Surveillance

US Republican Senators cavorting with military personnel, drinking and laughing and celebrating the orgy of money they are rolling in

The GOP just passed their budget reconciliation bill for FY2026 — a squeaker, but over the line and now signed into law. Looking at this staggering compilation of budget line items, we’re witnessing what can only be described as the construction of an unprecedented domestic security apparatus that should alarm anyone who values civil liberties and fiscal responsibility. What’s in the Republican spending bill? A massive financial allocation to create a new branch of the military — essentially a militarized standing army of the type the Founders feared most deeply (for example Hamilton, in Federalist No. 29).

This Republican budget bill represents a breathtaking $300+ billion commitment to militarizing America’s borders and expanding the surveillance state under the guise of “national security.” The numbers tell a chilling story: nearly $57 billion for border walls and barriers, $45 billion for immigrant detention facilities that will rival the size of the entire prison system, and almost $30 billion to supercharge ICE into a paramilitary force with expanded powers to raid communities nationwide.

What we’re seeing here isn’t border securityβ€”it’s the systematic transformation of immigration enforcement into a militarized occupation force. The bill allocates billions for “family detention centers” (a euphemism for camps where children will be imprisoned), grants to states for building more walls, and funding for “relocation of unlawfully present aliens” that sounds disturbingly like it will require the use of violent force.

Perhaps most troubling is how this massive expansion of domestic enforcement capabilities comes wrapped in the flag of military spending. Hundreds of billions flow to weapons manufacturers and defense contractors while basic human services are starved of funding. The message is clear: this administration views immigrants not as people seeking opportunity, but as enemy combatants requiring a military response.

The infrastructure being built hereβ€”the surveillance technology, detention facilities, militarized personnel, and coordination between local and federal enforcementβ€”creates the scaffolding for authoritarianism that could easily be turned against any group deemed “undesirable” by future administrations. Once you’ve normalized this level of militarized domestic enforcement, the definition of who deserves to be targeted has a way of expanding.

This isn’t about border securityβ€”it’s about power, control, and the profits that flow to contractors building America’s emerging police state.

Here is a comprehensive list of all the line items in the bill that add budget to law enforcement, border protection, national security, or military-related functions or agencies, ranked by size descending, drawing directly from the text of the bill:

  • $46,550,000,000 appropriated to the Commissioner of U.S. Customs and Border Protection for the Border Infrastructure and Wall System, including construction, installation, or improvement of new or replacement primary, waterborne, and secondary barriers; access roads; barrier system attributes (cameras, lights, sensors, detection technology); and any work necessary to prepare the ground at or near the border to allow U.S. Customs and Border Protection to conduct its operations.
  • $45,000,000,000 appropriated to U.S. Immigration and Customs Enforcement for single adult alien detention capacity and family residential center capacity. A “family residential center” is defined as a facility used by the Department of Homeland Security to detain alien family units, including children who are not unaccompanied, encountered or apprehended by the Department.
  • $29,850,000,000 appropriated to the Secretary of Homeland Security for U.S. Immigration and Customs Enforcement for fiscal year 2025, to remain available through September 30, 2029. These funds are designated for: hiring and training additional ICE personnel (officers, agents, investigators, and support staff), prioritizing and streamlining the hiring of retired ICE personnel; providing performance, retention, and signing bonuses to qualified ICE personnel; facilitating recruitment, hiring, and onboarding of additional ICE personnel (including investing in IT, recruitment, and marketing); transportation costs and related costs for alien departure or removal operations; information technology investments to support enforcement and removal operations (including fee collections); facility upgrades to support enforcement and removal operations; fleet modernization to support enforcement and removal operations; promoting family unity by maintaining care and custody of aliens charged only with a misdemeanor offense who entered with their child under 18 and detaining such an alien with their child; expanding, facilitating, and implementing 287(g) agreements; hiring and training additional staff for the Victims of Immigration Crime Engagement Office and providing nonfinancial assistance to victims of crimes perpetrated by unauthorized aliens; and hiring additional attorneys and support staff within the Office of the Principal Legal Advisor to represent DHS in immigration enforcement and removal proceedings.
  • $10,000,000,000 appropriated to the Department of Homeland Security for the State Border Security Reinforcement Fund. These funds are for grants to eligible States and units of local government for purposes including: construction or installation of a border wall, border fencing, other barriers, or buoys along the southern border of the United States (including planning, procurement of materials, and personnel costs); any work necessary to prepare the ground at or near land borders to allow construction and maintenance of a border wall or other barrier fencing; detection and interdiction of illicit substances and aliens who have unlawfully entered the United States and committed a crime, and their transfer or referral to DHS; and relocation of unlawfully present aliens from small population centers to other domestic locations.
  • $10,000,000,000 appropriated to the Secretary of Homeland Security for reimbursement of costs incurred in undertaking activities in support of the Department of Homeland Security’s mission to safeguard the borders of the United States.
Continue reading What’s in the massive Republican spending bill?
Read more

Peter Thiel at Isengaard looking into the Palantir

In the shadows of Washington’s policy debates, a quiet technological revolution is taking shapeβ€”one that could fundamentally alter how the federal government collects, analyzes, and potentially weaponizes data on American citizens. At the heart of this transformation sits Palantir Technologies, the secretive data analytics firm co-founded by tech billionaire Peter Thiel that has become the Trump administration’s go-to contractor for an ambitious plan to merge information across federal agencies into what critics fear could become an unprecedented surveillance apparatus.

The push represents the culmination of Thiel’s decades-long influence campaign within both Silicon Valley and right-wing politics, where he has emerged as the “godfather” of a powerful network of tech billionaires who have shifted dramatically rightward. Once the sole major Silicon Valley figure to back Trump in 2016, Thiel has watched his political philosophy spread throughout the tech elite, with former PayPal colleagues like Elon Musk and proteges like Vice President J.D. Vance now occupying the highest levels of government. This so-called “PayPal Mafia“β€”a group of billionaires with overlapping business interests and shared anti-regulatory fervorβ€”has become integral to the second Trump administration, with at least three former Palantir employees now working within Musk’s Department of Government Efficiency (DOGE).

Since Trump’s March executive order calling for expanded data sharing across government agencies, Palantir has quietly embedded itself deeper into the federal bureaucracy than ever before. The company has secured over $113 million in new federal contracts and expanded its flagship Foundry platform into at least four major agencies, including the Department of Homeland Security, Health and Human Services, and most recently, the Internal Revenue Service. This technological infrastructure could enable the administration to create detailed digital portraits of Americans by combining bank records, medical claims, student debt information, and disability statusβ€”all accessible through a single, searchable database.

The expansion reflects Thiel’s long-standing belief that “freedom and democracy are not compatible,” a philosophy that has guided his investments and political activities for over a decade. While Thiel maintains no official government position, he has direct access to the president, vice president, and virtually every tech figure in Trump’s inner circle, recently hosting an inauguration party at his Washington mansion for the “crΓ¨me de la crΓ¨me of the tech world.” As one journalist noted during the 2024 Republican National Convention, “It’s Peter Thiel’s party now”β€”a sentiment validated by the presence of his handpicked protege as vice president and his former colleagues running key government efficiency initiatives.

But the expansion has also triggered alarm bells within Palantir itself, where current and former employees worry about their company becoming the public face of Trump’s political agenda. Thirteen former employees recently signed a public letter urging the company to reconsider its role, while at least one strategist has resigned over the expanded ICE contracts, calling the work a “red line” she won’t cross.

As privacy advocates file lawsuits and Democratic lawmakers sound warnings about potential abuse, Palantir finds itself at the center of a national debate about the balance between government efficiency and civil liberties. To understand how we arrived at this momentβ€”and what it might mean for American privacyβ€”we need to examine the company behind the technology and the controversial figures who built it.

What is Palantir?

And once again I turned to Perplexity Labs to help me tell the story of Palantir in an interactive way. I am a little bit addicted to this new featureset — it is miraculous. It can build incredibly sophisticated things in a very short amount of time. To view the presentation, simply click the image below to launch it in a new Lightbox window:

And once again, the methodology and the full response are below.

Continue reading What is Palantir, and why are they building a database about you?
Read more

What is RT.com? If you’ve been following international news in recent years, you’ve likely encountered content from RT β€” the state-owned Russian news service formerly known as Russia Today. But what exactly is this network, and why does it matter in our global information landscape?

The Birth of a Propaganda Powerhouse

RT didn’t emerge out of nowhere. Back in 2005, the Russian government launched “Russia Today” with a substantial $30 million in state funding. The official mission? To counter what the Kremlin perceived as Western media dominance and improve Russia’s global image.

What’s fascinating is how they approached this mission. Margarita Simonyan, appointed as editor-in-chief at just 25 years old, strategically recruited foreign journalists to give the network an air of international credibility. By 2009, they rebranded to the sleeker “RT” β€” a deliberate move to distance themselves from their obvious Russian state origins.

While RT initially focused on cultural diplomacy (showcasing Russian culture and perspectives), its mission shifted dramatically after the 2008 Russia-Georgia war. The network increasingly pivoted toward anti-Western narratives β€” a strategy that continues to this day.

How RT Spreads Disinformation

RT’s playbook is both sophisticated and concerning. The network regularly promotes conspiracy theories about everything from COVID-19 origins to U.S. election fraud. It strategically amplifies divisive issues in Western societies, particularly racial tensions in America.

The coverage of the Ukraine war offers a perfect case study in RT’s propaganda techniques. Their reporting consistently and erroneously:

  • Blames NATO for the conflict
  • Denies Russian war crimes (despite Hague warrant for Putin’s arrest)
  • Frames the invasion as a “special operation” to “denazify” Ukraine (led by a Jewish president)

What makes RT particularly effective is its tailored regional messaging. In Africa, they operate “African Stream,” a covert platform promoting pro-Russian sentiment. In the Balkans, RT Balkan (based in Serbia) helps circumvent EU sanctions while spreading Kremlin-aligned content. Meanwhile, their Spanish-language expansion targets Latin American audiences with anti-Western narratives.

Beyond Media: Covert Operations

Perhaps most concerning is evidence suggesting RT extends far beyond conventional media operations. U.S. officials have alleged that RT funneled $10 million to pro-Trump influencers ahead of the 2024 election, leading to Department of Justice indictments of RT staff.

The network reportedly recruits social media influencers under fake accounts to obscure Russian involvement. More alarmingly, RT-associated platforms allegedly supply equipment (including drones, radios, and body armor) to Russian forces in Ukraine, with some materials sourced from China.

According to U.S. intelligence assessments, RT hosts a clandestine unit focused on global influence operations β€” blurring the line between media and intelligence work.

Money and Organization

As with any major operation, following the money tells an important story. RT’s annual funding has grown exponentially β€” from $30 million at its founding to $400 million by 2015. For the 2022-2024 period, the Russian government allocated a staggering 82 billion rubles.

The network’s organizational structure is deliberately complex. RT operates under ANO TV-Novosti (a nonprofit founded by RIA Novosti) and Rossiya Segodnya (a state media conglomerate established in 2013). Its subsidiaries include Ruptly (a video agency), Redfish, and Maffick (digital media platforms).

Staying One Step Ahead of Sanctions

Despite being banned in the EU and U.S. following Russia’s 2022 invasion of Ukraine, RT continues to expand its reach in Africa, Latin America, and Serbia. The network has proven remarkably adaptable at circumventing restrictions β€” using proxy outlets like “Red” in Germany and RT Balkan in Serbia to bypass sanctions.

The international response has been significant but inconsistent. The U.S. designated RT a foreign agent in 2017, the EU banned it in 2022, and Meta removed RT from its platforms in 2024. The U.S. has also launched campaigns to expose RT’s ties to Russian intelligence and limit its global operations.

Why This Matters

RT exemplifies modern hybrid warfare β€” blending traditional state media with covert influence operations and intelligence activities to advance Kremlin interests globally. Despite sanctions and increasing awareness of its true nature, RT’s adaptability and substantial funding ensure its continued reach.

For those of us concerned about information integrity and democratic resilience, understanding RT’s operations isn’t just academic β€” it’s essential for navigating our increasingly complex media landscape.

Read more

totalitarianism as a mindless form of hero worship

What Is Totalitarianism? A Comprehensive Guide

In today’s complex geopolitical landscape, understanding different systems of governance is crucial for making sense of world events. Among these systems, totalitarianism stands out as one of the most extreme forms of government control. What exactly is totalitarianism, how does it function, and what can history teach us about its impacts — and how to fight back against its oppressive aims?

Defining Totalitarianism

Totalitarianism is a form of government and political system that attempts to assert total control over the lives of its citizens. It shares similarities with both fascism and authoritarianism, but unlike other authoritarian regimes, totalitarian states seek to subordinate all aspects of individual life to the authority of the state. The term itself suggests the extreme “total” nature of this controlβ€”extending beyond purely political spheres into social, economic, cultural, and even private dimensions of human existence.

What distinguishes totalitarianism from other forms of authoritarianism is its ambition to erase the line between government and society entirely. Under totalitarianism, there is no concept of a private life outside the reach of state authority.

Key Characteristics of Totalitarian Regimes

1. Complete State Control of Society

Totalitarian states attempt to control virtually every aspect of social life:

  • Business and Economy: State-directed economic policies, often involving nationalization or collectivization of industries and resources
  • Labor: Control over labor unions, work assignments, and employment opportunities
  • Housing: Allocation and control of housing and living arrangements
  • Education: Strict control of curriculum and educational institutions to indoctrinate youth
  • Religion: Suppression or co-option of religious institutions
  • The Arts: Censorship and direction of artistic expression to serve state purposes
  • Personal Life: Intrusion into family relationships, leisure activities, and personal decisions
  • Youth Organizations: Creation of state-sponsored youth groups to foster loyalty from an early age

2. Dynamic Leader

Totalitarian systems typically center around a charismatic, authoritarian leader who:

  • Serves as the unifying symbol of the government
  • Builds a personality cult around themselves
  • Claims to embody the will of the people or nation
  • Encourages popular support through a combination of charisma and coercion
  • Is often portrayed as infallible or possessing extraordinary abilities
Continue reading What is totalitarianism?
Read more

AI accelerationism Dictionary illustration

Accelerationism Dictionary: A Complete Terminology and Lexicon

AI accelerationism, or β€œe/acc,” is one of the most radical and controversial ideologies emerging from Silicon Valley today. At its core, it champions the rapid and unrestricted development of artificial intelligence, rejecting calls for regulation and safety measures in favor of unchecked innovation. Proponents argue that AI holds the key to solving humanity’s greatest challengesβ€”climate change, poverty, diseaseβ€”and even envision a post-human future where intelligence transcends biological limits.

With strong libertarian leanings, the movement prioritizes market-driven progress, believing that government intervention would stifle AI’s transformative potential. Tech billionaires like legendary venture capitalist Marc Andreessen have embraced these ideas, elevating what was once a fringe philosophy into a driving force in the AI industry.

However, AI accelerationism faces fierce criticism for its disregard of ethical considerations, social consequences, and potential existential risks. Detractors warn that unregulated AI development could exacerbate inequality, destabilize economies, and lead to dangerous technological outcomes without proper safeguards.

The movement stands in stark opposition to cautious, ethical AI development advocated by groups like the effective altruism community, setting up a high-stakes ideological battle over the future of artificial intelligence. Whether one sees AI accelerationism as a path to utopia or a reckless gamble, its growing influence makes it a defining force in the ongoing debate over technology’s role in shaping humanity’s future.

This accelerationism dictionary should help get anyone up to speed on this emerging and dangerous ideology. We’ll keep adding to it over time as the field continues to evolve at breakneck pace.

A dystopian AI hellscape -- one of many potential outcomes of AI accelerationism ideology

Accelerationism Dictionary

A

Accelerate or die: A common slogan in the e/acc movement expressing the belief that technological acceleration is necessary for survival.

Accelerationism: A philosophical and political movement advocating for the acceleration of technological, social, and economic progress. Can exist in left-wing, right-wing, and politically neutral forms.

AGI (Artificial General Intelligence): An artificial intelligence system capable of performing any intellectual task that a human can do.

AI supremacy: The belief or fear that artificial intelligence will surpass human intelligence and capabilities, potentially dominating society, economies, and geopolitical power structures. It is often discussed in the context of global competition for technological dominance.

Continue reading Accelerationism Dictionary
Read more

Tech bros at Trump's inauguration

Dave Karpf absolutely shreds Balaji Srinivasan’s book “The Network State” as the ravings of a rich delusional megalomaniac preening to his Silicon Valley peers who fancy themselves in Galt’s Gulch. These guys appear almost completely ignorant about the actual functions of a nation-state. If they want to declare themselves sovereign and secede from the United States, we ought to cut their sewage, water, and electric supply to give them a dose of the factual reality they so disdain.

What happens to these guys’ nerdy little crypto-enclaves when a much larger power (say, Russia…) decides to invade them and take their enormous stores of value they’ve bragged about removing from state protection? Especially after they’ve just ushered in the destruction of the post-WWII global order in which it was generally frowned upon for giant nations to gobble up their neighbors just because they could? πŸ€”

Moreover, what if that invader nation is simply the United States itself, once an administration comes to power that decides it is tired of dealing with its collection of ornery Confederate enclaves? Some might knuckle under peacefully, but there might also be some Waco events — except this time, with a lethal military strike justified by a president completely immune from prosecution and beyond the power of legislative or judicial oversight.

Please go away

What is stopping these guys from starting their start-up utopias right now? They are squintillionaires and could certainly buy land and start a community organized around whatever value system they want to run up the flagpole (arguably that seems to be the idea behind California Forever). Why isn’t Peter Thiel seasteading already and leaving us the fuck alone? Why does California Forever take Forever to operationalize when the entire premise of these techbro elites for decades has been that government (and specifically democracy) is too slow and they could totally build everything much faster and better if only given the chance?

Continue reading The tech bros have no clothes
Read more

AOC Alexandria Ocasio-Cortez

The situation is, as they say in the military, FUBAR’d. We are under a full-on authoritarian attack to democracy in progress in broad daylight, being carried out by the (unfortunately) legitimate president and his illegitimate best buddy Elon Musk. What can we do — the situation seems so bleak, you say. I hear you and I feel you. But AOC and HCR (two of my favorite acronyms) are here to break it down about how we should not go quietly — and how to do it.

First up: what are we facing? Among other things, what is most probably the biggest data breach of all time — perpetrated by Elon’s Musk’s fake department DOGE. Former Republican strategist Stuart Stevens called Musk’s land grab of the federal till and all its payment information about citizens “the most significant data leak in cyber history.” On top of that, the conflicts of interest inherent in this unlawful caper are so staggering they’re well out of scope of this single blog post.

Elon Musk's head (poorly) stitched on to Miley Cyrus's body in the Wrecking Ball music video

Beyond that, Trump waited for Congress to go out of session before beginning the blitzkrieg of illegal Executive Orders and maneuvers designed to attack America and throw its citizens off balance. Here’s a list of the main actions we need to be pressing our Congresspeople to get answers for:

Events of the authoritarian push

Impoundment Attempt and Judicial Reversal:

  • Early in the Trump administration, an Office of Management and Budget memo attempted to freeze federal spending pending a review for alleged “DEI contamination”. A federal judge quickly ruled this action β€œblatantly unconstitutional,” forcing the administration to backtrack. However, related Executive Orders freezing some payments are said to “still be in order” which is (intentionally) causing confusion around the status of almost everything.

Elon Musk’s Intervention in the Treasury Payment System:

Breach of USAID’s Secure Systems:

  • Musk’s people, reportedly a group of young men between 19 and 24 according to Wired, attempted to access a β€œsecret area” within USAID (the agency responsible for U.S. foreign aid). In the process, two top officials were sidelined (put on administrative leave), and Musk’s team gained access, potentially compromising sensitive U.S. intelligence data.

Announced Cuts to Federal Programs:

  • Following these breaches, Musk (acting as a Trump ally) has claimed on social media that he is β€œcutting” certain federally funded programs, including a human services organization linked to the Lutheran Church. This move threatens funding for critical services such as migrant support, nursing homes, and possibly even affects Social Security and Medicare (though Trump has stated these will not be touched).

Tariffs and International Implications:

  • Additionally, Trump’s administration is imposing tariffs on Mexico, Canada, and China, which could inflict economic pain, especially in regions that predominantly support the Republican agenda.

These recent events (the inimitable Heather Cox Richardson covers them in-depth in her Letters from an American column) highlight an aggressive attack on constitutional governance marked by executive overreach and the manipulation of public funds. Actions such as unilateral spending freezesβ€”disguised (thinly) as efforts to address DEI concernsβ€”and the controversial transfer of control over federal financial systems to private interests like world’s richest man Elon Musk (who apparently still doesn’t have enough money) reveal a dangerous shift in power.

This reckless endangerment jeopardizes not only the integrity of critical public services and security measures but also the core democratic principle of accountability, underscoring an urgent need for citizens to remain vigilant and demand that elected officials uphold the constitutional order. We The People still wield the ultimate power — as AOC is about to so eloquently tell you more about.

AOC on what we can do: Do not comply in advance.

Continue reading Do Not Comply In Advance: What can we do?
Read more

disinformation illustrated by midjourney

In today’s digital landscape, disinformation has become an ever-present challenge, influencing everything from public opinion to personal beliefs. Understanding and combating disinformation isn’t just a task for media professionals; it’s a crucial skill for anyone navigating the vast array of information and misinformation in our interconnected world.

This curated list of books offers invaluable insights into the mechanisms of disinformation and the tools we can use to think critically, fact-check effectively, and enhance our media literacy. With perspectives spanning neuroscience, history, and media studies, these books dive deep into the factors that make disinformation so potentβ€”and what we can do to counter it. Whether you’re a publishing or media professional looking to stay informed or a member of the general public eager to sharpen your information literacy skills, this selection has something for everyone interested in the truth amidst a world of half-truths and fabrications.

Disinformation book summaries

Active Measures: The Secret History of Disinformation and Political Warfare

by Thomas Rid

The book provides a comprehensive historical account of disinformation campaigns, tracing their evolution from the early 20th century to the present day. Rid explores how intelligence agencies, governments, and other actors have used “active measures” to manipulate public opinion and influence political outcomes. The author examines key case studies, including Cold War operations and modern digital disinformation campaigns, offering insights into the tactics and strategies employed in information warfare.

This Is Not Propaganda: Adventures in the War Against Reality

by Peter Pomerantsev

Pomerantsev’s book explores the global landscape of information manipulation, drawing on personal experiences and interviews with key figures in the field. The author examines how various actors, from authoritarian regimes to populist movements, exploit modern communication technologies to shape narratives and influence public opinion. The book offers insights into the challenges facing democracy and truth in the digital age.

You Are Being Lied To: The Disinformation Guide to Media Distortion, Historical Whitewashes and Cultural Myths

by Russ Kick (Editor)

This collection of essays challenges conventional narratives and exposes various forms of misinformation across different domains. The book covers a wide range of topics, from media manipulation to historical inaccuracies and cultural misconceptions. It aims to encourage critical thinking and skepticism towards information presented by governments, media, corporations, and other institutions.

Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics

by Yochai Benkler, Robert Faris, and Hal Roberts

This comprehensive study analyzes media coverage of American presidential politics from 2015 to 2018. The authors argue that the right-wing media ecosystem operates fundamentally differently from the rest of the media environment, creating a propaganda feedback loop. The book examines how this dynamic has marginalized center-right media, radicalized the right-wing ecosystem, and made it susceptible to propaganda efforts.

LikeWar: The Weaponization of Social Media

by P.W. Singer and Emerson T. Brooking

This book examines how social media has become a new battlefield for information warfare. The authors explore how various actors, including governments, terrorists, and activists, use social media platforms to shape public opinion, spread propaganda, and influence real-world events. The book offers insights into the strategies and tactics employed in this new form of conflict and discusses the implications for society and warfare.

The Misinformation Age: How False Beliefs Spread

by Cailin O’Connor and James Owen Weatherall

“The Misinformation Age” explores the social and psychological factors that contribute to the spread of false beliefs. The authors use case studies and scientific research to explain how misinformation propagates through social networks and why it can be so persistent. They examine the role of cognitive biases, social dynamics, and information ecosystems in shaping our beliefs and discuss potential strategies for combating the spread of false information.

Fake News: Understanding Media and Misinformation in the Digital Age

by Melissa Zimdars and Kembrew McLeod (Editors)

This collection of essays from various experts examines the phenomenon of “fake news” from multiple perspectives. The book covers topics such as the history of misinformation, the role of social media in spreading false narratives, and the challenges of fact-checking in the digital age. It offers insights into the complex landscape of modern media and provides strategies for navigating an information environment rife with misinformation.

Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It

by Richard Stengel

Drawing from his experience as Under Secretary of State for Public Diplomacy and Public Affairs, Stengel provides an insider’s account of the U.S. government’s efforts to combat disinformation. The book examines the challenges faced in countering propaganda from state actors like Russia and non-state actors like ISIS. Stengel offers insights into the nature of modern information warfare and proposes strategies for addressing the threat of disinformation.

Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation

by Andrew Marantz

Marantz’s book provides an in-depth look at the individuals and groups behind the rise of online extremism and disinformation in America. Through extensive interviews and firsthand accounts, the author explores how fringe ideas have moved into the mainstream, facilitated by social media platforms and tech industry dynamics. The book offers insights into the complex interplay between technology, media, and politics in shaping public discourse.

Weaponized Lies: How to Think Critically in the Post-Truth Era

by Daniel J. Levitin

This book serves as a practical guide for navigating the complex information landscape of the “post-truth” era. Levitin provides tools and strategies for critical thinking, teaching readers how to evaluate claims, spot logical fallacies, and interpret statistics. The book aims to empower individuals to become more discerning consumers of information and to resist manipulation through misinformation and deceptive rhetoric.

The Reality Game: How the Next Wave of Technology Will Break the Truth

by Samuel Woolley

This book looks ahead to emerging technologies and their potential impact on the spread of disinformation. Woolley examines how artificial intelligence, virtual reality, and other advanced technologies might be used to create and disseminate even more convincing false narratives. The author also explores potential countermeasures and the role of policy in addressing these future challenges.

disinformation into the future

Lie Machines: How to Save Democracy from Troll Armies, Deceitful Robots, Junk News Operations, and Political Operatives

by Philip N. Howard

Howard’s book explores the world of computational propaganda, examining how social media platforms, artificial intelligence, and big data are being used to manipulate public opinion. The author investigates the actors behind disinformation campaigns, from state-sponsored trolls to political consultants, and discusses the implications for democracy. The book also offers potential solutions for combating these “lie machines” and preserving democratic discourse.

Read more

disinformation

Disinformation is more than just false informationβ€”it’s a calculated effort to deceive. Unlike misinformation, which spreads by accident or ignorance, disinformation is crafted with precision to manipulate public opinion and sow confusion. Its architects in the right-wing media ecosystem and elsewhere often exploit existing dividesβ€”political, social, or culturalβ€”using these cracks in the foundation of society to achieve their aims. Whether the goal is political dominance, economic advantage, or simply the unraveling of trust, disinformation thrives in the chaos it creates. And in today’s digital landscape, it spreads like wildfire, fanning the flames of discord faster than ever before.

But disinformation isn’t just about fake news or conspiracy theories. It’s a full-blown strategy, weaponized by those who understand how to pull the levers of media, technology, and emotion to get what they want. It doesn’t need to be entirely false to do damageβ€”sometimes a well-placed half-truth or a twisted fact is all it takes. The aim is to make us question what’s real and undermine our ability to discern truth from fiction. And this is where vigilance and education come in, arming us with the tools to resist these tactics. In the following disinformation dictionary, in addition to the disinformation definition I’ll break down some of the key terms and tactics used to muddy the waters of truth.

Disinformation Dictionary of Psychological Warfare

The cat is well and truly out of the bag in terms of understanding how easily wide swaths of people can be misled into believing total falsehoods and even insane conspiracy theories that have no basis whatsoever in reality. In their passion for this self-righteous series of untruths, they can lose families, jobs, loved ones, respect, and may even be radicalized to commit violence on behalf of an authority figure. It starts with the dissemination of disinformation — a practice with a unique Orwellian lexicon all its own, collated in the below disinformation dictionary.

Disinformation is meant to confuse, throw off, distract, polarize, and otherwise create conflict within and between target populations. The spreading of falsehoods is a very old strategy — perhaps as old as humankind itself — but its mass dissemination through the media was pioneered in the 20th century by the Bolsheviks in the Soviet Union, the Nazis in Germany, Mussolini‘s Fascists in Italy, and other authoritarian regimes of the early 1900s through the 1940s.

After World War II and the Allies’ defeat of Hitler, the role of disinformation lived on during the Cold War. The Soviet KGB were infamous for their spycraft and covert infiltration of information flows, while the United States experienced waves of anti-Communist paranoia and hysteria fueled by the spread of conspiracist thinking. Psychologists, social scientists, and others did their best to unpack the horrors revealed by the reign of the Nazi regime with a wellspring of research and critical thought about authoritarian personalities and totalitarianism that continues to this day.

disinformation, illustrated

The John Birch Society rides again

In some ways, we haven’t really moved on yet from the Cold War — in fact, some appear not to have moved on since the New Deal and are hellbent on rolling its provisions back, almost 100 years later. The dregs of the John Birch Society — an organization famously too koo-koo even for William F. Buckley, who excommunicated them from the conservative wing of the Republican Party — live on today in a reconstituted form known as the CNP, or Council for National Policy.

Founded officially in 1981 after almost a decade down in the political trenches radicalizing the right, the CNP is the shadowy organization pulling the strings of many of the set pieces in puppets in today’s political play. In alliance with other powerful networks including the Koch empire, the NRA, and the Evangelical church, the CNP is the group behind the recent hysteria out of nowhere about Critical Race Theory in public schools (where it is not taught).

They are funneling the money of America’s billionaires into absurdist theatrical displays of performance artists who distract America with bread and circuses while the plutocrats make off with the cash in the form of tax cuts, tax breaks, tax carve outs, tax loopholes, tax policy, and other wealth-building sweetheart deals for themselves and their cronies.

A crowd of people consuming disinformation, by Midjourney

The CNP, in partnership with Charles Koch’s massive database of all American voters (and of course, his money), have managed to brainwash the Evangelical flock and various assorted MAGA groups into believing a raft of nonsense from climate change denial to anti-masking to the Big Lie about the 2020 election and much more.

They have leveraged new political technology in order to recruit and radicalize new cult members quickly and at now digital scale — via QAnon, Fox News, the even more extreme aggressively partisan coverage of Newsmax and OANN, and a fleet of “grassroots” astroturf operations peddling their brand of seditious aspirational theocracy to ruralites like it was going out of style… on accounta it is.

US 2024 elections disinformation

As the U.S. now sees the 2024 elections in the rearview mirror, it’s ever more clear the impact of disinformation campaigns on American politics. These orchestrated fakeries are becoming more sophisticated and widespread, targeting voters across social media, messaging apps, and even AI-generated content. These efforts aim to confuse voters, suppress turnout, smear candidates, and undermine trust in the electoral system. In today’s highly polarized environment, disinformation is not just a tool of foreign interference but also a domestic weapon used to influence election outcomes. Understanding these tactics and how they operate is critical for protecting democracy and ensuring a fair election process.

Here is a guide to the main types of election interference disinformation campaigns in progress, so you can be forewarned and forearmed as much as possible:

  • Voter Suppression and Confusion
    False information is often spread about when, where, or how to vote, confusing voters about eligibility or tricking them with fake polling place closures (see: right-wing operative Jacob Wahl convicted for telecommunications fraud for a voter suppression campaign in MI, NY, PA, IL, and OH in 2020).
  • Candidate Smear Campaigns
    Bad actors fabricate scandals, use manipulated images or videos (“deepfakes”), and spread false claims about candidates to damage their reputations.
  • Foreign Interference
    Nations like Russia, China, and Iran are expected to use fake social media accounts, amplify domestic conspiracy theories, and send targeted messages to influence U.S. elections.
  • Undermining Election Integrity
    Disinformation campaigns spread false claims of widespread voter fraud, misrepresent election security, and attempt to delegitimize results with premature victory declarations or “rigged” election claims.

Platforms and Methods

  • Social Media and Messaging Apps
    Disinformation spreads rapidly on platforms like Facebook, Twitter (X), TikTok, WhatsApp, and Telegram, where users share and amplify false narratives.
  • Fake News Websites
    Some websites pose as legitimate news sources but are created to deceive readers with false stories that push specific agendas.
  • AI-Generated Content
    The rise of AI allows for the creation of highly realistic but fake images, videos, and texts, making it harder to distinguish truth from falsehood.

Targeted Communities

  • Communities of Color
    Minority communities are often the focus of disinformation, with tactics designed to exploit shared traumas, concerns, and cultural connections. Misinformation is tailored to specific demographics, often in multiple languages.

Emerging Trends in Disinformation

  • AI-Generated Content
    AI tools are making it easier to create convincing but fake media, posing new challenges for detecting and countering disinformation.
  • Prebunking Efforts
    Governments and organizations are becoming more proactive, working to debunk false narratives before they spread.
  • Cross-Platform Coordination
    Disinformation is coordinated across different platforms, making it harder to detect and stop, as the false narratives hop from one space to another.

Countermeasures

  • Government Agencies
    Federal entities are focused on monitoring foreign interference to safeguard elections.
  • Social Media Content Moderation
    Platforms are increasingly using algorithms and human moderators to identify and remove disinformation.
  • Fact-Checking and Public Education
    Non-profits and independent groups work to fact-check false claims and educate voters on how to critically assess the information they encounter.
  • Media Literacy Initiatives
    Public awareness campaigns aim to teach people how to recognize and resist disinformation, helping voters make informed decisions.

Disinformation Definitions Dictionary

This disinformation definition dictionary covers (and uncovers) the terminology and techniques used by disinfo peddlers, hucksters, Zucksters, propagandists, foreign actors, FARA actors, and professional liars of all sorts — including confirmation bias, the bandwagon effect, and other psychological soft points they target, attack, and exploit. From trolling to active measures to “alternative facts,” we dig into the terminology that makes disinformation tick.

This resource will be added to over time as neologisms are coined to keep up with the shifting landscape of fakes, deep fakes, AI disinformation, and alternative timelines in our near and potentially far future.

To learn even more, be sure to check out the Disinformation Books List:

TermDefinition
Read more

Microtargeting is a marketing and political strategy that leverages data analytics to deliver customized messages to specific groups within a larger population. This approach has become increasingly prevalent in the realms of digital media and advertising, and its influence on political campaigns has grown significantly.

Understanding microtargeting

Microtargeting begins with the collection and analysis of vast amounts of data about individuals. This data can include demographics (age, gender, income), psychographics (interests, habits, values), and behaviors (purchase history, online activity). By analyzing this data, organizations can identify small, specific groups of people who share common characteristics or interests. The next step involves crafting tailored messages that resonate with these groups, significantly increasing the likelihood of engagement compared to broad, one-size-fits-all communications.

Microtargeting and digital media

Digital media platforms, with their treasure troves of user data, have become the primary arenas for microtargeting. Social media networks, search engines, and websites collect extensive information on user behavior, preferences, and interactions. This data enables advertisers and organizations to identify and segment their audiences with remarkable precision.

Microtargeting, by Midjourney

Digital platforms offer sophisticated tools that allow for the delivery of customized content directly to individuals or narrowly defined groups, ensuring that the message is relevant and appealing to each recipient. The interactive nature of digital media also provides immediate feedback, allowing for the refinement of targeting strategies in real time.

Application in advertising

In the advertising domain, microtargeting has revolutionized how brands connect with consumers. Rather than casting a wide net with generic advertisements, companies can now send personalized messages that speak directly to the needs and desires of their target audience. This approach can improve the effectiveness of advertising campaigns — but comes with a tradeoff in terms of user data privacy.

Microtargeted ads can appear on social media feeds, as search engine results, within mobile apps, or as personalized email campaigns, making them a versatile tool for marketers. Thanks to growing awareness of the data privacy implications — including the passage of regulations including the GDPR, CCPA, DMA and others — users are beginning to have more control over what data is collected about them and how it is used.

Expanding role in political campaigns

The impact of microtargeting reaches its zenith in the realm of political campaigns. Political parties and candidates use microtargeting to understand voter preferences, concerns, and motivations at an unprecedented level of detail. This intelligence allows campaigns to tailor their communications, focusing on issues that resonate with specific voter segments.

For example, a campaign might send messages about environmental policies to voters identified as being concerned about climate change, while emphasizing tax reform to those worried about economic issues. A campaign might target swing voters with characteristics that match their party’s more consistent voting base, hoping to influence their decision to vote for the “right” candidate.

Microtargeting in politics also extends to voter mobilization efforts. Campaigns can identify individuals who are supportive but historically less likely to vote and target them with messages designed to motivate them to get to the polls. Similarly, microtargeting can help in shaping campaign strategies, determining where to hold rallies, whom to engage for endorsements, and what issues to highlight in speeches.

Ethical considerations and challenges

The rise of microtargeting raises significant ethical and moral questions and challenges. Concerns about privacy, data protection, and the potential for manipulation are at the forefront. The use of personal information for targeting purposes has sparked debates on the need for stricter regulation and transparency. In politics, there’s apprehension that microtargeting might deepen societal divisions by enabling campaigns to exploit sensitive issues or disseminate misleading information — or even disinformation — to susceptible groups.

Furthermore, the effectiveness of microtargeting in influencing consumer behavior and voter decisions has led to calls for more responsible use of data analytics. Critics argue for the development of ethical guidelines that balance the benefits of personalized communication with the imperative to protect individual privacy and maintain democratic integrity.

Microtargeting represents a significant evolution in the way organizations communicate with individuals, driven by advances in data analytics and digital technology. Its application across advertising and, more notably, political campaigns, has demonstrated its power to influence behavior and decision-making.

However, as microtargeting continues to evolve, it will be crucial for society to address the ethical and regulatory challenges it presents. Ensuring transparency, protecting privacy, and promoting responsible use will be essential in harnessing the benefits of microtargeting while mitigating its potential risks. As we move forward, the dialogue between technology, ethics, and regulation will shape the future of microtargeting in our increasingly digital world.

Read more

The concept of a “honeypot” in the realms of cybersecurity and information warfare is a fascinating and complex one, straddling the line between deception and defense. At its core, a honeypot is a security mechanism designed to mimic systems, data, or resources to attract and detect unauthorized users or attackers, essentially acting as digital bait. By engaging attackers, honeypots serve multiple purposes: they can distract adversaries from more valuable targets, gather intelligence on attack methods, and help in enhancing security measures.

Origins and Usage

The use of honeypots dates back to the early days of computer networks, evolving significantly with the internet‘s expansion. Initially, they were simple traps set to detect anyone probing a network. However, as cyber threats grew more sophisticated, so did honeypots, transforming into complex systems designed to emulate entire networks, applications, or databases to lure in cybercriminals.

A honeypot illustration with a circuit board beset by a bee, by Midjourney

Honeypots are used by a variety of entities, including corporate IT departments, cybersecurity firms, government agencies, and even individuals passionate about cybersecurity. Their versatility means they can be deployed in almost any context where digital security is a concern, from protecting corporate data to safeguarding national security.

Types and purposes

There are several types of honeypots, ranging from low-interaction honeypots, which simulate only the services and applications attackers might find interesting, to high-interaction honeypots, which are complex and fully-functional systems designed to engage attackers more deeply. The type chosen depends on the specific goals of the deployment, whether it’s to gather intelligence, study attack patterns, or improve defensive strategies.

In the context of information warfare, honeypots serve as a tool for deception and intelligence gathering. They can be used to mislead adversaries about the capabilities or intentions of a state or organization, capture malware samples, and even identify vulnerabilities in the attacker’s strategies. By analyzing the interactions attackers have with these traps, defenders can gain insights into their techniques, tools, and procedures (TTPs), enabling them to better anticipate and mitigate future threats.

Historical effects

Historically, honeypots have had significant impacts on both cybersecurity and information warfare. They’ve led to the discovery of new malware strains, helped dismantle botnets, and provided critical intelligence about state-sponsored cyber operations. For example, honeypots have been instrumental in tracking the activities of sophisticated hacking groups, leading to a deeper understanding of their targets and methods, which, in turn, has informed national security strategies and cybersecurity policies.

One notable example is the GhostNet investigation, which uncovered a significant cyber espionage network targeting diplomatic and governmental institutions worldwide. Honeypots played a key role in identifying the malware and command-and-control servers used in these attacks, highlighting the effectiveness of these tools in uncovering covert operations.

Honeypot hackers and cybercriminals

Ethical and practical considerations

While the benefits of honeypots are clear, their deployment is not without ethical and practical considerations. There’s a fine line between deception for defense and entrapment, raising questions about the legality and morality of certain honeypot operations, especially in international contexts where laws and norms may vary widely.

Moreover, the effectiveness of a honeypot depends on its believability and the skill with which it’s deployed and monitored. Poorly configured honeypots might not only fail to attract attackers but could also become liabilities, offering real vulnerabilities to be exploited.

Cyber attackers and defenders

Honeypots are a critical component of the cybersecurity and information warfare landscapes, providing valuable insights into attacker behaviors and tactics. They reflect the ongoing cat-and-mouse game between cyber attackers and defenders, evolving in response to the increasing sophistication of threats. As digital technologies continue to permeate all aspects of life, the strategic deployment of honeypots will remain a vital tactic in the arsenal of those looking to protect digital assets and information. Their historical impacts demonstrate their value, and ongoing advancements in technology promise even greater potential in understanding and combating cyber threats.

By serving as a mirror to the tactics and techniques of adversaries, honeypots help illuminate the shadowy world of cyber warfare, making them indispensable tools for anyone committed to safeguarding information in an increasingly interconnected world.

Read more

republican vs. democrat cage match boxing ring

Buckle up, we’re in for a wild ride. Many of the serious scholars of political history and authoritarian regimes are sounding the alarm bells that, although it is a very very good thing that we got the Trump crime family out of the Oval Office, it is still a very very bad thing for America to have so rapidly tilted towards authoritarianism. How did we get here?! How has hyper partisanship escalated to the point of an attempted coup by 126 sitting Republican House Representatives? How has political polarization gotten this bad?

These are some of the resources that have helped me continue grappling with that question, and with the rapidly shifting landscape of information warfare. How can we understand this era of polarization, this age of tribalism? This outline is a work in progress, and I’m planning to keep adding to this list as the tape keeps rolling.

Right-Wing Authoritarianism

Authoritarianism is both a personality type and a form of government — it operates at both the interpersonal and the societal level. The words authoritarian and fascist are often used interchangeably, but fascism is a more specific type of authoritarianism, and far more historically recent.

America has had flavors of authoritarianism since its founding, and when fascism came along the right-wing authoritarians ate it up — and deeply wanted the United States to be a part of it. Only after they became social pariahs did they change position to support American involvement in World War II — and some persisted even after the attack of Pearl Harbor.

With Project 2025, Trump now openly threatens fascism on America — and sadly, some are eager for it. The psychology behind both authoritarian leaders and followers is fascinating, overlooked, and misunderstood.

Scholars of authoritarianism

  • Hannah Arendt — The Origins of Totalitarianism
  • Bob Altemeyer — The Authoritarians
  • Derrida — the logic of the unconscious; performativity in the act of lying
  • ketman — Ketman is the psychological concept of concealing one’s true aims, akin to doublethink in Orwell’s 1984, that served as a central theme to Polish dissident CzesΕ‚aw MiΕ‚osz‘s book The Captive Mind about intellectual life under totalitarianism during the Communist post-WWII occupation.
  • Erich Fromm — coined the term “malignant narcissism” to describe the psychological character of the Nazis. He also wrote extensively about the mindset of the authoritarian follower in his seminal work, Escape from Freedom.
  • Eric Hoffer — his book The True Believers explores the mind of the authoritarian follower, and the appeal of losing oneself in a totalist movement
  • Fascism — elevation of the id as the source of truth; enthusiasm for political violence
  • Tyrants and dictators
  • John Dean — 3 types of authoritarian personality:
    • social dominators
    • authoritarian followers
    • double highs — social dominators who can “switch” to become followers in certain circumstances
  • Loyalty; hero worship
    • Freud = deeply distrustful of hero worship and worried that it indulged people’s needs for vertical authority. He found the archetype of the authoritarian primal father very troubling.
  • Ayn Rand
    • The Fountainhead (1943)
    • Atlas Shrugged (1957)
    • Objectivism ideology
  • Greatness Thinking; heroic individualism
  • Nietszche — will to power; the Uberman
  • Richard Hofstadter — The Paranoid Style
  • George Lakoff — moral framing; strict father morality
  • Neil Postman — Entertaining Ourselves to Death
  • Anti-Intellectualism
  • Can be disguised as hyper-rationalism (Communism)
  • More authoritarianism books
Continue reading Hyper Partisanship: How to understand American political polarization
Read more

Words, words, and more words.

In a world of increasing disinformation, it’s more important than ever to be armed with actual information. And being curious about the meaning, nature, and origins of things is a rewarding journey in and of itself.

Think of these dictionaries as tools for your mind — they can help you make connections between concepts, understand the terminology being used in the media and all around you, and feel less lost in a sea of dizzying complexity and rapid change. A fantastic vocabulary also helps you connect with people near and far — as well as get outside your comfort zone and learn something new.

Dictionaries List

This section includes dictionaries and definitions of important terms in important realms — and is continually being built out. Stay tuned!

Terms and Concepts

Authoritarianism and American Fascism

Authoritarianism is a political system where a single leader or a small group holds significant power, often without the consent of the governed. Decisions are made by authorities without public input, and individual freedoms and democratic principles are usually suppressed. The government may control various aspects of life, including media and the economy, without checks and balances. This leads to a concentration of power that can foster corruption and human rights abuses. In an authoritarian regime, obedience to the authorities is often emphasized over personal liberties and democratic participation.

Psychology

Definitions and terms relating to the study of the mind, including ideas from social psychology, political psychology, positive psychology, and Buddhist psychology.

Read more

phobia indoctrination, illustrated

Phobia indoctrination is one of the principle ways a charismatic leader will lull potential followers into his thrall, by putting them into a state of perpetual fear and anxiety. They know, either instinctively or through training (or both), that people can be induced into a prolonged state of confusion easily, and that many people in states of confusion act quite irrationally. Abusers, cult leaders, and other controllers use demagoguery and other tricks to hide in plain sight and continue to accrue power while passing themselves off as harmless or extremely patriotic.

These chaos agents use emotional manipulation and other tactics of emotional predators as a tool of control. They whip followers up into a fear frenzy frequently enough to instill a set of phobia-like instinctual reactions to chosen stimuli. In addition to stoking fears of the enemies at the gates, they also inculcate irrational fears of the consequences of questioning their authority — invoking authoritarianism. Any doubts expressed about the leadership or its doctrine are subject to terrifying negative results. Cults use this formula to wield undue influence over followers, and prevent them from questioning or leaving the group.

Phobia indoctrination is a tool of cults

As part of a larger overall program of brainwashing or mind control, cults and destructive organizations use imaginary extremes (going to hell, being possessed by demons, failing miserably at life, race war, Leftist apocalypse, etc.) to shock followers into refusing to examine any evidence whatsoever. A form of unethical hypnosis, phobia indoctrination can now be carried out on a mass scale thanks to the internet and our massive media apparatus. Be sure to be on the lookout for any cult warning signs in groups and messaging all around you.

Sociopaths and other types of emotional predators are taking ample advantage of their advantage in time and distance over the slow pace of justice. The wielding of fear as a cudgel in American politics has reached a fever pitch, with anti-Critical Race Theory hysteria, anti-vaxxers, anti-government types, anti-science, Lost Cause-revival zombie MAGA footsoldiers screeching about the “freedom!!!” they wish the government to provide them for persecuting their enemies, and other social horrors are merely the tip of the climate changing iceberg.

phobia indoctrination, illustrated

Phobia indoctrination tactics

Strategies of phobia indoctrination include Repetition and Conditioning, where fears are built through constant exposure; Misinformation and Propaganda, using false information to paint something as dangerous; Utilizing Existing Fears, exaggerating known fears or anxieties; and Social Pressure and Group Dynamics, leveraging social influences to convince others that irrational fears are common.

Other tactics include Authority and Expert Manipulation, where false credentials are used to lend legitimacy; Emotional Manipulation, appealing directly to emotions; Isolation and Control, where a person’s environment is manipulated; and Media Manipulation, using media to provoke fear.

Phobia indoctrination and cults book list:

Or, support local bookstores instead of Jeff Bezos:

Related to phobia indoctrination:

Cult Dictionary β†—

We had better get familiar with the lexicon and vocabulary of the coming era, so we can fight the creeping scourge of thought control roiling the land.

Jim Jones toasting his cult members with a cup of cyanide, by Midjourney

Disinformation Dictionary β†—

Disinformation is meant to confuse, throw off, distract, polarize, and otherwise create conflict within and between target populations.

Disinformation, by Midjourney

Cult Warning Signs: How to recognize cultish groups β†—

Recognizing cult warning signs can be vital in identifying and understanding the risk before getting involved with a group who may not have your best interests in mind.

cult warning signs, by Midjourney
Read more

authoritarians gather for a witch hunt

Many people around the world were shocked in the aftermath of World War II. How could “polite” society break down so utterly, so swiftly, and so zealously? Why did authoritarian personality traits come to dominate human affairs, seemingly out of nowhere? How thin is this veneer of civilization, really?

The authoritarian personality is characterized by excessive strictness and a propensity to exhibit oppressive behavior towards perceived subordinates. On the flip side, they treat authority figures with mindless obedience and unquestioning compliance. They also have an aversion to difference, ambiguity, complexity, and diversity.

How did they get this way? Are people born with authoritarian personalities, or is the authoritarian “made” predominately by circumstance?

Authoritarian personality studies

A braintrust of scholars, public servants, authors, psychologists, and others have been analyzing these questions ever since. Some of the most prominent thinkers on the subject of authoritarianism were either themselves affected by the Nazi regime, or lived through the war in some capacity. Other more recent contributions have built on those original foundations, refining and extending them as more new history continues to unfold with right-wing behavior to observe.

Continue reading Essential thinkers on authoritarian personality theory
Read more