Connect with us

Intelligence

The old and new techniques of Dezinformatsjia

Giancarlo Elia Valori

Published

on

Disinformation – i.e. what the Soviet intelligence services called Dezinformatsjia – is at the origin of the phenomenon that we currently define – with oversimplification -fake news, spread to support or not voters’ or consumers’ specific choices, obviously both nationally and internationally. Nowadays the “political market” is globalized exactly like the market of goods and services and hence all the tools available to a country and to its political elite need to be used.

Certainly the intelligence agencies’ room for manoeuvre is currently much wider than it was at the time of the Cold War. Hence many mass manipulation techniques, which in the past were specifically political, are now also commercial, behavioral, cultural, scientific or pseudo-scientific. They are closely interwoven and currently the electoral or political manipulation operations often stem from commercial marketing techniques.

Dezinformatsjia, however, is always a “weak to strong” operation, i.e. a series of strategic and information actions that try to prevent the use of force by those who are tactically superior.

Those who have not enough missiles targeted against the enemy,  or have not the maximum military efficiency, faces the opponent with psychological and propaganda techniques, which cost less and – by their very nature -do not trigger a conventional military countermove by the enemy against whom they are targeted. However they can trigger an equal and opposite disinformation by the target country.

These are all “ironic” operations, in the etymological sense of the word. Irony comes from the Greek word eironèia, i.e. “fiction, dissimulation, or to say the opposite of what you think”.

Just think of the great demonstrations against “Euromissiles” in the early 1980s -not foreseen by the Soviets, which put a strain on the huge intelligence network of the Warsaw Pact in Europe – or of the myth of the opening to dissent in the era of Khrushchev’s “thaw”. Or just think – as maintained by Anatoly Golytsin, the former KGB officer who defected to the USA – of the schisms between the USSR and Mao’s China, or of the transformation of the Komintern into Kominform, in which also Yugoslavia secretly participated, even after the famous schism between Tito and Stalin.

According to Golytsin, a senior KGB officer, all the divisions within the Communist world were a huge and very long sequence of fake news. Westerners never believed him, but the predictive power of his book, New Lies for Old, published in the USA in 1984, is still extraordinary.

He foresaw the “liberalization” of the Soviet system and even its collapse, so as to be later reborn in a new guise. All true, until today.

But what is really Dezinformatsjia, i.e. the technique that is at the origin of fake news and of all current psychopolitical operations?

For the KGB experts, disinformation is linked to the criterion of “active operations” (aktivinyyemeropriatia), i.e. the manipulation and control of mass media; the actual disinformation, both at written and oral levels; the use of Communist parties or covert organizations. In this case, just think of all the organizations “for peace” or for friendship “among peoples”, as well as of radio and TV broadcasts.

“Active measures” even include kompromat, i.e. the “compromising material”, as well as damaging and disparaging information about Western agents or politicians’ involvement in sex, illegal and drugs affairs. This information is collected and used strategically across all domains, with a view to creating negative publicity.

An active kind of measure that we have recently seen at work against President Trump. Nevertheless it has been implemented by his fellow countrymen, who, however, do not seem to be very skillful in the art of desinformatsjia.

It should be recalled, however, that currently a fundamental technique is to manipulate the opponents’ economies or to support guerrilla groups or terrorist organizations.

Manipulation of economies through statistical data or governments’ “covert” operations on stock markets, while support for terrorist groups, even those far from the State ideology, is provided through an intermediary that may be another State or a large company, or through bilateral financial transactions outside markets.

The Red Brigades, for example, initially trained in Czechoslovakia by passing through the Austrian woods at the border, owned by the Feltrinelli family.

When the publisher Giangiacomo Feltrinelli was found dead near an Enel trellis in Segrate, but long before the Italian police knew who had died on that trellis, the Head of the KGB center in Milan hastily went to report to the Soviet embassy in Rome.

Many friendly and enemy States, however, used right-wing and left-wing terrorism against the Italian Republic.

The goal was clear: to destroy or annihilate a dangerous economic competitor, especially in Africa and in the East.

Dezinformatsjia, however, was institutionally targeted against what the Soviets called “the primary enemy”, namely the United States.

Under Stalin’s power – who was dialectically “superseded” by Khrushchev, always in contrast with true innovators – “active measures” also included assassination.

I do not rule out at all that, in particular cases, this tradition has been recovered even after the death of the so-called “little father”.

As we can see, “active measures” -namely Dezinformatsjia – still has much to do with contemporary world.

If we only talk about fake news, we cannot understand why it is spread, while if it is interpreted in the framework of the old – but still topical – disinformation strategy, everything gets clearer.

In the Soviet regulations of the 1960s, every KGB foreign branch had to devote at least 25% of its forces to “active measures”, while each residence had an officer specifically trained at Dezinformatsjia.

It should be noted that, in 1980, CIA estimated the total cost of “active measures” at 3 billion US dollars, at least.

It was the real struggle for hegemony that the USSR was fighting, considering that the missile, nuclear and conventional balance of the two forces on the field did not permit a real military clash.

However, the result of the final clash would have been very uncertain.

Nowadays every State produces fake news, as well as ad hoc opinion movements, and spreads agents of influence in the media, in universities, businesses and governments.

Hence the globalization of disinformation, not simply fake news, is the phenomenon with which we really have to deal.

During the Cold War, the Soviet apparata spread the fake news of the CIA and FBI involvement in the assassination of John F. Kennedy, while the East German apparata often spread news about Western politicians being members of Nazi hierarchies or about the pro-Nazi sympathies of Pope Pius XI.

It should also be noted that Andropov, who was elected General Secretary of the CPSU in 1982, had been the Head of the KGB First Chief Directorate, precisely the one that coordinated and invented all “active measures”.

At the time, Western newspapers were filled with news about Andropov as a “modernizer”, a reader of the American literature classics and a jazz lover.

Was it Dezinformatsjia? Obviously so, but no one answered that question, thus raising expectations – among the NATO European Member States’ peoples – about a sure “democratization” of the Soviet Union in the future.

Andropov, however, secretly believed that the United States would unleash a nuclear war in the short term against the USSR. Hence this was the beginning of a long series of Dezinformatsjia hard operations right inside the United States.

Nevertheless, following the rules of “active measures”, they were not specifically targeted against the US military and political system, but against other targets apparently unrelated to the primary aim: the US responsibility for the (impossible) creation of the AIDS virus or – as the Soviet Dezinformatsjia always claimed – the “unclear” role played by CIA and FBI in the assassinations of J.F. Kennedy, Martin Luther King or even the death of Elvis Presley.

A specific product for each public.

Hence a fake storytelling is created – not a series of objective data – around a theme that is instead real, so as to reach the goal of a generic defamation of the primary enemy, where there is always a “bad guy” (obviously the US government and its Agencies) and a “good guy”, that is the American people that must be freed from the bad guy holding them prisoner.

According to the theories of the great Russian scholar of myths, tribal rituals, folktales and fairy storytelling, V.I. Propp, whose text “Morphology of the Folktale” was published in Leningrad in 1928, this is exactly one of the primary narrative elements of the folktale.

As in the case of  KGB “active operations”, Propp’s scheme envisages some phases of construction of the myth or of the folktale: 1) the initial balance, i.e. the phase in which everything is devoid of dangers; 2) the breaking of the initial balance and hence the creation of the motive for the subsequent action; 3) the vicissitudes of the hero, who is the one who “restores order” after the natural twists and turns; 4) the restoration of balance, namely the conclusion.

Hence the mythical and fairy mechanism concerns the archetypes of the human psyche, as described by Carl Gustav Jung.

This is the reason why, despite their evident counter factuality, propaganda constructions work well and last well beyond the time for which they were thought and designed.

Active operations are modeled on the natural parameters with which the human mind works. When well done, said operations do not use abstract theories, cultural or sectoral models. They speak to everyone, because they act on the unconscious.

It is no coincidence that currently the archetypal branding – i.e. the marketing system based on the 12 Jungian archetypes – is increasingly widespread.

It was created in 2001, several years after the fall of the USSR and in the phase in which the New World Order was strengthening.

Propp’s four elements work just as an “active measure”, based on four categories: 1) mastery and stability; 2) belonging; 3) change; 4) independence.

It is easy to verify how these four categories of modern marketing (and of the archetypal tale) fully apply  both to disinformation operations, which can often favor one of the four elements compared to the others, and to the actual political marketing.

Hence politics, intelligence services’ propaganda and marketing currently work on the basis of the same deep psychic mechanisms.

In the Soviet tradition, there is also a certain tendency to use Ivan Pavlov’s psychology in the field of intelligence.

Pavlov developed the theory of “conditioned reflexes”, i.e. the psychic mechanism that is produced by a conditioning stimulus.

The experiment of the dog and the bell is, in fact, well-known and needs no elaboration.

It should be noted, however, that the conditioned reflex is triggered precisely when the food announced by the sound of the bell is no longer there, while the dog shows all the typical reactions of the animal in the presence of food.

Here, the “active measures” of disinformation create a conditioned reflex by connecting a country, a leader or a political choice to something universally negative which, however, has nothing to do with the primary object.

This connection becomes instinctive, automatic, obvious and almost unconscious.

Just think of the automatism – once again artfully created – between the Italian intelligence services and the so-called “strategy of tension”.

The goal of perfect Dezinformatsjiais to create a Pavlovian conditioned reflex that works immediately and naturally as a Freudian “complex”.

Nevertheless, with a view to being successful, every fake news or message that is part of an “active measure” must have at least a grain of truth – otherwise it immediately appears as an opinion or ideology, which is soon rejected by the subject.

This means they can be discussed and maybe accepted rationally, but the “active measure” must mimic an immediate, natural and pre-rational reaction. Otherwise it becomes traditional propaganda or part of an open debate, exactly the opposite of what it has to do.

Hence the message must be processed with extreme care to reach the goal of any disinformation operation: to convey in the public “enemy” and / or in its ruling classes a message that – when well done – fits perfectly and unknowingly into the communication mechanisms of the “enemy”.

Western experts call this procedure “weaponization of information” or “fabrication of information”.

Nowadays, however, all information is distorted by the manipulation about the aims it must achieve – just think of the Italian and European debate on immigration from Africa.

Hence also the West uses the weaponization of information- but, probably, it still uses it badly.

Hence we will never witness the end of fake news – which  have always existed – but simply its refinement as real natural “states of mind” or, more often, as immediate reactions, such as those connected to a conditioned reflex artfully created.

In this case, there is no longer difference between reality and imagination.

Fake news as fiction – we could say.

If this is the new battlefield of psywar, it will be good for Italy – even autonomously from the NATO center that deals with “strategic information” – to equip itself with a structure, within the intelligence agencies, developing and carrying out specific disinformation operations.

For example, with reference to the Italian companies operating abroad, to Italy’s general image in the rest of Europe and to its action in Africa or in the rest of the world.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

Where does allegiance lie?

Bob Budahl

Published

on

Dongfan “Greg” Chung who is a native of China and a naturalized U.S. Citizen had “secret” security clearance while working with Rockwell and Boeing Corporations on the Space Shuttle project. He had retired in 2002 but returned a year later as a contractor until fall 2006. The government proved Chung committed espionage by taking and concealing Boeing secrets regarding the Delta IV rocket and also the Space Shuttle. He did this for the People’s Republic of China. He was convicted on charges of acting as an agent of the PRC as well as economic espionage.

The investigation of a different engineer working within the U.S is what led to Chung’s investigation and resulting conviction. He was sentenced to more than 24 years in prison.

The Chinese had sent letters requesting information as far back as 1979. In correspondence with the PRC Chung expressed his wishes to help the PRC modernize. He also sent 24 manuals related to the important B-1 Bomberfrom Rockwell Corporation which was very damaging.

Travel trips to the People’s Republic of China occurred on multiple occasions to lecture but he also met with government officials. In letters from his handlers they use his wife Rebecca and Chi Mak to transmit information. In the fall of 2006 FBI and NASA agents searched his home and discovered more than 250,000 documents from Boeing, Rockwell and others which were secret.

The Shuttle Drawing System or “SDS” that Rockwell and Boeing engineers created held information regarding performing processes regarding the Space Shuttle. The engineers need a password and authorization to be able to access this system and files. This is a clear case that defensive counterintelligence measures could have prevented printing, concealment and removal of documents from the workplace. One great example of offensive counterespionage was the search of Chung’s trash which led to much revealing evidence.Also his extensive travel to the PRC was an indicator that his scope of activities while in the PRC were above speaking engagements, seminars, teaching, personal. The authorities did conduct offensive counterintelligence to the best of their abilities once it learned via the other agent implicated in similar dealings with the PRC.

Continue Reading

Intelligence

Hacking of the Newswires connected with Trading: A refresher for the business community

Bob Budahl

Published

on

This case I am touching on is regarding Leonid Momotok in which he and other traders used insider trading information from not yet released press releases to amass windfalls in illegal trading. He pleaded guilty to conspiracy to commit wire fraud in his role to hack into three business newswires and obtain through theft the information related to finance that enabled illegal trading advantages. Their trades resulted in at least $30million in illegal profits. He pleaded guilty and faced up to 20 years in prison, restitution, a fine and criminal forfeiture.

The crux of the enabling operation to obtain an illegal advantage was gained through computer hackers in Ukraine who gained intrusion into Marketwired L.P, PR Newswire Association LLC (PRN) and Business Wire (Newswire Companies).Marketwired is owned by NASDAQ Inc., Business Wire is part of the billionaire Warren Buffet’s Berkshire Hathaway and PR Newswire is a Cision unit. The hackers used cyber-attack methods to obtain entry into the Newswire Companies’ networks. Once in, they stole upcoming press announcements about earnings, gross margins, confidential and material financial information and revenue information. They even sent messages regarding their activities. They went on to state they had gained access to the log-on to 15 wire business employees. While the traders made lists of what information they wanted, the hackers provided instructions on how to access and use the overseas server networks. And by having insider information before the public release the traders capitalized by placing trades prior to release date of the press releases. Caterpillar, Hewlett Packard, Panera Bread, Home Depot and others were some of those affected regarding nonpublic information. The hackers received a percentage of the profits and received it through shell corporations.       

The Dubovoy Group defendants tried to avoid detection by spreading their trading to more than 10 brokers firms in various names, etc. They helped each other with the activities as much as able. They stole over 100,000 unpublished press releases. Leonid Momotok owned 1% interest in two of Arkadiy Dubovoy’s companies.“He advised Arkadiy Dubovoy how to trade using the stolen information, and he had formal trading authority for brokerage accounts used in the scheme but held in the name of other members of the Dubovoy Group, …p 12.’

Involvement in the apprehension and prosecution of the perpetrators included many government agencies. The President’s Financial Fraud Enforcement Task Force had a leading hand in the pursuit and prosecution.

Continue Reading

Intelligence

9-11 Terrorist Attack: Defensive countermeasures of deter and detect

Bob Budahl

Published

on

On September 11, 2001 at 8:46 a.m. an airliner slammed into the North Tower of the World Trade Center in New York City. At 9:03 a.m. a 2nd airliner slammed into the South Tower. The planes carried thousands of gallons of jet-fuel aboard in effect making them lethal weapons. Tens of thousands of people worked in these buildings daily and both buildings fell to the ground within 90 minutes. More than 2,600 people died in the World Trade Center tower attacks. Then at 9:37 a.m. a 3rd airliner rammed into the western side of the Pentagon. 125 people died in the Pentagon attack. And a 4thairliner was intended for attack in either the U.S. Capitol or White House but the heroics of passengers crashed the plane, hence thwarting the attack. A total of 256 people died in the four planes. The death toll even surpassed the Pearl Harbor attacks of 1941.

Those responsible for the horrific attack were 19 Arabs carrying out Islamist extremists plans. Their headquarters were located in Afghanistan. They were resourceful and some had lived in the United States for some time and four of them had trained to be pilots. They were not well educated. They carried out the terrible attacks with knives, cutters, mace, etc. And they had tried to bring down the World Trade Center in 1993 but failed however in the result killed six people and wounded a thousand. It was an effort led by Ramzi Yousef. Others including Omar Abdel Rahman who had plans to blow up the Lincoln and Holland tunnels and other New York City landmarks, but they were arrested. Ramzi Yousef and others had various other terror plans of which some succeeded and some fortunately did not.

Bin Ladin was known and thought to be a financier but not thought of as a terrorist leader until later. In 1998 Bin Ladin and four others issued a fatwa in which it was publicly declaring it was God’s order that Muslims should try to kill any American they could. Bin Ladin was a wealthy Saudi and had conducted jihadist activities against the Soviet Union. But he also held grievances against the United States such as a U.S. troop presence in Saudi Arabia. He recruited and trained followers in Afghanistan and continued carrying out acts of terror, including on the United States. His people attacked embassies, hotels, and even attempted to sink the USS Cole Navy Ship by a terrorist attack. His rhetoric is derived from Islam, history and the economic and political disorder in the area. He formed an alliance between the al Qaeda group he led and the Taliban. The Clinton administration had tried cruise missile strikes against al Qaeda in Afghanistan and tried to get the Taliban to force Bin Ladin to leave Afghanistan. The U.S. unsuccessfully utilized CIA paid foreign agents to try to capture or kill Bin Ladin and his group.

As early as 1998 or 1999 Bin Ladin had been contacted by Khalid Sheikh Mohammed with an idea of using the planes as a method of attacking the World Trade Center and other targets. The original plans were for 10 planes to target both east and west coasts of the United States. The CIA did uncover some reports of Bin Ladin’s intent on attacks. The U.S. continued its disruption attempts globally and also utilized diplomacy with countries. The “predator drone” was eventually fitted with a missile should an attack on Bin Ladin provide an opportunity. Some of the reasons and connections to the actions of the perpetrators of the planned 9-11 terrorist attack became apparent after the attack. Unrest had come to the surface in the time before the attack as the Taliban leader opposed attacking the United States, in contrast to Bin Ladin’s wishes.

On 9/11 the terrorists were successful in hijacking the four planes. The planes were being used as terrorist weapons and confusion was present with air control. But eventually the FAA and NORAD who controlled airspace did receive a “shoot down order” but it was after the plane in Pennsylvania had been forced down by passengers in the only way to stop the plane from being used as a weapon.      

The enactment of the United States “Patriot Act” removed barriers that had impeded terrorism investigations in their outlay, scope and means. And in effect sped up the investigation and prosecution of the defendants. The FBI was point on the investigation that followed the attack and the operation was named Operation PENTTBOM. At one time more than half of the FBI’s personnel worked on the case. They followed through on more than one-half million leads. It was the largest crime scene in the FBI’s history.  Also in the time period following the 9/11 attack the Department of Homeland Security was created in March 2003, which brought together 22 separate agencies and offices into a Cabinet level department. The 9/11 Commission had made several recommendations and in this report some details are brought forward. These would be included under the defensive counterintelligence support mode of operation and include the principles of deter and detect within the countermeasures. It included recognizing 72 fusion centers throughout the country which acts as a focal point for receipt, analysis and sharing of threat related information. Also establishing related training and informational programs to deal with threats. One such example is the National Terrorism Advisory System. And the DHS developed and implemented a risk-based transportation security strategy. An action taken such as strengthening airline passenger’s pre-screening and targeting terrorist travel will deter terrorists as they become aware of increased security measures and thwart terrorists from attempting to board airlines for terrorist activities. The airliner’s cabin cockpit doors have been hardened post-911 and Air Marshalls are used appropriately as well as some flight crew being eligible to carry firearms. The TSA behavior detection officers use non-intrusive behavior observation to identify people who may be high risk. The TSA also utilizes detection methods such as canine teams to sniff for explosives on passengers and in luggage. Post 9/11 all cargo on U.S. planes is screened commensurate with their checked luggage. The flights coming into the U.S. from foreign countries are required to provide information prior to departure and checks all passengers against watch lists the government utilizes such as the Secure Flight Program. It also increases efficiency by allowing those cross-checked with biometrics to have expedited travel.

Today a significant defensive countermeasure post-911 is that airlines now screen all checked and carry-on baggage for explosives. The U.S. has increased security of U.S. borders and identification documents. Certain areas are closely watched and critical security improvements along the Northern and maritime are emplaced. The Dept. Of Homeland Security has taken aggressive action to enhance the security of the nation’s infrastructure and also cyber infrastructure and networks. There in a federal government system cyber intrusion detection system which includes EINSTEIN and the National Cybersecurity and communications integration center is the nation’s hub for organizing cyber response efforts. DHS and DOD are working together to protect against threats to military and civilian computer systems and networks. This is another example of defensive countermeasures. DNDO is affiliated with nuclear detection and back in 2003 only 68% of arriving trucks and passenger vehicles were scanned along the northern border with no system on the southwest border. But today the systems scan 100% of all containerized cargo and personal vehicles arriving in the U.S. through land port of entries and up to 99% of sea containers. Counter-proliferation of nuclear and biological threats is a high priority of the DHS. The tragic occurrence of 9-11 has brought about real focus on the danger of leaving vulnerabilities open to exploitation. The DHS also has importantly increased efforts to track and disrupt terrorist financing through programs such as ECTF or Electronic Crimes Task Force.

Another action taken post-9/11 was the creation of the National Counterterrorism Center or NCTC which was to serve 5 functions which were; Threat Analysis, Identity Management, Information sharing, Strategic Operational Planning and National Intelligence Management.

The U.S. Department of Justice charged ZACARIAS MOUSSAOUI with numerous terrorism charges and indicates others involved in the terrorist acts. The United States Department of Defense obtained a video tape of Bin Ladin basically accepting responsibility of the 9-11 attacks and the DOD has a transcript of the video and a portion I will quote is as follows. UBL refers to Osama Bin Ladin: “UBL: The brothers, who conducted the operation, all they knew was that they have a martyrdom operation and we asked each of them to go to America but they didn’t know anything about the operation, not even one letter.  But they were trained and we did not reveal the operation to them until they are there and just before they boarded the planes.UBL: (…inaudible…) then he said: Those who were trained to fly didn’t know the others.”

Bin Ladin, America’s most wanted terrorist was killed by United States Special Forces in a compound in Pakistan on May 2, 2011. The CIA had been involved in investigating Bin Ladin for years.      

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy