Posts

Fani Willis Serves Up Cheese and Kraken

Update: As Harpie and others noted in comments, in the hour since I’ve been taping with Nicole Sandler, Kenneth Chesebro pled guilty to a felony in GA.

Hours after the first 450 jurors appeared at the Fulton County Courthouse to fill out a questionnaire ahead of an expected monthslong trial where he faced seven felony counts, Chesebro and his attorneys pleaded guilty to a single felony charge of conspiracy to commit filing false documents.

Chesebro’s deal includes five years of probation, $5,000 in restitution to the secretary of state’s office, 100 hours of community service, a letter of apology, an agreement to testify in future trials and to hand over remaining documents and text messages to the district attorney’s office.

Here’s the colloquy.


As the news of Sidney Powell’s cooperation plea broke yesterday, there were people asking who could have predicted that Powell — the Kraken! — had turned state’s witness.

I laid out why she might flip back when the Georgia indictment came out.

One way the Georgia and federal indictments will interact is in the relative pressure between already being charged, in a state with strict pardon rules, and being not-yet charged, in a venue where Trump has pardoned his way out of criminal trouble in the past.

Five people are named as co-conspirators in both: Rudy (CC1 in the federal indictment), John Eastman (CC2), Powell (CC3), Jeffrey Clark (CC4) and Ken Chesebro (CC5).

Some of these people, like Sidney Powell, Trump might not consider pardoning in any case. Plus, Trump’s closest associates have spent the last week or so throwing her under the bus. But thus far at least, Powell’s personal legal risk is far greater in Georgia than federally.

Others, though, may think seriously about how much harder it would be to get a pardon for Georgia than a Federal indictment, where the next Republican President, possibly including Donald Trump, would be able to pardon them.

For Powell, more than anyone else, flipping was a wise option. She’s one of the five people charged in Georgia also described as co-conspirators in Jack Smith’s indictment (Boris Epshteyn is believed to be co-conspirator#6 in DC, but is being subpoenaed as a witness in Georgia).

All five are likely aware that loyalty in DC, which might win them a pardon if Trump wins in 2024, won’t save them in Georgia, where pardons are much harder to come by.

After Judge Scott McAfee rejected a Powell bid to dismiss the non-RICO charges against her, the decision to flip likely became a lot easier. The hacking charges with which she was charged were the most serious free-standing charges in the Georgia indictment.

Irrespective of what happens in DC, Powell traded cooperation and six years of probation — with the possibility of having the charges expunged — to avoid the possibility of serious state prison time that Trump couldn’t pardon away.

In any case, Powell is not among the insiders Trump would be quickest to pardon.

One thing about the decision: in spite of all the TV lawyers claiming she’ll make a terrible witness because she’s so batshit, this was an eminently rational decision. She sounded absolutely sane in yesterday’s plea hearing, as I imagine she did when he provided her videotaped testimony before pleading.

As to the question of whether that means Powell would cooperate in DC, it’s worth noting that we can’t even be sure we would know if she were cooperating. After all, few people covering the case account for the part of the investigation into Sidney Powell — for fundraising only tangentially related to any conspiracy with Trump — that was overt over two years ago, or the fact that Michael Flynn and Patrick Byrne had already underbussed her at that point. No one knows the full details about why she spent money raised in that fundraiser to fund the defense of people on the Oath Keepers (and probably others).

More importantly, those trying to imagine how her cooperation would impact Trump seem to imagine that we  understand the entire nature of any such cooperation. As I noted in August, the indictment actually includes Powell for just one purpose: to prove that Trump took advice from someone he was publicly identifying as crazy.

[H]er role — as described — is actually very limited. Just one paragraph describes her actions:

20. On November 16, 2020, on the Defendant’s behalf, his executive assistant sent Co-Conspirator 3 and others a document containing bullet points critical of a certain voting machine company, writing, “See attached – Please include as is, or almost as is, in lawsuit.” Co-Conspirator 3 responded nine minutes later, writing, “IT MUST GO IN ALL SUITS IN GA AND PA IMMEDIATELY WITH A FRAUD CLAIM THAT REQUIRES THE ENTIRE ELECTION TO BE SET ASIDE in those states and machines impounded for non-partisan professional inspection.” On November 25, Co-Conspirator 3 filed a lawsuit against the Governor of Georgia falsely alleging “massive election fraud” accomplished through the voting machine company’s election software and hardware. Before the lawsuit was even filed, the Defendant retweeted a post promoting it. The Defendant did this despite the fact that when he had discussed Co-Conspirator 3’s far-fetched public claims regarding the voting machine company in private with advisors, the Defendant had conceded that they were unsupported and that Co-Conspirator 3 sounded “crazy.” Co-Conspirator 3’s Georgia lawsuit was dismissed on December 7.

Go back and look! Her most famous role — when she got cleared into the White House and told Trump he should make her Special Counsel and seize the voting machines — doesn’t appear at all. Indeed, my greatest disappointment with the indictment is that it doesn’t explain one of the enduring mysteries of January 6: what led Trump to adopt January 6 as his plan shortly after that meeting.

It describes Trump’s December 19 tweet — the tweet that triggered thousands of MAGAts to start planning a trip to DC — but not what led up to it.

Curse you, Jack Smith!!!

Aside from proving he knowingly lied, the indictment doesn’t really tell us why Powell plays such a central part of the case against Trump.

There are, however, two details that I think are being missed: First, Powell played a key role in Fox’s platforming of propaganda, as laid out in the Dominion lawsuit (after the Fox settlement, Dominion’s lawsuit against Powell moved into a more active phase).

Fox brought her on and off the campaign, and had a role in her conspiracy theories.

And while Powell appeared on Fox only four times when she was even arguably part of the President’s team, and six times when Fox was clearly aware that she was not. As important, Fox was instrumental in maneuvering Powell both into the Trump campaign and then out of it.

Third, Fox ignores its own role in developing the conspiracy theories it then aired See Dom. MSJ pp.39-44

These two claims — that Fox “maneuvered Powell … out of” the Trump campaign and that they played a role in developing these conspiracy theories, are discussed in heavily redacted passages of the earlier filing (probably redacted because Fox has claimed it pertains to internal business deliberations).

The first — describing how Fox “maneuvered Powell … out of” the Trump campaign after Tucker came under fire for questioning Powell — consists of almost four full paragraphs introduced with a description that Fox, including Tucker and Raj Shah, “mobilized.”

“We won the battle with Powell. Thank god,” the passage quotes a Tucker text later. Dominion is now explaining that that “battle” pertained to getting Powell ousted from Trump’s orbit.

The second claim — that Fox was the source of some of these conspiracy theories — incorporates the description of how Fox got Powell ousted from the campaign, but also includes redacted passages describing Lou Dobbs’ role in “promoting the narrative,” another making a redacted reference to Hannity, as well as the unredacted reference to Bartiromo chasing an email from Sidney Powell that Powell herself said relied on a “wackadoodle” source. The later filing suggests the earlier filing goes as far as saying that Fox played part in developing the conspiracy theories.

That includes a December 10 Lou Dobbs appearance in which Powell claimed there had been a cyber Pearl Harbor that undermined the vote.

Nonetheless, on the next day, December 10, Dobbs had Powell on again, where she repeated the false (and repeatedly debunked) story about the Smartmatic and Dominion machines being designed to flip votes to rig elections for Hugo Chavez,and allowing people to login and manipulate votes . See ¶179(q );Appendix D. But rather than questioning Powell’s claims, Dobbs attacked Attorney General Barr for saying he’d seen no sign of any significant fraud that would overturn the election and told Powell “We will gladly put forward your evidence that supports your claim that this was a Cyber Pearl Harbor,” noting “we have tremendous evidence already,” id. which he now admits was not true. See Ex.111,Dobbs 46:25-47:10,86:20-24 . Dobbs had seen no evidence from Powell, nor has he since. Id.

Powell had sent her claims about a “Cyber Pearl Harbor” to Dobbs (who forwarded to his team) in advance of the show. Ex.450;Ex.451. Prior to the show, Dobbs published a tweet to the @loudobbs Twitter account with the claim that “The 2020 Election is a cyber Pearl Harbor,” and embedding the very document Powell had sent to him just hours before which stated that Dominion was one off our entities that had “executed an electoral 9-11 against the United States” and “a cyber Pearl Harbor,” that “there is an embedded controller in every Dominion machine,” and that they had “contracts ,program details, incriminating information ,and history” proving these claims.¶179(p); Appendix D.

Later the same day, after Powell appeared on the 5pm broadcast and before the 7pm unedited rebroadcast of the show, Dobbs again tweeted “Cyber Pearl Harbor @SidneyPowell reveals groundbreaking new evidence indicating our Presidential election came under massive cyber-attack orchestrated with the help of Dominion, Smartmatic, and foreign adversaries.” ¶179(r); Appendix D. Dobbs conceded at his deposition that this tweet was false Powell had not presented any such evidence on his program that day. Ex.111,Dobbs 269 :2-271:5.

Claims like that were the basis not just of Powell’s lawsuits that provided Trump cover that the election remained undecided, but also of Powell’s sustained effort to obtain Dominion data from swing states, the crime to which she just pled guilty. It was tied to a bid for Trump to use Commander-in-Chief authorities to steal the election.

The Georgia indictment claims that crime started on December 1, 2020 and lasted at least through April 2021.

Indeed, the way in which this pursuit of data was a continuation of and continued after January 6 is one of the most chilling parts of Anna Bower’s account of it. Bower first lays out good reason to suspect that Cathy Latham — another of the charged co-conspirators in the Georgia indictment — was in the Willard Hotel consulting with people like Bernie Kerik.

On Dec. 17, Marilyn Marks, the executive director of Coalition for Good Governance—the election security organization that initiated the Curling suit—texted Latham. Through the election activism grapevine, Marks had heard about the supposed problems with Dominion machines in Coffee, she said in an interview with Lawfare. Something sounded “suspicious” about it all, she said, but she wanted to learn more. She spoke with elections board member Chaney, who suggested that she get in touch with Latham.

Marks texted the GOP chairwoman, explaining that her organization was involved in litigation to move away from the use of Dominion systems in Georgia. Marks asked when Latham might be available to chat. Latham replied: “I am in D.C. right now and am about to meet with IT guys.”

Latham would later admit under oath that she visited D.C. for an unspecified period sometime in December. But she did not confirm the reason she gave at the time. In her deposition, rather, she claimed that she traveled to the capital city because she had been invited to go on a “tour” by a woman named Juliana Thompson, because Latham hadn’t been able to go the previous year.

“We [got] to see the Christmas trees, and I got to go to the Bible Museum,” she explained.

When asked if she met with anyone who was not with the D.C. tour group, Latham replied, “I’m going to plead the Fifth on that.”

But if Latham was in D.C. only to tour the Museum of the Bible and see Christmas trees, why did she tell Marks that she was “about to meet with IT guys”?

And Latham did admit in her deposition that she stayed at the Willard Hotel during her trip.

“That’s where I slept,” she said.

If the Willard Hotel rings a Jan. 6 bell, that’s because it served as the “command center” for the legal arm of the Trump campaign led by Giuliani in this period of time. The rooms were organized and paid for by Bernie Kerik, the former police commissioner of New York City, who worked for the Giuliani legal team as an investigator. Kerik later sought reimbursement for the rooms from the Trump campaign.

According to his testimony before the select committee, Kerik paid for the room of an unnamed “whistleblower” from Georgia who traveled to the Willard to meet with Giuliani sometime during the post-election period. The “whistleblower,” he said, had been brought to the hotel by William Ligon, a Georgia state senator, and an Atlanta-area attorney named Preston Haliburton. He did not specifically identify the whistleblower by name.

That said, later that month, on Dec. 30, Latham appeared alongside Giuliani and other Trump surrogates at a legislative hearing chaired by Ligon. At that hearing, Latham claimed “whistleblower” status as she testified about the alleged “problems” with Dominion Voting Systems machines that led Coffee County to refuse to certify its machine recount results. Haliburton, who was listed as “counsel of record for the Giuliani legal team,” also represented Latham at the hearing.

Latham, in her Curling deposition, denied that she had ever visited the Willard with Haliburton.

As Bower lays out, minutes after Trump called off the riot on January 6, the Coffee County caper — the crime to which both Powell and bail bondsman and David Bossie brother-in-law Scott Hall have already pled guilty — went into motion.

At 4:17 p.m. on Jan. 6, 2021, the president of the United States belatedly tweeted out his video message to the mob that had forcibly disrupted the counting of electoral votes. “You have to go home now,” he finally said.

But even as Giuliani was keeping up pressure on senators to “slow it down,” Coffee County officials were undeterred.

Nine minutes after the president’s tweet, at 4:26 p.m. that afternoon, Hampton sent a text to Chaney: “Scott Hall is on the phone with Cathy about wanting to come scan our ballots from the general election like we talked about the other day,” she wrote.

The next morning, on Jan. 7, Latham texted Hampton to tell her that the SullivanStrickler forensics team had departed Atlanta and were on their way to Coffee County. Hall, she added, was flying in, too. “Yay!!!!” Hampton responded. These events are also mentioned in Acts 142-143 of Count 1 of the Fulton County indictment.

Several minutes later, Paul Maggio, the chief operations officer of SullivanStrickler, sent an email to Powell, Logan, Penrose, and others. “We are on our way to Coffee County Georgia to collect what we can from the Election / Voting machines and systems,” he wrote, attaching an invoice for SullivanStrickler’s $26,000 retainer fee. The invoice billed Powell’s PAC, Defending the Republic.

This may be what Rudy was pointing to when he was pleading with Members of Congress to just buy some days.

It may also be why people like Kerik have been underbussing Powell: because they want to blame her for the plans that continued even after the attack on the Capitol.

I don’t know whether Powell will or even if she already has flipped federally.

What I’m more confident about, though, is that if she did, she’d offer testimony about things that are not widely understood, if at all.

Bret Baier’s False Claim, the Escort Service, and Former Fox News Pundit Keith Ablow

Deep into one version of what is referred to as the “Hunter Biden” “laptop,” (according to reports done for Washington Examiner by Gus Dimitrelos*) there’s a picture of a check, dated November 14, 2018, for $3,400, paid to a woman with a Slavic name. The check bears a signature that matches others, attributed to Hunter Biden, from the “laptop” also attributed to him. Along with a line crossing out Hunter’s ex-spouse’s name on the check, the check was marked on the memo line: “Blue Water Wellness” along with a word that is illegible–possibly “Rehab.”

The check appears in a chat thread, dated November 26, 2018, apparently initiated to set up tryst with an escort in New York  City. Just over 12 hours after setting up that tryst, the Russian or Ukrainian woman who manages the escort service, Eva, wrote back, asking Hunter if he was in New York, because she had a problem with his check, that $3,400 check dated twelve days earlier. Hunter was effusively apologetic, and offered to pay the presumed sex worker via wire, because it’s the only way he could be 100% certain it would get to her. Shortly thereafter, he sent two transfers from his Wells Fargo account, $3,200 plus $30 fees, directly to the woman’s bank account, and $800 via Zelle drawn on Wells Fargo.

Those transfers from Hunter Biden’s Wells Fargo account to a presumed sex worker with a Slavic name took place between the day, October 31, 2018, when IRS Agent Joseph Ziegler, newly arrived on IRS’ international tax squad, launched an investigation into an international online sex business and the day, December 10, 2018, when Ziegler would piggyback off that sex business investigation to launch an investigation into Hunter Biden. The Hunter Biden investigation was initially based off a Suspicious Activity Report from Wells Fargo sent on September 21, 2018 and from there, quickly focused on Hunter’s ties to Burisma, precisely the investigation the then President was demanding.

Understand: The entire five year long investigation of Hunter Biden was based off payments involving Wells Fargo quite similar to this one, the check for $3,400 to a sex worker associated (in this case, at least) with what Dimitrelos describes as an escort service.

Research on the company yielded bank reports indicating that [Hunter Biden] made payments to a U.S. contractor, who also had received payments from that U.K. company.

Only, this particular payment — the need to wire the presumed sex worker money to cover the check — ties the escort service to one of the businesses of former Fox News pundit Keith Ablow: Blue Water Wellness, a float spa just a few blocks down the road from where Ablow’s psychiatric practice was before it got shut down amid allegations of sex abuse of patients and a DEA investigation. Emails obtained from a different version of the “laptop” show that on November 13, Blue Water Wellness sent Hunter an appointment reminder, albeit for an appointment on November 17, not November 14. That appointment reminder is the first of around nine appointment reminders at the spa during the period.

The tryst with the presumed sex worker with the Slavic name does appear to have happened overnight between November 13 and 14.  Between 1:58 and 6:33AM, there were two attempts to sign into Hunter’s Venmo account from a new device, five verification codes sent to his email, and two password resets, along with the addition of the presumed sex worker to his Zelle account at Wells Fargo, which he would use to send her money over a week later. All that makes it appear like they were together, but Hunter didn’t have his phone, the phone he could use to pay her and so tried to do so from a different device. Maybe, he gave up, and simply wrote her a check, from the same account on which that Zelle account drew.

None of which explains why he appears to have written “Blue Water Wellness” on a check to pay a presumed sex worker. Maybe he was trying to cover up what he was paying for. Maybe he understood there to be a tie. Or maybe it was the advertising Blue Water did at the time.

Deep in a different part of the laptop analyzed by Dimitrelos, though, a deleted invoice shows that Hunter met with former Fox News pundit Keith Ablow on the same day as Hunter apparently wrote that check to the presumed sex worker. The deleted invoice reflects two 60-minute sessions billed by Baystate Psychiatry, the office just blocks away from the float spa.

Emails obtained from a different version of the “Hunter Biden” “laptop” show that at some point on November 26, 2018, as Hunter first arranged a tryst in New York City and then, no longer in New York, sent a wire directly from Wells Fargo to the presumed sex worker, someone accessed Hunter’s Venmo account from a new device — successfully this time — one located in Newburyport, MA, where former Fox News pundit Keith Ablow’s businesses were.

There are a number of things you’d need to do to rule out the possibility of Russian involvement in the process by which a laptop purportedly belonging to Hunter Biden showed up at the Wilmington repair shop of John Paul Mac Isaac, from there to be shared with Rudy Giuliani, who then shared it with three different Murdoch outlets and a ton of other right wing propagandists, many of them members of Congress.

One of those would be to rule out that any of the sex workers tied to this escort service had a role in compromising Hunter Biden’s digital identity, thereby obtaining credential information that would make it easy to package up a laptop that would be especially useful to those trying to destroy the life of the son of Donald Trump’s opponent. There’s no evidence that any of the sex workers were involved, but throughout 2018, there are a number of device accesses involving Hunter’s Venmo account, the iCloud account packaged up on “the laptop,” and different Google accounts — including between the day on November 13 when Hunter appears to have met the woman with the Slavic name and the date on November 26 when he wired her money — that should at least raise concerns that his digital identity had been compromised. I’ve laid out just a fraction of them in this post and this post, both of which focus on the later period when Hunter was in the care of the former Fox News pundit.

If you wanted to compromise Hunter Biden, as certain Russian-backed agents in Ukraine explicitly did, doing so via the sex workers, drug dealers, and fellow junkies he consorted with in this period would be painfully easy. Indeed, in Hunter’s book, he even described other addicts walking off with his, “watch or jacket or iPad—happened all the time.” Every single one of those iPads that walked away might include the keys to Hunter’s digital life, and as such, would be worth a tremendous amount of money to those looking to score their next fix. To rule out Russian involvement, you’d have to ID every single one of them and rule out that they were used for ongoing compromise of Hunter or, barring that, you’d have to come up with explanations, such as the likelihood that Hunter was trying to pay a sex worker but didn’t have his phone with him and so used hers, for the huge number of accesses to his accounts, especially the iCloud account ultimately packaged up.

Of course, explaining how a laptop purportedly belonging to Hunter Biden showed up at Mac Isaac’s shop would also require explaining how a laptop definitely belonging to Hunter Biden came to be left in former Fox News pundit Keith Ablow’s possession during precisely the same period when (it appears) Hunter Biden’s digital life was getting packaged up, a laptop Ablow did nothing to return to its owner and so still had when the DEA seized it.

Bret Baier lied about the Hunter Biden laptop

Given the unanswered questions about the role of a former Fox News pundit in all this, you’d think that Fox personalities would scrupulously adhere to the truth about the matter, if for no other reason than to avoid being legally implicated in any conspiracies their former colleague might have been involved with, or to avoid kicking off another expensive defamation lawsuit.

Sadly, Bret Baier couldn’t manage to stick to the truth in his attempt to sandbag former CIA Director Leon Panetta on Friday. Baier debauched the gravity of an appearance purportedly focused on the Hamas attack and aftermath,  with what he must have thought was a clever gotcha question about a letter Leon Panetta signed in October 2020 stating the opinion that the emails being pitched by Murdoch outlet New York Post, “has all the classic earmarks of a Russian information operation.” The letter not only expressed an opinion, but it cited four specific data points and two observations about known Russian methods, all of which were and remain true to to this day.

And in the process, Bret Baier made a false claim.

Bret Baier made a false claim and all of Fox News’ watchers and all the other propagandists made the clip of Bret Baier making a false claim go viral, because they apparently either don’t know or don’t care that Baier couldn’t even get basic facts right. They are positively giddy that Baier used the tragedy of a terrorist attack to demonstrate his own ignorance or willful deceit about Fox’s favorite story, Hunter Biden’s dick pics.

From the get-go, Baier adopted a rhetorical move commonly used by Murdoch employees and frothy right wingers sustaining their blind faith in “the laptop:” He conflated “the laptop” with individual emails.

Baier: I’d be remiss if I didn’t ask you about that letter you signed onto from former intelligence officials saying that the laptop and the emails had all the classic earmarks of a Russian information operation. Obviously the New York Post and others saying the Hunter Biden letter was the real disinformation all along. Um, that letter was used in the debate, I haven’t asked you this. But do you have regrets about that, now looking back, knowing what you know now? [my emphasis]

The spooks’ letter Panetta signed addressed emails, not “the laptop.” The only use of the word “laptop” in the letter was in labeling this a potential “laptop op,” a way to package up emails meant to discredit Joe Biden. The letter even includes “the dumping of accurate information” among the methods used in Russian information operations.

Having conflated emails and “the laptop,” Baier then asked whether Panetta thinks “it,” now referring just to “the laptop,” not even the hard drives of copies from the laptop in question, was real.

Panetta: Well, you know, Bret, I was extremely concerned about Russian interference and misinformation. And we all know it. Intelligence agencies discovered that Russia had continued to push disinformation across the board. And my concern was to kind of alert the public to be aware that these disinformation efforts went on. And frankly, I haven’t seen any evidence from any intelligence that that was not the case.

Baier: You don’t think that it was real?

Having first conflated emails and the laptop, then substituted the laptop for the emails addressed in the letter, Baier then falsely claimed that, “Hunter Biden said it was his laptop.”

Panetta: I think that, I think that disinformation is involved here. I think Russian disinformation is part of what we’re seeing everywhere. I don’t trust the Russians. And that’s exactly why I was concerned that the public not trust the Russians either.

Baier: I don’t want to dwell on this because we have bigger things to talk about. Bigger urgency. But obviously, Hunter Biden said it was his laptop, and this investigation continues. [my emphasis]

I understand how frothy right wingers misunderstand what Hunter Biden has said about the data associated with “the laptop,” but Baier presents as a journalist, and you’d think he’d take the time to read the primary documents.

Hunter Biden admits some data is his, but denies knowledge of the “laptop”

The claim that Hunter Biden has said “the laptop” was his arises from three lawsuits: first, from Hunter Biden’s response and counterclaim to John Paul Mac Isaac’s lawsuit, then of Hunter’s lawsuit against Garrett Ziegler, and finally, the lawsuit against Rudy Giuliani.

Regarding the first of those filings, Hunter Biden based his countersuit against JPMI on an admission that JPMI came into possession of electronically stored data, at least some of which belonged to him. But he specifically did not admit that JPMI “possessed any particular laptop … belonging to Mr. Biden.”

5. In or before April 2019, Counterclaim Defendant Mac Isaac, by whatever means, came into possession of certain electronically stored data, at least some of which belonged to Counterclaim Plaintiff Biden.1

1 This is not an admission by Mr. Biden that Mac Isaac (or others) in fact possessed any particular laptop containing electronically stored data belonging to Mr. Biden. Rather, Mr. Biden simply acknowledges that at some point, Mac Isaac obtained electronically stored data, some of which belonged to Mr. Biden.

Regarding JPMI’s claims that Hunter dropped off the laptop,

169. HUNTER knowingly left his laptop with Plaintiff on April 12, 2019.

170. Soon thereafter HUNTER returned to Plaintiff’s shop to leave an external hard drive to which Plaintiff could transfer the data from HUNTER’s laptop.

171. HUNTER never returned to Plaintiff’s shop pick up his laptop

Hunter denied sufficient knowledge to answer all of them.

169. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 169.

170. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 170.

171. Mr. Biden admits that, if he ever had visited before, he did not return to Plaintiff’s shop.

In response to JPMI’s claim that Hunter knew of the phone call his lawyer, George Mesires, made to JPMI in October 2020 and the email follow-up that in any case doesn’t substantiate what JPMI claimed about the phone call,

31. On October 13, 2020, Plaintiff received a call from Mr. George Mesires,1 identifying himself as HUNTER’s attorney, asking if Plaintiff still had possession of his client’s laptop and following up thereafter with an email to the Plaintiff. Copy of email attached as EXHIBIT C.

[snip]

174. HUNTER’s attorney, George Mesires contacted Plaintiff on October 13, 2020 about the laptop.

Hunter admitted that Mesires was his attorney but denied knowing anything more.

31. Mr. Biden admits that Mr. George Mesires was his attorney. Mr. Biden is without knowledge sufficient to admit or deny the remaining allegations in paragraph 31.

[snip]

174. Mr. Biden admits that Mr. Mesires was his attorney. Mr. Biden is without knowledge sufficient to admit or deny the remaining allegations in paragraph 174.

In response to JPMI’s claim that Hunter Biden said something about the laptop without mentioning JPMI,

172. When asked about the laptop in a television interview broadcast around the world, HUNTER stated, “There could be a laptop out there that was stolen from me. It could be that I was hacked. It could be that it was the – that it was Russian intelligence. It could be that it was stolen from me. Or that there was a laptop stolen from me.” See https://edition.cnn.com/2021/04/02/politics/hunterbiden-laptop/index.html.

173. HUNTER knew it was his laptop.

Hunter Biden admitted he made the comment that didn’t mention JPMI — a comment on which JPMI based a $1.5M defamation claim!! — but again denied knowing whether or not the laptop was his.

172. Admitted and Mr. Biden further answers that the statement makes no mention of or even a reference to Plaintiff.

173. Mr. Biden is without knowledge sufficient to admit or deny the allegations in paragraph 173.

Of some interest, in response to JPMI’s claim that the information that appeared in the NYPost came from Hunter, who voluntarily left his laptop with JPMI,

67. The information contained in the NY POST exposé came from HUNTER who voluntarily left his laptop with the Plaintiff and failed to return to retrieve it.

Hunter outright denied the claim.

67. Denied.

Hunter Biden claimed that Rudy hacked Hunter’s data

That last claim — the outright denial that the data in the NYPost story came from Hunter — is of particular interest given something Denver Riggleman recently said. He described that the Hunter Biden team now has the data that JPMI shared with others — apparently thanks to this countersuit — and they’ve used it to compare with the data distributed forward from there.

Also, we know now, since the Hunter Biden team has the John Paul Mac Isaac data that was given to Rudy Giuliani and given to CBS, we also know that that data had no forensic chain of custody and it was not a forensic copy of any type of laptop, or even multiple devices that we can see. It was just a copy-paste of files, more or less.

[snip]

We know that there’s different data sets in different portions of the Internet attributed to Hunter’s data — or, to Hunter’s laptop.

[nip]

Now that we do have forensic data — Hunter Biden team has more foensic data than anybody else out there — we can actually start to compare and contrast. And that’s why you see the aggressiveness from the Hunter Biden legal team.

The lawsuit against Rudy and Costello claims that at some point, Rudy and Costello did things that amount to accessing Hunter’s data unlawfully. Hacking.

23. Following these communications, Mac Isaac apparently sent via FedEx a copy of the data he claimed to have obtained from Plaintiff to Defendant Costello’s personal residence in New York on an “external drive.” Once the data was received by Defendants, Defendants repeatedly “booted up” the drive; they repeatedly accessed Plaintiff’s account to gain access to the drive; and they proceeded to tamper with, manipulate, alter, damage and create “bootable copies” of Plaintiff’s data over a period of many months, if not years. 2

24. Plaintiff has discovered (and is continuing to discover) facts concerning Defendants’ hacking activities and the damages being caused by those activities through Defendants’ public statements in 2022 and 2023. During one interview, which was published on or about September 12, 2022, Defendant Costello demonstrated for a reporter precisely how Defendants had gone about illegally accessing, tampering with, manipulating and altering Plaintiff’s data:

“Sitting at a desk in the living room of his home in Manhasset, [Defendant Costello], who was dressed for golf, booted up his computer. ‘How do I do this again?’ he asked himself, as a login window popped up with [Plaintiff’s] username . . .”3

By booting up and logging into an “external drive” containing Plaintiff’s data and using Plaintiff’s username to gain access Plaintiff’s data, Defendant Costello unlawfully accessed, tampered with and manipulated Plaintiff’s data in violation of federal and state law. Plaintiff is informed and believes and thereon alleges that Defendants used similar means to unlawfully access Plaintiff’s data many times over many months and that their illegal hacking activities are continuing to this day.

[snip]

26. For example, Defendant Costello has stated publicly that, after initially accessing the data, he “scrolled through the laptop’s [i.e., hard drive’s] email inbox” containing Plaintiff’s data reflecting thousands of emails, bank statements and other financial documents. Defendant Costello also has admitted publicly that he accessed and reviewed Plaintiff’s data reflecting what he claimed to be “the laptop’s photo roll,” including personal photos that, according to Defendant Costello himself, “made [him] feel like a voyeur” when he accessed and reviewed them.

27. By way of further example, Defendant Costello has stated publicly that he intentionally tampered with, manipulated, and altered Plaintiff’s data by causing the data to be “cleaned up” from its original form (whatever this means) and by creating “a number of new [digital] folders, with titles like ‘Salacious Pics’ and ‘The Big Guy.’” Neither Mac Issac nor Defendants have ever claimed to use forensically sound methods for their hacking activities. Not surprisingly, forensic experts who have examined for themselves copies of data purportedly obtained from Plaintiff’s “laptop” (which data also appears to have been obtained at some point from Mac Isaac) have found that sloppy or intentional mishandling of the data damaged digital records, altered cryptographic featuresin the data, and reduced the forensic quality of data to “garbage.”

2 Plaintiff’s investigation indicates that the data Defendant Costello initially received from Mac Isaac was incomplete, was not forensically preserved, and that it had been altered and tampered with before Mac Issac delivered it to Defendant Costello; Defendant Costello then engaged in forensically unsound hacking activities of his own that caused further alterations and additional damage to the data he had received. Discovery is needed to determine exactly what data of Plaintiff Defendants received, when they received it, and the extent to which it was altered, manipulated and damaged both before and after receipt.

3 Andrew Rice & Olivia Nuzzi, The Sordid Saga of Hunter Biden’s Laptop, N.Y. MAG. (Sept. 12, 2022), https://nymag.com/intelligencer/article/hunter-biden-laptop- investigation.html.

I don’t think Hunter’s team would have compared the data Rudy shared with the NYPost before Hunter denied, outright, that “The information contained in the NY POST exposé came from HUNTER.” But based on what Riggleman claimed, they have since, and did compare it, before accusing Rudy and a prominent NY lawyer of hacking Hunter Biden’s data.

Hunter Biden’s team admits they don’t know the precise timing of this: “the precise timing and manner by which Defendants obtained Plaintiff’s data remains unknown to Plaintiff.” DDOSecrets points to several emails that suggest Rudy and Costello did more than simply review available data, however. For example, it points to this email created on September 2, 2020, just after the former President’s lawyer got the hard drive.

September 2, 2020: A variation of a Burisma email from 2016 is created and added to the cache. The email and file metadata both indicate it was created on September 2, 2020.

But the lawsuit, if proven, suggests the possibility that between the time JPMI shared the data with Rudy and the time Rudy shared it with NYPost, Rudy may have committed federal violations of the Computer Federal Fraud and Abuse Act — that is, Hunter alleges that between the time JPMI shared the data and the time NYPost published derivative data, Rudy may have hacked Hunter Biden’s data.

If he could prove that, it means the basis Twitter gave for throttling the NYPost story in October 2020 — they suspected the story included materials that violated Twitter’s then prohibition on publishing hacked data — would be entirely vindicated.

For example, on October 14th, 2020, the New York Post tweeted articles about Hunter Biden’s laptop with embedded images that look like they may have been obtained through hacking. In 2018, we had developed a policy intended to, to prevent Twitter from becoming a dumping ground for hacked materials. We applied this policy to the New York Post tweets and blocked links to the articles embedding those source materials. At no point did Twitter otherwise prevent tweeting, reporting, discussing or describing the contents of Mr. Biden’s laptop.

[snip]

My team and I exposed hundreds of thousands of these accounts from Russia, but also from Iran, China and beyond. It’s a concern with these foreign interference campaigns that informed Twitter’s approach to the Hunter Biden laptop story. In 2020, Twitter noticed activity related to the laptop that at first glance bore a lot of similarities to the 2016 Russian hack and leak operation targeting the dnc, and we had to decide what to do, and in that moment with limited information, Twitter made a mistake under the distribution of hacked material policy.

If Hunter can prove that — no matter what happened in the process of packaging up this data before it got to JPMI, whether it involved the compromise of Hunter’s digital identity before JPMI got the data, which itself would have been a hack that would also vindicate Twitter’s throttling of the story  — it would mean all the data that has been publicly released is downstream from hacking.

For Twitter, it wouldn’t matter whether the data was hacked by Russia or by Donald Trump’s personal lawyer, it would still violate the policy as it existed at the time.

Importantly, this remains a claim about data, not about a laptop. The lawsuit against Rudy and Costello repeats the claim made in the JPMI counterclaim: while JPMI had data, some of which belongs to Hunter, Hunter is not — contrary to Bret Baier’s false claim — admitting that, “Hunter Biden said it was his laptop.”

2. Defendants themselves admit that their purported possession of a “laptop” is in fact not a “laptop” at all. It is, according to their own public statements, an “external drive” that Defendants were told contained hundreds of gigabytes of Plaintiff’s personal data. At least some of the data that Defendants obtained, copied, and proceeded to hack into and tamper with belongs to Plaintiff.1

1 This is not an admission by Plaintiff that John Paul Mac Isaac (or others) in fact possessed any particular laptop containing electronically stored data belonging to Plaintiff. Rather, Plaintiff simply acknowledges that at some point, Mac Isaac obtained electronically stored data, some of which belonged to Plaintiff.

In two lawsuits, Hunter Biden explicitly said that he was not admitting what Baier falsely claimed he had.

I know this is Fox News, but Baier just blithely interrupted a sober discussion about a terrorist attack to make a false claim about “the laptop.”

Hunter Biden claims that Garrett Ziegler hacked Hunter’s iPhone

Hunter Biden’s approach is different in the Garrett Ziegler lawsuit, in which he notes over and over that Ziegler bragged about accessing something he claimed to be Hunter Biden’s laptop, but which was really, “a hard drive that Defendants claim to be of Plaintiff’s ‘laptop’ computer.” By the time things got so far downstream to Ziegler, there was no pretense this was actually a laptop, no matter what Baier interrupted a discussion about terrorism to falsely claim.

But that paragraph explicitly denying admission about this being a laptop is not in the Ziegler suit.

There’s a likely reason for that. The core part of the claim against Ziegler is that Ziegler unlawfully accessed a real back-up of Hunter Biden’s iPhone, which was stored in encrypted form in iTunes — just as I laid out had to have happened months before that lawsuit.

28. Plaintiff further is informed and believes and thereon alleges that at least some of the data that Defendants have accessed, tampered with, manipulated, damaged and copied without Plaintiff’s authorization or consent originally was stored on Plaintiff’s iPhone and backed-up to Plaintiff’s iCloud storage. On information and belief, Defendants gained their unlawful access to Plaintiff’s iPhone data by circumventing technical or code-based barriers that were specifically designed and intended to prevent such access.

29. In an interview that occurred in or around December 2022, Defendant Ziegler bragged that Defendants had hacked their way into data purportedly stored on or originating from Plaintiff’s iPhone: “And we actually got into [Plaintiff’s] iPhone backup, we were the first group to do it in June of 2022, we cracked the encrypted code that was stored on his laptop.” After “cracking the encrypted code that was stored on [Plaintiff’s] laptop,” Defendants illegally accessed the data from the iPhone backup, and then uploaded Plaintiff’s encrypted iPhone data to their website, where it remains accessible to this day. It appears that data that Defendants have uploaded to their website from Plaintiff’s encrypted “iPhone backup,” like data that Defendants have uploaded from their copy of the hard drive of the “Biden laptop,” has been manipulated, tampered with, altered and/or damaged by Defendants. The precise nature and extent of Defendants’ manipulation, tampering, alteration, damage and copying of Plaintiff’s data, either from their copy of the hard drive of the claimed “Biden laptop” or from Plaintiff’s encrypted “iPhone backup” (or from some other source), is unknown to Plaintiff due to Defendants’ continuing refusal to return the data to Plaintiff so that it can be analyzed or inspected. [my emphasis]

Hunter Biden’s team has backup for this assertion, thanks to the notes Gary Shapley took in an October 22, 2022 meeting about what was an actual laptop JPMI handed over to the FBI. On that laptop — which the FBI had confirmed was associated with Hunter Biden’s iCloud account and which it tied to data that could all be falsifiable to someone in possession of the laptop, which had means to intercept and redirect emails and calls to Hunter’s real devices, but which the FBI still had not validated 10 months after obtaining it — the iPhone content was encrypted.

Laptop — iphone messages were on the hard drive but encrypted they didn’t get those messages until they looked at laptop and found a business card with the password on it so they were able to get into the iphone messages [my emphasis]

Even the FBI needed to find a password to access the iPhone content that Ziegler has bragged about accessing. (Note: there have been four known accesses to this data, and every single one of them claims to have used a different means to break the encryption, which in my mind raises real questions about the nature of the business card). But the FBI had a warrant. Ziegler did not.

There are still a great deal of questions one would have to answer before entirely ruling out that Russians were involved in the process of packaging up Hunter Biden’s digital identity; the possible role of a Russian escort service is only one of at least three possible ways Russia might be involved. Yet Bret Baier is unwilling to pursue those questions — starting with the unanswered questions about the role that Baier’s former Fox News colleague played.

But with all those unanswered questions, Baier was nevertheless willing to interrupt a discussion about terrorism to make false claims about what is known.

Update: I’ve taken out that this was specifically a Russian escort service. Some outlets claim Eva is Ukrainian. Dimitrelos does claim that Hunter searched for “Russian escort service,” though.

Update: Added the Bluewater Wellness Intramuscular Injection ad from October 2018.

Update: Added the observation about a newly created email from DDOSecrets.

Update: I was reminded of Bret Baier’s opinion in the same days when Leon Panetta was expressing his doubts about this story.

During a panel on his Thursday evening show, Baier addressed the Post‘s story and the decision by both Twitter and Facebook to limit sharing of the story on their respective platforms because of concerns about spreading misinformation. The move elicited fierce pushback from conservatives and sparked a vote on a Congressional subpoena of Twitter CEO Jack Dorsey.

“The Biden campaign says the meeting never happened, it wasn’t on the schedules, they say,” Baier noted. “And the email itself says ‘set up’ for a meeting” instead of discussing an actual meeting.

Baier then played an audio clip from a SiriusXM radio interview of Giuliani, where he appeared to alter the original details of who dropped off the laptop from which the emails in question were purportedly obtained. The computer store owner who gave a copy of the laptop’s hard drive to Giuliani was also heard explaining how he is legally blind and couldn’t for certain identify just who delivered the computer to him.

” Let’s say, just not sugarcoat it. The whole thing is sketchy,” Baier acknowledged. “You couldn’t write this script in 19 days from an election, but we are digging into where this computer is and the emails and the authenticity of it.”

Featured image courtesy of Thomas Fine.


*As I have noted in the past, Dimitrelos prohibited me from republishing his reports unless I indemnify him for the privacy violations involved. I have chosen instead — and am still attempting — to get permission from Hunter Biden’s representatives to reproduce redacted parts of this report that strongly back Hunter’s claim of being hacked.

Hunter Biden Threatens to Make Robert Costello’s Dalliance with Rudy Giuliani Even More Costly

Last week, Robert Costello’s law firm sued Rudy Giuliani — as they earlier successfully sued Steve Bannon for a far smaller amount earlier this year — for stiffing them on payments amounting to almost $1.4 million.

In a statement provided by a spokesman, Mr. Giuliani lashed out at Mr. Costello and the lawsuit, portraying it as an overly aggressive attempt to collect.

“I can’t express how personally hurt I am by what Bob Costello has done,” Mr. Giuliani said. “It’s a real shame when lawyers do things like this, and all I will say is that their bill is way in excess to anything approaching legitimate fees.”

Reached by phone, Mr. Costello initially declined to comment but fired back after hearing Mr. Giuliani’s statement, asking, “How can he take a personal affront when he owes my firm nearly $1.4 million?”

Mr. Costello also disputed the claim that the bills were excessive, saying that he billed his regular hourly rate and that Mr. Giuliani never complained about the cost until Davidoff Hutcher & Citron warned that it had planned to sue.

“He’s a little late to that party,” Mr. Costello said, adding, “it’s too late for that frivolous claim as he will find out in court.”

Mr. Giuliani, he said, “took the low road here because he is feeling desperate.”

In all, Mr. Costello’s firm has billed Mr. Giuliani $1,574,196, according to the lawsuit. Of that, Mr. Giuliani has paid only $214,000, the lawsuit said, most recently handing over $10,000 last week.

Rudy doesn’t have the money to pay Costello. This lawsuit can only serve to pressure Rudy to get Trump to pay up, something he has thus far refused to do.

In any case, Costello’s costs for enabling Rudy’s shenanigans may well grow, now that Hunter Biden has sued both of them for hacking his personal data.

The lawsuit largely parallels the lawsuit filed earlier against Garrett Ziegler — though the evidence that first Costello and then Rudy hacked the data is based on a different access claim. Hunter alleges (with merit) that Ziegler unlawfully accessed encrypted data that had been saved to Hunter’s iTunes account.

In this suit, the hacking claim appears to be two-fold: first, Costello’s demonstration to Olivia Nuzzi of how he accessed Hunter’s email account using Hunter’s own credentials.

24. Plaintiff has discovered (and is continuing to discover) facts concerning Defendants’ hacking activities and the damages being caused by those activities through Defendants’ public statements in 2022 and 2023. During one interview, which was published on or about September 12, 2022, Defendant Costello demonstrated for a reporter precisely how Defendants had gone about illegally accessing, tampering with, manipulating and altering Plaintiff’s data:

“Sitting at a desk in the living room of his home in Manhasset, [Defendant Costello], who was dressed for golf, booted up his computer. ‘How do I do this again?’ he asked himself, as a login window popped up with [Plaintiff’s] username . . .”3

By booting up and logging into an “external drive” containing Plaintiff’s data and using Plaintiff’s username to gain access Plaintiff’s data, Defendant Costello unlawfully accessed, tampered with and manipulated Plaintiff’s data in violation of federal and state law. Plaintiff is informed and believes and thereon alleges that Defendants used similar means to unlawfully access Plaintiff’s data many times over many months and that their illegal hacking activities are continuing to this day.

3 Andrew Rice & Olivia Nuzzi, The Sordid Saga of Hunter Biden’s Laptop, N.Y. MAG. (Sept. 12, 2022), https://nymag.com/intelligencer/article/hunter-biden-laptop- investigation.html.

I’ve been told that because of the way the data was stored, booting the hard drive up would update emails onto the hard drive, including any emails altered during the November 2019 Burisma hack. But using Hunter’s credentials — if that’s what Costello did — would be a CFAA violation unto itself.

Additionally, the complaint notes that both Costello and Rudy boasted about accessing Hunter’s camera roll.

26. For example, Defendant Costello has stated publicly that, after initially accessing the data, he “scrolled through the laptop’s [i.e., hard drive’s] email inbox” containing Plaintiff’s data reflecting thousands of emails, bank statements and other financial documents. Defendant Costello also has admitted publicly that he accessed and reviewed Plaintiff’s data reflecting what he claimed to be “the laptop’s photo roll,” including personal photos that, according to Defendant Costello himself, “made [him] feel like a voyeur” when he accessed and reviewed them.

[snip]

31. By way of further example, in an episode of the podcast “Louder with Crowder” in late 2022, Defendant Giuliani held up a laptop computer on air and announced: “This is the hard drive they’re on,” referring to data (e.g., photographs) he apparently carries around with him on a daily basis, presumably so that he can continuously access, tamper with and manipulate the data whenever and wherever he desires.

Hunter’s team may know that these photos would not have been available without a password.

Note, the complaint makes some interesting allegations about John Paul Mac Isaac’s own actions; I would be unsurprised if Hunter sues him next.

23. Following these communications, Mac Isaac apparently sent via FedEx a copy of the data he claimed to have obtained from Plaintiff to Defendant Costello’s personal residence in New York on an “external drive.” Once the data was received by Defendants, Defendants repeatedly “booted up” the drive; they repeatedly accessed Plaintiff’s account to gain access to the drive; and they proceeded to tamper with, manipulate, alter, damage and create “bootable copies” of Plaintiff’s data over a period of many months, if not years.

2. Plaintiff’s investigation indicates that the data Defendant Costello initially received from Mac Isaac was incomplete, was not forensically preserved, and that it had been altered and tampered with before Mac Issac delivered it to Defendant Costello; Defendant Costello then engaged in forensically unsound hacking activities of his own that caused further alterations and additional damage to the data he had received. Discovery is needed to determine exactly what data of Plaintiff Defendants received, when they received it, and the extent to which it was altered, manipulated and damaged both before and after receipt.

Mac Isaac admits in his book that the copy he made of the laptop he received was not a forensic copy.

As with Costello’s suit, the lawsuit against Rudy is drilling a dry hole. Rudy is broke, and even if Hunter prevailed, he’d be at the back of a long line of creditors at some time Rudy declares bankruptcy.

But the discovery is something else.

So, too, is Costello’s role in all that, which he may or may not be claiming is part of attorney-client privileged activities, a claim that would he impossible to sustain in light of the Nuzzi profile.

And, in the shorter term, these lawsuits provide basis to claim that DE USAO is pursuing Hunter for misdemeanor tax charges, while ignoring the way the President’s son was and continues to be serially hacked by his father’s opponents.

Update: Politico includes this quote in their report on the lawsuit.

Giuliani and his allies have long argued that the purported laptop was fair game because it was allegedly abandoned. But at the heart of the lawsuit is the argument that regardless of where any piece of computer hardware was located, Hunter Biden’s data still belongs to him alone. A member of his legal team, granted anonymity to discuss his newly aggressive legal strategy, put it this way: “If you take your coat to the dry cleaner and leave your wallet in it, and you forget to pick it up, it doesn’t mean the dry cleaner gets the wallet and all your money. It’s just common sense.”

The member of his legal team hinted that more litigation could follow.

“Everyone involved in stealing and manipulating Hunter’s data should be hearing footsteps right about now,” that person said.

I don’t think people yet have considered the full scope of people this might include.

The Various Kinds of Georgia Crimes in the RICO Indictment

There’s so much good reporting out of Georgia that I’m going to mostly leave close coverage of the Georgia case to them going forward.

But the Georgia prosecution will interact with Jack Smith’s ongoing investigation in interesting ways. To explain how, I want to first show that the indictment is, fundamentally, about protecting the integrity of Georgia’s government and elections. To see that, it helps to read counts 2 through 41 before reading the RICO charge, which is laid out in 70 pages describing 161 overt acts, many of which took place outside of Georgia.

Those counts fall into the following groups:

Lies to and solicitation of Georgia officials

Count 2 though Count 7: False claims and illegal requests made, many by Rudy Giuliani, before the fake electors scheme. These were lies told to official bodies of Georgia state government, and charging them is an attempt to prevent corruption in state government.

Count 23 through Count 26 charge Rudy, Ray Smith, and Robert Cheeley with false claims and solicitations on December 30 — similar in structure and purpose to Counts 2 through 7.

Count 28 charges both Trump and Mark Meadows for the January 2 call to Brad Raffensperger. Count 29 charges Trump for the lies he told during the call.

Counts 38 and 39 charge Trump with lies and solicitations of Brad Raffensperger on September 17, 2021.

Fake electors

Count 8 through Count 19: These are a series of six paired charges tied to various kinds of fraud involved with the fake electors. In each pair, the first count charges David Shafer, Shawn Still, and Cathleen Latham for doing the fraudulent thing, and the second count charges Trump, Rudy, John Eastman, Ken Chesebro, Ray Smith, Robert Cheeley, and Mike Roman with soliciting the fraudulent thing. They’re a near parallel to the Michigan charges against the fake electors, except that in Georgia only the three most culpable fake electors are charged, and there’s a mirror charge for Trump’s side of the conspiracy.

Attempts to entrap Ruby Freeman

Counts 20 and 21 and : These charge two efforts to defraud Ruby Freeman by offering her help when in fact they were an attempt to entrap her.

Count 30 and Count 31 charge aspects of a plot to get Kanye’s publicist to travel from Illinois to Georgia to entrap Ruby Freeman into making false claims.

Lies about Georgia

Count 22 charges Jeffrey Clark for his attempts to get DOJ to claim the Georgia election was fraudulent.

Count 27 charges Trump and Eastman with lying about Georgia’s results in a lawsuit.

Tampering with Coffee County tabulators

Count 32 through Count 37 charge Sidney Powell, Latham, and two others for tampering with the Coffee County vote tabulators. Again, this has a parallel in the Michigan charges against Matt DePerno and two others.

Lies during the investigation

Count 40 charges David Shafer with false statements told during the investigation.

Count 41 charges Robert Cheeley with perjury for false claims made during the investigation.

As I understand it, these are the charges on which the RICO conspiracy is built. The RICO conspiracy gives prosecutors additional tools and penalties with which to prosecute this (similar to the conspiracy law charged at the federal level). But ultimately it is built on a series of crimes charged to protect the integrity of Georgia’s government. They stand for the principle that you can’t simply come into Georgia and lie and defraud in an attempt to get state officials to violate their oaths of office.

Update: Corrected spelling of Cheeley’s last name.

The Overt Investigative Steps into Trump’s Co-Conspirators TV Lawyers Ignored

The first overt act in the investigation into Donald Trump’s six co-conspirators happened on January 25, 2021.

The Jeffrey Clark investigation started at DOJ IG

On that day, DOJ Inspector General Michael Horowitz announced that he was opening an investigation, “into whether any former or current DOJ official engaged in an improper attempt to have DOJ seek to alter the outcome of the 2020 Presidential Election.” The announcement came three days after Katie Benner did a story laying out Jeffrey Clark’s efforts to undermine the election results. Horowitz explained that he made the announcement, “to reassure the public that an appropriate agency is investigating the allegations.”

We don’t know all the details about what happened between Horowitz’s announcement of that investigation and last week’s indictment describing Clark as co-conspirator 4. Probably, when Merrick Garland arranged for Joe Biden to waive Executive Privilege so Jeffrey Rosen and others could tell the Senate Judiciary Committee what happened in July 2021, that freed up some communications to DOJ IG. For the record, I raised questions about why it took so long — though I suspect the delay in restoring the contacts policy at DOJ was part of it. Some time before May 26, 2022, DOJ obtained warrants for a private Jeffrey Clark email account and on May 26, Beryl Howell approved a filter process. On June 23, 2022, the FBI seized Clark’s phone — with some involvement of DOJ IG — and the next day DOJ seized a second email account of Clark’s. When FBI seized Clark’s phone, I predicted it would take at least six months to fully exploit Clark’s phone, because that’s what it was generally taking, even without a complex privilege review. Indeed, five months after first seizing some of Clark’s cloud content, on September 27, 2022, he was continuing to make frivolous privilege claims to keep his own account of the events leading up to January 6 out of the hands of investigators.

The first overt act in the investigation into one of Trump’s co-conspirators happened 926 days ago. Yet TV lawyers continue to insist the investigation that has resulted in an indictment including Clark as Donald Trump’s co-conspirator didn’t start in earnest until Jack Smith was appointed in November 2022.

A privilege review of Rudy’s devices was set in motion (in the Ukraine investigation) in April 2021

Clark is not the only one of Trump’s co-conspirators against whom investigative steps occurred in 2021, when TV lawyers were wailing that nothing was going on.

Take the December 6, 2020 Kenneth Chesebro memo that forms part of the progression mapped in the indictment from Chesebro’s efforts to preserve Wisconsin votes to trying to steal them. NYT liberated a copy and wrote it up here. It’s not clear where DOJ first obtained a copy, but one place it was available, which DOJ took steps to obtain starting on April 21, 2021 and which other parts of DOJ would have obtained by January 19, 2022, was on one of the devices seized from Rudy Giuliani in the Ukraine influence-peddling investigation. The PDF of a December 6 Kenneth Chesebro memo shows up in Rudy’s privilege log in the Ruby Freeman suit, marked with a Bates stamp from the Special Master review initiated by SDNY.

While Rudy is claiming privilege over it in Freeman’s lawsuit, it is highly likely Barbara Jones ruled that it was not (only 43 documents, total, were deemed privileged in that review, and there are easily that many emails pertaining to Rudy’s own defense in his privilege log).

The way in which SDNY did that privilege review, in which SDNY asked and Judge Paul Oetken granted in September 2021 that the review would cover all content post-dating January 1, 2018, was public in real time. I noted in December 2021, that Rudy’s coup-related content would be accessible, having undergone a privilege review, at any such time as DC investigators obtained probable cause for a warrant to access it.

Since then, Rudy has claimed — to the extent that claims by Rudy are worth much — that all his coup-related content would be available, and would only be available, via materials seized in that review. (In reality, much of this should also have been available on Gmail and iCloud, and Rudy’s Protonmail account does not appear to have been captured in the review at all.)

But unless you believe that Rudy got designated co-conspirator 1 in the indictment without DOJ ever showing probable cause against him, unless you believe DOJ decided to forego directly relevant material that was already privilege-reviewed and in DOJ custody, then we can be certain January 6 investigators did obtain that content, and once they did, the decisions made in April and August and September 2021 would have shaved nine months of time off the investigation into him going forward.

Indeed, those materials are one likely explanation for why DOJ’s investigation, as represented by subpoenas sent starting in May 2022, had a slightly different focus than January 6 Committee did. The first fake elector warrants sent in May 2022 as well as those sent in June and November all included Victoria Toensing and Joe DiGenova. Rudy’s known J6C interview included the couple as key members of his post-election team. But no one else seems to have cared or figured out what they did. After Rudy listed them in his January 6 interview, the Committee never once raised them again. But they were always part of a sustained focus by DOJ.

The more explicit investigative steps targeting Rudy have come more recently. Rudy was subpoenaed for information about how he was paid in November 2022. He sat for an interview in June.

But a privilege review on the coup-related content on seven of Rudy’s devices would have been complete by January 19, 2022 — the day before the long privilege battle between J6C and John Eastman started.

DOJ’s investigation of Sidney Powell’s graft was overt by September 2021

The investigation into one more of the six co-conspirators described in Trump’s indictment was also overt already in 2021: Sidney Powell.

Subpoenas sent out in September — along with allegations that Powell’s associates had made damning recordings of her — were first reported in November 2021. The investigation may have started under the same theory as Jack Smith’s recent focus on Trump: That Powell raised money for one thing but spent the money on something else, her legal defense. Molly Gaston, one of the two prosecutors who has shown an appearance on Trump’s indictment and who dropped off her last crime scene cases in March 2021, played a key role in the investigation.

By the time of DOJ’s overt September steps, both Florida’s Nikki Fried and Dominion had raised concerns about the legality of Powell’s graft.

According to Byrne, Powell had received a wave of donations in the aftermath of the election after being praised by mega-popular right-wing radio host Rush Limbaugh. But the donations were often given haphazardly, sometimes as a dollar bill or quarter taped to a postcard addressed to Powell’s law office. Byrne claims he discovered that Powell had amassed a fortune in contributions, somewhere between $20 and $30 million but provided no evidence to support the claim. A projected budget for Defending the Republic filed with the state of Florida lists only $7 million in revenue for the group.

Defending the Republic’s funds weren’t going towards the pro-Trump goals donors likely envisioned, according to Byrne. Instead, he claimed they were spent on paying legal bills for Powell, who has faced court disciplinary issues and a daunting billion-dollar defamation lawsuit from Dominion Voting Systems.

“It shouldn’t be called ‘Defending the Republic,’” Byrne said in the recording. “It should be called ‘Defending the Sidney Powell.’”

Attorneys for Dominion have also raised questions about the finances for Defending the Republic, which the voting technology company has sued alongside Powell. In court documents filed in May, Dominion accused Powell of “raiding [Defending the Republic’s funds] to pay for her personal legal defense.”

Dominion attorneys claimed in the filing that Powell began soliciting donations to Defending the Republic before officially incorporating the group. That sequence, they argued, meant that donations for the group “could not have been maintained separately in a bank account” and “would have necessarily been commingled in bank accounts controlled by [Powell].”

[snip]

Defending the Republic’s finances first attracted the scrutiny of regulators in Florida shortly after Powell founded the group in November 2020 when authorities received a complaint and subsequently issued a subpoena to internet hosting service GoDaddy for information about the group’s website.

In a June press conference, Florida Agriculture Commissioner Nikki Fried said Defending the Republic was “found to be soliciting contributions from the State of Florida or from persons within the State of Florida” on the internet “without having filed in the State of Florida” as a charitable organization.”

On Aug. 24, Defending the Republic paid a $10,000 fine as part of a settlement agreement with Florida authorities over its fundraising.

All that graft would directly overlap with the sole focus on Powell in the indictment: on her false claims about voting fraud, particularly relating to Dominion. Aside from a claim that Powell was providing rolling production of documents in January 2022, it’s not clear what further steps this investigation took. Though it’s not clear whether Powell showed up on any subpoenas before one sent days after Jack Smith’s appointment in November.

Unlike Clark and Eastman, there have been no public reports that Powell had her phone seized.

DOJ may have piggybacked off John Eastman’s legislative purpose subpoena

DOJ’s overt focus on John Eastman came after the January 6 Committee’s long privilege battle over his Chapman University emails. Two months after Judge David Carter found some of Eastman’s email to be crime-fraud excepted (at a lower standard for “corruptly” under 18 USC 1512(c)(2) than was being used in DC District cases already), DOJ obtained its own warrant for Eastman’s emails, and a month later, his phone.

While it seems like DOJ piggybacked off what J6C was doing, the phone warrant, like Clark’s issued on the same day, also had involvement from DOJ IG.

Whatever the import of J6C, it’s notable that J6C was able to get those emails for a legislative purpose, without first establishing probable cause a crime had occurred. DOJ surely could have subpoenaed Eastman themselves (though not without tipping him off), but it’s not clear they could have obtained the email in the same way, particularly not if they had to show “otherwise illegal” actions to do so, which was the standard Beryl Howell adopted in her first 1512(c)(2) opinion, issued orally on January 21, 2022.

DOJ’s focus on Kenneth Chesebro (whom J6C didn’t subpoena until July 2022, months after DOJ was including him on subpoenas; see correction below) and whoever co-conspirator 6 is likely were derivative of either Rudy and/or Eastman; J6C subpoenaed Rudy, Powell, and Epshteyn on January 18 — though Epshteyn did not comply — and Mike Roman on March 28. Epshteyn shows up far more often in Rudy’s privilege log than Roman does.

But of the four main co-conspirators in Trump’s indictment, DOJ opportunistically found means to take investigative steps — the DOJ IG investigation, probable cause warrants in another investigation, and a fundraising investigation — to start investigating at least three of the people who last week were described as Trump’s co-conspirators. Importantly, with Clark and Rudy, such an approach likely helped break through privilege claims that would otherwise require first showing the heightened probable cause required before obtaining warrants on an attorney.

We know a fair amount about where and when the investigation into four of Trump’s six co-conspirators came from. And for three of those, DOJ took investigative steps in 2021, before the January 6 Committee sent out their very first subpoena. Yet because those investigative steps didn’t happen where most TV commentators were looking — notably, via leaks from defense attorneys — those steps passed largely unnoticed and unobstructed.

Update, August 20: The J6C sent a subpoena to Chesebro in March, before the July one that was discussed at his deposition.

Trump’s Means of Bullying and His Co-Conspirator Volunteer Lawyers

There were three developments in the dispute over the protective order in Trump’s January 6 indictment yesterday.

Trump’s team filed their response to Judge Tanya Chutkan’s order and the government’s motion for a protective order, including not just a redline of the government’s proposed protective order, but also a rant claiming that Dark Brandon made public comments about Trump’s indictment he did not.

The government’s reply used John Lauro’s five Sunday show appearances to demonstrate that Trump is explicitly demanding to try this case in the public sphere rather than the courtroom.

Then Judge Chutkan issued an order that they find time for a hearing on this this week.

MINUTE ORDER as to DONALD J. TRUMP: Upon consideration of the government’s 10 Motion for Protective Order and Defendant’s 14 Response, as well as the government’s 15 Reply, the court will schedule a hearing on the parties’ respective proposals. The court will waive the requirement of Defendant’s appearance. Accordingly, it is hereby ORDERED that no later than 3:00 PM on August 8, 2023, the parties shall meet and confer and file a joint notice of two dates and times on or before August 11, 2023 when both parties are available for a hearing. Signed by Judge Tanya S. Chutkan on 08/07/2023.

Both linked filings are worth reading, but I want to focus on two minor details in the government’s filing.

The method of Trump’s bullying madness

The government pitches their argument as one of regular order, about trying the case in the courtroom rather than the public. It is about John Lauro’s stated goals, not Donald John Trump’s.

The defendant’s proposed order would lead to the public dissemination of discovery material. Indeed, that is the defendant’s stated goal; the defendant seeks to use the discovery material to litigate this case in the media. But that is contrary to the purpose of criminal discovery, which is to afford defendants the ability to prepare for and mount a defense in court—not to wage a media campaign.

[snip]

Defense counsel’s stated goal—to publicly disseminate and discuss discovery materials in the public sphere—is contrary to the general principle against pretrial publicity and inconsistent with this District’s local rule regarding conduct of attorneys in criminal cases, and the Court should not enter a protective order that permits such harmful extra-judicial publicity. As an initial matter, the Court can and should exercise its discretion, with respect to the protective order, to prevent dissemination of discovery material that could prejudice the jury. Accord Gannett Co. v. DePasquale, 443 U.S. 368, 378 (1979) (“a trial judge has an affirmative constitutional duty to minimize the effects of prejudicial pretrial publicity.”); United States v. Brown, 218 F.3d 415, 423 n.8 (5th Cir. 2000) (“Other principal dangers [of pretrial publicity] include disseminating to the press inadmissible evidence, the exclusion of which at trial ‘is rendered meaningless when news media make it available to the public,’ as well as creating a ‘carnival atmosphere,’ which threatens the integrity of the proceeding.” (quoting Shepherd v. Maxwell, 384 U.S. 333 (1966)).

This District’s rules prohibit defense counsel from doing precisely what he has stated he intends to do with discovery if permitted: publicize, outside of court, details of this case, including the testimony of anticipated witnesses. Local Criminal Rule 57.7(b) provides that it is the duty of attorneys in criminal cases not to publicly disseminate “information or opinion” regarding, among other things, “[t]he existence or contents of any . . . statement given by the accused” or “[t]he identity, testimony, or credibility of prospective witnesses.” This is because such statements risk tainting the jury pool with inadmissible evidence or otherwise harming the integrity of these proceedings. See Gentile v. State Bar of Nevada, 501 U.S. 1030, 1074 (1991) (“Because lawyers have special access to information, through discovery and client communications, their extrajudicial statements pose a threat to the fairness of a pending proceeding since lawyers’ statements are likely to be received as especially authoritative.”). The Court should not grant a protective order that would allow defense counsel or the defendant to disseminate evidence such as snippets of witness interview recordings—no matter how short, misleading, or unlikely to be admissible at trial under the Federal Rules of Evidence—and claim that it supports some position the defendant later may make in pre-trial motions or at trial. Such conduct has the potential to unnecessarily inflame public opinion short of all relevant facts, intimidate witnesses, pollute the jury pool, and in general degrade the integrity of proceedings in this Court. See Bridges v. California, 314 U.S. 252, 271 (1941) (“Legal trials are not like elections, to be won through the use of the meeting-hall, the radio, and the newspaper.”). The goal of the defendant’s proposed protective order—prejudicial publicity—is antithetical to the interests of justice.

[snip]

The Government has proposed a standard, reasonable order that will streamline the flow of discovery to the defendant while preserving the integrity of these proceedings. The defendant has proposed an unreasonable order to facilitate his plan to litigate this case in the media, to the detriment of litigating this case in the courtroom. Normal order should prevail.

As many people have noted, however, as an aside to the description of Lauro’s press blitz over the weekend, the government included this reference to Trump’s attack on Mike Pence.

1 The defendant himself has made a number of additional social media posts related to this case since the Government filed its motion for a protective order. For example, the day before his counsel made comments about Mr. Pence, the defendant posted the following to social media: “WOW, it’s finally happened! Liddle’ Mike Pence, a man who was about to be ousted as Governor Indiana until I came along and made him V.P., has gone to the Dark Side. I never told a newly emboldened (not based on his 2% poll numbers!) Pence to put me above the Constitution, or that Mike was ‘too honest.’ He’s delusional, and now he wants to show he’s a tough guy. I once read a major magazine article on Mike. It said he was not a very good person. I was surprised, but the article was right. Sad!”

Nevertheless, the government doesn’t address whether this tweet violates Trump’s release condition, which would prohibit him from talking to Mike Pence about the case.

Given the inclusion of that tweet, though, I’m more interested in this note addressing one of Trump’s requested changes. It describes why Trump’s lawyers should have to inspect Trump’s own notes of discovery to make sure he’s not taking notes about specific witnesses.

In paragraph 10, the defendant seeks to prohibit his counsel from confirming that his notes do not contain personally identifying information subject to Federal Rule of Criminal Procedure 49.1. But this condition—which is included in the protective order on which the defense claims to model its proposal—is particularly important here because of the defendant and his co-conspirators’ practice, as described in the indictment, of publicly targeting individuals. See, e.g., ECF No. 1, Indictment, at ¶¶ 26, 32, 42, 44, 97.

DOJ justifies having Trump’s lawyers babysit his own note-taking because of “the defendant and his co-conspirators’ practice, as described in the indictment, of publicly targeting individuals.”

It then cites as examples the following paragraphs of the indictment:

  • The death threats that followed Rudy Giuliani’s baseless accusations against Ruby Freeman and Shaye Moss.
  • Trump’s accusation that Brad Raffensperger “has no clue” after he refused to find Trump 11,780 votes.
  • The death threats that followed Trump’s public attack on Al Schmidt.
  • Trump’s retweet of a tweet attacking PA GOP legislative leaders for stating that they could not throw out the popular vote in PA.
  • In response to Mike Pence telling Trump he would not throw out the vote certification, Trump telling Pence he would have to publicly criticize him.

It’s the last one I find so interesting. DOJ does not cite the various tweets Trump sent on January 6 or the revisions addressed to Pence Trump made sure to include in his Ellipse speech — comments that led directly to death threats targeted against Pence. Rather, DOJ pointed to what must rely on Pence’s testimony, of Trump telling Pence he would send those tweets and make those public comments.

Thus far, DOJ has steered well clear of focusing on Trump’s potential violation of release conditions (perhaps wisely wanting to forestall Trump’s attempt to turn this into more victimhood). It has also steered clear, in the indictment, of claiming Trump incited death threats against everyone from Ruby Freeman to Mike Pence and thousands of people in between.

But in this citation, it has suggested that a method of this conspiracy was to trigger death threats against those unwilling to bow to Trump’s demands.

Trump’s non-attorney of record consigliere

Another specific objection — one of several objections to Trump’s attempts to expand the circle of people with whom he can share discovery — pertains to the definition of lawyers permitted to obtain discovery. In a wildly pregnant comment, DOJ notes that “several” co-conspirators are IDed as attorneys.

In paragraph 2, the defendant proposes including “other attorneys assisting counsel of record.” Without a clearly defined relationship of employment or privilege, this language is boundless. For example, several co-conspirators are identified as attorneys, whom the defense might interpret as “other attorneys assisting counsel of record.” The Court should not accept the edit.

In fact, four people are identified as attorneys in the indictment’s description of them: Rudy, John Eastman, Sidney Powell, and Kenneth Chesebro.

This post has led me to notice that the indictment doesn’t identify Jeffrey Clark as an attorney (perhaps because, while undoubtedly an attorney, he never had an attorney-client relationship with Trump during the conspiracy). Though he is obviously an attorney.

And then there is co-conspirator 6, described in the indictment as a political consultant and so someone who could be either Mike Roman (who does not have a JD) or Boris Epshteyn (who does). One reason it is not confirmed which of these two men it was is both were closely involved in the December recruitment of fake electors, the indictment’s primary focus on CC6’s activities. (The one other overt act was to help Rudy chase down contact information for Senators on January 6.)

As it happens, though, Epshteyn is not just someone who is known to have been closely involved in the fake elector conspiracy, but he is someone who in the stolen document case served as an “other attorney assisting counsel of record.” Crazier still, Epshteyn shares an attorney with Trump: Todd Blanche, who represents Trump in the Alvin Bragg case, the stolen documents case, and now the January 6 case. Epshteyn, who has never filed a notice of appearance for Trump, has followed him around to his various arraignments as if he is family.

If DOJ has a specific concern about Trump sharing discovery with Epshteyn — who has been centrally involved in Trump’s efforts to combat his legal jeopardy by attacking rule of law — this is the kind of objection they might raise.

The Elements of Offense in the Trump January 6 Indictment

In the last day, Maggie and Mike and Devlin and Dawsey came out with twin pieces that purport to assess the legal strength of the indictment against Trump, but instead simply say, “well, Trump believes his bullshit and so do we and so the charged conduct may be First Amendment protected.”

Neither of these articles even mention that 18 USC 371, conspiracy to defraud the US, is about lying to the US, even though one of the lawyers cited by WaPo attempted to explain that to them.

Here’s why all those claims that Trump knew he was lying are in the indictment: because his false claims were the means Trump used to carry out the conspiracy to defraud.

The Defendant widely disseminated his false claims of election fraud for months, despite the fact that he knew, and in many cases had been informed directly, that they were not true. The Defendant’s knowingly false statements were integral to his criminal plans to defeat the federal government function, obstruct the certification, and interfere with others’ right to vote and have their votes counted. He made these knowingly false claims throughout the post-election time period, including those below that he made immediately before the attack on the Capitol on January 6:

This indictment will be measured not by what Maggie and Mike and Devlin and Dawsey claim about legal statutes they haven’t bothered to explain.

It will be measured by whether the government presents evidence to prove the elements of offense for each charge beyond a reasonable doubt.

Here, in abbreviated form, is what the elements of the offense are for the four charged crimes, which is what the jury will be given to judge the former President’s crimes. DOJ will need to prove that Trump entered into three parallel conspiracies with his alleged co-conspirators, then show that they attempted to:

  • Use deceit to undermine the Electoral College Act
  • Prevent the certification of the Electoral votes on January 6
  • Prevent the Biden voters votes in swing states from being counted

Conspiracy

Trump is charged with conspiring with six people: Rudy Giuliani (CC1), John Eastman (CC2), Sidney Powell (CC3), Jeffrey Clark (CC4), Kenneth Chesebro (CC5), and either Boris Epshteyn or Mike Roman (CC6). DOJ did this because to prove the case against Trump, it plans to introduce the words and actions of each of these six people as co-conspirators. To admit that as evidence, DOJ will need to convince Judge Tanya Chutkan that Trump entered into an agreement with each of them to carry out the goal of each of three conspiracies, which are:

  • 18 USC 371: The purpose of the conspiracy was to overturn the legitimate results of the 2020 presidential election by using knowingly false claims of election fraud to obstruct the federal government function by which those results are collected, counted, and certified. The government function Trump is accused of seeking to thwart with all his lying is the Electoral Count Act, the means by which the government ascertains the winners of each state’s electoral college votes.
  • 18 USC 1512(k): The purpose of the conspiracy was to corruptly obstruct the vote certification on January 6.
  • 18 USC 241: The purpose of the conspiracy was to prevent people’s votes from being counted, probably best defined as the Biden voters whose votes made him the winner of swing states, with Georgia, Michigan, Nevada, Pennsylvania, and Arizona mentioned explicitly.

The government doesn’t have to prove that all seven of these people sat in a room and made an agreement on November 14, the day after Trump’s campaign conceded Arizona, which is when the alleged conspiracies began. Nor does it have to prove they entered into an explicit agreement. They just need to prove that each of these people agreed to pursue the goal of each conspiracy.

The kinds of things the government will use to prove the co-conspirators joined this conspiracy are:

Rudy: The government will show that on November 14, Rudy took over Trump’s efforts to contest the vote (remember that DOJ subpoenaed whatever legal arrangement he had with Trump, but note that Special Master Barbara Jones appears to have found none of Rudy’s post-election plotting to be privileged). It will show that, acting on Trump’s instructions, Rudy repeatedly contacted both state officials and members of Congress to assert fraud that even he admitted he had no evidence for. “We don’t have the evidence, but we have lots of theories.” It will show that Trump repeatedly publicly ratified Rudy’s lies, often by Tweeting the claims Rudy made, and often by pushing them both with state officials he was personally trying to pressure, but also with US government officials, including DOJ.

John Eastman: The government will show that as Trump tried to find some justification for stealing the election, he turned to Eastman to give it legal cover. It will point to things like the Georgia lawsuit certification Trump signed on December 31 that Eastman acknowledged included false data. It will show Eastman’s calls in support of fake electors. It will rely heavily on the meetings Eastman personally attended in the days leading up to January 6. It will show that Trump decided, after being told repeatedly that Mike Pence wouldn’t throw out the votes, to have Eastman (as well as Rudy) speak at the Ellipse rally.

Sidney Powell: As I noted in this post, the role of Powell as alleged in the conspiracy is actually quite narrow. The indictment shows that on November 16, Trump asked Powell and others to use the Dominion voting machine allegations in lawsuits, and starting on November 25, she did so. Trump ratified her actions, even though Rudy had publicly split from her, on Twitter. One of the lies the indictment claims Trump knowingly told — in addition to very specific lies about swing states he repeated in his Ellipse speech — pertains to the voting machines, and to prove that lie, the government will show Trump knew Powell was batshit crazy but didn’t care.

Jeffrey Clark: The government will show that, starting on December 22, after Bill Barr, Jeffrey Rosen, and Richard Donoghue all debunked Trump’s false claims, Clark had secret communications with Trump that violated DOJ’s contact policy. As a result of those secret communications, Clark drafted a letter he attempted to coerce Rosen and others to sign, endorsing the fake elector scheme. Trump endorsed his actions by attempting to (and briefly at least, in fact replacing) Rosen with Clark so Clark could, “use the authority of the Justice Department to falsely present the fraudulent electors as a valid alternative to the legitimate electors.”

Kenneth Chesebro: The government will show that, acting at the direction of people acting for Trump, Chesebro wrote a series of increasingly radical memos laying out how each swing state ascertained electors and describing how fake electors could attempt to comply with those laws, even while acknowledging that in several states they couldn’t meet the legal requirements. (Here’s the J6C Report on the memos.) The government will show that Chesebro entered into the conspiracy via communications with Rudy and, later, Eastman, not directly with Trump.

Co-Conspirator 6: It’s not yet certain whether CC6 is Boris Epshteyn or Mike Roman. Whoever it is, DOJ will show that CC6 played a key role in recruiting people to implement the fake elector scheme and then was involved in Rudy’s attempts to persuade members of Congress to reject the swing state electoral certificates.

Conspiracy to Defraud the United States

Assuming DOJ can convince Judge Chutkan that each of these people entered into a conspiracy with Trump, it will then use his own actions and theirs to prove the elements of offense for each of the charged conspiracies.

For 18 USC 371, the government needs to prove that Trump and his co-conspirators attempted to use deceit to pretend that Trump had won 306 electoral college votes, rather than Joe Biden. This statute is why the discussion of all the lying is in there.

Notably, assuming Chutkan agrees these are all co-conspirators, DOJ won’t have to rely entirely on Trump’s lies. They’ll also rely on:

  • Rudy’s admission to Rusty Bowers they had no evidence to back their claims
  • Eastman’s admission to Mike Pence his claims about ECA were untested, and his admission to Greg Jacob that SCOTUS would reject them
  • Trump’s description of Sidney Powell’s claims as crazy
  • Jeffrey Clark’s attempts to deceive his bosses about what he was doing with Trump
  • Kenneth Chesebro’s admission that the fake electors in several states could not comply with the law

As I have laid out, DOJ has set up 5 specific lies that Trump recycled in his Ellipse speech after having them repeatedly debunked by Republicans, along with the voting machine lies Sidney Powell told. They have also laid out that Trump lied about what Pence had just told him (and there are contemporary witnesses that it happened before Trump made his false claims about Pence).

Even if jurors believed Trump believed his own bullshit about some or all of the claims about fraudulent votes, DOJ would still have Trump’s lies about Dominion voting machines and Pence to prove that he knowingly defrauded the US.

Obstruction of the Vote Certification

As I have repeatedly noted, for both obstruction counts (charged as a conspiracy and against Trump alone), dozens of other January 6 defendants have already tried the defense that Maggie and Mike and Devlin and Dawsey present (and not for the first time by Maggie and Mike) as if Trump would be making it for the first time.

It didn’t work. I will link, once again, Royce Lamberth’s recent findings of fact in the Alan Hostetter case in the futile hope that Maggie and Mike and Devlin and Dawsey might decide to learn how this statute has already been applied in hundreds of January 6 cases.

To prove that Trump (and his co-conspirators for the 1512(k) charge) obstructed the vote certification, DOJ will need to:

  • Prove that Trump knew the significance of the vote certification (possibly both the December 14 and January 6 ones). DOJ will point to both the effort to get fake elector certificates created on December 14, and Trump’s publicity of January 6 and his repeated public claims that unless Pence intervened, he wouldn’t be President anymore.
  • Prove that Trump took steps to obstruct the certification of the votes. DOJ will point to the pressure on Mike Pence, both covertly in meetings leading up to January 6 and overtly after Pence told Trump he would not reject the certifications. DOJ will also point to things Trump did to ensure that a mob of bodies physically occupied the Capitol, and after they had ,refuse to take steps in response to requests from people like Kevin McCarthy and Pat Cipollone to get them out of there.
  • Prove that Trump had a corrupt purpose in doing all this. As I keep saying, what the standard for corrupt purpose will be is being decided as we speak by the DC Circuit (and yesterday, the effective solicitor general for the mobsters filed for cert at SCOTUS in an attempt to preempt the DC Circuit). It will be some combination of the following:
    • Otherwise illegal acts: DOJ would prove that Trump violated the law to obstruct the vote certification by looking at the fake elector plot and the knowingly illegal order to Pence.
    • Corrupt personal benefit: Among the hundreds of people charged with obstruction, this definition of corrupt purpose is probably easiest to prove for Trump, because he was attempting to remain President after being fired by voters. This is one area where Trump’s awareness that he lost might matter, but ultimately, the Lamberth decision would lay out that even if Trump really believed he won, the means he used to prevent Biden’s vote from being certified were corrupt.

Conspiracy to Prevent Biden’s Voters Votes from Being Counted

After laying out the elements of offense for joining a conspiracy, the jury instructions in the Douglass Mackey case used the following language for the objective of the conspiracy.

The indictment alleges that the objective of the charged conspiracy was to injure, oppress, threaten or intimidate one or more persons in the free exercise and enjoyment of their right to vote. The government must therefore prove beyond a reasonable doubt that the defendant knowingly and intentionally joined the conspiracy with the intent to further that objective. In this case, the government has alleged that the object of the conspiracy was specifically to “injure” one or more persons in the free exercise and enjoyment of their right to vote. I instruct you that the statute covers conduct intended to “obstruct,” “hinder,” “prevent,” “frustrate,” “make difficult or impossible,” “or indirectly rather than directly assault” free exercise of the right. For example, “hinder” is defined as “to make slow or difficult the progress of, to hamper, to hold back, to prevent, to check.”

It does not require the possibility of physical force or physical harm. Thus, conduct that makes the right to vote more difficult, or in some way prevents voters from exercising their right to vote can constitute an “injury” within the meaning of the law.

Here, the object of the conspiracy was twofold: to prevent people from voting, but also to prevent their votes from being counted.

Curiously, the timeline on this conspiracy only starts at November 14, after all the votes were cast.

The indictment notes several instances where Trump intimidated people counting the vote, mentioning the death threats that he caused Al Schmidt and Ruby Freeman and Shaye Moss to suffer. It explicitly states that Trump, “attempted to use a crowd of supporters that he had gathered in Washington, D.C., to pressure the Vice President to fraudulently alter the election results.” It describes how the lies (as well of those from Eastman and Rudy) in his Ellipse speech:

gave false hope that the Vice President might change the election outcome, and directed the crowd in front of him to go to the Capitol as a means to obstruct the certification and pressure the Vice President to fraudulently obstruct the certification

It describes how, after being told of the riot, Trump further inflamed the crowd with a tweet targeting Pence the minute before Pence was evacuated for his safety (thereby shutting down the vote count). It describes how Trump refused the requests of Pat Cipollone, Pat Philbin, Mark Meadows, a Deputy Chief of Staff (possibly Tony Ornato), and Eric Herschmann to tell the rioters to leave. It describes how Trump refused Cipollone’s request that he withdraw his objections to the vote certification.

The comments and actions of both Rudy and John Eastman also nakedly show that the intent was to prevent Joe Biden’s votes from being counted.

“Conspiracy Shit Beamed Down from the Mothership:” The Prehistory of Trump’s Ellipse Lies


In Jack Smith’s statement announcing the Trump indictment yesterday, he emphasized how Trump’s lies “fueled” the attack on the Capitol.

The attack on our nation’s capital on January 6, 2021, was an unprecedented assault on the seat of American democracy. As described in the indictment, it was fueled by lies. Lies by the defendant targeted at obstructing a bedrock function of the U.S. government, the nation’s process of collecting, counting, and certifying the results of the presidential election.

The men and women of law enforcement who defended the U.S. Capitol on January 6 are heroes. They’re patriots, and they are the very best of us. They did not just defend a building or the people sheltering in it. They put their lives on the line to defend who we are as a country and as a people. They defended the very institutions and principles that define the United States.

For each sub-section in the section of the indictment that lays out Trump’s pressure on states, the indictment shows how Trump repeated false claims on January 6 that he had been told were false. While the indictment doesn’t cite the actual language that would appear in Trump’s Ellipse speech, it invokes these five lies (it doesn’t include the lies he told about Nevada):

In the state of Arizona, over 36,000 ballots were illegally cast by non-citizens. Two thousand ballots were returned with no address. [cited here]

[snip]

Over 10,300 ballots in Georgia were cast by individuals whose names and dates of birth match Georgia residents who died in 2020 and prior to the election. [cited here]

[snip]

That’s Detroit. One hundred and seventy-four thousand ballots were counted without being tied to an actual registered voter. Nobody knows where they came from. [cited here]

[snip]

There were over 205,000 more ballots counted in Pennsylvania. Think of this, you had 205,000 more ballots than you had voters. That means you had two. Where did they come from? You know where they came from? Somebody’s imagination, whatever they needed. [cited here; also cited in January 4 meeting with Pence]

[snip]

In Wisconsin, corrupt Democrat-run cities deployed more than 500 illegal, unmanned, unsecured drop boxes, which collected a minimum of 91,000 unlawful votes. [cited here]

With each of these lies, the indictment shows when he was told these claims were false (Arizona, Georgia, Michigan, Pennsylvania, Wisconsin). In several cases, the indictment also shows DOJ officials telling Trump those lies were false (Georgia, Michigan, Pennsylvania, Wisconsin).

The actual citations from Trump’s Ellipse speech, which appears in the section on his pressuring of Mike Pence, focus on that — his false claims about what Pence could do (and the indictment describes Rudy Giuliani and John Eastman’s speeches as further effort to pressure Pence).

But before that, the indictment tracks the lies in the speech that Trump used to mobilize the mob.

The Structure of the Donald Trump Indictment

It’s late here, so this may be my only analysis before you all wake up.

But I wanted to lay out the structure of the Trump indictment.

The indictment charges him, alone, with four crimes:

  • 18 USC 371 (conspiracy to defraud the US)
  • 18 USC  1512(k) (conspiracy to obstruct the vote certification)
  • 18 USC 1512(c)(2) (obstructing the vote certifcation)
  • 18 USC 241( conspiracy to violate civil rights)

They all are entirely overlapping. That is, Trump’s conduct, and those of 6 alleged co-conspirators, is cited in all those charges.

These are four charges for the same crime. So if the DC Circuit or SCOTUS overturns how DOJ has applied 1512, there are two back stops.

The other most important part of this indictment is who is named as a co-conspirator (and who might well be charged, as far as we know, today, separately by sealed indictment):

  • Co-Conspirator 1, an attorney who was willing to spread knowingly false claims and pursue strategies that the Defendant’s 2020 re-election campaign attorneys would not. [Rudy Giuliani]
  • Co-Conspirator 2, an attorney who devised and attempted to implement a strategy to leverage the Vice President’s ceremonial role overseeing the certification proceeding to obstruct the certification of the presidential election. [John Eastman]
  • Co-Conspirator 3, an attorney whose unfounded claims of election fraud the Defendant privately acknowledged to others sounded “crazy.” Nevertheless, the Defendant embraced and publicly amplified Co-Conspirator 3’s disinformation. [Sidney Powell]
  • Co-Conspirator 4, a Justice Department official who worked on civil matters and who, with the Defendant, attempted to use the Justice Department to open sham election crime investigations and influence state legislatures with knowingly false claims of election fraud. [Jeffrey Clark]
  • Co-Conspirator 5, an attorney who assisted in devising and attempting to implement a plan to submit fraudulent slates of presidential electors to obstruct the certification proceeding. [Kenneth Chesebro]
  • Co-Conspirator 6, a political consultant who helped implement a plan to submit fraudulent slates of presidential electors to obstruct the certification proceeding. [Mike Roman; update: NYT says it is Boris Ephsteyn]

I will fill in who these people are later. They are uncharged and I want to be fairly sure.

The key detail, though, is that there is a separate conspiracy branching off involving most of them, and many other paragraphs of this indictment.

I argued since April 2022 that DOJ could — and should — charge Trump first and build in the stuff around him. I reiterated that a few weeks ago.

There’s a lot here.

But — with some awesome exceptions, which I’ll come back to — not much beyond what’s in the January 6 Report. Credit where it’s due, much, but not all, of this indictment follows their map.

Update: I’ve added Mike Roman as Co-Conspirator 6. The January 6 Report matches a report from the indictment.

A campaign operative named Michael Roman was also tapped for a major operational role in the fake elector effort. When Findlay sent his email handing off certain responsibilities for the initiative, he also wrote that Giuliani’s team had designated Roman “as the lead for executing the voting on Monday” December 14th.73 Roman was the Trump Campaign’s Director of Election Day Operations (EDO), with team members who specialized in political outreach and mobilization in battleground States wherethe Trump team now urgently needed the fake electors to meet on December 14th. With help from his EDO staff, as well as Giuliani’s team and RNC staffers working alongside the Campaign as part of the Trump Victory Committee, Roman ran an improvised “Electors Whip Operation.”74 For example, Roman sent an email on December 12th directing an aide to create “a tracker for the electors” with tabs for Arizona, Georgia, Michigan, Nevada, Pennsylvania, and Wisconsin, listing contact information, whether they hadbeen contacted, whether they agreed to attend on December 14th, and names of “[s]ubstitute electors” to replace any reticent or unavailable participants as needed.75 Roman referred to others on this email as the “WHIPTEAM” and directed them to fill out the spreadsheet, to update him on “what you have and what you need,” and to plan on a call that evening.76

Rudy Giuliani Appears to be Claiming Privilege Over Hundreds of Items He Already Agreed Were Not

Based on statements that Rudy Giuliani and his attorney Robert Costello have made in the Ruby Freeman suit, he should be claiming privilege over no more than 43 items total.

He is claiming privilege over around 400.

We can say that based on two claims, made in sworn declarations.

First, Rudy submitted this declaration stating that all his comms from the coup conspiracy would be in the materials archived by TrustPoint as part of the SDNY search of his devices.

Mind you, there’s a claim in that declaration that Costello’s declaration debunks — and it explains a lot about Rudy’s failure to provide discovery. Rudy claims that all his iCloud emails would be in the TrustPoint materials.

All of my [redacted]@icloud.com iCloud data would have also been included in the TrustPoint data because I synced my iCloud to my devices.

But Costello’s declaration reveals that prior to October 18, 2021, he had observed to the Special Master that many of the email files, “contain no ‘body’ text” and by October 18, 2021, he learned that the reason for that is that “this is the way the iPhone stores backup data.”

Rudy’s lawyer, at least, learned before this lawsuit was filed that the TrustPoint material wouldn’t have his emails intact. Nevertheless, Rudy claimed his emails would be available in the TrustPoint materials, and apparently never checked his existing iCloud, Gmail, and ProtonMail accounts for relevant emails.

Meanwhile Costello confirmed something still more damning: that ultimately he and Rudy never appealed any of the designations that the Special Master in that case, Barbara Jones, came to on his content.

Trustpoint would then send me sections of the electronic material, so that I could designate whatever communications I believed were covered by attorney client, work product, or executive privilege. Those identified communications would then be sent to Judge Jones for her ruling. If there was a dispute between Judge Jones and myself, the matter would be referred to Judge J. Paul Oetken, the sitting SDNY Judge who had authorized the search warrants. We never needed to have Judge Oetken resolve a dispute.

That’s important, because we know how many files, total, Barbara Jones ultimately deemed to be privileged: 43.

Remember: per Judge Paul Oetken’s order, this privilege review covered all material post-dating January 1, 2018, regardless of topic.

Here’s what Jones said about the results of her review in a January 22, 2022 filing (filed before this lawsuit moved towards discovery):

As indicated in my November 2, 2021 Report, I initially reserved decision on the first 3 items that were designated as privileged by Mr. Giuliani’s counsel. After further discussions regarding these items, I agree that they are privileged and should not be turned over to the Government’s investigative team.

B. Device 1B05 – Chats and Messages

I next assigned for review the chats and messages that post-dated January 1, 2018 on Device 1B05, which is a cell phone. There were originally 25,481 such items, which later increased to 25,629 after a technical issue involving document attachments was identified. An initial release of non-designated items was made to the Government’s investigative team on November 11, 2021.1

Of the total documents assigned for review, Mr. Giuliani designated 96 items as privileged and/or highly personal. Of those 96 designated items, I agreed that 40 were privileged, Mr. Giuliani’s counsel withdrew the privilege designation over 19, and I found that 37 were not privileged. I shared these determinations with Mr. Giuliani’s counsel, and they indicated that they would not challenge my determination that the 37 items are not privileged. The 40 privileged documents have been withheld from the Government’s investigative team and the remaining 56 were released on January 19, 2022.

43 documents total, across Rudy’s 16 devices, were privileged. Most were on an iPhone referred to as 1B05.

Rudy actually used the device identifiers from the search in his privilege log. Most are from 1B05 — and the Bates numbers show that there were over 21,000 items on that phone.

Indeed, we can see that around 40 really are privileged — because they pertain to Rudy’s own representation by Joe Sibley (indeed, those appear to be the only emails that were preserved).

That says Rudy and Costello already agreed that all the rest of the things in this privilege log (save potentially 3 files) — around 220 of which are just from that one phone — are not privileged.

That is, if you put Costello’s declaration together with Rudy’s, it suggests that Rudy claimed, in the Ruby Freeman lawsuit, that hundreds of things were privileged when he and his attorney had already agreed, before this case moved towards discovery, they were not.

I emailed both Costello and Freeman’s attorney Michael Gottlieb to check whether I understand these details correctly and got no response from either.