Plausible deniability

Last updated

Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge of or responsibility for actions committed by or on behalf of members of their organizational hierarchy. They may do so because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions. If illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such acts to insulate themselves and shift the blame onto the agents who carried out the acts, as they are confident that their doubters will be unable to prove otherwise. The lack of evidence to the contrary ostensibly makes the denial plausible (credible), but sometimes, it makes any accusations only unactionable.

Contents

The term typically implies forethought, such as intentionally setting up the conditions for the plausible avoidance of responsibility for one's future actions or knowledge. In some organizations, legal doctrines such as command responsibility exist to hold major parties responsible for the actions of subordinates who are involved in actions and nullify any legal protection that their denial of involvement would carry.

In politics and especially espionage, deniability refers to the ability of a powerful player or intelligence agency to pass the buck and to avoid blowback by secretly arranging for an action to be taken on its behalf by a third party that is ostensibly unconnected with the major player. In political campaigns, plausible deniability enables candidates to stay clean and denounce third-party advertisements that use unethical approaches or potentially libelous innuendo.

Although plausible deniability has existed throughout history, the term was coined by the CIA in the early 1960s to describe the withholding of information from senior officials to protect them from repercussions if illegal or unpopular activities became public knowledge. [1]

Overview

Arguably, the key concept of plausible deniability is plausibility. It is relatively easy for a government official to issue a blanket denial of an action, and it is possible to destroy or cover up evidence after the fact, that might be sufficient to avoid a criminal prosecution, for instance. However, the public might well disbelieve the denial, particularly if there is strong circumstantial evidence or if the action is believed to be so unlikely that the only logical explanation is that the denial is false.[ citation needed ]

The concept is even more important in espionage. Intelligence may come from many sources, including human sources. The exposure of information to which only a few people are privileged may directly implicate some of the people in the disclosure. An example is if an official is traveling secretly, and only one aide knows the specific travel plans. If that official is assassinated during his travels, and the circumstances of the assassination strongly suggest that the assassin had foreknowledge of the official's travel plans, the probable conclusion is that his aide has betrayed the official. There may be no direct evidence linking the aide to the assassin, but collaboration can be inferred from the facts alone, thus making the aide's denial implausible.

History

The term's roots go back to US President Harry Truman's National Security Council Paper 10/2 of June 18, 1948, which defined "covert operations" as "all activities (except as noted herein) which are conducted or sponsored by this Government against hostile foreign states or groups or in support of friendly foreign states or groups but which are so planned and executed that any US Government responsibility for them is not evident to unauthorized persons and that if uncovered the US Government can plausibly disclaim any responsibility for them." [2] During the Eisenhower administration, NSC 10/2 was incorporated into the more-specific NSC 5412/2 "Covert Operations." [3] NSC 5412 was declassified in 1977 and is located at the National Archives. [4] The expression "plausibly deniable" was first used publicly by Central Intelligence Agency (CIA) Director Allen Dulles. [5] The idea, on the other hand, is considerably older. For example, in the 19th century, Charles Babbage described the importance of having "a few simply honest men" on a committee who could be temporarily removed from the deliberations when "a peculiarly delicate question arises" so that one of them could "declare truly, if necessary, that he never was present at any meeting at which even a questionable course had been proposed." [6]

Church Committee

A U.S. Senate committee, the Church Committee, in 1974–1975 conducted an investigation of the intelligence agencies. In the course of the investigation, it was revealed that the CIA, going back to the Kennedy administration, had plotted the assassination of a number of foreign leaders, including Cuba's Fidel Castro, but the president himself, who clearly supported such actions, was not to be directly involved so that he could deny knowledge of it. That was given the term "plausible denial." [7]

Non-attribution to the United States for covert operations was the original and principal purpose of the so-called doctrine of "plausible denial." Evidence before the Committee clearly demonstrates that this concept, designed to protect the United States and its operatives from the consequences of disclosures, has been expanded to mask decisions of the president and his senior staff members.

Church Committee [8]

Plausible denial involves the creation of power structures and chains of command loose and informal enough to be denied if necessary. The idea was that the CIA and later other bodies could be given controversial instructions by powerful figures, including the president himself, but that the existence and true source of those instructions could be denied if necessary if, for example, an operation went disastrously wrong and it was necessary for the administration to disclaim responsibility.

Later legislative barriers

The Hughes–Ryan Act of 1974 sought to put an end to plausible denial by requiring a presidential finding for each operation to be important to national security, and the Intelligence Oversight Act of 1980 required for Congress to be notified of all covert operations. Both laws, however, are full of enough vague terms and escape hatches to allow the executive branch to thwart their authors' intentions, as was shown by the Iran–Contra affair. Indeed, the members of Congress are in a dilemma since when they are informed, they are in no position to stop the action, unless they leak its existence and thereby foreclose the option of covertness. [9]

Media reports

The (Church Committee) conceded that to provide the United States with "plausible denial" in the event that the anti-Castro plots were discovered, Presidential authorization might have been subsequently "obscured". (The Church Committee) also declared that, whatever the extent of the knowledge, Presidents Eisenhower, Kennedy and Johnson should bear the "ultimate responsibility" for the actions of their subordinates.

John M. Crewdson, The New York Times [10]

CIA officials deliberately used Aesopian language [11] in talking to the President and others outside the agency. (Richard Helms) testified that he did not want to "embarrass a President" or sit around an official table talking about "killing or murdering." The report found this "circumlocution" [12] reprehensible, saying: "Failing to call dirty business by its rightful name may have increased the risk of dirty business being done." The committee also suggested that the system of command and control may have been deliberately ambiguous, to give Presidents a chance for "plausible denial."

Anthony Lewis, The New York Times [13]

What made the responsibility difficult to pin down in retrospect was a sophisticated system of institutionalized vagueness and circumlocution whereby no official - and particularly a President - had to officially endorse questionable activities. Unsavory orders were rarely committed to paper and what record the committee found was shot through with references to "removal," "the magic button" [14] and "the resort beyond the last resort." Thus the agency might at times have misread instructions from on high, but it seemed more often to be easing the burden of presidents who knew there were things they didn't want to know. As former CIA director Richard Helms told the committee: "The difficulty with this kind of thing, as you gentlemen are all painfully aware, is that nobody wants to embarrass a President of the United States."

Newsweek [15]

Iran–Contra affair

In his testimony to the congressional committee studying the Iran–Contra affair, Vice Admiral John Poindexter stated: "I made a deliberate decision not to ask the President, so that I could insulate him from the decision and provide some future deniability for the President if it ever leaked out." [16]

Declassified government documents

Soviet operations

In the 1980s, the Soviet KGB ran OPERATION INFEKTION (also called "OPERATION DENVER"), which utilised the East German Stasi and Soviet-affiliated press to spread the idea that HIV/AIDS was an engineered bioweapon. The Stasi acquired plausible deniability on the operation by covertly supporting biologist Jakob Segal, whose stories were picked up by international press, including "numerous bourgeois newspapers" such as the Sunday Express . Publications in third-party countries were then cited as the originators of the claims. Meanwhile, Soviet intelligence obtained plausible deniability by utilising the German Stasi in the disinformation operation. [21]

Little green men and Wagner Group

In 2014, "Little green men"—troops without insignia carrying modern Russian military equipment—emerged at the start of the Russo-Ukrainian War, which The Moscow Times described as a tactic of plausible deniability. [22] [23]

The Wagner Group, a Russian private military company, has been described as an attempt at plausible deniability for Kremlin-backed interventions in Ukraine, Syria, and in various interventions in Africa. [24] [25] [23] [26]

Flaws

Other examples

Another example of plausible deniability is someone who actively avoids gaining certain knowledge of facts because it benefits that person not to know.

As an example, a lawyer may suspect that facts exist that would hurt his case but decide not to investigate the issue because if he has actual knowledge, the rules of ethics might require him to reveal the facts to the opposing side.

Council on Foreign Relations

...the U.S. government may at times require a certain deniability. Private activities can provide that deniability.

Council on Foreign Relations, Finding America's Voice: A Strategy for Reinvigorating U.S. Public Diplomacy [30] [ page needed ]

Use in computer networks

In computer networks, plausible deniability often refers to a situation in which people can deny transmitting a file, even when it is proven to come from their computer.

That is sometimes done by setting the computer to relay certain types of broadcasts automatically in such a way that the original transmitter of a file is indistinguishable from those who are merely relaying it. In that way, those who first transmitted the file can claim that their computer had merely relayed it from elsewhere. This principle is used in the opentracker bittorrent implementation by including random IP addresses in peer lists.

In encrypted messaging protocols, such as bitmessage, every user on the network keeps a copy of every message, but is only able to decrypt their own and that can only be done by trying to decrypt every single message. Using this approach it is impossible to determine who sent a message to whom without being able to decrypt it. As everyone receives everything and the outcome of the decryption process is kept private.

It can also be done by a VPN if the host is not known.[ dubious discuss ]

In any case, that claim cannot be disproven without a complete decrypted log of all network connections.

Freenet file sharing

The Freenet file sharing network is another application of the idea by obfuscating data sources and flows to protect operators and users of the network by preventing them and, by extension, observers such as censors from knowing where data comes from and where it is stored.

Use in cryptography

In cryptography, deniable encryption may be used to describe steganographic techniques in which the very existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that an encrypted message exists. In that case, the system is said to be "fully undetectable".[ citation needed ]

Some systems take this further, such as MaruTukku, FreeOTFE and (to a much lesser extent) TrueCrypt and VeraCrypt, which nest encrypted data. The owner of the encrypted data may reveal one or more keys to decrypt certain information from it, and then deny that more keys exist, a statement which cannot be disproven without knowledge of all encryption keys involved. The existence of "hidden" data within the overtly encrypted data is then deniable in the sense that it cannot be proven to exist.

“Trepidation of Relationship” [31] and “Trepidation of Memory” [32] are two further cryptogaphical concepts to discuss plausible deniability, as also compared in a Youtube-Audio-Podcast. [33]

These cryptographic concepts serve to protect privacy and increase security in networks. They make mass surveillance more difficult and enable plausible deniability. Both concepts can be summarized as follows:

Programming

The Underhanded C Contest is an annual programming contest involving the creation of carefully crafted defects, which have to be both very hard to find and plausibly deniable as mistakes once found.

See also

Related Research Articles

In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, where in actuality the attacker has inserted themselves between the two user parties.

<span class="mw-page-title-main">Bureau of Intelligence and Research</span> Intelligence agency in the U.S. State Department

The Bureau of Intelligence and Research (INR) is an intelligence agency in the United States Department of State. Its central mission is to provide all-source intelligence and analysis in support of U.S. diplomacy and foreign policy. INR is the oldest civilian element of the U.S. Intelligence Community and among the smallest, with roughly 300 personnel. Though lacking the resources and technology of other U.S. intelligence agencies, it is "one of the most highly regarded" for the quality of its work.

<span class="mw-page-title-main">TrueCrypt</span> Discontinued source-available disk encryption utility

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt the whole storage device.

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

<span class="mw-page-title-main">Church Committee</span> Committee investigating governmental abuses in the US intelligence community

The Church Committee was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence Agency (CIA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), and the Internal Revenue Service (IRS). Chaired by Idaho Senator Frank Church (D-ID), the committee was part of a series of investigations into intelligence abuses in 1975, dubbed the "Year of Intelligence", including its House counterpart, the Pike Committee, and the presidential Rockefeller Commission. The committee's efforts led to the establishment of the permanent US Senate Select Committee on Intelligence.

<span class="mw-page-title-main">Operation Mongoose</span> US government terrorism & sabotage campaign in Cuba

The Cuban Project, also known as Operation Mongoose, was an extensive campaign of state-sponsored terrorist attacks against civilians, and covert operations, carried out by the U.S. Central Intelligence Agency in Cuba. It was officially authorized on November 30, 1961, by U.S. President John F. Kennedy. The name "Operation Mongoose" was agreed to at a White House meeting on November 4, 1961.

<span class="mw-page-title-main">United States President's Commission on CIA Activities within the United States</span> Panel investigating intelligence activities within the U.S.

The United States President's Commission on CIA Activities within the United States was ordained by President Gerald Ford in 1975 to investigate the activities of the Central Intelligence Agency and other intelligence agencies within the United States. The Presidential Commission was led by Vice President Nelson Rockefeller, from whom it gained the nickname the Rockefeller Commission.

Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media by using disk encryption.

Proxy re-encryption (PRE) schemes are cryptosystems which allow third parties (proxies) to alter a ciphertext which has been encrypted for one party, so that it may be decrypted by another.

Ciphertext indistinguishability is a property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of indistinguishability, then an adversary will be unable to distinguish pairs of ciphertexts based on the message they encrypt. The property of indistinguishability under chosen plaintext attack is considered a basic requirement for most provably secure public key cryptosystems, though some schemes also provide indistinguishability under chosen ciphertext attack and adaptive chosen ciphertext attack. Indistinguishability under chosen plaintext attack is equivalent to the property of semantic security, and many cryptographic proofs use these definitions interchangeably.

The Office of Policy Coordination (OPC) was the covert operation wing of the United States Central Intelligence Agency (CIA). Created as a department of the CIA in 1948, it actually operated independently until October 1950. OPC existed until 1 August 1952, when it was merged with the Office of Special Operations (OSO) to form the Directorate of Plans (DDP).

The Hughes–Ryan Amendment was an amendment to the Foreign Assistance Act of 1961, passed as section 32 of the Foreign Assistance Act of 1974. The amendment was named for its co-authors, Senator Harold E. Hughes (D–IA) and Representative Leo Ryan (D–CA). The amendment required the President of the United States to report all covert actions of the Central Intelligence Agency to one or more Congressional committees.

<span class="mw-page-title-main">Directorate of Operations (CIA)</span> US clandestine intelligence organization

The Directorate of Operations (DO), less formally called the Clandestine Service, is a component of the US Central Intelligence Agency. It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015.

Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. Cryptovirology employs a twist on cryptography, showing that it can also be used offensively. It can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography typically prevents.

Executive oversight of United States covert operations has been carried out by a series of sub-committees of the National Security Council (NSC).

At various times since the creation of the Central Intelligence Agency, the Federal government of the United States has produced comprehensive reports on CIA actions that marked historical watersheds in how CIA went about trying to fulfill its vague charter purposes from 1947. These reports were the result of internal or presidential studies, external investigations by congressional committees or other arms of the Federal government of the United States, or even the simple releases and declassification of large quantities of documents by the CIA.

<span class="mw-page-title-main">OpenPuff</span> Steganography software

OpenPuff Steganography and Watermarking, sometimes abbreviated OpenPuff or Puff, is a free steganography tool for Microsoft Windows created by Cosimo Oliboni and still maintained as independent software. The program is notable for being the first steganography tool that:

<span class="mw-page-title-main">CIA assassination attempts on Fidel Castro</span> Assassination attempts on Cuban Leader Fidel Castro

The United States' Central Intelligence Agency (CIA) made numerous unsuccessful attempts to assassinate Cuban leader Fidel Castro. There were also attempts by Cuban exiles, sometimes in cooperation with the CIA. The 1975 Church Committee claimed eight proven CIA assassination attempts between 1960 and 1965. In 1976, President Gerald Ford issued an Executive Order banning political assassinations. In 2006, Fabián Escalante, former chief of Cuba's intelligence, stated that there had been 634 assassination schemes or attempts. The last known plot to assassinate Castro was by Cuban exiles in 2000.

<span class="mw-page-title-main">Stephen Slick</span> Former Central Intelligence Agency (CIA) Operation Officer in United States

Stephen Brent Slick is a former Central Intelligence Agency (CIA) operations officer and United States National Security Council official. He is the inaugural director of the Intelligence Studies Project at the University of Texas at Austin, where he is also a Clinical Professor at the Lyndon B. Johnson School of Public Affairs and the Bobby R. Inman Chair in Intelligence Studies.

Identity-based conditional proxy re-encryption (IBCPRE) is a type of proxy re-encryption (PRE) scheme in the identity-based public key cryptographic setting. An IBCPRE scheme is a natural extension of proxy re-encryption on two aspects. The first aspect is to extend the proxy re-encryption notion to the identity-based public key cryptographic setting. The second aspect is to extend the feature set of proxy re-encryption to support conditional proxy re-encryption. By conditional proxy re-encryption, a proxy can use an IBCPRE scheme to re-encrypt a ciphertext but the ciphertext would only be well-formed for decryption if a condition applied onto the ciphertext together with the re-encryption key is satisfied. This allows fine-grained proxy re-encryption and can be useful for applications such as secure sharing over encrypted cloud data storage.

References

  1. "Plausible Deniability Definition, Examples, & Laws". The Law Dictionary. Retrieved 2022-03-24.
  2. Office of the Historian, Department of State. National Security Council Directive on Office of Special Projects (NSC 10/2), Washington, June 18, 1948.
  3. Office of the Historian, Department of State. Covert Operations (NSC 5412/2), Washington, undated.
  4. Records of the National Security Council (NSC), Record Group 273.
  5. Carlisle, Rodney P (2003). The Complete Idiot's Guide to Spies and Espionage. Alpha Books. p. 213. ISBN   0-02-864418-2.
  6. Babbage, Charles (1864). Passages from the Life of a Philosopher. Longman, Green, Longman, Roberts, & Green. pp. 261–262.
  7. Zinn, Howard (1991). Declarations of Independence: Cross Examining American Ideology. Perennial. p. 16. ISBN   0-06-092108-0.
  8. Church Committee Reports United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Senate, Nov. 20, 1975, II. Section B Covert Action as a Vehicle for Foreign Policy Implementation. p. 11
  9. New York Times Under Cover, or Out of Control? November 29, 1987 Section 7; p. 3, Column 1 (Book Review of 2 books: The Perfect Failure and Covert Action)
  10. Crewdson, John M. (1975-11-21). "Castro Plot Study Finds No Role by White House". The New York Times . ISSN   0362-4331 . Retrieved 2020-06-07.
  11. Definition: Using or having ambiguous or allegorical meanings, especially to elude political censorship: "They could express their views only in a diluted form, resorting to Aesopian hints and allusions" (Isaac Deutscher).
  12. Definition: The use of unnecessarily wordy and indirect language, Evasion in speech or writing, An indirect way of expressing something
  13. Lewis, Anthony (1975-11-23). "How Fantasies Became Policy, Out of Control". The New York Times . ISSN   0362-4331 . Retrieved 2020-06-07.
  14. Definition of the "Magic Button" from the Los Angeles Times Article: The Search for a 'Magic Button' In American Foreign Policy; October 18, 1987; (Review by David Aaron of the book Covert Action)I recall during my days as a Senate investigator finding a piece of yellow note pad with jottings from a meeting with White House officials during the Kennedy Administration that discussed an "Executive Action" or, in plain English, an assassination capability. The notes referred to it as the "magic button."
  15. Newsweek The CIA'S Hit List, December 1, 1975, p. 28
  16. Jamieson, Kathleen Hall (1993). Dirty Politics: Deception, Distraction, and Democracy . Oxford University Press US. p. 86. ISBN   0-19-508553-1.
  17. "Cable from Ambassador Lodge to McGeorge Bundy on US Options With Respect to a Possible Coup, 25 October 1963". www.mtholyoke.edu. Archived from the original on 2021-03-08. Retrieved 2020-06-07.
  18. Department Of State: Office of Electronic Information, Bureau of Public Affairs. "Documents 209-244". 2001-2009.state.gov. p. Telegram 216. Retrieved 2020-06-07.
  19. "Chile 1964: CIA covert support in Frei election detailed; operational and policy records released for first time". National Security Archive. Archived from the original on 2014-06-17. Retrieved 2006-07-08.
  20. "CIA and Assassinations: The Guatemala 1954 Documents". National Security Archive. Retrieved 2006-07-08.
  21. Selvage, Douglas (2021-08-09). "Operation "Denver": The East German Ministry for State Security and the KGB's AIDS Disinformation Campaign, 1986–1989 (Part 2)". Journal of Cold War Studies. 23 (3): 4–80. doi: 10.1162/jcws_a_01024 . ISSN   1520-3972.
  22. Person, Robert (2015-10-26). "Baltic Russians Aren't Pawns in Strategic Game". The Moscow Times. Retrieved 2021-09-28.
  23. 1 2 "Russian Private Military Companies in Syria and Beyond". www.csis.org. Retrieved 2021-09-28.
  24. Mackinnon, Amy. "Russia's Wagner Group Doesn't Actually Exist". Foreign Policy. Retrieved 2021-09-18.
  25. "The Wagner Group: Untangling the Purpose behind a Russian Power Tool". cisac.fsi.stanford.edu. Retrieved 2021-09-18.
  26. Hussain, Murtaza (February 2, 2023). "The Grisly Cult of the Wagner Group's Sledgehammer". The Intercept.
  27. Church Committee II. Section B Page 11; IV. Findings and Conclusions Section C Subsection 1 Page 261:
    An additional possibility is that the President may, in fact, not be fully and accurately informed about a sensitive operation because he failed to receive the "circumlocutious" message.... The Committee finds that the system of Executive command and control was so inherently ambiguous that it is difficult to be certain at what level assassination activity was known and authorized. This creates the disturbing prospect that assassination activity might have been undertaken by officials of the United States Government without its having been incontrovertibly clear that there was explicit authorization from the President of the United States.
  28. Church Committee IV. Findings and Conclusions Section C Subsection 5 Page 277:
    It was naive for policymakers to assume that sponsorship of actions as big as the [Bay of Pigs] invasion could be concealed. The Committee's investigation of assassination and the public disclosures which preceded the inquiry demonstrate that when the United States resorted to cloak-and-dagger tactics, its hand was ultimately exposed.
  29. Church Committee IV. Section C Subsection 5 Page 277:
    "Plausible denial" increases the risk of misunderstanding. Subordinate officials should describe their proposals in clear, precise, and brutally frank language; superiors are entitled to, and should demand, no less
  30. Peterson, Peter G.; Bloomgarden, Kathy F. (Kathy Finn); Grunwald, Henry A. (Henry Anatole); Morey, David E.; Telhami, Shibley; Sieg, Jennifer (2003). Finding America's voice: a strategy for reinvigorating U.S. public diplomacy: report of an independent task force sponsored by the Council on Foreign Relations. New York: Council on Foreign Relations Press. ISBN   0-87609-321-7. OCLC   53166707.{{cite book}}: CS1 maint: multiple names: authors list (link)
  31. Nurf, Uni (2023). Human Proxies. BOD Publishing. p. 66ff. ISBN   978-3759705044.
  32. Tenzer, Theo (2022). Super Secreto - The Third Epoch of Cryptography. BOD Publishing. p. 244ff. ISBN   9783755761174.
  33. Youtube (October 24, 2024). Cryptography: Trepidation of Memory (with Fiasco Keys) & Trepidation of Relationship (with Human Proxy) (Audio-Podcast). Youtube.
  34. Tenzer, Theo (2022). Super Secreto - The Third Epoch of Cryptography. BOD Publishing. p. 244ff. ISBN   9783755761174.
  35. Nurf, Uni (2023). Human Proxies. BOD Publishing. p. 66ff. ISBN   978-3759705044.

Further reading