The Rest Is Classified – Episode 133 Summary
How Russia Made Trump: Romanian Hackers, WikiLeaks, and Hillary’s Emails (Ep 3)
Aired: March 3, 2026
Hosts: David McCloskey & Gordon Corera
Overview
Episode 133 of "The Rest Is Classified" delves deep into the transformative moment in Russian espionage: when digital intrusion evolves from secret information theft to active political manipulation through "hack and leak" operations. Focusing on the Russian state-sponsored hacks against the DNC and subsequent release of emails via WikiLeaks, hosts David McCloskey and Gordon Corera unpack how these events contributed to the unraveling of Hillary Clinton's 2016 presidential campaign, the unique role of Julian Assange, and the broader global implications for modern espionage.
Key Discussion Points & Insights
1. From Classic Espionage to “Hack and Leak” (03:55–10:00)
- Espionage Evolves: Russian operations move beyond secret-stealing to active influence. "This is the moment it switches to being an active measure to actually doing something with the information that's been stolen to try and have an impact and effect in the world." — Gordon (03:55)
- Need for Plausible Deniability: Unlike Cold War days, digital fronts mask Russian involvement. The GRU creates dcleaks.com after failing to register electionleaks.com and sets up “hacktivist” personas.
“You need basically $37 worth of freshly minted Bitcoin, which is what the GRU uses, and they reserve a domain… These pop tart eating borsch swilling hackers…” — David (04:24)
- Exfiltration: Data is extracted using command-and-control servers, attempts at covering tracks are only partially effective. Unit 26165 conducts the hacking, Unit 74455 (Sandworm) focuses on spreading and psychological warfare.
“74455 is actually associated with some of the most intense cyber sabotage… interesting that Mueller links them to building the infrastructure for spreading the material hacked by another unit.” — Gordon (07:49)
2. Publishing Tactics: The Role of Journalists and WikiLeaks (10:00–18:00)
- Dumping Data & Media’s Role: The new model is about data dumps, with journalists expected to sift through for stories:
“In this new world, you just dump the stuff and then let journalists sift through it… It makes it easier for the hackers because they just dump it there on DC Leaks.” — Gordon (10:04)
- Early Ineffectiveness: GRU’s initial attempts to amplify via fake American personas like "Melvin Reddick" fall flat.
- WikiLeaks Enters: The GRU seeks a larger platform with a reputation for indiscriminate publication, messaging WikiLeaks about coalition.
“Enter WikiLeaks and Julian Assange… it's amazing that we've got this far without dealing with the character of Julian Assange and WikiLeaks.” — Gordon (13:57)
3. Julian Assange & WikiLeaks’ Transformation (14:10–19:49)
- Assange’s Shifting Role: Starts as whistleblowing hero, publishing impactful material (e.g., “Collateral Murder” video), then transitions into mass data dumps (2010–2011), drawing US ire and controversy.
“At that point, Junior Assange and WikiLeaks are seen as this kind of anti-government, slightly heroic whistleblowing organization…” — Gordon (14:17)
- Anti-American & Russian Ties: Assange’s anti-Western stance deepens, evident as he collaborates with RT (Russian state media) after seeking asylum in the Ecuadorian embassy in 2012.
- Clinton Conflict Explained: Tensions between Assange and Hillary Clinton accelerate due to prior leaks and mutual animosity; Clinton becomes a focal enemy for both WikiLeaks and Russia.
4. Hillary Clinton’s Email Scandal: The Romanian Connection (19:49–23:18)
- Private Email Server: Clinton sets up a private server while Secretary of State — a "strikingly bad judgment." (20:50)
- Initial Revelation: The story breaks in 2015 after Romanian hacker "Guccifer" exposes the server, feeding suspicions (22:40).
- Politicization: The scandal is propelled by Republican-led investigations into Benghazi and subsequent deleted emails, expanding the controversy and public mistrust.
5. Russian Strategy: Collaboration with WikiLeaks and Masking Origin (25:32–27:27)
- Failed Distribution on DCLeaks: The initial front receives little attention; the GRU turns directly to WikiLeaks via encrypted and sometimes missed DM exchanges.
- Opaque Transmission: The hand-off of Podesta’s inbox is likely done anonymously, keeping direct ties hidden.
- Tensions Remain: "There still is some mystery here... on the kind of TikTok of the contacts and the secret contact between the GRU and WikiLeaks." — David (26:55)
6. Public Revelation: CrowdStrike, Attribution, and Guccifer 2.0 (29:16–36:10)
- Discovery and Disclosure: Security firm CrowdStrike traces the breach to GRU units, cooperates with the DNC and the press.
“By the middle of June, it is understood that the Russians are behind a hack of the DNC.” — David (32:24)
- Russian Retaliation – Guccifer 2.0: A new "lone hacker" persona is fabricated by GRU to confuse attribution, reusing the Guccifer name trying to pose as a Romanian independent actor.
“Guccifer 2.0… issues a rambling post that dismisses the CrowdStrike conclusions… and tries to portray themselves as Romanians.” — David (33:54)
- Sloppy Tradecraft Exposed: Metadata errors, such as Cyrillic usernames and references to Felix Dzerzhinsky (“Felix Edmundovich”), hint unmistakably at Russian involvement.
“Felix Edmundovich is not a pop tart eating GRU hacker. This is the first name… of Felix Dzerzhinsky, the founder of the Cheka…” — Gordon (36:10)
7. The WikiLeaks Dump & Political Aftermath (37:20–43:13)
- The Drop: On July 22, 2016, WikiLeaks uploads 19,252 DNC emails and over 8,000 attachments, right before the Democratic National Convention.
“Are you ready for Hillary? …We begin our series today with 20,000 emails from the top of the DNC.” — Julian Assange (38:10)
- Immediate Political Fallout: Major revelations include evidence that the DNC favored Clinton over Sanders, resulting in DNC leader Debbie Wasserman Schultz’s resignation.
“It’s something about the timing ahead of the convention, and crucially, that there is actually really interesting information in there…” — Gordon (38:45)
- Deepening Party Divisions: The leak stokes anger among Bernie Sanders’ supporters, threatens Democratic Party unity, and may have “material impact” in an ultimately close election.
“...if some of those Bernie Sanders supporters are sufficiently pissed off …they are not going to throw their support behind her, are they?” — Gordon (41:23)
8. Trump Weighs In & The Viral Spread (42:26–43:13)
- Trump Seizes the Narrative: Donald Trump tweets about the leaked emails, amplifying their impact and feeding perceptions of rigged primaries.
"Leaked emails of DNC show plans to destroy Bernie Sanders, mock his heritage, and much more online from WikiLeaks—really vicious, rigged." — Donald Trump (paraphrased by David, 42:26)
- Operation Goes Wildfire: The strategically timed leak, combined with candidate-driven amplification, pushes the story into the political mainstream, fracturing alliances and dominating news cycles.
Notable Quotes & Memorable Moments
- David on Active Measures (04:24):
“You want there to be some kind of plausible front for the information so it's not widely seen as coming from Russia...now you need basically $37 worth of freshly minted Bitcoin.” - Gordon on WikiLeaks’ Influence (13:57):
“Enter WikiLeaks and Julian Assange... it's amazing that we've got this far without dealing with the character of Julian Assange and WikiLeaks.” - David on Clinton’s Emails (20:47):
“She did not use or ever even activate a state.gov email account...we would both agree, Gordon, that it was a, I think, strikingly bad judgment.” - Gordon on Democratic Divisions (41:23):
“...if some of those Bernie Sanders supporters are sufficiently pissed off that the DNC has been conspiring against them and Hillary Clinton’s been conspiring against them, they are not going to throw their support behind her, are they?” - David on Russian Op Impact (43:13):
“This active measure...is going to just seep into the bloodstream of this election and...be used and really promulgated by media, the candidates themselves. It's really a startling story...”
Important Segment Timestamps
- Espionage Becomes Active Measures (Hacking vs. Leaking): 03:55–05:18
- DCLeaks Setup & Early Distribution Failures: 04:24–11:58
- WikiLeaks & Julian Assange Profile: 13:57–19:49
- Hillary’s Email Scandal Origin and Political Fallout: 20:47–25:32
- WikiLeaks’ Approach & Mystery of Hand-off: 25:32–27:27
- CrowdStrike, Guccifer 2.0, and Attribution Errors: 29:16–36:10
- The WikiLeaks Dump & Its Fallout: 37:20–43:13
- Trump Tweets on DNC Leak: 42:26
Takeaways
- The Russian “hack and leak” operation in 2016 marked a new level of information warfare, integrating cyber-espionage with strategic leaks designed to shape political events.
- The transition from data theft to distribution involved calculated use of digital fronts, deception (Guccifer 2.0), and third-party platforms (WikiLeaks) to mask origin and maximize impact.
- The DNC leaks were not only a technical triumph for Russian intelligence but, thanks to timing and content, played directly into existing US political schisms — potentially affecting the 2016 election outcome.
- The shifting persona and motivations of actors like Julian Assange were as much a part of the active measures as the cyber tools wielded by Russia.
- This episode demonstrates the blurred lines between traditional espionage, cyber operations, psychological warfare, and mass media manipulation—a defining characteristic of contemporary information conflict.
For Further Exploration
- Episode promises future deep dives into Julian Assange, WikiLeaks, and the tangled relationship between the Trump campaign and Russia.
- The hosts leave listeners with an invitation to join their membership club for bonus content, including more detailed looks at Trump-Russia ties.
End of summary.
