The Mueller Investigation Identifies Russian Spies

In painstaking detail, Robert Mueller's special counsel team laid out what it alleges was a concerted effort by the Russian military to hack the Democratic National Committee and senior-level Clinton campaign officials and disseminate private documents in order to disrupt and influence the 2016 US presidential election.

The Russians also attempted to infiltrate local election systems and software, although Deputy Attorney General Rod Rosenstein says that there is no evidence that they "altered the vote count or changed any election result". 

The Trump White House has picked up on this line, issuing a statement reiterating that there have been no allegations of "knowing involvement by anyone on the campaign" or that the hacking "affected the election result". That isn't what Mr Rosenstein and the special counsel's court filings concluded, however. The deputy attorney general said it was "not our responsibility" to assess to what extent Russian involvement influenced the 2016 election.

In fact, it is hard to deny that the hacks had a clear impact on US politics in 2016, and exacted a heavy toll on Democrats and the Clinton campaign in particular.

As a result of the hacks, the head of the Democratic National Committee was forced from office on the eve of the party's national convention, a convention whose first few days were marred by protests from Bernie Sanders supporters angry about the contents of some of those Democratic National Committee emails. 

John Podesta, the chair of Hillary Clinton's presidential campaign, had his personal correspondence exposed, including internal debates over political strategy, outlines of Mrs. Clinton's greatest weaknesses and transcripts of her private speeches, excerpts of which were cited by Donald Trump in presidential debates and on the campaign stump. Indeed, Mr Trump celebrated and amplified the revelations in the hacks, which were disseminated through DCLeaks and Guccifer 2.0, both identified as fronts for Russian military intelligence, as well as Wikileaks, which is alluded to, but not named in the Mueller indictment.

The hacks may not have changed the results of the 2016 election, but the effects were very real.

It was as though a team's entire playbook was revealed just days before the Super Bowl. While the rules of football weren't changed and the scoreboard wasn't surreptitiously altered, that doesn't mean the outcome of the contest wasn't affected.

That, then, is the big picture revelation from Mr Mueller's most recent indictment - which comes in addition to the already announced indictments and plea agreements from 20 individuals and three Russian companies. The 29-page court filing contains a variety of other details and revelations that add to the growing picture of alleged Russian election meddling which the Mueller team is outlining.

Russia, if you're listening…
At a Florida press event on 27 July 2016, candidate Trump issued a now famous request.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," he said. "I think you will probably be rewarded mightily by our press."

The line shocked many at the time and has been cited repeatedly since then as evidence that Mr Trump was actively encouraging Russian attempts to acquire and disseminate emails from Mrs. Clinton and her team. The 27 July date makes an appearance in Mr Mueller's most recent indictment document, as well.

"On or about July 27, 2016, the Conspirators attempted after hours to Spearphishing for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office," the court filing reads. "At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton campaign."

While this isn't the first time Russians allegedly targeted the Clinton team, after Mr Trump's remarks the hackers escalated their efforts.

"It seems clear that the indictment is trying to make the connection with language like 'after hours' and 'first time'," tweeted conservative commentator, and Trump critic, Ben Shapiro. "But even Trump publicly saying he wants the Russians to do something and them doing it isn't collusion in any real sense." 

It is, however, an uncanny coincidence.

A Political War Map
The indictment sheet also documents a number of interactions between Americans and Russian military operatives, although it stresses that there are no allegations that those Americans knew the true identity behind the internet aliases with whom they were corresponding.

A Florida blogger and state lobbyist, possibly Aaron Nevins, exchanged messages with Guccifer 2.0 and acquired a trove of documents Democrats had compiled outlining the weaknesses of the party's candidates running for congressional office in Florida. Mr Nevins told the Wall Street Journal that he had told Guccifer 2.0 in an email: "Basically if this was a war, this is the map to where all the troops are deployed."

Guccifer 2.0 also sent documents to a reporter "pertaining to the Black Lives Matter" movement. In another paragraph, Mr Mueller's team notes that a congressional candidate directly asked Guccifer 2.0 for stolen documents about his opponent - a request that the hacker accommodated. 

A long-time Trump man in the spotlight - but not the charge sheet
The Mueller indictment mentions that Guccifer 2.0 had direct communications with a person "who was in regular contact with senior members of the presidential campaign of Donald J Trump". It goes on to quote emails that match communications that Roger Stone, a Trump friend and acquaintance for decades, said he had with Guccifer 2.0 in August 2016. In those communications, Guccifer 2.0 asks Mr Stone to analyse some of his documents and offers to help the man who served as a Trump campaign aide early in his presidential bid. 

"It would be a great pleasure to me," the hacker wrote.

In May Mr Stone told a television interviewer that he was "prepared" to be indicted by the special counsel. "It is not inconceivable now that Mr Mueller and his team may seek to conjure up some extraneous crime pertaining to my business, or maybe not even pertaining to the 2016 election," he said. "I would chalk this up to an effort to silence me." Mr Stone has denied that he had any knowing contact with Russian agents. That's an assertion that the Mueller team appears to have accepted, at least for now. 

A Conspiracy Theory put to Rest?
Back in May former Republican Speaker of the House Newt Gingrich suggested that the real source of the DNC hacks was Seth Rich, a former Democratic operative who was murdered in Washington DC, in July 2016.

"It turns out it wasn't the Russians, it was this young guy who, I suspect, was disgusted by the corruption of the Democratic National Committee," Mr Gingrich said. "He's been killed, and apparently nothing serious has been done to investigate his murder."

It was a theory championed, as well, by conservative commentator and presidential confidante Sean Hannity, even though Washington, DC, police have concluded that the death was the result of a botched robbery. Mr Trump himself has alluded to the conspiracy theories, frequently tweeting and wondering aloud why the Democratic National Committee did not allow federal investigators to conduct a forensic examination of the hacked email server.

Just over two weeks after his most recent tweet, the special counsel's office has pointed the finger of responsibility for the DNC hacks directly at the Russian military. 

Given that Mr Trump was informed about the indictments earlier this week, but still referred to the Mueller investigation as a witch-hunt in remarks on Friday 13th July, he probably will not tone down his criticisms of the probe or suggestions of Russian innocence, but perhaps he will no longer cite the DNC server hacks quite so frequently.

BBC:                 Image: Special Prosecutor Rober Mueller

You Might Also Read: 

Both US Presidential Campaigns Hacked:

How Did WikiLeaks Get Clinton's Emails?:

 

« US Dark Web Raids Lead to Arrests And Seizures
For Sale: Access To Airport Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.

Reality Defender

Reality Defender

Reality Defender stops deepfakes before they become a problem. Our proprietary deepfake and generative content fingerprinting technology detects video, audio, and image deepfakes.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.