The Spectacle of the False-Flag

Total Page:16

File Type:pdf, Size:1020Kb

The Spectacle of the False-Flag The Spectacle of the False-Flag THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS FROM JFK TO WATERGATE Eric Wilson THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS from JFK to WATERGATE Eric Wilson, Monash University 2015 http://creativecommons.org/licenses/by-nc-nd/4.0/ This work is Open Access, which means that you are free to copy, distribute, display, and perform the work as long as you clearly attribute the work to the author, that you do not use this work for commercial gain in any form whatsoever, and that you in no way, alter, transform, or build upon the work outside of its normal use in academic scholarship without express permission of the author and the publisher of this volume. For any reuse or distribution, you must make clear to others the license terms of this work. First published in 2015 by Thought | Crimes an imprint of punctumbooks.com ISBN-13: 978-0988234055 ISBN-10: 098823405X and the full book is available for download via our Open Monograph Press website (a Public Knowledge Project) at: www.thoughtcrimespress.org a project of the Critical Criminology Working Group, publishers of the Open Access Journal: Radical Criminology: journal.radicalcriminology.org Contact: Jeff Shantz (Editor), Dept. of Criminology, KPU 12666 72 Ave. Surrey, BC V3W 2M8 [ + design & open format publishing: pj lilley ] I dedicate this book to my Mother, who watched over me as I slept through the spectacle in Dallas on November 22, 1963 and who was there to celebrate my birthday with me during the spectacle at the Watergate Hotel on June 17, 1972 Contents Editor©s Preface ................................................................. i “On Parapolitics and a New Criminology” Jeff Shantz Foreword ........................................................................v “The New Politology of Eric Wilson” Guido Giacomo Preparata Acknowledgements ......................................................xvii Introduction ¼...............................................................1 1 | Parapolitics and Spectacular Power...........................7 Spectacular Power, Criminal Sovereignty, and Parapolitics, 11 Yankees and Cowboys, 20 2 | False Flag I: JFK / Dallas ¼.................................... 31 The Deep Event and Philosophical Denial, 29 ‘The Wilderness of Mirrors’: The Usual Suspects, 53 The Joint Chiefs of Staff A/ General Lymon L. Lemnitzer, 54 B/ General Edward G. Lansdale, 58 The Central Intelligence Agency, 62 A. Senior level Officers, 62 B. Middle level Officers, 63 C. Low Level Officers, 63 Cosa Nostra (a.k.a. ‘The Wise Guys’), 64 Anti-Castro Cubans, 68 Lee Harvey Oswald, 81 (I) Tracy Barnes, 91 (II) David Atlee Phillips /Maurice Bishop, 93 I | THE SPECTACLE OF THE FALSE-FLAG Addendum to Phillips: On the ‘Lords of Misrule’, 99 Oswald in Mexico City, 105 Addendum, Philo-Communists twisting the night away , 116 Oswald-as-Nomad , 124 The Cover-Up/Phase II, 127 3 | False Flag II: LBJ & the Gulf of Tonkin ................. 153 4 | False Flag III: Nixon/Watergate ¼.......................... 175 ‘This is a comedy of errors (=doubles)’, 178 Nixon/Watergate as integrated spectacle, 184 Bob Woodward: The Moorer-Radford Affair, 189 Deep Throat/W. Mark Felt, 193 Parapolitical Symmetries: JFK/Dallas and Nixon/Watergate, 200 ‘The whole Bay of Pigs thing…’, 207 5 | The Spectacle of Conspiracy ¼................................ 225 ‘Twice as big as you can imagine…’: 9/11, 221 The Situation of the Mass Media, 241 The Unknown Quantity (of a private criminality): LIBRA, 242 The Ultra-Idiocy of Naïve Realism: JFK, 254 Colonel X, Part One, 276 Colonel X, Part Two, 277 ‘What’s the dope on the Watergate?’: All the President’s Men, 278 6 | Conclusion ¼.............................................................. 301 Bibliography ¼.....................................¼............................ 305 About the Author ........................................................¼..... 319 Editor's Preface “On Parapolitics and a New Criminology” riminology is a strange discipline. For an area of C study focused overwhelmingly, obsessively even, on state activity, criminology has perhaps as much as any social science, outside of psychology, completely and utterly undertheorized the state. The character of the state is largely misunderstood or only slightly under­ stood within criminology (even as the criminology of figures like Pierre­Joseph Proudhon and Nicos Poulantzas, who wrote much on law and the state, re­ main mostly unread by criminologists). Too often the state is simply taken for granted without real critical analysis. It is accepted straightforwardly, unproblemati­ cally, as the legitimate social authority, the social arbitra­ tor. Where critical approaches to the state are pursued there has been a tendency toward instrumentality or uni­ formity in discussing and explaining state activities. That is, the state is typically portrayed as a rather direct expression of the repressive needs of capital as a whole. And this, again, is the case only in critical approaches in which the state is interrogated or even problematized at i II | THE SPECTACLE OF THE FALSE-FLAG all, most criminology taking the state, its legitimacy if not its neutrality, for granted. Philosophically inclined criminologists like Bruce Arri­ go have remarked on the underdeveloped nature of crimi­ nological theory in general. So this under­theorization of the state is part of a larger problem in criminology. Arrigo suggests a philosophical turn in criminology that could en­ gage with philosophical works, particularly the critical philosophies of the post­1968 period in social thought. For too much of criminology it is as if the waves of post­68 social theorizing (and associated contemporary develop­ ments) never happened. Thankfully we have trailblazers like Eric Wilson who on the one hand seek to broaden the theoretical and politi­ cal horizons of criminology while on the other giving a more nuanced and deeper reading of the state and the rela­ tions and practices that animate it. Wilson is too percep­ tive, his work too subtle to present a uniform view of the liberal democratic state. Wilson offers a presentation of state operations of power as conflictual, contradictory, competing, confused. His is a robust conception of power that is rarely encountered in criminology. Wilson goes outside the theoretical bounds of what is typically in criminological thought. He makes use of in­ sights from Guy Debord’s works on social spectacle to re­ read literature on deep state practice and its (spectacular) false flag representations. Wilson, following Debord, moves away from notions of static, uniform power. Wilson’s work, in addition to shifting thinking about the liberal democratic state, challenges us to rethink the subject(s) of criminology. This is a step, on one hand, to­ ward rethinking criminology as analysis of states and state criminality. More than that, it challenges us to move be­ EDITOR'S PREFACE | III yond analyses of the simple or naïve view of states. In a sense Wilson’s book in Spectacle(s) of the False Flag(s) is solidly in the tradition of C. Wright Mills works like The Power Elite and White Collar (other of­ ferings that are too little read by criminologists). In Mills’ work the hidden or shadow networks are present­ ed as the fabric of the modern state—always in action behind the screen (or wishful dream) of the formal democratic institutions of government. Mills work makes clear that ruling groups centered in the state often have driven interests—moving and shifting specific al­ liances as interests shift and specific players gain or lose influence. Criminology needs works like this to develop its fo­ cus on state relations, networks of (counter)governance. Criminology has a long way to go to be adequately or ef­ fectively attuned to deep state relations. Whether from critical or uncritical, heterodox or orthodox perspectives, our understandings of the state have, for the most part been too superficial, too shallow. In place of simple in­ strumentality we may speak of instrumentalities, often competing and contradictory if converging at important points. Clandestinity is the health of the state. Yet it is rarely understood or acknowledged as such. A critical criminol­ ogy, let alone a radical one, must offer more insightful, nuanced, informed readings of the complexities of the state as the object of crime par excellence. One can en­ vision future criminological undertakings that apply such parapolitical spectacular analyses to issues of state­ corporate crime, transnational crime, or security studies as only a few examples. In this understanding, criminali­ ty, far from being a distortion of state practice is the IV | THE SPECTACLE OF THE FALSE-FLAG character of state practice (with the state as fragmented and uneven). The current work is an important step along these paths. It offers an example for all of criminology to ap­ proach. It hints at the possibility of a new criminology, a parapolitical criminology that looks beyond the surface of the spectacle that has so hypnotized and distracted main­ stream and orthodox criminology. It is work that carries certain risks. Thus, a final note on conspiracy. Even the threat of being labeled conspiracy theory can dissuade serious researchers from pursuing top­ ics of great importance. This is, of course, partly how power operates to silence or defuse criticism. We know— intuitively—that conspiracies exist, yet we shrink from naming them as such. We need to conceptualize conspira­ cy not as strange, atypical event,
Recommended publications
  • Copyright by Nhu Quynh-Thuy Truong 2009
    Copyright by Nhu Quynh-Thuy Truong 2009 Renewing Political Legitimacy: Pragmatic Reforms and Doi Moi by Nhu Quynh-Thuy Truong, B.A. Thesis Presented to the Faculty of the Graduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Asian Studies The University of Texas at Austin May 2009 Renewing Political Legitimacy: Pragmatic Reforms and Doi Moi Approved by Supervising Committee: Abstract Renewing Political Legitimacy: Pragmatic Reforms and Doi Moi Nhu Quynh-Thuy Truong, M.A. The University of Texas at Austin, 2009 Supervisors: Huaiyin Li & William Hurst The Vietnamese Communist Party (VCP) first launched Doi Moi [Renovation] in 1986— 10 years after the VCP officially assumed power in 1976 of the Socialist Republics of Vietnam. As the VCP describes, Doi Moi is a comprehensive economic reform package with new initiatives toward building ―a mixed economy‖ that introduces ―market mechanism with state management and a socialist orientation‖ to Vietnam‘s economy. With Doi Moi, pragmatism has evidently taken center stage in place of dogmatic concerns for ideological correctness. The thesis seeks to first examine the conditions and factors that gave impetus for the economic reforms in Vietnam. These conditions and factors are especially evident when they are examined in a comparative context with the Soviet Union and China‘s experiences with similar reforms as they are done here in the thesis. Moreover, the change of orientation from a centrally planned economy to market-oriented economy is reflected in Doi Moi‘s decentralization and economic liberalization reforms as well as the VCP‘s opening up to international reintegration and reconciliation with namely the United States.
    [Show full text]
  • Sourcenotes 01-02.07
    Source Notes ABBREVIATIONS AFIP, Armed Forces Institute of Pathology ARRB, Assassination Records Review Board ARRB MD, Assassination Records Review Board, Medical Deposition ASAIC, assistant special agent-in-charge (Secret Service) CD, Warren Commission document CE, Warren Commission exhibit DA, district attorney DMA, Dallas Municipal Archives DOJ, Department of Justice DOJCD, Department of Justice, Criminal Division DPD, Dallas Police Department FOIA, Freedom of Information Act H, Warren Commission hearings and exhibits (volumes 1–15 are testimony; volumes 16–26 are exhibits) HPSCI, House Permanent Select Committee on Intelligence HSCA, House Select Committee on Assassinations JCS, Joint Chiefs of Staff LBJ, Lyndon Baines Johnson NARA, National Archives and Records Administration NAS-CBA, National Academy of Science’s Committee on Ballistic Acoustics NSA, National Security Agency ONI, Office of Naval Intelligence SA, special agent SAC, special agent-in-charge (FBI) SAIC, special agent-in-charge (Secret Service) SSCIA, Senate Select Committee on the CIA WC, Warren Commission WCT, Warren Commission testimony WR, Warren Report Z, Zapruder film 1 INTRODUCTION 1. Stephen Ambrose, quoted in John Broder, “Greatness in the Eye of the Beholder?” Los Angeles Times, November 22, 1993, pp.1, 10. 2. O’Donnell and Powers with McCarthy, Johnny, We Hardly Knew Ye, p.472. 3. Ambrose, quoted in Broder, “Greatness in the Eye of the Beholder?” Los Angeles Times, Novem- ber 22, 1993, pp.1, 10. 4. USA Today, November 22, 1993. 5. Dallas Morning News, November 17, 2003, p.14. 6. New York Times, November 4, 2004, p.4; Phillips, “Fat City,” p.49. 7. Ashley Powers, “The Mythical Man of Camelot,” Dallas Morning News, November 16, 2003, pp.1A, 18A.
    [Show full text]
  • What Is Counterintelligence? and How Lessons on Counterintelligence Might Enrich Their Courses
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com , E-mail: [email protected] Volume 20 • Number 2 • $15 single copy price Fall/Winter 2013 ©2013, AFIO measure what an adversary knows about us? How do we determine whether or not we are successful in keeping our secrets and projecting the image we wish Guide to the Study of Intelligence to project? How do we know what and whom to trust?3 This article is a short cut to some basic concepts about counterintelligence: what it is and is not. Educa- tors in history, government, political science, ethics, law and cognitive psychology should consider whether What is Counterintelligence? and how lessons on counterintelligence might enrich their courses. Recommended additional readings are suggested in the footnotes. A Guide to Thinking A general introductory course on U.S. counter- and Teaching about CI intelligence should have five key learning objectives: Understanding the meaning of counterintelli- gence, its place within intelligence studies, and by Michelle K. Van Cleave its role in international relations as an instrument of statecraft.4 Understanding the difference between tactical WHY STUDY COUNTERINTELLIGENCE? and strategic CI,5 the difference between CI and security,6 and the range of foreign intelligence he study of “counterintelligence” is rare in aca- 3. Consider for example the deception paradox: “Alertness to demia. While modern courses on international deception presumably prompts a more careful and systematic relations often include intelligence, they usually review of the evidence.
    [Show full text]
  • Chapter 48 – Creative Destructor
    Chapter 48 Creative destructor Starting in the late 19th century, when the Hall-Heroult electrolytic reduction process made it possible for aluminum to be produced as a commodity, aluminum companies began to consolidate and secure raw material sources. Alcoa led the way, acquiring and building hydroelectric facilities, bauxite mines, alumina refineries, aluminum smelters, fabricating plants and even advanced research laboratories to develop more efficient processing technologies and new products. The vertical integration model was similar to the organizing system used by petroleum companies, which explored and drilled for oil, built pipelines and ships to transport oil, owned refineries that turned oil into gasoline and other products, and even set up retail outlets around the world to sell their products. The global economy dramatically changed after World War II, as former colonies with raw materials needed by developed countries began to ask for a piece of the action. At the same time, more corporations with the financial and technical means to enter at least one phase of aluminum production began to compete in the marketplace. As the global Big 6 oligopoly became challenged on multiple fronts, a commodity broker with a Machiavellian philosophy and a natural instinct for deal- making smelled blood and started picking the system apart. Marc Rich began by taking advantage of the oil market, out-foxing the petroleum giants and making a killing during the energy crises of the 1970s. A long-time metals trader, Rich next eyed the weakened aluminum industry during the 1980s, when depressed demand and over-capacity collided with rising energy costs, according to Shawn Tully’s 1988 account in Fortune.
    [Show full text]
  • Living Under Drones Death, Injury, and Trauma to Civilians from US Drone Practices in Pakistan
    Fall 08 September 2012 Living Under Drones Death, Injury, and Trauma to Civilians From US Drone Practices in Pakistan International Human Rights and Conflict Resolution Clinic Stanford Law School Global Justice Clinic http://livingunderdrones.org/ NYU School of Law Cover Photo: Roof of the home of Faheem Qureshi, a then 14-year old victim of a January 23, 2009 drone strike (the first during President Obama’s administration), in Zeraki, North Waziristan, Pakistan. Photo supplied by Faheem Qureshi to our research team. Suggested Citation: INTERNATIONAL HUMAN RIGHTS AND CONFLICT RESOLUTION CLINIC (STANFORD LAW SCHOOL) AND GLOBAL JUSTICE CLINIC (NYU SCHOOL OF LAW), LIVING UNDER DRONES: DEATH, INJURY, AND TRAUMA TO CIVILIANS FROM US DRONE PRACTICES IN PAKISTAN (September, 2012) TABLE OF CONTENTS ACKNOWLEDGMENTS I ABOUT THE AUTHORS III EXECUTIVE SUMMARY AND RECOMMENDATIONS V INTRODUCTION 1 METHODOLOGY 2 CHALLENGES 4 CHAPTER 1: BACKGROUND AND CONTEXT 7 DRONES: AN OVERVIEW 8 DRONES AND TARGETED KILLING AS A RESPONSE TO 9/11 10 PRESIDENT OBAMA’S ESCALATION OF THE DRONE PROGRAM 12 “PERSONALITY STRIKES” AND SO-CALLED “SIGNATURE STRIKES” 12 WHO MAKES THE CALL? 13 PAKISTAN’S DIVIDED ROLE 15 CONFLICT, ARMED NON-STATE GROUPS, AND MILITARY FORCES IN NORTHWEST PAKISTAN 17 UNDERSTANDING THE TARGET: FATA IN CONTEXT 20 PASHTUN CULTURE AND SOCIAL NORMS 22 GOVERNANCE 23 ECONOMY AND HOUSEHOLDS 25 ACCESSING FATA 26 CHAPTER 2: NUMBERS 29 TERMINOLOGY 30 UNDERREPORTING OF CIVILIAN CASUALTIES BY US GOVERNMENT SOURCES 32 CONFLICTING MEDIA REPORTS 35 OTHER CONSIDERATIONS
    [Show full text]
  • Chapter 7 the Assassination
    Chapter 7: November 22, 1963 Chapter 7 The assassination 1 Introduction Our interest in reviewing the information that is today available to us regarding the events of November 22, 1963, quite naturally focuses on the question as to whether President Kennedy was killed by a lone assassin or by a conspiracy. Other questions pale by comparison to this first and most important question. As we review the eyewitness testimony, we see that the conclusion is not difficult to reach -- that indeed, the President was shot both from the front and the rear. This conclusion can be reached by a consideration of several kinds of evidence: v where the eyewitnesses heard the shots coming from; v eyewitness accounts of the spacing of the shots, which came too close together for the lone assassin hypothesis to be maintained; v the total number of shots was too large for the lone assassin hypothesis to be maintained; v the early shot hitting the President was not the same as the shot hitting Governor Connally, invalidating the lone assassin hypothesis. 1 The route through Dallas The final decision for the President's route in Dallas was determined by Secret Service agent Winston Lawson, on Thursday, November 14.1 The WCR states that "Lawson was not specifi- cally instructed [on Nov. 8] to select the parade route, but he understood that this was one of his functions. Even before the Trade Mart had been definitely selected, Lawson and Sorrels began to consider the best motorcade route from Love Field to the Trade Mart. On November 14, Law- son and Sorrels attended a meeting at Love Field and on their return to Dallas drove over the route which Sorrels believed best suited for the proposed motorcade."2 The route was reviewed and approved by Chief of Police Jesse Curry, Asst.
    [Show full text]
  • A List of the Records That Petitioners Seek Is Attached to the Petition, Filed Concurrently Herewith
    UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA IN RE PETITION OF STANLEY KUTLER, ) AMERICAN HISTORICAL ASSOCIATION, ) AMERICAN SOCIETY FOR LEGAL HISTORY, ) Miscellaneous Action No. ORGANIZATION OF AMERICAN HISTORIANS, ) and SOCIETY OF AMERICAN ARCHIVISTS. ) ) MEMORANDUM IN SUPPORT OF PETITION FOR ORDER DIRECTING RELEASE OF TRANSCRIPT OF RICHARD M. NIXON’S GRAND JURY TESTIMONY OF JUNE 23-24, 1975, AND ASSOCIATED MATERIALS OF THE WATERGATE SPECIAL PROSECUTION FORCE Professor Stanley Kutler, the American Historical Association, the American Society for Legal History, the Organization of American Historians, and the Society of American Archivists petition this Court for an order directing the release of President Richard M. Nixon’s thirty-five-year- old grand jury testimony and associated materials of the Watergate Special Prosecution Force.1 On June 23-24, 1975, President Nixon testified before two members of a federal grand jury who had traveled from Washington, DC, to San Clemente, California. The testimony was then presented in Washington, DC, to the full grand jury that had been convened to investigate political espionage, illegal campaign contributions, and other wrongdoing falling under the umbrella term Watergate. Watergate was the defining event of Richard Nixon’s presidency. In the early 1970s, as the Vietnam War raged and the civil rights movement in the United States continued its momentum, the Watergate scandal ignited a crisis of confidence in government leadership and a constitutional crisis that tested the limits of executive power and the mettle of the democratic process. “Watergate” was 1A list of the records that petitioners seek is attached to the Petition, filed concurrently herewith.
    [Show full text]
  • Countering FIE Threats: Best Practices
    i Countering FIE Threats: Best Practices Effective programs to counter foreign intelligence entity (FIE) threats are focused on three overarching outcomes: Promote CI and Identify and 1. Identification of foreign intelligence threats security training assess risks to and sharing of threat information and awareness sensitive assets 2. Safeguarding of sensitive information, assets, and activities Establish Share threat programs Develop and 3. Prevention and detection of insider threats information countering implement and warnings FIE threats mitigation internally and strategies The best practices detailed in this Guide, from identifying externally and assessing risks to promoting training and awareness, are complementary program components that, when employed together, can effectively shield your organization Integrate counter-FIE efforts across the from FIE threats. organization The National Counterintelligence and Security Center (NCSC) is charged with leading and supporting the counterintelligence (CI) and security activities of the U.S. government, the U.S. Intelligence Community, and U.S. private sector entities that are at risk of intelligence collection, penetration, or attack by foreign adversaries and malicious insiders. The capabilities and activities described in this Guide are exemplars of program components delineated as requirements in numerous strategies, policies, and guidelines. This Guide is a living document and will be updated to reflect improved and innovative ways to achieve the above outcomes. In addition, organization-specific capabilities and activities may be defined and implemented to ensure unique needs are met. Finally, nothing in this document shall be construed as authorization for any organization to conduct activities not otherwise authorized under statute, executive order, or other applicable law, policy, or regulation, nor does this document obviate an organization’s responsibility to conduct activities that are otherwise mandated, directed, or recommended for execution under the same.
    [Show full text]
  • Cyberattack Attribution As Empowerment and Constraint 3
    A HOOVER INSTITUTION ESSAY Cyberattack Attribution as Empowerment and Constraint KRISTEN E. EICHENSEHR Aegis Series Paper No. 2101 Introduction When a state seeks to defend itself against a cyberattack, must it first identify the perpetrator responsible? The US policy of “defend forward” and “persistent engagement” in cyberspace raises the stakes of this attribution question as a matter of both international and domestic law. International law addresses in part the question of when attribution is required. The international law on state responsibility permits a state that has suffered an internationally wrongful act to take countermeasures, but only against the state responsible. This limitation implies that attribution is a necessary prerequisite to countermeasures. But international Law and Technology, Security, National law is silent about whether attribution is required for lesser responses, which may be more common. Moreover, even if states agree that attribution is required in order to take countermeasures, ongoing disagreements about whether certain actions, especially violations of sovereignty, count as internationally wrongful acts are likely to spark disputes about when states must attribute cyberattacks in order to respond lawfully. Under domestic US law, attributing a cyberattack to a particular state bolsters the authority of the executive branch to take action. Congress has authorized the executive to respond to attacks from particular countries and nonstate actors in both recent cyber-specific statutory provisions and the
    [Show full text]
  • Inside the CIA: on Company Business
    Darrell G. Moen, Ph.D. Promoting Social Justice, Human Rights, and Peace Inside the CIA: On Company Business Transcript courtesy of John Bernhart Frank Church (United States Senator, 1957-81; Chairman of Select Committee on Intelligence Activities, 1975-76) : Have you brought with you some of those devices, which would have enabled the CIA to use this poison for killing people? William Colby (CIA, 1947-75; Director, 1973-75): We have indeed. The round thing at the top is obviously the sight. It works by electricity. There's a battery in the handle, and it fires a small dart. Frank Church (United States Senator, 1957-81; Chairman of Select Committee on Intelligence Activities, 1975-76) : And the dart itself, when it strikes the target, does the target know that he has been hit and he is about to die? William Colby (CIA, 1947-75; Director, 1973-75): A special one was developed which potentially would be able to enter the target without perception. Frank Church (United States Senator, 1957-81; Chairman of Select Committee on Intelligence Activities, 1975-76) : As a murder instrument, that is about as efficient as you can get. William Colby (CIA, 1947-75; Director, 1973-75): It is a weapon: a very serious weapon. Victor Marchetti (CIA, 1955-69; Executive Assistant to the Deputy Director): I first began working in intelligence while I was in the army in Germany during the Cold War years. Later, when I was a student at Penn State, I was recruited by the CIA. James Wilcott (CIA, 1957-66): The guy told me he was from DoD, Department of Defense.
    [Show full text]
  • Cyber Counterintelligence - Deception, Distortion, Dishonesty
    #RSAC SESSION ID: CYBER COUNTERINTELLIGENCE - DECEPTION, DISTORTION, DISHONESTY Jeff Bardin Dr. Khatuna Mshvidobadze Chief Intelligence Officer Principal Treadstone 71 Cyberlight Global Associates @Treadstone71LLC [email protected] 5 2 Agenda Taxonomy Types of Denial Deception Dimensions of D&D Tactics Deception Chain (see your handout) and Deception Planning D&D Russian Historical Information Criminals & Kids Notable Events Georgia US Election Background Warfare Dis-information / France – Information Complexity of Formation of cyber Troll Factories Major Players TV5Monde Warfare on Social Outsourcing troops Media Forming public Interagency Socio-Cultural Conclusions - opinion Rivalries Differences Recommendations 3 Denial and Deception - Lifecycle Types of Denial and Deception Resource Diversion Uncertainty Intelligence Proactivity Depletion • Direct an • Waste an • Cause the • Monitor and • Use adversary’s adversary’s adversary to analyze deception attention time and doubt the adversary techniques to from real energy on veracity of a behavior detect assets toward obtaining and discovered during previously bogus ones. analyzing vulnerability intrusion unknown false or stolen attempts to attacks that information. information. inform future other defense defensive efforts. tools may miss. 4 Deception Planning Consideration of all critical components of the operation. Deny, deceive, create propaganda RSA Conference - Bardin and Mshvidobadze Western Dogs Dogs Lie Like Dotards - We will hack their sites and bring them down 5 Dimensions
    [Show full text]
  • Coming to Grips with Life in the Disinformation Age
    Coming to Grips with Life in the Disinformation Age “The Information Age” is the term given to post-World War II contemporary society, particularly from the Sixties, onward, when we were coming to the realization that our ability to publish information of all kinds, fact and fiction, was increasing at an exponential rate so as to make librarians worry that they would soon run out of storage space. Their storage worries were temporarily allayed by the advent of the common use of microform analog photography of printed materials, and eventually further by digital technology and nanotechnology. It is noted that in this era, similar to other past eras of great growth in communications technology such as written language, the printing press, analog recording, and telecommunication, dramatic changes occurred as well in human thinking and socialness. More ready archiving negatively impacted our disposition to remember things by rote, including, in recent times, our own phone numbers. Moreover, many opportunities for routine socializing were lost, particularly those involving public speech and readings, live music and theater, live visits to neighbors and friends, etc. The recognition that there had been a significant tradeoff from which there seemed to be no turning back evoked discussion of how to come to grips with “life in the Information Age”. Perhaps we could discover new social and intellectual opportunities from our technological advances to replace the old ones lost, ways made available by new technology. Today we are facing a new challenge, also brought on largely by new technology: that of coming to grips with life in the “Disinformation Age”.
    [Show full text]