Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure?

Opinion by Annie Machon (pictured)

The Democratic National Committee (DNC) of the USA has been hacked – cue a national American trauma, allegations of dirty tricks, fears that democracy has been subverted, all leading to what the next US president would call “our long national nightmare”.

But, no, I am not talking about the current Russo-phobic hysteria currently engulfing the US media, replete with claims about “fake news”, expelled Russian diplomats, and a lack of skepticism about the evidence-lite hacking allegations.

Instead I am dipping back into history – the old Watergate Scandal – when Richard Nixon’s “plumbers” stole information the old-fashioned way; they broke into the DNC offices, rifled the files and planted listening devices. On 17 June 1972, when police captured five burglars inside the DNC offices at the Watergate building in Washington, the case slowly unfolded over the next two years until President Nixon resigned on 9 August 1974, and was replaced by Vice President Gerald Ford who declared “our long national nightmare is over”.

During those two years, The Washington Post became internationally and justifiably famous for breaking the story about Richard Nixon’s role in the Watergate cover-up and – since then – generations of cub reporters have dreamed of being the next Woodward or Bernstein. Besides leading to the downfall of the mendacious and paranoid Nixon, the scandal contributed to the reining in of an out-of-control intelligence establishment culminating in the Church Committee hearings of 1975.

What followed was greater, if unfortunately temporary, control of the US intelligence agencies and at least an apparent respect for the rights of American citizens under the terms of the US Constitution. The work of The Washington Post then was indeed relevant and world changing.

The film depiction of the Post’s investigation – All the President’s Men – celebrated this exposé and confirmed in Western minds that our wonderful free press spoke truth to power.  And perhaps, in this case, the press did (although I have to say that I preferred the meltdown scene in the prophetic film The Network, which envisioned the slide of the news media into ratings-driven madness).

But – regarding The Washington Post – how the mighty have fallen. Over the last couple of months, The Post has blown what was left of its journalistic reputation out of the water.

First it unblushingly reported the PropOrNot “blacklist” of “fake news” internet sites that were allegedly working at the Kremlin’s command to swing the US election to Donald Trump, except that list encompassed many of the most reputable independent (ie not US corporate-owned) English-language international news sites. Threatened with angry writs from some of the sites, the paper quickly printed a disclaimer distancing itself from the anonymous people behind PropOrNot, but still not apologising for the McCarthyistic smear.

Then, last Friday, the paper was at it again – breathlessly reporting that the Vermont energy grid was apparently hacked by the scapegoat du jour, Russia. Although there should have been some obvious questions asked: why Vermont?  What has that state ever done to Russia? Well, not much as it turns out; nor Russia to Vermont.

Yet again the Post has revised its reporting down to the fact that a laptop, completely unconnected to the grid according to the energy provider’s statement, had been infected by malware. In other words, there was no Russian hacking into the Vermont power grid.

And yet, because it’s The Washington Post, this fake breaking “news” was taken seriously and metastasised through the body politic of America and beyond. This Russian hacking became a “post-truth” reality, no matter how fact-free the original story. (I hereby propose a #factfreediet for us all on Twitter for January, so we can highlight this phenomenon.)

But here is the obvious next questions: why did this non-story appear in The Washington Post and why now? He the paper suddenly fallen prey to a revamped Operation Mockingbird, its editorial stuffed to the gills with CIA agents of influence?

As I have written before, the CIA and its associates within the Deep State appear to be hell bent on undermining the legitimacy of the Trump election result and this hyping of Russian hacking is one of the key weapons in this struggle. So perhaps the Deep State players are (re)activating a few agents of influence in the mainstream American media?

But there may possibly be a more tangential explanation for The Washington Post’s plunge into fiction: Jeff Bezos, the founder of Amazon.com and one of the wealthiest people in the world. Amazon is not only the favourite purveyor of all goods online, but also suspected (at least in the UK) of massive tax avoidance scams as well as abusive employment practices in the same country.

Bezos is also, since 2013, the proud owner of The Washington Post, a purchase that heralded his unexpected business swerve into the old mainstream media. The deal to buy the newspaper was reported in the business press to have cost him $250 million.

Interestingly in the same year Amazon cut a deal to develop a cloud-based service for the CIA – a deal worth a reported $600 million over ten years. It also appears that this service has expanded across all 17 of America’s intelligence agencies, so who can tell what it might be worth to Amazon now and in the future?

It is no doubt just an interesting coincidence that the Bezos-owned Washington Post is the fount of the current stream of CIA assertions that the Russians are hacking key USA institutions, starting with the DNC – which then somehow became “hacking the election” – and now the utility grid. Bezos himself has asserted that he exerts no direct control over the editorial decisions of the newspaper, and he has left in place many of the neoconservative editors who preceded his stewardship, so there may not be any need for direct orders.

Of course, all state-level players, including the Russians and certainly the Americans, are going to be probing the basic systems underpinning all our countries for vulnerabilities.  That is what intelligence agencies do, and it is also what mercenary spy companies do on behalf of their corporate clients, and what hackers (either of the criminal flavour or the socially-minded hacktivists) do too. The dodgy malware, the code, the vulnerabilities are all out there, often for sale or squirrelled away by the national spy agencies for potential future advantage.

Whatever the truth about the DNC hacking allegations, The Washington Post sadly seems uninterested in properly pursuing it – indeed it seems interested in little beyond pursuing the specific political agenda of fanning a dangerous distrust of Russia and undermining the legitimacy of the President-elect Trump.

If such a compliant corporate culture had existed back in 1972 at the time of the first DNC “hack”, the Watergate Scandal would surely never have been exposed. And the old media still wonders why it is no longer trusted?

Annie Machon is a former intelligence officer for MI5, the UK Security Service.  She is now a public speaker, writer, media pundit and political campaigner. She is also the European Director of LEAP.

Annie Machon
 

 

« CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics
Propaganda & Bias In Social Media News »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

SpoofGuard

SpoofGuard

Spoofguard shields organizations from online scams, automating the entire process from domain monitoring to takedown enforcement.