Blog

  • Defending Free Business & Private Property with Enhanced Fiduciary Duty

    Defending Free Business & Private Property with Enhanced Fiduciary Duty

    Corporate leaders do not fulfill fiduciary duty to shareholders in the spirit of the laws by allowing company property, some of which enables strategic advantage over free nations, to slide into the maw of autocracy. The Congress and legislatures of the United States, the 50 states, and U.S.-based business lobbies have embraced a zombified version of fiduciary duty to deliver short range profits while handing corporate property rights to autocrats for market access.

    The foundation of free business is constitutional republican democracy (CRD) without which no private business would be free to innovate, own, hold and use private property according to the will of its ownership. Nor would business leaders be free to manage supply and demand to serve the best interests of shareholders, customers, suppliers, creditors, and vendors.

    IP-rights-for-market-access and other autocrat-leveraged arrangements divert taxable royalty revenues away from U.S., state, and local tax bases to authoritarian regime accounts.

    The spirit, rule of law, and policy question for CRD-based businesses is this:

    Should Congress legislate that business decision makers’ fiduciary duty to shareholders includes the duty to uphold the sovereignty of their CRD that in return provide for the security and rights of lawful U.S. businesses and workforces? The answer is an overdue yes.

    If fiduciary duty law does not expand to embolden corporate leaders to uphold CRD in international business relations, China and Russia will continue to manipulate free nations’ shallow fiduciary duty law to serve relatively short term shareholder profits over the perpetuity of private property and free business rights themselves.

    Corporate decision makers will continue to fear shareholder liability under current profit-centered fiduciary duty law should they reject autocratic offers of market access.

    Under the currently anemic fiduciary duty law scheme, U.S. and allied CRDs are on the ropes after immense strategic losses in intellectual property, trade secrets, energy market share, gray influence warfare, and competitive advantage to China and Russia.

    Congress must act to legislate a constitutionally-expanded definition of officers’ and directors’ fiduciary duties to uphold CRD as the source, guarantor, and guardian of private-propertied, free business.

  • The Shape of Political Subversion: Executive to Legislative

    The Shape of Political Subversion: Executive to Legislative

    The exodus of GOP conservatives from Congress continues into 2022 with Ohio Rep. Anthony Gonzalez withdrawing from a primary contest in submission to a Trump-controlled candidate. It is not often a young incumbent steps down, especially one who expands and diversifies the GOP tent in the spirit of former President George W. Bush’s once Latino-friendly leadership of the party.

    The Ohio Republicans’ treatment of Rep. Gonzalez reveals an autocratically re-aligned GOP entity in which a GOP member cannot exercise representative conscience under his oath to uphold the U.S. Constitution by voting to impeach the former head of the GOP for inciting an attack on the co-equality and independence of the U.S. Senate in its election certification role. And that, based on frivolous lawsuits and anemic evidence against which the traditional GOP advocated “tort reform.”

    Retaliating for Rep. Gonzalez’s vote to impeach him, the ex-President called Rep. Gonzalez a “sell-out” in June 2021 as if constitutionally-framed political conscience was something for sale. The Ohio GOP censured Gonzalez, and indeed, one could say it censored him, too. The Ohio GOP in this case, behaved like the old Soviet communist party, banning conscience and intellectual dissent with regard to a personality cult leader of “The Party.”

    Together with the Q-element infecting the GOP today, this personality-cult problem expresses more of a mass psychological operation of reflexive control than a domestic political shift anywhere in particular. Much of the GOP has aligned itself with a man who behaves as dictators do the world over, and gives comfort to dictators and autocrats who have realized more power and favor in the past 4 years than they had as satellites of Moscow and Beijing in the 20th Century.

    As Rep. Gonzalez steps away to shelter his family from the scorched-earth politics mainstreamed in the GOP by Trump-pardoned felon and nihilist Roger Stone’s corrosive influence, fringe conspiracy-theorists falsely cloak themselves in the Republican Party brand and run for office so as to deepen the personality cult and fanaticism in the GOP.

    How did it get this bad? The potential in the GOP to be leveraged by an adversarially-controlled demagogue hit an obvious tipping point in the litigated election of Bush v. Gore, 2000. In two years prior, Vladimir Putin had been given the time as head of the FSB in 1998 and as First Prime Minister in 1999 to forecast the nearness of such a tipping point from his ‘main enemy’s’ litigation of the Clinton impeachment as if the “gridlock” complaint memorably panned by Ross Perot in the 1992 Presidential election were prophecy coming true. Indeed, the partisan wars from Watergate to Monicagate did set the stage for anger over unresolved, gridlocked issues heating-up the nation’s politics such that a third party exploit might provide a tipping point for a foreign intelligence effort.

    The Gallup polls during the 2000 presidential election season (seen below) would have provided Putin’s KGB-dominated Russian state with confirmation that political warfare operations against the United States could work, and would be the most cost-effective end-run around U.S. military superpower. Spoiled American civilian society and leadership would have to become the inroad to undermining U.S. military and economic advantage.

    The Russians have centuries of experience with political intrigue, human manipulation, personality cultism, provocation, mental warfare, infiltration, and deception. With the internet, Putin and his KGB regime could leverage that experience into American homes and offices via desktops, laptops, and phones. That these highly-effective devices had brought Americans to a stage of psychological obsession, addiction, dependence, and short-attention span was all the better, for all Russian intelligence had to do was reach through those devices into American hearts, minds, and neurological responses to reach those with the most malleable anger, and even better, the guns.

    Moscow’s window of opportunity to exploit the tipping points on display and vie for control over the United States Executive branch was concealed by what nearly a century of Soviet autocratic political, economic and military pride and competition could not achieve: the disarming of American vigilance through the appearance of Russian weakness in all of the traditional instruments of power, including HUMINT.

    Americans in their hubris considered Russia’s HUMINT capabilities passé compared with U.S. technological intelligence acumen. The Russians understood this. Then, Russian HUMINT merged with CYBERINT and SOCMINT and rode trojan horses across the open internet cables to cast spells of technological and human psychological influence on Americans’ desktops and laptops, accessing the Facebook social lives of unwitting, unprepared, and unsuspecting Americans. Of U.S. war veterans. Of blue collar business owners and workers alienated by feeling obsolete as high tech replaced low tech.

    It was online that the SVR, GRU, and FSB would pose as American patriots throughout the Obama years and contrast Barack Obama in memes with every white action hero, war veteran, and macho personality there ever was, including Putin, while aligning Obama with terrorists based on Birther- disinformation, Islamist innuendo, and hatred for Obama’s Ivy League erudition as if none of that had to do with resentful racism.

    All of that chatter may well have made President Obama react to the provocations in ways that made him appear to fit the stereotypes, as the Obama Administration did not then have the intelligence about the extent of Russia’s weaponization of Facebook, Twitter, LinkedIn and other platforms. Such was provocation warfare permissively entering into the historic social scar-tissue of American demographics.

    In the 1990s Putin’s cadres had tracked former Soviet communist party officials that went West and became clients of connected U.S. lobbyists. Those that would not follow Moscow’s dictates, Putin in the 2000s would eventually crush or cow. Those that helped Moscow achieve foreign intelligence objectives, not so much. Roger Stone and Paul Manafort had capitalized on representing former Soviet officials, oligarchs, and proxies, shopping for influence, business inroads, and luxury in the U.S. Putin’s FSB no doubt knew much about Roger Stone, Paul Manafort, and others through their former Soviet clients. Stone’s amoral and nihilistic history with Richard Nixon was so much dirty icing on the cake.

    In considering the likelihood of a relationship between Moscow and Roger Stone, Stone’s claim to C-SPAN that he was a “volunteer” exploratory committee chair for Trump’s look at a 2000 presidential run raised a red flag, for as a lobbyist with a history of representing former Soviet foreign nationals, if he were working for same, could he not claim the volunteer exemption that a foreign national could claim from the Federal Election Campaign Act so long as he did not participate in campaign decisions or contribute money? And that, because lobbyists for foreign nationals don’t have to register under the Foreign Agent Registration Act so long as they satisfy the federal Lobbying Disclosure Act and the principal beneficiary of their activities is not a foreign government or political party? Given the history of Stone’s behavior, these are reasonable questions in hindsight.

    A third party had never been able to win an election against a mainstream party for President in the U.S., but may have caused one or the other mainstream party to lose elections. From Putin’s perspective, if the most powerful elements of a third party with overlapping hot-button issues with one of the mainstream parties was to infiltrate one of them, which would make more sense? The GOP or the Democratic Party or both? Such a Trojan horse movement, properly organized and funded, could provide the people, energy, motives, and sentiments to challenge and pressure aging party leaders by attacking their roles in gridlock on one-issue controversies such as gun rights, abortion, race, and immigration. Indeed, the Soviet history of seeking out Left Wing movements in the U.S. lacked gunpowder. To infiltrate and influence a bloc of Americans with the guns would add new options that Russian intelligence could take much further.

    In 1999, Stone and Trump learned a great deal in furtherance of such a stratagem when Stone chaired Trump’s exploratory committee for a Presidential run under the Reform Party, discovering wild and woolly fringe groups, an actor-macho veteran in Jesse Ventura, a former KKK Grand Dragon and anti-Israel firebrand David Duke; anti-government militia groups; and single-issue fanatics with overlapping counterparts in mainstream party blocs.

    The Reform Party had become factional and had retreated from the United We Stand ethos under Ross Perot’s leadership in 1992. After sampling and inciting some of that factionalism to further divide the Reform Party internally, Stone and Trump announced their withdrawal from consideration under the Reform Party under the guise of finding it too bigoted and divided to patronize. In the process, Stone had discovered much about tipping points and how to recruit Reform Party spin-offs into something that came to be known as the “Tea Party.”

    In a series of emails, one can see Roger Stone’s imprint and style shared also by Trump in his operative communications aimed at dividing, leveraging, and commandeering elements of the Reform Party to infiltrate the Tea Party movement and run it as a Trojan Horse inside the GOP to usurp, divide, and party and use it as a weapon to balkanize the United States.

  • “Quackaganda” & the Art of Information Defense

    “Quackaganda” & the Art of Information Defense

    It helps to update information defense nomenclature in ways that precisely target attack vectors aimed at our national security. Recently, attacks on U.S. and allied health security seek to tie-up U.S. resources and mental bandwidth on complex iterations of alternative health narratives that take on ‘Big Pharma,’ the “medical establishment,” and corporate health as dramatic camouflage for information warfare attacks on crucial U.S. and allied COVID-19 vaccination campaigns.

    “Quackaganda” is a suitably irreverent term referring to faux-sophisticate disinformation and or misinformation degrading public health responses to infectious diseases, undermining clear and accurate health information, and damaging popular thinking about and trust in public health efforts and authorities.

    Where disinformation and misinformation can lead to death or degraded health in mass populations of targeted societies, it could be “Black Quackaganda.” COVID-19 anti-vaccine disinformation is like that because it tends to slow and suppress vaccine compliance and effectiveness. This creates time windows mostly in unvaccinated populations for COVID-19 to mutate at risk of generating more lethal strains.

    Samples of Quackaganda

    Consider recent samples of Quackaganda making internet rounds like the plague-carrying horseman of the apocalypse, mixing falsehoods with truths to try to persuade people not to get vaccinated, or, to obstruct vaccination campaigns.

    In one case of “Quackaganda” at LinkedIn, a commenter urged alternatives to COVID-19 vaccines, arguing that they “could very well lead to inter-civilizational immunity collapse.” He advocated double-masking, goggles in and outdoors, social distancing, and “rapidly dispensing prophylactic Ivermectin..to eight billion people, shown to successfully reduce COVID-19 hospitalization in Mexico City, states in Peru, Argentina, and India (Italics mine).” See below:

     

     

    Ivermectin is a livestock de-wormer and anti-parasitic that some foreign case studies correlate with less severe outcomes from COVID-19, however, do not prove causal links between Ivermectin and reduced COVID-19 hospitalizations. For example, the killing of parasites in a cross-section of patients with COVID-19 may have enhanced the immune system response and potency of patients no longer battling the parasites. That would not necessarily recommend the drug for the non-parasitized, if true. It seems too early to tell, but the above commenter takes it a step further to suggest that Ivermectin treatment and containment behaviors should replace vaccination (the anti-vaxx underpinning to the Ivermectin pitch).

    As a treatment for COVID-19, Ivermectin would itself be experimental and not proven across dosages, particularly if administered prophylactically to 8 billion people given the drug’s known side-effects, interactions, and unknown effects on human organs of the sort of dosages theorized to be needed to defeat COVID-19 hospitalization.

    Note also the agitation propaganda narrative at the bottom of the comment above:

    “If anyone resists these safe and inexpensive approaches to experimental COVID-19 vaccines, all eight billion humans can legitimately ask if you are more loyal to Pfizer, Moderna and Johnson & Johnson than you are to the ideals of your your (sic) home country and/or the human cause.”

    Strategic Communications Profiles

    Then come the strategic communications types, sometimes hired to advocate for politically powerful interests on social media, mixing partly-accurate information, unsourced data, falsehood, excessive license with data, mis-stated definitions of medical terms, and more. Here is an example of that in which the commenter grossly inflates annual influenza deaths to make COVID-19 death statistics look more like a conspiracy of fear-mongering, capitalizing on distracted Americans’ lack of currency with the actual comparative numbers:

     

     

    Below was a corrective response that exposes the inflated influenza death numbers cited by the above profile as blatant mis or disinformation:

     

     

    The same profile posting false influenza death numbers for the U.S. had also spuriously claimed that myocarditis meant permanent heart damage after overstating incidences of myocarditis post-COVID-19 vaccination. Further review of the profile’s content revealed something else. Citation of a known Russian government agency website, “Strategic Culture Foundation,” in support of anti-vaccine efforts designed to make our ally Australia appear to be “Orwellian” (see last para in comment image below):

     

     

    In late August, TIME magazine published investigative journalism that helped to illuminate a number of sources of Quackaganda. It is essential reading for those who wish to understand the kind and character of the people behind the recurring iterations of anti-vaccine ideology that evolves much like a virus.

  • Is the Zambezi River Authority a Model for Ethiopia, Egypt, and Sudan?

    Is the Zambezi River Authority a Model for Ethiopia, Egypt, and Sudan?

    Issues: The Ethiopian Grand Renaissance Dam, or GERD, is a massive Nile River dam project impacting tens of millions downstream and upstream. Ethiopia cites national sovereignty in its right to build and fill the dam to stabilize its own infrastructural, agricultural, and energy future. Egypt and Sudan cite risks to their water, agriculture, and energy supplies caused by potential non-collaborative, unilateral water management decisions by Ethiopia upriver.

    Fact: The Zambezi River Authority (ZRA) is a joint corporation formed by the governments of Zimbabwe and Zambia mostly to manage, operate, and maintain the Kariba Dam on the Zambezi River in service to the populations of both countries. The ZRA also focuses on riparian co-conservation and co-management. The two nations share costs of management, upgrades, and new construction with international and private funding sources.

    Question: Does the Zambezi River Authority model and experience offer guidance for a poly-mutually, beneficial way forward for using and managing the GERD and related Nile River conservation projects between Ethiopia, Egypt, and Sudan?

    Recent Curative Diplomacy: Most recently, U.N. and U.S. representatives have stayed the course recommending a negotiated solution on upstream and downstream Nile River management and GERD issues, citing other nations’ successes in finding multilateral solutions. Such an approach by the U.S. Biden Administration State Department would cure the contradictory, ineffective approach taken by the previous Administration that itself leaned on national sovereignty arguments to justify its own unilateral policies while impliedly threatening Ethiopia’s like conduct when then-President Trump’s comment that Egypt would be justified in blowing-up the GERD.

    Also, despite agitation propaganda aimed at undermining the World Bank over many decades, it is a World Bank supported program called Cooperation in International Waters in Africa (CIWA) that has aided successful cooperatives such as the Zambezi River Authority (ZRA), the Zambezi Watercourse Commission (ZAMCOM), and Zambezi Water Information Management System (ZAMWIS).

    Takeaway: Organized water-cycle management efforts insuring efficient, sufficient, healthy, and effective water supply and usage suggest that there is no rational necessity for imposing existential threats over water sources and cycles where international collaboration and investment can ultimately save more total resources than would be wasted on inefficient, unsustainable conflict. However, time is of the essence where advance planning has been neglected, and water supply, usage, technology, and re-collection solutions take time, expertise, and collaborative work ethic to realize.

  • Beirut’s Port Explosion: Analysis and Strategic Implications

    Beirut’s Port Explosion: Analysis and Strategic Implications

    Introduction Purpose: To analyze open source information about (1) the strategic context and (2) chain of events leading to the massive ammonium nitrate explosion in Beirut’s port on August 4th, 2020, killing some 200 people, injuring over 6,500, and displacing 250,000.¹ Pre-and-Post Explosion Context Lebanon Generally: Modern Lebanon with its East Mediterranean ports2 has been a…

    Membership Required

    You must be a member to access this content.

    View Membership Levels

    Already a member? Log in here
  • Tesla Ups Bitcoin Game with China

    Tesla Ups Bitcoin Game with China

    Setup: In Q1 February, Tesla bought 1.5 billion USD in Bitcoin, sold 10% of that for a profit, announced Tesla would accept Bitcoin for cars, then announced on May 12th on Twitter that Tesla will suspend its acceptance of Bitcoin for the negative environmental impact of its mining operations. This, while asking Tesla followers whether Tesla should accept Dogecoin for Teslas instead.

    Question: Yet Tesla had to be aware of the climate costs of Bitcoin mining before all this. What else is up?

    Analysis: China’s autocracy has used its regulatory power and influence over Chinese buyers as trade weapons to pressure U.S. companies doing business in China during the trade war. In March, China banned Teslas from sensitive defense and housing (prison?) sites on the allegation that Tesla camera systems could be used to spy on China.

    And this week, April numbers showed that Tesla’s China sales dropped 27% from March to April. Tesla has also balked this week at acquiring more land for its Shanghai Tesla plant citing the 25% Trump tariffs after April’s numbers showed a drop in Chinese sales of 27% from March 2021.

    Would it be cynical to suggest that that Tesla may have bought 1.5 billion in Bitcoin as a negotiating token with China to avoid the negative treatment some other foreign companies had received? This on the premise that China commands influence and tax power over the largest Chinese Bitcoin mining operations in the world no matter where they base themselves. Elon Musk’s influence over Bitcoin prices could therefore affect China’s bottom line. In fact, China has quickly announced crackdowns on Bitcoin mining after its dominance and climate impact became well-known, despite the deputy governor of The People’s Bank of China (PBoC) referring to it as an alternative investment as recently as mid-April 2021. Tesla appears to be hanging onto its Bitcoin despite suspending it for transactions, possibly signaling its intent to keep it as a bargaining chip and for future use. Neither by offshoring Bitcoin mining does China necessarily relinquish interests in the Bitcoin mined or influence over its holders.

    When it appeared Beijing may have influenced Chinese consumers to slow down on buying Teslas on spying and other pretexts (Huawei retaliation?) did that prompt Musk to play hardball, stop accepting Bitcoin for Teslas, and freeze further investment in Chinese expansion? Was Musk’s emphasis in his Tweet on the environmental impact of Bitcoin mining a geopolitical leadership-PR counterpunch to China?

    Some may recall Peter Thiel warning that China might be using Bitcoin as a weapon against the U.S. dollar. Although Thiel is a biased party, he makes a good point that China’s lead in Bitcoin mining is not only an economic tool of wealth absorption, but a possible weapon for use against the U.S. Dollar reserve currency, and a potential economic weapon via cryptocurrency price manipulation negatively impacting non-Chinese investors.

    Musk may have used his rockstar influence to leverage China’s Bitcoin weight against Beijing, at one point reaching a 300 Billion USD swoon in cryptocurrency markets following his Tweet. With such high exposure to China, Musk’s cryptocurrency decisions may be a form of self-insurance against the unpredictable moods of an unresolved trade war.

    To show his seriousness on the environmental pretext for suspending Bitcoin for Teslas, Tesla is reportedly entering the U.S. carbon credit market.

  • Russia’s Ties to Blasts in Czech Republic, Ukraine and Recommendations

    Russia’s Ties to Blasts in Czech Republic, Ukraine and Recommendations

    Recent History is Instructive: Massive explosions in two democracies in the past seven years suggest Russian sabotage, state terror, and military operations against sovereign neighboring and nearby states, including: (1) the Czech Republic at an ammunition depot outside Prague on Oct. 16, 2014; (2) and multiple explosions at Ukrainian ammunition depots between 2015 and 2018 including massive multi-day events at the Balakleya ammunition depot on March 2017; the Kalynivka, Ukraine ammunition depot on September 26-27, 2017, and another near Druzhba, Ukraine on October 7-8, 2018.

    Some video documentaries and discussions of the tactically-significant ammo depot explosions in the Czech Republic and Ukraine follow:

    Czech Republic Ammunition Depot Explosion, October 16, 2014

    Balakleya, Ukraine, Ammo Depot Explosion, March 2017

    Kalynivka, near Vinnytsia, Ukraine, September 2017

    Druzhba, Chernihiv Region, Ukraine, October 2018

    Contextual, Tactical Implications:

    The fires, massive explosions, and stray missile activity at the ammo depots in the Czech Republic in 2014 and in Ukraine between 2015-2018 destroyed large stores of shells, rockets, and missiles held by or destined for the Ukrainian military. Some of the depots reportedly contained older munitions and were not well manned.

    In the context of the rapid Russian military buildup and Spring offensive feint at Ukraine’s border in the month of April 2021, such tactical sabotage operations align with Russian military objectives to degrade the Ukraine military’s readiness, lethality, and morale. This series of degradations of Ukrainian military resources would also benefit Putin’s Russian nationalist, irredentist, revanchist, and mercenary fighters in Ukraine.

    Czech Republic Prime Minister Andrej Babis cited “unequivocal evidence” linking the intelligence unit of two infamous GRU foot soldiers to a fire and powerful explosion at an ammunition depot near Prague on October 16, 2014. The Czech depot reportedly contained weapons destined for delivery to the Ukraine military.

    In December 2020, Russian President Vladimir Putin told Russian journalists that he would increase aid to the areas supporting Russian speaking insurgents and irredentist forces in Ukraine, suggesting that the seemingly innocuous expression of intent to help the “people” in the Donbas may have signaled a higher aggression posture preparing for this month’s staged invasion force.

    Basic Recommendations

    (1) Ukraine, European, and Eurasian democracies must harden facilities storing munitions, heavy weaponry, light weaponry, aircraft, energy, fuel, chemical, and other material supply chains against insider threats, covert attacks, and clandestine sabotage;

    (2) When hacking surveillance and reconnaissance activity increases, implement extra physical security and vigilance at military bases, depots, throughout the supply chain, armories, and related sites. This should include insider checks, K9 bomb detection patrols, and unannounced inspections;

    (3) Assemble and train special base, depot, supply chain, storage and armory security units with combat and technical experience and capability, and assign them to prioritized installations;

    (4) Assemble and train rapid materiel removal and temporary storage teams for special circumstances;

    (5) Decentralize ammunition, munition, weapons, heavy weapons, and other military supplies so that they are movable, changeable, and support a range of Ukrainian military positions and capabilities focusing on preserving stocks and providing for continuous supply, resupply, and replenishment;

    (6) Build-up communications monitoring and decrypting capabilities;

    (7) Create anti-drone buffer zones surrounding all military supply chain sites, barracks, stations, depots, and communications facilities;

    (8) Apply faraday protection for critical circuitry, communication areas, and other operational spaces relied upon by Ukrainian command, control, and communications;

    (9) Create inspection checklists and inspection teams for insuring the maintenance, training, vetting, and execution desired. Utilize snap inspections as motivation and as a countermeasure opportunity where available;

    (10) Identify Russian and proxy hackers used to support or execute sabotage. Eliminate the means, anonymity, and secrecy by which they operate;

    (11) Seek detente via diplomacy while bringing Russian sabotage activity before the U.N. and other international bodies, especially when such aggression results in loss of human life, economic opportunity, violates nation state sovereignty, and causes related instability in the region.

    Conclusion

    The defense force that handles military materiel, supply chains, munitions, weapons, and communications in lax, non-serious, and wasteful ways is self-defeating.

  • Putin’s impulsion trends in leadership error

    Putin’s impulsion trends in leadership error

    Vladimir Putin’s military build-up on the Ukraine border and partial pull-back today, combined with visible anger in his red-line rhetoric threatening harsh punishment for those who disrespect Russia’s security interests showed signs of impulsiveness in one inexperienced at commanding military forces. It was interesting that Russian Defense Minister Sergei Shoigu signaled the pullback.

    A breakthrough force with the look of a Spring offensive, absent a clearly defined, publicly-supported security interest opens the Russian military to risks of escalation, entanglement, mission creep, overextension, and blame for an unnecessary Ukrainian and European land war. Such a war would awaken insurgent opportunism in the Caucasus,  Siberia, the Near East, Mideast, and North Africa.

    Evidence of Russian encirclement of Europe puts an imperial stamp on Putin’s activities in both hemispheres (not agreeing with every conclusion of the linked NR piece). The overall effect is destabilizing. Consistent with this trend, in December 2020, Vladimir Putin telegraphed his intention to send increase aid to Russian speaking areas in Eastern Ukraine as if these were Russia’s territories, a provocation against Kyiv and Ukraine’s sovereignty, leading to current tensions.

    In view of the above, this latest incident at the Ukraine border appears to have been impulsive on Putin’s part, acting forcefully without thinking through the unintended consequences for Russia’s real security interests versus Putin’s ideologic and legacy-oriented motives. Defense Minister Shoigu may have alerted Mr. Putin to the military risks of his target-fixation on redressing past grievances instead of dealing with today’s reality.

    Finally, Putin’s decisions leading to this Spring 2021 incident contradicts Moscow’s narratives that NATO is obsolete and Putin’s pretenses to respecting national sovereignty.

  • Capitol Hill Pipe Bomb Analysis

    Capitol Hill Pipe Bomb Analysis

    Introduction

    As authorities charge suspects in the January 6, 2021 Capitol riot and insurrection, the pipe bomber suspect recorded the night before remains a menacing question mark.

    This source-linked analysis begins with observations, questions, and analysis of the actions of the suspected pipe bomber captured on select FBI-released video segments from the U.S. Capitol Hill neighborhood on the evening of January 5, 2021. It explores events, details, and actions in context as may lead to identifying the pipe bomb suspect.

    The analysis then addresses the gray war effects of the pipe bombs placed outside the HQ’s of the RNC and DNC and found on January 6, 2021.

    Capitol Hill Pipe Bomber Video Segments: January 5, 2021

    This analysis is partly based on the embedded FBI-released video segments below. For brevity, it uses the words “suspect” and “he” without assuming gender:

    Possible Dominant Hand: In all of the video captures seen above in which the pipe bomb suspect is carrying the backpack (thought to contain the pipe bombs), he uses his right hand in a straight-arm carry to his right side. Then, at the corner of Canal and South Capitol Street on Democratic National Committee HQ premises, the suspect sits on a park bench, sets down his backpack in front of him on the ground, and appears to pull an item from the backpack. He rises, holding a shiny object in his right hand, possibly a pipe bomb, while holding the backpack in his left hand, then sits down abruptly. That he drew the object out of the backpack with his right hand and switched to holding the pack with this left suggests he is right hand dominant. (More on this segment later).

    South Capitol Street SE, Residential Sidewalk Near DNC Segment: Context and Details

    In one video segment, the suspect walks on South Capitol Street toward the Democratic National Committee HQ along a sidewalk on the residential side of the street, left to right from the camera view (See entire video at link, as this is abbreviated, then shown in detail). Below, see in order: (1) a still shot from the January 5, 2021 video; (2) a June 2019 daytime Google street view (most recent); and (3) a likely view of the security camera on a lamp post in the parking lot across the street from the residential sidewalk the suspect was on:

    Behavior / Backpack / Jeans / Glasses: The suspect first hesitates on the residential sidewalk (at Left from camera viewpoint), looks back where he came from; touches his glasses and face mask; then looks in the general direction of the camera in the parking lot across the street. He walks two more doors down the sidewalk L to R per camera view, then stops on the sidewalk in front of a house, sets the backpack on the sidewalk against a small retaining wall, and bends at the waist revealing a right-side rectangular patch on the back of his jeans. He appears to pull something from the pack (perhaps a cloth), takes-off his glasses, and stands up facing the camera again, cleaning his glasses using both hands, before replacing them on his face above his mask (which he does not remove). The suspect is gloved throughout. Backpack Detail: Fibers from the backpack, gloves, and or powders or residues adhered to them might have transferred from the backpack to rough textures on the sidewalk or retaining wall where the suspect set the backpack in this segment. Jeans Detail: Does the shape, size, and location of the patch on the back of the suspect’s trousers betray the brand?

    Glasses / DNA: It isn’t clear the suspect cleans his glasses from necessity, but when he takes them off or cleans them, it is an opening for an eyelash, eyebrow, eye-rheum, dead skin, or dandruff to fall near to where he is standing. While chances are low in a public place with nearly three months passed by, the chances that another person would have stopped at that exact spot to clean their glasses is also low. The sidewalk appeared wet that evening, and the air calm, increasing chances that fibers, hairs, lashes, or biomaterial may adhere to or snag wet, rough surfaces near to where they fell, if they did fall. The suspect had set his bag down and appeared to clean his glasses twice. The suspect was standing close to the retaining wall and leaning over when cleaning his glasses, increasing chances that any falling bio-material might find a resting place close to the base of the retaining wall in pores, cracks, or ridges of the masonry. Also, as foot traffic is highly unlikely immediately next to the retaining wall, in the event bio-material fell, odds of preservation improve.

    Sedan and Dog Walker: Behavior, Details, and Context: Seconds after the suspect finishes cleaning and replacing the glasses on his face, a small sedan with lights on passes by Right to Left per camera viewpoint (from suspect’s Left). The suspect appears to raise up on his toes for a closer look toward the passing sedan, moving streetward on the sidewalk as he does. However, he may have been looking at or past the sedan. If waiting for the sedan he seems to avoid tracking or anticipating the sedan’s arrival, yet waits for it to cross his line of vision. After the sedan passes by, he then looks to his Right at the dog walker approaching from camera-view-Left (suspect’s Right). The suspect then turns the left side of his body to the dog walker and raises his left hand to the left side of his face (adjusting glasses or mask) as if to conceal his eyes and face as the dog walker passes. Height Detail: If the height of the dog walker is determined, the relative height of the suspect should be calculable using video camera stills of the two at their intersection, correcting for relative angles, positions, and estimated inches in fore and background distance as the dog walker passes in front of the suspect before the parking lot video camera view. Route and Context Considerations: The suspect may have deliberately stopped on the sidewalk to let the dog walker pass, cleaning his glasses as a pretext for this action. Whether he stopped for the sedan, awaiting its passage is unknown for now.

    Some context and possibilities: Once the sedan and dog walker both pass by, the suspect picks up the backpack, and reverses direction. He returns in the direction from which he came, and away from the DNC HQ.  Following the suspect’s original path as if we were him, and continuing on to the DNC HQ using Google street view, we find an October 2018 daytime street view as we approach the DNC HQ on South Capitol Street SE and Canal Street. This 2018 daytime Google street view reveals a watchman at and near the controlled garage entrance of that DNC building, within eyesight of the park bench on Canal and South Capitol Street that the suspect was captured by surveillance video sitting on in another segment (See embed of area and watchman below, expanding, or grabbing and panning the scene). 

    If the suspect continued his reversed course after the sedan and dog walker passed by, he would have been moving away from this DNC HQ scene and would have followed the sedan that may have passed by the below scene under winter conditions (no leaves on some trees). If the sedan was a suspect contact vehicle (not known), the suspect may have rendezvoused with it for information, for a ride, or both, as the sedan’s occupant(s) likely would have cased the DNC building moments before. Was a watchman on duty? Was a change of guard coming-up? If the sedan did or did not pick-up the suspect, the suspect may have ridden or walked around the block in a clockwise direction (see map below street view), (a) up South Capitol Street SE toward the Capitol, (b) Right on D Street SE, (c) Right on New Jersey Ave SE, then (d) Right on Ivy Street (unmarked on map below, zoom in x 1 to see) which leads back to the side of the DNC HQ building from which it appears the suspect approaches to sit on the park bench at the DNC HQ building curtilage at Canal Street SE and South Capitol Street SE some 12 minutes after his sidewalk stop for glasses cleaning. The Canal Street SE and South Capitol Street SE area can be seen in the October 2018 Google street view below and in the FBI’s released park bench video segment from different perspectives, however, with both showing the same landscaping and property features such as the spherical concrete barriers at the corner / intersection perimeter of the property along Capitol and Canal streets.

    Metadata inquiries: Could phone providers privately and anonymously contact device owners whose device location data for the evening in question shows-up along the suspect’s path, including possibly the dog walker, to ask if they would interview with authorities? Any information on the suspect’s direction or route out of sight of cameras could lead to more surveillance recordings, witnesses, or observations.

    One report suggested the suspect may have accessed a car. Would a late model vehicle with a trackable onboard system show up at or near that time-space in searchable, stored location metadata?

    DNC Park Bench at South Capitol Street SE and Canal Street Video Segment:

    Behavior and Details: At the corner of Canal and South Capitol Street on Democratic National Committee HQ premises, the suspect sits on a park bench. Shoulder Movement Detail: On seating himself and setting his backpack on the ground, the suspect makes a motion that appears as if he was adjusting or removing shoulder straps, although no shoulder straps appear visible on the outside of his hoodie in the video segment. He could have been symmetrically exercising his shoulders after carrying the backpack and setting it down, but the movement stood out as odd. Also, could he have been adjusting something he was wearing under the hoodie? Was there a form of communication worn underneath his hoodie, a holster with a weapon, or other wearable? Relating back to his repeat touching of his mask and glasses, did he have earpieces he was readjusting or securing? Camera or Surveillance Awareness: Once or twice the suspect looks back toward the capturing camera’s direction with a fairly fast head motion, and appears concerned with moving quickly as he opens and searches his backpack. Shiny Object Detail: The suspect leans forward on the bench, roots around in his bag, and appears to pull an item from the backpack. He soon rises, holding a shiny object in his right hand, possibly pipe bombs, while holding the backpack in his left hand, then sits down abruptly. Was this because he remembered the sense or knowledge of surveillance or possible surveillance from behind and to his right? Did he stand-up on impulse feeling urgency to get rid of the pipe bombs yet forgetting the pipe bombs would reflect nearby lights?

    Alley between Capitol Club and RNC Segment:

    Behavior: As the suspect walks down the alley between the Capitol Club and RNC at about 8:14 p.m., at first he avoids the water or moisture standing in the center of the alley. Footprint Detail: Yet as he approaches stairs descending from Right per the camera viewpoint, he looks up at them, loses orientation somewhat, and walks over into the moist or liquid drainage area at the center of the alley, which could have produced footprints in or to the left side of the liquid as he walked out of the drainage. While unlikely to survive three months time, if collected successfully at any point, the Capitol pipe bomber’s footprints could provide more information on shoe size, tread pattern or irregularity, or, if the moisture caused some earth or substance stuck to the treads of the shoes to dislodge and remain on the alley surface, yield more information about where the suspect had been.

    Capitol Club Sidewalk, RNC Video Segment:

    Behavior: In another segment at 8:14 p.m. the suspect walks on the sidewalk past the entrance of the Capitol Club on South Capitol Street near the RNC HQ, glances at the Capitol Club entrance in the general direction of the camera, then looks ahead as lights approach, moving a free left arm in a semi-circular exercise while straight-arm carrying a backpack with the right arm. This, just before a light colored SUV crossover (taxi? shuttle?) with trim, stripes, or decals passes by in the opposite direction. Implications of the arm movement may include a signal to others, possibly the SUV occupants; or a self-conscious movement to appear to be out for exercise rather than simply carrying dead-weight with one arm down the street as the vehicle approached. Possible footprint media: Toward the last seconds of this segment, the suspect approaches light colored sidewalk bricks appearing to have been soiled by some kind of substance, adhesive, earth, or spill. During or after his arm exercise, the suspect comes close to stepping in the discolored areas. Time and Date Detail: Whether Friday evening after 8:00 p.m. would be a busy dinner hour would be a matter of local knowledge. Any number of vehicles parked along the street may have had someone waiting inside, with potential witnesses.

    Possible Further Information Sources Toward Identification

    Gait: Neither automated or expert forensic gait analyses are scientifically established positive identification methods. However, properly vetted to evidentiary standards, they can aid in identification or non-identification. If automated gait recognition software advances to reliably search, find, and compare legally available, possible video matches with the suspect’s digitally captured gait from January 5, 2021, then a search of video surveillance captures within a reasonable proximity in location, time, and travel paths to and from Capitol Hill surrounding January 5-6 2021 might yield possible matches. It is reasonable to search back a week or so ahead of the former president’s tweeted announcement of the January 6 rally and protest of the vote certification in the Capitol.

    Historical uses for gait analysis are many. Medical gait analyses can detect pathology in a suspect’s gait. Biomechanics Engineers have begun to study gait differences by race for medical purposes. Forensic podiatrists help analyze footprint, footfall, and footwear evidence, merging these with gait analyses. These remain partial aids to understanding imperfect digital captures of suspect gait, while efforts continue toward standardization of gait analysis methods, for example, “Morphometric assessment.” 

    First Impression of Gait: This writer’s first impression, which could be wrong, when viewing the suspect’s physical proportions and gait, particularly the alley capture between the RNC and Capitol Club and in front of the Capitol Club was that the suspect could be a small to average sized male of near or far eastern Asian descent, wearing shoes he may have been unaccustomed to wearing. I deduced this from the mostly short, efficient stride, and how his gait appeared centered and relaxed (not lumbering, walking on heels,  or with a swagger, as seems a more western trait). This seemed especially so when he believed he was in less exposed locations such as the alleyway before reaching the stairs. However, the suspect seemed to lose physical centeredness or focus when cognitively distracted by potential encounters, surveillance, and or discovery, as when he approached the stairs in the alleyway, peered around the corner and up, and then apparently drifted to center, stepping into the wet drainage channel in the center. Also, he seemed to lose focus after showing concern for surveillance over his shoulder at the park bench at the DNC, rising prematurely (impulsively?) and holding a shiny object exposed to the building camera, then quickly sitting down again. On the residential segment after looking behind and possibly realizing the dog walker was coming, the suspect turned, walked and then stumbled slightly. These are intuitive impressions based on observation, memory, experience, and first impression. Deception in presentation is always a possibility.

    Infrared and Other Scans: With enough reliable profile data about the suspect, including credible estimates of height, weight, gait, footprints, shoe type, and other data, authorities should try to preserve incoming and outgoing passenger and commuter information including air, train, ship, charter, cargo, government, and other information from a reasonable time surrounding the suspect’s Capitol Hill presence on January 5, 2021. This would attempt to include relevant infrared face /body scans, video captures, and luggage imaging for such passengers or commuters.

    Shoes and Gait: The suspect wore distinctive, rubber-soled Nike court shoes and in one segment rose up on the toes of those shoes as if to get a better look at something in the distance while standing on a sidewalk just before a dog walker passed by. At one point the suspect stumbled a bit on the sidewalk. Was the suspect used to these shoes? Would thick-soled court shoes change a person’s gait?  Was the shoe type randomly selected or planned for appearances? What are the main characteristics of the largest market for the shoes? How would wearing other shoes or no shoes (as in an airport line) change the suspect’s gait and height?

    The Pipe Bombs: Planting, Purpose, and Effects

    The pipe bombs planted outside the RNC and DNC in the Capitol Hill area of Washington D.C. on January 5, 2021 may imply gray information and influence warfare by conduct as much or more than direct, purposeful terrorism.

    The Act of Planting But Not Detonating Pipe Bombs: Why the pipe bombs were not detonated is unknown, as they were viable. If they did not fail for technical reasons, it seems they must have intentionally or accidentally not been set to explode.

    If intentionally or accidentally not set, why? Some possibilities:

    (1) the bombs were meant to be found unexploded, reported to authorities, and the bomb planting suspect seen on video and discussed in the media for information warfare purposes;

    (2) the pipe bombs were intended for pickup by arrangement with a specific party to use but for some reason the party did not pickup;

    (3) the pipe bombs were planted in anticipation of a person who would stop by later and set their timers in place, but did not;

    (4) the pipe bombs were planted in case a random, radicalized party may find and use them, given what was to occur the next day at the Capitol, but they did not; and or

    (5) some combination of the above.

    For (2) above to be true, it would seem the pipe bombs would have been left in a concealed location for secure transfer to the intended party, not in the relative open to be easily discovered and reported. Dedicated terrorists would arrange secure transfer and use.

    For (2) or (3) to be true, it would mean the party responsible for the operation risked twice the public exposure, surveillance, and discovery risk of using two participants, ineffective placement, and a problematic timing gap between planting and likely timed use.

    For (4) to be true, the unlikely timing gap between planting the pipe bombs and the arrival of the crowds from which a radicalized insurrectionist might find the pipe bombs is too great for this to be a serious motive.

    Also, any and all of the above problems with the timing, location, and unset status of the pipe bombs makes detonation a less likely priority for whoever was in charge of the operation.

    Absent technical issues, logistical fails, or communication breakdowns, if the pipe bombs’ timers were intentionally not set, possibility (1) above is more likely: The pipe-bombs were an information warfare tool planted for near-certain discovery, reporting to authorities, and media broadcast to get public help with catching a mysterious suspect who apparently managed to sanitize the scene and situation of identifying evidence for nearly 3 months.

    ‘Homemade’ Black Powder: Authorities found what they described as homemade black powder in the pipe bombs. This could mean, or be meant to suggest, domestic non-professional actors, or, an effort to avoid the appearance of professional or state actors. The label “home made,” must not be used to assume that someone of domestic citizenship made the black powder, that it was made domestically, or that it was made by non-professionals, although any of those could be so.

    Information Warfare Pattern and Effect: The placement of pipe bombs at or near both the DNC and RNC sites offers animosity toward both mainstream U.S. parties and appears to be information warfare messaging by conduct. The act seems to assume that there would be favorable reception among Capitol rioters, insurrectionists, domestic extremists, conspiracists, and increasing numbers of the former president’s base that the established U.S. Constitutional governing system is a nefarious, “establishment,” “cabal,” or “deep state.”

    The near certain discovery and public knowledge of the discovery of viable bombs, amplified by media broadcast and video of the suspect might tend to egg-on a cross-section of suggestible U.S.-based extremists to prove they can succeed where the failed pipe bomber could not.

    The planting of pipe bombs in this case, absent an operational or technical defeat of their use, suggests the will to a slower-burn escalation of information warfare by conduct under the new Administration as might use the mystery of the bomber’s identity or loyalty as an enduring catalyst for cross-blame and proof that the U.S. government is at once corruptly deserving of being struck, and too weak to protect itself in its own Capitol.

    These information weapon narratives would also be consistent with a preferred strategic, lower cost warfare suitable to foreign nation state interests unready for sudden escalation with the United States and so dependent on encouraging domestic extremists to do the kinetic terror or militant work. Presently, mid to long term division and deconstruction of the superpower status of the United States would make more strategic sense for near-peer, autocratic adversaries.

    Whoever engineered the planting of the bombs before the January 6 rally, protest, riot, and insurrection had apparently anticipated in advance of January 6 that there would be anger enough against both main parties that detonation outside the RNC and DNC would be an effective development, rather than an action that unified Americans in the centrist main parties.

    The deniable nation state information warfare theory gains traction if the pipe bombs and components were professionally cleansed of potentially identifying or lead-generating forensic evidence; if the suspect left no digital trail; or if it is possible that the suspect used a wireless signal jammer or other tech to thwart wireless camera captures of the exact moment in time the pipe bombs were planted.

    Checking for evidence of past or ongoing third party monitoring, connection, or jamming devices at or near the bomb planter’s chosen sites might make sense, and or reviewing back-video coverage of such nearby, permissive locations in a radius around the spots the bomb suspect operated. If a non-adversarial nation state or intelligence actor may have had eyes or ears they would not admit having in the Capitol, and which they subsequently removed, this could become helpful evidence obtainable by diplomacy.

    Another reason for the nation state discussion: the direct approach of an operationally-minded domestic extremist would seem less likely to engage in the indirect, ineffective bomb planting activity seen on the FBI video releases.

    Caveat: Tech savvy domestic extremists versed in information warfare could possibly consider planting pipe bombs as an information weapon of warning and or recruitment, to encourage more people needing a purpose in life to step forward and join the insurrection. However, it is also arguable that anti-government actors and accelerationists would sooner plant more powerful bombs unless local technical countermeasures made that too risky.

    The grievances of the groups behind the Oklahoma City bombing apparently remain represented among some groups involved in the Capitol insurrection, online, and in foreign agitation content. Would these groups, absent advice or sponsorship by more sophisticated parties employ pipe bombs for information warfare use? Or would they use them violently, to maximum effect?

    Closing Thoughts and Future Focus

    The recent history of nation state and domestic extremist information warfare shows past patterns echoed in the implied action of the Capitol pipe bomb placement outside both the DNC and RNC buildings near the Capitol, targeting both mainstream parties. The “Unite the Right” and the extreme Left “Occupy” agitation propaganda movements morphed from an autocrat-state driven whipsaw operation into facilitation of a conspiracist, anti-democracy “Left-Right Unite” theme as disseminated and laundered via conspiracist tabloid content with supposed U.S.-Canadian identifiers (InfoWars, American Free Press, Breitbart, Global Research) despite the internet being borderless in its gray war reality. These trends in gray warfare will be addressed soon in a separate analysis and report.

  • A Way of Thinking About China

    A Way of Thinking About China

    Foreign Relations Thinking: Issue Set-Up

    We’ve heard the ineffective “or” questions: Is China an adversary, competitor, partner, or opponent to the United States? Is China a near-peer, or peer power? Which is the greater threat, China, Russia, or global terrorism? The honest answer is, “Yes, all of the above, with a regular doses of the unexpected.”

    Such questions strain for certainty instead of adaptive awareness in real time. War, terror, and differences with conflict-potential do not follow our plans, especially our telegraphed ones. By setting up false dichotomous questions, we numb ourselves to the qualities needed to execute policy that evolves, survives, and thrives in real time to keep the U.S. a perpetual freedom-superpower in a world of rising autocracies. And that, without becoming one of them or repeating our own historic errors and wrongs.

    An Analogy

    The U.S. American trend in establishing government from colonial times was to break with power-abusing ancient empires and theocracies of the world, dragging some baleful hypocrisies along with it.

    In legal and systemic sense, the U.S. American breakaway from the long line of dynastic or autocratic rulers in the world was a “divorce” from that world. Yet to this day the U.S. shares the planet, atmosphere, and solar system with that world, including China.

    If governing systems are like ‘parents’ in the divorce analogy, the shared world and our respective peoples are the perpetual ‘children.’ Our interactions, common interests, and conflicting visions bring the ‘parent governments’ into agreement, disagreement, negotiations, fora, courts, and varied risks of conflict, including military.

    Both versions of government find individuals with technology a challenge to their respective abuses of authority, sparing no government the embarrassment of being surveilled in return when doing wrong.

    Yet individuals and the collective society need governments to do certain jobs to defend, protect, serve, organize, and support civilization. Americans believe that governments that support an educated, civilized citizenry intelligently consenting to rational governance can be perpetual. China traditionally assumes that is true about centralized, authoritarian rule.

    Where China is an existential threat to the U.S., the U.S. has the right and duty to its people to prepare, equip, train, and ensure that the U.S.  can decisively defeat China and or deter it from aggression. This requires keeping the edge of the capability to decisively defeat potential aggressors and to return the existential threat. The principle of Mutually Assured Destruction still applies until, if ever, a basis for trustworthy reconciliation is achieved for greater common causes.

    Thought Experiment

    In the divorce analogy, consider a thought experiment in which the U.S.-China relationship is like an open post-divorce case file routinely managing issues such as:

    (1) the role of our respective governing styles and methods (analogy to parenting) and their direct effects on the world and on the international working relationship;

    (2) relevant property ownership, allocation, custody, rights, interests, and remedies;

    (3) fair trade for the civilian needs of ‘the children,’ being our respective peoples in each government’s ‘sole custody’ as distinguished from supply, communication, infrastructure, and sovereignty elements of defense, national security, cyberspace security, citizen loyalty, secrets, alliances, and navigation-freedom interests in the world, solar system, and beyond;

    (4) investment and visitation standards between citizens and companies of each country that minimize national security violations to home countries clearly defined by each side;

    (5) rights, duties, and collateral responsibilities of both powers to define, reduce, and prevent violations of civil rights at home and abroad and human rights in international conflict and intelligence activity to make the world a more stable, humane place;

    (6) rules, actions, responsibilities, and responses regarding encounters between the governments and commercial entities in the world’s oceans, atmosphere, orbit, solar system and cyberspaces;

    (7) de-escalatory yet just processes and remedies for alleged bad behaviors affecting the defense, economy, security, safety, health, welfare, property, fair trade, human needs, freedom, or order of either household, its government, and people;

    (8) negotiations of limits on WMD, standards for preventing accidents, standards for reducing the conflicts in the world that tempt their use, and cooperation on WMD anti-proliferation, denuclearization, and remedying irresponsible, unstable entities’ possession of WMD;

    (9) cooperation in our respective efforts to track and safely clean-up dangerous items polluting our environment and our planet’s orbital space, or incoming extra-terrestrial bodies threatening the planet;

    (10) addressing the need for prevention of extremist groups arising or recruiting from traumas imposed by extreme or fanatical nation state terror, action, and policies.

    Future Thoughts: Common Causes

    Divorced or not, between the U.S. and China there are objectively challenging global and extraterrestrial phenomena risking survival, success, and thriving across the planet. The clearest and most recent was infectious disease, Covid-19.

    The national households may be divorced as to governing systems, but both know that without cooperation for common survival and improved conditions on Earth, we may never have the freedom to compete to see whose system works best.