Advertisement
Guest User

Muller Report - GRU

a guest
Apr 19th, 2019
3,400
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 89.56 KB | None | 0 0
  1.  
  2. RESULT: 1
  3.  
  4. PAGE: 2
  5.  
  6. TEXT:
  7.  
  8. U.S. Department of Justice At:t:ef'fle)' Werle Predttet /,' Ma;? CeHtail'l
  9. Material Preteeted UHder Fed. R. Crim. P. 6(e) TABLE OF CONTENTS -VOLUME I
  10. INTRODUCTION TO VOLUME I .......................................................
  11. ................................................... 1 EXECUTIVE SUMMARY TO
  12. VOLUME 1. ................................................ ,
  13. ............................................. 4 I. THE SPECIAL COUNSEL'S
  14. INVESTIGATION
  15. ......................................................................... ,
  16. ....... 11 II. RUSSIAN "ACTIVE MEASURES" SOCIAL MEDIA CAMPAIGN
  17. ..................................................... 14 A. Structure of the
  18. Internet Research Agency
  19. ................................................................. 15 B. Funding
  20. and Oversight from Concord and Prigozhin
  21. ................................................. 16 C. The IRA Targets U.S.
  22. Elections ......................................................................
  23. ............ 19 1. The IRA Ramps Up U.S. Operations As Early As 2014
  24. ....................... , .............. 19 2. U.S. Operations Through IRA-
  25. Controlled Social Media Accounts ..................... 22 3. U.S. Operations
  26. Through Facebook.
  27. ..................................................................... 24 4. U.S.
  28. Operations Through Twitter
  29. ......................................................................... 26 a.
  30. Individualized Accounts ........................................................
  31. ........................... 26 b. IRA Botnet Activities ........................
  32. .............................................................. 28 5. U.S.
  33. Operations Involving Political Rallies
  34. .......................................................... 29 6. Targeting and
  35. Recruitment of U.S. Persons
  36. .......................................................... 31 7. Interactions
  37. and Contacts with the Trump Campaign ...........................................
  38. 33 a. Trump Campaign Promotion ofIRA Political Materials
  39. ................................. 33 b. Contact with Trump Campaign Officials in
  40. Connection to Rallies ................. 35 Ill. RUSSIAN HACKING AND DUMPING
  41. OPERATIONS .....................................................................
  42. 36 A. GRU Hacking Directed at the Clinton Campaign
  43. ....................................................... 36 1. GRU Units Target
  44. the Clinton Campaign
  45. ............................................................. 36 2. Intrusions
  46. into the DCCC and DNC Networks
  47. ..................................................... 38 a. Initial Access .....
  48. ................................................................................
  49. ............... 3 8 b. Implantation ofMalware on DCCC and DNC Networks
  50. ................................ 38 c. Theft of Documents from DNC and DCCC
  51. Networks .................................... 40 B. Dissemination of the Hacked
  52. Materials ......................................................................
  53. 41 I. DCLeaks ..................................................................
  54. ............................................. 41 2. Guccifer 2.0 ...............
  55. ................................................................................
  56. ............ 42 3. Use of WikiLeaks .................................. :
  57. .............................................................. 44 a. WikiLeaks's
  58. Expressed Opposition Toward the Clinton Campaign ............... 44 b.
  59. WikiLeaks's First Contact with Guccifer 2.0 and DCLeaks
  60. ........................... 45
  61.  
  62. RESULT: 2
  63.  
  64. PAGE: 3
  65.  
  66. TEXT:
  67.  
  68. U.S. Department of Justice MterHey Werk Pretittet // Ma,? Cel'ltail'I Material
  69. Preteeteti UH:tier Fee. R. Crim. P. 6(e) c. The GRU's Transfer of Stolen
  70. Materials to WikiLeaks .................................. 45 d. ? WikiLeaks
  71. Statements Dissembling About the Source of Stolen Materials ....................
  72. ................................................................................
  73. .... 48 C. Additional GRU Cyber Operations
  74. ............................................................................. 49
  75. l. Summer and Fall 2016 Operations Targeting Democrat-Linked Victims
  76. ............ 49 2. Intrusions Targeting the Administration of U.S. Elections
  77. ................................... 50 D. Trump Campaign and the Dissemination
  78. of Hacked Materials .................................. 51 l. ...................
  79. ........................................................................... 51
  80. a. Background ..................................................................
  81. .................................... 51 b. Contacts with the Campaign about
  82. WikiLeaks ................................................ 52 C. Harm to Ongoing
  83. Matter .................... 54 d. WikiLeaks's October 7, 2016 Release of Stolen
  84. Podesta Emails .................... 58 e. Donald Trump Jr. Interaction with
  85. WikiLeaks ................................................ 59 2. Other Potential
  86. Campaign Interest in Russian Hacked Materials ......................... 61 a.
  87. Henry Oknyansky (a/k/a Henry Greenberg)
  88. .................................................... 61 b. Campaign Efforts to
  89. Obtain Deleted Clinton Emails ...................................... 62 IV.
  90. RUSSIAN GOVERNMENT LINKS To AND CONTACTS WITH THE TRUMP CAMPAIGN
  91. ................ 66 A. Campaign Period (September 2015 -November 8, 2016)
  92. ......................................... 66 1. Trump Tower Moscow Project
  93. ............................................................................. 67
  94. a. Trump Tower Moscow Venture with the Crocus Group (2013-2014) ............ 67
  95. b. Communications with LC. Expert Investment Company and Giorgi Rtskhiladze
  96. (Summer and Fall 2015)
  97. ............................................................ 69 c. Letter of
  98. Intent and Contacts to Russian Government (October 2015-January 2016) ..........
  99. ................................................................................
  100. ...... 70 i. Trump Signs the Letter of Intent on behalf of the Trump
  101. Organization .... 70 ii. Post-LOI Contacts with Individuals in Russia
  102. ......................................... 72 d. Discussions about Russia Travel
  103. by Michael Cohen or Candidate Trump (December 2015-June 2016)
  104. ......................................................................... 76 i.
  105. Sater's Overtures to Cohen to Travel to Russia
  106. ........................................ 76 ii. Candidate Trump's Opportunities
  107. to Travel to Russia ............................ 78 2. George Papadopoulos .....
  108. ................................................................................
  109. ...... 80 a. Origins of Campaign Work
  110. ..............................................................................
  111. 81 b. Initial Russia-Related Contacts
  112. ........................................................................ 82 c.
  113. March 31 Foreign Policy Team Meeting
  114. ......................................................... 85 ii
  115.  
  116. RESULT: 3
  117.  
  118. PAGE: 11
  119.  
  120. TEXT:
  121.  
  122. U.S. Department of Justice Atterrte~? Werk Predttet // May Cetttairt Material
  123. Preteetee Urteer Fee. R. Crim. P. 6(e) EXECUTIVE SUMMARY TO VOLUME I RUSSIAN
  124. SOCIAL MEDIA CAMPAIGN The Internet Research Agency (IRA) carried out the
  125. earliest Russian interference operations identified by the investigation-a
  126. social media campaign designed to provoke and amplify political and social
  127. discord in the United States. The IRA was based in St. Petersburg, Russia, and
  128. received funding from Russian oligarch Y evgeniy Prigozhin and companies he
  129. controlled. Pri ozhin is widel re orted to have ties to Russian President
  130. Vladimir Putin In mid-2014, the IRA sent em lo mission with instructions The IRA
  131. later used social media accounts and interest groups to sow discord in the U.S.
  132. political system through what it termed "information warfare." The campaign
  133. evolved from a generalized program designed in 2014 and 2015 to undermine the
  134. U.S. electoral system, to a targeted operation that by early 2016 favored
  135. candidate Trump and disparaged candidate Clinton. The IRA' s operation also
  136. included the purchase of political advertisements on social media in the names
  137. of U.S. persons and entities, as well as the staging of political rallies inside
  138. the United States. To organize those rallies, IRA employees posed as U.S.
  139. grassroots entities and persons and made contact with Trump supporters and Trump
  140. Campaign officials in the United States. The investigation did not identify
  141. evidence that any U.S. persons conspired or coordinated with the IRA. Section II
  142. of this report details the Office's investigation of the Russian social media
  143. campaign. RUSSIAN HACKING OPERATIONS At the same time that the IRA operation
  144. began to focus ?on supporting candidate Trump in early 2016, the Russian
  145. government employed a second form of interference: cyber intrusions (hacking)
  146. and releases of hacked materials damaging to the Clinton Campaign. The Russian
  147. intelligence service known as the Main Intelligence Directorate of the General
  148. Staff of the Russian Army (GRU) carried out these operations. In March 2016, the
  149. GRU began hacking the email accounts of Clinton Campaign volunteers and
  150. employees, including campaign chairman John Podesta. In April 2016, the GRU
  151. hacked into the computer networks of the Democratic Congressional Campaign
  152. Committee (DCCC) and the Democratic National Committee (DNC). The GRU stole
  153. hundreds of thousands of documents from the compromised email accounts and
  154. networks. Around the time that the DNC announced in mid-June 2016 the Russian
  155. government's role in hacking its network, the GRU began disseminating stolen
  156. materials through the fictitious online personas "DCLeaks" and "Guccifer 2.0."
  157. The GRU later released additional materials through the organization WikiLeaks.
  158. 4
  159.  
  160. RESULT: 4
  161.  
  162. PAGE: 12
  163.  
  164. TEXT:
  165.  
  166. U.S. Department of Justice AH:erHey \?Brit Pr6d1:1et // Mtty Cet1:tttifl
  167. Mttterittl Preteeted Ut1:der Fed. R. Ct1iffl. P. 6(e) The presidential campaign
  168. of Donald J. Trump ("Trump Campaign" or "Campaign") showed interest in
  169. WikiLeaks's releases of documents and welcomed their otential to damage
  170. candidate Clinton. Beginning in June 2016,
  171. llfilllillliliilfll~llliillllllilllilli forecast to senior Campaign officials
  172. that WikiLeaks would release information damaging to candidate Clinton.
  173. WikiLeaks's first release came in July 2016. Around the same time, candidate
  174. Trump announced that he hoped Russia would recover emails described as missing
  175. from a private server used b Clinton when she was Secreta of State he later said
  176. that he was s ? eakin sarcasticall . WikiLeaks began releasing Podesta' s stolen
  177. emails on October 7, 2016, less than one hour after a U.S. media outlet released
  178. video considered damaging to candidate Trump. Section lII of this Report details
  179. the Office's investigation into the Russian hacking operations, as well as other
  180. efforts by Trump Campaign supporters to obtain Clinton-related emails. RUSSIAN
  181. CONTACTS WITH THE CAMPAIGN The social media campaign and the GRU hacking
  182. operations coincided with a series of contacts between Trump Campaign officials
  183. and individuals with ties to the Russian government. The Office investigated
  184. whether those contacts reflected or resulted in the Campaign conspiring or
  185. coordinating with Russia in its election-interference activities. Although the
  186. investigation established that the Russian government perceived it would benefit
  187. from a Trump presidency and worked to secure that outcome, and that the Campaign
  188. expected it would benefit electorally from information stolen and released
  189. through Russian efforts, the investigation did not establish that members of the
  190. Trump Campaign conspired or coordinated with the Russian government in its
  191. election interference activities. The Russian contacts consisted of business
  192. connections, offers of assistance to the Campaign, invitations for candidate
  193. Trump and Putin to meet in person, invitations for Campaign officials and
  194. representatives of the Russian government to meet, and policy positions seeking
  195. improved U.S.-Russian relations. Section IV of this Report details the contacts
  196. between Russia and the Trump Campaign during the campaign and transition
  197. periods, the most salient of which are summarized below in chronological order.
  198. 2015. Some of the earliest contacts were made in connection with a Trump
  199. Organization real-estate project in Russia known as Trump Tower Moscow.
  200. Candidate Trump signed a Letter oflntent for Trump Tower Moscow by November
  201. 2015, and in January 2016 Trump Organization executive Michael Cohen emailed and
  202. spoke about the project with the office of Russian government press secretary
  203. Dmitry Peskov. The Trump Organization pursued the project through at least June
  204. 2016, including by considering travel to Russia by Cohen and candidate Trump.
  205. Spring 2016. Campaign foreign policy advisor George Papadopoulos made early
  206. contact with Joseph Mifsud, a London-based professor who had connections to
  207. Russia and traveled to Moscow in April 2016. Immediately upon his return to
  208. London from that trip, Mifsud told Papadopoulos that the Russian government had
  209. "dirt" on Hillary Clinton in the form of thousands 5
  210.  
  211. RESULT: 5
  212.  
  213. PAGE: 13
  214.  
  215. TEXT:
  216.  
  217. U.S. Department of Justice l\.ttortte~? Work Pt'od1:1et // Mtty Cotttttitt
  218. Mttterittl Proteeted Uttder Fed. R. Criffl. P. 6(e) of emails. One week later,
  219. in the first week of May 2016, Papadopoulos suggested to a representative of a
  220. foreign government that the Trump Campaign had received indications from the
  221. Russian government that it could assist the Campaign through the anonymous
  222. release of information damaging to candidate Clinton. Throughout that period of
  223. time and for several months thereafter, Papadopoulos worked with Mifsud and two
  224. Russian nationals to arrange a meeting between the Campaign and the Russian
  225. government. No meeting took place. Summer 2016. Russian outreach to the Trump
  226. Campaign continued into the summer of 2016, as candidate Trump was becoming the
  227. presumptive Republican nominee for President. On June 9, 2016, for example, a
  228. Russian lawyer met with senior Trump Campaign officials Donald Trump Jr., Jared
  229. Kushner, and campaign chairman Paul Manafort to deliver what the email proposing
  230. the meeting had described as "official documents and information that would
  231. incriminate Hillary." The materials were offered to Trump Jr. as "part of Russia
  232. and its government's support for Mr. Trump." The written communications setting
  233. up the meeting showed that the Campaign anticipated receiving information from
  234. Russia that could assist candidate Trump's electoral prospects, but the Russian
  235. lawyer's presentation did not provide such information. Days after the June 9
  236. meeting, on June 14, 2016, a cybersecurity firm and the DNC announced that
  237. Russian government hackers had infiltrated the DNC and obtained access to
  238. opposition research on candidate Trump, among other documents. In July 2016,
  239. Campaign foreign policy advisor Carter Page traveled in his personal capacity to
  240. Moscow and gave the keynote address at the New Economic School. Page had lived
  241. and worked in Russia between 2003 and 2007. After returning to the United
  242. States, Page became acquainted with at least two Russian intelligence officers,
  243. one of whom was later charged in 2015 with conspiracy to act as an unregistered
  244. agent of Russia. Page's July 2016 trip to Moscow and his advocacy for pro-
  245. Russian foreign policy drew media attention. The Campaign then distanced itself
  246. from Page and, by late September 2016, removed him from the Campaign. July 2016
  247. was also the month WikiLeaks first released emails stolen by the GRU from the
  248. DNC. On July 22, 2016, WikiLeaks posted thousands of internal DNC documents
  249. revealing information about the Clinton Campaign. Within days, there was public
  250. reporting that U.S. intelligence agencies had "high confidence" that the Russian
  251. government was.behind the theft of emails and documents from the DNC. And within
  252. a week of the release, a foreign government informed the FBI about its May 2016
  253. interaction with Papadopoulos and his statement that the Russian government
  254. could assist the Trump Campaign. On July 31, 2016, based on the foreign
  255. government rep01ting, the FBI opened an investigation into potential
  256. coordination between the Russian government and individuals associated with the
  257. Trump Campaign. Separately, on August 2, 2016, Trump campaign chairman Paul
  258. Manafort met in New York City with his long-time business associate Konstantin
  259. Kilimnik, who the FBI assesses to have ties to Russian intelligence. Kilimnik
  260. requested the meeting to deliver in person a peace plan for Ukraine that
  261. Manafort acknowledged to the Special Counsel's Office was a "backdoor" way for
  262. Russia to control part of eastern Ukraine; both men believed the plan would
  263. require candidate Trump's assent to succeed (were he to be elected President).
  264. They also discussed the status of the 6
  265.  
  266. RESULT: 6
  267.  
  268. PAGE: 14
  269.  
  270. TEXT:
  271.  
  272. U.S. Department of Justice Atteffle'.} 'Nm?k P1:1edttet // May Cm~taitt Material
  273. Preteetecl Uttcler Fed. R. C1:1im. P. 6(e) Trump Campaign and Manafort's
  274. strategy for winning Democratic votes in Midwestern states. Months before that
  275. meeting, Manafort had caused internal polling data to be shared with Kilimnik,
  276. and the sharing continued for some period of time after their August meeting.
  277. Fall 2016. On October 7, 2016, the media released video of candidate Trump
  278. speaking in graphic terms about women years earlier, which was considered
  279. damaging to his candidacy. Less than an hour later, WikiLeaks made its second
  280. release: thousands of John Podesta's emails that had been stolen by the GRU in
  281. late March 2016. The FBI and other U.S. government institutions were at the time
  282. continuing their investigation of suspected Russian government efforts to
  283. interfere in the presidential election. That same day, October 7, the Department
  284. of Homeland Security and the Office of the Director of National Intelligence
  285. issued a joint public statement "that the Russian Government directed the recent
  286. compromises of e-mails from US persons and institutions, including from US
  287. political organizations." Those "thefts" and the "disclosures" of the hacked
  288. materials through online platforms such as WikiLeaks, the statement continued,
  289. "are intended to interfere with the US election process." Post-2016 Election.
  290. Immediately after the November 8 election, Russian government officials and
  291. prominent Russian businessmen began trying to make inroads into the new
  292. administration. The most senior levels of the Russian government encouraged
  293. these efforts. The Russian Embassy made contact hours after the election to
  294. congratulate the President-Elect and to arrange a call with President Putin.
  295. Several Russian businessmen picked up the effort from there. Kirill Dmitriev,
  296. the chief executive officer of Russia's sovereign wealth fund, was among the
  297. Russians who tried to make contact with the incoming administration. In early
  298. December, a business associate steered Dmitriev to Erik Prince, a supporter of
  299. the Trump Campaign and an associate of senior Trump advisor Steve Bannon.
  300. Dmitriev and Prince later met face-to-face in January 2017 in the Seychelles and
  301. discussed U.S.-Russia relations. During the same period, another business
  302. associate introduced Dmitriev to a friend of Jared Kushner who had not served on
  303. the Campaign or the Transition Team. Dmitriev and Kushner's friend collaborated
  304. on a short written reconciliation plan for the United States and Russia, which
  305. Dmitriev implied had been cleared through Putin. The friend gave that proposal
  306. to Kushner before the inauguration, and Kushner later gave copies to Bannon and
  307. incoming Secretary of State Rex Tillerson. On December 29, 2016, then-President
  308. Obama imposed sanctions on Russia for having interfered in the election.
  309. Incoming National Security Advisor Michael Flynn called Russian Ambassador
  310. Sergey Kislyak and asked Russia not to escalate the situation in response to the
  311. sanctions. The following day, Putin announced that Russia would not take
  312. retaliatory measures in response to the sanctions at that time. Hours later,
  313. President-Elect Trump tweeted, "Great move on delay (by V. Putin)." The next
  314. day, on December 31, 2016, Kislyak called Flynn and told him the request had
  315. been received at the highest levels and Russia had chosen not to retaliate as a
  316. result of Flynn's request. * * * On January 6, 2017, members of the intelligence
  317. community briefed President-Elect Trump on a joint assessment-drafted and
  318. coordinated among the Central Intelligence Agency, FBI, and 7
  319.  
  320. RESULT: 7
  321.  
  322. PAGE: 43
  323.  
  324. TEXT:
  325.  
  326. U.S. Department of Justice Attem1:ey Work Prod1:1et /,' M1ty Cot1t1tit1
  327. Mftteri1tl Proteeted Ut1der Fed. R. Crifl'I. P. 6(e) III. RUSSIAN HACKING AND
  328. DUMPING OPERATIONS Beginning in March 2016, units of the Russian Federation's
  329. Main Intelligence Directorate of the General Staff (GRU) hacked the computers
  330. and email accounts of organizations, e?mployees, and volunteers supporting the
  331. Clinton Campaign, including the email account of campaign chairman John Podesta.
  332. Starting in April 2016, the GRU hacked into the computer networks of the
  333. Democratic Congressional Campaign Committee (DCCC) and the Democratic National
  334. Committee (DNC). The GRU targeted hundreds of email accounts used by Clinton
  335. Campaign employees, advisors, and volunteers. In total, the GRU stole hundreds
  336. of thousands of documents from the compromised email accounts and networks.109
  337. The GRU later released stolen Clinton Campaign and DNC documents through online
  338. personas, "DCLeaks" and "Guccifer 2.0," and later through the organization
  339. WikiLeaks. The release of the documents was designed and timed to interfere with
  340. the 2016 U.S. presidential election and undermine the Clinton Campaign. , the
  341. Trump Campaign about WikiLeaks's activities. The investigation was unable to
  342. resolve WikiLeaks's release of the stolen Podesta emails on October 7, 2016, the
  343. same day a video from years earlier was published of Trump using graphic
  344. language about women. A. GRU Hacking Directed at the Clinton Campaign 1. GRU
  345. Units Target the Clinton Campaign Two military units of the GRU carried out the
  346. computer intrusions into the Clinton Campaign, DNC, and DCCC: Military Units
  347. 26165 and 74455.110 Military Unit 26165 is a GRU cyber unit dedicated to
  348. targeting military, political, governmental, and non-governmental organizations
  349. outside of Russia, including in the United States.111 The unit was sub-divided
  350. into departments with different specialties. One department, for example,
  351. developed specialized malicious software "malware" , while another de artment
  352. conducted large-scale spearphishing campaigns.112 jfllllililliliilllilli
  353. lilillllll~ a bitcoin mining operation to 109 As discussed in Section V below,
  354. our Office charged 12 GRU officers for crimes arising from the hacking of these
  355. computers, principally with conspiring to commit computer intrusions, in
  356. violation of 18 U.S.C. ?? 1030 and 371. See Volume I, Section V.B, infra;
  357. Indictment, United States v. Netyksho, No. I :18-cr-215 (D.D.C. July 13, 2018),
  358. Doc. 1 ("Netyksho Indictment"). 110 Netyksho Indictment ,r 1. 111 Separate from
  359. this Office's indictment of GRU officers, in October 2018 a grand jury sitting
  360. in the Western District of Pennsylvania returned an indictment charging certain
  361. members of Unit 26165 with hacking the U.S. Anti-Doping Agency, the World Anti-
  362. Doping Agency, and other international sport associations. United States v.
  363. Aleksei Sergeyevich Morenets, No. 18-263 (W.D. Pa.). 112 A spearphishing email
  364. is designed to appear as though it originates from a trusted source, and
  365. solicits information to enable the sender to gain access to an account or
  366. network, or causes the recipient to 36
  367.  
  368. RESULT: 8
  369.  
  370. PAGE: 44
  371.  
  372. TEXT:
  373.  
  374. U.S. Department of Justice MorAey Work Prodttet // Ma:,? CoAiait\ Material
  375. Protected UAder Fed. R. Criffl. P. 6(e) secure bitcoins used to purchase
  376. computer infrastructure used in hacking operations.113 Military Unit 74455 is a
  377. related GRU unit with multiple departments that engaged in cyber operations.
  378. Unit 74455 assisted in the release of documents stolen by Unit 26165, the
  379. promotion of those releases, and the publication of anti-Clinton content on
  380. social media accounts operated by the GRU. Officers from Unit 74455 separately
  381. hacked computers belonging to state boards of elections, secretaries of state,
  382. and U.S. companies that supplied software and other technology related to the
  383. administration of U.S. elections.114 Beginning in mid-March 2016, Unit 26165 had
  384. primary responsibility for hacking the DCCC and DNC, as well as email accounts
  385. of individuals affiliated with the Clinton Campaign: 115 Unit 26165 used
  386. Investigative Technique began before the GRU had obtained any credentials or
  387. gained access to these networks, indicating that the later DCCC and DNC
  388. intrusions were not crimes of opportunity but rather the result of targeting.116
  389. GRU officers also sent hundreds of spearphishing emails to the work and personal
  390. email accounts of Clinton Campaign employees and volunteers. Between March 10,
  391. 2016 and March 15, 2016, Unit 26165 appears to have sent approximately 90
  392. spearphishing emails to email accounts at hillaryclinton.com. Starting on March
  393. 15, 2016, the GRU began targeting Google email accounts used by Clinton Campaign
  394. employees, along with a smaller number of dnc.org email accounts.117 The GRU
  395. spearphishing operation enabled it to gain access to numerous email accounts of
  396. Clinton Campaign employees and volunteers, including campaign chairman John
  397. Podesta, junior volunteers assigned to the Clinton Campaign's advance team,
  398. informal Clinton Campaign advisors, and a DNC employee.118 GRU officers stole
  399. tens of thousands of emails from spearphishing victims, including various
  400. Clinton Campaign-related communications. download malware that enables the
  401. sender to gain access to an account or network. Netyksho Indictment 10. 113
  402. Bitcoin mining consists of unlocking new bitcoins by solving computational
  403. problems. Ill 1111 kept its newly mined coins in an account on the bitcoin
  404. exchange platform CEX.io. To make purchases, the GRU routed funds into other
  405. accounts through transactions designed to obscure the source of funds. Netyksho
  406. Indictment~ 62. 114 Netyksho Indictment~ 69. 115 Netyksho Indictment~ 9. 116 See
  407. SM-2589105, serials 144 & 495. 118 Investigative Technique 37
  408.  
  409. RESULT: 9
  410.  
  411. PAGE: 45
  412.  
  413. TEXT:
  414.  
  415. U.S. Department of Justice Attert1ey Werk P12ed1:1et // :Mt:ty Cmttaitt
  416. Materit:tl Preteeted Ut1der Fed. R. Criffl. P. 6(e) 2. Intrusions into the DCCC
  417. and DNC Networks a. Initial Access By no later than April 12, 2016, the GRU had
  418. gained access to the DCCC computer network using the credentials stolen from a
  419. DCCC employee who had been successfully spearphished the week before. Over the
  420. ensuing weeks, the GRU traversed the network, identifying different computers
  421. connected to the DCCC network. By stealing network access credentials along the
  422. way (including those of IT administrators with unrestricted access to the
  423. system), the GRU compromised approximately 29 different computers on the DCCC
  424. network.119 Approximately six days after first hacking into the DCCC network, on
  425. April 18, 2016, GRU officers gained access to the DNC network via a virtual
  426. private network (VPN) connection120 between the DCCC and DNC networks.121
  427. Between April 18, 2016 and June 8, 2016, Unit 26165 compromised more than 30
  428. computers on the DNC network, including the DNC mail server and shared file
  429. server.122 b. Implantation of Ma/ware on DCCC and DNC Networks Unit 26165
  430. implanted on the DCCC and DNC networks two types of customized malware, 123
  431. known as "X-Agent" and "X-Tunnel"; Mimikatz, a credential-harvesting tool; and
  432. rar.exe, a tool used in these intrusions to compile and compress materials for
  433. exfiltration. X-Agent was a multi-function hacking tool that allowed Unit 26165
  434. to log keystrokes, take screenshots, and gather other data about the infected
  435. computers (e.g., file directories, operating systems).124 Tunnel was a hacking
  436. tool that created an encrypted connection between the victim DCCC/DNC computers
  437. and GRU-controlled computers outside the DCCC and DNC networks that was capable
  438. of large-scale data transfers.125 GRU officers then used X-Tunnel to exfiltrate
  439. stolen data from the victim computers. 120 A VPN extends a private network,
  440. allowing users to send and receive data across public networks (such as the
  441. internet) as if the connecting computer was directly connected to the private
  442. network. The VPN in this case had been created to give a small number of DCCC
  443. employees access to certain databases housed on the DNC network. Therefore,
  444. while the DCCC employees were outside the DNC's private network, they could
  445. access parts of the DNC network from their DCCC computers. Investigative
  446. Technique Investigative Technique 123 "Malware" is short for malicious software,
  447. and here refers to software designed to allow a third party to infiltrate a
  448. computer without the consent or knowledge of the computer's user or operator.
  449. 124 Investigative Technique 125 Investigative Technique 38
  450.  
  451. RESULT: 10
  452.  
  453. PAGE: 46
  454.  
  455. TEXT:
  456.  
  457. U.S. Department of Justice Att:on1ey Work Proattet // Mtty Col'l:tttil'I:
  458. Mttterittl Proteetea Unser Fea. R. Crim.. P. 6(e) To operate X-Agent and
  459. X-Tunnel on the DCCC and DNC networks, Unit 26165 officers set up a group of
  460. computers outside those networks to communicate with the implanted malware.126
  461. The first set of GRU-controlled computers, known by the GRU as "middle servers,"
  462. sent and received messages to and from malware on the DNC/DCCC networks. The
  463. middle servers, in turn, relayed messages to a second set of GRU-controlled
  464. com;?'ters, labeled internally by the GRU as an "AMS Panel." The AMS Panel jjjff
  465. 11'??\1flffl 1?j'1?-served as a nerve center through which GRU officers
  466. monitored and directed the malware's operations on the DNC/DCCC networks.127 ! .
  467. ? . ? ? ? : Investigative Technique Investigative Technique Investigative
  468. Technique 126 In connection with these intrusions, the GRU used computers
  469. (virtual private networks, dedicated servers operated by hosting companies,
  470. etc.) that it leased from third-party providers located all over the world. The
  471. investi ation identified rental a reements and payments for computers located
  472. in, inter alia, -~-~-Ii IIMliilili all of which were used in the operations
  473. targeting the U.S. election. 127 Netyksho Indictment ,r 25. 128 Netyksho
  474. Indictment ,r 24( c ). 129 Netyksho Indictment ,r 24(b ). 39
  475.  
  476. RESULT: 11
  477.  
  478. PAGE: 47
  479.  
  480. TEXT:
  481.  
  482. U.S. Department of Justice Atlorttey Work Prodttet // May Cotttaifl Material
  483. Proteeted Under Fed. R. Crim. P. 6Ee) The Arizona-based AMS Panel also stored
  484. thousands of files containing keylogging sessions captured through X-Agent.
  485. These sessions were captured as GRU officers monitored DCCC and DNC employees'
  486. work on infected computers regularly between April 2016 and June 2016. Data
  487. captured in these key logging sessions included passwords, internal
  488. communications between employees, banking information, and sensitive personal
  489. information. c. Theft of Documents from DNC and DCCC Networks Officers from Unit
  490. 26165 stole thousands of documents from the DCCC and DNC networks, including
  491. significant amounts of data pertaining to the 2016 U.S. federal elections.
  492. Stolen documents included internal strategy documents, fundraising data,
  493. opposition research, and emails from the work inboxes of DNC employeesY0 The GRU
  494. began stealing DCCC data shortly after it gained access to the network. On April
  495. 14, 2016 (approximately three days after the initial intrusion) GRU officers
  496. downloaded rar.exe onto the DCCC's document server. The following day, the GRU
  497. searched one compromised DCCC computer for files containing search terms that
  498. included "Hillary," "DNC," "Cruz," and "Trump."131 On April 25, 2016, the GRU
  499. collected and compressed PDF and Microsoft documents from folders on the DCCC's
  500. shared file server that pertained to the 2016 election.132 The GRU appears to
  501. have compressed and exfiltrated over 70 gigabytes of data from this file
  502. server.133 The GRU also stole documents from the DNC network shortly after
  503. gaining access. On April 22, 2016, the GRU copied files from the DNC network to
  504. GRU-controlled computers. Stolen documents included the DNC' s opposition
  505. research into candidate Trump.134 Between approximately May 25, 2016 and June 1,
  506. 2016, GRU officers accessed the DNC's mail server from a GRU-controlled computer
  507. leased inside the United States.135 During these connections, 130 Netyksho
  508. Indictment ,i,i 27-29; Investigative Technique 131 Investigative Technique
  509. Investigative Technique Investigative Technique ? Investigative Technique
  510. SM-2589105-HACK, serial 5. Investigative Technique 135 Investigative Technique
  511. -See SM-2589105-GJ, serial 649. As part of its investigation, the FBI later
  512. received images ofDNC servers and copies of relevant traffic logs. Netyksho
  513. Indictment ,i,i 28-29. 40
  514.  
  515. RESULT: 12
  516.  
  517. PAGE: 48
  518.  
  519. TEXT:
  520.  
  521. U.S. Department of Justice Attarl'ley Werk Predttet // Mey Cel'ltail'l Material
  522. Preteeted Unaer Fed. R. Cril'l'I. P. 6(e) Unit 26165 officers appear to have
  523. stolen thousands of emails and attachments, which were later released by
  524. WikiLeaks in July 2016.136 B. Dissemination of the Hacked Materials The GRU's
  525. operations extended beyond stealing materials, and included releasing documents
  526. stolen from the Clinton Campaign and its supporters. The GRU carried out the
  527. anonymous release through two fictitious online personas that it created-DCLeaks
  528. and Guccifer 2.0-and later through the organization WikiLeaks. 1. DCLeaks The
  529. GRU began planning the releases at least as early as April 19, 2016, when Unit
  530. 26165 registered the domain dcleaks.com through a service that anonymized the
  531. registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that
  532. it had mined. 138 The dcleaks.com landing page pointed to different tranches of
  533. stolen documents, arranged by victim or subject matter. Other dcleaks.com pages
  534. contained indexes of the stolen emails that were being released (bearing the
  535. sender, recipient, and date of the email). To control access and the timing of
  536. releases, pages were sometimes password-protected for a period of time and later
  537. made unrestricted to the public. Starting in June 2016, the GRU posted stolen
  538. documents onto the website dcleaks.com, including documents stolen from a number
  539. of individuals associated with the Clinton Campaign. These documents appeared to
  540. have originated from personal email accounts (in particular, Google and
  541. Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks
  542. victims included an advisor to the Clinton Campaign, a former DNC employee and
  543. Clinton Campaign employee, and four other campaign volunteers.139 The GRU
  544. released through dcleaks.com thousands of documents, including personal
  545. identifying and financial information, internal correspondence related to the
  546. Clinton Campaign and prior political jobs, and fundraising files and
  547. information.140 136 Netyksho Indictment ,i 29. The last-in-time DNC email
  548. released by WikiLeaks was dated May 25, 2016, the same period of time during
  549. which the GRU gained access to the DNC's email server. Netyksho Indictment ,i
  550. 45. 137 Netyksho Indictment ,i 35. Approximately a week before the registration
  551. of dcleaks.com, the same actors attem ted to re ister the website
  552. electionleaks.com using the same domain registration service. 138 See
  553. SM-2589105, serial 181; Netyksho Indictment ,i 2l(a). 140 See, e.g., Internet
  554. Archive, "htt s://dcleaks.com/" archive date Nov. 10, 2016). Additionally,
  555. DCLeaks released documents relating to , emails belonging to_, and emails from
  556. 2015 relating to Republican Party employees (under the portfolio name "The
  557. United States Republican Party"). "The United States Republican Party" portfolio
  558. contained approximately 300 emails from a variety of GOP members, PACs,
  559. campaigns, state parties, and businesses dated between May and October 2015.
  560. According to open-source reporting, these victims shared the same 41
  561.  
  562. RESULT: 13
  563.  
  564. PAGE: 49
  565.  
  566. TEXT:
  567.  
  568. U.S. Department of Justice AM:6rt~ey W6rk Prndttet // Mtty CetttttiH Mttterittl
  569. Pr6teeted Umler Fed. R. Criffl. P. 6(e) GRU officers operated a Facebook page
  570. under the DCLeaks moniker, which they primarily used to promote releases of
  571. materials.141 The Facebook page was administered through a small number of
  572. preexisting GRU-controlled Facebook accounts.142 GRU officers also used the
  573. DCLeaks Facebook account, the Twitter account @dcleaks_, and the email account
  574. dcleaksproject@gmail.com to communicate privately with reporters and ? other
  575. U.S. persons. GRU officers using the DCLeaks persona gave certain reporters
  576. early access to archives of leaked files by sending them links and passwords to
  577. pages on the dcleaks.com website that had not yet become public. For example, on
  578. July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and
  579. password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook
  580. account.143 Similarly, on September 14, 2016, GRU officers sent reporters
  581. Twitter direct messages from @dcleaks_, with a password to another non-public
  582. part of the dcleaks.com website. 144 The DCLeaks.com website remained
  583. operational and public until March 2017. 2. Guccifer 2.0 On June 14, 2016, the
  584. DNC and its cyber-response team announced the breach of the DNC network and
  585. suspected theft of DNC documents. In the statements, the cyber-response team
  586. alleged that Russian state-sponsored actors (which they referred to as "Fancy
  587. Bear") were responsible for the breach. 145 Apparently in response to that
  588. announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0
  589. created a WordPress blog. In the hours leading up to the launch of that
  590. WordPress blog, GRU officers logged into a Moscow-based server used and managed
  591. by Unit 74455 and searched for a number of specific words and phrases in
  592. English, including "some hundred sheets," "illuminati," and "worldwide known."
  593. Approximately two hours after the last of those searches, Guccifer 2.0 published
  594. its first post, attributing the DNC server hack to a lone Romanian hacker and
  595. using several of the unique English words and phrases that the GRU officers had
  596. searched for that day.146 Tennessee-based web-hosting company, called Smartech
  597. Corporation. William Bastone, RNC E-Mail Was, In Fact, Hacked By Russians, The
  598. Smoking Gun (Dec. 13, 2016). 141 Netyksho Indictment ,r 38. 142 See, e.g.,
  599. Facebook Account 100008825623541 (Alice Donovan). 143 7/14/16 Facebook Message,
  600. ID 793058100795341 (DC Leaks) to ID 144 See, e .. , 9/14/16 Twitter DM, @dcleaks
  601. _ to KvFsgo/o* 14@gPgu& enjoy;)." ; 9/14/16 Twitter OM, . The messages read:
  602. "Hi https://t.co/QTvKUjQcOx pass: 145 Dmitri Alperovitch, Bears in the Midst:
  603. Intrusion into the Democratic National Committee, CrowdStrike Blog (June 14,
  604. 2016). CrowdStrike updated its post after the June 15, 2016 post by Guccifer 2.0
  605. claiming responsibility for the intrusion. 146 Netyksho Indictment ,r,r 41-42.
  606. 42
  607.  
  608. RESULT: 14
  609.  
  610. PAGE: 50
  611.  
  612. TEXT:
  613.  
  614. U.S. Department of Justice AtterHey '1?ei-lc Pfed1:1et // May CeHtaiH Material
  615. Preteeted UHder Fed. R. Criffl. P. 6(e) That same day, June 15, 2016, the GRU
  616. also used the Guccifer 2.0 WordPress blog to begin releasing to the public
  617. documents stolen from the DNC and DCCC computer networks. The Guccifer 2.0
  618. persona ultimately released thousands of documents stolen from the DNC and DCCC
  619. in a series of blog posts between June 15, 2016 and October 18, 2016.147
  620. Released documents included opposition research performed by the DNC (including
  621. a memorandum analyzing potential criticisms of candidate Trump), internal policy
  622. documents (such as recommendations on how to address politically sensitive
  623. issues), analyses of specific congressional races, and fundraising documents.
  624. Releases were organized around thematic issues, such as specific states (e.g.,
  625. Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S.
  626. presidential election. Beginning in late June 2016, the GRU also used the
  627. Guccifer 2.0 persona to release documents directly to reporters and other
  628. interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an
  629. email to the news outlet The Smoking Gun offering to provide "exclusive access
  630. to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later
  631. sent the reporter a password and link to a locked portion of the dcleaks.com
  632. website that contained an archive of emails stolen by Unit 26165 from a Clinton
  633. Campaign volunteer in March 2016.149 That the Guccifer 2.0 persona provided
  634. reporters access to a restricted portion of the DCLeaks website tends to
  635. indicate that both personas were operated by the same or a closely-related group
  636. of people.1so The GRU continued its release efforts through Guccifer 2.0 into
  637. August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a
  638. candidate for the U.S. Congress documents related to the candidate's
  639. opponent.1st On August 22, 2016, the Guccifer 2.0 persona transferred
  640. approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a
  641. U.S. blogger covering Florida politics.1s2 On August 22, 2016, the Guccifer 2.0
  642. persona sent a U.S. reporter documents stolen from the DCCC pertaining to the
  643. Black Lives Matter movement.1s3 147 Releases of documents on the Guccifer 2.0
  644. blog occurred on June 15, 2016; June 20, 2016; June 21, 2016; July 6, 2016; July
  645. 14, 2016; August 12, 2016; August 15, 2016; August 21, 2016; August 31, 2016;
  646. September 15, 2016; September 23, 2016; October 4, 2016; and October 18, 2016.
  647. ~~ccifer20@aol.fr to 149 6/27/16 Email, uccifer20@aol.fr to ; see also 612 7 /16
  648. (subject "leaked emails"); project"). (subject "leaked (sub' ect "leaked emails"
  649. ; uccifer20@aol.fr to ( claiming DCLeaks was a "Wikileaks sub 150 Before sending
  650. the reporter the link and password to the closed DCLeaks website, and in an
  651. apparent effort to deflect attention from the fact that DCLeaks and Guccifer 2.0
  652. were operated by the same organization, the Guccifer 2.0 persona sent the
  653. repm1er an email stating that DCLeaks was a "Wikileaks sub project" and that
  654. Guccifer 2.0 had asked DCLeaks to release the leaked emails with "closed access"
  655. to give reporters a preview of them. 151 Netyksho Indictment ,r 43(a). 152
  656. Netyksho Indictment ,r 43(b ). 153 Netyksho Indictment ,r 43(c). 43
  657.  
  658. RESULT: 15
  659.  
  660. PAGE: 51
  661.  
  662. TEXT:
  663.  
  664. U.S. Department of Justice AtierHey Werk Predttet // Moy CeHtttiH Material
  665. Preteeted UHeer Fed. R. Crim. P. 6(e) In early August 2016, Twitter's suspension
  666. of the Guccifer 2.0 Twitter account. After it was reinstated, GRU officers
  667. posing as Guccifer 2.0 wrote 1;c?)Wp ,,ia private message, "thank u for writing
  668. back ... do u find anyt[h]ing interesting in the docs i posted?" On August 17,
  669. 2016, the GRU added, "please tell me if i can help u anyhow ... it would be a
  670. great pleasure to me." On September 9, 2016, the GRUi;(T);f posing as Guccifer
  671. 2.0-referred to a stolen DCCC document posted online and asked ? "what do u
  672. think of the info on the turnout model for the democrats entire presidential
  673. campaign." -responded, "pretty standard."155 The investigation did not identify
  674. evidence of other communications between-and Guccifer 2.0. 3. Use of WikiLeaks
  675. In order to expand its interference in the 20 I 6 U.S. presidential election,
  676. the GRU units transferred many of the documents they stole from the DNC and the
  677. chairman of the Clinton Campaign to WikiLeaks. GRU officers used both the
  678. DCLeaks and Guccifer 2.0 personas to communicate with WikiLeaks through Twitter
  679. private messaging and through encrypted channels, including possibly through
  680. WikiLeaks's private communication system. . a. WikiLeaks's Expressed Opposition
  681. Toward the Clinton Campaign WikiLeaks, and particularly its founder Julian
  682. Assange, privately expressed opposition to candidate Clinton well before the
  683. first release of stolen documents. In November 2015, Assange wrote to other
  684. members and associates of WikiLeaks that "[w]e believe it would be much better
  685. for GOP to win ... Dems+Media+liberals woudl [sic] then form a block to reign in
  686. their worst qualities. . . . With Hillary in charge, GOP will be pushing for her
  687. worst qualities., dems+media+neoliberals will be mute .... She's a bright, well
  688. connected, sadisitic sociopath."156 In March 2016, WikiLeaks released a
  689. searchable archive of approximately 30,000 Clinton emails that had been obtained
  690. through FOIA litigation.157 While designing the archive, one WikiLeaks member
  691. explained the reason for building the archive to another associate: 154 155 Harm
  692. to Ongoing Matter 156 1 l/19/15 Twitter Group Chat, Group ID 594242937858486276,
  693. @WikiLeaks et al. Assange also wrote that, "GOP will generate a lot oposition
  694. [sic], including through dumb moves. Hillary will do the same thing, but co-opt
  695. the liberal opposition and the GOP opposition. Hence biliary has greater freedom
  696. to statt wars than the GOP and has the will to do so." Id. 157 WikiLeaks,
  697. "Hillary Clinton Email Archive," available at https://wikileaks.org/clinton-
  698. emails/. 44
  699.  
  700. RESULT: 16
  701.  
  702. PAGE: 52
  703.  
  704. TEXT:
  705.  
  706. U.S. Department of Justice AttorHey Work Prodttet // Mtty Cofl:tttifl:
  707. Mttterittl Proteeted UHder Fed. R. Criffl. P. 6(e) [W]e want this repository to
  708. become "the place" to search for background on hillary's plotting at the state
  709. department during 2009-2013. . . . Firstly because its useful and will annoy
  710. Hillary, but secondly because we want to be seen to be a resource/player in the
  711. US election, because eit [sic] may en[]courage people to send us even more
  712. important leaks.158 b. WikiLeaks's First Contact with Guccifer 2.0 and DCLeaks
  713. Shortly after the GRU's first release of stolen documents through dcleaks.com in
  714. June 2016, GRU officers also used the DCLeaks persona to contact WikiLeaks about
  715. possible coordination in the future release of stolen emails. On June 14, 2016,
  716. @dcleaks _ sent a direct message to @WikiLeaks, noting, "You announced your
  717. organization was preparing to publish more Hillary's emails. We are ready to
  718. support you. We have some sensitive information too, in particular, her
  719. financial documents. Let's do it to ether. What do ou think about ublishin our
  720. info at the same moment? Thank ou."159 Around the same time, WikiLeaks initiated
  721. communications with the GRU persona Guccifer 2.0 shortly after it was used to
  722. release documents stolen from the DNC. On June 22, 2016, seven days after
  723. Guccifer 2.0's first releases of stolen DNC documents, WikiLeaks used Twitter's
  724. direct message function to contact the Guccifer 2.0 Twitter account and suggest
  725. that Guccifer 2.0 "[s]end any new material [stolen from the DNC] here for us to
  726. review and it will have a much higher impact than what you are doing."160 On
  727. July 6, 2016, WikiLeaks again contacted Guccifer 2.0 through Twitter's private
  728. messaging function, writing, "if you have anything hillary related we want it in
  729. the next tweo [sic] days prefab le [sic] because the DNC is approaching and she
  730. will solidify bernie supporters behind her after." The Guccifer 2.0 persona
  731. responded, "ok ... i see." WikiLeaks also explained, "we think trump has only a
  732. 25% chance of winning against hillary ... so conflict between bernie and hillary
  733. is interesting." 161 c. The GRU's Transfer of Stolen Materials to WikiLeaks Both
  734. the GRU and WikiLeaks sought to hide their communications, which has limited the
  735. Office's ability to collect all of the communications between them. Thus,
  736. although it is clear that the stolen DNC and Podesta documents were transferred
  737. from the GRU to WikiLeaks, -Investigative Technique 158 3/14/16 Twitter DM,
  738. @WikiLeaks to Less than two weeks earlier, the same account had been used to
  739. send a private message opposing the idea of Clinton "in whitehouse with her
  740. bloodlutt and amitions [sic] of empire with hawkish liberal-interventionist
  741. appointees." 11/19/15 Twitter Group Chat, Group ID 594242937858486276,
  742. @WikiLeaks et al. 159 6/14/16 Twitter DM, @dcleaks_ to @WikiLeaks. 160 Netyksho
  743. Indictment ,r 47(a). 1617/6/16 Twitter DMs, @WikiLeaks & @guccifer_2. 45
  744.  
  745. RESULT: 17
  746.  
  747. PAGE: 53
  748.  
  749. TEXT:
  750.  
  751. U.S. Department of Justice Atterttey Werk Predttet // Ma:y Cettta:itt Mttteria:l
  752. Preteeted Uttder Fed. R. Criffl. P. 6(e) The Office was able to identify when
  753. the GRU ( operating through its personas Guccifer 2.0 and DCLeaks) transferred
  754. some of the stolen documents to WikiLeaks through online archives set up by the
  755. GRU. Assan e had access to the internet from the Ecuadorian Embass in London, En
  756. land. On July 14, 2016, GRU officers used a Guccifer 2.0 email account to send
  757. WikiLeaks an email bearing the subject "big archive" and the message "a new
  758. attempt."163 The email contained an encrypted attachment with the name "wk dnc
  759. link I .txt.gpg."164 Using the Guccifer 2.0 Twitter account, GRU officers sent
  760. WikiLeaks an encrypted file and instructions on how to open it.165 On July 18,
  761. 2016, WikiLeaks confirmed in a direct message to the Gucci fer 2.0 account that
  762. it had "the 1 Gb or so archive" and would make a release of the stolen documents
  763. "this week."166 On July 22, 2016, WikiLeaks released over 20,000 emails and
  764. other documents stolen from the DNC computer networks.167 The Democratic
  765. National Convention began three days later. Similar communications occurred
  766. between WikiLeaks and the GRU-operated persona DCLeaks. On September 15, 2016,
  767. @dcleaks wrote to @WikiLeaks, "hi there! I'm from DC Leaks. How could we discuss
  768. some submission-related issues? Am trying to reach out to you via your secured
  769. chat but getting no response. I've got something that might interest you. You
  770. won't be disappointed, I promise."168 The WikiLeaks account responded, "Hi
  771. there," without further elaboration. The @dcleaks_ account did not respond
  772. immediately. The same day, the Twitter account@guccifer_2 sent @dcleaks_ a
  773. direct message, which is the first known contact between the personas.169 During
  774. subsequent communications, the 163 This was not the GRU's first attempt at
  775. transferring data to WikiLeaks. On June 29, 2016, the GRU used a Guccifer 2.0
  776. email accou~ted file to a WikiLeaks email account. 6/29/16 Email,
  777. guccifer2@mail.com (The email appears to have been undelivered.) 164 See
  778. SM-2589105-DCLEAKS, serial 28 (analysis). 165 6/27/16 Twitter DM, @Guccifer_2 to
  779. @WikiLeaks. 166 7/18/16 Twitter OM, @Guccifer_2 & @WikiLeaks. 167 "DNC Email
  780. Archive," WikiLeaks (Jul. 22, 2016), available at https://wikileaks.org/dnc-
  781. emails. 168 9/15/16 Twitter DM, @dcleaks_ to @WikiLeaks. 169 9/15/16 Twitter DM,
  782. @guccifer _ 2 to @dcleaks _. 46
  783.  
  784. RESULT: 18
  785.  
  786. PAGE: 54
  787.  
  788. TEXT:
  789.  
  790. U.S. Department of Justice AtterRe;? Werk Predttet // Mtt;? CeRtail'l Mftferial
  791. Preteeted URder Fed. R. Crim. P. 6(e) Guccifer 2.0 persona informed DCLeaks that
  792. WikiLeaks was trying to contact DCLeaks and arrange for a way to speak through
  793. encrypted emails.170 An analysis of the metadata collected from the WikiLeaks
  794. site revealed that the stolen Podesta emails show a creation date of September
  795. 19, 2016.171 Based on information about Assange's computer and its possible
  796. operating system, this date may be when the GRU staged the stolen Podesta emails
  797. for transfer to WikiLeaks (as the GRU had previously done in July 2016 for the
  798. DNC emails).172 The WikiLeaks site also released PDFs and other documents taken
  799. from Podesta that were attachments to emails in his account; these documents had
  800. a creation date of October 2, 2016, which appears to be the date the attachments
  801. were separately staged by WikiLeaks on its site.173 Beginning on September 20,
  802. 2016, WikiLeaks and DCLeaks resumed communications in a brief exchange. On
  803. September 22, 2016, a DCLeaks email account dcleaksproject@gmail.com sent an
  804. email to a WikiLeaks account with the subject "Submission" and the message "Hi
  805. from DCLeaks." The email contained a PGP-encr ted with the filename
  806. "wiki_mail.txt.gpg."174 %?The email, however, bears a number of similarities to
  807. the July 14, 2016 email in which GRU officers used the Guccifer 2.0 persona to
  808. give WikiLeaks access to the archive of DNC files. On September 22, 2016 (the
  809. same day of DCLeaks' email to WikiLeaks), the Twitter account dcleaks sent a sin
  810. le messa e to WikiLeaks with the strin of characters The Office cannot rule out
  811. that stolen documents were transferred to WikiLeaks through intermediaries who
  812. visited during the summer of 2016. For example, public reporting identified A d
  813. M"'ll M h w?kiL k . t h h . t d "th th t fi fth Investigative Technique 170 See
  814. SM-2589105-DCLEAKS, serial 28; 9/15/16 Twitter DM, @Guccifer_2 & @WikiLeaks. 171
  815. See SM-2284941, serials 63 & 64 Investigative Technique At the time, certain
  816. Apple operating systems used a setting that left a downloaded file's creation
  817. date the same as the creation date shown on the host computer. This would
  818. explain why the creation date on WikiLeaks's version of the files was still
  819. September 19, 2016. See SM-Investigative Technique 2284941, serial 62 173 When
  820. WikiLeaks saved attachments separately from the stolen emails, its computer
  821. system appears to have treated each attachment as a new file and given it a new
  822. creation date. See SM-2284941, serials 63 & 64. 174 See 9/22/16 Email,
  823. dcleaksproject@gmail.com 175 Ellen Nakashima et al., A German Hacker Offers a
  824. Rare Look Inside the Secretive World of Julian Assange and WikiLeaks, Washington
  825. Post (Jan. 17, 2018). 47
  826.  
  827. RESULT: 19
  828.  
  829. PAGE: 55
  830.  
  831. TEXT:
  832.  
  833. U.S. Department of Justice Atton=iey Work Protl1:1et // Mtl:y Cottt:tl:ifl
  834. Mtl:teritl:l Proteetetl UAtier Fetl. R. Criffl. P. 6(e) Investigative Technique
  835. . On October 7, 2016, WikiLeaks released the first emails stolen from the
  836. Podesta email account. In total, WikiLeaks released 33 tranches of stolen emails
  837. between October 7, 2016 and November 7, 2016. The releases included private
  838. speeches given by Clinton; 177 internal communications between Podesta and other
  839. high-ranking members of the Clinton Campaign; 178 and correspondence related to
  840. the Clinton Foundation.179 In total, WikiLeaks released over 50,000 documents
  841. stolen from Podesta's personal email account. The last-in-time email released
  842. from Podesta' s account was dated March 21, 2016, two days after Podesta
  843. received a spearphishing email sent by the GRU. d. WikiLeaks Statements
  844. Dissembling About the Source of Stolen Materials As reports attributing the DNC
  845. and DCCC hacks to the Russian government emerged, WikiLeaks and Assange made
  846. several public statements apparently designed to obscure the source of the
  847. materials that WikiLeaks was releasing. The file-transfer evidence described
  848. above and other information uncovered during the investigation discredit
  849. WikiLeaks's claims about the source of material that it posted. Beginning in the
  850. summer of 2016, Assange and WikiLeaks made a number of statements about Seth
  851. Rich, a former DNC staff member who was killed in July 2016. The statements
  852. about Rich implied falsely that he had been the source of the stolen DNC emails.
  853. On August 9, 2016, the @WikiLeaks Twitter account posted: "ANNOUNCE: WikiLeaks
  854. has decided to issue a US$20k reward for information leading to conviction for
  855. the murder ofDNC staffer Seth Rich."180 Likewise, on August 25, 2016, Assange
  856. was asked in an interview, "Why are you so interested in Seth Rich's killer?"
  857. and responded, "We're very interested in anything that might be a threat to
  858. alleged Wikileaks sources." The interviewer responded to Assange's statement by
  859. commenting, "I know you don't want to reveal your source, but it certainly
  860. sounds like you're suggesting a man who leaked information to WikiLeaks was then
  861. murdered." Assange replied, "If there's someone who's potentially connected to
  862. our publication, and that person has been murdered in suspicious t79 Netyksho
  863. Indictment ,r 43. 180 @WikiLeaks 8/9/16 Tweet. 48
  864.  
  865. RESULT: 20
  866.  
  867. PAGE: 56
  868.  
  869. TEXT:
  870.  
  871. U.S. Department of Justice Attort1ey Work Prndttet ,'/ May Cot1:tait1: Material
  872. Proteeted Ut1:der Fed. R. Cri1fl. P. 6(e) circumstances, it doesn't necessarily
  873. mean that the two are connected. But it is a very serious matter ... that type
  874. of allegation is very serious, as it's taken very seriously by us."181 After the
  875. U.S. intelligence community publicly announced its assessment that Russia was
  876. behind the hacking operation, Assange continued to deny that the Clinton
  877. materials released by WikiLeaks had come from Russian hacking. According to
  878. media reports, Assange told a U.S. congressman that the DNC hack was an "inside
  879. job," and purported to have "physical proof' that Russians did not give
  880. materials to Assange. 182 C. Additional GRU Cyber Operations While releasing the
  881. stolen emails and documents through DCLeaks, Guccifer 2.0, and WikiLeaks, GRU
  882. officers continued to target and hack victims linked to the Democratic campaign
  883. and, eventually, to target entities responsible for election administration in
  884. several states. 1. Summer and Fall 2016 Operations Targeting Democrat-Linked
  885. Victims On July 27 2016, Unit 26165 targeted email accounts connected to
  886. candidate Clinton's personal office . Earlier that day, candidate Trump made
  887. public statements that included the following: "Russia, if you're listening, I
  888. hope you're able to find the 30,000 emails that are missing. I think you will
  889. probably be rewarded mightily by our press."183 The "30,000 emails" were
  890. apparently a reference to emails described in media accounts as having been
  891. stored on a personal server that candidate Clinton had used while serving as
  892. Secretary of State. Within approximately five hours of Trump's statement, GRU
  893. officers targeted for the first time Clinton's personal office. After candidate
  894. Trump's remarks, Unit 26165 created and sent malicious links targeting 15 email
  895. accounts at the domain including an email account belonging to Clinton aide The
  896. investigation did not find evidence of earlier GRU attempts to compromise
  897. accounts hosted on this domain. It is unclear how the GRU was able to identify
  898. these email accounts, which were not public.184 Unit 26165 officers also hacked
  899. into a DNC account hosted on a cloud-computing service copies of the DNC da
  900. databases (referred to On September 20, 2016, the GRU began to generate function
  901. designed to allow users to produce backups of as "snapshots"). The GRU then
  902. stole those snapshots by moving 181 See Assange: "Murdered DNC Staffer Was
  903. 'Potential' WikiLeaks Source," Fox News (Aug. 25, 2016)(containing video of
  904. Assange interview by Megyn Kelly). 182 M. Raju & Z. Cohen, A GOP Congressman's
  905. Lonely Quest Defending Julian Assange, CNN (May 23, 2018). 183 "Donald Trump on
  906. Russian & Missing Hillary Clinton Emails," YouTube Channel C-SPAN, Posted
  907. 7/27/16, available at https://www.youtube.com/watch?v=3kxG8uJUsWU (starting at
  908. 0:41). 49
  909.  
  910. RESULT: 21
  911.  
  912. PAGE: 57
  913.  
  914. TEXT:
  915.  
  916. U.S. Department of Justice Atteme;? :werk PFeauet // Moy Cef!ta.if! Material
  917. Preteetea Uflaef Fee. R. Crim.. P. 6(e) them to -account that they controlled;
  918. from there, the copies were moved to GRUcontrolled computers. The GRU stole
  919. approximately 300 gigabytes of data from the DNC based account.185 2. Intrusions
  920. Targeting the Administration of U.S. Elections In addition to targeting
  921. individuals involved in the Clinton Campaign, GRU officers also targeted
  922. individuals and entities involved in the administration of the elections.
  923. Victims included U.S. state and local entities, such as state boards of
  924. elections (SBOEs), secretaries of state, and county governments, as well as
  925. individuals who worked for those entities. 186 The GRU also targeted private
  926. technology firms responsible for manufacturing and administering election-
  927. related software and hardware, such as voter registration software and
  928. electronic polling stations.187 The GRU continued to target these victims
  929. through the elections in November 2016. While the investigation identified
  930. evidence that the GRU targeted these individuals and entities, the Office did
  931. not investigate further. The Office did not, for instance, obtain or examine
  932. servers or other relevant items belonging to these victims. The Office
  933. understands that the FBI, the U.S. Department of Homeland Security, and the
  934. states have separately investigated that activity. By at least the summer of
  935. 2016, GRU officers sought access to state and local computer networks by
  936. exploiting known software vulnerabilities on websites of state and local
  937. governmental entities. GRU officers, for example, targeted state and local
  938. databases of registered voters using a technique known as "SQL injection," by
  939. which malicious code was sent to the state or local website in order to run
  940. commands (such as exfiltrating the database contents).188 In one instance in
  941. approximately June 2016, the GRU compromised the computer network of the
  942. Illinois State Board of Elections by exploiting a vulnerability in the SBOE's
  943. website. The GRU then gained access to a database containing information on
  944. millions of registered Illinois voters, 189 and extracted data related to
  945. thousands of U.S. voters before the malicious activity was identified.190 GRU
  946. officers Investigative Technique scanned state and local websites for eriod in
  947. July 2016, GRU officers -for vulnerabilities on websites of more than 185
  948. Netyksho Indictment ,i 34; see also SM-2589105-HACK, serial 29 -? Investigative
  949. Technique 186 Netyksho Indictment ,i 69. 188 Investigative Technique -50
  950.  
  951. RESULT: 22
  952.  
  953. PAGE: 58
  954.  
  955. TEXT:
  956.  
  957. U.S. Department of Justice AttorHey Werle Proattet // Moy CoHtoiH Moteriol
  958. Proteetee UHeer Fee. R. Crtffl. P. 6(e) for vulnerabilities continued through
  959. the election. Unit 74455 also sent spearphishing emails to public officials
  960. involved in election administration and personnel a~ involved in voting
  961. technology. In August 2016, GRU officers targeted employees of ..... , a voting
  962. technology company that developed software used by numerous U.S. counties to
  963. manage voter rolls, and installed malware on the company network. Similarly, in
  964. November 2016, the GRU sent spearphishing emails to over 120 email accounts used
  965. by Florida county officials responsible for administering the 2016 U.S.
  966. election.191 The spearphishing emails contained an attached Word document coded
  967. with malicious software (commonly referred to as a Trojan) that permitted the
  968. GRU to access the infected computer.192 The FBI was separately responsible for
  969. this investigation. We understand the FBI believes that this operation enabled
  970. the GRU to gain access to the network of at least one Florida county government.
  971. The Office did not independently verify that belief and, as explained above, did
  972. not undertake the investigative steps that would have been necessary to do so.
  973. D. Trump Campaign and the Dissemination of Hacked Materials The Trump Campaign
  974. showed interest in WikiLeaks's releases hout the summer and fall of 2016. 1. a.
  975. Background I , Investigative Technique Investigative Technique 51
  976.  
  977. RESULT: 23
  978.  
  979. PAGE: 65
  980.  
  981. TEXT:
  982.  
  983. U.S. Department of Justice AM:erttey Wer:k Predttet // Mtty Cetttaitt Mttterial
  984. Preteeted Uttder FeE:I. R. Criffi. P. 6(e) d. WikiLeaks's October 7, 2016
  985. Release of Stolen Podesta Emails On October 7 2016 four days after the Assange
  986. press conference , the Washington Post published an Access Hollywood video that
  987. captured comments by candidate Trump some years earlier and that was expected to
  988. adversely affect the Campaign.239 Less than an hour after the video's
  989. publication, WikiLeaks released the first set of emails stolen by the GRU from
  990. the account of Clinton Campaign chairman John Podesta. Harm to Ongoing Matter
  991. 111Harm to Ongoing Matter -Harm to Ongoing Matter Harm to Ongoing Matter
  992. 1111Harm to Ongoing Matter Corsi said that, because he had no direct means o
  993. communicating with WikiLeaks, he told members of the news site WNO-who were
  994. participating on a conference call with him that day-to reach Assange
  995. immediately.244 Corsi claimed that the pressure was 239 Candidate Trump can be
  996. heard off camera making graphic statements about women. 240 241 242 243 244 In a
  997. later November 2018 interview, Corsi stated Harm to Ongoing Matter that he
  998. believed Malloch was on the call but then focused on other individuals who were
  999. on the call-invitation, which Malloch was not. (Separate travel records show
  1000. that at the time of the call, Malloch was aboard a transatlantic flight). Corsi
  1001. at one point stated that after WikiLeaks 's release of stolen emails on October
  1002. 7, 2016, he concluded Malloch had gotten in contact with Assange. Corsi 11/1/18
  1003. 302, at 6. 58
  1004.  
  1005. RESULT: 24
  1006.  
  1007. PAGE: 72
  1008.  
  1009. TEXT:
  1010.  
  1011. U.S. Department of Justice Att6rHey W6rle: Pr6dttet // May C6HtaiH Material
  1012. Pr6teeted Una er Fee. R. Crim. P. 6(e) email claimed that WikiLeaks would
  1013. release "All 33k deleted Emails" by "November 1st." No emails obtained from
  1014. Clinton's server were subsequently released. Smith drafted multiple emails
  1015. stating or intimating that he was in contact with Russian hackers. For example,
  1016. in one such email, Smith claimed that, in August 2016, KLS Research had
  1017. organized meetings with parties who had access to the deleted Clinton emails,
  1018. including parties with "ties and affiliations to Russia."286 The investigation
  1019. did not identify evidence that any such meetings occurred. Associates and
  1020. security experts who worked with Smith on the initiative did not believe that
  1021. Smith was in contact with Russian hackers and were aware of no such
  1022. connection.287 The investigation did not establish that Smith was in contact
  1023. with Russian hackers or that Smith, Ledeen, or other individuals in touch with
  1024. the Trump Campaign ultimately obtained the deleted Clinton emails. * * * In sum,
  1025. the investigation established that the GRU hacked into email accounts of persons
  1026. affiliated with the Clinton Campaign, as well as the computers of the DNC and
  1027. DCCC. The GRU then exfiltrated data related to the 2016 election from these
  1028. accounts and computers, and disseminated that data through fictitious online
  1029. personas (DCLeaks and Guccifer 2.0) and later through WikiLeaks. The
  1030. investigation also established that the Trum Cam ai n dis la ed interest in the
  1031. WikiLeaks releases, and that explained in Volume I, Section V.B, infra, the
  1032. evidence was sufficient to support intrusion and other char es a ainst GRU
  1033. officers for their role in election-related hackin . 286 8/31/16 Email, Smith to
  1034. Smith. 287 Safron 3/20/18 302, at 3; Szobocsan 3/29/18 302, at 6. 65
  1035.  
  1036. RESULT: 25
  1037.  
  1038. PAGE: 90
  1039.  
  1040. TEXT:
  1041.  
  1042. U.S. Department of Justice Mterttey '.\'erk Preeittet // May Cetttaitt Material
  1043. Preteeteel Ul'l:eler Feel. R. Criffl. P. 6(e) to Rome, Italy, as part of his
  1044. duties with LCILP.411 The purpose of the trip was to meet officials affiliated
  1045. with Link Campus University, a for-profit institution headed by a former Italian
  1046. government official.412 During the visit, Papadopoulos was introduced to Joseph
  1047. Mifsud. Mifsud is a Maltese national who worked as a professor at the London
  1048. Academy of Diplomacy in London, England.413 Although Mifsud worked out of London
  1049. and was also affiliated with LCILP, the encounter in Rome was the first time
  1050. that Papadopoulos met him.414 Mifsud maintained various Russian contacts while
  1051. living in London, as described further below. Among his contacts was ,415 a one-
  1052. time employee of the IRA, the entity that carried out the Russian social media
  1053. campaign (see Volume I Section II, supra). In January and February 2016, Mifsud
  1054. and -discussed possibly meeting in Russia. The investigation did not~ meeting.
  1055. Later, in the spring of 2016, -was also in contact -that was linked to an
  1056. employee of the Russian Ministry of Defense, and that account had overlapping
  1057. contacts with a group of Russian controlled Facebook accounts that included
  1058. accounts used to promote the DCLeaks releases in the course of the GRU's hack-
  1059. and-release operations (see Volume I, Section III.B.1, supra). According to
  1060. Papadopoulos, Mifsud at first seemed uninterested in Papadopoulos when they met
  1061. in Rome.416 After Papadopoulos informed Mifsud about his role in the Trump
  1062. Campaign, however, Mifsud appeared to take greater interest in Papadopoulos.417
  1063. The two discussed Mifsud's European and Russian contacts and had a general
  1064. discussion about Russia; Mifsud also offered to introduce Papadopoulos to
  1065. European leaders and others with contacts to the Russian government.418
  1066. Papadopoulos told the Office that Mifsud's claim of substantial connections with
  1067. Russian government officials interested Papadopoulos, who thought that such
  1068. connections could increase his importance as a policy advisor to the Trump
  1069. Campaign.419 411 Papadopoulos 8/10/17 302, at 2-3; Papadopoulos Statement of
  1070. Offense ,r 5. 412 Papadopoulos 8/10/17 302, at 2-3; Stephanie Kirchgaessner et
  1071. al., Joseph Mifsud: more questions than answers about mystery professor linked
  1072. to Russia, The Guardian (Oct. 31, 2017) ("Link Campus University ... is headed
  1073. by a former Italian interior minister named Vincenzo Scotti."). 413 Papadopoulos
  1074. Statement of Offense ,r 5. 414 Papadopoulos 8/10/17 302, at 3. , , , ?
  1075. Investigative Technique 1Harm to Ongoing Matter 416 Papadopoulos Statement of
  1076. Offense ,r 5. 417 Papadopoulos Statement of Offense ,r 5. 418 Papadopoulos
  1077. 8/10/17 302, at 3; Papadopoulos 8/11/17 302, at 2. 419 Papadopoulos Statement of
  1078. Offense ,r 5. 83
  1079.  
  1080. RESULT: 26
  1081.  
  1082. PAGE: 100
  1083.  
  1084. TEXT:
  1085.  
  1086. U.S. Department of Justice Atlerl'le~? Werk Pree1:1et // May Ce!'ltaiH Material
  1087. Preteetea UHaer Fee. R. Criffl. P. 6(e) Papadopoulos was dismissed from the
  1088. Trump Campaign in early October 2016, after an interview he gave to the Russian
  1089. news agency Inter/ax generated adverse publicity.492 f. Trump Campaign Knowledge
  1090. of "Dirt" Papadopoulos admitted telling at least one individual outside of the
  1091. specifically, the then-Greek foreign minister-about Russia's obtaining Clinton-
  1092. related emails.493 In addition, a different foreign government informed the FBI
  1093. that, 10 days after meeting with Mifsud in late April 2016, Papadopoulos
  1094. suggested that the Trump Campaign had received indications from the Russian
  1095. government that it could assist the Campaign through the anonymous release of
  1096. information that would be damaging to Hillary Clinton.494 (This conversation
  1097. occurred after the GRU spearphished Clinton Campaign chairman John Podesta and
  1098. stole his emails, and the GRU hacked into the DCCC and DNC, see Volume l,
  1099. Sections III.A & III.B, supra.) Such disclosures raised questions about whether
  1100. Papadopoulos informed any Trump Campaign official about the emails. When
  1101. interviewed, Papadopoulos and the Campaign officials who interacted with him
  1102. told the Office that they could not recall Papadopoulos's sharing the
  1103. information that Russia had obtained "dirt" on candidate Clinton in the form of
  1104. emails or that Russia could assist the Campaign through the anonymous release of
  1105. information about Clinton. Papadopoulos stated that he could not clearly recall
  1106. having told anyone on the Campaign and wavered about whether he accurately
  1107. remembered an incident in which Clovis had been upset after hearing Papadopoulos
  1108. tell Clovis that Papadopoulos thought "they have her emails."495 The Campaign
  1109. officials who interacted or corresponded with Papadopoulos have similarly
  1110. stated, with varying degrees of certainty, that he did not tell them. Senior
  1111. policy advisor Stephen Miller, for example, did not remember hearing anything
  1112. from Papadopoulos or Clovis about Russia having emails of or dirt on candidate
  1113. Clinton.496 Clovis stated that he did not recall anyone, including Papadopoulos,
  1114. having given him non-public information that a forei n overnment mi ht be in
  1115. ossession of material dama in to Hillar Clinton.497 492 George Papadopoulos:
  1116. Sanctions Have Done Little More Than to Turn Russia Towards China, Interfax
  1117. (Sept. 30, 2016). 493 Papadopoulos 9/19/17 302, at 14-15; Def. Sent. Mem.,
  1118. United States v. George Papadopoulos, I :17-cr-182 (D.D.C. Aug. 31, 2018), Doc.
  1119. 45. 494 See footnote 465 of Volume I, Section IV.A.2.d, supra. 495 Papadopoulos
  1120. 8/10/17 302, at 5; Papadopoulos 8/11/17 302, at 5; Papadopoulos 9/20/17 302, at
  1121. 2. 496 S. Miller 12/14/17 302, at 10. 497 498 93
  1122.  
  1123. RESULT: 27
  1124.  
  1125. PAGE: 127
  1126.  
  1127. TEXT:
  1128.  
  1129. U.S. Department of Justice Atlerftey Werk Predttet // May Cefttaifl. Mttterial
  1130. Preteetea Ufl.aer Fed. R. Crim. P. 6(e) After the June 9 meetin Goldstone, he
  1131. told Trump Jr. told Emin A alarov 745 Jr.743 According to 744 and Aras Agalarov
  1132. asked Kaveladze to report in after the meeting, but before Kaveladze could call,
  1133. Aras Agalarov called him.747 With Veselnitskaya next to him, Kaveladze reported
  1134. that the meeting had gone well, but he later told Aras Agalarov that the meeting
  1135. about the Magnitsky Act had been a waste of time because it was not with lawyers
  1136. and they were "preaching to the wrong crowd."748 c. Post-June 9 Events
  1137. Veselnitskaya and Aras Agalarov made at least two unsuccessful attempts after
  1138. the election to meet with Trump representatives to convey similar information
  1139. about Browder and the Magnitsky Act.749 On November 23, 2016, Kaveladze emailed
  1140. Goldstone about setting up another meeting "with T people" and sent a document
  1141. bearing allegations similar to those conveyed on June 9.75? Kaveladze followed
  1142. up with Goldstone, stating that "Mr. A," which Goldstone understood to mean Aras
  1143. Agalarov, called to ask about the meeting.751 Goldstone emailed the document to
  1144. Rhona Graff, saying that "Aras Agalarov has asked me to pass on this document in
  1145. the hope it can be passed on to the appropriate team. If needed, a lawyer
  1146. representing the case is Goldstone 2/8/18 302, (and one text message shows)
  1147. that, shortly after the DNC e ts co ecting the DNC hacking announcement to the
  1148. June 9 OSC-KA V _00029 (6/14/16 Email, Goldstone to E. Agalarov & Kaveladze
  1149. (10:09 a.m.)). The investigation did not identify evidence connecting the events
  1150. of June 9 to the GRU's hack-and-dump operation. OSC-KA V _00029-30 (6/14/16
  1151. Email, Goldstone to E. Agalarov). 746 747 Kaveladze 11/16/17 302, at 8; Call
  1152. Records ofike. Kaveladze 748 Kaveladze 11/16/17 302, at 8; Call Records of Ike
  1153. Kaveladze On June 14, 2016 Kaveladze's teenage daughter emailed asking how the
  1154. June 9 meeting had gone, and Kaveladze responded, "meeting was boring. The
  1155. Russians did not have an bad info on Hilar " KA V _00257 (6/14/16 Email, I.
  1156. Kaveladze to A. Kaveladze; 749 Goldstone 2/8/18 302, at 11; 750 OSC-KA V 00138
  1157. 11/23/16 Email, Goldstone to Kaveladze); 751 RG000196 (11/26-29/16 Text
  1158. Messages, Goldstone & Kaveladze); 120
  1159.  
  1160. RESULT: 28
  1161.  
  1162. PAGE: 182
  1163.  
  1164. TEXT:
  1165.  
  1166. U.S. Department of Justice Atterfl:ey Werk Preettet // Moy Cefltoifl Material
  1167. Preteetee Ufl:eef Pee. R. Criffl. P. 6Ee) Although members of the IRA had
  1168. contact with individuals affiliated with the Trump Campaign, the indictment does
  1169. not charge any Trump Campaign official or any other U.S. person with
  1170. participating in the conspiracy. That is because the investigation did not
  1171. identify evidence that any U.S. person who coordinated or communicated with the
  1172. IRA knew that he or she was speaking with Russian nationals engaged in the
  1173. criminal conspiracy. The Office therefore determined that such persons did not
  1174. have the knowledge or criminal purpose required to charge them in the conspiracy
  1175. to defraud the United States (Count One) or in the separate count alleging a
  1176. wire-and bank-fraud conspiracy involving the IRA and two individual Russian
  1177. nationals (Count Two). The Office did, however, charge one U.S. national for his
  1178. role in supplying false or stolen bank account numbers that allowed the IRA
  1179. conspirators to access U.S. online payment systems by circumventing those
  1180. systems' security features. On February 12, 2018, Richard Pinedo pleaded guilty,
  1181. pursuant to a single-count information, to identity fraud, in violation of 18 U
  1182. .S.C. ? 1028(a)(7) and (b)(l)(D). Plea Agreement, United States v. Richard
  1183. Pinedo, No. 1:18-cr-24 (D.D.C. Feb. 12, 2018), Doc. 10. The investigation did
  1184. not establish that Pinedo was aware of the identity of the IRA members who
  1185. purchased bank account numbers from him. Pinedo's sales of account numbers
  1186. enabled the IRA members to anonymously access a financial network through which
  1187. they transacted with U.S. persons and companies. See Gov't Sent. Mem. at 3,
  1188. United States v. Richard Pinedo, No. 1:18-cr-24 (D.D.C. Sept. 26, 2018), Doc.
  1189. 24. On October 10, 2018, Pinedo was sentenced to six months of imprisonment, to
  1190. be followed by six months of home confinement, and was ordered to complete 100
  1191. hours of community service. B. Russian Hacking and Dumping Operations 1. Section
  1192. 1030 Computer-Intrusion Conspiracy a. Background On July 13, 2018, a federal
  1193. grand jury in the District of Columbia returned an indictment charging Russian
  1194. military intelligence officers from the GRU with conspiring to hack into various
  1195. U.S. computers used by the Clinton Campaign, DNC, DCCC, and other U.S. persons,
  1196. in violation of 18 U.S.C. ?? 1030 and 371 (Count One); committing identity theft
  1197. and conspiring to commit money laundering in furtherance of that hacking
  1198. conspiracy, in violation of 18 U.S.C. ?? I 028A and l 956(h) (Counts Two through
  1199. Ten); and a separate conspiracy to hack into the computers of U.S. persons and
  1200. entities responsible for the administration of the 2016 U.S. election, in
  1201. violation of18U.S.C. ?? 1030and371 (CountEleven). Netyksholndictment.1277
  1202. Asofthiswriting,all 12 defendants remain at large. The Netyksho indictment
  1203. alleges that the defendants conspired with one another and with others to hack
  1204. into the computers of U.S. persons and entities involved in the 2016 U.S.
  1205. presidential election, steal documents from those computers, and stage releases
  1206. of the stolen documents to interfere in the election. Netyksho Indictment ,r 2.
  1207. The indictment also describes how, in staging 1277 The Office provided a more
  1208. detailed explanation of the charging decision in this case in meetings with the
  1209. Office of the Acting Attorney General before the indictment. 175
  1210.  
  1211. RESULT: 29
  1212.  
  1213. PAGE: 407
  1214.  
  1215. TEXT:
  1216.  
  1217. U.S. Department of Justice Att:erne)" Werle Prnelttet // Ma)' CeRtaiR Material
  1218. Prnteeteel UReief Feel. R. Crim. P. 6(e) Oganov, Georgiy Oknyansky, Henry (a/k/a
  1219. Henry Greenberg) Page, Carter Papadopoulos, George Parscale, Bradley Patten,
  1220. William (Sam) Jr. Peskov, Dmitry Phares, Walid Pinedo, Richard Podesta, John Jr.
  1221. Podobnyy, Victor Poliakova, Elena Polonskaya, Olga Pompeo, Michael Porter,
  1222. Robert Priebus, Reince Advisor to Oleg Deripaska and a board member of
  1223. investment company Basic Element. He met with Paul Manafort in Spain in early
  1224. 2017. Florida-based Russian individual who claimed to have derogatory
  1225. information pertaining to Hillary Clinton. He met with Roger Stone in May 2016.
  1226. Foreign policy advisor to the Trump Campaign who advocated Russian views and
  1227. made July 2016 and December 2016 visits to Moscow. Foreign policy advisor to the
  1228. Trump Campaign who received information from Joseph Mifsud that Russians had
  1229. "dirt" in the form of thousands of Clinton emails. He pleaded guilty to lying to
  1230. the FBI about his contact with Mifsud. Digital media director for the 2016 Trump
  1231. Campaign. Lobbyist and business partner of Konstantin Kilimnik. Deputy chief of
  1232. staff of and press secretary for the Russian presidential administration.
  1233. Foreign policy advisor to the Trump Campaign and co-secretary general of the
  1234. Transatlantic Parliamentary Group on Counterterrorism (TAG). U.S. person who
  1235. pleaded guilty to a single-count information of identity fraud. Clinton campaign
  1236. chairman whose email account was hacked by the GRU. WikiLeaks released his
  1237. stolen emails during the 2016 campaign. Russian intelligence officer who
  1238. interacted with Carter Page while operating inside the United States; later
  1239. charged in 2015 with conspiring to act as an unregistered agent of Russia.
  1240. Personal assistant to Dmitry Peskov who responded to Michael Cohen's outreach
  1241. about the Trump Tower Moscow project in January 2016. Russian national
  1242. introduced to George Papadopoulos by Joseph Mifsud as an individual with
  1243. connections to Vladimir Putin. U.S. Secretary of State; director of the Central
  1244. Intelligence Agency (Jan. 2017-Apr. 2018). White House staff secretary (Jan.
  1245. 2017 -Feb. 2018). White House chief of staff (Jan. 2017 -July 2017); chair of
  1246. the Republican National Committee (Jan. 2011-Jan. 2017). Prigozhin, Yevgeniy
  1247. Head of Russian companies Concord-Catering and Concord Management and
  1248. Consulting; supported and financed the Internet Research Agency, which engaged
  1249. in an "active measures" social media campaign to interfere in the 2016 U.S.
  1250. presidential election. B-8
  1251.  
  1252. RESULT: 30
  1253.  
  1254. PAGE: 410
  1255.  
  1256. TEXT:
  1257.  
  1258. U.S. Department of Justice Attorne)' Wol'lt Prod1:1et // Ma)' CorHaiR Mate,?ial
  1259. Prnteeted URder Fed. R. Criffl. P. 6(e) Yates, Sally Yatsenko, Sergey Zakharova,
  1260. Maria Zayed al Nahyan, Mohammed bin Alfa-Bank Acting Attorney General (Jan. 20,
  1261. 2017 -Jan. 30, 2017); Deputy Attorney General (Jan. 10, 2015 -Jan. 30, 2017).
  1262. Deputy chief financial officer of Gazprom, a Russian state-owned energy company,
  1263. and associate of Carter Page. Director of the Russian Ministry of Foreign
  1264. Affair's Information and Press Department who received notification of Carter
  1265. Page's speech in July 2016 from Denis Klimentov. Crown Prince of Abu Dhabi and
  1266. deputy supreme commander of the United Arab Emirates (UAE) armed forces.
  1267. Entities and Organizations Center for the National Interest (CNI) Russia's
  1268. largest commercial bank, which is headed by Petr Aven. U.S.-based think tank
  1269. with expertise in and connections to Russia. CNI's publication, the National
  1270. Interest, hosted candidate Trump's foreign policy speech in April 2016. Concord
  1271. Crocus Group or Crocus International DCLeaks Democratic Congressional Campaign
  1272. Committee Democratic National Committee Duma Gazprom Global Energy Capital, LLC
  1273. Global Partners in Diplomacy Umbrella term for Concord Management and
  1274. Consulting, LLC and Concord Catering, which are Russian companies controlled by
  1275. Yevgeniy Prigozhin. A Russian real-estate and property development company that,
  1276. in 2013, hosted the Miss Universe Pageant, and from 2013 through 2014, worked
  1277. with the Trump Organization on a Trump Moscow project. Fictitious online persona
  1278. operated by the GRU that released stolen documents during the 2016 U.S.
  1279. presidential campaign period. Political committee working to elect Democrats to
  1280. the House of Representatives; hacked by the GRU in April 2016. Formal governing
  1281. body for the Democratic Party; hacked by the GRU in April 2016. Lower House of
  1282. the national legislature of the Russian Federation. Russian oil and gas company
  1283. majority-owned by the Russian government. Investment and management firm founded
  1284. by Carter Page. Event hosted in partnership with the U.S. Department of State
  1285. and the Republican National Convention. In 2016, Jeff Sessions and J .D. Gordon
  1286. delivered speeches at the event and interacted with Russian Ambassador Sergey
  1287. Kislyak. B-11
  1288.  
  1289. RESULT: 31
  1290.  
  1291. PAGE: 411
  1292.  
  1293. TEXT:
  1294.  
  1295. U.S. Department of Justice Attorne)" Wol'lt Predttet // Mey Cofltttifl Meteriel
  1296. Proteeted U1~der Fed. R. Criffi. P. 6(e) Guccifer 2.0 I.C. Expert Investment
  1297. Company Internet Research Agency (IRA) KLS Research LLC Kremlin LetterOne Link
  1298. Campus University London Centre of International Law Practice (LCILP) Main
  1299. Intelligence Directorate of the General Staff (GRU) New Economic School in
  1300. Moscow (NES) Opposition Bloc Party of Regions Pericles Emerging Market Partners
  1301. LLP Prevezon Holdings Ltd. Roscongress Foundation Rosneft Russian Direct
  1302. Investment Fund Fictitious online persona operated by the GRU that released
  1303. stolen documents during the 2016 U.S. presidential campaign period. Russian
  1304. real-estate and development corporation that signed a letter of intent with a
  1305. Trump Organization subsidiary to develop a Trump Moscow property. Russian entity
  1306. based in Saint Petersburg and funded by Concord that engaged in an "active
  1307. measures" social media campaign to interfere in the 20 I 6 V,S. presidential
  1308. election. Business established by an associate of and at the direction of Peter
  1309. Smith to further Smith's search for Hillary Clinton emails. Official residence
  1310. of the president of the Russian Federation; it is used colloquially to refer to
  1311. the office of the president or the Russian government. Company that includes
  1312. Petr Aven and Richard Burt as board members. During a board meeting in December
  1313. 2016, Aven asked for Burt's help to make contact with the Presidential
  1314. Transition Team. University in Rome, Italy, where George Papadopoulos was
  1315. introduced to Joseph Mifsud. International law advisory organization in London
  1316. that employed Joseph Mifsud and George Papadopoulos. Russian Federation's
  1317. military intelligence agency. Moscow-based school that invited Carter Page to
  1318. speak at its July 2016 commencement ceremony. Ukrainian political party that
  1319. incorporated members of the defunct Party of Regions. Ukrainian political party
  1320. of former President Yanukovych. It was generally understood to align with
  1321. Russian policies. Company registered in the Cayman Islands by Paul Manafort and
  1322. his business partner Rick Davis. Oleg Deripaska invested in the fund. Russian
  1323. company that was a defendant in a U.S. civil action alleging the laundering of
  1324. proceeds from fraud exposed by Sergei Magnitsky. Russian entity that organized
  1325. the St. Petersburg International Economic Forum. Russian state-owned oil and
  1326. energy company. Sovereign wealth fund established by the Russian Government in
  1327. 2011 and headed by Kirill Dmitriev. B-12
  1328.  
  1329. RESULT: 32
  1330.  
  1331. PAGE: 412
  1332.  
  1333. TEXT:
  1334.  
  1335. U.S. Department of Justice Attorney \\'erk Prodttet // Ma)? C0Htait1 ~foterial
  1336. Proteeted Ut1de1? Ped. R. Cri1T1. P. 6(e) Russian International Affairs Council
  1337. Silk Road Group St. Petersburg International Economic Forum Tatneft
  1338. Transatlantic Parliamentary Group on Counterterrorism Unit 26165 (GRU) Unit
  1339. 74455 (GRU) Valdai Discussion Club WikiLeaks Russia-based nonprofit established
  1340. by Russian government decree. It is associated with the Ministry of Foreign
  1341. Affairs, and its members include Ivan Timofeev, Dmitry Peskov, and Petr Aven.
  1342. Privately held investment company that entered into a licensing agreement to
  1343. build a Trump-branded hotel in Georgia. Annual event held in Russia and attended
  1344. by prominent Russian politicians and businessmen. Russian energy company.
  1345. European group that sponsored a summit between European Parliament lawmakers and
  1346. U.S. persons. George Papadopoulos, Sam Clovis, and Walid Phares attended the TAG
  1347. summit in July 2016. GRU military cyber unit dedicated to targeting military,
  1348. political, governmental, and non-governmental organizations outside of Russia.
  1349. It engaged in computer intrusions of U.S. persons and organizations, as well as
  1350. the subsequent release of the stolen data, in order to interfere in the 2016
  1351. U.S. presidential election. GRU military unit with multiple departments that
  1352. engaged in cyber operations. It engaged in computer intrusions of U.S. persons
  1353. and organizations, as well as the subsequent release of the stolen data, in
  1354. order to interfere in the 2016 U.S. presidential election. Group that holds a
  1355. conference attended by Russian government officials, including President Putin.
  1356. Organization founded by Julian Assange that posts information online, including
  1357. data stolen from private, corporate, and U.S. Government entities. Released data
  1358. stolen by the GRU during the 2016 U.S. presidential election. B-13
  1359.  
  1360. RESULT: 33
  1361.  
  1362. PAGE: 413
  1363.  
  1364. TEXT:
  1365.  
  1366. U.S. Department of Justice Attorne)' 'Norlc Prodttet // May Cm1taifl Material
  1367. Proteeted URder Fed. R. Crim. P. 6(e) CNI DCCC DNC FBI FSB GEC GRU HPSCI HRC IRA
  1368. LCILP NATO NES NSA ODNI PTT RDIF RIAC SBOE sco SJC SSCI TAG VEB Index of
  1369. Acronyms Center for the National Interest Democratic Congressional Campaign
  1370. Committee Democratic National Committee Federal Bureau oflnvestigation Russian
  1371. Federal Security Service Global Energy Capital, LLC Russian Federation's Main
  1372. Intelligence Directorate of the General Staff U.S. House of Representatives
  1373. Permanent Select Committee on Intelligence Hillary Rodham Clinton Internet
  1374. Research Agency London Centre of International Law Practice North Atlantic
  1375. Treaty Organization New Economic School National Security Agency Office of the
  1376. Director of National Intelligence Presidential Transition Team Russian Direct
  1377. Investment Fund Russian International Affairs Council State boards of elections
  1378. Special Counsel's Office U.S. Senate Judiciary Committee U.S. Senate Select
  1379. Committee on Intelligence Transatlantic Parliamentary Group on Counterterrorism
  1380. Vnesheconombank B-14
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement