Wednesday, July 18, 2018

follow the cryptocurrency




Oxford English Dictionary:  The phrase 'to come in from the cold', meaning '(esp. of a spy) to return from isolation, concealment, or exile', is famous from John la Carré's 1963 novel The Spy Who Came In From The Cold.

__________________________________________








Forget the myths that the media has created about the White House.  The truth is, these are not very bright guys -- and things got out of hand.



Hunt's come in from the cold.  Supposedly, he's got a lawyer with $25,000 in a brown paper bag.



Follow the money.


------------------------ dialogue, All The President's Men, 1976 film

_______________________________________________




Mueller indictment (continued)

Defendants

9.     Defendant VIKTOR BORISOVICH NETYKSHO was the Russian military officer in command of Unit 26165, located at 20 Komsomolskiy Prospekt, Moscow, Russia.  




Unit 26165 had primary responsibility for hacking the DCCC and DNC, as well as the email accounts of individuals affiliated with the Clinton Campaign.

10.     Defendant BORIS ALEKSEYEVICH ANTONOV was a Major in the Russian military assigned to Unit 26165.  ANTONOV oversaw a department within Unit 26165 dedicated to targeting military, political, governmental, and non-governmental organizations with spearphishing emails and other computer intrusion activity.  

ANTONOV held the title "Head of Department."  In or around 2016, ANTONOV supervised other co-conspirators who targeted the DCCC, DNC, and individuals affiliated with the Clinton Campaign.









11.     Defendant DMITRIY SERGEYEVICH BADIN was a Russian military officer assigned to Unit 26165 who held the title "Assistant Head of Department."  In or around 2016, BADIN, along with ANTONOV, supervised other co-conspirators who targeted the DCCC, DNC, and individuals affiliated with the Clinton Campaign.


12.     Defendant IVAN SERGEYEVICH YERMAKOV was a Russian military officer assigned to ANTONOV's department within Unit 26165.  Since in or around 2010, YERMAKOV used various online personas, including "Kate S. Milton," "James McMorgans," and "Karen W. Millen," to conduct hacking operations on behalf of Unit 26165.  


In or around March 2016, YERMAKOV participated in hacking at least two email accounts from which campaign-related documents were released through DCLeaks.  In or around May 2016, YERMAKOV also participated in hacking the DNC email server and stealing DNC emails that were later released through Organization 1.




13.     Defendant ALEKSEY VIKTOROVICH LUKASHEV was a Senior Lieutenant in the Russian military assigned to ANTONOV's department within Unit 26165.  LUKASHEV used various online personas, including "Den Katenberg" and "Yuliana Martynova."  In or around 2016, LUKASHEV sent spearphishing emails to members of the Clinton Campaign and affiliated individuals, including the chairman of the Clinton Campaign.


14.     Defendant SERGEY ALEKSANDROVICH MORGACHEV was a Lieutenant Colonel in the Russian military assigned to Unit 26165.  MORGACHEV oversaw a department within Unit 26165 dedicated to developing and managing malware, including a hacking tool used by the GRU known as "X-Agent."  

During the hacking of the DCCC and DNC networks, MORGACHEV supervised the co-conspirators who developed and monitored the X-Agent malware implanted on those computers.


15.     Defendant NIKOLAY YURYEVISH KOZACHEK was a Lieutenant Captain in the Russian military assigned to MORGACHEV's department within Unit 26165.  KOZACHEK used a variety of monikers, including "kazak" and "blablabla1234565."  KOZACHEK developed, customized, and monitored X-Agent malware used to hack the DCCC and DNC networks beginning in or around April 2016.


16.  Defendant PAVEL VYACHESLAVOVICH YERSHOV was a Russian military officer assigned to MORGACHEV's department within Unit 26165.  In or around 2016, YERSHOV assisted KOZACHEK and other co-conspirators in testing and customizing X-Agent malware before actual depoyment and use.

17.     Defendant ARTEM ANDREYEVICH MALYSHEV was a Second Lieutenant in the Russian military assigned to MORGACHEV's department within Unit 26165.  MALYSHEV used a variety of monikers, including "djangomagicdev" and "realblatr."  In or around 2016, MALYSHEV monitored X-Agent malware implanted on the DCCC and DNC networks.




18.     Defendant ALEKSANDR VLADIMIROVICH OSADCHUK was a Colonel in the Russian military and the commanding officer of Unit 74455.  Unit 74455 was located at 22 Kirova Street, Khimki, Moscow, a building referred to within the GRU as the "Tower."  

Unit 74455 assisted in the release of stolen documents through the DCLeaks and Guccifer 2.0 personas, the promotion of those releases, and the publication of anti-Clinton content on social media accounts operated by the GRU.


19.     Defendant ALEKSEY ALEKSANDROVICH POTEMKIN was an officer in the Russian military assigned to Unit 74455.  POTEMKIN was a supervisor in a department within Unit 74455 responsible for the administration of computer infrastructure used in cyber operations.  

Infrastructure and social media accounts administered by POTEMKIN's department were used, among other things, to assist in the release of stolen documents through the DCLeaks and Guccifer 2.0 personas.

_____________________________

(to be continued -- Next:  Object of the Conspiracy)




-30-

No comments:

Post a Comment