Page_0002

US. Department of Justice
WW // WWW

U.S. Department of Justice

Afiemey—WefleréHfiUMarGenfififi-MaterfiPmteeméUnderPederGfimrPrééefi

TABLE OF CONTENTS VOLUME I

INTRODUCTION TO VOLUME I .......................................................................................................... 1
EXECUTIVE SUMMARY TO VOLUME 1 ............................................................................................... 4
I. THE SPECIAL COUNSEL’S INVESTIGATION ................................................................................. 1 1
II. RUSSIAN “ACTIVE MEASURES” SOCIAL MEDIA CAMPAIGN ..................................................... 14
A. Structure of the Internet Research Agency ................................................................. 15

B. Funding and Oversight from Concord and Prigozhin ................................................. 16

C. The IRA Targets U.S. Elections .................................................................................. 19

1. The [RA Ramps Up U.S. Operations As Early As 2014 ...................................... 19

2. U.S. Operations Through IRA-Controlled Social Media Accounts ..................... 22

3. U.S. Operations Through F acebook ...................................................................... 24

4. US. Operations Through Twitter ......................................................................... 26

a. Individualized Accounts ................................................................................... 26

b. IRA Botnet Activities ...................................................................................... 28

5. U.S. Operations Involving Political Rallies .......................................................... 29

6. Targeting and Recruitment of U.S. Persons .......................................................... 31

7. Interactions and Contacts with the Trump Campaign ........................................... 33

a. Trump Campaign Promotion of IRA Political Materials ................................. 33

b. Contact with Trump Campaign Officials in Connection to Rallies ................. 35

III. RUSSIAN HACKING AND DUMPING OPERATIONS ..................................................................... 36
A. GRU Hacking Directed at the Clinton Campaign ....................................................... 36

1. GRU Units Target the Clinton Campaign ............................................................. 36

2. Intrusions into the DCCC and DNC Networks ..................................................... 38

3.. Initial Access .................................................................................................... 38

b. Implantation of Malware on DCCC and DNC Networks ................................ 38

c. Theft of Documents from DNC and DCCC Networks .................................... 40

B. Dissemination of the Hacked Materials ...................................................................... 41

I. DCLeaks ............................................................................................................... 41

2. Guccifer 2.0 ........................................................................................................... 42

3. Use of WikiLeaks ................................................................................................. 44

a. WikiLeaks’s Expressed Opposition Toward the Clinton Campaign ............... 44

b. WikiLeaks’s First Contact with Guccifer 2.0 and DCLeaks ........................... 45


Next Page_0003
pages_list