{"id":24758,"date":"2019-01-28T15:05:03","date_gmt":"2019-01-28T15:05:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29758\/Indictment-Shows-A-Conspiratorial-Comedy-Of-Opsec-Errors.html"},"modified":"2019-01-28T15:05:03","modified_gmt":"2019-01-28T15:05:03","slug":"indictment-shows-a-conspiratorial-comedy-of-opsec-errors","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/","title":{"rendered":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/01\/GettyImages-1088549456-800x585.jpg\" alt=\"Roger Stone, a former advisor to President Donald Trump, leaves the Fort Lauderdale Federal Courthouse on January 25, 2019. Stone was charged by the government of obstruction, giving false statements and witness tampering. \"\/><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/01\/GettyImages-1088549456.jpg\" class=\"enlarge-link\" data-height=\"2634\" data-width=\"3600\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Roger Stone, a former advisor to President Donald Trump, leaves the Fort Lauderdale Federal Courthouse on January 25, 2019. Stone was charged by the government of obstruction, giving false statements and witness tampering.<\/div>\n<div class=\"caption-credit\">Johnny Louis\/Getty Images<\/div>\n<aside id=\"social-left\" aria-label=\"Read the comments or share this article\">\n<h4 class=\"comment-count-before\"><a title=\"213 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/01\/whatsapp-wikileaks-and-threats-against-a-dog-the-roger-stone-indictment\/?comments=1\">reader comments<\/a><\/h4>\n<p><a title=\"213 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/01\/whatsapp-wikileaks-and-threats-against-a-dog-the-roger-stone-indictment\/?comments=1\"><span class=\"comment-count-number\">1003<\/span> <span class=\"visually-hidden\">with 213 posters participating<\/span><\/a><\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/div>\n<\/aside>\n<p>Former Trump advisor and self-proclaimed &#8220;dirty trickster&#8221; Roger Stone\u2014the man with a Richard Nixon tattoo on his back and a penchant for playing the evil genius\u2014was arrested early on January 25 by a swarm of tactically equipped (and unpaid) FBI agents. The charges against him, <a href=\"https:\/\/www.justice.gov\/file\/1124706\/download\">in an indictment handed down by a federal grand jury<\/a> convened by Special Counsel Robert Mueller, include witness tampering, obstruction of a Congressional investigation, and six counts of making false statements to Congress.<\/p>\n<p>Stone had previously played up his connections with WikiLeaks&#8217; Julian Assange repeatedly. The advisor allegedly concealed the nature of those communications with WikiLeaks, lied about who acted as his intermediary, and made <em>Godfather II<\/em> references in his messages urging radio host Randy Credico\u2014one of his go-betweens to Assange\u2014not to contradict details of his testimony.<\/p>\n<p>The evidence listed against him in the indictment includes emails, text messages, and other communications\u2014communications that contradict Stone&#8217;s contention to the House Permanent Select Committee on Intelligence (HPSCI) that all his communications were over the phone and with only one individual. This evidence also shows Stone attempting to cajole and intimidate Randy Credico by threatening to take away his therapy dog and have his lawyers &#8220;rip you to shreds.&#8221; At one point, Stone allegedly even texted Credico, &#8220;Prepare to die [expletive].&#8221;<\/p>\n<p>And despite this mounting evidence, Stone might have gotten away with much of this had he been a bit more keen about operational security. He believed that WhatsApp, which he used as a &#8220;secure&#8221; phone line and for messaging, would protect his communications from the eyes of investigators\u2014forgetting that the people he was talking to could just show the messages to Mueller&#8217;s team and a grand jury. He also left an email trail of his alleged misdeeds seemingly spanning a mile wide.<\/p>\n<p>The Stone indictment also states that a &#8220;high-ranking&#8221; Trump campaign official directed the advisor to get in touch with WikiLeaks about damaging Clinton emails. Somehow, that&#8217;s a mere aside in the indictment&#8217;s description of Stone&#8217;s self-paved highway to arraignment.<\/p>\n<h2>\u201cFriend in embassy\u201d<\/h2>\n<p>The first stages of Stone&#8217;s involvement with WikiLeaks as described in the indictment have been confirmed by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Jerome_Corsi\">Jerome Corsi<\/a>, who was interviewed by the Special Counsel Investigation team in September 2018 and is referred to as Person 1 throughout the document. Corsi handed over his cell phone and emails to investigators.<\/p>\n<p>After WikiLeaks released <a href=\"https:\/\/arstechnica.com\/information-technology\/2016\/07\/clinton-campaign-email-accounts-were-targeted-by-russians-too\/\">emails stolen from the Democratic National Committee<\/a> on July 22, 2016, &#8220;a senior Trump Campaign official was directed to contact Stone about any additional releases and what other damaging information [WikiLeaks] had regarding the Clinton Campaign,&#8221; the indictment states. In turn, Stone reached out to multiple associates in an effort to communicate with WikiLeaks and Julian Assange and obtain further Clinton-related emails. On July 25, 2016, Stone emailed Corsi. The subject line was &#8220;Get to Julian Assange,&#8221; and the message read, &#8220;Get to [Julian Assange] \u00a0at Ecuadorian Embassy in London and get the pending WikiLeaks emails . . . they deal with Foundation, allegedly.&#8221;<\/p>\n<p>Corsi soon turned to a Trump supporter in the UK for assistance to act as a go-between to WikiLeaks. On August 2, 2016, Corsi emailed Stone, &#8220;Word is friend in embassy plans 2 more dumps. One shortly after I\u2019m back. 2nd in Oct. Impact planned to be very damaging\u2026Time to let more than [the Clinton Campaign chairman] to be exposed as in bed w\/ enemy if they are not ready to drop HRC. That appears to be the game hackers are now about. Would not hurt to start suggesting HRC old, memory bad, has stroke \u2013 neither he nor she well. I expect that much of next dump focus, setting stage for Foundation debacle.\u201d<\/p>\n<p>Stone took the message and ran with it. Six days later, Stone said at a public event, &#8220;I actually have communicated with Julian Assange. I believe the next tranche of his documents pertain to the Clinton Foundation, but there\u2019s no telling what the October surprise may be.&#8221; He continued to claim exclusive insight into future WikiLeaks drops\u2014despite, of course, having no direct communication with Assange or WikiLeaks.<\/p>\n<h2>\u201cOff the record\u201d<\/h2>\n<p>That doesn&#8217;t mean Stone wasn&#8217;t trying. On August 19, 2016, Credico texted him to say, &#8220;I\u2019m going to have Julian Assange on my show next Thursday.\u201d Assange was on Credico&#8217;s radio show on August 25, 2016; the next day, Credico texted Stone, &#8220;Assange talk[ed] about you last night.\u201d When Stone asked what Assange said, Credico replied, &#8220;He didn\u2019t say anything bad we were talking about how the Press is trying to make it look like you and he are in cahoots.&#8221; One day later, Credico texted that he was &#8220;in charge&#8221; of a project to create an Assange radio show. He texted later, &#8220;Assange has kryptonite on Hillary.&#8221;<\/p>\n<p>Stone next turned to Credico as a channel to Assange, asking him by text message to deliver a request to Assange at the Ecuadorian Embassy. \u00a0Credico assented, adding in a follow-up message, &#8220;Just remember do not name me as your connection to Assange\u2026you had one before that you referred to.&#8221; Stone emailed Credico an article with a list of allegations about Hillary Clinton&#8217;s activities as Secretary of State and asked the radio host, &#8220;Please ask Assange for any State or HRC email from August 10 to August 30\u2014particularly on August 20, 2011 that mention [the subject of the article] or confirm this narrative.&#8221; \u00a0Credico forwarded the request to &#8220;a friend who was an attorney with the ability to contact&#8221; Assange, the indictment states, BCC&#8217;ing that email to Stone. Credico then sent a photograph of himself standing outside the Ecuadorian Embassy in London.<\/p>\n<p>On October 1, Credico sent Stone a message in advance of an anticipated press conference by Assange: &#8220;big news Wednesday . . . now pretend u don\u2019t know me . . . Hillary\u2019s campaign will die this week.&#8221; This began a string of messages over Assange&#8217;s cancellation of that press conference, which was eventually held October 4\u2014without any Clinton bombshells.<\/p>\n<p>Credico texted Stone on October 2, &#8220;Off the Record Hillary and her people are doing a full-court press they [sic] keep Assange from making the next dump . . . That\u2019s all I can tell you on this line . . . Please leave my name out of it.&#8221;<\/p>\n<p>But Stone kept pumping up the dump with people in the Trump camp, based on the indictment&#8217;s timeline. He told a supporter within the Trump campaign on October 3, &#8220;Spoke to my friend in London last night. The payload is still coming.&#8221; And when the news conference passed without new Clinton dirt, Stone got an email from the unnamed high-ranking Trump Campaign official asking what was up. According to the indictment, Stone answered that &#8220;the head of [WikiLeaks] had a &#8216;[s]erious security concern&#8217; but that [WikiLeaks] would release &#8216;a load every week going forward.'&#8221;<\/p>\n<p>On October 4, Stone&#8217;s supporter with the Trump campaign texted to ask, &#8220;hear anymore from London?\u201d Stone answered, \u201cYes &#8211; want to talk on a secure line &#8211; got Whatsapp?\u201d In the conversation that followed, Stone said more damaging emails would drop soon.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29758\/Indictment-Shows-A-Conspiratorial-Comedy-Of-Opsec-Errors.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24759,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5633],"class_list":["post-24758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentemailusarussiadata-lossfraudspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-28T15:05:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Indictment Shows A Conspiratorial Comedy Of Opsec Errors\",\"datePublished\":\"2019-01-28T15:05:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/\"},\"wordCount\":1225,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg\",\"keywords\":[\"headline,government,email,usa,russia,data loss,fraud,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/\",\"name\":\"Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg\",\"datePublished\":\"2019-01-28T15:05:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg\",\"width\":800,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,email,usa,russia,data loss,fraud,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentemailusarussiadata-lossfraudspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Indictment Shows A Conspiratorial Comedy Of Opsec Errors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/","og_locale":"en_US","og_type":"article","og_title":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-01-28T15:05:03+00:00","og_image":[{"width":800,"height":585,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors","datePublished":"2019-01-28T15:05:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/"},"wordCount":1225,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg","keywords":["headline,government,email,usa,russia,data loss,fraud,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/","url":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/","name":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg","datePublished":"2019-01-28T15:05:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/01\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors.jpg","width":800,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/indictment-shows-a-conspiratorial-comedy-of-opsec-errors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,email,usa,russia,data loss,fraud,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentemailusarussiadata-lossfraudspyware\/"},{"@type":"ListItem","position":3,"name":"Indictment Shows A Conspiratorial Comedy Of Opsec Errors"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24758"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24758\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24759"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}