The Mueller Investigation Identifies Russian Spies

In painstaking detail, Robert Mueller's special counsel team laid out what it alleges was a concerted effort by the Russian military to hack the Democratic National Committee and senior-level Clinton campaign officials and disseminate private documents in order to disrupt and influence the 2016 US presidential election.

The Russians also attempted to infiltrate local election systems and software, although Deputy Attorney General Rod Rosenstein says that there is no evidence that they "altered the vote count or changed any election result". 

The Trump White House has picked up on this line, issuing a statement reiterating that there have been no allegations of "knowing involvement by anyone on the campaign" or that the hacking "affected the election result". That isn't what Mr Rosenstein and the special counsel's court filings concluded, however. The deputy attorney general said it was "not our responsibility" to assess to what extent Russian involvement influenced the 2016 election.

In fact, it is hard to deny that the hacks had a clear impact on US politics in 2016, and exacted a heavy toll on Democrats and the Clinton campaign in particular.

As a result of the hacks, the head of the Democratic National Committee was forced from office on the eve of the party's national convention, a convention whose first few days were marred by protests from Bernie Sanders supporters angry about the contents of some of those Democratic National Committee emails. 

John Podesta, the chair of Hillary Clinton's presidential campaign, had his personal correspondence exposed, including internal debates over political strategy, outlines of Mrs. Clinton's greatest weaknesses and transcripts of her private speeches, excerpts of which were cited by Donald Trump in presidential debates and on the campaign stump. Indeed, Mr Trump celebrated and amplified the revelations in the hacks, which were disseminated through DCLeaks and Guccifer 2.0, both identified as fronts for Russian military intelligence, as well as Wikileaks, which is alluded to, but not named in the Mueller indictment.

The hacks may not have changed the results of the 2016 election, but the effects were very real.

It was as though a team's entire playbook was revealed just days before the Super Bowl. While the rules of football weren't changed and the scoreboard wasn't surreptitiously altered, that doesn't mean the outcome of the contest wasn't affected.

That, then, is the big picture revelation from Mr Mueller's most recent indictment - which comes in addition to the already announced indictments and plea agreements from 20 individuals and three Russian companies. The 29-page court filing contains a variety of other details and revelations that add to the growing picture of alleged Russian election meddling which the Mueller team is outlining.

Russia, if you're listening…
At a Florida press event on 27 July 2016, candidate Trump issued a now famous request.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," he said. "I think you will probably be rewarded mightily by our press."

The line shocked many at the time and has been cited repeatedly since then as evidence that Mr Trump was actively encouraging Russian attempts to acquire and disseminate emails from Mrs. Clinton and her team. The 27 July date makes an appearance in Mr Mueller's most recent indictment document, as well.

"On or about July 27, 2016, the Conspirators attempted after hours to Spearphishing for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office," the court filing reads. "At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton campaign."

While this isn't the first time Russians allegedly targeted the Clinton team, after Mr Trump's remarks the hackers escalated their efforts.

"It seems clear that the indictment is trying to make the connection with language like 'after hours' and 'first time'," tweeted conservative commentator, and Trump critic, Ben Shapiro. "But even Trump publicly saying he wants the Russians to do something and them doing it isn't collusion in any real sense." 

It is, however, an uncanny coincidence.

A Political War Map
The indictment sheet also documents a number of interactions between Americans and Russian military operatives, although it stresses that there are no allegations that those Americans knew the true identity behind the internet aliases with whom they were corresponding.

A Florida blogger and state lobbyist, possibly Aaron Nevins, exchanged messages with Guccifer 2.0 and acquired a trove of documents Democrats had compiled outlining the weaknesses of the party's candidates running for congressional office in Florida. Mr Nevins told the Wall Street Journal that he had told Guccifer 2.0 in an email: "Basically if this was a war, this is the map to where all the troops are deployed."

Guccifer 2.0 also sent documents to a reporter "pertaining to the Black Lives Matter" movement. In another paragraph, Mr Mueller's team notes that a congressional candidate directly asked Guccifer 2.0 for stolen documents about his opponent - a request that the hacker accommodated. 

A long-time Trump man in the spotlight - but not the charge sheet
The Mueller indictment mentions that Guccifer 2.0 had direct communications with a person "who was in regular contact with senior members of the presidential campaign of Donald J Trump". It goes on to quote emails that match communications that Roger Stone, a Trump friend and acquaintance for decades, said he had with Guccifer 2.0 in August 2016. In those communications, Guccifer 2.0 asks Mr Stone to analyse some of his documents and offers to help the man who served as a Trump campaign aide early in his presidential bid. 

"It would be a great pleasure to me," the hacker wrote.

In May Mr Stone told a television interviewer that he was "prepared" to be indicted by the special counsel. "It is not inconceivable now that Mr Mueller and his team may seek to conjure up some extraneous crime pertaining to my business, or maybe not even pertaining to the 2016 election," he said. "I would chalk this up to an effort to silence me." Mr Stone has denied that he had any knowing contact with Russian agents. That's an assertion that the Mueller team appears to have accepted, at least for now. 

A Conspiracy Theory put to Rest?
Back in May former Republican Speaker of the House Newt Gingrich suggested that the real source of the DNC hacks was Seth Rich, a former Democratic operative who was murdered in Washington DC, in July 2016.

"It turns out it wasn't the Russians, it was this young guy who, I suspect, was disgusted by the corruption of the Democratic National Committee," Mr Gingrich said. "He's been killed, and apparently nothing serious has been done to investigate his murder."

It was a theory championed, as well, by conservative commentator and presidential confidante Sean Hannity, even though Washington, DC, police have concluded that the death was the result of a botched robbery. Mr Trump himself has alluded to the conspiracy theories, frequently tweeting and wondering aloud why the Democratic National Committee did not allow federal investigators to conduct a forensic examination of the hacked email server.

Just over two weeks after his most recent tweet, the special counsel's office has pointed the finger of responsibility for the DNC hacks directly at the Russian military. 

Given that Mr Trump was informed about the indictments earlier this week, but still referred to the Mueller investigation as a witch-hunt in remarks on Friday 13th July, he probably will not tone down his criticisms of the probe or suggestions of Russian innocence, but perhaps he will no longer cite the DNC server hacks quite so frequently.

BBC:                 Image: Special Prosecutor Rober Mueller

You Might Also Read: 

Both US Presidential Campaigns Hacked:

How Did WikiLeaks Get Clinton's Emails?:

 

« US Dark Web Raids Lead to Arrests And Seizures
For Sale: Access To Airport Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.

LabEx

LabEx

LabEx is an AI-Powered learning platform with labs spanning from Linux devops to web development and cybersecurity.