More on this book
Community
Kindle Notes & Highlights
Read between
February 5 - May 14, 2021
the investigation did not establish that members of the Trump Campaign conspired or coordinated with the Russian government in its election interference activities.
concluded with high confidence that Russia had intervened in the election through a variety of means to assist Trump's candidacy and harm Clinton's. A declassified version of the assessment was publicly released that same day.
pen registers;
While certain campaign volunteers agreed to provide the requested support (for example, agreeing to set aside a number of signs), the investigation has not identified evidence that any Trump Campaign official understood the requests were coming from foreign nationals.
originated from the Russian operation. Our best estimate is that approximately 126 million people may have been served content from a Page associated with the IRA at some point during the two-year period.").
The terra "troll" refers to internet users—in this context, paid operatives—who post inflammatory or otherwise disruptive
A botnet refers to a network of private computers or accounts controlled as a group to send specific automated messages. On the Twitter network, botnets can be used to promote and republish ("retweet") specific tweets or hashtags in order for them to gain larger audiences.
(W.D. Pa.). 112 A spearphishing email is designed to appear as though it originates from a trusted source, and solicits information to enable the sender to gain access to an account or network, or causes the recipient to download malware that enables the sender to gain access to an account or network.
Bitcoin mining consists of unlocking new bitcoins by solving computational problems. IT kept its newly mined coins in an account on the bitcoin exchange platform CEX.io. To make purchases, the GRU routed funds into other accounts through transactions designed to obscure the source of funds.
A VPN extends a private network, allowing users to send and receive data across public networks (such as the internet) as if the connecting computer was directly connected to the private network.
"Malware" is short for malicious software, and here refers to software designed to allow a third party to infiltrate a computer without the consent or knowledge of the computer's
superseding
proffer sessions
To offer or present for immediate acceptance or rejection, usually evidence at trial.
Proffer sessions are meetings between prosecutors and individuals who are the focus of an ongoing investigation. They are commonplace in criminal investigations. While a proffer session carries the potential to reduce or resolve a client's criminal exposure, it also presents a great deal of risk.
Papadopoulos's recollection is also consistent with handwritten notes from a Journal that he kept at the time.
(collusion is “[a]n agreement to defraud another or to do or obtain something forbidden by law”);
probable cause requires only “a fair probability,” and not “certainty, or proof beyond a reasonable doubt,
Campaign-finance law also places financial limits on contributions, 52 U.S.C. § 30116(a), and prohibits contributions from corporations, banks, and labor unions,
Contemporaneous notes taken by Porter show that the President told Porter to “Keep in touch with your friend,”
impedes any official proceeding’
proper administration of justice may be impeded or thwarted” by a “variety of corrupt methods ... limited only by the imagination of the criminally inclined,”
o [person] in this country is so high that he is above the law.”
while this report does not conclude that the President committed a crime, it also does not exonerate him.