Politics

Peter Navarro reports to prison

Former Trump advisor Peter Navarro — who wrote a book claiming credit for the idea to try and overthrow the 2020 election and bragged about it as the “Green Bay Sweep” to MSNBC’s Ari Melber — reported to prison today after the Supreme Court ruled he cannot get out of answering to a Congressional subpoena. Peter Navarro prison time is set to be 4 months for an independent jury’s conviction for Contempt of Congress.

The sentencing judge refuted Navarro’s allegations that he was the victim of a political prosecition: “you aren’t,” Mehta said. “You have received every process you are due.”

Read more

The backfire effect is a cognitive phenomenon that occurs when individuals are presented with information that contradicts their existing beliefs, leading them not only to reject the challenging information but also to further entrench themselves in their original beliefs.

This effect is counterintuitive, as one might expect that presenting factual information would correct misconceptions. However, due to various psychological mechanisms, the opposite can occur, complicating efforts to counter misinformation, disinformation, and the spread of conspiracy theories.

Origin and mechanism

The term “backfire effect” was popularized by researchers Brendan Nyhan and Jason Reifler, who in 2010 conducted studies demonstrating that corrections to false political information could actually deepen an individual’s commitment to their initial misconception. This effect is thought to stem from a combination of cognitive dissonance (the discomfort experienced when holding two conflicting beliefs) and identity-protective cognition (wherein individuals process information in a way that protects their sense of identity and group belonging).

Relation to media, disinformation, echo chambers, and media bubbles

In the context of media and disinformation, the backfire effect is particularly relevant. The proliferation of digital media platforms has made it easier than ever for individuals to encounter information that contradicts their beliefs — but paradoxically, it has also made it easier for them to insulate themselves in echo chambers and media bubblesβ€”environments where their existing beliefs are constantly reinforced and rarely challenged.

Echo chambers refer to situations where individuals are exposed only to opinions and information that reinforce their existing beliefs, limiting their exposure to diverse perspectives. Media bubbles are similar, often facilitated by algorithms on social media platforms that curate content to match users’ interests and past behaviors, inadvertently reinforcing their existing beliefs and psychological biases.

Disinformation campaigns can exploit these dynamics by deliberately spreading misleading or false information, knowing that it is likely to be uncritically accepted and amplified within certain echo chambers or media bubbles. This can exacerbate the backfire effect, as attempts to correct the misinformation can lead to individuals further entrenching themselves in the false beliefs, especially if those beliefs are tied to their identity or worldview.

How the backfire effect happens

The backfire effect happens through a few key psychological processes:

  1. Cognitive Dissonance: When confronted with evidence that contradicts their beliefs, individuals experience discomfort. To alleviate this discomfort, they often reject the new information in favor of their pre-existing beliefs.
  2. Confirmation Bias: Individuals tend to favor information that confirms their existing beliefs and disregard information that contradicts them. This tendency towards bias can lead them to misinterpret or dismiss corrective information.
  3. Identity Defense: For many, beliefs are tied to their identity and social groups. Challenging these beliefs can feel like a personal attack, leading individuals to double down on their beliefs as a form of identity defense.

Prevention and mitigation

Preventing the backfire effect and its impact on public discourse and belief systems requires a multifaceted approach:

  1. Promote Media Literacy: Educating the public on how to critically evaluate sources and understand the mechanisms behind the spread of misinformation can empower individuals to think critically and assess the information they encounter.
  2. Encourage Exposure to Diverse Viewpoints: Breaking out of media bubbles and echo chambers by intentionally seeking out and engaging with a variety of perspectives can reduce the likelihood of the backfire effect by making conflicting information less threatening and more normal.
  3. Emphasize Shared Values: Framing challenging information in the context of shared values or goals can make it less threatening to an individual’s identity, reducing the defensive reaction.
  4. Use Fact-Checking and Corrections Carefully: Presenting corrections in a way that is non-confrontational and, when possible, aligns with the individual’s worldview or values can make the correction more acceptable. Visual aids and narratives that resonate with the individual’s experiences or beliefs can also be more effective than plain factual corrections.
  5. Foster Open Dialogue: Encouraging open, respectful conversations about contentious issues can help to humanize opposing viewpoints and reduce the instinctive defensive reactions to conflicting information.

The backfire effect presents a significant challenge in the fight against misinformation and disinformation, particularly in the context of digital media. Understanding the psychological underpinnings of this effect is crucial for developing strategies to promote a more informed and less polarized public discourse. By fostering critical thinking, encouraging exposure to diverse viewpoints, and promoting respectful dialogue, it may be possible to mitigate the impact of the backfire effect and create a healthier information ecosystem.

Read more

Machiavellianism originates from Machiavelli’s most famous work, “The Prince,” written in 1513. It was a guidebook for new princes and rulers in maintaining power and control. Machiavelli’s central thesis was the separation of politics from ethics and morality. He argued that to maintain power, a ruler might have to engage in amoral or unethical actions for the state’s benefit. His stark realism and advocacy for political pragmatism were groundbreaking at the time.

Machiavelli’s work was revolutionary, providing a secular, pragmatic approach to governance, in contrast to the prevailing moralistic views of the era. His ideas were so radical that “Machiavellian” became synonymous with cunning, scheming, and unscrupulous behavior in politics. This term, however, is a simplification and somewhat misrepresents Machiavelli’s nuanced arguments about power and statecraft.

Throughout history, Machiavellianism has been interpreted in various ways. During the Enlightenment, philosophers like Rousseau criticized Machiavelli for promoting tyranny and despotism. However, in the 20th century, Machiavelli’s ideas were re-evaluated by political scientists who saw value in his separation of politics from morality, highlighting the complexity and real-world challenges of governance.

Machiavellianism in psychology

In psychology, Machiavellianism is defined as a personality trait characterized by a duplicitous interpersonal style, a cynical disregard for morality, and a focus on self-interest and personal gain. This concept was popularized in the 1970s by Richard Christie and Florence L. Geis, who developed the Mach-IV test, a questionnaire that identifies Machiavellian tendencies in individuals. People high in Machiavellian traits tend to be manipulative, deceitful, predatory, and exploitative in their relationships and interactions.

Machiavellianism in American politics

In American politics, Machiavellianism can be observed in various strategies and behaviors of politicians and political groups. Here are some ways to identify Machiavellian tendencies:

  1. Exploitation and Manipulation: Politicians exhibiting Machiavellian traits often manipulate public opinion, exploit legal loopholes, or use deceptive tactics to achieve their goals. This might include manipulating media narratives, twisting facts, disseminating disinformation, and/or exploiting populist sentiments.
  2. Realpolitik and Pragmatism: Machiavellianism in politics can also be seen in a focus on realpolitik – a theory that prioritizes practical and pragmatic approaches over moral or ideological considerations. Politicians might adopt policies that are more about maintaining power or achieving pragmatic goals than about adhering to ethical standards.
  3. Power Play and Control: Machiavellian politicians are often characterized by their relentless pursuit of power. They may engage in power plays, such as political patronage, gerrymandering, and/or consolidating power through legislative maneuvers, often at the expense of democratic norms.
  4. Moral Flexibility: A key aspect of Machiavellianism is moral flexibility – the ability to adjust one’s moral compass based on circumstances. In politics, this might manifest in policy flip-flops or aligning with ideologically diverse groups when it benefits one’s own interests.
  5. Charismatic Leadership: Machiavelli emphasized the importance of a ruler’s charisma and public image. Modern politicians might cultivate a charismatic persona to gain public support, sometimes using this charm to mask more manipulative or self-serving agendas.

Machiavellianism, stemming from the teachings of NiccolΓ² Machiavelli, has evolved over centuries, influencing both political theory and psychology. In contemporary American politics, identifying Machiavellian traits involves looking at actions and policies through the lens of power dynamics, manipulation, moral flexibility, and a pragmatic approach to governance.

While Machiavellian strategies can be effective in achieving political goals, they often raise ethical questions about the nature of power and governance in a democratic society.

Read more

The “wallpaper effect” is a phenomenon in media, propaganda, and disinformation where individuals become influenced or even indoctrinated by being continuously exposed to a particular set of ideas, perspectives, or ideologies. This effect is akin to wallpaper in a room, which, though initially noticeable, becomes part of the unnoticed background over time.

The wallpaper effect plays a significant role in shaping public opinion and individual beliefs, often without the conscious awareness of the individuals affected.

Origins and mechanisms

The term “wallpaper effect” stems from the idea that constant exposure to a specific type of media or messaging can subconsciously influence an individual’s perception and beliefs, similar to how wallpaper in a room becomes a subtle but constant presence. This effect is potentiated by the human tendency to seek information that aligns with existing beliefs, known as confirmation bias. It leads to a situation where diverse viewpoints are overlooked, and a singular perspective dominates an individual’s information landscape.

The wallpaper effect, by DALL-E 3

Media and information bubbles

In the context of media, the wallpaper effect is exacerbated by the formation of information bubbles or echo chambers. These are environments where a person is exposed only to opinions and information that reinforce their existing beliefs.

The rise of digital media and personalized content algorithms has intensified this effect, as users often receive news and information tailored to their preferences, further entrenching their existing viewpoints. Even more insidiously, social media platforms tend to earn higher profits when they fill users’ feeds with ideological perspectives they already agree with. Even more profitable is the process of tilting them towards more extreme versions of those beliefs — a practice that in other contexts we call “radicalization.”

Role in propaganda and disinformation

The wallpaper effect is a critical tool in propaganda and disinformation campaigns. By consistently presenting a specific narrative or viewpoint, these campaigns can subtly alter the perceptions and beliefs of the target audience. Over time, the repeated exposure to these biased or false narratives becomes a backdrop to the individual’s understanding of events, issues, or groups, often leading to misconceptions or unwarranted biases.

Psychological impact

The psychological impact of the wallpaper effect is profound. It can lead to a narrowing of perspective, where individuals become less open to new information or alternative viewpoints. This effect can foster polarized communities and hyper partisan politics, where dialogue and understanding between differing viewpoints become increasingly difficult.

Case studies and examples

Historically, authoritarian regimes have used the wallpaper effect to control public opinion and suppress dissent. By monopolizing the media landscape and continuously broadcasting their propaganda, these regimes effectively shaped the public’s perception of reality.

In contemporary times, this effect is also seen in democracies, where partisan news outlets or social media algorithms create a similar, though more fragmented, landscape of information bubbles.

Counteracting the wallpaper effect

Counteracting the wallpaper effect involves a multifaceted approach. Media literacy education is crucial, as it empowers individuals to critically analyze and understand the sources and content of information they consume.

Encouraging exposure to a wide range of viewpoints and promoting critical thinking skills are also essential strategies. Additionally, reforms in digital media algorithms to promote diverse viewpoints and reduce the creation of echo chambers can help mitigate this effect.

Implications for democracy and society

The wallpaper effect has significant implications for democracy and society. It can lead to a polarized public, where consensus and compromise become challenging to achieve. The narrowing of perspective and entrenchment of beliefs can undermine democratic discourse, leading to increased societal divisions and decreased trust in media and institutions.

The wallpaper effect is a critical phenomenon that shapes public opinion and belief systems. Its influence is subtle yet profound, as constant exposure to a specific set of ideas can subconsciously mold an individual’s worldview. Understanding and addressing this effect is essential in promoting a healthy, informed, and open society. Efforts to enhance media literacy, promote diverse viewpoints, and reform digital media practices are key to mitigating the wallpaper effect and fostering a more informed and less polarized public.

Read more

Election denialism, the refusal to accept credible election outcomes, has significantly impacted U.S. history, especially in recent years. This phenomenon is not entirely new; election denial has roots that stretch back through various periods of American history. However, its prevalence and intensity have surged in the contemporary digital and political landscape, influencing public trust, political discourse, and the very fabric of democracy.

Historical context

Historically, disputes over election outcomes are as old as the U.S. electoral system itself. For instance, the fiercely contested 1800 election between Thomas Jefferson and John Adams resulted in a constitutional amendment (the 12th Amendment) to prevent similar confusion in the future. The 1876 election between Rutherford B. Hayes and Samuel J. Tilden was resolved through the Compromise of 1877, which effectively ended Reconstruction and had profound effects on the Southern United States.

Yet these instances, while contentious, were resolved within the framework of existing legal and political mechanisms, without denying the legitimacy of the electoral process itself. Over time, claims of election fraud would come to be levied against the electoral and political system itself — with dangerous implications for the peaceful transfer of power upon which democracy rests.

Voting box in an election, by Midjourney

The 21st century and digital influence

Fast forward to the 21st century, and election denialism has taken on new dimensions, fueled by the rapid dissemination of disinformation (and misinformation) through digital media and a polarized political climate. The 2000 Presidential election, with its razor-thin margins and weeks of legal battles over Florida’s vote count, tested the country’s faith in the electoral process.

Although the Supreme Court‘s decision in Bush v. Gore was deeply controversial, Al Gore’s concession helped to maintain the American tradition of peaceful transitions of power.

The 2020 Election: A flashpoint

The 2020 election, marked by the COVID-19 pandemic and an unprecedented number of mail-in ballots, became a flashpoint for election denialism. Claims of widespread voter fraud and electoral malfeasance were propagated at the highest levels of government, despite a lack of evidence substantiated by multiple recounts, audits, and legal proceedings across several states.

The refusal to concede by President Trump and the storming of the U.S. Capitol on January 6, 2021, marked a watershed moment in U.S. history, where election denialism moved from the fringes to the center of political discourse, challenging the norms of democratic transition. Widely referred to as The Big Lie, the baseless claims of election fraud that persist in the right-wing to this day are considered themselves to be a form of election fraud by justice officials, legal analysts, and a host of concerned citizens worried about ongoing attempts to overthrow democracy in the United States.

Implications, public trust, and voter suppression

The implications of this recent surge in election denialism are far-reaching. It has eroded public trust in the electoral system, with polls indicating a significant portion of the American populace doubting the legitimacy of election results. This skepticism is not limited to the national level but has trickled down to local elections, with election officials facing threats and harassment. The spread of misinformation, propaganda, and conspiracy theories about electoral processes and outcomes has become a tool for political mobilization, often exacerbating divisions within the American society.

Moreover, election denialism has prompted legislative responses at the state level, with numerous bills introduced to restrict voting access in the name of election security. These measures have sparked debates about voter suppression and the balance between securing elections and ensuring broad electoral participation. The challenge lies in addressing legitimate concerns about election integrity while avoiding the disenfranchisement of eligible voters.

Calls for reform and strengthening democracy

In response to these challenges, there have been calls for reforms to strengthen the resilience of the U.S. electoral system. These include measures to enhance the security and transparency of the voting process, improve the accuracy of voter rolls, and counter misinformation about elections. There’s also a growing emphasis on civic education to foster a more informed electorate capable of critically evaluating electoral information.

The rise of election denialism in recent years highlights the fragility of democratic norms and the crucial role of trust in the electoral process. While disputes over election outcomes are not new, the scale and impact of recent episodes pose unique challenges to American democracy. Addressing these challenges requires a multifaceted approach, including legal, educational, and technological interventions, to reinforce the foundations of democratic governance and ensure that the will of the people is accurately and fairly represented.

Read more

A “filter bubble” is a concept in the realm of digital publishing, media, and web technology, particularly significant in understanding the dynamics of disinformation and political polarization. At its core, a filter bubble is a state of intellectual isolation that can occur when algorithms selectively guess what information a user would like to see based on past behavior and preferences. This concept is crucial in the digital age, where much of our information comes from the internet and online sources.

Origins and mechanics

The term was popularized by internet activist Eli Pariser around 2011. It describes how personalization algorithms in search engines and social media platforms can isolate users in cultural or ideological bubbles. These algorithms, driven by AI and machine learning, curate content – be it news, search results, or social media posts – based on individual user preferences, search histories, and previous interactions.

filter bubble, by DALL-E 3

The intended purpose is to enhance user experience by providing relevant and tailored content. However, this leads to a situation where users are less likely to encounter information that challenges or broadens their worldview.

Filter bubbles in the context of disinformation

In the sphere of media and information, filter bubbles can exacerbate the spread of disinformation and propaganda. When users are consistently exposed to a certain type of content, especially if it’s sensational or aligns with their pre-existing beliefs, they become more susceptible to misinformation. This effect is compounded on platforms where sensational content is more likely to be shared and become viral, often irrespective of its accuracy.

Disinformation campaigns, aware of these dynamics, often exploit filter bubbles to spread misleading narratives. By tailoring content to specific groups, they can effectively reinforce existing beliefs or sow discord, making it a significant challenge in the fight against fake news and propaganda.

Impact on political beliefs and US politics

The role of filter bubbles in shaping political beliefs is profound, particularly in the polarized landscape of recent US politics. These bubbles create echo chambers where one-sided political views are amplified without exposure to opposing viewpoints. This can intensify partisanship, as individuals within these bubbles are more likely to develop extreme views and less likely to understand or empathize with the other side.

Recent years in the US have seen a stark divide in political beliefs, influenced heavily by the media sources individuals consume. For instance, the right and left wings of the political spectrum often inhabit separate media ecosystems, with their own preferred news sources and social media platforms. This separation contributes to a lack of shared reality, where even basic facts can be subject to dispute, complicating political discourse and decision-making.

Filter bubbles in elections and political campaigns

Political campaigns have increasingly utilized data analytics and targeted advertising to reach potential voters within these filter bubbles. While this can be an effective campaign strategy, it also means that voters receive highly personalized messages that can reinforce their existing beliefs and psychological biases, rather than presenting a diverse range of perspectives.

Breaking out of filter bubbles

Addressing the challenges posed by filter bubbles involves both individual and systemic actions. On the individual level, it requires awareness and a conscious effort to seek out diverse sources of information. On a systemic level, it calls for responsibility from tech companies to modify their algorithms to expose users to a broader range of content and viewpoints.

Filter bubbles play a significant role in the dissemination and reception of information in today’s digital age. Their impact on political beliefs and the democratic process — indeed, on democracy itself — in the United States cannot be overstated. Understanding and mitigating the effects of filter bubbles is crucial in fostering a well-informed public, capable of critical thinking and engaging in healthy democratic discourse.

Read more

The concept of a “honeypot” in the realms of cybersecurity and information warfare is a fascinating and complex one, straddling the line between deception and defense. At its core, a honeypot is a security mechanism designed to mimic systems, data, or resources to attract and detect unauthorized users or attackers, essentially acting as digital bait. By engaging attackers, honeypots serve multiple purposes: they can distract adversaries from more valuable targets, gather intelligence on attack methods, and help in enhancing security measures.

Origins and Usage

The use of honeypots dates back to the early days of computer networks, evolving significantly with the internet‘s expansion. Initially, they were simple traps set to detect anyone probing a network. However, as cyber threats grew more sophisticated, so did honeypots, transforming into complex systems designed to emulate entire networks, applications, or databases to lure in cybercriminals.

A honeypot illustration with a circuit board beset by a bee, by Midjourney

Honeypots are used by a variety of entities, including corporate IT departments, cybersecurity firms, government agencies, and even individuals passionate about cybersecurity. Their versatility means they can be deployed in almost any context where digital security is a concern, from protecting corporate data to safeguarding national security.

Types and purposes

There are several types of honeypots, ranging from low-interaction honeypots, which simulate only the services and applications attackers might find interesting, to high-interaction honeypots, which are complex and fully-functional systems designed to engage attackers more deeply. The type chosen depends on the specific goals of the deployment, whether it’s to gather intelligence, study attack patterns, or improve defensive strategies.

In the context of information warfare, honeypots serve as a tool for deception and intelligence gathering. They can be used to mislead adversaries about the capabilities or intentions of a state or organization, capture malware samples, and even identify vulnerabilities in the attacker’s strategies. By analyzing the interactions attackers have with these traps, defenders can gain insights into their techniques, tools, and procedures (TTPs), enabling them to better anticipate and mitigate future threats.

Historical effects

Historically, honeypots have had significant impacts on both cybersecurity and information warfare. They’ve led to the discovery of new malware strains, helped dismantle botnets, and provided critical intelligence about state-sponsored cyber operations. For example, honeypots have been instrumental in tracking the activities of sophisticated hacking groups, leading to a deeper understanding of their targets and methods, which, in turn, has informed national security strategies and cybersecurity policies.

One notable example is the GhostNet investigation, which uncovered a significant cyber espionage network targeting diplomatic and governmental institutions worldwide. Honeypots played a key role in identifying the malware and command-and-control servers used in these attacks, highlighting the effectiveness of these tools in uncovering covert operations.

Honeypot hackers and cybercriminals

Ethical and practical considerations

While the benefits of honeypots are clear, their deployment is not without ethical and practical considerations. There’s a fine line between deception for defense and entrapment, raising questions about the legality and morality of certain honeypot operations, especially in international contexts where laws and norms may vary widely.

Moreover, the effectiveness of a honeypot depends on its believability and the skill with which it’s deployed and monitored. Poorly configured honeypots might not only fail to attract attackers but could also become liabilities, offering real vulnerabilities to be exploited.

Cyber attackers and defenders

Honeypots are a critical component of the cybersecurity and information warfare landscapes, providing valuable insights into attacker behaviors and tactics. They reflect the ongoing cat-and-mouse game between cyber attackers and defenders, evolving in response to the increasing sophistication of threats. As digital technologies continue to permeate all aspects of life, the strategic deployment of honeypots will remain a vital tactic in the arsenal of those looking to protect digital assets and information. Their historical impacts demonstrate their value, and ongoing advancements in technology promise even greater potential in understanding and combating cyber threats.

By serving as a mirror to the tactics and techniques of adversaries, honeypots help illuminate the shadowy world of cyber warfare, making them indispensable tools for anyone committed to safeguarding information in an increasingly interconnected world.

Read more

SOTU 2024 Joe Biden Presidential address

Strong economic messages of the Keynesian buttressing of the middle class that is Bidenomics were everywhere in evidence at last night’s State of the Union address, Biden’s third since taking office in 2021. In SOTU 2024 he spoke about stabbing trickle-down economics in its gasping heart as a repeated failure to the American people. Instead of giving another $2 trillion tax cuts to billionaires, Biden wants to give back to the people who he says built America: the middle class.

The President delivered strong, sweeping language and vision reminiscent of LBJ’s Great Society and FDR‘s New Deal. He also delivered a heartwarming sense of unity and appeal to put down our bickering and get things done for the American people.

“We all come from somewhere — but we’re all Americans.”

This while lambasting the Republicans for scuttling the deal over the popular bipartisan immigration bill thanks to 11th hour interference from TFG (“my predecessor” as JRB called him). “This bill would save lives!” He is really effective at calling out the GOP‘s hypocrisy on border security with this delivery.

“We can fight about the border or we can fix the border. Send me a bill!”

He is taking full advantage of being the incumbent candidate here. He has the power and the track record to do all these things he is promising, and he’s telling the exact truth about the Republican obstructionism preventing the American people from having their government work for them.

SOTU 2024 Joe Biden fiery speech with Kamala Harris and Mike Johnson in the background behind him

I love that he calls out Trump in this speech, without naming names — almost a kind of Voldemort effect. He who must not be named — because giving him the dignity even of a name is more than he deserves.

He says that Trump and his cabal of anti-democratic political operatives have ancient ideas (hate, revenge, reactionary, etc.) — and that you can’t lead America with ancient ideas. In America, we look towards the future — relentlessly. Americans wants a president who will protect their rights — not take them away.

“I see a future… for all Americans!” he ends with, in a segment reminiscent of the great Martin Luther King’s “I Have a Dream” speech, with its clear vision of power and authority flowing from what is morally right and just, instead of what is corrupt and cronyish. It gave me hope for the future — that Americans will make the right choice, as we seem to have done under pressure, throughout our history. 🀞🏽

Continue reading Biden SOTU 2024: Success stories and big policy ideas
Read more

Dark money refers to political spending by organizations that are not required to disclose their donors or how much money they spend. This allows wealthy individuals and special interest groups to secretly fund political campaigns and influence elections without transparency or accountability.

The term “dark money” gained prominence after the 2010 Supreme Court decision in Citizens United v. Federal Election Commission. In that case, the Court ruled that corporations and unions could spend unlimited amounts of money on political campaigns, as long as the spending was not coordinated with a candidate’s campaign.

This decision opened the floodgates for massive amounts of dark money to flow into political campaigns, often with no way for the public to know who was behind it. Dark money can come from a variety of sources, including wealthy individuals, corporations, trade associations, and non-profit organizations.

Hidden donors

Non-profit organizations, in particular, have become a popular way for donors to hide their political contributions. These organizations can operate under section 501(c)(4) of the tax code, which allows them to engage in some political activity as long as it is not their primary purpose. These groups are not required to disclose their donors, which means that wealthy individuals and corporations can funnel unlimited amounts of money into political campaigns without anyone knowing where the money came from.

Another way that dark money is used in politics is through “shell corporations.” These are companies that exist solely to make political donations and are often set up specifically to hide the identity of the true donor. For example, a wealthy individual could set up a shell corporation and then use that corporation to donate to a political campaign. Because the corporation is listed as the donor, the individual’s name does not appear on any public disclosure forms.

The money can be used to run ads, create content and propaganda, fund opposition research, pay armadas of PR people, send direct mail, lobby Congress, hire social media influencers, and many other powerful marketing strategies to reach and court voters.

These practices erode at the foundations of representative democracy, and the kind of government the Founders had in mind. One is free to vote for who one wishes, and to advocate for who ones wishes to hold power, but one has no Constitutional right to anonymity when doing so. It infringes on others peoples’ rights as well — the right to representative and transparent government.

Dark money impact

Dark money can have a significant impact on elections and public policy. Because the source of the money is not known, candidates and elected officials may be influenced by the interests of the donors rather than the needs of their constituents. This can lead to policies that benefit wealthy donors and special interest groups rather than the broader public.

There have been some efforts to increase transparency around dark money. For example, the DISCLOSE Act, which has been introduced in Congress several times since 2010, would require organizations that spend money on political campaigns to disclose their donors (the acronym stands for “Democracy Is Strengthened by Casting Light On Spending in Elections”). However, these efforts have been met with resistance from groups that benefit from the lack of transparency — who, somewhat ironically, have been using their influence with the Republican Party to make sure the GOP opposes the bill and prevents it from passing, or even coming up for a vote at all.

In addition to the impact on elections and policy, dark money can also undermine public trust in government. When voters feel that their voices are being drowned out by the interests of wealthy donors and special interest groups, they may become disillusioned with the political process and less likely to participate.

Overall, dark money is a significant problem in American politics. The lack of transparency and accountability around political spending allows wealthy individuals and special interest groups to wield undue influence over elections and policy. To address this problem, it will be important to increase transparency around political spending and reduce the influence of money in politics.

Dark Money: Learn more

Read more

The term “hoax” is derived from “hocus,” a term that has been in use since the late 18th century. It originally referred to a trick or deception, often of a playful or harmless nature. The essence of a hoax was its capacity to deceive, typically for entertainment or to prove a point without malicious intent. Over time, the scope and implications of a hoax have broadened significantly. What was once a term denoting jest or trickery has morphed into a label for deliberate falsehoods intended to mislead or manipulate public perception.

From playful deception to malicious misinformation

As society entered the age of mass communication, the potential reach and impact of hoaxes expanded dramatically. The advent of newspapers, radio, television, and eventually the internet and social media platforms, transformed the way informationβ€”and misinformationβ€”circulated. Hoaxes began to be used not just for amusement but for more nefarious purposes, including political manipulation, financial fraud, and social engineering. The line between a harmless prank and damaging disinformation and misinformation became increasingly blurred.

The political weaponization of “hoax”

In the contemporary political landscape, particularly within the US, the term “hoax” has been co-opted as a tool for disinformation and propaganda. This strategic appropriation has been most visible among certain factions of the right-wing, where it is used to discredit damaging information, undermine factual reporting, and challenge the legitimacy of institutional findings or scientific consensus. This application of “hoax” serves multiple purposes: it seeks to sow doubt, rally political bases, and divert attention from substantive issues.

the politicization of hoaxes, via fake scandals that tie up the media unwittingly in bullshit for years, by DALL-E 3

This tactic involves labeling genuine concerns, credible investigations, and verified facts as “hoaxes” to delegitimize opponents and minimize the impact of damaging revelations. It is a form of gaslighting on a mass scale, where the goal is not just to deny wrongdoing but to erode the very foundations of truth and consensus. By branding something as a “hoax,” these actors attempt to preemptively dismiss any criticism or negative information, regardless of its veracity.

Case Studies: The “Hoax” label in action

High-profile instances of this strategy include the dismissal of climate change data, the denial of election results, and the rejection of public health advice during the COVID-19 pandemic. In each case, the term “hoax” has been employed not as a description of a specific act of deception, but as a blanket term intended to cast doubt on the legitimacy of scientifically or empirically supported conclusions. This usage represents a significant departure from the term’s origins, emphasizing denial and division over dialogue and discovery.

The impact on public discourse and trust

The strategic labeling of inconvenient truths as “hoaxes” has profound implications for public discourse and trust in institutions. It creates an environment where facts are fungible, and truth is contingent on political allegiance rather than empirical evidence. This erosion of shared reality undermines democratic processes, hampers effective governance, and polarizes society.

Moreover, the frequent use of “hoax” in political discourse dilutes the term’s meaning and impact, making it more difficult to identify and respond to genuine instances of deception. When everything can be dismissed as a hoax, the capacity for critical engagement and informed decision-making is significantly compromised.

Moving Forward: Navigating a “post-hoax” landscape

The challenge moving forward is to reclaim the narrative space that has been distorted by the misuse of “hoax” and similar terms. This involves promoting media literacy, encouraging critical thinking, and fostering a public culture that values truth and accountability over partisanship. It also requires the media, educators, and public figures to be vigilant in their language, carefully distinguishing between genuine skepticism and disingenuous dismissal.

The evolution of “hoax” from a term denoting playful deception to a tool for political disinformation reflects broader shifts in how information, truth, and reality are contested in the public sphere. Understanding this transformation is crucial for navigating the complexities of the modern informational landscape and for fostering a more informed, resilient, and cohesive society.

Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s TelefΓ³nica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

Wealth Cult -- rich men behaving badly, by Midjourney

A network of exceedingly wealthy individuals and organizations have channeled their vast fortunes into influencing American politics, policy, and public opinion — they’ve formed a wealth cult. And they’ve leveraged that cult and its considerable fortune to influence and in many ways dramatically transform American politics.

The term “dark money” refers to political spending meant to influence the decision-making and critical thinking of the public and lawmakers where the source of the money is not disclosed. This lack of transparency makes it challenging to trace the influence back to its origins, hence the term “dark.”

And, it is dark indeed.

Wealth cult anchors the trench coat

The Wealth Cult is one of 3 primary groups or clusters supporting the right-wing and generally, the Republican Party. It anchors the trench coat by funding the 2 cults above it: the Christian Cult, and the White Cult.

Its story is stealthy and significant.

A bunch of billionaires toast themselves to themselves, by Midjourney

The wealth cult has funded disinformation campaigns, the spread of conspiracy theories, created fake social movements through astroturfing, enabled violent extremists to attack their country’s capitol, cruelly deprived vulnerable people (especially immigrants, poor people, and women) of the kind of state aid granted generously throughout the developed world, bribed regulators, rigged elections, crashed economies, and on and on in service of their extremist free market ideology beliefs.

They believe in “makers and takers,” or Mudsill Theory, as it was once called by pedophile and racist Senator and slavery enthusiast James Henry Hammond. Some people were born to serve others, they say. Hierarchies are natural, they claim. Wealthy men should make all the decisions — because that’s what’s best for everyone, they say in paternalistic tones.

I don’t buy it. I believe all men are created equal. So did a certain Founder of our country.

Continue reading Wealth Cult: The oligarchs influencing American politics from the shadows
Read more

Below is a list of the covert gang of folks trying to take down the US government — the anti-government oligarchs who think they run the place. The Koch network of megarich political operatives has been anointing itself the true (shadowy) leaders of American politics for several decades.

Spearheaded by Charles Koch, the billionaire fossil fuel magnate who inherited his father Fred Koch’s oil business, the highly active and secretive Koch network — aka the “Kochtopus” — features a sprawling network of donors, think tanks, non-profits, political operatives, PR hacks, and other fellow travelers who have come to believe that democracy is incompatible with their ability to amass infinite amounts of wealth.

Despite their obvious and profligate success as some of the world’s richest people, they whine that the system of US government is very unfair to them and their ability to do whatever they want to keep making a buck — the environment, the people, and even the whole planet be damned. Part of an ever larger wealth cult of individuals spending unprecedented amounts of cash to kneecap the US government from any ability to regulate business or create a social safety net for those exploited by concentrated (and to a large extent inherited) wealth, the Koch network is the largest and most formidable group within the larger project of US oligarchy.

The Kochtopus

By 2016 the Koch network of private political groups had a paid staff of 1600 people in 35 states — a payroll larger than that of the Republican National Committee (RNC) itself. They managed a pool of funds from about 400 or so of the richest people in the United States, whose goal was to capture the government and run it according to their extremist views of economic and social policy. They found convenient alignment with the GOP, which has been the party of Big Business ever since it succeeded in first being the party of the Common Man in the 1850s and 60s.

Are we to be just a wholly-owned subsidiary of Koch Industries? Who will help stand and fight for our independence from oligarchy?

  • Philip Anschutz — Founder of Qwest Communications. Colorado oil and entertainment magnate and billionaire dubbed the world’s “greediest executive” by Fortune Magazine in 2002.
  • American Energy Alliance — Koch-funded tax-exempt nonprofit lobbying for corporate-friendly energy policies
  • American Enterprise Institute — The American Enterprise Institute (AEI) is a public policy think tank based in Washington, D.C. Established in 1938, it is one of the oldest and most influential think tanks in the United States. AEI is primarily known for its conservative and free-market-oriented policy research and advocacy.
  • Americans for Prosperity
  • Harry and Lynde Bradley — midwestern defense contractors and Koch donors
  • Michael Catanzaro
  • Cato Institute
  • Center to Protect Patient Rights — The Koch network’s fake front group for fighting against Obama‘s Affordable Care Act.
  • CGCN Group — right-wing lobbying group
  • Citizens for a Sound Economy
  • Club for Growth
  • Competitive Enterprise Institute — Right-wing think tank funded by the Kochs and other oil and gas barons
  • Continental Resources — Harold Hamm’s shale-oil company
  • Joseph Coors — Colorado beer magnate
  • Betsy and Dick DeVos — founders of the Amway MLM empire, and one of the richest families in Michigan
  • Myron Ebell — Outspoken client change denier picked to head Trump’s EPA transition team who previously worked at the Koch-funded Competitive Enterprise Institute.
  • Richard Farmer — Chairman of the Cintas Corporation in Cincinnati, the nation’s largest uniform supply company. Legal problems against him included an employee’s gruesome death thanks to violating safety laws.
  • Freedom Partners — the Koch donor group
  • Freedom School — the all-white CO private school funded by Charles Koch in the 1960s
  • FreedomWorks
  • Richard Gilliam — Head of Virginia coal mining company Cumberland Resources, and Koch network donor.
  • Harold Hamm — Oklahoma fracking king and charter member of the Koch donors’ circle, Hamm became a billionaire founding the Continental Resources shale-oil company
  • Diane Hendricks — $3.6 billion building supply company owner and Trump inaugural committee donor, and the wealthiest woman in Wisconsin.
  • Charles Koch — CEO of Koch Industries and patriarch of the Koch empire following his father and brother’s death, and estrangement from his other younger brother. Former member of the John Birch Society, a group so far to the right that even arch-conservative William F. Buckley excommunicated them from the mainstream party in the 1950s.
  • The Charles Koch Foundation
  • (David Koch) — deceased twin brother of Bill Koch and younger brother to Charles who ran a failed campaign in 1980 as the vice presidential nominee of the Libertarian Party — netting 1% of the popular vote. In 2011 he echoed spurious claims from conservative pundit Dinesh D’Souza that Obama got his “radical” political outlook from his African father.
  • The Leadership Institute
  • Michael McKenna — president of the lobbying firm MWR Strategies, whose clients include Koch Industries, picked by Trump to serve on the Department of Energy transition team
  • Rebekah Mercer — daughter of hedge fund billionaire and right-wing Koch donor Robert Mercer, she worked with Steve Bannon on several projects including Breitbart News, Cambridge Analytica, and Gab.
  • Robert Mercer — billionaire NY hedge fund manager and next largest donor after the Kochs themselves, sometimes even surpassing them
  • MWR Strategies — lobbying firm for the energy industry whose clients include Koch Industries, whose president Michael McKenna served on the Trump energy transition team
  • John M. Olin — chemical and munitions magnate and Koch donor
  • George Pearson — Former head of the Koch Foundation
  • Mike Pence — Charles Koch’s number one pick for president in 2012.
  • Mike Pompeo — former Republican Kansas Congressman who got picked first to lead the CIA, then later as Secretary of State under Trump. He was the single largest recipient of Koch money in Congress as of 2017. The Kochs had been investors and partners in Pompeo’s business ventures before he got into politics.
  • The Reason Foundation
  • Richard Mellon Scaife — heir to the Mellon banking and Gulf Oil fortunes
  • David Schnare — self-described “free-market environmentalist” on Trump’s EPA transition team
  • Marc Short — ran the Kochs’ secretive donor club, Freedom Partners, before becoming a senior advisor to vice president Mike Pence during the Trump transition
  • State Policy Network
  • The Tax Foundation
  • Tea Party

Koch Network Mind Map

This mind map shows the intersections between the Koch network and the larger network of GOP donors, reactionaries, and evil billionaires who feel entitled to control American politics via the fortunes they’ve made or acquired.

Read more

The GOP is 3 cults in a trench coat

One of two major parties in our American first-past-the-post voting system of dual-party reality, the Republican Party, has evolved (or devolved…) into a full-throated authoritarian movement seeking to overthrow our democracy, The Constitution, and the rule of law in order to establish a fascist regime in the United States. It’s been a not-so-secret fever dream on the right for decades and even centuries — and the old guard reflexively senses their time is coming to an end.

The demographic changes underway in America are inexorable — by the 2024 election cycle 8 million new young voters who have turned 18 since the 2022 mid-terms, and 5 million seniors aged 65 and up will have died. The first group will vote overwhelmingly Democratic, while the second group represents the ever-dwindling base of the Republican Party. Although historically older voters have participated at much higher rates than the youth voting percentage, the rate of increase for the 18-24 group is much higher.

Faced with these realities and the census projection of a majority minority population in the United States by the year 2045, the Republican right-wing is struggling to keep piecing together a voting base that can achieve victories in electoral politics. The GOP is now 3 cults in a trenchcoat, having been hollowed out and twisted to the point of trying desperately to hold increasingly extreme factions together for another election cycle in which they can try to capture power forever through gerrymandering and other anti-democratic election engineering — or at least long enough to erase the evidence of their criminal behavior during the Trump years culminating in a coup attempt on January 6, 2021.

The 3 Republican cult factions

  1. The Wealth Cult — A business lobby led by Charles Koch and a collection of dark money groups including Leonard Leo‘s Federalist Society and the American Legislative Exchange Council (ALEC), this group emerged out of the 1970s business backlash to the civil rights movement — while piggybacking on the still-simmering resentments of the anti-New Deal and pro-fascist America Firsters of the 1930s and the searing anti-Communism of the 1950s McCarthyism era turned, improbably, Russophilia in modern days.
  2. The Christian Nationalist Cult — Started by Jerry Falwell Sr. with the Moral Majority circa 1979, the politicized Evangelical movement is inexplicably led today by “sudden believers” Mike Pence, Mike Flynn, and others under the umbrella of the Council for National Policy (CNP), the New Apostolic Reformation (NAR), and other religious organizations involved in politics in large part as a backlash to the Broad v. Board of Education ruling and the federal mandate to end school segregation. Masquerading as so-called “originalists,” this coalition are rather radical reactionaries participating in a long-running backlash against civil rights and the women’s rights movements of the 1960s, including the Roe v. Wade ruling by the Supreme Court that legalized abortion — overturned in 2022 based on efforts by this group.
  3. The White Nationalist Cult — With roots in the 1980s white power movement stretching all the way back to the Civil War and the Lost Cause mythology that followed and long outlasted Reconstruction, today the white identity movement is led by Steve Bannon and Roger Stone, with a parallel intertwined branch led by Peter Thiel and the Dark Enlightenment neo-Reactionaries of Silicon Valley. This group includes dominant private militia groups involved in the January 6 insurrection including the Proud Boys and Oath Keepers (both of whose leaders have been convicted of seditious conspiracy for their roles in the coup attempt — with the Oath Keepers’ leader Stewart Rhodes sentenced to 18 years for his actions).

The Wealth Cult

Led by Charles Koch et al, the mostly aging, Boomer crowd who controls much of the US government either directly or indirectly as a donor or operative is starting to panic for one reason or another: the fear of death looming, existential worries about thwarted or unmet ambition, economic turn of the wheel starting to leave their fortunes in decline (with inflation as a common boogie man since the Wall Street Putsch of the 1930s). Much of this crowd inherited the free market ideological zeal of the Austrian School of economics (later, trickle down economics) from their fathers along with their trust fund fortunes that some have squandered (Trump), tread water with (Coors, Scaife), or grown (Koch, DeVos).

The Wealth Cult, by Midjourney
Continue reading The GOP is 3 Cults in a Trenchcoat
Read more

An echo chamber is a metaphorical description of a situation where an individual is encased in a bubble of like-minded information, reinforcing pre-existing views without exposure to opposing perspectives. This concept has gained prominence with the rise of digital and social media, where algorithms personalize user experiences, inadvertently isolating individuals from diverse viewpoints and enabling people to remain cloistered within a closed system that may contain misinformation and disinformation.

The role of digital media and algorithms

Digital platforms and social media leverage algorithms to tailor content that aligns with users’ past behaviors and preferences. This personalization, while enhancing engagement, fosters filter bubblesβ€”closed environments laden with homogeneous information.

Such settings are ripe for the unchecked proliferation of disinformation, as they lack the diversity of opinion necessary for critical scrutiny. The need for critical thinking is greatly diminished when we are only ever exposed to information and beliefs we already agree with.

Disinformation in echo chambers

Echo chambers serve as breeding grounds for disinformation, where false information is designed to mislead and manipulate. In these closed loops, disinformation finds little resistance and is readily accepted and amplified, bolstering existing biases and misconceptions.

We all have psychological traits that make us vulnerable to believing things that aren’t true. Whether sourced via deception, misinterpretation, conspiracy theories, propaganda, or other phenomena, false beliefs are made stickier and harder to debunk when one is surrounded by an echo chamber.

Political polarization exacerbated

Beyond the scale of lone individuals, the isolation facilitated by echo chambers significantly contributes to political polarization more broadly. As people become entrenched in their informational silos, the common ground necessary for democratic discourse dwindles. This division not only fosters extremism but also undermines the social cohesion essential for a functioning democracy.

The impact of confirmation bias

Within echo chambers, confirmation biasβ€”the tendency to favor information that corroborates existing beliefsβ€”becomes particularly pronounced. This cognitive bias solidifies ideological positions, making individuals resistant to changing their views, even in the face of contradictory evidence.

The real-world effects of echo chambers transcend digital boundaries as well, influencing real-world political landscapes. Political actors can exploit these dynamics to deepen divides, manipulate public opinion, and mobilize support based on misinformation, leading to a polarized and potentially radicalized electorate.

Strategies for mitigation

Combating the challenges posed by echo chambers and disinformation necessitates a comprehensive approach:

  • Media Literacy: Educating the public to critically assess information sources, understand content personalization, and identify sources of biases and disinformation.
  • Responsible Platform Design: Encouraging digital platforms to modify algorithms to promote diversity in content exposure and implement measures against disinformation.
  • Regulatory Interventions: Policymakers may need to step in to ensure digital environments foster healthy public discourse.

Echo chambers, particularly within the digital media landscape, significantly impact the spread of disinformation and political polarization. By reinforcing existing beliefs and isolating individuals from diverse perspectives, they contribute to a divided society. Addressing this issue is critical and requires efforts in education, platform design, and regulation to promote a more informed and cohesive public discourse.

Read more