Wednesday, August 1, 2018

bit-coin laundro-mat




     If you go on You Tube (or Google) and type in the underlined title below, you can watch an eight-minute video about a newly-organized project to try to improve public discourse.

     I listened to it a couple of times, and thought it was a great idea.  Here's the title:

How a group is trying to bridge the growing partisan divide and depolarize America

     They have meetings, or conventions or rallies, or whatever -- (get-togethers?) and practice discussing politics & current issues in a respectful, mature, civilized way.

     Part of the curriculum was set up with the help of a marriage counselor.

     People are allowed to state their ideas and opinions, but not to attack the ideas and opinions of anyone else.



     Participants do not try to "convince" other people to accept, or agree with, their opinions.  The ones not speaking are required only to listen.  (And, I'm assuming, to not throw any vegetables, fresh or otherwise...)

     It's a good idea.

     One of the spokespeople said, when you try to convince someone else that you're right, it's like you're saying they are wrong, and "their defenses go up," and then no one's listening anymore, and you're done.

     
------------------------- That video made me remember one time when I was at the state capitol, walking from the Senate chamber lobby toward the marble stairs leading down to the first floor....

Walking with me was a school board member who was telling me about a conversation he had with someone from another district where he was trying to get the other person to see the "right" way on a particular legislative question.

His report ended with the sentence, "I tried to tell him he was stupid, but he wouldn't listen!"



_____________________________________

Mueller indictment (continued)
[highlights provided for readers who like to "skim," when reading indictments]

49.     On or about October 7, 2016, Organization 1 released the

first set of emails from the chairman of the Clinton Campaign that had been stolen by LUKASHEV 

and his co-conspirators.  Between on or about October 7, 2016 and November 7, 2016, Organization 1 released approximately thirty-three tranches of documents that had been stolen from the chairman of the Clinton Campaign.  In total, 

over 50,000 stolen documents were released.



Statutory Allegations

50.     Paragraphs 1 through 49 of this Indictment are re-alleged and incorporated by reference as if fully set forth herein.

51.     From at least in or around March 2016 through November 2016, in the District of Columbia and elsewhere, Defendants NETYKSHO, ANTONOV, BADIN, YERMAKOV, LUKASHEV, MORGACHEV, KOZACHEK, YERSHOV, MALYSHEV, OSADCHUK, AND POTEMKIN, together with others known and unknown to the Grand Jury, 

knowingly and intentionally conspired to commit offenses against the United States

namely:

     a.     To knowingly access a computer without authorization and exceed authorized access to a computer, and to obtain thereby information from a protected computer, where the value of the information obtained exceeded $5,000, in violation of Title 18, United States Code, Sections 1030(a)(2)(C) and 1030(c)(2)(B); and 

     b.     To knowingly cause the transmission of a program, information, code, and command, and as a result of such conduct, to intentionally cause damage without authorization to a protected computer, and where the offense did cause and, if completed, would have caused, 

loss aggregating $5,000 in value to at least one person during a one-year period from a related course of conduct affecting a protected computer, and damage affecting at least ten protected computers during a one-year period, in violation of Title 18, United States Code, Sections 1030(a)(5)(A) and 1030(c)(4)(B).





52.     In furtherance of the 

Conspiracy and to effect its illegal objects, 

the Conspirators committed the overt acts set forth in paragraphs 1 through 19, 21 through 49, 55, and 57 through 64, which are re-alleged and incorporated by reference as if fully set forth herein.

53.     In furtherance of the Conspiracy, and as set forth in paragraphs 1 through 19, 21 through 49, 55, and 57 through 64, the conspirators knowingly 

falsely registered a domain name and knowingly used that domain name in the course of committing an offense, 

namely, the Conspirators registered domains, including dcleaks.com and actblues.com, with false names and addresses, and used those domains in the course of committing the felony offense charged in Count One.

     All in violation of Title 18, United States Code, Sections 371 and 3559(g)(1).




COUNTS TWO THROUGH NINE
(Aggravated Identity Theft)

54.     Paragraphs 1 through 19, 21 through 49, and 57 through 64 of this Indictment are re-alleged and incorporated by reference as if fully set forth herein.

55.     On or about the dates specified below, in the District of Columbia and elsewhere, Defendants 

VIKTOR BORISOVICH NETYKSHO, BORIS ALEKSEYEVICH ANTONOV, DMITRIY SERGEYEVICH BADIN, IVAN SERGEYEVICH YERMAKOV, ALEKSEY VIKTOROVICH LUKASHEV, SERGEY ALEKSANDROVICH MORGACHEV, NIKOLAY YURYEVICH KOZACHEK, PAVEL VYACHESLAVOVICH YERSHOV, ARTEM ANDREYEVICH MALYSHEV, ALEKSANDR VLADIMIROVICH OSADCHUK, and ALEKSEY ALEKSANDROVICH POTEMKIN 


did knowingly transfer, possess, and use, without lawful authority, a means of identification of another person during and in relation to a felony violation enumerated in Title 18, United States Code, Section 1028A(c), namely, computer fraud in violation of Title 18, United States Code, Sections 1030(a)(2)(C) and 1030(c)(2)(B), knowing that the means of identification belonged to another real person:

Count 2; approximate date, March 21, 2016; Victim 3; Username and password for personal email account.

Count 3; approximate date, March 25, 2016; Victim 1; Username and password for personal email account.

Count 4; approx. date April 12, 2016; Victim 4; Username and password for DCCC computer network.

Count 5; approx. April 15, 2016; Victim 5; Username and password for DCCC computer network.

Count 6; approx. April 18, 2016; Victim 6; Username and password for DCCC computer network.

Count 7; approx. May 10, 2016; Victim 7; Username and password for DNC computer network.

Count 8; approx. June 2, 2016; Victim 2; Username and password for personal email account.

Count 9; approx. July 6, 2016; Victim 8; Username and password for personal email account.



COUNT TEN
(Conspiracy to Launder Money)

56.     Paragraphs 1 through 19, 21 through 49, and 55 are re-alleged and incorporated by reference as if fully set forth herein.

57.     To facilitate the purchase of infrastructure used in their hacking activity -- 

including hacking into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election and releasing the stolen documents -- 

the Defendants conspired to launder the equivalent of more than $95,000 through a web of transactions structured to capitalize on the perceived anonymity of cryptocurrencies such as bitcoin.



--------------------------------

(to be continued)



-30-    

No comments:

Post a Comment