Experts who suspect Russian involvement say that how thoroughly the leakers covered their trail suggests a professional, deliberate scheme. Whoever was behind the operation used an array of burner email accounts and virtual phone numbers, unusual behavior that further lines up with past Russian efforts, government officials and independent researchers told Reuters.