Cybersecurity

The war in Ukraine is less “surprising” to some who’ve seen it raging since 2014. Although it escalated greatly in 2022, the Ukraine timeline dates back all the way to the collapse of the Soviet Union in 1991.

To understand the backstory — which is now inextricably intertwined with our own presidential history given the impeachment of Donald Trump over his phone calls with Zelensky to the Republican Party‘s current-day support of the aims of Vladimir Putin — we have to go back to a time when no one was stronger on anti-Russian policy than GOP darling Ronald Reagan.

  • 1991 — Ukraine declares independence and becomes an independent entity after the fall of the Soviet Union
  • 1994 — Ukraine agrees to give up its nuclear arsenal in exchange for a protection agreement with Russia, United States, Britain, and Ireland (Budapest Memorandum)
  • 2004Viktor Yanukovich “wins” election under dubious circumstances and is deposed for a do over election, which he loses to Viktor Yuschenko (Orange Revolution)
  • 2006 — Viktor Yanukovych begins working directly with Paul Manafort, in an effort to boost his image after his electoral loss. Manafort was known for his work helping the “Torturers’ Lobby” of brutal dictators around the world in the 1980s, with Roger Stone (another infamous dirty trickster best known for his role as a fixer for Richard Nixon).
  • 2007 — Yanukovych’s Party of Regions does well in the Ukranian parliamentary elections, gaining a large number of seats credited to Manafort’s strategic advice about Western-style campaigning.
  • 2010 — Yanukovych is elected President of Ukraine, again largely crediting Manafort’s strategies for his comeback.
  • Nov 2013 — Having promised a more European-style government in order to win the presidency in 2010, Yanukovych turned on his word and initiated more pro-Russian policies than the Ukranians had signed up for. Yanukovych is now beset by enormous public protests against the corruption of his regime, and his unilateral decision to abandon an association agreement with the EU in favor of a trade agreement with Russia (Maidan Revolution / Revolution of Dignity)
  • Feb 2014 — After a harrowing 93 days barricaded inside Kyiv’s Maidan Square, activists are victorious; Yanukovich is deposed and flees to Russia
  • Mar 2014 — Russian forces invade and annex the region of Crimea within Ukraine
  • Apr 2014 — Russian forces invade the Donetsk and Luhansk regions in eastern Ukraine, escalating a war that continues to this day and had already killed more than 14,000 people by the time the 2022 large scale invasion began
  • Apr 2014 — Hunter Biden and business partner Devon Archer join the board of Burisma
  • May 2014 — Candy magnate Petro Poroshenko succeeds Yanukovych as president of Ukraine
  • Feb 10, 2015Viktor Shokin takes office as the prosecutor general of Ukraine, tasked with getting a handle on rampant corruption
  • Oct 8, 2015 — US Assistant Secretary of State Victoria Nuland reiterates strong concerns that Shokin is failing to prosecute obvious corruption in Ukraine, and that efforts at anti-corruption must be stepped up there
  • Dec 8, 2015 — Then VP and point person on Ukraine Joe Biden gave a speech to the Ukrainian parliament, urging them to step up their efforts to pursue anti-corruption reforms to help strengthen their young democracy
  • Winter 2015-6 — Biden is talking to Poroshenko about how Shokin is slow-walking their anti-corruption efforts
  • Feb 16, 2016 — Viktor Shokin resigns as Prosecutor General of Ukraine
  • May 12, 2016Yuriy Lutsenko is appointed as the new Prosecutor General, despite having no law degree or legal experience. At first he takes a hard line against Burisma.
  • Aug 14, 2016 — “Black ledger” payments to Paul Manafort from Viktor Yanukovych go public
  • May 10, 2017Trump hosts Russian Foreign Minister Sergei Lavrov and Ambassador Sergey Kislyak in the Oval Office, the day after he has fired James Comey as the Director of the FBI over “the Russian thing” — only a photographer for Russian news agency Tass is allowed to cover the meeting
  • June 2017 — The NotPetya malware emerges and causes extensive damage — especially in Ukraine. It is widely fingerprinted as a Russian state-sponsored attack.
  • October 30, 2017 — Paul Manafort is indicted by Special Counsel Robert Mueller for money laundering, acting as a foreign agent, making false statements, and conspiracy against the United States, as part of the ongoing investigation into Russian interference in the 2016 US presidential election.
  • Apr 30, 2018 — At a Trump dinner in his DC hotel, Lev Parnas and Igor Fruman tell Trump they think Ukraine Ambassador Yovanovitch isn’t loyal enough to him
  • May-June 2018 — Lev Parnas pressures US Congressman Pete Sessions to pressure Trump to fire Yovanovitch in exchange for campaign funding; he and Fruman are later arrested for this scheme and other federal charges of illegal foreign funding of election campaigns
  • Summer 2018 — Trump reportedly frets a potential Biden run for the presidency
  • August 2018 — Lev Parnas’s company, which is named (I kid you not) “Fraud Guarantee,” hires Rudy Giuliani‘s firm for $500,000 to continue working on getting Ambassador Yovanovitch fired for doing her job pursuing corruption in Ukraine.
  • Sept 2018Congress passes and Trump signs a spending bill for the Department of Defense, including $250 million in military aid to Ukraine under the Ukraine Security Assistance Initiative (USAI)
  • Late 2018 — Lev Parnas arranges for Giuliani to meet with both Shokin and Lutsenko on multiple occasions; Devin Nunes also secretly meets with Shokin in Vienna.
  • Dec 6, 2018 — Trump pressures Parnas and Fruman to pressure the Ukrainian government to open an investigation into the Bidens
  • Late Feb, 2019 — Parnas and Fruman pressure then-President Poroshenko to open an investigation into the Bidens, in exchange for a state visit at the White House that would help his challenging re-election campaign against the popular young upstart comedian Volodymyr Zelenskyy
  • Spring 2019 — A “working group” of Giuliani, Parnas, Fruman, conservative Hill reporter John Solomon, Joseph diGenova, Victoria Toensing, and Devin Nunes’s top aide Harvey meet regularly to work on the quid pro quo project
  • March 2019 — Prosecutor General Lutsenko opens 2 investigations: 1 into alleged Ukrainian involvement in the 2016 US election (a Russian conspiracy theory) and a 2nd into Hunter Biden’s involvement with Burisma (he will later retract many of his allegations).
  • March 24, 2019 — Don Jr. tweets criticism of Ambassador Yovanovitch
  • March 28, 2019 — Giuliani hands off a smear campaign packet of disinformation cobbled together on Yovanovitch, intended for Secretary of State Mike Pompeo
  • April 24, 2019 — Trump orders Marie Yovanovitch recalled from her diplomatic mission in Ukraine, after Giuliani and other allies reported she was undermining and obstructing their efforts to extort Ukrainian president Volodomyr Zelensky to claim he was investigating the Bidens for corruption.
  • July 25, 2019 — On a phone call with Zelensky, Trump pressures him to investigate Biden in exchange for the release of funds to keep the Russians at bay in Crimea. He disparages Yovanovitch on the call, referring to her as “bad news.”
  • Oct 3, 2019 — Ambassador to Ukraine Marie Yovanovitch is unsummarily fired by Donald Trump after recently having been invited to continue her post for several more years
  • Dec 18, 2019 — The House of Representatives votes to impeach Donald Trump for abuse of power and obstruction of Congress, the first of two times Trump will be impeached.
  • Feb 5, 2020 — The Republican-controlled Senate voted along party lines, having called no witnesses, to acquit Donald Trump of both impeachment charges.
  • Feb 2022 — Russian forces begin a large scale land invasion of Ukraine including massive attacks on civilian cities.
  • Feb 2024 — Donald Trump holds up a bipartisan immigration deal in Congress that would allow military aide funds to Ukraine to be released. Running for a second term as US President, Trump continues to break with 80 years of the post-WWII international order — in refusing to support NATO, the alliance widely regarded as keeping the peace in Europe broadly, as well as in supporting the regime of Vladimir Putin in Russia’s war of aggression against Ukraine.
Read more

The concept of a “honeypot” in the realms of cybersecurity and information warfare is a fascinating and complex one, straddling the line between deception and defense. At its core, a honeypot is a security mechanism designed to mimic systems, data, or resources to attract and detect unauthorized users or attackers, essentially acting as digital bait. By engaging attackers, honeypots serve multiple purposes: they can distract adversaries from more valuable targets, gather intelligence on attack methods, and help in enhancing security measures.

Origins and Usage

The use of honeypots dates back to the early days of computer networks, evolving significantly with the internet‘s expansion. Initially, they were simple traps set to detect anyone probing a network. However, as cyber threats grew more sophisticated, so did honeypots, transforming into complex systems designed to emulate entire networks, applications, or databases to lure in cybercriminals.

A honeypot illustration with a circuit board beset by a bee, by Midjourney

Honeypots are used by a variety of entities, including corporate IT departments, cybersecurity firms, government agencies, and even individuals passionate about cybersecurity. Their versatility means they can be deployed in almost any context where digital security is a concern, from protecting corporate data to safeguarding national security.

Types and purposes

There are several types of honeypots, ranging from low-interaction honeypots, which simulate only the services and applications attackers might find interesting, to high-interaction honeypots, which are complex and fully-functional systems designed to engage attackers more deeply. The type chosen depends on the specific goals of the deployment, whether it’s to gather intelligence, study attack patterns, or improve defensive strategies.

In the context of information warfare, honeypots serve as a tool for deception and intelligence gathering. They can be used to mislead adversaries about the capabilities or intentions of a state or organization, capture malware samples, and even identify vulnerabilities in the attacker’s strategies. By analyzing the interactions attackers have with these traps, defenders can gain insights into their techniques, tools, and procedures (TTPs), enabling them to better anticipate and mitigate future threats.

Historical effects

Historically, honeypots have had significant impacts on both cybersecurity and information warfare. They’ve led to the discovery of new malware strains, helped dismantle botnets, and provided critical intelligence about state-sponsored cyber operations. For example, honeypots have been instrumental in tracking the activities of sophisticated hacking groups, leading to a deeper understanding of their targets and methods, which, in turn, has informed national security strategies and cybersecurity policies.

One notable example is the GhostNet investigation, which uncovered a significant cyber espionage network targeting diplomatic and governmental institutions worldwide. Honeypots played a key role in identifying the malware and command-and-control servers used in these attacks, highlighting the effectiveness of these tools in uncovering covert operations.

Honeypot hackers and cybercriminals

Ethical and practical considerations

While the benefits of honeypots are clear, their deployment is not without ethical and practical considerations. There’s a fine line between deception for defense and entrapment, raising questions about the legality and morality of certain honeypot operations, especially in international contexts where laws and norms may vary widely.

Moreover, the effectiveness of a honeypot depends on its believability and the skill with which it’s deployed and monitored. Poorly configured honeypots might not only fail to attract attackers but could also become liabilities, offering real vulnerabilities to be exploited.

Cyber attackers and defenders

Honeypots are a critical component of the cybersecurity and information warfare landscapes, providing valuable insights into attacker behaviors and tactics. They reflect the ongoing cat-and-mouse game between cyber attackers and defenders, evolving in response to the increasing sophistication of threats. As digital technologies continue to permeate all aspects of life, the strategic deployment of honeypots will remain a vital tactic in the arsenal of those looking to protect digital assets and information. Their historical impacts demonstrate their value, and ongoing advancements in technology promise even greater potential in understanding and combating cyber threats.

By serving as a mirror to the tactics and techniques of adversaries, honeypots help illuminate the shadowy world of cyber warfare, making them indispensable tools for anyone committed to safeguarding information in an increasingly interconnected world.

Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s TelefΓ³nica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

Cyberbullying involves the use of digital technologies, like social media, texting, and websites, to harass, intimidate, or embarrass individuals. Unlike traditional bullying, its digital nature allows for anonymity and a wider audience. Cyberbullies employ various tactics such as sending threatening messages, spreading rumors online, posting sensitive or derogatory information, or impersonating someone to damage their reputation — on to more sinister and dangerous actions like doxxing.

Geopolitical impact of cyberbullying

In recent years, cyberbullying has transcended personal boundaries and infiltrated the realm of geopolitics. Nation-states or politically motivated groups have started using cyberbullying tactics to intimidate dissidents, manipulate public opinion, or disrupt political processes in other countries. Examples include spreading disinformation, launching smear campaigns against political figures, or using bots to amplify divisive content. This form of cyberbullying can have significant consequences, destabilizing societies and influencing elections.

Recognizing cyberbullying

Identifying cyberbullying involves looking for signs of digital harassment. This can include receiving repeated, unsolicited, and aggressive communications, noticing fake profiles spreading misinformation about an individual, or observing coordinated attacks against a person or group. In geopolitics, recognizing cyberbullying might involve identifying patterns of disinformation, noting unusual social media activity around sensitive political topics, or detecting state-sponsored troll accounts.

Responding to cyberbullying

The response to cyberbullying varies based on the context and severity. For individuals, it involves:

  1. Documentation: Keep records of all bullying messages or posts.
  2. Non-engagement: Avoid responding to the bully, as engagement often escalates the situation.
  3. Reporting: Report the behavior to the platform where it occurred and, if necessary, to law enforcement.
  4. Seeking Support: Reach out to friends, family, or professionals for emotional support.

For geopolitical cyberbullying, responses are more complex and involve:

  1. Public Awareness: Educate the public about the signs of state-sponsored cyberbullying and disinformation.
  2. Policy and Diplomacy: Governments can implement policies to counteract foreign cyberbullying and engage in diplomatic efforts to address these issues internationally.
  3. Cybersecurity Measures: Strengthening cybersecurity infrastructures to prevent and respond to cyberbullying at a state level.

Cyberbullying, in its personal and geopolitical forms, represents a significant challenge in the digital age. Understanding its nature, recognizing its signs, and knowing how to respond are crucial steps in mitigating its impact. For individuals, it means being vigilant online and knowing when to seek help. In the geopolitical arena, it requires a coordinated effort from governments, tech companies, and the public to defend against these insidious forms of digital aggression. By taking these steps, societies can work towards a safer, more respectful digital world.

Read more

Shitposting, a term that has seeped into the mainstream of internet culture, is often characterized by the act of posting deliberately provocative, off-topic, or nonsensical content in online communities and on social media. The somewhat vulgar term encapsulates a spectrum of online behavior ranging from harmless, humorous banter to malicious, divisive content.

Typically, a shit-post is defined by its lack of substantive content, its primary goal being to elicit attention and reactions — whether amusement, confusion, or irritation — from its intended audience. Closely related to trolling, shitposting is one aspect of a broader pantheon of bad faith behavior online.

Shit-poster motivations

The demographic engaging in shit-posting is diverse, cutting across various age groups, social strata, and political affiliations. However, it’s particularly prevalent among younger internet users who are well-versed in meme culture and online vernacular. The motivations for shit-posting can be as varied as its practitioners.

Some engage in it for humor and entertainment, seeing it as a form of digital performance art. Others may use it as a tool for social commentary or satire, while a more nefarious subset might employ it to spread disinformation and misinformation, sow discord, and/or harass individuals or groups.

Online trolls shitposting on the internet, by Midjourney

Context in US politics

In the realm of U.S. politics, shit-posting has assumed a significant role in recent elections, especially on platforms like Twitter / X, Reddit, and Facebook. Politicians, activists, and politically engaged individuals often use this tactic to galvanize supporters, mock opponents, or shape public perception. It’s not uncommon to see political shit-posts that are laden with irony, exaggeration, or out-of-context information, designed to inflame passions or reinforce existing biases — or exploit them.

Recognition and response

Recognizing shit-posting involves a discerning eye. Key indicators include the use of hyperbole, irony, non-sequiturs, and content that seems outlandishly out of place or context. The tone is often mocking or sarcastic. Visual cues, such as memes or exaggerated images, are common.

Responding to shit-posting is a nuanced affair. Engaging with it can sometimes amplify the message, which might be the poster’s intention. A measured approach is to assess the intent behind the post. If it’s harmless humor, it might warrant a light-hearted response or none at all.

For posts that are disinformation or border on misinformation or toxicity, countering with factual information, reporting the content, or choosing not to engage are viable strategies. The key is not to feed into the cycle of provocation and reaction that shit-posting often seeks to perpetuate.

Shitposting troll farms lurk in the shadows, beaming disinformation across the land -- by Midjourney

Fighting back

Shit-posting, in its many forms, is a complex phenomenon in the digital age. It straddles the line between being a form of modern-day satire and a tool for misinformation, propaganda, and/or cyberbullying. As digital communication continues to evolve, understanding the nuances of shit-posting – its forms, motivations, and impacts – becomes crucial, particularly in politically charged environments. Navigating this landscape requires a balanced approach, blending awareness, discernment, and thoughtful engagement.

This overview provides a basic understanding of shit-posting, but the landscape is ever-changing, with new forms and norms continually emerging. The ongoing evolution of online communication norms, including phenomena like shit-posting, is particularly fascinating and significant in the broader context of digital culture and political discourse.

Read more

republican vs. democrat cage match boxing ring

Buckle up, we’re in for a wild ride. Many of the serious scholars of political history and authoritarian regimes are sounding the alarm bells that, although it is a very very good thing that we got the Trump crime family out of the Oval Office, it is still a very very bad thing for America to have so rapidly tilted towards authoritarianism. How did we get here?! How has hyper partisanship escalated to the point of an attempted coup by 126 sitting Republican House Representatives? How has political polarization gotten this bad?

These are some of the resources that have helped me continue grappling with that question, and with the rapidly shifting landscape of information warfare. How can we understand this era of polarization, this age of tribalism? This outline is a work in progress, and I’m planning to keep adding to this list as the tape keeps rolling.

Right-Wing Authoritarianism

Authoritarianism is both a personality type and a form of government — it operates at both the interpersonal and the societal level. The words authoritarian and fascist are often used interchangeably, but fascism is a more specific type of authoritarianism, and far more historically recent.

America has had flavors of authoritarianism since its founding, and when fascism came along the right-wing authoritarians ate it up — and deeply wanted the United States to be a part of it. Only after they became social pariahs did they change position to support American involvement in World War II — and some persisted even after the attack of Pearl Harbor.

Scholars of authoritarianism

  • Hannah Arendt — The Origins of Totalitarianism
  • Bob Altemeyer — The Authoritarians
  • Derrida — the logic of the unconscious; performativity in the act of lying
  • ketman — Ketman is the psychological concept of concealing one’s true aims, akin to doublethink in Orwell’s 1984, that served as a central theme to Polish dissident CzesΕ‚aw MiΕ‚osz‘s book The Captive Mind about intellectual life under totalitarianism during the Communist post-WWII occupation.
  • Erich Fromm — coined the term “malignant narcissism” to describe the psychological character of the Nazis. He also wrote extensively about the mindset of the authoritarian follower in his seminal work, Escape from Freedom.
  • Eric Hoffer — his book The True Believers explores the mind of the authoritarian follower, and the appeal of losing oneself in a totalist movement
  • Fascism — elevation of the id as the source of truth; enthusiasm for political violence
  • Tyrants and dictators
  • John Dean — 3 types of authoritarian personality:
    • social dominators
    • authoritarian followers
    • double highs — social dominators who can “switch” to become followers in certain circumstances
  • Loyalty; hero worship
    • Freud = deeply distrustful of hero worship and worried that it indulged people’s needs for vertical authority. He found the archetype of the authoritarian primal father very troubling.
  • Ayn Rand
    • The Fountainhead (1943)
    • Atlas Shrugged (1957)
    • Objectivism ideology
  • Greatness Thinking; heroic individualism
  • Nietszche — will to power; the Uberman
  • Richard Hofstadter — The Paranoid Style
  • George Lakoff — moral framing; strict father morality
  • Neil Postman — Entertaining Ourselves to Death
  • Anti-Intellectualism
  • Can be disguised as hyper-rationalism (Communism)
  • More authoritarianism books
Continue reading Hyper Partisanship: How to understand American politics today
Read more

phobia indoctrination, illustrated

Phobia indoctrination is one of the principle ways a charismatic leader will lull potential followers into his thrall, by putting them into a state of perpetual fear and anxiety. They know, either instinctively or through training (or both), that people can be induced into a prolonged state of confusion easily, and that many people in states of confusion act quite irrationally. Abusers, cult leaders, and other controllers use demagoguery and other tricks to hide in plain sight and continue to accrue power while passing themselves off as harmless or extremely patriotic.

These chaos agents use emotional manipulation and other tactics of emotional predators as a tool of control. They whip followers up into a fear frenzy frequently enough to instill a set of phobia-like instinctual reactions to chosen stimuli. In addition to stoking fears of the enemies at the gates, they also inculcate irrational fears of the consequences of questioning their authority — invoking authoritarianism. Any doubts expressed about the leadership or its doctrine are subject to terrifying negative results. Cults use this formula to wield undue influence over followers, and prevent them from questioning or leaving the group.

Phobia indoctrination is a tool of cults

As part of a larger overall program of brainwashing or mind control, cults and destructive organizations use imaginary extremes (going to hell, being possessed by demons, failing miserably at life, race war, Leftist apocalypse, etc.) to shock followers into refusing to examine any evidence whatsoever. A form of unethical hypnosis, phobia indoctrination can now be carried out on a mass scale thanks to the internet and our massive media apparatus. Be sure to be on the lookout for any cult warning signs in groups and messaging all around you.

Sociopaths and other types of emotional predators are taking ample advantage of their advantage in time and distance over the slow pace of justice. The wielding of fear as a cudgel in American politics has reached a fever pitch, with anti-Critical Race Theory hysteria, anti-vaxxers, anti-government types, anti-science, Lost Cause-revival zombie MAGA footsoldiers screeching about the “freedom!!!” they wish the government to provide them for persecuting their enemies, and other social horrors are merely the tip of the climate changing iceberg.

phobia indoctrination, illustrated

Phobia indoctrination tactics

Strategies of phobia indoctrination include Repetition and Conditioning, where fears are built through constant exposure; Misinformation and Propaganda, using false information to paint something as dangerous; Utilizing Existing Fears, exaggerating known fears or anxieties; and Social Pressure and Group Dynamics, leveraging social influences to convince others that irrational fears are common.

Other tactics include Authority and Expert Manipulation, where false credentials are used to lend legitimacy; Emotional Manipulation, appealing directly to emotions; Isolation and Control, where a person’s environment is manipulated; and Media Manipulation, using media to provoke fear.

Phobia indoctrination and cults book list:

Or, support local bookstores instead of Jeff Bezos:

Related to phobia indoctrination:

Cult Dictionary β†—

We had better get familiar with the lexicon and vocabulary of the coming era, so we can fight the creeping scourge of thought control roiling the land.

Jim Jones toasting his cult members with a cup of cyanide, by Midjourney

Disinformation Dictionary β†—

Disinformation is meant to confuse, throw off, distract, polarize, and otherwise create conflict within and between target populations.

Disinformation, by Midjourney

Cult Warning Signs: How to recognize cultish groups β†—

Recognizing cult warning signs can be vital in identifying and understanding the risk before getting involved with a group who may not have your best interests in mind.

cult warning signs, by Midjourney
Read more

Some of us have been boning up on this topic for about 6 years already, while others are just tuning in now based on the horrors of recent events. It can be overwhelming to come in cold, so here — don’t go it alone! Take this:

Putin’s war against the west

President Biden “declassified” an intelligence analysis many of us had arrived at some time ago: Russian president Vladimir Putin is a cruel revanchist leader who will stop at nothing to claw out a larger legacy before he dies. His goal is nothing less than reconstituting the former Soviet Union and restoring the “glory” of the Russian empire of yesteryear. And for some reason he thinks the world community is going to let him get away with his delusional fever dreams of conquest — as if fever dreams of Mongol domination are still de rigueur.

The attacks on the 2016 election and on the American Capitol in 2021 are related — both are Russian hybrid warfare operations. Russia also is the cold beating heart of the right-wing authoritarianism movement around the world, via financial, political, psychological, economic, and other means of government and regulatory capture.

Putin has hated democracy for a long time — since before the Berlin Wall fell where he was stationed in East Berlin as a young KGB agent, taking the news hard. Now, he has many fifth column confederates aiding and abetting him from within the United States — a number of them brazenly, and openly. It is getting harder and harder for those treasonous types to “hide out” in the folds of disinformation, misinformation, and plausible deniability. The play is being called — and everyone will need to decide if they’re for democracy or authoritarianism.

Further reading:

Media Resources

Twitter Lists

Read more

Another big legislative win crossed the line for Biden’s agenda late this Friday night: the $1.2T bipartisan infrastructure bill passed the House with 6 Democrats dissenting and a whopping 13 Republicans joining to finally bring Infrastructure Week to the American people. Still to come is the other partner to the twin bills circulating in Congress, the Build Back Better reconciliation bill that would add another $2T to the most Keynesian U.S. budget in decades.

Nevertheless, the bill is largely paid for via various means including adding significantly to economic growth and GDP over the next 10 years. The Biden infrastructure bill will not raise taxes on any families making less than $400,000, a campaign promise the president consistently made and has now delivered upon.

The bipartisan infrastructure bill is the second significant piece of legislation passed under Biden’s tenure in the White House, following the $1.9T American Rescue Plan back in March to successfully tame the covid-19 pandemic.

Infrastructure Bill 2021: Breakdown

What’s in the bill? A slate of sorely needed national funds to modernize our transportation, energy, and broadband systems, including provisions for increasing renewables and lowering emissions on a large scale to combat climate change. Here’s a list of what’s included in the largest single infrastructure investment in American history:

  • $110B for roads, bridges, & other infrastructure
  • $11B for transportation safety
  • $39B to modernize public transit, including replacing 1000s of vehicles with zero-emission models
  • $66B to modernize passenger and freight rail
  • $12B for high-speed rail
  • largest federal investment in public transit in history
  • $65B in broadband
  • $42B in airports and ports, including emissions reduction and low-carbon technologies
  • $7.5B for 0- and low-emissions buses (including school buses) and ferries
  • $7.5B for national network of EV chargers
  • $65B to rebuild the electric grid
  • $55B to upgrade water infrastructure
  • $50B to critical infrastructure cybersecurity
  • $21B to clean up toxic waste
Read more

Surveillance Capitalism Dictionary

They were inspired by hippies, but Orwell would fear them. The giants of Silicon Valley started out trying to outsmart The Man, and in the process became him. And so, surveillance capitalism got born. Such is the story of corruption since time immemorial.

This surveillance capitalism dictionary of surveillance is a work in progress! Check back for further updates!

TermDefinition
algorithmA set of instructions that programmers give to computers to run software and make decisions.
artificial intelligence (AI)
Bayes' Theorem
bioinformaticsA technical and computational subfield of genetics, concerned with the information and data encoded by our genes and genetic codes.
child machineAlan Turing's concept for developing an "adult brain" by creating a child brain and giving it an education
CHINOOKcheckers program that becomes the first time an AI wins an official world championship in a game of skill, in 1994
click-wrap
collateral behavioral data
common carrierA sort of hybrid public interest served by corporate promise of meeting a high bar of neutrality -- a historical precedent setby the early Bell system monopoly, and an issue of public-private strife today with the advent of the internet.
contracts of adhesion
cookiesSmall packets of data deposited by the vast majority of websites you visit, that store information in the browser as a way to extract intelligence about their users and visitors.
corpusIn Natural Language Processing, a compendium of words used to "train" the AI to understand patterns in new texts.
decision trees
Deep BlueChess program that beats world chess champion Garry Kasparov in 1997
deep learning
evolutionary algorithms
Facebook
facial recognition
Flash Crash of 2010sudden drop of over $1 trillion in the E-Mini S&P 500 futures contract market via runaway feedback loop within a set of algorithmic traders
FLOPSfloating-point operations per second
Free BasicsFacebook's plan, via Internet.org, to provide limited free internet services in rural India (and elsewhere in the developing world).Controversy centers on the β€œlimited” nature of the offering, which gives Facebook the power to select or reject individual websites and resources for inclusion.
genetic algorithms
GOFAI"Good Old-Fashioned Artificial Intelligence"
HLMIhuman-level machine intelligence: defined as being able to carry out most human professions at least as well as a typical human
interoperability
Kolmogorov complexity
language translation
linear regression
machine learning
Markov chains
monopoly
NAFTA
natural language processing (NLP)A technology for processing and analyzing words
neofeudalism
net neutralityLegal and regulatory concept maintaining that Internet Service Providers must act as common carriers, allowing businesses and citizens to interoperate with the physical infrastructure of the communications network equally, without being subject to biased or exclusionary activities on the part of the network.
neural networks
netizens
"Online Eraser" law (CA)
patrimonial capitalism
Pegasus
phonemes
predatory lending
predictive analytics
privacy
private eminent domain
probability
prosody
qualia
r > gPiketty's insight
randomness
random walk
recommender systems
recursion
recursive learning
right to be forgottenWhen it became EU law in 2014, this groundbreaking legislation gave citizens the power to demand search engines remove pointers to content about them. It was the growing of a data rights movement in Europe that led later to GDPR.
SciKit
simulation
smart speakers
speech recognition
spyware
statistical modeling
strong vs. weak AI"weak AI" refers to algorithms designed to master a specific narrow domain of knowledge or problem-solving, vs. achieving a more general intelligence (strong AI)
supermajority
supervised learning
surplus data
TensorFlow
Tianhe-2The world's fastest supercomputer, developed in China, until it was surpassed in June 2016 by the also Chinese Sunway TaihuLight
Terms of Service
Twitter
unsupervised learning
WatsonIBM AI that defeats the two all-time greatest human Jeopardy! champions in 2010
WhatsApp
WTO
Zuccotti Park
Read more

The Richest People in the World

The vast majority of billionaires in the world got richer during the year of the pandemic — fantastically richer. And they still demand more!

Inequality grows and grows, warping both capitalism and government, and yet still the plutocrats press their advantage further while whining about their invented delusional oppression.

Certainly not all rich people are gigantic assholes, but a depressing many of them are. We can hang onto the good ones while tossing the others out of the Titanic lifeboats where their rugged masculinity can carry them to shore.

see also:

NameNet WorthWealth SourceIndustry
Jeff Bezos$177 BAmazonTechnology
Elon Musk$151 BTesla, SpaceXTechnology
Bernard Arnault & family$150 BLVMHFashion & Retail
Bill Gates$124 BMicrosoftTechnology
Mark Zuckerberg$97 BFacebookTechnology
Warren Buffett$96 BBerkshire HathawayFinance & Investments
Larry Ellison$93 BsoftwareTechnology
Larry Page$91.5 BGoogleTechnology
Sergey Brin$89 BGoogleTechnology
Mukesh Ambani$84.5 BdiversifiedDiversified
Amancio Ortega$77 BZaraFashion & Retail
Francoise Bettencourt Meyers & family$73.6 BL'OrΓ©alFashion & Retail
Zhong Shanshan$68.9 Bbeverages, pharmaceuticalsFood & Beverage
Steve Ballmer$68.7 BMicrosoftTechnology
Ma Huateng$65.8 Binternet mediaTechnology
Carlos Slim Helu & family$62.8 BtelecomTelecom
Alice Walton$61.8 BWalmartFashion & Retail
Jim Walton$60.2 BWalmartFashion & Retail
Rob Walton$59.5 BWalmartFashion & Retail
Michael Bloomberg$59 BBloomberg LPMedia & Entertainment
Colin Zheng Huang$55.3 Be-commerceTechnology
MacKenzie Scott$53 BAmazonTechnology
Daniel Gilbert$51.9 BQuicken LoansFinance & Investments
Gautam Adani & family$50.5 Binfrastructure, commoditiesDiversified
Phil Knight & family$49.9 BNikeFashion & Retail
Jack Ma$48.4 Be-commerceTechnology
Charles Koch$46.4 BKoch IndustriesOil & Gas
Julia Koch & family$46.4 BKoch IndustriesOil & Gas
Masayoshi Son$45.4 Binternet, telecomTechnology
Michael Dell$45.1 BDell computersTechnology
Tadashi Yanai & family$44.1 Bfashion retailFashion & Retail
François Pinault & family$42.3 Bluxury goodsFashion & Retail
David Thomson & family$41.8 BmediaMedia & Entertainment
Beate Heister & Karl Albrecht Jr.$39.2 BsupermarketsFashion & Retail
Wang Wei$39 Bpackage deliveryService
Miriam Adelson$38.2 BcasinosGambling & Casinos
He Xiangjian$37.7 Bhome appliancesManufacturing
Dieter Schwarz$36.9 BretailFashion & Retail
Zhang Yiming$35.6 BTikTokTechnology
Giovanni Ferrero$35.1 BNutella, chocolatesFood & Beverage
Alain Wertheimer$34.5 BChanelFashion & Retail
Gerard Wertheimer$34.5 BChanelFashion & Retail
Li Ka-shing$33.7 BdiversifiedDiversified
Qin Yinglin & family$33.5 Bpig breedingFood & Beverage
William Lei Ding$33 Bonline gamesTechnology
Len Blavatnik$32 Bmusic, chemicalsDiversified
Lee Shau Kee$31.7 Breal estateReal Estate
Jacqueline Mars$31.3 Bcandy, pet foodFood & Beverage
John Mars$31.3 Bcandy, pet foodFood & Beverage
Yang Huiyan & family$29.6 Breal estateReal Estate
Alexey Mordashov & family$29.1 Bsteel, investmentsMetals & Mining
Robin Zeng$28.4 BbatteriesEnergy
Hui Ka Yan$27.7 Breal estateReal Estate
Susanne Klatten$27.7 BBMW, pharmaceuticalsAutomotive
Vladimir Potanin$27 BmetalsMetals & Mining
Dietrich Mateschitz$26.9 BRed BullFood & Beverage
Pang Kang$26.4 Bsoy sauceFood & Beverage
Klaus-Michael Kuehne$26.3 BshippingLogistics
Vladimir Lisin$26.2 Bsteel, transportMetals & Mining
Wang Xing$26.1 Be-commerceTechnology
German Larrea Mota Velasco & family$25.9 BminingMetals & Mining
Leonardo Del Vecchio & family$25.8 BeyeglassesFashion & Retail
Takemitsu Takizaki$25.8 BsensorsManufacturing
Leonard Lauder$25.5 BEstee LauderFashion & Retail
Thomas Peterffy$25 Bdiscount brokerageFinance & Investments
Vagit Alekperov$24.9 BoilEnergy
Leonid Mikhelson$24.9 Bgas, chemicalsEnergy
Jim Simons$24.6 Bhedge fundsFinance & Investments
Jiang Rensheng & family$24.4 BvaccinesHealthcare
Gina Rinehart$23.6 BminingMetals & Mining
Rupert Murdoch & family$23.5 Bnewspapers, TV networkMedia & Entertainment
Shiv Nadar$23.5 Bsoftware servicesTechnology
Zhang Zhidong$23.4 Binternet mediaTechnology
Iris Fontbona & family$23.3 BminingMetals & Mining
Lei Jun$23 BsmartphonesTechnology
Zhang Yong$23 BrestaurantsFood & Beverage
Richard Qiangdong Liu$22.4 Be-commerceTechnology
Gennady Timchenko$22 Boil, gasEnergy
Stephen Schwarzman$21.9 BinvestmentsFinance & Investments
Goh Cheng Liang$21.7 BpaintsManufacturing
Stefan Quandt$21.6 BBMWAutomotive
Li Xiting$21.5 Bmedical devicesHealthcare
Pierre Omidyar$21.4 BeBay, PayPalTechnology
Stefan Persson$21.3 BH&MFashion & Retail
Abigail Johnson$20.9 Bmoney managementFinance & Investments
R. Budi Hartono$20.5 Bbanking, tobaccoFinance & Investments
Andrew Forrest$20.4 BminingMetals & Mining
Ray Dalio$20.3 Bhedge fundsFinance & Investments
Michael Hartono$19.7 Bbanking, tobaccoManufacturing
Li Shufu$19.7 BautomobilesAutomotive
Zhong Huijuan$19.7 BpharmaceuticalsHealthcare
Xu Hang$19.5 Bmedical devicesHealthcare
Lui Che Woo & family$19.4 Bcasinos/hotelsGambling & Casinos
Emmanuel Besnier$19.1 BcheeseFood & Beverage
Laurene Powell Jobs & family$19 BApple, DisneyTechnology
Eric Schmidt$18.9 BGoogleTechnology
Sun Piaoyang$18.9 BpharmaceuticalsHealthcare
Theo Albrecht, Jr. & family$18.8 BAldi, Trader Joe'sFashion & Retail
Alisher Usmanov$18.4 Bsteel, telecom, investmentsMetals & Mining
Robert Pera$18.3 Bwireless networking gearTechnology
Wu Yajun$18.3 Breal estateReal Estate
Fan Hongwei & family$18.2 BpetrochemicalsEnergy
Dhanin Chearavanont$18.1 BdiversifiedDiversified
Peter Woo$18 Breal estateReal Estate
Chen Bang$17.9 BhospitalsHealthcare
Andrey Melnichenko$17.9 Bcoal, fertilizersEnergy
Dustin Moskovitz$17.8 BFacebookTechnology
Su Hua$17.8 Bvideo streamingMedia & Entertainment
Donald Newhouse$17.6 BmediaMedia & Entertainment
Petr Kellner$17.5 Bfinance, telecommunicationsFinance & Investments
Lee Man Tat$17.4 BfoodFood & Beverage
Pavel Durov$17.2 Bmessaging appTechnology
James Ratcliffe$17 BchemicalsManufacturing
Jorge Paulo Lemann & family$16.9 BbeerFood & Beverage
Reinhold Wuerth & family$16.8 BfastenersManufacturing
Charlene de Carvalho-Heineken & family$16.7 BHeinekenFood & Beverage
Radhakishan Damani$16.5 Bretail, investmentsFashion & Retail
Wang Chuanfu$16.3 Bbatteries, automobilesAutomotive
Steve Cohen$16 Bhedge fundsFinance & Investments
Ken Griffin$16 Bhedge fundsFinance & Investments
Chen Zhiping$15.9 Be-cigarettesManufacturing
Ernest Garcia, II.$15.9 Bused carsAutomotive
Uday Kotak$15.9 BbankingFinance & Investments
Carl Icahn$15.8 BinvestmentsFinance & Investments
Suleiman Kerimov & family$15.8 BinvestmentsFinance & Investments
Thomas Frist, Jr. & family$15.7 BhospitalsHealthcare
Lukas Walton$15.6 BWalmartFashion & Retail
Mikhail Fridman$15.5 Boil, banking, telecomEnergy
Wei Jianjun & family$15.5 BautomobilesAutomotive
Zuo Hui$15.5 Breal estate servicesReal Estate
Zhou Qunfei & family$15.4 Bsmartphone screensTechnology
Donald Bren$15.3 Breal estateReal Estate
Hinduja brothers$14.9 BdiversifiedDiversified
Lakshmi Mittal$14.9 BsteelMetals & Mining
Georg Schaeffler$14.9 Bauto partsAutomotive
Eric Yuan & family$14.9 Bvideo conferencingTechnology
Wang Jianlin$14.8 Breal estateReal Estate
Kwong Siu-hing$14.7 Breal estateReal Estate
Robin Li$14.7 Binternet searchTechnology
Pallonji Mistry$14.6 BconstructionConstruction & Engineering
Eduardo Saverin$14.6 BFacebookTechnology
Roman Abramovich$14.5 Bsteel, investmentsDiversified
David Tepper$14.5 Bhedge fundsFinance & Investments
Gong Hongjia & family$14.4 Bvideo surveillanceFinance & Investments
Mike Cannon-Brookes$14.2 BsoftwareTechnology
John Menard, Jr.$14.2 Bhome improvement storesFashion & Retail
Seo Jung-jin$14.2 BbiotechHealthcare
Cheng Yixiao$14.1 Bvideo streaming appMedia & Entertainment
Liang Wengen$14.1 Bconstruction equipmentManufacturing
Scott Farquhar$14 BsoftwareTechnology
Finn Rausing$13.9 BpackagingFood & Beverage
Jorn Rausing$13.9 BpackagingFood & Beverage
Kirsten Rausing$13.9 BpackagingFood & Beverage
Brian Chesky$13.7 BAirbnbTechnology
Joseph Lau$13.6 Breal estateReal Estate
David Duffield$13.5 Bbusiness softwareTechnology
Charoen Sirivadhanabhakdi$13.5 Balcohol, real estateFood & Beverage
Kim Jung-ju$13.3 Bonline gamesTechnology
Robert & Philip Ng$13.3 Breal estateReal Estate
Zhang Bangxin$13.3 BeducationService
Anders Holch Povlsen$13.2 Bfashion retailFashion & Retail
Wang Wenyin$13.2 Bmining, copper productsMetals & Mining
Wang Liping & family$13.1 Bhydraulic machineryManufacturing
Tatyana Bakalchuk$13 BecommerceFashion & Retail
Michael Platt$13 Bhedge fundsFinance & Investments
Huang Shilin$12.9 BbatteriesEnergy
Ricardo Salinas Pliego & family$12.9 Bretail, mediaFashion & Retail
Kumar Birla$12.8 BcommoditiesDiversified
Dang Yanbao$12.7 BcoalMetals & Mining
Cyrus Poonawalla$12.7 BvaccinesHealthcare
Robert Kuok$12.6 Bpalm oil, shipping, propertyDiversified
Hank & Doug Meijer$12.6 BsupermarketsFashion & Retail
Jack Dorsey$12.5 BTwitter, SquareTechnology
Lu Zhongfang$12.5 BeducationAutomotive
Ma Jianrong & family$12.5 Btextiles, apparelFashion & Retail
Zhang Tao$12.5 Be-commerceFashion & Retail
Nathan Blecharczyk$12.4 BAirbnbTechnology
John Doerr$12.4 Bventure capitalTechnology
Joe Gebbia$12.4 BAirbnbTechnology
Forrest Li$12.4 BgamingMedia & Entertainment
Yu Renrong$12.3 BsemiconductorsManufacturing
Liu Yonghao & family$12.1 BagribusinessService
Gordon Moore$12.1 BIntelTechnology
Jeff Yass$12 Btrading, investmentsFinance & Investments
Bobby Murphy$11.9 BSnapchatTechnology
Patrick Drahi$11.8 BtelecomTelecom
Jensen Huang$11.8 BsemiconductorsTechnology
Alexander Otto$11.8 Breal estateReal Estate
Cen Junda$11.6 BpharmaceuticalsHealthcare
Joseph Tsai$11.6 Be-commerceTechnology
Aliko Dangote$11.5 Bcement, sugarManufacturing
Marcel Herrmann Telles$11.5 BbeerFood & Beverage
Mikhail Prokhorov$11.4 BinvestmentsFinance & Investments
Jorge Moll Filho & family$11.3 BhospitalsHealthcare
Viktor Rashnikov$11.2 BsteelManufacturing
Harry Triguboff$11.2 Breal estateReal Estate
Leonid Fedun & family$11.1 BoilEnergy
Eyal Ofer$11.1 Breal estate, shippingDiversified
Evan Spiegel$11.1 BSnapchatTechnology
Luis Carlos Sarmiento$11 BbankingFinance & Investments

Read more

There was a period of dashed hopes on Saturday morning during the impeachment trial of former president Trump. After securing a last-minute and unexpected motion to call witnesses, based on resurfaced testimony from Representative Jaime Herrera Beutler (R-WA), the House Impeachment Managers in conference with Senate Democrats and negotiation with Senate Republicans ended up deciding to call the vote instead.

They did win a concession to read Herrera Beutler’s statement into the Congressional record, and a historically unprecedented 57-43 impeachment vote to convict with 7 Republican Senators crossing the aisle to vote to convict the president of their own party of inciting sedition. But many Democrats who had gotten our hopes up for the prospect of getting to the bottom of what really happened on January 6 were quite deflated, and there were plenty of folks angry at Democrats for “caving” to Republicans once again.

The Real Reason Democrats didn’t call witnesses

As the Democrats have been making the press conference and media rounds to talk about the impeachment and talk about why they ultimately ended up deciding not to move forward with calling witnesses, some of the anger is subsiding but plenty of people are still miffed.

In my opinion, what is probably the strongest reason of all that Democrats didn’t call witnesses, is the one fact not being widely cited by the Democrats including the House Impeachment Managers. And that argument is: walking and chewing gum at the same time was not going to be possible. Calling witnesses would have meant getting led down the garden path by the Masters of Game Delay.

There was some optimism before the impeachment trial that the Senate would be able to find a way to handle the trial and also juggle legislative business plus confirmation hearings and votes for Biden cabinet members and other high-level executive positions. Unfortunately, the parliamentary rules for impeachment proceedings are both old and strict, and preclude the Senate from taking up other regular legislative or executive business while the trial is in progress from Monday to Saturdays until complete, according to the rules of 1868.

The only way to get around this is to have the chamber meet in a separate session. And the only way to get a separate session is via unanimous consent — which requires a full 100 votes. After the vote on calling witnesses, McConnell indicated he would withhold his party’s support for unanimous consent to do any other business besides the trial. He also reportedly threatened to obstruct and delay the rest of the 2-year legislative agenda, including the confirmation of Merrick Garland as AG. Everyone saw the struggle to get to just 57, so I agree it does not seem credible that enough GOP Senators at that point would have suddenly found an “I am Spartacus!” moment.

It would have sandbagged Biden’s agenda

Not being able to walk and chew gum at the same time would have tanked Biden’s ability to get the help to the American people that they need — full stop. No budget reconciliation and covid relief plan. No cabinet nominations. No other executive branch noms. No economic plan.

It would only play into the hands of Republicans to obstruct Biden’s agenda indefinitely and infinitely. Their base is rewarding them only for loyalty to Trump, and punishing any of the “deviants” who vote to hold him accountable. The GOP would just blame the Democrats for not getting anything done, and for dragging out this “highly political” trial that actually they will be drawing out with procedural nonsense and legal abuse — a Trumpian specialty!

I think it’s arguably just as important that Democrats be able to say that they got swift and solid help to Americans in a time of crisis, otherwise the 2022 midterms are the next jump point for authoritarian takeover. We can still pursue justice via other means that are just as enduring and have the potential to uncover so much more about the events leading up to and surrounding January 6.

The Other Good Reasons

Beyond the parliamentary jiujitsu, there are several other compelling reasons Democrats didn’t call witnesses:

  • Witnesses are not generally called live onto the Senate floor — for impeachment trials, depositions are taken in trial committees, then read into the record. Senators have to submit their questions in writing, and there is no live cross-examination. In other words, the thing most folks would be looking for which is public testimony, would not be forthcoming — the committee work could take weeks or months, and Republicans benefit more from agenda delays because their base no longer even cares about policy anymore.
  • Entering Jaime Herrera Beutler’s statements into the record accomplished the same thing a deposition would have done — it read her testimony into the official legislative annals of history. It gave additional ammunition to any of the potential federal, state, or local investigations that may follow the conclusion of the trial. And it showed indelibly the lengths to which even Republican lawmakers were willing to go to pursue justice against this lawless president.
  • No more Republican votes were going to change anyway — the trial was at “peak persuasion” because the rest of the pack were going to hide behind the procedural issue regardless. In other words, like SCOTUS to Trump’s frivolous election fraud claims, they refused to hear the case “on the merits” even though they were subject to a binding resolution on that very question that their chamber had passed on Tuesday. They chose to ignore their own binding resolution and continued to cite the fact that Trump was no longer in office as the reason the Senate lacked jurisdiction to censure him — despite the fact that it was now minority leader Mitch McConnell who insisted on delaying the start of trial past inauguration day in the first place.
  • They had already effectively made their case — as “beyond a shadow of a doubt” as is ever likely to happen in any impeachment trial ever, yet still falling on deaf ears, there isn’t much doubt that the House Managers overwhelmingly presented a successful case. I’m sympathetic to the argument that it may have proved diminishing returns as pursued through additional Senate trial time, and is undoubtedly better pursued by the justice system and through other committee work in both the Senate and the House.
  • A 9/11-style commission is much more appropriate to actually get to the bottom of the political aspects of the crime — the independent commission created by House Speaker Nancy Pelosi today is going to have far more time, budget, reach, and depth than a drawn out trial in the Senate, and it won’t cannibalize the agenda of other business. It can go all the way down the rabbit hole and lead us to evidence on other potential co-conspirators, including Cruz, Hawley, Tuberville, Lee, Gomert, Greene, Jordan, Gosar, et al, all the financial ties in and around the Ellipse rally, and perhaps new federal charges for Trump’s pardoned felon buddies Bannon, Stone, and Flynn. Democrats didn’t call witnesses because now, they can call as many witnesses they like without any pressure or obstruction from Senate Republicans.
  • His lawyers are just lying — the defense portion of the witness process would be just as looney toons and Four Seasons Total Lawyering as in the main show. Trump’s lawyers are just distorting, distracting, and debasing the profession of law with their clownish disregard of the augustness of the chamber in which they stood. Giving them more time to muddy the bulk of the trial record, and more time to delay delay delay and inject the Big Lies over and over again into public consciousness, would not have necessarily been worth the tradeoff in what we might learn from additional witnesses ourselves.
  • Other witnesses went cold — Pence’s staff spoke up to refute the claim that Trump evinced concern for him during or soon after the January 6 attack. They said the former president did not contact Pence at all that day, or for 5 days afterward. And yet, when contacted by the House Impeachment Managers, they indicated they would not be willing to go so far as to testify in the trial.
  • Enthusiasm for the trial would wane in the public eye — unfortunately, the general public has a much shorter political attention span than most of us Blue Check intellectuals. While it would be total catnip for us, it would like start to have diminishing returns in the eyes of the voters, especially when they discover that other business is not proceeding. Regardless of the fact that it’s actually the Republicans holding other legislative business hostage for the trial, it will be blamed on Democrats and our entire political system has been primed to blame everything on Democrats and is generally successful — like muscle memory.

I will be looking forward to the results of the independent commission, as well as the continued criminal prosecutions of the insurrectionists and at some point, hopefully, whoever it was on the inside who was helping them.

Read more

GOP angry elephants

Only 7 out of 50 among them are patriots — the rest, cowards and knaves who continue to seek destruction of this republic out of self-interest and an authoritarian’s need to dominate others. Today’s impeachment vote of acquittal for Trump‘s role in the January 6 insurrection was brutal but of course, not surprising. It highlighted once again something that’s been hiding in plain sight for some time — that the Republican Party is a criminal organization that thinks of itself and its members as being above the law.

“Law and Order” is just another Big Lie

It’s used to cover up quite the opposite — criminality, entitlement, sadism, and a zeal for the domination of others. Including both the violent insurrectionist kind and the pasty jowly turtly slow walking kind on the right wing. The GOP is an insult to the rule of law.

https://twitter.com/anders_aslund/status/1360092604919128064?s=20

There is no best time to impeach a president

Unfortunately the spineless toothless Republican Senators defanged the Constitution today, by casting into doubt its power to achieve healthy checks and balances between the branches of government. They gleefully gave up the role of Congress in moderating the chief executive — to the probable detriment of us all.

As usual, they performed a series of timeline hacks, rhetorical games, and parliamentary tricks that resulting in the “logical” impossibility of ever successfully impeaching a US president. They are masters at avoiding responsibility for their actions, and fiercely protect their own, even despite heinous crimes.

Senate Minority Leader Mitch McConnell and his merry band of “institutionalists” and “originalists” have managed to do more damage to our institutions than any other Republican administration, and that’s truly saying something.

In addition to sowing doubt about our elections, throwing SCOTUS and the courts under the bus despite having packed them with conservative judges and loyalists for years, damaging our sovereignty and our national security, and impugning our reputation with nations around the world, they’ve managed to turn the United States into a kleptocracy. It’s official: the Republican Party is a criminal organization.

Let the DOJ do its work

Even Trump’s own lawyer advocated for it, along with McConnell. Though he can’t be trusted and will surely have tricks up his sleeve, it would be cathartic to see Attorney General Merrick Garland and the much-maligned Department of Justice bring down the largest RICO case in the history of history. I hope that karma brings justice to all of them, regardless of the actual outcome here and now.

Read more

I try to be choosy about my news as well as reading widely. I make it a habit to routinely consult sources outside the US, know the ethics of the outlets I most rely on, and try to mix up the types of media ownership and format (newspaper, TV, podcast, website, radio, etc.) to avoid a monolithic class or other point of view on any particular subject or issue. Some of the media sources I trust for valuable perspectives are in the table below.

Other habits: trying to corroborate stories amongst multiple publications; evaluate the credibility of authors and references; read source material; do my own calculations; consult public data when available; go back further into history to understand the trajectory of preceding events; keep listening for new information on the subject. Adjust my views based on new incoming information, if warranted. Keep an eye out for disinformation or other skewed presentations of fact.

Good journalism matters

Having worked in media for most of my career, I have a lot of practice evaluating the quality and veracity of reporting. Cross-referencing comes second nature. I’ve studied the media industry as a professional imperative and understand a bit about its ownership structures and its history, both technical and economic. As a political philosophy buff, I’m aware of the great importance of a free press to our democratic republic.

I appreciate a tight headline, a profound topic, and bold investigation as well as imaginative prose and pithy information. We need the intrepid courage of the press, particularly in these times of demagoguery, kleptocracy, hucksterism, and Zucksterism. The fourth estate has helped us find our better angels in the past, and there’s no reason to think it can’t assist us once again to get better transparency into the bigger picture and big histories behind today’s otherwise chaotic and overwhelming political landscape.

NameCountryFundingYear foundedAgeLink
The GuardianUKPrivate1821203https://www.theguardian.com/
The EconomistUKPrivate1843181https://www.economist.com/
Scientific AmericanUSPrivate1845179https://www.nature.com/
Associated PressUSNonprofit1846178https://apnews.com/
The New York TimesUSPrivate1851173https://www.nytimes.com/
ReutersUSPrivate1851173https://www.reuters.com/
The Daily TelegraphUKPrivate1855169https://www.telegraph.co.uk/
The AtlanticUSPrivate1857167https://www.theatlantic.com/
NatureUSPrivate1869155https://www.nature.com/
The Washington PostUSPrivate1877147https://www.washingtonpost.com/
LA TimesUSPrivate1881143https://www.latimes.com/
Financial TimesUKPrivate1888136https://www.ft.com/
The New RepublicUSPrivate1914110https://newrepublic.com/
BBCUKPublic1922102https://www.bbc.com/news
TimeUSPrivate1923101https://time.com/
The New YorkerUSPrivate192599https://www.newyorker.com/
CBCCanadaPublic193688https://www.cbc.ca/news/world
SpiegelEUPrivate194777https://www.spiegel.de/international/
Radio Free EuropeEUPublic194975https://www.rferl.org/
New ScientistUKPrivate195668https://www.newscientist.com/
Rolling StoneUSPrivate196757https://www.rollingstone.com/
PBSUSPublic196955https://www.pbs.org/
Foreign PolicyUSPrivate197054https://www.euronews.com/
NPRUSPublic197054https://www.npr.org/
Greg PalastUSIndependent197648https://www.gregpalast.com/
C-SPANUSPublic197945https://www.c-span.org/
CNNUSPrivate198044https://www.cnn.com/
The IndependentUKPrivate198638https://www.independent.co.uk/us
Sky NewsUKPrivate198638https://news.sky.com/
EuronewsEUPrivate199331https://www.euronews.com/
MSNBCUSPrivate199628https://www.msnbc.com/
International Consortium of Investigative JournalistsUSNonprofit199727https://icij.org
VoxUSPrivate200519https://www.vox.com/
PoliticoUSPrivate200717https://www.politico.com/
BellingcatEUIndependent201410https://www.bellingcat.com/
Gaslit NationUSCrowdfunding20159https://www.patreon.com/m/1844970/posts
AxiosUSPrivate20177https://www.axios.com/
Just SecurityUSAcademic20177https://www.justsecurity.org/
The ConversationalistUSNonprofit20195https://conversationalist.org/
Read more

Spearphishing is an email designed to appear as if from a trusted source, to solicit information that allows the sender to gain access to an account or network, or installs malware that later enables the sender to gain access to an account or network.

Spearphishing is a challenge in the context of cybersecurity as a highly targeted form of phishing, a cyberattack technique where attackers masquerade as trustworthy entities to deceive individuals into divulging confidential information, such as login credentials or financial information. Unlike broad-based phishing campaigns that cast a wide net to catch as many victims as possible, spearphishing is meticulously tailored to its targets.

A personalized cyberattack

Attackers invest time in gathering personal information about their victimsβ€”such as their employment, key relationships, and interestsβ€”to craft convincing and personalized messages. This could involve emails that appear to come from a colleague, a trusted organization, or a friend, making the fraudulent request for information or action seem legitimate.

What makes spearphishing particularly dangerous is its precision and seeming legitimacy. By leveraging publicly available information or data obtained from previous breaches, attackers can create communications that are highly convincing.

These emails or messages might include specific references to projects, events, or personal details that lend credibility to the request. This level of personalization makes spearphishing attacks much harder to detect than standard phishing attempts, and therefore, more likely to succeed.

For individuals and organizations alike, the key to defense lies in heightened vigilance, thorough verification processes, and ongoing cybersecurity education to recognize and respond to these sophisticated threats.

Read more