Posts

Fun with Dr. Corsi’s “Forensics”!

By far the most ridiculous part of Jerome Corsi’s book is where he spends an entire chapter pretending that he figured out on his own that WikiLeaks had John Podesta’s emails rather than being told that by someone whose identity he’s trying to avoid sharing with Mueller’s team.

The chapter is one of three in the book that he presents as having been written in real time, effectively as diary entries. Corsi presents it as the fevered narrative he writes on November 18, 2018, at a time when Mueller’s team was cracking down on him for his continued lies but before he refused the plea deal, after a night of nightmares.

Last night, I was plagued by nightmares that caused me to sleep very poorly.

His change in voice is followed with an even more direct address to readers, which he returns to as an interjection in the middle of his crazed explanation.

I am going to write this chapter to explain to you, the reader, how I used my basic intuitive skills as a reporter to figure out in August 2016 that Assange had Podesta’s emails, that Assange planned to start making the Podesta file public in October 2016, and that Assange would release the emails in a serial, day-by-day fashion, right up to election day.

[snip]

Now, I know this is tedious and will tax many readers, so I’ve decided here to take a break. You have to understand what I am going through is a roller-coaster. Sometimes I feel like everything is normal and that the federal government will understand that I am a reporter and should be protected by the First Amendment. Then, I realize that the next ring of the doorbell could be the FBI seeking to handcuff me and arrest me in full view of my family.

Resuming after a much-needed break, we need only a few more dates to complete the analysis.

The chapter consists of three things, none of which even remotely presents a case for how he could have concluded WikiLeaks was sitting on John Podesta’s emails:

  • An argument that claims he simply reasoned it all out, without proof
  • A chronology that makes no sense given the July and August 2016 emails he’s trying to explain away
  • Other crap theories designed to undermine Mueller’s argument about Russian involvement, most of which post-date the date when Corsi claims to have figured out the Podesta emails were coming

Corsi’s “argument”

Corsi’s main argument is this:

Clearly, I reasoned there had to have been Podesta emails on that server that would have discussed the Clinton/DNC plot to deny Bernie Sanders the Democratic Party presidential nomination in 2016. Where were these Podesta emails, I wondered?

[snip]

I felt certain that if Assange had Podesta’s emails he would wait to drop them in October 2016, capturing the chance to stage the 2016 “October Surprise,” a term that had been in vogue in U.S. presidential politics since 1980 when Jimmy Carter lost re-election to Ronald Reagan, largely because the Reagan camp finessed Ayatollah Khomeini to postpone the release of the hostages from the American embassy in Tehran until after that year’s November election. I also figured that Assange would release the Podesta emails in drip-drip fashion, serially, over a number of days, stretching right up to the Election Day. In presidential politics, the news cycle speeds up, such that what might take a month or a week to play out in a normal news cycle might take only a day or two in the heightened intensity of a presidential news cycle—especially a presidential news cycle in October, right at Election Day is nearing.

In spite of his claims, elsewhere, to have done forensic analysis that told him John Podesta’s emails were coming, ultimately his argument boils down to this: he figured out that Podesta’s emails (which he purportedly hadn’t read) would be the most damning possible thing and therefore WikiLeaks must have and intend to release them in a serial release because it made sense.

Corsi’s chronology

From there, Corsi proceeds to spin out the following bullshit about how he came to that conclusion:

  • Starting in February 2016, a woman named LH whose ex-husband was a former top NSA figure told him [why?] incorrect things about how the Democrats organize their servers. This information seems to be inflected by the flap over VAN space the previous December, but Corsi doesn’t mention that. This information is wrong in many of the ways later skeptics of the Russian hack would be wrong, but Corsi claims he had that wrong understanding well in advance of the crowd.
  • When Assange announced on June 12 that he had upcoming Hillary leaks, Corsi was “alerted to the possibility Assange had obtained emails from the DNC email server,” which he took to mean VAN.
  • When the WaPo reported on the DNC hack on June 14, 2016, Corsi took Democrats’ (false) reassurances about financial data to be true, matched it to his incorrect claimed understanding of how the Democrats organized their data, and assumed VAN had been hacked (this is the day before Guccifer 2.0 would claim he got in through VAN, remember). Corsi also claims to have noted from the WaPo story that Perkins Coie and Crowdstrike were involved, the latter of which he tied to Google’s Eric Schmidt (who was helping Dems on tech), which together he used to suggest that in real time he believed the Democrats had “manufactured” evidence to pin the hack on the Russians. Again, Corsi is suggesting he got to the conspiracy theories it took the rest of Republicans a year to get to, but in real time.
  • Corsi incorrectly read the Crowdstrike white paper (on which the WaPo story was obviously based and which Ellen Nakashima had had for about a week, and which includes an update written in response to the appearance of Guccifer 2.0) as a response to Guccifer 2.0’s post on June 15 and — in spite of the WaPo report that Cozy Bear had been “monitoring DNC’s email and chat communications” — concluded that the hackers had not taken email.
  • After the DNC emails were released, Corsi had what he claims was his big insight: that these emails largely came from DNC’s Comms Director and their finance staffers, which meant Podesta’s (and DWS’, which he logically should but did not, pursue) had to be what was left. Mind you, the former point is something WikiLeaks made clear on its website:

On July 22, 2016, Wikileaks began releasing over two days a total of 44,053 emails and17,761 email attachments from key figures in the DNC. What I noticed immediately was that the largest number of emails by far came from DNC Communications Director Luis Miranda (10,520 emails), who had approximately three-times the emails released for the next highest on the list, National Finance Director Jordon Kaplan (3,799 emails) and Finance Chief of Staff Scott Corner (3,095 emails). What I noticed immediately was that emails from Debbie Wasserman Schultz and John Podesta were missing. Yet, by analyzing the addresses in the emails, it was clear the “From,” “To,” and or “CC” listings indicate the email was sent by or to an addressee using the DNC email server, identified as @dnc.org.

  • In his narrative of how he “figured out” there must be Podesta emails, he relies not on the July 25 NBC story he cites earlier in his book, quoting Assange saying there was “no proof” the emails came from Russia (and suggesting his set were a different one than the ones analyzed by cybersecurity experts), but a CNN story he dates to July 26 but which got updated early morning July 27, citing Assange saying, “Perhaps one day the source or sources will step forward and that might be an interesting moment some people may have egg on their faces. But to exclude certain actors is to make it easier to find out who our sources are;” Corsi also cites a July 27 NYMag story citing the CNN one. Corsi claims that as he was listening to this interview, he realized that Assange had Podesta emails “lifted from the DNC server,” which would be incorrect even if it were true, given that Podesta’s emails were from his Gmail account.

Listening to this interview on CNN, all the pieces fit in place for me. Assange had Podesta emails that were also lifted from the DNC server and these were the emails he was holding to drop later in the campaign.

  • Corsi describes “the last piece of the puzzle” to be Seth Rich’s death on July 10, 2016, but which occurred before Assange’s post DNC release interviews, in one of which Assange suggested his sources were still alive to “step forward,” then points to Assange’s offer of a reward for information leading to a conviction on August 9. This happened after he had already suggested to Stone that Podesta’s emails were coming.

None of this explains how Corsi would not have decided that Clinton Foundation emails were what was missing, which is what Stone believed when he instructed Corsi to reach out to Ted Malloch on July 25, the day before the Assange interviews Corsi says led him to conclude WikiLeaks instead had Podesta’s emails. And much of it assumes that a unified hack occurred (otherwise it would be impossible to decide what was coming from what had already been released), an assumption he claims not to believe in much of the rest of his crap.

Corsi’s crap

In addition to that chronology, though, Corsi throws in a bunch of crap meant to discredit the evidence laid out in the Mueller GRU indictment. Much of this evidence post-dates the moment he claims he figured out that WikiLeaks had Podesta’s emails, which makes it irrelevant to his theory, nevertheless Corsi throws it out there.

  • Corsi takes the Guccifer 2.0 leak of DCCC files to Aaron Nevins — which didn’t happen until over a month after he told Stone that WikiLeaks had Podesta emails — to be “proof” not just that Guccifer 2.0 only hacked DNC files, which he again asserts incorrectly came from VAN, but also that Guccifer 2.0 had not hacked emails.
  • Corsi claims that Guccifer 2.0 “never bragged that he hacked the DNC email server that contained the Podesta emails,” even though Guccifer 2.0 did brag that WikiLeaks had published documents he gave them after the DNC leak.
  • Corsi claims that Guccifer 2.0 published donor lists and voter analysis at DCLeaks, which is generally inaccurate (indeed, some Podesta files came out via DCLeaks!), but also admits a tie between Guccifer 2.0 and DCLeaks that would either rely on contemporary reporting that asserted a tie, the GRU indictment, or some personal knowledge not otherwise explained.
  • Corsi claims that, unlike Marcel Lazar, “Guccifer 2.0 has never been positively identified let alone arrested,” without explaining how he’s sure that the 12 GRU officers Mueller indicted don’t amount to positively identifying the people running Guccifer 2.0. Indeed, rather than addressing that indictment, Corsi instead tries to rebut the Intelligence Community Assessment’s “high confidence” attribution of Guccifer 2.0 to GRU, which he claims relies on ‘tradecraft’ that relies on circumstantial evidence at best, presuming a hacker leaves a signature.” In the ICA, that discussion appears in a section that also notes that “Some analytic judgments are based directly on collected information,” as the Mueller indictment makes clear the GRU one was.
  • Corsi claims the Vault 7 release suggesting the CIA has a tool to falsely attribute its own hacks “undermined” the IC’s attribution of Cozy Bear and Fancy Bear, without realizing that’s a different issue from whether the CIA, NSA, and FBI can correctly attribute the hack (though if the Russians obtained those files in the weeks after Joshua Schulte allegedly stole them in 2016, it would have made it harder for CIA to chase down the Russians).
  • Corsi initially argues, providing no evidence except that he’s sure the DNC emails come from the DNC email server and not NGP-VAN or Hillary’s private server, that, “While the DNC email server could have been hacked by an outside agent, what is equally plausible is that the emails could have been stolen by someone on the inside of the DNC, perhaps an employee with their own @dnc.org email address.” He then feeds the Seth Rich conspiracy.
  • Corsi uses what he claims to have learned about serialization in a college course covering Dickens (but details of which, regarding the history of Dickens’ serialization, he gets entirely wrong) to explain how he knew the Podesta emails would come out in a serialized release.
  • Corsi dismisses the possibility the Russians used a cut-out with this garble:

The attempt to distinguish is disingenuous, suggesting the Russians may have been responsible for the hack, turning the information to a third party, not the Russians or a state actor, who handed WikiLeaks the emails and thus became “the source.”

  • Corsi cites the Nation’s August 9, 2017 version of the Bill Binney theory purportedly proving that a set of files purporting to be from the DNC — which were never released by WikiLeaks — were copied inside the US and also noting that the Russian metadata in the first Guccifer 2.0 documents was placed there intentionally. As I noted at the time, the two theories actually don’t — at all — disprove the claim that Russia hacked the DNC. But they’re even worse for Corsi’s claims, because (even though the set of files were called NGP/VAN) they undermine his false claim about the Democrats’ servers and they acknowledge that the files he said disproved that Guccifer 2.0 had Podesta files actually were Podesta files.

These things are utterly irrelevant to the soundness of Corsi’s own claim to have been able to guess that the Podesta emails were coming and — as I note — a number of them sharply contradict what he claims to believe.

Corsi’s mistaken notion of his role in proving “collusion”

But the crap does serve Corsi’s larger point, which is to undermine what he imagines Mueller’s theory of “collusion” to be.

Mueller & Company had decided the Trump campaign somehow encouraged Russia to steal the DNC emails and give them to Assange, so WikiLeaks could publish them. Then to establish “Russian collusion” with the Trump campaign, Mueller was out to connect his own dots. The Mueller prosecutors had been charged with the mission to grill me until

I would “give up” my source to Assange. I was their critical “missing link.” If Rhee, Zelinsky, and Goldstein only got me to confess, Mueller figured he could connect the dots from Roger Stone to me to Assange, and from Assange back again to me, and from me to Roger Stone, who would feed the information to Steve Bannon, then chairing the Trump campaign.

The final dots, the Mueller prosecutors assumed, would connect Bannon to Trump and the “Russian collusion” chain of communication would be complete. The only problem was that I did not have a source connecting me to Assange, so Mueller’s chain-link narrative does not connect.

While I actually think it possible that Corsi’s shenanigans may have harmed the neatness of Mueller’s case against Stone, perhaps even leading Mueller to charge Stone only with the obstruction charges rather than in a larger conspiracy, it doesn’t affect the understanding with which Mueller seems to be approaching the Don Jr side of any conspiracy, in which Trump’s son accepted a meeting offering dirt, thinking the family might make $300 million off it, and promised policy considerations that — even before he was sworn into office — his father took steps to pay off.

That conspiracy remains, even if Mueller can’t show that at the same time, Trump was maximizing the advantage of the WikiLeaks releases via his old political advisor Roger Stone.

But who knows? Perhaps Mueller may one day prove that, too?

One other thing that’s worth noting, however: As I laid out above, Corsi doesn’t just attempt to explain how he came to guess that WikiLeaks would release John Podesta’s emails. In the guise of doing that, he lays out what amounts to the Greatest Hits of the Denialist Conspiracies, throwing every possible claim mobilized to undermine the conclusion that Russia hacked the Democrats out there, even the ones that undermine Corsi’s own claimed beliefs.

And, as Corsi himself notes, Mueller has Corsi’s Google searches.

Truthfully, I was astounded because it seemed as if the FBI had studied me down to knowing the key strokes that I had used on my computer to do Google searches for articles. I realized my Google file would have much information about my locations and my Internet searches, but the way Zelinsky drilled down on how I wrote this article was shocking.

Repeatedly Zelinsky had warned me that I had no idea how truly extensive the Special Counselor’s investigation had been. Now, I imagined an army of FBI computer specialists at Quantico mapping out my every electronic communication in 2016, including my emails, my cellphone calls, and my use of the laptop and the Internet to conduct my research and write my various articles and memos.

They actually know whether he read this stuff (notably, the NBC, CNN, and NYMag articles he cites from late July 2016) in real time or only after the fact. They know when Corsi downloaded a bunch of other things (including the Guccifer 2.0 releases), and they know whether he read the GRU indictment. The FBI has also likely obtained what he was doing in November, 2018, as he was writing this stuff.

So it may be that when Corsi’s book comes out in hard cover on March 12, Mueller’s team will  already have put together the forensic evidence to prove that Corsi’s claims about how he came by his own forensic analysis — and the rest of these conspiracies — are absolute bullshit. It is, admittedly, frightening how much the government can obtain about our contemporaneous thinking.

But it would be an ironic and just outcome for Corsi if Mueller’s best demonstration about the power of FBI’s forensic analysis comes not in the GRU indictment Corsi so studiously avoided mentioning in the entire book attempting to discredit it, but in proving Corsi’s own claims about forensics to be utterly false.

Corsi’s Timeline

March 16, 2016: WikiLeaks indexes FOIAed Hillary emails

June 12, 2016: Assange announces he has more information on Hillary

In that interview, Assange disclosed that WikiLeaks has “upcoming leaks in relation to Hillary Clinton,” though Assange distinguished the Hillary Clinton emails WikiLeaks possessed pending publication came from a different source than the emails from Hillary’s private email server. This alerted me to the possibility Assange had obtained emails from the DNC email server.

June 14, 2016: WaPo announces the DNC hack

June 15, 2016: Crowdstrike publicly releases white paper on DNC hack and Guccifer 2.0 first posts

July 10, 2016: Seth Rich’s murder

July 22, 2016: WikiLeaks releases the DNC emails

July 25, 2016: Stone emails Corsi asking him to Get to Assange to “get the pending WikiLeaks emails;” Corsi forwards the email to Ted Malloch

July 26, 2016: Assange tells CNN a lot more material is coming and refuses to exclude Russia as a source because “to exclude certain actors is to make it easier to find out who our sources are”

July 28, 2016: Corsi and his wife leave for Italy

July 31, 2016: Stone emails Corsi to “call me MON” instructing him to get Malloch to see Assange

August 2, 2016: Corsi emails Stone,

Word is friend in embassy plans 2 more dumps. One shortly after I’m back. 2nd in Oct. Impact planned to be very damaging.… Time to let more than Podesta to be exposed as in bed w enemy if they are not ready to drop HRC. That appears to be the game hackers are now about. Would not hurt to start suggesting HRC old, memory bad, has stroke — neither he nor she well. I expect that much of next dump focus, setting stage for Foundation debacle.

August 9, 2016: WikiLeaks offers $20,000 reward for information leading to conviction for murder of Seth Rich

August 12, 2016: Corsi returns from Italy

March 7, 2017: WikiLeaks starts to release Vault 7 documents, including an Umbrage file showing that CIA uses disinformation to hide which attacks it launches

May 25, 2017: WSJ reports on Aaron Nevins files that Guccifer 2.0 noted in real time; Corsi deems this (in a Murdoch paper) to be part of the anti-Stone narrative

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Jerome Corsi’s Theory of Roger the Rat-Fucker’s Mule Prosecution

I did something rash recently. I bought Jerome Corsi’s book, Silent No More.

It’s a … remarkable work of autobiographical fiction. It has two unbelievable chapters — one on how he met Stone and one claiming to describe how he figured out WikiLeaks had John Podesta’s emails; I’ll deal with the former in this post, and do a follow-up on the latter.

The rest of the book is a narrative of Corsi’s botched cooperation that is fairly clearly designed to provide all the details of his interactions with Mueller’s team to others, without, however, even clarifying details about events that should be central to the story.

Corsi continues to hide details of his Strip House trip with Stone

One of those missing details is what date Corsi introduced Stone to Ted Malloch over dinner at the Strip House in NYC. After that dinner, Stone had Corsi email two requests to Malloch, one of which is the email that appears in Corsi’s botched plea:

a. On or about July 25, 2016, Person 1 sent an email to CORSI with the subject line, “Get to [the founder of Organization 1].” The body of the message read: “Get to [the founder of Organization 1] [a]t Ecuadorian Embassy in London and get the pending [Organization 1] emails . . . they deal with Foundation, allegedly.” On or about the same day, CORSI forwarded Person 1’s email to the overseas individual.

b. On or about July 31, 2016, Person 1 emailed CORSI with the subject line, “Call me MON.” The body of the email read in part that the overseas individual “should see [the founder of Organization 1].”

c. On or about August 2, 2016, CORSI responded to Person 1 by email. CORSI wrote that he was currently in Europe and planned to return in mid-August. CORSI stated: “Word is friend in embassy plans 2 more dumps. One shortly after I’m back. 2nd in Oct. Impact planned to be very damaging.… Time to let more than [the Clinton Campaign chairman] to be exposed as in bed w enemy if they are not ready to drop HRC [Hillary Rodham Clinton]. That appears to be the game hackers

A second request from Stone — which Corsi says was sent August 16 — Corsi describes as being limited to Bernie Sanders’ brother, but at least one other description I’ve heard about may also include a reference to WikiLeaks.

Here’s the context of Corsi’s two references to that dinner and his description of the August 16 email:

After meeting Roger Stone in February 2016, I arranged a dinner in New York City with Roger and Ted Malloch, a strong supporter of Donald Trump, for the next time both were in New York City at the same time. Malloch was anxious to assist the Trump campaign and he hoped Malloch [sic] could arrange to have him appointed to Trump’s presidential advisory staff—a hope that never materialized.

[snip]

On Tuesday, August 16, 2016, I sent Ted Malloch an email in the U.K., asking Ted if he could find Bernie Sanders’ brother who was in the U.K. at that time. My email to Malloch continued: “He (Bernie Sanders brother) is on the record of saying he plans to vote for Trump. Roger Stone suggested you might track down Sanders’ brother.” This was the third request Stone made of Malloch. At the dinner in New York City when I introduced Roger to Ted, Roger asked Ted to research Bill Clinton’s time as a Rhodes Scholar at Oxford. Roger believed Bill Clinton had been dismissed from the program because Clinton had raped a female graduate student at Oxford. Then, on July 25, 2016, I passed Roger’s email onto Ted, asking Ted to go see Assange in London. Ted waned [sic] an advisory position with the Trump campaign and Stone believed Malloch could improve his chances by scoring on one of these three requests. To the best of my recollection, Ted never said anything to me to suggest he had succeeded on any of the three requests.

One published version of the dinner puts it in late February or March, almost immediately after Corsi met Stone.

Corsi told the Guardian he introduced Malloch to Stone over steaks at the Strip House in midtown Manhattan in late February or March 2016. Mueller’s investigators “wanted to know about the dinner”, he said. When asked if Assange was discussed during the meal, Corsi said he was not a “human tape recorder”.

I think the actual date of the meeting is later, but if that date is right — given the possibility that WikiLeaks came up at the meeting — it would have Stone pursuing information about what WikiLeaks had around the same time as (possibly even before) the Russians first hacked John Podesta on March 19.

Update: One other detail of Corsi’s suppression of details about Malloch. In the book, he describes the only time he met with Trump during the campaign.

During the campaign, I only recall seeing Trump once up close, and that was as Trump was entering the elevator at Trump Tower. On that occasion, Trump jokingly pointed at me and said, “That’s trouble there.” The last time I recall having a telephone conversation with Trump was in 2011.

Elsewhere, however, he made it clear that that exchange happened with Malloch.

Corsi said he spoke to Trump only once during the 2016 presidential campaign. It happened when he brought London-based conservative author Ted Malloch to Trump Tower to show him the campaign headquarters and possibly meet Trump. Corsi said Malloch was interested in potentially doing policy work for the campaign.

Shortly after Corsi and Malloch entered the lobby, Trump happened to be getting into the elevator, Corsi said.

“We said hello. Trump points to me and he points to Malloch and he says, ‘There’s trouble there,'” Corsi said. “And he laughs, we laugh, and that’s the only time I spoke to Donald Trump [during the campaign].”

Corsi never explains what crime he stopped short of committing with Stone

The book is also entirely inconsistent with the fact that before Corsi first lied to Mueller’s prosecutors, his lawyer, David Gray, suggested that Corsi had had the opportunity to engage in, but stopped short of, committing some crime.

Gray said he was confident that Corsi has done nothing wrong. “Jerry Corsi made decisions that he would not take actions that would give him criminal liability,” he added, declining to elaborate.

Asked if Corsi had opportunities to take such actions, Gray said, “I wouldn’t say he was offered those opportunities. I would say he had communications with Roger Stone. We’ll supply those communications and be cooperative. My client didn’t act further that would give rise to any criminal liability.”

As I note here, Gray’s pre-interview comments make it really hard for Corsi to claim faulty memory.

Corsi emphasizes Stone’s ongoing, yet deniable, role in Trump’s campaign

I raise those two details as background to what Corsi lays out in the chapter called, Meet Roger Stone. It describes:

  • Meeting Stone for the first time on February 22, 2016
  • Claiming that Stone’s campaign role as an “outside adviser” was intentionally designed to give Trump plausible deniability regarding Stone’s “various maneuvers”
  • Learning that — at least in February 2016 — Stone spoke to Trump every day and got him to adopt about 70% of his suggestions
  • Giving Stone the credit for getting Paul Manafort hired

And then it goes into a theory of Stone’s crime, real or imagined, I’m not sure which.

Corsi avoids the GRU indictment like the plague but nevertheless suggests Stone could be the mule

Mind you, I’m not sure if this is Corsi’s theory about what Stone actually did or what he thinks Mueller thinks Stone did (the theory is somewhat inconsistent with what Corsi suggests Mueller thinks Stone did as presented later in the book, which is more focused on Julian Assange). In part, it addresses what he seems to think Democrats suspect about Stone.

Democratic opponents of Trump raised the question that if Roger Stone had known in advance that Assange was holding the Podesta emails, as evidenced by his tweet on August 21, was it possible Stone had colluded with the Russians and with WikiLeaks? Had all this happened by accident or were the WikiLeaks DNC email drops just Roger Stone’s crowning achievement in a career distinguished by dirty tricks. Put simply: Did Roger Stone coordinate with Russia to steal the DNC emails and give them to WikiLeaks, having having arranged with Assange in advance a strategy to use the hacked DNC emails to prevent Hillary from achieving the White House?

But it ends by suggesting that when he was first subpoenaed, he “suspected immediately” that he was a key link in a theory that (bizarrely) had Stone serving as a mule between Guccifer 2.0 and WikiLeaks (it’s worth noting that Corsi claims to believe, erroneously, that the Podesta emails came from a DNC server, in which case the reference could be about the Podesta emails).

On August 28, 2018, when I was served the subpoena from the Mueller grand jury, I suspected immediately the prosecutors in the Special Counsel office were in possession of evidence that suggested I might have been the link between Stone and Assange. As David Gray and I prepared to go to Washington, we speculated Mueller may have targeted me as the link who provided Stone his advance knowledge in August 2016 that Assange possessed DNC emails from John Podesta that WikiLeaks planned to release serially over a number of days as the 2016 “October Surprise,” designed to deal a knock-out punch to the Clinton campaign. If I was Stone’s link to Assange, was this the connection with WikiLeaks that Stone used to get WikiLeaks the Guccifer 2.0 hacks of the DNC computers?

The theory relies on a really weird timeline of the relevant events, which I’ve reproduced below. Several things stick out about the timeline. First, Corsi dates WikiLeaks’ indexing of Hillary’s FOIAed emails as part of WikiLeaks’ election year activities (something he continues later in the book). That’s interesting because of Cambridge Analytica’s related efforts in that early period (not to mention the funding of an attack on Hillary as being close to Russia), as well as the way a WikiLeaks’ request for Hillary’s speech transcripts precedes the John Podesta hack. If Corsi knows that that indexing was part of a larger campaign (and as I’ll show in the follow-up post, he does know stuff about WikiLeaks he should not), then it suggests that he knows that WikiLeaks knew the hacks were coming.

The timeline is also weird for the way it jumps over all the exchanges between Stone and Corsi in the aftermath of the DNC email release, details that are absolutely central to the rest of the narrative in the book.

It’s oddest, however, in the way this chapter makes no mention of the initial Guccifer 2.0 posts, even though in his chapter purporting to explain how he knew Podesta’s emails were coming, Corsi admits to having tracked those releases very closely (and links two of the posts). Just as notably, Corsi’s narrative only mentions Mueller’s GRU indictment indirectly (an odd habit he continues in his Podesta explanation), instead relying on the 2018 coverage of the indictment for his claims about what’s in it. Even there, however, Corsi doesn’t link the coverage (not even Fox!) where Stone admitted he’s the person cited in the GRU indictment. This leads Corsi to treat the mention of Stone in the GRU indictment to be merely “suspect” rather than confirmed.

Clearly, Stone’s tweets with Guccifer 2.0 target him as a likely suspect for that person, especially given that Stone remained in regular contact with Trump even after Stone resigned as Trump’s political advisor.

Perhaps both those choices are just attempts to avoid acknowledging familiarity with the evidence that would utterly disprove his later whack theories about the Podesta emails (which go well beyond the Podesta emails). But it seems to adopt a very indirect method to avoid admitting that, yes, Stone was DMing with  Guccifer 2.0, but that nothing in the public record suggests those DMs were criminal in any way.

Let me be clear: There’s nothing in the public record that suggests Stone had a role in getting any files from the Russians to WikiLeaks (though I considered the possibility Guccifer 2.0 was a source for the men here). But the handoff of the Podesta emails is part of the operation that remains unexplained. And even while Corsi goes to great lengths to spin up this theory of Stone’s prosecution, he (a guy who puts his PhD in his Twitter handle) studiously avoids the primary sources that make this case.

Timeline

February 22, 2016: Stone and Corsi first meet

March 16, 2016: First WikiLeaks drop (in reality, indexing of documents obtained via FOIA)

July 13, 2016: Guccifer 2.0, a hacker who previously claimed to have breached the computers of the DNC, released a cache of purported DNC documents to The Hill

July 14, 2016: Guccifer 2.0 sends WikiLeaks link to archive of DNC documents [Corsi botches this section badly, in part by getting the year of the GRU indictment wrong]

July 22, 2016: DNC release “Julian Assange timed the release of the DNC emails to be the Friday before the DNC National Nominating Convention”

July 24, 2016: DWS resigns

July 24, 2016: Robby Mook announces Russia hacked emails “for the purpose of helping Donald Trump”

July 25, 2016: Assange tells NBC “there is no proof whatsoever” he got emails from Russia

August 21, 2016: Stone tweets “Podesta’s time in the barrel”

October 7, 2016: WikiLeaks starts dumping Podesta files

November 7, 2016: “final WikiLeaks post … dropped by WikiLeaks on November 7, 2016, three days after the presidential election was held.”

March 10, 2017: Stone post Corsi relies on to describes his DMs with Guccifer 2.0

July 13, 2018: WaPo story on Stone and the GRU indictment

July 15, 2018: NYT story on GRU indictment

August 28, 2018: Corsi subpoena

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Unwinding a Multithreaded Beast

This is more than the usual caveat asking readers to note the byline on this post. I’m not the expert at this site on the investigations by Special Counsel’s Office or any other law enforcement body — for that see Marcy’s or bmaz’s posts and comments.

However I spend a lot of time on information technology, which is how I ended up reading a report on internet-mediated information warfare.

Last year the Senate Select Committee on Intelligence held a hearing about Foreign Influence on Social Media. One of the commissioned and invited research organizations was New Knowledge (NK), a cybersecurity/information integrity consultancy. NK’s director of research delivered prepared remarks and a whitepaper providing an overview of Russia’s influence operations and information warfare program.

The paper is a peppy read; it will little surprise those who have followed the Trump-Russia investigation and the role social media played in the 2016 election. But there are still bits which are intriguing — more so months after the paper was first delivered,  in light of long-time ratfucker Roger Stone’s indictment this past week.

Note these two excerpts from the report:

There wasn’t a link in the indictment last year of the Russian Internet Research Agency personnel with Stone’s indictment. The IRA charges don’t overlap with Stone’s at all (count numbers from indictments in paren.).

Stone:
(1) Obstruction of Proceeding
(2-6) False Statements
(7) Witness Tampering

IRA:
(1) Conspiracy (to gain unauthorized access, hack and steal information)
(1) Wire Fraud Conspiracy
(3-7) Wire Fraud
(8,9) Aggravated Identity Theft
(10) Conspiracy Commit to Money Laundering

But Stone’s indictment reveals an interesting overlap of threads between Stone’s efforts on behalf of the Trump campaign and the information warfare operation the IRA conducted in 2016.

Why was the IRA propelling content to fluff Assange’s credibility in the days before the release of the hacked emails Stone was trying to manage? This is a rather odd service to offer as a tenth anniversary gift to a so-called journalism outlet which should be able to point to its achievements on its own.

The IRA wasn’t alone in its Assange cred-fluffing. What a coincidence the UK tabloid DailyMail also touted Assange’s ability to affect Clinton’s campaign with a release of hacked emails — and at nearly the same time the IRA was pumping up Assange’s image.

How odd this DailyMail piece was pegged to Wikileaks’ anniversary, but the headline on the article and subhead treat the anniversary as an afterthought compared to the hacked emails and their effect on the Clinton campaign.

It doesn’t look like social media alone manipulated public perception, or that manipulation was confined to U.S. media.

Perhaps these two threads — the IRA’s influence operation/information warfare and Stone’s hacked email ratfucking — weren’t directed by a common entity. The public may not know depending on the course of SCO’s criminal and counterintelligence investigations and what information is released. But they certainly sewed toward the same outcome.

Two Details That Many Are Missing in/about the Stone Indictment

I’ve been traveling most of the day to get out of the Midwest before the snow and record low temperatures show up, and will be buried for three days working on things that have nothing to do with any investigation Mueller has been involved in since 2013.

But I do want to add two details to the parlor game going on about whether or not the Roger Stone indictment is the tip of a conspiracy-burg or evidence there’s no there there. Joyce White Vance argues that Mueller charged Stone the way he did to hide the rest of the conspiracy prosecution.

Why didn’t Mueller charge Stone with conspiracy? The rules in federal cases require that prosecutors provide defendants with broad discovery. By indicting Stone on a fairly narrow set of charges, Mueller limits what has to be disclosed & can protect ongoing investigation.

Randall Eliason offers a respectable version of the argument that the indictment suggests there won’t be a conspiracy case.

There have always been at least two possible end games for the Mueller investigation. He could uncover evidence of a widespread criminal conspiracy between the Trump campaign and Russians to influence the election. Or he could conclude that the campaign’s numerous documented interactions with Russians seeking to help Trump win were not criminal, but people close to Trump lied to cover up those interactions because revealing them would have been politically devastating.

Stone’s indictment falls into the coverup category. Mueller may have evidence of the broader conspiracy, and more charges may well be coming. But every case like Stone’s, or those against former campaign manager Paul Manafort, that is filed without charging a conspiracy with the Russians makes it seem more likely that criminal charges brought by the special counsel will end up being primarily about the coverups.

Andy McCarthy offers a less respectable version of the same.

Neither Eliason nor McCarthy account for one of the only new details in the indictment, showing that an unidentified Steve Bannon associate congratulated Stone on October 7.

On or about October 7, 2016, Organization 1 released the first set of emails stolen from the Clinton Campaign chairman. Shortly after Organization 1’s release, an associate of the high-ranking Trump Campaign official sent a text message to STONE that read “well done.” In subsequent conversations with senior Trump Campaign officials, STONE claimed credit for having correctly predicted the October 7, 2016 release.

This detail shows that the Trump campaign at least believed that Stone succeeded in getting WikiLeaks to drop the John Podesta emails to distract attention from the Access Hollywood video, which in turn is consistent with a claim Jerome Corsi made about Stone having advance knowledge of the Access Hollywood video and that he and Stone succeeded in timing the email release.

 Corsi wrote in his forthcoming 57,000-word book that he told Zelinsky that Stone told him in advance that the “Access Hollywood” tape would be released.

He wrote that “although I could not remember exactly when Roger told me, or the precise substance of the discussion, I remembered Roger told me before the Washington Post went to press with the Billy Bush tape that the tape was coming and that it would be a bombshell.”

Corsi said he had three phone calls with Stone in the hours before the release of the tape.

“I know nothing about that, either does Jerry Corsi,” Stone told TheDCNF. When asked why Corsi might be motivated to make a false claim, Stone said: “He’s saying this because the prosecutors induced him to say it.”

Corsi also wrote that Zelinsky revealed that prosecutors had evidence of an email exchange between he and Stone “in which Stone expressed pleasure that Assange had released the Podesta emails as instructed.”

Corsi said he replied that he and Stone “should be given credit” for the release.

While Stone disputes Corsi’s claim and Corsi feigns forgetfulness about precisely what happened, by including a communication showing Stone getting credit for the timing, Mueller is suggesting that Corsi is right — and that he has credible, corroborating evidence to prove it.

That’s more coordination — between Corsi and Stone, but more importantly between some go-between and WikiLeaks — than would be the case if Stone’s indictment were all Mueller had. It would put Stone and Corsi in a conspiracy with WikiLeaks and their go-between(s).

Then there’s this detail from the motion to seal Stone’s indictment that no one has yet offered a full explanation for (indeed, most of the reports that noted that Amy Berman Jackson had been assigned the case didn’t explain this detail at all).

Someone — and it would almost certainly have to be the prosecutors (including one who, DC US Attorney’s office prosecutor Jonathan Kravis, is on the internet Research Agency case),  — told the court that Stone’s namby pamby “process crime” is related to the big conspiracy case involving WIkiLeaks with a bunch of Russian hackers. (I’ve updated my running docket of Mueller and potentially related cases to reflect Stone’s indictment.) And while it’s true that Stone is described in the GRU indictment, he is not named in a way that the court would identify that by themselves. WikiLeaks shows up in both, but there’s no need to tie WikiLeaks cases together unless some defendant is going to show up to face prosecution (and WikiLeaks is does not take any of the overt acts described in the Stone indictment).

I don’t pretend to understand how this happened or what it all means. But there’s nothing about the Stone obstruction prosecution that would overlap with the evidence in the GRU indictment. And, as charged, the GRU indictment won’t be prosecuted at all until Julian Assange or someone else involved in it ends up in DC to face charges.

By all means, continue the parlor game. But at least explain how those two details fit into your theory of nothing-“berder” or grand conspiracy.

Update: By popular demand, I’m including the definition of a “related case” under DC’s local rules.

A related case for the purpose of this Rule means as follows:

(1) Criminal cases are deemed related when

(i) a superseding indictment has been filed, or

(ii) more than one indictment is filed or pending against the same defendant or defendants, or

(iii) prosecution against different defendants arises from a common wiretap, search warrant, or activities which are a part of the same alleged criminal event or transaction. A case is considered pending until a defendant has been sentenced.

Certainly, WikiLeaks is named as a co-conspirator in both. But it is not yet a defendant. Though both cases may rely on a wiretap targeting Wikileaks. Or perhaps Stone’s search warrant included his conversations with Guccifer 2.0, and so the other indictment.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Things Not Said in Roger Stone’s Indictment: “Trump Directed” and Other More Damning Details

I’m a leading purveyor of the theory that Robert Mueller is producing his mythical “report” via one after another speaking indictments. That said, it has always been true that some of the most interesting parts of his indictments involved what didn’t get said. That’s especially true in today’s Roger Stone indictment. Before I explain what didn’t get said, let me review what got said. The indictment shows that Stone was asked to figure out what emails on Hillary Julian Assange had, and using at least Jerome Corsi and Randy Credico as go-betweens, Stone did so, providing information (most explicitly) to Trump campaign manager Steve Bannon. When Congress asked Stone about all this, he lied, first hiding any of his go-betweens, and then seemingly using Randy Credico to hide Jerome Corsi. Mueller provides a lot of the communications between Stone and his go-betweens and the communications from October 2016, as well as some of the ones from the cover-up period.

But he doesn’t provide us everything.

I have argued that the early morning raid, not to mention the larding on of charges, suggest this is an effort to get Stone to flip, both against Jerome Corsi (which is why Meuller locked in testimony from Corsi’s stepson yesterday) and Trump himself.

With that in mind, here are the things that Mueller doesn’t say.

With whom — besides Campaign Manager Steve Bannon — at the Trump Campaign did Roger Stone speak

The word “campaign” shows up 52 times in Stone’s indictment, of which (by my count) 7 are generic references, 16 are to Hillary’s campaign or a descriptor for John Podesta, and 29 are to Trump’s campaign or associates of it. The indictment describes Stone’s discussions with people on the campaign over and over. While a number of those are to identified individuals — most notably Steve Bannon — a number of those are generic, including the following references.

During the summer of 2016, STONE spoke to senior Trump Campaign officials about Organization 1 and information it might have had that would be damaging to the Clinton Campaign. STONE was contacted by senior Trump Campaign officials to inquire about future releases by Organization 1.

[snip]

STONE also continued to communicate with members of the Trump Campaign about Organization 1 and its intended future releases.

[snip]

By in or around June and July 2016, STONE informed senior Trump Campaign officials that he had information indicating Organization 1 had documents whose release would be damaging to the Clinton Campaign.

[snip]

STONE thereafter told the Trump Campaign about potential future releases of damaging material by Organization 1.

It does so in an indictment that alleges (correctly, obviously) that one of Stone’s lies to the House Intelligence Committee that was material was whom he was speaking with on the campaign. The description of that lie cites the October 4 Bannon communication and the “supporter.” But it still leaves who else he spoke with unstated.

STONE’s False and Misleading Testimony About Communications with the Trump Campaign

35. During his HPSCI testimony, STONE was asked, “did you discuss your conversations with the intermediary with anyone involved in the Trump campaign?” STONE falsely and misleadingly answered, “I did not.” In truth and in fact, and as described above, STONE spoke to multiple individuals involved in the Trump Campaign about what he claimed to have learned from his intermediary to Organization 1, including the following:

a. On multiple occasions, STONE told senior Trump Campaign officials about materials possessed by Organization 1 and the timing of future releases.

And, of course, there’s this reference, which uses the word “directed” exactly a week after BuzzFeed got pilloried for using it about Trump.

After the July 22, 2016 release of stolen DNC emails by Organization 1, a senior Trump Campaign official was directed to contact STONE about any additional releases and what other damaging information Organization 1 had regarding the Clinton Campaign.

Mind you, this indictment had to have been approved in advance by Big Dick Toilet Salesman Matt Whitaker, and the last time he permitted prosecutors to name Individual-1 in an indictment, he got chewed out for it.

So maybe Mueller is not saying who else on the Trump campaign Stone was talking to (though we know he had frequent calls with Trump all through the campaign) to hide what else he knows. Maybe the Big Dick Toilet Salesman wouldn’t let Mueller lay this out (though I doubt that’s the case). Or maybe Mueller is just trying to avoid a second week in a row featuring headlines about what Trump “directed” his associates to do as part of the Russian conspiracy.

Corsi’s (and possibly Credico’s) role in the conspiracy

As I noted above, Mueller got aggressive with Stone to get him to flip on others. Obviously, the big prize is Trump. But there’s space for Stone to take his revenge on Jerome Corsi (and possibly even Randy Credico).

I suspect that Credico is not in any danger here. That said, he is described as a potential co-conspirator, Person 2, and did clearly discuss a conspiracy to obstruct HPSCI’s investigation. “‘Stonewall it. Plead the fifth. Anything to save the plan’ . . . Richard Nixon,” Stone wrote as he tried to persuade Credico not to testify to HPSCI.

There’s just one detail that makes me wonder if Credico was not fully truthful with Mueller. When Credico discussed Stone’s September request that he ask Assange about emails pertaining to Hillary’s efforts to undermine a Libyan peace effort with WSJ last year, he denied he had sent the request to either Assange or his lawyer Margaret Kunstler.

“Please ask Assange for any State or HRC e-mail from August 10 to August 30–particularly on August 20, 2011,” Mr. Stone wrote to Randy Credico, a New York radio personality who had interviewed Mr. Assange several weeks earlier. Mr. Stone, a longtime confidant of Donald Trump, had no formal role in his campaign at the time.

Mr. Credico initially responded to Mr. Stone that what he was requesting would be on WikiLeaks’ website if it existed, according to an email reviewed by the Journal. Mr. Stone, the emails show, replied: “Why do we assume WikiLeaks has released everything they have ???”

In another email, Mr. Credico then asked Mr. Stone to give him a “little bit of time,” saying he thought Mr. Assange might appear on his radio show the next day. A few hours later, Mr. Credico wrote: “That batch probably coming out in the next drop…I can’t ask them favors every other day .I asked one of his lawyers…they have major legal headaches riggt now..relax.”

Mr. Credico said in an interview with the Journal that he never passed the message on to Mr. Assange or his lawyers, but “got tired” of Mr. Stone “bothering” him, and so told Mr. Stone he had passed along the message.

The indictment says he in fact did forward the request to Kunstler.

On or about September 20, 2016, Person 2 forwarded the request to a friend who was an attorney with the ability to contact the head of Organization 1. Person 2 blind-copied STONE on the forwarded email.

That said, the indictment clearly remains silent about a lot of the details Mueller has incriminating Corsi in a cover-up (who, remember, prosecutors threatened to charge in a conspiracy to suborn perjury with respect to Stone’s testimony, and whose stepson Mueller locked into testimony before this indictment). The indictment includes this reference to a November discussion between Stone and Corsi.

On or about November 30, 2017, STONE asked Person 1 to write publicly about Person 2. Person 1 responded, “Are you sure you want to make something out of this now? Why not wait to see what [Person 2] does. You may be defending yourself too much—raising new questions that will fuel new inquiries. This may be a time to say less, not more.” STONE responded by telling Person 1 that Person 2 “will take the 5th—but let’s hold a day.”

But it remains silent on the report that Stone asked Corsi to write in August 2016 to establish a cover story, and it remains silent on whether Stone paid Corsi hush payments to stay silent after that.

Farage and Malloch and any other go-betweens

The indictment names Ted Malloch, though not as a co-conspirator.

On or about the same day, Person 1 forwarded STONE’s email to an associate who lived in the United Kingdom and was a supporter of the Trump Campaign.

[snip]

The body of the email read in part that Person 1’s associate in the United Kingdom “should see [the head of Organization 1].”

It doesn’t, however, put the Malloch references into context.

For example, it doesn’t reveal that — around the time someone “was directed” to get Stone to find out what WikiLeaks had — Stone and Alex Jones met with Nigel Farage at the RNC, which ultimately led to Farage joining Trump at a campaign event.

One night during the convention, Farage was introduced to Trump’s longtime adviser, the infamous political trickster, Roger Stone, at an Italian restaurant in The Flats district of Cleveland, according to both men.

Stone, who was accompanied that night by the Internet radio host and conspiracy theorist Alex Jones, said Farage’s main goal appeared to be to get a meeting with Trump.

The next day, Stone said, he tried to help by calling his former business partner, Paul Manafort – then Trump’s campaign chairman – and suggested that the Republican nominee get together with Farage. Manafort’s response was something along the lines of, “I’ll put a good word in,” Stone recalled.

Then, Stone met Ted Malloch — with Corsi — for dinner in NYC.

Asked about the nature of his relationship with Malloch, Stone said he did not know the other man well. He initially said he met Malloch three times but later said he recalled only two meetings with him.

Stone’s and Malloch’s first meeting was at a New York restaurant, Strip House, during the 2016 campaign. The two men dined with Jerome Corsi, a far-right political commentator and conspiracy theorist, Stone said.

Stone said his conversation with Malloch and Corsi at dinner was friendly but not memorable, and that they discussed “Brexit and globalism.” He added that they never discussed WikiLeaks, Assange, or Russia.

Stone, at least, is very sketchy about the timing of this, though it may actually precede when Stone asks Corsi to reach out to Malloch (indeed, might be the very reason he thought Corsi could get to Assange via Malloch).

That led to Farage’s campaign appearance with Trump on August 23.

Note, too, that the Stone indictment actually doesn’t say that Corsi is the go-between that Stone was hiding when he instead claimed Credico was his link to Assange. Indeed, of that go-between, he says he had only phone contact (though as I’ll write in a follow-up, that may have been for other reasons).

Particularly given Stone’s move to begin setting up a cover-story in August 2016, I’m not yet convinced we know who Stone’s real go-between is (and I’m still fairly certain that he and possibly Corsi had actual Podesta emails by then). He could have been working with Malloch directly. Or it could be someone else entirely.

Whoever it is, nothing in the Stone indictment tells us that for sure.

The Assange pardon

The Stone indictment is also silent about something that they have evidence — in the form of texts between Credico and Stone, surely among other things — that Stone tried to get Assange a pardon early last year.

In early January, Roger Stone, the longtime Republican operative and adviser to Donald Trump, sent a text message to an associate stating that he was actively seeking a presidential pardon for WikiLeaks founder Julian Assange—and felt optimistic about his chances. “I am working with others to get JA a blanket pardon,” Stone wrote, in a January 6 exchange of text messages obtained by Mother Jones. “It’s very real and very possible. Don’t fuck it up.” Thirty-five minutes later, Stone added, “Something very big about to go down.”

The recipient of the messages was Randy Credico, a New York-based comedian and left-leaning political activist whom Stone has identified as his back channel to WikiLeaks during the 2016 campaign—a claim Credico strongly denies. During the election, Stone, a political provocateur who got his start working for Richard Nixon’s presidential campaign, made statements that suggested he had knowledge of WikiLeaks’ plans to publish emails stolen from Hillary Clinton’s campaign chairman, John Podesta, and other Democrats, and his interactions with WikiLeaks have become an intense focus of special counsel Robert Mueller’s ongoing investigation into Russian election interference. As Mueller’s team zeroes in on Stone, they have examined his push for an Assange pardon—which could be seen as an attempt to interfere with the Russia probe—and have questioned at least one of Stone’s associates about the effort.

Particularly given that any pardon would have had to involve the one guy in the United States who can pardon Assange, it seems relevant to Mueller’s investigation. And yet it doesn’t show up in this indictment.

That’s something, then, that Stone could walk Mueller through as an effort to get rid of the 20-year witness tampering charge he faces.

Russia

Finally, the indictment remains mostly silent about Russia, particularly Roger Stone’s 180-turn on August 1 to claim that Russia may not have been behind the hack of the DNC. That’s all the more interesting given the way the indictment lays out the attribution to Russia made in mid-June.

On or about June 14, 2016, the DNC—through Company 1—publicly announced that it had been hacked by Russian government actors.

And then included Stone’s denial that Russia had hacked the DNC in his statement before HPSCI.

“These hearings are largely based on a yet unproven allegation that the Russian state is responsible for the hacking of the DNC and [the Clinton Campaign chairman] and the transfer of that information to [Organization 1].”

The indictment makes these two nods to attribution even as (as a number of people have observed) in their motion to seal Stone’s indictment, prosecutors deemed Stone’s indictment to be related to the GRU indictment, and his docket includes one of the DC AUSAs also on the Internet Research Agency case, Jonathan Kravis. (I’ve updated my running docket of Mueller and potentially related cases here.)

Remember, the GRU indictment describes (but doesn’t charge) Stone’s communications with Guccifer 2.0.

On or about August 15, 2016, the Conspirators, posing as Guccifer 2.0, wrote to a person who wasin regular contact with senior members of the presidential campaign of Donald J. Trump, “thank u for writing back . . . do u find anyt[h]ing interesting in the docs i posted?” On or about August 17, 2016, the Conspirators added, “please tell me if i can help u anyhow . . . it would be a great pleasure to me.” On or about September 9, 2016, the Conspirators, again posing as Guccifer 2.0, referred to a stolen DCCC document posted online and asked the person, “what do u think of the info on the turnout model for the democrats entire presidential campaign.” The person responded, “[p]retty standard.”

So prosecutors are saying that Stone’s crimes are more closely related to the actual Russian hack (which, remember, continued into September, after Stone deemed the DCCC analytics Guccifer 2.0 released to be “standard”) than they are to Flynn or Manafort or Papadopoulos or anyone else’s indictments.

Mind you, WikiLeaks appears as an unindicted co-conspirator in both the Stone and the GRU indictments, which may explain the connection.

But for some reason, Mueller thinks it important to note in Stone’s indictment that he pretended to believe Russia didn’t hack the DNC long after the hack had been attributed, without ever once mentioning that he had also spoken with the GRU persona dumping files.

Update: I’ve taken out the reference to Sam Nunberg, who says he’s not the person listed in this indictment.

Update: I’ve corrected this to reflect it was Jerome Corsi’s stepson who appeared before the grand jury Thursday. h/t AK

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

It Is False and Defamatory to Accuse WikiLeaks of a Bunch of Things that Aren’t the Key Allegations against It

WikiLeaks decided it was a good idea to release a long list of claims about Julian Assange and WikiLeaks that it considers defamatory. Emma Best obtained and liberated the list. Given that the list clearly attempts (unsuccessfully in some places, and hilariously in other places where they deem matters of opinion defamatory) to be factually correct, I’m interested in the way WikiLeaks uses the list to try to deny a bunch of things that might end up in a US criminal indictment.

The US is only angry with Assange because Ecuador has lots of debt

Pretty far down the list, WikiLeaks denies being gagged for claims made about Sergey Skripal in such a way as to falsely suggest the only concerns the US had over Assange came to do with debt pressure.

It is false and defamatory to suggest that Ecuador isolated and gagged Mr. Assange due to his comments on Sergei Skripal [in fact, he was isolated over his refusal to delete a factually accurate tweet about the arrest of the president of Catalonia by Spain in Germany, along with U.S. debt pressure on Ecuador. The president of Ecuador Lenin Moreno admitted that these two countries were the issue, see https://defend.wikileaks.org/about-julian/].

It’s nonsensical to claim that Assange was gagged just because of debt pressure, but it’s a good way to hide how the timing of his gag correlated with actions he took to piss of the US government, including by releasing a live CIA malware file.

The US charged Assange for actions it already decided not to charge him for, on which statutes of limitation have expired

The rest of the list is sprinkled with efforts to spin the US government’s legal interest in Assange. There’s an extended series of items that attempt to claim, as WikiLeaks has since DOJ accidentally revealed the existence of a recently filed complaint against Assange, that the charges instead relate to long-past publications (like Cablegate).

It is false and defamatory to deny that Julian Assange has been formally investigated since 2010 and charged by the U.S. federal government over his publishing work [it is defamatory because such a claim falsely imputes that Mr. Assange’s asylum is a sham and that he is a liar, see https://defend.wikileaks.org/].

It is false and defamatory to suggest that such U.S. charges have not been confirmed [in fact, they have, most recently by Associated Press (AP) and the Washington Post in November 2018].
– It is false and defamatory to suggest that the U.S. government denies the existence of such charges.
– It is false and defamatory to suggest that Julian Assange is not wanted for extradition by the U.S. government [in fact, public records from the Department of Justice show that the U.S. government says it had been intentionally concealing its charges against Mr. Assange from the public specifically to decrease his ability to “avoid arrest and extradition”].
– It is false and defamatory to suggest that the U.S. government has not publicly confirmed that it has an active grand jury, or pending or prospective proceedings, against Julian Assange or WikiLeaks, each year since 2010.

These claims are all true. WikiLeaks has been under investigation since well before 2010. There are charges that the US would like to extradite Assange for.

But all the public evidence suggests those charges relate to WikiLeaks’ recent actions, almost certainly involving Vault 7 and probably involving Russia’s election year operation.

Julian Assange is not a hacker, which is different from being someone who solicits or assists in hacks

WikiLeaks makes repeated claims that might appear to deny that the organization has solicited or assisted in hacks. The list denies that the DNC (which doesn’t have all the evidence Mueller does) has accused Assange of soliciting hacks of the DNC or Podesta. (Everywhere, this list is silent about the DCCC and other election year targets).

It is false and defamatory to suggest that the Democratic National Committee has claimed that Julian Assange directed, conspired, or colluded to hack the Democratic National Committee or John Podesta [in fact, the DNC makes no such claim: https://www.courthousenews.com/wp-content/uploads/2018/12/WikiLeaksDNC.pdf].

It denies that France has claimed that the MacronLeaks came from Russia (which again stops short of saying that the MacronLeaks came from Russia).

It is false and defamatory to suggest that the French government found that “MacronLeaks” were hacked by Russia [in fact, the head of the French cyber-security agency, ANSSI, said that they did not have evidence connecting the hack with Russia, see https://wikileaks.org/macron-emails/].

It denies that Assange has hacked the state of Ecuador (but not the Embassy of Ecuador or other states, including the US or Iceland).

It is false and defamatory to suggest that Julian Assange has ever hacked the state of Ecuador.

And it denies that Assange is, himself, a hacker.

It is false and defamatory to suggest that Julian Assange is a “hacker”.

All of these hacking denials stop well short of denying that WikiLeaks has solicited hacks before, including by publicizing a “most wanted” list that Russian hackers might respond to.

Mueller described WikiLeaks as an unindicted co-conspirator but that doesn’t mean Mueller has any interest in the organization

Close to the top of the list, WikiLeaks makes two claims to suggest the organization and Assange are not targets in the Mueller investigation.

It is false and defamatory to suggest that WikiLeaks or Julian Assange has ever been contacted by the Mueller investigation.

It is false and defamatory to suggest that there is any evidence that the U.S. charges against Julian Assange relate to the Mueller investigation.

This is misdirection hiding a great deal of evidence that WikiLeaks is a target in the Mueller investigation. The list is silent, for example, on whether Congressional investigators have contacted Assange, whether Assange ultimately did accept SSCI’s renewed request last summer to meet with Assange, and whether Assange demanded immunity to travel to the US to respond to such inquiries.

Nor does WikiLeaks deny having been described — in a fashion usually reserved for unindicted co-conspirators — in a Mueller indictment.

WikiLeaks doesn’t deny that WikiLeaks denied Russians were its source for 2016 materials

WikiLeaks twice denies, in very similar language, that it suggested that Seth Rich was its source for the DNC emails.

It is false and defamatory to suggest that WikiLeaks or Julian Assange claimed that any person or entity was their source for WikiLeaks’ 2016 U.S. election publications [it is defamatory because Julian Assange’s professional reputation is substantially based on source protection].

[snip]

It is false and defamatory to suggest that WikiLeaks or Julian Assange has ever stated or suggested that any particular person was their source for any publication, including Seth Rich.

A good lawyer would be able to sustain a claim that Assange had indeed “suggested” that Rich was his source, though it would make an interesting legal battle.

But when WikiLeaks denies feeding Seth Rich conspiracies, it does so only by denying the most extreme conspiracy, that the Democrats had Rich killed.

It is false and defamatory to suggest that WikiLeaks or Julian Assange has ever published, uttered or tried to promote alleged conspiracy theories claiming “John Podesta engaged in satanic rituals”, the “Democratic Party had Seth Rich Killed”, “Clinton wore earpieces to the 2016 US election debates”, on “Clinton’s health” or “Clinton kidnapping children”.

All of this, of course, dodges the way that WikiLeaks repeatedly tried to claim that Russia was not its ultimate source for the 2016 files.

Should we take the silence on this point as an admission?

Marcy Wheeler is false and defamatory

Finally, there are four claims relating to Vault 7, three of which pertain to my coverage of the way WikiLeaks attempted to leverage the Vault 7 releases in conversations with the Trump Administration. WikiLeaks denies that the two times Assange suggested to the President’s spawn that he should be made an ambassador to the US constituted an effort by WikiLeaks to get Trump to appoint Assange ambassador (note, this is also a denial that Assange tried to serve in another diplomatic role, which is different than being Ambassador).

It is false and defamatory to suggest that WikiLeaks tried to have the Trump administration appoint Julian Assange as an ambassador or to have any other person or state appoint him as an ambassador.

I find it notable that this claim departs from the form used in many of these denials, speaking for both Assange and WikiLeaks.

Then the list twice denies that Assange suggested he wouldn’t release the Vault 7 files if the Trump Administration provided him immunity.

It is false and defamatory to suggest that Julian Assange has ever extorted the United States government.

It is false and defamatory to suggest that Julian Assange has ever proposed that he not publish, censor or delay a publication in exchange for any thing.

Assange would and will claim that the discussions with Adam Waldman where just this arrangement was floated are protected by Attorney-Client privilege. But Waldman may have said enough to people at DOJ to refute this denial regardless.

Finally, WikiLeaks insisted it has never retracted any of the bullshit claims it made about its Vault 7 files.

It is false and defamatory to suggest that any of WikiLeaks’ claims about its 2017 CIA leak, Vault 7, “were later retracted”.

Given that one of the claims directly parroted the bullshit claims Shadow Brokers was making, a claim it made in a release that will probably be part of the charges against it, this non-retraction doesn’t necessarily help it much.

Note that one other thing WikiLeaks is silent about here are its public statements about Joshua Schulte, whose attempts to continue leaking from jail the FBI got on video. I find that interesting both for WikiLeaks’ attempt to corroborate Schulte’s thin excuse for using Tor after he was charged, and for its relative silence about whether he would be a whistleblower if he were its source for CIA’s hacking tools.

Update: WikiLeaks has released a revised version that takes out, among other things, the Ambassador claim, the Seth Rich claims, and also a denial that it is close to Russia.

As I disclosed last July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Bumped! Rudy’s Ineffective Assistance of Counsel Strategy

I got an invitation to be on my first Sunday show this week. But — as usually happens when you’re talking to big media bookers — I got bumped. I got bumped to make way for this Rudy Giuliani appearance, which sets a new standard among his many media appearances for giving Trump cause to claim his lawyer screwed him over.

The interview starts with Trump’s blabbermouth lawyer assailing someone else for bad lawyering.

RUDY GIULIANI, PRESIDENT TRUMP’S LAWYER: Pathetic. The man is pathetic. That’s a lawyer you were interviewing and he says he — oh, he directed me to do it and, oh my goodness, he directed me. He’s a lawyer. He’s the guy you depend on to determine whether or not you should do it this way or that way, whether you’re Donald Trump or you are me or you, I have…

From there, Rudy pisses away one of the few benefits he offers Trump, his past service as US Attorney in the famously cliquish Southern District of NY. Rather than soft-pedaling any critique of SDNY, Rudy repeatedly pisses all over the office currently targeting his client, his client’s spawn, and his client’s eponymous corporation in at least one serious criminal investigation.

STEPHANOPOULOS: But you just said you ran that office. You know how the Southern District is run. You know exactly how the Southern District is run.

GIULIANI: No, I don’t know — actually, I don’t know how the Southern District —

(CROSSTALK)

STEPHANOPOULOS: They wouldn’t have put that in the statement of fact if they didn’t believe —

GIULIANI: I’m disgusted with the Southern District.

[snip]

STEPHANOPOULOS: Here’s the question I have for you. Why do you have so much trouble with the southern district? The southern district’s being run – this case being run by Robert Khuzami, a Republican appointed by the Trump administration, spoke at the Republican …

GIULIANI: His interpretation of the campaign finance law is completely erroneous. And to be – even if – and even if you want to make some argument that there’s some validity to it, you do not pursue a president of the United States for a questionable interpretation of the statute. That is completely wrong, it’s harassment.

After failing to respond to George Stephanopoulos’ descriptions of what distinguishes Trump’s hush payment case from that of John Edwards, Rudy fails to offer one piece of evidence that might back his arguments — that Trump had paid similar hush payments in the past, when winning the Presidential election wasn’t at stake.

STEPHANOPOULOS: Did he ever make any payments like that in the past?

GIULIANI: Nobody else asked for — in the past, I can’t speak to. I wasn’t his lawyer in the past.

Rudy then tries to claim that Jerome Corsi (who, Stephanopoulos points out, claimed 9/11 was an inside job) and Mike Flynn were not lying, misstating that Peter Strzok had said something exonerating about Flynn in a text versus an FBI interview.

Peter Strzok wrote in one of his texts that he didn’t seem to be – he didn’t seem to be lying, wasn’t acting like a person …

This is where things start to go really haywire. Stephanopoulos asks Rudy about the reference to Michael Cohen’s ongoing contacts with the White House through 2018 — which, given the way multiple entities happened to tell the same false story about the Trump Tower deal, likely means a conspiracy to obstruct justice — and in response Rudy says “It was over by the time of the election.”

STEPHANOPOULOS: Now, the special counsel went on to say that they found Cohen credible, provided valuable information about Russia-related matters for its investigation, also that his contacts with persons connected to the White House in 2017 and 2018, they seem to be getting at, there, both collusion and obstruction.

GIULIANI: Isn’t that prosecution by innuendo? I have no idea what they’re talking about. Beyond what you just said, I have no idea what they’re talking about …

STEPHANOPOULOS: Well, let me ask you a few specifics.

GIULIANI: I have no – I have no idea – I know that collusion is not a crime. It was over with by the time of the election. I don’t know what evidence … [my emphasis]

Admittedly, by this point in the interview, Rudy was blathering. But I’m particularly interested — given that Trump reportedly refused to answer any Mueller questions about the transition — that Rudy thinks in terms of the collusion he’s seemingly admitting his client engaged in ended “by the time of the election.” Trump’s legal team may be adopting a defensive strategy premised on the claim that certain activities (reaching out to Russians to tell them you’ll give them sanctions relief is just the most obvious) can be divorced from any context that implicates election season “collusion.”

That’s the form of Rudy’s most newsworthy statement is so interesting. He says that the answer Trump gave (in context, this must mean in response to Mueller’s questions) “would have covered all the way up to,” and here he corrects himself, “covered up to November, 2016.”

STEPHANOPOULOS: Did the president – did Donald Trump know that Michael Cohen was pursuing the Trump Tower in Moscow into the summer of 2016?

GIULIANI: According to the answer that he gave, it would have covered all the way up to – covered up to November, 2016. Said he had conversations with him but the president didn’t hide this. They know …

STEPHANOPOULOS: Earlier they had said those conversations stopped in January, 2016.

GIULIANI: I don’t — I mean, the date — I mean, until you actually sit down and you look at the questions, and you go back and you look at the papers and you look at the — the — you’re not going to know what happened. That’s why — that’s why lawyers, you know, prepare for those answers.

This is breaking news, of course: the last we had heard, the Trump Tower negotiations only went up through July. Here, Rudy seems to be confessing that they went through November.

Only, his reference to “why lawyers, you know, prepare for those answers” suggests that that’s not what Trump’s response to Mueller actually was. I would imagine the response he gave was deliberately left vague enough so that if Cohen (who was caught meeting with Mueller in the days when Trump was finalizing his answers) told Mueller the deal went through November, then Trump’s answer wouldn’t contradict that, even if he didn’t admit that the deal did go that long.

Rudy went on the teevee this morning, in part, to make an utterly damning statement that would nevertheless tell Mueller’s prosecutors that the answer (lawyers wrote but that) his client swore to was meant to cover a deal that continued all the way through November, even if he didn’t say that explicitly.

Remember, the day Cohen pled guilty on the Mueller false statements charge, Rudy gave an unbelievably hedged answer about whether that deal ever died.

“The president, as far as he knows, he remembers there was such a proposal for a hotel,” Giuliani said. “He talked it over with Cohen as Cohen said. There was a nonbinding letter of intent that was sent. As far as he knows it never came to fruition. That was kind of the end of it.”

Rudy seems confident that Cohen did not know about the continuation of this deal, but I’d bet money that it did continue.

Back to today’s interview, Rudy goes on to deny, then back off a categorical denial, that Stone communicated to Trump about WikiLeaks, working hard to suggest that Mueller might only charge a conspiracy to hack, not a conspiracy to defraud the United States (even while the public record makes it increasingly possible that Stone could get charged in a CFAA conspiracy).

STEPHANOPOULOS: And did Roger Stone ever give the president a heads-up on WikiLeaks’ leaks — leaks concerning Hillary Clinton, the DNC?

GIULIANI: No, he didn’t.

STEPHANOPOULOS: Not at all?

GIULIANI: No. I don’t believe so. But again, if Roger Stone gave anybody a heads-up about WikiLeaks’ leaks, that’s not a crime. It would be like giving him a heads-up that the Times is going to print something. One the — the crime — this is why this thing is so weird, strange — the crime is conspiracy to hack; collusion is not a crime, it doesn’t exist.

STEPHANOPOULOS: No. Conspiracy to defraud the government, you’re right, conspiracy to hack that is the crime. We don’t know whether …

GIULIANI: Yes. Did Donald Trump engage in a conspiracy to hack with the Russians? They’ve been going at it. The counterintelligence investigation came to the conclusion no evidence.

Rudy seems to take wholly unjustified comfort in what I can only guess is that GRU indictment describing his client and Stone prominently, without charging them. Hell, Julian Assange hasn’t even been charged yet; why does Rudy think the counterintelligence investigation is done?

From there, Rudy admits he was in discussions with Cohen’s lawyers about pardons!!!! He then suggests that Cohen “double-crossed” — that is, told the truth — because of that discussion about pardons.

STEPHANOPOULOS: Well, they’re also looking at obstruction. Did anyone connected to the president ever suggest in any way to Michael Cohen that he would get a pardon if he stayed on the team?

GIULIANI: I had this specific conversation with his lawyers and that liar can say what he wants, I told his lawyers there will be no discussion of a pardon. That doesn’t mean the president doesn’t have the — nobody’s giving away any power, but do not consider it in your thinking now. It has nothing about what you should decide about yourself. I think that’s one of the reasons why he double-crossed.

All this ends with Rudy stating, quite confidently, that Mueller is done, after having just said that conversations were ongoing about whether Trump might sit for an interview.

STEPHANOPOULOS: I do know that from my time in the White House. Final question: Mueller almost done?

GIULIANI: He is done. I don’t know what else — I told you. No, the only thing left are the parking tickets and jaywalking.

Maybe Rudy’s right. Maybe Mueller has told him they didn’t find any evidence against his client.

But even if that’s (improbably) true, if I’m Mueller I might be reopening things in light of this appearance by Rudy.

As I disclosed in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post. 

Hillary Clinton Caught Her Stroke from Jerome Corsi

Gotta give Jerome Corsi: For a guy that not even his spouse should believe, he has taken down a series of Democratic presidential candidates. One thing we learn from the plea agreement he didn’t sign, for example, is that a campaign attack claiming that Hillary had had a stroke may have originated with the same guy who invented the Swift Boat Veterans and a Kenyan birth certificate.

On August 2, 2016, having consulted with someone who consulted with Julian Assange, Corsi advised Roger Stone to start setting up a claim that Hillary had had a stroke.

On or about August 2, 2016, CORSI responded to Person 1 by email. CORSI wrote that he was currently in Europe and planned to return in mid-August. CORSI stated: “Word is friend in embassy plans 2 more dumps. One shortly after I’m back. 2nd in Oct. Impact planned to be very damaging…. Time to let more than [the Clinton Campaign chairman] to be exposed as in bed w enemy if they are not ready to drop HRC [Hillary Rodham Clinton]. That appears to be the game hackers are now about. Would not hurt to start suggesting HRC old, memory bad, has stroke — neither he nor she well. I expect that much of next dump focus, setting stage for Foundation debacle.” [my emphasis]

On August 3, by his own accounting, Roger Stone spoke with Trump.

On August 5, Trump started an attack on Hillary that would evolve into claims she had a stroke.

Donald Trump pumped up his attacks on Hillary Clinton’s character Saturday night by suggesting that the former secretary of state is not mentally fit to be president.

“She took a short-circuit in the brain. She’s got problems,” Trump said, seizing on Clinton’s explanation that she “short-circuited” a recent answer about her truthfulness in discussing her email server.

“Honestly, I don’t think she’s all there,” he added.

A perhaps more interesting detail is that when Corsi tried to destroy all evidence he had been conspiring with people working with emails stolen by Russia, he deleted all those before October 11.

Between approximately January 13, 2017 and March 1, 2017, CORSI deleted from his computer all email correspondence that predated October 11, 2016, including Person 1’s email instructing CORSI to “get to [the founder of Organization 1]” and CORSI’s subsequent forwarding of that email to the overseas individual.

October 11 is the day WikiLeaks released the emails including attachments relating to Joule were released. If you wanted to eliminate all evidence of foreknowledge of those emails, you’d start there. And Corsi tried to do just that, eliminate evidence of the period leading up to WikiLeaks’ release of Joule emails, during a period when Stone was working on a cover-up story.

Time Machine: 2011 to 2012 WikiLeaks Is not 2018 WikiLeaks

Since DOJ confirmed last week that it does have at least one sealed criminal complaint against Julian Assange, WikiLeaks has adopted a notable defense strategy. In most of their responses, WikiLeaks has claimed a continuity between what it has done in the last two years and what it was doing in 2010, when the US government first took aggressive action against WikiLeaks.

For example, this timeline claims vindication of persistent claims among WikiLeaks supporters that Assange had already been indicted, even while linking to reports that make it clear DOJ has changed its approach recently (and ignoring, entirely, the NYT report that says the charge dates to this summer and which WikiLeaks’ Twitter feed attacks elsewhere).

November: US prosecutors inadvertently reveal that Julian has been charged under seal (i.e., confidentially) in the US – something which WikiLeaks and others have long said but which has been denied by some US officials. The document making the admission was written by Assistant US Attorney Kellen S Dwyer. The Wall Street Journal reports that “over the past year, US prosecutors have discussed several types of charges they could potentially bring against Mr. Assange”. It notes that charges against Julian could include violating the US Espionage Act, which criminalises releasing information regarding US national defence.

Assange’s UK lawyer, Jennifer Robinson, did the same in an appearance with MSNBC. She claimed  that the charge came out of the investigation started in 2010 in response to WikiLeaks’ publication of US Diplomatic cables, the Iraq war logs, the Afghan war logs, which she argues (correctly, I’d agree) was demonstrated to be in the public interest and had been published by other media outlets, including the NYT. She says this criminal charge proves it was correct for Assange to have sought asylum from Ecuador. And she emphasized that Assange would be extradited “for publishing truthful information.” She repeated “public interest” over and over.

Another Tweet RTed by WikiLeaks claims that Assange had been indicted as early as 2011 and the Australian government knew about it.

Finally, another Tweet purports to lay out the possible charges against Assange, which it describes as:

  • Espionage: 18 U.S.C. § 793(d) – imprisonment up to 10 years
  • Conspiracy to commit espionage: 18 U.S.C. § 793(g) – imprisonment up to 10 years
  • The theft or conversion of property belonging to the United States government: 18 U.S.C. § 641 – imprisonment up to 10 years
  • Violation of the Computer Fraud and Abuse Act: 18 U.S.C. § 1030 – imprisonment up to 10 years
  • (general) Conspiracy: 18 U.S.C. § 371 – imprisonment up to 5 years

It bases that claim on this post from early 2015 describing the late 2014 notice to WikiLeaks of warrants served on Google two and a half years earlier (so around June 2012, which is when Assange first took refuge in the Ecuadorian embassy).

In other words, WikiLeaks is working public opinion by pretending it is being prosecuted for the stuff it did in 2011, even to the point of claiming that news of a recent complaint proves that Assange has been indicted all this time. It is true that the prosecutor who made the cut-and-paste error that revealed the existence of a complaint, Kellen Dwyer, has reportedly been on the WikiLeaks investigative team for years. But that doesn’t mean, at all, that the US prosecution is in any way related to those earlier actions.

The reports of both the WSJ and NYT seem to prove the opposite. Whether because the Trump Administration that WikiLeaks worked so hard to elect turned out to be far less respectful of freedom of the press than the Obama Administration, or because the US started collecting more aggressively on WikiLeaks and therefore learned more about its operations, or because the nature of Assange’s more recent actions are fundamentally different from what he did in 2011, DOJ came to charging Assange this summer when Eric Holder refused to do so. Indeed, while no one has confirmed this one way or another, the assumption has been that Assange’s charges relate either to his involvement in the 2016 Russian hack-and-leak (though that would presumably be charged in DC) or his involvement in the 2017 Vault 7 and Vault 8 files as well as his exploitation of them.

The possible crimes may have expanded, too. Espionage is definitely still a possibility, particularly given how DOJ charged accused Vault 7 leaker Joshua Schulte, including possibly suggesting his leaks were designed to help another nation (presumably Russia). If Assange had advance knowledge of any of the Russian hacks (or the Peter Smith negotiated efforts to obtain Hillary’s server emails), he might be exposed to CFAA as well. And if he is charged by Mueller, he will surely be charged with at least one conspiracy charge as well; WikiLeaks was already described as an unindicted co-conspirator in the GRU indictment.

But there may well be other charges, starting with extortion or something akin to it for the way Assange tried to use the threat of the release of the Vault 7 documents to obtain a pardon. Some of his actions might also amount to obstruction. Yochai Benkler’s latest post also imagines Assange may have coordinated more closely with Russian intelligence, which might lead to different charges.

WikiLeaks’ attempts to rest on its earlier laurels is telling, for several reasons. It suggests they and their supporters don’t seem to want to defend Assange’s more recent actions. I find it remarkable, for example, that Robinson didn’t mention how many stories the NYT and WaPo wrote based on the 2016 files, which would support her argument that the files were newsworthy.

The attempt to pretend Assange is being prosecuted for his earlier actions seems to serve another purpose — to defend his years of asylum claims, which are also the basis for his claims to be a victim of US political targeting (and the premise for his demands for immunity on threat of releasing the Vault 7 files). Don’t get me wrong. I think some of the things DOJ is known or suspected to have done in 2010 and 2011 are problematic. But those did not directly merit an asylum claim (and in fact they preceded Assange’s asylum claim by over a year).

That may, in turn, serve to obscure what Assange wanted immunity for in coercive negotiations that started in 2017: Was it 2011, his role in publishing the State cables? Or was it 2016, as his offers to explain what (he claims) really happened in 2016 would suggest?

Whichever it is, WikiLeaks seems to have a lot staked on making a defense of Assange’s 2011 activities. Which suggests they’re a lot less confident they can defend his 2016 and 2017 activities.

The Theory of Prosecution You Love for Julian Assange May Look Different When Applied to Jason Leopold

The WaPo confirmed something Seamus Hughes disclosed last night: Sometime before August 22, EDVA had filed a sealed complaint (not indictment) against Julian Assange.

WikiLeaks founder Julian Assange has been charged under seal, prosecutors inadvertently revealed in a recently unsealed court filing — a development that could significantly advance the probe into Russian interference in the 2016 election and have major implications for those who publish government secrets.

The disclosure came in a filing in a case unrelated to Assange. Assistant U.S. Attorney Kellen S. Dwyer, urging a judge to keep the matter sealed, wrote that “due to the sophistication of the defendant and the publicity surrounding the case, no other procedure is likely to keep confidential the fact that Assange has been charged.” Later, Dwyer wrote the charges would “need to remain sealed until Assange is arrested.”

Dwyer is also assigned to the WikiLeaks case. People familiar with the matter said what Dwyer was disclosing was true, but unintentional.

The confirmation closely follows a WSJ story describing increased confidence that the US will succeed in extraditing Assange for trial.

The confirmation that Assange has been charged has set off a frenzy, both among Assange supporters who claim this proves their years of claims he was indicted back in 2011 and insisting that charging him now would amount to criminalizing journalism, and among so-called liberals attacking Assange lawyer Barry Pollack’s scolding of DOJ for breaking their own rules.

I’ve long been on record saying that I think most older theories of charging Assange would be very dangerous for journalism. More recently, though, I’ve noted that Assange’s actions with respect to Vault 7, which had original venue in EDVA where the Assange complaint was filed (accused leaker Joshua Schulte waived venue in his prosecution), go well beyond journalism. That said, I worry DOJ may have embraced a revised theory on Assange’s exposure that would have dire implications for other journalists, most urgently for Jason Leopold.

There are, roughly, four theories DOJ might use to charge Assange:

  • Receiving and publishing stolen information is illegal
  • Conspiring to release stolen information for maximal damage is illegal
  • Soliciting the theft of protected information is illegal
  • Using stolen weapons to extort the US government is illegal

Receiving and publishing stolen information is illegal

The first, theory is the one that Obama’s DOJ rejected, based on the recognition that it would expose NYT journalists to prosecution as well. I suspect the Trump Administration will have the same reservations with such a prosecution.

Conspiring to release stolen information for maximal damage is illegal

The second imagines that Assange would be charged for behavior noted in the GRU indictment — WikiLeaks’ solicitation, from someone using the persona of Guccifer 2.0, of material such that it would be maximally damaging to Hillary Clinton.

On or about June 22, 2016, Organization 1 sent a private message to Guccifer 2.0 to “[s]end any new material [stolen from the DNC] here for us to review and it will have a much higher impact than what you are doing.” On or about July 6, 2016, Organization 1 added, “if you have anything hillary related we want it in the next tweo [sic] days prefable [sic] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after.” The Conspirators responded, “ok . . . i see.” Organization 1 explained, “we think trump has only a 25% chance of winning against hillary . . . so conflict between bernie and hillary is interesting.”

After failed attempts to transfer the stolen documents starting in late June 2016, on or about July 14, 2016, the Conspirators, posing as Guccifer 2.0, sent Organization 1 an email with an attachment titled “wk dnc link1.txt.gpg.” The Conspirators explained to Organization 1 that the encrypted file contained instructions on how to access an online archive of stolen DNC documents. On or about July 18, 2016, Organization 1 confirmed it had “the 1Gb or so archive” and would make a release of the stolen documents “this week.”

Significantly, WikiLeaks (but not Roger Stone) was referred to in the way an unidicted co-conspirator normally is, not named, but described in such a way to make its identity clear.

This is a closer call. There is a Supreme Court precedent protecting journalists who publish stolen newsworthy information. But it’s one already being challenged in civil suits in ways that have elicited a lot of debate. Prosecuting a journalist for trying to do maximal damage actually would criminalize a great deal of political journalism, starting with but not limited to Fox. Note that when the founders wrote the First Amendment, the norm was political journalism, not the so-called objective journalism we have now, so they certainly didn’t expect press protections to be limited to those trying to be fair to both sides.

Such a charge may depend on the degree to which the government can prove foreknowledge of the larger agreement with the Russians to damage Hillary, as well as the illegal procurement of information after WikiLeaks expressed an interest in information damaging Hillary.

Mueller might have evidence to support this (though there’s also evidence that WikiLeaks refused to publish a number of things co-conspirators leaked to them, including but not limited to the DCCC documents). The point is, we don’t know what the fact pattern on such a prosecution would look like, and how it would distinguish the actions from protected politically engaged journalism.

Soliciting the theft of protected information is illegal

Then there’s the scenario that Emma Best just hit on yesterday: that DOJ would prosecute Assange for soliciting hacks of specific targets. Best points to Assange’s close coordination with hackers going back to at least 2011 (ironically, but in a legally meaningless way, with FBI’s mole Sabu).

This is, in my opinion, a possible way DOJ would charge Assange that would be very dangerous. I’m particularly worried because of the way the DOJ charged Natalie Mayflower Edwards for leaking Suspicious Activity Reports to Jason Leopold. Edwards was charged with two crimes: Unauthorized Disclosure of Suspicious Activity Reports and Conspiracy to Make Unauthorized Disclosures of Suspicious Activity Reports (using the same Conspiracy charge that Mueller has been focused on).

In addition to describing BuzzFeed stories relying on SARs that Edwards saved to a flash drive by October 18, 2017 and then January 8, 2018, it describes a (probably Signal) conversation from September 2018 where Leopold — described in the manner used to describe unindicted co-conspirators — directed Edwards to conduct certain searches for material that ended up in an October story on Prevezon, a story published the day before Edwards was charged.

As noted above, the October 2018 Article regarded, among other things, Prevezon and the Investment Company. As recently as September 2018, EDWARDS and Reporter-1 engaged in the following conversation, via the Encrypted Application, in relevant part:

EDWARDS: I am not getting any hits on [the CEO of the Investment Company] do you have any idea what the association is if I had more information i could search in different areas

Reporter-1: If not on his name it would be [the Investment Company]. That’s the only other one [The CEO] is associated with Prevezon Well not associated His company is [the Investment Company]

Based upon my training and experience, my participation in the investigation, and my conversations with other law enforcement agents familiar with the investigation, I believe that in the above conversation, EDWARDS was explaining that she had performed searches of FinCEN records relating to Prevezon, at Reporter-l’s request, in order to supply SAR information for the October 2018 Article.

Edwards still has not been indicted, two weeks after her arraignment. That suggests it’s possible the government is trying to persuade her to plead and testify against Leopold in that conspiracy, thereby waiving indictment. The argument, in that case, would be that Leopold went beyond accepting stolen protected information, to soliciting the theft of the information.

This is the model a lot of people are embracing for an Assange prosecution, and it’s something that a lot of journalists not named Jason Leopold also do (arguably, it’s similar but probably more active than what James Rosen got dubbed a co-conspirator in the Stephen Jin-Woo Kim case).

Charging Leopold in a bunch of leaks pertaining to Russian targets would be a nice way (for DOJ, not for journalism) to limit any claim that just Assange was being targeted under such a theory. Indeed, it would placate Trump and would endanger efforts to report on what Mueller and Congress have been doing. Furthermore, it would be consistent with the aggressive approach to journalists reflected in the prosecution of James Wolfe for a bunch of leaks pertaining to Carter Page, which involved subpoenaing years of Ali Watkins’ call records.

In short, pursuing Leopold for a conspiracy to leak charge would be consistent with — and for DOJ, tactically advantageous — the theory under which most people want Assange charged.

Using stolen weapons to extort the US government is illegal

Finally, there’s the fourth possibility, and one I think is highly likely: charging Assange for his serial efforts to extort a pardon from the US government by threatening to release the Vault 7 (and ultimately, a single Vault 8 live malware) files.

This post shows how, starting in January 2017, Assange (and Oleg Deripaska) representative Adam Waldman was reaching out to top DOJ officials trying to negotiate a deal and using the release of the Vault 7 documents as leverage.

This post shows how, the second time Assange tweeted Don Jr asking for an Ambassadorship, he included a threatening reference to Vault 8, WikiLeaks’ name for the actual malware stolen and leaked from CIA, the first file from which Assange had released days earlier.

[B]ack in November 2017, some outlets began to publish a bunch of previously undisclosed DMs between Don Jr and Wikileaks. Most attention focused on Wikileaks providing Don Jr access to an anti-Trump site during the election. But I was most interested in Julian Assange’s December 16, 2016 “offer” to be Australian Ambassador to the US — basically a request for payback for his help getting Trump elected.

Hi Don. Hope you’re doing well! In relation to Mr. Assange: Obama/Clinton placed pressure on Sweden, UK and Australia (his home country) to illicitly go after Mr. Assange. It would be real easy and helpful for your dad to suggest that Australia appoint Assange ambassador to DC “That’s a really smart tough guy and the most famous australian you have! ” or something similar. They won’t do it, but it will send the right signals to Australia, UK + Sweden to start following the law and stop bending it to ingratiate themselves with the Clintons. 12/16/16 12:38PM

In the wake of the releases, on November 14, 2017, Assange tweeted out a follow-up.

As I noted at the time, the offer included an implicit threat: by referencing “Vault 8,” the name Wikileaks had given to its sole release, on November 9, 2017 of an actual CIA exploit (as opposed to the documentation that Wikileaks had previously released), Assange was threatening to dump more hacking tools, as Shadow Brokers had done before it. Not long after, Ecuador gave Assange its first warning to stop meddling in other countries politics, explicitly pointing to his involvement in the Catalan referendum but also pointing to his tampering with other countries. That warning became an initial ban on visitors and Internet access in March of this year followed by a more formal one on May 10, 2018 that remains in place.

Notably, Ecuador may have warned Assange back then to stop releasing America’s malware from their Embassy; those warnings have laid the groundwork for the rigid gag rules recently imposed on Assange on risk of losing asylum.

Immediately after this exchange, accused Vault 7/8 leaker Joshua Schulte had some Tor accesses which led to him losing bail. They didn’t, however, lead BOP to take away his multiple devices (!?!?!). Which means that when they raided his jail cell on or around October 1, they found a bunch of devices and his activity from 13 email and social media accounts. Importantly, DOJ claims they also obtained video evidence of Schulte continuing his efforts to leak classified information.

The announcement of that raid, and the additional charges against Schulte, coincided with a period of increased silence from WikiLeaks, broken only by last night’s response to the confirmation Assange had been charged.

I think it possible and journalistically safe to go after Assange for releasing stolen weapons to extort a criminal pardon. But most of the other theories of prosecuting Assange would also pose real risks for other journalists that those rooting for an Assange prosecution appreciate and rely on.

As I disclosed in July, I provided information to the FBI on issues related to the Mueller investigation, so I’m going to include disclosure statements on Mueller investigation posts from here on out. I will include the disclosure whether or not the stuff I shared with the FBI pertains to the subject of the post.