Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure?

Opinion by Annie Machon (pictured)

The Democratic National Committee (DNC) of the USA has been hacked – cue a national American trauma, allegations of dirty tricks, fears that democracy has been subverted, all leading to what the next US president would call “our long national nightmare”.

But, no, I am not talking about the current Russo-phobic hysteria currently engulfing the US media, replete with claims about “fake news”, expelled Russian diplomats, and a lack of skepticism about the evidence-lite hacking allegations.

Instead I am dipping back into history – the old Watergate Scandal – when Richard Nixon’s “plumbers” stole information the old-fashioned way; they broke into the DNC offices, rifled the files and planted listening devices. On 17 June 1972, when police captured five burglars inside the DNC offices at the Watergate building in Washington, the case slowly unfolded over the next two years until President Nixon resigned on 9 August 1974, and was replaced by Vice President Gerald Ford who declared “our long national nightmare is over”.

During those two years, The Washington Post became internationally and justifiably famous for breaking the story about Richard Nixon’s role in the Watergate cover-up and – since then – generations of cub reporters have dreamed of being the next Woodward or Bernstein. Besides leading to the downfall of the mendacious and paranoid Nixon, the scandal contributed to the reining in of an out-of-control intelligence establishment culminating in the Church Committee hearings of 1975.

What followed was greater, if unfortunately temporary, control of the US intelligence agencies and at least an apparent respect for the rights of American citizens under the terms of the US Constitution. The work of The Washington Post then was indeed relevant and world changing.

The film depiction of the Post’s investigation – All the President’s Men – celebrated this exposé and confirmed in Western minds that our wonderful free press spoke truth to power.  And perhaps, in this case, the press did (although I have to say that I preferred the meltdown scene in the prophetic film The Network, which envisioned the slide of the news media into ratings-driven madness).

But – regarding The Washington Post – how the mighty have fallen. Over the last couple of months, The Post has blown what was left of its journalistic reputation out of the water.

First it unblushingly reported the PropOrNot “blacklist” of “fake news” internet sites that were allegedly working at the Kremlin’s command to swing the US election to Donald Trump, except that list encompassed many of the most reputable independent (ie not US corporate-owned) English-language international news sites. Threatened with angry writs from some of the sites, the paper quickly printed a disclaimer distancing itself from the anonymous people behind PropOrNot, but still not apologising for the McCarthyistic smear.

Then, last Friday, the paper was at it again – breathlessly reporting that the Vermont energy grid was apparently hacked by the scapegoat du jour, Russia. Although there should have been some obvious questions asked: why Vermont?  What has that state ever done to Russia? Well, not much as it turns out; nor Russia to Vermont.

Yet again the Post has revised its reporting down to the fact that a laptop, completely unconnected to the grid according to the energy provider’s statement, had been infected by malware. In other words, there was no Russian hacking into the Vermont power grid.

And yet, because it’s The Washington Post, this fake breaking “news” was taken seriously and metastasised through the body politic of America and beyond. This Russian hacking became a “post-truth” reality, no matter how fact-free the original story. (I hereby propose a #factfreediet for us all on Twitter for January, so we can highlight this phenomenon.)

But here is the obvious next questions: why did this non-story appear in The Washington Post and why now? He the paper suddenly fallen prey to a revamped Operation Mockingbird, its editorial stuffed to the gills with CIA agents of influence?

As I have written before, the CIA and its associates within the Deep State appear to be hell bent on undermining the legitimacy of the Trump election result and this hyping of Russian hacking is one of the key weapons in this struggle. So perhaps the Deep State players are (re)activating a few agents of influence in the mainstream American media?

But there may possibly be a more tangential explanation for The Washington Post’s plunge into fiction: Jeff Bezos, the founder of Amazon.com and one of the wealthiest people in the world. Amazon is not only the favourite purveyor of all goods online, but also suspected (at least in the UK) of massive tax avoidance scams as well as abusive employment practices in the same country.

Bezos is also, since 2013, the proud owner of The Washington Post, a purchase that heralded his unexpected business swerve into the old mainstream media. The deal to buy the newspaper was reported in the business press to have cost him $250 million.

Interestingly in the same year Amazon cut a deal to develop a cloud-based service for the CIA – a deal worth a reported $600 million over ten years. It also appears that this service has expanded across all 17 of America’s intelligence agencies, so who can tell what it might be worth to Amazon now and in the future?

It is no doubt just an interesting coincidence that the Bezos-owned Washington Post is the fount of the current stream of CIA assertions that the Russians are hacking key USA institutions, starting with the DNC – which then somehow became “hacking the election” – and now the utility grid. Bezos himself has asserted that he exerts no direct control over the editorial decisions of the newspaper, and he has left in place many of the neoconservative editors who preceded his stewardship, so there may not be any need for direct orders.

Of course, all state-level players, including the Russians and certainly the Americans, are going to be probing the basic systems underpinning all our countries for vulnerabilities.  That is what intelligence agencies do, and it is also what mercenary spy companies do on behalf of their corporate clients, and what hackers (either of the criminal flavour or the socially-minded hacktivists) do too. The dodgy malware, the code, the vulnerabilities are all out there, often for sale or squirrelled away by the national spy agencies for potential future advantage.

Whatever the truth about the DNC hacking allegations, The Washington Post sadly seems uninterested in properly pursuing it – indeed it seems interested in little beyond pursuing the specific political agenda of fanning a dangerous distrust of Russia and undermining the legitimacy of the President-elect Trump.

If such a compliant corporate culture had existed back in 1972 at the time of the first DNC “hack”, the Watergate Scandal would surely never have been exposed. And the old media still wonders why it is no longer trusted?

Annie Machon is a former intelligence officer for MI5, the UK Security Service.  She is now a public speaker, writer, media pundit and political campaigner. She is also the European Director of LEAP.

Annie Machon
 

 

« CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics
Propaganda & Bias In Social Media News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.