Ockham’s Cut: How the Andrew McCabe Notes Were Doctored

Some weeks ago, I asked for help understanding the irregularities of the Andrew McCabe notes. Among other observations, two people showed that the notes had been created in layers, with the redaction of the protective order footnote seemingly added twice. Since then, longtime friend of the site “William Ockham” has done more analysis (he was the tech expert identified in the second post), and determined that the file must have been made as part of a multi-step process. I share his analysis here. The italics, including the bracket, are mine, the bold is his.

Here’s what I can say about the McCabe notes. The easiest way to explain this is to think about the ancestral tree of the images that are embedded in the documents we have. It all starts with the original page from McCabe’s notes (Generation 0).

Someone scanned that page to create an unredacted image file (Gen 1).

That image was printed (Gen 2). {From a technical point of view, this is what happens when a page is copied on a modern copy machine. Based on the evidence I have, I’m fairly sure that a digital image of the original page must exist. If not, it sucks to be the FBI.)

An analog redaction (probably with a black Sharpie or similar instrument) was applied. I strongly suspect that the date was added to the same physical page before it was rescanned. It’s possible, although I consider it very unlikely, that the date was added after the physical page was rescanned. These original redactions aren’t totally black the way they would be if done with the DoJ’s redaction software. In any event, this rescanned image is Gen 3.

That physical page with the date was scanned to an image file (Gen 4).

At this point, a PDF file  that will become 170510-mccabe-notes-jensen-200924.pdf is created by embedding the Gen 4 image and saving the file as a PDF. Then, a separate process adds the words “SUBJECT TO PROTECTIVE ORDER” and “DOJSCO – 700023502” to the metadata inside the file and draws the words in a font called “Arial Black” at the bottom of that page and the file is saved again. ***I am 100% certain that a PDF was created exactly like I describe here***

Update from Ockham to describe how the redaction shows up in the DOJ footnote:

A PDF file is really a software program that has instructions for rendering one or more pages. An image similar to the one above [Gen 4] was turned into a PDF file which contained one set of instructions:

  1. Store about 1 megabyte of compressed data.
  2. Take that data and render an image by interpreting the data as an 8bit per pixel grayscale image 1710 pixels wide by 2196 pixels high (at normal 96 pixels per inch, 17.81 in by 22.87 in, so obviously scanned at a much higher resolution)
  3. Scale that image so it takes up an entire 8 ½ by 11 page
  4. Render the image

Then, an automated process adds the footer. The part of the instructions for rendering the Bates number are still in the document and look like this:

Operation Description Operands
Dictionary E.g.: /Name << … >> /Artifact<</Contents (DOJSCO – 700023502)/Subtype /BatesN /Type /Pagination >>
BDC (PDF 1.2) Begin marked-content sequence with property list
q Save graphics state
cm Concatenate matrix to current transformation matrix 1001458.234985434.7999268
gs (PDF 1.2) Set parameters from graphics state parameter dictionary /GS0
Tr Set text rendering mode 0
Tf Set text font and size /T1_031.5 [This is a pointer to a font name and size, Arial Black – 18PT]
Do Invoke named XObject /Fm0 [This is a pointer to the actual text and location to render it
Q Restore graphics state
EMC (PDF 1.2) End marked-content sequence

Originally, there would have been a similar set of instructions for the “SUBJECT TO PROTECTIVE ORDER” part as well. They would have looked almost the same except for the “Artifact” operands, the actual text, and the positioning instruction.

Now, here’s the really important part. The DoJ redaction software presents the rendered PDF file to the end user. However, it operates on the actual PDF by rewriting the instructions. When the user drew the rectangle around the words “SUBJECT TO PROTECTIVE ORDER”, the redaction software has to find every instruction in the PDF that made changes to the pixels within the coordinates of the rectangle. The redaction software sees two “layers” of instructions that affect the rectangle, the text writing instructions and the image itself. The redaction software removes all the instructions for writing the text and replaces those instructions with instructions to draw a black box in the same place. Then, it also blacks out the pixels in the image itself. It has to do both of those things to ensure that it has removed all of the redacted information, even though in this case it didn’t really need to do both.

Then someone at the DoJ opens the PDF and redacts the words “SUBJECT TO PROTECTIVE ORDER” from the page. The redaction does all of the following things:

  • It removes the metadata entry with the words “SUBJECT TO PROTECTIVE ORDER”,
  • It removes the commands that draw the words.
  • It replaces those commands with commands that draw a black rectangle the same size as the rendered words.
  • It replaces the pixels in the Gen 4 image that correspond to the area of the image that the words were drawn on top of with solid black pixels.

Those last two steps create two very slightly offset redaction boxes. The slight offset is caused by errors caused by using floating point math to draw the same shape in two different coordinate systems. Step 4 creates an image which I’ll call Gen 5 which can be extracted from 170510-mccabe-notes-jensen-200924.pdf.

When someone notices that this file and the Strzok notes have been altered, Judge Sullivan asks for the unaltered versions.  Jocelyn Ballantine has a problem. There’s no redacted version of McCabe’s notes without the added date. She can’t use the DoJ’s redaction software because that would look even worse (a big black rectangle where the date was added).  What’s a stressed out assistant US Attorney to do? Here’s what she did. She took the unredacted PDF file I mentioned above and converted it to an image. Then she used image editing software to remove the date, which made that rectangle of white pixels. She fires up Microsoft Word on her DoJ work computer and starts creating a new document (likely from a template designed creating exhibit files). The first page just says Exhibit A and on the second page (which has all margins set to 0) she pastes in the image she just created, scaled to fit exactly on the page. Without saving the Word file, she prints the document (using the Adobe Distiller print driver) to PDF and submits the printed file as the supposedly unaltered McCabe notes. [Gen 6]

It seems like these steps look like this:

Gen 0: FBI had or has McCabe’s original notes presumably stored with his other documents.

Gen 1:  Someone took the notes from there and scanned them, presumably to share with other investigators.

Gen 2: Someone printed out Gen 1 and made notes and otherwise altered them. This is the stage at which the government claims someone put a sticky note with a date on the notes, but it appears they just wrote the date on the notes themselves. If everything had been operating normally, however, when Judge Sullivan asked for unaltered copies of the documents, they could have used the Gen 1 copy to resubmit. They didn’t do so, which suggests the chain of custody may have already been suspect. Some possible explanations for that are that Jeffrey Jensen’s team received the document from either DOJ IG or John Durham’s investigation, not directly from the FBI files. That wouldn’t be suspect from the standpoint of DOJ internal workings, but it would be proof that DOJ knew the documents they relied on in their motion to dismiss had already been reviewed by Michael Horowitz or Durham’s teams, and found not to sustain the conspiracies that Billy Barr needed them to sustain to throw out Flynn’s prosecution (or that DOJ claimed they sustained in the motion to dismiss).

Gen 3: I think Ockham is viewing the creation of the image file in two steps. First, a scan of the file with the note written on it is made, which is Gen 3.

Gen 4: Then, probably before the file is handed off to Jocelyn Ballantine to “share” with Mike Flynn’s team (I’m scare-quoting because I suspect there may have been a back channel as well), the redaction is created for where the protective order stamp would go. Here’s what Gen 4 would have looked like:

Gen 5: Gen 4 is then prepared as an exhibit would normally be, by putting it into a PDF and adding the Bates number and protective order stamp, then redacted the latter. Reminder: The protective order footer was also redacted from (at least) the two altered Strzok notes, as I show here.

Gen 6: When Peter Strzok and McCabe tell Sullivan that their notes have had dates added, DOJ re-releases the notes such that the notes are no longer added but the redacted footnote is. As Ockham notes (and as I think everyone who looked closely at this agrees) the date is not removed by taking off a post-it. Instead, it is whited out digitally, leaving a clear mark in the exhibit.

One reason this is so interesting — besides providing more proof that DOJ went to some lengths to make sure a version of these notes did not include the protective order, freeing Sidney Powell to share it with Jenna Ellis and whomever else she wanted, so they could prepare campaign attacks from it — is that DOJ refused to say who added the date to McCabe’s notes. As I noted in my own discussion here, one possible explanation why DOJ kept redacting stuff rather than going back to the original (other than having to submit the file for formal declassification and the post-it hiding other parts of the document) is because the chain of custody itself would undermine the claims DOJ has made in the motion to dismiss, by making it clear that someone had already reviewed this document and found no criminal intent in the document.

The other problem with this multi-generation alteration of Andrew McCabe’s notes is, if anyone asks, it is going to be very difficult for anyone involved to disclaim knowledge that these documents were altered. Mind you, Ballantine already has problems on that front: I emailed her to note that the FBI version of Bill Barnett’s “302” she shared redacted information that was material to Judge Sullivan’s analysis, the positive comments that Barnett had for Brandon Van Grack. So if and when Sullivan asks her why DOJ hid that material information from him, she will not be able to claim she didn’t know. Then there’s her false claim — which both Strzok and McCabe’s lawyers have already disproved — that the lawyers affirmed that no other changes had been made to the notes.

But if this file was prepared as Ockham describes, then both DOJ and FBI will have a tough time claiming they didn’t know they were materially altering documents before submitting them to Judge Sullivan’s court.

Updated with some corrections from Ockham.

Trump’s Pardon Jenga, Starting with the Julian Assange Building Block

I was going to wait to address Trump’s likely use of his power of clemency in the days ahead until it was clear he was going to leave without a fight and I will return to it once that’s clear. But there have already been a slew of pieces on the likely upcoming pardons:

None of them mentions Julian Assange (though Graff does consider the possibility of a Snowden pardon, which I consider related, not least for the terms on which Glenn Greenwald is pitching a package deal as a way for Trump to damage the Deep State).

I would argue that unless a piece considers an Assange pardon, it cannot capture the complexity facing Trump as he tries to negotiate a way to use pardons (and other clemency) to eliminate his legal exposure itself.

I’m not saying Trump’s decision on whether to give Assange a pardon is his hardest decision. But it may be one a few that could bring any hope of protecting himself falling down.

Trump has talked about pardons, generally, covering a number of crimes in which he himself (or a family member) is implicated:

  • Asking DHS officials to violate the law in order to build the wall
  • Working with the National Enquirer to capture and kill damaging stories during the 2016 election
  • Dodging impeachment
  • Steve Bannon’s Build the Wall grift (which likely implicates Jr)

There are others whom Trump would give a pardon because they’re loyal criminals, like Ryan Zinke or Commerce Officials and others who’ve lied in court. There are hybrid cases; in addition to Bannon, Erik Prince has legal exposure both for his own lies that protected Trump, but also for his efforts to sell mercenary services to hostile foreign governments. And Rudy Giuliani has committed his own crimes as well as possible crimes to protect the President. With the possible exception of Rudy (who still might claim attorney client privilege to refuse to testify about Trump), those pardons create challenges, but they’re highly likely (unless Trump made some pardons contingent on remaining in power).

Then there’s the Mueller Report. In 2019 testimony to HPSCI, Michael Cohen credibly described Jay Sekulow considering mass “pre-pardons” in the summer of 2017 in an attempt to make the Russian investigation go away. But the Mueller Report itself only obviously talks about five pardons:

  • An extensive discussion of the reasons why pardons for Mike Flynn, Paul Manafort, and Roger Stone would amount to obstruction (a sentiment with which Billy Barr once agreed)
  • A discussion of Robert Costello’s efforts to broker silence from Cohen in exchange for a pardon and almost certainly a still-redacted referral of Costello for the same; Costello is currently Rudy Giuliani’s attorney
  • A question about discussions of a Julian Assange pardon, even while the report did not mention or obscured the tie with underlying evidence proving such an effort occurred, possibly as a part of a quid pro quo to optimize the WikiLeaks releases

There are difficulties — albeit surmountable ones — for pardons of Flynn and Manafort, not least because Billy Barr has found other ways for Trump to keep them out of jail (so far), even while issuing a DOJ ruling that his prior pardon dangles are not obstruction. Costello is someone who has no privilege directly with Trump and so might implicate him personally in trading pardons for silence if Trump himself is not pardoned.

But Stone (and quite possibly Don Jr) is indelibly tied to an Assange pardon.

It’s possible something might make this easier between now and January 20. If British Judge Vanessa Baraister rules on January 4, 2021 in favor of Julian Assange’s Lauri Love gambit, arguing that American prisons are not humane for those on the autism spectrum, then there’s a decent chance he’ll beat extradition. If not, his chances are slim. And even if he beats extradition the UK could choose to prosecute him on Official Secrets Act charges tied to Vault 7.

That presents Trump limited choices. He could pardon just Stone (and Don Jr, who will undoubtedly get a broad pardon in any case). But then both could be coerced to testify against Assange under threat of contempt or perjury from a Biden DOJ.

He could pardon all three, including a broad pardon (including Vault 7) for Assange. But if he did that, it could complete the conspiracy, a quid pro quo tied to Russian interference in 2016. That would make a Pence pardon of Trump much more politically costly; it would likewise make a Trump self-pardon much more toxic for even a very partisan SCOTUS to rubber stamp.

But if he doesn’t pardon Assange, he risks pissing of those who helped him in 2016, with whatever repercussions that would have for Trump Organization funding going forward. To sum up:

  • Pardoning just Stone and Jr would expose them to coercion to testify against Assange and maybe others
  • Pardoning all three would make Trump’s own pardons much less defensible to those who would have to ensure he himself got immunity
  • Pardoning Assange at all would complete the conspiracy Mueller never charged
  • Not pardoning Assange might risk ire from Russia

I’m not saying he can’t find a way out of this dilemma. But it is one of the reasons why Trump’s pardon gambit is far more complex than others are accounting for.

Convergence: Mueller Obstruction, Ukrainian Favors, and DOJ’s Altered Documents

Amid uncorrected false claims about election results and tweets inciting violence in DC, Donald Trump tweeted this last night.

After respectable law firms withdrew in AZ and PA, Trump’s legal team is now down to Rudy, DiGenova and Toensing, Sidney Powell, and Jenna Ellis, along with “other wonderful lawyers” whom he did not name.

Finally, the grand convergence: Trump’s obstruction of the Mueller investigation into Trump’s “collusion” with Russia, his demand that Ukraine’s President Volodymyr Zelensky “do him a favor” by inventing an investigation of Joe Biden, and the Billy Barr-led effort to blow up Mike Flynn’s prosecution for covering up Trump’s efforts to undermine sanctions imposed for helping Trump to win. All one grand effort led by lawyers barely clinging to reality.

That’s not a unique observation. Many people are making it (along with laughing at the sorry state of affairs for Trump, a glee that may be premature).

But it’s worth focusing on the relationship between Jenna Ellis and Powell. As I have noted repeatedly, when Judge Emmet Sullivan asked Powell whether she had been in direct contact with Trump about Mike Flynn’s case, she not only confessed to that, but also admitted multiple contacts with Trump’s campaign lawyer, Ellis. That means Ellis is directly implicated in whatever effort there was to alter documents to launch a false attack on Joe Biden, one intimately tied to DOJ’s false excuses (that the investigation was primarily about the Logan Act) for wanting to blow up the Flynn prosecution.

That is, the effort to throw out the Mike Flynn prosecution (about which the lawyers have mostly gone silent, post-election) was all part of an effort to obtain power via illegitimate means. And still is.

Andrew McCabe’s Comments about Trump More Likely Reference What an Easy Mark Russia Thinks He Is than Any (Unexpected) Thing He Did

Andrew McCabe was on Chris Cuomo’s show last night, talking about Trump’s reported plan to release more sensitive intelligence about the Russian investigation. A number of people have asked me about it, so I thought I’d talk about what he did and did not say. First, my transcription:

Cuomo: … the next leading theory, other than just payback, is he wants a lot of stuff from the Russia investigation declassified because he’s been told by Nunes and others, “the more comes out the more it would look you were framed.” Uh, what’s the risk there, if a lot of stuff comes out? We’ve talked about sources and methods. But let me reverse the question: from your knowledge, is there anything that could come out that people would look at it and say, “Wow, I can’t believe they ever included the President in this analysis. He and his people clearly did nothing.”

McCabe: There is some very, very serious, very specific undeniable intelligence that has NOT come out that, if it were released, would risk compromising our access to that sort of information in the future. I think it would also risk casting the President in a very negative light. So does it — would he have a motivation to release those things? It’s almost incomprehensible to me that he would want that information out. I don’t see how he spins it to his advantage because, quite frankly, I don’t believe it’s flattering.

Cuomo: You think there’s more bad stuff about him that we don’t know?

McCabe: There is always more intelligence — there was a lot more in the intelligence community assessment than what was ever released for public consumption. I mean, the original version of that report was classified at the absolute highest level I have ever seen. You’re talking about Top Secret, Compartmentalized Code Word stuff, and it would be ver–it would be tragic to American intelligence collection for those sources to be put at risk.

First, note that McCabe at first didn’t answer Cuomo’s question, which was basically whether there was anything that would substantiate Trump’s claims to have been framed. Instead, he first says that there’s stuff that if it were released, would have a permanent impact on US intelligence collection. Only after saying that does McCabe say there’s stuff that McCabe doesn’t believe is “flattering” that would “risk casting the President in a very negative light.” Cuomo picks up on that and asks if there’s more bad stuff about Trump that we don’t know (as if CNN has covered even the public stuff that puts Trump in a very bad light, which they have not). McCabe responds by addressing only the Intelligence Community Assessment completed by early January 2017. He then describes the ICA using terms that describe the most sensitive stuff coming from a variety of different collection sources, without specifically saying that this is about Trump, or if it is, whether it involves something that Trump did rather than something that was said about Trump.

Moreover, McCabe is talking about stuff that was available by January 6, 2017, not stuff that became available by May 2019, when Mueller shut down his office. He’s talking about stuff that, because CIA and NSA were key parts of the collection effort, could not be targeted at Trump, but instead would be targeted at Russians.

It’s possible this stuff refers to more compromise by women. After all, the SSCI Report (which benefitted more from CIA and NSA information than it did from FBI information) found more examples — three — than were known about Trump’s possible sexual compromise when in Russia, and the section is preceded by two redacted pages.

It may also include details about Trump’s 2013 trip associated with Miss Universe, which the SSCI Report also provides damning new details about.

Another likely topic pertains to Russia’s profiling of Trump as a potential asset. The SSCI Report leaves his usefulness as a money laundering vehicle almost unmentioned and similarly limits mention of Trump’s ties to the mob (though it does include the latter in several places, such as this discussion of his 2013 trip and this discussion of warnings about the Agalarovs). But if the IC had the kind of collection as sensitive as McCabe says, it likely includes discussions of how easy it would be to stoke Trump’s narcissism to get him to work contrary to America’s interests.

There’s one more thing it likely includes. As I observed when it came out, the Mueller Report does not discuss — at all — Trump’s interactions directly with Putin, not even his meeting at the G20 where they discussed adoptions in advance of Trump crafting a June 9 denial for his failson that focused on adoptions. In my never-ending fascination with what gets classified, the Andrew Weissmann book also makes no mention of that meeting, even though he discusses the adoption cover story at length. If that weren’t really sensitive, he should have been able to argue that the meeting was public, not least given that Trump confessed it himself in an NYT interview. Trump and Putin are not known to have met before he became President. Nevertheless, there must be a corpus of intelligence of “about” collections in which Trump’s cultivation by Putin are discussed.

Still, most of that isn’t about what Trump did — aside the same financial corruption and serial sexual philandering he has done in the US. It’s about what Russia thinks of Trump. Which is consistent with it not being “flattering” rather than being described as “damning.”

McCabe doesn’t talk about the damning information that FBI would have found between the time the ICA came out and the time the investigation into his closest associates ramped up. And that stuff is likely more interesting.

Roger Stone’s 2016 “Stop the Steal” Effort May Have Been Coordinated with Russia

CNN has traced out in detail what I’ve been noting for some time: the “Stop the Steal” effort ginning up disinformation and threats of violence in the wake of Donald Trump’s loss is a repackaged version of an effort that Roger Stone rolled out in 2016.

[W]hile Stop the Steal may sound like a new 2020 political slogan to many, it did not emerge organically over widespread concerns about voting fraud in President Donald Trump’s race against Joe Biden. It has been in the works for years.

Its origin traces to Roger Stone, a veteran Republican operative and self-described “dirty trickster” whose 40-month prison sentence for seven felonies was cut short by Trump’s commutation in July.

Stone’s political action committee launched a “Stop the Steal” website in 2016 to fundraise ahead of that election, asking for $10,000 donations by saying, “If this election is close, THEY WILL STEAL IT.”

But CNN — with four journalists bylined — misses several important parts of that earlier story, parts that are critical to understanding the stakes for Steve Bannon and Stone now.

Stone may have mixed his political fundraising

First, there’s good reason to believe that Stone was not segregating the different kinds of campaign finance organizations he was using for his 2016 rat-fucking. Even from what remained of his public infrastructure when I wrote this post, it showed that fundraising for one kind of dark money group went to links associated with a PAC.

[I]t’s clear he wasn’t segregating the fundraising for them, and I wonder whether some of his email fundraising involved other possible campaign finance violations. For example, here’s the Stop the Steal site as it existed on March 10, 2016. It was clearly trying to track fundraising, carefully instructing people to respond to emails if they received one. But it claimed to be TCTRAG (what I call CRAG), even though the incoming URL was for Stop the Steal.

That remained true even after Stop the Steal was formally created, on April 10. Even after the website changed language to disavow Stop the Steal being a PAC by April 23, the fundraising form still went to TCTRAG (what I call CRAG), a PAC.

In other words, people would click a link thinking it would fund one effort (and one kind of legal entity) and any money donated would instead go to another effort (and another kind of legal entity). Since then, we’ve learned more about how everyone associated with Trump — Corey Lewandowski, Paul Manafort, and Brad Parscale, in addition to Stone — set up these entities to get rich off of Trump. It’s one reason the rivalry between Lewandowski and Manafort was so heated: because one’s relative prominence in Trump’s campaign effort was directly related to the amount of money that one could grift from it.

But as Bannon’s indictment for fraud makes clear, telling people they’re donating money for one purpose (to build a wall) but using the money for other purposes (to support Bannon’s pricey lifestyle) can be prosecuted as fraud.

When Andrew Miller was negotiating testimony about Stone, he specifically asked for immunity relating to Stone’s PACs and his texts with Stone that the government subpoenaed after his grand jury appearance overlapped with that campaign slush.

In 2016, Stone was (illegally) coordinating with the campaign

As appears to have been the case for all these efforts to grift off the campaign, Stone was coordinating his PAC and dark money efforts with the campaign.

We learned that, in Stone’s case, starting with a legal debate in the lead-up to Stone’s trial about 404(b) information, which is information about other bad actions (including crimes) that prosecutors are permitted to introduce during a trial to prove something like motive or consistent behavior.

In advance of Stone’s trial prosecutors got permission to introduce evidence that Stone lied about something in his HPSCI testimony, on top of all the lies about who his go-between with WikiLeaks was, only that other lie wasn’t charged.

At the pretrial conference held on September 25, 2019, the Court deferred ruling on that portion of the Government’s Notice of Intention to Introduce Rule 404(b) evidence [Dkt. # 140] that sought the introduction of evidence related to another alleged false statement to the HPSCI, which, like the statement charged in Count Six, relates to the defendant’s communications with the Trump campaign. After further review of the arguments made by the parties and the relevant authorities, and considering both the fact that the defendant has stated publicly that his alleged false statements were merely accidental, and that he is charged not only with making individual false statements, but also with corruptly endeavoring to obstruct the proceedings in general, the evidence will be admitted, with an appropriate limiting instruction. See Lavelle v. United States, 751 F.2d 1266, 1276 (D.C. Cir. 1985), citing United States v. DeLoach, 654 F.2d 763 (D.C. Cir. 1980) (given the defendant’s claim that she was simply confused and did not intend to deceive Congress, evidence of false testimony in other instances was relevant to her intent and passed the threshold under Rule 404(b)). The Court further finds that the probative value of the evidence is not substantially outweighed by the danger of unfair prejudice.

Judge Amy Berman Jackson permitted prosecutors to include it because it showed that Stone was trying to cover up all of his coordination with the campaign.

A September hearing about this topic made clear that it pertained to what Stone’s PACs were doing.

Assistant U.S. Attorney Michael J. Marando argued that Stone falsely denied communicating with Trump’s campaign about his political-action-committee-related activities, and that the lie revealed his calculated plan to cover up his ties to the campaign and obstruct the committee’s work.

This debate suggested prosecutors could present the information via just one witness, but unless I’m misunderstanding, it actually came in via two witnesses: There were a number of texts between Rick Gates and Stone where Stone kept demanding lists from the campaign (indeed, this is something that Stone’s lawyers actually emphasized!). And during the period when Bannon was campaign manager, Stone asked him to get Rebekah Mercer to support some of his other activities, designed to suppress the black vote.

Both of these communications show that Stone was at least attempting to coordinate his efforts with the campaign (it’s not clear to what degree Gates responded to Stone’s demands), and the second detail shows that he was coordinating with Bannon, the guy who took over the Stop the Steal effort this year.

This kind of coordination is illegal (albeit common), though Billy Barr’s DOJ refused to prosecute Trump for any of it (and he even appears to have shut down an investigation into what appeared to be a kickback system Manafort used to get paid).

Stone’s Stop the Steal efforts paralleled the voter suppression efforts of the Russian operation

Even back when I examined Stone’s Stop the Steal efforts in 2018 (when I was skeptical about his legal liability with respect to WikiLeaks), it was clear that the steps Stone took happened to coincide with Russia’s efforts.

Stone’s voter suppression effort is not surprising. It’s the kind of thing the rat-fucker has been doing his entire life.

Except it’s of particular interest in 2016 because of the specific form it took. That’s because two aspects of Stone’s voter suppression efforts paralleled Russian efforts. For example, even as Stone was recruiting thousands of “exit pollers” to intimidate people of color, Guccifer 2.0 was promising to register as an election observer, in part because of the “holes and vulnerabilities” in the software of the machines.

INFO FROM INSIDE THE FEC: THE DEMOCRATS MAY RIG THE ELECTIONS

I’d like to warn you that the Democrats may rig the elections on November 8. This may be possible because of the software installed in the FEC networks by the large IT companies.

As I’ve already said, their software is of poor quality, with many holes and vulnerabilities.

I have registered in the FEC electronic system as an independent election observer; so I will monitor that the elections are held honestly.

I also call on other hackers to join me, monitor the elections from inside and inform the U.S. society about the facts of electoral fraud.

More interesting still, the GRU indictment makes it clear that GRU’s information operation hackers were probing county electoral websites in swing states as late as October 28.

In or around October 2016, KOVALEV and his co-conspirators further targeted state and county offices responsible for administering the 2016 U.S. elections. For example, on or about October 28, 2016, KOVALEV and his co-conspirators visited the websites of certain counties in Georgia, Iowa, and Florida to identify vulnerabilities.

Whether or not GRU ever intended to alter the vote, Russia’s propagandists were providing the digital “proof” that Republicans might point to to sustain their claims that Democrats had rigged the election.

This is a line that Wikileaks also parroted, DMing Don Jr that if Hillary won his pop should not concede.

Hi Don if your father ‘loses’ we think it is much more interesting if he DOES NOT conceed [sic] and spends time CHALLENGING the media and other types of rigging that occurred—as he has implied that he might do.

Since that time, we’ve learned that Maria Butina and Sergey Kislyak were also aiming to focus on observing polls in 2016. We’ve learned that the GRU hackers were actually targeting conservative Florida counties in 2016 (including Matt Gaetz’s district), meaning that had Trump lost he might have turned to the hacking of GOP strongholds to claim that that hacking had undermined his vote totals in Florida.

There are also indications that Mueller was pursuing evidence that not only Stone, but also Paul Manafort, had advance notice of all this. For example, Manafort got asked about Russians hacking voting machines in regards to a November 5, 2016 note he sent to the campaign regarding “Securing the Victory” (which admittedly is a slightly different topic but one that might have elicited an answer about hacking the Boards of Election if Manafort were at all inclined to tell the truth, which he was not).

All of which is to say that, had Hillary won narrowly (as Biden won by close margins in enough states to amount to a resounding victory), we probably would have seen Stone’s Stop the Steal effort to be doing precisely what Bannon’s Stop the Steal has been doing this year, both delegitimizing the outcome and sowing violence. But in that case, the effort may have been accompanied by possible foreknowledge that a close investigation of certain GOP strongholds would disclose proof of tampering in the election.

Stone pitched Bannon on a way to win ugly the day he became Campaign Manager

At this point, I’ve come to believe that prosecutors used their live witnesses at Stone’s trial (aside from former FBI Agent Michelle Taylor, who introduced most of the evidence) to make certain testimony public regarding other investigative prongs. For example, prosecutors got Gates to testify publicly that Stone claimed involvement in the release of stolen emails at a time when only Guccifer 2.0 was releasing them, not WikiLeaks. Prosecutors got Randy Credico to confirm publicly that shortly after the election, he helped Stone try to pay off his election debt by pardoning Julian Assange.

And prosecutors got Steve Bannon to — very reluctantly — repeat grand jury testimony that he regarded a pitch that Stone made to him the day after he became campaign manager to be related to dirty tricks and WikiLeaks.

Prosecutors introduced a similar exchange with Steve Bannon, the guy who took over from Manafort weeks later: an August 18, 2016 email exchange  where Stone claimed Trump could “still win” … “but it ain’t pretty,” and Bannon responded by asking to talk ASAP.

Manafort didn’t testify at Stone’s trial. But Bannon did. Prosecutors had Bannon sitting there on the stand, forcing him to repeat what he had said to a grand jury earlier in the year, yet they only asked him to say this much about what all this means, in which he begrudgingly admitted he believed this discussion about using social media to win was about WikiLeaks:

Q. At the bottom of this email Mr. Stone states, “Trump can still win, but time is running out. Early voting begins in six weeks. I do know how to win this, but it ain’t pretty. Campaign has never been good at playing the new media. Lots to do, let me know when you can talk, R.” Did I read that correctly?

A. That’s correct.

Q. Then you respond, “Let’s talk ASAP”; am I correct?

A. That’s correct.

Q. When Mr. Stone wrote to you, “I do know how to win this but it ain’t pretty,” what in your mind did you understand that to mean?

A. Well, Roger is an agent provocateur, he’s an expert in opposition research. He’s an expert in the tougher side of politics. And when you’re this far behind, you have to use every tool in the toolbox.

Q. What do you mean by that?

A. Well, opposition research, dirty tricks, the types of things that campaigns use when they have got to make up some ground.

Q. Did you view that as sort of value added that Mr. Stone could add to the campaign?

A. Potentially value added, yes.

Q. Was one of the ways that Mr. Stone could add value to the campaign his relationship with WikiLeaks or Julian Assange?

A. I don’t know if I thought it at the time, but he could — you know, I was led to believe that he had a relationship with WikiLeaks and Julian Assange.

Even though prosecutors didn’t lay out precisely what happened next — something that other evidence suggests may have implicated Jared Kushner — Stone’s team never challenged the prosecution claim that this email and the subsequent exchanges did pertain to WikiLeaks. Perhaps, because they had reviewed Bannon’s grand jury and more recent testimony, they knew how he would respond and thought better off leaving it unchallenged.

Perhaps, too, they didn’t want to have to explain how long this exchange persisted. For example, the Stone affidavits — starting with one obtained after Bannon’s first testimony — showed this particular email exchange lasted two more days, through August 19 and 20 (the day before the Podesta “time in the barrel” tweet).

On August 19, 2016, Bannon sent Stone a text message asking if he could talk that morning. On August 20, 2016, Stone replied, “when can u talk???”

And those discussions may have continued into face-to-face meetings in September.

On September 4, 2016, Stone texted Bannon that he was in New York City for a few more days, and asked if Bannon was able to talk.

[snip]

On September 7, 2016, Stone and Bannon texted to arrange a meeting on September 8, 2016 at the Warner Center in New York.

On September 7, 2016, Bannon texted Stone asking him if he could “come by trump tower now???”

On September 8, 2016, Stone and Bannon texted about arranging a meeting in New York.

This is a lot of back-and-forth to discuss the “the tougher side of politics.”

Even though they had Bannon there on the stand, prosecutors did not get him to explain what this plan to win ugly entailed. So we don’t know whether it pertained to Stone’s efforts to suppress the black vote, his Stop the Steal effort to discredit a potential Hillary win, or something more (I’ll eventually get around to what that something more might be). But we do know that when Bannon enthusiastically responded to those pitches, he expected Stone’s plan to win ugly would involve dirty tricks and WikiLeaks.

Stone’s real go-between with WikiLeaks was likely Guccifer 2.0

No one involved with the Trump campaign — at least as far as is public — claims to have known who Stone’s claimed tie to WikiLeaks was.

But Rick Gates apparently did testify that Stone claimed to have a tie to Guccifer 2.0 well before the time he was DMing with the persona on Twitter. The FBI had evidence (though how good it is remains inconclusive) that he was searching on both Guccifer 2.0 and dcleaks before those sites went live. When prosecutors wrote the Mueller Report in March 2019, they still had not determined whether any proof they had of Stone’s awareness of Russia’s ongoing hacking — which extended until November 2016 — was sufficient proof beyond reasonable doubt to charge him as part of the hack-and-leak conspiracy.

As I have argued, there is evidence, albeit not conclusive, that Stone’s go-between with WikiLeaks was Guccifer 2.0.

If that’s right, it suggests that Stone’s parallel efforts with Guccifer 2.0’s, efforts that seemingly anticipated hacks that might have served to discredit the vote in 2016, may not have been coincidence or even just a result of the seeming dance via which Trump’s team and Russia followed the same path without any coordination. It may have reflected coordination.

Let me very clear: I’m not making any claims that happened this year. There’s no evidence of it, and those who tracked election tampering efforts have said they found none.

But until Billy Barr intervened in Stone’s sentencing, all this was (at least per FOIA redactions) an ongoing investigation, the investigation that Stone’s prosecution served, in part, as an investigative step in. If you put that together with Bannon’s own legal exposure in the Build the Wall fraud indictment, it changes the stakes on these men’s efforts to curry Trump’s favor (and to ensure he remains in power, via whatever means).

If Trump remains in charge of DOJ, these men will stay out of prison. If he doesn’t, they may not. And for Stone, especially, a Joe Biden DOJ (or a Democratic Congress, with DOJ’s help) may reveal what he has been denying for years, that Stone willingly coordinated during the 2016 election with someone whose ties to Russia were only thinly hidden.

Some Details of Mueller’s GRU Indictment You Probably Missed

When the Mueller team wrote the GRU indictment, they were hiding that Roger Stone might one day be included in it.

Last week,  DOJ unsealed language making it clear that, when Mueller closed up shop in March 2019, they were still investigating whether Roger Stone was part of a conspiracy with Russia’s GRU to hack-and-leak documents stolen from the Democrats in 2016.

The Office determined that it could not pursue a Section 1030 conspiracy charge against Stone for some of the same legal reasons. The most fundamental hurdles, though, are factual ones.1279 As explained in Volume I, Section III.D.1, supra, Corsi’s accounts of his interactions with Stone on October 7, 2016 are not fully consistent or corroborated. Even if they were, neither Corsi’s testimony nor other evidence currently available to the Office is sufficient to prove beyond a reasonable doubt that Stone knew or believed that the computer intrusions were ongoing at the time he ostensibly encouraged or coordinated the publication of the Podesta emails. Stone’s actions would thus be consistent with (among other things) a belief that he was aiding in the dissemination of the fruits of an already completed hacking operation perpetrated by a third party, which would be a level of knowledge insufficient to establish conspiracy liability. See State v. Phillips, 82 S.E.2d 762, 766 (N.C. 1954) (“In the very nature of things, persons cannot retroactively conspire to commit a previously consummated crime.”) (quoted in Model Penal Code and Commentaries § 5.03, at 442 (1985)).

1279 Some of the factual uncertainties are the subject of ongoing investigations that have been referred by this Office to the D.C. U.S. Attorney’s Office.

That means, eight months after they charged a bunch of GRU officers for the hack-and-leak, DOJ still hadn’t decided whether Stone had criminally participated in that very same conspiracy.

That raises questions about why they obtained the indictment before deciding whether to include Stone in it.

In his book, Andrew Weissmann provides an explanation for the timing of it.

A problem arose, however, when it came to the timing of this indictment. Having secured the Intelligence Community’s and Justice Department’s go-ahead, Jeannie aimed to have the indictment completed by July 2018. However, Team M’s first case against Manafort was scheduled to go to trial in Virginia in mid-July and, with Manafort showing little sign of wanting to plead, much less cooperate, with our office, we had few doubts that the trial would go forward. If we brought Team R’s indictment just before the trial, the judge in the Manafort case would go bonkers, justifiably concerned that such an indictment from the Special Counsel’s Office could generate adverse pretrial publicity, even if it didn’t relate directly to the Manafort charges.

But we couldn’t afford to wait to bring the hacking indictment until after both of Manafort’s trials concluded—the trial in Virginia was slated to start in July and the trial in Washington in early September. By then, we would be running up on the midterms, and we would not announce any new charges that close to the election (consistent with Department policy). But waiting until mid-November would be intolerable to Mueller. I told Jeannie I thought we could safely defend ourselves from any objections from the Virginia judge if she brought her case at least two weeks before the start of our July trial—that, I hoped, would give us a reasonable buffer.

Jeannie said she could manage that, then quickly noted that the new timetable created yet another problem: Two weeks before our trial, the president was scheduled to be in Helsinki, where he would be meeting privately with Vladimir Putin. Our indictment would require alerting the State Department, given their diplomatic concerns in preparing for and running a summit, as the indictment would accuse the Russians explicitly of election interference. That was standard operating procedure, but there was also the real perception issue that the indictment could look like a commentary on Trump’s decision to meet alone with Putin, which we did not intend.

We brought the dilemma to Mueller. He suggested we determine whether the White House would take issue with our proceeding just before the president’s trip—would it pose any diplomatic issues? The answer we got back was no: The administration would not object to the timing. I suspect the White House Counsel’s Office did not want to be perceived as dictating to us how or when to bring our indictment, or as hiding evidence of Russian election interference. In retrospect, a less generous interpretation of their blessing to move forward was that they knew dropping the indictment just before the trip would provide Trump and Putin an opportunity to jointly deny the attack on a global stage—that they were playing us, as Barr would later on. [my emphasis]

The indictment was ready in July. If it wasn’t announced then and if both Manafort trials went forward, then prohibitions on pre-election indictments would kick in, meaning the indictment wouldn’t be released in mid-November. That would have been “intolerable” for Mueller’s purposes. Weissmann doesn’t note that mid-November would also be after the election, meaning that the indictment might not get released before a hypothetical post-election Mueller firing and so might not get released at all. That may be what intolerable means.

Other possible factors on the GRU indictment timing

One thing that almost certainly played a factor in DOJ obtaining the indictment before they decided whether to include Stone in it, however, was Andrew Miller’s appeal.

Stone’s former aide Andrew Miller was interviewed for two hours at his home on May 9, 2018; this is almost certainly the 302 from the interview. Assuming that is his 302, Miller was asked about his relationship with Stone, Stone’s relationship with Trump, a bunch of Stone’s right wing nut-job friends, and someone whom Miller knew under a different name. Nothing in the unredacted passages of the interview reflects Miller’s role coordinating Stone’s schedule at the RNC, even though that was the focus of a follow-up subpoena after Miller testified to the grand jury. At the end of the interview, Miller agreed to appear voluntarily for a follow-up and grand jury testimony.

But then Stone learned about the interview.

We know that from the description of a pen register Mueller obtained on Stone a week later, described in affidavits. The PRTT showed that Miller had called Stone twice in the days after his interview with the FBI. On May 11, 2018, Miller lawyered up and his new lawyer, Alicia Dearn, told Mueller that Miller would no longer appear voluntarily (remember that Stone had offered to get a lawyer who would help Randy Credico refuse to testify).

This timeline lays out the early part of Miller’s subpoena challenge.

Miller emailed Stone over a hundred times over the month after his FBI interview. Miller did schedule a grand jury appearance, but then blew it off. Mueller started moving to hold Miller in contempt on June 11. In the days between then and a hearing on the subpoena, Miller and Stone exchanged five more emails. Then, in late June, Miller added another lawyer, Paul Kamenar (whom Stone would add to his team after his sentencing, presumably to allow Kamenar to access the evidence against him under the protective order). Kamenar made it clear he would appeal Miller’s subpoena.

In other words, in late June, the Mueller team learned that they would have to wait a while to get Miller before the grand jury (it ultimately took until the moment Mueller closed up shop on May 29, 2019). All the back and forth also would have made it clear how damaging Stone believed Miller’s testimony against him to be. When Mueller obtained a second warrant for Stone’s emails in early August 2018, the team would have gotten the content of those emails to learn precisely what Stone had to say to Miller about his testimony.

So Miller’s challenge to his subpoena meant that Mueller’s team would not obtain testimony that — it seems clear — they knew went to the heart of whether Stone was conspiring with Russia until well after the midterm election.

If my concerns that “Phil” had a role in the Guccifer 2.0 operation were correct, there’s a chance my big mouth had a role in the timing, too. Starting on June 28, I started considering revealing that I had gone to the FBI in what would eventually become this post. Contrary to the invented rants of people like Glenn Greenwald and Eli Lake, even a year into an investigation into what I had shared with the FBI, long after the time they would have been able to dismiss my concerns if they had no merit, prosecutors did not blow me off.

My interaction with Mueller’s press person in advance of going forward extended over five days. I emailed the press person on June 28 and said I wanted to run something by him. He blew it off for a day (there was a Manafort hearing), then on Friday I wrote again saying I run my decision by my lawyer, and was still planning on going forward. He still blew it off. The next day, I suggested he go check with a particular prosecutor; while the prosecutor hadn’t been in my interview, he was involved in setting it up. The press guy called back within an hour, far more interested in the discussion, and chatty about the fact that I live(d) in Michigan. He asked me to explain the threats I believed I had gotten after I went to the FBI. He asked me generally what I wanted to say. I noted that I believed if people guessed why I had gone to the FBI, they would guess the Shadow Brokers side of it, since TSB had dedicated its last words to a tribute to me, but probably not the Guccifer 2.0 side.

He told me “some people” needed to discuss it. Early on Monday July 1, we spoke again first thing in the morning. He asked me to describe more specifically what I would say. I described the select parts of my post that I suspected would be most sensitive, and read the text that I planned to publish. He said some people needed to discuss it and I would hear by the end of the day. At the end of the workday, he apologized for a further delay. After some more back-and-forth, he told me, around 10PM, that my post would not damage the investigation. The Special Counsel’s Office took no view on whether it was a stupid idea or not (it probably was, not least because one can never understand the moving parts in an investigation like this).

I posted the next day, part of a mostly-failed attempt to get Republicans to care about the non-partisan sides of this investigation. That was 11 days before the actual indictment.

I didn’t know then and frankly I still can’t rule out whether, over those two days, when “some people” discussed my plans, they reached a final conclusion that my concerns about an American who might have a role in the Guccifer 2.0 operation were either baseless or could not be proven.

But the aftermath shows they were still investigating Stone’s ties to Guccifer 2.0, whether not I was right about an American involved in it. Later in July, after the GRU indictment was released, prosecutors would obtain a warrant on several of Stone’s Google accounts in an attempt to determine whether he was the person looking up dcleaks and Guccifer 2.0 before the sites went live. A month and a half later, they would get two warrants, two minutes apart, one for Stone’s cell site location, and another for a Guccifer 2.0 email account, possibly an attempt to co-locate Stone and someone using the Guccifer account. That was the beginning of the period when Mueller’s team would start gagging warrant applications to hide the scope of the investigation from Stone.

For several months after releasing an indictment that made it appear as if all the answers about the hack-and-leak were answered, then, Mueller’s team took a number of steps that aimed to understand any tie between Stone and Guccifer 2.0. Even sixteen months after the GRU indictment, the Guccifer 2.0 persona ended up being an unstated focus of Stone’s trial — a trial about his lies to hide his true go-between with WikiLeaks — too.

Whatever the reason for the timing of the GRU indictment, given the confirmation that Mueller’s team was still investigating whether Stone had foreknowledge of ongoing GRU hacks that would merit including him in the hack-and-leak conspiracy when they closed up shop in March 2019, it’s worth revisiting the GRU indictment. At the time Mueller’s team wrote it, they knew at a minimum they were killing time to get Miller’s testimony, and subsequent steps they took show they they continued to pursue a prong of the investigation pertaining to Guccifer 2.0 that they planned to hide from Stone. So it’s worth seeing how they wrote the indictment to allow for the possibility of later including Stone in it, without telegraphing that that was a still open part of the investigation.

The Stone investigation parallels several of the counts charged in Mueller’s GRU indictment

The indictment charges 12 GRU officers for several intersecting conspiracies: Conspiracy against the US by hacking to interfere in the 2016 election (incorporating various CFAA charges and 18 USC §371), conspiracy to commit wire fraud for using false domain names (18 USC §3559(g)(1)), aggravated identity theft for stealing the credentials of victims (18 USC 1028A(a)(1)), conspiracy to launder money for using bitcoin to hide who was funding the hacking infrastructure (18 USC §1956(h)), and conspiracy against the US for tampering with election infrastructure (18 USC §371). In addition there’s an abetting charge (18 USC §2). Those charges are similar to, but do not exactly line up with, the other GRU indictment obtained in 2018, for hacking international doping agencies, which I’ll call the WADA indictment. The WADA indictment includes hacking, wire fraud, money laundering conspiracies, along with identity theft, as well. But it doesn’t include the abetting charge. And as described below, it deals with the leaking part of the operation differently.

DOJ used the abetting charge in Julian Assange’s indictments, a way to try to hold him accountable for the theft of documents by Chelsea Manning. Given the mention of Company 1, WikiLeaks, in the indictment, that may be why the abetting charge is there.

But the charges in the Mueller GRU indictment also parallel those for which the office was investigating Stone: he was investigated for CFAA charges from the start (that first affidavit focused exclusively on Guccifer 2.0), 371 was added in the next affidavit, aiding and abetting a conspiracy was added in the third affidavit, and wire fraud was added in March 2018 (the campaign finance charges that would be declined in the Mueller Report were added in November 2017). While the wire fraud investigation might be tied to Stone’s own disinformation on social media, the rest all stems from the charges eventually filed against the GRU in July 2018. Those same charges remained in Stone’s affidavits through 2018 (though did not appear in the early 2019 warrants used to search his houses and devices).

Mueller charged Unit 74455 officers for “assisting” in the DNC leak, without describing whom they assisted

Given the overlap on charges between those for which Mueller investigated Stone and those that appeared in the indictment, the treatment of the information operation in the GRU indictment — particularly when compared with the WADA indictment — is of particular interest. In both cases, the indictment described the InfoOps side to be conducted by Russian military intelligence GRU Unit 74455, as distinct from Unit 26165, which did most (but not all, in the case of the election operation) of the hacking.

In the WADA indictment, none of the personnel involved in the hack-and-leak at Unit 74455 are named or charged. Instead the indictment explains that, “these [Fancy Bears Hack Team social media accounts] were acquired and maintained by GRU Unit 74455.” Later, the indictment describes these accounts as being “managed, at least in part, by conspirators in GRU 74455,” notably allowing for the possibility that someone else may have been involved as well. The actions associated with that infrastructure are generally described in the passive voice: “were registered,” “were released” (several times). For other actions, the personas were the subject of the action: “”@fancybears and @fancybearHT Twitter accounts sent direct messages…”

The Mueller indictment, however, names three Unit 74455 officers: It charges Aleksandr Osadchuk and Anatoliy Kovalev in the hack of the election infrastructure (Kovalev got charged in the recent GRU indictment covering the Seoul Olympics and NotPetya, as well).

And it charges Osadchuk and the improbably named Aleksey Potemkin in the hack-and-leak conspiracy. The Mueller indictment describes that those two Unit 74455 officers set up the infrastructure for the leaking part of the operation. Significantly, it describes that these officers “assisted” in the release of the stolen documents.

Unit 74455 assisted in the release of stolen documents through the DCLeaks and Guccifer 2.0 personas, the promotion of those releases, and the publication of anti-Clinton content on social media accounts operated by the GRU.

[snip]

Infrastructure and social media accounts administered by POTEMKIN’s department were used, among other things, to assist in the release of stolen documents through the DCLeaks and Guccifer 2.0 personas.

The indictment doesn’t describe whom these officers assisted in releasing the documents.

Unlike the WADA indictment, the Mueller indictment also includes specific details proving that GRU did control the social media infrastructure. It describes how the conspirators used the same cryptocurrency account to register “dcleaks.com” as they used in the spear-phishing operation, and the same email used to register the server was also used in the spear-phishing effort.

The funds used to pay for the dcleaks.com domain originated from an account at an online cryptocurrency service that the Conspirators also used to fund the lease of a virtual private server registered with the operational email account [email protected]. The dirbinsaabol email account was also used to register the john356gh URL-shortening account used by LUKASHEV to spearphish the Clinton Campaign chairman and other campaign-related individuals.

[snip]

For example, between on or about March 14, 2016 and April 28, 2016, the Conspirators used the same pool of bitcoin funds to purchase a virtual private network (“VPN”) account and to lease a server in Malaysia. In or around June 2016, the Conspirators used the Malaysian server to host the dcleaks.com website. On or about July 6, 2016, the Conspirators used the VPN to log into the @Guccifer_2 Twitter account. The Conspirators opened that VPN account from the same server that was also used to register malicious domains for the hacking of the DCCC and DNC networks.

(Note, this is some of the evidence collected via subpoenas to tech companies that the denialists ignore when they claim that CrowdStrike was the only entity to attribute the effort to Russia.)

The Mueller indictment describes how Potemkin controlled the computers used to launch the dcleaks Facebook account.

On or about June 8, 2016, and at approximately the same time that the dcleaks.com website was launched, the Conspirators created a DCLeaks Facebook page using a preexisting social media account under the fictitious name “Alice Donovan.” In addition to the DCLeaks Facebook page, the Conspirators used other social media accounts in the names of fictitious U.S. persons such as “Jason Scott” and “Richard Gingrey” to promote the DCLeaks website. The Conspirators accessed these accounts from computers managed by POTEMKIN and his co-conspirators.

Finally, there’s the most compelling evidence, that some conspirators logged into a Unit 74455-controlled server in Moscow hours before the initial Guccifer 2.0 post went up and searched for the phrases that would be used in the first post.

On or about June 15, 2016, the Conspirators logged into a Moscow-based server used and managed by Unit 74455 and, between 4:19 PM and 4:56 PM Moscow Standard Time, searched for certain words and phrases, including:

Search Term(s)

“some hundred sheets”

“some hundreds of sheets”

dcleaks

illuminati

широко известный перевод [widely known translation]

“worldwide known”

“think twice about”

“company’s competence”

Later that day, at 7:02 PM Moscow Standard Time, the online persona Guccifer 2.0 published its first post on a blog site created through WordPress. Titled “DNC’s servers hacked by a lone hacker,” the post used numerous English words and phrases that the Conspirators had searched for earlier that day (bolded below):

Worldwide known cyber security company [Company 1] announced that the Democratic National Committee (DNC) servers had been hacked by “sophisticated” hacker groups.

I’m very pleased the company appreciated my skills so highly))) [. . .]

Here are just a few docs from many thousands I extracted when hacking into DNC’s network. [. . .]

Some hundred sheets! This’s a serious case, isn’t it? [. . .] I guess [Company 1] customers should think twice about company’s competence.

F[***] the Illuminati and their conspiracies!!!!!!!!! F[***] [Company 1]!!!!!!!!! [emphasis original]

Remember: in the weeks after DOJ released this indictment, Mueller’s team took steps to try to obtain proof of whether Roger Stone was the person in Florida searching on Guccifer’s moniker on June 15, 2016, before the initial post was published. If Stone did learn about this effort in advance, it would suggest he learned about Guccifer 2.0 operation around the same time as someone was searching on these phrases in a GRU server located in Moscow. It would mean Stone learned about the upcoming Guccifer post in the same timeframe as these GRU officers were reviewing it.

It’s not really clear what was going on here. The assumption has always been that GRU officers were looking for translations into English from a post they drafted in Russian, even though the quotation marks suggests the Russian officers were searching on English phrases.

The one exception to that seems to confirm that. Those conducting these searches appear to have searched on a Russian phrase, a phrase they would have easily understood.

широко известный перевод

Moreover, it would take a shitty-ass translation application to come up with the stilted English used in the post. Plus, “illuminati,” at least, is an easily recognized cognate, even for someone (me!) whose Russian is surely worse than the English of any one of these Russian intelligence officers.

Still, proof of this  activity — obtained via undescribed means — clearly ties the Guccifer operation to the GRU. It’s just not clear what to make of it. And the possibility that there’s an American component to the Guccifer 2.0 operation — whether “Phil” or someone else — one that may have alerted Stone to what was going on, provides explanations other than straight up translation. Indeed, it may be that GRU officers were approving the content that someone else wrote, originally in English. Which might also explain why Stone may have known about it in advance.

Whatever else, the GRU indictment only claims that these GRU officers “assisted” this effort. It doesn’t claim they wrote this post.

The Stone-adjacent Guccifer 2.0 activity

One other detail of Mueller’s GRU indictment of interest pertains to which Stone-adjacent activity it chose to highlight.

Stone had first made his DMs with Guccifer 2.0 public himself, in March 2017. They were covered in his House Intelligence Committee testimony. But when Mueller included them in the GRU indictment, Stone first denied, and then sort of conceded the reference to them might be him.  His initial denial was an attempt to deny he had spoken with people in the campaign other than Trump himself, even though he had released the communications himself over a year earlier.

Remember — Mueller was still weighing whether Stone was criminally involved in this conspiracy when Stone issued the initial denial!

But that’s not the most interesting detail of the part of the indictment that lays out with whom Guccifer 2.0 shared stolen documents (even ignoring one or two tidbits I’m still working on).

Mueller’s GRU indictment included — along with the reference to the Roger Stone DMs they still hadn’t determined whether reflected part of a criminal conspiracy or not — the Lee Stranahan exchange with Guccifer 2.0 that ended in Stranahan, a Breitbart employee who would later move to Sputnik, obtaining early copies of a document purportedly about Black Lives Matter.

On or about August 22, 2016, the Conspirators, posing as Guccifer 2.0, sent a reporter stolen documents pertaining to the Black Lives Matter movement. The reporter responded by discussing when to release the documents and offering to write an article about their release.

These Stranahan exchanges are really worth attention, not just for the way they prove that Stone-adjacent people got early releases on request (which, lots of evidence suggests, also happened with Stone with respect to the Podesta files pertaining to Joule Holdings), but also for the way Guccifer 2.0 ignored Stranahan’s claim in early August 2016 to have convinced Stone that Guccifer 2.0 was not Russian.

Note what this indictment didn’t mention, though: Guccifer 2.0’s outreach to Alex Jones (about whom, unlike Stranahan, the FBI questioned Andrew Miller).

As I’ve pointed out, in the SSCI Report, there’s a long section on Jones that remains almost entirely redacted. Citing to five pages of a report the title of which is also redacted, the four paragraphs appear between the discussions of Guccifer 2.0’s outreach to then-InfoWars affiliate Roger Stone and Guccifer 2.0 and dcleaks’ communication with each other.

According to Thomas Rid’s book, Active Measures, both dcleaks and Guccifer 2.0 tried to reach out to Jones on October 18, 2016.

On October 18, for example, as the election campaign was white hot and during the daily onslaught of Podesta leaks, both GRU fronts attempted to reach out to Alex Jones, a then-prominent conspiracy theorist who ran a far-right media organization called Infowars. The fronts contacted two reporters at Infowars, offered exclusive material, and asked to be put in touch with the boss directly. One of the reporters was Mikael Thalen, who then covered computer security. First it was DCleaks that contacted Thalen. Then, the following day, Guccifer 2.0 contacted him in a similar fashion. Thalen, however, saw through the ruse and was determined not to “become a pawn” of the Russian disinformation operation; after all, he worked at Infowars. So Thalen waited until his boss was live on a show and distracted, then proceeded to impersonate Jones vis-à-vis the Russian intelligence fronts.23

“Hey, Alex here. What can I do for you?” the faux Alex Jones privately messaged to the faux Guccifer 2.0 on Twitter, later on October 18.

“hi,” the Guccifer 2.0 account responded, “how r u?”

“Good. Just in between breaks on the show,” said the Jones account. “did u see my last twit about taxes?”

Thalen, pretending to be Jones, said he didn’t, and kept responses short. The officers manning the Guccifer 2.0 account, meanwhile, displayed how bad they were at media outreach work, and consequently how much value Julian Assange added to their campaign. “do u remember story about manafort?” they asked Jones in butchered English, referring to Paul Manafort, Donald Trump’s former campaign manager. But Thalen no longer responded. “dems prepared to attack him earlier. I found out it from the docs. is it interesting for u?”24

Rid describes just one of two outreaches to Jones (through his IC sources, he may know of the report the SSCI relies on). But a key detail is that this outreach used as entrée some stolen documents from May 2016 showing that the Democrats were doing basic campaign research on Trump’s financials. It then purports to offer “Alex Jones” information on early Democratic attacks on Paul Manafort’s substantial Ukrainian graft, possibly part of the larger GRU effort to claim that Ukraine had planned an election year attack on Trump.

That is, unlike Stranahan’s request for advance documents, this discussion intended for “Alex Jones,” ties directly to Stone’s efforts to optimize the Podesta release. And it’s something that some entity prevented SSCI from publishing.

It’s also something Mueller’s team left out of an indictment aiming to lay out the hack-and-leak case before they might get fired, but in such a way as to hide the then-current state of the investigation from Roger Stone.

There were actually a number of Stone-adjacent associates in contact with GRU’s personas. And as recently as just a few months ago, the government wanted to hide the nature of those ties.

Palace Intrigue: Trump Prepares His Consolation Prize for Vladimir Putin

In the last two days, Trump has prepared a coup of sorts. First, he fired Mike Esper and replaced him with Christopher Miller; several of Esper’s top deputies went with him. Then, Trump installed three different Devin Nunes flunkies at several places in the DOD bureaucracy:

  • Mike Ellis — the guy who hid the Ukraine transcript and one source for the unmasking hoax — to NSA as General Counsel
  • Ezra Cohen-Watnick — a key Mike Flynn loyalist and another source for the unmasking hoax — to DOD Undersecretary of Intelligence
  • Kash Patel — who ensured that no HPSCI Republicans got sound intelligence during their Russian investigation, then pretended to be a Ukraine expert during impeachment, and then served to conduct a purge in the Office of Director of National Intelligence — to DOD Chief of Staff

To be clear, unlike these others, Christopher Miller, the Acting Secretary of Defense, reportedly does care about US security, even if he’s several ranks too junior for the job and got appointed over a Senate confirmed Deputy.

But the Nunes flunkies are there, serving as gate-keepers for the hoaxes favored by Trump and Nunes, as they have done so successfully throughout Trump’s term.

Spook-whisperer David Ignatius reports that these changes come amidst a sustained debate about what to do with a piece of likely Russian disinformation that — Trump and feeble-minded partisans like Lindsey Graham believe — will prove that Russia didn’t prefer Trump over Hillary.

President Trump’s senior military and intelligence officials have been warning him strongly against declassifying information about Russia that his advisers say would compromise sensitive collection methods and anger key allies.

An intense battle over this issue has raged within the administration in the days before and after the Nov. 3 presidential election. Trump and his allies want the information public because they believe it would rebut claims that Russian President Vladimir Putin supported Trump in 2016. That may sound like ancient history, but for Trump it remains ground zero — the moment when his political problems began.

CIA Director Gina Haspel last month argued strongly at a White House meeting against disclosing the information, because she believed that doing so would violate her pledge to protect sources and methods, a senior congressional source said. This official said a bipartisan group of Republican and Democratic senators has been trying to protect Haspel, though some fear that Trump may yet oust her.

Rumors have been flying this week about Haspel’s tenure, but a source familiar with her standing as CIA director said Tuesday that national security adviser Robert C. O’Brien and White House Chief of Staff Mark Meadows had both “assured her that she’s good,” meaning she wouldn’t be removed. Haspel also met personally with Senate Majority Leader Mitch McConnell (R-Ky.) Tuesday. She sees him regularly as a member of the “Gang of Eight” senior congressional leaders. But Tuesday’s visit was another sign of GOP support.

Haspel’s most unlikely defender has been Attorney General William P. Barr, who opposed a pre-election push to declassify the sensitive material, according to three current and former officials. At a showdown meeting at the White House, Barr pushed back against revealing the secret information.

Gen. Paul Nakasone, who heads U.S. Cyber Command and the National Security Agency, has also argued vehemently against disclosure, according to a senior defense official and the senior congressional source. Like Haspel, Nakasone took the unusual step of directly opposing White House efforts to release the intelligence, because he feared the damage that disclosure would cause.

With the new changes, General Nakasone reports through Cohen-Watnick and Patel and will have to rely on the legal “advice” of Ellis. So not only does this move put more senior votes in favor of declassifying this intelligence, but it puts them in places where Nakasone might be forced to accede to these demands.

Reporting suggests that Trump is seeking to make the full intelligence behind the reports described here available. Fundamentally, the intelligence shows that the US government obtained a Russian intelligence report that stated in late July 2016 — John Ratcliffe says it was July 26 but by handwriting it appears to be July 28 — Hillary approved of a plan to vilify Trump for his dalliance with Russian intelligence.

Already, this is a stupid hoax from the Republicans. It is public that, in the wake of the DNC release on July 22 — and particularly after Trump’s “Russia are you listening” comment on July 27 — Hillary started focusing on Trump’s coziness with Russia. In other words, the crack Russian analysts would have to do no more than read the paper to come to this conclusion. Nor would there be anything scandalous about Hillary trying to hold Trump accountable for capitalizing on an attack on her by a hostile foreign country.

I think Republicans are trying to suggest — by altering a date (July 26 instead of July 28) again and breathing heavy — that former government official Hillary Clinton was the reason why the FBI opened an investigation into Trump, rather than the Australians informing the US about Coffee Boy George Papadopoulos bragging about Russia offering help back in May. There’s not a shred of evidence for it, of course, but that has never stopped the frothy right.

The far more interesting part of this intelligence comes in the report that Peter Strzok wrote up, which is dated September 7. It makes it clear that Hillary’s alleged attack pertained to Russian hackers, notably Guccifer 2.0.

So a Russian intelligence report the US stole from Russia in late July 2016 claimed that, on July 26 0r 28, Hillary approved an attack on Trump pertaining to having help from Russian hackers, a report that did not get formally shared with the FBI until September 7. And either the report itself or FBI’s interpretation of it focuses on Guccifer 2.0.

Somehow this is the smoking gun — that over a month after opening up Crossfire Hurricane the FBI started investigating a claim that, starting on July 26 or 28, Hillary thought Trump was cuddling up with Russian hackers, interpreted by someone to be Guccifer 2.0 — the FBI learned that fact.

When I first wrote this up, I hadn’t started my Rashomon Rat-Fucker series, to say nothing of my report to the FBI that an American I knew may have served as an American cut-out for the Guccifer 2.0 operation (I’m jumping ahead of myself, but I’m certain the FBI investigated that claim for at least a year). At the time, I focused on how prescient the frothers were making Hillary look for anticipating that Roger Stone would first start doing propaganda for Guccifer 2.0 on August 5; best case for the frothers in this situation is that Stone somehow learned of the Russian report before the FBI did.

But now that I’ve written those posts, it’s clear that not only did the FBI have strong circumstantial evidence that Stone knew of the Guccifer 2.0 operation even before the first Guccifer 2.0 post, because he was searching for it on June 15 before the WordPress site went public, but that Stone probably had a face-to-face meeting with someone at the RNC from whom he got advance notice of the DNC drop.

In July 2016, this report is only mildly interesting, amounting to showing that the Russians read the newspaper like everyone else.

In 2020, after details from the Mueller investigation have become public, the Russian report makes far more sense as deliberate disinformation, an attempt to turn a direct contact with Stone into a hoax about Hillary.

Which makes Trump’s apparent determination to liberate this document all the more telling. It suggests that he wants to make public something, anything, he can use to counter what will be very damning allegations when this all becomes clear.

And, given how shoddy the actual intelligence itself is (at best showing that Russian intelligence officers read public sources and more credibly showing that Russia was building plausible deniability for contacts with Roger Stone in real time), Trump’s insistence on it, whether intentional or not, would serve to blow highly sensitive collection for a third-rate hoax.

I can see why Trump would prioritize this intelligence on his way out that the door. It comes at a time when he can be easily manipulated to burn the IC in ways that can only serve Russian interests.

In other words, one of Trump’s top priorities for the Lame Duck period is to give Vladimir Putin a consolation prize.

The Last Time Billy Barr Ordered a Politicized Investigation, DOJ Altered Documents for Public Consumption

It is a fact that someone (or someones) who were part of the Jeffrey Jensen review of the Mike Flynn prosecution altered documents for public consumption. That is not speculation. It is not hyperbole. It is a fact, one that other outlets had better start replicating and enhancing if they want to prevent Barr’s green light on investigations into election irregularities, announced last night, from doing the same.

At a minimum, DOJ removed protective order footers from a set of documents shared with Sidney Powell on September 23, in advance of the first debate.

The altered January 5, 2017 Strzok notes, altered to suggest a January 5, 2017 meeting might have happened on January 4, 2017, without the footer:

The realtered January 5, 2017 Strzok notes, with the footer:

The second set of Strzok notes (originally altered to read March 28), without the footer:

The second set of Strzok notes, with the footer.

The altered McCabe notes, altered to include a date, with the footer redacted out:

The realtered McCabe notes, with the footer unredacted:

The two other documents released that day, a newly repackaged set of Page-Strzok texts (with newly released personal information that constitutes a new violation of the Privacy Act) that DOJ now claims not to have had a purpose to release and a set of FBI analyst texts the identities of which DOJ seems very concerned about hiding, also lacked protective order footnotes.

The three documents (above) subsequently released with the protective order replaced all had dates added to the initially altered document, a misleading date in at least the case of Peter Strzok’s January 5, 2017 notes and misleading redactions used to suggest something false about the date added to the McCabe notes. DOJ claims those added dates were inadvertent, but the fact they happened with documents that had otherwise been altered (and on a document, the Strzok January 5, 2017 notes, that had already been released once without the date) makes that claim highly unlikely. When prosecutor Jocelyn Ballantine submitted a filing admitting that the dates had been altered, she falsely claimed that Strzok and McCabe’s lawyers had confirmed nothing else was altered.

There are several other problems with the altered set of Andrew McCabe notes (including that notes about prep for the Global Threats Hearing got released with no declassification stamp), problems that merit more attention from experts.

But those aren’t the only pieces of evidence that the Jeffrey Jensen investigation evolved from inventing an excuse to blow up the Flynn prosecution into an opportunity to set up campaign attacks for the President. Pro-Trump FBI Agent Bill Barnett gave an interview that was materially inconsistent with his actions during the Flynn investigation (and that claimed to be unaware of key pieces of evidence against Flynn). When DOJ released it, they redacted it in such a way as to hide complimentary comments from Barnett about Brandon Van Grack that would have completely undermined DOJ’s claimed reasons to throw out Flynn’s prosecution.

There are more signs of irregularities with this “investigation.” But this list by itself proves that DOJ, in an investigation personally ordered up by Billy Barr, used the “investigation” to package up propaganda to help Donald Trump. The package even seems to have served to tee up an attack Trump made on Joe Biden in the first debate.

As noted, last night Barr authorized what had previously been forbidden for over forty years, DOJ’s conduct of investigations into claims of irregularities ginned up by the very same lawyers — Sidney Powell and Rudy Giuliani — who invented the complaints about the Flynn prosecution. One of Barr’s investigations has already altered official documents to sustain false claims. That means there’s reason to believe he would do it again, to serve the same cause. Indeed, Trump’s election loss gives Barr’s a greater incentive to repeat the process, to ensure he is not replaced by someone who would treat these alterations as a crime.

A Bill Barr politicized investigation altered documents to serve propaganda in the past. We should assume it will happen again.

Don Jr’s Demand to “Declassify Everything” and the Secret Grand Jury Information His Buddy Shared about Julian Assange

Yesterday, Don Jr tweeted out a demand that someone — Daddy, maybe? — “declassify everything.”

I guess the failson believes there are secret facts that will change the reality that his Daddy just lost an election by the same Electoral College margin Trump beat Hillary by in 2016, with an even bigger popular vote loss than he suffered in 2016.

Given Jr’s belief that releasing classified information can save him, though, it’s worth revisiting testimony that former Sputnik propagandist Cassandra Fairbanks gave at the Julian Assange extradition hearing.

She testified under oath that, a month after President Trump would have learned that the Mueller team was investigating the Roger Stone-led effort to pardon Julian Assange — an effort that seems to have implicated Don Jr, too — Don Jr’s close friend Arthur Schwartz told Fairbanks that there would be no fucking pardon for Assange. Schwartz proceeded to give Fairbanks accurate, secret information about the grand jury investigation into Assange. She also testified vaguely that Schwartz said “other persons … might be affected” including people he referred to as “lifelong friends,” a reference she took to mean Don Jr.

In early 2019, Fairbanks traveled to London to share this secret grand jury information with Assange in person. So Schwartz’ leak played a role in the target of a criminal investigation learning secret details about that investigation.

Fairbanks implied that Ric Grenell — who inhabited the same far right wing chat room as Fairbanks and Schwartz and who gave Ecuador reassurances that Assange won’t face the death penalty — may have been Schwartz’s source. But if Schwartz knew that Assange might present problems for Don Jr, as Fairbanks implied, it suggests he spoke with the President’s son about it.

At the very least, DOJ must be investigating how grand jury information got leaked and how Schwartz got that information to leak.

The failson might not want to advertise how happy he is to share America’s secrets.

The Mueller Charging Decisions Through Ratfucker Rashomon’s Eyes

As noted, late Monday night, DOJ released a newly unredacted version of the Mueller Report that disclosed that, when Mueller shut down in March 2019, there were ongoing investigations, plural, into Stone’s role in the hack-and-leak. This all accords with what I laid out in my Ratfucker Rashomon series, which read the four different stories of the Stone investigation so as to explain that the Stone prosecution was partly an effort to collect further information in the investigation.

I’d like to look at the newly unsealed charging language through the lens of that series. The introduction to the discussion of the hack-and-leak notes (unlike the IRA indictment) that in addition to those charged in the conspiracy, there were other co-conspirators, defining the conspiracy to include the staged releases of the documents.

On July 13, 2018, a federal grand jury in the District of Columbia returned an indictment charging Russian military intelligence officers from the GRU with conspiring to hack into various U.S. computers used by the Clinton Campaign, DNC, DCCC, and other U.S. persons, in violation of 18 U.S.C. §§ 1030 and 371 (Count One); committing identity theft and conspiring to commit money laundering in furtherance of that hacking conspiracy, in violation of 18 U.S.C. §§ 1028A and 1956(h) (Counts Two through Ten); and a separate conspiracy to hack into the computers of U.S. persons and entities responsible for the administration of the 2016 U.S. election, in violation of 18 U.S.C. §§ 1030 and 371 (Count Eleven). Netyksho Indictment.1277 As of this writing, all 12 defendants remain at large.

The Netyksho indictment alleges that the defendants conspired with one another and with others to hack into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from those computers, and stage releases of the stolen documents to interfere in the election. [my emphasis]

In a curious phrase, the introduction describes the co-conspirators using Guccifer 2.0 to stage releases through WikiLeaks, thereby emphasizing the role of Guccifer 2.0 as middle-man.

The indictment also describes how, in staging the releases, the defendants used the Guccifer 2.0 persona to disseminate documents through WikiLeaks.

As I’ve noted, there’s good reason to suspect that Stone’s tie to WikiLeaks was via Guccifer 2.0.

In a previously unredacted passage, it then describes Jerome Corsi’s claims that Stone had optimized the WikiLeaks release on October 7, 2016.

One witness told the Office at one point that the initial release of Podesta emails on October 7 may have come at the behest of, or in coordination with, Roger Stone, an associate of candidate Trump. As explained in Volume I, Section III.D.1.d, supra, phone records show that Stone called Jerome Corsi on October 7, after Stone received a call from the Washington Post. The Washington Post broke a story later that day about a video recording of Trump speaking about women in graphic terms. According to some of Corsi’s statements to the Office [grand jury redaction] Stone said that he had learned about the imminent release of that tape recording, and it was expected to generate significant negative media attention for the Campaign. Corsi told investigators that Stone may have believed from their prior dealings that Corsi had connections to Julian Assange, WikiLeaks’s founder, and that Stone therefore asked Corsi to tell Assange to start releasing the Podesta emails immediately to shift the news cycle away from the damaging Trump recording. Although Corsi denies that he actually had access to Assange, he told the Office at one point that he tried to bring the request to Assange’s attention via public Twitter posts and by asking other contacts to get in touch with Assange. The investigation did not establish that Corsi actually took those steps, but WikiLeaks did release the first batch of Podesta emails later on the afternoon of October 7, within an hour of the publication of the Washington Post’s story on the Trump tape.

As I laid out in this post from the Rashomon series, the focus on Corsi later in this section — while not inappropriate from the viewpoint of the prosecutorial memo that the Mueller Report served as — appears to have been a head fake, a way to explain why the Report addressed the Podesta emails without ever addressing the substantive evidence that showed Stone did optimize the Podesta release. This passage is the same: a way to explain the focus on the Podesta emails without revealing what prosecutors actually knew, including (as laid out in this post), pretty compelling evidence that Stone and Corsi had the content of some of the Podesta emails by August 15, 2016, ones related to an attack on Podesta that right wingers were pushing even as Stone was working to optimize the release.

Having used the Corsi head fake to introduce the topic, then, the discussion of the charging decision starts by generally nodding to “some evidence that Stone played a role in coordinating the October 7 release of the Podesta materials” and — through that — focusing on WikiLeaks.

Given WikiLeaks’s role in disseminating the hacked materials, and the existence of some evidence that Stone played a role in coordinating the October 7 release of the Podesta materials, this Office considered whether to charge WikiLeaks, Assange, or Stone as conspirators in the computer-intrusion conspiracy under Sections 1030 and 371.1278 The theory of prosecution would be that these actors were liable as late joiners in an already existing conspiracy.

It lays out that two things would be necessary to charge either WikiLeaks or Stone under this theory: proof they agreed to enter into the conspiracy and that they knew about ongoing hacking. It envisions WikiLeaks might have served as a “fence,” marketing goods it knew to be stolen.

In particular, although it did not participate in the hacking itself, WikiLeaks would be liable for ensuring a market for and maximizing the value of the stolen materials—much as someone who holds himself out as a “fence” may be found to have joined a conspiracy to traffic in stolen goods, see United States v. Hess, 691 F.2d 984, 988 (11th Cir. 1982), and an individual who launders drug money can be a member of a drug-trafficking conspiracy when such laundering activities are “integral to the success” of the overall trafficking venture,

This language is interesting not just in this context. The expanded CFAA charge in the second superseding Assange indictment describes how Assange had Siggi reach out to Gnosis and LulzSec and then later, some of those same people were involved in hacking Stratfor. While they were doing so, Assange helped them sort through the stolen emails, and — ultimately — WikiLeaks published them. In that case, then, the government is effectively claiming that Assange did agree to the hack before it happened, and then guaranteed the access to the files once they were hacked. Here, though, the Mueller Report concluded it didn’t have admissible evidence to charge WikiLeaks, in part because the key communications were encrypted.

The Office determined, however, that it did not have admissible evidence that was probably sufficient to obtain and sustain a Section 1030 conspiracy conviction of WikiLeaks, Assange, or Stone.

[snip]

With respect to WikiLeaks and Assange, this Office determined the admissible evidence to be insufficient on both the agreement and knowledge prongs. As to agreement, many of the communications between the GRU officers and WikiLeaks-affiliated actors occurred via encrypted chats. Although a conspiracy is often inferred from the circumstances, see Iannelli, 420 U.S. at 777 n.10, the lack of visibility into the contents of these communications would hinder the Office’s ability to prove that WikiLeaks was aware of and intended to join the criminal venture comprised of the GRU hackers.

I get the feeling the US government has evidence — just not evidence they would want to submit at trial, something from a foreign partner or collection targeted on Russians (temporally, this would not be anything collected via UC Global, which is one of the reasons why the UC Global surveillance is probably not what WikiLeaks supporters claim it is).

The Report also explains that it did not have evidence that Assange knew of the ongoing hacks.

Here, a late-joiner theory would require that the conspirator knew that the computer intrusions that comprise the Section 1030 violation were ongoing, or expected to continue, at the time that he or she joined the conspiracy.

[snip]

Similar problems of proof existed as to knowledge. While the investigation developed evidence that the GRU’s hacking efforts in fact were continuing at least at the time of the July 2016 WikiLeaks dissemination, see Netyksho Indictment ¶¶ 32, 34, the Office did not develop sufficient admissible evidence that WikiLeaks knew of—or even was willfully blind to—that fact. Cf. Global-Tech Appliances, Inc. v. SEB S.A., 563 U.S. 754, 769-70 (2011) (recognizing that willful blindness can be used to prove the knowledge element of an offense). And absent sufficient evidence of such knowledge, the government could not prove that WikiLeaks (or Assange) joined an ongoing hacking conspiracy intending to further or facilitate additional computer intrusions.

Note the timing: the Report is saying that WikiLeaks would have had to know that GRU was still hacking Democratic targets when it released the first dump in July 2016. It is silent about ongoing after that, even though the hacking did continue through the election.

It then says the legal analysis is similar for Stone. But it doesn’t conduct that analysis in the way it does for WikiLeaks. Instead, it says it still has factual questions about Stone’s knowledge of ongoing hacks, returning to that Jerome Corsi head fake, rather than discussing the actual evidence prosecutors did have.

The Office determined that it could not pursue a Section 1030 conspiracy charge against Stone for some of the same legal reasons. The most fundamental hurdles, though, are factual ones.1279 As explained in Volume I, Section III.D.1, supra, Corsi’s accounts of his interactions with Stone on October 7, 2016 are not fully consistent or corroborated. Even if they were, neither Corsi’s testimony nor other evidence currently available to the Office is sufficient to prove beyond a reasonable doubt that Stone knew or believed that the computer intrusions were ongoing at the time he ostensibly encouraged or coordinated the publication of the Podesta emails. Stone’s actions would thus be consistent with (among other things) a belief that he was aiding in the dissemination of the fruits of an already completed hacking operation perpetrated by a third party, which would be a level of knowledge insufficient to establish conspiracy liability. See State v. Phillips, 82 S.E.2d 762, 766 (N.C. 1954) (“In the very nature of things, persons cannot retroactively conspire to commit a previously consummated crime.”) (quoted in Model Penal Code and Commentaries § 5.03, at 442 (1985)).

1279 Some of the factual uncertainties are the subject of ongoing investigations that have been referred by this Office to the D.C. U.S. Attorney’s Office.

The question of Stone’s foreknowledge is actually quite different than Assange’s. That’s because (as the Mueller Report barely mentions but affidavits lay out in detail), he seems to have had knowledge from Guccifer 2.0, possibly as early as April and reportedly as early as May, when hackers were still in the DNC servers. The SSCI Report lays out (but the Mueller Report did not) that Stone was scripting pro-Russian Tweets for Trump in the days after he made his “Russia are you listening” comment. If prosecutors found proof that Stone scripted the “Are you listening” quote, then he could be directly tied to the attempted hacking of Hillary that immediately followed. And Manafort, at least, was asked whether he knew that Russian hackers were probing state election infrastructure in the days before the election, so prosecutors may have reason to believe Stone knew of that (certainly, his voter suppression efforts paralleled Russia’s). This is one reason why it was so curious that prosecutors laid out how Stone pitched both Manafort and Steve Bannon on a way to win ugly during the same period he was optimizing the Podesta emails; it’s possible he pitched them on the later Russian voter suppression and. not just the Podesta emails.

Still, aside from the question to Manafort (which he denied) and some suggestions from his contemporaneous writings, there’s no public evidence of that.

Nevertheless and perhaps counterintuitively, there’s more evidence that Stone knew of ongoing hacking than that Assange did (and when Stone has denied such knowledge in the past, the timeline he uses is always bolloxed all to hell, ignoring key parts of the hacking).

That’s most (not not all) of the CFAA decision. But there’s a second passage, one focused on whether WikiLeaks provided an illegal campaign donation to Trump (one that parallels the similar discussion of whether the June 9 meeting amounted to an illegal offer and solicitation of foreign assistance).

Much of this discussion focuses on campaign finance law — whether the stolen emails represented something of value and how foreigners are covered by campaign finance law. I may return to it. The analysis in this section, plus an earlier one of the Bartnicki precedent that says it’s usually not criminal to publish illegally obtained information, could now have dramatically changed given a SCOTUS decision eliminating any claim for foreigners like Julian Assange to rely on a First Amendment defense. Given the other First Amendment issues, I doubt prosecutors would ever revisit this decision, but prosecutors in Assange’s existing indictment may already be planning to rely on that precedent. (I hope to return to the irony that a Trump judge may fuck up Assange’s defense after Assange helped Trump get elected.)

But not all of it.

There’s also a discussion about whether Stone would have criminal liability. It’s particularly interesting not least because it invokes others on the campaign too (in a prosecutorial memo that considers whether Don Jr committed a CFAA crime by using a password he got from WikiLeaks to access a non-public website).

There is also insufficient evidence at the present time to establish beyond a reasonable doubt that Roger Stone or any other persons associated with the Campaign coordinated with WikiLeaks on the release of the emails, which alone would preclude prosecution of them for the WikiLeaks-related conduct even if WikiLeaks had violated campaign-finance law.

[snip]

The Office also considered whether Roger Stone could be prosecuted for any direct or indirect contacts with WikiLeaks about its release of hacked emails for the purpose of influencing the presidential election, and whether any coordination between Stone and WikiLeaks would affect WikiLeaks’s criminal exposure. If WikiLeaks’s release of documents were conducted in coordination with Stone (or others associated with the Trump Campaign), the activity would arguably constitute a “contribution,” rather than an “expenditure.” [my emphasis]

I’ll just leave that repeated invocation of others associated with the Trump campaign for now.

Importantly, though, this section comes as close as any other passage in the Mueller Report does — far closer than the Jerome Corsi head fake sections do — to saying Stone didn’t coordinate with WikiLeaks.

The Office did not pursue that theory [that Stone might be liable], however, because the investigation did not identify sufficient credible evidence that would establish that Stone coordinated with WikiLeaks or that any contacts with WikiLeaks were attributable to the Campaign. See Volume I, Section III.D.1, supra. While the Office cannot exclude the possibility of coordination between Stone and WikiLeaks or that additional evidence could come to light on that issue, the investigation did not obtain admissible evidence likely to meet the government’s burden to prove facts establishing such coordination beyond a reasonable doubt.

Note the reference to “credible evidence,” which I take to be a reference to Corsi.

Two key things about this though: This is all about WikiLeaks. There’s not a word about criminal liability if Stone can be shown to have coordinated with Guccifer 2.0 (Stone, of course, would say he believed Guccifer 2.0 was not Russian, even though prior to August 5, he had said he did believe the persona was Russian). I laid out evidence that that seems to have been the case — that Stone’s go-between was actually Guccifer 2.0, not Corsi or Credico or anyone else. And there’s good reason to believe Mueller expected to find that at the time (which I’ll return to).

The other thing is this WikiLeaks related analysis is all campaign finance related. It doesn’t consider a pardon, about which there was communication between Stone and WikiLeaks, possibly even Don Jr or Paul Manafort and WikiLeaks. There, the question has to do with the terms, whether prosecutors have proof it was part of a quid pro quo. And, as I said before, at least as of early October, that investigation remained open.

As I laid out in my Ratfucker Rashomon series, the Mueller Report has always been misread as a summary of all the things Mueller found. It’s not. It’s the explanation of charging decisions. But the footnote unsealed on Monday confirms that there were multiple charging decisions that Mueller did not make with respect to Stone — he sent those ongoing investigations to DC. And so the story told here, with significant gaps about Guccifer 2.0 and post-election, doesn’t tell the most interesting part of the story.