Reading the Mueller Report: Part 3, The Leaks

The story of how the Kremlin fronted leaks through DCLeaks, Guccifer 2.0, and Wikileaks, from the Mueller Report.

GRU Unit 74455 was responsible for leaking documents they had stolen and publicizing the leaks through social media. They used three main channels through which they dumped documents: two websites created by GRU themselves (DCLeaks and Guccifer 2.0), and later, Wikileaks—which, given their long experience publishing leaked archives, appears to have had the most impact.

[Part 2 is here. The full report is here. This post deals with Volume I, Section III. B.]

DCLeaks.com

Almost as soon as GRU began to steal documents, they started planning to dump them. They created the domain DCLeaks.com on April 19, pretty much right as they managed to break into the DCCC computers. They leaked documents through this website in neatly labeled tranches, publicizing them through their Facebook and Twitter accounts, and occasionally directly contacting journalists to give them sneak previews of documents that hadn’t been publicly leaked yet. They hid the GRU ownership of the DCLeaks.com domain behind an anonymous registration and paid for it with Bitcoin.

Continue reading “Reading the Mueller Report: Part 3, The Leaks”

Reading the Mueller Report: Part 2, The Hacks

Fancy Bear a.k.a. Unit 26165: how the GRU hacked the Dems.

[Part 1 is here. This post deals with Volume I, Section III. A. The full report is here.]

The hacking of Democratic networks by the Russian State is the part of the Trump-Russia scandal (picturesquely known as Stupid Watergate) that most closely matches the break-in into the DNC headquarters during Watergate, at the eponymous office complex.

Except instead of five men, the break-in was carried out by Russia’s military intelligence, GRU. And instead of breaking into DNC headquarters, the break-in was into the DNC, DCCC, and the Clinton Campaign staffers’ computer networks. The break-in was virtual but much wider in scope. And the documents they stole, unlike during Watergate, were later weaponized by releasing them drip-by-drip through DCLeaks, Guccifer 2.0, and Wikileaks, timed for maximum impact during key moments of the campaign.

Continue reading “Reading the Mueller Report: Part 2, The Hacks”