Justice Department Seizes 32 Russian-Linked Domains in Election Interference Crackdown
The Justice Department announced the ongoing seizure of 32 internet domains allegedly used by Russian government-directed entities for malign influence campaigns, commonly known as “Doppelganger.” These actions are in violation of U.S. money laundering and criminal trademark laws. The domains were reportedly used to spread propaganda aiming to reduce international support for Ukraine, promote pro-Russian policies, and influence voters in the U.S. and other countries, including the upcoming 2024 U.S. Presidential Election.
Entities involved in this operation include the Social Design Agency (SDA), Structura National Technology (Structura), and ANO Dialog, all operating under the directive of the Russian Presidential Administration. Specifically, First Deputy Chief of Staff Sergei Vladilenovich Kiriyenko is named as a key figure in these activities.
In a coordinated response, the U.S. Treasury Department also announced the designation of 10 individuals and two entities involved in the influence efforts. This follows a previous designation of actors involved in the Doppelganger campaign announced by the Treasury Department in March.
“The Justice Department is seizing 32 internet domains that the Russian government and Russian government-sponsored actors have used to engage in a covert campaign to interfere in and influence the outcome of our country’s elections,” said Attorney General Merrick B. Garland. “As alleged in our court filings, President Vladimir Putin’s inner circle, including Sergei Kiriyenko, directed Russian public relations companies to promote disinformation and state-sponsored narratives as part of a campaign to influence the 2024 U.S. Presidential Election.”
Deputy Attorney General Lisa Monaco emphasized the ongoing threat, stating, “The Department’s seizure of 32 internet domains secretly deployed to spread foreign malign influence demonstrates once again that Russia remains a predominant foreign threat to our elections.”
FBI Director Christopher Wray highlighted the technological sophistication of these efforts: “Today’s announcement exposes the scope of the Russian government’s influence operations and their reliance on cutting-edge AI to sow disinformation.”
Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division added, “This seizure illustrates vividly what the U.S. government and private sector partners have warned for months: the Russian government and its proxies are aggressively accelerating the Kremlin’s covert efforts to seed false stories and amplify disinformation directed at the American public.”
U.S. Attorney Jacqueline C. Romero for the Eastern District of Pennsylvania commented on the broader implications: “Protecting our democratic processes from foreign malign influence is paramount to ensure enduring public trust.”
The propaganda campaigns did not identify their Russian origins, instead using “cybersquatted” domains to mimic legitimate news websites. For example, domains like washingtonpost.pm were created to look like washingtonpost.com. These domains were used to publish Russian government messaging falsely presented as content from legitimate media organizations.
Overview
The affidavit details various internal strategy meetings and project proposals. Notable projects include:
- Good Old USA Project: Attachments 8A, 8B
- The Guerilla Media Campaign: Attachments 9A, 9B
- U.S. Social Media Influencers Network Project: Attachments 10A, 10B
Beyond the United States, these influence campaigns also targeted audiences in Germany, Mexico, and Israel, aiming to sway public opinion in favor of Russian objectives and undermine U.S. relationships with these countries.
The use of U.S.-based domains for these activities, directed by sanctioned individuals, violates the International Emergency Economic Powers Act (IEEPA) and involves federal money laundering and criminal trademark violations.
The FBI Philadelphia Field Office is leading the investigation. The case is being prosecuted by the U.S. Attorney’s Office for the Eastern District of Pennsylvania, the National Security Division’s Counterintelligence and Export Control Section, and the National Security Cyber Section, with assistance from the Criminal Division’s Computer Crime and Intellectual Property Section.



