RUSSIA/РОССИЯ THREAD—ASSANGE CHRGD W/ SPYING—DJT IMPEACHED TWICE-US TREASURY SANCTS KILIMNIK AS RUSSIAN AGNT

☑︎#VoteDemocrat

The Original
Bushed
WOAT
Supporter
Joined
Dec 9, 2012
Messages
305,928
Reputation
-34,259
Daps
616,251
Reppin
The Deep State




thtZqKt.gif

hujMXiN.gif


Mueller has emails from Stone pal Corsi about WikiLeaks Dem email dump


Mueller has emails from Stone pal Corsi about WikiLeaks Dem email dump
"Word is (Julian Assange) plans 2 more dumps...Impact planned to be very damaging," Jerome Corsi said in email to Stone, say draft court documents.
Nov. 27, 2018 / 3:57 PM EST
Two months before WikiLeaks released emails stolen from the Clinton campaign, right-wing conspiracy theorist Jerome Corsi sent an email to former Trump campaign adviser Roger Stone anticipating the document dump, according to draft court papers obtained by NBC News.

"Word is friend in embassy plans 2 more dumps," Corsi wrote on Aug. 2, 2016, referring to WikiLeaks founder Julian Assange, according to the draft court papers. "One shortly after I'm back. 2nd in Oct. Impact planned to be very damaging."


The email was revealed in a draft court document, known as a statement of the offense, sent to Corsi by special counsel Robert Mueller's office. Mueller also sent Corsi a draft plea agreement stipulating that the special counsel would not oppose Corsi requesting a sentence of probation if he agreed to plead guilty to one count of lying to federal investigators.

As NBC News reported on Monday, Corsi said he has rejected the deal. He has described Mueller's team as "thugs" and insisted that he did not "intentionally lie" about his communications related to WikiLeaks.



The draft court documents obtained by NBC News provide the most extensive account to date of Corsi's contact with Mueller's prosecutors.

The interviews began on Sept. 6 when Corsi told investigators that an associate, identified by Corsi as Stone, asked him in the summer of 2016 to get in touch with an organization, identified by Corsi as WikiLeaks, about unreleased materials relevant to the presidential campaign, the draft court papers say.

"Get to (Assange) [a]t Ecuadorian Embassy in London and get the pending (WikiLeaks) emails," read the email to Corsi dated July 25, 2016, according to the draft court documents.

Corsi said he declined the request and made clear to Stone that an attempt to contact WikiLeaks could put them in investigators' crosshairs, according to the draft court documents.

But Mueller's team said that was a lie.


Instead of turning down the request, Corsi in fact passed it along to a person in London, according to the draft court documents. Corsi said that person was conservative author Ted Malloch.

Eight days later, Corsi sent the email to Stone saying that WikiLeaks possessed information that would be damaging to Hillary Clinton's campaign and planned to release it in October.


Jerome Corsi during an interview at NBC News in New York on November 27, 2018.Chelsea Stahl / NBC News
"Time to let more than (Clinton campaign chairman John Podesta) to be exposed as in bed w enemy if they are not ready to drop HRC (Hillary Rodham Clinton)," Corsi added in the Aug. 2, 2016, email, according to the draft court papers. "That appears to be the game hackers are now about."

On Oct. 7, 2016, WikiLeaks released the first of two batches of emails that Russian hackers stole from Podesta, altering the trajectory of the presidential race.

Mueller's team says in the court papers that Corsi scrubbed his computer between Jan. 13, 2017, and March 1, 2017, deleting all email correspondence that predated Oct. 11, 2016, including the messages from Stone about WikiLeaks and Corsi's email to Malloch.

Corsi remained in contact with Stone in 2017 when the former Trump adviser's connections to WikiLeaks came under investigation by the FBI and congressional committees, according to the draft court papers.

On Nov. 30, 2017, Stone emailed Corsi asking him to write about a person whom Stone had told congressional investigators was his "source" or "intermediary" to WikiLeaks, according to the draft court papers.

Corsi and Stone have identified that person as Randy Credico, a radio host and one-time friend of Stone.

"Are you sure you want to make something out of this now?" Corsi responded, according to the draft court papers. "Why not wait to see what (Credico) does? You may be defending yourself too much — raising new questions that will fuel new inquiries. This may be a time to say less, not more."

Stone responded by telling Corsi that Credico will "take the 5th — but let's hold a day," the draft court document says.

https://www.nbcnews.com/nightly-new...ing-plea-agreement-with-mueller-1378933827534
The draft court documents says that Corsi met with the special counsel's office for several additional interviews and provided access to his email accounts and electronic devices.

In the interviews, the draft court papers say, Corsi said that his claims to Stone, beginning in 2016, that he had a way of obtaining confidential information from WikiLeaks were false.

Corsi, the former Washington bureau chief of the conspiracy theory outlet InfoWars, has told NBC News that he had no direct or indirect contact with WikiLeaks. Corsi claims to have anticipated WikiLeaks' release of the hacked emails by "connecting the dots" between public statements from Assange and other available materials.

"Why did I think they were coming out in October? Because I said to myself if I had these emails I'd use them as the October surprise," Corsi told NBC News on Tuesday. "And why did I think they would come out serially, drip by drip? Because Assange is very strategic. He understands the news cycle."

A spokesman for Mueller's office declined to comment. Corsi's lawyer, David Gray, also declined to comment.

Robert Mueller testifies before a Senate Judiciary Committee in 2013.Tom Williams / CQ-Roll Call,Inc. file
But in a letter drafted by Gray and addressed to Mueller's team, Corsi's lawyer argued that he should not be charged with a crime based on a faulty memory.

"I understand that this plea to making a false claim is predicated on the fact that Dr. Corsi had emails and phone calls wherein he was in fact interested in WikiLeaks," Gray wrote.

"He had not had the benefit of reviewing all of his emails prior to the interview and you graciously allowed him to review his emails and amend his statements — which he did. Now, after various amendments to his statements, Dr. Corsi is being asked to affirmatively state that he lied to FBI agents. The issue is that the statements that Dr. Corsi made were, in fact, the best he could recall at the time."

Gray also noted that if Corsi were to plead guilty, he would have to give up his securities license and cease his online chats until sentencing, depriving him of crucial sources of income.

Daniel Goldman, a former federal prosecutor who is now a legal analyst for NBC News and MSNBC, said the documents suggest that Mueller has more on Corsi than is laid out in the draft court papers.

"Based on reviewing these documents, I believe that the office of the special counsel may have more evidence of criminal wrongdoing by Corsi beyond the false statements, and that is why they engaged in plea negotiations," Goldman said.

Goldman also said that the documents indicate that Mueller and his investigators are "really circling Stone."

"He is a clear target of the investigation," Goldman added.

Stone, who has repeatedly insisted that he had no advanced knowledge of the WikiLeaks email dump, said Tuesday that the newly-released emails don't suggest otherwise.

"None of these emails provide any evidence or proof that I knew in advance about the source or content of any of the allegedly stolen or allegedly hacked emails published by WikiLeaks," Stone said.

"Since when did gossip become a criminal offense? Where is the WikiLeaks collaboration? Where is the evidence that I received anything whatsoever from WikiLeaks and passed it on to Donald Trump? These emails prove nothing other than the fact that Jerry Corsi is an aggressive investigative reporter."

Anna Schecter is a producer for the investigations unit of NBC News.

Rich Schapiro contributed.
 

☑︎#VoteDemocrat

The Original
Bushed
WOAT
Supporter
Joined
Dec 9, 2012
Messages
305,928
Reputation
-34,259
Daps
616,251
Reppin
The Deep State

Two International Cybercriminal Rings Dismantled and Eight Defendants Indicted for Causing Tens of Millions of Dollars in Losses in Digital Advertising Fraud
Global Botnets Shut Down Following Arrests
A 13-count indictment was unsealed today in federal court in Brooklyn charging Aleksandr Zhukov, Boris Timokhin, Mikhail Andreev, Denis Avdeev, Dmitry Novikov, Sergey Ovsyannikov, Aleksandr Isaev and Yevgeniy Timchenko with criminal violations for their involvement in perpetrating widespread digital advertising fraud. The charges include wire fraud, computer intrusion, aggravated identity theft and money laundering. Ovsyannikov was arrested last month in Malaysia; Zhukov was arrested earlier this month in Bulgaria; and Timchenko was arrested earlier this month in Estonia, all pursuant to provisional arrest warrants issued at the request of the United States. They await extradition. The remaining defendants are at large.

Also unsealed today in federal court in Brooklyn were seizure warrants authorizing the FBI to take control of 31 internet domains, and search warrants authorizing the FBI to take information from 89 computer servers, that were all part of the infrastructure for botnets engaged in digital advertising fraud activity. The FBI, working with private sector partners, redirected the internet traffic going to the domains (an action known as “sinkholing”) in order to disrupt and dismantle these botnets.

Richard P. Donoghue, United States Attorney for the Eastern District of New York, William F. Sweeney, Jr., Assistant Director-in-Charge, Federal Bureau of Investigation, New York Field Office (FBI), and James P. O’Neill, Commissioner, New York City Police Department (NYPD) announced the charges and domain seizures.

“As alleged in court filings, the defendants in this case used sophisticated computer programming and infrastructure around the world to exploit the digital advertising industry through fraud,” stated United States Attorney Donoghue. “This case sends a powerful message that this Office, together with our law enforcement partners, will use all our available resources to target and dismantle these costly schemes and bring their perpetrators to justice, wherever they are.” Mr. Donoghue thanked the FBI Cyber Division for its extraordinary efforts in carrying out the multi-year investigation.

“As alleged, these individuals built complex, fraudulent digital advertising infrastructure for the express purpose of misleading and defrauding companies who believed they were acting in good faith, and costing them millions of dollars. This kind of exploitation undermines confidence in the system, on the part of both companies and their customers,
” stated FBI Assistant Director-in-Charge Sweeney. “Thanks to the hard work of our legal attachés and law enforcement partners overseas, with the cooperation of our international and U.S.-based private sector partners, the defendants will face justice for their alleged crimes.”

“This investigation highlights public- and private-sector collaboration across the globe, and again confirms the absolute necessity for interagency information-sharing. Criminals – especially those operating via the internet – do not concern themselves with jurisdictional boundaries, so it is critical that the law-enforcement community works together to achieve our shared goal of protecting the people we serve,” stated NYPD Commissioner O’Neill. “I thank and commend the U.S. Attorney for the Eastern District, and all the investigators with the FBI Cyber Division and the NYPD. Together, we are ensuring that the vital systems and technologies of our economy are kept safe.”

The Criminal Scheme

The internet is, in large part, freely available to users worldwide because it runs on digital advertising: website owners display advertisements on their sites and are compensated for doing so by intermediaries representing businesses seeking to advertise their goods and services to real human customers. In general, digital advertising revenue is based on how many users click or view the ads on those websites. As alleged in court filings, the defendants in this case represented to others that they ran legitimate companies that delivered advertisements to real human internet users accessing real internet webpages. In fact, the defendants faked both the users and the webpages: they programmed computers they controlled to load advertisements on fabricated webpages, via an automated program, in order to fraudulently obtain digital advertising revenue.

The Datacenter-Based Scheme (Methbot)

As alleged in the indictment, between September 2014 and December 2016, Zhukov, Timokhin, Andreev, Avdeev and Novikov operated a purported advertising network (“Ad Network #1”) and, with Ovsyannikov’s assistance, carried out a digital ad fraud scheme. Ad Network #1 had business arrangements with other advertising networks whereby it received payments in return for placing advertising placeholders (“ad tags”) on websites. Rather than place these ad tags on real publishers’ websites, however, Ad Network #1 rented more than 1,900 computer servers housed in commercial datacenters in Dallas, Texas and elsewhere, and used those datacenter servers to load ads on fabricated websites, “spoofing” more than 5,000 domains. To create the illusion that real human internet users were viewing the advertisements loaded onto these fabricated websites, the defendants programmed the datacenter servers to simulate the internet activity of human internet users: browsing the internet through a fake browser, using a fake mouse to move around and scroll down a webpage, starting and stopping a video player midway, and falsely appearing to be signed into Facebook. Furthermore, the defendants leased more than 650,000 Internet Protocol (“IP”) addresses, assigned multiple IP addresses to each datacenter server, and then fraudulently registered those IP addresses to make it appear that that the datacenter servers were residential computers belonging to individual human internet users who were subscribed to various residential internet service providers. As a result of this scheme, Ad Network #1 falsified billions of ad views and caused businesses to pay more than $7 million for ads that were never actually viewed by real human internet users.


The Botnet-Based Scheme (3ve.2 Template A)

As also alleged in the indictment, between December 2015 and October 2018, Ovsyannikov, Timchenko and Isaev operated a purported advertising network (“Ad Network #2”) and carried out another digital ad fraud scheme. In this scheme, the defendants used a global “botnet”¾a network of malware-infected computers operated without the true owner’s knowledge or consent¾to perpetrate their fraud. The defendants developed an intricate infrastructure of command-and-control servers to direct and monitor the infected computers and check whether a particular infected computer had been flagged by cybersecurity companies as associated with fraud. By using this infrastructure, the defendants accessed more than 1.7 million infected computers, belonging to ordinary individuals and businesses in the United States and elsewhere, and used hidden browsers on those infected computers to download fabricated webpages and load ads onto those fabricated webpages. Meanwhile, the owners of the infected computers were unaware that this process was running in the background on their computers. As a result of this scheme, Ad Network #2 falsified billions of ad views and caused businesses to pay more than $29 million for ads that were never actually viewed by real human internet users.

The Botnet Takedown

Following the arrest of Ovsyannikov by Malaysian authorities, U.S. law enforcement authorities, in conjunction with various private sector companies, began the process of dismantling the criminal cyber infrastructure utilized in the botnet-based scheme, which involved computers infected with malicious software known in the cybersecurity community as “Kovter.” The FBI executed seizure warrants to sinkhole 23 internet domains used to further the charged botnet-based scheme or otherwise used to further the Kovter botnet. The FBI also executed search warrants at 11 different U.S. server providers for 89 servers related to the charged botnet-based scheme or Kovter.

In addition, as part of its investigation, the FBI discovered an additional cybercrime infrastructure committing digital advertising fraud through the use of datacenter servers located in Germany and a botnet of computers in the United States infected with malicious software known in the cybersecurity community as “Boaxxe.” The FBI executed seizure warrants to sinkhole eight domains used to further this scheme and thereby disrupt yet another botnet engaged in digital advertising fraud.

Finally, the United States, with the assistance of its foreign partners, executed seizure warrants for multiple international bank accounts in Switzerland and elsewhere that were associated with the schemes.

The charges in the indictment are merely allegations and the defendants are presumed innocent unless and until proven guilty.

The government’s case is being prosecuted by the Office’s National Security and Cybercrime Section. Assistant United States Attorneys Saritha Komatireddy, Alexander F. Mindlin, Michael T. Keilty and Karin K. Orenstein are in charge of the prosecution.

The Justice Department’s Office of International Affairs, the FBI’s Legal Attachés abroad and foreign authorities in multiple countries provided critical assistance in this case. The Office extends its appreciation to the Attorney General’s Chambers of Malaysia, the Royal Malaysian Police, the Malaysian National Central Bureau of Interpol, the Supreme Cassation Prosecution Office of Bulgaria, the Regional Prosecution Office of Varna, the Cybercrime Department of the Bulgarian General Directorate for Combating Organized Crime, the Bulgarian Ministry of Interior Regional Directorate of Varna, the Office of the Prosecutor General of Estonia, the Estonian Police and Border Guard Board and the FBI’s Legal Attaché Offices in Malaysia, Bulgaria and Estonia for their assistance in apprehending defendants in this case. The Office also extends its appreciation to the German Bundeskriminalamt Cybercrime Intelligence Operations Department and Polizei Sachsen Polizeidirektion Zwickau Criminal Investigation Department, the Dutch National Police, the United Kingdom National Crime Agency, the French Police Cybercrime Central Bureau, the Swiss Federal Office of Justice, FBI’s Legal Attaché Offices in those countries, and Europol for their assistance in various aspects of the investigation and botnet takedown.

Multiple private sector organizations also provided critical assistance in this case. The Office extends its appreciation to White Ops, Inc. and Google LLC for their assistance in the investigation and botnet takedown. The Office also extends its appreciation to Microsoft Corporation, ESET, Trend Micro Inc., Symantec Corporation, CenturyLink, Inc, F-Secure Corporation, Malwarebytes, MediaMath, the National Cyber-Forensics and Training Alliance and The Shadowserver Foundation for their assistance in the botnet takedown.

For technical details on the malware and botnets referenced in this case, please see US-CERT Alert TA18-331A: 3ve – Major Online Ad Fraud Operation | US-CERT

The Defendants:

ALEKSANDR ZHUKOV
Age: 38
Russian Federation

BORIS TIMOKHIN
Age: 39
Russian Federation

MIKHAIL ANDREEV
Age: 34
Russian Federation and Ukraine

DENIS AVDEEV
Age: 40
Russian Federation

DMITRY NOVIKOV
Age: Unknown
Russian Federation

SERGEY OVSYANNIKOV
Age: 30
Republic of Kazakhstan

ALEKSANDR ISAEV
Age: 31
Russian Federation

YEVGENIY TIMCHENKO
Age: 30
Republic of Kazakhstan

E.D.N.Y. Docket No. 18-CR-633 (ERK)

John Marzulli Tyler Daniels United States Attorney’s Office (718) 254-6323
 
Last edited:
Top