Posts

Three Things: Good, Better, Best News

Let’s mix things up a bit and roll around in some good news for a change, hmm?

~ 3 ~

Arrests continue in wake of January 6 Capitol insurrection and they are both pleasurable and comic.

Mothertrucking racist who waved an enemy flag inside the capitol has been arrested.

Goddamned firefighter arrested for throwing a fire extinguisher at a Capitol Police officer’s head.

Chicago man stupid enough to think he wouldn’t be caught, was caught.

Gratifying to see they are chasing all of these perps to ground. These are only a few I’ve seen in my timeline, but among some of the more egregious insurrectionists. The firefighter is only lucky he didn’t throw that extinguisher hard enough to kill the Capitol Police Officer.

~ 2 ~

Flint may get some justice; former Michigan governor Rick Snyder was charged with two misdemeanor counts of willful neglect of duty in his handling of Flint’s water crisis. Six others were charged as well; the former director of the Michigan Department of Health and Human Services and the state’s former chief medical executive were both charged with involuntary manslaughter related to the known dozen deaths of Michiganders who died from Legionnaire’s disease acquired from the city’s contaminated water.

Personally, I think Snyder’s charge is both too light and won’t stick; an entire city’s children were poisoned because he failed to execute his job faithfully, not to mention an increase in fetal deaths. Lead poisoning isn’t like getting the flu — the brain damage it causes may be permanent though the brain can be trained to compensate for some of the damage. Chances are good Snyder will weasel out of the charges because he relied on experts like the director of MDHHS and the chief medical executive.

One of my adult kids was poisoned during the period when Flint’s water was contaminated. They were fortunate their exposure was limited, but it took nearly five years to recover their health and we’re still not certain there won’t be sequelae which haven’t yet emerged. An entire city faces the same challenge, at a minimum; not all those who died of Legionnaire’s were Flint city residents, getting sick in Flint because they had to be in Flint for work or some other reason. There’s a possibility there were more Flint-related deaths which were masked by other chronic illness, but we may never know for sure.

At least these charges are the beginning of the end to the Flint water crisis. I do hope during the course of prosecution that all communications before and immediately following the cutover from Detroit’s water supply to the Flint River will be disclosed. I still suspect something happened the night of the cutover when Detroit made a last pitch to keep Flint on their water system.

~ 1 ~

A new day dawns at Democratic National Committee as Joe Biden gave Jaime Harrison the nod for DNC Chair. His experience will help change the party’s approach to southern states, complimenting the work Stacey Abrams did in Georgia.

There will be grousing from the far left about Harrison’s experience working for Podesta Group and the types of clients served. But Harrison has done what others with similar experience haven’t — organizing and getting out the vote in marginalized communities, zip code by zip code. Will he be more moderate as many Black Americans are across the south? Sure, but leave the policy and legislation to the Democratic majority in Congress; if they can pull off greater successes felt at home and in American’s wallets, the entire base will move more to the left.

We may have a chance to keep the majority and win more seats if Harrison can keep the energy high across the party. We don’t want another 2010 during which we lost an extremely narrow majority in the Senate, ushering in Mitch McConnell’s nightmarish decade of obstruction and social destruction.

~ 0 ~

What other good news is there? Apart from the fact we are now six days away from Biden’s inauguration. Share in comments.

Donald Trump Has a Roger Stone Problem

By all appearances, the investigation into whether Roger Stone bears some liability for the 2016 Russian hacks is ongoing, with new evidence available from the search of his homes, a February search following that, Andrew Miller’s testimony, and anything Ecuador turns over to the US government.

But even without any further charges against Stone, Donald Trump has a Roger Stone problem, one he may not be able to dispense with by pardoning his rat-fucker before Stone’s November trial.

That’s because he could be a lynch pin in the DNC lawsuit against Trump’s campaign and associates, and no one is actually contesting that.

The lawsuit has been inching along with updates after each new batch of evidence. Earlier this week, everyone but WikiLeaks submitted their reply in support of a motion to dismiss (WikiLeaks’ response, which has always been premised on claiming that Julian Assange and WikiLeaks are not the same thing, has gotten more difficult in the wake of Assange’s arrest).

Along with all the replies, the Trump campaign (represented by Jones Day, which has an incentive to bill liberally while the White House tries to prevent partner Don McGahn from testifying to Congress) submitted a motion for sanctions on the DNC for continuing to claim a conspiracy after the Mueller Report made clear there was evidence of a — or several — conspiracies, but nothing for which he had proof beyond a reasonable doubt.

Of course, the standard for a civil case is lower than it is for a criminal one, and to survive the motion to dismiss the DNC doesn’t even have to get that far, which is one of the things the DNC argued when the Trump campaign first threatened sanctions.

In arguing to the contrary, the Trump Campaign commits a logical error that the Report warned readers not to make. Specifically, the Campaign assumes that there were only two possible outcomes from the Special Counsel’s investigation: (1) it would conclusively establish the Trump Campaign’s guilt; or (2) it would conclusively establish the Trump Campaign’s innocence. And because the investigation did not conclusively prove that the Trump Campaign conspired with Russia, the Campaign insists that investigation proved their innocence. By creating a false choice between these two extremes, the Trump Campaign leaves no room for the Report’s actual findings: there was evidence of the Trump Campaign’s guilt, but not enough to establish that guilt beyond a reasonable doubt. On page 2 of the Report, the Special Counsel warned readers not to make that mistake, explaining: “A statement that the investigation did not establish particular facts does not mean there was no evidence of those facts.” Report at 2 (emphasis added). Nevertheless, the Trump Campaign’s letter repeatedly and falsely suggests that, if the Special Counsel’s investigation “did not establish” a particular fact, then the investigation refuted that fact. 3. The Campaign’s Letter Overlooks the Differences Between Civil and Criminal Actions

The Campaign’s May 13 letter also overlooks the crucial differences between civil and criminal cases. It is axiomatic that an “acquittal in [a] criminal action does not bar civil suit based on the same facts.” 2A Charles Wright et al, Federal Practice & Procedure § 468 (4th ed. 2013); see also Purdy v. Zeldes, 337 F.3d 253, 259 (2d Cir. 2003). Similarly, the government’s decision not to press criminal charges against a defendant has no effect on civil proceedings. Indeed, civil plaintiffs routinely prevail in cases where the government has declined to prosecute the defendants. See, e.g., In re: Urethanes Antitrust Litigation, No. 04-1616 (D. Kan.) (after the government determined there was not enough evidence to prosecute the defendants, civil plaintiffs took the case to trial and secured a judgment of approximately $1.06 billion). This is not surprising in light of the different standards of proof in civil and criminal cases and the additional sources of evidence available to civil plaintiffs.

First, a civil plaintiff’s burden of proof is much lighter than the government’s burden of proof in a criminal case. See Sedima, S.P.R.L. v. Imrex Co., 473 U.S. 479, 491 (1985) (noting that a civil plaintiff only needs to show that it is more likely than not that the defendants violated the law, while criminal prosecutors must prove their case “beyond a reasonable doubt”). Thus, while the information available in the Special Counsel’s Report may be insufficient to sustain a criminal conviction, a civil jury could find the same information more than sufficient to hold Defendants civilly liable.

[snip]

Moreover, a civil plaintiff can pursue evidentiary avenues unavailable to prosecutors. For example, unlike in a criminal proceeding, where a defendant has no obligation to speak to government investigators regarding her own illegal conduct, a civil plaintiff can compel a defendant to attend a deposition, and if the defendant refuses, she can be held in contempt of court or otherwise sanctioned. See Fed. R. Civ. P. 37(b). Similarly, if a defendant invokes her Fifth Amendment right not to answer specific questions during a deposition or at trial, a civil jury— unlike a criminal jury—can infer that the defendant invoked her rights because she violated the law. See, e.g., See Mitchell v. United States, 526 U.S. 314, 328 (1999); Woods v. START Treatment & Recovery Centers, Inc., 864 F.3d 158, 170 (2d Cir. 2017). Thus, in this case, Trump, Jr., Assange, and the Agalarovs—whom the Special Counsel did not interview—can be compelled to attend depositions, where they will have an incentive to answer the DNC’s questions truthfully (rather than invoking their Fifth Amendment rights).

More interestingly, the motion for sanctions remains utterly silent about one of DNC’s key allegations: Roger Stone’s seemingly successful effort to optimize the WikiLeaks releases.

Admittedly, so is the DNC in its response to the Trump campaign letter, when it points to all the new details in the Mueller Report that supports their suit. But there’s good reason for it: Most of the Roger Stone stuff is redacted.

But the Trump campaign’s silence on Roger Stone is particularly damning because Stone has never address a key observation the DNC has made: that after Stone dismissed the value of leaked DCCC oppo research in a DM with Guccifer 2.0, the GRU went on to hack Democratic data that was quite valuable: their AWS-hosted analytics.

On September 9, 2016, GRU operatives contacted Stone, writing him “please tell me if I can help u anyhow[,]” and adding “it would be a great pleasure to me.” ¶ 179. The operatives then asked Stone for his reaction to a stolen “turnout model for the Democrats’ entire presidential campaign.” Id. Stone replied, “[p]retty standard.” See id.

Throughout September 2016, Russian intelligence agents illegally gained access to DNC computers hosted on a third-party cloud computing service, stole large amounts of the DNC’s private data and proprietary computer code, and exfiltrated the stolen materials to their own cloud-based accounts registered with same service. ¶ 180.

[snip]

Moreover, GRU officers using the screenname Guccifer 2.0 stayed in close contact with Stone, asking for feedback on how they could be most helpful, after Russia had been publicly linked to the theft of Democratic documents. See ¶¶ 167, 177-79. In September 2016, the GRU operatives asked Stone for his reaction to a “turnout model” that the GRU had stolen from another Democratic Party target. ¶ 179. After Stone suggested that he was not impressed, see id., Russia took snapshots of the virtual servers that housed key pieces of the DNC’s analytics infrastructure— its “most, important, valuable, and highly confidential tools,” which could have “provided the GRU with the ability to see how the DNC was evaluating and processing data critical to its principal goal of winning elections,” ¶ 180.

Not only does this put Stone’s interaction with GRU prior to some of the hacking it did, but it undercuts Stone’s entire defense (which is mostly to claim his involvement extends only to John Podesta emails, which he distinguishes from DNC).

The DNC’s second amended complaint does not overcome the lack of standing argument and that it does not allege Roger Stone conspired to damage the DNC; rather, the allegations are only inferences of another conspiracy against John Podesta whose emails were on a Google server – i.e. “gmail.com.” Furthermore, it has no standing against Roger Stone because Plaintiff did not sufficiently allege that he participated in the conspiracy against it.

The DNC keeps raising the September hack — which was clearly a DNC target — and Stone keeps just blowing that allegation off.

As noted above: the Stone material in the Mueller Report is currently redacted. But it’s there, showing that Stone provided Trump non-public details ahead of time (which Michael Cohen has described under oath and Rick Gates apparently has also described) and also showing that Trump wanted the emails and his top aides — including Paul Manafort, Rick Gates, Mike Flynn, and Steve Bannon — made sure he got them.

It is still a very high bar for the DNC to win this suit.

But Roger Stone is a very weak point in the Republican attempt to defeat it. And neither he nor the Trump campaign seem to want to address that fact head on.

Roger Stone Does the RICO Defense

Most of the Russian investigation beat journalists are analyzing Amy Berman Jackson’s latest smackdown of Roger Stone, in which she requires him to comply with her gag order even though (he claims) the book forward that conflicts with it was planned in advance of her gag. I’ll leave that to other journalists for now (though I will note that in the order, she relies on all the traps she set in the hearing on the gag, including Stone’s admission he doesn’t need the book for his livelihood and Stone’s lawyer’s concession that Stone shouldn’t speak about his case). Effectively, she’s still letting their stunt in that hearing make her ruling for her.

I’ve been engaged in the far more mundane analysis of how Stone’s defense against the DNC lawsuit has evolved, possibly in conjunction with his indictment and the prospect of further information coming out.

Yesterday, all the defendants who have accepted service in the DNC lawsuit against Trump’s campaign, WikiLeaks, the Agalarovs, and GRU submitted their motions to dismiss a second amended complaint (SAC). Because of the timing of all this, I wanted to compare Roger Stone’s last response (Second Motion) with the one submitted yesterday (Third Motion).

The last motions to dismiss were submitted December 7. The SAC, filed January 18, added allegations tied to Jerome Corsi’s draft plea agreement and related revelations, but not Stone’s indictment (which was filed a week after the SAC). But Stone’s response, submitted March 4, reflects the indictment, and presumably may reflect what his lawyers are seeing in discovery.

So comparing the two motions provides a sense of what Stone’s lawyers are seeing and how they imagine they’ll defend him against his indictment.

The SAC mentions Stone around 112 times; his actions (described starting at ¶161) form a key part of the Democratic narrative, and is key to tying the Trump associates named in the suit to the Russian and WikiLeaks efforts to exploit the stolen documents.

There are three key differences in Stone’s Third Motion and the Second.

Stone stops quoting the accusations against him

The Second Motion takes on the specific accusations against him, quoting some of the key paragraphs.

The specific facts alleged as to Roger Stone make him a unique defendant. While analyzing these allegations, it is critical for the Court to note when Stone is alleged, by Plaintiff to have joined the conspiracy (post-July 22, 2016, first DNC dissemination), what acts he allegedly committed to in fact join the conspiracy, and do those acts allege a conspiracy to which the DNC can seek a remedy in this Court. As to Roger Stone, the amended complaint alleges:

19. Throughout the summer and fall of 2016, during the height of the Presidential campaign, Trump’s associates continued to communicate secretly with Russian agents and WikiLeaks, who strategically disseminated information stolen from Democratic targets. For example, in August 2016, Stone began communicating secretly with GRU operatives and bragged about his contacts with Assange. Similarly, Gates, who served as the Trump Campaign’s deputy chairman and then liaison to the Republican National Committee, maintained secret communications with an individual he knew to be connected to the GRU. (emphasis added).

Other than the private messages (communication on the social network platform, twitter), between Guccifer 2.0 and Stone there are no additional allegations about what they communicated about. The communications are attached as exhibits to this motion.

20. In the summer and fall of 2016, Stone revealed information that he could not have had unless he were communicating with WikiLeaks, Russian operatives, or both about their hacking operations in the United States. For instance, in August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, the chairman of Secretary Hillary Clinton’s presidential campaign. Nevertheless, on August 21, 2016, Stone predicted that damaging information about Podesta would be released, tweeting “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. Similarly, in mid-September 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted. (emphasis added).

WikiLeaks merely telling Stone that it has specific information is not a tort. Additionally, since the DNC alleged that Stone’s prediction about “the Podesta’s” proves Stone joined the relevant conspiracy is belied by the fact John Podesta’s emails were not on the DNC server. The DNC cannot properly allege Stone joined the conspiracy and committed torts based upon this allegation in which the DNC cannot claim a concrete injury fairly traceable to Stone. An analysis of the DNC’s standing and misuse of inferences to attempt to sufficiently plead this conspiracy will be discussed below.

That same passage in yesterday’s motion to dismiss is far more abbreviated and — in the passage that most directly addresses the charges against him — doesn’t cite the DNC’s full accusations against him directly.

In the summer and fall of 2016, Stone revealed information that he could not have had unless he were communicating with WikiLeaks, Russian operatives, or both about their hacking operations in the United States. For instance, in August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, the chairman of Secretary Hillary Clinton’s presidential campaign. Nevertheless, on August 21, 2016, Stone predicted that damaging information about Podesta would be released, tweeting “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. Similarly, in mid-September 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted.

Next, the DNC alleges Roger Stone was prophetic because he “revealed information he could not have had unless he were communicating with WikiLeaks, Russian operatives or both. (SAC ¶ 22). An example cited is: In August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, Stone predicted that damaging information about Podesta would be released, tweeting: “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. (SAC ¶91).

WikiLeaks merely telling Stone that it has non-specific information is not a tort. But the DNC emphasizes that “Stone discussed highly confidential and strategic information stolen from another Democratic party institution and disseminated to the public.” (SAC ¶ 23). This admission in and of itself proves that the Podesta emails were not part of the DNC records. Since the DNC alleged that Stone’s prediction about “the Podesta’s” proves Stone joined the relevant conspiracy and enterprise it is absolutely defeated by the fact John Podesta’s emails were not on the DNC server or that of the other “Democratic party institution.” Similarly, in midSeptember 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” Id. And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted. Id.

Then the DNC alleges Stone and other defendants misled various government agencies. Stone did not lie to the Special Counsel or the FBI; he only appeared or testified to one congressional committee. 3 He is alleged to have intimidated a witness who “threatened to contradict his narrative about his communications with WikiLeaks.” (SAC ¶ 30). But neither the testimony to Congress, nor the “intimidation” occurred prior to the 2016 presidential election.

3 Roger Stone has been indicted in the District of the District of Columbia. (Case No. 1:19-cr-18-ABJ). The indictment charges Stone with lying to Congress and intimidating a witness, Randy Credico in relation to Credico asserting his Fifth Amendment right to a House Committee. The indictment is not for conspiracy, RICO, theft, or trespass. The DNC alleges an open-ended RICO, something the Special Counsel has not been willing to allege against any American.

By telling this instead as a narrative rather than quoting the actual paragraphs, Stone minimizes the accusations against him, which the DNC could now fill out with more from his indictment.

Ultimately, Stone’s defense remains, as it has been from the start, that any foreknowledge of the John Podesta emails is useless to the Democrats’ lawsuit because Podesta’s emails were not stolen from a DNC server, and that he had no foreknowledge of the DNC release to WikiLeaks (he also leans heavily on WikiLeaks not having engaged in a tort, which may get him in trouble if WikiLeaks does get charged with something).

The possibility that Stone saw the Podesta emails in advance may explain this strategy. After all, if it comes out that he did receive the Podesta emails in advance, then his defense here (that the emails don’t amount to economic espionage) still might fly given that Podesta was not part of the DNC.

But now that Cohen has described Stone warning Trump of the July 22 release, that strategy may begin to crumble.

Stone drops his claim not to be part of the campaign

In the Second Motion, in an effort to distance himself from the network of conspirators, Stone denied that he was part of the campaign.

Conspiracy between Stone and the Campaign.

Plaintiffs do not state a proper theory of conspiracy to support any claim. An agent of a corporation cannot conspire with the corporation itself. Executive Sandwich Shoppe, Inc. v. Carr Realty Corp., 749 A.2d 724, 739 (D.C. 2000) (referred to as the “intracorporate conspiracy doctrine”); Little Professor Book Co. v. Reston N. Pt. Vill., 41 Va. Cir. 73 (1996) (circuit court opinion); Reich v. Lopez, 38 F. Supp. 3d 436, 464 (S.D.N.Y. 2014), aff’d, 858 F.3d 55 (2d Cir. 2017); Tabb v. D.C., 477 F. Supp. 2d 185, 190 (D.D.C. 2007) (citing Dickerson v. Alachua County Comm., 200 F.3d 761, 767 (11th Cir. 2000)). Stone worked as an independent contractor for the Campaign for a few months in 2015. In short, the amended complaint alleges Stone was always acting as an agent of the Trump Campaign for President. In the only footnote in the amended complaint, the term “Trump Associate” is defined as an agent of the Campaign. (Am. Compl. at 16 *). The D.C.-law and Virginia law, therefore, does not support a claim of conspiracy between Stone and the Campaign.

That footnote in the SAC has been rewritten to define Trump associate this way:

“Trump Associates” refers to the Trump advisors and confidants named as Defendants herein: Trump, Jr., Manafort, Kushner, Stone, and Papadopoulos.

In the section disclaiming a role in managing the RICO enterprise, Stone also drops an argument that the complaint doesn’t allege “that he was even communicating with the other ‘Trump associates’,” leaving this argument denying that he played a key role in the conspiracy.

The lawsuit does not allege Roger Stone had a management or operational position in the Campaign at all. He was merely an informal adviser. In short, Stone did not have any part in directing the enterprise’s affairs as required by the law in this Circuit. See id. At best, Stone is talking to an alleged Russian hacker on twitter about a hack and theft after the DNC’s data was stolen.

In the wake of his indictment — which gets closer to suggesting Stone got the October release timed to drown out the Access Hollywood release (a claim Jerome Corsi has sometimes backed), not to mention Michael Cohen’s claim that Stone told the President about the initial July 22 email dump several days in advance — this claim may get harder to sustain.

Indeed, as it is, if Stone goes to trial multiple communications with the campaign about WikiLeaks’ releases will become public. But Cohen’s allusion to corroboration about the July 18 or 19 Stone call to Trump suggests that information could become public even sooner.

Stone continues to ignore potential CFAA exposure

As in the Second Motion, there’s a key part of the Democratic narrative that Stone ignores in the Third Motion: the hack of the Dem’s analytics on AWS, which post-dates Guccifer 2.0’s offer to help Stone and offer of the DCCC analytics in early September, which starts this way (I discuss and quote this in more depth in this post).

N. The GRU Reaches Out To Stone About Democratic Party Turnout Models

177. On August 22, 2016, GRU operatives transmitted several gigabytes of data stolen from another Democratic party target to a Republican party strategist in Florida. The data included voter turnout analyses for Florida and other states.160

178. Between September 7 and September 8, 2016, the GOP strategist exchanged private messages with GRU operatives posing as Guccifer 2.0 in which he explained the substantial value of the stolen data he had received from them.161

179. On September 9, 2016, GRU operatives posing as Guccifer 2.0 contacted Stone, writing him “please tell me if I can help u anyhow[,]” and adding “it would be a great pleasure to me.” The operatives then asked Stone for his reaction to the “turnout model for the Democrats’ entire presidential campaign.” Stone replied, “[p]retty standard.” 162

O. Russia Launches Another Attack On DNC Servers Housing Sensitive And Valuable Trade Secrets

180. On September 20, 2016, CrowdStrike’s monitoring service discovered that unauthorized users—later discovered to be GRU officers—had accessed the DNC’s cloud-computing service. The cloud-computing service housed test applications related to the DNC’s analytics. The DNC’s analytics are its most important, valuable, and highly confidential tools. While the DNC did not detect unauthorized access to its voter file, access to these test applications could have provided the GRU with the ability to see how the DNC was evaluating and processing data critical to its principal goal of winning elections. Forensic analysis showed that the unauthorized users had stolen the contents of these virtual servers by making exact duplicates (“snapshots”) of them and moving those snapshots to other accounts they owned on the same service. The GRU stole multiple snapshots of these virtual servers between September 5, 2016 and September 22, 2016. The U.S. government later concluded that this cyberattack had been executed by the GRU as part of its broader campaign to damage to the Democratic party.

DNC’s allegation that Stone informed Guccifer 2.0 he was unimpressed with the DCCC oppo research released in early September, followed shortly by GRU’s hack of the crown jewels, would seem to undermine Stone’s entire defense, given that his claims that his conversations with Guccifer 2.0 preceded all hacks (it doesn’t — indeed, it happens as the hacks are occurring) and his claims that the Podesta release is unrelated because is not DNC does not apply to the analytics.

But thus far, he’s just ignoring those allegations.

None of the new details about Stone’s conduct will really get the DNC to The RICO. But it may put Stone at more risk of other exposure.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

A Tale of Two GRU Indictments

Yesterday, DOJ indicted a bunch of GRU hackers again, in part for hacks in retaliation for anti-doping associations’ reports finding a state-run Russian effort to help its athletes cheat (though also including hacks of Westinghouse and the Organization for the Prohibition of Chemical Weapons (OPCW)).

As the DNC GRU indictment did, this indictment provides a snapshot of the division of labor in GRU, made easier by the capture of four of these guys, with all their hacking toys in the trunk of their rented car, in the Netherlands. I find a comparison of the two indictments — of some of the same people for similar activity spanning the same period of time — instructive for a number of reasons.

The team

Consider the team.

There are Aleksei Morenets and Evgenii Serebriakov, whom the indictment calls “on-site GRU hackers who traveled to foreign countries with other conspirators, in some instances using Russian government issued diplomatic passports to conduct on-site operations.” Serebriakov even has a title, “Deputy Head of Directorate,” which sounds like a pretty senior person to travel around sniffing WiFi networks.

There are the three men we met in the DNC indictment, Ivan Yermakov, Artem Malyshev, and Dmitriy Badin, all of whom work  out of Moscow running hacks. Yermakov and Malyshev were closely involved in both hacks in 2016 (as demonstrated by the timeline below).

Finally, there are Oleg Sotnikov and Alexey Minin, who joined Morenets and Serebriakov as they tried to hack the Organization for the Prohibition of Chemical Weapons (OPCW) and tried to hack the Spiez Chemical laboratory that was analyzing the Novichok used to poison Sergei Skripal.

There are slightly different tactics than in the DNC hack. For example, GRU used a bunch of bit.ly links in this operation (though some of those are an earlier campaign against Westinghouse). And they sent out hackers to tap into targets’ WiFi networks directly, whereas none of the DNC hackers are alleged to have left Russia.

But there’s a ton of common activity, notably the spearphishing of targeted individuals and the use of their X-Agent hacking tool to exploit targeted machines.

Overlapping hack schedule

I’m also interested in the way the WADA hack, in particular, overlaps with the DNC one. I’ve got a timeline, below, of the two indictments look like (I’ve excluded both the Westinghouse and OPCW hacks from this timeline to focus on the overlapping 2016 operations).

Yermakov and Malyshev are described by name doing specific tasks in the DNC hack though May 2016. By August, they have turned to hacking anti-doping targets. Yermakov, in particular, seems to play the same research role in both hacks.

Given the impact of these operations, it’s fairly remarkable that such a small team conducted both.

Common bitcoin habits and possibly even infrastructure

There are also paragraphs in the WADA indictment, particularly those pertaining to the use of bitcoin to fund the operation used to substantiate the money laundering charge, that appear to be lifted in their entirety from the DNC one (or perhaps both come from DOJ or Western PA US Attorney boilerplate — remember that the DNC hack was originally investigated in Western PA, so this language likely originates there).

These include:

  •  58/106: Describing how conspirators primarily used bitcoin to pay for infrastructure
  • 59/107: Describing how bitcoin works, with examples specific to each operation provided
  • 60/108: Describing how conspirators used dedicated email accounts to track bitcoin transactions
  • 61/109: Describing how conspirators used the same computers to conduct hacking operations and facilitate bitcoin payments
  • 62/110: Describing how conspirators also mined bitcoin and then used it to pay for servers, with examples specific to each operation
  • 64/111: Describing how conspirators used the same funding structure and sometimes the same pool of funds to pay for hacking infrastructure, with examples specific to each operation provided

The similarity of these two passages suggests two things. First, it suggests that the August 8, 2016 transaction in the WADA indictment may have been orchestrated from the gfade147 email noted in the DNC indictment. With both, the indictment notes that “One of these dedicated accounts … received hundreds of bitcoin payment requests from approximately 100 different email accounts,” with the DNC indictment including the gfade147 address. (Compare paragraphs 60 in the DNC indictment with 108 in the WADA one.)  That would suggest these two operations overlap even more than suspect.

That said, there’s one paragraph in the DNC indictment that doesn’t have an analogue in the WADA one, 63. It describes conspirators,

purchasing bitcoin through peer-to-peer exchanges, moving funds through other digital currencies, and using pre-paid cards. They also enlisted the assistance of one or more third-party exchangers who facilitated layered transactions through digital currency exchange platforms providing heightened anonymity.

Given how loud much of these operations were, it raises questions about why some of the DNC hack (but not, at least by description) the WADA one would require “heightened anonymity.”

Different treatment of InfoOps

I’m perhaps most interested in the different treatment of the InfoOps side of the operation. As I noted here, in general there seems to be a division of labor at GRU between the actual hackers, in Unit 26165, which is located at  20 Komsomolskiy Prospekt, and the information operations officers, in Unit 74455, which is located in the “Tower” at 22 Kirova Street, Khimki. Both units were involved in both operations.

Yet the WADA indictment does not name or charge any Unit 74455 officers, in spite of describing (in paragraphs 1 and 11) how the unit acquired and maintained online social media accounts and associated infrastructure (paragraph 76 describes that infrastructure to be “procured and managed, at least in part, by conspirators in GRU Unit 74455”). Five of the seven named defendants in the WADA indictment are in Unit 26165, with Oleg Sotnikov and Alexey Minin not identified by unit.

By comparison, three of the 11 officers charged in the DNC indictment belong to Unit 744555.

And the WADA campaign did have a significant media component, as explained in paragraphs 76-87. The indictment even complains (as did DOJ officials as the press conference announcing this indictment) about,

reporters press[ing] for and receiv[ing] promises of exclusivity in such reporting, with one such reporter attempting to make arrangements for a right of first refusal for articles on all future leaks and actively suggesting methods with whicch the conspiracy could search the stolen materials for documents of interest to that reporter (e.g., keywords of interest).

That said, the language in much of this discussion (see paragraphs 77 through 81) uses the passive voice — “were registered,” “were named,” “was posted,” “were released,” “were released,” “were released,” “were released” — showing less certainty about who was running that infrastructure.

That’s particularly interesting given that the government clearly had emails between the Fancy Bear personas and journalists.

One difference may be, in part, that in the DNC indictment, there are specific hacking (not InfoOps) actions attributed to two of the Unit 74455 officers: Aleksandr Osadchuk and Anatoliy Kovalev. Indeed, Kovalev seems to have been added on just for that charge, as he doesn’t appear in the introduction section at the beginning of the indictment.

Whereas Unit 74455’s role in the WADA indictment seems to be limited to running the InfoOps infrastructure.

Importance of WikiLeaks and sharing with Republicans

It’s not clear how much we can conclude form all that. But the different structure in the DNC indictment does allow it to foreground the role of a number of others, such as WikiLeaks and Roger Stone and — as I suggested drop in some or all of  those others in a future conspiracy indictment — that were a key part of the election operation.

Timeline

February 1, 2016: gfade147 0.026043 bitcoin transaction

March 2016: Conspirators hack email accounts of volunteers and employees of Hillary campaign, including John Podesta

March 2016: Yermakov spearphishes two accounts that would be leaked to DC Leaks

March 14, 2016 through April 28, 2016: Conspirators use same pool of bitcoin to purchase VPN and lease server in Malaysia

March 15, 2016: Yermakov runs technical query for DNC IP configurations and searches for open source info on DNC network, Dem Party, and Hillary

March 19, 2016: Lukashev spearphish Podesta personal email using john356gh

March 21, 2016: Lukashev steals contents of Podesta’s email account, over 50,000 emails (he is named Victim 3 later in indictment)

March 25, 2016: Lukashev spearphishes Victims 1 (personal email) and 2 using john356gh; their emails later released on DCLeaks

March 28, 2016: Yermakov researched Victims 1 and 2 on social media

April 2016: Kozachek customizes X-Agent

April 2016: Conspirators hack into DCCC and DNC networks, plant X-Agent malware

April 2016: Conspirators plan release of materials stolen from Clinton Campaign, DCCC, and DNC

April 6, 2016: Conspirators create email for fake Clinton Campaign team member to spearphish Clinton campaign; DCCC Employee 1 clicks spearphish link

April 7, 2016: Yermakov runs technical query for DCCC’s internet protocol configurations

April 12, 2016: Conspirators use stolen credentials of DCCC employee to access network; Victim 4 DCCC email victimized

April 14, 2016: Conspirators use X-Agent keylog and screenshot functions to surveil DCCC Employee 1

April 15, 2016: Conspirators search hacked DCCC computer for “hillary,” “cruz,” “trump” and copied “Benghazi investigations” folder

April 15, 2016: Victim 5 DCCC email victimized

April 18, 2016: Conspirators hack into DNC through DCCC using credentials of DCCC employee with access to DNC server; Victim 6 DCCC email victimized

April 19, 2016: Kozachek, Yershov, and co-conspirators remotely configure middle server

April 19, 2016: Conspirators register dcleaks using operational email [email protected]

April 20, 2016: Conspirators direct X-Agent malware on DCCC computers to connect to middle server

April 22, 2016: Conspirators use X-Agent keylog and screenshot function to surveil DCCC Employee 2

April 22, 2016: Conspirators compress oppo research for exfil to server in Illinois

April 26, 2016: George Papadopolous learns Russians are offering election assistance in the form of leaked emails

April 28, 2016: Conspirators use bitcoin associated with Guccifer 2.0 VPN to lease Malaysian server hosting dcleaks.com

April 28, 2016: Conspirators test IL server

May 2016: Yermakov hacks DNC server

May 10, 2016: Victim 7 DNC email victimized

May 13, 2016: Conspirators delete logs from DNC computer

May 25 through June 1, 2016: Conspirators hack DNC Microsoft Exchange Server; Yermakov researches PowerShell commands related to accessing it

May 30, 2016: Malyshev upgrades the AMS (AZ) server, which receives updates from 13 DCCC and DNC computers

May 31, 2016: Yermakov researches Crowdstrike and X-Agent and X-Tunnel malware

June 2016: Conspirators staged and released tens of thousands of stolen emails and documents

June 1, 2016: Conspirators attempt to delete presence on DCCC using CCleaner

June 2, 2016: Victim 2 personal victimized

June 8, 2016: Conspirators launch dcleaks.com, dcleaks Facebook account using Alive Donovan, Jason Scott, and Richard Gingrey IDs, and @dcleaks_ Twitter account, using same computer used for other

June 9, 2016: Don Jr, Paul Manafort, Jared Kushner have meeting expecting dirt from Russians, including Aras Agalarov employee Ike Kaveladze

June 10, 2016: Ike Kaveladze has calls with Russia and NY while still in NYC

June 14, 2016: Conspirators register actblues and redirect DCCC website to actblues

June 14, 2016: WaPo (before noon ET) and Crowdstrike announces DNC hack

June 15, 2016, between 4:19PM and 4:56 PM Moscow Standard Time (9:19 and 9:56 AM ET): Conspirators log into Moscow-based sever and search for words that would end up in first Guccifer 2.0 post, including “some hundred sheets,” “illuminati,” “think twice about company’s competence,” “worldwide known”

June 15, 2016, 7:02PM MST (12:02PM ET): Guccifer 2.0 posts first post

June 15 and 16, 2016: Ike Kaveladze places roaming calls from Russia, the only ones he places during the extended trip

June 20, 2016: Conspirators delete logs from AMS panel, including login history, attempt to reaccess DCCC using stolen credentials

June 22, 2016: Wikileaks sends a private message to Guccifer 2.0 to “send any new material here for us to review and it will have a much higher impact than what you are doing.”

June 27, 2016: Conspirators contact US reporter, send report password to access nonpublic portion of dcleaks

Late June, 2016: Failed attempts to transfer data to Wikileaks

July, 2016: Kovalev hacks into IL State Board of Elections and steals information on 500,000 voters

July 6, 2016: Conspirators use VPN to log into Guccifer 2.0 account

July 6, 2016: Wikileaks writes Guccifer 2.0 adding, “if you have anything hillary related we want it in the next tweo [sic] days prefabl [sic] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after”

July 6, 2016: Victim 8 personal email victimized

July 10-19: Morenets travels to Rio de Janeiro

July 14, 2016: Conspirators send WikiLeaks an email with attachment titled wk dnc link1.txt.gpg providing instructions on how to access online archive of stolen DNC documents

July 18, 2016: WikiLeaks confirms it has “the 1Gb or so archive” and would make a release of stolen documents “this week”

July 22, 2016: WikiLeaks releases first dump of 20,000 emails

July 27, 2016: Trump asks Russia for Hillary emails

July 27, 2016: After hours, conspirators attempt to spearphish email accounts at a domain hosted by third party provider and used by Hillary’s personal office, as well as 76 email addresses at Clinton Campaign

August 2016: Kovalev hacks into VR systems

August 2-9, 2016: Conspirators use multiple IP addresses to connect to or scan WADA’s network

August 2-4, 2016: Yermakov researches WADA and its ADAM database (which includes the drug test results of the world’s athletes) and USADA

August 3, 2016: Conspirators register wada.awa.org

August 5, 9, 2016: Yermakov researches Cisco firewalls, he and Malyshev send specific WADA employees spearfish

August 8, 2016: Conspirators register wada-arna.org and tas-cass.org

August 8, 2016: .012684 bitcoin transaction directed by dedicated email account

August 13-19, 2016: Morenets and Serebriakov travel to Rio, while Yermakov supports with research in Moscow

August 14-18, 2016: SQL attacks against USADA

August 15, 2016: Conspirators receive request for stolen documents from candidate for US congress

August 15, 2016: First Guccifer 2.0 exchange with Roger Stone noted

August 19, 2016: Serebriakov compromises a specific anti-doping official and obtains credentials to access ADAM database

August 22, 2016: Conspirators transfer 2.5 GB of stolen DCCC data to registered FL state lobbyist Aaron Nevins

August 22, 2016: Conspirators send Lee Stranahan Black Lives Matter document

September 1, 2016: Domains fancybear.org and fancybear.net registered

September 6, 2016: Conspirators compromise credentials of USADA Board member while in Rio

September 7-14, 2016: Conspirators try, but fail, to use credentials stolen from USADA board member to access USADA systems

September 12, 2016: Data stolen from WADA and ADAMS first posted, initially focusing on US athletes

September 12, 2016 to January 17, 2018: Conspirators attempt to draw media attention to leaks via social media

September 18, 2016: Morenets and Serebriakov travel to Lausanne, staying in anti-doping hotels, to compromise hotel WiFi

September 19, 2016 to July 20, 2018: Conspirators attempt to draw media attention to leaks via email

September 2016: Conspirators access DNC computers hosted on cloud service, creating backups of analytics applications

October 2016: Linux version of X-Agent remains on DNC network

October 6, 2016: Emails stolen from USADA first released

October 7, 2016: WikiLeaks releases first set of Podesta emails

October 28, 2016: Kovalev visits counties in GA, IA, and FL to identify vulnerabilities

November 2016: Kovalev uses VR Systems email address to phish FL officials

December 6, 2016 – January 2, 2017: Using IP frequently used by Malyshev, conspirators compromise FIFA’s anti-doping files

December 13, 2016: Data stolen from CCES released

January 19-24, 2017: Conspirators compromise computers of four IAAF officials

June 22, 2017: Data stolen from IAAF’s network released

July 5, 2017: Data stolen from IAAF’s network released

August 28, 2017: Data stolen from FIFA released

As I said in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

What Becomes Of The Brokenhearted Dems And Clickbait Complicit Media Who Got Us Here?

Will Rogers very famously said:

“I am not a member of any organized political party. I am a Democrat.”

That was made sometime in the 1930’s I think, but it is enduringly true.

So, where will the Democratic party go now that they have had their ass handed to them by Trump? Who will lead the Democratic party going forward?

The calls are already ringing out. Liz Warren! Bernie Sanders! Keith Ellison (Sanders has even issued an email ask as to Ellison)! But there is a serious money people and Clintonian push for Howard Dean. Which is truly mind numbing.

Howard Dean is moldy cheese that needs to be taken out with the next non-recycle trash dump. He did neither himself, nor the party, any favors in the 2016 election clownshow cycle. Seriously, in the 2016 election cycle, Sarah Palin may have been more reserved and credible than Howard Dean.

Dean’s 50 state op got Obama elected in 2008, but he is smelly garbage now. Screw this always retread manure. Dean needs to dry up and go away.

And the Democratic Party needs to extricate their head from their ass and move to the future.

New blood. Dems CANNOT be the same old constantly revanchist assholes every time they lose bigly. And, boy did they lose bigly.

The Dem go to kleptomaniacs like Debbie Wasserman Schultz and Rahm Emanuel not only did not help the party expand but set it back in serious ways in places like MO, KS, AZ and the entire United States.

And, while we are at it, the high holy “Senator Professor Warren” ain’t immune either. She had a moment and a shot, and she cowardly whiffed. Maybe it is something she just truly did not want, and, if so, fine. But don’t tell me that someone that is little more than a year younger than Hillary, and who consciously forfeited both her, and Bernie’s, shot in 2016, will be the Democratic holy savior in 2020.

Don’t do that. This is the same ignorant reset idiocy that got Democrats here today. That time is done. If Democrats do one thing ever, it ought be to build the bridge for the young’s of the United States to clean up the shithole we left them. Liz Warren and Bernie Sanders can be a huge part in doing that. But only as bridge builders, not as the man or woman who will be the avatar in 2020. We need them terribly, but not themselves as the embodiment of the future. That kind of thinking is the idiocy of the past.

There is a future. Although CNN’s Jeff Zucker and Trump/Breitbartism’s Steve Bannon are brothers in clickbait cuck arms that birthed, literally, President Trump, and will not easily give up their money raking news cycles.

The “new normal” is that CNN, MSNBC, NBC, CBS, ABC, New York Times, Washington Post, and an endless roll call of dying, wimpering subservient media jackasses, who rode Trump’s clickbait train to a place in hell, will find it’s new Stockholm Syndromed place and start lecturing us how it is all good and just a “function of normal democracy”. It is already occurring, just watch any Wolf Blitzer on CNN or Chris Matthews on MSNBC moment. They are getting climax happy legs on Trump and Giuliani fascism as we speak.

That is one vision, and the early reality, of what the “press” will do in the coming Trump Presidency. The competing vision, which is what I hope and ascribe to, is that the media extricates their heads from their asses and brings real scrutiny to try to mitigate the hell they helped gestate. Are there enough Brian Stelters and Jay Rosens to get us there?

The brokenhearted Dems have some serious soul searching to engage in. So do the currently unapologetic and furiously rationalizing media and “pundits” who so helped get us here.

“Balanced” is NOT fair. Honest is fair. Accurate is fair. Truth is fair. Putting on panels of bickering loud mouthed bought and paid for political assholes as “news coverage” is NOT fair. Nor is it “balanced” news. Jeff Zucker makes Roger Goodell look like a piker in terms of the pantheon of American assholes.

While the media, especially cable, has a circle jerk field day congratulating themselves over their “wall to wall coverage”, and “looking forward to the transition”, just remember how the Trumpism and fascism germinated. Not shockingly, it germinated the same way it always has. When the gatekeepers of a rational society become more about themselves and their money than their jobs representing society.

There is a lesson here, too, for the Dems in media interaction. You got played and hosed royally. Don’t be the brokenhearted, be the, for once, party that learns from its mistakes and failures, and does better.

Just once, do this. If you can.

UPDATE: Commenter GK James posted something below that I think crystallizes much of what I was trying to say far better than I did, even if from a slightly different perspective.

Sure, but doesn’t that effectively absolve the demos that does the choosing? Aren’t Democrats up against a larger problem, one that they’ve had to wrestle with since Reagan? How do you advocate a progressive worldview when the majority of an aging, increasingly atomized, entertainment-addicted population doesn’t want that? It’s easy enough to say, after the fact, that Clinton should have focused more on those disadvantaged by globalization, or that, had they only chosen Sanders, the Democrats would have won. But recall that, without moving to the center, Bill Clinton would never have made it. A lousy bargain in retrospect, but not a crazy one at the time.

Yes, the DNC needs new blood. But assuming someone is found who can articulate a crisp clear message of what Democrats stand for—and who’s telegenic, personable, and entertaining to boot—how would that change the stranglehold that Republicans have on state governments, state legislatures, and the US Congress? The clear majority likes the status quo, having no problem with gerrymandered districts, voter suppression, or bought-and-paid-for legislators who enjoy an incumbency rate of 90%+. And the infotainment complex is likely to help keep it that way by making sure that its customers are never overtaxed by complicated thoughts. There will still be people, adults, who read, think, and have constructive ideas about matters of public import, which they’ll express in complete sentences. But they’ll be increasingly outnumbered and marginalized in a Twittered world.

Can’t argue with that, and don’t know the answers to the questions. But the Democratic party, if it is to continue (and I think it must), has to start finding those answers quickly.

Tuesday: Tilted

I miss prosthesis and mended souls
Trample over beauty while singing their thoughts
I match them with my euphoria
When they said “Je suis plus folle que toi”


— excerpt, Tilted by Christine And The Queens

We’ve spent (and will spend) a lot of time looking at Americans this month, given the two major parties’ political conventions back to back. Yeah, we’ll look at Russia with a gimlet eye directed by media. But we could use a look away.

The artist in this video is actually Héloïse Letissier; Christine and the Queens is the stage name she and a group of transgender supporting artists use, though many of her works are solo performances. Letissier’s work isn’t confined to music alone as she also works in graphic arts. Her work frequently combines French and English lyrics with strong synthpop beat, making for wide appeal outside of France. If you like Tilted, try the mournful but earworm-y Paradis Perdus and the more hip-hoppy No Harm Is Done.

Allons-y!

Eat more cyber

Motor mayhem

  • Tesla driver ‘speeding’ before Florida crash (Reuters) — IMO, the truck driver still bears some responsibility here, failed to yield to oncoming vehicle in spite of their speed. But I don’t have all the data, can’t be certain. One thing I can be more sure of: Tesla’s ‘driving-assist software’ should NOT be perceived as autopilot. If this was true autopilot, the software would have adjusted the vehicle’s speed to meet and not exceed the posted limit.
  • U.S. District court gives prelim approval to Volkswagen’s $15B settlement (LAT) — Settlement covers consumers’ and EPA’s suit on passenger diesels with emissions cheat devices. The deal offers car owners to choose a vehicle buy-back on 2.0L passenger diesel models. VW Group’s 3.0L models are not included in this preliminary offer.
  • Volkswagen owners in EU get an apology, not a check (Politico.EU) — They are NOT happy with the disparity between the $15B initial settlement offered to US passenger diesel owners and the lip service offered to EU vehicle owners.

    “For the same car, in the U.S., you get a compensation, while in Europe you get an apology,” said Maroš Šefčovič, a Commission vice president overseeing energy and climate policy. “I don’t think it is fair.”

    Yeah, it’s not fair, and VW’s head engineer Ulrich Eichhorn is wrong when he says EU customers aren’t damaged. Baloney–the entire EU is damaged by higher NOX and other pollutants generated by these fraudulent cars. People are sick and dying because EU’s biggest automaker is poisoning the air.

Science-y schtuff

  • WHO: Antibiotic resistance a bigger threat than cancer within ~30 years (Euronews) — The rise of superbugs and inadequate research is already costing tens of thousands lives each year and beaucoup money. It will only get worse if the use of antibiotics remains excessive and research doesn’t increase.
  • Plasma technology may extend storage life of fruits (ScienceDaily) — Plasma technology — using energy applied to a gas — can zap bacteria on surface of fruit to prevent deterioration the bacteria cause. Except it’s expensive compared to simply washing fruit with known natural antibacterial agents. Like vinegar and water. Plasma tech might be best used on soft fruits like berries which don’t handle washing very well. But still, more energy required, and any heat generated might cook the fruit. ~smh~
  • Better beer through yeast (Nature) — Soon-to-be-published paper will detail 150 yeast strains’ genomes in an effort to help beermakers find the perfect yeast. What happens when they find The One, though? Will we lose our excuse for sampling widely and deeply?

Longread for your next commute
Belt magazine offers a four-part series, Walking to Cleveland by Drew Philps. It’s a travelogue of sorts, documenting Philp’s journey on foot from Dearborn to Cleveland in time for the Republican National Convention. Visit the Midwest with read.

Catch you later!

Tuesday: Going Alone

I’ve been so damned angry I’ve had difficulty wrapping words around what I want to say. It’s still Tuesday somewhere, so I’ll grit this out.

Assault weapons should be banned for sale to civilians.

Spare me the crap about hunters and taking their guns. My freezer contains 25 to 100 pounds of venison at any time. This household lives off the results of hunting and respects the power of firearms. None of this meat required an assault weapon.

If an assault weapon had been used, it would have been a waste of a deer tag. There’d be no meat left.

The embedded video above shows the damage hunting ammo does at close range — approximately 15-20 feet — on meat. The next video shows the damage #4 and #8 birdshot can do at short range, even through multiple layers of denim and drywall. Imagine what an assault weapon would do to flesh at similar range.

Better yet, listen to what a combat vet says about assault weapons.

There’s nothing in the Second Amendment to suggest a prohibition on certain weapons is wrong; if anything, the framing of a ‘well regulated militia’ suggests limitations are in order.

There’s also nothing in the Second Amendment to suggest that gun manufacturers have an absolute right to an unrestrained business model, or to profits at the expense of the public’s general welfare.

Nor does the Second Amendment say a damned thing about catering to ‘gun enthusiasts’ who want guns for ‘pleasure’. A ‘well regulated militia’ doesn’t possess guns but as necessary for the ‘security of a free state’, not personal enjoyment.

And both embedded videos embedded make a bloody good case that arguments about assault weapons being necessary to stop a home invasion are trash. Birdshot at close range can do one hell of a lot of damage, as do 00 buckshot and a 1-oz slug.

Congress — more specifically, the GOP — needs to strap on its spine and draw the line on assault weapons. How many more dead Americans is it going to take before Congress clues in the terrorist threat is already here? It’s domestic, and it’s better armed than the police because GOP-led Congress is as weak as the GOP is against Trump.

Spare the empty moments of silence and prayers which might as well be to Moloch after another human sacrifice. Such fail at protecting the American public.

Speaking of which…

Information Security Fail

  • USAF database with records on ~100,000 investigations ‘lost’ (Defense One) — This is such bullshit, I can’t even…why is a CONTRACTOR, which may be the subject of any one of the 100K investigations, hosting and managing a database like this? What a massive conflict of interest. The database included constituent and congressional inquiries. Don’t even get me started on the fact this system relied on Microsoft Internet Explorer. Where have we seen this kind of massive loss of data including failed backups before? Hardly a surprise the data covers the period including most of the Iraq and Afghanistan wars as well as the construction of the F-35. Somebody better lose their job for this crap, and there’d better be a respectable investigation instead of the usual fluffery hiding billions of lost dollars.
  • DNC database infiltrated by the Russians (WaPo) — DNC Chair Debbie Wasserman-Schultz needs to be walked out the door for this bullshit, along with responsible IT management. As if anyone able to sit up and take nourishment couldn’t see the DNC computer systems would be a target for cybercrime and cyberwarfare. No excuses for this during the run-up to a general election season, especially when her favorite candidate is already floundering because of information security failures during her tenure as Secretary of State. This bit:

    The depth of the penetration reflects the skill and determination of the United States’ top cyber adversary as Russia goes after strategic targets, from the White House and State Department to political campaign organizations.

    Total blowjob for access. If the hackers got in by spearphishing as suggested in the article, there’s no finesse required. Just poorly trained/educated users and no firewall between email and database. The only thing that surprises me about this is that ransomware wasn’t deployed. Imagine it: a major U.S. political party ground to a halt by spearphish-delivered ransomware.

  • University of Calgary paid CDN$20K after ransomware attack (Calgary Herald) — First heard about this attack the end of May. Looks like the school had no choice but to offer the bitcoin equivalent of $20K to release their systems, which says a lot about backup systems and rebuild cost. Considering the broad range of users at universities and widely different levels of experience and training, I’m surprised we haven’t seen more ransomware attacks on schools. Though monetarily they’re less appetizing than other targets, and may have more resources to deal with the threat if they have a strong IS/IS program.
  • Chinese IBM employee arrested for trade secret theft (Reuters) — The indictment (pdf) says the now-former IBM employee stole proprietary software related to hyperscale storage clusters, or what most consumers would know as ‘cloud storage’. This is a technology segment in which the U.S. still has considerable clout in terms of marketshare, and in terms of global economic impact based on its use. Reporting on this indictment has been vague, referring to the technology at the heart of this case as ‘networking software’. It’s more complex than that; the proprietary software underpins storage and retrieval of data across networked large storage devices. (Hi blueba. Just checking to see if you missed me. Can’t let the Russians have all the fun.)

Basta. Enough. Let’s hope Wednesday is kinder than the last handful of days have been.

The Democrats’ “Diversity Problem”

[youtube]S_Rjj8onm2c[/youtube]

There was a bit of a stink after Chuck Todd suggested the Democrats wish they had the diversity the GOP showed at the RNC this week. Josh Marshall said it was, “one of the stupidest things I’ve ever heard anyone say.” And then Marshall and Todd debated about it over Twitter. At which point Todd made it clear that he was reporting what the Obama campaign had said to him.

And this is reported material btw, not pundit speculation.

Marshall pointed out how diverse the Democratic party is.

Dude. Actually, let me rephrase that … DUDE. Black prez. 2 asian-am sens, 1 Hisp sen, black gov. (1/3)

2 huge caucuses of hispanic & af-am lawmakers in House, do u really believe the dems “had to go” to a red state to (2/3)

To which Todd repeatedly suggested that this came from the Obama Administration and claimed he was talking about “high profile” positions.

how many govs and senators do the dems have on this front? That was my point. High profile positions

ask the Obama campaign if they wish they had govs and sens as diverse as GOP right now.

Now, frankly, I think Chuck Todd’s problem–in this particular instance–is that he repeated what the Obama campaign said to him, rather than pointing out how crazy the Obama campaign is. It’s not just diversity they want, it’s the right kind of diversity.

Which brings me to the Sunday shows, which include the following lineups–which presumably were made with the significant input of the Obama Administration. (h/t Elliott)

ABC’s This Week:  White House senior adviser David Plouffe.

 

CBS’ Face the Nation:Gov. Martin O’Malley (D-MD), former New Mexico Gov. Bill Richardson and Obama Deputy Campaign Manager Stephanie Cutter.
 

CNN’s State of the Union: Los Angeles Mayor Antonio Villaraigosa, Gov. Bev Perdue (D-NC), and Gov. Martin O’Malley (D-MD). Then, Obama Senior Campaign Adviser Robert Gibbs. Senior Romney Campaign Adviser Eric Fehrnstrom.
 

Fox News Sunday:DNC Chair Los Angeles Mayor Antonio Villaraigosa, Obama Campaign Senior Advisor David Axelrod.
 

NBC’s Meet the Press:Chicago Mayor Rahm Emmanuel.

The Latino Mayor of Los Angeles, a tainted but Latino former Governor of New Mexico, lots of dickish top campaign advisors, dickish Rahm, Governor O’Malley (who’s been a superb campaign surrogate).

And just two women, one Stephanie Cutter appearance and one appearance from the Governor of the state hosting the Convention.

Not even DNC Chair Debbie Wasserman Schultz, who whatever else I might say about her is also a terrific media figure. Read more

Road Trip: Democratic National Convention Edition

lake-superior.jpgIt’s that time of year again where I go off grid for a period of time and people resign or other momentous stuff happens while I’m away from the Toobz.

I’ll be leaving Friday evening for a road trip with mr. emptywheel and McCaffrey the MilleniaLab, up over the top of Lake Superior, through South Dakota so mr. emptywheel can see Abraham Lincoln in a rock, and from there down to Denver for the Convention (and to visit my family, some of whom live there). I can’t promise you mr. emptywheel will let me check on the Toobz until I get to Denver a week from tomorrow, though perhaps if I go into withdrawal I’ll liveblog Wall Drug for you (you think Wall Drug has wifi??). And McCaffrey the MilleniaLab, who was named after Eddie McCaffrey of the Denver Broncos, is hoping to be able to see Barack Obama accept the nomination in Mile High.

It’s bound to be a particularly momentous absence, as Calculated Risk will also be gone from the Toobz for some of the same dates as I’ll be gone–and when he goes off  grid, banks tend to fail. Obviously, one of the things I’ll be missing is the announcement of Obama’s Veep (and no, I didn’t sign up to get a text as soon as it’s announced), but who knows, maybe we’ll be lucky and another high level Bushie will resign to spend more time with his family.

In the meantime, bmaz will have the keys (yes, to the blog and to the liquor cabinet, you lushes), and I’ve instructed him he can do with those keys as he sees fit–so behave! You don’t want him to key your car. We’ll also have a few posts from another surprise guest poster next week, so you’ll be in great hands while I’m gone.

Anyone have any tips for must-see things along the way?

(Photo of Lake Superior Provincial Park, where I plan to do a day hike on Saturday, by loimere.) 

Howard, This Is Not About You, This Is About Your Country

Howard Dean has kicked off this meeting with a great speech. He emphasized the superb turnout Democrats have had this year. And he emphasized how strong we are to be able come together and disagree.

He condemned the sexist and racist statements made over the course of the primary. When he said, "on the part of the media" there were some grumblings.

He then told a story about when he was running for President. He was really really angry at what the Democratic Party had done. And he was ranting. (I imagine it went something like Argghhhhhh!!) And then Al Gore called. It took him about 20 minutes, but finally, Gore said, "Howard, this is not about you, this is about your country."

The speech made me proud to own a orange cap from Iowa.

Oh, and then he said, "we have to honor the voters who turned out, and also those voters who didn’t turn out in MI."

I got a lot of stares, up here in the media seats, for clapping loudly.

It was a good speech. We did good when we elected that man.