DNC Sues, Serves WikiLeaks via Twitter

Okay, so how does WikiLeaks confirm receipt? heh

The Democratic National Committee on Friday officially served its lawsuit to WikiLeaks via Twitter, employing a rare method to serve its suit to the elusive group that has thus far been unresponsive.

As CBS News first reported last month, the DNC filed a motion with a federal court in Manhattan requesting permission to serve its complaint to WikiLeaks on Twitter, a platform the DNC argued the website uses regularly. The DNC filed a lawsuit in April against the Trump campaign, Russian government and WikiLeaks, alleging a massive conspiracy to tilt the 2016 election in Donald Trump’s favor.

Another Senior DNC Staffer Gone Following Emails Leak by ...

All of the DNC’s attempts to serve the lawsuit via email failed, the DNC said in last month’s motion to the judge, which was ultimately approved.

The lawsuit was served through a tweet from a Twitter account established Friday by Cohen Milstein, the law firm representing the DNC in the suit, with the intent of serving the lawsuit.

*** @wikileaks By Court order, you are being served with the following legal documents: https://t.co/ICg8qWnsUy, https://t.co/ZP2tTPJ4pb, https://t.co/RKue30s4hM, https://t.co/q5g0G1rQpQ.
All of these documents may be found here: https://t.co/NOCgvQhh2j.

The DNC argued the unusual method of serving a lawsuit over Twitter was feasible because WikiLeaks, founded by Julian Assange, frequently uses Twitter and had even suggested it had read the DNC’s lawsuit.

On April 21, the WikiLeaks Twitter account tweeted, “Democrats have gone all Scientology against @WikiLeaks. We read the DNC lawsuit. Its primary claim against @WikiLeaks is that we published their ‘trade secrets.’ Scientology infamously tried this trick when we published their secret bibles. Didn’t work out well for them.'”

The DNC also noted last month that there is some legal precedent for serving the lawsuit on Twitter. The U.S. District Court for the Northern District of California, the DNC notes, decided service by Twitter was a reasonable way to alert the defendant, who had an active Twitter account.

“WikiLeaks seems to tweet daily,” the DNC said in the motion made to the judge last month.

In the months before the 2016 election, WikiLeaks released nearly 20,000 internal DNC emails, many of which were related to Hillary Clinton. WikiLeaks later released thousands of emails belonging to John Podesta, who was Clinton’s 2016 presidential campaign chairman.

Mr. Trump and many in his administration have described questions of alleged conspiracy with Russia as an excuse for losing the election.

“Just won lawsuit filed by the DNC and a bunch of Democrat crazies trying to claim the Trump Campaign (and others), colluded with Russia. They haven’t figured out that this was an excuse for them losing the election!” the president tweeted in July, although the lawsuit is ongoing.

 

 

Trouble Ahead After DPRK’s FM Visit to Tehran

So, it appears there is more to the teaming up between Tehran and Pyongyang.

The Iranian President Rouhani told the North Korean Foreign Minister in a recent confab to NOT trust the United States.

Meanwhile, SecState, Mike Pompeo issued a proposal to North Korea calling for a timeline Pompeo that would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

North Korea has reportedly rejected a formal timeline for its denuclearization proposed by Secretary of State Mike Pompeo.

Vox reported Wednesday that Pyongyang has rejected the timeline several times over the past two months amid continued negotiations over North Korea’s nuclear program.

The timeline Pompeo proposed would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

However, it is unclear how many warheads North Korean leader Kim Jong Un has, making it difficult to verify that Pyongyang has actually turned over an agreed-upon percentage.

Trump administration officials in recent weeks have expressed frustration with North Korea’s efforts to denuclearize despite President Trump hailing his June summit with Kim in Singapore as a success.

“The ultimate timeline for denuclearization will be set by Chairman Kim, at least in part,” Pompeo told Channel NewsAsia in an interview last week.

“The decision is his. He made a commitment, and we’re very hopeful that over the coming weeks and months we can make substantial progress towards that and put the North Korean people on a trajectory towards a brighter future very quickly.”

White House national security adviser John Bolton told Fox News on Tuesday that “North Korea that has not taken the steps we feel are necessary to denuclearize.”

Iran fires attack on Trump as it tells North Korea: ‘US ... photo

Then we have yet another emerging hacking warning from CERT.

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as KEYMARBLE—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

US-CERT encourages users and administrators to review Malware Analysis Report (MAR) MAR-10135536-17 and the US-CERT page on HIDDEN COBRA – North Korean Malicious Cyber Activity for more information.

Not to leave out Iran’s cyber attack warnings.

Iranian hackers have laid the groundwork to carry out extensive cyber attacks against private U.S. and European companies, U.S. officials warn, according to NBC News. Although experts don’t believe any such attack is imminent, the preparations could enable denial-of-service attacks on infrastructure including electric grids and water plants, plus health care and technology companies across the U.S., Europe, and Middle East, say U.S. officials at the 2018 Aspen Security Forum.

A spokesperson for the Iranian mission to the United Nations, Alireza Miryousefi, told NBC News that the U.S. is more aggressive in terms of cyber attacks, and Iran’s moves are merely defensive.

***

As sanctions reimposed in response to its nuclear program begin to bite, Iran seems poised to follow the trail North Korea blazed in cyberspace: state-directed hacking that aims at direct theft to redress economic pain. Accenture researchers have been tracking ransomware strains, many of them requiring payment in Bitcoin or other cryptocurrencies, and they’ve concluded that they represent an incipient Iranian campaign against targets of opportunity that offer the prospect of quick financial gain. Tehran’s state-directed hackers have a reputation as being relatively less sophisticated than those run by Russia and China (and indeed those run by major Western powers, the Five Eyes and their closest friends) but they also have a reputation as determined fast-learners.

CCN: As the US gets ready to impose sanctions on Iran, hackers in that country are working on ransomware to secure bitcoin, according to cybersecurity experts interviewed by The Wall Street Journal.

Accenture PLC’s cybersecurity intelligence group has followed five Iranian built ransomware variations in the last two years. The hackers are hoping to secure payments in cryptocurrencies, according to Jim Guinn, who oversees the industrial cybersecurity business at Accenture.

Several clues link the ransomware to Iran. Samples include messages in Farsi that are connected to Iran based computers.

A recent Accenture report noted the ransomware could be driven by Iranian government supported parties, criminals, or both.

Scourge Continues

Ransomware has plagued both businesses and governments for years, having disabled payment systems at the San Francisco Municipal Transportation Agency, U.K hospitals and cargo shipments. Government supported hackers in some instances have obtained cryptocurrency payments from victims.

One variant of ransomware that iDefense discovered has been linked to Iran’s government, according to CrowdStrike Inc., another cybersecurity firm. The software, called Tyrant, was developed to discourage Iranian citizens from downloading software designed to discourage government snooping, CrowdStrike noted.

Palo Alto Networks Inc. and Symantec Corp. issued reports last month that described a pair of data stealing operations connected to Iran.

Crypto Mining Linked To Iran

Crypto mining software, which robs computers of their processing power to mine cryptocurrencies, has also been linked to Iran.

Accenture cited crypto mining software installed on Middle Eastern customer networks equipped with digital clues to Iran.

Crypto mining software has created problems in gas and oil facilities in the Middle East, Guinn said. He estimated millions of dollars of compute cycles have been stolen in the last year.

Iran Denies Culpability

Iran has claimed it has not been involved in cyber attacks, and that it has been a hacking victim.

A cyber attack called Stuxnet initiated by the U.S. and Israel about a decade ago disabled uranium-enrichment centrifuges for Iran’s nuclear program. Iran has since focused on enhancing its own cyber capabilities, according to government officials and security researchers.

Keith Alexander, chief executive of IronNet Cybersecurity Inc. and former director of the U.S. Cyber Command and the National Security Agency said crypto mining and theft is a way for cash-strapped countries to make fast profits.

Guinn said hackers have also stolen intellectual property.

The Friendship of Chris Steele and Oleg Deripaska

The dossier. Fusion GPS. Mueller probe. Rogue FBI leadership. Cable News…..it all keeps churning.

Is the truth getting closer to a reveal? There are countless questions that have not been asked. Has anyone in media asked Hillary any questions? What about Debbie Wasserman Schultz as she was head of the DNC when all this mess began. Has anyone in media asked if there were in fact dossiers or manifestos crafted on other Republican candidates like Gingrich, Rubio or Fiorina perhaps?

Between that pesky law firm Perkins Coie, Marc Elias, the DCCC, DNC, the FBI and the Lynch DoJ, just how far did this foreign opposition operation really go? Does Bruce Ohr and his wife Nellie know more due to their sinewy involvement?

Related reading: Emails Show Christopher Steele Lobbied DoJ Official on Behalf of Russian Oligarch

Related reading: Emails Show 2016 Links Among Steele, Ohr, Simpson

Billionaire warns financial crisis is only going to get ... Oleg Deripaska included in recent round of sanctions

Okay,  there are a few journalists and lawyers that are doing some good work and asking some different questions at least.

A release last week of texts showed that Christopher Steele, the former British spy whose memos regarding the Trump campaign’s possible ties to Russia are referred to as the Steele dossier, reached out to Sen. Mark Warner, the ranking Democratic member of the Senate Intelligence Committee, through a Russian-linked Washington, D.C., lobbyist named Adam Waldman. Among Waldman’s clients is Oleg Deripaska, a Russian aluminum magnate with close ties to Russian President Vladimir Putin. In a text dated March 16, 2017, Waldman texted Warner, “Chris Steele asked me to call you.”

In 2009, Waldman filed papers with the Department of Justice under the Foreign Agents Registration Act (FARA) registering himself as an agent for Deripaska in order to provide “legal advice on issues involving his U.S. visa as well as commercial transactions” at a retainer of $40,000 a month. In 2010, Waldman additionally registered as an agent for Russian foreign minister Sergei Lavrov, “gathering information and providing advice and analysis as it relates to the U.S. policy towards the visa status of Oleg Deripaska,” including meetings with U.S. policymakers. Based on the information in his FARA filings, Waldman has received at least $2.36 million for his work with Deripaska.

A letter dated Feb. 9 sent by Senate Judiciary Committee Chairman Charles Grassley to a London-based lawyer may shed light on why Steele used Waldman as an intermediary. (Waldman’s office did not reply to an email from Tablet requesting comment.)

February 9, 2018
VIA ELECTRONIC TRANSMISSION
Paul E. Hauser, Esq.
Partner
Bryan Cave
88 Wood Street
London, EC2V 7AJ UK

Dear Mr. Hauser:

The United States Senate Committee on the Judiciary has been investigating issues relating to the Russian government’s disinformation efforts targeting the 2016 Presidential election, as well as the nature of the FBI’s relationship with Christopher Steele. Part of that inquiry involves examining the connections between those involved and Russian interests.

In light of this, by February 23, 2018 please answer the following questions:

1. Public reports and court documents indicate that you are an attorney for Mr. Oleg Deripaska. Do you serve, or have you served, as legal counsel for Mr. Deripaska or any business associated with him?

2. Have you ever hired or otherwise worked with Mr. Christopher Steele, Orbis Business Intelligence Limited, Orbis Business International Limited, Walsingham Training Limited, or Walsingham Partners Limited? If so, when, and what was the nature of the arrangement?

3. Is it the case that Mr. Steele, through you, works or has worked on behalf of Mr. Deripaska or businesses associated with him? If so, when has such work occurred?

4. Are you otherwise aware of any business or financial relationships between Mr. Steele and Russian government officials, Russian oligarchs, or Russian businesses?

If Steele was employed by Deripaska or by his lawyer to do work on his behalf, it is likely to cast the dossier he allegedly authored in a new light.

In January, Deripaska filed a lawsuit against Paul Manafort, Donald Trump’s former campaign-convention manager—the latest chapter in an ongoing nine-year business dispute between the two men, in which Deripaska has alleged that Manafort failed to properly account for more than $20 million in investments and fees from a 2008 business deal between the two men. In 2014, Deripaska took legal action against Manafort in the Cayman Islands.

Manafort’s work on behalf of former Ukrainian President Viktor Yanukovych was underscored in the Steele dossier, which alleged that Manafort had partnered in a money-laundering operation with Yanukovych. In October, special counsel Robert Mueller indicted Manafort on several counts, including a conspiracy to launder millions of dollars in payment from political parties and officials in Ukraine.

In the Warner-Waldman texts, the lobbyist refers to his “Russian client” and discusses the possibility of the oligarch offering his testimony before the Senate committee. “My other guy,” Waldman says, apparently referring to Deripaska, is “very mistrustful of the USG [United States government]. He’s been essentially shut out of the country and dragged through the mud.”

According to The New York Times, Deripaska has long had difficulty entering the United States. “The State Department has refused to issue him a business visa because of concerns over allegations that he was connected to organized crime, according to a former United States government official, which Mr. Deripaska has denied.”

Putin himself complained about the State Department’s refusal to issue Deripaska a visa. “They give us nothing, explain to us nothing, and forbid him from entry,” the Russian president said in 2008. In 2011, after Waldman began working for Deripaska and Lavrov, the Russian government issued Deripaska a diplomatic passport, and the oligarch was allowed to visit the United States.

If Steele worked for a Russian oligarch with close ties to Putin, it is likely to change prevailing views of the Russia investigations of the past year and a half. The three congressional inquiries (Senate Judiciary, Senate Intelligence, and House Intelligence), as well as special counsel Robert Mueller’s probe, are based largely on allegations made in the dossier. Was Steele paid by Deripaska at the same time he was paid by the Washington, D.C., communications firm Fusion GPS for his work on behalf of the Clinton campaign and the Democratic National Committee? Did his work on behalf of Deripaska influence his investigations into the Trump team’s possible ties to Russia? Was Deripaska one of Steele’s Kremlin-insider sources—and what does that tell us about the contents and purpose of the Steele dossier?

Putin/Trump Arms Control then Sanctions

Leaked Document Reveals Putin Lobbied Trump on Arms Control

Vladimir Putin presented President Donald Trump with a series of requests during their private meeting in Helsinki last month, including new talks on controlling nuclear arms and prohibiting weapons in space, according to a Russian document obtained by POLITICO.

A page of proposed topics for negotiation, not previously made public, offers new insights into the substance of the July 16 dialogue that even Trump’s top advisers have said they were not privy to at the time. Putin shared the contents of the document with Trump during their two-hour conversation, according to a U.S. government adviser who provided an English-language translation. Details in the single page agenda for the meeting shows Mr. Putin remains interested in maintaining continued cooperation with the US on nuclear weapons.

A source who did not wish to be identified after obtaining the page translated from Russian into English by Politico, said: “This is, ‘We want to get out of the dog house and engage with the US on a broad range of security issues.” The document fails to address questions raised about what the Russian government meant last month when it said “cooperation in Syria” would be discussed between the two presidents and what they agreed to as a result.

Further murkiness fanned the flames of suspicion after Dan Coats, US Director of National Intelligence, told reporters he was “not in a position to either understand fully or talk about what happened in Helsinki.” Politico

Primer saludo entre Donald Trump y Vladimir Putin en el G20 | El Imparcial photo

Treaty Structure: The Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms also known as the New START Treaty.

Strategic Offensive Reductions: The Treaty between the United States of America and the Russian Federation on Measures for the Further Reduction and Limitation of Strategic Offensive Arms, also known as the New START Treaty, entered into force on February 5, 2011. Under the Treaty, the United States and Russia must meet the Treaty’s central limits on strategic arms by February 5, 2018; seven years from the date the Treaty entered into force. Each Party has the flexibility to determine for itself the structure of its strategic forces within the aggregate limits of the Treaty. These limits are based on the rigorous analysis conducted by Department of Defense planners in support of the 2010 Nuclear Posture Review.

Aggregate limits:

  • 700 deployed intercontinental ballistic missiles (ICBMs), deployed submarine-launched ballistic missiles (SLBMs), and deployed heavy bombers equipped for nuclear armaments;
  • 1,550 nuclear warheads on deployed ICBMs, deployed SLBMs, and deployed heavy bombers equipped for nuclear armaments (each such heavy bomber is counted as one warhead toward this limit);
  • 800 deployed and non-deployed ICBM launchers, SLBM launchers, and heavy bombers equipped for nuclear armaments.

Verification and Transparency: The Treaty has a verification regime that combines appropriate elements of the 1991 START Treaty with new elements tailored to the limitations and structure of this Treaty. Verification measures under the Treaty include on-site inspections and exhibitions, data exchanges and notifications related to strategic offensive arms and facilities covered by the Treaty, and provisions to facilitate the use of national technical means for treaty monitoring. To increase confidence and transparency, the Treaty also provides for an annual exchange of telemetry on an agreed number of ICBM and SLBM launches.

Treaty Duration: The Treaty’s duration is ten years, unless superseded by a subsequent agreement. The Parties may agree to extend the Treaty for a period of no more than five years. The Treaty includes a withdrawal clause that is standard in arms control agreements. The 2002 Moscow Treaty terminated when the New START Treaty entered into force.

No Constraints on Missile Defense and Conventional Strike: The Treaty does not constrain testing, development, or deployment of current or planned U.S. missile defense programs or long-range conventional strike capabilities.

What is the difference between a “Type One” and a “Type Two” inspection?

The New START Treaty provides for 18 on-site inspections per year. There are two basic types of inspections. Type One inspections focus on sites with deployed and non-deployed strategic systems; Type Two inspections focus on sites with only non-deployed strategic systems. Permitted inspection activities include confirming the number of reentry vehicles on deployed ICBMs and deployed SLBMs, confirming numbers related to non-deployed launcher limits, counting nuclear weapons onboard or attached to deployed heavy bombers, confirming weapon system conversions or eliminations, and confirming facility eliminations. Each side is allowed to conduct ten Type One inspections and eight Type Two inspections annually.

Meanwhile, standing with lab results and in solidarity with Britain:

FNC: Russia used “chemical or biological weapons” to try to assassinate a former British spy, the U.S. said on Wednesday, adding that new sanctions would be imposed on the country for the attack.

“Following the use of a ‘Novichok’ nerve agent in an attempt to assassinate UK citizen Sergei Skripal and his daughter Yulia Skripal, the United States, on August 6, 2018, determined under the Chemical and Biological Weapons Control and Warfare Elimination Act of 1991 (CBW Act) that the Government of the Russian Federation has used chemical or biological weapons in violation of international law or has used lethal chemical or biological weapons against its own nationals,” the State Department said in a statement.

“Following a 15-day Congressional notification period, these sanctions will take effect upon publication of a notice in the Federal Register, expected on or around August 22, 2018,” the department continued.

Skripal and his daughter were poisoned by the military-grade nerve agent in the British town of Salisbury in March.

Britain earlier accused Russia of being behind the attack, which the Kremlin has vehemently denied.

On March 15, President Trump, French President Emmanuel Macron and German Chancellor Angela Merkel and British Prime Minister Theresa May said in a joint statement that they “abhorred” the attack against Skripal.

“It is an assault on U.K. sovereignty and any such use by a State party is a clear violation of the Chemical Weapons Convention and a breach of international law. It threatens the security of us all,” the statement read.

Skripal was discharged from a U.K. hospital in May, following his daughter’s April release.

Since the March attack, two other British nationals with no ties to Russia have been poisoned by the substance.

MisInformationCom and Election Security

Election security top priority for U.S.: DHS chief - newsR ...
So, Dana Perino of Fox News/Daily Briefing had Mary Anne Marsh on the show today to discuss voting security. Mary Ann went on and on about how the Trump administration is not doing enough to ensure foreign interference/election meddling is prevented in the 2018 mid-terms and all the way to the general election in 2020.
Clearly Mary Ann has not been a part of the countless sessions that DHS has hosted for the benefit of each state to protect and harden their respective systems. Frankly, I have participated in 2 conference calls and have watched congressional hearings as well as read documents provided as to the activities on behalf of DHS and the FBI.
Then while few people know, the Justice Department produced a lengthy document by the titled ‘The Cyber Digital Task Force that speaks to all foreign intrusion operations including the matter of the election infrastructure. Pass this on to Mary Ann please. Just one of hundreds of paragraphs is below:
Covert influence operations, including disinformation operations, to influence
public opinion and sow division.
Using false U.S. personas, adversaries could covertly create and operate social media pages and other forums designed to attract U.S. audiences and spread disinformation or divisive messages. This could happen in isolation or in combination with other operations, and could be intended to foster specific narratives that advance foreign political objectives, or could be intended simply to turn citizens against each other. These messages need not relate directly to political campaigns. They could seek to depress voter turnout among particular groups, encourage third-party voting, or convince the public of widespread voter fraud to undermine confidence in election results. These messages could target discrete U.S. populations based on their political
and demographic characteristics. They may mobilize Americans to sign online petitions
and join issue-related rallies and protests, or even to incite violence. For example, advertisements from at least 2015 to 2017 linked to a Russian organization called the Internet Research Agency focused on divisive issues, including illegal immigration and gun rights, among others, and targeted those messages to groups most likely to react.
Meanwhile, there is an external organization made up of subject matter experts collecting evidence and stories of which the Deputy Assistant Attorney General Adam S. Hickey for the National Security Division Delivered Remarks at Misinfo Con.
Thank you for the invitation to speak today, and for the important work you are doing: in organizing this conference devoted to the challenges of misinformation, and, by attending, bringing your experience and expertise to bear on the problem.

It’s a privilege to help kick off this first day of MisinfoCon, focused on state-sponsored misinformation. To do that, I am going to give you an overview of how the Department of Justice views the problem, where it fits in the context of related national security threats, and how we are addressing it.

As you probably know, the Justice Department recently obtained an indictment of 13 Russian individuals and three entities, including the Internet Research Agency (or IRA), for federal crimes in connection with an effort to interfere in the 2016 Presidential election. The defendants allegedly conducted what they called “information warfare against the United States,” with the stated goal of “spread[ing] distrust towards the candidates and the political system in general.”

According to the indictment, the IRA was a structured organization headed by a management group and arranged in departments. It had a “translator project,” designed to focus on the U.S. population, with more than 80 employees assigned by July 2016. They posed as politically and socially active Americans, advocating for and against particular political candidates. They established social media pages and groups to communicate with unwitting Americans. They also purchased political advertisements on social media.

One of the so-called trolls who worked for the IRA recently spoke to the Washington Post about his work in a different department, attempting to influence a domestic, Russian audience. He described it as “a place where you have to write that white is black and black is white.” Hundreds of people “were all writing absolute untruths.”

But as the indictment alleges it, what made the defendants’ conduct illegal in the United States was not the substance of their message, the “accuracy” of their opinions: it was their conspiracy to defraud by, among other ways, lying about who the messenger was.  They were not Americans expressing their own viewpoints; they were Russians on the payroll of a foreign company.

Now, the problem of covert foreign influence is not new. In 1938, a congressional committee found that the Nazi government had established an extensive, underground propaganda apparatus inside the United States using American firms and citizens. The response was to recommend a law that would (in the committee’s words) throw these activities under the “spotlight of pitiless publicity.”  The result is the Foreign Agents Registration Act (FARA), a disclosure statute that, notably, does not prohibit speech. Rather, FARA requires agents of foreign principals who engage in political activities within the United States to file periodic public disclosures with the Department.

The Act’s purpose is to ensure that the American public and our lawmakers know the source of information provided at the behest of a foreign principal, enhancing the public’s and the government’s ability to evaluate such information.

Transparency, not prohibition, has been the government’s response to misinformation. In the 1980s, the government established an interagency committee, the “Active Measures Working Group,” to counter Soviet disinformation. It did so by exposing forgeries and other propaganda, such as fake stories that the Pentagon developed the AIDS virus as part of a biological weapons research program.

Today, we confront misinformation as only one component of a broader, malign foreign influence effort.  As this framework from the Department’s recent Cyber-Digital Task Force report shows, those efforts can also include cyber operations that target election infrastructure or political parties’ networks; covert efforts to assist (or harm) candidates; and overt efforts to influence the American public (for example, through state-run media organizations).

Our responses to those efforts must likewise be multifaceted, from providing indicators and warnings that can help network owners protect themselves from hackers, to criminal investigations and prosecutions, and other measures, like sanctions and expulsions that raise the costs on the states that sponsor such malign activities.

This graphic, also from the Task Force report, depicts the Department’s strategy to counter each phase of a covert influence campaign cycle, from the identification of targets to the production and amplification of content.  The middle rows (in red) depict our adversaries’ activities in stages, while the bottom rows (in blue) suggest the means by which private actors and the government can disrupt and deter the activity.

One aspect of this strategy worth highlighting is that the content of a foreign influence campaign may be true or false.  Whether the message is accurate or not may not be the point: doxing a candidate or a corporation for political reasons might not involve misinformation, but it may nonetheless violate our laws, threaten our values and way of life, compromise privacy and, sometimes, retaliate against and chill free speech.

Covert foreign influence efforts can take many forms, but recently we have seen increased efforts to influence Americans through social media. To counter these efforts, a key component of our approach is sharing information with social media and other Internet service providers, which we do through the FBI’s Foreign Influence Task Force.  It is those providers who bear the primary responsibility for securing their own products and platforms.  By sharing information with them, especially about who certain users and account holders actually are, we can assist their own, voluntary initiatives to track foreign influence activity and to enforce their own terms of service.

As the Task Force report also recognizes, there may be circumstances when it is appropriate for the government itself to expose and attribute foreign influence operations as a means of rendering them less effective. But there are often compelling, countervailing considerations, however.

As a general rule, the Department does not confirm, deny, or comment on pending investigations, both to protect the investigation itself as well as the rights of any accused.

We are also constrained to protect the classified sources and methods that may inform our judgment of what foreign governments are doing.

And, most important of all, we must never act to confer any advantage or disadvantage on any political or social group, individual, or organization, and we must strive to avoid even the appearance of partiality. That could constrain the timing and nature of any disclosure we might make.

All of this is to say, and as the Department’s Policy on the Disclosure of Foreign Influence Operations recognizes, we might not be the best messenger to counter a particular piece of misinformation.

That’s why this conference is so important: what we call the private sector (but which includes a lot of people in public spaces, just like you) has a critical role – larger than the federal government’s – in countering covert foreign influence efforts, particularly misinformation, and ensuring that our democracy rests on the active engagement of an informed public.

The former Russian troll I mentioned at the beginning of my remarks, who worked for the IRA, said his work was “pointless” for Russian audiences, that it would not impact them.  But in America, that kind of trickery might have an impact, he said, because we “live in a society in which it’s accepted to answer for your words.” My challenge to us during this conference, if I may make one, is that we find ways to ensure we all continue to answer for our words, so that the trust we enjoy as an aspect of our free, democratic society can thrive.

*** Someone help out the democrats and Mary Ann….all discussions inside the Beltway include these multi-track discussions. Back in March, the U.S. spending bill provided $380 million for election cyber security. There was an amendment for an additional $250 million that the Senate Republicans on a floor vote rejected. Why? Because many of the states have either been slow to accept money inside that $380 million or not taken any at all.