213

 

 

Corsi said that, because he had no direct means o communicating with WikiLeaks, he told members of the news site WNO-who were participating on a conference call with him that day-to reach Assange immediately. 244 Corsi claimed that the pressure was enormous and recalled telling the conference call the Access Hollywood tape was coming. 245 Corsi stated that he was convinced that his efforts had caused WikiLeaks to release the emails when they did.246 In a later November 2018 interview, Corsi stated that he thought that he had told people on a WND conference call about the forthcoming tape and had sent out a tweet asking whether anyone could contact Assange, but then said that maybe he had done nothing. 247

Pg. 66-67 So Corsi is who told Wikileaks to drop Podesta emails when it did.

 

 

https://twitter.com/justinjm1/status/1119049204561850368

 

https://cdn.cnn.com/cnn/2019/images/04/18/mueller-report-searchable.pdf

 

Shortly after the GRU’s first release of stolen documents through dcleaks.com in June 2016, GRU officers also used the DCLeaks persona to contact WikiLeaks about possible coordination in the future release of stolen emails. On June 14, 2016, @dcleaks _ sent a direct message to @WikiLeaks, noting, “You announced your organization was preparing to publish more Hillary’s emails. We are ready to support you. We have some sensitive information too, in particular, her financial documents. Let’s do it to ether. What do ou think about ublishin our info at the same moment? Thank ou.” 159 Around the same time, WikiLeaks initiated communications with the GRU persona Guccifer 2.0 shortly after it was used to release documents stolen from the DNC. On June 22, 2016, seven days after Guccifer 2.0 ‘s first releases of stolen DNC documents, WikiLeaks used Twitter’s direct message function to contact the Guccifer 2.0 Twitter account and suggest that Guccifer 2.0 “[s]end any new material [stolen from the DNC] here for us to review and it will have a much higher impact than what you are doing.” 160 On July 6, 2016, WikiLeaks again contacted Guccifer 2.0 through Twitter’s private messaging function , writing, “if you have anything hillary related we want it in the next tweo [sic] days prefab le [sic] because the DNC is approaching and she will solidify bernie supporters behind her after.” The Guccifer 2.0 persona responded , “ok … i see.” WikiLeaks also explained, “we think trump has only a 25% chance of winning against hillary … so conflict between bernie and hillary is interesting.” 161

Pg. 53

 

Around the same time, WikiLeaks initiated communications with the GRU persona Guccifer 2.0 shortly after it was used to release documents stolen from the DNC. On June 22, 2016, seven days after Guccifer 2.0 ‘s first releases of stolen DNC documents, WikiLeaks used Twitter’s direct message function to contact the Guccifer 2.0 Twitter account and suggest that Guccifer 2.0 “[s]end any new material [stolen from the DNC] here for us to review and it will have a much higher impact than what you are doing.” 160 On July 6, 2016, WikiLeaks again contacted Guccifer 2.0 through Twitter’s private messaging function , writing, “if you have anything hillary related we want it in the next tweo [sic] days prefab le [sic] because the DNC is approaching and she will solidify bernie supporters behind her after.” The Guccifer 2.0 persona responded , “ok … i see.” WikiLeaks also explained, “we think trump has only a 25% chance of winning against hillary … so conflict between bernie and hillary is interesting.” 16

Pg. 54:

The Office was able to identify when the GRU ( operating through its personas Guccifer 2.0 and DCLeaks) transferred some of the stolen documents to WikiLeaks through online archives set up by the GRU. Assan e had access to the internet from the Ecuadorian Embass in London, En land.

On July 14, 2016, GRU officers used a Guccifer 2.0 email account to send WikiLeaks an email bearing the subject “big archive” and the message “a new attempt.” 163 The email contained an encrypted attachment with the name “wk dnc link I .txt.gpg.” 164 Using the Guccifer 2.0 Twitter account, GRU officers sent WikiLeaks an encrypted file and instructions on how to open it.165 On July 18, 2016, WikiLeaks confirmed in a direct message to the Gucci fer 2.0 account that it had “the 1 Gb or so archive” and would make a release of the stolen documents “this week.” 166 On July 22, 2016, WikiLeaks released over 20,000 emails and other documents stolen from the DNC computer networks. 167 The Democratic National Convention began three days later.

 

Pg. 56-57:

As reports attributing the DNC and DCCC hacks to the Russian government emerged , WikiLeaks and Assange made several public statement s apparentl y designed to obscure the source of the materials that WikiLeaks was releasing. The file-transfer evidence described above and other information uncovered during the investigation discredit WikiLeaks’s claims about the source of material that it posted. Beginning in the summer of 2016 , Assange and WikiLeaks made a number of statements about Seth Rich , a former DNC staff member who was killed in July 2016. The statements about Rich implied falsely that he had been the source of the stolen DNC emails . On August 9, 2016, the @WikiLeaks Twitt er account posted: “ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder ofDNC staffer Seth Rich. ” 180 Likewise, on August 25, 2016, Assange was asked in an interview, “Why are you so interested in Seth Rich’s killer?” and responded , “We ‘re very interested in anythin g that might be a threat to alleged Wikileaks sources. ” The interviewer responded to Assange ‘s statement by commenting , “I know you don ‘t want to reveal your source, but it certainly sounds like you ‘re suggesting a man who leaked information to WikiLeaks wa s then murdered.” Assange replied , “If there ‘s someone who’s potentially connected to our publication , and that person has been murder ed in suspicious

circumstances, it doesn’t necessarily mean that the two are connected. But it is a very serious matter … that type of allegation is very serious, as it’s taken very seriously by us.” 181 After the U.S. intelligence community publicly announced its assessment that Russia was behind the hacking operation , Assange continued to deny that the Clinton materials released by WikiLeaks had come from Russian hacking. According to media reports, Assange told a U.S. congressman that the DNC hack was an “inside job,” and purported to have “physical proof ‘ that Russians did not give materials to Assange. 182

License

October 28, 2016: a Day That Will Live in Infamy Copyright © by . All Rights Reserved.

Share This Book