Posts

In a Shoddy Attempt to Inflate the Single Server Fallacy, Roger Stone Suggests Communicating with Guccifer 2.0 Would Be Criminal

In a frivolous pair of motions, Roger Stone is going after CrowdStrike’s analysis of the Russian hack. In the first, he demands full unredacted copies of CrowdStrike’s reports on the hacks. He bases that demand on a claim the CrowdStrike reports are material to a motion to suppress the warrants against him because — he claims, falsely — the government relied exclusively on the CrowdStrike reports to decide Russia had hacked Democratic targets, so if the reports are faulty, then so are the warrants.

The entire stunt is based off what appears to be an inaccurate claim — that this government response to some other frivolous motions claimed they didn’t have to prove that Russia hacked Democratic targets.

The Government stated in its Opposition to Stone’s Motion to Dismiss (Dkt # 99) that it will not be required to prove that the Russians hacked either the Democratic National Committee (“DNC”) or Democratic Congressional Campaign Committee (“DCCC”) from outside their physical premises or that the Russians were responsible for delivering the data to WikiLeaks.

Maybe he’s thinking of another government response to his motions that notes they don’t have to prove an underlying crime to prove obstruction, but the one he cites (without paragraph citation) doesn’t make that claim. I mean, it is true that the government doesn’t have to prove the underlying crime, but that’s still another issue than having to prove what physical premises the Russians hacked the DNC from.

In his demand for the CrowdStrike servers, Stone at least claims he’s making the demand to distinguish his case from all the other Trump flunkies prosecuted for lying to Congress and mount a materiality challenge to his false statements prosecution.

As to selective prosecution, if the Russian state did not hack the DNC, DCCC, or Podesta’s servers, then Roger Stone was prosecuted for obstructing a congressional investigation into an unproven Russian state hacking conspiracy, while others similarly situated were not. Lastly, if the Russian state did not hack the servers or did not transfer the data to WikiLeaks, the exculpatory evidence regarding materiality, a factual issue for the jury, is amplified.

But in his Fourth Amendment challenge, Stone suggested that if Russia didn’t hack the Democrats and hand the documents to WikiLeaks, then speaking to WikiLeaks and Guccifer 2.0 would not be a crime.

If these premises are not the foundation for probable cause, Roger Stone communicating with a Twitter user named “Guccifer 2.0” or speaking with WikiLeaks, would not constitute criminal activity.

Hmm.

Speaking to WikiLeaks and Guccifer 2.0 would only be a crime if Stone engaged in a conspiracy with them, and a good bit of the redacted language on prosecutorial decisions in the Mueller Report probably says the First Amendment otherwise protects such speech. That said, the claim that talking to them would be a crime is interesting given some of the crimes for which the government showed probable cause in his warrant affidavits.

The search warrant applications however, allege that the FBI was investigating various crimes at different times, such as Stone for accessory after the fact, misprision of a felony, conspiracy, false statements, unauthorized access of a protected computer, obstruction of justice, witness tampering, wire fraud, attempt and conspiracy to commit wire fraud, and foreign contributions ban. The uncharged conduct particularly relied upon the assumptions the Russian state is responsible for hacking the DNC, DCCC,1 and even (although not as clear) Hillary Clinton campaign manager, John Podesta.

Stone is not, here, claiming that the government didn’t show a lot of evidence he engaged in these crimes (and remember, the government has told Andrew Miller that they’re likely to supersede Stone’s current indictment after they get Miller’s grand jury testimony, the content of which they know from an FBI interview last year). Rather, he’s claiming that these hacking-related crimes would only be illegal if the Russians did the hacking. (I really look forward to the government response to this, because some of these crimes would be crimes based on Julian Assange’s foreign status, not GRU’s, and wire fraud is a crime all by itself.)

Perhaps most interesting is the way Stone’s lawyers dismiss the Mueller Report (and the GRU indictment’s) focus on DCCC and Podesta documents. A footnote even suggests falsely that the Mueller Report said the DCCC documents did not get released.

WikiLeaks never released the DCCC documents. The Mueller report suggests the hack of the DCCC only provided additional keys to access the DNC servers.

At one point — perhaps a critical one — Stone uses the fact that the GRU hacked the DNC’s AWS server after Stone dismissed the value of the DCCC oppo research Guccifer 2.0 discussed with Stone in early September 2016 to suggest CrowdStrike was not competent.

CrowdStrike’s three draft reports are dated [sic] August 8 and August 24, 2016. The Mueller Report states Unit 26165 officers also hacked into a DNC account hosted on a cloud-computing service on September 20, 2016, thereby illustrating the government’s reliance on CrowdStrike even though the DNC suffered another attack under CrowdStrike’s watch.

Of course, CrowdStrike had little ability to protect AWS’ servers.

Ultimately, this is an attempt to misrepresent the Mueller Report and GRU indictment to shift the focus away from the Podesta and DCCC documents — where Stone’s greater criminal exposure might lie — and onto the Single Server Fallacy about the DNC server, which is irrelevant to those other documents.

And along the way, Stone lays out a good number of impressive crimes he was and may still be at risk for, and admits the government believed his actions are closely enough tied to the hacks to get redacted copies of the CrowdStrike reports in discovery. He also concedes (incorrectly) that simply speaking to WikiLeaks and Guccifer 2.0 may be a crime.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

The Many Sided Stone: The Investigation Is Not Over

While we have been talking about how good and done Robert Meuller’s investigation is, a slew of filings and other reports relating to Roger Stone in the last few days remind us that the fruits of his investigation are definitely not done.

Roger Stone’s cry for help

As background, consider this cry for help, in a local, as opposed to the kind of national media outlets that had recently hung on Roger’s every word. In it, he describes the burden of spending all his money on defense attorneys.

“The worst part of this is being broke,” he said on the SiriusXM program that airs weekdays on the Faction Talk channel 103.

“I’ve lost my home, my insurance, what little savings I had, my ability to make a living because people pay me to write and talk, and of course the things they want me to write and talk about are the very things I’m not allowed to talk and write about. In the blink of an eye you can lose everything.

“I have to pay everything I have to lawyers. And I could no longer pay the rent in the property that I was in. I moved from a nine-bedroom house to a one-bedroom apartment. Had to do the move myself with my wife renting a truck. On the last day of the move in kind of a freak accident the truck slips out of gear and rolls over my wife’s ankle, breaking it.”

More interestingly, Stone claims he hasn’t spoken with Donald Trump for almost two years (he doesn’t say whether his attorneys have spoken to Trump’s attorneys).

“I’ve known him for 40 years. We’re very good friends. I don’t agree with everything he does, I agree with a lot of what he does,” Stone said. Stone said Trump was at his wedding, and he at two of Trump’s weddings; he was at the funerals for Trump’s parents, and is friendly with his sister. “I do miss him.”

He also complains that Alex Jones is not selling T-shirts for him.

“I am grateful for Alex Jones for giving me a platform. He is a friend of mine. I like the guy, I like hanging out with him. I do not agree with everything he says, I agree with some of the things he says. He probably doesn’t agree with everything I say. But you know, the check would be nice.”

While I’m sure Stone exaggerates his financial straits, I’m also sure they’re considerable. These two specific calls for help, though (especially in the wake of allegations that InfoWars may have been providing hush money to Jerome Corsi), are especially interesting.

Stone’s throw of the dice

Meanwhile, the lawyers that are bankrupting Stone have been busy, filing six challenges to his indictment last night, several of them meritorious, the others not. The motions include:

  1. A bid to throw out the prosecution on several grounds designed to appeal to William Barr’s prejudices
  2. A demand for the full Mueller report based on some specious (appeals to Bill Barr) and some justified bases (prosecutorial decisions on Jerome Corsi and Randy Credico)
  3. A motion to enjoin his prosecution based on a claim that Congress hadn’t funded this Special Counsel investigation
  4. A motion to dismiss based on the claim that Mueller violated separation of powers by charging him for lying to HPSCI without a formal referral
  5. A request for discovery to support a selective prosecution claimed designed, in large part, to accuse Randy Credico of lying to the grand jury
  6. A renewed objection to having his case judged by Amy Berman Jackson along with the GRU hackers

He seems to be pursuing several strategies (beyond just throwing a bunch of spaghetti against the wall).

Embarrass Credico

The first is to use the motions process to discredit the witnesses against him. That’s most true of a passage of his selective prosecution motion that accuses Credico of lying to the grand jury.

Another witness, Randy Credico lied about speaking to Assange and Assange’s lawyer to federal agents. It is curious that the Special Counsel found one aspect of Credico’s interactions with Stone so compelling that it made its way into Stone’s Indictment. In Paragraph 14(e) of the Indictment, the Special Counsel quotes the conversation between Stone and Credico from Credico’s radio show of August 23, 2016. Stone and Credico have a discussion regarding communications with the “head of Organization 1.” Yet, astonishingly, in Credico’s testimony to the Grand Jury (DOJ-3500-RC-000111) Transcript Page 44, Lines 7-22, Credico tells the Grand Jury that on the very show they quote, Stone and Credico never discussed the head of Organization 1. For unknown reasons and the precise reason why discovery is mandated in these situations, the Special Counsel elected not to charge Credico with lying to the Grand Jury, something expressly within their regulatory authority.

Later in his testimony, Credico says that prior to his interview with presidential candidate Gary Johnson on September 10, 2016, that he had never spoken to Stone about WikiLeaks or Assange.3 This is a demonstrated lie as according to the text messages between Stone and Credico that Stone voluntarily released, and the Special Counsel possessed. As early as August 19, 2016, Credico was bragging to Stone that he had a connection to Assange and that it was through Margaret Kunstler, Esq., an attorney represented to be on Julian Assange’s legal team. There is no indication based on the initial review of discovery provided by the government that the Grand Jury was ever informed of Credico’s lies regarding the August 23d radio interview.

It’s unclear whether Stone’s representation of Credico’s grand jury testimony is fair. But if it is, the selective prosecution claim provides a way to discredit Credico.

Appeal to Barr and Trump

Then there’s a series of arguments that appear to be an attempt to appeal to Bill Barr’s prejudices, and through him, Trump. There’s the separation of powers argument about the lack of a criminal referral that suggests — incorrectly — that Mueller would have needed to rely on Adam Schiff’s testimony to assess whether and how Stone lied in his testimony (as a matter of courtesy, HPSCI shared informal copies of the transcripts with the IC) and claims — probably ridiculously — that an equivalent example of Barr’s contention that the president can’t be guilty of obstruction without committing the underlying crime is also true for the President’s rat-fucker. Stone repeats this argument in his demand for the full Mueller report, claiming that it will show there was no “collusion,” which therefore means he couldn’t obstruct anything.

The most novel of these arguments, however, is that the President — and his campaign from before he was elected!! — can’t be investigated under the Take Care Clause. This is mostly bullshit, a dime store version of Bill Barr’s own opininion excusing many kinds of obstruction for the President. Trump will like it best where Stone argued that investigating all links with Russia inhibited Trump’s ability to conduct foreign policy.

The Mueller Appointment grants the Special Counsel the authority to investigate “any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump.” Accordingly, every action taken by President Trump since he formed his campaign with regard to the United States’ relationship with Russia has been second guessed as evidence of “collusion,” or a conspiracy between Trump and Putin.20 Many have asserted that Putin has some form of control over Trump.21 The Special Counsel investigation has stimulated this second guessing, significantly undermining the President’s ability to conduct foreign policy with regard to Russia. The Special Counsel investigation hog-ties the President in the execution of his foreign policy.

The Mueller Appointment not only hobbles the President’s ability to conduct a rational foreign policy with regard to Russia, it undermines his ability to deal with every world leader. No President can deal effectively with the heads of other nations when he is the subject of a Department of Justice investigation that is prominently being portrayed in the press as imminently removing him from office. Counterparts will be inhibited in reliance on a President who may not serve out his term

This is bait for the frothy right. More importantly, it treats Roger Stone as the President for investigative purposes when according to both him and the President he wasn’t even formally part of the campaign for the key periods under investigation.

This is mostly spaghetti throwing for the frothy right, but there’s no telling what will happen if some of the nuttier GOP judges latch on to one of these strands of spaghetti.

Engage in graymail

Stone repeats his demand for the full Mueller report in several ways — first in a bid for the report itself, then as the “prologue” to a bunch of mostly spurious attacks on Mueller’s authority (some of which have already been rejected in the larger Mueller investigation). This is graymail. Of course Stone is not going to get the full report, which includes grand jury material unrelated to his prosecution and descriptions of ongoing investigations likewise unrelated to his prosecution. But he probably does have a good case to claim that he should get the parts that will be redacted for us that pertain to him.

Misstate Barr’s citation of Mueller’s findings

I’m perhaps most interested in the way Stone engages in Russian hack trutherism. For example, his first justification for needing the full Mueller report — even before he claims to need to know why Credico and Corsi weren’t charged — is to understand Mueller’s “assumption” that Russia hacked the Democrats (something that Stone himself admitted until August 2016, when it became inconvenient).

His lawyers must be allowed to review the Report in its entirety because it contains the government’s evidence and conclusions on matters essential to Stone’s defense. Starting with the base assumptions by the Special Counsel that Russians hacked the Democratic National Committee, Democratic Congressional Campaign Committee, and Clinton Campaign email databases (see Indictment, ¶¶ 1-3, 7, 18, 20, 39);

And in Stone’s bid to get his case reassigned, he makes several misrepresentations of the public record. For example, he claims Barr’s representation of Mueller’s finding said there was no evidence of “collusion” between Trump’s associates and Russia.

The Office of the Special Counsel has since concluded its investigation and has found that there is no evidence of collusion between Russia and those associated with the presidential campaign of Donald J. Trump.

Barr addressed only conspiracy and coordination, and all the language is consistent with Mueller not finding enough evidence to charge it, while finding some evidence.

Stone also claims that prosecutors have claimed that his case is associated with the GRU indictment only because communications between Stone and Guccifer 2.0 were obtained with the GRU warrants.

Previously, however, opposing counsel designated this case as related to that of United States of America v. Netyksho, et al. (1:18-cr-00215-ABJ), because the government claimed that communications between Guccifer 2.0 and Stone were obtained from the Netyksho search warrant.

If they said specifically that, then it was in private. In public, the government said this:

The defendant’s false statements did not arise in a vacuum: they were made in the course of an investigation into possible links between Russian individuals (including the Netyksho defendants), individuals associated with the dumping of materials (including Organization 1), and U.S. persons (including the defendant).

[snip]

In the course of investigating that activity, the government obtained and executed dozens of search warrants on various accounts used to facilitate the transfer of stolen documents for release, as well as to discuss the timing and promotion of their release. Several of those search warrants were executed on accounts that contained Stone’s communications with Guccifer 2.0 and with Organization 1.

Even ignoring that Stone seems to cede that at least one of the number of warrants referred to in that filing included his communications with Guccifer 2.0, it’s even more amusing that Stone ignores WikiLeaks — I wonder if they took it out after Julian Assange got arrested?

Stone then misstates another thing Barr said, claiming he claimed no American citizens conspired with “Russian agents.”

[T]he Department of Justice has concluded that there was no conspiracy between Russian agents and any American citizen, including Roger Stone, this “connection” is unsubstantiated.

What the Barr memo actually says about the hack-and-leak operation is,

Special Counsel did not find that the Trump campaign, or anyone associated with it, conspired or coordinated with the Russian government in these efforts, despite multiple offers from Russian-affiliated individuals to assist the Trump campaign.

Barr’s statement only refers to the Russian government, not possible Russian cut-outs like WikiLeaks, and only discusses Americans with ties to Trump.

Stone then claims that the GRU indictment claims no American was part of the conspiracy.

Additionally, the only document filed in Netyksho, the Indictment, states no American was part of the conspiracy charged. There is nothing left to “connect” Roger Stone to.

It doesn’t name any Americans, but also doesn’t say no Americans were part of the conspiracy. Here’s what it says about the conspirators.

[The defendants] were GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”),

Stone’s effort to get a new judge is not going to work in any case. Which leads me to wonder why he repeatedly misstates the public record.

In any case, assuming normal judicial review, Stone’s request for more of the Mueller report might have promise and he could get some thoughtful briefing on a few of the other claims. But most of this is wall-splat for specific audiences: Trump, Barr, and the frothy right.

Andrew Miller claims he has been mooted

Meanwhile, as expected, Stone associate Andrew Miller just requested an en banc review of the DC Circuit ruling that he needs to testify against Stone. Along with the arguments he already lost on, he is now asking the court to find out whether the government really still needs his testimony, arguing (in part) that Mueller’s authority has expired.

Since the subpoena issued to Mr. Miller was for the purpose of obtaining evidence related to Mr. Stone’s connection with WikiLeaks, Julian Assange, and Guccifer 2.0, it would appear that the Special Counsel would no longer need Mr. Miller’s testimony regarding that subject matter. Nevertheless, the next business day, Monday, January 28, 2019, undersigned counsel was advised by the Special Counsel’s office that it believed the case to be a live controversy since the grand jury was still active, though it was not apparent whether the grand jury or its foreperson was consulted as to any continued interest in hearing Mr. Miller’s testimony. 3

On March 22, 2019, Special Counsel submitted his final report to Attorney General Barr pursuant to the Special Counsel regulations, 28 C.F.R. 600.8(c), concluding his investigation, explaining his prosecutions and declinations, and finding that no conspiracy or coordination took place between the Trump campaign or any aides associated with the campaign and Russia regarding interference with the 2016 campaign or hacking the emails of Hillary Clinton or the DNC. 4 No further indictments are expected. According to Justice Department spokesperson Kerri Kupec, “The investigation is complete.”5 Thus, like Cinderella’s carriage that turned into a pumpkin at midnight, Special Counsel Mueller’s authority expired. Accordingly, the intervening events described above that have occurred since the issuance of the subpoena in question over nine months ago, strongly, if not definitively, demonstrate Mr. Miller’s testimony regarding Mr. Stone is no longer required nor can be legally obtained. Thus, this Court should invite the government’s views to verify whether this case continues to be a live controversy or is moot to assure itself that it continues to possess judicial power to adjudicate the instant petition for rehearing and suggestion for rehearing en banc and any subsequent action in this appeal

3 Notably, while the mandate was stayed as is the usual practice until 7 days after the time for the filing a petition for rehearing had expired or after disposition of any timely filed petition (45 days from the decision, or April 12), the Special Counsel had the right to ask the Court to issue the mandate ever since February 26 if Mr. Miller’s testimony was needed. The Special Counsel declined to do so. [my emphasis]

This is really just decoration on an en banc review that will be denied, but along the way he’s fishing for information about where else prosecutors (including the DC AUSAs who’ve been involved since Stone’s indictment, at least) are headed.

Mueller may be done but prosecutors are not

Which brings us, finally, to this response from prosecutors (signed by two DC AUSAs, Jonathan Kravis and Michael Marando, from the Stone team and Aaron Zelinsky from the Mueller team) in response to what is fairly characterized as a media request for all outstanding warrant materials in the Mueller investigation, with a focus on Stone. After getting two extensions, one because the attorneys involved in it were involved in a press of other work, one to transition to the DC AUSAs who’d take over because Mueller was done, the government today issued a narrowly targeted (to Stone) response.

After introducing the scope of the investigation as it proceeded from Comey’s March 20, 2017 scope to Mueller’s May 17, 2017 scope to his March 22, 2019 closure, the government response then stated the media request in remarkably narrow terms, focused just on Stone.

The movants seek to unseal search warrant materials related to the Stone prosecution. Specifically, the movants seek unsealing of “warrants, applications, supporting affidavits, and returns relating to all search or seizure warrants relevant to the prosecution of Roger J. Stone, Jr.” Doc. 4, at 2 (Order) (quoting Media Coalition Mem. 1). 2 It is unclear whether the movant’s request is limited to warrants issued pursuant to Rule 41 or also includes warrants under the SCA. In an abundance of caution, the government is treating the request as covering both categories. It is similarly unclear whether the reference to “warrants relevant to the Prosecution of Roger J. Stone, Jr.” means only warrants to search Stone’s property and facilities or includes other warrants that were executed as part of the same line of investigation. Again, in an abundance of caution, the government is treating the request as covering both categories.3

2 In places, the movant more broadly references warrant materials pertaining to “the Russia investigation” (Mot. 1, 4; Mem. 4) and once references “Manafort records” (Mot. 3). Consistent with this Court’s March 1, 2019 order (Doc. 4, at 2), and the movants’ detailed description of the records sought, see Mem. 4-5, the government understands those references as context for this specific request to unseal records related to the prosecution of Stone. See Mot. 1, 3, 4; Mem. 1, 4, 5.

Yes, it makes a big show of interpreting the media request broadly to interpret the request as both a request for Rule 41 and Stored Communication Act warrants and both Stone’s property and others (though again, they remarkably blow off all requests for anyone but Stone). But then they get to footnote 3, which reveals that there were warrants targeting entirely different people that ended up “merely happen[ing] to yield evidence that concerns Stone.”

3 The government does not understand the request to include warrants that were not related to Stone or that line of investigation but that merely happened to yield evidence that concerns Stone and is being provided to him in discovery.

This is a fairly remarkable disclosure, that the government obtained warrants thinking they were getting one thing that “merely happened to yield evidence that concerns Stone.” Particularly when you consider the earlier discussion of the “multiple lines” of Mueller’s investigation, some of which have been spun off.

The Special Counsel’s investigation has involved multiple lines of inquiry. Many have been handled in the Special Counsel’s Office. But the Special Counsel has also referred a number of matters to other offices in the government for investigation.

[snip]

On March 22, 2019, the Special Counsel notified the Attorney General that he had completed his investigation into Russian interference in the 2016 presidential election. The Special Counsel, however, referred a number of matters to other offices in the Department of Justice. Those matters remain ongoing.

The filing claims, again, that this is an ongoing investigation, with stuff still being handled by “other offices and entities,” plural,

As explained, although the Special Counsel has concluded his work, the Special Counsel referred a number of matters that are ongoing and are being handled by other offices and entities. Disclosure of the warrant materials threatens the harms that courts have catalogued in holding that the First Amendment provides no right of access to search warrant materials in ongoing investigations.

Nor would it make sense to recognize a right of access automatically once any indictment has been returned. In complex investigations, such as this one, where a single warrant may have relevance to interconnected lines of investigation, that test would fail to take into account tangible investigative harms from disclosure. An indictment does not end an overall investigation, for example, when a defendant is potentially involved in activities with other subjects or targets, and the warrant in question seeks evidence bearing on that joint activity, but the defendant has been charged only with a subset of his conduct under investigation. The probability of a continuing investigation post-indictment grows when the search targets are linked to other persons of interest by ties to a single organization, common associates, or coordinated activities. Disclosure of warrant materials could reveal sources, methods, factual and legal theories, and lines of investigation extending beyond the charged conduct.

It suggests a “single warrant may have relevance to interconnected lines of investigation” (I assume those targeting Rick Gates are one example), then specifically says an indictment, like that targeting Stone, “does not end an overall investigation” perhaps because the “defendant has been charged only with a subset of his conduct under investigation” and he “is potentially involved in activities with other subjects or targets … linked to other persons of interest by ties to a single organization, common associates, or coordinated activities.”

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Roger Stone and the Dozens of Search Warrants on Accounts Used to Facilitate the Transfer and Promotion of Stolen Democratic Emails

In response to Roger Stone’s bid to get a new judge, the government has submitted a filing explaining why his case is related to the GRU indictment. It explains that Stone’s alleged false statements pertained to an investigation into links between the Russians who stole Democratic emails, entities who dumped them, and US persons like Stone:

The defendant’s false statements did not arise in a vacuum: they were made in the course of an investigation into possible links between Russian individuals (including the Netyksho defendants), individuals associated with the dumping of materials (including Organization 1), and U.S. persons (including the defendant).

More interestingly, it makes clear that Stone’s communications “with Guccifer 2.0 and with Organization 1” were found in some of the accounts used to transfer and promote the stolen emails.

In the course of investigating that activity, the government obtained and executed dozens of search warrants on various accounts used to facilitate the transfer of stolen documents for release, as well as to discuss the timing and promotion of their release. Several of those search warrants were executed on accounts that contained Stone’s communications with Guccifer 2.0 and with Organization 1.

To be clear: We know that Stone had (innocuous) DMs with both Guccifer 2.0 and WikiLeaks. So this passage is not necessarily saying anything new. But given that Stone’s indictment obscures precisely who his and Jerome Corsi’s go-between with WikiLeaks is, it suggests there may be more direct Stone communications of interest.

Stone will get a sealed description of what those warrants are and — eventually — get the warrants themselves in discovery.

The relevant search warrants, which are being produced to the defendant in discovery in this case, are discussed further in a sealed addendum to this filing.

Meanwhile, Amy Berman Jackson has issued a very limited gag in Stone’s case, prohibiting lawyers from material comments on the case, but gagging Stone only at the courthouse. That said, her gag includes lawyers for witnesses, which would seem to include Jerome Corsi lawyer Larry Klayman.

Counsel for the parties and the witnesses must refrain from making statements to the media or in public settings that pose a substantial likelihood of material prejudice to this case

ABJ does give Stone the following warnings to shut up, however.

This order should not be interpreted as modifying or superseding the condition of the defendant’s release that absolutely prohibits him from communicating with any witness in the case, either directly or indirectly. Nor does this order permit the defendant to intimidate or threaten any witness, or to engage or attempt to engage in any conduct in violation of 18 U.S.C. §1512.

Finally, while it is not up to the Court to advise the defendant as to whether a succession of public statements would be in his best interest at this time, it notes that one factor that will be considered in the evaluation of any future request for relief based on pretrial publicity will be the extent to which the publicity was engendered by the defendant himself.

So the biggest news here might be that Larry Klayman has to shut up.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Roger Stone Adopts the Russian Troll Evidence-Phishing Technique

Roger Stone submitted two motions in his defense today. The first, opposing a gag in the case, is rigorous and will make for an interesting legal battle (until such time as Stone violates the protective order in the case, in which case it’ll become a no-brainer; here’s the government’s motion supporting a limited gag). The second, objecting to the designation of Stone’s case as “related to” the GRU indictment, is a frivolous attempt to force evidence into the public realm, similar to the way Yevgeniy Prigozhin is using a defense of Concord Management in an attempt to obtain the intelligence that went into that investigation.

As I noted in this post, the local DC rules deem a case to be related in three cases, the third of which says that cases are related if they arise from a common wiretap, search warrant, or the same alleged criminal event.

A related case for the purpose of this Rule means as follows:

(1) Criminal cases are deemed related when

(i) a superseding indictment has been filed, or

(ii) more than one indictment is filed or pending against the same defendant or defendants, or

(iii) prosecution against different defendants arises from a common wiretap, search warrant, or activities which are a part of the same alleged criminal event or transaction. A case is considered pending until a defendant has been sentenced.

With his filing, Stone includes the form prosecutors used to lay out why his case related to that of the GRU officers who hacked the election.

The form makes it clear that the cases are related both because there’s a common search warrant and because both cases arise from “activities which are part of the same alleged criminal event or transaction.” Not only that, it explains why that’s the case:

In particular, certain evidence that is relevant to this case was derived from search warrants executed in Netyksho et al., and the alleged obstructive conduct in this cases arises from claimed and then disputed advance knowledge about the dissemination of stolen document during the 2016 presidential campaign that forms, in part, the basis for the criminal charges against Netkysho et al.

Stone’s lawyers don’t mention that explanation at all in their motion. Instead, they argue (fairly, as far as this cynical move goes) that because they need to object to the designation within 10 days but they haven’t obtained discovery yet to understand this, they need to register this objection now. Rather than asking for that an explanation or due consideration of the explanation included on the form, though, they instead demand all the evidence and reasoning used to support the designation.

At first blush and without the benefit of discovery, there is nothing about these cases that suggests they are suitably related, other than they are both brought by the Office of Special Counsel. The notice served on defense counsel requires an objection to the designation be filed within ten days of the arraignment. As a result of this constraint of a timely objection, the government should be required to disclose all evidence and reasoning used to support its requested designation since the goal of the local rule is to safeguard the honor of the district court and protect the rights of defendants like Roger Stone. [my emphasis]

The motion then goes on to make a series of contradictory claims. For example, he claims,

Defendant Stone has been charged with lying to Congress and witness tampering under 18 U.S.C. §§ 1505, 1001, 1512(b)(1), 2. There is no mention of hacking, stealing, or involvement with Russia or the Netyksho defendants

Just a few paragraphs before he cites his own indictment mentioning that very same hack.

The indictment in the Stone case alleges that the servers of the Democratic National Committee were hacked by unspecified “Russian government actors”

Ultimately, he gets around to admitting it is the same alleged hack.

There is not one single fact alleged in either indictment about the facts in the other indictment, other than that the Russians stole emails that Stone, a year later, allegedly lied to Congress about regarding his failed efforts to find out about them. Thus not a single one of the three criteria exists that is necessary for relatedness to be found.

Similarly, he notes how the GRU indictment describes him,

The Office of Special Counsel further alleged that “on or about August 15, 2016, the [Russian defendants] posing as Guccifer 2.0, wrote to a person who was in regular contact with senior members of the presidential campaign of Donald J. Trump, ‘thank u for writing back…do u find anyt[h]ing interesting the docs I posted? … The person responded, ‘[p]retty standard’.”

Just a few paragraphs before he cites similar language from his own indictment.

It also claims that Defendant Stone was a political consultant employed by the Trump campaign until August 2015 (Id. ¶ 4), and that “[d]uring the summer of 2016. . .[he] spoke to senior Trump Campaign officials about Organization 1 and information it might have had that would be damaging to the Clinton Campaign.”

Most interesting is the way Stone acknowledges that the GRU indictment alleges that Guccifer 2.0 sent 20,000 emails to WikiLeaks,

Later, it was also alleged that some 20,000 stolen emails were transmitted by Guccifer 2.0 to “Organization 1.”

Just a few paragraphs before he admits his own indictment describes him bragging about communicating with WikiLeaks.

The indictment further alleges that Defendant Stone was “claiming both publicly and privately to have communicated with Organization 1″ (Id. ¶ 6),

That said, Stone doesn’t consider the commonality of WikiLeaks’ actions in this motion, which is probably the point.

Understand, Stone is trying to figure out several things with his demand to receive the evidence underlying it immediately. He’s trying to figure out what search warrants targeting him, going back almost a year, look like. He’s trying to figure out whether the communications between whoever his intermediary to WikiLeaks was got picked up discussing his outreach and if so in what granularity. He’s trying to figure out what kind of evidence Mueller has to indict WikiLeaks (which Stone would surely use, as he already has, to make a First Amendment defense of WikiLeaks’ role in the operation). And he’s trying to figure out whether Mueller has the good to name him as a co-conspirator, a move that might or might not go through WikiLeaks alone (though not exclusively — as I note, he discusses analytics with Guccifer 2.0 at a time when GRU was actively stealing the Democrats’ analytics).

In any case, Stone likely already has some of this information; it’s likely that the various conspiracies he’s at risk for being charged with were on his search warrant.

Don’t get me wrong. I’m pretty interested in why these cases are deemed related and (just as an example) the GRU indictment was not deemed related to George Papadopoulos’ case, which was still pending at the time of the indictment (the answer is probably that none of the Papadopoulos investigation implicated WikiLeaks directly).

But once the government claimed there were common search warrants, plural, used in both these cases, it became really easy to make sense of why: WikiLeaks, the Guccifer Twitter account, and Stone’s own warrants would be common to both of the indictments.

Roger Stone was, thus far, just charged with false statements. But it’s clear the government is still entertaining other charges against him and others. So Stone is using this related designation as a way to fish for how close any further charges might be.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Fun with Dr. Corsi’s “Forensics”!

By far the most ridiculous part of Jerome Corsi’s book is where he spends an entire chapter pretending that he figured out on his own that WikiLeaks had John Podesta’s emails rather than being told that by someone whose identity he’s trying to avoid sharing with Mueller’s team.

The chapter is one of three in the book that he presents as having been written in real time, effectively as diary entries. Corsi presents it as the fevered narrative he writes on November 18, 2018, at a time when Mueller’s team was cracking down on him for his continued lies but before he refused the plea deal, after a night of nightmares.

Last night, I was plagued by nightmares that caused me to sleep very poorly.

His change in voice is followed with an even more direct address to readers, which he returns to as an interjection in the middle of his crazed explanation.

I am going to write this chapter to explain to you, the reader, how I used my basic intuitive skills as a reporter to figure out in August 2016 that Assange had Podesta’s emails, that Assange planned to start making the Podesta file public in October 2016, and that Assange would release the emails in a serial, day-by-day fashion, right up to election day.

[snip]

Now, I know this is tedious and will tax many readers, so I’ve decided here to take a break. You have to understand what I am going through is a roller-coaster. Sometimes I feel like everything is normal and that the federal government will understand that I am a reporter and should be protected by the First Amendment. Then, I realize that the next ring of the doorbell could be the FBI seeking to handcuff me and arrest me in full view of my family.

Resuming after a much-needed break, we need only a few more dates to complete the analysis.

The chapter consists of three things, none of which even remotely presents a case for how he could have concluded WikiLeaks was sitting on John Podesta’s emails:

  • An argument that claims he simply reasoned it all out, without proof
  • A chronology that makes no sense given the July and August 2016 emails he’s trying to explain away
  • Other crap theories designed to undermine Mueller’s argument about Russian involvement, most of which post-date the date when Corsi claims to have figured out the Podesta emails were coming

Corsi’s “argument”

Corsi’s main argument is this:

Clearly, I reasoned there had to have been Podesta emails on that server that would have discussed the Clinton/DNC plot to deny Bernie Sanders the Democratic Party presidential nomination in 2016. Where were these Podesta emails, I wondered?

[snip]

I felt certain that if Assange had Podesta’s emails he would wait to drop them in October 2016, capturing the chance to stage the 2016 “October Surprise,” a term that had been in vogue in U.S. presidential politics since 1980 when Jimmy Carter lost re-election to Ronald Reagan, largely because the Reagan camp finessed Ayatollah Khomeini to postpone the release of the hostages from the American embassy in Tehran until after that year’s November election. I also figured that Assange would release the Podesta emails in drip-drip fashion, serially, over a number of days, stretching right up to the Election Day. In presidential politics, the news cycle speeds up, such that what might take a month or a week to play out in a normal news cycle might take only a day or two in the heightened intensity of a presidential news cycle—especially a presidential news cycle in October, right at Election Day is nearing.

In spite of his claims, elsewhere, to have done forensic analysis that told him John Podesta’s emails were coming, ultimately his argument boils down to this: he figured out that Podesta’s emails (which he purportedly hadn’t read) would be the most damning possible thing and therefore WikiLeaks must have and intend to release them in a serial release because it made sense.

Corsi’s chronology

From there, Corsi proceeds to spin out the following bullshit about how he came to that conclusion:

  • Starting in February 2016, a woman named LH whose ex-husband was a former top NSA figure told him [why?] incorrect things about how the Democrats organize their servers. This information seems to be inflected by the flap over VAN space the previous December, but Corsi doesn’t mention that. This information is wrong in many of the ways later skeptics of the Russian hack would be wrong, but Corsi claims he had that wrong understanding well in advance of the crowd.
  • When Assange announced on June 12 that he had upcoming Hillary leaks, Corsi was “alerted to the possibility Assange had obtained emails from the DNC email server,” which he took to mean VAN.
  • When the WaPo reported on the DNC hack on June 14, 2016, Corsi took Democrats’ (false) reassurances about financial data to be true, matched it to his incorrect claimed understanding of how the Democrats organized their data, and assumed VAN had been hacked (this is the day before Guccifer 2.0 would claim he got in through VAN, remember). Corsi also claims to have noted from the WaPo story that Perkins Coie and Crowdstrike were involved, the latter of which he tied to Google’s Eric Schmidt (who was helping Dems on tech), which together he used to suggest that in real time he believed the Democrats had “manufactured” evidence to pin the hack on the Russians. Again, Corsi is suggesting he got to the conspiracy theories it took the rest of Republicans a year to get to, but in real time.
  • Corsi incorrectly read the Crowdstrike white paper (on which the WaPo story was obviously based and which Ellen Nakashima had had for about a week, and which includes an update written in response to the appearance of Guccifer 2.0) as a response to Guccifer 2.0’s post on June 15 and — in spite of the WaPo report that Cozy Bear had been “monitoring DNC’s email and chat communications” — concluded that the hackers had not taken email.
  • After the DNC emails were released, Corsi had what he claims was his big insight: that these emails largely came from DNC’s Comms Director and their finance staffers, which meant Podesta’s (and DWS’, which he logically should but did not, pursue) had to be what was left. Mind you, the former point is something WikiLeaks made clear on its website:

On July 22, 2016, Wikileaks began releasing over two days a total of 44,053 emails and17,761 email attachments from key figures in the DNC. What I noticed immediately was that the largest number of emails by far came from DNC Communications Director Luis Miranda (10,520 emails), who had approximately three-times the emails released for the next highest on the list, National Finance Director Jordon Kaplan (3,799 emails) and Finance Chief of Staff Scott Corner (3,095 emails). What I noticed immediately was that emails from Debbie Wasserman Schultz and John Podesta were missing. Yet, by analyzing the addresses in the emails, it was clear the “From,” “To,” and or “CC” listings indicate the email was sent by or to an addressee using the DNC email server, identified as @dnc.org.

  • In his narrative of how he “figured out” there must be Podesta emails, he relies not on the July 25 NBC story he cites earlier in his book, quoting Assange saying there was “no proof” the emails came from Russia (and suggesting his set were a different one than the ones analyzed by cybersecurity experts), but a CNN story he dates to July 26 but which got updated early morning July 27, citing Assange saying, “Perhaps one day the source or sources will step forward and that might be an interesting moment some people may have egg on their faces. But to exclude certain actors is to make it easier to find out who our sources are;” Corsi also cites a July 27 NYMag story citing the CNN one. Corsi claims that as he was listening to this interview, he realized that Assange had Podesta emails “lifted from the DNC server,” which would be incorrect even if it were true, given that Podesta’s emails were from his Gmail account.

Listening to this interview on CNN, all the pieces fit in place for me. Assange had Podesta emails that were also lifted from the DNC server and these were the emails he was holding to drop later in the campaign.

  • Corsi describes “the last piece of the puzzle” to be Seth Rich’s death on July 10, 2016, but which occurred before Assange’s post DNC release interviews, in one of which Assange suggested his sources were still alive to “step forward,” then points to Assange’s offer of a reward for information leading to a conviction on August 9. This happened after he had already suggested to Stone that Podesta’s emails were coming.

None of this explains how Corsi would not have decided that Clinton Foundation emails were what was missing, which is what Stone believed when he instructed Corsi to reach out to Ted Malloch on July 25, the day before the Assange interviews Corsi says led him to conclude WikiLeaks instead had Podesta’s emails. And much of it assumes that a unified hack occurred (otherwise it would be impossible to decide what was coming from what had already been released), an assumption he claims not to believe in much of the rest of his crap.

Corsi’s crap

In addition to that chronology, though, Corsi throws in a bunch of crap meant to discredit the evidence laid out in the Mueller GRU indictment. Much of this evidence post-dates the moment he claims he figured out that WikiLeaks had Podesta’s emails, which makes it irrelevant to his theory, nevertheless Corsi throws it out there.

  • Corsi takes the Guccifer 2.0 leak of DCCC files to Aaron Nevins — which didn’t happen until over a month after he told Stone that WikiLeaks had Podesta emails — to be “proof” not just that Guccifer 2.0 only hacked DNC files, which he again asserts incorrectly came from VAN, but also that Guccifer 2.0 had not hacked emails.
  • Corsi claims that Guccifer 2.0 “never bragged that he hacked the DNC email server that contained the Podesta emails,” even though Guccifer 2.0 did brag that WikiLeaks had published documents he gave them after the DNC leak.
  • Corsi claims that Guccifer 2.0 published donor lists and voter analysis at DCLeaks, which is generally inaccurate (indeed, some Podesta files came out via DCLeaks!), but also admits a tie between Guccifer 2.0 and DCLeaks that would either rely on contemporary reporting that asserted a tie, the GRU indictment, or some personal knowledge not otherwise explained.
  • Corsi claims that, unlike Marcel Lazar, “Guccifer 2.0 has never been positively identified let alone arrested,” without explaining how he’s sure that the 12 GRU officers Mueller indicted don’t amount to positively identifying the people running Guccifer 2.0. Indeed, rather than addressing that indictment, Corsi instead tries to rebut the Intelligence Community Assessment’s “high confidence” attribution of Guccifer 2.0 to GRU, which he claims relies on ‘tradecraft’ that relies on circumstantial evidence at best, presuming a hacker leaves a signature.” In the ICA, that discussion appears in a section that also notes that “Some analytic judgments are based directly on collected information,” as the Mueller indictment makes clear the GRU one was.
  • Corsi claims the Vault 7 release suggesting the CIA has a tool to falsely attribute its own hacks “undermined” the IC’s attribution of Cozy Bear and Fancy Bear, without realizing that’s a different issue from whether the CIA, NSA, and FBI can correctly attribute the hack (though if the Russians obtained those files in the weeks after Joshua Schulte allegedly stole them in 2016, it would have made it harder for CIA to chase down the Russians).
  • Corsi initially argues, providing no evidence except that he’s sure the DNC emails come from the DNC email server and not NGP-VAN or Hillary’s private server, that, “While the DNC email server could have been hacked by an outside agent, what is equally plausible is that the emails could have been stolen by someone on the inside of the DNC, perhaps an employee with their own @dnc.org email address.” He then feeds the Seth Rich conspiracy.
  • Corsi uses what he claims to have learned about serialization in a college course covering Dickens (but details of which, regarding the history of Dickens’ serialization, he gets entirely wrong) to explain how he knew the Podesta emails would come out in a serialized release.
  • Corsi dismisses the possibility the Russians used a cut-out with this garble:

The attempt to distinguish is disingenuous, suggesting the Russians may have been responsible for the hack, turning the information to a third party, not the Russians or a state actor, who handed WikiLeaks the emails and thus became “the source.”

  • Corsi cites the Nation’s August 9, 2017 version of the Bill Binney theory purportedly proving that a set of files purporting to be from the DNC — which were never released by WikiLeaks — were copied inside the US and also noting that the Russian metadata in the first Guccifer 2.0 documents was placed there intentionally. As I noted at the time, the two theories actually don’t — at all — disprove the claim that Russia hacked the DNC. But they’re even worse for Corsi’s claims, because (even though the set of files were called NGP/VAN) they undermine his false claim about the Democrats’ servers and they acknowledge that the files he said disproved that Guccifer 2.0 had Podesta files actually were Podesta files.

These things are utterly irrelevant to the soundness of Corsi’s own claim to have been able to guess that the Podesta emails were coming and — as I note — a number of them sharply contradict what he claims to believe.

Corsi’s mistaken notion of his role in proving “collusion”

But the crap does serve Corsi’s larger point, which is to undermine what he imagines Mueller’s theory of “collusion” to be.

Mueller & Company had decided the Trump campaign somehow encouraged Russia to steal the DNC emails and give them to Assange, so WikiLeaks could publish them. Then to establish “Russian collusion” with the Trump campaign, Mueller was out to connect his own dots. The Mueller prosecutors had been charged with the mission to grill me until

I would “give up” my source to Assange. I was their critical “missing link.” If Rhee, Zelinsky, and Goldstein only got me to confess, Mueller figured he could connect the dots from Roger Stone to me to Assange, and from Assange back again to me, and from me to Roger Stone, who would feed the information to Steve Bannon, then chairing the Trump campaign.

The final dots, the Mueller prosecutors assumed, would connect Bannon to Trump and the “Russian collusion” chain of communication would be complete. The only problem was that I did not have a source connecting me to Assange, so Mueller’s chain-link narrative does not connect.

While I actually think it possible that Corsi’s shenanigans may have harmed the neatness of Mueller’s case against Stone, perhaps even leading Mueller to charge Stone only with the obstruction charges rather than in a larger conspiracy, it doesn’t affect the understanding with which Mueller seems to be approaching the Don Jr side of any conspiracy, in which Trump’s son accepted a meeting offering dirt, thinking the family might make $300 million off it, and promised policy considerations that — even before he was sworn into office — his father took steps to pay off.

That conspiracy remains, even if Mueller can’t show that at the same time, Trump was maximizing the advantage of the WikiLeaks releases via his old political advisor Roger Stone.

But who knows? Perhaps Mueller may one day prove that, too?

One other thing that’s worth noting, however: As I laid out above, Corsi doesn’t just attempt to explain how he came to guess that WikiLeaks would release John Podesta’s emails. In the guise of doing that, he lays out what amounts to the Greatest Hits of the Denialist Conspiracies, throwing every possible claim mobilized to undermine the conclusion that Russia hacked the Democrats out there, even the ones that undermine Corsi’s own claimed beliefs.

And, as Corsi himself notes, Mueller has Corsi’s Google searches.

Truthfully, I was astounded because it seemed as if the FBI had studied me down to knowing the key strokes that I had used on my computer to do Google searches for articles. I realized my Google file would have much information about my locations and my Internet searches, but the way Zelinsky drilled down on how I wrote this article was shocking.

Repeatedly Zelinsky had warned me that I had no idea how truly extensive the Special Counselor’s investigation had been. Now, I imagined an army of FBI computer specialists at Quantico mapping out my every electronic communication in 2016, including my emails, my cellphone calls, and my use of the laptop and the Internet to conduct my research and write my various articles and memos.

They actually know whether he read this stuff (notably, the NBC, CNN, and NYMag articles he cites from late July 2016) in real time or only after the fact. They know when Corsi downloaded a bunch of other things (including the Guccifer 2.0 releases), and they know whether he read the GRU indictment. The FBI has also likely obtained what he was doing in November, 2018, as he was writing this stuff.

So it may be that when Corsi’s book comes out in hard cover on March 12, Mueller’s team will  already have put together the forensic evidence to prove that Corsi’s claims about how he came by his own forensic analysis — and the rest of these conspiracies — are absolute bullshit. It is, admittedly, frightening how much the government can obtain about our contemporaneous thinking.

But it would be an ironic and just outcome for Corsi if Mueller’s best demonstration about the power of FBI’s forensic analysis comes not in the GRU indictment Corsi so studiously avoided mentioning in the entire book attempting to discredit it, but in proving Corsi’s own claims about forensics to be utterly false.

Corsi’s Timeline

March 16, 2016: WikiLeaks indexes FOIAed Hillary emails

June 12, 2016: Assange announces he has more information on Hillary

In that interview, Assange disclosed that WikiLeaks has “upcoming leaks in relation to Hillary Clinton,” though Assange distinguished the Hillary Clinton emails WikiLeaks possessed pending publication came from a different source than the emails from Hillary’s private email server. This alerted me to the possibility Assange had obtained emails from the DNC email server.

June 14, 2016: WaPo announces the DNC hack

June 15, 2016: Crowdstrike publicly releases white paper on DNC hack and Guccifer 2.0 first posts

July 10, 2016: Seth Rich’s murder

July 22, 2016: WikiLeaks releases the DNC emails

July 25, 2016: Stone emails Corsi asking him to Get to Assange to “get the pending WikiLeaks emails;” Corsi forwards the email to Ted Malloch

July 26, 2016: Assange tells CNN a lot more material is coming and refuses to exclude Russia as a source because “to exclude certain actors is to make it easier to find out who our sources are”

July 28, 2016: Corsi and his wife leave for Italy

July 31, 2016: Stone emails Corsi to “call me MON” instructing him to get Malloch to see Assange

August 2, 2016: Corsi emails Stone,

Word is friend in embassy plans 2 more dumps. One shortly after I’m back. 2nd in Oct. Impact planned to be very damaging.… Time to let more than Podesta to be exposed as in bed w enemy if they are not ready to drop HRC. That appears to be the game hackers are now about. Would not hurt to start suggesting HRC old, memory bad, has stroke — neither he nor she well. I expect that much of next dump focus, setting stage for Foundation debacle.

August 9, 2016: WikiLeaks offers $20,000 reward for information leading to conviction for murder of Seth Rich

August 12, 2016: Corsi returns from Italy

March 7, 2017: WikiLeaks starts to release Vault 7 documents, including an Umbrage file showing that CIA uses disinformation to hide which attacks it launches

May 25, 2017: WSJ reports on Aaron Nevins files that Guccifer 2.0 noted in real time; Corsi deems this (in a Murdoch paper) to be part of the anti-Stone narrative

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Jerome Corsi’s Theory of Roger the Rat-Fucker’s Mule Prosecution

I did something rash recently. I bought Jerome Corsi’s book, Silent No More.

It’s a … remarkable work of autobiographical fiction. It has two unbelievable chapters — one on how he met Stone and one claiming to describe how he figured out WikiLeaks had John Podesta’s emails; I’ll deal with the former in this post, and do a follow-up on the latter.

The rest of the book is a narrative of Corsi’s botched cooperation that is fairly clearly designed to provide all the details of his interactions with Mueller’s team to others, without, however, even clarifying details about events that should be central to the story.

Corsi continues to hide details of his Strip House trip with Stone

One of those missing details is what date Corsi introduced Stone to Ted Malloch over dinner at the Strip House in NYC. After that dinner, Stone had Corsi email two requests to Malloch, one of which is the email that appears in Corsi’s botched plea:

a. On or about July 25, 2016, Person 1 sent an email to CORSI with the subject line, “Get to [the founder of Organization 1].” The body of the message read: “Get to [the founder of Organization 1] [a]t Ecuadorian Embassy in London and get the pending [Organization 1] emails . . . they deal with Foundation, allegedly.” On or about the same day, CORSI forwarded Person 1’s email to the overseas individual.

b. On or about July 31, 2016, Person 1 emailed CORSI with the subject line, “Call me MON.” The body of the email read in part that the overseas individual “should see [the founder of Organization 1].”

c. On or about August 2, 2016, CORSI responded to Person 1 by email. CORSI wrote that he was currently in Europe and planned to return in mid-August. CORSI stated: “Word is friend in embassy plans 2 more dumps. One shortly after I’m back. 2nd in Oct. Impact planned to be very damaging.… Time to let more than [the Clinton Campaign chairman] to be exposed as in bed w enemy if they are not ready to drop HRC [Hillary Rodham Clinton]. That appears to be the game hackers

A second request from Stone — which Corsi says was sent August 16 — Corsi describes as being limited to Bernie Sanders’ brother, but at least one other description I’ve heard about may also include a reference to WikiLeaks.

Here’s the context of Corsi’s two references to that dinner and his description of the August 16 email:

After meeting Roger Stone in February 2016, I arranged a dinner in New York City with Roger and Ted Malloch, a strong supporter of Donald Trump, for the next time both were in New York City at the same time. Malloch was anxious to assist the Trump campaign and he hoped Malloch [sic] could arrange to have him appointed to Trump’s presidential advisory staff—a hope that never materialized.

[snip]

On Tuesday, August 16, 2016, I sent Ted Malloch an email in the U.K., asking Ted if he could find Bernie Sanders’ brother who was in the U.K. at that time. My email to Malloch continued: “He (Bernie Sanders brother) is on the record of saying he plans to vote for Trump. Roger Stone suggested you might track down Sanders’ brother.” This was the third request Stone made of Malloch. At the dinner in New York City when I introduced Roger to Ted, Roger asked Ted to research Bill Clinton’s time as a Rhodes Scholar at Oxford. Roger believed Bill Clinton had been dismissed from the program because Clinton had raped a female graduate student at Oxford. Then, on July 25, 2016, I passed Roger’s email onto Ted, asking Ted to go see Assange in London. Ted waned [sic] an advisory position with the Trump campaign and Stone believed Malloch could improve his chances by scoring on one of these three requests. To the best of my recollection, Ted never said anything to me to suggest he had succeeded on any of the three requests.

One published version of the dinner puts it in late February or March, almost immediately after Corsi met Stone.

Corsi told the Guardian he introduced Malloch to Stone over steaks at the Strip House in midtown Manhattan in late February or March 2016. Mueller’s investigators “wanted to know about the dinner”, he said. When asked if Assange was discussed during the meal, Corsi said he was not a “human tape recorder”.

I think the actual date of the meeting is later, but if that date is right — given the possibility that WikiLeaks came up at the meeting — it would have Stone pursuing information about what WikiLeaks had around the same time as (possibly even before) the Russians first hacked John Podesta on March 19.

Update: One other detail of Corsi’s suppression of details about Malloch. In the book, he describes the only time he met with Trump during the campaign.

During the campaign, I only recall seeing Trump once up close, and that was as Trump was entering the elevator at Trump Tower. On that occasion, Trump jokingly pointed at me and said, “That’s trouble there.” The last time I recall having a telephone conversation with Trump was in 2011.

Elsewhere, however, he made it clear that that exchange happened with Malloch.

Corsi said he spoke to Trump only once during the 2016 presidential campaign. It happened when he brought London-based conservative author Ted Malloch to Trump Tower to show him the campaign headquarters and possibly meet Trump. Corsi said Malloch was interested in potentially doing policy work for the campaign.

Shortly after Corsi and Malloch entered the lobby, Trump happened to be getting into the elevator, Corsi said.

“We said hello. Trump points to me and he points to Malloch and he says, ‘There’s trouble there,'” Corsi said. “And he laughs, we laugh, and that’s the only time I spoke to Donald Trump [during the campaign].”

Corsi never explains what crime he stopped short of committing with Stone

The book is also entirely inconsistent with the fact that before Corsi first lied to Mueller’s prosecutors, his lawyer, David Gray, suggested that Corsi had had the opportunity to engage in, but stopped short of, committing some crime.

Gray said he was confident that Corsi has done nothing wrong. “Jerry Corsi made decisions that he would not take actions that would give him criminal liability,” he added, declining to elaborate.

Asked if Corsi had opportunities to take such actions, Gray said, “I wouldn’t say he was offered those opportunities. I would say he had communications with Roger Stone. We’ll supply those communications and be cooperative. My client didn’t act further that would give rise to any criminal liability.”

As I note here, Gray’s pre-interview comments make it really hard for Corsi to claim faulty memory.

Corsi emphasizes Stone’s ongoing, yet deniable, role in Trump’s campaign

I raise those two details as background to what Corsi lays out in the chapter called, Meet Roger Stone. It describes:

  • Meeting Stone for the first time on February 22, 2016
  • Claiming that Stone’s campaign role as an “outside adviser” was intentionally designed to give Trump plausible deniability regarding Stone’s “various maneuvers”
  • Learning that — at least in February 2016 — Stone spoke to Trump every day and got him to adopt about 70% of his suggestions
  • Giving Stone the credit for getting Paul Manafort hired

And then it goes into a theory of Stone’s crime, real or imagined, I’m not sure which.

Corsi avoids the GRU indictment like the plague but nevertheless suggests Stone could be the mule

Mind you, I’m not sure if this is Corsi’s theory about what Stone actually did or what he thinks Mueller thinks Stone did (the theory is somewhat inconsistent with what Corsi suggests Mueller thinks Stone did as presented later in the book, which is more focused on Julian Assange). In part, it addresses what he seems to think Democrats suspect about Stone.

Democratic opponents of Trump raised the question that if Roger Stone had known in advance that Assange was holding the Podesta emails, as evidenced by his tweet on August 21, was it possible Stone had colluded with the Russians and with WikiLeaks? Had all this happened by accident or were the WikiLeaks DNC email drops just Roger Stone’s crowning achievement in a career distinguished by dirty tricks. Put simply: Did Roger Stone coordinate with Russia to steal the DNC emails and give them to WikiLeaks, having having arranged with Assange in advance a strategy to use the hacked DNC emails to prevent Hillary from achieving the White House?

But it ends by suggesting that when he was first subpoenaed, he “suspected immediately” that he was a key link in a theory that (bizarrely) had Stone serving as a mule between Guccifer 2.0 and WikiLeaks (it’s worth noting that Corsi claims to believe, erroneously, that the Podesta emails came from a DNC server, in which case the reference could be about the Podesta emails).

On August 28, 2018, when I was served the subpoena from the Mueller grand jury, I suspected immediately the prosecutors in the Special Counsel office were in possession of evidence that suggested I might have been the link between Stone and Assange. As David Gray and I prepared to go to Washington, we speculated Mueller may have targeted me as the link who provided Stone his advance knowledge in August 2016 that Assange possessed DNC emails from John Podesta that WikiLeaks planned to release serially over a number of days as the 2016 “October Surprise,” designed to deal a knock-out punch to the Clinton campaign. If I was Stone’s link to Assange, was this the connection with WikiLeaks that Stone used to get WikiLeaks the Guccifer 2.0 hacks of the DNC computers?

The theory relies on a really weird timeline of the relevant events, which I’ve reproduced below. Several things stick out about the timeline. First, Corsi dates WikiLeaks’ indexing of Hillary’s FOIAed emails as part of WikiLeaks’ election year activities (something he continues later in the book). That’s interesting because of Cambridge Analytica’s related efforts in that early period (not to mention the funding of an attack on Hillary as being close to Russia), as well as the way a WikiLeaks’ request for Hillary’s speech transcripts precedes the John Podesta hack. If Corsi knows that that indexing was part of a larger campaign (and as I’ll show in the follow-up post, he does know stuff about WikiLeaks he should not), then it suggests that he knows that WikiLeaks knew the hacks were coming.

The timeline is also weird for the way it jumps over all the exchanges between Stone and Corsi in the aftermath of the DNC email release, details that are absolutely central to the rest of the narrative in the book.

It’s oddest, however, in the way this chapter makes no mention of the initial Guccifer 2.0 posts, even though in his chapter purporting to explain how he knew Podesta’s emails were coming, Corsi admits to having tracked those releases very closely (and links two of the posts). Just as notably, Corsi’s narrative only mentions Mueller’s GRU indictment indirectly (an odd habit he continues in his Podesta explanation), instead relying on the 2018 coverage of the indictment for his claims about what’s in it. Even there, however, Corsi doesn’t link the coverage (not even Fox!) where Stone admitted he’s the person cited in the GRU indictment. This leads Corsi to treat the mention of Stone in the GRU indictment to be merely “suspect” rather than confirmed.

Clearly, Stone’s tweets with Guccifer 2.0 target him as a likely suspect for that person, especially given that Stone remained in regular contact with Trump even after Stone resigned as Trump’s political advisor.

Perhaps both those choices are just attempts to avoid acknowledging familiarity with the evidence that would utterly disprove his later whack theories about the Podesta emails (which go well beyond the Podesta emails). But it seems to adopt a very indirect method to avoid admitting that, yes, Stone was DMing with  Guccifer 2.0, but that nothing in the public record suggests those DMs were criminal in any way.

Let me be clear: There’s nothing in the public record that suggests Stone had a role in getting any files from the Russians to WikiLeaks (though I considered the possibility Guccifer 2.0 was a source for the men here). But the handoff of the Podesta emails is part of the operation that remains unexplained. And even while Corsi goes to great lengths to spin up this theory of Stone’s prosecution, he (a guy who puts his PhD in his Twitter handle) studiously avoids the primary sources that make this case.

Timeline

February 22, 2016: Stone and Corsi first meet

March 16, 2016: First WikiLeaks drop (in reality, indexing of documents obtained via FOIA)

July 13, 2016: Guccifer 2.0, a hacker who previously claimed to have breached the computers of the DNC, released a cache of purported DNC documents to The Hill

July 14, 2016: Guccifer 2.0 sends WikiLeaks link to archive of DNC documents [Corsi botches this section badly, in part by getting the year of the GRU indictment wrong]

July 22, 2016: DNC release “Julian Assange timed the release of the DNC emails to be the Friday before the DNC National Nominating Convention”

July 24, 2016: DWS resigns

July 24, 2016: Robby Mook announces Russia hacked emails “for the purpose of helping Donald Trump”

July 25, 2016: Assange tells NBC “there is no proof whatsoever” he got emails from Russia

August 21, 2016: Stone tweets “Podesta’s time in the barrel”

October 7, 2016: WikiLeaks starts dumping Podesta files

November 7, 2016: “final WikiLeaks post … dropped by WikiLeaks on November 7, 2016, three days after the presidential election was held.”

March 10, 2017: Stone post Corsi relies on to describes his DMs with Guccifer 2.0

July 13, 2018: WaPo story on Stone and the GRU indictment

July 15, 2018: NYT story on GRU indictment

August 28, 2018: Corsi subpoena

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Things Not Said in Roger Stone’s Indictment: “Trump Directed” and Other More Damning Details

I’m a leading purveyor of the theory that Robert Mueller is producing his mythical “report” via one after another speaking indictments. That said, it has always been true that some of the most interesting parts of his indictments involved what didn’t get said. That’s especially true in today’s Roger Stone indictment. Before I explain what didn’t get said, let me review what got said. The indictment shows that Stone was asked to figure out what emails on Hillary Julian Assange had, and using at least Jerome Corsi and Randy Credico as go-betweens, Stone did so, providing information (most explicitly) to Trump campaign manager Steve Bannon. When Congress asked Stone about all this, he lied, first hiding any of his go-betweens, and then seemingly using Randy Credico to hide Jerome Corsi. Mueller provides a lot of the communications between Stone and his go-betweens and the communications from October 2016, as well as some of the ones from the cover-up period.

But he doesn’t provide us everything.

I have argued that the early morning raid, not to mention the larding on of charges, suggest this is an effort to get Stone to flip, both against Jerome Corsi (which is why Meuller locked in testimony from Corsi’s stepson yesterday) and Trump himself.

With that in mind, here are the things that Mueller doesn’t say.

With whom — besides Campaign Manager Steve Bannon — at the Trump Campaign did Roger Stone speak

The word “campaign” shows up 52 times in Stone’s indictment, of which (by my count) 7 are generic references, 16 are to Hillary’s campaign or a descriptor for John Podesta, and 29 are to Trump’s campaign or associates of it. The indictment describes Stone’s discussions with people on the campaign over and over. While a number of those are to identified individuals — most notably Steve Bannon — a number of those are generic, including the following references.

During the summer of 2016, STONE spoke to senior Trump Campaign officials about Organization 1 and information it might have had that would be damaging to the Clinton Campaign. STONE was contacted by senior Trump Campaign officials to inquire about future releases by Organization 1.

[snip]

STONE also continued to communicate with members of the Trump Campaign about Organization 1 and its intended future releases.

[snip]

By in or around June and July 2016, STONE informed senior Trump Campaign officials that he had information indicating Organization 1 had documents whose release would be damaging to the Clinton Campaign.

[snip]

STONE thereafter told the Trump Campaign about potential future releases of damaging material by Organization 1.

It does so in an indictment that alleges (correctly, obviously) that one of Stone’s lies to the House Intelligence Committee that was material was whom he was speaking with on the campaign. The description of that lie cites the October 4 Bannon communication and the “supporter.” But it still leaves who else he spoke with unstated.

STONE’s False and Misleading Testimony About Communications with the Trump Campaign

35. During his HPSCI testimony, STONE was asked, “did you discuss your conversations with the intermediary with anyone involved in the Trump campaign?” STONE falsely and misleadingly answered, “I did not.” In truth and in fact, and as described above, STONE spoke to multiple individuals involved in the Trump Campaign about what he claimed to have learned from his intermediary to Organization 1, including the following:

a. On multiple occasions, STONE told senior Trump Campaign officials about materials possessed by Organization 1 and the timing of future releases.

And, of course, there’s this reference, which uses the word “directed” exactly a week after BuzzFeed got pilloried for using it about Trump.

After the July 22, 2016 release of stolen DNC emails by Organization 1, a senior Trump Campaign official was directed to contact STONE about any additional releases and what other damaging information Organization 1 had regarding the Clinton Campaign.

Mind you, this indictment had to have been approved in advance by Big Dick Toilet Salesman Matt Whitaker, and the last time he permitted prosecutors to name Individual-1 in an indictment, he got chewed out for it.

So maybe Mueller is not saying who else on the Trump campaign Stone was talking to (though we know he had frequent calls with Trump all through the campaign) to hide what else he knows. Maybe the Big Dick Toilet Salesman wouldn’t let Mueller lay this out (though I doubt that’s the case). Or maybe Mueller is just trying to avoid a second week in a row featuring headlines about what Trump “directed” his associates to do as part of the Russian conspiracy.

Corsi’s (and possibly Credico’s) role in the conspiracy

As I noted above, Mueller got aggressive with Stone to get him to flip on others. Obviously, the big prize is Trump. But there’s space for Stone to take his revenge on Jerome Corsi (and possibly even Randy Credico).

I suspect that Credico is not in any danger here. That said, he is described as a potential co-conspirator, Person 2, and did clearly discuss a conspiracy to obstruct HPSCI’s investigation. “‘Stonewall it. Plead the fifth. Anything to save the plan’ . . . Richard Nixon,” Stone wrote as he tried to persuade Credico not to testify to HPSCI.

There’s just one detail that makes me wonder if Credico was not fully truthful with Mueller. When Credico discussed Stone’s September request that he ask Assange about emails pertaining to Hillary’s efforts to undermine a Libyan peace effort with WSJ last year, he denied he had sent the request to either Assange or his lawyer Margaret Kunstler.

“Please ask Assange for any State or HRC e-mail from August 10 to August 30–particularly on August 20, 2011,” Mr. Stone wrote to Randy Credico, a New York radio personality who had interviewed Mr. Assange several weeks earlier. Mr. Stone, a longtime confidant of Donald Trump, had no formal role in his campaign at the time.

Mr. Credico initially responded to Mr. Stone that what he was requesting would be on WikiLeaks’ website if it existed, according to an email reviewed by the Journal. Mr. Stone, the emails show, replied: “Why do we assume WikiLeaks has released everything they have ???”

In another email, Mr. Credico then asked Mr. Stone to give him a “little bit of time,” saying he thought Mr. Assange might appear on his radio show the next day. A few hours later, Mr. Credico wrote: “That batch probably coming out in the next drop…I can’t ask them favors every other day .I asked one of his lawyers…they have major legal headaches riggt now..relax.”

Mr. Credico said in an interview with the Journal that he never passed the message on to Mr. Assange or his lawyers, but “got tired” of Mr. Stone “bothering” him, and so told Mr. Stone he had passed along the message.

The indictment says he in fact did forward the request to Kunstler.

On or about September 20, 2016, Person 2 forwarded the request to a friend who was an attorney with the ability to contact the head of Organization 1. Person 2 blind-copied STONE on the forwarded email.

That said, the indictment clearly remains silent about a lot of the details Mueller has incriminating Corsi in a cover-up (who, remember, prosecutors threatened to charge in a conspiracy to suborn perjury with respect to Stone’s testimony, and whose stepson Mueller locked into testimony before this indictment). The indictment includes this reference to a November discussion between Stone and Corsi.

On or about November 30, 2017, STONE asked Person 1 to write publicly about Person 2. Person 1 responded, “Are you sure you want to make something out of this now? Why not wait to see what [Person 2] does. You may be defending yourself too much—raising new questions that will fuel new inquiries. This may be a time to say less, not more.” STONE responded by telling Person 1 that Person 2 “will take the 5th—but let’s hold a day.”

But it remains silent on the report that Stone asked Corsi to write in August 2016 to establish a cover story, and it remains silent on whether Stone paid Corsi hush payments to stay silent after that.

Farage and Malloch and any other go-betweens

The indictment names Ted Malloch, though not as a co-conspirator.

On or about the same day, Person 1 forwarded STONE’s email to an associate who lived in the United Kingdom and was a supporter of the Trump Campaign.

[snip]

The body of the email read in part that Person 1’s associate in the United Kingdom “should see [the head of Organization 1].”

It doesn’t, however, put the Malloch references into context.

For example, it doesn’t reveal that — around the time someone “was directed” to get Stone to find out what WikiLeaks had — Stone and Alex Jones met with Nigel Farage at the RNC, which ultimately led to Farage joining Trump at a campaign event.

One night during the convention, Farage was introduced to Trump’s longtime adviser, the infamous political trickster, Roger Stone, at an Italian restaurant in The Flats district of Cleveland, according to both men.

Stone, who was accompanied that night by the Internet radio host and conspiracy theorist Alex Jones, said Farage’s main goal appeared to be to get a meeting with Trump.

The next day, Stone said, he tried to help by calling his former business partner, Paul Manafort – then Trump’s campaign chairman – and suggested that the Republican nominee get together with Farage. Manafort’s response was something along the lines of, “I’ll put a good word in,” Stone recalled.

Then, Stone met Ted Malloch — with Corsi — for dinner in NYC.

Asked about the nature of his relationship with Malloch, Stone said he did not know the other man well. He initially said he met Malloch three times but later said he recalled only two meetings with him.

Stone’s and Malloch’s first meeting was at a New York restaurant, Strip House, during the 2016 campaign. The two men dined with Jerome Corsi, a far-right political commentator and conspiracy theorist, Stone said.

Stone said his conversation with Malloch and Corsi at dinner was friendly but not memorable, and that they discussed “Brexit and globalism.” He added that they never discussed WikiLeaks, Assange, or Russia.

Stone, at least, is very sketchy about the timing of this, though it may actually precede when Stone asks Corsi to reach out to Malloch (indeed, might be the very reason he thought Corsi could get to Assange via Malloch).

That led to Farage’s campaign appearance with Trump on August 23.

Note, too, that the Stone indictment actually doesn’t say that Corsi is the go-between that Stone was hiding when he instead claimed Credico was his link to Assange. Indeed, of that go-between, he says he had only phone contact (though as I’ll write in a follow-up, that may have been for other reasons).

Particularly given Stone’s move to begin setting up a cover-story in August 2016, I’m not yet convinced we know who Stone’s real go-between is (and I’m still fairly certain that he and possibly Corsi had actual Podesta emails by then). He could have been working with Malloch directly. Or it could be someone else entirely.

Whoever it is, nothing in the Stone indictment tells us that for sure.

The Assange pardon

The Stone indictment is also silent about something that they have evidence — in the form of texts between Credico and Stone, surely among other things — that Stone tried to get Assange a pardon early last year.

In early January, Roger Stone, the longtime Republican operative and adviser to Donald Trump, sent a text message to an associate stating that he was actively seeking a presidential pardon for WikiLeaks founder Julian Assange—and felt optimistic about his chances. “I am working with others to get JA a blanket pardon,” Stone wrote, in a January 6 exchange of text messages obtained by Mother Jones. “It’s very real and very possible. Don’t fuck it up.” Thirty-five minutes later, Stone added, “Something very big about to go down.”

The recipient of the messages was Randy Credico, a New York-based comedian and left-leaning political activist whom Stone has identified as his back channel to WikiLeaks during the 2016 campaign—a claim Credico strongly denies. During the election, Stone, a political provocateur who got his start working for Richard Nixon’s presidential campaign, made statements that suggested he had knowledge of WikiLeaks’ plans to publish emails stolen from Hillary Clinton’s campaign chairman, John Podesta, and other Democrats, and his interactions with WikiLeaks have become an intense focus of special counsel Robert Mueller’s ongoing investigation into Russian election interference. As Mueller’s team zeroes in on Stone, they have examined his push for an Assange pardon—which could be seen as an attempt to interfere with the Russia probe—and have questioned at least one of Stone’s associates about the effort.

Particularly given that any pardon would have had to involve the one guy in the United States who can pardon Assange, it seems relevant to Mueller’s investigation. And yet it doesn’t show up in this indictment.

That’s something, then, that Stone could walk Mueller through as an effort to get rid of the 20-year witness tampering charge he faces.

Russia

Finally, the indictment remains mostly silent about Russia, particularly Roger Stone’s 180-turn on August 1 to claim that Russia may not have been behind the hack of the DNC. That’s all the more interesting given the way the indictment lays out the attribution to Russia made in mid-June.

On or about June 14, 2016, the DNC—through Company 1—publicly announced that it had been hacked by Russian government actors.

And then included Stone’s denial that Russia had hacked the DNC in his statement before HPSCI.

“These hearings are largely based on a yet unproven allegation that the Russian state is responsible for the hacking of the DNC and [the Clinton Campaign chairman] and the transfer of that information to [Organization 1].”

The indictment makes these two nods to attribution even as (as a number of people have observed) in their motion to seal Stone’s indictment, prosecutors deemed Stone’s indictment to be related to the GRU indictment, and his docket includes one of the DC AUSAs also on the Internet Research Agency case, Jonathan Kravis. (I’ve updated my running docket of Mueller and potentially related cases here.)

Remember, the GRU indictment describes (but doesn’t charge) Stone’s communications with Guccifer 2.0.

On or about August 15, 2016, the Conspirators, posing as Guccifer 2.0, wrote to a person who wasin regular contact with senior members of the presidential campaign of Donald J. Trump, “thank u for writing back . . . do u find anyt[h]ing interesting in the docs i posted?” On or about August 17, 2016, the Conspirators added, “please tell me if i can help u anyhow . . . it would be a great pleasure to me.” On or about September 9, 2016, the Conspirators, again posing as Guccifer 2.0, referred to a stolen DCCC document posted online and asked the person, “what do u think of the info on the turnout model for the democrats entire presidential campaign.” The person responded, “[p]retty standard.”

So prosecutors are saying that Stone’s crimes are more closely related to the actual Russian hack (which, remember, continued into September, after Stone deemed the DCCC analytics Guccifer 2.0 released to be “standard”) than they are to Flynn or Manafort or Papadopoulos or anyone else’s indictments.

Mind you, WikiLeaks appears as an unindicted co-conspirator in both the Stone and the GRU indictments, which may explain the connection.

But for some reason, Mueller thinks it important to note in Stone’s indictment that he pretended to believe Russia didn’t hack the DNC long after the hack had been attributed, without ever once mentioning that he had also spoken with the GRU persona dumping files.

Update: I’ve taken out the reference to Sam Nunberg, who says he’s not the person listed in this indictment.

Update: I’ve corrected this to reflect it was Jerome Corsi’s stepson who appeared before the grand jury Thursday. h/t AK

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Someone Has Already Been Charged for Most of the Actions the Steele Dossier Attributes to Michael Cohen

Because of a McClatchy story claiming two new details corroborating a Steele dossier claim that Michael Cohen had a meeting with people serving the interests of Putin’s Administration, people have gotten themselves into a tizzy again about what a smoking gun it would be if the allegations in the Steele dossier were proven true.

It’s an utterly bizarre tizzy, both because the allegations in the Steele dossier not only don’t match some more damning allegations Cohen has already pled guilty to, but because Mueller has already charged other people for some of the allegations about Cohen made in the dossier. In other words, the McClatchy story has people excited about the wrong allegations, rather than focusing on the damning things Cohen (and others) have already been charged with.

Indeed, most functional allegations made in the Steele dossier have already been publicly explained in either court filings or sworn testimony. That doesn’t rule out that Cohen had a role in some of them, however. Indeed, one detail from Cohen’s SDNY plea — that among the things Trump Organization reimbursed Cohen for in January 2017 was a $50,000 payment to a tech services company — actually could confirm a detail made in the dossier. But generally, Mueller and other entities have already explained away many of the allegations made against Cohen in the dossier.

I’ve put the substantive claims the Steele dossier made about Cohen below. I’ll take each and show public reporting that explains who did something attributed to Cohen in the dossier.

Cohen met with Russian Presidential Administration Legal Department officials

The central allegation involving Cohen is that he met with people from Putin’s Presidential Administration’s legal department or, in a later version, someone acting on their behalf.

By the time that allegedly happened in August or maybe September, however, Cohen had already established a paper trail with someone more central than some anonymous lawyers. Cohen’s Mueller plea describes Cohen receiving an email on January 20, 2016 from Dmitry Peskov’s personal assistant and shortly thereafter calling her. Somehow Mueller knows that the assistant “asked detailed questions and took notes.” The day after Cohen spoke with the personal assistant, someone from Putin’s office called Felix Sater.

Given that Cohen made reservations to travel to St. Petersburg (for a possible meeting directly with Putin) on June 9, then canceled those reservations on June 14 (after Russia’s role in the DNC hack was made public), those communications about a Trump Tower deal surely tie to the hack-and-leak operation.

It’s certainly possible that, later in the summer (or in the fall, during Cohen’s known trips to London), Cohen would attempt to reschedule that meeting, though the purpose was originally and probably would remain more central to a quid pro quo trading a Trump Tower and election assistance for sanctions relief and policy considerations. But having already exchanged easily collectable communications directly with Peskov’s office (whom the dossier calls “the main protagonist” in the operation), it’s not clear how helpful using Rossotrudnichestvo would be to hide the Trump role. Furthermore, there are other known cut-outs for related matters, including Steele dossier source Sergei Millian and the Agalrovs.

Cohen aimed to contain the Paul Manafort scandal

The three Cohen reports in October all claim that Cohen got involved to tamp down scandals connecting Trump to Russia. That’s not, at all, far-fetched. After all, Cohen was Trump’s fixer and he told a bunch of lies to Congress in an effort to hide Trump’s Moscow Project.

That said, a filing explaining why Mueller might have to mention the Trump campaign in Manafort’s aborted DC trial and a filing in Alex Van der Zwaan’s prosecution show that Manafort and Rick Gates themselves — with the direct involvement of Oleg Deripaska associate Konstantin Kilimnik — worked to contain this scandal.

As Mueller laid out in numerous ways, the Manafort-Gates-Kilimnik team went on a crime spree in the fall trying to cover up their past activities with Russian-backed oligarchs.

Indeed, that a claim that Cohen managed this pushback (and its timing) appeared in the dossier is particularly tantalizing for two reasons. First, one of the things Manafort reportedly lied about after agreeing to cooperate with Mueller pertained a boat trip he took with Tom Barrack; Mueller seems to know that Kilimnik joined the two men. If that happened, then it would show that someone did indeed hold a meeting in August to contain the damage of Manafort’s burgeoning scandals, but that meeting would have been between a key Trump funder, Manafort himself, and someone suspected of ongoing ties with GRU, the agency that conducted the DNC hack.

More intriguing still, as I noted above, Kilimnik was Manafort’s go-between with Oleg Deripaska. That’s interesting because in 2016, Christopher Steele was attempting to convince DOJ’s Bruce Ohr that Deripaska could be a useful source on Russian organized crime. If Steele thought Deripaska would be a useful source for DOJ, he may well have been relying on Deripaska himself. If so, the report that Cohen (who in fact did have communications with Peskov!) was containing the damage of Manafort’s ties to Russian oligarchs might be an attempt to distract from the way that a Russian oligarch was actually working through his handler, Kilimnik, to minimize that damage himself.

Cohen aimed to contain the Carter Page scandal

It likewise seems unlikely that Cohen was the one to try to contain the Carter Page scandal. While he shouldn’t be relied on for anything, several claims in Page’s testimony to HPSCI provide an alternate explanation about who was containing the scandal tied to him.

Page denied ever speaking to Cohen.

But he did describe Keith Kellogg discussing the allegations with him. And he did describe Steve Bannon, both by himself and with the assistance of Trump’s election lawfirm, Jones Day, trying to minimize the Page scandal.

That’s consistent with a number of on-the-record claims from the campaign in the days following Page’s resignation in September. Which is to say, minimizing the Page scandal fell to the campaign itself.

The people who carried out the information operation had been paid by Russia and Trump

The three initial reports on Cohen came, in suspiciously quick succession, in October, after the number of reporters briefed on the Steele dossier started to expand.

The one other report implicating Cohen was the December 13 report, based on intelligence Steele claimed he obtained for “free.”

The report is most notable for the legal battle it caused. The allegations most clearly resemble what Adrian Chen had identified and attributed to the Internet Research Agency year earlier and there had been extensive reporting on it all through the campaign. But instead of blaming Internet Research Agency, the report blames all that on Webzilla. And Webzilla’s owner, Aleksei Gubarev was sufficiently comfortable facing the prospect of discovery to sue BuzzFeed right away (though he lost his lawsuit a few weeks back).

There’s another reference in the report to a long debunked claim made by the Russians — that a Romanian hacker was involved, presumably an allusion to Guccifer 2.0’s half-hearted claim to be Romanian.

Still, much of that last report instead presented the most inflammatory claim in the entire dossier: that Trump’s campaign had helped pay for the information operation targeting Hillary.

On its face, that claim makes zero sense. The scenario as a whole assumes that the hack was done by independent hackers coerced to work for the FSB — perhaps people like Yevgeniy Nikulin, who had already been arrested in Prague by this point. As far as Mueller has shown publicly, however, the information operation was instead done by two entities: Russians in the employ of Putin crony Yevgeniy Prigozhin’s Internet Research Agency and officers in the employ of Russia’s military intelligence agency, GRU. In indictments of both conspirators, Mueller provided details about how the money was handled.

So we’ve already got explanations for how the information operation was funded: by Prigozhin and the Russian state, using a range of money laundering techniques to hide Russia’s role. We even have evidence that — contrary to the claim about information warriors’ loyalty to Sergei Ivanov — Prighozhin’s employees even sucked up to him in one of their dry runs getting Americans to perform IRL actions.

Cohen arranged deniable cash payments to hackers working in Europe against the Clinton campaign

As noted, the December report involving Cohen made the most incendiary claim of all: that the Trump organization planned to pay for some of the hackers that targeted Hillary.

In spite of the fact that Mueller has already explained how the two main groups of participants in the information operation got funded, this allegation gets more interesting given details laid out in Cohen’s SDNY plea. Several of his SDNY crimes, after all, involving making deniable payments, in that case to Stormy Daniels and Karen McDougal.

That shows Cohen’s modus operandi for paying off Trump’s illicit debts. Mind you, it shows that he didn’t use cash. He laundered the funds using more sophisticated money laundering. But it does show that Cohen was the guy who did that kind of thing.

Which makes this detail included — but not explained — in the same plea document intriguing.

Cohen paid some tech company $50,000 in connection with the campaign.

That’s not a whole lot of money, in any case. And if it went to pay off part of the information operation, it would have to have involved some part of the operation not yet publicly identified. Even the one known instance of Trump supporters reaching out to hackers in Europe — Peter Smith’s reported consultation of Weev — is known to have been paid for by other means (in that case, Smith’s own fundraising).

Still, it’s certainly possible that that $50,000 went to some still unidentified entity that played a role in the information operation that, for some reason, didn’t get paid for by Putin’s cronies or the Russian state.

As I disclosed in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post.


18 October

Speaking separately to the same compatriot in mid-October 2016, a Kremlin insider with direct access to the leadership confirmed that a key role in the secret TRUMP campaign/Kremlin was being played by the Republican candidates personal lawyer Michael COHEN. [redacted line]

19 October

1. Speaking in confidence to a longstanding compatriot friend in mid-October 2016, a Kremlin insider highlighted the importance of Republican presidential candidate Donald TRUMP’s lawyer, Michael COHEN, in the ongoing secret liaison relationship between the New York tycoon’s campaign and the Russian leadership. COHEN’s role had grown following the departure of Paul MANNAFORT as campaign manager in August 2016. Prior to that MANNAFORT had led for the TRUMP side.

2. According to the Kremlin insider, COHEN now was heavily engaged in a cover up and damage limitation operation in the attempt to prevent the full details of relationship with Russia being exposed. In pursuit of this aim, COHEN had met secretly with several Russian Presidential Administration (PA) Legal Department officials in an EU country in August 2016. The immediate issues had been to contain further scandals involving MANNAFORT’s commercial and political role in Russia/Ukraine and to limit the damage arising from exposure of former TRUMP foreign policy advisor, Carter PAGE’s secret meetings with Russian leadership figures in Moscow the previous month. The overall objective had been to “to sweep it all under the carpet and make sure no connections could be fully established or proven”

3. Things had become even “hotter” since August on the TRUMP-Russia track. According to the Kremlin insider, this had meant that direct contact between the TRUMP team and Russia had been farmed out by the Kremlin to trusted agents of influence working in pro-government policy institutes like that of Law and Comparative Jurisprudence. COHEN however continued to lead for the TRUMP team.

[snip]

The Kremlin insider was unsure of the identities of the PA officials with whom COHEN met secretly in August, or the exact date/s and locations of the meeting/s. There were significant internal security barriers being erected in the PA as the TRUMP issue became more controversial and damaging. However s/he continued to try to obtain these.

20 October

1. Speaking to a compatriot and friend on 19 October 2016, a Kremlin insider provided further details of reported clandestine meeting/s between Republican presidential candidate, Donald lawyer Michael COHEN and Kremlin representatives in August 2016. Although the communication between them had to be cryptic for security reasons, the Kremlin insider clearly indicated to his/her friend that the reported contact/s took place in Prague, Czech Republic.

2. Continuing on this theme, the Kremlin insider highlighted the importance of the Russian parastatal organisation, Rossotrudnichestvo, in this contact between TRUMP campaign representative/3 and Kremlin officials. Rossotrudnichestvo was being used as cover for this relationship and its office in Prague may well have been used to host the COHEN Russian Presidential Administration (PA) meeting/s. It was considered a “plausibly deniable” vehicle for this, whilst remaining entirely under Kremlin control.

3. The Kremlin insider went on to identify leading pro-PUTIN Duma figure, Konstantin KOSACHEV (Head of the Foreign Relations Committee) as an important figure in the TRUMP campaign-Kremlin liaison operation. KOSACHEV, also “plausibly deniable” being part of the Russian legislature rather than executive, had facilitated the contact in Prague and by implication, may have attended the meeting/s with COHEN there in August.

Company Comment

We reported previously, in our Company Intelligence Report 2016/135 of 19 October 2016 from the same source, that COHEN met officials from the PA Legal Department clandestinely in an EU country in August 2016. This was in order to clean up the mess left behind by western media revelations of TRUMP ex-campaign manager corrupt relationship with the former pro-Russian YANUKOVYCH regime in Ukraine and TRUMP foreign policy advisor, Carter secret meetings in Moscow with senior regime figures in July 2016. According to the Kremlin advisor, these meeting/s were originally scheduled for COHEN in Moscow but shifted to what was considered an operationally “soft” EU country when it was judged too compromising for him to travel to the Russian capital.

13 December

1. We reported previously (2016/135 and /136) on secret meeting/s held in Prague, Czech Republic in August 2016 between then Republican presidential candidate Donald TRUMP’s representative, Michael COHEN and his interlocutors from the Kremlin working under cover of Russian ‘NGO’ Rossotrudnichestvo.

2. [two lines redacted] provided further details of these meeting/s and associated anti- CLINTON/Democratic Party operations. COHEN had been accompanied to Prague by 3 colleagues and the timing of the visit was either in the last week of August or the first week of September. One of their main Russian interlocutors was Oleg SOLODUKHIN operating under Rossotrudnichestvo cover. According to [redacted] the agenda comprised questions on how deniable cash payments were to be made to hackers who had worked in Europe under Kremlin direction against the CLINTON campaign and various contingencies for covering up these operations and Moscow’s secret liaison with the TRUMP team more generally.

3. [redacted] reported that over the period March-September 2016 a company called XBT/Webzilla and its affiliates had been using botnets and porn traffic to transmit viruses, plant bugs, steal data and conduct “altering operations” against the Democratic Party leadership. Entities linked to one Aleksei GUBAROV were involved and he and another hacking expert, both recruited under duress by the FSB, Seva KAPSUGOVICH, were significant players in this operation. In Prague, COHEN agreed contingency plans for various scenarios to protect the Operation, but in particular what was to be done in the event that Hillary CLINTON won the presidency. It was important in this event that all cash payments owed were made quickly and discreetly and that cyber and other operators were stood down/able to go effectively to ground to cover their traces. (We reported earlier that the involvement of political operatives Paul MANAFORT and Carter PAGE in the secret TRUMP-Kremlin liaison had been exposed in the media in the run-up to Prague and that damage limitation of these also was discussed by COHEN with the Kremlin representatives).

In terms of practical measures to be taken, it was agreed by the two sides in Prague to stand down various “Romanian hackers” (presumably based in their homeland or neighboring eastern Europe) and that other operatives should head for a bolt-hole in Plovdiv, Bulgaria where they should “lay low”. On payments, IVANOV’s associate said that the operatives involved had been paid by both TRUMP’s team and the Kremlin, though their orders and ultimately loyalty lay with IVANOV, as Head of the PA and thus ultimately responsible for the operation, and his designator successor/s after he was dismissed by president PUTIN in connection with the anti-CLINTON operation in mid August.

Information in Amended DNC Lawsuit Reveals that Roger Stone Is at Significantly Greater Risk for CFAA Indictment

Back in November, I wrote a post considering whether Roger Stone could be charged in a CFAA conspiracy. I noted that the last hack noted in the GRU indictment may have post-dated communications Stone had with Guccifer 2.0, in which Stone scoffed at the analytical information released as part of the DCCC hack. I pointed to this passage from the GRU indictment, showing that the GRU hack of the DNC analytics hosted on an AWS server may have post-dated those conversations between Guccifer 2.0 and Stone.

I’m writing a response to the Wikileaks defense against the DNC lawsuit for its involvements in the 2016 election attack, and so have only now gotten around to reading the amended complaint against Stone and others that the DNC filed in the wake of the GRU indictment. And it reveals that the AWS hack was far worse than described in the GRU indictment — and it continued well after that Stone conversation with Guccifer 2.0.

None of this long passage is footnoted in the complaint. It has to be based on the DNC’s own knowledge of the AWS hack.

On September 20, 2016, CrowdStrike’s monitoring service discovered that unauthorized users—later discovered to be GRU officers—had accessed the DNC’s cloud-computing service. The cloud-computing service housed test applications related to the DNC’s analytics. The DNC’s analytics are its most important, valuable, and highly confidential tools. While the DNC did not detect unauthorized access to its voter file, access to these test applications could have provided the GRU with the ability to see how the DNC was evaluating and processing data critical to its principal goal of winning elections. Forensic analysis showed that the unauthorized users had stolen the contents of these virtual servers by making exact duplicates (“snapshots”) of them and moving those snapshots to other accounts they owned on the same service. The GRU stole multiple snapshots of these virtual servers between September 5, 2016 and September 22, 2016. The U.S. government later concluded that this cyberattack had been executed by the GRU as part of its broader campaign to damage to the Democratic party.

In 2016, the DNC used Amazon Web Services (“AWS”), an Amazon-owned company that provides cloud computing space for businesses, as its “data warehouse” for storing and analyzing almost all of its data.

To store and analyze the data, the DNC used a software program called Vertica, which was run on the AWS servers. Vertica is a Hewlett Packard program, which the DNC licensed. The data stored on Vertica included voter contact information, such as the names, addresses, phone numbers, and email addresses of voters, and notes from the DNC’s prior contacts with these voters. The DNC also stored “digital information” on AWS servers. “Digital information” included data about the DNC’s online engagement, such as DNC email lists, the number of times internet users click on DNC advertisements (or “click rates”), and the number of times internet users click on links embedded in DNC emails (or “engagement rates”). The DNC also used AWS to store volunteer information—such as the list of people who have signed up for DNC-sponsored events and the number of people who attended those events.

Vertica was used to both store DNC data and organize the data so that DNC computer engineers could access it. To use the Vertica data, DNC employees could not simply type a plain-English question into the database. Instead, DNC engineers needed to write lines of computer code that instructed Vertica to search for and display a data set. The computer engineers’ coded requests for data are called “queries.”

When the DNC wanted to access and use the data it collected, the DNC described the information it wanted to retrieve, and DNC computer engineers designed and coded the appropriate “queries” to produce that data. These queries are secret, sensitive work product developed by the DNC for the purpose of retrieving specific cross-sections of information in order to develop political, financial, and voter engagement strategies and services. Many of these queries are used or intended for use in interstate commerce. The DNC derives value from these queries by virtue of their secrecy: if made public, these queries would reveal critical insights into the DNC’s political, financial, and voter engagement strategies. DNC computer engineers could save Vertica queries that they run repeatedly. In 2016, some of the DNC’s most frequently used Vertica queries—which revealed fundamental elements of the DNC’s political and financial strategies— were stored on the AWS servers.

When the DNC wanted to analyze its data to look for helpful patterns or trends, the DNC used another piece of software called Tableau. Tableau is commercial software not developed by DNC engineers. Instead, the DNC purchased a license for the Tableau software, and ran the software against Vertica.

Using Tableau, the DNC was able to develop graphs, maps, and other visual reports based on the data stored on Vertica. When the DNC wanted to visualize the data it collected, the DNC described the information it wanted to examine, and DNC computer engineers designed and coded the appropriate “Tableau queries” to produce that data in the form requested. These Tableau queries are secret, sensitive work product developed by the DNC for the purpose of transforming its raw data into useful visualizations. The DNC derives value from these queries by virtue of their secrecy: if made public, these queries would reveal critical insights into the DNC’s political, financial, and voter engagement strategies and services. Many of these queries are used or intended for use in interstate commerce.

DNC computer engineers could also save Tableau queries that they ran repeatedly. In 2016, some of the DNC’s most frequently used Tableau queries—which revealed fundamental elements of the DNC’s political and financial strategies—were stored on the AWS servers.

The DNC’s Vertica queries and Tableau Queries that allow DNC staff to analyze their data and measure their progress toward their strategic goals—collectively, the DNC’s “analytics,”—are its most important, valuable, and highly confidential tools. Because these tools were so essential, the DNC would often test them before they were used broadly.

The tests were conducted using “testing clusters”—designated portions of the AWS servers where the DNC tests new pieces of software, including new Tableau and Vertica Queries. To test a new query, a DNC engineer could use the query on a “synthetic” data set—mock-up data generated for the purpose of testing new software—or a small set of real data. For example, the DNC might test a Tableau query by applying the software to a set of information from a specific state or in a specific age range. Thus, the testing clusters housed sensitive, proprietary pieces of software under development. As described above, the DNC derives significant value from its proprietary software by virtue of its secrecy: if made public, it would reveal critical insights into the DNC’s political, financial, and voter engagement strategies and services, many of which are used or intended for use in interstate commerce.

The DNC protected all of the data and code in its AWS servers by, among other things, restricting access to authorized users. To gain access to the AWS servers themselves, an authorized user had to take multiple steps. First, the authorized user would have to log onto a Virtual Private Network (VPN) using a unique username and password. Second, once the user entered a valid and password, the system would send a unique six-digit code (PIN) to the authorized user’s phone, and the user would have 30 seconds to type it into the computer system. This two-step process is commonly known as “two-factor authentication.”

Authorized users would also employ a two-factor authentication system to access Tableau visualizations. First, they would log into a Google account with a unique username and password, and then they would enter a pin sent to their cell phones.

Finally, the DNC’s AWS servers were protected with firewalls and cybersecurity best practices, including: (a) limiting the IP addresses and ports with which users could access servers; (b) auditing user account activities; and (c) monitoring authentication and access attempts.

On September 20, 2016, CrowdStrike’s monitoring service discovered that unauthorized users had breached DNC AWS servers that contained testing clusters. Further forensic analysis showed that the unauthorized users had stolen the contents of these DNC AWS servers by taking snapshots of the virtual servers, and had moved those replicas to other AWS accounts they controlled. The GRU stole multiple snapshots of these servers between September 5, 2016 and September 22, 2016. The U.S. later concluded that this cyberattack had been executed by the GRU as part of its broader campaign to damage to the Democratic party. The GRU could have derived significant economic value from the theft of the DNC’s data by, among other possibilities, selling the data to the highest bidder.

The software would also be usable as executable code by DNC opponents, who could attempt to re-create DNC data visualizations or derive DNC strategy decisions by analyzing the tools the DNC uses to analyze its data. [my emphasis]

In other words, at least one of those snapshots was stolen after Stone suggested he would like better analytics data than what GRU had publicly released via HelloFL. So he can no longer say that his communications with Guccifer 2.0 preceded all the hacking. Which the nifty timeline Stone’s attorney submitted in conjunction with his motion to dismiss doesn’t account for at all.

Given Stone’s history of non-denial denials for crimes he commits, I’d say this stunted timeline doesn’t help him much.

Here’s Stone’s motion to dismiss. As with his nifty timeline, he does not address — at all — the communications between him and Guccifer 2.0 regarding analytics. It does, however, include this tagline.

He is the First Amendment running, not walking; but his conduct cannot be adjudged a civil wrong.

Past history says Stone’s rat-fuckery tends to be easily found in his swiss cheese denials, and I’d say this is one example.

Note that, a week after DNC submitted its amended complaint on October 4, WikiLeaks released a proprietary AWS document showing the locations of all AWS’s servers around the world — something that is not all that newsworthy, but something that would be incredibly valuable for those trying to compromise AWS. That was one of its only releases since the crackdown on Assange has intensified.

As I disclosed in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

The Theory of Prosecution You Love for Julian Assange May Look Different When Applied to Jason Leopold

The WaPo confirmed something Seamus Hughes disclosed last night: Sometime before August 22, EDVA had filed a sealed complaint (not indictment) against Julian Assange.

WikiLeaks founder Julian Assange has been charged under seal, prosecutors inadvertently revealed in a recently unsealed court filing — a development that could significantly advance the probe into Russian interference in the 2016 election and have major implications for those who publish government secrets.

The disclosure came in a filing in a case unrelated to Assange. Assistant U.S. Attorney Kellen S. Dwyer, urging a judge to keep the matter sealed, wrote that “due to the sophistication of the defendant and the publicity surrounding the case, no other procedure is likely to keep confidential the fact that Assange has been charged.” Later, Dwyer wrote the charges would “need to remain sealed until Assange is arrested.”

Dwyer is also assigned to the WikiLeaks case. People familiar with the matter said what Dwyer was disclosing was true, but unintentional.

The confirmation closely follows a WSJ story describing increased confidence that the US will succeed in extraditing Assange for trial.

The confirmation that Assange has been charged has set off a frenzy, both among Assange supporters who claim this proves their years of claims he was indicted back in 2011 and insisting that charging him now would amount to criminalizing journalism, and among so-called liberals attacking Assange lawyer Barry Pollack’s scolding of DOJ for breaking their own rules.

I’ve long been on record saying that I think most older theories of charging Assange would be very dangerous for journalism. More recently, though, I’ve noted that Assange’s actions with respect to Vault 7, which had original venue in EDVA where the Assange complaint was filed (accused leaker Joshua Schulte waived venue in his prosecution), go well beyond journalism. That said, I worry DOJ may have embraced a revised theory on Assange’s exposure that would have dire implications for other journalists, most urgently for Jason Leopold.

There are, roughly, four theories DOJ might use to charge Assange:

  • Receiving and publishing stolen information is illegal
  • Conspiring to release stolen information for maximal damage is illegal
  • Soliciting the theft of protected information is illegal
  • Using stolen weapons to extort the US government is illegal

Receiving and publishing stolen information is illegal

The first, theory is the one that Obama’s DOJ rejected, based on the recognition that it would expose NYT journalists to prosecution as well. I suspect the Trump Administration will have the same reservations with such a prosecution.

Conspiring to release stolen information for maximal damage is illegal

The second imagines that Assange would be charged for behavior noted in the GRU indictment — WikiLeaks’ solicitation, from someone using the persona of Guccifer 2.0, of material such that it would be maximally damaging to Hillary Clinton.

On or about June 22, 2016, Organization 1 sent a private message to Guccifer 2.0 to “[s]end any new material [stolen from the DNC] here for us to review and it will have a much higher impact than what you are doing.” On or about July 6, 2016, Organization 1 added, “if you have anything hillary related we want it in the next tweo [sic] days prefable [sic] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after.” The Conspirators responded, “ok . . . i see.” Organization 1 explained, “we think trump has only a 25% chance of winning against hillary . . . so conflict between bernie and hillary is interesting.”

After failed attempts to transfer the stolen documents starting in late June 2016, on or about July 14, 2016, the Conspirators, posing as Guccifer 2.0, sent Organization 1 an email with an attachment titled “wk dnc link1.txt.gpg.” The Conspirators explained to Organization 1 that the encrypted file contained instructions on how to access an online archive of stolen DNC documents. On or about July 18, 2016, Organization 1 confirmed it had “the 1Gb or so archive” and would make a release of the stolen documents “this week.”

Significantly, WikiLeaks (but not Roger Stone) was referred to in the way an unidicted co-conspirator normally is, not named, but described in such a way to make its identity clear.

This is a closer call. There is a Supreme Court precedent protecting journalists who publish stolen newsworthy information. But it’s one already being challenged in civil suits in ways that have elicited a lot of debate. Prosecuting a journalist for trying to do maximal damage actually would criminalize a great deal of political journalism, starting with but not limited to Fox. Note that when the founders wrote the First Amendment, the norm was political journalism, not the so-called objective journalism we have now, so they certainly didn’t expect press protections to be limited to those trying to be fair to both sides.

Such a charge may depend on the degree to which the government can prove foreknowledge of the larger agreement with the Russians to damage Hillary, as well as the illegal procurement of information after WikiLeaks expressed an interest in information damaging Hillary.

Mueller might have evidence to support this (though there’s also evidence that WikiLeaks refused to publish a number of things co-conspirators leaked to them, including but not limited to the DCCC documents). The point is, we don’t know what the fact pattern on such a prosecution would look like, and how it would distinguish the actions from protected politically engaged journalism.

Soliciting the theft of protected information is illegal

Then there’s the scenario that Emma Best just hit on yesterday: that DOJ would prosecute Assange for soliciting hacks of specific targets. Best points to Assange’s close coordination with hackers going back to at least 2011 (ironically, but in a legally meaningless way, with FBI’s mole Sabu).

This is, in my opinion, a possible way DOJ would charge Assange that would be very dangerous. I’m particularly worried because of the way the DOJ charged Natalie Mayflower Edwards for leaking Suspicious Activity Reports to Jason Leopold. Edwards was charged with two crimes: Unauthorized Disclosure of Suspicious Activity Reports and Conspiracy to Make Unauthorized Disclosures of Suspicious Activity Reports (using the same Conspiracy charge that Mueller has been focused on).

In addition to describing BuzzFeed stories relying on SARs that Edwards saved to a flash drive by October 18, 2017 and then January 8, 2018, it describes a (probably Signal) conversation from September 2018 where Leopold — described in the manner used to describe unindicted co-conspirators — directed Edwards to conduct certain searches for material that ended up in an October story on Prevezon, a story published the day before Edwards was charged.

As noted above, the October 2018 Article regarded, among other things, Prevezon and the Investment Company. As recently as September 2018, EDWARDS and Reporter-1 engaged in the following conversation, via the Encrypted Application, in relevant part:

EDWARDS: I am not getting any hits on [the CEO of the Investment Company] do you have any idea what the association is if I had more information i could search in different areas

Reporter-1: If not on his name it would be [the Investment Company]. That’s the only other one [The CEO] is associated with Prevezon Well not associated His company is [the Investment Company]

Based upon my training and experience, my participation in the investigation, and my conversations with other law enforcement agents familiar with the investigation, I believe that in the above conversation, EDWARDS was explaining that she had performed searches of FinCEN records relating to Prevezon, at Reporter-l’s request, in order to supply SAR information for the October 2018 Article.

Edwards still has not been indicted, two weeks after her arraignment. That suggests it’s possible the government is trying to persuade her to plead and testify against Leopold in that conspiracy, thereby waiving indictment. The argument, in that case, would be that Leopold went beyond accepting stolen protected information, to soliciting the theft of the information.

This is the model a lot of people are embracing for an Assange prosecution, and it’s something that a lot of journalists not named Jason Leopold also do (arguably, it’s similar but probably more active than what James Rosen got dubbed a co-conspirator in the Stephen Jin-Woo Kim case).

Charging Leopold in a bunch of leaks pertaining to Russian targets would be a nice way (for DOJ, not for journalism) to limit any claim that just Assange was being targeted under such a theory. Indeed, it would placate Trump and would endanger efforts to report on what Mueller and Congress have been doing. Furthermore, it would be consistent with the aggressive approach to journalists reflected in the prosecution of James Wolfe for a bunch of leaks pertaining to Carter Page, which involved subpoenaing years of Ali Watkins’ call records.

In short, pursuing Leopold for a conspiracy to leak charge would be consistent with — and for DOJ, tactically advantageous — the theory under which most people want Assange charged.

Using stolen weapons to extort the US government is illegal

Finally, there’s the fourth possibility, and one I think is highly likely: charging Assange for his serial efforts to extort a pardon from the US government by threatening to release the Vault 7 (and ultimately, a single Vault 8 live malware) files.

This post shows how, starting in January 2017, Assange (and Oleg Deripaska) representative Adam Waldman was reaching out to top DOJ officials trying to negotiate a deal and using the release of the Vault 7 documents as leverage.

This post shows how, the second time Assange tweeted Don Jr asking for an Ambassadorship, he included a threatening reference to Vault 8, WikiLeaks’ name for the actual malware stolen and leaked from CIA, the first file from which Assange had released days earlier.

[B]ack in November 2017, some outlets began to publish a bunch of previously undisclosed DMs between Don Jr and Wikileaks. Most attention focused on Wikileaks providing Don Jr access to an anti-Trump site during the election. But I was most interested in Julian Assange’s December 16, 2016 “offer” to be Australian Ambassador to the US — basically a request for payback for his help getting Trump elected.

Hi Don. Hope you’re doing well! In relation to Mr. Assange: Obama/Clinton placed pressure on Sweden, UK and Australia (his home country) to illicitly go after Mr. Assange. It would be real easy and helpful for your dad to suggest that Australia appoint Assange ambassador to DC “That’s a really smart tough guy and the most famous australian you have! ” or something similar. They won’t do it, but it will send the right signals to Australia, UK + Sweden to start following the law and stop bending it to ingratiate themselves with the Clintons. 12/16/16 12:38PM

In the wake of the releases, on November 14, 2017, Assange tweeted out a follow-up.

As I noted at the time, the offer included an implicit threat: by referencing “Vault 8,” the name Wikileaks had given to its sole release, on November 9, 2017 of an actual CIA exploit (as opposed to the documentation that Wikileaks had previously released), Assange was threatening to dump more hacking tools, as Shadow Brokers had done before it. Not long after, Ecuador gave Assange its first warning to stop meddling in other countries politics, explicitly pointing to his involvement in the Catalan referendum but also pointing to his tampering with other countries. That warning became an initial ban on visitors and Internet access in March of this year followed by a more formal one on May 10, 2018 that remains in place.

Notably, Ecuador may have warned Assange back then to stop releasing America’s malware from their Embassy; those warnings have laid the groundwork for the rigid gag rules recently imposed on Assange on risk of losing asylum.

Immediately after this exchange, accused Vault 7/8 leaker Joshua Schulte had some Tor accesses which led to him losing bail. They didn’t, however, lead BOP to take away his multiple devices (!?!?!). Which means that when they raided his jail cell on or around October 1, they found a bunch of devices and his activity from 13 email and social media accounts. Importantly, DOJ claims they also obtained video evidence of Schulte continuing his efforts to leak classified information.

The announcement of that raid, and the additional charges against Schulte, coincided with a period of increased silence from WikiLeaks, broken only by last night’s response to the confirmation Assange had been charged.

I think it possible and journalistically safe to go after Assange for releasing stolen weapons to extort a criminal pardon. But most of the other theories of prosecuting Assange would also pose real risks for other journalists that those rooting for an Assange prosecution appreciate and rely on.

As I disclosed in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post.