Jack Anderson

Total Page:16

File Type:pdf, Size:1020Kb

Jack Anderson I• The Washington merry-go-round With LES WHITTEN 1,'41q Jack Anderson WASHINGTON — The Senate report at the bottom; others bear no name at calls "plausible deniability." —The Dominican Republic's late on CIA assassination attempts has been all. The draft report runs about 200 pages dictator, Rafael Trujillo, was censured held up while the senators make a final, There is some evidence that and is bound in a looseleaf folder. But by the Organization of American States probably futile effort to find out who Presidents may have authorized the pages are still being taken out to be in 1960 for sponsoring an unsuccessful authorized the plots against foreign CIA's participation in an occasional rewritten. Key witnesses have also been assassination plot against Venezuela's rulers. coup of kidnaping. For example, called back for additional questioning. President Romulo Betancourt. Although Still unresolved is whether past President Kennedy apparently approved The assassination report may not be the OAS denounced the attempted Presidents were aware of the murder an August 23, 1963 cable directing the ready, therefore, until the end of the murder as a flagrant violation of human plots. Did men like Dwight Eisenhower, U.S. embassy in Saigon to arrange the month. rights, this didn't deter the Eisenhower John Kennedy, Lyndon Johnson and overthrow of South Vietnam's President However, here are the committee's administration from sponsoring plots to Richard Nixon sometimes behave in a Ngo Dinh Diem. preliminary findings: kill not only Castro but Trujillo. At least manner more befitting a Mafia There was also secret testimony that —in 1960, the CIA plotted to do away the State Department, in a clumsily godfather than President of the United President Nixon personally gave CIA with the troublesome Congolese leader, coded message, directed its consulate in States? chief Richard Helms the green light to go Patrice Lumumba. One method that was Santo Domingo to support a coup against There are two possibilities, both ahead with the 1970 kidnaping of Chile's explored was poisoning. An official Trujillo. Although the U.S. supplied the profoundly disturbing. Either the Gen. Rene Schneider. Nixon allegedly announcement claimed he was slain on weapons, it is denied that the U.S killings had presidential approval, or the told Helms that Henry Kissinger would Feb. 12, 1961 by Congolese tribesmen encouraged the assassins to gun down CIA arranged them without be his White House contact on the after his escape from prison. But Trujillo as happened on May 30,1961. authorization. scheme. according to one Bizarre, unconfirmed —Not only did a cable go out from The evidence before the Senate But it was emphatically denied that account, he was given only whiskey to Washington on Aug. 23, 1963, ordering Intelligence Committee is inconclusive. the Diem and Schneider killings were drink and died of alcoholic poisoning. In U.S. Ambassador Henry Cabot Lodge to CIA officials, testifying in secret, denied ever part of the original plans. The Diem any event, CIA witnesses denied that the seek the overthrow of South Vietnam's getting any assassination orders from coup got out of control, and Schneider agency had anything to do with his final President Ngo Dinh Diem but some of the White House. They admitted under put up unexpected resistance, it was demise. the generals who participated in the cross-examination, however, that they explained. —In late 1960, the CIA recruited two coup were paid by the U.S. Two months would lie to protect the President. Hints were dropped that the White Mafia mobsters to knock off Cuba's later, on November t, Diem was killed. The same witnesses also denied that House wasn't kept entirely in the dark Premier Fidel Castro. The attempts on . Still, the key witnesses denied that the the CIA had plotted to kill anyone about the assassination plots. As one Castro's life continued until the spring of cabled orders were implemented- r without authorization. Yet they could witness put it, the late CIA chief Allen 1963. Castro not only was aware of the —The 1970 kidnaping of Gen. Rene never seem to identify who had granted Dulles informed Presidents of the dirty attempts to kill him, the draft report , Schneider was intended, apparently, to the authorization. work by "circumlocution." notes, but also threatened to retaliate touch off a coup that would block the late • Thig point is equally vague in the Most committee members reportedly against U.S. leaders. The report offers 1 Salvador Allende from coming to power documents that the CIA delivered to the believe that past Presidents approved, no evidence, however, that Castro had in Chile. Although President Nixon has committee. Invariably, the secret or at least condoned, the assassination anything to do with the subsequent been linked with the kidnap order, there memos dealing with assassination plots plots but that no record was kept. This assassination of President Kennedy a is no evidence that this was intended to are unsigned. Some have a name typed gave the Presidents what a draft report few weeks later. be an assassination plot. : CA , ,_ I The Washington Merry-Go-Round ittf, WASHINGTON POST Thursday. September 18, 1975 B19 10 • • rtgtn of Assassination Plots Sought ; - By Jack Anderson embassy in Saigon to arrange was slain on Feb. 12, 1961, by was censured by the Organiza-A the overthrow of South Viet- Congolese tribesmen after his lion of American States in 1960' and Lee Whitten nam's President Ngo Dinh escape from prison. But accord- for sponsoring an unsuccessful assassination plot against Venal.. The Senate report on CIA as- Diem. ing to one bizarre, unconfirmed sassination attempts has been Threre was also secret testi- account, he was given only whis- zuela's President Romulo Bev, held up while the senators mony that President Nixon per- key to drink and died of alco- tancourt. Although the OAS ctett: make a final, probably futile, ef- sonally gave CIA chief Richard holic poisoning. In any event, nounced the attempted murder: fort to find out who authorized Helms the green light to go CIA witnesses denied that the as a flagrant violation of humatf', the plots against foreign rulers. ahead with the 1970 kidnaping agency had anything to do with rights, this didn't deter the Ei- of Chile's Gen. Rene Schneider. his final demise. senhower administration from' Still unresolved is whether Nixon allegedly told Helms that • In late 1960, the CIA re- plots to kill not only Castro but past Presidents were aware of Henry Kissinger would be his Trujillo. At least the Depart: the muder plats. Did mvn like cruited two Mafia mobsters to White House contact on the knock of Cuba'sPremier Fidel ment, in a clumsily coded mes-' Dwight Eisenhower, John Ken- scheme. sage, directed its consulate in nedy, Lyndon Johnson and Castro. The attempts on Castro's But it was emphatically de- life continued until the spring Santo Domingo to support a Richard Nixon sometimes be- nied that the Diem and coup against Trujillo. Although. - have in a manner more befitting of 1963. Castro not only was Schneider killings were ever aware of the attempts to kill the U.S. supplied the weapons, - a Mafia godfather than Presi- part of the original plans. The him, the draft report notes, but it is denied that the U.S. encour- dent of the United States' Diem coup got out of control, aged the assassins to gut down- There are two possibilities, and Schneider put up unex- also threatened to retaliate against U.S. leaders. The report Trujillo as happened on May 30, both profoundly disturbing. Ei- pected resistance, it was ex- offers no evidence, however, 1961. ther the killings had presiden- plained. .1575. United Feitzre Syndic-MA.1w. tial approval, or the CIA ar- Hints were dropped that the that Castro had anything to do with the subsequent assassina- ranged them without authoriza- White House wasn't kept en- tion of President Kennedy few tion. tirely in the dark about the as- The evidence before the Sen- sassination plots. As one wit- weeks later. ate intelligenc committee is in- ness put it, the late CIA chief Al- • The Dominican Republic's conclusive. CIA officials, testify- len Dulles informed Presidents late dictator. Rafael Trujillo, ing in secret, denied getting any of the dirty work by "circumlo- assassination orders from the cution." White House. They admitted un- Most committee members re- der cross-examination,however, portedly believe that past Presi- that they would lie to protect dents approved, or at least con- the President. doned, the assassination plots The same witnesses also de- but that no record was kept. nied that the CIA had plotted to This gave the Presidents what a kill anyone without authoriza- draft report calls "plausible de- tion. Yet they could never seem niability." to identity who had granted the The draft report runs about authorization. 200 pages and is bound in a This point is equally vague in loose-leaf folder. But pages are the documents that the CIA de- still being taken out to be rew- livered to the committee. Invar- ritten. Key witnesses have also iably, the secret memos deal- been called back for additional ing with assassination plots are questioning. The assassination unsigned. Some have a name report may not be ready, there- typed at the bottom: others bear fore, until the end of the month. no name at all. However, here are the com- There is some evidence that mittee's preliminary findings: Presidents may have authorized • In 1960, the CIA plotted to do the CIA's participation in an oc- away with the troublesome Con- casional coup or kidnaping.
Recommended publications
  • A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College
    Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2015 A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College Recommended Citation Brockmann, Andrew, "A Plausibly Deniable Encryption Scheme for Personal Data Storage" (2015). HMC Senior Theses. 88. https://scholarship.claremont.edu/hmc_theses/88 This Open Access Senior Thesis is brought to you for free and open access by the HMC Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in HMC Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Talithia D. Williams, Advisor Arthur T. Benjamin, Reader Department of Mathematics May, 2015 Copyright © 2015 Andrew Brockmann. The author grants Harvey Mudd College and the Claremont Colleges Library the nonexclusive right to make this work available for noncommercial, educational pur- poses, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Abstract Even if an encryption algorithm is mathematically strong, humans in- evitably make for a weak link in most security protocols. A sufficiently threatening adversary will typically be able to force people to reveal their encrypted data. Methods of deniable encryption seek to mend this vulnerability by al- lowing for decryption to alternate data which is plausible but not sensitive. Existing schemes which allow for deniable encryption are best suited for use by parties who wish to communicate with one another.
    [Show full text]
  • Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
    MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices? Xingjie Yuy;z;\, Bo Chen], Zhan Wangy;z;??, Bing Changy;z;\, Wen Tao Zhuz;y, and Jiwu Jingy;z y State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, CHINA z Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, CHINA \ University of Chinese Academy of Sciences, CHINA ] Department of Computer Science, Stony Brook University, USA Email: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Nowadays, smartphones have started being used as a tool to collect and spread po- litically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk. In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack. MobiHydra is pragmatic in that it remarkably supports hiding opportunistic data without necessarily rebooting the device. In addition, MobiHydra favourably mitigates the so-called booting-time defect, which is a whistle-blower to expose the usage of PDE in previous solutions. We implement a prototype for MobiHydra on Google Nexus S. The evaluation results demonstrate that MobiHydra introduces very low overhead compared with other PDE solutions for mobile devices.
    [Show full text]
  • The Spectacle of the False-Flag
    The Spectacle of the False-Flag THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS FROM JFK TO WATERGATE Eric Wilson THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS from JFK to WATERGATE Eric Wilson, Monash University 2015 http://creativecommons.org/licenses/by-nc-nd/4.0/ This work is Open Access, which means that you are free to copy, distribute, display, and perform the work as long as you clearly attribute the work to the author, that you do not use this work for commercial gain in any form whatsoever, and that you in no way, alter, transform, or build upon the work outside of its normal use in academic scholarship without express permission of the author and the publisher of this volume. For any reuse or distribution, you must make clear to others the license terms of this work. First published in 2015 by Thought | Crimes an imprint of punctumbooks.com ISBN-13: 978-0988234055 ISBN-10: 098823405X and the full book is available for download via our Open Monograph Press website (a Public Knowledge Project) at: www.thoughtcrimespress.org a project of the Critical Criminology Working Group, publishers of the Open Access Journal: Radical Criminology: journal.radicalcriminology.org Contact: Jeff Shantz (Editor), Dept. of Criminology, KPU 12666 72 Ave. Surrey, BC V3W 2M8 [ + design & open format publishing: pj lilley ] I dedicate this book to my Mother, who watched over me as I slept through the spectacle in Dallas on November 22, 1963 and who was there to celebrate my birthday with me during the spectacle at the Watergate Hotel on June 17, 1972 Contents Editor©s Preface ................................................................
    [Show full text]
  • The CIA and Covert Operations: to Disclose Or Not to Disclose - That Is the Question, 17 BYU J
    Brigham Young University Journal of Public Law Volume 17 | Issue 1 Article 3 5-1-2002 The IC A and Covert Operations: To Disclose or Not to Disclose - That is the Question Marcus Eyth Follow this and additional works at: https://digitalcommons.law.byu.edu/jpl Part of the National Security Law Commons Recommended Citation Marcus Eyth, The CIA and Covert Operations: To Disclose or Not to Disclose - That is the Question, 17 BYU J. Pub. L. 45 (2002). Available at: https://digitalcommons.law.byu.edu/jpl/vol17/iss1/3 This Article is brought to you for free and open access by BYU Law Digital Commons. It has been accepted for inclusion in Brigham Young University Journal of Public Law by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. EYTH-MACRO 2/5/2003 9:49 AM The CIA and Covert Operations: To Disclose or Not to Disclose – That is the Question Marcus Eyth* I. INTRODUCTION When the president does it, that means it is not illegal.1 President Richard M. Nixon If Mr. Nixon’s statement were unconditionally true, many United States citizens would presumably find the very pillars upon which the United States was founded to have been significantly shaken, and some might even consider a permanent move to another country. With respect to the implications this statement has upon the president’s discretion in conducting covert operations without first consulting Congress, some scholars would opt to reach for pen and paper.2 The issue of whether Congress and the executive branch must share the power to authorize and conduct covert activities, or whether it may be unilaterally exercised by the CIA, under the direction of the National Security Council (NSC), has become ripe for critique since Congress took significant steps to reign-in the discretion of the executive which for nearly two centuries enjoyed virtually carte blanche authority in this area.
    [Show full text]
  • Data Epistemologies / Surveillance and Uncertainty
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 Data Epistemologies / Surveillance and Uncertainty Sun Ha Hong University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Communication Commons, Other Sociology Commons, and the Philosophy of Science Commons Recommended Citation Hong, Sun Ha, "Data Epistemologies / Surveillance and Uncertainty" (2016). Publicly Accessible Penn Dissertations. 1766. https://repository.upenn.edu/edissertations/1766 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/1766 For more information, please contact [email protected]. Data Epistemologies / Surveillance and Uncertainty Abstract Data Epistemologies studies the changing ways in which ‘knowledge’ is defined, promised, problematised, legitimated vis-á-vis the advent of digital, ‘big’ data surveillance technologies in early twenty-first century America. As part of the period’s fascination with ‘new’ media and ‘big’ data, such technologies intersect ambitious claims to better knowledge with a problematisation of uncertainty. This entanglement, I argue, results in contextual reconfigurations of what ‘counts’ as knowledge and who (or what) is granted authority to produce it – whether it involves proving that indiscriminate domestic surveillance prevents terrorist attacks, to arguing that machinic sensors can know us better than we can ever know ourselves. The present work focuses on two empirical cases. The first is the ‘Snowden Affair’ (2013-Present): the public controversy unleashed through the leakage of vast quantities of secret material on the electronic surveillance practices of the U.S. government. The second is the ‘Quantified Self’ (2007-Present), a name which describes both an international community of experimenters and the wider industry built up around the use of data-driven surveillance technology for self-tracking every possible aspect of the individual ‘self’.
    [Show full text]
  • Plausible Deniability Over Broadcast Channels Mayank Bakshi∗ Member, IEEE, and Vinod Prabhakaran† Member, IEEE
    1 Plausible Deniability over Broadcast Channels Mayank Bakshi∗ Member, IEEE, and Vinod Prabhakarany Member, IEEE Abstract In this paper, we introduce the notion of Plausible Deniability in an information theoretic framework. We consider a scenario where an entity that eavesdrops through a broadcast channel summons one of the parties in a communication protocol to reveal their message (or signal vector). It is desirable that the summoned party have enough freedom to produce a fake output that is likely plausible given the eavesdropper’s observation. We examine three variants of this problem – Message Deniability, Transmitter Deniability, and Receiver Deniability. In the first setting, the message sender is summoned to produce the sent message. Similarly, in the second and third settings, the transmitter and the receiver are required to produce the transmitted codeword, and the received vector respectively. For each of these settings, we examine the maximum communication rate that allows a given minimum rate of plausible fake outputs. For the Message and Transmitter Deniability problems, we fully characterise the capacity region for general broadcast channels, while for the Receiver Deniability problem, we give an achievable rate region for physically degraded broadcast channels. I. INTRODUCTION The explosive growth in information technologies in recent years is not without its pitfalls. On one hand, advances in communications have enabled ground-breaking applications that have arguably been instrumental in improving the general quality of life. On the other hand, the naturally connected nature of these technologies also presents a wide variety of security and privacy concerns. To counter these, much recent attention has also focused on designing and analyzing algorithms and protocols that guarantee security or privacy.
    [Show full text]
  • An Overt Turn on Covert Action
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Saint Louis University School of Law Research: Scholarship Commons Saint Louis University Law Journal Volume 53 Number 2 (Winter 2009) Article 6 2009 An Overt Turn on Covert Action A. John Radsan William Mitchell College of Law, [email protected] Follow this and additional works at: https://scholarship.law.slu.edu/lj Part of the Law Commons Recommended Citation A. J. Radsan, An Overt Turn on Covert Action, 53 St. Louis U. L.J. (2009). Available at: https://scholarship.law.slu.edu/lj/vol53/iss2/6 This Article is brought to you for free and open access by Scholarship Commons. It has been accepted for inclusion in Saint Louis University Law Journal by an authorized editor of Scholarship Commons. For more information, please contact Susie Lee. SAINT LOUIS UNIVERSITY SCHOOL OF LAW AN OVERT TURN ON COVERT ACTION A. JOHN RADSAN* “At its best, covert action should be used like a well-honed scalpel, infrequently, and with discretion lest the blade lose its edge.”† INTRODUCTION ............................................................................................... 486 I. HISTORY ..................................................................................................... 488 A. Political Action in Italy ............................................................... 490 B. Cold War Propaganda: Radio Free Europe and Radio Liberty ........................................................................ 494 C. Cold War Coups .........................................................................
    [Show full text]
  • Threat Models for Analyzing Plausible Deniability of Deniable File Systems
    Threat Models for Analyzing Plausible Deniability of Deniable File Systems Michal Kedziora1,∗, Yang-Wai Chow2 and Willy Susilo2 1Faculty of Computer Science and Management, Wroclaw University of Science and Technology, Wroclaw, Poland 2Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, Australia E-mail: [email protected]; {caseyc,wsusilo}@uow.edu.au *Corresponding Author Received 15 August 2017; Accepted 22 October 2017; Publication 27 November 2017 Abstract Plausible deniability is a property of Deniable File System (DFS), which are encrypted using a Plausibly Deniable Encryption (PDE) scheme, where one cannot prove the existence of a hidden file system within it. This paper investigates widely used security models that are commonly employed for analyzing DFSs. We contend that these models are no longer adequate con- sidering the changing technological landscape that now encompass platforms like mobile and cloud computing as a part of everyday life. This necessitates a shift in digital forensic analysis paradigms, as new forensic models are required to detect and analyze DFSs. As such, it is vital to develop new contemporary threat models that cater for the current computing environment that incorporates the increasing use of mobile and cloud technology. In this paper, we present improved threat models for PDE, against which DFS hidden volumes and hidden operating systems can be analyzed. In addition, we demonstrate how these contemporary threat models can be adopted to attack and defeat the plausible deniability property of a widely used DFS software. Journal of Software Networking, 241–264. doi: 10.13052/jsn2445-9739.2017.012 This is an Open Access publication.
    [Show full text]
  • Plausible Deniabilitydeniability Oror Howhow Leadersleaders Maymay Trytry Toto Concealconceal Theirtheir Rolesroles
    PlausiblePlausible DeniabilityDeniability oror HowHow LeadersLeaders MayMay TryTry toto ConcealConceal TheirTheir RolesRoles Dr. Walter Dorn Royal Military College of Canada International Criminal Court/Office of the Prosecutor ICC/OTP Guest Lecture, 18 May 2010 NB: The views expressed in this presentation are those of Professor Dorn and do not necessarily reflect ICC/OTP or Canadian government policy. Overview I. Plausible Deniability: definition and scope II. Origins and Examples in US Intelligence III. Purposes and Methods IV. Challenging “Plausible Deniers” V. ICC applications I. Definition and Scope OED Definition plausible deniability n. Polit. (the possibility of) denying a fact (esp. a discreditable action) without arousing suspicion; the method of achieving this. 1974 Washington Post 14 Sept. A2/3 Author David Wise also objected that the secret activities also required a policy of ‘plausible deniability’ on the part of U.S. officials when publicly questioned about them. 1987 N.Y. Times (Nexis) 8 Jan. A1/5 Investigators want to know..whether Mr. Reagan's open support for the contras was translated into action that he and other senior officials now find it convenient to repudiate... According to several Administration officials, the White House in the last few years had used the technique of ‘plausible deniability’. 2001 New Republic 8 Oct. 8/2 So the Agency [sc. the CIA] tried to avoid direct involvement in the war, and to maintain plausible deniability... The U.S. provided the mujahedin only Eastern-bloc weaponry, so the rebels could claim they had captured it from Soviet troops rather than received it from Washington. (Note: All three examples apply to deniability of US government.) The Oxford Essential Dictionary of the U.S.
    [Show full text]
  • Grey Is the New Black: Covert Action and Implausible Deniability
    Grey is the new black: covert action and implausible deniability RORY CORMAC AND RICHARD J. ALDRICH* Anxiety about ambiguous warfare and ‘hybridity’ is all the rage. But the rapidly proliferating literature on ‘grey’, ‘hybrid’ and ‘non-linear warfare’ is confused and references a bewildering range of military, political and economic developments associated with the changing nature of war over several decades.1 The proliferation of terms emphasizes that conceptual clarity is in short supply, and this elasticity ultimately obscures more than it explains.2 We argue that this lack of clarity turns upon the paradoxical nature of covert action. Covert action by definition seeks to change things and often leaves some sort of a trail. Although some have remarked on the varying degrees of exposure associated with hybrid warfare, little system- atic analysis exists of the role of visibility and acknowledgement.3 We therefore seek to relocate the debate within a wide-ranging analysis of covert action which, on closer inspection, was often hardly covert at all. We unpack ideas surrounding secrecy to challenge assumptions about covert action and offer broader insights into contemporary interventionism. For hundreds of years, states have sought to intervene in the affairs of others in a deniable manner. Since the professionalization of intelligence services in the aftermath of the Second World War, this behaviour has become known as covert action: commonly understood as activity to influence events in a plausibly deniable manner. Indeed, the concept of plausible deniability—some have gone as far as to call it a doctrine4—is central to understandings of covert action both academically and in practice.
    [Show full text]
  • Download the Transcript
    DEMOCRACY-2020/10/02 1 THE BROOKINGS INSTITUTION DISINFORMED DEMOCRACY: THE PAST, PRESENT, AND FUTURE OF INFORMATION WARFARE Washington, D.C. Friday, October 2, 2020 Welcoming Remarks: JOHN R. ALLEN President, The Brookings Institution Opening Conversation: How Disinformation Threatens World Order: KEYNOTE: H.R. McMASTER Fouad and Michelle Ajami Senior Fellow, Hoover Institution, Stanford University Former U.S. National Security Advisor MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution Panel 1: The Road to Russian Interference in 2016: MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution CATHERINE BELTON Special Correspondent, Reuters ARKADY OSTROVSKY Russia and Easter Europe Editor, The Economist THOMAS RID Professor of Strategic Studies Johns Hopkins School of Advanced International Studies DAVID SHIMER Global Fellow, Woodrow Wilson International Center for Scholars Associate Fellow, Yale University Panel 2: Domestic Drivers of Disinformation: MODERATOR: CHRIS MESEROLE Fellow and Deputy Director, Artificial Intelligence and Emerging Technology Initiative The Brookings Institution RENÉE DiRESTA Research Manager, Stanford Internet Observatory ANDERSON COURT REPORTING 1800 Diagonal Road, Suite 600 Alexandria, VA 22314 Phone (703) 519-7180 Fax (703) 519-7190 DEMOCRACY-2020/10/02 2 ELAINE KAMARCK Senior Fellow and Director, Center for Effective Public Management The Brookings Institution KATE STARBIRD Associate Professor, Human Centered Design & Engineering University of Washington Panel 3: Novel strategies for countering information warfare MODERATOR: FIONA HILL Senior Fellow, Center on the United States and Europe The Brookings Institution EILEEN DONAHOE Executive Director, Global Digital Policy Incubator, Stanford University Former U.S. Ambassador, United National Human Rights Council THOMAS KENT Adjunct Associate Professor of International and Public Affairs Columbia University DANIEL KIMMAGE Principal Deputy Coordinator, Global Engagement Center U.S.
    [Show full text]
  • Unacknowledged Special Operations and Covert Action 5B
    DIFFERENT WORLDS: UNACKNOWLEDGED SPECIAL OPERATIONS AND COVERT ACTION BY COLONEL RICHARD C. GROSS United States Army DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. USAWC CLASS OF 2009 This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Strategy Research Project U.S. Army War College, Carlisle Barracks, PA 17013-5050 Form Approved Report Documentation Page OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 30 MAR 2009 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Different Worlds: Unacknowledged Special Operations and Covert 5b. GRANT NUMBER Action 5c. PROGRAM ELEMENT NUMBER 6.
    [Show full text]