three kinds of social hierarchy, hierarchies of command, hierarchies of esteem, and hierarchies of standing.

In hierarchies of command, the inferior class is subject to arbitrary and unaccountable control by the superior class. The inferior class must obey the orders of the superior class without questioning. Inferiors cannot exercise their liberty without the assent of the superior class. This is the opposite of the non-domination I discussed in the two previous posts in this series. This hierarchy is undone when the inferior class is able to govern itself directly or democratically.

In hierarchies of esteem the superior class stigmatizes the inferior class. The inferior class is marked for disdain, ridicule, humiliation and even violent persecution.

In hierarchies of standing, the interests and voices of the superior class are given great weight in social decision-making, legislation, and enforcement of laws and rules. The interests of the inferior class are given little or no weight in such matters.

Values

Anderson follows John Dewey’s scheme of values in the following passage.

The realm of values is divided into three great domains: the good, the right, and the virtuous. Each is defined in relation to the perspective from which people make judgments about each type. Judgments of goodness are made from a first-person perspective—that is, from the perspective of one enjoying, remembering, or anticipating the enjoyment of some object, individually or in concert with others (“us”). The experience of goodness—the sign or evidence of goodness—is one’s felt attraction to an appealing object. Judgments of moral rightness are made from a second-person perspective, in which one person asserts the authority (in his or her own person or on behalf of another) to make claims on another—to demand that the other respect the rights or pay due regard to the interests of the claimant and to hold the other accountable for doing so. Judgments of moral wrongness, therefore, are essentially expressible as complaints by or on behalf of a victim that are addressed to agents who are held responsible for wrongdoing. The experience of encountering a valid claim of rightness is that of feeling required to do something, of being commanded by a legitimate authority. Judgments of virtue are made from the third-person perspective of an observer and judge of people’s conduct and underlying dispositions. The experience of virtue is one’s felt approval or admiration of people’s character or powers as expressed in their conduct. Citations omitted.

This is a lot to process. Perhaps the first step is to try to apply these ideas to your personal thinking about social issues. Consider the family separation policy applied to asylum seekers by Trump (Miller). When I think of it in terms of the good, the right and the virtuous, I immediately see that it makes me want to act, to demand justice. It makes me despise the people who instigated this policy and the people who carry it out. Therefore I perceive it as neither right (just) nor virtuous. I also see that it is evil, the opposite of good; it doesn’t make me happy, it makes me angry and hostile.

On the other hand, to judge from Twitter and what I see of Fox news on comedy shows, there are plenty of people who don’t see it that way. Is it possible to have a discussion of values with such people? Is there an argument that the policy is good or right or virtuous? Am I prepared to admit such arguments might be worth considering?

Relational Equality Against Social Hierarchies

This is the central argument of Anderson’s chapter. Anderson claims that egalitarians argue that social hierarchies are bad on all three counts. In general, social hierarchies are not right ( meaning they are unjust) towards the people placed in the inferior class and thus to society as a whole. They are morally wrong (virtue) towards both superior and inferior classes because it devalues the human worth and potential of the inferior class and inflates the worth of the superior class. And they are vicious (not good) because they treat the ideologies supporting this class distinction as good when we can see that those ideologies are corrupt.

In the case of esteem hierarchies, egalitarians argue that all human beings are entitled to a basic level of esteem and equal access to higher levels of esteem. As to hierarchies of standing, egalitarians argue that all humans should be treated equally before the law, and should have a basal level of standing in other settings.

With respect to command hierarchies, egalitarians argue that the primary justification is the idea that some humans are fit to rule and other are fit only to follow. Egalitarians say that all humans possess a basic level of self-government sufficient to enable them to participate in decisions about their lives and work, and “…entitle them to reject systems in which others wield unaccountable power over them.”

These ideas may not be comfortable. The arguments may seem unanchored, because there isn’t a Ten Commandments or any other seemingly objective standard. I’ll have other comments in the next post.

====
*Rorty, Achieving Our Country, p. 20. This is a great book, an antidote to the despair that alternates with cynicism that infects the American left. I may do a series on it, but it’s easy to read, barely theoretical and mostly an impassioned argument for hope for the future based on the best ideas of the American Project.

The Ohr 302 Exemptions

As I noted yesterday, the FD-302s of FBI’s conversations with Bruce Ohr released to Judicial Watch the other day are unremarkable. The scope of Judicial Watch’s request left out the time periods — before Ohr was handed off to another FBI Agent after the election, and after Mueller was hired — that would be the most interesting. But what we do see shows that FBI first reached out to Ohr in an effort to assess the Steele dossier production, and Ohr was able and willing to chase down answers for the FBI that go to issues of credibility. Later, Steele reached out to Ohr in a panic about what would happen as Congress scrutinized his work more closely; in what we see, those conversations were not inappropriate (which is not to say I’m sympathetic to Steele’s concerns, given how he publicized his work). Though given Ohr’s notes, they may have been later in the year; at a minimum, they show how aggressively Steele was trying to prepare a public story that ended up being quite partial.

In my opinion, the FOIA exemptions are the most interesting aspect to the 302s. We can learn a bit from the things DOJ chose (or felt obligated) to protect. Here’s a short guide to FOIA exemptions and here’s DOJ’s more thorough one.

The less interesting redactions are for the following purposes:

  • b7C/b6: Protects privacy, used here to protect everything from Steele’s name to other sources
  • b7D: Protects confidential sources (both Steele and his sub-sources would get some protection)
  • b7E: Protects law enforcement techniques, including the bureaucracy of writing up 302s

The exemption, b3, protects information protected by statute, often the National Security Act. For example, that’s one of the exemptions (along with privacy and law enforcement technique exemptions) used to protect boring bureaucratic details about the case file. But it’s interesting in one instance.

The discussions, starting on PDF 14, of how Steele was panicking about one of his sources are protected for privacy, source, and b3, statute (as well as, sometimes, law enforcement technique).

That’s interesting, because FBI is not saying this person’s identity is classified. Nor is it saying that this person is credibly at risk of being killed, which would be a b7F (which is what they’d use to protect our own recruited agents). But they are according Steele’s source some kind of statutory protection.

The exemption, b1, protects classified information. It’s a measure, in these discussions about someone who used to work as an intelligence officer for an ally and who continues to collect HUMINT, of what the DOJ or other agencies considers genuinely classified (and doesn’t always line up with the initial or FOIA review classification marks on the paragraphs). For example, a paragraph describing how Ohr first met Steele — which appears in unredacted form in Ohr’s congressional testimony as follows — is protected by both a b3 and b1 exemption, presumably to protect references to MI6.

I believe I met Chris Steele for the first time around 2007. That was an official meeting. At that time, he was still employed by the British Government. I went to London to talk with British Government officials about Russian organized crime and what they were doing to look at the threat, and the FBI office at the U.S. Embassy in London set up a meeting. That was with Chris Steele. And there were other members of different British Government agencies there. And we met and had a discussion. And afterwards, I believe the agent and I spoke with Chris Steele further over lunch.

A more interesting redaction appears on PDF 8, in a series of paragraphs where the Agent was asking Ohr whether about his personal knowledge of certain aspects of Steele’s work, such as whether he had witnessed Steele’s meetings with Jon Winer. One of those paragraphs is redacted, in part for b3 and b1 reasons, and classified Secret. Whatever that protects, it’s a reminder that Ohr and Steele had real discussions about organized crime in the past.

By far the most interesting exemptions, however, are what FBI has chosen to protect because of ongoing investigations, exemption b7A, starting with what they have not protected: these conversations, generally.

The frothy right believes that Bruce Ohr should go to prison because he shared information about suspected Russian crimes with other experts in the subject. Ohr’s role in the dossier has presumably been under scrutiny for some time as part of DOJ IG’s investigation into the basis for Carter Page’s FISA application. In addition, Christopher Steele and Glenn Simpson have both been referred to DOJ for suspected lies to Congress, the latter more credibly than the former. With one significant possible exception, there’s nothing in these 302s that has been protected for either of those reasons. Ohr’s earlier and later conversations with Steele would be more pertinent to those inquiries (and there’s reason to believe the later ones are being treated as such), but some of these 302s would clearly be too. But FBI has determined they can release these files. That’s interesting, especially, because of the history of this FOIA:

  • August 6, 2018: Initial Judicial Watch FOIA
  • September 10, 2018: JW sues
  • March 15, 2019: DOJ tells JW the files are being withheld in full
  • March 22, 2019: Conclusion of Mueller investigation
  • April 1, 2019: Status report states that FBI is evaluating impact of conclusion of that investigation on FOIA
  • May 8, 2019: DOJ still considering whether FBI can release the files
  • July 25, 2019: DOJ decides it can release the files in part

As recently as August 5, DOJ said it was “still engaged in internal discussions about the redactions necessary to release the requested records to the public.” In other words, a very recent review of these files has determined that files showing how FBI handled the mid-term discussions between Christopher Steele and Bruce Ohr may be released to the public.

The big possible exception pertains to details of the original conversation on Trump and Russia with Steele.

Steele’s initial conversation

The paragraph describing what Steele first told Ohr back on July 30, 2016 is redacted for b1, b3, and b7A reasons.

The redactions in this passage include the entirety of Steele’s explanation for the “over a barrel” comment, which is interesting because other agencies have released these details (which may name the people boasting they had kompromat on Trump). The paragraph also redacts part of the discussion of Deripaska preparing to bring details on Paul Manafort’s “theft” from him to US authorities. That may be for privacy reasons,  but — assuming the order is the same in the interview and the notes, but it seems Ohr was reading verbatim — both are redacted for ongoing investigation reasons in Ohr’s notes released in December.

If, as seems to be the case, Page was not redacted as part of an ongoing investigation in either of these suggests the early Ohr conversation is not one being scrutinized by DOJ IG on the FISA application (especially given the notes were released in December, well before the IG had come close to finishing, as has been reported).

Note, Ohr turned over notes from during and after the meeting with Steele to the Agent. Just these notes were released in December, meaning the notes he wrote after the meeting must be among the 6 pages of Ohr’s notes withheld in that December release, in part to protect an ongoing investigation (that could be consistent both with the known DOJ IG investigation into the origins of the investigation, and an investigation into those two allegations).

One other thing in that first interview pertains, per the redaction to an ongoing investigation: a discussion of a post-Ukrainian invasion meeting involving Ohr, Steele, and oligarchs (possibly, though not definitely, Russian).

 

The description seems to match a meeting Steele is known to have set up with Deripaska (though that meeting was in 2015).

Oleg Deripaska

The treatment of one known Deripaska reference and this reference to cultivating oligarchs as sources (earlier in 2016, Steele had been trying to get DOJ to use Deripaska as a source) is particularly interesting given that, what appear to be additional Deripaska references, are also redacted to protect an ongoing investigation.

A significant chunk of the 302 memorializing the February 6, 2017 interview protects an ongoing investigation.

There are good reasons to think this is a reference to Deripaska. Steele worked for Deripaska lawyer Paul Hauser, and Deripaska was interviewed in September 2016. Deripaska would be directly implicated in the election (two months after this interview, Deripaska was sanctioned).

This may reflect a conversation directly with Hauser though, as the Steele reference in this interview was covered in entirely in a WhatsApp chat. Given the redaction, it’s also possible that Ohr took notes, which would be among the 6 pages not turned over because of an ongoing investigation.

And while less definitive, this passage from the February 14 interview of Steele referring to which lawyers he was working for could also be the Hauser work.

Given the withholdings on Ohr’s note from the meeting, the ongoing investigation does pertain to Steele’s client.

If it is Deripaska, it would suggest that Steele was financially dependent on his Deripaska work, as the other client mentioned, Bilfinger, wasn’t paying him (which he complained about to Ohr).

[Note, this note also has what looks like a reference to “Snowden report,” which makes absolutely no sense to me, so I assume I’m misreading it.] Update: This is likely a reference to the report, from the day before, that Russia was offering Snowden to Trump.

It has long been troubling that Steele had an ongoing relationship with Deripaska during the time he worked on the dossier. It’s clear that Deripaska used Steele to misinform DOJ that he was upping the pressure on Manafort, hiding that Manafort was instead making a desperate — and somewhat successful bid — to get back on Deripaska’s payroll.

A good deal of the ongoing investigation redactions in these Ohr 302s suggest DOJ continues to be interested in all that, as well.

Alfa Bank

The other ongoing investigation redactions are far more surprising, as they suggest (though this is far less definitive than the Deripaska tie) that DOJ may continue to investigate … something pertaining to the Alfa Bank allegations.

The initial reference to Alfa Bank, from the November 22, 2016 interview and discussing his September 2016 meeting with Glenn Simpson, is not protected as part of an ongoing investigation — though what appears to be a continuation of a discussion of it is treated as classified.

But a follow-up reference to Alfa bank does seem to be redacted as part of an ongoing investigation. These two paragraphs from the December 12, 2016 interview of Ohr, at PDF 11, have just one exemption explanation, including the b7A ongoing investigation one.

It’s certainly possible that the second paragraph is unrelated, and that’s what pertains to the ongoing investigation. But treating them as the same FOIA exemptions suggests they’re related.

In the same interview, Ohr explained that when he asked Simpson if he was concerned about his personal safety, Simpson,

mentioned that someone called and asked him to find out where all of the Alfa Bank stories were coming from. Simpson did not state this was a threat from the Russians, but that was the impression made upon OHR based upon the timing of the comment and using that story as a response to OHR’s question.

This seems to suggest more than one Alfa Bank story.

Also note two things. First, when the NYT first got the story of Jared Kushner’s “back channel” meeting with Sergey Gorkov, they had it as a meeting with Alfa Bank (though they misspelled it in the same way that Steele’s dossier did). That meeting would take place four days after Simpson raised whatever crazy tip he got, on December 13.

Kushner agreed to meet with Gorkov. 1151 The one-on-one meeting took place the next day, December 13, 2016, at the Colony Capital building in Manhattan, where Kushner had previously scheduled meetings. 1152

Also, during this period, Petr Aven was trying to reach out to Trump’s people on direct orders from Putin.

In December 2016, weeks after the one-on-one meeting with Putin described in Volume I, Section IV.B.1.b, supra, Petr Aven attended what he described as a separate “all-hands” oligarch meeting between Putin and Russia’s most prominent businessmen. 1167 As in Aven’s one-on-one meeting, a main topic of discussion at the oligarch meeting in December 2016 was the prospect of forthcoming U.S. economic sanctions. 1168

After the December 2016 all-hands meeting, Aven tried to establish a connection to the Trump team. Aven instructed Richard Burt to make contact with the incoming Trump Administration

It’s highly unlikely that Simpson got wind of any of those things; we would have heard about it. I raise these other instances not because I think Simpson had them, but because it’s clear Mueller chased these Alfa leads much further than we otherwise knew, and the leads themselves still seem not to have amounted to anything (even while showing that Putin leveraged the threat of election-related sanctions on the one bank that was legally acceptable in the west at the time, Alfa, to get its oligarch to join his efforts to cultivate Trump).

These Alfa allegations all still seem to be fluff. But even so, the redactions in the second reference may suggest there’s something here of continued interest to the FBI.

Update: I’ve taken out Bill Priestap’s name, as that was incorrect reporting when this came out.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

The Transcript the Frothy Right Claims Exculpates George Papadopoulos Instead Probably Inculpates Him

Last Monday, Republican huckster lawyer Joe Di Genova promised — among other things — that the documents the frothy right has been promising will blow up the Russian investigation would be released Wednesday — that is, a week ago. The frothy right — which for some unfathomable reason is following sworn liar and all around dope George Papadpoulos like sheep — believes that a transcript of the interactions between him and Stefan Halper somehow includes evidence that undercuts the case that there was probable cause that Carter Page was an agent of a foreign power.

An exchange from Sunday, however, confirms that the transcript in question shows that Papadopoulos was actively lying in September 2016 about his ties to Russia. In an exchange with Papadopoulos, Maria Bartiromo confirmed that the transcript in question is the one on which the former Trump flunkie told Stefan Halper that working with Russia to optimize the release of emails stolen from Hillary would be treason.

Bartiromo said that she had spoken with Papadopoulos on Saturday night, during which he told her that the recorded conversation in question involves him and FBI informant Stefan Halper in September 2016. Papadopoulos allegedly pushed back against Halper’s suggestion that he or the Trump campaign would have wanted Russia to release the Democratic National Committee emails it hacked in 2016.

[snip]

Bartiromo then said that “George Papadopoulos told me last night” that the transcript Gowdy was referring to is from a conversation Papadopoulos had with Halper in London at the Sofitel Hotel in London where she recounted that, according to Papadopoulos, Halper questioned Papadopoulos, saying, “Russia has all of these e-mails of Hillary Clinton and you know, and when they get out that would be really good for you, right? That would be really good for you and the Trump campaign, if all those e-mails got out, right?”

But Bartiromo says Papadopoulos responded to Halper by saying “that’s crazy,” “that would be treason,” “people get hanged for stuff,” and “I would never do something like that.”

That means it’s the same transcript that Mark Meadows — questioning Papadopoulos about what he learned not from his lawyers (who said there was no misconduct with Papadopoulos) but from the John Solomon echo chamber — asks about here.

Mr. Meadows. You say a transcript exists. A transcript exists of that conversation?

Mr. Papadopoulos. That’s I guess what John Solomon reported a couple days ago.

Mr. Meadows. So are you aware of a transcript existing? I mean —

Mr. Papadopoulos. I wasn’t aware of a transcript existing personally.

Mr. Meadows. So you have no personal knowledge of it?

Mr. Papadopoulos. I had no personal knowledge, no.

Mr. Meadows. But you think that he could have been recording you is what you’re suggesting?

Mr. Papadopoulos. Yes.

Mr. Meadows. All right. Go ahead.

Mr. Papadopoulos. And after he was throwing these allegations at me, I —

Mr. Meadows. And by allegations, allegations that the Trump campaign was benefiting from Hillary Clinton emails?

Mr. Papadopoulos. Something along those lines, sir. And I think I pushed back and I told him, I don’t know what the hell you’re talking about. What you’re talking about is something along the lines of treason. I’m not involved. I don’t know anyone in the campaign who’s involved. And, you know, I really have nothing to do with Russia. That’s — something along those lines is how I think I responded to this person.

By Papadopoulos’ own memory, he said three things in a mid-September meeting with Stefan Halper:

  1. He didn’t know anything about the Trump campaign benefitting from Hillary Clinton emails
  2. He believed if he did know about such a thing, it would amount to treason
  3. “I really have nothing to do with Russia”

Papadopoulos pled guilty, under oath, with the advice of counsel who knew the contents of this interview, that in fact he did know about the Trump campaign benefitting from Hillary Clinton emails, because he had been told about it in April 2016. So that’s one lie that this supposed exculpatory transcript records him telling.

I’m more interested in the second lie: that he “really has nothing to do with Russia.”

He made that statement sometime around September 16, 2016, in London. A month earlier, Papadopoulos had very different plans for a mid-September trip to London. He planned a meeting in London with the “Office of Putin,” that would hide any formal tie with the campaign.

The frothy right makes much of the fact that that meeting, as far as we know, did not take place. Though there is a written record of Sam Clovis — who probably was not entirely forthcoming in a grand jury appearance — encouraging Papadopoulos and Walid Phares to pursue such a meeting if feasible. More importantly, a year later, at a time when he was purportedly cooperating, Papadopoulos refused to cooperate in transcribing these notes, meaning he was still covering up the details about the fact that as late as mid-August the Trump campaign had plans to have a secret meeting at precisely the same time and in the same place that this Halper transcript was recorded.

Papadopoulos declined to assist in deciphering his notes, telling investigators that he could not read his own handwriting from the journal. Papadopoulos 9/19/17 302, at 21. The notes, however, appear to read as listed in the column to the left of the image above.

Worse still, Papadopoulos continued to show great enthusiasm for Russia even after the meeting where he claimed he “really has nothing to do with Russia.” He proudly alerted Joseph Mifsud of his September 30 column attacking sanctions against Russia.

On or about October 1, 2016, PAPADOPOULOS sent Mifsud a private Facebook message with a link to an article from Interfax.com, a Russian news website. This evidence contradicts PAPADOPOULOS’s statement to the Agents when interviewed on or about January 27, 2017, that he had not been “messaging” with [Mifsud] during the campaign while “with Trump.”

This column led the Trump campaign to sever ties with Papadopoulos.

Papadopoulos was dismissed from the Trump Campaign in early October 2016, after an interview he gave to the Russian news agency Inter/ax generated adverse publicity.492

492 George Papadopoulos: Sanctions Have Done Little More Than to Turn Russia Towards China, Interfax (Sept. 30, 2016).

And in spite of claiming he had “nothing to do with Russia” sometime in mid-September, immediately after the election Papadopoulos pursued deals with Russia, via Sergei Millian.

On November 9, 2016, shortly after the election, Papadopoulos arranged to meet Millian in Chicago to discuss business opportunities, including potential work with Russian “billionaires who are not under sanctions.”511 The meeting took place on November 14, 2016, at the Trump Hotel and Tower in Chicago.512 According to Papadopoulos, the two men discussed partnering on business deals, but Papadopoulos perceived that Millian’s attitude toward him changed when Papadopoulos stated that he was only pursuing private-sector opportunities and was not interested in a job in the Administration.5 13 The two remained in contact, however, and had extended online discussions about possible business opportunities in Russia. 514 The two also arranged to meet at a Washington, D.C. bar when both attended Trump’s inauguration in late January 2017.515

In short, the transcript (if it reflects Papadopoulos claiming he had nothing to do with Russia) is not exculpatory. On the contrary, it’s proof that Papadopoulos lied about at least two of three things Halper grilled him about.

The frothy right doesn’t seem to care that this transcript proves Papadopoulos lied, even before he knew he was under legal scrutiny for ties to Russia he continued to pursue even after being questioned about them.

The frothy right is using it differently. Trey Gowdy claims the transcript proves that the FBI was questioning “Trump campaign officials” (Papadopoulos was never paid by the campaign and would be “fired” two weeks later for his open enthusiasm for sanctions relief) about the campaign.

Gowdy told Bartiromo that this transcript “certainly has the potential to be” a game changer and said that he was “lost” and “clueless” as to why it hadn’t been made public yet, stating that he didn’t think it contained any information that would have an impact on relationships with our allies.

Gowdy further said that the transcripts would show “what questions [the FBI] coached the informants or the cooperating witnesses to ask of the Trump campaign officials” and implied that the questions would show that the FBI had been targeting the Trump campaign rather than simply attempting to combat Russian election interference.

Gowdy claimed that if the transcripts showed that the FBI was “veering over into the campaign or your [the FBI’s] questions are not solely about Russia, then you [the FBI] have been misleading us for two years.”

Here’s how that belief looked when Mark Meadows first mainstreamed it last fall.

Mr. Meadows. So essentially at this point, he was suggesting that there was collusion and you pushed back very firmly is what it sounds like.

Mr. Papadopoulos. That’s what I remember, yes.

Mr. Meadows. Okay. And then what did he do from there?

Mr. Papadopoulos. And then I remember he was — he was quite disappointed. I think he was expecting something else. There was a —

Mr. Meadows. So he thought you would confirm that you were actually benefiting from Hillary Clinton’s email dump?

Mr. Papadopoulos. Perhaps that’s why he was disappointed in what I had to tell him, which was the truth.

Mr. Meadows. So you have no knowledge — you’ve already testified that you have no personal interaction, but you have no knowledge of anybody on the campaign that was working with the Russians in any capacity to get these emails and use them to the advantage. Is that correct?

Mr. Papadopoulos. That’s absolutely correct.

Mark Meadows is pretty dumb. But this line of questioning is pretty shrewd (and may show some awareness of details that were not, at this point, public). His purportedly slam dunk question, proving misconduct, is whether Papadopoulos — who has, at times, been referred to as a “coffee boy” and was not a paid member of the campaign — had personal interaction or “knowledge of anybody on the campaign [] working with the Russians in any capacity to get these emails and use them to the advantage.”

Papadopoulos claimed he did not have that knowledge.

But we know that by the time this meeting with Halper happened, Donald Trump had ordered his top campaign aides to get Roger Stone to reach out to WikiLeaks to “get these emails and use them to the advantage.” Not Russia directly, not anybody still with the campaign, but the campaign did in fact try to “get these emails and use them to the advantage,” which is how Mark Meadows defines “collusion.” In short, this slam dunk exchange defines “collusion” to be precisely what Trump asked his aides to ask his rat-fucker to accomplish.

The Mike Flynn cooperation addendum makes it clear that, “only a select few people were privy” to the discussions about optimizing the WikiLeaks releases. The candidate’s campaign manager was privy to those discussions. The deputy campaign manager was privy to those discussions. The candidate’s top national security advisor was privy to them. The candidate’s rat-fucker was entrusted with those efforts. The candidate himself pushed this effort and got communication back about it.

But the coffee boy was not privy to those discussions.

Finally, let’s turn to the really bizarre part of what is supposed to be a smoking gun.

Trey Gowdy claims to believe that a transcript showing that Papadopoulos was lying to hide his ongoing ties with Russia in September 2016 — the contents of which Papadopoulos’ lawyers appear to have known about, which did not persuade them any misconduct had occurred with their client — should have been disclosed to the FISA Court for an application targeting Carter Page.

Gowdy also claimed that the potentially exonerating info was misleadingly concealed from the Foreign Intelligence Surveillance Court by the FBI, and that this is not the only mysterious transcript yet to be released.

Now, I could be wrong about this. After all, Trey Gowdy is one of the few people who has reviewed the unredacted Page warrant, though in the past has said there was clearly enough evidence to justify the warrant, something the Mueller Report substantiates (in part by making clear that Page told the FBI he’d happily provide non-public information to known Russian spies). But it appears that Papadopoulos appears in Page’s FISA application because events he swore under oath happened suggest that Russia was trying to reach out to the Trump campaign (for which there is abundant evidence), in part by offering energy deals (which is one thing Papadopoulos was still chasing even after November 2016), and there was reason to believe both Papadopoulos and Page had gotten advanced notice of the July 22 DNC email drop.

  • FBI targeted Page because they believed Russia was recruiting him as part of their effort to influence the outcome of the election (4)
  • Trump named both Page and Papadopoulos as advisors in March 2016 (6)
  • What the FBI knew so far of Papadopoulos’ activities [and other things] led the FBI to believe that Russia was not just trying to influence the outcome, but trying to coordinate with Trump’s campaign as well (9)
  • Russia has recruited Page in the past (12-14)
  • [Redacted section that probably explains that Page had told the FBI that he thought providing information to people he knew were Russian intelligence officers was beneficial for both countries and, after he showed up in the Buryakov complaint, he told Russia he had not cooperated with the FBI] (14-15)
  • In addition to allegedly meeting with Sechin and discussing eliminating sanctions, he met with someone assumed to be Igor Nikolayevich Divyekin, also “raised a dossier of ‘kompromat’ that the Kremlin had” on Clinton and the possibility of it being released to Trump’s campaign (18)
  • After those July meetings, Trump appeared to change his platform and publicly announced he might recognize Crimea (21)
  • Once these details became public, the Trump campaign not only denied Page had any ongoing connection to the campaign, but denied he ever had, which was false (24)

Some of those allegations about Page — specifically about whether he was alerted to kompromat harming Hillary when he was in Moscow in July 2016 — may not be true (though Mueller concluded that it remained unresolved). But they were true about Papadopoulos.

Establishing proof that Papadopoulos was lying to people about his ties to Russia in the weeks before his role was included in a FISA application doesn’t really make his inclusion exculpatory. On the contrary, it makes it more justifiable.

The frothy right is so spun up by con man George Papadopoulos that they have run to the TV cameras and claimed that a transcript that shows Papadopoulos was lying to hide his ongoing efforts to establish ties with Russia was in some way exculpatory. I mean, sure, Bill Barr might believe this tale. But no one else should.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

The Dance between Joshua Schulte and WikiLeaks

Way back when Joshua Schulte was first charged for leaking the CIA’s hacking tools to WikiLeaks, I noted a loose coincidence between WikiLeaks’ release, for the first time, of some of CIA’s hacking source code rather than just development notes and the activity on Tor that led to Schulte getting his bail revoked. Since then, however, court documents have laid out a number of other interactions between Schulte and WikiLeaks. This post lays all of those out.

The government currently maintains that Schulte stole the CIA’s hacking tools in late April 2016 and sent them (it’s unclear whether they believe he sent them directly to WikiLeaks or not), using Tails, in early May. In court documents (the most informative warrant affidavit starts at PDF 129, though the FBI would revise some of its understanding of events after that time), that timeline is based off the searches Schulte did in Google (!!!) mapping out his actions.

April 24, 2016: Schulte searches for a SATA adapter (which lets you connect a computer hard drive via a USB connection); Schulte searches how to partition a drive

April 28, 2016: Schulte searches, for a second time, on how to restrict other admins from seeing parts of a LAN

April 30, 2016: Schulte researches how to delete Google history, Western Digital disk wipe, and Samsung ssd wipe (the search of Schulte’s apartment would find both Western Digital and Samsung drives)

May 1, 2016, 3:20AM: Schulte searches on “how can I verify that a 1 tb file transferred correctly?”

May 4, 2016: Schulte searches on “can you use dban on ssd,” referring to a wiping software called Darik’s Boot and Nuke

May 6, 2016: Schulte researches Tor

May 8, 2016: Schulte researches how to set up a Tor bridge

In August 2016, Schulte for the first time started tracking WikiLeaks coverage via a number of Google searches, but without visiting the site. He also researched Tails for a second time, as well as throwaway email.

Schulte’s first trackable visit to the WikiLeaks site itself was on March 7, 2017, the day of the first Vault 7 release (though WikiLeaks had started hyping it earlier, starting in February 2017).

From that first release on March 7 through September 7, WikiLeaks would release another Vault 7 release fairly regularly, often every week, other times at two week intervals and, at one point in June, releasing files on consecutive days. WikiLeaks then released the one and only Vault 8 file — source code rather than development notes — on November 9.

In general, that rhythm of releases is not obviously remarkable, though of course it took place against the background of serial efforts to get Julian Assange a pardon in the US.

But it intersects with the investigation of Schulte laid out in search warrant applications and other filings in a few key ways. As I’ll show in a follow-up, it’s clear that Schulte provided WikiLeaks with a story about the files to offer a rationale for their publication, so it’s clear that he did more than provide the files as a dead drop. After the first files dropped, he realized he’d be the prime suspect. Court filings reveal that he contacted a number of his former colleagues (using Google!), trying to find out what they knew about the investigation, acknowledging that he would be a key suspect, and denying he had done the leak.

Then, between the first and the second Vault 7 release, on March 15, the FBI interviewed Schulte as they were searching his apartment. As part of that interview, Schulte lied to the FBI so as to be able to leave his apartment with the CIA diplomatic passport he had never returned (he had plane tickets to leave the country the following day). When he left his apartment, he told FBI Agents he’d be back in roughly an hour. He went to Bloomberg (where he still worked), stashed his passports there, and got on his work computer. 45 minutes after the time he said he’d return, the FBI found him leaving the lobby of Bloomberg, and on threat of arrest, got him to surrender his passports. After all this happened, Bloomberg did an analysis of what Schulte had done on his work computer and phones in this period; FBI seized his work hard drive in May 2017. If Schulte had on-going communications with WikiLeaks, this would have provided an opportunity to reach out to them to tell them he was under imminent threat of arrest.

From that point forward, the FBI asked Schulte new questions based off what had been released by WikiLeaks. Most notably, on June 29, they asked Schulte whether he altered Brutal Kangaroo, a file released by WikiLeaks just a week earlier, outside the CIA.

The rhythm of WikiLeaks’ regular releases continued through August 24, when Schulte was arrested for child porn, with a file released that day, and another file released on September 7, while he was in jail. But after Schulte was released on bail after a September 13 hearing, WikiLeaks released no more Vault 7 files.

An April 2019 Bill of Particulars released last month strongly suggests there may be a tie between Schulte’s Tor activities starting on November 16, 2017. The document suggests that Schulte may have met with someone on November 8, 2017, then lied to the FBI or prosecutors about it 8 days later. Among the four lies the government described to substantiate False Statements and Obstruction charges in his indictment, it explains,

On or about November 16, 2017, Schulte falsely described his trip to a court appearance from the vicinity of Grand Central Terminal to the vicinity of the courthouse, and also falsely claimed to have been approached on the way to that court appearance by an unknown male who allegedly stated, in substance and in part, that he knew that Schulte had been betrayed and bankrupted by the U.S. Government.

This incident almost certainly happened on November 8. As noted, he was arrested on August 24, 2017. He was denied bail at first (so remained in jail). But when he was arraigned on the first (child porn) indictment on September 13, he was granted bail, including house arrest. While he would have had to check in with Parole Officers, the next “court appearance” he had (because the first status hearing got delayed a few times) — and the only court appearance before November 16 — was on November 8. He’d have gone to his first and second arraignment from jail; he was only out on bail to travel to a court appearance from his home for that first status conference.

It seems likely that an FBI surveillance team tracked Schulte on that day doing something suspect between the time he left his home and arrived at the courthouse. The mention of Grand Central suggests he may have met someone there, though that’s not dispositive because his apartment was just a few blocks away. But Schulte’s description of meeting a man he didn’t know, which the government alleges is false, seems like the kind of lie you’d tell if you were covering for meeting a man you did know. As noted, that probably happened on November 8.

On November 9, WikiLeaks released their single Vault 8 file.

Then, Schulte was asked, by some “law enforcement agents and/or prosecutor[] at the U.S. Attorney’s Office” about the incident on November 16.

That same day that he was interviewed about the incident on the way to the courthouse, November 16, he got on Tor for the first of five times, as laid out in his detention memo.

Separately, since the defendant was released on bail, the Government has obtained evidence that he has been using the Internet. First, the Government has obtained data from the service provider for the defendant’s email account (the “Schulte Email Account”), which shows that the account has regularly been logged into and out of since the defendant was released on bail, most recently on the evening of December 6, 2017. Notably, the IP address used to access the Schulte Email Account is almost always the same IP address associated with the broadband internet account for the defendant’s apartment (the “Broadband Account”)—i.e., the account used by Schulte in the apartment to access the Internet via a Wi-Fi network. Moreover, data from the Broadband Account shows that on November 16, 2017, the Broadband Account was used to access the “TOR” network, that is, a network that allows for anonymous communications on the Internet via a worldwide network of linked computer servers, and multiple layers of data encryption. The Broadband Account shows that additional TOR connections were made again on November 17, 26, 30, and December 5.

[snip]

First, there is clear and convincing evidence that the defendant has violated a release condition—namely, the condition that he shall not use the Internet without express authorization from Pretrial Services to do so. As explained above, data obtained from the Schulte Email Account and the Broadband Account strongly suggests that the defendant has been using the Internet since shortly after his release on bail. Especially troubling is the defendant’s apparent use on five occasions of the TOR network.

When it ultimately came time to explain away this use of Tor, Schulte pointed to a series of posts that would form part of what the government claims Schulte called an “information war” attempting to discredit the US government. That was first made broadly available when WikiLeaks posted it on June 19, 2018, the day after Schulte was charged with leaking the Vault 7 files.

The government alleges that a copy posted to Facebook later that year, on September 25, 2018, was posted by Schulte from his jail cell himself, using a contraband cell phone, which makes the WikiLeaks tweet part of Schulte’s deliberate information campaign from jail.

And around the same time Schulte posted his diaries from jail, the government claims, Schulte was prepping to send Wikileaks materials from a fake FBI agent attesting that the Bureau had framed Schulte by planting child porn on his computer.

iii. A document that appears to be an article for release by WikiLeaks.org (“WikiLeaks”), in which a purported FBI “whistleblower” claimed to have provided the discovery in this case to WikiLeaks and that the FBI had planted evidence of child pornography on Schulte’s computer to frame him (the “Fake FBI Document”).

[snip]

What appears to be a “to-do” list dated September 12, 2018, in which Schulte wrote that on September 17 and 18, he would “DL Disc. UL WL,” and.that on September 19, 20, and 21, he would “schedule tweets[.]” I believe that here, “DL Disc. UL WL” means that Schulte planned to download his discovery (”DL Disc.”) from the Schulte Laptop and upload that discovery to WikiLeaks (“UL WL”). As noted above, in another place in the Schulte Cell Documents, Schulte drafted the Fake FBI Document, a purported statement by a supposed FBI “whistleblower” who provided Schulte’s discovery to WikiLeaks and claimed that the FBI had planted evidence of child pornography on Schulte’s computer.

As I’ll show, Schulte gave WikiLeaks several claims it used to introduce the series in March 2017.

Then, several key events — an incident that probably occurred on November 8 which the government accuses Schulte of trying to cover up, WikiLeaks’ sole release of source code from the CIA, the interview at which Schulte allegedly lied about the November 8 incident, and some activity on Tor — makes it more likely the events are more than a coincidence.

And then WikiLeaks contributed early to Schulte’s “Information War,” and Schulte may have expected he could get WikiLeaks to cooperate again, with even more blatant disinformation.

That’s a fairly remarkable degree of coordination at a time when WikiLeaks was trying to coerce an Assange pardon and Schulte was (according to the government) trying to lie his way out of a great deal of legal trouble.

The Parts of the Mueller Report withheld from Roger Stone Show the Centrality of His WikiLeaks Activities to Trump’s Obstruction

Along with denying most of Roger Stone’s frivolous challenges to his prosecution, Amy Berman Jackson also partly granted his motion to get some of the redacted Mueller Report. As she laid out, she permitted the government to withhold grand jury information, sources and methods, stuff that would harm the reputation of others, and prosecutorial deliberations.

But the Court was of the view that the Report of the Special Counsel should receive separate consideration since a great deal of deliberative material within the Report had already been released to the public.

[snip]

Having considered the defendant’s motion, the government’s response and supplemental submissions, and the Report itself, the Court has determined that the defense should have the limited access he requested to some, but not all, of the redacted material.32 Insofar as defendant’s motion to compel seeks any material that was redacted from the public report on the basis that its release would infringe upon the personal privacy of third parties or cause them reputational harm; pursuant to Federal Rule of Criminal Procedure 6(e); or on the basis of national security or law enforcement concerns, including information that if revealed, could potentially compromise sensitive information gathering sources, methods, or techniques or harm ongoing intelligence or law enforcement activities, the Court will deny the motion.33 With respect to material that was withheld solely on the basis that its release could affect the ongoing prosecution of this case, the Court has concluded that the material to be specified in the order issued with this opinion should be provided to counsel for the defendant subject to the terms and conditions of the Protective Order in this case.

As she described, the government “submit[ed] unredacted portions of the Report that relate to defendant ‘and/or “the dissemination of hacked materials.”‘” Then she and the government conducted a sealed discussion about what could be released to Stone. In addition to her opinion, she submitted an order describing which specific pages must now be released to Stone.

We can compare what the government identified as fitting her order — this includes anything that fits the order, whether redacted or not — with what she has ordered released to Stone (note, the government either did not include Appendix D, showing referrals, or ABJ didn’t mention it, because in addition to an unredacted reference to Stone, there are referrals that the FOIA copies show to be related to Stone; nor did it include questions to Trump).

ABJ has not ordered the government to turn over anything pertaining to how GRU got stolen documents to WikiLeaks. This is precisely the kind of thing Stone is trying to get with his demands for Crowdstrike reports; after ABJ pointed out if they really wanted the reports, they would have tried subpoenaing Crowdstrike and they are now launching an attempt to do that. That ABJ has not ordered the government to turn this material over does not bode well for Stone’s plans to make this trial about the hack-and-leak rather than his lies. I would not be surprised if Stone made a second effort to get this information.

She has permitted the government to withhold all the prosecutorial decisions covered by her order except the one pertaining to Stone’s own lies. In addition, she let the government withhold one line about how they hadn’t determined whether or not Stone and Corsi had managed to optimize the release of the Podesta emails in October (though she did give Stone the more detailed discussion of that).

But ABJ has not included any of the references in the main part of Volume II in her order (presumably to protect Trump’s reputation!). That Volume includes three references to Trump and the campaign’s enthusiasm for or attempts to optimize the WikiLeaks releases through Stone, the reference to Richard Burr leaking news of the targets of the investigation (including Stone) to the White House before Jim Comey got fired, and three instances describing Trump floating pardons to Stone or otherwise encouraging him to remain silent.

It also includes the page on which this passage appears:

After Flynn was forced to resign, the press raised questions about why the President waited more than two weeks after the DOJ notification to remove Flynn and whether the President had known about Flynn’s contacts with Kislyak before the DOJ notification.244 The press also continued to raise questions about connections between Russia and the President’s campaign.245 On February 15, 2017, the President told reporters, “General Flynn is a wonderful man. I think he’s been treated very, very unfairly by the media.”246 On February 16, 2017, the President held a press conference and said that he removed Flynn because Flynn “didn’t tell the Vice President of the United States the facts, and then he didn’t remember. And that just wasn’t acceptable to me.” 247 The President said he did not direct Flynn to discuss sanctions with Kislyak, but “it certainly would have been okay with me if he did. I would have directed him to do it if I thought he wasn’t doing it. I didn’t direct him, but I would have directed him because that’s his job.”248 In listing the reasons for terminating Flynn, the President did not say that Flynn had lied to him.249 The President also denied having any connection to Russia, stating, “I have nothing to do with Russia. I told you, I have no deals there. I have no anything.”250 The President also said he “had nothing to do with” WikiLeaks’s publication of information hacked from the Clinton campaign.251 [my emphasis]

Clearly, it was included for Trump’s public denials — at the moment he fired Flynn in an attempt to stop the Russian investigation — of having anything to do with WikiLeaks’ publication of materials stolen from Hillary’s campaign. It is, on its face, a reference to the publication of the stolen emails, and as such qualifies under ABJ’s order. At that level, it is unremarkable.

But the government is treating it not as Trump making empty denials, but instead to make a claim specifically disavowing any involvement in WikiLeaks’ publication of stolen emails. Mueller’s team put the claim right next to a claim we know to be false, a claim designed to hide his Trump Tower deals. And he put all that amid a discussion of why he first did not, and then did, fire Mike Flynn.

Now consider something else: While it doesn’t appear in the Mueller Report at all, one thing Flynn told prosecutors was that after WikiLeaks started dumping John Podesta’s emails, he took part in conversations during which the campaign discussed reaching out to WikiLeaks.

The defendant also provided useful information concerning discussions within the campaign about WikiLeaks’ release of emails. WikiLeaks is an important subject of the SCO’s investigation because a Russian intelligence service used WikiLeaks to release emails the intelligence service stole during the 2016 presidential campaign. On July 22, 2016, WikiLeaks released emails stolen from the Democratic National Committee. Beginning on October 7, 2016, WikiLeaks released emails stolen from John Podesta, the chairman of Hillary Clinton’s 2016 presidential campaign. The defendant relayed to the government statements made in 2016 by senior campaign officials about WikiLeaks to which only a select few people were privy. For example, the defendant recalled conversations with senior campaign officials after the release of the Podesta emails, during which the prospect of reaching out to WikiLeaks was discussed.

There’s nothing in the public record that suggests Flynn knew of Trump’s efforts, during the campaign, to build a Trump Tower. But he did know about Trump’s efforts to optimize WikiLeaks’ releases of stolen emails. And Trump would have known that when he considered the impact of Flynn’s ties to Russia being investigated by the FBI.

And the treatment of that references as a real denial — as Trump evincing guilt even as he fired Flynn — sure makes the Flynn firing more interesting.