The Mueller Investigation Identifies Russian Spies

In painstaking detail, Robert Mueller's special counsel team laid out what it alleges was a concerted effort by the Russian military to hack the Democratic National Committee and senior-level Clinton campaign officials and disseminate private documents in order to disrupt and influence the 2016 US presidential election.

The Russians also attempted to infiltrate local election systems and software, although Deputy Attorney General Rod Rosenstein says that there is no evidence that they "altered the vote count or changed any election result". 

The Trump White House has picked up on this line, issuing a statement reiterating that there have been no allegations of "knowing involvement by anyone on the campaign" or that the hacking "affected the election result". That isn't what Mr Rosenstein and the special counsel's court filings concluded, however. The deputy attorney general said it was "not our responsibility" to assess to what extent Russian involvement influenced the 2016 election.

In fact, it is hard to deny that the hacks had a clear impact on US politics in 2016, and exacted a heavy toll on Democrats and the Clinton campaign in particular.

As a result of the hacks, the head of the Democratic National Committee was forced from office on the eve of the party's national convention, a convention whose first few days were marred by protests from Bernie Sanders supporters angry about the contents of some of those Democratic National Committee emails. 

John Podesta, the chair of Hillary Clinton's presidential campaign, had his personal correspondence exposed, including internal debates over political strategy, outlines of Mrs. Clinton's greatest weaknesses and transcripts of her private speeches, excerpts of which were cited by Donald Trump in presidential debates and on the campaign stump. Indeed, Mr Trump celebrated and amplified the revelations in the hacks, which were disseminated through DCLeaks and Guccifer 2.0, both identified as fronts for Russian military intelligence, as well as Wikileaks, which is alluded to, but not named in the Mueller indictment.

The hacks may not have changed the results of the 2016 election, but the effects were very real.

It was as though a team's entire playbook was revealed just days before the Super Bowl. While the rules of football weren't changed and the scoreboard wasn't surreptitiously altered, that doesn't mean the outcome of the contest wasn't affected.

That, then, is the big picture revelation from Mr Mueller's most recent indictment - which comes in addition to the already announced indictments and plea agreements from 20 individuals and three Russian companies. The 29-page court filing contains a variety of other details and revelations that add to the growing picture of alleged Russian election meddling which the Mueller team is outlining.

Russia, if you're listening…
At a Florida press event on 27 July 2016, candidate Trump issued a now famous request.

"Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," he said. "I think you will probably be rewarded mightily by our press."

The line shocked many at the time and has been cited repeatedly since then as evidence that Mr Trump was actively encouraging Russian attempts to acquire and disseminate emails from Mrs. Clinton and her team. The 27 July date makes an appearance in Mr Mueller's most recent indictment document, as well.

"On or about July 27, 2016, the Conspirators attempted after hours to Spearphishing for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office," the court filing reads. "At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton campaign."

While this isn't the first time Russians allegedly targeted the Clinton team, after Mr Trump's remarks the hackers escalated their efforts.

"It seems clear that the indictment is trying to make the connection with language like 'after hours' and 'first time'," tweeted conservative commentator, and Trump critic, Ben Shapiro. "But even Trump publicly saying he wants the Russians to do something and them doing it isn't collusion in any real sense." 

It is, however, an uncanny coincidence.

A Political War Map
The indictment sheet also documents a number of interactions between Americans and Russian military operatives, although it stresses that there are no allegations that those Americans knew the true identity behind the internet aliases with whom they were corresponding.

A Florida blogger and state lobbyist, possibly Aaron Nevins, exchanged messages with Guccifer 2.0 and acquired a trove of documents Democrats had compiled outlining the weaknesses of the party's candidates running for congressional office in Florida. Mr Nevins told the Wall Street Journal that he had told Guccifer 2.0 in an email: "Basically if this was a war, this is the map to where all the troops are deployed."

Guccifer 2.0 also sent documents to a reporter "pertaining to the Black Lives Matter" movement. In another paragraph, Mr Mueller's team notes that a congressional candidate directly asked Guccifer 2.0 for stolen documents about his opponent - a request that the hacker accommodated. 

A long-time Trump man in the spotlight - but not the charge sheet
The Mueller indictment mentions that Guccifer 2.0 had direct communications with a person "who was in regular contact with senior members of the presidential campaign of Donald J Trump". It goes on to quote emails that match communications that Roger Stone, a Trump friend and acquaintance for decades, said he had with Guccifer 2.0 in August 2016. In those communications, Guccifer 2.0 asks Mr Stone to analyse some of his documents and offers to help the man who served as a Trump campaign aide early in his presidential bid. 

"It would be a great pleasure to me," the hacker wrote.

In May Mr Stone told a television interviewer that he was "prepared" to be indicted by the special counsel. "It is not inconceivable now that Mr Mueller and his team may seek to conjure up some extraneous crime pertaining to my business, or maybe not even pertaining to the 2016 election," he said. "I would chalk this up to an effort to silence me." Mr Stone has denied that he had any knowing contact with Russian agents. That's an assertion that the Mueller team appears to have accepted, at least for now. 

A Conspiracy Theory put to Rest?
Back in May former Republican Speaker of the House Newt Gingrich suggested that the real source of the DNC hacks was Seth Rich, a former Democratic operative who was murdered in Washington DC, in July 2016.

"It turns out it wasn't the Russians, it was this young guy who, I suspect, was disgusted by the corruption of the Democratic National Committee," Mr Gingrich said. "He's been killed, and apparently nothing serious has been done to investigate his murder."

It was a theory championed, as well, by conservative commentator and presidential confidante Sean Hannity, even though Washington, DC, police have concluded that the death was the result of a botched robbery. Mr Trump himself has alluded to the conspiracy theories, frequently tweeting and wondering aloud why the Democratic National Committee did not allow federal investigators to conduct a forensic examination of the hacked email server.

Just over two weeks after his most recent tweet, the special counsel's office has pointed the finger of responsibility for the DNC hacks directly at the Russian military. 

Given that Mr Trump was informed about the indictments earlier this week, but still referred to the Mueller investigation as a witch-hunt in remarks on Friday 13th July, he probably will not tone down his criticisms of the probe or suggestions of Russian innocence, but perhaps he will no longer cite the DNC server hacks quite so frequently.

BBC:                 Image: Special Prosecutor Rober Mueller

You Might Also Read: 

Both US Presidential Campaigns Hacked:

How Did WikiLeaks Get Clinton's Emails?:

 

« US Dark Web Raids Lead to Arrests And Seizures
For Sale: Access To Airport Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.

Triam Security

Triam Security

Triam Security are on a mission to make software supply chain security effortless, effective, and invisible - so developers can move fast without leaving security behind.