Tag

information warfare

Internet Morphs WSJ Article on 2021 IC Differences on Covid-19 Origin into “Cover-up”

Feature photo from China Daily. On Friday December 27th, 2024, the Wall Street Journal published “U.S. Intelligence Review of Origins of Covid-19 Masked Deep Divisions,” (also titled “Behind closed Doors: The Spy-World Scientists Who Argued Covid Was a Lab Leak”) reporting that the FBI was the only member of the IC with “moderate confidence” that…

Defending Free Business & Private Property with Enhanced Fiduciary Duty

Corporate leaders do not fulfill fiduciary duty to shareholders in the spirit of the laws by allowing company property, some of which enables strategic advantage over free nations, to slide into the maw of autocracy. The Congress and legislatures of the United States, the 50 states, and U.S.-based business lobbies have embraced a zombified version…

Capitol Hill Pipe Bomb Analysis

Introduction As authorities charge suspects in the January 6, 2021 Capitol riot and insurrection, the pipe bomber suspect recorded the night before remains a menacing question mark. This source-linked analysis begins with observations, questions, and analysis of the actions of the suspected pipe bomber captured on select FBI-released video segments from the U.S. Capitol Hill neighborhood…

Privacy-as-Security

Privacy and national security are in a form of quantum entanglement over the internet. Stratpass Corp defined the issue five years ago in terms of “Privacy-as-Security,” and centering on the need for greater legal power instituted in the individual right to consent, not consent, or withdraw consent to a number of things that happen to…

Lai Xiaomin and China’s Anti-Democracy Narrative to the United States

With the execution of Lai Xiaomin of China Huarong Asset Management Co., China executed a subtle sword block and strike in the art of information war against the United States. Beijing’s leadership-level propaganda piggy-backs on decades’ long Russian intelligence narratives and memes marinating military, law enforcement, far right, and angry young men in the notion that…

Argument: Dynasties in U.S. Politics Present Security Vulnerabilities

Power families using their resources, names, and influence to repeatedly win or determine political offices can become de-facto dynasts to the detriment of U.S. national security. Much like software, firmware, or operating systems, such families are like programs running public offices with informational and other flaws that become well known and more vulnerable over time.…

First Debate: Draining the Swamp to Waterboard America with the Firehose of Falsehood

The anti-George Washington seeks another term. The incumbent in the White House is ‘draining the Swamp,’ with his “Firehose of Falsehood” plumbed in reverse and directed out his mouth at our eyes, ears, noses, and throats, waterboarding us with the bacterial corruption of the Swamp. ‘Toxic waste dump’ is a more apt term, yet we are all-in…

On Labeling Adversarial Governments

The imprecise labeling of adversarial autocratic states in an information war can backfire on U.S., allies, and democracies in general. “ChiComm,” “Marxist,” “rogue state,” “communist” and “criminal” are broad labels that do not specify how autocracies like China, Russia, and North Korea actually behave, use, and abuse those concepts as distinguished from the nation state concept they…