Mueller Questions Stone Associates on WikiLeaks
Efforts to investigate the extent to which Russian’s meddled in the 2016 presidential election – what President Trump has deemed a rigged witch hunt – continue. The latest interviews in Robert Mueller’s probe into Russian collusion involve two associates of GOP operative Roger Stone.
Comedian and talk-show host, Randy Credico, and political commentator, Jerome Corsi, were questioned last week, according to the The Hill. Credico’s lawyer, Martin Stolar, said that his client was asked about his relationship with both Stone and WikiLeaks in front of a grand jury Friday, Reuters reported. Credico’s testimony suggested that prosecutors are looking to understand the extent of Stone’s relationship with WikiLeaks.
On Thursday, the known conspiracy theorist, Jerome Corsi, was also questioned. CNN reported that Corsi was originally set to testify Friday but the plan was placed on hold. As the investigation seems to be moving toward Stone being indicted, Stone told CNN that he would fully cooperate with investigators, but there is no situation under which he would testify against President Trump.
After WikiLeaks released emails that had been obtained during the hack of Democratic National Party’s in the 2016 presidential election, Stone became a person of greater interest. Mueller’s team has reportedly been inquiring about Stone’s relationship with WikiLeaks founder, Julian Assange. According to US intelligence agencies, the hack of the DNC’s email server was the act of Russian operatives who then used WikiLeaks to publish the information.
“The special counsel is investigating if Stone had any advance knowledge of the 2016 document dump after Stone sent out multiple tweets lining up with the reveal of the Democratic documents,” The Hill wrote.
The interviews have caused stress for Credico, who reportedly arrived in Washington with his therapy dog. The Senate Intelligence Committee has also reportedly asked Credico to provide “certain documents,” which his lawyer told Reuters would not likely happen voluntarily.
Source: Information Security Magazine