Category Archives: Food

Massive Canadian Maple Syrup Integrity Breach

A Quebec maple syrup producer was just caught breaching product integrity. Cane sugar was being injected as an inexpensive substitute. The story ran as a Canada story. The investigation was done by Radio-Canada’s Enquête programme, where the producer is francophone. The regulatory body also is francophone, because three-quarters of global maple syrup production is Quebec’s. The Guardian labeled it as a Canada story anyway. I only point that out because the news label didn’t match the contents, providing us a story inside the story. I’m 100% certain the writers missed the irony of their error.

The producer, Steve Bourdeau, explained his pricing advantage directly:

There’s a lot of jealousy going on. Because I have the market. And it’s not entirely legal. And I got away with it anyway.

That sounds like NASCAR hacking. He got away with it because he didn’t get caught, knowing routine testing didn’t exist to catch him.

10 out of 10 Bad: Scandal as Industry

Last year I wrote about honey. The European Commission sampled products across member states and found 46% suspected fraudulent. Every single sample from the UK came back suspect. Scientists at Cranfield University announced a new detection method shortly after: Spatial Offset Raman Spectroscopy with machine learning, a technique borrowed from pharmaceutical and security diagnostics.

The question I asked then is the same one that applies to maple syrup now. If you only just built the test, what was the fraud rate before the test existed? That number is unrecoverable. You cannot retroactively test what people consumed. The market corrects forward, if it corrects at all.

Coca-Cola proved the template decades ago. Switch from cane sugar to high-fructose corn syrup. Save billions. Most consumers won’t notice. The ones who notice can be told their taste memory is wrong. Honey and maple syrup are the premium version of the same logic. The fraud margin is enormous precisely because authentic product commands a premium. Sugar syrup does sweeten. The fraud is in the story attached to the jar.

Chocolate has been in the news a lot lately, as if the infamously huge Coca-Cola integrity breaches with corn syrup taught the sweet-lies-inside industry nothing.

Salty Table

This is not a short list, so bear with me.

Food Fraud Method Detection Gap
Honey Sugar syrup dilution Reliable test only developed 2024
Maple syrup Cane sugar dilution Caught by taste; no routine test
Olive oil Cut with cheaper oils; mislabeled origin Ongoing; partial testing only
Seafood Species substitution; farmed sold as wild DNA testing rare at retail
Beef Species substitution Horsemeat caught accidentally in 2013
Milk Water dilution; vegetable oil for milk fat Spot-checked; not systematic
Saffron Plant material, artificial dye Expensive to test; rarely done
Spices Fillers, lead chromate, Sudan dyes Hazardous adulterants found late
Vanilla Synthetic vanillin labeled natural Label fraud, rarely prosecuted
Truffle oil Contains no truffles; synthetic compound No legal definition requiring any
Infant formula Melamine added to fake protein content Deaths in China before detection (2008)
Alcohol Methanol substitution; counterfeiting $9 billion fiscal loss estimated annually
Fruit juice Water and sugar dilution Spot-checked only
Ground coffee Fillers including chicory and cereal Routine testing uncommon
Parmesan Cellulose filler Caught by FDA in US market

The third column matters in an important way. Every row where the detection gap is large means an unknown quantity of prior fraud that is in fact unrecoverable.

The US Food and Drug Administration estimates food fraud costs the global industry $10 to $40 billion annually. FoodChain ID documented a 10% increase in reported incidents in 2024. Those are reported incidents. Successful frauds do not appear in the data at all.

Every Country

Country-by-country comparisons mostly measure who tests, not who cheats. A low incident count from a particular country should not be read as low fraud. It may simply mean they have weak surveillance. Oh, and by the way, surveillance is science. So don’t go around like a Zuboff trying to shame the science out of data.

The UK has the National Food Crime Unit, established after the horsemeat scandal, and still estimates food fraud costs the economy up to £2 billion per year. The EU runs the RASFF alert system across member states and still finds only around 8% of food safety reports are about fraud specifically. The United States found 69% of imported extra virgin olive oils failing standard, 76% of grocery store honey samples devoid of pollen, and 33% of seafood samples mislabeled. China built its food adulteration database after infants died. India documents milk cut with water and detergent. The pattern is consistent across jurisdictions with different regulatory capacity and political will.

Processing Threat

Processed food adds intermediaries. Each intermediary is an obfuscated opportunity. Complex supply chains crossing multiple countries create what one food safety analyst called “numerous opportunities for adulteration or substitution.” The sophistication of fraud has increased alongside the complexity of supply chains: advanced documentation forgery, digital certification gaps, products passing through five countries before reaching a shelf. It’s enough to keep expensive security professionals engaged forever.

The maple syrup heist in 2011 involved slowly siphoning nearly C$18 million from Quebec’s strategic reserve. Forty arrests and five jail sentences later, we are still talking about threats. That was theft of the physical product, which we can compare to a privacy leak of data and loss of confidentiality.

What’s happening now is harder to detect and easier to deny, because it’s an integrity attack. You don’t steal the syrup to make money. You replace it with something else and label it the same for a particular financial outcome, if not other intentions.

The label says pure.

The jar says Quebec.

The price says premium.

The contents are… an integrity breach.

Afroman Destroys Trump in Landmark “Lemon Pound Cake” Verdict

Today should become a national American holiday: Lemon Pound Cake Day.

An Ohio jury just delivered one of the clearest freedom verdicts in recent memory. It took less than a day to throw out all thirteen claims of defamation, invasion of privacy, the lot, that had been brought by seven Adams County sheriff’s deputies against rapper Afroman. The deputies claimed they should earn $3.9 million for causing him harm. They got nothing.

The facts are plain. Deputies raided Afroman’s home in Winchester, Ohio with long guns and pistols drawn, smashed his door down, and seized over $5,000 in cash in August 2022. They based the assault on a dubious warrant for drug trafficking and kidnapping. No charges were filed. He was in Chicago, not home. No drugs. No kidnapping. When the sheriff’s office returned the cash taken from him, $400 had been skimmed off. They told him they weren’t responsible for this loss or their property damage either.

Afroman had security cameras that captured the targeted abuse. He used the footage to make music videos, most notably the song “Lemon Pound Cake,” which has been viewed over 3 million times on YouTube. It features surveillance clips of white heavyset deputies breaking down the door, then pausing in the kitchen to eye a lemon cake. Afroman narrates the intrusions to a beat. It is a masterpiece, easily one of the best American protest songs in history.

The deputies, invoking historic white supremacist cancel culture, sued to suppress Black speech. They filed claims of emotional distress, humiliation, and death threats, surprised they would be held accountable for their actions. Deputy Lisa Phillips wanted $1.5 million. Sgt. Randy Walters wanted $1 million and told jurors he was humiliated when his daughter came home from school crying because classmates said her mother was making love to Afroman, a reference to lyrics in a song called “Randy Walters is a Son of a Bitch.

Afroman, as a true patriot, showed up to court every day in an American flag. His testimony was the whole case in miniature:

“I got freedom of speech. After they run around my house with guns, kicked down my door, I got the right to kick a can in my backyard, use my freedom of speech, turn my bad times into a good time.”

“I don’t go to their house, kick down their doors, flip them off on their surveillance cameras, then try to play the victim and sue them.”

“All of this is their fault. If they hadn’t wrongly raided my house, there would be no lawsuit, I would not know their names, they wouldn’t be on my home surveillance system, and there would be no songs.”

He also explained why he brought a local TV crew along when he went to collect his money from the sheriff’s station:

I didn’t wanna get beat up or Epstein’d at the sheriff’s station after I seen them running around my house with AR15s.

God damn American hero, right there.

His defense attorney, David Osborne Jr., put the legal framework to work for everyone to see: the deputies are public officials held to a higher standard, and social commentary on their outrageously unjust conduct is protected speech.

No reasonable person would expect a police officer not to be criticized.

Meanwhile, Afroman’s own countersuit for the property damage the deputies caused during the raid had already been dismissed by Judge Jonathan Hein without a hearing. A victim of police assault had legitimately suffered damages from unwarranted acts. Click of a button, some little office somewhere, Afroman’s words. The institution protects its own until a jury got in the room and called out the imbalance.

Trump Talk Time

To nobody’s surprise, aggressive acts of white supremacists require invisibility to remain legitimate. America First literally calls itself the invisible empire and walks around with white hoods over their head, ever since Woodrow Wilson screened the white sheets vigilante thriller in the White House in 1915.

These KKK “X” uniforms of an “invisible empire” were a byproduct of President Woodrow Wilson’s promotion of costumed violence against Blacks.

These radical racists abusing their power in America see the documentation of them as the actual threat.

The Economist/The New Yorker weren’t wrong
Screen capture from “Birth of a Nation”, the propaganda film President Wilson spread to restart the KKK and incite violence across America.

Lynching, including public torture, worked in America as social and political control affecting law enforcement because it was public but unrecorded, witnessed by the community as spectacle, but not captured in a form that could travel beyond it and reframe it as what it was. The moment reporters and eventually cameras showed up, the political cost of America First changed. Emmett Till’s mother understood this perfectly.

Open the casket, force people to see.


A 17-year-old civil-rights demonstrator is attacked by a police dog, May 3, 1963, Birmingham, AL. President John F. Kennedy discussed this widely seen photo at a White House meeting the next afternoon. | “Once people saw those photos,” says Prof. Brinkley, “they were repulsed by the Southern Jim Crow bigot system.” Photo: Bill Hudson/Associated Press

Lemon Pound Cake is the mechanism Trump is naming and whining he will try to shut down.

The American press has been called liars by him for ages because that exact campaign worked so well for Hitler, but now Trump is elevating his accusations to treason like it’s 1837 in America again. It’s being called treasonous because it reveals the crimes.

On March 15, Trump posted on Truth Social:

media outlets reporting on the Iran war should “be brought up on Charges for TREASON for the dissemination of false information.”

Not a joke. Reporting on a war, as this blog certainly does, is described by Trump as treason. The maximum penalty for treason?

Open the casket, force people to see.

FCC Chair Brendan Carr followed up by threatening to revoke broadcast licenses. Defense Secretary Pete Hegseth whined from the Pentagon podium that networks were running chyrons reading “Mideast War Intensifies” when they should instead fluff and puff about “Iran Increasingly Desperate.”

The footage, the documentation, the record all breaks the framework. Power needs the act and the narrative about the act to be the same thing. An independent record creates a gap between what happened and what was supposed to have happened, and that gap is where accountability lives.

Afroman used a beat and security camera footage to speak the truth to power. The deputies’ lawyer literally argued in court that a victim giving the public a report about a raid was the harm. Not the raid. The reporting that showed evidence. The reframing, with evidence. An American Black man shining a bright light through the sheets of injustice, instead of cowering to the system of false authority.

CNN’s Daniel Dale documented that when the White House provided examples of outlets spreading the fake carrier video Trump raged about, not a single one was American. There was one Israeli, one Saudi, one Turkish. The treason accusation he cooked up was aimed at an American press corps, even as they hadn’t done what Trump accused them of doing. He wanted to punish Americans for the crime of foreign coverage itself.

Trump’s world is violence against non-whites as hidden policy, as to him American documentation of the truth is the treason.

Afroman after the verdict, with tears of joy on his face, wrapped in the American flag on the courthouse steps, corrected the framing one more time:

I didn’t win. America won. America still has freedom of speech. It’s still for the people by the people.

He trumped the Trump.

The jury agreed in under a day.

The question is whether the rest of the world does, or when will Hegseth be held accountable for why he’s covered himself in white supremacist tattoos, known as the guy who loses his grip. Here’s the video predicting three F-15E would be shot down by friendly fire in one night.

Afroman said he didn’t want to be Epstein’d. He won in court. Nearly 200 Iranian little girls are dead from Hegseth’s unpopular war crimes, let alone the many others killed from his expanding mistakes. When will their day in court come? Or what about all the Epstein victims?

Source: Epstein Files

Havana Syndrome Device Has Become Undeniable

The U.S. government has a device that causes Havana Syndrome. It has tested it on animals. It has classified footage of Americans being struck by it overseas. The CIA knows exactly what this weapon does.

Yet the CIA still won’t say who is responsible for Americans attacked with such a device.

A Device Without a Name

In late 2024, DHS Homeland Security Investigations agents used over $15 million in Pentagon funding to purchase a portable, backpack-sized weapon from a Russian criminal group.

At first glance you might think that’s lot of money but the Pentagon under “no rules surf and turf” orders from Hegseth last September spent $15.1 million just on ribeye steaks with another $7 million on lobster tail. Don’t ask how much was spent on Hegseth’s makeup room.

The device purchase exposed that the vital device components were made in Russia. It operates silently, programmable for different scenarios, operable by remote control, and capable of penetrating windows and drywall at a range of several hundred feet. It doesn’t look like much and certainly not a weapon. The software does the work: like a medical tool it shapes a unique electromagnetic wave that rapidly pulses, narrowly targeting electrically active organic tissue.

For years, the CIA argued a microwave weapon capable of causing Havana Syndrome injuries victims would be very large and therefore hard to operate covertly, the size of a truck.

That argument is long gone.

Test Results Are In

The weapon has been in a U.S. military lab for over a year. Tests on rats and sheep produced injuries consistent with those seen in humans diagnosed with Havana Syndrome. Sources who spoke to 60 Minutes also described classified security footage showing Americans being struck overseas — including incidents at CIA headquarters in Virginia and on the grounds of the White House. The CIA declined to comment.

Stanford microbiologist David Relman, who chaired two government investigations into Havana Syndrome, explained the mechanism:

When you produce pulses like this, you can actually stimulate electrically active tissue like brain tissue and the heart… mimicking what the brain normally does, but now you’re driving it with your pulses from the outside.

Norway Accidentally Confirmed It

A Norwegian government scientist with a reputation as a leading skeptic of directed-energy weapon theories discovered the opposite of his intent. He constructed his own pulsed microwave device in 2024 to prove, with himself as the test subject, that such technology was harmless. He instead harmed himself enough to suffer neurological symptoms consistent with Havana Syndrome: headaches, vertigo, memory loss, hearing loss, cognitive disruption.

The Norwegian government informed the CIA. The Pentagon and White House each sent delegations to Norway to examine his device.

U.S. officials noted that his symptoms were not a clinical match for every documented AHI case, but confirmed the core finding: pulsed-energy devices can cause measurable neurological injury in humans.

A skeptic built a device to disprove the theory and caused his own brain damage instead.

CIA Struggles to Deny

A former CIA officer who worked the agency’s Havana Syndrome investigation told 60 Minutes that the unit’s mission, from the beginning, was to:

bring down the temperature

The agency has been steering conclusions toward environmental causes. This tracks with what victims have documented for years. CIA senior leadership privately accused them of fabricating symptoms for financial gain, denied medical care, and required participation in research as a condition of treatment.

The 60 Minutes investigation further found that incidents had been reported at CIA headquarters and on White House grounds, which make “environmental factors” an implausible explanation on their face.

The 2023 intelligence community assessment concluded it was “very unlikely” a foreign adversary was responsible. And that assessment held through a January 2025 update.

So what, it’s a domestic adversary?

A Big Split

The intelligence community is now formally divided on the issue, as evidence no longer can be explained away. The NSA and the National Ground Intelligence Center have shifted positions, acknowledging the possibility that a foreign actor possesses technology capable of producing biological effects consistent with documented AHI cases. The CIA and four other agencies aren’t having it, and continue to hold the “very unlikely” line.

This is not a difference of analytical interpretation. The U.S. defense experts have a working device, animal trial results, classified impact footage, and an accidental human replication in Norway. The CIA has a weak conclusion it reached in 2023 and has declined to revisit.

Proliferation Risk

The operation that obtained the device exposed an arms dealer situation. Obviously if undercover HSI agents could buy this weapon from dealers in the arms market, Russia doesn’t keep or control it. These devices are not confined to state programs. They are circulating. Any billionaire these days could buy one, especially if the CIA keeps denying they even exist. The question is who makes them, how fast, how many of them are out there, who has them, and who has been harmed.

The CIA’s continued position does not engage with any of this. It predates the device acquisition, predates the animal trials, predates Norway, and predates the classified footage. It is a conclusion held in place by institutional investment in a prior judgment.

That means the agency is actively refusing to do analysis. That is a cover.

Decoder Ring for Trump’s 15 Dictator Tactics in One White House Press Release

The White House published its official summary of the 2026 State of the Union address on February 25th.

…[Texas Rep. Al] Green quietly unfurled a sign declaring that “Black People Aren’t Apes,” an apparent reference to a video that was briefly posted on Trump’s Truth Social account earlier this month that depicted President Barack Obama and first lady Michelle Obama as apes. Republican lawmakers were incensed, with Sen. Markwayne Mullin of Oklahoma at one point trying to tear the sign out of Green’s hand.

What was Mullin so angry about?

To no one’s surprise the White House recount reads like a dispatch from North Korea, a silly propaganda operation. To me, as a disinformation historian, it looks like a military-grade influence technique buffet.

I assure you that every line from the White House blog maps to a known military intelligence information warfare tactic. Most of them are catalogued in doctrine manuals from RAND, NATO StratCom, as well as the old Soviet active measures playbook.

None of this is subtle.

None of it is new.

The only thing novel is that the .gov domain has been captured by people who type like they only have thumbs.

Here is the secret decoder ring you should be able to find in any box of Cheerios.

Loyalty Enumeration

What They Published How It Works Who Did It Before
1. The entire “Democrats refused to applaud” list structure Documenting who failed to perform sufficient enthusiasm for the leader transforms a press release into a denunciation register. The content of the speech becomes secondary to cataloguing the reactions of potential enemies. Stalin’s Pravda tracked applause levels at Party Congresses. Mao’s Hundred Flowers campaign invited criticism, then used responses as a purge list. Ceausescu’s final speech was structured identically.

Dehumanization Lexicon

What They Published How It Works Who Did It Before
2. “Savage criminal illegal aliens — killers, rapists, gang members, and traffickers,” “illegal alien monster,” “invasion” Categorical dehumanization collapses an entire population into threat archetypes. Once a group is linguistically recategorized as subhuman, any action against them reads as self-defense rather than aggression. Nazi Ungeziefer (vermin) and Untermenschen. Rwandan Hutu Power radio used inyenzi (cockroaches). Ottoman authorities framed Armenians as existential threats. Khmer Rouge called targets “parasites.”

Firehose of Falsehood

What They Published How It Works Who Did It Before
3. Over 47 claims in a single document: “ending eight wars,” “total victory over terrorists,” “single largest drop in the murder rate in 125 years,” soaring 401(k)s, secure border, falling crime Volume overwhelms verification. Each claim would require independent fact-checking, but the sheer density ensures no single lie gets adequate scrutiny. Documented by RAND as a core Russian information warfare technique. The goal is not persuasion but exhaustion. Russian IRA operations 2014-2020. Goebbels’ principle of the Big Lie scaled through repetition. Iraqi Information Minister “Baghdad Bob” during the 2003 invasion. Erdogan’s post-coup media blitz in 2016.

Atrocity Propaganda

What They Published How It Works Who Did It Before
4. “The grieving families of innocent American women and children murdered by criminal illegal aliens — including the mother of Iryna Zarutska” Showcase individual victims of the target group to generalize criminality across an entire population. The named victim creates emotional specificity; the category does the political work. Individual tragedy becomes collective indictment. The Nazis published Der Stürmer with a regular feature on crimes allegedly committed by Jews. The British WWI Bryce Report fabricated Belgian atrocity stories. Willie Horton was the American domestic version.

Blood Libel / Ethnic Financial Crime

What They Published How It Works Who Did It Before
5. “Ending widespread fraud schemes — like the $19 billion Somali fraud scandal that burdened Minnesota taxpayers” Attach an outrageous financial crime to a specific ethnic community as a collective. Position the native population as victims. The dollar figure gives false precision. Whether a kernel of fraud exists is irrelevant — the function is to weld an ethnic identity to criminality in public memory. Medieval blood libel against Jews. The Protocols of the Elders of Zion. Chinese Exclusion Act propaganda about wage theft. Japanese internment justified partly through claims of economic sabotage.

Child Protection Pretext

What They Published How It Works Who Did It Before
6. “Protecting minor children from the horrors of irreversible sex changes” Position the state as rescuer of children from a demonized minority. “Protect the children” is the single most reliable authoritarian mobilization frame because it makes opposition impossible to articulate without appearing to endorse harm to minors. Anita Bryant’s “Save Our Children” (1977). UK Section 28 (1988). Putin’s “gay propaganda” law (2013). QAnon’s child trafficking mythology. Nazi campaign against “degenerate” influences on youth.

War Buried in Consumer Metrics

What They Published How It Works Who Did It Before
7. Military invasion of Venezuela listed between gas prices and tax cuts Normalization through sequencing. Embedding an act of war inside a consumer satisfaction list makes conquest read as just another deliverable. By the time the reader scrolls past “No Tax on Tips,” the overthrow of a sovereign government is just another bullet point. Mussolini buried the invasion of Ethiopia inside domestic economic messaging. Bush administration embedded Iraq escalation inside State of the Union laundry lists. Israel’s settlement expansion reported alongside economic indicators.

Sovereignty Laundering

What They Published How It Works Who Did It Before
8. “The decisive military action that brought indicted narcoterrorist Nicolás Maduro to justice, crippling drug cartels and liberating our hemisphere” Reframe military invasion of a sovereign nation as law enforcement. “Indicted” provides the legal costume. “Narcoterrorist” merges drug policy with war on terror framing. “Liberating our hemisphere” recycles Monroe Doctrine language to present aggression as regional stewardship. Panama 1989 (Noriega). Grenada 1983. Iraq 2003 framed as “liberation.” Soviet “fraternal assistance” for Hungary 1956, Czechoslovakia 1968, Afghanistan 1979.

Credit Claiming / Post Hoc Fallacy

What They Published How It Works Who Did It Before
9. “Inflation finally subsiding,” gas prices dropping, stock market surging, crime falling Claim credit for trends that precede your administration or result from factors beyond executive control. Economic indicators move on multi-year cycles; presenting inherited momentum as personal achievement is a universal autocratic move. Mussolini and the trains. Stalin and industrialization (achieved through mass death). Putin claiming credit for oil-price-driven GDP growth in the 2000s. Xi claiming poverty reduction that was already trending.

Phantom Threat / Voter Fraud Myth

What They Published How It Works Who Did It Before
10. “Protecting the integrity of our elections by preventing illegal aliens from undermining our democracy” Manufacture a nonexistent threat to justify voter suppression infrastructure. Noncitizen voting is statistically negligible, but asserting its existence creates the pretext for purging voter rolls and restricting access. The “protection” is the weapon. Jim Crow literacy tests framed as “election integrity.” Hungary’s Orbán used “Soros-funded” migration to justify election law changes. Putin frames managed elections as defense against Western interference.

Militarism as Nostalgia

What They Published How It Works Who Did It Before
11. “A World War II hero who helped liberate the largest internment camp in the Philippines,” “Warrior Dividends,” law enforcement “respected once again” Wrap current militarism in the unimpeachable moral authority of WWII. Conflating a genuine hero’s story with contemporary military adventurism transfers legitimacy from a justified war to unjustified ones. “Warrior Dividends” monetizes the mythology. Reagan’s WWII references to justify Cold War escalation. Putin’s “Great Patriotic War” cult used to legitimize the Ukraine invasion. Mussolini invoking Rome. Every authoritarian regime attaches itself to prior military glory to launder current aggression.

Unfalsifiable Victory Claims

What They Published How It Works Who Did It Before
12. “Ending eight wars,” “total victory over terrorists abroad,” “peace through unmatched American strength” Declare victory in conflicts the audience cannot independently verify. Which eight wars? Total victory where? These claims exist in a verification vacuum — they cannot be checked in real time, and by the time anyone tries, the news cycle has moved on. Nixon’s “peace with honor” in Vietnam. Bush’s “Mission Accomplished.” Soviet claims of victory in Afghanistan. The forever war’s perpetual “turning the corner.”

Populist Bribery

What They Published How It Works Who Did It Before
13. “No Tax on Tips, No Tax on Overtime, No Tax on Social Security,” “Trump Accounts” for newborns, banning corporations from buying single-family homes Scatter enough consumer-facing promises to create personal financial stakes in regime loyalty. Each item targets a specific demographic. The policies need not be real or enacted — the announcement itself is the product. Perón’s aguinaldo (mandatory bonus). Chavez’s Bolivarian missions. Erdogan’s pre-election handouts. Putin’s pension increases timed to elections. Bread and circuses, updated for the 401(k) era.

Sacred Calendar

What They Published How It Works Who Did It Before
14. “National Day of Patriotic Devotion, 2026” in the related articles Sacralizing the regime through mandatory civic ritual. Creating regime-specific holidays displaces existing civic traditions and establishes the leader’s calendar as the national temporal framework. Mussolini’s Fascist calendar (Year I of the Fascist Era). Franco’s “Day of the Race.” Nazi Nationalfeiertag. North Korea’s Juche calendar. Turkmenistan’s Ruhnama Day.

Enemy Media Designation

What They Published How It Works Who Did It Before
15. “Media Offenders” page linked in site navigation Official government designation of press outlets as enemies of the state, maintained as a permanent institutional feature rather than rhetorical flourish. Converts press criticism from democratic function to act of disloyalty. Nazi Lügenpresse (lying press). Stalin’s purges of journalists. Erdogan’s mass closure of media outlets post-2016. Orbán’s systematic acquisition of independent Hungarian media. Duterte’s shutdown of ABS-CBN.

The Architecture, Not the Ingredients

Any single tactic on this list normally would be dismissed as deranged political hyperbole, excessive partisan messaging, or rhetorical overreach that causes conflict. That is exactly how military intelligence sets up a disinformation buffet to work. The effect does not depend on any individual dish, because it serves them all simultaneously on official White House china. As Trump loyalists monitor everyone in the house, those who digest what’s served are in trouble, while those who resist are in even more danger.

Nazis wore red. A scene from a 2025 movie about Hitler pressing women into tasting his food for poison, based on the 2018 book: “Le assaggiatrici”

Military information operations doctrine FM 3-13 distinguishes between content and architecture.

Content is each of the fifteen individual tactics. Architecture is the system that connects all the content, such as the .gov blog post methodology. The White House use of military intelligence doctrine in an attack on the American public does three things at once with a known authoritarian architecture:

  1. Establishes a loyalty test (who applauded)
  2. Designates enemies both domestic (Democrats, media) and foreign (immigrants, Somalis, Venezuela)
  3. Buries an act of war inside a consumer rewards program

That triple function of loyalty enforcement, enemy designation, and normalization of violence does something far beyond an actual press release. It is an operations order, which comes along with news that mass political prisons are being rushed at high cost to begin spraying people with “war power” authorized pesticides.

Use of the .gov domain and a blog post to attack Americans tells you how far and informal a normalization of military dictatorship has already progressed. Every technique was field-tested by a regime that did not survive its own ambitions. The historical record is not ambiguous about where an all-you-can-eat buffet approach to military intelligence leads.

The only question is whether Americans recognize the price of swallowing what Trump is dishing, before the bill is due.