Posts

Don’t Make the Same Mistake with Iran that Denialists Made with Russia

I read the book by Aaron Zebley, James Quarles, and Andrew Goldstein on the Mueller investigation. Regarding the investigation itself, there were no new details. Where the book does break new ground is in describing the discussions with Trump’s attorneys and DOJ officials, especially with regards to the debate about whether to subpoena Trump. I’ll return to those details in a follow-up.

But I want to point to something they said in their afterward. They describe that Barr’s treatment of the report helped sow doubt about the import of the Russian attack on US democracy in 2016.

Perhaps the most significant casualty of Barr’s handling of the report was the truth about Russia’s attack on the United States during the 2016 election. The Russian government interfered in our democracy in sweeping and systematic fashion. Those are the first substantive words of our report. This statement is beyond dispute, and yet many in America do not know that, and still others deny it.

As detailed in volume I of our report, Russian operatives working for the Internet Research Agency visited the United States in 2014 to gather intelligence for what they called “information warfare” against the United States. They returned to Russia and—sitting at their desks in Saint Petersburg—planned and advertised rallies to support Trump at specific US locations, invited Americans to attend, provided banners for Americans to wave, and then handed off logistical responsibilities for the events to real Americans. The goal of these activities, along with their yearslong campaign of false-name social media accounts, was to further divide Americans and cause them to think and behave in particular ways—including at the voting booth in 2016.

Meanwhile, Russian military intelligence hacked into email accounts belonging to the Democratic team supporting Hillary Clinton in 2016, and then dumped emails and other documents they had stolen at specific times during the campaign to harm Clinton and bolster Trump. The Russians also leveraged WikiLeaks to release the stolen information, and, like the Russians, WikiLeaks timed its releases to favor Trump’s candidacy.

While these operations were underway, Russian government officials and their proxies reached out to multiple Trump campaign officials. George Papadopoulos was one example. A month after Trump appointed him as a foreign policy adviser in March 2016, Papadopoulos received word about a Russian government offer to assist the Trump campaign through the anonymous release of information information damaging to Clinton—“dirt” in the form of “thousands of emails.” This offer coincided with the Russian military’s then secret hack-and-dump operation.

It is beyond dispute that the Russians interfered in the 2016 election to support Trump—that was no hoax. They worked to secure his win. Our investigation of this work was no witch hunt.

[snip]

It has not seemed to matter, for instance, that our hack-and-dump indictment, which was backed by financial, email, and other records, demonstrated irrefutably that the Russian military executed this operation. Three days after the indictment came out, Trump dismissed it all in a press conference in Helsinki, Finland, after Putin—standing a few feet to Trump’s left—told him, “It’s not Russia.” Trump and his advocates declared it all a hoax, taking Putin’s word over the plain facts. And millions of Americans have taken this as truth, siding with Kremlin propaganda over the US Department of Justice.

We are now heading into another election. Russia interfered before, Russia is emboldened, and Russia is interfering again. Bob described Russia’s actions as one of the most serious attacks on democracy he has seen in his career—chilling words from the person who helped lead America’s fight against terrorism following the 9/11 attacks. As he put it in his 2019 testimony, the Russians are interfering in our democracy “as we sit here, and they expect to do it during the next campaign.”

I’ve obviously written a lot about this. It’s the central focus of the Ball of Threads podcast that LOLGOP and I are doing.

I fear that, because of the polarization Trump has deliberately stoked, many lefties are doing the same thing that Trump’s MAGAts did with Russia: treat credible allegations that Iran is targeting him, both for hacking and assassination, as a hoax.

Regarding the hacking, as happened in 2016, it is not just the Intelligence Community (one, two) attributing the hack in real time. Both Microsoft and Google have described the operation. As I explained repeatedly regarding the 2016 Russian attack, big American tech companies have a similar kind of global reach as the NSA, and when someone uses their infrastructure to target someone, they have both the tools and an independent incentive to get the attribution right. There’s really no reason to doubt the attribution, from three of the entities with the best global reach in the world, that Iran targeted Trump’s campaign.

Regarding Iran’s attempt to assassinate Trump, there’s also no reason to doubt that. While the case against Asif Merchant, whom DOJ accused of trying to solicit a variety of operations targeting Trump, does rely on undercover FBI employees posing as wannabe hitmen, the underlying tip — from the guy Merchant allegedly asked for help recruiting a hit team — appears to be organic, just someone calling the cops. Plus, the effort bears certain resemblance to the effort to solicit assassins for John Bolton, arising from the same motive of revenge for the Qassem Soleimani killing.

According to court documents, on Oct. 22, 2021, Poursafi asked Individual A, a U.S. resident whom Poursafi previously met online, to take photographs of the former National Security Advisor, claiming the photographs were for a book Poursafi was writing. Individual A told Poursafi that he/she could introduce Poursafi to another person who would take the pictures for $5,000-$10,000. Individual A later introduced Poursafi to an associate (referred to in court documents as the confidential human source or CHS).

On Nov. 9, 2021, Poursafi contacted the CHS on an encrypted messaging application, and then directed the CHS to a second encrypted messaging application for further communications. Poursafi offered the CHS $250,000 to hire someone to “eliminate” the former National Security Advisor. This amount would later be negotiated up to $300,000. Poursafi added that he had an additional “job,” for which he would pay $1 million.

As I noted in my first post on the Merchant arrest, the Pakistani man took 20 minutes before he let the FBI in to arrest him, meaning he may have had time to destroy evidence. There’s no reason to assume Merchant’s efforts to hire assassins was limited to the NYC source who called the FBI, nor is there reason to assume that Merchant was the only one recruiting assassins.

Indeed, as I keep noting, we can’t rule out that Ryan Routh (who was indicted yesterday and will face trial before Aileen Cannon, and whose son was arrested Monday after the FBI found CSAM at his house while conducting a search presumably related to his father) was recruited by Iran. His sympathy for Iran and his antipathy for Trump were both public, he imagined himself a fighter, and he had international ties from his efforts to recruit fighters for Ukraine. Both the Bolton efforts and the Merchant plot relied on secure digital operational security, and the six phones Routh had in his truck indicate he was communicating in unusual ways, even for — especially for — a person with possible mental illness. And the timing of Routh’s movements — he left North Carolina August 14 and traveled to Florida, scoped out Trump events in August, September, and October, and conducted reconnaissance for much of the month leading up to his arrest — match the planned timing of the Merchant plot. For a variety of reasons (not least that Routh has due process rights and an incentive to flip, if he did have co-conspirators), if the FBI did suspect an Iranian tie, they wouldn’t say more than they already have done, including references to Iran in his detention memo.

In the wake of Routh’s indictment yesterday, the IC briefed Trump on ongoing assassination threats from Iran. And while his comments to Fox — suggesting that Kamala Harris was weak on Iran — were typical Trump garbage, Trump’s Xitter account posted something that — for him — is downright gracious, recognizing the bipartisan support to expand Secret Service funding.

It is perfectly reasonable to call out the double standards of Trump himself, in responding stupidly to the hacking attempt, in ignoring his own role in the stalking of Barack Obama and pretending he has faced unique threats, in media outlets refusing to publish stolen emails.

Trump’s narcissistic behavior is one reason it’s so easy for hostile countries like Russia and Iran to stoke division.

But that doesn’t mean you should make it easier for them, by doubting the word of neutral parties who attest the threat to Trump is real. The Russian attack continues to do real damage, to this day, because the investigation into it led to such polarization. If I’m right about the Steele dossier (Ball of Thread version), some of that was by design, while some of it was the auspicious upside (from the perspective of Russia) of targeting a narcissist. But the result is the same: By targeting Trump, you can elicit the tribalism that damages the US, regardless of Iran’s (or Russia’s) other efforts. A great deal of the polarization in the US, a great deal of the conspiracism on the part of Trump supporters, and therefore a great deal of the extremism, stems from the response to the Russian attack and investigation.

Whether a country backs Trump or wants revenge against him, the goal is the same: to end US hegemony and extend authoritarianism. There are public, rational reasons to believe that Iran really is targeting Trump. There are no good reasons to instead irrationally doubt those public attributions.

Update: In an appearance in North Carolina, Trump said there could be a tie to Iran, and complained that DOJ had not yet broken into the six phones found in Routh’s truck.

Ryan Routh’s Eleven Phones and Two Iran Mentions

DOJ has submitted a detention memo for Ryan Routh, the man held on suspicion that he was trying to assassinate Donald Trump.

The memo cites a letter, left in a box with a neighbor months ago, that seems to confirm that he was trying to assassinate Trump (and offering six figures to anyone else who would accomplish the task). That same letter describes that Trump, “ended relations with Iran like a child and now the Middle East has unraveled.” The detention memo also cites the passage from Routh’s manuscript that I noted here, apologizing to Iran for voting for Trump.

I am man enough to say that I misjudged and made a terrible mistake and Iran I apologize. You are free to assassinate Trump as well as me for that error in judgment and the dismantling of the deal.

The memo describes a number of other things that suggest an operational security far exceeding that of a mentally ill man seeking glory. As I noted in the earlier post, the phone he had on his person while surveilling the golf course was one for which he had posted the WhatsApp number while Asif Merchant, charged in an attempt to recruit hitmen to target Trump, was still at large on July 10.

But in addition to that phone, Routh had six cellphones in his truck, at least two of which used different carriers, and four more cell phones in the box he left at a neighbor’s. As I mentioned, Merchant provided the informant in that case instructions on acquiring secure phones.

As previous reports described, the license plats on his truck were stolen, and he had two other sets of plates in the truck. One of the phones in the truck had been used to search for directions to Mexico.

Again, it certainly may be that Routh was simply disturbed. But more of this looks like Iran may have been involved.

The Concerning Paragraph in the Ryan Routh Complaint

Of all the coverage on Ryan Routh — the seemingly unbalanced man who fled Trump’s golf course after being spotted with a gun yesterday — just the NYT (that I’ve seen) notes that Routh’s various statements seeming to express regret about the US’ worsening relationship with Iran.

In one convoluted passage, Mr. Routh vented his anger at Mr. Trump’s dismantling of the Obama administration’s nuclear deal with Iran.

After writing “Iran, I apologize,” Mr. Routh added, “you are free to assassinate Trump” — although he moves freely in the book between addressing his general readers and specific subjects.

Mr. Trump and his allies have long warned about the threat posed by Iran to the former president’s personal safety. In August, the Justice Department charged a Pakistani man who had recently visited Iran with trying to hire a hit man to assassinate political figures in the United States. Investigators believe that those potential targets likely included Mr. Trump.

Most journalists report that there have been two seeming assassination plots against Trump. Not so, if you count Asif Merchant’s efforts to hire a hit man, purportedly to go after Donald Trump. That would be a third.

Unless there’s a tie between Merchant’s efforts and Routh’s.

That’s almost certainly not the case.

Routh seems like someone who keep searching for grandiose meaning in his life.

Still, I keep thinking about this paragraph from the complaint charging Routh with owning a gun as a felon.

Routh was offering a public way to contact him, via WhatsApp, on the phone he had with him yesterday, a phone he seems to have carried on his person even though the gun he had and the truck he drove both had identifying information obscured.

Routh was doing so on July 10, on a day when Merchant remained at large (Merchant was arrested on July 12).

One aspect of Merchant’s planning involved requiring the EDNY informant — whom Merchant believed would help him find a hit squad — to get him a new phone.

On or about June 10, 2024, Merchant met with the purported hitmen, who were in fact undercover U.S. law enforcement officers (the “UCs”) whom the CS introduced to Merchant at Merchant’s request. Merchant advised the UCs that he was looking for three services from them, including killing a “political person.” During the meeting, Merchant presented himself as the “representative” in the U.S., indicating that there were other people he worked for outside the U.S. Merchant told the UCs that he wanted to pay the hitmen in cash through “hawalas”—an informal and unregulated method of transferring money—in Istanbul and Dubai. Merchant also stated that he would give the hitmen instructions on who to kill either the last week of August 2024 or the first week of September 2024, after he returned to Pakistan. Merchant requested that the UCs provide him with a secure cellular phone so they could communicate, and the UCs said they would do so. The UCs also told Merchant that they would be in touch about how much their services would cost.

On or about June 12, 2024, Merchant met the UCs again and obtained the cellular phone from the UCs to use in furtherance of the assassination plot. During the meeting, Merchant agreed to pay the UCs a $5,000 advance payment for the plot. Following the meeting with the UCs, Merchant met with the CS again in furtherance of the plot.

On or about June 13, 2024, Merchant wrote out coded language on a piece of paper that he instructed the CS to copy down and use when communicating with him in the future. Merchant wrote that the word “tee-shirt” would mean a “protest,” which he described as the “lightest work.” The phrase “flannel shirt” would mean “stealing,” which was “heavier work.” The phrase “fleece jacket,” the heaviest work, would mean “the third task . . . commit the act of the game,” indicating murder as previously discussed. The phrase “denim jacket” referred to “sending money.” Merchant told the CS to use the code words only orally on the phone and not to text them. [my emphasis]

So even in the plot the FBI thwarted, Merchant had a plan to set up a dedicated device for his efforts.

Again, I think it most likely that Routh is just a mentally ill person looking to give his life meaning.

But I don’t rule out that Iran tried to find more potential recruits to target Trump. Routh’s public profile would make it clear he wanted to recruit and be recruited, and his beliefs were so quirky, he might well allow himself to be recruited by Iran.

Which is to say, it’s early yet. Routh’s story may well be more complicated than it seems.

Kamala Harris Is Not Goading Journalists to Publish Emails Iran Stole from Roger Stone

As I’ve alluded to a few times, I was sent what I believe to be three of the files Iran puportedly stole from Trump’s team. I received them after I explained why I thought this hack-and-leak was different than the Hillary one in ways that should influence considerations about publishing:

  • Trump doesn’t compartment his campaign from his crimes, meaning Iran could be — could have been trying, could have succeeded in — stealing information about the Iran-related documents Trump took when he left the White House. The report that Susie Wiles was the intended target of the hack confirms that risk. In addition to running Trump’s campaign, Wiles decided who would be provided defense attorneys paid by the campaign. Aside from the classified information Trump shared with her, she should never have had anything implicating classified discovery and the classified discovery itself should never have left the SCIFs in which it was provided to defense attorneys. But she is likely to know some of what — for example — witnesses like Kash Patel said about classified information.
  • In addition to the hack, Iran allegedly was also trying to solicit a hit squad to kill Trump (indeed, the alleged recruiter, Asif Merchant, was just indicted on Wednesday). That makes the possibility of Iran exploiting internal information from Trump’s campaign (such as travel details) far more dangerous.

I had decided it wasn’t worth participating. And then I got sent files I believe to be those vetting files.

In the last few days, Google has slapped a phishing warning on the files I got sent.

Even though I offered that explanation a month ago, I still get questions from people about why I, and why other outlets, haven’t published the documents.

Don’t get me wrong, other outlets are, without a doubt, exercising a double standard in choosing not to publish these documents, or at least reviewing whether the JD Vance vetting document includes some of the really damning videos surfaced since Trump picked him. It’s not just the Hillary emails in 2016. Every single outlet known to have received these files has also chased the Hunter Biden laptop, even though they never succeeded in implicating Joe Biden in anything found in the laptop. The dick pics were enough to sustain many outlets for a year (and longer, in the case of the NYPost).

But there’s one other big, big difference — one that I think explains the entire difference.

As far as I know, no one in the Kamala Harris campaign is goading journalists to post the documents.

Compare that to 2016, where Trump’s top people were strategizing how to maximize attention on John Podesta’s risotto recipe. Somebody who may be Don Jr was getting all his trolls to push hashtags so “liberal news forced to cover it.” Or 2020, when Trump’s personal lawyer flew around the world, even meeting with known Russian spies, looking for dirt on Joe Biden’s kid. And when a laptop of dick pics dropped in Rudy Giuliani’s lap, like magic, the far right demanded that private social media companies let those dick pics disseminate like wild, because — they claimed — the dissemination of distractions about Hunter Biden was absolutely crucial to Trump’s election strategy.

If I’m right that Kamala Harris has never encouraged journalists to post these documents, there would be a very good reason why not, even beyond the considerable national security risks of encouraging hack-and-leak operations from hostile intelligence services.

Kamala has just 107 days to win an election. And she has a story that she is very very busy telling.

Hack-and-leak operations are about attention, about distraction. If she focused on these stolen documents, she would distract from her own campaign, from the story she is busy telling.

In 2016, Trump used the documents Russia stole to suck up media attention, which served to distract from his own corruption. That’s what he tried in 2020, too. And media outlets have, quite literally, argued that they could avoid accusations of liberal bias by printing error-riddled stories about Hunter Biden, still sucking on that dick pic, three years later.

Hack-and-leak operations help someone like Donald Trump, because too much scrutiny of his own actions might sink his campaign.

But Harris is doing something different than Trump. She’s trying to convince voters that government can improve their lives. She’s trying to convince voters that she cares about their issues and plans to [try to] address them. She needs to sustain their attention long enough to tell that story.

She doesn’t have the time to chase distraction with documents stolen from Trump.

Besides, the press has barely scratched the surface of the corruption or right wing extremism of Trump and his running mate, just sitting in plain sight, such as JD’s claim that we’re still fighting the Civil War and he’s fighting on the side of the south, or Trump rolling out another effort to cash in on his campaign, just weeks before the election.

There’s no shortage of dirt on Donald Trump. Nothing Iran has offered, thus far, at all compares to the stuff sitting out in plain sight.

There is, however, a shortage of time. And wasting time on stolen emails would squander what little time there is.

The Trump Hack Could Extend Far Beyond a Hack-and-Leak

When news first broke that Donald Trump’s campaign says it has been hacked, I started drafting a post on applying the lessons of past ratfucks.

The alleged hack was first reported by Politico, which says some person using an AOL account reached out and shared documents, including the vetting materials pertaining to JD Vance and Marco Rubio.

On July 22, POLITICO began receiving emails from an anonymous account. Over the course of the past few weeks, the person — who used an AOL email account and identified themselves only as “Robert” — relayed what appeared to be internal communications from a senior Trump campaign official. A research dossier the campaign had apparently done on Trump’s running mate, Ohio Sen. JD Vance, which was dated Feb. 23, was included in the documents. The documents are authentic, according to two people familiar with them and granted anonymity to describe internal communications. One of the people described the dossier as a preliminary version of Vance’s vetting file.

The research dossier was a 271-page document based on publicly available information about Vance’s past record and statements, with some — such as his past criticisms of Trump — identified in the document as “POTENTIAL VULNERABILITIES.” The person also sent part of a research document about Florida Sen. Marco Rubio, who was also a finalist for the vice presidential nomination.

Trump’s bouncer-spox, Steven Cheung, claims the hack was done by Iran, citing a Microsoft report released Friday describing the compromise by Iran of the email account of a “former senior advisor,” which the IRGC then used to attempt to compromise a current high-level official.

Yet another Iranian group, this one connected with the Islamic Revolutionary Guard Corps, or IRGC, sent a spear phishing email in June to a high-ranking official on a presidential campaign from the compromised email account of a former senior advisor. The email contained a link that would direct traffic through a domain controlled by the group before routing to the website of the provided link. Within days of this activity, the same group unsuccessfully attempted to log into an account belonging to a former presidential candidate. We’ve since notified those targeted.

A pity for the Trump campaign that Cheung is a habitual liar, so we can’t trust anything he says, and Politico’s authentication appears to rely exclusively on word of mouth from those who have the documents, not digital authentication.

Still, it’s distinctly possible. The FBI certainly seems to believe the IRGC is trying to assassinate Trump.

The lessons I was going to propose in my draft post were the following:

  • Vice President Harris should eschew assigning her senior-most staff to exploiting these emails like Trump did in 2016.
  • But only after Trump, Don Jr, and Mike Pompeo apologize for their enthusiastic use of hacked emails in 2016.
  • The same 51 former spooks who warned that the Hunter Biden laptop had the earmarks of a foreign influence operation should write a similar letter here, emphasizing (as they did in their Hunter Biden letter) the import of resisting foreign efforts to influence a presidential election. Maybe Peter Strzok and Andy McCabe could join in. Chris Krebs, who already has weighed in validating the seriousness of the threat, but who was fired for telling the truth about the 2020 election, can join too. They should send it to Politico, which first reported this story, but CC Jim Jordan, who says even writing such a letter is an abuse of First Amendment protected free speech.
  • Donald Trump must provide all the affected servers to the FBI, stat.

It’s the last one that was going to be my punch line. Partly because of misleading (arguably inaccurate) Jim Comey testimony, and partly because a wide swath of people had an incentive to do Russia’s bidding, for eight years people, including many in Congress, have been suggesting that a hacking victim must give all the servers that were hacked to law enforcement — the actual servers, not forensic images — otherwise the FBI’s investigation would be suspect.

They were wrong on several counts. But they were loud and insistent.

Fine. Based on that precedent, Trump must hand over his campaign servers to the same FBI that has criminally investigated him, including his campaign finance shenanigans, immediately.

That’s what I was going to write when Politico’s Alex Isenstadt, who is not a journalist competent to report a hack-and-leak story, was the only one who had written this up.

But then WaPo wrote it up, with Trump-whisperer Josh Dawsey and horserace journo Isaac Arnsdorf bylined, but also Ellen Nakashima and Shane Harris, the latter two of whom are exceptional reporters for a story about hacking.

That story had two additional details that made me rethink the potential impact of this. First, it revealed that Trump didn’t tell the FBI about the hack.

People familiar with the matter said the campaign separately concluded earlier this summer its email system had been breached but did not disclose it publicly or to law enforcement. The people said some officials were told to take more protective measures on their email accounts. At the time, campaign officials communicated to others that they weren’t sure who hacked the emails.

It’s not even clear whether Trump got an outside contractor — and if so, if it was someone more competent than Rudy Giuliani, whom Trump once pitched as a cybersecurity expert — to help clean up this mess. It took Crowdstrike and the DNC over a month to attribute the Russian hack, but they never fully cleaned it up. And persistent attacks continued through the election. That is, even with a respected outside contractor, the Democrats were wasting energy on whack-a-mole defense efforts for the remainder of the election.

Against that background, WaPo’s description of what the persona shared becomes more alarming.

On Thursday, The Washington Post was also sent a 271-page document about Vance from a sender who called himself Robert and used an AOL email account. Dated Feb. 23 and labeled “privileged & confidential,” the document highlighted potential political vulnerabilities for the first-term senator. Two people familiar with the document confirmed it was authentic and was commissioned by the campaign from Brand Woodward, a law firm that represents a number of prominent Trump advisers in investigations by state and federal authorities.

The document drew from publicly available information, including past news reports and interviews with the senator. The campaign commissioned several reports of other candidates, too, the advisers said.

The sender would not speak on the telephone with a Post reporter but indicated they had access to additional information, including internal campaign emails and documents related to Trump’s court cases. [my emphasis]

First, Brand Woodward did the campaign’s vetting.

Stan Woodward represents, along with others, Walt Nauta, Kash Patel, and Peter Navarro in various Trump-related criminal investigations, as well as some seditionists. He’s a great fit for Trump insofar as he’s good at generating outrage over manufactured slights — though in front of regular judges, those complaints usually collapse. Multiple filings in the documents case suggest that Woodward has a tenuous relationship with digital technology.

The role of Stan Brand, Woodward’s partner, has been assiduously hidden, except insofar as he has made claims about cases to the press on-the-record without disclosing the tie to Woodward.

Now, WaPo has confirmed that the Microsoft description — of a former advisor pwned and using that person’s email account, an attempt to hack “a high-official” still on the campaign — pertained to the Trump campaign. Given that description, there’s no reason to believe that Woodward or Brand were affected.

But there’s nevertheless a problem with hiring Brand Woodward to do your candidate vetting. To be clear: Brand is absolutely qualified to do that kind of thing. He’s got a long record of doing so in congress. But even Trump appears to have concerns about major issues the vetting process missed, to say nothing of his donors.

Over the past two weeks, Mr. Trump has fielded complaints from donors about his running mate, JD Vance, as news coverage exploring Mr. Vance’s past statements unearthed — and then exhaustively critiqued — remarks including a lament that America was run by “childless cat ladies.”

Mr. Trump dismissed out of hand donors’ suggestions that he replace Mr. Vance on the ticket. But Mr. Trump privately asked his advisers whether they had known about Mr. Vance’s comments about childless women before Mr. Trump chose him.

There were better choices to vet candidates, but if Trump wants to let a thin team vet the surly troll he picked to be his running mate, that’s his own business.

My alarm about the news that Brand Woodward starts, however, by the way that the Trump campaign has muddled various functions, criminal and civil defense with campaign finance and, now, candidate vetting. It creates a legal morass, one that — if Trump loses this election — could lead to more legal trouble down the road.

Maybe that’s why Trump didn’t call the FBI.

But it also means that some people — most notably, Susie Wiles and Boris Epshteyn, along with Woodward and Brand — are playing multiple functions. Wiles is the one who decides who gets their criminal defense bills paid, she’s also the one who decides how to spend campaign cash, and she was a big backer of the JD pick.

When people play overlapping functions like that, it means that a hack targeted at them for one function — say, candidate vetting — may strike a gold mine of documents pertaining to another function — say, criminal defense.

WaPo’s reference to “documents related to Trump’s court cases” — Politico quoted the persona offering a “variety of documents from [Trump’s] legal and court documents to internal campaign discussions” — may ultimately pertain exclusively to Trump’s electoral court cases. If it does, those could be some of the most newsworthy out there, since Trump’s electoral court cases pose a direct threat to democracy.

But what if they don’t? What if these documents pertain to what those overlap people — people like Wiles or Epshteyn, and they’re only two of the most obvious –know about Trump’s criminal cases? What if they pertain to claims that witnesses have made to the FBI about where documents got moved or what was included in them? What if they pertain to the actual documents Trump stole, starting with the US strategic plan against Iran that Trump shared with Mark Meadows’ ghost writers?

Trump has not firewalled his campaign from a criminal case involving the most sensitive documents of the US government, meaning a well-executed hack targeted at his campaign may turn into an intelligence bonanza.

If Iran plans to make things difficult for Trump, the problems may extend well beyond what documents get leaked. As they did in 2016, this could mean that Trump wastes resources having to serially defend against hacking attempts via a range of different platforms. It could mean that Iran does what Russia did, hack key strategic models to optimize other kinds of fuckery later in the election. Because — unlike Russia — Iran is actively trying to kill Trump, not just defeat him, hacked documents may also facilitate efforts like those charged against Asif Merchant, manufacturing fake protests to create distractions to facilitate an assassination attempt.

The question of how to approach this news, if it is further confirmed, goes well beyond the question of whether to publish the documents allegedly stolen by Iran. In significant part because Trump refuses to maintain boundaries between his political life and his criminal life, hacks from Iran could create real damage to the United States beyond what they do to Trump’s campaign.

So by all means, let’s pause for a moment of schadenfreude. Let’s review all the things Trump said and did in 2016 and 2020 (including with the Hunter Biden laptop) that invite his opponents to fully exploit stolen documents this time.

But as you do that, consider that this ratfuck may be far more dangerous to the US than those targeting Hillary and Hunter.

Trump Commends the Deep State; Media Buries That Fact

The Trump press conference yesterday has left me thinking that goldfish might do a better job of covering this guy than the people currently doing so.

As I’ll describe, after covering it live, many outlets have chosen to bury what a blubbery mess the former President was. Then NYT, which assigned multiple reporters on any given day to repeat, “Joe Biden old,” had taken all stories about the presser off its front page by the time it released the Dead Tree version.

Admittedly, there wasn’t much news.

But there was a piece that I think merits more attention. Trump was apparently asked (the entire presser was set up such that Trump claimed not to be able to hear the questions, and they weren’t picked up on the coverage) whether the FBI had interviewed him as part of the investigation into the Thomas Crooks shooting attempt. He described:

They have. The FBI came to see me about the shooter. Uh, I think they’ve done a very good job. And I think they did a very good job with respect to this other lunatic that they have in custody.

The reference to “this other lunatic” is likely a reference to Asif Merchant, the Pakistani man accused of attempting to solicit paid killers to assassinate Trump on behalf of Iran.

This is newsworthy!

It’s newsworthy, because Trump’s allies in Congress are gunning for Chris Wray regarding the Crooks investigation.

And it is newsworthy, because Trump has spent years demonizing the Deep State, only to commend them when they preempt an attack on him.

Nevermind that (as LOLGOP and I laid out in one of our Ball of Threads episodes) almost everyone the FBI first targeted in Crossfire Hurricaine (including Carter Page, George Papadopoulos, Mike Flynn, and Paul Manafort) were, or were attempting to, monetize their access to Trump. Trump was, at first, one of the victims of that investigation too.

If you believe what Konstantin Kilimnik told Paul Manafort in December 2016, Page even went to Russia and claimed to be negotiating on Ukraine on behalf of Trump.

Trump could have viewed himself as a victim of that influence peddling, but his narcissism prevented that.

He undoubtedly does view himself as the victim here, rightly so. And because of that, he’s willing to commend the work the FBI does.

That answer deserves wider coverage, not least so the Trump mob that has been targeting the FBI might tone things down.

Alas, the media wants horserace, and to hell with US democracy and rule of law.

Update: ABC describes that during Trump’s victim interview, he quizzed them for more details about Crooks.

Fleece Jacket: The Assassination Plot against Trump

Amid all the other excitement yesterday, EDNY revealed the arrest, on July 12, of an assassination plot believed to target Donald Trump. A Pakistani man with ties to Iran, Asif Merchant, pitched someone in the US — referred to only as Confidential Source — in April on what purported to be a clothing import business, with an opportunity to earn $100,000. The complaint suggests that Merchant had reason to believe CS had committed crimes in the past. But when meeting in person on June 3 about the business, Merchant described that the business involved killing.

On or about June 3, 2024, MERCHANT flew from Texas to LaGuardia Airport in New York. The CS picked up MERCHANT from the airport and drove him to a hotel in Nassau County, New York. While at the hotel, MERCHANT told the CS that the opportunity he had for the CS was not a one-time opportunity and would be ongoing. MERCHANT then made a “finger gun” motion with his hand, indicating that the opportunity was related to a killing. MERCHANT subsequently took the CS’s cellphone and put it in a drawer for security reasons, so they could discuss the plan. MERCHANT stated that he would give the CS more details about the plan the next day but that he needed the CS to arrange a meeting for MERCHANT to meet hitmen in New York.

The complaint is coy about when the CS got the Feds involved. But by the next day, the FBI had set up cameras that captured Merchant drawing up his plan on a napkin. And when CS introduced Merchant to people he believed to be hitmen on June 10, they were really undercover Feds.

On June 13, Merchant wrote up a code for CS, describing each of three types of crimes — stealing documents, starting a protest as cover, and assassinating someone — as different kinds of tops, with fleece jacket signifying the assassination.

Merchant must have made last minute plans to leave the country on July 12, because he was arrested even before the FBI wrote up the complaint on July 14 (the Texas docket describing the Houston arrest must still be sealed). Merchant seemed to be recruiting multiple people in the US, so I assume this all remained sealed for a month to provide the FBI opportunity to track down others.

According to the detention memo, Merchant refused to let the FBI in for 20 minutes, so he may have deleted evidence (though not the paper on which he wrote his fleece jacket code).

Notably, when the FBI arrived at his residence to execute the arrest as well as a search warrant for the residence, Merchant refused to exit his residence for approximately 20 minutes after the FBI announced their presence and the search warrant.

Which makes for some pretty eerie timing, given Thomas Crooks’ shooting of Trump on July 13.