Tuesday, July 17, 2018

...and, speaking of rum business...




     News stories are saying President Trump has been criticizing our allies, complimenting and supporting our adversary, and attacking his own law enforcement agencies.
     It sounds like treason, to some people.

     A retired American military general being interviewed on a news program said for us to "read the indictment, it's not that long," and so we will.





(from Online)

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA


UNITED STATES OF AMERICA

     v.

VICTOR BORISOVICH NETYKSHO,
BORIS ALEKSEYEVICH ANTONOV,
DMITRIY SERGEYEVICH BADIN,
IVAN SERGEYEVICH YERMAKOV,
ALEKSEY VIKTOROVICH LUKASHEV,
SERGEY ALEKSANDROVICH MORGACHEV,
NIKOLAY YURYEVICH KOZACHEK,
PAVEL VYACHESLAVOVICH YERSHOV,
ARTEM ANDREYEVICH MALYSHEV,
ALEKSANDR VLADIMIROVICH OSADCHUK,
ALEKSEY ALEKSANDROVICH POTEMKIN, and
ANATOLIY SERGEYEVICH KOVALEV,

          Defendants.





INDICTMENT

The Grand Jury for the District of Columbia charges:


COUNT ONE

(Conspiracy to Commit an Offense Against the United States)


1.          In or around 2016, the Russian Federation ("Russia") operated a military intelligence agency called the Main Intelligence Directorate of the General Staff ("GRU").  The GRU had multiple units, including Units 26165 and 74455, engaged in cyber operations that involved the staged releases of documents stolen through computer intrusions.  These units conducted large-scale cyber operations to interfere with the 2016 U.S. presidential election.


2.          Defendants VICTOR BORISOVICH NETYKSHO, BORIS ALEKSEYEVICH ANTONOV, DMITRIY SERGEYEVICH BADIN, IVAN SERGEYEVICH YERMAKOV,  ALEKSEY VIKTOROVICH LUKASHEV, SERGEY ALEKSANDROVICH MORGACHEV, NIKOLAY YURYEVICH KOZACHEK, PAVEL VYACHESLAVOVICH YERSHOV, ARTEM ANDREYEICH MALYSHEV, ALEKSANDR VLADIMIROVICH OSADCHUK, AND ALEKSEY ALEKSANDROVICH POTEMKIN were GRU officers 

who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the "Conspirators"), to gain unauthorized access (to "hack") into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from those computers, and stage releases of the stolen documents to interfere with the 2016 U.S. presidential election.




3.          Starting in at least March 2016, the Conspirators used a variety of means to hack the email accounts of volunteers and employees of the U.S. presidential campaign of Hillary Clinton (the "Clinton Campaign"), including the email account of the Clinton Campaign's chairman.


4.          By in or around April 2016, the Conspirators also hacked into the computer networks of the Democratic Congressional Campaign Committee ("DCCC") and the Democratic National Committee ("DNC").  The Conspirators covertly monitored the computers of dozens of DCCC and DNC employees, implanted hundreds of files containing malicious computer code ("malware"), and stole emails and other documents from the DCCC and DNC.



5.          By in or around April 2016, the Conspirators began to plan the release of materials stolen from the Clinton Campaign, DCCC, and DNC.


6.          Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents.  They did so using fictitious online personas, including "DCLeaks" and "Guccifer 2.0."


7.          The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization ("Organization 1"), that had previously posted documents stolen from U.S. persons, entities, and the U.S. government.  The Conspirators continued their U.S. election-interference operations through in or around November 2016.



8.          To hide their connections to Russia and the Russian government, the Conspirators used false identities and made false statements about their identities.  To further avoid detection, the Conspirators used a network of computers located across the world, including in the United States, and paid for this infrastructure using cryptocurrency.

________________________________
(to be continued...)





-30-

No comments:

Post a Comment