PART 2:
What did Mueller know?
Absent a release of Mueller’s full report, it’s hard to know how deeply his office probed the IRA’s web activities. He brought charges in February 2018 against three Russian companies and 13 Russians, alleging that the IRA hired hundreds of people for online disinformation campaigns in the United States and elsewhere. A new report by Business Insider
shed additional light on the IRA’s massive operation.
Mueller’s charging documents provided few details about where these people were hired or how and from where these computer-command-driven programs called bots were launched. Peter Carr, a spokesman for the Office of Special Counsel, declined to comment.
On Jan. 31, 2018, Twitter said
it had notified 1.4 million people who had actively followed an IRA-linked account or engaged with the 3,814 IRA-linked accounts identified by the social-media giant. For this story, Twitter said of its new protections, “We have automated systems and partner with a range of companies to determine potential security risks.”
The divisive pro-Trump, anti-Democratic Party automated tweets during the 2016 presidential campaign are well documented. But malware spread by link-shortening sites is less known. One company accused by Trump supporters of targeting with malware is called Shorte.st.
“WARNING: DON’T click on user’s “Shorte.st” link bc it’s INFECTED CLICK BAIT” a Trump supporter who goes by the handle @SnafuWorld commented on Sept. 2, 2016. That @TheTrumpNews account that allegedly spread the shortened malware links is now suspended and was retweeted by what Twitter called Russian IRA accounts.
McClatchy also identified numerous accounts, some still active, that from the same Twitter handle tweeted divisive content and contained sh.st links and sought to divide citizens of the United States, Great Britain and Spain. There’s no evidence Shorte.st knew it was helping spread such content.
Large web hosts such as GoDaddy and popular New York-based firm Bitly offer their own link shorteners, but these do a passive redirect and someone looking to spread malware would quickly run afoul of the company’s terms of service and would be easy to detect.
The Shorte.st business model is driven by revenue.
“We will turn your links into earning ones by adding an ad layer. Your visitors will see an ad before reaching a destination page and you will make money,” Shorte.st says on its home page, boasting “over 300,000 earning users.”
Code hidden from users on most shorteners actively processes many user variables such as location and whether a browser is outdated. That can determine what ad content to show and to redirect to a given destination website. In addition to its legitimate commercial operation, this type of system could allow for targeted delivery of malware.
This screen shot of his Twitter account shows Dawid Chomicz, chief technology officer of the URL-shortening company Shorte.st, at a technology conference in Dublin, Ireland, in 2014.
Shorte.st is based in western Poland, in the city of Szczecin. Chomicz said over LinkedIn messages that he was unsure if a URL shortener could be used to spread malware. Advertisers are responsible for content, he said, adding that he found “nothing special” when reviewing 2016 and 2017 traffic. His support team “blocks all the links which are reported by various parties that are against any law only as it is received by them,” he said.
Shorte.st is a subsidiary of Polish parent Red Sky, which builds and maintains websites for global Internet users. Red Sky operates shorte.st link shorteners, which are connected to Webzilla.
Chomicz did not answer when asked if he had a business relationship with Webzilla. XBT, Webzilla’s parent, described Red Sky and Shorte.st as a very small part of its business and said that there is no investment in either.
“They do not have access to customer servers and ... software. Servers do not belong to XBT,” said the response from XBT, noting it provides only power and Internet connectivity to Red Sky through an Amsterdam data center.
Venezuela muddies the water
McClatchy’s probe also found that some of the link-shortening ads attached to the pro-Trump tweets actually trace back to domains registered from across Venezuela. with names like
www.TrumpNewss.com and
www.trumppresident45.info. That country’s socialist government is teetering on the brink of collapse, condemned by much of the world yet propped up in part by support from Russia.
This screen shot posted by a user of the website Pastebin shows the Internet domains registered to people in Venezuela who were said to be spreading malware and ad bots via Twitter and Facebook postings during the 2016 U.S. elections and the immediate aftermath.
McClatchy engaged one of the domain owners, Katiuska Borges, by email and later by phone.
“My colleagues, like me, have nothing, we are broke. This helped to purchase [necessities] but now everything has gone down,” said Borges. She is the registrant of the now-expired domain
www.kabchnews.com, registered from remote Tia Juana via the U.S. company GoDaddy on July 22, 2016.
Borges said she and others made $5 for every 1,000 visitors to an advertiser from outside Venezuela. The entire business model, she said, relied on posts on Facebook and Twitter, using a program “that did tweets every set hour.”
She said Shorte.st and others paid her via PayPal for spreading links, adding, “If there really was something wrong with those links, truthfully, I had no idea.”
Another faux news site found in McClatchy’s investigation was trumpservativenews.club. McClatchy traced its registration back to Jose Alvarez in Houston. The address matched his former home there, but McClatchy traced him back to his native Spain, from where he claimed no knowledge.
“I have no idea what [the website] is. ... I have no involvement or interest in politics. I did not register it or have any knowledge of its registration,” the software specialist said in an interview, denying that the email
lockerzamerica@gmail.com used to register the site in Germany was his.
The precursor domain to this website was trumpservativenews.info, registered by another Venezuelan, Rodolfo Hernandez, who didn’t respond to emails seeking comment.
Kevin Hall: 202-383-6038, @KevinGHall
Investigative reporter Kevin G. Hall shared the 2017 Pulitzer Prize for the Panama Papers. He was a 2010 Pulitzer finalist for reporting on the U.S. financial crisis and won of the 2004 Sigma Delta Chi for best foreign correspondence for his series on modern-day slavery in Brazil. He is past president of the Society of American Business Editors and Writers.
@88m3 @ADevilYouKhow @wire28 @dtownreppin214
@DonKnock @dza @wire28 @BigMoneyGrip @Dameon Farrow @VR Tripper @re'up @Blackfyre @Cali_livin @NY's #1 Draft Pick