Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure?

Opinion by Annie Machon (pictured)

The Democratic National Committee (DNC) of the USA has been hacked – cue a national American trauma, allegations of dirty tricks, fears that democracy has been subverted, all leading to what the next US president would call “our long national nightmare”.

But, no, I am not talking about the current Russo-phobic hysteria currently engulfing the US media, replete with claims about “fake news”, expelled Russian diplomats, and a lack of skepticism about the evidence-lite hacking allegations.

Instead I am dipping back into history – the old Watergate Scandal – when Richard Nixon’s “plumbers” stole information the old-fashioned way; they broke into the DNC offices, rifled the files and planted listening devices. On 17 June 1972, when police captured five burglars inside the DNC offices at the Watergate building in Washington, the case slowly unfolded over the next two years until President Nixon resigned on 9 August 1974, and was replaced by Vice President Gerald Ford who declared “our long national nightmare is over”.

During those two years, The Washington Post became internationally and justifiably famous for breaking the story about Richard Nixon’s role in the Watergate cover-up and – since then – generations of cub reporters have dreamed of being the next Woodward or Bernstein. Besides leading to the downfall of the mendacious and paranoid Nixon, the scandal contributed to the reining in of an out-of-control intelligence establishment culminating in the Church Committee hearings of 1975.

What followed was greater, if unfortunately temporary, control of the US intelligence agencies and at least an apparent respect for the rights of American citizens under the terms of the US Constitution. The work of The Washington Post then was indeed relevant and world changing.

The film depiction of the Post’s investigation – All the President’s Men – celebrated this exposé and confirmed in Western minds that our wonderful free press spoke truth to power.  And perhaps, in this case, the press did (although I have to say that I preferred the meltdown scene in the prophetic film The Network, which envisioned the slide of the news media into ratings-driven madness).

But – regarding The Washington Post – how the mighty have fallen. Over the last couple of months, The Post has blown what was left of its journalistic reputation out of the water.

First it unblushingly reported the PropOrNot “blacklist” of “fake news” internet sites that were allegedly working at the Kremlin’s command to swing the US election to Donald Trump, except that list encompassed many of the most reputable independent (ie not US corporate-owned) English-language international news sites. Threatened with angry writs from some of the sites, the paper quickly printed a disclaimer distancing itself from the anonymous people behind PropOrNot, but still not apologising for the McCarthyistic smear.

Then, last Friday, the paper was at it again – breathlessly reporting that the Vermont energy grid was apparently hacked by the scapegoat du jour, Russia. Although there should have been some obvious questions asked: why Vermont?  What has that state ever done to Russia? Well, not much as it turns out; nor Russia to Vermont.

Yet again the Post has revised its reporting down to the fact that a laptop, completely unconnected to the grid according to the energy provider’s statement, had been infected by malware. In other words, there was no Russian hacking into the Vermont power grid.

And yet, because it’s The Washington Post, this fake breaking “news” was taken seriously and metastasised through the body politic of America and beyond. This Russian hacking became a “post-truth” reality, no matter how fact-free the original story. (I hereby propose a #factfreediet for us all on Twitter for January, so we can highlight this phenomenon.)

But here is the obvious next questions: why did this non-story appear in The Washington Post and why now? He the paper suddenly fallen prey to a revamped Operation Mockingbird, its editorial stuffed to the gills with CIA agents of influence?

As I have written before, the CIA and its associates within the Deep State appear to be hell bent on undermining the legitimacy of the Trump election result and this hyping of Russian hacking is one of the key weapons in this struggle. So perhaps the Deep State players are (re)activating a few agents of influence in the mainstream American media?

But there may possibly be a more tangential explanation for The Washington Post’s plunge into fiction: Jeff Bezos, the founder of Amazon.com and one of the wealthiest people in the world. Amazon is not only the favourite purveyor of all goods online, but also suspected (at least in the UK) of massive tax avoidance scams as well as abusive employment practices in the same country.

Bezos is also, since 2013, the proud owner of The Washington Post, a purchase that heralded his unexpected business swerve into the old mainstream media. The deal to buy the newspaper was reported in the business press to have cost him $250 million.

Interestingly in the same year Amazon cut a deal to develop a cloud-based service for the CIA – a deal worth a reported $600 million over ten years. It also appears that this service has expanded across all 17 of America’s intelligence agencies, so who can tell what it might be worth to Amazon now and in the future?

It is no doubt just an interesting coincidence that the Bezos-owned Washington Post is the fount of the current stream of CIA assertions that the Russians are hacking key USA institutions, starting with the DNC – which then somehow became “hacking the election” – and now the utility grid. Bezos himself has asserted that he exerts no direct control over the editorial decisions of the newspaper, and he has left in place many of the neoconservative editors who preceded his stewardship, so there may not be any need for direct orders.

Of course, all state-level players, including the Russians and certainly the Americans, are going to be probing the basic systems underpinning all our countries for vulnerabilities.  That is what intelligence agencies do, and it is also what mercenary spy companies do on behalf of their corporate clients, and what hackers (either of the criminal flavour or the socially-minded hacktivists) do too. The dodgy malware, the code, the vulnerabilities are all out there, often for sale or squirrelled away by the national spy agencies for potential future advantage.

Whatever the truth about the DNC hacking allegations, The Washington Post sadly seems uninterested in properly pursuing it – indeed it seems interested in little beyond pursuing the specific political agenda of fanning a dangerous distrust of Russia and undermining the legitimacy of the President-elect Trump.

If such a compliant corporate culture had existed back in 1972 at the time of the first DNC “hack”, the Watergate Scandal would surely never have been exposed. And the old media still wonders why it is no longer trusted?

Annie Machon is a former intelligence officer for MI5, the UK Security Service.  She is now a public speaker, writer, media pundit and political campaigner. She is also the European Director of LEAP.

Annie Machon
 

 

« CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics
Propaganda & Bias In Social Media News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.