Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure?

Opinion by Annie Machon (pictured)

The Democratic National Committee (DNC) of the USA has been hacked – cue a national American trauma, allegations of dirty tricks, fears that democracy has been subverted, all leading to what the next US president would call “our long national nightmare”.

But, no, I am not talking about the current Russo-phobic hysteria currently engulfing the US media, replete with claims about “fake news”, expelled Russian diplomats, and a lack of skepticism about the evidence-lite hacking allegations.

Instead I am dipping back into history – the old Watergate Scandal – when Richard Nixon’s “plumbers” stole information the old-fashioned way; they broke into the DNC offices, rifled the files and planted listening devices. On 17 June 1972, when police captured five burglars inside the DNC offices at the Watergate building in Washington, the case slowly unfolded over the next two years until President Nixon resigned on 9 August 1974, and was replaced by Vice President Gerald Ford who declared “our long national nightmare is over”.

During those two years, The Washington Post became internationally and justifiably famous for breaking the story about Richard Nixon’s role in the Watergate cover-up and – since then – generations of cub reporters have dreamed of being the next Woodward or Bernstein. Besides leading to the downfall of the mendacious and paranoid Nixon, the scandal contributed to the reining in of an out-of-control intelligence establishment culminating in the Church Committee hearings of 1975.

What followed was greater, if unfortunately temporary, control of the US intelligence agencies and at least an apparent respect for the rights of American citizens under the terms of the US Constitution. The work of The Washington Post then was indeed relevant and world changing.

The film depiction of the Post’s investigation – All the President’s Men – celebrated this exposé and confirmed in Western minds that our wonderful free press spoke truth to power.  And perhaps, in this case, the press did (although I have to say that I preferred the meltdown scene in the prophetic film The Network, which envisioned the slide of the news media into ratings-driven madness).

But – regarding The Washington Post – how the mighty have fallen. Over the last couple of months, The Post has blown what was left of its journalistic reputation out of the water.

First it unblushingly reported the PropOrNot “blacklist” of “fake news” internet sites that were allegedly working at the Kremlin’s command to swing the US election to Donald Trump, except that list encompassed many of the most reputable independent (ie not US corporate-owned) English-language international news sites. Threatened with angry writs from some of the sites, the paper quickly printed a disclaimer distancing itself from the anonymous people behind PropOrNot, but still not apologising for the McCarthyistic smear.

Then, last Friday, the paper was at it again – breathlessly reporting that the Vermont energy grid was apparently hacked by the scapegoat du jour, Russia. Although there should have been some obvious questions asked: why Vermont?  What has that state ever done to Russia? Well, not much as it turns out; nor Russia to Vermont.

Yet again the Post has revised its reporting down to the fact that a laptop, completely unconnected to the grid according to the energy provider’s statement, had been infected by malware. In other words, there was no Russian hacking into the Vermont power grid.

And yet, because it’s The Washington Post, this fake breaking “news” was taken seriously and metastasised through the body politic of America and beyond. This Russian hacking became a “post-truth” reality, no matter how fact-free the original story. (I hereby propose a #factfreediet for us all on Twitter for January, so we can highlight this phenomenon.)

But here is the obvious next questions: why did this non-story appear in The Washington Post and why now? He the paper suddenly fallen prey to a revamped Operation Mockingbird, its editorial stuffed to the gills with CIA agents of influence?

As I have written before, the CIA and its associates within the Deep State appear to be hell bent on undermining the legitimacy of the Trump election result and this hyping of Russian hacking is one of the key weapons in this struggle. So perhaps the Deep State players are (re)activating a few agents of influence in the mainstream American media?

But there may possibly be a more tangential explanation for The Washington Post’s plunge into fiction: Jeff Bezos, the founder of Amazon.com and one of the wealthiest people in the world. Amazon is not only the favourite purveyor of all goods online, but also suspected (at least in the UK) of massive tax avoidance scams as well as abusive employment practices in the same country.

Bezos is also, since 2013, the proud owner of The Washington Post, a purchase that heralded his unexpected business swerve into the old mainstream media. The deal to buy the newspaper was reported in the business press to have cost him $250 million.

Interestingly in the same year Amazon cut a deal to develop a cloud-based service for the CIA – a deal worth a reported $600 million over ten years. It also appears that this service has expanded across all 17 of America’s intelligence agencies, so who can tell what it might be worth to Amazon now and in the future?

It is no doubt just an interesting coincidence that the Bezos-owned Washington Post is the fount of the current stream of CIA assertions that the Russians are hacking key USA institutions, starting with the DNC – which then somehow became “hacking the election” – and now the utility grid. Bezos himself has asserted that he exerts no direct control over the editorial decisions of the newspaper, and he has left in place many of the neoconservative editors who preceded his stewardship, so there may not be any need for direct orders.

Of course, all state-level players, including the Russians and certainly the Americans, are going to be probing the basic systems underpinning all our countries for vulnerabilities.  That is what intelligence agencies do, and it is also what mercenary spy companies do on behalf of their corporate clients, and what hackers (either of the criminal flavour or the socially-minded hacktivists) do too. The dodgy malware, the code, the vulnerabilities are all out there, often for sale or squirrelled away by the national spy agencies for potential future advantage.

Whatever the truth about the DNC hacking allegations, The Washington Post sadly seems uninterested in properly pursuing it – indeed it seems interested in little beyond pursuing the specific political agenda of fanning a dangerous distrust of Russia and undermining the legitimacy of the President-elect Trump.

If such a compliant corporate culture had existed back in 1972 at the time of the first DNC “hack”, the Watergate Scandal would surely never have been exposed. And the old media still wonders why it is no longer trusted?

Annie Machon is a former intelligence officer for MI5, the UK Security Service.  She is now a public speaker, writer, media pundit and political campaigner. She is also the European Director of LEAP.

Annie Machon
 

 

« CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics
Propaganda & Bias In Social Media News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Phosphorus Cybersecurity

Phosphorus Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.