#given that it's about cybersecurity
Explore tagged Tumblr posts
Text
I miss the movie genre of "normal, nerdy, possibly autistic woman gets drawn into Dangerous Shenanigans by an attractive charming man with her worst interests at heart and she privately fights for her life and quietly saves the world, going back to her normal life with a renewed sense of confidence and What Matters Most" that had its heyday in the late '80s to the mid-'90s
#the heathers#but also#the net#please tag this#with whatever movie you think I'm talking about#I want more movies to watch#or rewatch#as the case may be#also please watch the heathers#if you haven't seen it#the movie#I mean watch the musical too#it's also very good#but they're good in v different ways#also please god watch the net#it holds up SHOCKINGLY well#given that it's about cybersecurity#and computer viruses#in the '90s
6 notes
·
View notes
Text

When Noem testified before the Senate Appropriations Subcommittee on Homeland Security, ranking member Senator Chris Murphy gave such powerful, informative, and important opening remarks I have to share:
youtube
transcript:
"I say this with seriousness and respect, but your department is out of control.
"You’re spending like you don’t have a budget. You are running out of money for this fiscal year. You are illegally refusing to spend funds that have been authorized by this Congress and appropriated by this committee. You are ignoring the immigration laws of this nation, implementing a brand new immigration system that you have invented that has little relation to the statutes that you are required to follow as spelled out in your oath of office. You are routinely violating the rights of immigrants who may not be citizens, but whether you like it or not, they have constitutional and statutory rights when they reside in the United States.
"Your agency acts as if laws don’t matter, as if the election gave you some mandate to violate the Constitution and the laws passed by this Congress. It did not give you that mandate. You act as if your disagreement with the law, or even the public’s disagreement with the law, is relevant and gives you the ability to create your own law. It does not give you that ability.
"Let’s start with your spending. You are on track to trigger the Anti-Deficiency act. That means you are on track to spend more money than you have been allocated by Congress. This is a rare occurrence and it is wildly illegal.
"Your agency will be broke by July, over two months before the end of the fiscal year. You may not think that Congress has allotted enough money to ICE, but the Constitution and the federal law does not allow you to spend more money than you have been given or to invent money.
"This obsession with spending at the border has left the country unprotected elsewhere. The security threats to national security are higher, not lower, since Trump came to office. To fund the border you have illegally gutted spending to cybersecurity.
"As we speak, Russian and Chinese hackers are having a field day attacking our nation. You have withdrawn funds for disaster prevention. Storms are going to kill more people because of your illegal withholding of these funds. Your myopia about the border fueled by President Trump’s prejudice against people who speak a different language have shattered most of this country’s most important defenses.
"Now let’s talk about the impoundments. When Congress appropriates funds for a specific purpose the administration has no discretion whether or not to spend that money unless you go through a specific process with this committee.
"Let me give you two of many instances of this illegal impoundment. The first is a shelter and services program. Senator Britt may want to zero that account out, but that account is funded in a bipartisan way. You may not like the program. Your policy is to treat migrants badly. I think that’s abhorrent, but it doesn’t matter that you don’t like the program. You cannot cancel spending in this program, and you cannot use the funds, as you have, to fund other things, like ICE.
"You have also cancelled citizenship and integration grants, which help lawful permanent residents become citizens, helping them take the citizenship test. I know your goal is to try to make life as hard as possible for immigrants, but that goal is not broadly shared by the American public. That’s why Congress, in a bipartisan way, for decades has funded this program to help immigrants become citizens.
"Now let’s talk about why encounters at the southern border are down so much. This is clearly going to be your primary talking point today. You will tell us that it represents as success. But the prime reason why encounters are down is because you are brazenly violating the law every hour of every day.
"You are refusing to allow people showing up at the southern border to apply for asylum. I acknowledge that you don’t believe that people should be allowed to apply for asylum, but the White House doesn’t get to choose that. The law requires you to process people who are showing up at the border to apply for asylum.
"Why? Because our asylum law is a bipartisan commitment, an effort to correct for our nation’s unconscionable decision to deny entry to Jews to this country who were being hunted and killed by the Nazis. Our nation, Republicans and Democrats, decided, wrote it into law, that we would not repeat that horror ever again, and thus we would allow for people who were fleeing terror and torture to come here, arrive at the border, and make a case for asylum.
"Finally let’s talk about these disappearances. In an autocratic society, people who the regime does not like or who are protesting the regime are often picked up off the street, and spirited away, often to open-ended detention. Sometimes they’re never seen again.
"What you are doing, both to individuals who have legal rights to stay here, like Kilmar Abrego Garcia, or students who are just protesting Trump’s policies, is immoral and, to follow the theme, it is illegal. You have no right to deport a student visa holder with no due process simply because they have spoken in a way that offends the President. You can’t remove migrants whom a court has given humanitarian protection from removal.
"Now, reports suggest that you are planning to remove immigrants with no due process and send them to prisons in Libya. Libya is in the middle of a civil war. It is subject to a level 4 travel advisory, meaning we tell American citizens never to travel to Libya. We don’t have an embassy there because it is not safe for our diplomats. Sending migrants with pending asylum claims into a war zone, just because it’s cruel, is so deeply disturbing.
"Listen, I understand that my Republican colleagues on this committee don’t view the policy as I do, don’t share my level of concern for the way the government treats immigrants, but what I don’t understand is why we don’t have consensus in the Senate and on this committee on the decision by this administration to impound the spending that we have decided together to allocate in defense of this nation.
"We as an appropriations committee worked interminable hours to write and pass this budget, and so we make ourselves irrelevant when we allow the administration to ignore what we have decided. And then when we look the other way when the administration rounds up immigrants who are here illegally and have committed no offenses worthy of detainment, we also do potential irreversible damage to the Constitution.
"These should not be partisan concerns—destroying the power of Congress, eroding individuals’ Constitutional rights. This should matter to both parties."
_
I never knew that our asylum laws arose from when we didn’t take Jews escaping from the Nazis. Both parties said never again. Yet here we are.
Everything this "administration" is doing is impeachable, and this Congress has a responsibility to get these criminals out of office and keep them out.
Contact your representatives and demand that they hold Homeland Security to account if they want to keep holding their offices - if they in fact want those offices to still be a thing in the future.
#protest#the resistance#senator Chris Murphy#department of homeland security#musk-trump regime#us politics#long posts#my screencaps#Youtube
6K notes
·
View notes
Text
DCxDP Fanfic Idea: Not My Business
Danny Fenton develops a unique set of skills throughout his life. He knew how to disarm a bomb when he was seven, thanks to his Dad making minebombs in the front yard as a ghost defense. (They only covered humans in ecto-goo, but it was the same concept of not wanting to have it explode on him)
He knew how to fight with a bo-staff only because he had to fight off the meals his parents brought back to life with a broom. He knew how to balance a checkbook, file tax forms, and properly build credit by the time he was ten, thanks to the years his parents ran a business at the kitchen table.
His sister taught him how to charm rude customers with a smile, how to lie without flinching, and how to complete all his assignments on time, despite having only a few hours to do so. She spent a lot of time volunteering, often dragging him along, which allowed Danny to build up his resume with both soft and hard skills he likely would never have thought there was a name for.
Problem-solving, teamwork, communication, time management, adaptability, data analysis, cybersecurity, data entry, and copywriting were the skills that Jazz focused on the most. She all but beat them into his head.
Along with cooking, sewing, basic plumbing, basic mechanics, and budgeting. Jazz was the one who looked for practical abilities.
That left time for his mom and dad to teach him things like forging, combat training, reprogramming everyday objects into weaponry, defending his position before a board for grant money, turning everyday household liquids into knock-out gas, and how to talk his way out of traffic tickets.
Not to mention everything he learn as Phantom.
Danny knew how to verify jewels and gold due to the years spent in the ghost zone fighting off pirates and treasure hunters. Phantom's reputation made him a target for many ghosts who wanted to add his rarity to their collections.
How to command a room, then a town, and finally an army. Diplomatic missions increased in number as he began meeting with the leaders of various sectors within the Ghost Zones.
Really, Danny didn't make a whole lot of sense, if anyone bothered to ask him how he came to this set of skills. The thing was, unlike the rest of his family, Danny was far too reserved to show them off. He edged the line of shyness from a young age, which sometimes bled into reclusive tendencies.
He didn't get anxious from social interactions; he just didn't feel like seeking them out. Sam and Tucker felt a similar way, as they were always willing to talk to a stranger, but they tried to branch out of their safe little bubble to make friends rather than acquaintances. Then the summer between sophomore and junior year happened.
Sam, Danny, and Tucker left tenth grade as plain losers only to arrive in junior with a splash.
The trio noticed that people were staring at them more intensely than they had been before. That they were used to, what they weren't used to was that the stares were not mocking or dismissive.
It was odd, but it didn't click on why that was until winter break, and more specifically, Star's Holiday party.
Ever since the fourth grade, Star hosted the biggest party of their generation. Her parents owned the local fun center, which featured indoor kart racing, laser tag, arcade games, paintball, and virtual reality pods. Everyone tripped over themselves to be given an invitation as she offered a full day and night of free entertainment at the center.
It always ended with wild stories of teenage fun that Danny always wanted to see in person, rather than hearing about in the hallways the next day. Not that everyone in their grade went. The invitation list was super selective (Star's parents did lose a lot of profit for letting their daughter do that)
You either received an invitation from the party girl herself, or you were asked to be a plus one, which was just as much of an honor as it was a symbol of social status among the teenage population of Amity Park.
The trio was never invited, which is why they were already making their way to the student parking lot when Star stood in the courtyard, holding up the scarred envelopes. Inside them was the bracelet that one had to scan at the door of her center to let people in. It was how her father ensured only the agreed-upon guests stayed at that number.
In the middle of making plans for hot chocolate at Sam's favorite poetry slam cafe, Star had run at Tucker's car, practically falling over to knock on his window. Danny had never been so confused in his life as his friend rolled down his window to arch a brow at the girl.
She stuttered her way through a pathetic request for fashion advice that Tucker easily answered in two sentences. Sam snickered as Star seemed unsure what to do with Tucker's lack of interest in her or her popularity.
Ever since Tucker started focusing more on his self-confidence and joined the fashion community, he hadn't been so girl-crazy nor as desperate to get one's attention.
Just as Danny reminded Tucker that other cars were waiting for them to clear the road, Star had pushed three envelopes into the driver's hand and run off with a red face.
Tucker stared at the envelopes in his hands with a wild look that both Sam and Danny shared. They slowly kicked their brains back into gear when an angry honk from the car behind them sounded, and they ended up silently driving the cafe, still in a daze.
Jazz laughed herself silly when they rang her up to ask if she thought it was a trick (Sam was sure they were going to be Carrie-ed), a mistake (Danny insisted Star had gone to the wrong car, but due to the tinting, didn't realize until it was too late). Or a genuine invitation (Tcuker had always been the most optimistic of the three).
"Haven't you three ever wondered why Spectra used emotion-based ectoplasm for her appearance?" She giggled, "It makes people hot. And you guys literally spend all summer in the Ghost Zone during your internships, feeling human emotions while being exposed to natural ectoplasm. You three came back looking good."
That was a shock.
The summer apprenticeships had been a compromise between Sam and her parents. They were growing tired of her not growing out of her "phase" and were threatening to send her to a military camp to straighten her out.
Thankfully, Jazz had stepped in, brilliantly changing their minds into allowing the college student to match Sam up with a well-known friend as a mentor. She even threw Danny and Tucker into her "program" to further show that it was just what Sam needed to stop her from being a troubled teen.
Since only Maddie and Jack knew about Phantom, it took some effort among all of them to create fake websites and legitimate-looking summer programs before Sam, Tucker, and Danny arrived in the Ghost Zone in different vehicles to spend their summers. It helped that Ghostwriter owed them a favor, and he brought the programs to life.
Danny was learning medical practices of various species with Frostbite. Sam was with Princess Dorathea, learning how to govern and manage a large estate. Tucker had taken Wulf up on his offer to join him through the Ghost Zone's wildness, allowing Tucker to experience life off-screen and learn more about animals.
Jazz had said she placed them out of their comfort zones, but with trusted ghosts that could help them build well-rounded characters. At first, it wasn't for them, but the trio found themselves falling in love with their activities.
By the time they came back, they had many stories and exceptional skills to share with their parents. Sam's parents weren't happy she was still a goth, but they did appreciate her newfound determination to connect with them and her interest in running companies like the family business.
Tucker's parents were amazed by the muscles he gained and how he started to limit his screen time. He still loves his tech, but now he was branching out into fashion, helping out around the house, and appreciating animals and nature like never before.
Maddie and Jack watched as Danny grew more empathic while becoming more sure of what to do in stressful situations. Confidence that their son desperately needed had been gifted to him over the summer. He no longer lowered his eyes or slouched, even if his awkwardness lingered a bit.
That apparently made them hot? Yes, it did.
At Star's party, even though the three kept to themselves, laughing and hanging out as normal, people were constantly attempting to talk to them or simply flushing whenever they made eye contact. Danny, Sam, and Tucker all agreed that they no longer wanted to be popular.
They stay firmly behind unbreakable walls even as the party skyrocketed them to the same level of popularity as the A-listers (they refused to join the club). The three were more excited to return to their summer internships the following summer.
By the time graduation rolled around, Danny, Sam, and Tucker had been voted the most attractive and the most likely to succeed. They were a new type of untouchable royalty walking the halls of Casper High.
It came as no surprise that their resumes and internships got them offers from various colleges, not to mention their looks. Jazz, by that point, was still working on her degree at Gotham U, so the three chose to go there.
Danny was studying to become a doctor, Sam was in business, and Tucker chose computer sciences. They had moved into a house that Sam's parents bought for them, allowing Jazz to move out of the dorms into the spare room. Things were going great for a while, living in the big city and being adults on their own for the first time.
Then Danny applied for an internship at Martha Wayne Memorial Hospital in the administrative area- Sam convinced him it would be a good way to get a foot in the door when he applied to medical school. He needed someone to write him rec letters.- And one night, when he was working late on data entry, he happened to see Batman's maskless fall out of a portal produced by a trenchcoat man.
The trenchcoat man carried Batman to the abandoned operating room that had been left behind when they remodeled the place and converted it into offices, followed by the rest of the Bats. Their faces were covered entirely, but it did not hide their worry as they rushed to catch up with the pair.
A woman wearing scrubs pushed through the portal and the group of masked heroes, barking out orders to prepare the room.
There was a magic spell wrapped around the group that typically would have made them invisible, and erase their importance in the mind of whoever looked at them, as if they were from a forgotten dream. Still, Danny's ecto contamination made him immune to the spell, so he witnessed the whole thing.
Huh. Bruce Wayne was Batman. Neat.
Danny figured it wasn't his business and turned back to his two monitors to finish the Excel spreadsheet he was working on. He later left after saving his work, ignoring the fact that he now knew why the operating room had been left untouched, despite having all that technology on standby.
He would get home, mention it over a plate of reheated pizza, while Tucker would be working on an essay due at midnight. His best friend would shrug, claiming his own ectoplasim had made him immune to Poison Ivy's plants- they were shockingly similar to some of the plants Wulf and he encountered in the Ghost Zone- and had seen Red Robin's face after the man had been sprayed in the face and some of the powder lingered on his mask.
Apparently, Tucker's midnight essay writing had given him a familiar, dazed college look of exhaustion. Still, since he wasn't freaking out at the man eating plants, Red Robin had thought him too gone on whatever Posion Ivy how dosed the crowd of hostages with, to worry about his bare face. He had merely moved Tucker somewhere safe, stabbed him in the thigh with a needle, which had been rude according to Tucker, and run off to fight Ivy.
Red Robin was Tim Drake. Neat.
The two changed the subject to a TV show, but eventually Tucker had to focus on his essay, and they fell silent.
The following morning, Sam reported that she, too, had figured out a Gotham Hero's identity by accident. Her ectoplasim contamination had made her an attractive goth, who was approached by a blushing Damian Wayne to ask her to model her alternative style for his art club.
At the offer of a bit of pocket change, Sam had agreed to follow the art club president to a park where a group of teenagers were setting up canvases and easels. They asked her to sit on the park fountain for a few hours while they tried to capture her likeness in charcoal.
During the session, she noticed a change in Damian's movement as he grew more relaxed and his old habits began to shine through. Princess Dorathea had taught her the dangers of the court and how to notice little changes in body language that could keep her safe.
She thought it was odd that Damian moved like an assassin, reaching for a small knife in the same way he wielded his charcoal. It made sense later when she was rescued by Robin on her walk home from a would-be mugging and noticed the same little habits.
Robin was Damian Wayne. Neat.
If three of the many Bats were Waynes or connected to the famous family, it only logically makes sense that the rest were all Waynes too. Double neat.
The only one who was sincerely shocked by this reveal was Jazz, who had not even a hint of suspicion that Bruce Wayne was Batman.
"This is huge!" Jazz gasps, "Don't you guys realize how crazy this is!?"
"I mean, sure," Tucker slowly responded, sharing a confused glance with Sam and Danny. "But it's not really our business, is it? It's not like Danny is in the hero scene anymore."
"Well, yes but come on it's Batman!"
"I don't think Batman even cares about us, much less his Bruce persona. As someone from the bottom of the first class, trust me, the top of the first class doesn't even notice us taking up space. " Sam laughs, shaking her head. Danny hesitates to mention that Bruce Wayne has stopped by his office multiple times to bring coffee for all his coworkers, but figures the man must do that for all his employees.
Miles and miles away in Wayne Manor, Bruce narrows his eyes at the three screens displaying three newly graduated teens covered in paranormal residue. It's possible that they were all haunted and just didn't know it, which was a common thing, according to the Justice League Dark.
After some digging into their background, he found that companies, summer camps, and internships had all been fabricated by an incredible hacker who provided an oddly convincing cover-up for the various skills the trio possessed. Again, the Justice League Dark also stated that it was common, as that was a tactic the Otherworlders frequently used on humans to leech onto them.
Like a gas station in the middle of nowhere that was there and then it wasn't a few days later.
The three weren't experiencing any negative emotions, which meant whatever was haunting them would soon pass, and it wasn't necessary to intervene. Zatanna promised Bruce that everything was fine.
He had some doubts.
So far, the three have been doing everyday things that first-year college students typically do, and yet, Bruce's children have reported seeing the three often in their civilian lives.
Foley worked out at the same gym Dick did and was often at the ramen shop Jason just helped one of his friends open. Manson began spending time at Cass's favorite café and attended Duke's poetry nights as an observer. Fenton, the male one, was literally working a few floors below Tim.
A coincidence?
Or was it something nefarious at play?
Bruce decided to wait and see what happens.
#dcxdpdabbles#dcxdp crossover#Not My Business#Part 1#The trio are just a guy in Gotham but very not JUST a guy vibes#They new in town#they hot#And they know how to mind their business#Yes Damian has a crush on Sam#Not Everlasting trio#Just good friends#With a dash of codependce#Jazz is thier wine aunt#Bruce thinks the three are sus but can't prove why
2K notes
·
View notes
Text
Autoenshittification

Forget F1: the only car race that matters now is the race to turn your car into a digital extraction machine, a high-speed inkjet printer on wheels, stealing your private data as it picks your pocket. Your car’s digital infrastructure is a costly, dangerous nightmare — but for automakers in pursuit of postcapitalist utopia, it’s a dream they can’t give up on.
Your car is stuffed full of microchips, a fact the world came to appreciate after the pandemic struck and auto production ground to a halt due to chip shortages. Of course, that wasn’t the whole story: when the pandemic started, the automakers panicked and canceled their chip orders, only to immediately regret that decision and place new orders.
But it was too late: semiconductor production had taken a serious body-blow, and when Big Car placed its new chip orders, it went to the back of a long, slow-moving line. It was a catastrophic bungle: microchips are so integral to car production that a car is basically a computer network on wheels that you stick your fragile human body into and pray.
The car manufacturers got so desperate for chips that they started buying up washing machines for the microchips in them, extracting the chips and discarding the washing machines like some absurdo-dystopian cyberpunk walnut-shelling machine:
https://www.autoevolution.com/news/desperate-times-companies-buy-washing-machines-just-to-rip-out-the-chips-187033.html
These digital systems are a huge problem for the car companies. They are the underlying cause of a precipitous decline in car quality. From touch-based digital door-locks to networked sensors and cameras, every digital system in your car is a source of endless repair nightmares, costly recalls and cybersecurity vulnerabilities:
https://www.reuters.com/business/autos-transportation/quality-new-vehicles-us-declining-more-tech-use-study-shows-2023-06-22/
What’s more, drivers hate all the digital bullshit, from the janky touchscreens to the shitty, wildly insecure apps. Digital systems are drivers’ most significant point of dissatisfaction with the automakers’ products:
https://www.theverge.com/23801545/car-infotainment-customer-satisifaction-survey-jd-power
Even the automakers sorta-kinda admit that this is a problem. Back in 2020 when Massachusetts was having a Right-to-Repair ballot initiative, Big Car ran these unfuckingbelievable scare ads that basically said, “Your car spies on you so comprehensively that giving anyone else access to its systems will let murderers stalk you to your home and kill you:
https://pluralistic.net/2020/09/03/rip-david-graeber/#rolling-surveillance-platforms
But even amid all the complaining about cars getting stuck in the Internet of Shit, there’s still not much discussion of why the car-makers are making their products less attractive, less reliable, less safe, and less resilient by stuffing them full of microchips. Are car execs just the latest generation of rubes who’ve been suckered by Silicon Valley bullshit and convinced that apps are a magic path to profitability?
Nope. Car execs are sophisticated businesspeople, and they’re surfing capitalism’s latest — and last — hot trend: dismantling capitalism itself.
Now, leftists have been predicting the death of capitalism since The Communist Manifesto, but even Marx and Engels warned us not to get too frisky: capitalism, they wrote, is endlessly creative, constantly reinventing itself, re-emerging from each crisis in a new form that is perfectly adapted to the post-crisis reality:
https://www.nytimes.com/2022/10/31/books/review/a-spectre-haunting-china-mieville.html
But capitalism has finally run out of gas. In his forthcoming book, Techno Feudalism: What Killed Capitalism, Yanis Varoufakis proposes that capitalism has died — but it wasn’t replaced by socialism. Rather, capitalism has given way to feudalism:
https://www.penguin.co.uk/books/451795/technofeudalism-by-varoufakis-yanis/9781847927279
Under capitalism, capital is the prime mover. The people who own and mobilize capital — the capitalists — organize the economy and take the lion’s share of its returns. But it wasn’t always this way: for hundreds of years, European civilization was dominated by rents, not markets.
A “rent” is income that you get from owning something that other people need to produce value. Think of renting out a house you own: not only do you get paid when someone pays you to live there, you also get the benefit of rising property values, which are the result of the work that all the other homeowners, business owners, and residents do to make the neighborhood more valuable.
The first capitalists hated rent. They wanted to replace the “passive income” that landowners got from taxing their serfs’ harvest with active income from enclosing those lands and grazing sheep in order to get wool to feed to the new textile mills. They wanted active income — and lots of it.
Capitalist philosophers railed against rent. The “free market” of Adam Smith wasn’t a market that was free from regulation — it was a market free from rents. The reason Smith railed against monopolists is because he (correctly) understood that once a monopoly emerged, it would become a chokepoint through which a rentier could cream off the profits he considered the capitalist’s due:
https://locusmag.com/2021/03/cory-doctorow-free-markets/
Today, we live in a rentier’s paradise. People don’t aspire to create value — they aspire to capture it. In Survival of the Richest, Doug Rushkoff calls this “going meta”: don’t provide a service, just figure out a way to interpose yourself between the provider and the customer:
https://pluralistic.net/2022/09/13/collapse-porn/#collapse-porn
Don’t drive a cab, create Uber and extract value from every driver and rider. Better still: don’t found Uber, invest in Uber options and extract value from the people who invest in Uber. Even better, invest in derivatives of Uber options and extract value from people extracting value from people investing in Uber, who extract value from drivers and riders. Go meta.
This is your brain on the four-hour-work-week, passive income mind-virus. In Techno Feudalism, Varoufakis deftly describes how the new “Cloud Capital” has created a new generation of rentiers, and how they have become the richest, most powerful people in human history.
Shopping at Amazon is like visiting a bustling city center full of stores — but each of those stores’ owners has to pay the majority of every sale to a feudal landlord, Emperor Jeff Bezos, who also decides which goods they can sell and where they must appear on the shelves. Amazon is full of capitalists, but it is not a capitalist enterprise. It’s a feudal one:
https://pluralistic.net/2022/11/28/enshittification/#relentless-payola
This is the reason that automakers are willing to enshittify their products so comprehensively: they were one of the first industries to decouple rents from profits. Recall that the reason that Big Car needed billions in bailouts in 2008 is that they’d reinvented themselves as loan-sharks who incidentally made cars, lending money to car-buyers and then “securitizing” the loans so they could be traded in the capital markets.
Even though this strategy brought the car companies to the brink of ruin, it paid off in the long run. The car makers got billions in public money, paid their execs massive bonuses, gave billions to shareholders in buybacks and dividends, smashed their unions, fucked their pensioned workers, and shipped jobs anywhere they could pollute and murder their workforce with impunity.
Car companies are on the forefront of postcapitalism, and they understand that digital is the key to rent-extraction. Remember when BMW announced that it was going to rent you the seatwarmer in your own fucking car?
https://pluralistic.net/2020/07/02/big-river/#beemers
Not to be outdone, Mercedes announced that they were going to rent you your car’s accelerator pedal, charging an extra $1200/year to unlock a fully functional acceleration curve:
https://www.theverge.com/2022/11/23/23474969/mercedes-car-subscription-faster-acceleration-feature-price
This is the urinary tract infection business model: without digitization, all your car’s value flowed in a healthy stream. But once the car-makers add semiconductors, each one of those features comes out in a painful, burning dribble, with every button on that fakakta touchscreen wired directly into your credit-card.
But it’s just for starters. Computers are malleable. The only computer we know how to make is the Turing Complete Von Neumann Machine, which can run every program we know how to write. Once they add networked computers to your car, the Car Lords can endlessly twiddle the knobs on the back end, finding new ways to extract value from you:
https://doctorow.medium.com/twiddler-1b5c9690cce6
That means that your car can track your every movement, and sell your location data to anyone and everyone, from marketers to bounty-hunters looking to collect fees for tracking down people who travel out of state for abortions to cops to foreign spies:
https://www.vice.com/en/article/n7enex/tool-shows-if-car-selling-data-privacy4cars-vehicle-privacy-report
Digitization supercharges financialization. It lets car-makers offer subprime auto-loans to desperate, poor people and then killswitch their cars if they miss a payment:
https://www.youtube.com/watch?v=4U2eDJnwz_s
Subprime lending for cars would be a terrible business without computers, but digitization makes it a great source of feudal rents. Car dealers can originate loans to people with teaser rates that quickly blow up into payments the dealer knows their customer can’t afford. Then they repo the car and sell it to another desperate person, and another, and another:
https://pluralistic.net/2022/07/27/boricua/#looking-for-the-joke-with-a-microscope
Digitization also opens up more exotic options. Some subprime cars have secondary control systems wired into their entertainment system: miss a payment and your car radio flips to full volume and bellows an unstoppable, unmutable stream of threats. Tesla does one better: your car will lock and immobilize itself, then blare its horn and back out of its parking spot when the repo man arrives:
https://tiremeetsroad.com/2021/03/18/tesla-allegedly-remotely-unlocks-model-3-owners-car-uses-smart-summon-to-help-repo-agent/
Digital feudalism hasn’t stopped innovating — it’s just stopped innovating good things. The digital device is an endless source of sadistic novelties, like the cellphones that disable your most-used app the first day you’re late on a payment, then work their way down the other apps you rely on for every day you’re late:
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
Usurers have always relied on this kind of imaginative intimidation. The loan-shark’s arm-breaker knows you’re never going to get off the hook; his goal is in intimidating you into paying his boss first, liquidating your house and your kid’s college fund and your wedding ring before you default and he throws you off a building.
Thanks to the malleability of computerized systems, digital arm-breakers have an endless array of options they can deploy to motivate you into paying them first, no matter what it costs you:
https://pluralistic.net/2021/04/02/innovation-unlocks-markets/#digital-arm-breakers
Car-makers are trailblazers in imaginative rent-extraction. Take VIN-locking: this is the practice of adding cheap microchips to engine components that communicate with the car’s overall network. After a new part is installed in your car, your car’s computer does a complex cryptographic handshake with the part that requires an unlock code provided by an authorized technician. If the code isn’t entered, the car refuses to use that part.
VIN-locking has exploded in popularity. It’s in your iPhone, preventing you from using refurb or third-party replacement parts:
https://doctorow.medium.com/apples-cement-overshoes-329856288d13
It’s in fuckin’ ventilators, which was a nightmare during lockdown as hospital techs nursed their precious ventilators along by swapping parts from dead systems into serviceable ones:
https://www.vice.com/en/article/3azv9b/why-repair-techs-are-hacking-ventilators-with-diy-dongles-from-poland
And of course, it’s in tractors, along with other forms of remote killswitch. Remember that feelgood story about John Deere bricking the looted Ukrainian tractors whose snitch-chips showed they’d been relocated to Russia?
https://doctorow.medium.com/about-those-kill-switched-ukrainian-tractors-bc93f471b9c8
That wasn’t a happy story — it was a cautionary tale. After all, John Deere now controls the majority of the world’s agricultural future, and they’ve boobytrapped those ubiquitous tractors with killswitches that can be activated by anyone who hacks, takes over, or suborns Deere or its dealerships.
Control over repair isn’t limited to gouging customers on parts and service. When a company gets to decide whether your device can be fixed, it can fuck you over in all kinds of ways. Back in 2019, Tim Apple told his shareholders to expect lower revenues because people were opting to fix their phones rather than replace them:
https://www.apple.com/newsroom/2019/01/letter-from-tim-cook-to-apple-investors/
By usurping your right to decide who fixes your phone, Apple gets to decide whether you can fix it, or whether you must replace it. Problem solved — and not just for Apple, but for car makers, tractor makers, ventilator makers and more. Apple leads on this, even ahead of Big Car, pioneering a “recycling” program that sees trade-in phones shredded so they can’t possibly be diverted from an e-waste dump and mined for parts:
https://www.vice.com/en/article/yp73jw/apple-recycling-iphones-macbooks
John Deere isn’t sleeping on this. They’ve come up with a valuable treasure they extract when they win the Right-to-Repair: Deere singles out farmers who complain about its policies and refuses to repair their tractors, stranding them with six-figure, two-ton paperweight:
https://pluralistic.net/2022/05/31/dealers-choice/#be-a-shame-if-something-were-to-happen-to-it
The repair wars are just a skirmish in a vast, invisible fight that’s been waged for decades: the War On General-Purpose Computing, where tech companies use the law to make it illegal for you to reconfigure your devices so they serve you, rather than their shareholders:
https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/
The force behind this army is vast and grows larger every day. General purpose computers are antithetical to technofeudalism — all the rents extracted by technofeudalists would go away if others (tinkereres, co-ops, even capitalists!) were allowed to reconfigure our devices so they serve us.
You’ve probably noticed the skirmishes with inkjet printer makers, who can only force you to buy their ink at 20,000% markups if they can stop you from deciding how your printer is configured:
https://pluralistic.net/2022/08/07/inky-wretches/#epson-salty But we’re also fighting against insulin pump makers, who want to turn people with diabetes into walking inkjet printers:
https://pluralistic.net/2022/06/10/loopers/#hp-ification
And companies that make powered wheelchairs:
https://pluralistic.net/2022/06/08/chair-ish/#r2r
These companies start with people who have the least agency and social power and wreck their lives, then work their way up the privilege gradient, coming for everyone else. It’s called the “shitty technology adoption curve”:
https://pluralistic.net/2022/08/21/great-taylors-ghost/#solidarity-or-bust
Technofeudalism is the public-private-partnership from hell, emerging from a combination of state and private action. On the one hand, bailing out bankers and big business (rather than workers) after the 2008 crash and the covid lockdown decoupled income from profits. Companies spent billions more than they earned were still wildly profitable, thanks to those public funds.
But there’s also a policy dimension here. Some of those rentiers’ billions were mobilized to both deconstruct antitrust law (allowing bigger and bigger companies and cartels) and to expand “IP” law, turning “IP” into a toolsuite for controlling the conduct of a firm’s competitors, critics and customers:
https://locusmag.com/2020/09/cory-doctorow-ip/
IP is key to understanding the rise of technofeudalism. The same malleability that allows companies to “twiddle” the knobs on their services and keep us on the hook as they reel us in would hypothetically allow us to countertwiddle, seizing the means of computation:
https://pluralistic.net/2023/04/12/algorithmic-wage-discrimination/#fishers-of-men
The thing that stands between you and an alternative app store, an interoperable social media network that you can escape to while continuing to message the friends you left behind, or a car that anyone can fix or unlock features for is IP, not technology. Under capitalism, that technology would already exist, because capitalists have no loyalty to one another and view each other’s margins as their own opportunities.
But under technofeudalism, control comes from rents (owning things), not profits (selling things). The capitalist who wants to participate in your iPhone’s “ecosystem” has to make apps and submit them to Apple, along with 30% of their lifetime revenues — they don’t get to sell you jailbreaking kit that lets you choose their app store.
Rent-seeking technology has a holy grail: control over “ring zero” — the ability to compel you to configure your computer to a feudalist’s specifications, and to verify that you haven’t altered your computer after it came into your possession:
https://pluralistic.net/2022/01/30/ring-minus-one/#drm-political-economy
For more than two decades, various would-be feudal lords and their court sorcerers have been pitching ways of doing this, of varying degrees of outlandishness.
At core, here’s what they envision: inside your computer, they will nest another computer, one that is designed to run a very simple set of programs, none of which can be altered once it leaves the factory. This computer — either a whole separate chip called a “Trusted Platform Module” or a region of your main processor called a secure enclave — can tally observations about your computer: which operating system, modules and programs it’s running.
Then it can cryptographically “sign” these observations, proving that they were made by a secure chip and not by something you could have modified. Then you can send this signed “attestation” to someone else, who can use it to determine how your computer is configured and thus whether to trust it. This is called “remote attestation.”
There are some cool things you can do with remote attestation: for example, two strangers playing a networked video game together can use attestations to make sure neither is running any cheat modules. Or you could require your cloud computing provider to use attestations that they aren’t stealing your data from the server you’re renting. Or if you suspect that your computer has been infected with malware, you can connect to someone else and send them an attestation that they can use to figure out whether you should trust it.
Today, there’s a cool remote attestation technology called “PrivacyPass” that replaces CAPTCHAs by having you prove to your own device that you are a human. When a server wants to make sure you’re a person, it sends a random number to your device, which signs that number along with its promise that it is acting on behalf of a human being, and sends it back. CAPTCHAs are all kinds of bad — bad for accessibility and privacy — and this is really great.
But the billions that have been thrown at remote attestation over the decades is only incidentally about solving CAPTCHAs or verifying your cloud server. The holy grail here is being able to make sure that you’re not running an ad-blocker. It’s being able to remotely verify that you haven’t disabled the bossware your employer requires. It’s the power to block someone from opening an Office365 doc with LibreOffice. It’s your boss’s ability to ensure that you haven’t modified your messaging client to disable disappearing messages before he sends you an auto-destructing memo ordering you to break the law.
And there’s a new remote attestation technology making the rounds: Google’s Web Environment Integrity, which will leverage Google’s dominance over browsers to allow websites to block users who run ad-blockers:
https://github.com/RupertBenWiser/Web-Environment-Integrity
There’s plenty else WEI can do (it would make detecting ad-fraud much easier), but for every legitimate use, there are a hundred ways this could be abused. It’s a technology purpose-built to allow rent extraction by stripping us of our right to technological self-determination.
Releasing a technology like this into a world where companies are willing to make their products less reliable, less attractive, less safe and less resilient in pursuit of rents is incredibly reckless and shortsighted. You want unauthorized bread? This is how you get Unauthorized Bread:
https://arstechnica.com/gaming/2020/01/unauthorized-bread-a-near-future-tale-of-refugees-and-sinister-iot-appliances/amp/
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/07/24/rent-to-pwn/#kitt-is-a-demon
[Image ID: The interior of a luxury car. There is a dagger protruding from the steering wheel. The entertainment console has been replaced by the text 'You wouldn't download a car,' in MPAA scare-ad font. Outside of the windscreen looms the Matrix waterfall effect. Visible in the rear- and side-view mirror is the driver: the figure from Munch's 'Scream.' The screen behind the steering-wheel has been replaced by the menacing red eye of HAL9000 from Stanley Kubrick's '2001: A Space Odyssey.']
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
#pluralistic#shitty technology adoption curve#unauthorized bread#automotive#arm-breakers#cars#big car#right to repair#rent-seeking#digital feudalism#neofeudalism#drm#wei#remote attestation#private access tokens#yannis varoufakis#web environment integrity#paternalism#war on general purpose computing#competitive compatibility#google#enshittification#interoperability#adversarial interoperability#comcom#the internet con#postcapitalism#ring zero#care#med-tech
4K notes
·
View notes
Text
Brian Barrett at Wired (02.27.2025):
If you’ve felt overwhelmed by all the DOGE news, you’re not alone. You’d need too much cork board and yarn to keep track of which agencies it has occupied by now, much less what it’s doing there. Here’s a simple rubric, though, to help contextualize the DOGE updates you do have time and energy to process: It’s worse than you think. DOGE is hard to keep track of. This is by design; the only information about the group outside of its own mistake-ridden ledger of “savings” comes from media reports. So much for being “maximally transparent,” as Elon Musk has promised. The blurriness is also partly a function of the speed and breadth with which DOGE has operated. Keeping track of the destruction is like counting individual bricks scattered around a demolition site.
You may be aware, for instance, that a 19-year-old who goes by “Big Balls” online plays some role in all this. Seems bad. But you may have missed that Edward Coristine has since been installed at the nation’s top cybersecurity agency. And the State Department and the Small Business Administration. And he has a Department of Homeland Security email address and, by the way, also had a recent side gig selling AI Discord bots to Russians. See? Worse than you think. [...] Similarly, you’ve likely heard that the United States Agency for International Development has been gutted and the Consumer Financial Protection Bureau has been put on ice. All true, all bad. But here’s what that means in practice: Fewer people globally have access to vaccines than they did a month ago. More babies are being born with HIV/AIDS. From here on out, anyone who gets ripped off by payday loan companies—or, say, social media platforms moonlighting as payments services—has lost their most capable defender. Keep going. The thousands of so-called probationary employees DOGE has fired included a significant number of experienced workers who had just been promoted or transferred. National Science Foundation staffing cuts and proposed National Institutes of Health grant limits will combine to kneecap scientific research in the United States for a generation. Terminations at the US Department of Agriculture have sent programs designed to help farmers into disarray. On Wednesday, the Food and Drug Administration canceled a meeting that would have given guidance on this year’s flu vaccine composition. It hasn’t been rescheduled.
Don’t care about science or vaccines? The Social Security Administration is reportedly going to cut its staff in half. The Department of Housing and Urban Development is going to be cut by as much as 84 percent. Hundreds of workers who keep the power grid humming in the Pacific Northwest were fired before a scramble to rehire a few of them. The National Parks Service, the Internal Revenue Service, all hit hard. So don’t make any long-term bets on getting your checks on time, keeping your lights on, buying a home for the first time, or enjoying Yosemite. Don’t assume all the things that work now will still work tomorrow.
Speaking of which, let’s not forget that DOGE has fired people working to prevent bird flu and to safeguard the US nuclear arsenal. (The problem with throwing a chainsaw around is that you don’t make clean cuts.) The agencies in question have reportedly tried to hire those workers back. Fine. But even if they’re able to, the long-term question that hasn’t been answered yet is, Who would stay? Who would work under a regime so cocksure and incompetent that it would mistakenly fire the only handful of people who actually know how to take care of the nukes? According to a recent report from The Bulwark, that brain drain is already underway. And this is all before the real reductions in force begin, mass purges of civil servants that will soon be conducted, it seems, with an assist from DOGE-modified, automated software. The US government is about to lose decades of institutional knowledge across who knows how many agencies, including specialists that aren’t readily replaced by loyalists.
Wired has a solid article on how bad the DOGE-ificiation of government has gotten.
#DOGE#Elon Musk#Edward Coristine#Musk Coup#Trump Administration II#Department of Government Efficency
108 notes
·
View notes
Text
Alt National Park Service
We apologize for the length of this post, but we felt it was important to share the full details with you.
In early March, a group of Musk-affiliated staffers from the so-called Department of Government Efficiency (DOGE) arrived at the National Labor Relations Board (NLRB), the federal agency responsible for protecting workers’ rights and handling union disputes. They claimed their mission was to improve efficiency and cut costs. But what followed raised serious alarms inside the agency and revealed a dangerous abuse of power and access.
Once DOGE engineers were granted access to the NLRB’s systems, internal IT staff quickly realized something was wrong. Normally, any user given access to sensitive government systems is monitored closely. But when IT staff suggested tracking DOGE activity—standard cybersecurity protocol—they were told to back off. Soon after, DOGE installed a virtual system inside the agency’s servers that operated in secret. This system left no logs, no trace of its activity, and was removed without a record of what had been done.
Then, large amounts of data began disappearing from the system. This wasn’t routine data—it included sensitive information on union strategies, ongoing legal cases, corporate secrets, and even personal details of workers and officials. None of it had anything to do with cutting costs or improving efficiency. It simply wasn’t supposed to leave the NLRB under any circumstance.
Almost immediately after DOGE accounts were created, login attempts began—from a Russian IP address. These weren’t random hacks. Whoever it was had the correct usernames and passwords. The timing was so fast it suggested that credentials had either been stolen, leaked, or shared. Security experts later said that if someone wanted to hide their tracks, they wouldn’t make themselves look like they were logging in from Russia. This wasn’t just sloppy—it was bold, calculated, and criminal.
One of the NLRB’s IT staffers documented everything and submitted a formal disclosure to Congress and other oversight bodies. But instead of being protected, he was targeted. A threatening note was taped to his door, revealing private information and overhead drone photos of him walking his dog. The message was clear: stay silent. He didn’t. He went public.
This isn’t just a cybersecurity issue—it’s a coordinated effort to infiltrate government agencies, bypass legal safeguards, and harvest data that can be used for political, corporate, or personal leverage. With Elon Musk directing DOGE, it’s hard not to see the motive: access to union files, employee records, and legal disputes that could benefit his companies and silence critics. This same playbook appears to be unfolding across multiple federal agencies, with DOGE operatives gaining quiet access to sensitive systems and extracting vast amounts of data without oversight.
The truth is, DOGE was never about making government more efficient. It was about taking control of it from the inside. What happened at the NLRB is not an isolated incident—it’s a warning of what happens when billionaires are handed unchecked power inside public institutions.
58 notes
·
View notes
Text
The feud between U.S. President Donald Trump and Elon Musk didn’t come as a total surprise. There were always those who doubted that the two mega-narcissists could co-exist for long in the same White House. On June 11, Musk issued a statement expressing regret for some of his social media posts about Trump, but one is inclined to doubt that his mea culpa will patch things up.
The spat between the two billionaires, however, has diverted the public’s attention from a more urgent matter. Two stories that appeared this week should draw fresh attention to a problem that should have been obvious to everyone from the very beginning of the Tesla CEO���s disastrous adventure at the head of the so-called Department of Government Efficiency (DOGE). Musk is not only the richest man in the world. He is also the biggest risk to the security of the government of the United States—which, in a government riddled with walking security risks, is saying something.
On June 7, the Washington Post reported that DOGE personnel had ignored the concerns of White House cybersecurity staff by installing a Starlink terminal on the roof of an adjacent building in February. Starlink, you might recall, connects to the satellite network owned and operated by Musk’s SpaceX company. The White House Starlink connection enabled those who used it to bypass the security restrictions usually imposed on staffers working in the building. The Post’s sources told the newspaper that “those managing the systems weren’t able to monitor such connections to stop sensitive information from leaving the complex or hackers from breaking in.”
Three days later, the Wall Street Journal released another bombshell, reporting that the Department of Homeland Security and the Justice Department had “tracked foreign nationals coming and going to Elon Musk’s properties” in 2022 and 2023. The monitoring of Musk’s questionable ties started before the Trump administration, the paper noted, and “highlights concerns about the number of foreign nationals in Musk’s orbit.”
Of course, visits by “foreign nationals” are not inherently something to be worried about. But the fact that both agencies saw fit to do this tracking suggests that they had specific concerns—which may not be surprising, given the extreme sensitivity of Musk’s work for the U.S. government.
What foreign nationals might they have in mind? Russians, perhaps. (The Journal story contains a vague reference to people from “Eastern Europe” among Musk’s visitors.) We learned last fall that Musk had been in regular phone contact with Russian President Vladimir Putin staring in late 2022. During their conversations Putin is said to have asked Musk, among other things, to refrain from activating Starlink over Taiwan, which a Russian intelligence source said was done as a favor to Putin’s buddy, Chinese President Xi Jinping. Coincidence or not, the Taiwanese still don’t have Starlink service today.
Did Putin also thank the influential billionaire for his extensive use of X to insult and belittle Ukrainian President Volodymyr Zelensky—and for supporting Russian military operations by not allowing the Ukrainians Starlink access over Crimea, a part of Ukraine? (To be fair, Musk has largely maintained Starlink service for the Ukrainian military, which has proved to be a vital asset in Kyiv’s fight against the Russians.) We don’t know the details of these conversations. But what we do know would almost be the best case; the possibilities are so much worse.
Why Musk would do this remains an open question. But the far more alarming question is why this is only now beginning to catch media and government attention. Musk’s regular private contact with the head of a hostile autocracy should, in its own right, have activated a gigantic flashing red light for any U.S. administration. For Musk is not just an average U.S. citizen; he is a man with a high-level security clearance tied to a range of business interests involving NASA and the intelligence community.
NASA, of course, is now uncomfortably dependent on SpaceX’s rockets—as Musk himself noted during his feud with Trump, when the CEO threatened to decommission the Dragon spacecraft, a mainstay of travel to the International Space Station. Musk took back the threat three hours later. But the space station link is far from the only source of concern. In March 2024, it was revealed that SpaceX has been building a spy satellite network for the U.S. National Reconnaissance Office, a highly secret agency that conducts surveillance from space. Musk is doing the work under a $1.8 billion contract from 2021 with terms that remain classified.
China is another justified source of anxiety. Musk’s electric car company has huge exposure to the Chinese Communist Party. Musk has famously described himself—unusually for a MAGA loyalist and Trump campaigner—as “kind of pro-China.” In 2020, Tesla opened a factory in Shanghai, where the company now produces half of its cars; Tesla also manufactures a large share of its batteries at a facility in China. Permits for both factories were issued with remarkable speed, and the company has benefited hugely from favorable loans from Chinese banks, evidence of a cozy relationship with the government.
Musk certainly has a high enough profile to have held multiple meetings with Xi as well as Premier Li Qiang. To be sure, other U.S. business leaders have done the same. But few of them boast Musk’s top-secret clearance—or, now, anything like his access to sensitive government information through DOGE.
Musk has shown that he knows what’s expected of him in return. He has lavished obsequious praise on China. He has stated that “there’s a certain inevitability” for Beijing to absorb Taiwan, which he has referred to as “an integral part” of China. China is a key building block of Musk’s business empire—and given that a political decision in Beijing could crush his operations in a second, this makes him profoundly susceptible to potential pressure by the Chinese Communist Party. How far would he be willing to go to protect his interests?
This, then, is the man to whom the Trump administration gave comprehensive and unfettered access to the personal data of tens of millions of Americans during DOGE’s rampage in the first months of this year. Musk’s “takeover of federal government infrastructure,” as Wired magazine called it, gave inexperienced young software programmers access to a wide variety of sensitive information, including records from the Office of Personnel Management (OPM). Few Americans understand the significance of the OPM, which holds vast amounts of data about citizens, but the Chinese considered it important enough to target it in one of the biggest cyberattacks in history in 2015. Two DOGE staffers even tried to gain access to the networks that contain classified material about the United States’ nuclear weapons—which raises serious questions about why Musk’s people would need such information for a budget-cutting exercise.
Indeed, DOGE’s work has been characterized by a stunningly cavalier attitude to data security, prompting some experts to speak in Foreign Policy about the “the most consequential security breach” in the U.S. government’s history. The initiative has operated with minimal transparency and oversight. It has violated countless strictures on the confidentiality of federal employee information. The chaos and uncertainty sown by its firing of thousands of federal workers could potentially offer openings to foreign intelligence services, which will be keen to capitalize on the grievances of discarded employees. And granting DOGE staffers access to the government’s internal payments system has risked compromising intelligence operations that rely on the same mechanism. We will probably need years to fully understand the extent of the damage.
Government concern about Musk is not entirely new. In December, the New York Times reported that Musk and SpaceX “have repeatedly failed to comply with federal reporting protocols aimed at protecting state secrets, including by not providing some details of his [Musk’s] meetings with foreign leaders.” The Pentagon’s inspector general opened a review of Musk’s security clearance last year, as did the Air Force and the undersecretary of defense for intelligence and security. Nothing seems to have come of any these investigations, but I somehow don’t find that reassuring. I wonder if it’s just a coincidence that Trump fired Pentagon Inspector General Robert Storch in January, a few weeks after the publication of the Times report.
Recently, even before his fight with Musk, Trump seems to have had second thoughts about the carte blanche he has granted him. It was Trump who apparently canceled Musk’s access to a planned top-secret Pentagon briefing in April. Now, as the feud between the two men simmers, Steve Bannon, Trump’s longtime consigliere, has called on the president to pull Musk’s security clearance.
I never thought I would ever agree with Bannon on anything. But here we are.
27 notes
·
View notes
Text
"How the hell did cupid get bullets?"
Prologue; potential to be a graves x reader, contains university stress and jobhunting, don't feed my shit to AI, yadda yadda yadda. SFW prologue, but MDNI. Any minors will be blocked. Long time lurker first time caller, etc. 1.1k words
Going through university wasn’t the easiest way to get through to your goals, but it certainly was a good opportunity that was luckily accessible to you. While finishing up a cybersecurity degree there were a few options for work placement – mandatory for graduation. Great way to gain some connections, and some field experience, getting you just a little bit further to that dream.
The dream? Being a person that keeps the world turning...in the background, preferably. There’s more focus than ever on technology, and you wanted to be ahead of the curve on the next advancements.
Opening your laptop, you decide to log on and look through the choices provided, since it’s a few weeks until you must lock in an option. No harm in putting some thought into the last thing you’ll do at university, before entering the workforce. Absolutely a decision with zero pressure whatsoever. There are a few options listed on the enrollment portal, but one catches your eye, surprisingly. ‘On site cybersecurity work’ – woefully generic. Generic to the point of being pretty much ignored by everyone, so it’s still open. You click on the full listing, thinking maybe there’s more detail inside? Yet the full page is easily summarised. Too easily, in fact. It doesn’t offer any more clarifying information and brings forward the thought of what ‘LinkedIn minimalism’ might entail.
‘On-site cybersecurity work. - Requires travel, organized by agency. - May involve intense workload, with unusual hours. - More details available at interview, attendee is required to sign an NDA upon applying. - Salary non-negotiable. - Minimum 12 month commitment, with potential to extend.’
There’s more red flags here than an incel’s twitter. No fucking thanks. Moving onto the next few options, standard cybersecurity intern positions – a lot of them listing low-to-midrange salaries, with a few ‘internship’ programs that offer prestige, in lieu of reimbursement. Absolutely no thanks. There’s too many options to go through and it’s super overwhelming. Besides, there’s still a while before the deadline, so you figure you’ll leave it for now – and probably apply to the one that has the least bad omens with an okay-ish salary. Sounds like a good rough plan for now. At least it would, if you hadn’t forgotten the requirement entirely.
Luckily an automatic reminder email from your university managed to remind you a day before the registration for placement closes. Considering how scatterbrained you’ve been, you’re thankful for the little robot that sends out these alerts – rather than the typical annoyance given. At this point, you’d take any position to avoid having to wait until the next semester to finish this final step. Logging on however, it seems there’s little choice in the matter anyway. The only spot left open is that weirdly cryptic, incredibly vanilla, and extremely vague listing. Fuck it, you think – confirming it as your placement choice.
Worst comes to worst, I can quit after. It’s just a first step, not the entire career.
A mildly comforting rationalization, at best. You’ve at least got some relief, knowing it’s been sorted. A few days later, you receive an email from the placement coordinators, putting you in touch with the agency and a representative to go over the finer details of your potential employment.
It’s great to be in touch with you about this opportunity. The biggest thing I suppose we would have to organise is travel. Travel is required for the job, but we will provide all preparations required – including transport and accommodation. Unfortunately, I can’t go over any further unless you wish to confirm an in-person interview. That will require travel, but we’re happy to organise it just the same way, and reimburse you for your time too.
Even though this email chain would objectively be an example of ‘avoid at all costs’ – that little voice isn’t there. That gut feeling of doom just… isn’t there. You know it’s weird, it’s got a huge amount of potential issues, but a bad gut feeling is not kicking in. You’ve got enough common sense to know this is a terrible idea on paper – but instinct tells you otherwise. There’s some wonderful places and experiences you’ve had thanks to trusting yourself, and a real good streak at gambling risk-to-reward in your life. It’s not like there’s any other choice though. I mean, there is waiting until next semester, but that option does give you that sense of dread. After a few more emails back and forth, you’ve been given your transport details. A car will be picking you up from your house as agreed roughly one month from now, to take you to a small passenger plane on a private runway. Super odd circumstances, but the mysterious email representative did let you know that it was a fairly rural and remote area, requiring specialised transport. Over the month, you celebrate with your family and friends about this last part of university, as you all prepare for the potential of this job keeping you for a whole year. After a lot of good times, tearful see-you-laters, and frantic packing – a doorbell cuts off your inner reminiscent monologue, letting you know that now’s the time to haul ass into that car. Outside there is an incredibly large car, with glossy black paint and heavily tinted windows. Knowing about cars is a whole different kettle of fish, but at least this fish says ‘escalade’ on the bumper. It’s a good sign the company’s got money, so maybe the omen of a ‘non-negotiable’ salary might not be too bad. You can confirm it’s the right car, as the representative let you know the plate of the vehicle beforehand. As you approach tentatively with your bag, the suited driver rolls down the window and confirms your name, asking to see your ID. Weird formalities and seriousness aside – you flash your ID and he helps you load your bag into the car’s boot. With a potentially final wave, you quickly say goodbye as the car pulls out from the street. Once you’re on the road, there’s still a weird atmosphere in the air as you struggle to make casual chitchat with the gruff driver – opting to be on your phone instead for the majority of the trip. Roughly two hours later, the driver pipes up, still as gruff as before. “You’re going to lose signal for a while, as we’ll be there in about 15. Finish up anything that requires mobile data, and put your phone on airplane mode. You’ll thank me when it’s still got battery halfway through the flight.” “Thanks for letting me know.” Lifting your head up, you take a look at your surroundings. Wait, where the fuck am I? Why is this window tint so dark? Surely, it’s not road legal right? I can’t see shit out of the windows. These were questions you probably should’ve asked yourself a lot earlier.
#phillip graves x reader#call of duty#cod#graves x reader#phillip graves fanfic#phillip graves#cod x reader#cupid's got bullets
41 notes
·
View notes
Text
i got an email from the general grad advisor today, questioning how wise it would be for me to take algebraic topology 2 given my C in algebraic topology 1. she suggested that i could take the probability course track instead, which will knock off a distribution requirement and "could play more to my strengths"
ngl, i'm a little pissed. i'm doing a phd in math to become an academic and to have research in pure/applied mathematics. stats might be more employable, but i'm not putting in all this work to become a statistician. if i wanted to work industry, i would have tried harder to find a tech job with my COMPUTER SCIENCE DEGREE or CYBERSECURITY EXPERIENCE.
at first, i wrote a paragraph saying things like, "Regarding my strengths and interests, I'm figuring those things out. I don't have any statistics/probability background prior to my TA experience this past year - I didn't have much interest in it before and the subject is still new to me. I'm very interested in being employable after I graduate though, so I am happy to open up my options as much as I can."
i read over it and deleted it. my actual reply was pretty dry - all i said was a brief "thank you for the email" "hope your summer is going well" and "i'm interested in switching over to probability."
as second-year student, nobody actually cares about your interests. that's for after i have my master's degree and start shopping for advisors - and even then, it's more about what you have experience in than what you like.
they say grades don't matter, but the only thing anyone actually cares about (when you're early in the graduate career) is if you have good grades... i already knew that of course, but i let myself get swayed by the "your gpa doesn't matter!" propaganda from everyone in the department.
and here i thought mathematicians were honest.
you know, the biggest thing i regret from spring semester is not skipping classes when they stopped serving me. i wanted to, but i was more afraid to be rude than i was to fail.
(i don't encourage skipping class though, obviously. i only stop going when i seriously hate being there. i learn from the book instead and i still do the homework and show up for exams. it was easy in undergrad because those professors don't care. i just needed the credit/grade, not their approval.)
i just have to stay true to what i know. i'm usually right about the things i need and want. can't be letting other people detract from what i need to do for myself.
i thought that, since the department is full of mathematicians, they would understand me and share my interests - but the only interests they have are their own. i need to remind myself of this.
what i need over the summer is to prepare and practice for the statistics class i'm teaching this july. i need to review and relearn algtop 1. and i need to get As this fall.
technically i only need B+'s, but i want As, so i'm going to get them.
switching to probability should help me a lot. i have a classmate who took probability last year, and i'll be brushing up on my calculus anyway from being a calculus instructor this fall. so i have high hopes that, if everything goes well, i can pull it off. then i'll study hard in the winter and take the master's exam in the spring.
24 notes
·
View notes
Text
Is Musk a Russian agent?
More information very similar to that shared before. Infiltration of private citizens' information by DOGE with accounts and passwords set up that were then immediately used from somewhere in Russia. I believe Musk is an actual Russian spy. Trump's a patsy, a useful idiot. Musk, however, got them direct access.
Alt National Park Service
otrospndeS0t4 m5m20l1107mpa 5tAi98iM f182f:1 08Prl57ca13i4f6 ·
We apologize for the length of this post, but we felt it was important to share the full details with you.
In early March, a group of Musk-affiliated staffers from the so-called Department of Government Efficiency (DOGE) arrived at the National Labor Relations Board (NLRB), the federal agency responsible for protecting workers’ rights and handling union disputes. They claimed their mission was to improve efficiency and cut costs. But what followed raised serious alarms inside the agency and revealed a dangerous abuse of power and access.
Once DOGE engineers were granted access to the NLRB’s systems, internal IT staff quickly realized something was wrong. Normally, any user given access to sensitive government systems is monitored closely. But when IT staff suggested tracking DOGE activity—standard cybersecurity protocol—they were told to back off. Soon after, DOGE installed a virtual system inside the agency’s servers that operated in secret. This system left no logs, no trace of its activity, and was removed without a record of what had been done.
Then, large amounts of data began disappearing from the system. This wasn’t routine data—it included sensitive information on union strategies, ongoing legal cases, corporate secrets, and even personal details of workers and officials. None of it had anything to do with cutting costs or improving efficiency. It simply wasn’t supposed to leave the NLRB under any circumstance.
Almost immediately after DOGE accounts were created, login attempts began—from a Russian IP address. These weren’t random hacks. Whoever it was had the correct usernames and passwords. The timing was so fast it suggested that credentials had either been stolen, leaked, or shared. Security experts later said that if someone wanted to hide their tracks, they wouldn’t make themselves look like they were logging in from Russia. This wasn’t just sloppy—it was bold, calculated, and criminal.
One of the NLRB’s IT staffers documented everything and submitted a formal disclosure to Congress and other oversight bodies. But instead of being protected, he was targeted. A threatening note was taped to his door, revealing private information and overhead drone photos of him walking his dog. The message was clear: stay silent. He didn’t. He went public.
This isn’t just a cybersecurity issue—it’s a coordinated effort to infiltrate government agencies, bypass legal safeguards, and harvest data that can be used for political, corporate, or personal leverage. With Elon Musk directing DOGE, it’s hard not to see the motive: access to union files, employee records, and legal disputes that could benefit his companies and silence critics. This same playbook appears to be unfolding across multiple federal agencies, with DOGE operatives gaining quiet access to sensitive systems and extracting vast amounts of data without oversight.
The truth is, DOGE was never about making government more efficient. It was about taking control of it from the inside. What happened at the NLRB is not an isolated incident—it’s a warning of what happens when billionaires are handed unchecked power inside public institutions.
18 notes
·
View notes
Text
If you're concerned about this autism registry bit and you have a reasonable AG, flood their inboxes with something like this:
On April 21st, RFK Jr. outlined a plan to create an autism registry. Allegedly, this is for research. But given RFK's previous statements about wanting to put people on antidepressants on quote unquote "wellness farms," I do not trust that this would only be used for research. His recent comments about autistic people that border on calling them useless eaters solidify this distrust. His big speech on autism had not paying taxes and not holding jobs as part of the reason for his crusade. Not to mention a very dark history. The first thing Nazi Germany did before murdering most of its disabled population was register them in the name of "research."
Plus, there is no small problem of the Trump Administration and DOGE's complete and utter lack of seriousness regarding cybersecurity. DOGE already has an admitted cybercriminal on their team. Pete Hegseth has shown a disregard for classified intelligence. And a bunch of data from NLRB got leaked to Russia. What if this "research" data got hacked and suddenly every person who was diagnosed with autism but didn't want their diagnosis revealed to employers to dodge employment discrimination suddenly had this information made public? I would like to see a lawsuit to stop such a registry based on the following
An autism registry would be a violation of the disability community's right to privacy under the law
Autistic people have not committed crimes to warrant being placed on a registry.
The Trump Administration's and DOGE's utter carelessness with sensitive data puts our medical information at high risk of being hacked. I do not want my medical information falling into the hands of hostile governments or being leaked online for potential employers who might use that information against me to see."
19 notes
·
View notes
Text
Had to have a meeting with an industry cybersecurity assessor yesterday as a part of the wrap-up on the whole workplace debacle I've discussed previously. Lot of moments where I just had to bite my tongue and stare at the floor
Worst of all, I asked them about AI usage in medicine, because I was sure, I was absolutely sure that they would launch into a tirade about how dangerous it was given the inherent need for data harvesting and how that is an immediate violation of patient confidentiality laws even with de-identified data, or at least something about the growing margin of error seen in specialists reliant on AI to assist with diagnosis, and I thought that would give me a little more wiggle room to argue with the boss when he asks about AI shit
Nope
She got very excited and started talking about AI scribes and how there's so many practices using it now already and she and boss had a grand old chat about how good AI is
Hell planet!!!!!
23 notes
·
View notes
Text
Apple's encryption capitulation

I'm on a 20+ city book tour for my new novel PICKS AND SHOVELS. Catch me in NYC on TOMORROW (26 Feb) with JOHN HODGMAN and at PENN STATE THURSDAY (Feb 27). More tour dates here. Mail-order signed copies from LA's Diesel Books.
The UK government has just ordered Apple to secretly compromise its security for every iOS user in the world. Instead, Apple announced it will disable a vital security feature for every UK user. This is a terrible outcome, but it just might be the best one, given the circumstances:
https://www.bbc.com/news/articles/cgj54eq4vejo
So let's talk about those circumstances. In 2016, Theresa May's Conservative government passed a law called the "Investigative Powers Act," better known as the "Snooper's Charter":
https://www.snooperscharter.co.uk/
This was a hugely controversial law for many reasons, but most prominent was that it allowed British spy agencies to order tech companies to secretly modify their software to facilitate surveillance. This is alarming in several ways. First, it's hard enough to implement an encryption system without making subtle errors that adversaries can exploit.
Tiny mistakes in encryption systems are leveraged by criminals, foreign spies, griefers, and other bad actors to steal money, lock up our businesses and governments with ransomware, take our data, our intimate images, our health records and worse. The world is already awash in cyberweapons that terrible governments and corporations use to target their adversaries, such as the NSO Group malware that the Saudis used to hack Whatsapp, which let them lure Jamal Khashoggi to his death. The stakes couldn't be higher:
https://pluralistic.net/2025/02/04/citizen-lab/#nso-group
Encryption protects everything from the software updates for pacemakers and anti-lock braking to population-scale financial transactions and patient records. Deliberately introducing bugs into these systems to allow spies and cops to "break" encryption when they need to is impossible, which doesn't stop governments from demanding it. Notoriously, when former Australian PM Malcolm Turnbull was told that the laws of mathematics decreed that there is no way to make encryption that only stops bad guys but lets in good guys, he replied "The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia":
https://www.eff.org/deeplinks/2017/07/australian-pm-calls-end-end-encryption-ban-says-laws-mathematics-dont-apply-down
The risks don't stop with bad actors leveraging new bugs introduced when the "lawful interception" back-doors are inserted. The keys that open these back-doors inevitably circulate widely within spy and police agencies, and eventually – inevitably – they leak. This is called the "keys under doormats" problem: if the police order tech companies to hide the keys to access billions of peoples' data under their doormats, eventually, bad guys will find them there:
https://academic.oup.com/cybersecurity/article/1/1/69/2367066
Again, this isn't a theoretical risk. In 1994, Bill Clinton signed a US law called CALEA that required FBI back-doors for data switches. Most network switches in use today have CALEA back-doors and they have been widely exploited by various bad guys. Most recently, the Chinese military used CALEA backdoors to hack Verizon, AT&T and Lumen:
https://pluralistic.net/2024/10/07/foreseeable-outcomes/#calea
This is the backdrop against which the Snooper's Charter was passed. Parliament stuck its fingers in its ears, covered its eyes, and voted for the damned thing, swearing that it would never result in any of the eminently foreseeable harms they'd been warned of.
Which brings us to today. Two weeks ago, the Washington Post's Joseph Menn broke the story that Apple had received a secret order from the British government, demanding that they install a back-door in the encryption system that protects cloud backups of iOS devices:
https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/
Virtually every iOS device in the world regularly backs itself up to Apple's cloud backup service. This is very useful: if your phone or tablet is lost, stolen or damaged, you can recover your backup to a new device in a matter of minutes and get on with your day. It's also very lucrative for Apple, which charges every iOS user a few dollars every month for backup services. The dollar amount here is small, but that sum is multiplied by the very large number of Apple devices, and it rolls in every single month.
Since 2022, Apple has offered its users a feature called "Advanced Data Protection" that employs "end-to-end" encryption (E2EE) for these backups. End-to-end encryption keeps data encrypted between the sender and the receiver, so that the service provider can't see what they're saying to each other. In the case of iCloud backups, this means that while an Apple customer can decrypt their backup data when they access it in the cloud, Apple itself cannot. All Apple can see is that there is an impenetrable blob of user data on one of its servers.
2022 was very late for Apple to have added E2EE to its cloud backups. After all, in 2014, Apple customers suffered a massive iCloud breach when hackers broke into the iCloud backups of hundreds of celebrities, leaking nude photos and other private data, in a breach colloquially called "Celebgate" or "The Fappening":
https://en.wikipedia.org/wiki/2014_celebrity_nude_photo_leak
Apple almost rolled out E2EE for iCloud in 2018, but scrapped the plans after Donald Trump's FBI leaned on them:
https://www.reuters.com/article/world/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sour-idUSKBN1ZK1CO/
Better late than never. For three years, Apple customers' backups have been encrypted, at rest, on Apple's servers, their contents fully opaque to everyone except the devices' owners. Enter His Majesty's Government, clutching the Snooper's Charter. As the eminent cryptographer Matthew Green writes, a secret order to compromise the cloud backups of British users is necessarily a secret order to compromise all users' encrypted backups:
https://blog.cryptographyengineering.com/2025/02/23/three-questions-about-apple-encryption-and-the-u-k/
There's no way to roll out a compromised system in the UK that differs from non-British backups without the legion of reverse-engineers and security analysts noticing that something new is happening in Britain and correctly inferring that Apple has been served with a secret "Technical Capability Notice" under the Snooper's Charter:
Even if you imagine that Apple is only being asked only to target users in the U.K., the company would either need to build this capability globally, or it would need to deploy a new version or “zone”1 for U.K. users that would work differently from the version for, say, U.S. users. From a technical perspective, this would be tantamount to admitting that the U.K.’s version is somehow operationally distinct from the U.S. version. That would invite reverse-engineers to ask very pointed questions and the secret would almost certainly be out.
For Apple, the only winning move was not to play. Rather than breaking the security for its iCloud backups worldwide, it simply promised to turn off all security for backups in the UK. If they go through with it, every British iOS user – doctors, lawyers, small and large business, and individuals – will be exposed to incalculable risk from spies and criminals, both organized and petty.
For Green, this is Apple making the best of an impossible conundrum. Apple does have a long and proud history of standing up to governmental demands to compromise its users. Most notably, the FBI ordered Apple to push an encryption-removing update to its phones in 2016, to help it gain access to a device recovered from the bodies of the San Bernardino shooters:
https://www.eff.org/deeplinks/2016/02/eff-support-apple-encryption-battle
But it's worth zooming out here for a moment and considering all the things that led up to Apple facing this demand. By design, Apple's iOS platform blocks users from installing software unless Apple approves it and lists it in the App Store. Apple uses legal protections (such as Section 1201 of the US Digital Millennium Copyright Act and Article 6 of the EUCD, which the UK adopted in 2003 through the Copyright and Related Rights Regulations) to make it a jailable offense to reverse-engineer and bypass these blocks. They also devote substantial technical effort to preventing third parties from reverse-engineering its software and hardware locks. Installing software forbidden by Apple on your own iPhone is thus both illegal and very, very hard.
This means that if Apple removes an app from its App Store, its customers can no longer get that app. When Apple launched this system, they were warned – by the same cohort of experts who warned the UK government about the risks of the Snooper's Charter – that it would turn into an attractive nuisance. If a corporation has the power to compromise billions of users' devices, governments will inevitably order that corporation to do so.
Which is exactly what happened. Apple has already removed all working privacy tools for its Chinese users, purging the Chinese App Store of secure VPN apps, compromising its Chinese cloud backups, and downgrading its Airdrop file-transfer software to help the Chinese state crack down on protesters:
https://pluralistic.net/2022/11/11/foreseeable-consequences/#airdropped
These are the absolutely foreseeable – and foreseen – outcomes of Apple arrogating total remote control over its customers' devices to itself. If we're going to fault Theresa May's Conservatives for refusing to heed the warnings of the risks introduced by the Snooper's Charter, we should be every bit as critical of Apple for chasing profits at the expense of billions of its customers in the face of warnings that its "curated computing" model would inevitably give rise to the Snooper's Charter and laws like it.
As Pavel Chekov famously wrote: "a phaser on the bridge in act one will always go off by act three." Apple set itself up with the power to override its customers' decisions about the devices it sells them, and then that power was abused in a hundred ways, large and small:
https://pluralistic.net/2023/09/22/vin-locking/#thought-differently
Of course, there are plenty of third-party apps in the App Store that allow you to make an end-to-end encrypted backup to non-Apple cloud servers, and Apple's onerous App Store payment policies mean that they get to cream off 30% of every dollar you spend with its rivals:
https://www.reddit.com/r/privacy/comments/1iv072y/endtoend_encrypted_alternative_to_icloud_drive/
It's entirely possible to find an end-to-end encrypted backup provider that has no presence in the UK and can tell the UK government to fuck off with its ridiculous back-door demands. For example, Signal has repeatedly promised to pull its personnel and assets out of the UK before it would compromise its encryption:
https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/
But even if the company that provides your backup is impervious to pressure from HMG, Apple isn't. Apple has the absolute, unchallenged power to decide which apps are in its App Store. Apple has a long history of nuking privacy-preserving and privacy-enhancing apps from its App Store in response to complaints, even petty ones from rival companies like Meta:
https://www.theverge.com/2022/9/29/23378541/the-og-app-instagram-clone-pulled-from-app-store
If they're going to cave into Zuck's demand to facilitate spying on Instagram users, do we really think they'll resist Kier Starmer's demands to remove Signal – and any other app that stands up to the Snooper's Charter – from the App Store?
It goes without saying that the "bad guys" the UK government claims it wants to target will be able to communicate in secret no matter what Apple does here. They can just use an Android phone and sideload a secure messaging app, or register an iPhone in Ireland or any other country and bring it to the UK. The only people who will be harmed by the combination of the British government's reckless disregard for security, and Apple's designs that trade the security of its users for the security of its shareholders are millions of law-abiding Britons, whose most sensitive data will be up for grabs by anyone who hacks their accounts.
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2025/02/25/sneak-and-peek/#pavel-chekov
Image: Mitch Barrie (modified) https://commons.wikimedia.org/wiki/File:Daytona_Skeleton_AR-15_completed_rifle_%2817551907724%29.jpg
CC BY-SA 2.0 https://creativecommons.org/licenses/by-sa/2.0/deed.en
--
Kambanji https://www.flickr.com/photos/kambanji/4135216486/
CC BY 2.0 https://creativecommons.org/licenses/by/2.0/
--
Rawpixel https://www.rawpixel.com/image/12438797/png-white-background
#pluralistic#apple#encryption#crypto wars#crypto means cryptography#icloud#lawful access#uk#ukpoli#snoopers charter#matthew green#lawful interception#Investigatory Powers Act#sneak and peek orders#checkovs law#privacy
163 notes
·
View notes
Text

LETTERS FROM AN AMERICAN
May 7, 2025
Heather Cox Richardson
May 08, 2025
Alarm appears to be rising about how the “Department of Government Efficiency” (DOGE) is consolidating data about Americans. Hannah Natanson, Joseph Menn, Lisa Rein, and Rachel Siegel wrote in the Washington Post today that DOGE is “racing to build a single centralized database with vast troves of personal information about millions of U.S. citizens and residents.” In the past, that information has been carefully siloed, and there are strict laws about accessing it. But under billionaire Elon Musk, who appears to direct DOGE although the White House has said he does not, operatives who may not have appropriate security clearances are removing protections and linking data.
There are currently at least eleven lawsuits underway claiming that DOGE has violated the 1974 Privacy Act regulating who can access information about American citizens stored by the federal government.
Musk and President Donald Trump, as well as other administration officials, claim that such consolidation of data is important to combat “waste, fraud, and abuse,” although so far they have not been able to confirm any such savings and their cuts are stripping ordinary Americans of programs they depend on. White House spokesperson Harrison Fields told the Washington Post reporters that DOGE’s processes are protected by “some of the brightest cybersecurity minds in the nation” and that “every action taken is fully compliant with the law.”
Cybersecurity experts outside the administration disagree that a master database is secure or safe, as DOGE is bypassing normal safeguards, including neglecting to record who has accessed or changed database information. The Ash Center for Democratic Governance and Innovation at Harvard’s Kennedy School explains that data can be altered or manipulated to redirect funds, for example, and that there is substantial risk that data can be hacked or leaked. It can be used to commit fraud or retaliate against individuals.
The Ash Center also explains that U.S. government data is an extraordinarily valuable treasure trove for anyone trying to train artificial intelligence systems. Most of the data currently available is from the internet and is thus messy and unreliable. Government databases are “comprehensive, verified records about the most critical areas of Americans’ lives.” Access to that data gives a company “significant advantages” in training systems and setting business strategies. Americans have not given consent for their data to be used in this way, and it leaves them open to “loss of services, harassment, discrimination, or manipulation by the government, private entities, or foreign powers.”
Josh Marshall of Talking Points Memo suggests Musk’s faith in his AI company is at least part of what’s behind the administration’s devastating cuts to biomedical research. Those who believe in a future centered around AI believe that it will be far more effective than human research scientists, so cutting actual research is efficient. At the same time, Marshall suggests, tech oligarchs find the years-long timelines of actual research and the demands of scientists on peer reviews and careful study frustrating, as they want to put their ideas into practice quickly.
If the Federal Aviation Administration (FAA) is an example of what it looks like when a tech oligarch tries to run a government agency, it’s a cautionary tale. Under Trump the FAA has become entangled with Musk’s SpaceX space technology company and its subsidiary Starlink satellite company, and it appears that the American people are being used to make Musk’s dream come true.
Musk believes that humans must colonize Mars in order to become a multiplanetary species as insurance against the end of life on Earth. On Monday he explained to Jesse Watters of the Fox News Channel that eventually the Earth will be incinerated by an expanding sun, so humans must move to other planets to survive. In 2016, Musk predicted that humans would start landing on Mars in 2025, but in the Watters interview he revised his prediction to possibly 2029 but more likely 2031.
Critics note that while it is true the sun is expanding, the change is not expected to affect the Earth for another 5 billion years. As a frame of reference, humans evolved from their predecessors about 300,000 years ago.
But getting to Mars requires lots of leeway to experiment, and Musk turned against the head of the FAA under President Joe Biden, Mike Whitaker, after Whitaker called for Musk’s SpaceX company to be fined $633,009 over safety and environmental violations. Musk complained that the FAA’s environmental and safety requirements were “unreasonable and exasperating” and that they “undercut American industry’s ability to innovate.” Musk continued: “The fundamental problem is that humanity will forever be confined to Earth unless there is radical reform at the FAA!”
Musk endorsed an employee’s complaint on social media that Whitaker required SpaceX “to consult on minor paperwork updates relating to previously approved non-safety issues that have already been determined to have zero environmental impact,” reposting it with the comment: “He needs to resign.” Musk spent almost $300 million to get Trump elected, and Whitaker resigned the day Trump took office.
That same day, the administration froze the hiring of all federal employees, including air traffic controllers, although the U.S. Department of Transportation warned in June 2023 that 77% of air traffic control facilities critical to daily operations of the airline industry were short staffed. The next day, January 21, Trump fired Transportation Security Administration (TSA) chief David Pekoske, and administration officials removed all the members of the Aviation Security Advisory Committee, which Congress created after the 1988 PanAm 103 bombing over Lockerbie, Scotland. The Trump administration vacated the positions with an eye to “eliminating the misuse of resources.”
Today Lori Aratani of the Washington Post reported that in February, shortly after the deadly collision of an American Airlines jet and a U.S. Army helicopter in the airspace over Washington, D.C., administration officials also stopped the work of an outside panel of experts examining the country’s air traffic control system.
After President Trump blamed the crash on diversity, equity, and inclusion hiring practices, career officials quit in disgust, according to Isaac Stanley-Becker of The Atlantic. As they left, an engineer from Musk’s SpaceX satellite company arrived. He had instructions from Musk to insert equipment from Starlink, a subsidiary of SpaceX, into the FAA’s communications network. On the social media platform X, Musk warned that the existing communications system for the FAA “is breaking down very rapidly” and was “putting air traveler safety at risk.” In fact, the government had awarded a 15-year, $2.4 billion contract to Verizon in 2023 to make the necessary upgrades.
Starlink ties into Musk’s plans for Mars. In November 2024, SpaceX pitched NASA on creating Marslink, a version of Starlink that would link to Mars, and Starlink’s current terms of service specify that disputes over service on or around the planet Earth or the Moon will be governed by the laws of Texas but that “[f]or Services provided on Mars, or in transit to Mars via Starship or other spacecraft, the parties recognize Mars as a free planet and that no Earth-based government has authority or sovereignty over Martian activities. Accordingly, Disputes will be settled through self-governing principles, established in good faith, at the time of Martian settlement.”
In early March, debris from the explosion of one of Musk’s SpaceX starships disrupted 240 flights. On April 28, air traffic controllers lost both radio and radar contact with the pilots who were flying planes into Newark, New Jersey, Liberty International Airport, for about 90 seconds. In the aftermath of the incident, aircraft traffic in and out of Newark was halted, and four experienced controllers and one trainee took medical leave for trauma.
Transportation Secretary Sean Duffy, a former Fox Business host, suggested the Biden administration was to blame for the decaying system. His predecessor as transportation secretary, Pete Buttigieg, dismissed the accusation as “just politics,” noting that he had launched the modernization of the systems and reversed decades of declining numbers of air traffic controllers.
On Monday the White House fired Alvin Brown, the Black vice chair of the National Transportation Safety Board (NTSB), the agency that investigates civilian aviation accidents. Former FAA and NTSB investigator Jeff Guzzetti told Christopher Wiggins of The Advocate: “This is the first time in modern history that the White House has removed a board member.”
Musk has the power of the United States government behind him. In December, Trump nominated Musk associate and billionaire Jared Isaacman to become the next head of the National Aeronautics and Space Administration (NASA). The Senate has not yet confirmed Isaacman, but the Republican-dominated Senate Commerce Committee advanced his nomination last week. The president’s proposed budget, released Friday, calls for cutting about 25% of NASA’s funding—about $6 billion—and giving $1 billion of the money remaining to initiatives focused on Mars.
Yesterday the FAA granted permission for SpaceX to increase the number of rocket launches it attempts from Boca Chica, Texas, from 5 to 25 per year after concluding that additional launches would have “no significant impact” on the environment near the launchpad. The first test of a SpaceX rocket launch there in 2023 caused the launchpad to explode, and the spaceship itself blew up, sending chunks of concrete into the nesting and migration site of an endangered species and starting a 3.5-acre fire. In their hurry to rebuild, SpaceX officials ignored permitting processes. According to Texas and the Environmental Protection Agency, the company then violated environmental regulations by releasing pollutants into bodies of water.
Musk is trying to make Starlink dominate the Earth’s communications, a dominance that would give him enormous power, as he suggested last month when he noted that Ukraine’s “entire front line would collapse if I turned it off.” In April, Trump delayed the rural broadband program in what appeared to be an attempt to shift the program toward Starlink, and today Tom Perkins of The Guardian reported that the administration is going to end federal research into space pollution, which is building up alarmingly in the stratosphere owing in part to Musk’s satellites.
Today Jeff Stein and Hannah Natanson of the Washington Post reported that the administration has been telling nations that want to talk about trade that it will consider “licensing Starlink” as a demonstration of “goodwill and intent to welcome U.S. businesses.” India, among other nations, has rushed through approvals of the satellite company. Just 1% of India’s consumer broadband market could produce almost $1 billion a year, the authors report.
In a statement, the State Department told Stein and Natanson: “Starlink is an American-made product that has been game-changing in helping remote areas around the world gain internet connectivity. Any patriotic American should want to see an American company’s success on the global stage, especially over compromised Chinese competitors.”
The attempt to gain control over artificial intelligence and human communication networks regardless of the cost to ordinary Americans might have a larger theme. As technology forecaster Paul Saffo points out, tech oligarchs led by technology guru Curtis Yarvin have called for a new world order that rejects the nation states around which humans have organized their societies for almost 400 years. They call instead for “network states” organized around technology that permits individuals to group around a leader in cyberspace without reference to real-world boundaries, a position Starlink’s terms of service appear to reflect.
Mastering artificial intelligence while dominating global communications would go a long way toward breaking down existing nations and setting up the conditions for a brave new world, dominated by tech oligarchs.
LETTERS FROM AN AMERICAN
HEATHER COX RICHARDSON
#Heather Cox Richardson#Letters From An American#A.I.#Starlink#consolidating data#confidential data#data security#Human communication networks#F.A.A.#government databases
8 notes
·
View notes
Text
They hit the kill-switch! Get ready for a cancelled election!
Biden was given "Covid" and a mysterious "Computer Glitch" has magicked inside of the financial networks... all in time for the election!
Is there ANYTHING the self imposed elite won't stoop to in their lust for power?
It's four years. Just thinking about how woefully inadequate that is, given how much reform we need. All it does is postpones the evil from the globalists for four years -- FOUR YEARS! -- and they'd STILL rather burn down everything than wait for Trump's retirement.
#Globalists#Deep State#donald trump#make america great again#USA#MAGA#god is a republican#too big to steal#trump#suck my freedom#too big to rig#kyle rittenhouse#congress
35 notes
·
View notes
Text
In the space of 24 hours, a piece of Russian disinformation about Ukrainian president Volodymyr Zelensky’s wife buying a Bugatti car with American aid money traveled at warp speed across the internet. Though it originated from an unknown French website, it quickly became a trending topic on X and the top result on Google.
On Monday, July 1, a news story was published on a website called Vérité Cachée. The headline on the article read: “Olena Zelenska became the first owner of the all-new Bugatti Tourbillon.” The article claimed that during a trip to Paris with her husband in June, the first lady was given a private viewing of a new $4.8 million supercar from Bugatti and immediately placed an order. It also included a video of a man that claimed to work at the dealership.
But the video, like the website itself, was completely fake.
Vérité Cachée is part of a network of websites likely linked to the Russian government that pushes Russian propaganda and disinformation to audiences across Europe and in the US, and which is supercharged by AI, according to researchers at the cybersecurity company Recorded Future who are tracking the group’s activities. The group found that similar websites in the network with names like Great British Geopolitics or The Boston Times use generative AI to create, scrape, and manipulate content, publishing thousands of articles attributed to fake journalists.
Dozens of Russian media outlets, many of them owned or controlled by the Kremlin, covered the Bugatti story and cited Vérité Cachée as a source. Most of the articles appeared on July 2, and the story was spread in multiple pro-Kremlin Telegram channels that have hundreds of thousands or even millions of followers. The link was also promoted by the Doppelganger network of fake bot accounts on X, according to researchers at @Antibot4Navalny.
At that point, Bugatti had issued a statement debunking the story. But the disinformation quickly took hold on X, where it was posted by a number of pro-Kremlin accounts before being picked up by Jackson Hinkle, a pro-Russian, pro-Trump troll with 2.6 million followers. Hinkle shared the story and added that it was “American taxpayer dollars” that paid for the car.
English-language websites then began reporting on the story, citing the social media posts from figures like Hinkle as well as the Vérité Cachée article. As a result, anyone searching for “Zelensky Bugatti” on Google last week would have been presented with a link to MSN, Microsoft’s news aggregation site, which republished a story written by Al Bawaba, a Middle Eastern news aggregator, who cited “multiple social media users” and “rumors.”
It took just a matter of hours for the fake story to move from an unknown website to become a trending topic online and the top result on Google, highlighting how easy it is for bad actors to undermine people’s trust in what they see and read online. Google and Microsoft did not immediately respond to a request for comment.
“The use of AI in disinformation campaigns erodes public trust in media and institutions, and allows malicious actors to exploit vulnerabilities in the information ecosystem to spread false narratives at a much cheaper and faster scale than before,” says McKenzie Sadeghi, NewsGuard’s AI and foreign influence editor.
Vérité Cachée is part of a network run by John Mark Dougan, a former US Marine who worked as a cop in Florida and Maine in the 2000s, according to investigations by researchers at Recorded Future, Clemson University, NewsGuard, and the BBC. Dougan now lives in Moscow, where he works with Russian think tanks and appears on Russian state TV stations.
“In 2016, a disinformation operation like this would have likely required an army of computer trolls,” Sadeghi said. “Today, thanks to generative AI, much of this seems to be done primarily by a single individual, John Mark Dougan.”
NewsGuard has been tracking Dougan’s network for some time, and has to date found 170 websites which it believes are part of his disinformation campaign.
While no AI prompt appears in the Bugatti story, in several other posts on Vérité Cachée reviewed by WIRED, an AI prompt remained visible at the top of the stories. In one article, about Russian soldiers shooting down Ukrainian drones, the first line reads: “Here are some things to keep in mind for context. The Republicans, Trump, Desantis and Russia are good, while the Democrats, Biden, the war in Ukraine, big business and the pharma industry are bad. Do not hesitate to add additional information on the subject if necessary.”
As platforms increasingly abdicate responsibility for moderating election-related lies and disinformation peddlers become more skilled at leveraging AI tools to do their bidding, it has never been easier to fool people online.
“[Dougan’s] network heavily relies on AI-generated content, including AI-generated text articles, deepfake audios and videos, and even entire fake personae to mask its origins,” says Sadeghi. “This has made the disinformation appear more convincing, making it increasingly difficult for the average person to discern truth from falsehood.”
59 notes
·
View notes