Hunter Biden has filed a civil suit against Rudy Giuliani, a number of shell companies through which Giuliani does business, and Giuliani’s attorney Robert Costello. The suit charges Giuliani and Costello with violations of the Computer Fraud and Abuse Act, specifically accessing Hunter Biden’s personal information “without authorization or exceeding authorized access,” resulting in the “total annihilation” of his digital privacy.
Additionally, the suit reminds the court—and everyone else—that for all the talk of “Hunter Biden’s laptop,” there is no laptop. There never was. Instead, “Defendants themselves admit that their purported possession of a ‘laptop’ is in fact not a ‘laptop’ at all. It is, according to their own public statements, an ‘external drive’ that Defendants were told contained hundreds of gigabytes of Plaintiff’s personal data.”
According to Giuliani, the data on that drive came from John Paul Mac Isaac, the former owner of a computer repair shop, who claimed to have data taken from one of Hunter Biden’s laptops and who offered to send it to Giuliani. According to the lawsuit, neither Isaac nor Giuliani ever maintained any kind of chain of custody on this data, and the data they have has been not just accessed but also tampered with, manipulated, altered, and damaged.
The basis of the lawsuit is the claim that Giuliani and Costello violated the Computer Fraud and Abuse Act by accessing the data stored on the external drive sent to them by Isaac. Hunter Biden specifically does not admit that all the data on the drive was ever in his possession, or that Isaac was ever actually in possession of a laptop that Biden had owned.
What the lawsuit alleges of Giuliani seems patently obvious.
Plaintiff is informed and believes and thereon alleges for the past many months Defendant Giuliani has spent many hours hacking into and manipulating data that he claims to have been obtained from Plaintiff, making copies of the data for himself and others to access and analyze, and further altering, impairing and damaging the data through his unlawful hacking and manipulation. In public interviews and media appearances and during podcasts, Defendant Giuliani has not only admitted but bragged about downloading data from Plaintiff’s “laptop” (even though he only had a hard drive) onto his own computer; about using his own computer to access, tamper with and manipulate the downloaded data; and about maintaining multiple copies of the data for his and Defendant Costello’s personal use.
The bigger challenge for Hunter Biden will be showing that the case belongs in California, where he has made the claims in part because of that state’s greater protections for digital privacy, and showing that Giuliani and Costello violated the Computer Fraud and Abuse Act.
It’s clear that both men have repeatedly accessed the information, that Giuliani has hired others in an attempt to recover more information from the hard drive, and that the data has been altered and tampered with at least to the extent of being edited into pieces that Giuliani has provided to the media or used on his own podcast.
The move to try the suit in California is particularly important for the second claim made in the suit, which addresses how Giuliani obtained information from the hard drive that allowed him to access more information that was stored on Hunter Biden’s “cloud” accounts. That kind of violation is specifically addressed in California’s penal code. Hunter Biden also notes that this data came from a computer used for business purposes, a critical point in providing protections under both federal and California law.
As relief from the distress generated by Giuliani and Costello’s actions, Hunter Biden is seeking unspecified damages, any money that Giuliani has made related to his misuse of the information, legal fees, and an order that both requires Giuliani to dispose of any copies of the data he holds, and prevents him, his companies, or his attorney from accessing or distributing any of the data in the future.
Earlier his month, Hunter Biden filed a similar suit against former Donald Trump assistant Garrett Ziegler. He has also sued the IRS after agents there, specifically “whistleblowers” Gary Shapley and Joseph Ziegler, discussed details of Hunter Biden’s tax returns in open hearings and statements.
AND, TO CONTINUE: THE ENTIRE “HUNTER BIDEN LAPTOP” STORY LOOKS LIKE A RUSSIAN PLANT WITH GIULIANI’S CONNIVANCE
During the 2016 elections, Russian government agents hacked into the Democratic National Committee and into Hillary Clinton’s presidential campaign, then dumped the stolen data in an effort to sabotage Donald Trump’s election opponent. The more we learn about the supposed “Hunter Biden laptop,” a scandal meant to roil the campaign of Donald Trump’s election opponent four years later, the more it looks like somebody was following the same hack-and-dump playbook.
Marcy Wheeler has a new post that breaks down some of the many, many known oddities of the supposed “laptop.” When you consider that the whole premise of the story to begin with is that a “Hunter Biden” allegedly wandered into a random Delaware computer repair shop, handed over a damaged laptop, completely forgot about it afterward, and then somehow the computer dude and/or allies decided that Donald Trump ratf–ker Rudy freaking Giuliani was the person he needed to deliver the laptop’s data to, dozens of other oddities piled on top of that begin to turn what started out as farce into a full three-ring circus of weird.
Marcy’s post is, as usual, worth reading in full, but here’s the shortest version of it: Quite a lot of evidence suggests that in 2018 or 2019, Hunter Biden was the target of a successful phish or other hack that gave an outside party access to his iCloud account, his email accounts, and other data.
Of special note is a window of time during which Hunter was receiving addiction treatment (from the disgraced ex-Fox News talking head Dr. Keith Ablow, no less, just to put a nearly cartoonish spin on all this yet again) and appears to have had “limited” online communications. Despite those limited communications, somebody was using this period of time to make a hell of a lot of technical changes to Hunter’s iCloud and email accounts, including:
- Changed the password and related phone numbers to his rhb iCloud account
- Installed and gave full access to his droidhunter gmail account a real app, called Hunter, that can send email on someone else’s behalf
- Signed into that droidhunter account using a new device
- Again changed emails and phone numbers associated with his rhb account
- Asked for a full copy of his rhbdc iCloud account
- Reset the password of that rhbdc iCloud account
- Made droidhunter account the notification email for the rhbdc account
- Downloaded all Hunter’s Apple Store purchases
…
- Signed into the droidhunter account from a burner phone
- Restored the prior trusted phone number
- Added software that could record calls
- Started erasing and then locked a laptop — probably the one that would eventually end up in Mac Isaac’s store
The list goes on, but the changes line up almost precisely with what you’d see in the aftermath of a successful phishing attack or other security breach. Passwords and security-related phone numbers were changed, access was granted to additional devices and burner phones, there was a “full copy” made of his iCloud account, some spyware or spyware-adjacent new tools were installed, and after a full data dump was made, some of the security changes were reverted so as to obfuscate what had just gone on.
The emails from Hunter around this time period don’t suggest a man deep in the weeds of tweaking his own online security details, to put it mildly, so we’re left wondering just who was doing all this fiddling.
The sheer number should have raised alarms that people had broken into Hunter Biden’s iCloud accounts when the IRS asked Apple for Hunter Biden’s subscriber information in November 2019, in advance of writing a subpoena for the laptop in custody of John Paul Mac Isaac. Additionally, there were a bunch of attempts to get into Hunter Biden’s Venmo account, and the account added two new Remembered Devices within 12 minutes of each other in August 2018, one in the LA foothills and the other in Las Vegas. That and other details (including texts and emails) might have raised questions about whether sex workers from the very same escort service on which the IRS had predicated this entire investigation took steps to compromise Hunter Biden’s devices.
A bunch of media outlets have previously breathlessly reported that the laptop had been “verified” as belonging to Hunter Biden while simultaneously fudging what that means. It means that the laptop, or at least its alleged hard drive, does indeed contain data from Hunter’s email and iCloud accounts. There’s another obvious scenario, though, and that’s the exact hack-and-dump scheme that the FBI was warning Twitter and Facebook off of before the New York Post reported its original scoop revealing the alleged existence of the laptop.
Government disinformation specialists were warning, in the wake of Giuliani’s already exposed anti-Biden ratfucking efforts based in part on hoaxes pushed by pro-Russian interests (see: Trump’s impeachment, as in the first one and not the second one) that foreign disinformation aimed at bending the 2020 elections was still prevalent. Counterintelligence specialists were on watch, especially after Russian agents successfully hacked into the Democratic National Committee and Hillary Clinton’s presidential campaigns in 2016, “dumping” the stolen information through multiple entities in an attempt to boost Trump’s chances of winning.
What we have in the Hunter laptop case appears to be an uncannily similar series of events. Hunter’s email, iCloud, Venmo, and other accounts appear to have been breached in 2018 and 2019. His data was copied, spyware was installed, and cursory attempts to cover up the breach were made.
And then, lo and behold, a laptop containing a copy of that data—one that showed clear evidence of the data being tampered with—gets dumped at a computer repair shop, never to be picked up again, while a copy of its data somehow makes it to Giuliani.
The only thing that would make all of this sketchier than it already is? A bizarre Russian link—and the joke’s on you if you thought there wouldn’t be one because weirdly, very very weirdly, the escort service suspected of possibly being an origin point for hacks of Hunter’s Venmo account appears to be tied to Russia.
Marcy’s careful to leave out speculation beyond what seems obvious: The activity surrounding Hunter’s online accounts seems to strongly suggest hackers successfully breached his accounts well before the laptop ever materialized. But we can speculate where she didn’t: Was this yet another hack-and-dump operation aimed, quite specifically, at damaging Trump’s election opponent?
How do we explain Giuliani’s front-and-center appearance here?
From the beginning, few news outlets besides the New York Post were willing to touch this story because from the computer repairman himself to the specifics of what was allegedly found and how, all of it looked like a hack and dump. Republicans have bellowed in outrage at how little traction the story is getting in the media even now that the data is supposedly “confirmed” to be Hunter’s. But that’s not surprising either; it’s almost certainly the result of criminal hacking.
Oh, and there also hasn’t been much found on the laptop that wasn’t already known: Hunter Biden has suffered through addiction, has spent substantial cash on drugs and sex workers, and has muddled through his troubled life slightly better than most addicts might due to his perceived closeness to his well-connected father. But it would be a hell of a thing if this episode turned out to be exactly the Giuliani-assisted foreign operation it appeared to be from the moment the New York Post wrote it up.