Grand Jury Indicts Thirteen Russian Individuals and Three Russian Companies for Scheme to Interfere in the US Political System

Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Friday, February 16, 2018

The Department of Justice announced that a grand jury in the District of Columbia today returned an indictment presented by the Special Counsel’s Office. The indictment charges thirteen Russian nationals and three Russian companies for committing federal crimes while seeking to interfere in the United States political system, including the 2016 Presidential election. The defendants allegedly conducted what they called “information warfare against the United States,” with the stated goal of “spread[ing] distrust towards the candidates and the political system in general.”

“This indictment serves as a reminder that people are not always who they appear to be on the Internet,” said Deputy Attorney General Rod J. Rosenstein. “The indictment alleges that the Russian conspirators want to promote discord in the United States and undermine public confidence in democracy. We must not allow them to succeed. The Department of Justice will continue to work cooperatively with other law enforcement and intelligence agencies, and with the Congress, to defend our nation against similar current and future schemes. I want to thank the federal agents and prosecutors working on this case for their exceptional service.”

https://www.justice.gov/file/1035477/download

According to the allegations in the indictment, twelve of the individual defendants worked at various times for Internet Research Agency LLC, a Russian company based in St. Petersburg, Russia. The other individual defendant, Yevgeniy Viktorovich Prigozhin, funded the conspiracy through companies known as Concord Management and Consulting LLC, Concord Catering, and many subsidiaries and affiliates. The conspiracy was part of a larger operation called “Project Lakhta.” Project Lakhta included multiple components, some involving domestic audiences within the Russian Federation and others targeting foreign audiences in multiple countries.

Internet Research Agency allegedly operated through Russian shell companies. It employed hundreds of persons for its online operations, ranging from creators of fictitious personas to technical and administrative support, with an annual budget of millions of dollars. Internet Research Agency was a structured organization headed by a management group and arranged in departments, including graphics, search-engine optimization, information technology, and finance departments. In 2014, the agency established a “translator project” to focus on the U.S. population. In July 2016, more than 80 employees were assigned to the translator project.

Two of the defendants allegedly traveled to the United States in 2014 to collect intelligence for their American political influence operations.

To hide the Russian origin of their activities, the defendants allegedly purchased space on computer servers located within the United States in order to set up a virtual private network. The defendants allegedly used that infrastructure to establish hundreds of accounts on social media networks such as Facebook, Instagram, and Twitter, making it appear that the accounts were controlled by persons within the United States. They used stolen or fictitious American identities, fraudulent bank accounts, and false identification documents. The defendants posed as politically and socially active Americans, advocating for and against particular political candidates. They established social media pages and groups to communicate with unwitting Americans. They also purchased political advertisements on social media.

The Russians also recruited and paid real Americans to engage in political activities, promote political campaigns, and stage political rallies. The defendants and their co-conspirators pretended to be grassroots activists. According to the indictment, the Americans did not know that they were communicating with Russians.

After the election, the defendants allegedly staged rallies to support the President-elect while simultaneously staging rallies to protest his election. For example, the defendants organized one rally to support the President-elect and another rally to oppose him—both in New York, on the same day.

On September 13, 2017, soon after the news media reported that the Special Counsel’s Office was investigating evidence that Russian operatives had used social media to interfere in the 2016 election, one defendant allegedly wrote, “We had a slight crisis here at work: the FBI busted our activity…. So, I got preoccupied with covering tracks together with my colleagues.”

The indictment includes eight criminal counts. Count One alleges a criminal conspiracy to defraud the United States, by all of the defendants. The defendants allegedly conspired to defraud the United States by impairing the lawful functions of the Federal Election Commission, the U.S. Department of Justice, and the U.S. Department of State in administering federal requirements for disclosure of foreign involvement in certain domestic activities.

Count Two charges conspiracy to commit wire fraud and bank fraud by Internet Research Agency and two individual defendants.

Counts Three through Eight charge aggravated identity theft by Internet Research Agency and four individuals.

There is no allegation in the indictment that any American was a knowing participant in the alleged unlawful activity. There is no allegation in the indictment that the charged conduct altered the outcome of the 2016 election.

Everyone charged with a crime is presumed innocent unless proven guilty in court. At trial, prosecutors must introduce credible evidence that is sufficient to prove each defendant guilty beyond a reasonable doubt, to the unanimous satisfaction of a jury of twelve citizens.

The Special Counsel’s investigation is ongoing. There will be no comments from the Special Counsel at this time.

Twitter Updates Info on Propaganda, Internet Research Agency Linked Accounts, Russian Bots

Most user engagement was with a very small number of IRA-associated accounts.  Image above courtesy Twitter, example of Internet Research Agency disinformation campaign.
By Twitter PublicPolicy

Friday, 19 January 2018

When we appeared before the United States Congress last fall, Twitter publicly committed to regularly updating both congressional committees and the public on findings from our ongoing review into events surrounding the 2016 U.S. election.

Twitter is committed to providing a platform that fosters healthy civic discourse and democratic debate.  We have been cooperating with congressional investigations into Russian interference in the 2016 U.S. presidential election. We have committed to be as transparent as possible about sharing what we have learned through our retroactive investigationinto activity related to the election.

Since we presented our findings to Congress last fall, we have updated our analysis and continue to look for patterns and signals in data. Today, we are sharing an update on several aspects of that ongoing work, as well as steps we are taking to continue to make progress against potential manipulation of our platform.

Informing People of Malicious Activity in the 2016 Election

As previously announced, we identified and suspended a number of accounts that were potentially connected to a propaganda effort by a Russian government-linked organization known as the Internet Research Agency (IRA).

Consistent with our commitment to transparency, we are emailing notifications to 677,775 people in the United States who followed one of these accounts or retweeted or liked a Tweet from these accounts during the election period. Because we have already suspended these accounts, the relevant content on Twitter is no longer publicly available.

Examples of IRA Content

Most user engagement was with a very small number of IRA-associated accounts.  Some examples of content which received significant engagement are:

Updated Numbers of IRA Accounts

As part of our ongoing review, we have identified both more IRA and automated Russia-based accounts. The results of this supplemental analysis are consistent with the results of our previous work: automated election-related content associated with Russian signals represented a very small fraction of the overall activity on Twitter in the ten-week period preceding the 2016 election.

We have identified an additional 1,062 accounts associated with the IRA. We have suspended all of these accounts for Terms of Service violations, primarily spam, and all but a few accounts, which were restored to legitimate users, remain suspended.  At the request of congressional investigators, we are also sharing those account handles with Congress. In total, during the time period we investigated, the 3,814 identified IRA-linked accounts posted 175,993 Tweets, approximately 8.4% of which were election-related.

We have also provided Congress with the results of our supplemental analysis into activity believed to be automated, election-related activity originating out of Russia during the election period. Through our supplemental analysis, we have identified 13,512 additional accounts, for a total of 50,258 automated accounts that we identified as Russian-linked and Tweeting election-related content during the election period, representing approximately two one-hundredths of a percent (0.016%) of the total accounts on Twitter at the time.  However any such activity represents a challenge to democratic societies everywhere, and we’re committed to continuing to work on this important issue.

Enhancing Information Quality

After the 2016 election, we launched our Information Quality initiative to further develop strategies to detect and prevent bad actors from abusing our platform. We have since made significant improvements, while recognizing that we have more to do as these patterns of activity develop and shift over time.

With our current capabilities, we detect and block approximately 523,000 suspicious logins daily for being generated through automation. In December 2017, our systems identified and challenged more than 6.4 million suspicious accounts globally per week— a 60% increase in our detection rate from October 2017. We have developed new techniques for identifying malicious automation (such as near-instantaneous replies to Tweets, non-random Tweet timing, and coordinated engagement). We have improved our phone verification process and introduced new challenges, including reCAPTCHAs to validate that a human is in control of an account.

Alongside these improvements, we’re continuing to expand enforcement of our developer and automation rules. Since June 2017, we’ve removed more than 220,000 applications in violation of our rules, collectively responsible for more than 2.2 billion low-quality Tweets.

In 2018, we will build upon our existing improvements. Our plans include:

  • Investing further in machine-learning capabilities that help us detect and mitigate the effect on users of fake, coordinated, and automated account activity;
  • Limiting the ability of users to perform coordinated actions across multiple accounts in Tweetdeck and via the Twitter API;
  • Continuing the expansion of our new developer onboarding process to better manage the use cases for developers building on Twitter’s API. This will help us improve how we enforce our policies on restricted uses of our developer products, including rules on the appropriate use of bots and automation.

Media Literacy and Partnerships

We recognize that Twitter is an important part of a larger ecosystem of how news and information spreads online, and that we have a responsibility to support external programs that empower our users, connecting them with resources to give them control over their online experience.

Our partners Common Sense Media, the National Association for Media Literacy, the Family Online Safety Institute and Connect Safely, amongst others, have helped us to craft materials and conduct workshops to help our users learn how to process online information and understand which sources of news have integrity. We focus on elements like verification of sources, critical thinking, active citizenship online and the breaking down of digital divides.

Learn more about our most recent efforts for Media Literacy Week in countries like the U.S., Canada and Ireland, and follow our partners @MediaLiteracyEd@CommonSenseEdu and @ConnectSafely for new initiatives like the Teachers Institute at Twitter HQ.

Twitter is proud to partner with journalistic NGOs for trainings and outreach initiatives, including Reporters without Borders, the Committee to Protect Journalists, and the Reporters Committee for Freedom of the Press. We will keep working with reporters, journalism NGOs, and media organizations to ensure that Twitter’s full capabilities are built into newsrooms and established media outlets worldwide.

Moving Forward

Even as we continue to learn from the events of the 2016 U.S. election, we are taking steps every day to improve the security of our platform and stay one step ahead of those who would abuse it. As part of our preparations for the U.S. midterm elections, our teams are organizing to:

  • Verify major party candidates for all statewide and federal elective offices, and major national party accounts, as a hedge against impersonation;
  • Maintain open lines of communication to federal and state election officials to quickly escalate issues that arise;
  • Address escalations of account issues with respect to violations of Twitter Rules or applicable laws;
  • Continually improve and apply our anti-spam technology to address networks of malicious automation targeting election-related matters; and
  • Monitor trends and spikes in conversations relating to the 2018 elections for potential manipulation activity.

We are committed to ensuring that Twitter is safe and secure for all users and serves to advance healthy civic discussion and engagement. Our work on these issues will never be done, and we will continue in our efforts to protect Twitter against bad actors and networks of malicious automation and manipulation.

Facebook Tool Shows if You Followed or Liked Russian Internet Research Agency Pages

How can I see if I’ve liked or followed a Facebook Page or Instagram account created by the Internet Research Agency?

Click here to see if you liked or followed any of these accounts (you must be logged in to your Facebook account for it to work):

https://www.facebook.com/help/817246628445509?helpref=faq_content

Hopefully, you will see this message: You haven’t liked or followed any pages or accounts from the IRA (Internet Research Agency).
Login with your Instagram account to see if you’ve followed an IRA Instagram account.
——————————–https://skepticreview.com/2017/11/03/propaganda-samples-released-us-house-intelligence-commitee/

September 21, 2017

Facebook to Provide Congress With Ads Linked to Internet Research Agency

By Colin Stretch, General Counsel

Two weeks ago, we announced we had found more than 3,000 ads addressing social and political issues that ran in the US between 2015 and 2017 and that appear to have come from accounts associated with a Russian entity known as the Internet Research Agency. We subsequently made clear that we are providing information related to those ads, including the ad content itself, to the Special Counsel investigating allegations of Russian interference in the 2016 US election. Since then, some people have asked why we aren’t sharing the content of the ads more broadly.

After an extensive legal and policy review, today we are announcing that we will also share these ads with congressional investigators. We believe it is vitally important that government authorities have the information they need to deliver to the public a full assessment of what happened in the 2016 election. That is an assessment that can be made only by investigators with access to classified intelligence and information from all relevant companies and industries — and we want to do our part. Congress is best placed to use the information we and others provide to inform the public comprehensively and completely.

This has been a difficult decision. Disclosing content is not something we do lightly under any circumstances. We are deeply committed to safeguarding user content, regardless of the user’s nationality, and ads are user content. Federal law also places strict limitations on the disclosure of account information. As our biannual transparency reports make clear, we carefully scrutinize all government data requests, from here and abroad, and we push back where they do not adhere to those legal limitations. And, of course, we also recognize and support the important work of government investigations and take care not to take steps, like public disclosures, that might undermine them.

Over recent weeks, we have grappled with the extraordinary nature of this particular investigation through this lens. The questions that have arisen go to the integrity of US elections. And the limited information Congress and the intelligence community have shared with us to date suggests that efforts to compromise the 2016 election were varied and sophisticated — and that understanding those efforts requires a united effort, from across the technology, intelligence and political communities. We believe the public deserves a full accounting of what happened in the 2016 election, and we’ve concluded that sharing the ads we’ve discovered, in a manner that is consistent with our obligations to protect user information, can help.

That’s why we have reached out to congressional leadership to agree on a process and schedule to provide the content of these ads, along with related information, to congressional investigators. At the same time, we will continue our own review and investigation, and to do our part to make sure investigators have the information they need. We look forward to their comprehensive assessment, and to a greater public understanding of what took place.