Cybersecurity

sadism a trait of the Dark Triad

The Psychology of Sadism: Understanding the Dark Side of Human Nature

In the pantheon of human psychological traits, few are as unsettling – yet fascinating – as sadism. While the term often conjures images of extreme criminal behavior or medieval torture chambers, the reality is both more nuanced and more pervasive than most people realize. Let’s dive deep into the psychological architecture of sadism and explore what modern science tells us about this disturbing aspect of human nature.

The Spectrum of Sadistic Behavior

At its core, sadism represents the capacity to derive pleasure from others’ suffering. But like many psychological phenomena, it exists on a spectrum rather than as a binary trait. On one end, we find what researchers call “everyday sadism” – those small cruel behaviors that pepper ordinary life, like enjoying watching fail videos or taking pleasure in office politics gone wrong. On the other end lies clinical sadism, the domain of true predators and those who commit acts of serious violence.

This spectrum theory helps explain why perfectly “normal” people might engage in behaviors like internet trolling or workplace bullying. These acts represent subclinical manifestations of sadistic tendencies that, while concerning, fall well short of criminal behavior.

The Dark Tetrad: A Family of Malevolent Traits

Sadism doesn’t exist in isolation. It’s part of what psychologists call the Dark Tetrad – a cluster of interconnected traits including narcissism, Machiavellianism, and psychopathy (it’s the newest band member of the artist formerly known as the Dark Triad). Think of these as the four horsemen of malevolent personality, each bringing its own flavor of interpersonal toxicity to the table.

What makes sadism unique within this dark constellation? Unlike its siblings, sadism involves a willingness to incur personal costs just to harm others. A narcissist might hurt you to get ahead, but a sadist will hurt you simply because it feels good – even if it means sacrificing their own resources or social standing in the process.

The Anatomy of a Sadistic Personality

Modern psychological research has identified three key components of sadistic personality:

  1. Physical violence isn’t just tolerated – it’s enjoyed. Whether participating in or merely witnessing violent acts, sadistic individuals experience positive emotions where others would feel revulsion.
  2. Verbal sadism manifests as a love of cruel humor, cutting remarks, and psychological warfare. These individuals don’t just win arguments; they savor their opponent’s emotional pain.
  3. Violent media consumption goes beyond normal entertainment preferences. Sadistic individuals actively seek out graphic content and experience genuine pleasure from witnessing violence, even in fictional contexts.
a sadistic man watching violence on TV

The Neuroscience of Cruelty

Recent neurobiological research has begun to unlock the physical basis of sadistic behavior. Studies show that sadistic individuals often display blunted startle responses similar to those seen in psychopaths. This suggests a fundamental difference in how their brains process threats and emotional stimuli.

Even more intriguingly, brain imaging studies have revealed potential alterations in regions associated with empathy and emotion processing. It’s as if the neural machinery normally responsible for sharing others’ pain has been rewired to experience it as pleasure instead.

Measuring the Unmeasurable

How do you quantify something as complex as sadistic tendencies? Researchers have developed several innovative approaches:

The Comprehensive Assessment of Sadistic Tendencies (CAST) provides a standardized way to measure sadistic traits across populations.

Behavioral experiments, including the infamous “bug-grinding study,” create controlled environments where sadistic tendencies can be observed in action.

Advanced neuroimaging techniques allow researchers to watch the sadistic brain in real-time, offering unprecedented insights into the neural correlates of cruel behavior.

Why This Matters

Understanding sadism isn’t just an academic exercise. It has profound implications for:

  • Predicting and preventing violent behavior
  • Developing more effective interventions for individuals with sadistic tendencies
  • Understanding the psychological mechanisms behind systemic cruelty and institutional violence
  • Creating safer online spaces by addressing trolling and cyberbullying
  • Improving workplace dynamics by recognizing and addressing subtle forms of sadistic behavior

Looking Forward

As our understanding of sadism continues to evolve, we’re faced with uncomfortable questions about human nature. Is the capacity for sadistic pleasure a bug or a feature of our psychological makeup? Can we develop effective interventions to curb sadistic tendencies? How do we balance the need to understand sadism with the risk of normalizing it?

These questions don’t have easy answers, but they’re crucial to address as we work toward creating a society that can recognize, understand, and ultimately minimize the expression of sadistic behavior.

The study of sadism reminds us that the darker aspects of human nature deserve neither glorification nor denial, but rather careful, clear-eyed examination. Only by understanding the psychology of cruelty can we hope to build a world with less of it.

For a deeper dive into related topics in psychology and human behavior (and more), explore more articles here on Doctor Paradox.

Related to sadism

Read more

In an era marked by unprecedented political, social, and technological upheavals, understanding the forces shaping our world has never been more urgent. From the dark currents of authoritarianism and Christian nationalism to the shadowy influence of dark money and disinformation, we’re facing a web of interconnected threats that challenge the very foundations of democracy. To navigate this complex landscape, we need to rely on those trusted experts who have dedicated their lives to researching and exposing these dangersβ€”experts whose work sheds light on the hidden mechanisms at play in global power struggles.

This post is a curated guide to some of the top thought leaders in areas critical to understanding today’s political battlegrounds. These experts, from historians to journalists to security analysts, are at the forefront of their fields, providing the insights we need to decode the chaos and develop informed strategies for resistance. Whether you’re a seasoned activist, a curious reader, or someone just trying to make sense of the headlines, these voices are essential listening if we’re to combat the disinformation and division threatening democratic norms.

In times like these, it’s easy to feel overwhelmed by the sheer scale of the challenges we face. But by turning to trusted experts, we can arm ourselves with knowledgeβ€”one of the most powerful tools we have in the fight for a more just and equitable future.

Authoritarianism

The rise of authoritarianism isn’t a distant threat relegated to history booksβ€”it’s a real, present danger, creeping into the cracks of democracy worldwide. Understanding its mechanisms, from centralized power grabs to the erosion of civil liberties, is crucial to resisting its spread. Below are some of the most insightful thinkers and researchers who are sounding the alarm, dissecting how authoritarian regimes function, and offering solutions to protect democratic institutions.

  • Anne Applebaum — Anne Applebaum is a Pulitzer Prize-winning historian and journalist who specializes in authoritarianism, communism, and the resurgence of nationalism in Europe and the U.S. Her notable works include Gulag and Twilight of Democracy, exploring the rise of illiberal politics. (@anneapplebaum)
  • Ruth Ben-Ghiat — Ruth Ben-Ghiat is a historian and expert on authoritarianism, propaganda, and fascism, with a focus on the past and present dynamics of strongman rulers. She is the author of Strongmen: Mussolini to the Present and frequently writes about modern autocratic regimes. (@ruthbenghiat)
  • Natasha Bertrand — Natasha Bertrand is a journalist and national security correspondent, known for her work covering intelligence, foreign policy, and the investigation into Russian interference in U.S. elections. She has written for Politico, The Atlantic, and currently serves as a White House reporter for CNN. (@NatashaBertrand)
  • Joseph Fronczak — Joseph Fronczak is a historian who studies the history of global insurgencies, empire, and the politics of solidarity. His work explores the impact of colonialism and anti-colonial movements on modern international relations and transnational activism.
  • Masha Gessen — Masha Gessen is a Russian-American journalist and author who has written extensively on totalitarianism, Vladimir Putin‘s regime, and LGBTQ+ rights. Gessen’s book The Future Is History won the National Book Award for its profound exploration of Russia’s political culture. (@mashagessen)
  • Jason Stanley — Jason Stanley is a professor of philosophy at Yale University and the author of How Fascism Works: The Politics of Us and Them. His research focuses on the intersections of propaganda, ideology, and authoritarianism, especially in contemporary contexts. (@jasonintrator)
  • Elizabeth Mika — Elizabeth Mika is a clinical psychologist and expert on authoritarianism and collective psychology, with a particular focus on the psychological mechanisms behind mass support for authoritarian leaders. She has contributed to anthologies and discussions on the psychology of totalitarianism and fascism. (@yourauntemma)
  • Timothy Snyder — Timothy Snyder is a historian specializing in Eastern European history and totalitarian regimes, best known for his books Bloodlands and On Tyranny, which explore the dangers of authoritarianism and the fragility of democracy. He is a professor at Yale University and a frequent commentator on modern political crises. (@TimothyDSnyder)
Timothy Snyder, authoritarianism expert on YouTube

Christian nationalism

Christian Nationalism is more than just a fringe ideologyβ€”it’s a growing political force that merges religious fundamentalism with nationalist fervor, aiming to reshape American democracy into a theocratic state. This dangerous movement thrives on historical revisionism and a distorted version of Christian values. The experts listed here have been at the forefront of exposing and analyzing the real-world implications of Christian Nationalism, warning of its impact on policy, governance, and individual rights.

  • Tim Alberta — Tim Alberta is a journalist and political reporter, best known for his coverage of the Republican Party and conservative politics in the U.S. He is the author of American Carnage, which delves into the GOP’s transformation and the rise of Donald Trump. (@timalberta)
  • Anthea Butler — Anthea Butler is the Geraldine R. Segal Professor in American Social Thought and Chair of Religious Studies at the University of Pennsylvania, specializing in African American and American religion, race, politics, and evangelicalism. She is a prolific author and commentator, known for her work on religion and politics, including her recent book “White Evangelical Racism: The Politics of Morality in America” and her contributions to the 1619 Project (@AntheaButler)
  • Robert P. Jones — Robert P. Jones is the president and founder of Public Religion Research Institute (PRRI) and a leading scholar on religion and politics in America. He is a New York Times bestselling author, known for his books on white supremacy and American Christianity, including “The Hidden Roots of White Supremacy and the Path to a Shared American Future” and “White Too Long: The Legacy of White Supremacy in American Christianity” (@robertpjones)
  • Kevin Kruse — Kevin M. Kruse is an American historian and professor of history at Princeton University, specializing in the political, social, and urban/suburban history of 20th-century America with a focus on modern conservatism. He has gained significant attention for his Twitter threads providing historical context for current political events and has authored several books, including “White Flight: Atlanta and the Making of Modern Conservatism (@kevinmkruse)
  • Sarah Posner — Sarah Posner is a Type Investigations reporting fellow who has spent years reporting on the increasing influence of the evangelical Christian right on mainstream politics. She is known for her in-depth analysis of Christian nationalism and its impact on various aspects of American society, including reproductive rights and LGBTQ issues (@sarahposner)
  • Katherine Stewart — Katherine Stewart is a journalist and author focusing on religious extremism and its influence on American politics. Her book The Power Worshippers examines the rise of Christian nationalism and its impact on the country’s political landscape. (@kathsstewart)
Christian nationalism illustration

Dark Money

Dark money flows through the veins of modern politics, influencing elections, legislation, and public opinion in ways most people never see. These hidden streams of funding empower corporations, billionaires, and interest groups to manipulate the political landscape without accountability. The researchers and journalists below have dedicated themselves to pulling back the curtain on these shadowy networks, offering a clearer picture of how wealth and power are wielded behind closed doors.

  • David Farenthold — David Farenthold is a Pulitzer Prize-winning journalist who has covered political corruption and the misuse of funds, particularly in his investigative reporting on Donald Trump’s charitable foundation. He is known for his in-depth investigations and work with The Washington Post and The New York Times. (@Fahrenthold)
  • Judd Legum — Judd Legum is a journalist and the founder of Popular Information, a newsletter focused on accountability journalism, corporate influence, and politics. He previously served as the editor-in-chief of ThinkProgress and frequently covers disinformation and media dynamics in U.S. politics. (@JuddLegum)
  • Jane Mayer — Jane Mayer is a staff writer for The New Yorker and the author of Dark Money, which explores the influence of wealthy conservative donors on American politics. She is an acclaimed investigative journalist, specializing in political corruption, the Koch network, and the intersection of money and policy. (@JaneMayerNYer)
  • Anne Nelson — Anne Nelson is an American journalist, author, playwright, and professor at Columbia University’s School of International and Public Affairs, known for her diverse career spanning war correspondence, award-winning books, and plays. Her work includes “Shadow Network: Media, Money, and the Secret Hub of the Radical Right,” which examines the influence of conservative political groups, and she was inducted into the Oklahoma Journalism Hall of Fame in 2024 for her significant contributions to journalism. (@anelsona)

Disinformation

In an era of digital noise, disinformation is the poison that sows confusion, distrust, and division. From fake news and deepfakes to state-sponsored propaganda, the scale of disinformation campaigns is staggering, threatening not just elections but the very fabric of truth itself. The experts in this field are working to identify, expose, and counter the tactics used to manipulate public perception and undermine democracy.

  • Brooke Binkowski — Brooke Binkowski is a professional journalist whose career has taken her across the globe, covering stories in Mexico, Alaska, Europe, North Africa, and South America. She has worked for various news organizations including CNN, NPR, CBS, and the BBC, and currently serves as an interim news anchor at KPBS Public Media (@brooklynmarie)
  • Ben Collins — Ben Collins is an American businessman and journalist from Massachusetts who formerly worked as a reporter for NBC News, where he focused on disinformation and extremism. In 2024, he became the CEO of Global Tetrahedron, the media company that owns The Onion (@oneunderscore__)
  • Joan Donovan — Joan Donovan is an American social science researcher, sociologist, and academic renowned for her work on disinformation, online extremism, and media manipulation. She is the founder of The Critical Internet Studies Institute and currently serves as an assistant professor at Boston University’s College of Communication, following her tenure as a researcher at Harvard Kennedy School (@BostonJoan)
  • Karen Douglas — Karen Douglas is a Professor of Social Psychology at the University of Kent, specializing in the psychology of conspiracy theories. Her research examines why conspiracy theories appeal to people and their consequences for individuals, groups, and society. Douglas has been widely featured in media outlets like Time, The Guardian, and BBC, and is a co-editor of the textbook “Social Psychology” (@Karen_Douglas)
  • Kevin Roose — Kevin Roose is an American author, journalist, and technology columnist for The New York Times. He hosts the podcast “Rabbit Hole” and co-hosts “Hard Fork” for the Times. Roose has written three books, including “Futureproof: 9 Rules in the Age of Automation,” and gained attention for his early access to and reporting on Bing’s ChatGPT-based chatbot (@kevinroose)
  • Brandy Zadrozny — Brandy Zadrozny is an American investigative journalist and reporter for NBC News, focusing on political radicalization, extremism, and disinformation on the Internet. Before journalism, she worked as a librarian and researcher. Zadrozny has covered topics like QAnon, the Stop the Steal movement, and COVID-19 misinformation (@BrandyZadrozny)
  • Rebecca Lewis — Rebecca Lewis is a researcher and PhD candidate at Stanford University, studying online political subcultures and radicalization. Her work has focused on the alternative influence network on YouTube and the spread of far-right ideologies online. Lewis has published influential reports on these topics through the Data & Society Research Institute.
  • Alice Marwick — Alice E. Marwick is an Associate Professor in Communication and Principal Researcher at the Center for Information, Technology and Public Life at the University of North Carolina at Chapel Hill. Her research focuses on the intersection of social media, politics, gender, and privacy. Marwick has authored books on social media culture and networked privacy, and has written for publications like the New York Times and The Guardian (@alicetiara)
  • Nina Jankowicz — Nina Jankowicz is a disinformation expert and author who has advised governments and organizations on countering information manipulation. She briefly served as executive director of the Department of Homeland Security’s Disinformation Governance Board before it was disbanded. Jankowicz has written two books, “How to Lose the Information War” and “How to Be a Woman Online,” and is a frequent commentator on disinformation-related issues. (@wiczipedia)
Disinformation

Intelligence and National Security

Behind the headlines of political scandals and geopolitical maneuvering lies the world of intelligence and national securityβ€”a complex and often hidden battleground where information is power. Understanding how states gather intelligence, conduct espionage, and protect national interests is key to grasping global power dynamics. The experts featured here have deep insight into the covert world of intelligence operations and its implications for global security.

  • Frank Figliuzzi — Frank Figliuzzi served as the FBI‘s Assistant Director for Counterintelligence and spent 25 years as a Special Agent, directing all espionage investigations across the U.S. government. He is now a national security contributor for NBC News and MSNBC, as well as the author of “The FBI Way: Inside the Bureau’s Code of Excellence,” leveraging his extensive experience to provide insights on intelligence and national security matters (@FrankFigliuzzi1)
  • Carol Leonnig — Carol Leonnig is a Pulitzer Prize-winning investigative journalist for The Washington Post, known for her coverage of government accountability and national security. She has co-authored several books, including “Zero Fail: The Rise and Fall of the Secret Service” and “I Alone Can Fix It: Donald J. Trump’s Catastrophic Final Year,” providing in-depth reporting on the Trump administration and related political events. (@CarolLeonnig)
  • Asha Rangappa — Asha Rangappa is a lawyer, former FBI agent, and senior lecturer at Yale University’s Jackson Institute for Global Affairs. She frequently appears as a legal and national security analyst on various news networks, offering insights on counterintelligence, constitutional law, and the intersection of national security and civil liberties. (@AshaRangappa_)
  • John Sipher — John Sipher is a former member of the CIA‘s Senior Intelligence Service who worked for the agency’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council, co-founder of Spycraft Entertainment, and a frequent contributor to various media outlets on intelligence and national security matters (@john_sipher)
  • Sam Vinograd — Samantha Vinograd is a national security expert who has served in various roles within the U.S. government, including as Senior Advisor to the National Security Advisor during the Obama administration. She is currently the Assistant Secretary for Counterterrorism and Threat Prevention at the Department of Homeland Security and provides regular commentary on national security issues. (@sam_vinograd)
  • Clint Watts — Clint Watts is a senior fellow at the Center for Cyber and Homeland Security at George Washington University and a Foreign Policy Research Institute fellow. He previously served as an infantry officer in the U.S. Army, an FBI special agent, and has provided expert testimony to Congress on topics including terrorism, Russian interference, and cybersecurity (@selectedwisdom)
  • Marcy Wheeler — Marcy Wheeler is an independent journalist and national security expert who runs the blog “emptywheel.” She is known for her in-depth analysis of legal documents related to national security, surveillance, and political scandals. Wheeler’s work has been instrumental in uncovering details about various high-profile investigations, including the Mueller probe and other national security matters. (@emptywheel)

Law, Legal, and SCOTUS

At the intersection of governance and justice lies the lawβ€”an evolving field that shapes the boundaries of individual rights, state power, and societal norms. Whether it’s landmark Supreme Court rulings or the legal frameworks used to regulate new technologies, understanding the law is essential to navigating the political and social landscape. The following legal scholars and practitioners have made significant contributions to dissecting the most pressing legal issues of our time.

  • George Conway — George Conway is an American lawyer and political activist known for his vocal criticism of former President Donald Trump, despite being the then-husband of Trump advisor Kellyanne Conway (he now helms PsychoPAC, a fundraising arm against a Trump second term). As a partner at the law firm Wachtell, Lipton, Rosen & Katz, he gained prominence for successfully arguing the Supreme Court case Morrison v. National Australia Bank in 2010 and has since become a prominent figure in conservative legal circles, contributing to discussions on the rule of law and constitutional issues. (@gtconway3d)
  • Quinta Jurecic — Quinta Jurecic is a fellow in Governance Studies at the Brookings Institution and a senior editor at Lawfare, as well as a contributing writer at The Atlantic. She co-hosts the “Arbiters of Truth” series on the Lawfare Podcast, focusing on misinformation and online information ecosystems, and her work has appeared in prominent publications such as the New York Times and the Washington Post. (@qjurecic)
  • Teri Kanefield — Teri Kanefield is an attorney, author, and legal analyst known for her clear explanations of complex legal and political issues. She has written numerous books for children and young adults on historical and legal topics, and regularly contributes analysis on current events, particularly related to constitutional law and democracy, through her blog and social media presence. (@Teri_Kanefield)
  • Dahlia Lithwick — Dahlia Lithwick is a Canadian-American lawyer, writer, and journalist who serves as a senior editor at Slate and contributing editor at Newsweek. She is known for her insightful legal commentary, particularly on Supreme Court issues, and hosts the award-winning podcast “Amicus” while also being a regular contributing analyst on MSNBC (@Dahlialithwick)
  • Joyce Vance — Joyce Vance is a Distinguished Professor from the Practice of Law at the University of Alabama School of Law and a legal analyst for NBC and MSNBC. She served as the United States Attorney in the Northern District of Alabama from 2009 to 2017, appointed by President Obama, and has focused her work on criminal justice reform, civil rights, and improving police-community relationships (@JoyceWhiteVance)
  • Maya Wiley — Maya Wiley is a nationally respected civil rights attorney and activist who has dedicated her life to fighting for justice, equality, and fairness. She has served in various roles, including as counsel to the mayor of New York City, chair of the New York City Civilian Complaint Review Board, and as a faculty member at the New School University, while also working as a legal analyst for NBC News and MSNBC (@mayawiley)
scales of justice

Politics

In an age of hyper-polarization, understanding the intricacies of politicsβ€”both domestic and globalβ€”is more crucial than ever. Whether it’s electoral strategies, policy debates, or the workings of political institutions, the experts in this field offer invaluable insights into the forces shaping our world. Below is a list of the most astute political analysts, reporters, and scholars whose work illuminates the evolving political landscape.

  • Yamiche Alcindor — Yamiche Alcindor is a prominent American journalist and political commentator. She currently serves as the Washington correspondent for NBC News and is a political contributor to NBC News and MSNBC. Previously, she was the White House correspondent for PBS NewsHour and has also worked for The New York Times and USA Today. (@Yamiche)
  • Rachel Maddow — Rachel Maddow is a political commentator, author, and television host. She is best known for hosting “The Rachel Maddow Show” on MSNBC, where she provides in-depth analysis of political news. Maddow has written several books, including “Blowout” and “Bag Man,” and is known for her liberal perspective and investigative reporting style. (@maddow)
  • Phil Rucker — Philip Rucker is a Pulitzer Prize-winning journalist who serves as the deputy national editor at The Washington Post. He previously worked as the White House Bureau Chief for the Post during the Trump administration. Rucker has co-authored two books about the Trump presidency with his colleague Carol Leonnig: “A Very Stable Genius” and “I Alone Can Fix It.” (@PhilipRucker)
  • Jared Yates Sexton — Jared Yates Sexton is an author, political commentator, and associate professor of creative writing at Georgia Southern University. He has written several books, including “The People Are Going to Rise Like the Waters Upon Your Shore” and “American Rule,” focusing on American politics, history, and culture. Sexton is known for his analysis of right-wing extremism and political movements. (@JYSexton)
  • A.B. Stoddard — A.B. Stoddard is a political analyst and associate editor and columnist for RealClearPolitics. She regularly appears on various news networks to provide commentary on American politics. Stoddard is known for her non-partisan approach to political analysis and her insights into congressional politics and national elections.
  • Nicolle Wallace — Nicolle Wallace is an American television host, author, and former political commentator. She currently hosts MSNBC’s “Deadline: White House” and serves as a political analyst for the network. Wallace previously worked in Republican politics, serving as White House Communications Director during the George W. Bush administration and as a senior advisor for John McCain’s 2008 presidential campaign. (@NicolleDWallace)

Right-Wing History

The resurgence of far-right movements across the globe has deep historical roots, with ideological threads that stretch back to fascism, white supremacy, and nativism. Understanding these origins is key to unpacking the modern political landscape, as many of today’s right-wing movements draw heavily on historical narratives. The scholars below are dedicated to tracing these threads, helping us see the connections between past and present in the evolution of right-wing ideologies.

  • Seth Cotlar — Seth Cotlar is a Professor of History at Willamette University, specializing in the history of the United States between the American Revolution and the Civil War. His first book, “Tom Paine’s America: The Rise and Fall of Trans-Atlantic Radicalism in the Early Republic,” won the Best First Book Prize from the Society for Historians of the Early American Republic, and he is currently working on a cultural history of nostalgia in modernizing America from 1776 to 1865 (@sethcotlar)
  • John Dean — John Dean is an American former attorney who served as White House Counsel for President Richard Nixon from 1970 to 1973. He became a key figure in the Watergate scandal, eventually testifying against Nixon and other administration officials. Since then, Dean has worked as an investment banker, author, and political commentator, often criticizing Republican administrations. (@JohnWDean)
  • Joanne Freeman — Joanne Freeman is a professor of History and American Studies at Yale University, specializing in early American politics and political culture. She has authored several books on the revolutionary and early national periods, including “Affairs of Honor: National Politics in the New Republic” and “The Field of Blood: Violence in Congress and the Road to Civil War.” (@jbf1755)
  • Nicole Hemmer — Nicole Hemmer is an associate professor of History at Vanderbilt University and director of the Carolyn T. and Robert M. Rogers Center for the American Presidency. She specializes in media, conservatism, and the presidency, and has authored books such as “Partisans: The Conservative Revolutionaries Who Remade American Politics in the 1990s” and “Messengers of the Right: Conservative Media and the Transformation of American Politics.” (@pastpunditry)
  • Heather Cox RichardsonΒ — Heather Cox Richardson is an American historian and professor of history at Boston College, known for her expertise in 19th-century American history, particularly the Civil War, Reconstruction, and the American West. She gained widespread recognition for her nightly newsletter “Letters from an American,” which contextualizes current events within American history, and has authored several books including “To Make Men Free: A History of the Republican Party” and “Democracy Awakening: Notes on the State of America” (@HC_Richardson)
  • Julian Zelizer — Julian Zelizer is a professor of History and Public Affairs at Princeton University and a CNN Political Analyst. He has authored and edited numerous books on American political history, including “Burning Down the House: Newt Gingrich, the Fall of a Speaker, and the Rise of the New Republican Party” and “The Presidency of Donald J. Trump: A First Historical Assessment.” (@julianzelizer)

Russia and Ukraine

The ongoing conflict between Russia and Ukraine is far more than a regional disputeβ€”it’s a flashpoint in global geopolitics, with ramifications for democracy, security, and international law. Understanding the complex history and political motivations driving this conflict requires deep expertise. The experts listed here provide crucial analysis on everything from Russia’s imperial ambitions to Ukraine’s struggle for sovereignty and the international community’s response.

  • Allison Gill — Dr. Allison Gill is a multifaceted talent who transitioned from a federal government executive to a comedian, author, and podcast host. She is best known as the executive producer and host of the popular podcast “Mueller, She Wrote,” which provides in-depth analysis of the Trump-Russia investigation (@muellershewrote)
  • Fiona Hill — Dr. Fiona Hill is an acclaimed foreign affairs specialist, author, and former presidential advisor who served on the US National Security Council from 2017 to 2019. Born in County Durham, England, she is now a senior fellow at the Brookings Institution and is widely recognized as an authority on Russian and European geopolitics.
  • Gary Kasparov — Garry Kasparov is a former World Chess Champion who held the title from 1985 to 2000 and is widely considered one of the greatest chess players of all time. After retiring from professional chess in 2005, he became a prominent political activist and critic of Vladimir Putin, eventually leaving Russia in 2013 and settling in New York City (@Kasparov63)
  • Michael McFaul — Michael McFaul is the Ken Olivier and Angela Nomellini Professor of International Studies at Stanford University and a former U.S. Ambassador to Russia from 2012 to 2014. He has authored several books on democracy and Russian politics, and currently serves as an analyst for NBC News and a contributing columnist to The Washington Post (@McFaul)
  • Molly McKew — Molly McKew is an American journalist and strategic consultant specializing in foreign policy and information warfare. She has worked as an adviser to foreign governments, including Georgia and Moldova, and has written extensively on Russian information operations and geopolitics for publications such as WIRED and Politico. (@MollyMcKew)
Vladimir Putin and the Russian propaganda campaigns unsealed by the DOJ

White Nationalism

White nationalism is not just an extremist ideologyβ€”it’s a persistent and growing threat, gaining new life through online platforms, political rhetoric, and violent movements. From Charlottesville to Christchurch, the ideology has fueled domestic terrorism, hate crimes, and political insurgencies. The researchers below have been instrumental in tracking the rise of white nationalism, unpacking its myths, and revealing its insidious presence in mainstream discourse.

  • Carol Anderson — Carol Anderson is the Charles Howard Candler Professor of African American Studies at Emory University and a historian known for her work on public policy and how it intersects with race, justice, and equality. She is the author of several acclaimed books, including “White Rage: The Unspoken Truth of Our Racial Divide” and “One Person, No Vote: How Voter Suppression Is Destroying Our Democracy.”
  • Kathleen Belew — Kathleen Belew is an associate professor of History at Northwestern University and an expert on the white power movement in the United States. She is the author of “Bring the War Home: The White Power Movement and Paramilitary America” and has testified before Congress on issues related to white nationalism and domestic terrorism. (@kathleen_belew)
  • Talia Lavin — Talia Lavin is an American journalist and author known for her investigative work on far-right extremism and white supremacist movements. She wrote the book “Culture Warlords: My Journey Into the Dark Web of White Supremacy” and has contributed to publications such as The New Yorker, The New York Times, and The Washington Post. (@mobydickenergy)
  • Cynthia Miller-Idriss — Cynthia Miller-Idriss is a professor of education and sociology at American University, where she leads the Polarization and Extremism Research and Innovation Lab (PERIL). She is an expert on far-right extremism and radicalization, having authored several books on the subject, including “Hate in the Homeland: The New Global Far Right.” (@milleridriss)
  • Vegas Tenold — Vegas Tenold is a Norwegian journalist and author who has extensively covered white supremacist and neo-Nazi groups in the United States. His book “Everything You Love Will Burn: Inside the Rebirth of White Nationalism in America” provides an in-depth look at various far-right organizations based on his years of firsthand reporting. (@Vegastenold)
Read more

gamergate illustrated by midjourney

Today, we’re diving into the labyrinthine tale of Gamergateβ€”an episode that unfolded in 2014 but echoes into today’s digital sociology. What was Gamergate? It was a kind of canary in the coalmine — a tale of online intrigue, cultural upheaval, and for some, an awakening to the virulent undercurrents of internet anonymity.

I. Origins and Triggering Events: The Spark That Lit the Fire

In August 2014, an unassuming blog post titled “The Zoe Post” by Eron Gjoni set off a chain reaction that few could have foreseen. Through this post, which detailed his personal grievances against Zoe Quinn, a game developer, the seed of misinformation was sown. The post falsely implicated Quinn in an unethical affair with Nathan Grayson, a gaming journalist, suggesting she had manipulated him for favorable coverage of her game Depression Quest. This unfounded claim was the initial spark that ignited the raging internet inferno of Gamergate.

The allegations quickly spread across forums like 4chan, a breeding ground for anonymity and chaos. Here, the narrative morphed into a menacing campaign that took aim at Quinn and other women in the gaming industry. The escalation was not just rapidβ€”it was coordinated, a harbinger of the kind of internet and meme warfare that has since become all too familiar.

II. Targets of Harassment: The Human Cost of Online Fury

What followed was an onslaught of harassment against women at the heart of the gaming industry. Zoe Quinn wasn’t alone in this; Anita Sarkeesian and Brianna Wu also bore the brunt of this vicious campaign. This wasn’t just trolling or mean tweetsβ€”it was a barrage of rape threats, death threats, and doxing attempts, creating a reality where digital assault became a daily occurrence.

Others got caught in the crossfire, tooβ€”individuals like Jenn Frank and Mattie Brice, who dared to defend the victims or criticize Gamergate, found themselves subject to the same malevolent noise. Even Phil Fish, a game developer, saw his private data leaked in a cruel display of digital vigilantism.

III. Nature of the Harassment: When Digital Attacks Go Beyond the Screen

Gamergate painted a harrowing picture of the scope and scale of online harassment. Orchestrated attacks didn’t stop at vitriolic tweets; they extended to doxing, where victims’ personal information was broadcast publicly, and swatting,” a dangerous “prank” that involves making false police reports to provoke a SWAT team response.

Platforms like Twitter, 4chan, and its notorious sibling 8chan were the stages upon which this drama played out. Here, an army of “sockpuppet” accounts created an overwhelming maelstrom, blurring the lines between dissent and digital terrorism.

Gamergate red-pilled right work to inflict pain, elect Trump

IV. Motivations and Ideology: Misogyny and Political Underpinnings

At its core, Gamergate was more than just a gamers’ revolt; it was a flashpoint in a broader cultural war, defined by misogyny and anti-feminism. This was a resistance against the shifting dynamics within the gaming worldβ€”a refusal to accept the increasing roles women were assuming.

Moreover, Gamergate was entangled with the burgeoning alt-right movement. Figures like Milo Yiannopoulos latched onto the controversy, using platforms like Breitbart News as megaphones for their ideas. Here, Gamergate served as both a symptom and a gateway, introducing many to the alt-right’s narrative of disenchantment and defiance against progressive change.

Gamergate’s Lasting Legacy and the “Great Meme War”

Gamergate wasn’t just a flashpoint in the world of gaming; it was the breeding ground for a new kind of online warfare. The tactics honed during Gamergateβ€”coordinated harassment, the use of memes as cultural weapons, and the manipulation of platforms like Twitter and 4chanβ€”became the playbook for a much larger, more consequential battle: the so-called β€œGreat Meme War” that helped fuel Donald Trump’s 2016 presidential campaign.

The very same troll armies that harassed women in the gaming industry turned their attention toward mainstream politics, using the lessons learned in Gamergate to spread disinformation, amplify division, and create chaos. Memes became more than just jokes; they became political tools wielded with precision, reaching millions and shaping narratives in ways traditional media struggled to keep up with. What began as a seemingly insular controversy in the gaming world would go on to sow the seeds of a far more disruptive force, one that reshaped modern political discourse.

The influence of these tactics is still felt today, as the digital landscape continues to be a battleground where information warfare is waged daily. Gamergate was the first tremor in a cultural earthquake that has redefined how power, politics, and identity are contested in the digital age. As we move forward, understanding its origins and its impact on today’s sociopolitical environment is essential if we hope to navigateβ€”and counterβ€”the dark currents of digital extremism.

In retrospect, Gamergate wasn’t an isolated incident but a prelude, a trial run for the troll armies that would soon storm the gates of political power. Its legacy, while grim, offers critical insights into the fragility and volatility of our online spacesβ€”and the urgent need for vigilance in the face of future campaigns of digital manipulation.

Read more

Vladimir Putin and the Russian propaganda campaigns unsealed by the DOJ

In the digital age, the line between fact and fiction is often blurred, and nowhere is this more dangerous than in the realm of political influence. The power to shape narratives, sway public opinion, and manipulate democratic processes is no longer just the domain of politicians and pundits β€” it’s a high-stakes game involving shadowy operatives, shell companies, and an arsenal of disinformation tools. The latest indictments from the Department of Justice expose the scale of Russian propaganda campaigns to reveal just how deeply this game is rigged against us.

At the heart of this operation is a well-oiled propaganda machine, targeting the fault lines of American society β€” free speech, immigration, and even our national pastime of online gaming. And in the backdrop of these revelations looms the 2024 presidential election, a moment ripe for manipulation by foreign actors with the singular goal of deepening our divisions. While these efforts may feel like the plot of a dystopian thriller, they are all too real, with disinformation campaigns working to tilt the scales of democracy in favor of authoritarianism.

Last week, the Department of Justice released a treasure trove of indictments and accompanying information about the depth and breadth of the still ongoing Russian influence campaigns raging in the US and elsewhere — with a particular focus on sowing discord ahead of the US 2024 elections. Let’s take a look at the major pillars of the DOJ’s work.

RT employees and right-wing influencers indicted

On September 3, 2024, the Department of Justice filed an indictment of two Russian nationals, Kostiantyn Kalashnikov and Elena Afanasyeva, for covertly funding a Tennessee-based content creation company that published videos promoting Russian interests. According to the indictment, they funneled nearly $10 million through shell companies to spread pro-Russian propaganda and disinformation on U.S. social media platforms. The defendants posed as U.S.-based editors, directing content that amplified domestic divisions and supported Russian government narratives. Both are charged with conspiracy to violate the Foreign Agents Registration Act (FARA) and money laundering.

Although not specifically named, there are enough uniquely identifying clues in the document to identify the content company in the scheme as Tenet Media, a company run by married couple Liam Donovan and Lauren Chen — herself a prominent “conservative” commentator associated with Glenn Beck‘s The Blaze and Charlie Kirk’s Turning Point USA. The six commentators who were being paid exorbitantly by the Russians for their content (as much as $100,000 per video) — all of whom, improbably, claim to have been duped — are Tim Pool, Dave Rubin, and Benny Johnson, Tayler Hansen, Matt Christiansen, and Lauren Southern. All are outspoken Trump supporters, and are on record parroting Russian talking points despite claiming the work was wholly their own.

Continue reading Russian propaganda campaigns exposed by the DOJ in a slew of indictments
Read more

The war in Ukraine is less “surprising” to some who’ve seen it raging since 2014. Although it escalated greatly in 2022, the Ukraine war timeline ultimately dates back all the way to the collapse of the Soviet Union in 1991.

To understand the backstory — which is now inextricably intertwined with our own presidential history given the impeachment of Donald Trump over his phone calls with Zelensky to the Republican Party‘s current-day support of the aims of Vladimir Putin — we have to go back to a time when no one was stronger on anti-Russian policy than GOP darling Ronald Reagan.

  • 1991 — Ukraine declares independence and becomes an independent entity after the fall of the Soviet Union
  • 1994 — Ukraine agrees to give up its nuclear arsenal in exchange for a protection agreement with Russia, United States, Britain, and Ireland (Budapest Memorandum)
  • 2004Viktor Yanukovich “wins” election under dubious circumstances and is deposed for a do over election, which he loses to Viktor Yuschenko (Orange Revolution)
  • 2006 — Viktor Yanukovych begins working directly with Paul Manafort, in an effort to boost his image after his electoral loss. Manafort was known for his work helping the “Torturers’ Lobby” of brutal dictators around the world in the 1980s, with Roger Stone (another infamous dirty trickster best known for his role as a fixer for Richard Nixon).
  • 2007 — Yanukovych’s Party of Regions does well in the Ukranian parliamentary elections, gaining a large number of seats credited to Manafort’s strategic advice about Western-style campaigning.
  • 2010 — Yanukovych is elected President of Ukraine, again largely crediting Manafort’s strategies for his comeback.
  • Nov 2013 — Having promised a more European-style government in order to win the presidency in 2010, Yanukovych turned on his word and initiated more pro-Russian policies than the Ukranians had signed up for. Yanukovych is now beset by enormous public protests against the corruption of his regime, and his unilateral decision to abandon an association agreement with the EU in favor of a trade agreement with Russia (Maidan Revolution / Revolution of Dignity)
  • Feb 2014 — After a harrowing 93 days barricaded inside Kyiv’s Maidan Square, activists are victorious; Yanukovich is deposed and flees to Russia
  • Mar 2014 — Russian forces invade and annex the region of Crimea within Ukraine
  • Apr 2014 — Russian forces invade the Donetsk and Luhansk regions in eastern Ukraine, escalating a war that continues to this day and had already killed more than 14,000 people by the time the 2022 large scale invasion began
  • Apr 2014 — Hunter Biden and business partner Devon Archer join the board of Burisma
  • May 2014 — Candy magnate Petro Poroshenko succeeds Yanukovych as president of Ukraine
Continue reading Ukraine War Timeline
Read more

A con artist, also known as a confidence trickster, is someone who deceives others by misrepresenting themselves or lying about their intentions to gain something valuable, often money or personal information. These individuals employ psychological manipulation and emotionally prey on the trust and confidence of their victims.

There are various forms of con artistry, ranging from financial fraud to the spread of disinformation. Each type requires distinct strategies for identification and prevention.

Characteristics of con artists

  1. Charming and Persuasive: Con artists are typically very charismatic. They use their charm to persuade and manipulate others, making their deceit seem believable.
  2. Manipulation of Emotions: They play on emotions to elicit sympathy or create urgency, pushing their targets into making hasty decisions that they might not make under normal circumstances.
  3. Appearing Credible: They often pose as authority figures or experts, sometimes forging documents or creating fake identities to appear legitimate and trustworthy.
  4. Information Gatherers: They are adept at extracting personal information from their victims, either to use directly in fraud or to tailor their schemes more effectively.
  5. Adaptability: Con artists are quick to change tactics if confronted or if their current strategy fails. They are versatile and can shift their stories and methods depending on their target’s responses.

Types of con artists: Disinformation peddlers and financial fraudsters

  1. Disinformation Peddlers: These con artists specialize in the deliberate spread of false or misleading information. They often target vulnerable groups or capitalize on current events to sow confusion and mistrust. Their tactics may include creating fake news websites, using social media to amplify false narratives, or impersonating credible sources to disseminate false information widely.
  2. Financial Fraudsters: These individuals focus on directly or indirectly extracting financial resources from their victims. Common schemes include investment frauds, such as Ponzi schemes and pyramid schemes; advanced-fee scams, where victims are persuaded to pay money upfront for services or benefits that never materialize; and identity theft, where the con artist uses someone else’s personal information for financial gain.

Identifying con artists

  • Too Good to Be True: If an offer or claim sounds too good to be true, it likely is. High returns with no risk, urgent offers, and requests for secrecy are red flags.
  • Request for Personal Information: Be cautious of unsolicited requests for personal or financial information. Legitimate organizations do not typically request sensitive information through insecure channels.
  • Lack of Verification: Check the credibility of the source. Verify the legitimacy of websites, companies, and individuals through independent reviews and official registries.
  • Pressure Tactics: Be wary of any attempt to rush you into a decision. High-pressure tactics are a hallmark of many scams.
  • Unusual Payment Requests: Scammers often ask for payments through unconventional methods, such as wire transfers, gift cards, or cryptocurrencies, which are difficult to trace and recover.

What society can do to stop them

  1. Education and Awareness: Regular public education campaigns can raise awareness about common scams and the importance of skepticism when dealing with unsolicited contacts.
  2. Stronger Regulations: Implementing and enforcing stricter regulations on financial transactions and digital communications can reduce the opportunities for con artists to operate.
  3. Improved Verification Processes: Organizations can adopt more rigorous verification processes to prevent impersonation and reduce the risk of fraud.
  4. Community Vigilance: Encouraging community reporting of suspicious activities and promoting neighborhood watch programs can help catch and deter con artists.
  5. Support for Victims: Providing support and resources for victims of scams can help them recover and reduce the stigma of having been deceived, encouraging more people to come forward and report these crimes.

Con artists are a persistent threat in society, but through a combination of vigilance, education, and regulatory enforcement, we can reduce their impact and protect vulnerable individuals from falling victim to their schemes. Understanding the characteristics and tactics of these fraudsters is the first step in combatting their dark, Machiavellian influence.

Read more

The concept of a “honeypot” in the realms of cybersecurity and information warfare is a fascinating and complex one, straddling the line between deception and defense. At its core, a honeypot is a security mechanism designed to mimic systems, data, or resources to attract and detect unauthorized users or attackers, essentially acting as digital bait. By engaging attackers, honeypots serve multiple purposes: they can distract adversaries from more valuable targets, gather intelligence on attack methods, and help in enhancing security measures.

Origins and Usage

The use of honeypots dates back to the early days of computer networks, evolving significantly with the internet‘s expansion. Initially, they were simple traps set to detect anyone probing a network. However, as cyber threats grew more sophisticated, so did honeypots, transforming into complex systems designed to emulate entire networks, applications, or databases to lure in cybercriminals.

A honeypot illustration with a circuit board beset by a bee, by Midjourney

Honeypots are used by a variety of entities, including corporate IT departments, cybersecurity firms, government agencies, and even individuals passionate about cybersecurity. Their versatility means they can be deployed in almost any context where digital security is a concern, from protecting corporate data to safeguarding national security.

Types and purposes

There are several types of honeypots, ranging from low-interaction honeypots, which simulate only the services and applications attackers might find interesting, to high-interaction honeypots, which are complex and fully-functional systems designed to engage attackers more deeply. The type chosen depends on the specific goals of the deployment, whether it’s to gather intelligence, study attack patterns, or improve defensive strategies.

In the context of information warfare, honeypots serve as a tool for deception and intelligence gathering. They can be used to mislead adversaries about the capabilities or intentions of a state or organization, capture malware samples, and even identify vulnerabilities in the attacker’s strategies. By analyzing the interactions attackers have with these traps, defenders can gain insights into their techniques, tools, and procedures (TTPs), enabling them to better anticipate and mitigate future threats.

Historical effects

Historically, honeypots have had significant impacts on both cybersecurity and information warfare. They’ve led to the discovery of new malware strains, helped dismantle botnets, and provided critical intelligence about state-sponsored cyber operations. For example, honeypots have been instrumental in tracking the activities of sophisticated hacking groups, leading to a deeper understanding of their targets and methods, which, in turn, has informed national security strategies and cybersecurity policies.

One notable example is the GhostNet investigation, which uncovered a significant cyber espionage network targeting diplomatic and governmental institutions worldwide. Honeypots played a key role in identifying the malware and command-and-control servers used in these attacks, highlighting the effectiveness of these tools in uncovering covert operations.

Honeypot hackers and cybercriminals

Ethical and practical considerations

While the benefits of honeypots are clear, their deployment is not without ethical and practical considerations. There’s a fine line between deception for defense and entrapment, raising questions about the legality and morality of certain honeypot operations, especially in international contexts where laws and norms may vary widely.

Moreover, the effectiveness of a honeypot depends on its believability and the skill with which it’s deployed and monitored. Poorly configured honeypots might not only fail to attract attackers but could also become liabilities, offering real vulnerabilities to be exploited.

Cyber attackers and defenders

Honeypots are a critical component of the cybersecurity and information warfare landscapes, providing valuable insights into attacker behaviors and tactics. They reflect the ongoing cat-and-mouse game between cyber attackers and defenders, evolving in response to the increasing sophistication of threats. As digital technologies continue to permeate all aspects of life, the strategic deployment of honeypots will remain a vital tactic in the arsenal of those looking to protect digital assets and information. Their historical impacts demonstrate their value, and ongoing advancements in technology promise even greater potential in understanding and combating cyber threats.

By serving as a mirror to the tactics and techniques of adversaries, honeypots help illuminate the shadowy world of cyber warfare, making them indispensable tools for anyone committed to safeguarding information in an increasingly interconnected world.

Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s TelefΓ³nica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

Cyberbullying involves the use of digital technologies, like social media, texting, and websites, to harass, intimidate, or embarrass individuals. Unlike traditional bullying, its digital nature allows for anonymity and a wider audience. Cyberbullies employ various tactics such as sending threatening messages, spreading rumors online, posting sensitive or derogatory information, or impersonating someone to damage their reputation — on to more sinister and dangerous actions like doxxing.

Geopolitical impact of cyberbullying

In recent years, cyberbullying has transcended personal boundaries and infiltrated the realm of geopolitics. Nation-states or politically motivated groups have started using cyberbullying tactics to intimidate dissidents, manipulate public opinion, or disrupt political processes in other countries. Examples include spreading disinformation, launching smear campaigns against political figures, or using bots to amplify divisive content. This form of cyberbullying can have significant consequences, destabilizing societies and influencing elections.

Recognizing cyberbullying

Identifying cyberbullying involves looking for signs of digital harassment. This can include receiving repeated, unsolicited, and aggressive communications, noticing fake profiles spreading misinformation about an individual, or observing coordinated attacks against a person or group. In geopolitics, recognizing cyberbullying might involve identifying patterns of disinformation, noting unusual social media activity around sensitive political topics, or detecting state-sponsored troll accounts.

Responding to cyberbullying

The response to cyberbullying varies based on the context and severity. For individuals, it involves:

  1. Documentation: Keep records of all bullying messages or posts.
  2. Non-engagement: Avoid responding to the bully, as engagement often escalates the situation.
  3. Reporting: Report the behavior to the platform where it occurred and, if necessary, to law enforcement.
  4. Seeking Support: Reach out to friends, family, or professionals for emotional support.

For geopolitical cyberbullying, responses are more complex and involve:

  1. Public Awareness: Educate the public about the signs of state-sponsored cyberbullying and disinformation.
  2. Policy and Diplomacy: Governments can implement policies to counteract foreign cyberbullying and engage in diplomatic efforts to address these issues internationally.
  3. Cybersecurity Measures: Strengthening cybersecurity infrastructures to prevent and respond to cyberbullying at a state level.

Cyberbullying, in its personal and geopolitical forms, represents a significant challenge in the digital age. Understanding its nature, recognizing its signs, and knowing how to respond are crucial steps in mitigating its impact. For individuals, it means being vigilant online and knowing when to seek help. In the geopolitical arena, it requires a coordinated effort from governments, tech companies, and the public to defend against these insidious forms of digital aggression. By taking these steps, societies can work towards a safer, more respectful digital world.

Read more

Shitposting, a term that has seeped into the mainstream of internet culture, is often characterized by the act of posting deliberately provocative, off-topic, or nonsensical content in online communities and on social media. The somewhat vulgar term encapsulates a spectrum of online behavior ranging from harmless, humorous banter to malicious, divisive content.

Typically, a shit-post is defined by its lack of substantive content, its primary goal being to elicit attention and reactions — whether amusement, confusion, or irritation — from its intended audience. Closely related to trolling, shitposting is one aspect of a broader pantheon of bad faith behavior online.

Shit-poster motivations

The demographic engaging in shit-posting is diverse, cutting across various age groups, social strata, and political affiliations. However, it’s particularly prevalent among younger internet users who are well-versed in meme culture and online vernacular. The motivations for shit-posting can be as varied as its practitioners.

Some engage in it for humor and entertainment, seeing it as a form of digital performance art. Others may use it as a tool for social commentary or satire, while a more nefarious subset might employ it to spread disinformation and misinformation, sow discord, and/or harass individuals or groups.

Online trolls shitposting on the internet, by Midjourney

Context in US politics

In the realm of U.S. politics, shit-posting has assumed a significant role in recent elections, especially on platforms like Twitter / X, Reddit, and Facebook. Politicians, activists, and politically engaged individuals often use this tactic to galvanize supporters, mock opponents, or shape public perception. It’s not uncommon to see political shit-posts that are laden with irony, exaggeration, or out-of-context information, designed to inflame passions or reinforce existing biases — or exploit them.

Recognition and response

Recognizing shit-posting involves a discerning eye. Key indicators include the use of hyperbole, irony, non-sequiturs, and content that seems outlandishly out of place or context. The tone is often mocking or sarcastic. Visual cues, such as memes or exaggerated images, are common.

Responding to shit-posting is a nuanced affair. Engaging with it can sometimes amplify the message, which might be the poster’s intention. A measured approach is to assess the intent behind the post. If it’s harmless humor, it might warrant a light-hearted response or none at all.

For posts that are disinformation or border on misinformation or toxicity, countering with factual information, reporting the content, or choosing not to engage are viable strategies. The key is not to feed into the cycle of provocation and reaction that shit-posting often seeks to perpetuate.

Shitposting troll farms lurk in the shadows, beaming disinformation across the land -- by Midjourney

Fighting back

Shit-posting, in its many forms, is a complex phenomenon in the digital age. It straddles the line between being a form of modern-day satire and a tool for misinformation, propaganda, and/or cyberbullying. As digital communication continues to evolve, understanding the nuances of shit-posting – its forms, motivations, and impacts – becomes crucial, particularly in politically charged environments. Navigating this landscape requires a balanced approach, blending awareness, discernment, and thoughtful engagement.

This overview provides a basic understanding of shit-posting, but the landscape is ever-changing, with new forms and norms continually emerging. The ongoing evolution of online communication norms, including phenomena like shit-posting, is particularly fascinating and significant in the broader context of digital culture and political discourse.

Read more

republican vs. democrat cage match boxing ring

Buckle up, we’re in for a wild ride. Many of the serious scholars of political history and authoritarian regimes are sounding the alarm bells that, although it is a very very good thing that we got the Trump crime family out of the Oval Office, it is still a very very bad thing for America to have so rapidly tilted towards authoritarianism. How did we get here?! How has hyper partisanship escalated to the point of an attempted coup by 126 sitting Republican House Representatives? How has political polarization gotten this bad?

These are some of the resources that have helped me continue grappling with that question, and with the rapidly shifting landscape of information warfare. How can we understand this era of polarization, this age of tribalism? This outline is a work in progress, and I’m planning to keep adding to this list as the tape keeps rolling.

Right-Wing Authoritarianism

Authoritarianism is both a personality type and a form of government — it operates at both the interpersonal and the societal level. The words authoritarian and fascist are often used interchangeably, but fascism is a more specific type of authoritarianism, and far more historically recent.

America has had flavors of authoritarianism since its founding, and when fascism came along the right-wing authoritarians ate it up — and deeply wanted the United States to be a part of it. Only after they became social pariahs did they change position to support American involvement in World War II — and some persisted even after the attack of Pearl Harbor.

With Project 2025, Trump now openly threatens fascism on America — and sadly, some are eager for it. The psychology behind both authoritarian leaders and followers is fascinating, overlooked, and misunderstood.

Scholars of authoritarianism

  • Hannah Arendt — The Origins of Totalitarianism
  • Bob Altemeyer — The Authoritarians
  • Derrida — the logic of the unconscious; performativity in the act of lying
  • ketman — Ketman is the psychological concept of concealing one’s true aims, akin to doublethink in Orwell’s 1984, that served as a central theme to Polish dissident CzesΕ‚aw MiΕ‚osz‘s book The Captive Mind about intellectual life under totalitarianism during the Communist post-WWII occupation.
  • Erich Fromm — coined the term “malignant narcissism” to describe the psychological character of the Nazis. He also wrote extensively about the mindset of the authoritarian follower in his seminal work, Escape from Freedom.
  • Eric Hoffer — his book The True Believers explores the mind of the authoritarian follower, and the appeal of losing oneself in a totalist movement
  • Fascism — elevation of the id as the source of truth; enthusiasm for political violence
  • Tyrants and dictators
  • John Dean — 3 types of authoritarian personality:
    • social dominators
    • authoritarian followers
    • double highs — social dominators who can “switch” to become followers in certain circumstances
  • Loyalty; hero worship
    • Freud = deeply distrustful of hero worship and worried that it indulged people’s needs for vertical authority. He found the archetype of the authoritarian primal father very troubling.
  • Ayn Rand
    • The Fountainhead (1943)
    • Atlas Shrugged (1957)
    • Objectivism ideology
  • Greatness Thinking; heroic individualism
  • Nietszche — will to power; the Uberman
  • Richard Hofstadter — The Paranoid Style
  • George Lakoff — moral framing; strict father morality
  • Neil Postman — Entertaining Ourselves to Death
  • Anti-Intellectualism
  • Can be disguised as hyper-rationalism (Communism)
  • More authoritarianism books
Continue reading Hyper Partisanship: How to understand American political polarization
Read more

phobia indoctrination, illustrated

Phobia indoctrination is one of the principle ways a charismatic leader will lull potential followers into his thrall, by putting them into a state of perpetual fear and anxiety. They know, either instinctively or through training (or both), that people can be induced into a prolonged state of confusion easily, and that many people in states of confusion act quite irrationally. Abusers, cult leaders, and other controllers use demagoguery and other tricks to hide in plain sight and continue to accrue power while passing themselves off as harmless or extremely patriotic.

These chaos agents use emotional manipulation and other tactics of emotional predators as a tool of control. They whip followers up into a fear frenzy frequently enough to instill a set of phobia-like instinctual reactions to chosen stimuli. In addition to stoking fears of the enemies at the gates, they also inculcate irrational fears of the consequences of questioning their authority — invoking authoritarianism. Any doubts expressed about the leadership or its doctrine are subject to terrifying negative results. Cults use this formula to wield undue influence over followers, and prevent them from questioning or leaving the group.

Phobia indoctrination is a tool of cults

As part of a larger overall program of brainwashing or mind control, cults and destructive organizations use imaginary extremes (going to hell, being possessed by demons, failing miserably at life, race war, Leftist apocalypse, etc.) to shock followers into refusing to examine any evidence whatsoever. A form of unethical hypnosis, phobia indoctrination can now be carried out on a mass scale thanks to the internet and our massive media apparatus. Be sure to be on the lookout for any cult warning signs in groups and messaging all around you.

Sociopaths and other types of emotional predators are taking ample advantage of their advantage in time and distance over the slow pace of justice. The wielding of fear as a cudgel in American politics has reached a fever pitch, with anti-Critical Race Theory hysteria, anti-vaxxers, anti-government types, anti-science, Lost Cause-revival zombie MAGA footsoldiers screeching about the “freedom!!!” they wish the government to provide them for persecuting their enemies, and other social horrors are merely the tip of the climate changing iceberg.

phobia indoctrination, illustrated

Phobia indoctrination tactics

Strategies of phobia indoctrination include Repetition and Conditioning, where fears are built through constant exposure; Misinformation and Propaganda, using false information to paint something as dangerous; Utilizing Existing Fears, exaggerating known fears or anxieties; and Social Pressure and Group Dynamics, leveraging social influences to convince others that irrational fears are common.

Other tactics include Authority and Expert Manipulation, where false credentials are used to lend legitimacy; Emotional Manipulation, appealing directly to emotions; Isolation and Control, where a person’s environment is manipulated; and Media Manipulation, using media to provoke fear.

Phobia indoctrination and cults book list:

Or, support local bookstores instead of Jeff Bezos:

Related to phobia indoctrination:

Cult Dictionary β†—

We had better get familiar with the lexicon and vocabulary of the coming era, so we can fight the creeping scourge of thought control roiling the land.

Jim Jones toasting his cult members with a cup of cyanide, by Midjourney

Disinformation Dictionary β†—

Disinformation is meant to confuse, throw off, distract, polarize, and otherwise create conflict within and between target populations.

Disinformation, by Midjourney

Cult Warning Signs: How to recognize cultish groups β†—

Recognizing cult warning signs can be vital in identifying and understanding the risk before getting involved with a group who may not have your best interests in mind.

cult warning signs, by Midjourney
Read more

Some of us have been boning up on this topic for about 6 years already, while others are just tuning in now based on the horrors of recent events. It can be overwhelming to come in cold, so here — don’t go it alone! Take this:

Putin’s war against the west

President Biden “declassified” an intelligence analysis many of us had arrived at some time ago: Russian president Vladimir Putin is a cruel revanchist leader who will stop at nothing to claw out a larger legacy before he dies. His goal is nothing less than reconstituting the former Soviet Union and restoring the “glory” of the Russian empire of yesteryear. And for some reason he thinks the world community is going to let him get away with his delusional fever dreams of conquest — as if fever dreams of Mongol domination are still de rigueur.

The attacks on the 2016 election and on the American Capitol in 2021 are related — both are Russian hybrid warfare operations. Russia also is the cold beating heart of the right-wing authoritarianism movement around the world, via financial, political, psychological, economic, and other means of government and regulatory capture.

Putin has hated democracy for a long time — since before the Berlin Wall fell where he was stationed in East Berlin as a young KGB agent, taking the news hard. Now, he has many fifth column confederates aiding and abetting him from within the United States — a number of them brazenly, and openly. It is getting harder and harder for those treasonous types to “hide out” in the folds of disinformation, misinformation, and plausible deniability. The play is being called — and everyone will need to decide if they’re for democracy or authoritarianism.

Further reading:

Media Resources

Twitter Lists

Read more

Another big legislative win crossed the line for Biden’s agenda late this Friday night: the $1.2T bipartisan infrastructure bill passed the House with 6 Democrats dissenting and a whopping 13 Republicans joining to finally bring Infrastructure Week to the American people. Still to come is the other partner to the twin bills circulating in Congress, the Build Back Better reconciliation bill that would add another $2T to the most Keynesian U.S. budget in decades.

Nevertheless, the bill is largely paid for via various means including adding significantly to economic growth and GDP over the next 10 years. The Biden infrastructure bill will not raise taxes on any families making less than $400,000, a campaign promise the president consistently made and has now delivered upon.

The bipartisan infrastructure bill is the second significant piece of legislation passed under Biden’s tenure in the White House, following the $1.9T American Rescue Plan back in March to successfully tame the covid-19 pandemic.

Infrastructure Bill 2021: Breakdown

What’s in the bill? A slate of sorely needed national funds to modernize our transportation, energy, and broadband systems, including provisions for increasing renewables and lowering emissions on a large scale to combat climate change. Here’s a list of what’s included in the largest single infrastructure investment in American history:

  • $110B for roads, bridges, & other infrastructure
  • $11B for transportation safety
  • $39B to modernize public transit, including replacing 1000s of vehicles with zero-emission models
  • $66B to modernize passenger and freight rail
  • $12B for high-speed rail
  • largest federal investment in public transit in history
  • $65B in broadband
  • $42B in airports and ports, including emissions reduction and low-carbon technologies
  • $7.5B for 0- and low-emissions buses (including school buses) and ferries
  • $7.5B for national network of EV chargers
  • $65B to rebuild the electric grid
  • $55B to upgrade water infrastructure
  • $50B to critical infrastructure cybersecurity
  • $21B to clean up toxic waste
Read more

Surveillance Capitalism Dictionary

They were inspired by hippies, but Orwell would fear them. The giants of Silicon Valley started out trying to outsmart The Man, and in the process became him. And so, surveillance capitalism got born. Such is the story of corruption since time immemorial.

This surveillance capitalism dictionary of surveillance is a work in progress! Check back for further updates!

TermDefinition
algorithmA set of instructions that programmers give to computers to run software and make decisions.
artificial intelligence (AI)
Bayes' Theorem
bioinformaticsA technical and computational subfield of genetics, concerned with the information and data encoded by our genes and genetic codes.
child machineAlan Turing's concept for developing an "adult brain" by creating a child brain and giving it an education
CHINOOKcheckers program that becomes the first time an AI wins an official world championship in a game of skill, in 1994
click-wrap
collateral behavioral data
common carrierA sort of hybrid public interest served by corporate promise of meeting a high bar of neutrality -- a historical precedent setby the early Bell system monopoly, and an issue of public-private strife today with the advent of the internet.
contracts of adhesion
cookiesSmall packets of data deposited by the vast majority of websites you visit, that store information in the browser as a way to extract intelligence about their users and visitors.
corpusIn Natural Language Processing, a compendium of words used to "train" the AI to understand patterns in new texts.
decision trees
Deep BlueChess program that beats world chess champion Garry Kasparov in 1997
deep learning
evolutionary algorithms
Facebook
facial recognition
Flash Crash of 2010sudden drop of over $1 trillion in the E-Mini S&P 500 futures contract market via runaway feedback loop within a set of algorithmic traders
FLOPSfloating-point operations per second
Free BasicsFacebook's plan, via Internet.org, to provide limited free internet services in rural India (and elsewhere in the developing world).Controversy centers on the β€œlimited” nature of the offering, which gives Facebook the power to select or reject individual websites and resources for inclusion.
genetic algorithms
GOFAI"Good Old-Fashioned Artificial Intelligence"
HLMIhuman-level machine intelligence: defined as being able to carry out most human professions at least as well as a typical human
interoperability
Kolmogorov complexity
language translation
linear regression
machine learning
Markov chains
monopoly
NAFTA
natural language processing (NLP)A technology for processing and analyzing words
neofeudalism
net neutralityLegal and regulatory concept maintaining that Internet Service Providers must act as common carriers, allowing businesses and citizens to interoperate with the physical infrastructure of the communications network equally, without being subject to biased or exclusionary activities on the part of the network.
neural networks
netizens
"Online Eraser" law (CA)
patrimonial capitalism
Pegasus
phonemes
predatory lending
predictive analytics
privacy
private eminent domain
probability
prosody
qualia
r > gPiketty's insight
randomness
random walk
recommender systems
recursion
recursive learning
right to be forgottenWhen it became EU law in 2014, this groundbreaking legislation gave citizens the power to demand search engines remove pointers to content about them. It was the growing of a data rights movement in Europe that led later to GDPR.
SciKit
simulation
smart speakers
speech recognition
spyware
statistical modeling
strong vs. weak AI"weak AI" refers to algorithms designed to master a specific narrow domain of knowledge or problem-solving, vs. achieving a more general intelligence (strong AI)
supermajority
supervised learning
surplus data
TensorFlow
Tianhe-2The world's fastest supercomputer, developed in China, until it was surpassed in June 2016 by the also Chinese Sunway TaihuLight
Terms of Service
Twitter
unsupervised learning
WatsonIBM AI that defeats the two all-time greatest human Jeopardy! champions in 2010
WhatsApp
WTO
Zuccotti Park
Read more