In the United States District Court for the Southern District of New York

Total Page:16

File Type:pdf, Size:1020Kb

In the United States District Court for the Southern District of New York Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 1 of 111 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK DEMOCRATIC NATIONAL COMMITTEE, ) Civil Action No. 1:18-cv-03501 ) JURY DEMAND Plaintiff, ) ) SECOND AMENDED v. ) COMPLAINT ) COMPUTER FRAUD AND ABUSE THE RUSSIAN FEDERATION; ) ACT (18 U.S.C. § 1030(a)) ARAS ISKENEROVICH AGALAROV; ) RICO (18 U.S.C. § 1962(c)) EMIN ARAZ AGALAROV; ) ) RICO CONSPIRACY (18 U.S.C. JOSEPH MIFSUD; ) § 1962(d)) WIKILEAKS; ) WIRETAP ACT (18 U.S.C. JULIAN ASSANGE; ) §§ 2510-22) DONALD J. TRUMP FOR PRESIDENT, INC.; ) ) STORED COMMUNICATIONS DONALD J. TRUMP, JR.; ) ACT (18 U.S.C. §§ 2701-12) PAUL J. MANAFORT, JR.; ) DIGITAL MILLENNIUM ROGER J. STONE, JR.; ) COPYRIGHT ACT (17 U.S.C. ) JARED C. KUSHNER; § 1201 et seq.) GEORGE PAPADOPOULOS; ) ) MISAPPROPRIATION OF TRADE RICHARD W. GATES, III; ) SECRETS UNDER THE DEFEND ) TRADE SECRETS ACT (18 U.S.C. Defendants. ) § 1831 et seq.) ) INFLUENCING OR INJURING ) OFFICER OR JUROR GENERALLY ) (18 U.S.C. § 1503) ) ) TAMPERING WITH A WITNESS, ) VICTIM, OR AN INFORMANT (18 ) U.S.C. § 1512) ) WASHINGTON D.C. UNIFORM ) TRADE SECRETS ACT (D.C. Code ) Ann. §§ 36-401 – 46-410) ) ) TRESPASS (D.C. Common Law) ) CONVERSION (D.C. Common Law) ) TRESPASS TO CHATTELS ) (Virginia Common Law) ) ) ) Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 2 of 111 CONSPIRACY TO COMMIT TRESPASS TO CHATTELS (Virginia Common Law) CONVERSION (Virginia Common Law) VIRGINIA COMPUTER CRIMES ACT (Va. Code Ann. § 18.2-152.5 et seq.) 2 Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 3 of 111 TABLE OF CONTENTS Page NATURE OF ACTION .................................................................................................................. 1 I. INTRODUCTION .............................................................................................................. 1 II. OVERVIEW OF THE CONSPIRACY .............................................................................. 3 III. DAMAGES TO THE DNC ................................................................................................ 9 JURISDICTION AND VENUE ................................................................................................... 10 PARTIES ...................................................................................................................................... 11 GENERAL ALLEGATIONS ....................................................................................................... 18 IV. SEVERAL DEFENDANTS’ PRE-EXISTING RELATIONSHIPS WITH RUSSIA AND RUSSIAN OLIGARCHS PROVIDED FERTILE GROUND FOR A CONSPIRACY ............................................................................................................. 18 V. THE COMMON PURPOSE: SECURE TRUMP’S GRIP ON THE PRESIDENCY THROUGH ILLEGAL MEANS ............................................................ 21 VI. THE CONSPIRACY TO DISSEMINATE STOLEN DNC DATA TO AID TRUMP ............................................................................................................................. 24 A. Trump Announces His Candidacy For President, And Russia Begins Its Attack On The DNC’s Computer Systems ........................................................... 25 B. European Allies Sound The Alarm To U.S. Intelligence Regarding Communications Between Russians And Trump Associates ............................... 25 C. While Campaigning For President, Trump Signs A Letter Of Intent To Build Trump Tower Moscow................................................................................ 26 D. The Trump Campaign Establishes Further Ties To Russia And Russian Intelligence Agents ............................................................................................... 26 E. Russia Steals A Massive Trove Of Documents From The DNC .......................... 29 F. The DNC Discovers The Hack And Hires CrowdStrike ...................................... 31 G. Forensic Evidence Confirms Russia’s Attack On The DNC’s Network .............. 31 H. Russians Again Offer To Assist Trump—And Trump Associates Accept The Offer ............................................................................................................... 34 I. Following The Trump Tower Meeting, Russia Continues Its Hacking And Launches A Massive Public Dissemination Of Stolen DNC Documents ............. 37 J. WikiLeaks And Russian Intelligence Discuss A Plan To Use Stolen DNC Documents To Disrupt The Democratic National Convention............................. 39 K. The Trump Campaign Continues Communicating With Russian Agents And Blocks Anti-Russian Language From Being Added To The GOP i Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 4 of 111 TABLE OF CONTENTS Page Platform As WikiLeaks And The GRU Finalize Arrangement To Disrupt The Democratic National Convention .................................................................. 39 L. After The Trump Campaign Blocks Anti-Russia Language From The GOP Platform, WikiLeaks Begins Disseminating Stolen DNC Documents ................. 40 M. Trump Associates Secretly Communicate With Russian Agents And WikiLeaks As They Strategically Release Stolen DNC Documents .................... 42 N. The GRU Reaches Out To Stone About Democratic Party Turnout Models ....... 45 O. Russia Launches Another Attack On DNC Servers Housing Sensitive And Valuable Trade Secrets ......................................................................................... 46 P. Russia Continues Disseminating Stolen Documents ............................................ 50 Q. Trump Publicly Praises The Illegal Dissemination Of The Stolen DNC Data ....................................................................................................................... 50 R. Trump—And Russia—Win .................................................................................. 52 VII. THE DEFENDANTS’ CRIMINAL CONSPIRACY CONTINUED AFTER THE 2016 ELECTION .............................................................................................................. 52 VIII. RUSSIA’S CONTINUED HACKING ATTEMPTS ....................................................... 60 A. Russia Attempts To Hack The Computer Networks Of Three Midterm Candidates ............................................................................................................. 60 B. U.S. Authorities Make Clear That Russia Continues To Pose A Hacking Threat .................................................................................................................... 60 C. WikiLeaks Releases Amazon Document Compromising Security Of AWS Servers................................................................................................................... 61 D. A Source Consistent With Cozy Bear Attempts To Hack The DNC’s Computer System .................................................................................................. 61 IX. TRUMP CONTINUES TO SIDE WITH RUSSIA AND DENIGRATE GOVERNMENT INVESTIGATORS .............................................................................. 61 X. THE SIGNIFICANT HARM INFLICTED UPON PLAINTIFF ..................................... 63 CAUSES OF ACTION ................................................................................................................. 65 COUNT I .......................................................................................................................... 65 COMPUTER FRAUD AND ABUSE ACT (18 U.S.C. § 1030(A)) (AGAINST RUSSIA) ........................................................................................... 65 COUNT II ......................................................................................................................... 67 RICO (18 U.S.C. § 1962(C)) (AGAINST ALL DEFENDANTS) ....................... 67 A. The Trump Campaign Was The Racketeering Enterprise ........................ 67 B. Alternatively, And At The Very Least, The Trump Campaign Was Part Of An Association-In-Fact Enterprise ............................................... 68 C. RICO Predicate Acts ................................................................................. 69 ii Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 5 of 111 TABLE OF CONTENTS Page D. RICO Damages ......................................................................................... 74 COUNT III ........................................................................................................................ 74 RICO CONSPIRACY (18 U.S.C. § 1962(D)) (AGAINST ALL DEFENDANTS) ................................................................................................... 74 COUNT IV........................................................................................................................ 75 WIRETAP ACT (18 U.S.C. §§ 2510-22) (AGAINST WIKILEAKS, ASSANGE, THE TRUMP CAMPAIGN, AND THE TRUMP ASSOCIATES) ..................................................................................................... 75 COUNT V ......................................................................................................................... 76 STORED COMMUNICATIONS ACT (18 U.S.C. §§ 2701-12) (AGAINST RUSSIA) ........................................................................................... 76 COUNT VI........................................................................................................................ 77 DIGITAL MILLENNIUM COPYRIGHT ACT (17 U.S.C. § 1201 ET SEQ.) (AGAINST RUSSIA) ...............................................................................
Recommended publications
  • CRITICAL THEORY and AUTHORITARIAN POPULISM Critical Theory and Authoritarian Populism
    CDSMS EDITED BY JEREMIAH MORELOCK CRITICAL THEORY AND AUTHORITARIAN POPULISM Critical Theory and Authoritarian Populism edited by Jeremiah Morelock Critical, Digital and Social Media Studies Series Editor: Christian Fuchs The peer-reviewed book series edited by Christian Fuchs publishes books that critically study the role of the internet and digital and social media in society. Titles analyse how power structures, digital capitalism, ideology and social struggles shape and are shaped by digital and social media. They use and develop critical theory discussing the political relevance and implications of studied topics. The series is a theoretical forum for in- ternet and social media research for books using methods and theories that challenge digital positivism; it also seeks to explore digital media ethics grounded in critical social theories and philosophy. Editorial Board Thomas Allmer, Mark Andrejevic, Miriyam Aouragh, Charles Brown, Eran Fisher, Peter Goodwin, Jonathan Hardy, Kylie Jarrett, Anastasia Kavada, Maria Michalis, Stefania Milan, Vincent Mosco, Jack Qiu, Jernej Amon Prodnik, Marisol Sandoval, Se- bastian Sevignani, Pieter Verdegem Published Critical Theory of Communication: New Readings of Lukács, Adorno, Marcuse, Honneth and Habermas in the Age of the Internet Christian Fuchs https://doi.org/10.16997/book1 Knowledge in the Age of Digital Capitalism: An Introduction to Cognitive Materialism Mariano Zukerfeld https://doi.org/10.16997/book3 Politicizing Digital Space: Theory, the Internet, and Renewing Democracy Trevor Garrison Smith https://doi.org/10.16997/book5 Capital, State, Empire: The New American Way of Digital Warfare Scott Timcke https://doi.org/10.16997/book6 The Spectacle 2.0: Reading Debord in the Context of Digital Capitalism Edited by Marco Briziarelli and Emiliana Armano https://doi.org/10.16997/book11 The Big Data Agenda: Data Ethics and Critical Data Studies Annika Richterich https://doi.org/10.16997/book14 Social Capital Online: Alienation and Accumulation Kane X.
    [Show full text]
  • How White Supremacy Returned to Mainstream Politics
    GETTY CORUM IMAGES/SAMUEL How White Supremacy Returned to Mainstream Politics By Simon Clark July 2020 WWW.AMERICANPROGRESS.ORG How White Supremacy Returned to Mainstream Politics By Simon Clark July 2020 Contents 1 Introduction and summary 4 Tracing the origins of white supremacist ideas 13 How did this start, and how can it end? 16 Conclusion 17 About the author and acknowledgments 18 Endnotes Introduction and summary The United States is living through a moment of profound and positive change in attitudes toward race, with a large majority of citizens1 coming to grips with the deeply embedded historical legacy of racist structures and ideas. The recent protests and public reaction to George Floyd’s murder are a testament to many individu- als’ deep commitment to renewing the founding ideals of the republic. But there is another, more dangerous, side to this debate—one that seeks to rehabilitate toxic political notions of racial superiority, stokes fear of immigrants and minorities to inflame grievances for political ends, and attempts to build a notion of an embat- tled white majority which has to defend its power by any means necessary. These notions, once the preserve of fringe white nationalist groups, have increasingly infiltrated the mainstream of American political and cultural discussion, with poi- sonous results. For a starting point, one must look no further than President Donald Trump’s senior adviser for policy and chief speechwriter, Stephen Miller. In December 2019, the Southern Poverty Law Center’s Hatewatch published a cache of more than 900 emails2 Miller wrote to his contacts at Breitbart News before the 2016 presidential election.
    [Show full text]
  • Minority Views
    MINORITY VIEWS The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018 submit the following Minority Views to the Majority-produced "Repo11 on Russian Active Measures, March 22, 2018." Devin Nunes, California, CMAtRMAN K. Mich.J OI Conaw ay, Toxas Pe1 or T. King. New York F,ank A. LoBiondo, N ew Jersey Thom.is J. Roonev. Florida UNCLASSIFIED Ileana ROS·l chtinon, Florida HVC- 304, THE CAPITOL Michnel R. Turner, Ohio Brad R. Wons1 rup. Ohio U.S. HOUSE OF REPRESENTATIVES WASHINGTON, DC 20515 Ou is S1cwart. U1ah (202) 225-4121 Rick Cr.,w ford, Arka nsas P ERMANENT SELECT C OMMITTEE Trey Gowdy, South Carolina 0A~lON NELSON Ellsr. M . S1nfn11ik, Nnw York ON INTELLIGENCE SrAFf. D IREC f()ti Wi ll Hurd, Tcxa~ T11\'10l !IV s. 8 £.R(.REE N At1am 8 . Schiff, Cohforn1a , M tNORllV STAFF OtR ECToq RANKIN G M EMtlER Jorncs A. Himes, Connec1icut Terri A. Sewell, AlabJma AndrC Carso n, lncli.1 na Jacki e Speier, Callfomia Mike Quigley, Il linois E,ic Swalwell, California Joilq u1 0 Castro, T exas De nny Huck, Wash ington P::iul D . Ry an, SPCAl([ R or TH( HOUSE Noncv r c1os1. DEMOC 11t.1 1c Lr:.11.orn March 26, 2018 MINORITY VIEWS On March I, 201 7, the House Permanent Select Commiltee on Intelligence (HPSCI) approved a bipartisan "'Scope of In vestigation" to guide the Committee's inquiry into Russia 's interference in the 201 6 U.S. e lection.1 In announc ing these paramete rs for the House of Representatives' onl y authorized investigation into Russia's meddling, the Committee' s leadership pl edged to unde1take a thorough, bipartisan, and independent probe.
    [Show full text]
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • Cyber-Conflict Between the United States of America and Russia CSS
    CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber-conflict between the United States of America and Russia Zürich, June 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber-conflict between the United States of America and Russia Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: Cyber-conflict between the United States of America and Russia, June 2017, Center for Security Studies (CSS), ETH Zürich. 2 Cyber-conflict between the United States of America and Russia Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Tools and techniques 9 3.2 Targets 10 3.3 Attribution and actors 10 4 Effects 11 4.1 Social and internal political effects 11 4.2 Economic effects 13 4.3 Technological effects 13 4.4 International effects 13 5 Consequences 14 5.1 Improvement of cybersecurity 14 5.2 Raising awareness of propaganda and misinformation 15 5.3 Observation of the evolution of relations between the USA and Russia 15 5.4 Promotion of Confidence Building Measures 16 6 Annex 1 17 7 Glossary 18 8 Abbreviations 19 9 Bibliography 19 3 Cyber-conflict between the United States of America and Russia Executive Summary Effects Targets: US State institutions and a political The analysis found that the tensions between the party.
    [Show full text]
  • Filed: New York County Clerk 08/24/2020 12:45 Pm Index No
    FILED: NEW YORK COUNTY CLERK 08/24/2020 12:45 PM INDEX NO. 451685/2020 NYSCEF DOC. NO. 11 RECEIVED NYSCEF: 08/24/2020 SUPREME COURT OF THE STATE OF NEW YORK COUNTY OF NEW YORK PEOPLE OF THE STATE OF NEW Index No. _____________ YORK, by LETITIA JAMES, Attorney General of the State of New Motion Sequence _______ York, (REDACTED) Petitioner, -against- THE TRUMP ORGANIZATION, INC.; DJT HOLDINGS LLC; DJT HOLDINGS MANAGING MEMBER LLC; SEVEN SPRINGS LLC; ERIC TRUMP; CHARLES MARTABANO; MORGAN, LEWIS & BOCKIUS, LLP; and SHERI DILLON, Respondents. MEMORANDUM OF LAW IN SUPPORT OF THE ATTORNEY GENERAL’S SPECIAL PROCEEDING AND APPLICATION TO COMPEL RESPONDENTS TO COMPLY WITH INVESTIGATORY SUBPOENAS LETITIA JAMES Attorney General of the State of New York 28 Liberty Street New York, NY 10005 1 of 68 FILED: NEW YORK COUNTY CLERK 08/24/2020 12:45 PM INDEX NO. 451685/2020 NYSCEF DOC. NO. 11 RECEIVED NYSCEF: 08/24/2020 TABLE OF CONTENTS TABLE OF AUTHORITIES ......................................................................................................... iii PRELIMINARY STATEMENT .....................................................................................................1 BACKGROUND .............................................................................................................................4 I. The Attorney General’s authority under Executive Law § 63(12). .....................................4 II. The Attorney General’s investigation. .................................................................................5 A. Mr.
    [Show full text]
  • The New York Times Site Search Navigation 1. US
    1/3/2020 Mueller Report Shows Depth of Connections Between Trump Campaign and Russians - The New York Times Sections Home Search The New York Times Politics |Mueller Report Shows Depth of Connections Between Trump Campaign and Russians Share Tweet Email More Save Account Log In 0 Settings Close search Site Search Navigation Search NYTimes.com Clear this text input Go https://nyti.ms/2S3TdZn 1. U.S. 1. United Methodist Church Announces Plan to Split Over Same-Sex Marriage 2. ‘A Different Era’: Anti-Semitic Crimes, and Efforts to Track Them, Climb 3. Denying a Professor Tenure, Harvard Sparks a Debate Over Ethnic Studies 4. Christianity Today Editor Laments ‘Ethical Naïveté’ of Trump Backers 5. DONALD J. TRUMP Invited to Moscow to celebrate birthday of Aras Agalarov, a Russian former business associate, and to Jack Sheldon,po sTsibrumpeterly meet Putin. and ‘Schoolhouse Rock!’ Singer, Is Dead at 88 6. ‘We Did Not Take Action to Start a War,’ Trump Says 7. Phil Roe, Tennessee Republican, Announces Retirement from Congress 8. https://www.nytimes.com/interactive/2019/01/26/us/politics/trump-contacts-russians-wikileaks.html 1/9 1/3/2020 Mueller Report Shows Depth of Connections Between Trump Campaign and Russians - The New York Times Impeachment Impasse Deepens in Senate, Leaving Trump’s Trial in Doubt 9. Will There Be a Draft? Young People Worry After Military Strike in Iran 10. Airstrike That Killed Suleimani Also Killed Powerful Iraqi Militia Leader 11. Trilobites Beware Tyrannosaurus Rex Teenagers and Their Growth Spurts 12. Killing of Iranian Commander Divides Senate Leaders 13.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • United States Court of Appeals for the SECOND CIRCUIT
    Case 14-2985, Document 88, 12/15/2014, 1393895, Page1 of 64 14-2985-cv IN THE United States Court of Appeals FOR THE SECOND CIRCUIT In the Matter ofd a Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corporation, MICROSOFT CORPORATION, Appellant, —v.— UNITED STATES OF AMERICA, Appellee. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK BRIEF OF AMICI CURIAE MEDIA ORGANIZATIONS IN SUPPORT OF APPELLANT LAURA R. HANDMAN ALISON SCHARY DAVIS WRIGHT TREMAINE LLP 1919 Pennsylvania Avenue NW, Suite 800 Washington, DC 20006 (202) 973-4200 Attorneys for Amici Curiae Media Organizations Case 14-2985, Document 88, 12/15/2014, 1393895, Page2 of 64 OF COUNSEL Indira Satyendra David Vigilante John W. Zucker CABLE NEWS NETWORK , INC . ABC, INC . One CNN Center 77 West 66th Street, 15th Floor Atlanta, GA 30303 New York, NY 10036 Counsel for Cable News Network, Counsel for ABC, Inc. Inc. Richard A. Bernstein Andrew Goldberg SABIN , BERMANT & GOULD LLP THE DAILY BEAST One World Trade Center 555 West 18th Street 44th Floor New York, New York 10011 New York, NY 10007 Counsel for The Daily Beast Counsel for Advance Publications, Company LLC Inc. Matthew Leish Kevin M. Goldberg Cyna Alderman FLETCHER HEALD & HILDRETH NEW YORK DAILY NEWS 1300 North 17th Street, 11th Floor 4 New York Plaza Arlington, VA 22209 New York, NY 10004 Counsel for the American Counsel for Daily News, L.P. Society of News Editors and the Association of Alternative David M. Giles Newsmedia THE E.W. SCRIPPS COMPANY 312 Walnut St., Suite 2800 Scott Searl Cincinnati, OH 45202 BH MEDIA GROUP Counsel for The E.W.
    [Show full text]
  • Comey Testimony Regarding Dossier
    Comey Testimony Regarding Dossier Plagiarized Rabi ingots no septicemia befalling insensibly after Erl shagging obliviously, quite free-and-easy. Is Crawford tetchy or hymenopterous when aerially.equalizing some bulrush spat auricularly? Mahmoud usually outhired point-device or vitalised cubically when trilingual Calhoun trepan marvellously and It was under your goal dividing us You never read that? Hillary Clinton is the kind children in disinformation that Russia is engaging in defence now. And we search, when question were first nominated to balloon the FBI Director. Was the team even aware of the information when they opened the investigation? Comey just made it sound clear Mueller is bellow to investigate obstruction of justice. Chairman, the convey of proxies, but occupy also recognized you were placed in a truly unprecedented situation. Tom cotton of much we believe that if not. And chestnut are continuing to push the Justice looking for noon from. Accountability and comey testimony regarding dossier asserts that have known liar, regarding intent to understand how do that you were responsible way? Now regarding the really appreciate having contact from comey testimony regarding dossier that individual for the people about the committee? Comey defends 'Crossfire Hurricane' damage but admits flaws. This creates a way? So that dossier linking president himself pushed back and justice our spectrum news expected committee testimony in forest hill in jest that comey testimony regarding dossier months previously that fbi. President might prompt the comey testimony regarding dossier is a dossier to comey if they do not what do you are agreeing to get to affect the.
    [Show full text]
  • RCFP Comment on Rule 41
    February 17, 2015 1156 15th St. NW, Suite 1250 Washington, D.C. 20005 Members of the Advisory Committee on Criminal Rules (202) 795-9300 www.rcfp.org Bruce D. Brown Re: Comment of the Reporters Committee for Freedom of the Press on Executive Director [email protected] (202) 795-9301 the Proposed Amendment to Federal Rule of Criminal Procedure 41 STEERING COMMITTEE Concerning “Remote Access” Searches of Electronic Storage Media and STEPHEN J. ADLER Electronic Information Reuters SCOTT APPLEWHITE The Associated Press The Reporters Committee for Freedom of the Press (“Reporters WOLF BLITZER CNN Committee”) appreciates this opportunity to comment on the proposed DAVID BOARDMAN Temple University amendment to Rule 41 of the Federal Rules of Criminal Procedure CHIP BOK concerning “remote access” searches of computers and other electronic Creators Syndicate JAN CRAWFORD devices. The amendment was proposed by the Department of Justice and CBS News 1 MICHAEL DUFFY modified by the Committee in April 2014. Time RICHARD S. DUNHAM Tsinghua University, Beijing The Reporters Committee is a voluntary, unincorporated association ASHLEA EBELING Forbes Magazine of reporters and editors dedicated to safeguarding the First Amendment rights SUSAN GOLDBERG and freedom of information interests of the news media and the public. The National Geographic FRED GRAHAM Reporters Committee has provided assistance, guidance, and research in First Founding Member JOHN C. HENRY Amendment and freedom of information litigation since 1970. The Reporters Freelance Committee frequently represents the interests of the press and the public NAT HENTOFF United Media Newspaper Syndicate before Article III courts. The Reporters Committee is concerned that the JEFF LEEN The Washington Post proposed amendment to Rule 41 would intrude on vital constitutional and DAHLIA LITHWICK statutory rights protecting the news media and the free press.
    [Show full text]
  • Interview Transcript of Andrew Brown
    1 UNCLASSIFIED, COMMITTEE SENSITIVE EXECUTIVE SESSION PERMANENT SELECT COMMITTEE ON INTELLIGENCE, U.S. HOUSE OF REPRESENTATIVES, WASHINGTON, D.C. INTERVIEW OF: ANDREW BROWN Wednesday, August 30, 2017 Washington, D.C. The interview in the above matter was held in Room HVC-304, the Capitol, commencing at 10:04 a.m. UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 2 UNCLASSIFIED, COMMITTEE SENSITIVE Appearances: For the PERMANENT SELECT COMMITTEE ON INTELLIGENCE: For ANDREW BROWN: MARK ELIAS, ESQ. GRAHAM M. WILSON, ESQ. PERKINS COIE POLITICAL LAW GROUP 700 13TH Street NW Suite 600 Washington, D.C. 20005 UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 3 UNCLASSIFIED, COMMITTEE SENSITIVE Good morning. This is a transcribed interview of Mr. Andrew Brown. Thank you for coming in and speaking with us today. For the record, I'm a staff member with the House Permanent Select Committee on Intelligence for the majority. Also with me is -- from the majority staff. And -- with the minority staff. So before we begin, I just want to state a few things for the record. The questioning will be conducted by staff, as you see. During the course of this interview, members -- members will not -- staff will ask questions during their allotted time period. Some questions may seem basic, but that is because we need to clearly establish facts and understand the situation. Please do not assume we know any facts you have previously disclosed as part of any other investigation or review. During the course of this interview, we will take any breaks that you desire.
    [Show full text]