This is part of an ongoing series on Consultants Advisory Group.
After having been provided with the email address of David Wimhurst of MINUSTAH in Haiti yesterday morning, I sent Wimhurst a polite note asking him if I might submit to his office questions concerning Consultants Advisory Group. The response I received from him -- not befitting an employee of a "Communications and Public Information Office" -- was intended to intimidate me. I was duly intimidated. But now I've had a good night's sleep and I'm over it.
The main purpose of this post is to discuss the two slides Wimhurst submitted to me as the "originals" by way of claiming the PowerPoint presentation in my possession has been doctored. I will address that presently. [Note that Wimhust submitted only two slides, not an entire presentation that might be compared to the one in my possession.]
Part 1: Addressing WImhurst’s Questions
First, however, I will attempt to address the questions Wimhurst claims I must answer. In the course of his unprofessionally rude and threatening letter, which I will show him the mercy of not publishing for the moment, what he seems to demand is any evidence in my possession that the PowerPoint presentation downloadable from my web site was altered by anyone for the purpose of undermining the UN operations in Haiti. Let me say unequivocally, for the record, that there is no evidence whatsoever in my possession that anyone doctored the PowerPoint presentation for the purpose of undermining the UN operations in Haiti. None. Zip. Zero. Sorry to disappoint.
HOWEVER, there is an abundance of evidence in my possession, much of it unpublished, that the Consultants Advisory Group is an amateurish operation which changes its story whenever convenient; an outfit that makes the Keystone Cops look like pros.
As nearly as I can tell, CAG's Valerie Sendecki initiated communications with me last month for the purpose of finding out how I learned of CAG and their connection to Top Cat Marine Security. Despite Sendecki's claims to have had lunch with Jordan Sage and later to have had her arrested and deported, my current thinking is that access to Sage's email account was gained by keystroke logging on UN-owned computers and that Sendecki and co. never knew her identity. What they had access to was her correspondence and her address book. My suspicion is that someone found Mariely Puello's name and phone number in Jordan Sage's email account and used the name to create a gmail account under her name.
The Mariely Puello, whose phone number appears in the email I received, is not the author of the letter I was sent. How do I know this? She doesn't have the English skills. When I called her number and got her on the phone, we were unable to have a conversation. She and I have no common language. A third party has contacted me on her behalf and explained her situation, but it is frustrating because I am unable to converse or correspond with her. From what I understand, while she was visited by some police, she has nothing to do with the sending of the PowerPoint presentation. I'm told that she is a very good girl and that she is terrified. Further, Sendecki could not have had her detained in Haiti as Sendecki claimed, because Puello was not in Haiti at the time. There is no reason to expect that Puello even knows the identity of "Jordan Sage," even if she has corresponded with that person. Other than Valerie Sendecki's claim to have lunched with Sage, no one has yet come forward to say they know her. The name was not contained in the email address under which "Sage" wrote and is, I suspect, an alias.
CAG may well, as they claimed, have had a few people in Haiti arrested. But if their intel was based on keystroke logging, CAG has no way of knowing if they arrested the right ones.
So. Why do I think access to Jordan Sage's account was obtained by keystroke logging? Because otherwise CAG's whole clown circus of incompetent psyops operatives would not be after information that should already be in their possession. It is my belief that CAG's operatives have not been candid with their employer about the full extent of their attempts to do damage control on my discovery of their existence. Inasmuch as I have any evidence that a document might have been altered, this evidence suggests that it was an inside job conducted in the interests of CAG.
Interestingly absent from Wimhurst’s letter is any hint that he is aware that I provided the “Puello” letter plus the PowerPoint presentation to two other people immediately upon receipt. It is my strong impression that CAG has communicated to Wimhurst neither the identities of these two people nor the contents of CAG’s communications with them. Wimhurst would be much more uncomfortable involving the UN legal office in this affair if he had received full disclosure from CAG.
MEANWHILE, I hear through the grapevine that CAG's Jay Fullerton claims Sendecki has resigned. If Wimhurst were receiving full disclosure, Fullerton would also need to resign.
Part 2: Thinking with Bullets
A few years ago, Edward Tufte published a book entitled The Cognitive Style of Power Point which I have been meaning to read some time. While I am a heavy user of both Microsoft Word and Microsoft Excel, until I got an enormous hard drive I used to routinely throw PowerPoint off my hard drive because I think it is a mostly useless and actively pernicious program.
Here’s a little snip of how Presentations.com summarizes Tufte’s objections to PowerPoint and the reactions to them:
Another reason for PowerPoint's sudden spike in notoriety is that the program finally caught the attention of Edward R. Tufte, a professor of information design at Yale University. Often referred to as the world's leading guru of information design, Tufte's books – The Visual Display of Information, Envisioning Information, and Visual Explanations – redefined the art of presenting information in visual form (charts, tables, graphs, etc.). No one knows more about effective data design, and no one in the field is more respected.
So when, in March 2003, Tufte published a 23-page denunciation of PowerPoint entitled "The Cognitive Style of PowerPoint," many people who had never before taken PowerPoint seriously began paying attention. It was Tufte who brought NASA's now infamous PowerPoint slide to the public's attention. It was Tufte's work that emboldened The New York Times to suggest that information manipulation via electronic slides may have helped Secretary of State Colin Powell make his case to the United Nations for declaring war on Iraq. And it is Tufte, in his 23-page screed, who uses such words as stupid, smarmy, incoherent, witless, medieval and dementia to describe the trivializing effect of PowerPoint slides on pure, defenseless data. Tufte doesn't stop short of calling PowerPoint evil – he does call it evil, most visibly in an excerpt published in Wired last year succinctly titled "PowerPoint is evil." Indeed, the photo on the pamphlet's cover is of a 1956 Russian military parade in which a statue of Stalin is depicted saying, "Next slide, please."
If there is something right with PowerPoint, it is the program's ability to combine either images and text, or a sequence of bulleted items, in order to make an argument.
The UN-restricted PowerPoint presentation I was provided with initially seems to make several layers of argument, a couple of which I am unhappy with. Though the authoring info on the document listed the author as “pkf” and the company as “UN,” the implicit narrative voice is that of CAG; one of the document’s arguments is how useful CAG is making itself. Though perhaps composed on UN computers, my sense is that the docment's author works for CAG.
Now, let us turn to the two slides provided by Wimhurst which he claims are the “originals.”
Slide 1: What might the point of this slide be?
It seems to be lacking a point, but I’ll have a go at it: For those
of you Peace Keepers fresh off the plane, Waaf Jeremie and Cite Soleil
are on the coast, not in the mountains, and the coastline between
them is completely surrounded by WATER!
Click. Next slide, please!
Slide 2: This page is a little sparse, too. Um, and why bullet something that’s all alone on the page?
I’ll have a go at the voiceover: And men, remember, when creating
PowerPoint presentations for military use, it’s very important to leave
plenty of room to allow space for others to add their thoughts, so be
sure to push the text as high up as you can. Also, the resulting
expanse of blue will subliminally remind your audience that the Haitian
coastline is completely surrounded by WATER!
Look. Um. Wimhust. This is embarrassing. Are these really the originals from an actual PowerPoint presentation? The best face I can put on this is that these are the materials from which a final presentation might have been made, not the final presentation itself. It is also possible that these really are slides from a real presentation. But if that is the case, the presentation’s author is incompetent to use the program and perhaps should explore some other mode of communication.
This does not prove that the presentation I was emailed was in fact presented or that its contents mean what they appear to. But the incompleteness of Wimhurst's "originals" does call into question the plausibility of the only actual information I have received from MINUSTAH.
In Wimhurst's one communication to me his prose style suggests his background
is in yelling at people in uniform, not in answering questions. Who hired this Wimhurst guy, anyway? What I find most peculiar about Wimhurst's letter to me is that he seems to take the attitude that CAGs Clown Crew had already said what he had to say to me by proxy and that he had nothing further to add. Were Sendecki-Fullerton-Reuther really speaking for Wimhurst?
(Thanks for the support, Alex!)
UPDATE 2/2/06: Rereading our exchange, I note that in my email to Wimhurst I specifically expressed concern that CAG " may be under contract to the Brazilian Peacekeeping Forces and may have been using their office computers." It occurred to me this morning that Wimhurst's reply that he had "no intention of answering any of [my] questions" was in fact Wimhurst declining comment on
- Whether CAG is under contract to Brazilian Peacekeeping Forces, and
- Whether CAG is using the office computers of the Brazilian Peackeepers.
All right then. He has no comment. I'll probably revisit that subject in a subsequent post.