The Mueller Report: The Comprehensive Findings of the Special Counsel
Rate it:
Kindle Notes & Highlights
2%
Flag icon
The Russian government interfered in the 2016 presidential election in sweeping and systematic fashion. Evidence of Russian government operations began to surface in mid-2016.
3%
Flag icon
We understood coordination to require an agreement—tacit or express—between the Trump Campaign and the Russian government on election interference. That requires more than the two parties taking actions that were informed by or responsive to the other's actions or interests. We applied the term coordination in that sense when stating in the report that the investigation did not establish that the Trump Campaign coordinated with the Russian government in its election interference activities.
4%
Flag icon
while the investigation identified numerous links between individuals with ties to the Russian government and individuals associated with the Trump Campaign, the evidence was not sufficient to support criminal charges.
4%
Flag icon
George Papadopoulos, a foreign policy advisor during the campaign period, pleaded guilty to lying to investigators about, inter alia, the nature and timing of his interactions with Joseph Mifsud, the professor who told Papadopoulos that the Russians had dirt on candidate Clinton in the form of thousands of emails.
4%
Flag icon
And the investigation did not establish that one Campaign official's efforts to dilute a portion of the Republican Party platform on providing assistance to Ukraine were undertaken at the behest of candidate Trump or Russia.
4%
Flag icon
Further, the Office learned that some of the individuals we interviewed or whose conduct we investigated—including some associated with the Trump Campaign—deleted relevant communications or communicated during the relevant period using applications that feature encryption or that do not provide for long-term retention of data or communications records.
4%
Flag icon
Accordingly, while this report embodies factual and legal determinations that the Office believes to be accurate and complete to the greatest extent possible, given these identified gaps, the Office cannot rule out the possibility that the unavailable information would shed additional light on (or cast in a new light) the events described in the report. I.
5%
Flag icon
The first form of Russian election influence came principally from the Internet Research Agency, LLC (IRA), a Russian organization funded by Yevgeniy Viktorovich Prigozhin and companies he controlled, including Concord Management and Consulting LLC and Concord Catering (collectively "Concord").
5%
Flag icon
The IRA and its employees began operations targeting the United States as early as 2014.
5%
Flag icon
Using fictitious U.S. personas, IRA employees operated social media accounts and group pages designed to attract U.S. audiences.
5%
Flag icon
By early to mid-2016, IRA operations included supporting the Trump Campaign and disparaging candidate Hillary Clinton.
5%
Flag icon
By the end of the 2016 U.S. election, the IRA had the ability to reach millions of U.S. persons through their social media accounts.
5%
Flag icon
The IRA's U.S. operations sought to influence public opinion through online media and forums. By the spring of 2014, the IRA began to consolidate U.S. operations within a single general department, known internally as the "Translator" department.
5%
Flag icon
Initially, the IRA created social media accounts that pretended to be the personal accounts of U.S. persons.45 By early 2015, the IRA began to create larger social media groups or public social media pages that claimed (falsely) to be affiliated with U.S. political and grassroots organizations.
5%
Flag icon
IRA Facebook groups active during the 2016 campaign covered a range of political issues and included purported conservative groups (with names such as "Being Patriotic," "Stop All Immigrants," "Secured Borders," and "Tea Party News"), purported Black social justice groups ("Black Matters," "Blacktivist," and "Don't Shoot Us"), LGBTQ groups ("LGBT United"), and religious groups ("United Muslims of America").
6%
Flag icon
The IRA organized and promoted political rallies inside the United States while posing as U.S. grassroots activists.
6%
Flag icon
From those who responded with interest in attending, the IRA then sought a U.S. person to serve as the event's coordinator. In most cases, the IRA account operator would tell the U.S. person that they personally could not attend the event due to some preexisting conflict or because they were somewhere else in the United States.
6%
Flag icon
From June 2016 until the end of the presidential campaign, almost all of the U.S. rallies organized by the IRA focused on the U.S. election, often promoting the Trump Campaign and opposing the Clinton Campaign.
6%
Flag icon
Trump Campaign affiliates promoted dozens of tweets, posts, and other political content created by the IRA.
6%
Flag icon
The IRA's contacts included requests for signs and other materials to use at rallies,107 as well as requests to promote the rallies and help coordinate logistics.108
6%
Flag icon
the investigation has not identified evidence that any Trump Campaign official understood the requests were coming from foreign nationals.
Mark
This is significant, and votes a long way towards explaining why Mueller did not find sufficient evidence to support filing criminal charges based upon conspiracy.
8%
Flag icon
Beginning in March 2016, units of the Russian Federation's Main Intelligence Directorate of the General Staff (GRU) hacked the computers and email accounts of organizations, employees, and volunteers supporting the Clinton Campaign, including the email account of campaign chairman John Podesta.
8%
Flag icon
Two military units of the GRU carried out the computer intrusions into the Clinton Campaign, DNC, and DCCC: Military Units 26165 and
8%
Flag icon
Beginning in mid-March 2016, Unit 26165 had primary responsibility for hacking the DCCC and DNC, as well as email accounts of individuals affiliated with the Clinton Campaign:
8%
Flag icon
GRU officers also sent hundreds of spearphishing emails to the work and personal email accounts of
8%
Flag icon
Clinton Campaign employees and volunteers.
8%
Flag icon
Between April 18, 2016 and June 8, 2016, Unit 26165 compromised more than 30 computers on the DNC network, including the DNC mail server and shared file server.122
9%
Flag icon
Officers from Unit 26165 stole thousands of documents from the DCCC and DNC networks, including significant amounts of data pertaining to the 2016 U.S. federal elections. Stolen documents included internal strategy documents, fundraising data, opposition research, and emails from the work inboxes of DNC employees.130
9%
Flag icon
The GRU's operations extended beyond stealing materials, and included releasing documents stolen from the Clinton Campaign and its supporters. The GRU carried out the anonymous release through two fictitious online personas that it created—DCLeaks and Guccifer 2.0—and later through the organization WikiLeaks.
9%
Flag icon
The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the Clinton Campaign and prior political jobs, and fundraising files and information.140
9%
Flag icon
Facebook
Mark
The GRU created a FB page for the purpose of promoting public access to leaked materials.
9%
Flag icon
GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account dcleaksproject@gmail.com to communicate privately with reporters and other U.S. persons.
9%
Flag icon
Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146
9%
Flag icon
The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.
9%
Flag icon
Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 That the Guccifer 2.0 persona provided reporters ...more
9%
Flag icon
The Office was able to identify when the GRU (operating through its personas Guccifer 2.0 and DCLeaks) transferred some of the stolen documents to WikiLeaks through online archives set up by the GRU. Assange had access to the internet from the Ecuadorian Embassy in London, England. [REDACTED: Investigative Technique]162
10%
Flag icon
On October 7, 2016, WikiLeaks released the first emails stolen from the Podesta email account. In total, WikiLeaks released 33 tranches of stolen emails between October 7, 2016 and November 7, 2016. The releases included private speeches given by Clinton;177 internal communications between Podesta and other high-ranking members of the Clinton Campaign;178 and correspondence related to the Clinton Foundation.
10%
Flag icon
As reports attributing the DNC and DCCC hacks to the Russian government emerged, WikiLeaks and Assange made several public statements apparently designed to obscure the source of the materials that WikiLeaks was releasing. The file-transfer evidence described above and other information uncovered during the investigation discredit WikiLeaks's claims about the source of material that it posted.
10%
Flag icon
Within approximately five hours of Trump's statement, GRU officers targeted for the first time Clinton's personal office. After candidate Trump's remarks, Unit 26165 created and sent malicious links targeting 15 email accounts at the domain [REDACTED: Personal Privacy] including an email account belonging to Clinton aide
10%
Flag icon
In addition to targeting individuals involved in the Clinton Campaign, GRU officers also targeted individuals and entities involved in the administration of the elections. Victims included U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well as individuals who worked for those entities.
10%
Flag icon
GRU officers, for example, targeted state and local databases of registered voters using a technique known as "SQL injection," by which malicious code was sent to the state or local website in order to run commands (such as exfiltrating the database contents).
10%
Flag icon
Unit 74455 also sent spearphishing emails to public officials involved in election administration and personnel at companies involved in voting technology.
10%
Flag icon
We understand the FBI believes that this operation enabled the GRU to gain access to the network of at least one Florida county government.
11%
Flag icon
According to Gates, by the late summer of 2016, the Trump Campaign was planning a press strategy, a communications campaign, and messaging based on the possible release of Clinton emails by WikiLeaks.207 [REDACTED: Harm to Ongoing Matter]208 [REDACTED: Harm to Ongoing Matter] while Trump and Gates were driving to LaGuardia Airport. [REDACTED: Harm to Ongoing Matter], shortly after the call candidate Trump told Gates that more releases of damaging information would be coming.209
11%
Flag icon
Donald Trump Jr. had direct electronic communications with WikiLeaks during the campaign period.
11%
Flag icon
The investigation did not find evidence that the Trump Campaign recovered any
11%
Flag icon
such Clinton emails, or that these contacts were part of a coordinated effort between Russia and the Trump Campaign.
11%
Flag icon
Oknyansky was accompanied to the meeting by Alexei Rasin, a Ukrainian associate involved in Florida real estate. At the meeting, Rasin offered to sell Stone derogatory information on Clinton that Rasin claimed to have obtained while working for Clinton.
11%
Flag icon
After candidate Trump stated on July 27, 2016, that he hoped Russia would "find the 30,000 emails that are missing," Trump asked individuals affiliated with his Campaign to find the deleted Clinton emails.264 Michael Flynn—who would later serve as National Security Advisor in the Trump Administration—recalled that Trump made this request repeatedly, and Flynn subsequently contacted multiple people in an effort to obtain the emails.265
Mark
The fucking asshole was obsessed with finding the "30,000 emails".
12%
Flag icon
Just weeks after Trump's July 2016 request to find the Clinton emails, however, Smith tried to locate and obtain the emails himself. He created a company, raised tens of thousands of dollars, and recruited security experts and business associates. Smith made claims to others involved in the effort (and those from whom he sought funding) that he was in contact with hackers with "ties and affiliations to Russia" who had access to the emails, and that his efforts were coordinated with the Trump Campaign.273
Mark
More on Trump's obsessive efforts to locate the Clinton emils, this time seeking Russiin assistance.
« Prev 1 3 6