The Mueller Investigation Identifies Russian Spies

In painstaking detail, Robert Mueller's special counsel team laid out what it alleges was a concerted effort by the Russian military to hack the Democratic National Committee and senior-level Clinton campaign officials and disseminate private documents in order to disrupt and influence the 2016 US presidential election.

The Russians also attempted to infiltrate local election systems and software, although Deputy Attorney General Rod Rosenstein says that there is no evidence that they "altered the vote count or changed any election result". 

The Trump White House has picked up on this line, issuing a statement reiterating that there have been no allegations of "knowing involvement by anyone on the campaign" or that the hacking "affected the election result". That isn't what Mr Rosenstein and the special counsel's court filings concluded, however. The deputy attorney general said it was "not our responsibility" to assess to what extent Russian involvement influenced the 2016 election.

In fact, it is hard to deny that the hacks had a clear impact on US politics in 2016, and exacted a heavy toll on Democrats and the Clinton campaign in particular.

As a result of the hacks, the head of the Democratic National Committee was forced from office on the eve of the party's national convention, a convention whose first few days were marred by protests from Bernie Sanders supporters angry about the contents of some of those Democratic National Committee emails. 

John Podesta, the chair of Hillary Clinton's presidential campaign, had his personal correspondence exposed, including internal debates over political strategy, outlines of Mrs. Clinton's greatest weaknesses and transcripts of her private speeches, excerpts of which were cited by Donald Trump in presidential debates and on the campaign stump. Indeed, Mr Trump celebrated and amplified the revelations in the hacks, which were disseminated through DCLeaks and Guccifer 2.0, both identified as fronts for Russian military intelligence, as well as Wikileaks, which is alluded to, but not named in the Mueller indictment.

The hacks may not have changed the results of the 2016 election, but the effects were very real.

It was as though a team's entire playbook was revealed just days before the Super Bowl. While the rules of football weren't changed and the scoreboard wasn't surreptitiously altered, that doesn't mean the outcome of the contest wasn't affected.

That, then, is the big picture revelation from Mr Mueller's most recent indictment - which comes in addition to the already announced indictments and plea agreements from 20 individuals and three Russian companies. The 29-page court filing contains a variety of other details and revelations that add to the growing picture of alleged Russian election meddling which the Mueller team is outlining.

Russia, if you're listening…
At a Florida press event on 27 July 2016, candidate Trump issued a now famous request.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," he said. "I think you will probably be rewarded mightily by our press."

The line shocked many at the time and has been cited repeatedly since then as evidence that Mr Trump was actively encouraging Russian attempts to acquire and disseminate emails from Mrs. Clinton and her team. The 27 July date makes an appearance in Mr Mueller's most recent indictment document, as well.

"On or about July 27, 2016, the Conspirators attempted after hours to Spearphishing for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office," the court filing reads. "At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton campaign."

While this isn't the first time Russians allegedly targeted the Clinton team, after Mr Trump's remarks the hackers escalated their efforts.

"It seems clear that the indictment is trying to make the connection with language like 'after hours' and 'first time'," tweeted conservative commentator, and Trump critic, Ben Shapiro. "But even Trump publicly saying he wants the Russians to do something and them doing it isn't collusion in any real sense." 

It is, however, an uncanny coincidence.

A Political War Map
The indictment sheet also documents a number of interactions between Americans and Russian military operatives, although it stresses that there are no allegations that those Americans knew the true identity behind the internet aliases with whom they were corresponding.

A Florida blogger and state lobbyist, possibly Aaron Nevins, exchanged messages with Guccifer 2.0 and acquired a trove of documents Democrats had compiled outlining the weaknesses of the party's candidates running for congressional office in Florida. Mr Nevins told the Wall Street Journal that he had told Guccifer 2.0 in an email: "Basically if this was a war, this is the map to where all the troops are deployed."

Guccifer 2.0 also sent documents to a reporter "pertaining to the Black Lives Matter" movement. In another paragraph, Mr Mueller's team notes that a congressional candidate directly asked Guccifer 2.0 for stolen documents about his opponent - a request that the hacker accommodated. 

A long-time Trump man in the spotlight - but not the charge sheet
The Mueller indictment mentions that Guccifer 2.0 had direct communications with a person "who was in regular contact with senior members of the presidential campaign of Donald J Trump". It goes on to quote emails that match communications that Roger Stone, a Trump friend and acquaintance for decades, said he had with Guccifer 2.0 in August 2016. In those communications, Guccifer 2.0 asks Mr Stone to analyse some of his documents and offers to help the man who served as a Trump campaign aide early in his presidential bid. 

"It would be a great pleasure to me," the hacker wrote.

In May Mr Stone told a television interviewer that he was "prepared" to be indicted by the special counsel. "It is not inconceivable now that Mr Mueller and his team may seek to conjure up some extraneous crime pertaining to my business, or maybe not even pertaining to the 2016 election," he said. "I would chalk this up to an effort to silence me." Mr Stone has denied that he had any knowing contact with Russian agents. That's an assertion that the Mueller team appears to have accepted, at least for now. 

A Conspiracy Theory put to Rest?
Back in May former Republican Speaker of the House Newt Gingrich suggested that the real source of the DNC hacks was Seth Rich, a former Democratic operative who was murdered in Washington DC, in July 2016.

"It turns out it wasn't the Russians, it was this young guy who, I suspect, was disgusted by the corruption of the Democratic National Committee," Mr Gingrich said. "He's been killed, and apparently nothing serious has been done to investigate his murder."

It was a theory championed, as well, by conservative commentator and presidential confidante Sean Hannity, even though Washington, DC, police have concluded that the death was the result of a botched robbery. Mr Trump himself has alluded to the conspiracy theories, frequently tweeting and wondering aloud why the Democratic National Committee did not allow federal investigators to conduct a forensic examination of the hacked email server.

Just over two weeks after his most recent tweet, the special counsel's office has pointed the finger of responsibility for the DNC hacks directly at the Russian military. 

Given that Mr Trump was informed about the indictments earlier this week, but still referred to the Mueller investigation as a witch-hunt in remarks on Friday 13th July, he probably will not tone down his criticisms of the probe or suggestions of Russian innocence, but perhaps he will no longer cite the DNC server hacks quite so frequently.

BBC:                 Image: Special Prosecutor Rober Mueller

You Might Also Read: 

Both US Presidential Campaigns Hacked:

How Did WikiLeaks Get Clinton's Emails?:

 

« US Dark Web Raids Lead to Arrests And Seizures
For Sale: Access To Airport Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.