Ukraine

SOTU 2024 Joe Biden Presidential address

Strong economic messages of the Keynesian buttressing of the middle class that is Bidenomics were everywhere in evidence at last night’s State of the Union address, Biden’s third since taking office in 2021. In SOTU 2024 he spoke about stabbing trickle-down economics in its gasping heart as a repeated failure to the American people. Instead of giving another $2 trillion tax cuts to billionaires, Biden wants to give back to the people who he says built America: the middle class.

The President delivered strong, sweeping language and vision reminiscent of LBJ’s Great Society and FDR‘s New Deal. He also delivered a heartwarming sense of unity and appeal to put down our bickering and get things done for the American people.

“We all come from somewhere — but we’re all Americans.”

This while lambasting the Republicans for scuttling the deal over the popular bipartisan immigration bill thanks to 11th hour interference from TFG (“my predecessor” as JRB called him). “This bill would save lives!” He is really effective at calling out the GOP‘s hypocrisy on border security with this delivery.

“We can fight about the border or we can fix the border. Send me a bill!”

He is taking full advantage of being the incumbent candidate here. He has the power and the track record to do all these things he is promising, and he’s telling the exact truth about the Republican obstructionism preventing the American people from having their government work for them.

SOTU 2024 Joe Biden fiery speech with Kamala Harris and Mike Johnson in the background behind him

I love that he calls out Trump in this speech, without naming names — almost a kind of Voldemort effect. He who must not be named — because giving him the dignity even of a name is more than he deserves.

He says that Trump and his cabal of anti-democratic political operatives have ancient ideas (hate, revenge, reactionary, etc.) — and that you can’t lead America with ancient ideas. In America, we look towards the future — relentlessly. Americans wants a president who will protect their rights — not take them away.

“I see a future… for all Americans!” he ends with, in a segment reminiscent of the great Martin Luther King’s “I Have a Dream” speech, with its clear vision of power and authority flowing from what is morally right and just, instead of what is corrupt and cronyish. It gave me hope for the future — that Americans will make the right choice, as we seem to have done under pressure, throughout our history. ๐Ÿคž๐Ÿฝ

Continue reading Biden SOTU 2024: Success stories and big policy ideas
Read more

Malware, short for “malicious software,” is any software intentionally designed to cause damage to a computer, server, client, or computer network. This cybersecurity threat encompasses a variety of software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Each type has a different method of infection and damage.

Who uses malware and what for

Malware is utilized by a wide range of actors, from amateur hackers to sophisticated cybercriminals, and even nation-states. The motives can vary greatly:

  • Cybercriminals often deploy malware to steal personal, financial, or business information, which can be used for financial gain through fraud or direct theft.
  • Hacktivists use malware to disrupt services or bring attention to political or social causes.
  • Nation-states and state-sponsored actors might deploy sophisticated malware for espionage and intelligence, to gain strategic advantage, sabotage, or influence geopolitical dynamics.
Malware, illustrated by DALL-E 3

Role in disinformation and geopolitical espionage

Malware plays a significant role in disinformation campaigns and geopolitical espionage. State-sponsored actors might use malware to infiltrate the networks of other nations, steal sensitive information (hacked emails perhaps?), and manipulate or disrupt critical infrastructure. In terms of disinformation, malware can be used to gain unauthorized access to media outlets or social media accounts, spreading false information to influence public opinion or destabilize political situations.

Preventing malware

Preventing malware involves multiple layers of security measures:

  • Educate Users: The first line of defense is often the users themselves. Educating them about the dangers of phishing emails, not to click on suspicious links, and the importance of not downloading or opening files from unknown sources can significantly reduce the risk of malware infections.
  • Regular Software Updates: Keeping all software up to date, including operating systems and antivirus programs, can protect against known vulnerabilities that malware exploits.
  • Use Antivirus Software: A robust antivirus program can detect and remove many types of malware. Regular scans and real-time protection features are crucial.
  • Firewalls: Both hardware and software firewalls can block unauthorized access to your network, which can help prevent malware from spreading.
  • Backups: Regularly backing up important data ensures that, in the event of a malware attack, the lost data can be recovered without paying ransoms or losing critical information.

Famous malware incidents in foreign affairs

Several high-profile malware incidents have had significant implications in the realm of foreign affairs:

  • Stuxnet: Discovered in 2010, Stuxnet was a highly sophisticated worm that targeted supervisory control and data acquisition (SCADA) systems and was believed to be designed to damage Iran’s nuclear program. It is widely thought to be a cyberweapon developed by the United States and Israel, though neither has confirmed involvement.
  • WannaCry: In May 2017, the WannaCry ransomware attack affected over 200,000 computers across 150 countries, with the UK’s National Health Service, Spain’s Telefรณnica, FedEx, and Deutsche Bahn among those impacted. The attack exploited a vulnerability in Microsoft Windows, and North Korea was widely blamed for the attack.
  • NotPetya: Initially thought to be ransomware, NotPetya emerged in 2017 and caused extensive damage, particularly in Ukraine. It later spread globally, affecting businesses and causing billions of dollars in damages. It is believed to have been a state-sponsored attack originating from Russia, designed as a geopolitical tool under the guise of ransomware.
  • SolarWinds: Uncovered in December 2020, the SolarWinds hack was a sophisticated supply chain attack that compromised the Orion software suite used by numerous US government agencies and thousands of private companies. It allowed the attackers, believed to be Russian state-sponsored, to spy on the internal communications of affected organizations for months.

In conclusion, malware is a versatile and dangerous tool in the hands of cybercriminals and state actors alike, used for everything from financial theft to sophisticated geopolitical maneuvers. The proliferation of malware in global affairs underscores the need for robust cybersecurity practices at all levels, from individual users to national governments. Awareness, education, and the implementation of comprehensive security measures are key to defending against the threats posed by malware.

Read more

Sockpuppets are fake social media accounts used by trolls for deceptive and covert actions, avoiding culpability for abuse, aggression, death threats, doxxing, and other criminal acts against targets.

In the digital age, the battleground for political influence has extended beyond traditional media to the vast, interconnected realm of social media. Central to this new frontier are “sockpuppet” accounts – fake online personas created for deceptive purposes. These shadowy figures have become tools in the hands of authoritarian regimes, perhaps most notably Russia, to manipulate public opinion and infiltrate the political systems of countries like the UK, Ukraine, and the US.

What are sockpuppet accounts?

A sockpuppet account is a fake online identity used for purposes of deception. Unlike simple trolls or spam accounts, sockpuppets are more sophisticated. They mimic real users, often stealing photos and personal data to appear authentic. These accounts engage in activities ranging from posting comments to spreading disinformation, all designed to manipulate public opinion.

The Strategic Use of Sockpuppets

Sockpuppet accounts are a cog in the larger machinery of cyber warfare. They play a critical role in shaping narratives and influencing public discourse. In countries like Russia, where the state exerts considerable control over media, these accounts are often state-sponsored or affiliated with groups that align with government interests.

Case Studies: Russia’s global reach

  1. The United Kingdom: Investigations have revealed Russian interference in the Brexit referendum. Sockpuppet accounts spread divisive content to influence public opinion and exacerbate social tensions. Their goal was to weaken the European Union by supporting the UK’s departure.
  2. Ukraine: Russia’s geopolitical interests in Ukraine have been furthered through a barrage of sockpuppet accounts. These accounts disseminate pro-Russian propaganda and misinformation to destabilize Ukraine’s political landscape, particularly during times of crisis, elections, or — most notably — during its own current war of aggression against its neighbor nation.
  3. The United States: The 2016 US Presidential elections saw an unprecedented level of interference. Russian sockpuppets spread divisive content, fake news, and even organized real-life events, creating an environment of distrust and chaos. Their goal was to sow discord and undermine the democratic process.
Vladimir Putin with his sheep, by Midjourney

How sockpuppets operate

Sockpuppets often work in networks, creating an echo chamber effect. They amplify messages, create false trends, and give the illusion of widespread support for a particular viewpoint. Advanced tactics include deepfakes and AI-generated text, making it increasingly difficult to distinguish between real and fake content.

Detection and countermeasures

Detecting sockpuppets is challenging due to their evolving sophistication. Social media platforms are employing AI-based algorithms to identify and remove these accounts. However, the arms race between detection methods and evasion techniques continues. Governments and independent watchdogs also play a crucial role in exposing such operations.

Implications for democracy

The use of sockpuppet accounts by authoritarian regimes like Russia poses a significant threat to democratic processes. By influencing public opinion and political outcomes in other countries, they undermine the very essence of democracy โ€“ the informed consent of the governed. This digital interference erodes trust in democratic institutions and fuels political polarization.

As we continue to navigate the complex landscape of digital information, the challenge posed by sockpuppet accounts remains significant. Awareness and vigilance are key. Social media platforms, governments, and individuals must collaborate to safeguard the integrity of our political systems. As citizens, staying informed and critically evaluating online information is our first line of defense against this invisible but potent threat.

Read more

Some of us have been boning up on this topic for about 6 years already, while others are just tuning in now based on the horrors of recent events. It can be overwhelming to come in cold, so here — don’t go it alone! Take this:

Putin’s war against the west

President Biden “declassified” an intelligence analysis many of us had arrived at some time ago: Russian president Vladimir Putin is a cruel revanchist leader who will stop at nothing to claw out a larger legacy before he dies. His goal is nothing less than reconstituting the former Soviet Union and restoring the “glory” of the Russian empire of yesteryear. And for some reason he thinks the world community is going to let him get away with his delusional fever dreams of conquest — as if fever dreams of Mongol domination are still de rigueur.

The attacks on the 2016 election and on the American Capitol in 2021 are related — both are Russian hybrid warfare operations. Russia also is the cold beating heart of the right-wing authoritarianism movement around the world, via financial, political, psychological, economic, and other means of government and regulatory capture.

Putin has hated democracy for a long time — since before the Berlin Wall fell where he was stationed in East Berlin as a young KGB agent, taking the news hard. Now, he has many fifth column confederates aiding and abetting him from within the United States — a number of them brazenly, and openly. It is getting harder and harder for those treasonous types to “hide out” in the folds of disinformation, misinformation, and plausible deniability. The play is being called — and everyone will need to decide if they’re for democracy or authoritarianism.

Further reading:

Media Resources

Twitter Lists

Read more

Titushki (or titushky) are paid street thugs sent to act as provocateurs, who provoke clashes or destroy property to tarnish peaceful protests and blame the left for “violence.”

The concept is from Ukraine, where it was first employed by later ousted President Viktor Yanukovych. He hired street hooligans in civilian clothing to perform illegal acts including street beatings, carjackings, kidnappings, and murders. Their purpose was both to intimidate the opposition against his government and create pretexts for arresting pro-democracy protestors.

During the events of Euromaidan in 2013-14, Yanukovich’s Party of Regions paid titushki about $100 per day to blend into peaceful crowds and start picking fights. After violence broke out, mass arrests would disperse the gatherings and round up protestors — and the titushki were again used as either “witnesses or “victims” for the show trials of these ginned up “crimes.”

Titushki in the U.S.?

During the George Floyd protests in summer 2020, city officials in Atlanta, Minneapolis, and elsewhere reported a pattern of out-of-town agents provacateur escalating peaceful protests and instigating aggression, incitement, and property damage. A Ukranian immigrant family in Idaho with no prior political activity organized one of the most important pro-Trump demonstrations of the summer in Portland, out of nowhere. There was umbrella man. He may be more likely aligned with the white nationalist groups who were also id’d as instigating violence and who also have an undercover plot against America going on so, you know, strange bedfellows!

Read more

While we wring our hands in the United States over whether or not such a strategy is even conceivable, the erstwhile President of Russia has been running this playbook out in the open in Ukraine and Eastern Europe for some time. With help from Propagandist-in-Chief Vladislav Surkov, Putin has leveraged the open secrets about the psychology of crowds we learned in the late 19th and early 20th century to stir up emotional antagonisms within the political spectrum — to predictable results.

It’s no accident that fascism is on the march in America. The conditions have been brewing for some time, predominantly since the Conservative movement began breaking away more militantly from democratic principles and towards authoritarian philosophy (elite rule by force: preferably invisible force via economic hegemony for the middle and upper classes, and violent force / the carceral state for The Undesirables) in the late 1970s and 1980s. All Putin had to do was make use of available prevailing conditions and tools — the rise of social media in the 2000s counterintuitively blew a gaping wide security hole in the American persuasion landscape that Cold War Soviet operatives of the 1960s would scarcely have believed.

Today, as in parts of Europe between the world wars, the U.S. has partisan gridlock within The Establishment sector of politics; this exacerbates the impatience with and contempt for the status quo (aka the Liberal world order) that in some sense naturally congeals at the far right and far left margins of the political spectrum as a simple consequence of the Normal Distribution (the Median Voter Theorem captures this tendency quite succinctly). Under such conditions, an influence campaign like the one Russia wielded against the United States during the 2016 election season was tasked merely with tilting the playing field a little further — a task that platforms like Facebook and Twitter were in some sense fundamentally engineered to accomplish, in exchange for ad revenue.

New World Order? Be careful what we wish for

“Both Italian and German fascists had done their best to make democracy work badly. But the deadlock of liberal constitutions was not something the fascists alone had brought about. ‘The collapse of the Liberal state,’ says Roberto Vivarelli, ‘occurred independently of fascism.’ At the time it was tempting to see the malfunction of democratic government after 1918 as a systemic crisis marking the historic terminus of liberalism. Since the revival of constitutional democracy since World War II, it has seemed more plausible to see it as a circumstantial crisis growing out of the strains of World War I, a sudden enlargement of democracy, and the Bolshevik Revolution. However we interpret the deadlock of democratic government, no fascist movement is likely to reach office without it.”

— Robert O. Paxton, The Anatomy of Fascism

100 years on, it feels like we’re back at the start.

Read more

I still see a lot of denialism on this point about the DNC email hacks from the far-left (or the alt-left, depending on your favored terminology), which is a bit devastating to see as it essentially parrots the pro-Russian ideology of the far-right (both the alt-right and the neo-libertarian flavors). Green Party candidate Jill Stein is an especially pernicious promoter of this myth that Vladimir Putin is a poor, innocent, peaceful world leader who is being bullied by NATO (when in fact, Russia has been the aggressor since its annexation of Crimea in 2014).

DNC email hacks forensic evidence

Two separate Russian-affiliated adversaries were behind the attacks, according to a post-mortem by cyber-security firm CrowdStrike when the news of the intrusion first broke in early June, 2016. This has since been confirmed by other independent security firms including Fidelis, Mandiant, SecureWorks, and ThreatConnect as well as corroborated by analysis from Ars Technica and Edward Snowden.

At this point the US intelligence community is confident enough to formally accuse Russia of involvement in the hacks, and are currently investigating other breaches of voter registration databases in Arizona and Illinois as well as in Floridaโ€Šโ€”โ€Šthe key battleground state from the 2000 election that handed GWB an unfortunate victory. Elsewhere, there is ample evidence of Putinโ€™s extensive disinformation campaign being waged online (including several experiences I have myself witnessed), which is the continuation of a long through line of wielding propaganda as a tool from the former head of the KGB.

Related:

  • A timeline of recent Russian aggression
  • A RussiaGate Dictionary: Lexicon for the New Cold War
  • A RussiaGate Bestiary: Principal actors and related extras in the 2016 election scandal
  • The Russian Mafia State: How the former USSR has become a sclerotic kleptocracy under the rule of former KGB agent Vladimir Putin, who vowed revenge on the West after his station in Dresden, East Germany was overrun by angry citizens during the month leading up to the fall of the Berlin Wall.
Read more