Thursday, August 2, 2018
a fictitious name and an address in New York
"You got to walk -- that lonesome valley
You got to walk -- it by yourself
Nobody else -- can walk it for you
You got to walk -- it by yourself"
~~ traditional American folk blues
____________________________
I've been listening to
"Mississippi John Hurt -- The Best Of (Full Album)"
on You Tube. (Jim Blues Rock Channel).
Sometimes on You Tube you want to play one song and then choose another -- or play the same one several (or 600) times because it's good. But when you use YT this way, you have to "tap" your screen once about every 3 minutes to make your next selection.
Sometimes you're busy doing things and you want something that will just play for a while and you don't have to tap, like a Senate Foreign Relations Committee hearing or a Mississippi John Hurt album.
"The Best Of" is 30 or 35 minutes, and it sounds just great.
When I look up that album on the Internet, it gives a listing of 12 songs. But I'm pretty sure the one on You Tube has the first 10 songs, and not the 11th and 12th. The 11th song is "Sliding Delta," and the 12th is "Monday Morning Blues." (Maybe there was a copyright issue...)
Anyway, we can be very grateful for the 10 songs that are up there on "Jim Blues Rock Channel" -- sound quality is excellent.
There are two songs out of the 10 that are other songs -- Song 1, "Here Am I, Oh Lord, Send Me" has the melody of "You Gotta Walk That Lonesome Valley" but with different words.
Song 10 -- "Since I've Laid This Burden Down" -- has the melody of "Will The Circle Be Unbroken."
_____________________________
Mueller indictment (continued)
[highlights provided for readers who want to skim]
58. Although the Conspirators caused transactions to be conducted in a variety of currencies, including U.S. dollars, they principally used bitcoin when purchasing servers, registering domains, and otherwise making payments in furtherance of hacking activity. Many of these payments were processed by companies located in the United States that provided payment processing services to hosting companies, domain registrars, and other vendors both international and domestic.
The use of bitcoin allowed the Conspirators to avoid direct relationships with traditional financial institutions, allowing them to evade greater scrutiny
of their identities and sources of funds.
59. All bitcoin transactions are added to a public ledger called the Blockchain, but the Blockchain identifies the parties to each transaction only by alpha-numeric identifiers known as bitcoin addresses.
To further avoid creating a centralized paper trail of all of their purchases,
the Conspirators purchased infrastructure using hundreds of different email accounts, in some cases using a new account for each purchase.
The Conspirators used fictitious names and addresses in order to obscure their identities and their links to Russia and the Russian government.
For example, the dcleaks.com domain was registered and paid for using the fictitious name "Carrie Feehan" and an address in New York. In some cases, as part of the payment process, the Conspirators provided vendors with nonsensical addresses such as "usa Denver AZ," "gfhgh ghfhgfh fdgfdg WA," and "1 2 dwd District of Columbia."
60. The Conspirators used several dedicated email accounts to track basic bitcoin transaction information and to facilitate bitcoin payments to vendors.
One of these dedicated accounts, registered with the username "gfade147," received hundreds of bitcoin payment requests from approximately 100 different email accounts. For example, on or about February 1, 2016, the gfade147 account received the instruction to "[p]lease send exactly 0.026043 bitcoin to" a certain thirty-four character bitcoin address. Shortly thereafter, a transaction matching those exact instructions was added to the Blockchain.
61. On occasion, the Conspirators facilitated bitcoin payments using the same computers that they used to conduct their hacking activity, including to create and send test spearphishing emails. Additionally, one of these dedicated accounts was used by the Conspirators in or around 2015 to renew the registration of a domain (linuxkrnl.net) encoded in certain X-Agent malware installed on the DNC network.
62. The Conspirators funded the purchase of computer infrastructure for their hacking activity in part by "mining" bitcoin.
Individuals and entities can mine bitcoin by allowing their computing power to be used to verify and record payments on the bitcoin public ledger, a service for which they are rewarded with freshly-minted bitcoin. The pool of bitcoin generated from the GRU's mining activity was used, for example, to pay a Romanian company to register the domain dcleaks.com through a payment processing company located in the United States.
63. In addition to mining bitcoin, the Conspirators acquired bitcoin through a variety of means designed to obscure the origin of the funds.
This included purchasing bitcoin through peer-to-peer exchanges, moving funds through other digital currencies, and using pre-paid cards. They also enlisted the assistance of one or more third-party exchangers who facilitated layered transactions through digital currency exchange platforms
providing heightened anonymity.
____________________________
(to be continued ...)
-30-
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment