The Mueller Investigation Identifies Russian Spies

In painstaking detail, Robert Mueller's special counsel team laid out what it alleges was a concerted effort by the Russian military to hack the Democratic National Committee and senior-level Clinton campaign officials and disseminate private documents in order to disrupt and influence the 2016 US presidential election.

The Russians also attempted to infiltrate local election systems and software, although Deputy Attorney General Rod Rosenstein says that there is no evidence that they "altered the vote count or changed any election result". 

The Trump White House has picked up on this line, issuing a statement reiterating that there have been no allegations of "knowing involvement by anyone on the campaign" or that the hacking "affected the election result". That isn't what Mr Rosenstein and the special counsel's court filings concluded, however. The deputy attorney general said it was "not our responsibility" to assess to what extent Russian involvement influenced the 2016 election.

In fact, it is hard to deny that the hacks had a clear impact on US politics in 2016, and exacted a heavy toll on Democrats and the Clinton campaign in particular.

As a result of the hacks, the head of the Democratic National Committee was forced from office on the eve of the party's national convention, a convention whose first few days were marred by protests from Bernie Sanders supporters angry about the contents of some of those Democratic National Committee emails. 

John Podesta, the chair of Hillary Clinton's presidential campaign, had his personal correspondence exposed, including internal debates over political strategy, outlines of Mrs. Clinton's greatest weaknesses and transcripts of her private speeches, excerpts of which were cited by Donald Trump in presidential debates and on the campaign stump. Indeed, Mr Trump celebrated and amplified the revelations in the hacks, which were disseminated through DCLeaks and Guccifer 2.0, both identified as fronts for Russian military intelligence, as well as Wikileaks, which is alluded to, but not named in the Mueller indictment.

The hacks may not have changed the results of the 2016 election, but the effects were very real.

It was as though a team's entire playbook was revealed just days before the Super Bowl. While the rules of football weren't changed and the scoreboard wasn't surreptitiously altered, that doesn't mean the outcome of the contest wasn't affected.

That, then, is the big picture revelation from Mr Mueller's most recent indictment - which comes in addition to the already announced indictments and plea agreements from 20 individuals and three Russian companies. The 29-page court filing contains a variety of other details and revelations that add to the growing picture of alleged Russian election meddling which the Mueller team is outlining.

Russia, if you're listening…
At a Florida press event on 27 July 2016, candidate Trump issued a now famous request.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," he said. "I think you will probably be rewarded mightily by our press."

The line shocked many at the time and has been cited repeatedly since then as evidence that Mr Trump was actively encouraging Russian attempts to acquire and disseminate emails from Mrs. Clinton and her team. The 27 July date makes an appearance in Mr Mueller's most recent indictment document, as well.

"On or about July 27, 2016, the Conspirators attempted after hours to Spearphishing for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office," the court filing reads. "At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton campaign."

While this isn't the first time Russians allegedly targeted the Clinton team, after Mr Trump's remarks the hackers escalated their efforts.

"It seems clear that the indictment is trying to make the connection with language like 'after hours' and 'first time'," tweeted conservative commentator, and Trump critic, Ben Shapiro. "But even Trump publicly saying he wants the Russians to do something and them doing it isn't collusion in any real sense." 

It is, however, an uncanny coincidence.

A Political War Map
The indictment sheet also documents a number of interactions between Americans and Russian military operatives, although it stresses that there are no allegations that those Americans knew the true identity behind the internet aliases with whom they were corresponding.

A Florida blogger and state lobbyist, possibly Aaron Nevins, exchanged messages with Guccifer 2.0 and acquired a trove of documents Democrats had compiled outlining the weaknesses of the party's candidates running for congressional office in Florida. Mr Nevins told the Wall Street Journal that he had told Guccifer 2.0 in an email: "Basically if this was a war, this is the map to where all the troops are deployed."

Guccifer 2.0 also sent documents to a reporter "pertaining to the Black Lives Matter" movement. In another paragraph, Mr Mueller's team notes that a congressional candidate directly asked Guccifer 2.0 for stolen documents about his opponent - a request that the hacker accommodated. 

A long-time Trump man in the spotlight - but not the charge sheet
The Mueller indictment mentions that Guccifer 2.0 had direct communications with a person "who was in regular contact with senior members of the presidential campaign of Donald J Trump". It goes on to quote emails that match communications that Roger Stone, a Trump friend and acquaintance for decades, said he had with Guccifer 2.0 in August 2016. In those communications, Guccifer 2.0 asks Mr Stone to analyse some of his documents and offers to help the man who served as a Trump campaign aide early in his presidential bid. 

"It would be a great pleasure to me," the hacker wrote.

In May Mr Stone told a television interviewer that he was "prepared" to be indicted by the special counsel. "It is not inconceivable now that Mr Mueller and his team may seek to conjure up some extraneous crime pertaining to my business, or maybe not even pertaining to the 2016 election," he said. "I would chalk this up to an effort to silence me." Mr Stone has denied that he had any knowing contact with Russian agents. That's an assertion that the Mueller team appears to have accepted, at least for now. 

A Conspiracy Theory put to Rest?
Back in May former Republican Speaker of the House Newt Gingrich suggested that the real source of the DNC hacks was Seth Rich, a former Democratic operative who was murdered in Washington DC, in July 2016.

"It turns out it wasn't the Russians, it was this young guy who, I suspect, was disgusted by the corruption of the Democratic National Committee," Mr Gingrich said. "He's been killed, and apparently nothing serious has been done to investigate his murder."

It was a theory championed, as well, by conservative commentator and presidential confidante Sean Hannity, even though Washington, DC, police have concluded that the death was the result of a botched robbery. Mr Trump himself has alluded to the conspiracy theories, frequently tweeting and wondering aloud why the Democratic National Committee did not allow federal investigators to conduct a forensic examination of the hacked email server.

Just over two weeks after his most recent tweet, the special counsel's office has pointed the finger of responsibility for the DNC hacks directly at the Russian military. 

Given that Mr Trump was informed about the indictments earlier this week, but still referred to the Mueller investigation as a witch-hunt in remarks on Friday 13th July, he probably will not tone down his criticisms of the probe or suggestions of Russian innocence, but perhaps he will no longer cite the DNC server hacks quite so frequently.

BBC:                 Image: Special Prosecutor Rober Mueller

You Might Also Read: 

Both US Presidential Campaigns Hacked:

How Did WikiLeaks Get Clinton's Emails?:

 

« US Dark Web Raids Lead to Arrests And Seizures
For Sale: Access To Airport Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

National Cybersecurity Agency (ANCS) - Tunisia

National Cybersecurity Agency (ANCS) - Tunisia

ANCS (L'Agence Nationale de la Cybersécurité) is the national cybersecurity agency for Tunisia.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

Click Studios

Click Studios

Click Studios is an Agile software development company specialising in the development of a secure Enterprise Password Management solution called Passwordstate.