Posts

Roger Stone Does the RICO Defense

Most of the Russian investigation beat journalists are analyzing Amy Berman Jackson’s latest smackdown of Roger Stone, in which she requires him to comply with her gag order even though (he claims) the book forward that conflicts with it was planned in advance of her gag. I’ll leave that to other journalists for now (though I will note that in the order, she relies on all the traps she set in the hearing on the gag, including Stone’s admission he doesn’t need the book for his livelihood and Stone’s lawyer’s concession that Stone shouldn’t speak about his case). Effectively, she’s still letting their stunt in that hearing make her ruling for her.

I’ve been engaged in the far more mundane analysis of how Stone’s defense against the DNC lawsuit has evolved, possibly in conjunction with his indictment and the prospect of further information coming out.

Yesterday, all the defendants who have accepted service in the DNC lawsuit against Trump’s campaign, WikiLeaks, the Agalarovs, and GRU submitted their motions to dismiss a second amended complaint (SAC). Because of the timing of all this, I wanted to compare Roger Stone’s last response (Second Motion) with the one submitted yesterday (Third Motion).

The last motions to dismiss were submitted December 7. The SAC, filed January 18, added allegations tied to Jerome Corsi’s draft plea agreement and related revelations, but not Stone’s indictment (which was filed a week after the SAC). But Stone’s response, submitted March 4, reflects the indictment, and presumably may reflect what his lawyers are seeing in discovery.

So comparing the two motions provides a sense of what Stone’s lawyers are seeing and how they imagine they’ll defend him against his indictment.

The SAC mentions Stone around 112 times; his actions (described starting at ¶161) form a key part of the Democratic narrative, and is key to tying the Trump associates named in the suit to the Russian and WikiLeaks efforts to exploit the stolen documents.

There are three key differences in Stone’s Third Motion and the Second.

Stone stops quoting the accusations against him

The Second Motion takes on the specific accusations against him, quoting some of the key paragraphs.

The specific facts alleged as to Roger Stone make him a unique defendant. While analyzing these allegations, it is critical for the Court to note when Stone is alleged, by Plaintiff to have joined the conspiracy (post-July 22, 2016, first DNC dissemination), what acts he allegedly committed to in fact join the conspiracy, and do those acts allege a conspiracy to which the DNC can seek a remedy in this Court. As to Roger Stone, the amended complaint alleges:

19. Throughout the summer and fall of 2016, during the height of the Presidential campaign, Trump’s associates continued to communicate secretly with Russian agents and WikiLeaks, who strategically disseminated information stolen from Democratic targets. For example, in August 2016, Stone began communicating secretly with GRU operatives and bragged about his contacts with Assange. Similarly, Gates, who served as the Trump Campaign’s deputy chairman and then liaison to the Republican National Committee, maintained secret communications with an individual he knew to be connected to the GRU. (emphasis added).

Other than the private messages (communication on the social network platform, twitter), between Guccifer 2.0 and Stone there are no additional allegations about what they communicated about. The communications are attached as exhibits to this motion.

20. In the summer and fall of 2016, Stone revealed information that he could not have had unless he were communicating with WikiLeaks, Russian operatives, or both about their hacking operations in the United States. For instance, in August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, the chairman of Secretary Hillary Clinton’s presidential campaign. Nevertheless, on August 21, 2016, Stone predicted that damaging information about Podesta would be released, tweeting “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. Similarly, in mid-September 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted. (emphasis added).

WikiLeaks merely telling Stone that it has specific information is not a tort. Additionally, since the DNC alleged that Stone’s prediction about “the Podesta’s” proves Stone joined the relevant conspiracy is belied by the fact John Podesta’s emails were not on the DNC server. The DNC cannot properly allege Stone joined the conspiracy and committed torts based upon this allegation in which the DNC cannot claim a concrete injury fairly traceable to Stone. An analysis of the DNC’s standing and misuse of inferences to attempt to sufficiently plead this conspiracy will be discussed below.

That same passage in yesterday’s motion to dismiss is far more abbreviated and — in the passage that most directly addresses the charges against him — doesn’t cite the DNC’s full accusations against him directly.

In the summer and fall of 2016, Stone revealed information that he could not have had unless he were communicating with WikiLeaks, Russian operatives, or both about their hacking operations in the United States. For instance, in August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, the chairman of Secretary Hillary Clinton’s presidential campaign. Nevertheless, on August 21, 2016, Stone predicted that damaging information about Podesta would be released, tweeting “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. Similarly, in mid-September 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted.

Next, the DNC alleges Roger Stone was prophetic because he “revealed information he could not have had unless he were communicating with WikiLeaks, Russian operatives or both. (SAC ¶ 22). An example cited is: In August of 2016, nobody in the public sphere knew that Russia had stolen emails from John Podesta, Stone predicted that damaging information about Podesta would be released, tweeting: “it will soon [be] the Podesta’s time in the barrel.” Weeks later, WikiLeaks began releasing batches of Podesta’s emails on a near-daily basis until Election Day—as Stone had predicted. (SAC ¶91).

WikiLeaks merely telling Stone that it has non-specific information is not a tort. But the DNC emphasizes that “Stone discussed highly confidential and strategic information stolen from another Democratic party institution and disseminated to the public.” (SAC ¶ 23). This admission in and of itself proves that the Podesta emails were not part of the DNC records. Since the DNC alleged that Stone’s prediction about “the Podesta’s” proves Stone joined the relevant conspiracy and enterprise it is absolutely defeated by the fact John Podesta’s emails were not on the DNC server or that of the other “Democratic party institution.” Similarly, in midSeptember 2016, Stone said that he expected “Julian Assange and the WikiLeaks people to drop a payload of new documents on Hillary [Clinton] on a weekly basis fairly soon.” Id. And, beginning on October 7, 2016, WikiLeaks began releasing stolen emails at least once a week—as Stone had predicted. Id.

Then the DNC alleges Stone and other defendants misled various government agencies. Stone did not lie to the Special Counsel or the FBI; he only appeared or testified to one congressional committee. 3 He is alleged to have intimidated a witness who “threatened to contradict his narrative about his communications with WikiLeaks.” (SAC ¶ 30). But neither the testimony to Congress, nor the “intimidation” occurred prior to the 2016 presidential election.

3 Roger Stone has been indicted in the District of the District of Columbia. (Case No. 1:19-cr-18-ABJ). The indictment charges Stone with lying to Congress and intimidating a witness, Randy Credico in relation to Credico asserting his Fifth Amendment right to a House Committee. The indictment is not for conspiracy, RICO, theft, or trespass. The DNC alleges an open-ended RICO, something the Special Counsel has not been willing to allege against any American.

By telling this instead as a narrative rather than quoting the actual paragraphs, Stone minimizes the accusations against him, which the DNC could now fill out with more from his indictment.

Ultimately, Stone’s defense remains, as it has been from the start, that any foreknowledge of the John Podesta emails is useless to the Democrats’ lawsuit because Podesta’s emails were not stolen from a DNC server, and that he had no foreknowledge of the DNC release to WikiLeaks (he also leans heavily on WikiLeaks not having engaged in a tort, which may get him in trouble if WikiLeaks does get charged with something).

The possibility that Stone saw the Podesta emails in advance may explain this strategy. After all, if it comes out that he did receive the Podesta emails in advance, then his defense here (that the emails don’t amount to economic espionage) still might fly given that Podesta was not part of the DNC.

But now that Cohen has described Stone warning Trump of the July 22 release, that strategy may begin to crumble.

Stone drops his claim not to be part of the campaign

In the Second Motion, in an effort to distance himself from the network of conspirators, Stone denied that he was part of the campaign.

Conspiracy between Stone and the Campaign.

Plaintiffs do not state a proper theory of conspiracy to support any claim. An agent of a corporation cannot conspire with the corporation itself. Executive Sandwich Shoppe, Inc. v. Carr Realty Corp., 749 A.2d 724, 739 (D.C. 2000) (referred to as the “intracorporate conspiracy doctrine”); Little Professor Book Co. v. Reston N. Pt. Vill., 41 Va. Cir. 73 (1996) (circuit court opinion); Reich v. Lopez, 38 F. Supp. 3d 436, 464 (S.D.N.Y. 2014), aff’d, 858 F.3d 55 (2d Cir. 2017); Tabb v. D.C., 477 F. Supp. 2d 185, 190 (D.D.C. 2007) (citing Dickerson v. Alachua County Comm., 200 F.3d 761, 767 (11th Cir. 2000)). Stone worked as an independent contractor for the Campaign for a few months in 2015. In short, the amended complaint alleges Stone was always acting as an agent of the Trump Campaign for President. In the only footnote in the amended complaint, the term “Trump Associate” is defined as an agent of the Campaign. (Am. Compl. at 16 *). The D.C.-law and Virginia law, therefore, does not support a claim of conspiracy between Stone and the Campaign.

That footnote in the SAC has been rewritten to define Trump associate this way:

“Trump Associates” refers to the Trump advisors and confidants named as Defendants herein: Trump, Jr., Manafort, Kushner, Stone, and Papadopoulos.

In the section disclaiming a role in managing the RICO enterprise, Stone also drops an argument that the complaint doesn’t allege “that he was even communicating with the other ‘Trump associates’,” leaving this argument denying that he played a key role in the conspiracy.

The lawsuit does not allege Roger Stone had a management or operational position in the Campaign at all. He was merely an informal adviser. In short, Stone did not have any part in directing the enterprise’s affairs as required by the law in this Circuit. See id. At best, Stone is talking to an alleged Russian hacker on twitter about a hack and theft after the DNC’s data was stolen.

In the wake of his indictment — which gets closer to suggesting Stone got the October release timed to drown out the Access Hollywood release (a claim Jerome Corsi has sometimes backed), not to mention Michael Cohen’s claim that Stone told the President about the initial July 22 email dump several days in advance — this claim may get harder to sustain.

Indeed, as it is, if Stone goes to trial multiple communications with the campaign about WikiLeaks’ releases will become public. But Cohen’s allusion to corroboration about the July 18 or 19 Stone call to Trump suggests that information could become public even sooner.

Stone continues to ignore potential CFAA exposure

As in the Second Motion, there’s a key part of the Democratic narrative that Stone ignores in the Third Motion: the hack of the Dem’s analytics on AWS, which post-dates Guccifer 2.0’s offer to help Stone and offer of the DCCC analytics in early September, which starts this way (I discuss and quote this in more depth in this post).

N. The GRU Reaches Out To Stone About Democratic Party Turnout Models

177. On August 22, 2016, GRU operatives transmitted several gigabytes of data stolen from another Democratic party target to a Republican party strategist in Florida. The data included voter turnout analyses for Florida and other states.160

178. Between September 7 and September 8, 2016, the GOP strategist exchanged private messages with GRU operatives posing as Guccifer 2.0 in which he explained the substantial value of the stolen data he had received from them.161

179. On September 9, 2016, GRU operatives posing as Guccifer 2.0 contacted Stone, writing him “please tell me if I can help u anyhow[,]” and adding “it would be a great pleasure to me.” The operatives then asked Stone for his reaction to the “turnout model for the Democrats’ entire presidential campaign.” Stone replied, “[p]retty standard.” 162

O. Russia Launches Another Attack On DNC Servers Housing Sensitive And Valuable Trade Secrets

180. On September 20, 2016, CrowdStrike’s monitoring service discovered that unauthorized users—later discovered to be GRU officers—had accessed the DNC’s cloud-computing service. The cloud-computing service housed test applications related to the DNC’s analytics. The DNC’s analytics are its most important, valuable, and highly confidential tools. While the DNC did not detect unauthorized access to its voter file, access to these test applications could have provided the GRU with the ability to see how the DNC was evaluating and processing data critical to its principal goal of winning elections. Forensic analysis showed that the unauthorized users had stolen the contents of these virtual servers by making exact duplicates (“snapshots”) of them and moving those snapshots to other accounts they owned on the same service. The GRU stole multiple snapshots of these virtual servers between September 5, 2016 and September 22, 2016. The U.S. government later concluded that this cyberattack had been executed by the GRU as part of its broader campaign to damage to the Democratic party.

DNC’s allegation that Stone informed Guccifer 2.0 he was unimpressed with the DCCC oppo research released in early September, followed shortly by GRU’s hack of the crown jewels, would seem to undermine Stone’s entire defense, given that his claims that his conversations with Guccifer 2.0 preceded all hacks (it doesn’t — indeed, it happens as the hacks are occurring) and his claims that the Podesta release is unrelated because is not DNC does not apply to the analytics.

But thus far, he’s just ignoring those allegations.

None of the new details about Stone’s conduct will really get the DNC to The RICO. But it may put Stone at more risk of other exposure.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

A Tale of Two GRU Indictments

Yesterday, DOJ indicted a bunch of GRU hackers again, in part for hacks in retaliation for anti-doping associations’ reports finding a state-run Russian effort to help its athletes cheat (though also including hacks of Westinghouse and the Organization for the Prohibition of Chemical Weapons (OPCW)).

As the DNC GRU indictment did, this indictment provides a snapshot of the division of labor in GRU, made easier by the capture of four of these guys, with all their hacking toys in the trunk of their rented car, in the Netherlands. I find a comparison of the two indictments — of some of the same people for similar activity spanning the same period of time — instructive for a number of reasons.

The team

Consider the team.

There are Aleksei Morenets and Evgenii Serebriakov, whom the indictment calls “on-site GRU hackers who traveled to foreign countries with other conspirators, in some instances using Russian government issued diplomatic passports to conduct on-site operations.” Serebriakov even has a title, “Deputy Head of Directorate,” which sounds like a pretty senior person to travel around sniffing WiFi networks.

There are the three men we met in the DNC indictment, Ivan Yermakov, Artem Malyshev, and Dmitriy Badin, all of whom work  out of Moscow running hacks. Yermakov and Malyshev were closely involved in both hacks in 2016 (as demonstrated by the timeline below).

Finally, there are Oleg Sotnikov and Alexey Minin, who joined Morenets and Serebriakov as they tried to hack the Organization for the Prohibition of Chemical Weapons (OPCW) and tried to hack the Spiez Chemical laboratory that was analyzing the Novichok used to poison Sergei Skripal.

There are slightly different tactics than in the DNC hack. For example, GRU used a bunch of bit.ly links in this operation (though some of those are an earlier campaign against Westinghouse). And they sent out hackers to tap into targets’ WiFi networks directly, whereas none of the DNC hackers are alleged to have left Russia.

But there’s a ton of common activity, notably the spearphishing of targeted individuals and the use of their X-Agent hacking tool to exploit targeted machines.

Overlapping hack schedule

I’m also interested in the way the WADA hack, in particular, overlaps with the DNC one. I’ve got a timeline, below, of the two indictments look like (I’ve excluded both the Westinghouse and OPCW hacks from this timeline to focus on the overlapping 2016 operations).

Yermakov and Malyshev are described by name doing specific tasks in the DNC hack though May 2016. By August, they have turned to hacking anti-doping targets. Yermakov, in particular, seems to play the same research role in both hacks.

Given the impact of these operations, it’s fairly remarkable that such a small team conducted both.

Common bitcoin habits and possibly even infrastructure

There are also paragraphs in the WADA indictment, particularly those pertaining to the use of bitcoin to fund the operation used to substantiate the money laundering charge, that appear to be lifted in their entirety from the DNC one (or perhaps both come from DOJ or Western PA US Attorney boilerplate — remember that the DNC hack was originally investigated in Western PA, so this language likely originates there).

These include:

  •  58/106: Describing how conspirators primarily used bitcoin to pay for infrastructure
  • 59/107: Describing how bitcoin works, with examples specific to each operation provided
  • 60/108: Describing how conspirators used dedicated email accounts to track bitcoin transactions
  • 61/109: Describing how conspirators used the same computers to conduct hacking operations and facilitate bitcoin payments
  • 62/110: Describing how conspirators also mined bitcoin and then used it to pay for servers, with examples specific to each operation
  • 64/111: Describing how conspirators used the same funding structure and sometimes the same pool of funds to pay for hacking infrastructure, with examples specific to each operation provided

The similarity of these two passages suggests two things. First, it suggests that the August 8, 2016 transaction in the WADA indictment may have been orchestrated from the gfade147 email noted in the DNC indictment. With both, the indictment notes that “One of these dedicated accounts … received hundreds of bitcoin payment requests from approximately 100 different email accounts,” with the DNC indictment including the gfade147 address. (Compare paragraphs 60 in the DNC indictment with 108 in the WADA one.)  That would suggest these two operations overlap even more than suspect.

That said, there’s one paragraph in the DNC indictment that doesn’t have an analogue in the WADA one, 63. It describes conspirators,

purchasing bitcoin through peer-to-peer exchanges, moving funds through other digital currencies, and using pre-paid cards. They also enlisted the assistance of one or more third-party exchangers who facilitated layered transactions through digital currency exchange platforms providing heightened anonymity.

Given how loud much of these operations were, it raises questions about why some of the DNC hack (but not, at least by description) the WADA one would require “heightened anonymity.”

Different treatment of InfoOps

I’m perhaps most interested in the different treatment of the InfoOps side of the operation. As I noted here, in general there seems to be a division of labor at GRU between the actual hackers, in Unit 26165, which is located at  20 Komsomolskiy Prospekt, and the information operations officers, in Unit 74455, which is located in the “Tower” at 22 Kirova Street, Khimki. Both units were involved in both operations.

Yet the WADA indictment does not name or charge any Unit 74455 officers, in spite of describing (in paragraphs 1 and 11) how the unit acquired and maintained online social media accounts and associated infrastructure (paragraph 76 describes that infrastructure to be “procured and managed, at least in part, by conspirators in GRU Unit 74455”). Five of the seven named defendants in the WADA indictment are in Unit 26165, with Oleg Sotnikov and Alexey Minin not identified by unit.

By comparison, three of the 11 officers charged in the DNC indictment belong to Unit 744555.

And the WADA campaign did have a significant media component, as explained in paragraphs 76-87. The indictment even complains (as did DOJ officials as the press conference announcing this indictment) about,

reporters press[ing] for and receiv[ing] promises of exclusivity in such reporting, with one such reporter attempting to make arrangements for a right of first refusal for articles on all future leaks and actively suggesting methods with whicch the conspiracy could search the stolen materials for documents of interest to that reporter (e.g., keywords of interest).

That said, the language in much of this discussion (see paragraphs 77 through 81) uses the passive voice — “were registered,” “were named,” “was posted,” “were released,” “were released,” “were released,” “were released” — showing less certainty about who was running that infrastructure.

That’s particularly interesting given that the government clearly had emails between the Fancy Bear personas and journalists.

One difference may be, in part, that in the DNC indictment, there are specific hacking (not InfoOps) actions attributed to two of the Unit 74455 officers: Aleksandr Osadchuk and Anatoliy Kovalev. Indeed, Kovalev seems to have been added on just for that charge, as he doesn’t appear in the introduction section at the beginning of the indictment.

Whereas Unit 74455’s role in the WADA indictment seems to be limited to running the InfoOps infrastructure.

Importance of WikiLeaks and sharing with Republicans

It’s not clear how much we can conclude form all that. But the different structure in the DNC indictment does allow it to foreground the role of a number of others, such as WikiLeaks and Roger Stone and — as I suggested drop in some or all of  those others in a future conspiracy indictment — that were a key part of the election operation.

Timeline

February 1, 2016: gfade147 0.026043 bitcoin transaction

March 2016: Conspirators hack email accounts of volunteers and employees of Hillary campaign, including John Podesta

March 2016: Yermakov spearphishes two accounts that would be leaked to DC Leaks

March 14, 2016 through April 28, 2016: Conspirators use same pool of bitcoin to purchase VPN and lease server in Malaysia

March 15, 2016: Yermakov runs technical query for DNC IP configurations and searches for open source info on DNC network, Dem Party, and Hillary

March 19, 2016: Lukashev spearphish Podesta personal email using john356gh

March 21, 2016: Lukashev steals contents of Podesta’s email account, over 50,000 emails (he is named Victim 3 later in indictment)

March 25, 2016: Lukashev spearphishes Victims 1 (personal email) and 2 using john356gh; their emails later released on DCLeaks

March 28, 2016: Yermakov researched Victims 1 and 2 on social media

April 2016: Kozachek customizes X-Agent

April 2016: Conspirators hack into DCCC and DNC networks, plant X-Agent malware

April 2016: Conspirators plan release of materials stolen from Clinton Campaign, DCCC, and DNC

April 6, 2016: Conspirators create email for fake Clinton Campaign team member to spearphish Clinton campaign; DCCC Employee 1 clicks spearphish link

April 7, 2016: Yermakov runs technical query for DCCC’s internet protocol configurations

April 12, 2016: Conspirators use stolen credentials of DCCC employee to access network; Victim 4 DCCC email victimized

April 14, 2016: Conspirators use X-Agent keylog and screenshot functions to surveil DCCC Employee 1

April 15, 2016: Conspirators search hacked DCCC computer for “hillary,” “cruz,” “trump” and copied “Benghazi investigations” folder

April 15, 2016: Victim 5 DCCC email victimized

April 18, 2016: Conspirators hack into DNC through DCCC using credentials of DCCC employee with access to DNC server; Victim 6 DCCC email victimized

April 19, 2016: Kozachek, Yershov, and co-conspirators remotely configure middle server

April 19, 2016: Conspirators register dcleaks using operational email [email protected]

April 20, 2016: Conspirators direct X-Agent malware on DCCC computers to connect to middle server

April 22, 2016: Conspirators use X-Agent keylog and screenshot function to surveil DCCC Employee 2

April 22, 2016: Conspirators compress oppo research for exfil to server in Illinois

April 26, 2016: George Papadopolous learns Russians are offering election assistance in the form of leaked emails

April 28, 2016: Conspirators use bitcoin associated with Guccifer 2.0 VPN to lease Malaysian server hosting dcleaks.com

April 28, 2016: Conspirators test IL server

May 2016: Yermakov hacks DNC server

May 10, 2016: Victim 7 DNC email victimized

May 13, 2016: Conspirators delete logs from DNC computer

May 25 through June 1, 2016: Conspirators hack DNC Microsoft Exchange Server; Yermakov researches PowerShell commands related to accessing it

May 30, 2016: Malyshev upgrades the AMS (AZ) server, which receives updates from 13 DCCC and DNC computers

May 31, 2016: Yermakov researches Crowdstrike and X-Agent and X-Tunnel malware

June 2016: Conspirators staged and released tens of thousands of stolen emails and documents

June 1, 2016: Conspirators attempt to delete presence on DCCC using CCleaner

June 2, 2016: Victim 2 personal victimized

June 8, 2016: Conspirators launch dcleaks.com, dcleaks Facebook account using Alive Donovan, Jason Scott, and Richard Gingrey IDs, and @dcleaks_ Twitter account, using same computer used for other

June 9, 2016: Don Jr, Paul Manafort, Jared Kushner have meeting expecting dirt from Russians, including Aras Agalarov employee Ike Kaveladze

June 10, 2016: Ike Kaveladze has calls with Russia and NY while still in NYC

June 14, 2016: Conspirators register actblues and redirect DCCC website to actblues

June 14, 2016: WaPo (before noon ET) and Crowdstrike announces DNC hack

June 15, 2016, between 4:19PM and 4:56 PM Moscow Standard Time (9:19 and 9:56 AM ET): Conspirators log into Moscow-based sever and search for words that would end up in first Guccifer 2.0 post, including “some hundred sheets,” “illuminati,” “think twice about company’s competence,” “worldwide known”

June 15, 2016, 7:02PM MST (12:02PM ET): Guccifer 2.0 posts first post

June 15 and 16, 2016: Ike Kaveladze places roaming calls from Russia, the only ones he places during the extended trip

June 20, 2016: Conspirators delete logs from AMS panel, including login history, attempt to reaccess DCCC using stolen credentials

June 22, 2016: Wikileaks sends a private message to Guccifer 2.0 to “send any new material here for us to review and it will have a much higher impact than what you are doing.”

June 27, 2016: Conspirators contact US reporter, send report password to access nonpublic portion of dcleaks

Late June, 2016: Failed attempts to transfer data to Wikileaks

July, 2016: Kovalev hacks into IL State Board of Elections and steals information on 500,000 voters

July 6, 2016: Conspirators use VPN to log into Guccifer 2.0 account

July 6, 2016: Wikileaks writes Guccifer 2.0 adding, “if you have anything hillary related we want it in the next tweo [sic] days prefabl [sic] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after”

July 6, 2016: Victim 8 personal email victimized

July 10-19: Morenets travels to Rio de Janeiro

July 14, 2016: Conspirators send WikiLeaks an email with attachment titled wk dnc link1.txt.gpg providing instructions on how to access online archive of stolen DNC documents

July 18, 2016: WikiLeaks confirms it has “the 1Gb or so archive” and would make a release of stolen documents “this week”

July 22, 2016: WikiLeaks releases first dump of 20,000 emails

July 27, 2016: Trump asks Russia for Hillary emails

July 27, 2016: After hours, conspirators attempt to spearphish email accounts at a domain hosted by third party provider and used by Hillary’s personal office, as well as 76 email addresses at Clinton Campaign

August 2016: Kovalev hacks into VR systems

August 2-9, 2016: Conspirators use multiple IP addresses to connect to or scan WADA’s network

August 2-4, 2016: Yermakov researches WADA and its ADAM database (which includes the drug test results of the world’s athletes) and USADA

August 3, 2016: Conspirators register wada.awa.org

August 5, 9, 2016: Yermakov researches Cisco firewalls, he and Malyshev send specific WADA employees spearfish

August 8, 2016: Conspirators register wada-arna.org and tas-cass.org

August 8, 2016: .012684 bitcoin transaction directed by dedicated email account

August 13-19, 2016: Morenets and Serebriakov travel to Rio, while Yermakov supports with research in Moscow

August 14-18, 2016: SQL attacks against USADA

August 15, 2016: Conspirators receive request for stolen documents from candidate for US congress

August 15, 2016: First Guccifer 2.0 exchange with Roger Stone noted

August 19, 2016: Serebriakov compromises a specific anti-doping official and obtains credentials to access ADAM database

August 22, 2016: Conspirators transfer 2.5 GB of stolen DCCC data to registered FL state lobbyist Aaron Nevins

August 22, 2016: Conspirators send Lee Stranahan Black Lives Matter document

September 1, 2016: Domains fancybear.org and fancybear.net registered

September 6, 2016: Conspirators compromise credentials of USADA Board member while in Rio

September 7-14, 2016: Conspirators try, but fail, to use credentials stolen from USADA board member to access USADA systems

September 12, 2016: Data stolen from WADA and ADAMS first posted, initially focusing on US athletes

September 12, 2016 to January 17, 2018: Conspirators attempt to draw media attention to leaks via social media

September 18, 2016: Morenets and Serebriakov travel to Lausanne, staying in anti-doping hotels, to compromise hotel WiFi

September 19, 2016 to July 20, 2018: Conspirators attempt to draw media attention to leaks via email

September 2016: Conspirators access DNC computers hosted on cloud service, creating backups of analytics applications

October 2016: Linux version of X-Agent remains on DNC network

October 6, 2016: Emails stolen from USADA first released

October 7, 2016: WikiLeaks releases first set of Podesta emails

October 28, 2016: Kovalev visits counties in GA, IA, and FL to identify vulnerabilities

November 2016: Kovalev uses VR Systems email address to phish FL officials

December 6, 2016 – January 2, 2017: Using IP frequently used by Malyshev, conspirators compromise FIFA’s anti-doping files

December 13, 2016: Data stolen from CCES released

January 19-24, 2017: Conspirators compromise computers of four IAAF officials

June 22, 2017: Data stolen from IAAF’s network released

July 5, 2017: Data stolen from IAAF’s network released

August 28, 2017: Data stolen from FIFA released

As I said in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

What Becomes Of The Brokenhearted Dems And Clickbait Complicit Media Who Got Us Here?

Will Rogers very famously said:

“I am not a member of any organized political party. I am a Democrat.”

That was made sometime in the 1930’s I think, but it is enduringly true.

So, where will the Democratic party go now that they have had their ass handed to them by Trump? Who will lead the Democratic party going forward?

The calls are already ringing out. Liz Warren! Bernie Sanders! Keith Ellison (Sanders has even issued an email ask as to Ellison)! But there is a serious money people and Clintonian push for Howard Dean. Which is truly mind numbing.

Howard Dean is moldy cheese that needs to be taken out with the next non-recycle trash dump. He did neither himself, nor the party, any favors in the 2016 election clownshow cycle. Seriously, in the 2016 election cycle, Sarah Palin may have been more reserved and credible than Howard Dean.

Dean’s 50 state op got Obama elected in 2008, but he is smelly garbage now. Screw this always retread manure. Dean needs to dry up and go away.

And the Democratic Party needs to extricate their head from their ass and move to the future.

New blood. Dems CANNOT be the same old constantly revanchist assholes every time they lose bigly. And, boy did they lose bigly.

The Dem go to kleptomaniacs like Debbie Wasserman Schultz and Rahm Emanuel not only did not help the party expand but set it back in serious ways in places like MO, KS, AZ and the entire United States.

And, while we are at it, the high holy “Senator Professor Warren” ain’t immune either. She had a moment and a shot, and she cowardly whiffed. Maybe it is something she just truly did not want, and, if so, fine. But don’t tell me that someone that is little more than a year younger than Hillary, and who consciously forfeited both her, and Bernie’s, shot in 2016, will be the Democratic holy savior in 2020.

Don’t do that. This is the same ignorant reset idiocy that got Democrats here today. That time is done. If Democrats do one thing ever, it ought be to build the bridge for the young’s of the United States to clean up the shithole we left them. Liz Warren and Bernie Sanders can be a huge part in doing that. But only as bridge builders, not as the man or woman who will be the avatar in 2020. We need them terribly, but not themselves as the embodiment of the future. That kind of thinking is the idiocy of the past.

There is a future. Although CNN’s Jeff Zucker and Trump/Breitbartism’s Steve Bannon are brothers in clickbait cuck arms that birthed, literally, President Trump, and will not easily give up their money raking news cycles.

The “new normal” is that CNN, MSNBC, NBC, CBS, ABC, New York Times, Washington Post, and an endless roll call of dying, wimpering subservient media jackasses, who rode Trump’s clickbait train to a place in hell, will find it’s new Stockholm Syndromed place and start lecturing us how it is all good and just a “function of normal democracy”. It is already occurring, just watch any Wolf Blitzer on CNN or Chris Matthews on MSNBC moment. They are getting climax happy legs on Trump and Giuliani fascism as we speak.

That is one vision, and the early reality, of what the “press” will do in the coming Trump Presidency. The competing vision, which is what I hope and ascribe to, is that the media extricates their heads from their asses and brings real scrutiny to try to mitigate the hell they helped gestate. Are there enough Brian Stelters and Jay Rosens to get us there?

The brokenhearted Dems have some serious soul searching to engage in. So do the currently unapologetic and furiously rationalizing media and “pundits” who so helped get us here.

“Balanced” is NOT fair. Honest is fair. Accurate is fair. Truth is fair. Putting on panels of bickering loud mouthed bought and paid for political assholes as “news coverage” is NOT fair. Nor is it “balanced” news. Jeff Zucker makes Roger Goodell look like a piker in terms of the pantheon of American assholes.

While the media, especially cable, has a circle jerk field day congratulating themselves over their “wall to wall coverage”, and “looking forward to the transition”, just remember how the Trumpism and fascism germinated. Not shockingly, it germinated the same way it always has. When the gatekeepers of a rational society become more about themselves and their money than their jobs representing society.

There is a lesson here, too, for the Dems in media interaction. You got played and hosed royally. Don’t be the brokenhearted, be the, for once, party that learns from its mistakes and failures, and does better.

Just once, do this. If you can.

UPDATE: Commenter GK James posted something below that I think crystallizes much of what I was trying to say far better than I did, even if from a slightly different perspective.

Sure, but doesn’t that effectively absolve the demos that does the choosing? Aren’t Democrats up against a larger problem, one that they’ve had to wrestle with since Reagan? How do you advocate a progressive worldview when the majority of an aging, increasingly atomized, entertainment-addicted population doesn’t want that? It’s easy enough to say, after the fact, that Clinton should have focused more on those disadvantaged by globalization, or that, had they only chosen Sanders, the Democrats would have won. But recall that, without moving to the center, Bill Clinton would never have made it. A lousy bargain in retrospect, but not a crazy one at the time.

Yes, the DNC needs new blood. But assuming someone is found who can articulate a crisp clear message of what Democrats stand for—and who’s telegenic, personable, and entertaining to boot—how would that change the stranglehold that Republicans have on state governments, state legislatures, and the US Congress? The clear majority likes the status quo, having no problem with gerrymandered districts, voter suppression, or bought-and-paid-for legislators who enjoy an incumbency rate of 90%+. And the infotainment complex is likely to help keep it that way by making sure that its customers are never overtaxed by complicated thoughts. There will still be people, adults, who read, think, and have constructive ideas about matters of public import, which they’ll express in complete sentences. But they’ll be increasingly outnumbered and marginalized in a Twittered world.

Can’t argue with that, and don’t know the answers to the questions. But the Democratic party, if it is to continue (and I think it must), has to start finding those answers quickly.

Tuesday: Tilted

I miss prosthesis and mended souls
Trample over beauty while singing their thoughts
I match them with my euphoria
When they said “Je suis plus folle que toi”


— excerpt, Tilted by Christine And The Queens

We’ve spent (and will spend) a lot of time looking at Americans this month, given the two major parties’ political conventions back to back. Yeah, we’ll look at Russia with a gimlet eye directed by media. But we could use a look away.

The artist in this video is actually Héloïse Letissier; Christine and the Queens is the stage name she and a group of transgender supporting artists use, though many of her works are solo performances. Letissier’s work isn’t confined to music alone as she also works in graphic arts. Her work frequently combines French and English lyrics with strong synthpop beat, making for wide appeal outside of France. If you like Tilted, try the mournful but earworm-y Paradis Perdus and the more hip-hoppy No Harm Is Done.

Allons-y!

Eat more cyber

Motor mayhem

  • Tesla driver ‘speeding’ before Florida crash (Reuters) — IMO, the truck driver still bears some responsibility here, failed to yield to oncoming vehicle in spite of their speed. But I don’t have all the data, can’t be certain. One thing I can be more sure of: Tesla’s ‘driving-assist software’ should NOT be perceived as autopilot. If this was true autopilot, the software would have adjusted the vehicle’s speed to meet and not exceed the posted limit.
  • U.S. District court gives prelim approval to Volkswagen’s $15B settlement (LAT) — Settlement covers consumers’ and EPA’s suit on passenger diesels with emissions cheat devices. The deal offers car owners to choose a vehicle buy-back on 2.0L passenger diesel models. VW Group’s 3.0L models are not included in this preliminary offer.
  • Volkswagen owners in EU get an apology, not a check (Politico.EU) — They are NOT happy with the disparity between the $15B initial settlement offered to US passenger diesel owners and the lip service offered to EU vehicle owners.

    “For the same car, in the U.S., you get a compensation, while in Europe you get an apology,” said Maroš Šefčovič, a Commission vice president overseeing energy and climate policy. “I don’t think it is fair.”

    Yeah, it’s not fair, and VW’s head engineer Ulrich Eichhorn is wrong when he says EU customers aren’t damaged. Baloney–the entire EU is damaged by higher NOX and other pollutants generated by these fraudulent cars. People are sick and dying because EU’s biggest automaker is poisoning the air.

Science-y schtuff

  • WHO: Antibiotic resistance a bigger threat than cancer within ~30 years (Euronews) — The rise of superbugs and inadequate research is already costing tens of thousands lives each year and beaucoup money. It will only get worse if the use of antibiotics remains excessive and research doesn’t increase.
  • Plasma technology may extend storage life of fruits (ScienceDaily) — Plasma technology — using energy applied to a gas — can zap bacteria on surface of fruit to prevent deterioration the bacteria cause. Except it’s expensive compared to simply washing fruit with known natural antibacterial agents. Like vinegar and water. Plasma tech might be best used on soft fruits like berries which don’t handle washing very well. But still, more energy required, and any heat generated might cook the fruit. ~smh~
  • Better beer through yeast (Nature) — Soon-to-be-published paper will detail 150 yeast strains’ genomes in an effort to help beermakers find the perfect yeast. What happens when they find The One, though? Will we lose our excuse for sampling widely and deeply?

Longread for your next commute
Belt magazine offers a four-part series, Walking to Cleveland by Drew Philps. It’s a travelogue of sorts, documenting Philp’s journey on foot from Dearborn to Cleveland in time for the Republican National Convention. Visit the Midwest with read.

Catch you later!

Tuesday: Going Alone

I’ve been so damned angry I’ve had difficulty wrapping words around what I want to say. It’s still Tuesday somewhere, so I’ll grit this out.

Assault weapons should be banned for sale to civilians.

Spare me the crap about hunters and taking their guns. My freezer contains 25 to 100 pounds of venison at any time. This household lives off the results of hunting and respects the power of firearms. None of this meat required an assault weapon.

If an assault weapon had been used, it would have been a waste of a deer tag. There’d be no meat left.

The embedded video above shows the damage hunting ammo does at close range — approximately 15-20 feet — on meat. The next video shows the damage #4 and #8 birdshot can do at short range, even through multiple layers of denim and drywall. Imagine what an assault weapon would do to flesh at similar range.

Better yet, listen to what a combat vet says about assault weapons.

There’s nothing in the Second Amendment to suggest a prohibition on certain weapons is wrong; if anything, the framing of a ‘well regulated militia’ suggests limitations are in order.

There’s also nothing in the Second Amendment to suggest that gun manufacturers have an absolute right to an unrestrained business model, or to profits at the expense of the public’s general welfare.

Nor does the Second Amendment say a damned thing about catering to ‘gun enthusiasts’ who want guns for ‘pleasure’. A ‘well regulated militia’ doesn’t possess guns but as necessary for the ‘security of a free state’, not personal enjoyment.

And both embedded videos embedded make a bloody good case that arguments about assault weapons being necessary to stop a home invasion are trash. Birdshot at close range can do one hell of a lot of damage, as do 00 buckshot and a 1-oz slug.

Congress — more specifically, the GOP — needs to strap on its spine and draw the line on assault weapons. How many more dead Americans is it going to take before Congress clues in the terrorist threat is already here? It’s domestic, and it’s better armed than the police because GOP-led Congress is as weak as the GOP is against Trump.

Spare the empty moments of silence and prayers which might as well be to Moloch after another human sacrifice. Such fail at protecting the American public.

Speaking of which…

Information Security Fail

  • USAF database with records on ~100,000 investigations ‘lost’ (Defense One) — This is such bullshit, I can’t even…why is a CONTRACTOR, which may be the subject of any one of the 100K investigations, hosting and managing a database like this? What a massive conflict of interest. The database included constituent and congressional inquiries. Don’t even get me started on the fact this system relied on Microsoft Internet Explorer. Where have we seen this kind of massive loss of data including failed backups before? Hardly a surprise the data covers the period including most of the Iraq and Afghanistan wars as well as the construction of the F-35. Somebody better lose their job for this crap, and there’d better be a respectable investigation instead of the usual fluffery hiding billions of lost dollars.
  • DNC database infiltrated by the Russians (WaPo) — DNC Chair Debbie Wasserman-Schultz needs to be walked out the door for this bullshit, along with responsible IT management. As if anyone able to sit up and take nourishment couldn’t see the DNC computer systems would be a target for cybercrime and cyberwarfare. No excuses for this during the run-up to a general election season, especially when her favorite candidate is already floundering because of information security failures during her tenure as Secretary of State. This bit:

    The depth of the penetration reflects the skill and determination of the United States’ top cyber adversary as Russia goes after strategic targets, from the White House and State Department to political campaign organizations.

    Total blowjob for access. If the hackers got in by spearphishing as suggested in the article, there’s no finesse required. Just poorly trained/educated users and no firewall between email and database. The only thing that surprises me about this is that ransomware wasn’t deployed. Imagine it: a major U.S. political party ground to a halt by spearphish-delivered ransomware.

  • University of Calgary paid CDN$20K after ransomware attack (Calgary Herald) — First heard about this attack the end of May. Looks like the school had no choice but to offer the bitcoin equivalent of $20K to release their systems, which says a lot about backup systems and rebuild cost. Considering the broad range of users at universities and widely different levels of experience and training, I’m surprised we haven’t seen more ransomware attacks on schools. Though monetarily they’re less appetizing than other targets, and may have more resources to deal with the threat if they have a strong IS/IS program.
  • Chinese IBM employee arrested for trade secret theft (Reuters) — The indictment (pdf) says the now-former IBM employee stole proprietary software related to hyperscale storage clusters, or what most consumers would know as ‘cloud storage’. This is a technology segment in which the U.S. still has considerable clout in terms of marketshare, and in terms of global economic impact based on its use. Reporting on this indictment has been vague, referring to the technology at the heart of this case as ‘networking software’. It’s more complex than that; the proprietary software underpins storage and retrieval of data across networked large storage devices. (Hi blueba. Just checking to see if you missed me. Can’t let the Russians have all the fun.)

Basta. Enough. Let’s hope Wednesday is kinder than the last handful of days have been.

The Democrats’ “Diversity Problem”

There was a bit of a stink after Chuck Todd suggested the Democrats wish they had the diversity the GOP showed at the RNC this week. Josh Marshall said it was, “one of the stupidest things I’ve ever heard anyone say.” And then Marshall and Todd debated about it over Twitter. At which point Todd made it clear that he was reporting what the Obama campaign had said to him.

And this is reported material btw, not pundit speculation.

Marshall pointed out how diverse the Democratic party is.

Dude. Actually, let me rephrase that … DUDE. Black prez. 2 asian-am sens, 1 Hisp sen, black gov. (1/3)

2 huge caucuses of hispanic & af-am lawmakers in House, do u really believe the dems “had to go” to a red state to (2/3)

To which Todd repeatedly suggested that this came from the Obama Administration and claimed he was talking about “high profile” positions.

how many govs and senators do the dems have on this front? That was my point. High profile positions

ask the Obama campaign if they wish they had govs and sens as diverse as GOP right now.

Now, frankly, I think Chuck Todd’s problem–in this particular instance–is that he repeated what the Obama campaign said to him, rather than pointing out how crazy the Obama campaign is. It’s not just diversity they want, it’s the right kind of diversity.

Which brings me to the Sunday shows, which include the following lineups–which presumably were made with the significant input of the Obama Administration. (h/t Elliott)

ABC’s This Week:  White House senior adviser David Plouffe.

 

CBS’ Face the Nation:Gov. Martin O’Malley (D-MD), former New Mexico Gov. Bill Richardson and Obama Deputy Campaign Manager Stephanie Cutter.
 

CNN’s State of the Union: Los Angeles Mayor Antonio Villaraigosa, Gov. Bev Perdue (D-NC), and Gov. Martin O’Malley (D-MD). Then, Obama Senior Campaign Adviser Robert Gibbs. Senior Romney Campaign Adviser Eric Fehrnstrom.
 

Fox News Sunday:DNC Chair Los Angeles Mayor Antonio Villaraigosa, Obama Campaign Senior Advisor David Axelrod.
 

NBC’s Meet the Press:Chicago Mayor Rahm Emmanuel.

The Latino Mayor of Los Angeles, a tainted but Latino former Governor of New Mexico, lots of dickish top campaign advisors, dickish Rahm, Governor O’Malley (who’s been a superb campaign surrogate).

And just two women, one Stephanie Cutter appearance and one appearance from the Governor of the state hosting the Convention.

Not even DNC Chair Debbie Wasserman Schultz, who whatever else I might say about her is also a terrific media figure. Read more

Road Trip: Democratic National Convention Edition

lake-superior.jpgIt’s that time of year again where I go off grid for a period of time and people resign or other momentous stuff happens while I’m away from the Toobz.

I’ll be leaving Friday evening for a road trip with mr. emptywheel and McCaffrey the MilleniaLab, up over the top of Lake Superior, through South Dakota so mr. emptywheel can see Abraham Lincoln in a rock, and from there down to Denver for the Convention (and to visit my family, some of whom live there). I can’t promise you mr. emptywheel will let me check on the Toobz until I get to Denver a week from tomorrow, though perhaps if I go into withdrawal I’ll liveblog Wall Drug for you (you think Wall Drug has wifi??). And McCaffrey the MilleniaLab, who was named after Eddie McCaffrey of the Denver Broncos, is hoping to be able to see Barack Obama accept the nomination in Mile High.

It’s bound to be a particularly momentous absence, as Calculated Risk will also be gone from the Toobz for some of the same dates as I’ll be gone–and when he goes off  grid, banks tend to fail. Obviously, one of the things I’ll be missing is the announcement of Obama’s Veep (and no, I didn’t sign up to get a text as soon as it’s announced), but who knows, maybe we’ll be lucky and another high level Bushie will resign to spend more time with his family.

In the meantime, bmaz will have the keys (yes, to the blog and to the liquor cabinet, you lushes), and I’ve instructed him he can do with those keys as he sees fit–so behave! You don’t want him to key your car. We’ll also have a few posts from another surprise guest poster next week, so you’ll be in great hands while I’m gone.

Anyone have any tips for must-see things along the way?

(Photo of Lake Superior Provincial Park, where I plan to do a day hike on Saturday, by loimere.) 

Howard, This Is Not About You, This Is About Your Country

Howard Dean has kicked off this meeting with a great speech. He emphasized the superb turnout Democrats have had this year. And he emphasized how strong we are to be able come together and disagree.

He condemned the sexist and racist statements made over the course of the primary. When he said, "on the part of the media" there were some grumblings.

He then told a story about when he was running for President. He was really really angry at what the Democratic Party had done. And he was ranting. (I imagine it went something like Argghhhhhh!!) And then Al Gore called. It took him about 20 minutes, but finally, Gore said, "Howard, this is not about you, this is about your country."

The speech made me proud to own a orange cap from Iowa.

Oh, and then he said, "we have to honor the voters who turned out, and also those voters who didn’t turn out in MI."

I got a lot of stares, up here in the media seats, for clapping loudly.

It was a good speech. We did good when we elected that man.

Why Is the DNC Ignoring MI’s Citizens’ Legal Complaints about the Cluster$%@#?

The Democratic Party’s charter requires that the Party:

Establish standards and rules of procedure to afford all members of the Democratic Party full, timely and equal opportunities to participate in decisions concerning the selection of candidates, … and further, to promote fair campaign practices and the fair adjudication of disputes. (Charter, Article I, Section 4)

Yet both the Democratic National Committee and the Michigan Democratic Party appear to be violating that requirement in their selection of which challenges to the MI Clusterfuck to hear at the May 31 Rules and Bylaws Committee meeting.

At least one group of ordinary Michigan citizens submitted a complaint that appears to fulfill all legal requirements. Yet the MDP has failed to follow its own rules on how to assist with and respond to that complaint–and it also did not comply with the requirement that it publish the names of those selected in the April 19 district conventions (which triggers a deadline for the submission of complaints). And the DNC will only hear the two state party-led complaints at the May 31 Rules and Bylaw Committee, thereby violating the requirement that "all members" of the party be able "to participate in decisions concerning the selection of candidates."

This complaint is similar to the petition I launched in April, in that its solution would reflect a compromise number between the results of the January 15 Clusterfuck and a 50-50 split: it works out to be the same 69-59 that the "Blue Ribbon Commission" has proposed. Also, like my petition, this complaint calls for the super-delegates to receive no vote.

But it’s different in two ways. First, it advocates giving MI’s elected delegates just half a vote each, not the full vote I suggested (in that respect, I like mine better, but then I didn’t get off my ass and file an official complaint; though this complaint has the advantage that it matches what the rules call for). More importantly, the complaint justifies its solution based on the MDP’s and the DNC’s own rules.

My favorite part of the petition is that it notes that, on March 26, a Court ruled the January 15 primary unconstitutional. That meant, the petition asserts, that the,

Michigan Presidential Primary of January 15, 2008, was "invalid, inoperable, and without effect." The result was non-binding.

Read more

Dean: Is McCain a Puppet … or a Racist?

I taped a MI political talking heads show this morning–if I don’t suck too badly, I should have a link to it tomorrow (just as a preview, though, the cameramen were apparently upset that I said "pissed" so often, six times … and here I was congratulating myself I avoided "fuck"). One of the Republicans was "pissed" that I brought up that McCain, a guy who married into a $100 million fortune, suggested that our economic problems were "psychological" so often.

One regret I have, though, is that we didn’t start talking about the NC Republicans’ race-baiting ad until after the cameras had stopped rolling. NPR had done a story on it while I was driving–and they credulously, sheepishly, accepted McCain’s and the RNC’s claims that they had asked the NC GOP not to run the ad. "Chumps!" I said to myself in the car. "Only chumps would believe the presumptive head of the Republican Party couldn’t get the NC GOP to withhold the ad if he wanted to." Digby says it better:

St McCain has written one of his patented sanctimonious letters saying that he doesn’t approve of these awful ads. He’s very upset and wants them to take them down. (Isn’t he awesome?) Sadly, they told him no. It’s really too bad the presumptive head of the Republican party he really can’t control what those terrible people are doing. C’est la vie! At least we all know where St. McCain stands on the issue and that his heart is totally in the right place.

So I was glad to see Howard Dean channeling Digby:

This is a test of leadership for John McCain. If he can’t pick up the phone and make members of his own party stop airing a television ad he claims to oppose, how can he lead our country through an economic crisis or the war in Iraq? After shifting his positions on gun control, immigration and tax cuts throughout this campaign, McCain should not equivocate on this issue. Making a show of releasing your emails to the press is not leadership. If he is serious, he will get this ad pulled.

Read more