Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure?

Opinion by Annie Machon (pictured)

The Democratic National Committee (DNC) of the USA has been hacked – cue a national American trauma, allegations of dirty tricks, fears that democracy has been subverted, all leading to what the next US president would call “our long national nightmare”.

But, no, I am not talking about the current Russo-phobic hysteria currently engulfing the US media, replete with claims about “fake news”, expelled Russian diplomats, and a lack of skepticism about the evidence-lite hacking allegations.

Instead I am dipping back into history – the old Watergate Scandal – when Richard Nixon’s “plumbers” stole information the old-fashioned way; they broke into the DNC offices, rifled the files and planted listening devices. On 17 June 1972, when police captured five burglars inside the DNC offices at the Watergate building in Washington, the case slowly unfolded over the next two years until President Nixon resigned on 9 August 1974, and was replaced by Vice President Gerald Ford who declared “our long national nightmare is over”.

During those two years, The Washington Post became internationally and justifiably famous for breaking the story about Richard Nixon’s role in the Watergate cover-up and – since then – generations of cub reporters have dreamed of being the next Woodward or Bernstein. Besides leading to the downfall of the mendacious and paranoid Nixon, the scandal contributed to the reining in of an out-of-control intelligence establishment culminating in the Church Committee hearings of 1975.

What followed was greater, if unfortunately temporary, control of the US intelligence agencies and at least an apparent respect for the rights of American citizens under the terms of the US Constitution. The work of The Washington Post then was indeed relevant and world changing.

The film depiction of the Post’s investigation – All the President’s Men – celebrated this exposé and confirmed in Western minds that our wonderful free press spoke truth to power.  And perhaps, in this case, the press did (although I have to say that I preferred the meltdown scene in the prophetic film The Network, which envisioned the slide of the news media into ratings-driven madness).

But – regarding The Washington Post – how the mighty have fallen. Over the last couple of months, The Post has blown what was left of its journalistic reputation out of the water.

First it unblushingly reported the PropOrNot “blacklist” of “fake news” internet sites that were allegedly working at the Kremlin’s command to swing the US election to Donald Trump, except that list encompassed many of the most reputable independent (ie not US corporate-owned) English-language international news sites. Threatened with angry writs from some of the sites, the paper quickly printed a disclaimer distancing itself from the anonymous people behind PropOrNot, but still not apologising for the McCarthyistic smear.

Then, last Friday, the paper was at it again – breathlessly reporting that the Vermont energy grid was apparently hacked by the scapegoat du jour, Russia. Although there should have been some obvious questions asked: why Vermont?  What has that state ever done to Russia? Well, not much as it turns out; nor Russia to Vermont.

Yet again the Post has revised its reporting down to the fact that a laptop, completely unconnected to the grid according to the energy provider’s statement, had been infected by malware. In other words, there was no Russian hacking into the Vermont power grid.

And yet, because it’s The Washington Post, this fake breaking “news” was taken seriously and metastasised through the body politic of America and beyond. This Russian hacking became a “post-truth” reality, no matter how fact-free the original story. (I hereby propose a #factfreediet for us all on Twitter for January, so we can highlight this phenomenon.)

But here is the obvious next questions: why did this non-story appear in The Washington Post and why now? He the paper suddenly fallen prey to a revamped Operation Mockingbird, its editorial stuffed to the gills with CIA agents of influence?

As I have written before, the CIA and its associates within the Deep State appear to be hell bent on undermining the legitimacy of the Trump election result and this hyping of Russian hacking is one of the key weapons in this struggle. So perhaps the Deep State players are (re)activating a few agents of influence in the mainstream American media?

But there may possibly be a more tangential explanation for The Washington Post’s plunge into fiction: Jeff Bezos, the founder of Amazon.com and one of the wealthiest people in the world. Amazon is not only the favourite purveyor of all goods online, but also suspected (at least in the UK) of massive tax avoidance scams as well as abusive employment practices in the same country.

Bezos is also, since 2013, the proud owner of The Washington Post, a purchase that heralded his unexpected business swerve into the old mainstream media. The deal to buy the newspaper was reported in the business press to have cost him $250 million.

Interestingly in the same year Amazon cut a deal to develop a cloud-based service for the CIA – a deal worth a reported $600 million over ten years. It also appears that this service has expanded across all 17 of America’s intelligence agencies, so who can tell what it might be worth to Amazon now and in the future?

It is no doubt just an interesting coincidence that the Bezos-owned Washington Post is the fount of the current stream of CIA assertions that the Russians are hacking key USA institutions, starting with the DNC – which then somehow became “hacking the election” – and now the utility grid. Bezos himself has asserted that he exerts no direct control over the editorial decisions of the newspaper, and he has left in place many of the neoconservative editors who preceded his stewardship, so there may not be any need for direct orders.

Of course, all state-level players, including the Russians and certainly the Americans, are going to be probing the basic systems underpinning all our countries for vulnerabilities.  That is what intelligence agencies do, and it is also what mercenary spy companies do on behalf of their corporate clients, and what hackers (either of the criminal flavour or the socially-minded hacktivists) do too. The dodgy malware, the code, the vulnerabilities are all out there, often for sale or squirrelled away by the national spy agencies for potential future advantage.

Whatever the truth about the DNC hacking allegations, The Washington Post sadly seems uninterested in properly pursuing it – indeed it seems interested in little beyond pursuing the specific political agenda of fanning a dangerous distrust of Russia and undermining the legitimacy of the President-elect Trump.

If such a compliant corporate culture had existed back in 1972 at the time of the first DNC “hack”, the Watergate Scandal would surely never have been exposed. And the old media still wonders why it is no longer trusted?

Annie Machon is a former intelligence officer for MI5, the UK Security Service.  She is now a public speaker, writer, media pundit and political campaigner. She is also the European Director of LEAP.

Annie Machon
 

 

« CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics
Propaganda & Bias In Social Media News »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Sprinto

Sprinto

Ambitious tech companies all over the world trust Sprinto to power their security compliance programs and sprint through audits without breaking their stride.