Потёмкин Алексей Александрович / Потьомкін Олексій Олександрович / Potemkin Aleksey Aleksandrovich

Страна: Россия
Адрес:
Московская обл., г. Химки,

Варианты имени:
  • Potyomkin Aleksej Aleksandrovich

Кибертеррорист. Сотрудник спецслужб страны-агрессора (россия).

Сотрудник ГРУ генштаба ВС страны-агрессора. Обвиняется в участии в заговоре в совершении преступления против США.

2. Defendants VIKTOR BORISOVICH NETYKSHO, BORIS ALEKSEYEVICH ANTONOV, DMITRIY SERGEYEVICH BADIN, IVAN SERGEYEVICH YERMAKOV, ALEKSEY VIKTOROVICH LUKASHEV, SERGEY ALEKSANDROVICH MORGACHEV, NIKOLAY YURYEVICH KOZACHEK, PAVEL VYACHESLAVOVICH YERSHOV, ARTEM ANDREYEVICH MALYSHEV, ALEKSANDR VLADIMIROVICH OSADCHUK, and ALEKSEY ALEKSANDROVICH POTEMKIN were GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”), to gain unauthorized access (to “hack”) into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from those computers, and stage releases of the stolen documents to interfere with the 2016 U.S. presidential election.
3. Starting in at least March 2016, the Conspirators used a variety of means to hack the email accounts of volunteers and employees of the U.S. presidential campaign of Hillary Clinton (the “Clinton Campaign”), including the email account of the Clinton Campaign’s chairman.
4. By in or around April 2016, the Conspirators also hacked into the computer networks of the Democratic Congressional Campaign Committee (“DCCC”) and the Democratic National Committee (“DNC”). The Conspirators covertly monitored the computers of dozens of DCCC and DNC employees, implanted hundreds of files containing malicious computer code (“malware”), and stole emails and other documents from the DCCC and DNC.
5. By in or around April 2016, the Conspirators began to plan the release of materials stolen from the Clinton Campaign, DCCC, and DNC.
6. Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including “DCLeaks” and “Guccifer 2.0.”
7. The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization (“Organization 1”), that had previously posted documents stolen from U.S. persons, entities, and the U.S. government. The Conspirators continued their U.S. election-interference operations through in or around November 2016.
8. To hide their connections to Russia and the Russian government, the Conspirators used false identities and made false statements about their identities. To further avoid detection, the Conspirators used a network of computers located across the world, including in the United States, and paid for this infrastructure using cryptocurrency.

Источники: 1, 2.

Кадровый российский военный, офицер. Прикреплён к в/ч 74455. Руководитель отдела в в/ч 74455, ответственныго за администрирование компьютерной инфраструктуры, используемой в кибер-операциях. Инфраструктура и аккаунты социальных сетей, управляемые отделом Потёмкина, использовались, среди прочего, для помощи в распространении украденных документов через DCLeaks и Guccifer 2.0. С аккаунтов Потемкина были зарегистрированы фейковые аккаунты на Facebook под выдуманными именами Alice Donovan, Jason Scott, Richard Gingrey и прочие, которые продвигали информацию с сайта DCLeaks. Также им в Twitter был создан аккаунт @dcleaks_ для продвижения материалов сайта. С того же компьютера был зарегистрирован аккаунт @BaltimoreIsWhr, который призывал присоединиться к флешмобу против Клинтон и постить фотографии с хештегом #BlacksAgainstHillary.

#CyBERGRU