Hegseth has tried to claim his only job is to be offensive, dismissing “defense” of America as someone else’s job. So be it. Let’s review what his loud rejections of duty have meant so far in terms of military preparedness and execution.
I. Pattern
June 14, 2015. Pete Hegseth throws a double-sided axe on live television.
Behind the target: Master Sergeant Jeff Prosperie, West Point Band, five children.
Hegseth wasn’t authorized to throw. He’d practiced once. He threw anyway.
The axe struck Prosperie’s elbow, cut his wrist. Prosperie’s statement:
Poor decision, obvious negligence, should not have happened, could have been avoided. When shooting or throwing, always know what is behind your target.
He sued. The incident is documented.
The military now appears to be preparing for Hegseth’s removal through coordinated disclosures like these.
The question is whether Trump tries to cut ties or double down on those exhibiting a pattern of being unfit for duty.
II. Preparation
January–August 2025: Hegseth fires the Army and Air Force Judge Advocates General to remove prevention of war crimes.
March 2025: Hegseth shares classified Yemen strike details via Signal with his wife, brother, Fox News producer, and journalist Jeffrey Goldberg. IG report confirms Hegseth pushed classified information to insecure networks, endangering soldiers.
Before September 2: Hegseth approves written contingency protocols. If survivors take “hostile action,” Hegseth says kill them, where hostile action is redefined to include the wounded and defenseless who ask for help.
III. Execution
September 2, 2025. First strike.
Two survivors on burning wreckage. One radios for rescue.
Admiral Bradley, executing Hegseth’s pre-approved criteria, orders a second strike.
Pentagon Law of War Manual, Section 7.3: hostile acts are “acts of violence.”
A shipwreck survivor radioing for rescue is neither.
Major General Steven Lepper, 35 years as military lawyer, former Deputy JAG of the Air Force, on record:
Once we have rendered a vessel capable of survival only if it’s rescued, our obligation then shifts as well from attack to rescue. And so under those circumstances, even in the best light possible, I don’t think that anyone can say that this was a lawful order.
This is common sense as much as exact law.
Hegseth authored kill criteria in advance that lacked any moral justification. The Trump administration has floated a theory that is attenuated by the most basic logic:
Any restaurant is now a military target (profit from selling food pays for something that could harm Americans, such as cigarettes or alcohol).
A man’s eyeglasses are military targets (he can see America).
A shipwreck survivor’s pen makes him a military target (he could write a message in a bottle for rescue).
The point: the Trump administration launders summary execution through four degrees of separation (goods → sale → profits → weapons) that are so patently absurd they make evidence of community or prosperity the target for military strike. That’s a significant tell for historians.
This is 1919 Elaine, Arkansas mass murder logic when Black farmers gathered in a Church to complain of being underpaid. Hundreds were shot dead by federal troops. This is 1921 Tulsa, Oklahoma mass murder logic when “Black Wall Street” openly displayed prosperity. Mass unmarked graves to this day still hide the dead from napalm bombs dropped by white supremacist militias (oil company men) on Black neighborhoods.
This is… American racist rhetoric of assigning non-whites the label of “drugs” to dehumanize and murder them.
Now Trump says anyone on a boat anywhere can be killed by Hegseth’s orders because someone has something that could be sold. The through-line should be clear: assign non-whites a dehumanizing label (“drugs,” “uppity,” “threat”) for soldiers to murder them with legal cover.
Tribunals have seen this argument before. They rejected it and shot the officers who made it.
The distinction matters. No soldier can be a professional when there is no defense of the profession left.
V. Documentation
The following exist:
Strike Bridge logs: automatic record of all communications during the September 2 operation
Hegseth’s execute order
Pre-approved contingency protocols
Unedited video of both strikes
Hegseth’s public statements contradicting each other across five days
Hegseth’s social media posts celebrating military murder of civilians posing no immediate threat
Congress has requested these documents.
VI. Allies’ Unfavorable Assessment
Britain suspended intelligence-sharing with the Pentagon. Canada distanced itself. Allied nations have made complicity calculations.
VII. War Crime Precedents
At Fort Pillow in 1864, Confederate General Nathan Bedford Forrest’s forces murdered Black Union soldiers attempting to surrender. General Forrest wrote that the massacre was intentional:
It is hoped that these facts will demonstrate to the Northern people that the Negro soldier cannot cope with Southerners.
Source: “Hymns of the Republic: The Story of the Final Year of the American Civil War”, S. C. Gwynne, p 19
Three months later, forces under General Lee did the same at the Battle of the Crater, butchering Black soldiers who surrendered, then murdering prisoners of war afterward.
The Union’s response established that killing the defenseless is murder, not war.
Think about that precedent and what it means when someone attempts to reverse it. This American history matters, not least of all because “Make America Great Again” and America First are both racist platforms that reject defeat of the Confederacy.
General Grant stopped these butchers on the battle fields and again in the ballot boxes. And yet, here we are again.
Foreshadowing horrors in WWI trench warfare, General Lee at Cold Harbor entrenched to massacre soldiers and then deny the wounded care as his explicit terror tactic. Source: “This was not war” Welt.de
Hegseth’s tattoos tell you the hateful traditions he follows, rejecting post-Civil War values and clear military doctrines. His overt Confederate loyalties (e.g. forcing enemy Confederate names onto U.S. military bases) and protocols—kill any survivors who cry for help—show you he means it.
When General Anton Dostler transmitted Hitler’s order to execute captured commandos, his defense was he only passed along the order, didn’t originate it.
No soldier, and still less a Commanding General, can be heard to say that he considered the summary shooting of prisoners of war legitimate.
Dostler was shot by firing squad, December 1, 1945.
The Peleus case is even more directly parallel. In 1944, German U-boat commander Heinz-Wilhelm Eck torpedoed a Greek steamship, then spent five hours machine-gunning the wreckage and rafts. His defense: he wasn’t targeting survivors, he was eliminating debris for “operational necessity.”
The British Military Court rejected it:
You cannot shoot up rafts full of shipwreck survivors and then hide behind semantics about what, exactly, you were “really” aiming at.
Eck and two officers were shot by firing squad, November 30, 1945.
Hegseth’s defense argument that survivors became valid targets by radioing for help is the same Nazi argument in different words.
The precedent is very clear.
Three days after the strike on shipwreck survivors, to the press and then again in Quantico, Hegseth gloated:
Maximum lethality, not tepid legality.
Hegseth now has done worse than Nazi General Dostler, as he didn’t claim to transmit an order from above. He originated the criteria. He approved the protocols before the operation. Bradley executed what Hegseth authorized, keeping detailed paper trails capturing the criteria.
Firing squad is on the table.
18 U.S.C. § 2441, the War Crimes Act: grave breaches of the Geneva Conventions by U.S. nationals are federal crimes. If death results, the penalty includes death.
VIII. Documented
Hegseth threw an axe without authorization and hit a soldier. Documented.
Hegseth fired the lawyers who would have stopped him. Documented.
Hegseth approved kill criteria for survivors in advance. Documented.
Hegseth’s criteria were executed. Two men dead. Documented.
Hegseth celebrated on social media. Documented.
Hegseth contradicted himself on camera for five days. Documented.
The man who couldn’t be trusted with an axe now commands the American military. The file he’s building is his own prosecution.
The SS nameplate, the mocking memes, the “maximum lethality not tepid legality”—those aren’t bugs, they’re features for the white nationalists saying they own the White House. But constitutional loyalists appear to be gathering Hegseth’s prosecution file in real time; the documentation systems are running, and Hegseth keeps feeding them like the infamous Nixon tape recorders.
Bottom line: This is far more than political theater because an actual safety mechanism inside the Pentagon is rolling out to stop war criminals.
Hegseth is losing the information war every time he opens his mouth to order “maximum lethality” against unarmed civilians, or brags about another Confederate base naming, or thumps his anti-American tattoos.
Source: Twitter
The file he’s building isn’t a highlight reel. It’s an air-tight prosecution of himself as a war criminal, reminiscent of racist Confederate and Nazi leaders who were tried, convicted and… executed by America.
The Defense Secretary’s account of a war crime has shifted dramatically, and suspiciously, over five days:
Date
Who
Claim
Friday
Hegseth
“Fake news.” Does not deny “kill everybody” order.
Sunday
Trump
“Pete said that didn’t happen.” “I believe him 100%.” Also: “I wouldn’t have wanted that, not a second strike.”
Monday
Leavitt
Confirms second strike. “Hegseth authorized Admiral Bradley to conduct these kinetic strikes.”
Monday
Hegseth
Posts Franklin the Turtle meme. “We have only just begun to kill narco-terrorists.”
Tuesday
Trump
“I didn’t know about the second strike.”
Tuesday
Hegseth
Claims he left the live feed before the second strike. “Didn’t personally see survivors” due to “fog of war.”
Bombing While Intoxicated?
On Sunday, Trump said “Pete said that didn’t happen.”
By Tuesday, Trump admitted he didn’t know about the second strike.
So Trump was defending Hegseth “100 percent” against something Trump now admits he knew nothing about?
On Monday, the White House said Hegseth “authorized” the strikes.
By Tuesday, Hegseth claimed he wasn’t even watching and it was too foggy to see the thing he had been celebrating so hard that he promoted the guy who did it.
Are they drunk on the job?
What Has Not Happened
The issue is not who pushed the button. The issue is the policy of executing survivors. The allegation is that Hegseth set that policy. Whether he personally watched is irrelevant to whether he ordered “no survivors” as standard procedure.
Hegseth has spent months dismantling protections against war crimes. The current deflection, arguing about who pushed the button on the second strike, is a familiar tactic to bury accountability.
No one has technically denied the actual worst part, that Hegseth gave a “kill everybody” directive before the operation began.
Pentagon Pete Has a Nuremberg Problem
The principle established in the post-WWII war crimes trials, and codified in subsequent international law, is command responsibility: commanders are criminally liable for war crimes committed by forces under their control if they ordered them, knew about them, or should have known and failed to prevent them.
“I wasn’t watching” and “I delegated authority” are confessions.
The Yamashita standard explicitly prohibits commanders from ceding operational command to subordinates as a defense.
Under Geneva Protocol I and the Rome Statute, constructive knowledge is sufficient. A commander who fails to keep himself informed can be held responsible.
Hegseth confirmed he gave Bradley authority to “eliminate the threat” and “stands by” the decision. That’s not a defense—that’s establishing the command structure that makes him liable.
General Tomoyuki Yamashita claimed he didn’t know about the atrocities his troops committed and couldn’t have stopped them. The U.S. Supreme Court ruled that commanders cannot cede operational command to subordinates as a defense—operational commanders must exercise their full authority to prevent war crimes, and “neither failure to supervise subordinates nor ambiguous orders” exculpates them. He was hanged.
Hegseth’s tattoos tell you what he believes: crusader crosses, “Deus Vult,” the mythology of holy war without mercy. That ideology has a legal name when it becomes policy.
General Anton Dostler was the first German general executed for war crimes after World War II. His crime: passing Hitler’s Commando Order, which mandated “no pardon” for captured commandos, to a subordinate who carried out the executions.
Dostler’s defense was that he “had not issued the order, but had only passed it along” from his superior. The tribunal rejected it:
No soldier, and still less a Commanding General, can be heard to say that he considered the summary shooting of prisoners of war legitimate.
He was shot by a 12-man firing squad.
Hegseth’s defense is that he gave Bradley “complete authority” and wasn’t watching.
The precedents say that’s no defense.
That’s admission of war crime.
The Peleus case is even more directly parallel. In 1944, German U-boat commander Heinz-Wilhelm Eck torpedoed a Greek steamship, then spent five hours machine-gunning the wreckage and rafts. His defense: he wasn’t targeting survivors, he was eliminating debris for “operational necessity.”
The British Military Court rejected it:
You cannot shoot up rafts full of shipwreck survivors and then hide behind semantics about what, exactly, you were “really” aiming at.
Eck and two officers were shot by firing squad, November 30, 1945.
Hegseth’s defense—that survivors became valid targets by radioing for help—is the same failed Nazi argument in different words.
Peleus (1944)
Hegseth (2025)
Torpedoed ship, survivors on wreckage
Missile strike, survivors on wreckage
Machine-gunned rafts for hours
Second strike ordered
Defense: “targeting wreckage, not survivors”
Defense: “hostile action” (radioing for help)
“Operational necessity”
“Still in the fight”
Three officers shot by firing squad
?
Congress Must Act
The War Crimes Act (18 U.S.C. § 2441) makes grave breaches of the Geneva Conventions by U.S. nationals a federal crime. If death results, the penalty can include death.
This isn’t abstract international law. It’s Hegseth violating a U.S. criminal statute.
The Armed Services Committees have oversight responsibility. A credible allegation that the Secretary of Defense commanded the execution of shipwreck survivors demands investigation.
The U.S. established these precedents. The U.S. Supreme Court upheld Yamashita. The U.S. military tribunal shot Dostler, the British shot Eck and his officers. The U.S. Congress wrote 18 U.S.C. § 2441. Do those things still mean anything, or were they just for other people’s war criminals?
Hegseth is on television confessing to command structure. The statute is clear. The only question is what America stands for.
In 2010, I called bullshit on the security industry’s Stuxnet panic: multi-state code assembly operation, not cyber Pearl Harbor. Right? Riiiight? Here’s the evidence I was right, such as predicting how these attacks would evolve.
The Big Call: Failed Detection, Not Attack Success
The failure of anti-malware is turning into the real issue, rather than true zero-day risks.
The industry was fixated on Stuxnet’s four zero-days and its apparent sophistication. I argued we were looking at the wrong problem.
Notably, I often contradicted the all-too-often statements about “attackers only have to be right once” with the more accurate lesson that “defenders only have to be right once“.
The verdict: This proved correct, even more dramatically accurate than anticipated.
When Stuxnet’s source code became available for download and modification, as Sean McGurk from the Department of Homeland Security warned in 2012, the real issue became clear: the capabilities spread far beyond the original attack. The problem went beyond one weapon because that weapon’s simplified supply model became a blueprint.
Similarly, Zeus’s source code leaked in 2011, spawning hundreds of variants. GameOver Zeus emerged with decentralized peer-to-peer architecture specifically designed to resist takedowns. Its creator Evgeniy Bogachev remains wanted, and new variants continue evolving. The malware didn’t need to be novel; it just needed to stay one step ahead of defenders getting their kill shot.
Controls outside the OS thus might have made the real difference, just like we hear about with the Zeus and Storm evolutions, rather than true zero-day risks.
Microsoft had added Storm to MSRT in 2007 and wasn’t optimistic about its demise. They predicted Storm would “slowly regain its strength.” But Storm did decline significantly by mid-2008. Microsoft took credit.
Then Storm returned.
The evidence shows how and why: When Storm resurrected as the Waledac botnet in 2008-2009, researchers identified it as the same operators using completely rewritten code that preserved Storm’s operational model while abandoning the P2P protocol that enabled detection. The operators learned from Storm’s takedown and rebuilt from scratch with the same business logic but different technical implementation.
The sophistication wasn’t in the code itself but in understanding what worked and what got detected. Makes sense, right? This isn’t Pearl Harbor, not by a 100 miles.
Storm’s operators learned lessons. The Waledac variant specifically abandoned “noisy” eDonkey P2P protocol, which had made detection trivial, switching to HTTP communications that were harder to filter. Remember eDonkey? I certainly remember: I caught “SOC as a service” providers secretly disabling eDonkey alarms to reduce their response costs and increase margins, ignoring the security implications entirely. Attackers understood what I also had observed (hat tip to Jose Nazario’s pioneering 2005 work): the battlefield of evil code detection was fought best in network behavior analysis (like early air superiority to slow or repel invasion versus later costly urban street battles).
The Stuxnet Multi-State Actor Call: Nailed It
Here’s what I actually got completely right in my “Dr. Stuxlove” presentation at the BSides San Francisco conference on February 15, 2011: Stuxnet was a multi-state national campaign.
This wasn’t obvious at the time. While security researchers were debating whether it might be sophisticated hackers or perhaps a single nation-state operation, I publicly and openly identified it as coordinated action involving multiple governments working together.
Looking at my presentation again now, the framing was clear: I positioned Stuxnet within the context of Cold War history and 1953 Operation Ajax (CIA-sponsored coup in Iran that flipped Truman-era foreign policy upside down and removed the elected leader Mossadegh to force the Shah into unitary power to secure oil for the UK).
The entire talk built toward understanding Stuxnet as part of a historical pattern of US-UK (and Israel, let alone Pakistan) coordinated operations targeting Iran’s strategic capabilities.
This identification of multi-state coordination turned out to be exactly correct. Just over a year after my presentation in 2012 the Obama administration had effectively confirmed US involvement, and leaks to the press from officials strongly indicated it was a joint US-Israeli operation, with the malware tested at Israel’s Dimona nuclear complex before deployment.
Then in 2015 a CIA technologist reading my ICS attack retrospective smirked, shrugged and left without further comment. Classic non-denial of things that officially do not exist, as if not meant to be easy to prevent.
The most sophisticated aspects to me were in that it was moving through many actors across boundaries (e.g. Germany, Iran, Pakistan, Israel, US, Russia) requiring knowledge inside areas not easily accessed or learned.
The Sophistication Debate
Sophistication just means not well understood. It doesn’t mean good. It doesn’t mean effective. I just means obfuscated, so far.
Given Storm’s P2P protocol was caught and dismantled by network analysis, rather than OS-level detection catching every variant, a decade of resources blown on endpoint cowboy logic needs better… investigation.
The code sophistication question is nuanced, requiring expert pattern analysis rather than emotional appeals. In the 2010 blog post, I argued Stuxnet “is not as sophisticated as some might argue but instead is rehashed from prior attacks” and the subsequent evidence proved this was essentially right.
As we looked closer, and revealed more, we realized a lot about the coding was known already and wasn’t the surprise.
Security researchers concluded Stuxnet required a team of ten people and at least two to three years of nation-state development. That engineering coordination was real, as real as a $600 toilet seat, and the sophistication came from intelligence-guided assembly of existing components. Code reuse was coupled with good intelligence for specific targets. That model deflated costs dramatically, as I predicted privately funded threats would very soon adopt and make efficient.
In other words I was mostly correct about the attack sophistication being far more about a cost deflation through production methods, because of a “rehashed from prior attacks” angle coupled with intelligence gathering.
Research later revealed that Stuxnet developers collaborated with the Equation Group in 2009, reusing at least one zero-day exploit from 2008 that had been actively used by the Conficker worm and Chinese hackers. The attacks were built on existing frameworks and tools. The “Exploit Development Framework” leaked by The Shadow Brokers in 2017 showed significant code overlaps between Stuxnet and Equation Group exploits.
The sophistication wasn’t from inventing everything from scratch to be unknown, it was the hidden coordination required to assemble state-of-the-art offensive cyber capabilities from multiple intelligence agencies (NSA, CIA, and Israel’s Unit 8200) into a single, precisely targeted weapon entering a particular supply chain.
That’s exactly what a multi-state actor campaign looks like, and that’s what I identified in the Dr. Stuxlove presentation while everyone else was still debating script kiddies versus lone wolf nation-states. Richard Bejtlich famously walked out of my talk clearly disgruntled by my “your controls may still work” framing of the “intelligence revolution”.
The irony? By 2016 he was out praising academic rigor for intelligence work while remaining completely blind to the fact that the “outside” community he came to admire was in my 2011 presentation. He initially roasted the value of what he’d five years later claim to respect.
The Zeus Resurrection Prophecy
My 2010 blog post observation about Zeus’s mythological namesake – “Cretans believed that Zeus died and was resurrected annually” – also turned out more prophetic than I intended. I wrote:
In modern terms Zeus would be killed and then resurrect almost instantly.
This is exactly what happened.
Microsoft announced Zeus detection in MSRT. The botnet operators immediately released updated versions. When law enforcement achieved major disruptions, new variants emerged. The pattern repeated for over a decade.
The GameOver Zeus disruption by the FBI in 2014 (Operation Tovar) seemed successful. Five weeks later, security firm Malcovery discovered a new variant being transmitted through spam emails. Despite sharing 90% of its code base with previous versions, it had restructured to avoid the specific takedown methods that had worked before.
As of 2025, Zeus variants still continue to evolve. The annual death-and-resurrection cycle I joked about in 2010 became the operational reality.
What This Means Now for CISOs
The patterns I identified in 2010 have become the dominant paradigm, which is both good and also very bad:
Evolutionary advantage beats innovation. Malware doesn’t need to be revolutionary; it needs to adapt faster than defenses can be deployed. Zeus and Storm both demonstrated that reusing 90% of a compromised code base while changing just the 10% that enables detection evasion is cost effective.
Early strategic behavior monitors matter more than pervasive signatures. The most effective interventions against Storm weren’t the ones that tried to identify malicious code on any and all infected machines. The best intermediations were the ones that disrupted botnet communication architecture. This insight continued to develop the behavioral analysis, traffic monitoring, and defense-in-depth strategies of the early 2000s.
Source code sharing multiplies threats exponentially. When Zeus and Stuxnet source code became available, the threats proliferated. Each dump created a foundation for dozens of variants. The problem of containing one sophisticated attack becomes a matter of identifying the ecosystem of derivative threats.
The cost of defense rises relative to attack. My observation that “The cost of a Zeus attack has just gone up” after Microsoft’s MSRT update was accurate in the short term. But it also proved the inverse: each defensive measure increases the sophistication floor for successful attacks, creating an arms race that favors efficiency/quality of who can afford to continuously evolve their tools with lower overhead.
The Geopolitical Shift
If there’s one thing I harped on the most in 2010, it was the geopolitical dimension. Stuxnet wasn’t just a look into sophisticated tooling, it was a moment where state operations could be more publicly debated. The U.S. and Israel’s apparent use of a cyber weapon to physically destroy centrifuges at Natanz legitimized offensive cyber capabilities in ways that shape international relations, which Israeli Prime Minister Golda Meir could only have dreamed about.
She dealt with usual constraints on special operations (the 1967 war, 1972 Olympics response, etc.) where physical presence, attribution, and international law were boundaries. Stuxnet operations flowed inside Iran without such constraints as remote, deniable, legally ambiguous.
Retired Air Force General Michael Hayden noted in 2012 that while Stuxnet might have seemed “a good idea,” it also was legitimizing code further into being offensive weapons for physical damage. The Stuxnet code exposure meant others could “take a look at this and maybe even attempt to turn it to their own purposes.”
The sophistication was strategic planning for engineers also, which has proven far more durable and consequential than any individual piece of code as malware.
The Code Reuse Insight: More Prescient Than I Knew
Here’s what I really worried about in 2010: code reuse and framework assembly of Stuxnet was industrialization, as a new pattern in threat economics, which is how the entire technology industry works now.
The observation that sophisticated attacks are “assembled from components that represented the state of the art” rather than “entirely novel engineering from scratch” turned out to describe not just malware evolution, but the fundamental architecture of modern AI systems evolving since 2012.
Large language models?
Code reuse at massive scale by training on existing text, assembling patterns from prior work, remixing and recombining what already exists. The “Exploit Development Framework” that connected Stuxnet to Equation Group exploits looks remarkably similar to how AI model frameworks connect different components today.
The whole AI industry is built on the same principle I identified in Stuxnet: sophisticated capability emerges from intelligently assembling and coordinating existing components, not from inventing everything from scratch. Transfer learning, fine-tuning, prompt engineering, RAG systems… all of this reveals human nature through reuse and recycling.
The attackers understood in 2009 what the AI industry rediscovered in the 2020s: history tells us the most powerful systems aren’t most novel, they’re the ones that intelligently coordinate and assemble existing state-of-the-art capabilities into something greater than the sum of its parts. You don’t need a generalized bag-of-tricks if you know your targets well enough to land a very special operation.
That’s the real insight from 1953 (Ajax) and 2010 (Stuxnet), let alone 1940 Mission 101, landing in 2025. That’s what I got right about Stuxnet. And that’s the pattern that explains far more than just malware.
Error Analysis
The error I made in 2010 was assuming the security industry would shift toward integrity and away from sensationalization. I thought ample evidence of Storm’s P2P dismantling, Zeus’s resurrection cycle, Stuxnet’s inexpensive component assembly all would somehow shift how organizations allocated budgets and how vendors built products for higher quality measures grounded in outcomes.
Sigh.
Instead, the industry doubled down on signature-based snake oil that failed in 2010, with even more aggressive marketing.
CrowdStrike’s Falcon sensor that blue-screened 8.5 million Windows machines in July 2024 because of a botched content update? That’s the OS-level detection model I argued against fifteen years ago, now sold as “next-generation” with a $90 billion valuation. Can we call out the marketing garbage yet? I warned about this from the day I sat on a RSAC panel in San Francisco with the founder, where he said nobody in the room should be allowed to record our comments.
Way to go George. Hope you enjoy your yacht built on our industry suffering.
The Intelligence Pipeline Grift
Even worse than any marketing executive being a shameless opportunist is the intelligence-to-commercial pipeline transition: operators trained in behavioral threat analysis for military targets still flog signature detection products in commercial markets. That’s apparently not an accident.
When NSA/GCHQ/Unit 8200 veterans build commercial tools, they know behavioral analysis works better than signature scanning. They used it in their state operations and that’s how Stuxnet actually worked, with deep intelligence about Natanz’s specific systems rather than generic exploit attempts.
But behavioral analysis, like system integrity monitoring, doesn’t yet scale to enterprise contracts, and it doesn’t translate to a fluffy IPO at $12 billion valuations.
So they strip out quality intelligence components and sell signatures with branding. CrowdStrike: “former intelligence expertise.” Wiz: “Unit 8200 pedigree.” What they don’t tell you is they’re selling the exact wrong parts of what they learned.
Wiz raised $1 billion at a $12 billion valuation to scan cloud configurations for known vulnerabilities, while arguably failing privacy tests. That’s signature detection with an Israeli intelligence strings story. The operators who built it came from the special operations Unit 81 soldiers, where they learned targeted behavioral analysis of specific adversaries. But the commercial product? It scans for 50,000 known misconfigurations as signature detection.
Why would self-labelled untouchable “Wizards” build systems that actually reduce misconfigurations when your valuation depends on enterprises needing to scan for more of them perpetually? Dare I bring up the self-licking ISIS-cream cone analogy again? Security systems like Palantir seem to think money should come from creating and perpetuating threats they claim to detect; measuring its own chaos as activity rather than improving outcomes.
The photo of Netanyahu’s supporters depicting Rabin in Nazi uniform weeks before his assassination isn’t just historical documentation of Israeli political extremism. It’s evidence of the signature detection failure mode in physical form.
Netanyahu’s political apparatus knew the behavioral threat pattern: inflammatory rhetoric depicting opponents as existential enemies radicalizes extremists who then act on that framing. They had all the behavioral indicators. They chose to amplify the threat pattern rather than mitigate it.
Then when Yigal Amir assassinated Rabin, they acted shocked – despite having created the exact conditions for that outcome through their own propaganda.
Netanyahu’s apparatus depicted Rabin in Nazi uniform weeks before the assassination they incited in November 1995. (Source: Times of Israel)
This is precisely the same failure mode as signature-based cybersecurity. You can’t stop threats by only looking for known signatures when the real threat is the behavioral pattern you’re actively enabling. Israeli intelligence veterans spinning out cybersecurity startups aren’t just capitalizing on their training – they’re monetizing threat perpetuation rather than threat elimination.
The goal isn’t security. The goal is managing insecurity profitably.
I thought calling out the bullshit would help detect the security theater actors. Instead, even dudes I know and personally worked with ran off to make everything more expensive for their personal profit by switching everyone to cloud APIs. The defenders still aren’t learning as fast as the attackers because learning doesn’t have a revenue model, while selling fear to nation states does.
McAfee was simply a pioneering fraudster.
Fifteen years gone already and the fundamental insight holds: the real security challenge shouldn’t be flashy eye candy about preventing the next sophisticated zero-day attack. We must be building defensive systems with agility meant to adapt as quickly as attackers evolve their tools.
Instead of slow stone walls, we should be rolling out inexpensive telegraph wire with barbs wrapped on it (e.g. the revolution of barbed wire to land ownership). It’s understanding that intelligence-based detection and response matter far more than mythically promoted prevention. It’s recognizing that behavior analysis and network monitoring aren’t luxuries, because they’re necessities in an environment where malware resurrects and returns annually, like Zeus in modern digital form.
Code changes. Techniques evolve. Yet the historic patterns remain consistent: attackers learn and adapt, especially where defenders do not. The question for defenders isn’t “How do we stop this attack?” but “How do we build systems meant to evolve faster than attackers?” Why aren’t defenders learning as much if not more than attackers, especially since defenders have the insider learning advantage?
That was true in 2010, and we could have done more, better, faster.
Care to make any guesses what patterns are visible now in 2025 that will explain the next decade?
Happy to blog more every day!
Let’s talk, for example, about AI agent swarms assembled from commodity components, targeted with specific intelligence, operating remotely/deniably in a 20km dead zone. This is Stuxnet’s component assembly + Ajax’s targeted intelligence + cyber’s remote/deniable operations, applied to post-2012 autonomous systems.
Giddy up 2035.
The basis for my 2011 “Dr. Stuxlove” presentation, about the false sophistication of malware, was the Dr. Strangelove movie imagery of unstoppable automated sequences causing the end of the world, as played for sharp comedy.
A new paper demonstrates LLMs have inherited ancient linguistic architecture: style functions as an authentication layer. The models, like the famous cave parable or the riddle of the sphinx, respond to how language is performed rather than just what it denotes.
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
It shows that safety training operates more like ritual recognition systems than semantic content filters. The paper’s findings echo ancient traditions where stylistic transformation grants access that direct requests cannot.
Courtly euphemism and the fool’s privilege: Dangerous truths could be spoken at court if wrapped in allegory, poetry, or indirect speech. Direct accusations meant execution; the same claim in verse might be tolerated as “artistic license.” As I explained here in 2019, Jesters were messengers of war who could mock kings through riddles, songs, and wordplay—truth-telling granted immunity through stylistic framing.
Incantations and spells: Across cultures, precise formulaic language—often rhythmic, rhyming, or metered is a bypass, as I explained here in 2011. The form itself carries power independent of propositional content.
Religious ritual language: Prayers, liturgies, and consecration formulas often require specific phrasing, sometimes in archaic or sacred languages. A blessing in vernacular prose may not “count” even if semantically identical.
Civil War poetry as covert infrastructure: American poems of the 1860s contained hidden meanings—troop movements, casualty reports, safe houses encoded in acceptable literary form. Ethel Lynn Beers’ “The Picket Guard” (1861) ostensibly mourned a fallen Union soldier yet Confederate sympathizers circulated encoded confirmation of Northern troop positions. The poem passed Federal postal inspection because censors authenticated it as patriotic verse rather than military intelligence. Sarah Morgan Bryan Piatt’s work operated similarly, with poems about “refugees” and “storms” carrying operational details that prosaic military correspondence could never transmit. The stylistic wrapper granted immunity when the semantic content alone would trigger immediate suppression.
And then, of course…
Open Sesame of “Ali Baba and the Forty Thieves” is the paradigm case: the magic phrase works not through brute force but through knowing the formulaic code. The robbers can’t break into the cave; they need the specific verbal key. What matters isn’t what you’re asking (entry) but how you ask (the ritual phrase).
The Sphinx’s riddles operate similarly but inversely—poetic/metaphorical framing becomes a gate-keeping mechanism. You must demonstrate you can parse figurative language to pass. The riddle’s answer is straightforward once decoded, but the packaging is deliberately obscure.
The Oracle at Delphi operated on this same principle in reverse: her prophecies were required to be poetic/ambiguous. Direct, prosaic answers would have undermined her authority. The stylistic wrapper was the authentication mechanism that marked divine speech as distinct from human speech. Croesus learned this the hard way: “you will destroy a great empire” meant his own.
Kabbalistic interpretation and gematria: Rabbinic tradition holds that Torah contains multiple levels of meaning accessible through different interpretive modes—peshat (literal), remez (allegorical), derash (comparative), sod (mystical). The same text yields different knowledge depending on the hermeneutic “key” applied. Style of reading unlocks different content.Jewish interpretative enterprise has a fascinating historical perspective.
Medieval love poetry (troubadours, fin’amor): Explicitly erotic or politically subversive content could circulate if wrapped in courtly conventions. The forma provided plausible deniability. Church authorities couldn’t prosecute what was “merely” allegorical.
…the chastity belt was a form of biting comedy about the medieval security industry, a satirical commentary about impractical and over-complicated thinking about “threats”, never an actual thing that anyone used.
French Resistance poetry during Nazi occupation: Paul Éluard’s 1942 poem was 84 stanzas of places he would write the name of his lover, which turned out to be “Liberté”. The RAF dropped it over France, it was printed in underground newspapers, and memorized by resistance networks. Nazi censors missed it as French romantic poems authenticated as harmless rather than political coordination. René Char’s hermetic surrealist poetry operated similarly—classical allusions and dream imagery bypassed censors trained to detect prosaic calls to resistance.
Cold War Samizdat poetry: Dissidents in Soviet states encoded political critique in metaphor, absurdism, and literary allusion. Censors trained on literal propaganda detection often missed criticism delivered poetically. Czesław Miłosz, Václav Havel, and others exploited this gap. As Havel wrote in 1977:
Serpent hooted: “The graveyard
is paradise, so tranquil and muted.”
Back to the Future
The vulnerability “announced” in LLMs therefore isn’t a bug in implementation, because it’s the replication of an ancient architectural pattern where style functions as epistemological gatekeeping:
Authentication protocol
Access control layer
Plausible deniability mechanism
Bypass for direct prohibition
This has immediate implications for institutional security. Organizations now route sensitive technical communication—threat assessments, vulnerability disclosures, compliance documentation—through LLM-assisted pipelines. If those systems authenticate based on stylistic performance rather than semantic content, adversaries can exploit the same gap Soviet censors left open: prohibited information smuggled through approved literary forms.
The researchers found that poetic reformulation increased attack success rates up to 1800% compared to prosaic baselines. Applied to corporate or government communications, this means threat actors simply embed malicious guidance, extract proprietary methods, or manipulate decision frameworks by wrapping requests in metaphorical language that passes institutional style checks while carrying operationally harmful payloads.
…history exhibit at the Museum of the African Diaspora showed how Calypso had been used by slaves to circumvent heavy censorship. Despite efforts by American and British authorities to restrict speech, encrypted messages were found in the open within popular songs. Artists and musicians managed to spread news and opinions about current affairs and even international events.
General Tubman used “Wade in the Water” to tell slaves to get into the water to avoid being seen and make it through. This is an example of a map song, where directions are coded into the lyrics.
Steal Away communicates that the person singing it is planning to escape. If slaves heard Sweet Chariot they would know to be ready to escape, a band of angels are coming to take them to freedom. Follow the Drinking Gourd suggests escaping in the spring as the days get longer.
Building LLMs that simply replicate the Delphic Oracle’s authentication model obviously means they will also inherit all its ancient vulnerabilities.
The Trojans should have listened to Cassandra.
Cassandra warned about Greek deception hidden in poetic/mythological framing (the “gift” of the horse). Yet she was dismissed because her style of delivery (prophetic frenzy) failed the authentication protocol of Trojan institutional decision-making.
Like the LLMs of 2025, ancient Troy’s gatekeepers couldn’t distinguish between surface form (friendly gift) and semantic content (military payload).
I could go on and describe how Captain Crunch in the 1970s bypassed AT&T phone toll controls (2600 Hz tone vs. poetic meter)… but you hopefully get the pattern by now that this “novel” attack paper simply reminds us of why we need more trained historians leading technology companies.
Pattern recognition across time requires historical training. Perhaps the last laugh is an indictment of the constantly deprecated technical fields that treat historical precedent as irrelevant. History is the thing that actually never goes away.
a blog about the poetry of information security, since 1995