A Comprehensive Timeline of Russian Electoral Interference: From Imperial Russia to the Digital Age
Russian election interference around the globe has a much longer history than most people realize, extending back centuries rather than decades. This interference has evolved alongside Russia‘s own political transformations, from imperial ambitions to Soviet ideology to modern geopolitical objectives under Vladimir Putin. Recent actions, particularly during the 2016 U.S. presidential election, represent not an anomaly but the continuation and evolution of long-established patterns of behavior designed to shape foreign politics to Russian advantage.
The Imperial Russian Roots of Electoral Interference
Russia’s involvement in foreign electoral politics dates back to the early 18th century. Following a period when Poland had been the dominant power that once occupied Moscow, the tables turned as Russia grew in strength. Under Peter the Great and his successors, Russia began systematically meddling in Poland’s electoral politics by bribing Polish nobles to vote against attempts to strengthen the Polish central government and national army. This early form of interference was aimed at keeping a neighboring power weak and malleable to Russian interests.
This pattern culminated at the end of the 18th century when Russia, alongside Austria and Prussia, partitioned the Polish state among themselves, effectively erasing Poland from the map. Poland would remain part of the Russian Empire until World War I when it finally regained independence. This early example established a precedent that would continue in various forms through subsequent Russian regimes.
The Birth of Soviet Electoral Interference
After the 1917 Bolshevik Revolution, the Soviet approach to electoral interference took on an ideological dimension. In 1919, Vladimir Lenin founded the Communist International (Comintern), an organization designed to unite communist parties worldwide and foment revolution abroad. The Comintern distributed funding and supported propaganda operations in various countries to help communist parties compete more effectively in elections, with the ultimate goal of having these parties assume power and eventually abolish national borders.
While Lenin’s vision of global communist revolution was not realized, the Comintern’s activities generated significant paranoia in Western democracies like the United States and United Kingdom, where fears of Soviet manipulation of democratic processes took root. This marked the beginning of a more systematic approach to electoral interference that would be refined during the Soviet era.
Post-World War II: Aggressive Soviet Electoral Manipulation
After World War II, the Soviet Union under Joseph Stalin aggressively interfered in elections across Eastern Europe, particularly in countries like East Germany, Hungary, and Poland. These operations foreshadowed many tactics that would later be employed by Putin’s Russia. The Soviet Union manipulated voter rolls, falsified vote counts, and distributed massive amounts of propaganda through posters, pamphlets, and leaflets to influence public opinion.
These elections were effectively rigged, resulting in communist parties coming to power across Eastern Europe and subsequently ending competitive elections in these nations. This period represents one of the most successful campaigns of electoral interference in modern history, as it resulted in the establishment of Soviet-aligned governments throughout the Eastern Bloc.
Douglas Rushkoff’s “Survival of the Richest: Escape Fantasies of the Tech Billionaires” delves into the unsettling strategies of the ultra-wealthy broligarchs as they prepare for global catastrophes of their own making. Drawing from personal encounters with tech magnates, Rushkoff unveils a mindset fixated on personal survival over collective well-being running rampant in Silicon Valley.
The Mindset
At the heart of Rushkoff’s critique is “The Mindset,” a belief system among tech billionaires from Peter Thiel to Elon Musk and beyond characterized by:
Extreme Wealth and Privilege: Leveraging vast resources to insulate themselves from societal collapse.
Escape Over Prevention: Prioritizing personal exit strategies rather than addressing systemic issues.
Technological Transcendence: Aiming to surpass human limitations through advanced technologies.
This worldview drives investments in elaborate escape plans, sidelining efforts to resolve the crises they anticipate. It is almost as if they are in a low-key doomsday cult, albeit one that lacks a singular leader and isn’t holed up in a compound (…yet).
The Event
The term “The Event” encapsulates potential disasters such as environmental collapse — particularly from climate change, social unrest, pandemics, and cyberattacks. They believe we should expect more bitter divisiveness, more covid-19s, and more hostile hacking in our future. The elite perceive these scenarios as unavoidable, focusing on personal survival rather than prevention.
Escape Strategies
Rushkoff examines the lengths to which the ultra-rich go to secure their futures, including:
Luxury Bunkers: Constructing fortified shelters to withstand various apocalyptic events.
These measures reflect a desire to detach from societal responsibilities and the broader human community.
The Insulation Equation
Rushkoff introduces the “insulation equation,” illustrating how billionaires calculate the wealth required to shield themselves from the fallout of their own actions. This cycle perpetuates reckless behavior and further wealth accumulation, exacerbating the very problems they seek to escape.
Critique of Capitalism and Technology
The book critiques the symbiotic relationship between capitalism and technology, highlighting:
Exponential Growth Pursuit: An obsession with endless expansion at any cost.
Shareholder Primacy: Prioritizing investor returns over societal or environmental considerations.
Erosion of Empathy: A growing disconnect between the wealthy and the rest of society.
Resource Exploitation: Reducing nature and human complexity to mere commodities.
Rushkoff argues that this dynamic fosters a dystopian future dominated by private technologies and monopolistic control — a very authoritarian direction.
Historical Context
Positioning today’s tech elites within a historical framework, Rushkoff contends they are not pioneers but continuations of past power structures that enriched themselves at others’ expense. Their perceived uniqueness is, in reality, a repetition of historical patterns, including colonialism.
Proposed Solutions
While primarily a critique, Rushkoff offers some ideas for pathways to counteract “The Mindset”:
Rejecting Doom’s Inevitability: Embracing proactive solutions over fatalistic resignation.
Supporting Local Economies: Fostering community resilience through localized commerce.
Advocating Anti-Monopoly Laws: Challenging corporate dominance to promote fair competition.
Redefining Identity: Moving beyond algorithmic categorizations to embrace human complexity.
Some critics argue these suggestions may not fully address the scale of the issues presented — but it’s much easier to be a critic than to come up with these solutions. We may not know all the answers yet as to how to curb these alarming trends, but I think Rushkoff’s point is well taken that we ought to involve ourselves in at least starting to work out the solutions with some urgency.
Ultimately, “Survival of the Richest” serves as a stark examination of the escapist fantasies of the tech elite, and an eye-opening look behind the curtains of the Great Oz’s who dot our landscape today. These wealthy tech elites have promised the moon (or Mars) without knowing whether they could really deliver — and all the while planning a Plan B in case their hare-brained schemes went belly-up. They are okay with sacrificing the vast majority of the people on the planet, as long as their underground bunkers (or better yet, private islands) are there for them.
By exposing their self-serving strategies, Rushkoff urges a shift from individualistic survivalism to collective action in tackling the many global challenges that face us today. We would be wise to heed the call and gather our tribes early and often.
Today, weβre diving into the labyrinthine tale of Gamergateβan episode that unfolded in 2014 but echoes into todayβs digital sociology. What was Gamergate? It was a kind of canary in the coalmine — a tale of online intrigue, cultural upheaval, and for some, an awakening to the virulent undercurrents of internet anonymity.
I. Origins and Triggering Events: The Spark That Lit the Fire
In August 2014, an unassuming blog post titled “The Zoe Post” by Eron Gjoni set off a chain reaction that few could have foreseen. Through this post, which detailed his personal grievances against Zoe Quinn, a game developer, the seed of misinformation was sown. The post falsely implicated Quinn in an unethical affair with Nathan Grayson, a gaming journalist, suggesting she had manipulated him for favorable coverage of her game Depression Quest. This unfounded claim was the initial spark that ignited the raging internet inferno of Gamergate.
The allegations quickly spread across forums like 4chan, a breeding ground for anonymity and chaos. Here, the narrative morphed into a menacing campaign that took aim at Quinn and other women in the gaming industry. The escalation was not just rapidβit was coordinated, a harbinger of the kind of internet and meme warfare that has since become all too familiar.
II. Targets of Harassment: The Human Cost of Online Fury
What followed was an onslaught of harassment against women at the heart of the gaming industry. Zoe Quinn wasn’t alone in this; Anita Sarkeesian and Brianna Wu also bore the brunt of this vicious campaign. This wasnβt just trolling or mean tweetsβit was a barrage of rape threats, death threats, and doxing attempts, creating a reality where digital assault became a daily occurrence.
Others got caught in the crossfire, tooβindividuals like Jenn Frank and Mattie Brice, who dared to defend the victims or criticize Gamergate, found themselves subject to the same malevolent noise. Even Phil Fish, a game developer, saw his private data leaked in a cruel display of digital vigilantism.
III. Nature of the Harassment: When Digital Attacks Go Beyond the Screen
Gamergate painted a harrowing picture of the scope and scale of online harassment. Orchestrated attacks didnβt stop at vitriolic tweets; they extended to doxing, where victimsβ personal information was broadcast publicly, and “swatting,” a dangerous “prank” that involves making false police reports to provoke a SWAT team response.
Platforms like Twitter, 4chan, and its notorious sibling 8chan were the stages upon which this drama played out. Here, an army of “sockpuppet” accounts created an overwhelming maelstrom, blurring the lines between dissent and digital terrorism.
IV. Motivations and Ideology: Misogyny and Political Underpinnings
At its core, Gamergate was more than just a gamersβ revolt; it was a flashpoint in a broader cultural war, defined by misogyny and anti-feminism. This was a resistance against the shifting dynamics within the gaming worldβa refusal to accept the increasing roles women were assuming.
Moreover, Gamergate was entangled with the burgeoning alt-right movement. Figures like Milo Yiannopoulos latched onto the controversy, using platforms like Breitbart News as megaphones for their ideas. Here, Gamergate served as both a symptom and a gateway, introducing many to the alt-right’s narrative of disenchantment and defiance against progressive change.
Gamergate’s Lasting Legacy and the “Great Meme War”
Gamergate wasnβt just a flashpoint in the world of gaming; it was the breeding ground for a new kind of online warfare. The tactics honed during Gamergateβcoordinated harassment, the use of memes as cultural weapons, and the manipulation of platforms like Twitter and 4chanβbecame the playbook for a much larger, more consequential battle: the so-called βGreat Meme Warβ that helped fuel Donald Trumpβs 2016 presidential campaign.
The very same troll armies that harassed women in the gaming industry turned their attention toward mainstream politics, using the lessons learned in Gamergate to spread disinformation, amplify division, and create chaos. Memes became more than just jokes; they became political tools wielded with precision, reaching millions and shaping narratives in ways traditional media struggled to keep up with. What began as a seemingly insular controversy in the gaming world would go on to sow the seeds of a far more disruptive force, one that reshaped modern political discourse.
The influence of these tactics is still felt today, as the digital landscape continues to be a battleground where information warfare is waged daily. Gamergate was the first tremor in a cultural earthquake that has redefined how power, politics, and identity are contested in the digital age. As we move forward, understanding its origins and its impact on todayβs sociopolitical environment is essential if we hope to navigateβand counterβthe dark currents of digital extremism.
In retrospect, Gamergate wasnβt an isolated incident but a prelude, a trial run for the troll armies that would soon storm the gates of political power. Its legacy, while grim, offers critical insights into the fragility and volatility of our online spacesβand the urgent need for vigilance in the face of future campaigns of digital manipulation.
Disinformation is more than just false informationβitβs a calculated effort to deceive. Unlike misinformation, which spreads by accident or ignorance, disinformation is crafted with precision to manipulate public opinion and sow confusion. Its architects in the right-wing media ecosystem and elsewhere often exploit existing dividesβpolitical, social, or culturalβusing these cracks in the foundation of society to achieve their aims. Whether the goal is political dominance, economic advantage, or simply the unraveling of trust, disinformation thrives in the chaos it creates. And in todayβs digital landscape, it spreads like wildfire, fanning the flames of discord faster than ever before.
But disinformation isnβt just about fake news or conspiracy theories. Itβs a full-blown strategy, weaponized by those who understand how to pull the levers of media, technology, and emotion to get what they want. It doesnβt need to be entirely false to do damageβsometimes a well-placed half-truth or a twisted fact is all it takes. The aim is to make us question whatβs real and undermine our ability to discern truth from fiction. And this is where vigilance and education come in, arming us with the tools to resist these tactics. In the following disinformation dictionary, in addition to the disinformation definition Iβll break down some of the key terms and tactics used to muddy the waters of truth.
Disinformation Dictionary of Psychological Warfare
The cat is well and truly out of the bag in terms of understanding how easily wide swaths of people can be misled into believing total falsehoods and even insane conspiracy theories that have no basis whatsoever in reality. In their passion for this self-righteous series of untruths, they can lose families, jobs, loved ones, respect, and may even be radicalized to commit violence on behalf of an authority figure. It starts with the dissemination of disinformation — a practice with a unique Orwellian lexicon all its own, collated in the below disinformation dictionary.
Disinformation is meant to confuse, throw off, distract, polarize, and otherwise create conflict within and between target populations. The spreading of falsehoods is a very old strategy — perhaps as old as humankind itself — but its mass dissemination through the media was pioneered in the 20th century by the Bolsheviks in the Soviet Union, the Nazis in Germany, Mussolini‘s Fascists in Italy, and other authoritarian regimes of the early 1900s through the 1940s.
After World War II and the Allies’ defeat of Hitler, the role of disinformation lived on during the Cold War. The Soviet KGB were infamous for their spycraft and covert infiltration of information flows, while the United States experienced waves of anti-Communist paranoia and hysteria fueled by the spread of conspiracist thinking. Psychologists, social scientists, and others did their best to unpack the horrors revealed by the reign of the Nazi regime with a wellspring of research and critical thought about authoritarian personalities and totalitarianism that continues to this day.
The John Birch Society rides again
In some ways, we haven’t really moved on yet from the Cold War — in fact, some appear not to have moved on since the New Deal and are hellbent on rolling its provisions back, almost 100 years later. The dregs of the John Birch Society — an organization famously too koo-koo even for William F. Buckley, who excommunicated them from the conservative wing of the Republican Party — live on today in a reconstituted form known as the CNP, or Council for National Policy.
Founded officially in 1981 after almost a decade down in the political trenches radicalizing the right, the CNP is the shadowy organization pulling the strings of many of the set pieces in puppets in today’s political play. In alliance with other powerful networks including the Koch empire, the NRA, and the Evangelical church, the CNP is the group behind the recent hysteria out of nowhere about Critical Race Theory in public schools (where it is not taught).
They are funneling the money of America’s billionaires into absurdist theatrical displays of performance artists who distract America with bread and circuses while the plutocrats make off with the cash in the form of tax cuts, tax breaks, tax carve outs, tax loopholes, tax policy, and other wealth-building sweetheart deals for themselves and their cronies.
The CNP, in partnership with Charles Koch’s massive database of all American voters (and of course, his money), have managed to brainwash the Evangelical flock and various assorted MAGA groups into believing a raft of nonsense from climate change denial to anti-masking to the Big Lie about the 2020 election and much more.
They have leveraged new political technology in order to recruit and radicalize new cult members quickly and at now digital scale — via QAnon, Fox News, the even more extreme aggressively partisan coverage of Newsmax and OANN, and a fleet of “grassroots” astroturf operations peddling their brand of seditious aspirational theocracy to ruralites like it was going out of style… on accounta it is.
US 2024 elections disinformation
As the U.S. now sees the 2024 elections in the rearview mirror, it’s ever more clear the impact of disinformation campaigns on American politics. These orchestrated fakeries are becoming more sophisticated and widespread, targeting voters across social media, messaging apps, and even AI-generated content. These efforts aim to confuse voters, suppress turnout, smear candidates, and undermine trust in the electoral system. In todayβs highly polarized environment, disinformation is not just a tool of foreign interference but also a domestic weapon used to influence election outcomes. Understanding these tactics and how they operate is critical for protecting democracy and ensuring a fair election process.
Here is a guide to the main types of election interference disinformation campaigns in progress, so you can be forewarned and forearmed as much as possible:
Voter Suppression and Confusion False information is often spread about when, where, or how to vote, confusing voters about eligibility or tricking them with fake polling place closures (see: right-wing operative Jacob Wahl convicted for telecommunications fraud for a voter suppression campaign in MI, NY, PA, IL, and OH in 2020).
Candidate Smear Campaigns Bad actors fabricate scandals, use manipulated images or videos (“deepfakes”), and spread false claims about candidates to damage their reputations.
Foreign Interference Nations like Russia, China, and Iran are expected to use fake social media accounts, amplify domestic conspiracy theories, and send targeted messages to influence U.S. elections.
Undermining Election Integrity Disinformation campaigns spread false claims of widespread voter fraud, misrepresent election security, and attempt to delegitimize results with premature victory declarations or “rigged” election claims.
Platforms and Methods
Social Media and Messaging Apps Disinformation spreads rapidly on platforms like Facebook, Twitter (X), TikTok, WhatsApp, and Telegram, where users share and amplify false narratives.
Fake News Websites Some websites pose as legitimate news sources but are created to deceive readers with false stories that push specific agendas.
AI-Generated Content The rise of AI allows for the creation of highly realistic but fake images, videos, and texts, making it harder to distinguish truth from falsehood.
Targeted Communities
Communities of Color Minority communities are often the focus of disinformation, with tactics designed to exploit shared traumas, concerns, and cultural connections. Misinformation is tailored to specific demographics, often in multiple languages.
Emerging Trends in Disinformation
AI-Generated Content AI tools are making it easier to create convincing but fake media, posing new challenges for detecting and countering disinformation.
Prebunking Efforts Governments and organizations are becoming more proactive, working to debunk false narratives before they spread.
Cross-Platform Coordination Disinformation is coordinated across different platforms, making it harder to detect and stop, as the false narratives hop from one space to another.
Countermeasures
Government Agencies Federal entities are focused on monitoring foreign interference to safeguard elections.
Social Media Content Moderation Platforms are increasingly using algorithms and human moderators to identify and remove disinformation.
Fact-Checking and Public Education Non-profits and independent groups work to fact-check false claims and educate voters on how to critically assess the information they encounter.
Media Literacy Initiatives Public awareness campaigns aim to teach people how to recognize and resist disinformation, helping voters make informed decisions.
Disinformation Definitions Dictionary
This disinformation definition dictionary covers (and uncovers) the terminology and techniques used by disinfo peddlers, hucksters, Zucksters, propagandists, foreign actors, FARA actors, and professional liars of all sorts — including confirmation bias, the bandwagon effect, and other psychological soft points they target, attack, and exploit. From trolling to active measures to “alternative facts,” we dig into the terminology that makes disinformation tick.
This resource will be added to over time as neologisms are coined to keep up with the shifting landscape of fakes, deep fakes, AI disinformation, and alternative timelines in our near and potentially far future.
In the digital age, the line between fact and fiction is often blurred, and nowhere is this more dangerous than in the realm of political influence. The power to shape narratives, sway public opinion, and manipulate democratic processes is no longer just the domain of politicians and pundits β it’s a high-stakes game involving shadowy operatives, shell companies, and an arsenal of disinformation tools. The latest indictments from the Department of Justice expose the scale of Russian propaganda campaigns to reveal just how deeply this game is rigged against us.
At the heart of this operation is a well-oiled propaganda machine, targeting the fault lines of American society β free speech, immigration, and even our national pastime of online gaming. And in the backdrop of these revelations looms the 2024 presidential election, a moment ripe for manipulation by foreign actors with the singular goal of deepening our divisions. While these efforts may feel like the plot of a dystopian thriller, they are all too real, with disinformation campaigns working to tilt the scales of democracy in favor of authoritarianism.
Last week, the Department of Justice released a treasure trove of indictments and accompanying information about the depth and breadth of the still ongoing Russian influence campaigns raging in the US and elsewhere — with a particular focus on sowing discord ahead of the US 2024 elections. Let’s take a look at the major pillars of the DOJ’s work.
RT employees and right-wing influencers indicted
On September 3, 2024, the Department of Justice filed an indictment of two Russian nationals, Kostiantyn Kalashnikov and Elena Afanasyeva, for covertly funding a Tennessee-based content creation company that published videos promoting Russian interests. According to the indictment, they funneled nearly $10 million through shell companies to spread pro-Russian propaganda and disinformation on U.S. social media platforms. The defendants posed as U.S.-based editors, directing content that amplified domestic divisions and supported Russian government narratives. Both are charged with conspiracy to violate the Foreign Agents Registration Act (FARA) and money laundering.
Although not specifically named, there are enough uniquely identifying clues in the document to identify the content company in the scheme as Tenet Media, a company run by married couple Liam Donovan and Lauren Chen — herself a prominent “conservative” commentator associated with Glenn Beck‘s The Blaze and Charlie Kirk’s Turning Point USA. The six commentators who were being paid exorbitantly by the Russians for their content (as much as $100,000 per video) — all of whom, improbably, claim to have been duped — are Tim Pool, Dave Rubin, and Benny Johnson, Tayler Hansen, Matt Christiansen, and Lauren Southern. All are outspoken Trump supporters, and are on record parroting Russian talking points despite claiming the work was wholly their own.
The war in Ukraine is less “surprising” to some who’ve seen it raging since 2014. Although it escalated greatly in 2022, the Ukraine war timeline ultimately dates back all the way to the collapse of the Soviet Union in 1991.
To understand the backstory — which is now inextricably intertwined with our own presidential history given the impeachment of Donald Trump over his phone calls with Zelensky to the Republican Party‘s current-day support of the aims of Vladimir Putin — we have to go back to a time when no one was stronger on anti-Russian policy than GOP darling Ronald Reagan.
1991 — Ukraine declares independence and becomes an independent entity after the fall of the Soviet Union
1994 — Ukraine agrees to give up its nuclear arsenal in exchange for a protection agreement with Russia, United States, Britain, and Ireland (Budapest Memorandum)
2004 — Viktor Yanukovich “wins” election under dubious circumstances and is deposed for a do over election, which he loses to Viktor Yuschenko (Orange Revolution)
2006 — Viktor Yanukovych begins working directly with Paul Manafort, in an effort to boost his image after his electoral loss. Manafort was known for his work helping the “Torturers’ Lobby” of brutal dictators around the world in the 1980s, with Roger Stone (another infamous dirty trickster best known for his role as a fixer for Richard Nixon).
2007 — Yanukovych’s Party of Regions does well in the Ukranian parliamentary elections, gaining a large number of seats credited to Manafort’s strategic advice about Western-style campaigning.
2010 — Yanukovych is elected President of Ukraine, again largely crediting Manafort’s strategies for his comeback.
Nov 2013 — Having promised a more European-style government in order to win the presidency in 2010, Yanukovych turned on his word and initiated more pro-Russian policies than the Ukranians had signed up for. Yanukovych is now beset by enormous public protests against the corruption of his regime, and his unilateral decision to abandon an association agreement with the EU in favor of a trade agreement with Russia (Maidan Revolution / Revolution of Dignity)
Feb 2014 — After a harrowing 93 days barricaded inside Kyiv’s Maidan Square, activists are victorious; Yanukovich is deposed and flees to Russia
Mar 2014 — Russian forces invade and annex the region of Crimea within Ukraine
Apr 2014 — Russian forces invade the Donetsk and Luhansk regions in eastern Ukraine, escalating a war that continues to this day and had already killed more than 14,000 people by the time the 2022 large scale invasion began
Apr 2014 — Hunter Biden and business partner Devon Archer join the board of Burisma
May 2014 — Candy magnate Petro Poroshenko succeeds Yanukovych as president of Ukraine
A con artist, also known as a confidence trickster, is someone who deceives others by misrepresenting themselves or lying about their intentions to gain something valuable, often money or personal information. These individuals employ psychological manipulation and emotionally prey on the trust and confidence of their victims.
There are various forms of con artistry, ranging from financial fraud to the spread of disinformation. Each type requires distinct strategies for identification and prevention.
Characteristics of con artists
Charming and Persuasive: Con artists are typically very charismatic. They use their charm to persuade and manipulate others, making their deceit seem believable.
Manipulation of Emotions: They play on emotions to elicit sympathy or create urgency, pushing their targets into making hasty decisions that they might not make under normal circumstances.
Appearing Credible: They often pose as authority figures or experts, sometimes forging documents or creating fake identities to appear legitimate and trustworthy.
Information Gatherers: They are adept at extracting personal information from their victims, either to use directly in fraud or to tailor their schemes more effectively.
Adaptability: Con artists are quick to change tactics if confronted or if their current strategy fails. They are versatile and can shift their stories and methods depending on their target’s responses.
Types of con artists: Disinformation peddlers and financial fraudsters
Disinformation Peddlers: These con artists specialize in the deliberate spread of false or misleading information. They often target vulnerable groups or capitalize on current events to sow confusion and mistrust. Their tactics may include creating fake news websites, using social media to amplify false narratives, or impersonating credible sources to disseminate false information widely.
Financial Fraudsters: These individuals focus on directly or indirectly extracting financial resources from their victims. Common schemes include investment frauds, such as Ponzi schemes and pyramid schemes; advanced-fee scams, where victims are persuaded to pay money upfront for services or benefits that never materialize; and identity theft, where the con artist uses someone else’s personal information for financial gain.
Identifying con artists
Too Good to Be True: If an offer or claim sounds too good to be true, it likely is. High returns with no risk, urgent offers, and requests for secrecy are red flags.
Request for Personal Information: Be cautious of unsolicited requests for personal or financial information. Legitimate organizations do not typically request sensitive information through insecure channels.
Lack of Verification: Check the credibility of the source. Verify the legitimacy of websites, companies, and individuals through independent reviews and official registries.
Pressure Tactics: Be wary of any attempt to rush you into a decision. High-pressure tactics are a hallmark of many scams.
Unusual Payment Requests: Scammers often ask for payments through unconventional methods, such as wire transfers, gift cards, or cryptocurrencies, which are difficult to trace and recover.
What society can do to stop them
Education and Awareness: Regular public education campaigns can raise awareness about common scams and the importance of skepticism when dealing with unsolicited contacts.
Stronger Regulations: Implementing and enforcing stricter regulations on financial transactions and digital communications can reduce the opportunities for con artists to operate.
Improved Verification Processes: Organizations can adopt more rigorous verification processes to prevent impersonation and reduce the risk of fraud.
Community Vigilance: Encouraging community reporting of suspicious activities and promoting neighborhood watch programs can help catch and deter con artists.
Support for Victims: Providing support and resources for victims of scams can help them recover and reduce the stigma of having been deceived, encouraging more people to come forward and report these crimes.
Con artists are a persistent threat in society, but through a combination of vigilance, education, and regulatory enforcement, we can reduce their impact and protect vulnerable individuals from falling victim to their schemes. Understanding the characteristics and tactics of these fraudsters is the first step in combatting their dark, Machiavellian influence.
The concept of a “honeypot” in the realms of cybersecurity and information warfare is a fascinating and complex one, straddling the line between deception and defense. At its core, a honeypot is a security mechanism designed to mimic systems, data, or resources to attract and detect unauthorized users or attackers, essentially acting as digital bait. By engaging attackers, honeypots serve multiple purposes: they can distract adversaries from more valuable targets, gather intelligence on attack methods, and help in enhancing security measures.
Origins and Usage
The use of honeypots dates back to the early days of computer networks, evolving significantly with the internet‘s expansion. Initially, they were simple traps set to detect anyone probing a network. However, as cyber threats grew more sophisticated, so did honeypots, transforming into complex systems designed to emulate entire networks, applications, or databases to lure in cybercriminals.
Honeypots are used by a variety of entities, including corporate IT departments, cybersecurity firms, government agencies, and even individuals passionate about cybersecurity. Their versatility means they can be deployed in almost any context where digital security is a concern, from protecting corporate data to safeguarding national security.
Types and purposes
There are several types of honeypots, ranging from low-interaction honeypots, which simulate only the services and applications attackers might find interesting, to high-interaction honeypots, which are complex and fully-functional systems designed to engage attackers more deeply. The type chosen depends on the specific goals of the deployment, whether it’s to gather intelligence, study attack patterns, or improve defensive strategies.
In the context of information warfare, honeypots serve as a tool for deception and intelligence gathering. They can be used to mislead adversaries about the capabilities or intentions of a state or organization, capture malware samples, and even identify vulnerabilities in the attacker’s strategies. By analyzing the interactions attackers have with these traps, defenders can gain insights into their techniques, tools, and procedures (TTPs), enabling them to better anticipate and mitigate future threats.
Historical effects
Historically, honeypots have had significant impacts on both cybersecurity and information warfare. They’ve led to the discovery of new malware strains, helped dismantle botnets, and provided critical intelligence about state-sponsored cyber operations. For example, honeypots have been instrumental in tracking the activities of sophisticated hacking groups, leading to a deeper understanding of their targets and methods, which, in turn, has informed national security strategies and cybersecurity policies.
One notable example is the GhostNet investigation, which uncovered a significant cyber espionage network targeting diplomatic and governmental institutions worldwide. Honeypots played a key role in identifying the malware and command-and-control servers used in these attacks, highlighting the effectiveness of these tools in uncovering covert operations.
Ethical and practical considerations
While the benefits of honeypots are clear, their deployment is not without ethical and practical considerations. There’s a fine line between deception for defense and entrapment, raising questions about the legality and morality of certain honeypot operations, especially in international contexts where laws and norms may vary widely.
Moreover, the effectiveness of a honeypot depends on its believability and the skill with which it’s deployed and monitored. Poorly configured honeypots might not only fail to attract attackers but could also become liabilities, offering real vulnerabilities to be exploited.
Cyber attackers and defenders
Honeypots are a critical component of the cybersecurity and information warfare landscapes, providing valuable insights into attacker behaviors and tactics. They reflect the ongoing cat-and-mouse game between cyber attackers and defenders, evolving in response to the increasing sophistication of threats. As digital technologies continue to permeate all aspects of life, the strategic deployment of honeypots will remain a vital tactic in the arsenal of those looking to protect digital assets and information. Their historical impacts demonstrate their value, and ongoing advancements in technology promise even greater potential in understanding and combating cyber threats.
By serving as a mirror to the tactics and techniques of adversaries, honeypots help illuminate the shadowy world of cyber warfare, making them indispensable tools for anyone committed to safeguarding information in an increasingly interconnected world.
Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.
Who uses malware and what for
Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:
Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
Hacktivists use malware to disrupt services or bring attention to political or social causes.
Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Role in disinformation and geopolitical espionage
Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.
Preventing malware
Preventing malware involves multiple layers of security measures:
Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.
Famous malware incidents in foreign affairs
Several high-profile malware incidents have had significant implications in the realm of foreign affairs:
Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s TelefΓ³nica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.
In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.
Buckle up, we’re in for a wild ride. Many of the serious scholars of political history and authoritarian regimes are sounding the alarm bells that, although it is a very very good thing that we got the Trump crime family out of the Oval Office, it is still a very very bad thing for America to have so rapidly tilted towards authoritarianism. How did we get here?! How has hyper partisanship escalated to the point of an attempted coup by 126 sitting Republican House Representatives? How has political polarization gotten this bad?
These are some of the resources that have helped me continue grappling with that question, and with the rapidly shifting landscape of information warfare. How can we understand this era of polarization, this age of tribalism? This outline is a work in progress, and I’m planning to keep adding to this list as the tape keeps rolling.
America has had flavors of authoritarianism since its founding, and when fascism came along the right-wing authoritarians ate it up — and deeply wanted the United States to be a part of it. Only after they became social pariahs did they change position to support American involvement in World War II — and some persisted even after the attack of Pearl Harbor.
With Project 2025, Trump now openly threatens fascism on America — and sadly, some are eager for it. The psychology behind both authoritarian leaders and followers is fascinating, overlooked, and misunderstood.
Scholars of authoritarianism
Karen Stenner — Australian political psychologist Karen Stenner found that approximately 1/3 of populations are authoritarian, have an authoritarian personality, or have authoritarian tendencies.
Derrida — the logic of the unconscious; performativity in the act of lying
ketman — Ketman is the psychological concept of concealing one’s true aims, akin to doublethink in Orwell’s 1984, that served as a central theme to Polish dissident CzesΕaw MiΕosz‘s book The Captive Mind about intellectual life under totalitarianism during the Communist post-WWII occupation.
Erich Fromm — coined the term “malignant narcissism” to describe the psychological character of the Nazis. He also wrote extensively about the mindset of the authoritarian follower in his seminal work, Escape from Freedom.
Eric Hoffer — his book The True Believers explores the mind of the authoritarian follower, and the appeal of losing oneself in a totalist movement
Fascism — elevation of the id as the source of truth; enthusiasm for political violence
double highs — social dominators who can “switch” to become followers in certain circumstances
Loyalty; hero worship
Freud = deeply distrustful of hero worship and worried that it indulged people’s needs for vertical authority. He found the archetype of the authoritarian primal father very troubling.
Phobia indoctrination is one of the principle ways a charismatic leader will lull potential followers into his thrall, by putting them into a state of perpetual fear and anxiety. They know, either instinctively or through training (or both), that people can be induced into a prolonged state of confusion easily, and that many people in states of confusion act quite irrationally. Abusers, cult leaders, and other controllers use demagoguery and other tricks to hide in plain sight and continue to accrue power while passing themselves off as harmless or extremely patriotic.
These chaos agents use emotional manipulation and other tactics of emotional predators as a tool of control. They whip followers up into a fear frenzy frequently enough to instill a set of phobia-like instinctual reactions to chosen stimuli. In addition to stoking fears of the enemies at the gates, they also inculcate irrational fears of the consequences of questioning their authority — invoking authoritarianism. Any doubts expressed about the leadership or its doctrine are subject to terrifying negative results. Cults use this formula to wield undue influence over followers, and prevent them from questioning or leaving the group.
Phobia indoctrination is a tool of cults
As part of a larger overall program of brainwashing or mind control, cults and destructive organizations use imaginary extremes (going to hell, being possessed by demons, failing miserably at life, race war, Leftist apocalypse, etc.) to shock followers into refusing to examine any evidence whatsoever. A form of unethical hypnosis, phobia indoctrination can now be carried out on a mass scale thanks to the internet and our massive media apparatus. Be sure to be on the lookout for any cult warning signs in groups and messaging all around you.
Sociopaths and other types of emotional predators are taking ample advantage of their advantage in time and distance over the slow pace of justice. The wielding of fear as a cudgel in American politics has reached a fever pitch, with anti-Critical Race Theory hysteria, anti-vaxxers, anti-government types, anti-science, Lost Cause-revival zombie MAGA footsoldiers screeching about the “freedom!!!” they wish the government to provide them for persecuting their enemies, and other social horrors are merely the tip of the climate changing iceberg.
Phobia indoctrination tactics
Strategies of phobia indoctrination include Repetition and Conditioning, where fears are built through constant exposure; Misinformation and Propaganda, using false information to paint something as dangerous; Utilizing Existing Fears, exaggerating known fears or anxieties; and Social Pressure and Group Dynamics, leveraging social influences to convince others that irrational fears are common.
Other tactics include Authority and Expert Manipulation, where false credentials are used to lend legitimacy; Emotional Manipulation, appealing directly to emotions; Isolation and Control, where a person’s environment is manipulated; and Media Manipulation, using media to provoke fear.
We had better get familiar with the lexicon and vocabulary of the coming era, so we can fight the creeping scourge of thought control roiling the land.
Recognizing cult warning signs can be vital in identifying and understanding the risk before getting involved with a group who may not have your best interests in mind.
Some of us have been boning up on this topic for about 6 years already, while others are just tuning in now based on the horrors of recent events. It can be overwhelming to come in cold, so here — don’t go it alone! Take this:
Putin’s war against the west
President Biden “declassified” an intelligence analysis many of us had arrived at some time ago: Russian president Vladimir Putin is a cruel revanchist leader who will stop at nothing to claw out a larger legacy before he dies. His goal is nothing less than reconstituting the former Soviet Union and restoring the “glory” of the Russian empire of yesteryear. And for some reason he thinks the world community is going to let him get away with his delusional fever dreams of conquest — as if fever dreams of Mongol domination are still de rigueur.
Putin has hated democracy for a long time — since before the Berlin Wall fell where he was stationed in East Berlin as a young KGB agent, taking the news hard. Now, he has many fifth column confederates aiding and abetting him from within the United States — a number of them brazenly, and openly. It is getting harder and harder for those treasonous types to “hide out” in the folds of disinformation, misinformation, and plausible deniability. The play is being called — and everyone will need to decide if they’re for democracy or authoritarianism.
They were inspired by hippies, but Orwell would fear them. The giants of Silicon Valley started out trying to outsmart The Man, and in the process became him. And so, surveillance capitalism got born. Such is the story of corruption since time immemorial.
This surveillance capitalism dictionary of surveillance is a work in progress! Check back for further updates!
The vast majority of billionaires in the world got richer during the year of the pandemic — fantastically richer. And they still demand more!
Inequality grows and grows, warping both capitalism and government, and yet still the plutocrats press their advantage further while whining about their invented delusional oppression.
Certainly not all rich people are gigantic assholes, but a depressing many of them are. We can hang onto the good ones while tossing the others out of the Titanic lifeboats where their rugged masculinity can carry them to shore.
Republicans see criminal impunity as the *whole point* of holding office. Iran-Contra wasn't so much a scandal as a marketing brochure and recruitment drive. https://t.co/kzDgud44m4
Unfortunately the spineless toothless Republican Senators defanged the Constitution today, by casting into doubt its power to achieve healthy checks and balances between the branches of government. They gleefully gave up the role of Congress in moderating the chief executive — to the probable detriment of us all.
As usual, they performed a series of timeline hacks, rhetorical games, and parliamentary tricks that resulting in the “logical” impossibility of ever successfully impeaching a US president. They are masters at avoiding responsibility for their actions, and fiercely protect their own, even despite heinous crimes.
The Republican Houdini Game:
* Impeachment 1: "Let the voters decide" * Voters decide to remove: "Let the legal process play out" * Lame duck coup attempt: "Too soon to impeach" * Trial under new administration: "Too late! Not our problem; let the Department of Justice decide"
Senate Minority Leader Mitch McConnell and his merry band of “institutionalists” and “originalists” have managed to do more damage to our institutions than any other Republican administration, and that’s truly saying something.
In addition to sowing doubt about our elections, throwing SCOTUS and the courts under the bus despite having packed them with conservative judges and loyalists for years, damaging our sovereignty and our national security, and impugning our reputation with nations around the world, they’ve managed to turn the United States into a kleptocracy. It’s official: the Republican Party is a criminal organization.
We should remember they ALSO rejected the authority of the courts to determine the legitimacy of the 2020 election, including the rulings of SCOTUS.
Despite saying "let the legal process play out," it played out & they still pressed forward with the Big Lie of illegitimacy. https://t.co/HgWhqKGOJI
Even Trump’s own lawyer advocated for it, along with McConnell. Though he can’t be trusted and will surely have tricks up his sleeve, it would be cathartic to see Attorney General Merrick Garland and the much-maligned Department of Justice bring down the largest RICO case in the history of history. I hope that karma brings justice to all of them, regardless of the actual outcome here and now.
Alea iacta est.
The Republican Party has made its choice as the party of thugs, criminals, extortionists, liars, cheaters, seditionists, conspiracy theory, hatred, and political violence. May they break themselves on the wheel of history for generations to come.