Intelligence community

Peter Thiel at Isengaard looking into the Palantir

In the shadows of Washington’s policy debates, a quiet technological revolution is taking shapeβ€”one that could fundamentally alter how the federal government collects, analyzes, and potentially weaponizes data on American citizens. At the heart of this transformation sits Palantir Technologies, the secretive data analytics firm co-founded by tech billionaire Peter Thiel that has become the Trump administration’s go-to contractor for an ambitious plan to merge information across federal agencies into what critics fear could become an unprecedented surveillance apparatus.

The push represents the culmination of Thiel’s decades-long influence campaign within both Silicon Valley and right-wing politics, where he has emerged as the “godfather” of a powerful network of tech billionaires who have shifted dramatically rightward. Once the sole major Silicon Valley figure to back Trump in 2016, Thiel has watched his political philosophy spread throughout the tech elite, with former PayPal colleagues like Elon Musk and proteges like Vice President J.D. Vance now occupying the highest levels of government. This so-called “PayPal Mafia“β€”a group of billionaires with overlapping business interests and shared anti-regulatory fervorβ€”has become integral to the second Trump administration, with at least three former Palantir employees now working within Musk’s Department of Government Efficiency (DOGE).

Since Trump’s March executive order calling for expanded data sharing across government agencies, Palantir has quietly embedded itself deeper into the federal bureaucracy than ever before. The company has secured over $113 million in new federal contracts and expanded its flagship Foundry platform into at least four major agencies, including the Department of Homeland Security, Health and Human Services, and most recently, the Internal Revenue Service. This technological infrastructure could enable the administration to create detailed digital portraits of Americans by combining bank records, medical claims, student debt information, and disability statusβ€”all accessible through a single, searchable database.

The expansion reflects Thiel’s long-standing belief that “freedom and democracy are not compatible,” a philosophy that has guided his investments and political activities for over a decade. While Thiel maintains no official government position, he has direct access to the president, vice president, and virtually every tech figure in Trump’s inner circle, recently hosting an inauguration party at his Washington mansion for the “crΓ¨me de la crΓ¨me of the tech world.” As one journalist noted during the 2024 Republican National Convention, “It’s Peter Thiel’s party now”β€”a sentiment validated by the presence of his handpicked protege as vice president and his former colleagues running key government efficiency initiatives.

But the expansion has also triggered alarm bells within Palantir itself, where current and former employees worry about their company becoming the public face of Trump’s political agenda. Thirteen former employees recently signed a public letter urging the company to reconsider its role, while at least one strategist has resigned over the expanded ICE contracts, calling the work a “red line” she won’t cross.

As privacy advocates file lawsuits and Democratic lawmakers sound warnings about potential abuse, Palantir finds itself at the center of a national debate about the balance between government efficiency and civil liberties. To understand how we arrived at this momentβ€”and what it might mean for American privacyβ€”we need to examine the company behind the technology and the controversial figures who built it.

What is Palantir?

And once again I turned to Perplexity Labs to help me tell the story of Palantir in an interactive way. I am a little bit addicted to this new featureset — it is miraculous. It can build incredibly sophisticated things in a very short amount of time. To view the presentation, simply click the image below to launch it in a new Lightbox window:

And once again, the methodology and the full response are below.

Continue reading What is Palantir, and why are they building a database about you?
Read more

AOC Alexandria Ocasio-Cortez

The situation is, as they say in the military, FUBAR’d. We are under a full-on authoritarian attack to democracy in progress in broad daylight, being carried out by the (unfortunately) legitimate president and his illegitimate best buddy Elon Musk. What can we do — the situation seems so bleak, you say. I hear you and I feel you. But AOC and HCR (two of my favorite acronyms) are here to break it down about how we should not go quietly — and how to do it.

First up: what are we facing? Among other things, what is most probably the biggest data breach of all time — perpetrated by Elon’s Musk’s fake department DOGE. Former Republican strategist Stuart Stevens called Musk’s land grab of the federal till and all its payment information about citizens “the most significant data leak in cyber history.” On top of that, the conflicts of interest inherent in this unlawful caper are so staggering they’re well out of scope of this single blog post.

Elon Musk's head (poorly) stitched on to Miley Cyrus's body in the Wrecking Ball music video

Beyond that, Trump waited for Congress to go out of session before beginning the blitzkrieg of illegal Executive Orders and maneuvers designed to attack America and throw its citizens off balance. Here’s a list of the main actions we need to be pressing our Congresspeople to get answers for:

Events of the authoritarian push

Impoundment Attempt and Judicial Reversal:

  • Early in the Trump administration, an Office of Management and Budget memo attempted to freeze federal spending pending a review for alleged “DEI contamination”. A federal judge quickly ruled this action β€œblatantly unconstitutional,” forcing the administration to backtrack. However, related Executive Orders freezing some payments are said to “still be in order” which is (intentionally) causing confusion around the status of almost everything.

Elon Musk’s Intervention in the Treasury Payment System:

Breach of USAID’s Secure Systems:

  • Musk’s people, reportedly a group of young men between 19 and 24 according to Wired, attempted to access a β€œsecret area” within USAID (the agency responsible for U.S. foreign aid). In the process, two top officials were sidelined (put on administrative leave), and Musk’s team gained access, potentially compromising sensitive U.S. intelligence data.

Announced Cuts to Federal Programs:

  • Following these breaches, Musk (acting as a Trump ally) has claimed on social media that he is β€œcutting” certain federally funded programs, including a human services organization linked to the Lutheran Church. This move threatens funding for critical services such as migrant support, nursing homes, and possibly even affects Social Security and Medicare (though Trump has stated these will not be touched).

Tariffs and International Implications:

  • Additionally, Trump’s administration is imposing tariffs on Mexico, Canada, and China, which could inflict economic pain, especially in regions that predominantly support the Republican agenda.

These recent events (the inimitable Heather Cox Richardson covers them in-depth in her Letters from an American column) highlight an aggressive attack on constitutional governance marked by executive overreach and the manipulation of public funds. Actions such as unilateral spending freezesβ€”disguised (thinly) as efforts to address DEI concernsβ€”and the controversial transfer of control over federal financial systems to private interests like world’s richest man Elon Musk (who apparently still doesn’t have enough money) reveal a dangerous shift in power.

This reckless endangerment jeopardizes not only the integrity of critical public services and security measures but also the core democratic principle of accountability, underscoring an urgent need for citizens to remain vigilant and demand that elected officials uphold the constitutional order. We The People still wield the ultimate power — as AOC is about to so eloquently tell you more about.

AOC on what we can do: Do not comply in advance.

Continue reading Do Not Comply In Advance: What can we do?
Read more

What is a dictator? Not someone you wanna meet in a dark alley.

What is a dictator, and what drives the allure of absolute power? How do dictators reshape the political and social landscapes they dominate? This post explores the intricate systems of control underpinning authoritarian governance, tracing its evolution from historical precedents to modern manifestations, and examining the far-reaching consequences for societies caught in its grip.

Dictators: Unraveling the Complexity of Authoritarian Governance

Political power represents a profound and intricate spectrum of human organizational capability, with dictatorships emerging as one of its most complex and destructive manifestations. The journey of understanding dictatorships requires a nuanced exploration that transcends simple categorizations, delving deep into the historical, sociological, and psychological landscapes that enable and sustain authoritarian control.

The Essence of Dictatorial Power

At its core, a dictator represents far more than a mere political leader. These individuals — often demagogues — are architects of comprehensive systems of control, systematically dismantling institutional safeguards and reconstructing societal frameworks to serve their singular vision of governance. Unlike democratically elected leaders constrained by robust institutional checks and balances, a dictatorship operates through a sophisticated network of power consolidation that penetrates every aspect of social and political life.

The hallmark of dictatorial governance lies not just in the concentration of power, but in the systematic elimination of alternative power structures. These leaders do not simply rule; they fundamentally reshape the entire landscape of political possibility, creating environments where opposition becomes not just difficult, but potentially life-threatening.

a dictator in the style of North Korea
Continue reading What is a Dictator?
Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s TelefΓ³nica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

The FBI took the extraordinary step of initiating a counterintelligence investigation into the President of the United States, based according to the New York Times on the firing of James Comey and Trump‘s public actions surrounding that event, in which he linked the firing to the Russia investigation vociferously several times.

This is a historical first.

Hold on to your hats.

Read more