Intelligence community

AOC Alexandria Ocasio-Cortez

The situation is, as they say in the military, FUBAR’d. We are under a full-on authoritarian attack to democracy in progress in broad daylight, being carried out by the (unfortunately) legitimate president and his illegitimate best buddy Elon Musk. What can we do — the situation seems so bleak, you say. I hear you and I feel you. But AOC and HCR (two of my favorite acronyms) are here to break it down about how we should not go quietly — and how to do it.

First up: what are we facing? Among other things, what is most probably the biggest data breach of all time. Former Republican strategist Stuart Stevens called Elon Musk’s land grab of the federal till and all its payment information about citizens “the most significant data leak in cyber history.” On top of that, the conflicts of interest inherent in this unlawful caper are so staggering they’re well out of scope of this single blog post.

Elon Musk's head (poorly) stitched on to Miley Cyrus's body in the Wrecking Ball music video

Beyond that, Trump waited for Congress to go out of session before beginning the blitzkrieg of illegal Executive Orders and maneuvers designed to attack America and throw its citizens off balance. Here’s a list of the main actions we need to be pressing our Congresspeople to get answers for:

Events of the authoritarian push

Impoundment Attempt and Judicial Reversal:

  • Early in the Trump administration, an Office of Management and Budget memo attempted to freeze federal spending pending a review for alleged “DEI contamination”. A federal judge quickly ruled this action โ€œblatantly unconstitutional,โ€ forcing the administration to backtrack. However, related Executive Orders freezing some payments are said to “still be in order” which is (intentionally) causing confusion around the status of almost everything.

Elon Muskโ€™s Intervention in the Treasury Payment System:

Breach of USAIDโ€™s Secure Systems:

  • Muskโ€™s people, reportedly a group of young men between 19 and 24 according to Wired, attempted to access a โ€œsecret areaโ€ within USAID (the agency responsible for U.S. foreign aid). In the process, two top officials were sidelined (put on administrative leave), and Muskโ€™s team gained access, potentially compromising sensitive U.S. intelligence data.

Announced Cuts to Federal Programs:

  • Following these breaches, Musk (acting as a Trump ally) has claimed on social media that he is โ€œcuttingโ€ certain federally funded programs, including a human services organization linked to the Lutheran Church. This move threatens funding for critical services such as migrant support, nursing homes, and possibly even affects Social Security and Medicare (though Trump has stated these will not be touched).

Tariffs and International Implications:

  • Additionally, Trumpโ€™s administration is imposing tariffs on Mexico, Canada, and China, which could inflict economic pain, especially in regions that predominantly support the Republican agenda.

These recent events (the inimitable Heather Cox Richardson covers them in-depth in her Letters from an American column) highlight an aggressive attack on constitutional governance marked by executive overreach and the manipulation of public funds. Actions such as unilateral spending freezesโ€”disguised (thinly) as efforts to address DEI concernsโ€”and the controversial transfer of control over federal financial systems to private interests like world’s richest man Elon Musk (who apparently still doesn’t have enough money) reveal a dangerous shift in power.

This reckless endangerment jeopardizes not only the integrity of critical public services and security measures but also the core democratic principle of accountability, underscoring an urgent need for citizens to remain vigilant and demand that elected officials uphold the constitutional order. We The People still wield the ultimate power — as AOC is about to so eloquently tell you more about.

AOC on what we can do: Do not comply in advance.

Continue reading Do Not Comply In Advance: What can we do?
Read more

What is a dictator? Not someone you wanna meet in a dark alley.

What is a dictator, and what drives the allure of absolute power? How do dictators reshape the political and social landscapes they dominate? This post explores the intricate systems of control underpinning authoritarian governance, tracing its evolution from historical precedents to modern manifestations, and examining the far-reaching consequences for societies caught in its grip.

Dictators: Unraveling the Complexity of Authoritarian Governance

Political power represents a profound and intricate spectrum of human organizational capability, with dictatorships emerging as one of its most complex and destructive manifestations. The journey of understanding dictatorships requires a nuanced exploration that transcends simple categorizations, delving deep into the historical, sociological, and psychological landscapes that enable and sustain authoritarian control.

The Essence of Dictatorial Power

At its core, a dictator represents far more than a mere political leader. These individuals — often demagogues — are architects of comprehensive systems of control, systematically dismantling institutional safeguards and reconstructing societal frameworks to serve their singular vision of governance. Unlike democratically elected leaders constrained by robust institutional checks and balances, a dictatorship operates through a sophisticated network of power consolidation that penetrates every aspect of social and political life.

The hallmark of dictatorial governance lies not just in the concentration of power, but in the systematic elimination of alternative power structures. These leaders do not simply rule; they fundamentally reshape the entire landscape of political possibility, creating environments where opposition becomes not just difficult, but potentially life-threatening.

a dictator in the style of North Korea
Continue reading What is a Dictator?
Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s Telefรณnica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

The FBI took the extraordinary step of initiating a counterintelligence investigation into the President of the United States, based according to the New York Times on the firing of James Comey and Trump‘s public actions surrounding that event, in which he linked the firing to the Russia investigation vociferously several times.

This is a historical first.

Hold on to your hats.

Read more