Category Archives: History

Decoder Ring for Trump’s 15 Dictator Tactics in One White House Press Release

The White House published its official summary of the 2026 State of the Union address on February 25th.

…[Texas Rep. Al] Green quietly unfurled a sign declaring that “Black People Aren’t Apes,” an apparent reference to a video that was briefly posted on Trump’s Truth Social account earlier this month that depicted President Barack Obama and first lady Michelle Obama as apes. Republican lawmakers were incensed, with Sen. Markwayne Mullin of Oklahoma at one point trying to tear the sign out of Green’s hand.

What was Mullin so angry about?

To no one’s surprise the White House recount reads like a dispatch from North Korea, a silly propaganda operation. To me it looks like a military-grade influence technique buffet.

As a historian of disinformation I assure you that every line from the White House maps to a known information warfare tactic. Most of them are catalogued in military doctrine manuals from RAND, NATO StratCom, and the old Soviet active measures playbook.

None of this is subtle.

None of it is new.

The only thing novel is that the .gov domain has been captured by people who type like they only have thumbs.

Here is the secret decoder ring you should be able to find in any box of Cheerios.

Loyalty Enumeration

What They Published How It Works Who Did It Before
1. The entire “Democrats refused to applaud” list structure Documenting who failed to perform sufficient enthusiasm for the leader transforms a press release into a denunciation register. The content of the speech becomes secondary to cataloguing the reactions of potential enemies. Stalin’s Pravda tracked applause levels at Party Congresses. Mao’s Hundred Flowers campaign invited criticism, then used responses as a purge list. Ceausescu’s final speech was structured identically.

Dehumanization Lexicon

What They Published How It Works Who Did It Before
2. “Savage criminal illegal aliens — killers, rapists, gang members, and traffickers,” “illegal alien monster,” “invasion” Categorical dehumanization collapses an entire population into threat archetypes. Once a group is linguistically recategorized as subhuman, any action against them reads as self-defense rather than aggression. Nazi Ungeziefer (vermin) and Untermenschen. Rwandan Hutu Power radio used inyenzi (cockroaches). Ottoman authorities framed Armenians as existential threats. Khmer Rouge called targets “parasites.”

Firehose of Falsehood

What They Published How It Works Who Did It Before
3. Over 47 claims in a single document: “ending eight wars,” “total victory over terrorists,” “single largest drop in the murder rate in 125 years,” soaring 401(k)s, secure border, falling crime Volume overwhelms verification. Each claim would require independent fact-checking, but the sheer density ensures no single lie gets adequate scrutiny. Documented by RAND as a core Russian information warfare technique. The goal is not persuasion but exhaustion. Russian IRA operations 2014-2020. Goebbels’ principle of the Big Lie scaled through repetition. Iraqi Information Minister “Baghdad Bob” during the 2003 invasion. Erdogan’s post-coup media blitz in 2016.

Atrocity Propaganda

What They Published How It Works Who Did It Before
4. “The grieving families of innocent American women and children murdered by criminal illegal aliens — including the mother of Iryna Zarutska” Showcase individual victims of the target group to generalize criminality across an entire population. The named victim creates emotional specificity; the category does the political work. Individual tragedy becomes collective indictment. The Nazis published Der Stürmer with a regular feature on crimes allegedly committed by Jews. The British WWI Bryce Report fabricated Belgian atrocity stories. Willie Horton was the American domestic version.

Blood Libel / Ethnic Financial Crime

What They Published How It Works Who Did It Before
5. “Ending widespread fraud schemes — like the $19 billion Somali fraud scandal that burdened Minnesota taxpayers” Attach an outrageous financial crime to a specific ethnic community as a collective. Position the native population as victims. The dollar figure gives false precision. Whether a kernel of fraud exists is irrelevant — the function is to weld an ethnic identity to criminality in public memory. Medieval blood libel against Jews. The Protocols of the Elders of Zion. Chinese Exclusion Act propaganda about wage theft. Japanese internment justified partly through claims of economic sabotage.

Child Protection Pretext

What They Published How It Works Who Did It Before
6. “Protecting minor children from the horrors of irreversible sex changes” Position the state as rescuer of children from a demonized minority. “Protect the children” is the single most reliable authoritarian mobilization frame because it makes opposition impossible to articulate without appearing to endorse harm to minors. Anita Bryant’s “Save Our Children” (1977). UK Section 28 (1988). Putin’s “gay propaganda” law (2013). QAnon’s child trafficking mythology. Nazi campaign against “degenerate” influences on youth.

War Buried in Consumer Metrics

What They Published How It Works Who Did It Before
7. Military invasion of Venezuela listed between gas prices and tax cuts Normalization through sequencing. Embedding an act of war inside a consumer satisfaction list makes conquest read as just another deliverable. By the time the reader scrolls past “No Tax on Tips,” the overthrow of a sovereign government is just another bullet point. Mussolini buried the invasion of Ethiopia inside domestic economic messaging. Bush administration embedded Iraq escalation inside State of the Union laundry lists. Israel’s settlement expansion reported alongside economic indicators.

Sovereignty Laundering

What They Published How It Works Who Did It Before
8. “The decisive military action that brought indicted narcoterrorist Nicolás Maduro to justice, crippling drug cartels and liberating our hemisphere” Reframe military invasion of a sovereign nation as law enforcement. “Indicted” provides the legal costume. “Narcoterrorist” merges drug policy with war on terror framing. “Liberating our hemisphere” recycles Monroe Doctrine language to present aggression as regional stewardship. Panama 1989 (Noriega). Grenada 1983. Iraq 2003 framed as “liberation.” Soviet “fraternal assistance” for Hungary 1956, Czechoslovakia 1968, Afghanistan 1979.

Credit Claiming / Post Hoc Fallacy

What They Published How It Works Who Did It Before
9. “Inflation finally subsiding,” gas prices dropping, stock market surging, crime falling Claim credit for trends that precede your administration or result from factors beyond executive control. Economic indicators move on multi-year cycles; presenting inherited momentum as personal achievement is a universal autocratic move. Mussolini and the trains. Stalin and industrialization (achieved through mass death). Putin claiming credit for oil-price-driven GDP growth in the 2000s. Xi claiming poverty reduction that was already trending.

Phantom Threat / Voter Fraud Myth

What They Published How It Works Who Did It Before
10. “Protecting the integrity of our elections by preventing illegal aliens from undermining our democracy” Manufacture a nonexistent threat to justify voter suppression infrastructure. Noncitizen voting is statistically negligible, but asserting its existence creates the pretext for purging voter rolls and restricting access. The “protection” is the weapon. Jim Crow literacy tests framed as “election integrity.” Hungary’s Orbán used “Soros-funded” migration to justify election law changes. Putin frames managed elections as defense against Western interference.

Militarism as Nostalgia

What They Published How It Works Who Did It Before
11. “A World War II hero who helped liberate the largest internment camp in the Philippines,” “Warrior Dividends,” law enforcement “respected once again” Wrap current militarism in the unimpeachable moral authority of WWII. Conflating a genuine hero’s story with contemporary military adventurism transfers legitimacy from a justified war to unjustified ones. “Warrior Dividends” monetizes the mythology. Reagan’s WWII references to justify Cold War escalation. Putin’s “Great Patriotic War” cult used to legitimize the Ukraine invasion. Mussolini invoking Rome. Every authoritarian regime attaches itself to prior military glory to launder current aggression.

Unfalsifiable Victory Claims

What They Published How It Works Who Did It Before
12. “Ending eight wars,” “total victory over terrorists abroad,” “peace through unmatched American strength” Declare victory in conflicts the audience cannot independently verify. Which eight wars? Total victory where? These claims exist in a verification vacuum — they cannot be checked in real time, and by the time anyone tries, the news cycle has moved on. Nixon’s “peace with honor” in Vietnam. Bush’s “Mission Accomplished.” Soviet claims of victory in Afghanistan. The forever war’s perpetual “turning the corner.”

Populist Bribery

What They Published How It Works Who Did It Before
13. “No Tax on Tips, No Tax on Overtime, No Tax on Social Security,” “Trump Accounts” for newborns, banning corporations from buying single-family homes Scatter enough consumer-facing promises to create personal financial stakes in regime loyalty. Each item targets a specific demographic. The policies need not be real or enacted — the announcement itself is the product. Perón’s aguinaldo (mandatory bonus). Chavez’s Bolivarian missions. Erdogan’s pre-election handouts. Putin’s pension increases timed to elections. Bread and circuses, updated for the 401(k) era.

Sacred Calendar

What They Published How It Works Who Did It Before
14. “National Day of Patriotic Devotion, 2026” in the related articles Sacralizing the regime through mandatory civic ritual. Creating regime-specific holidays displaces existing civic traditions and establishes the leader’s calendar as the national temporal framework. Mussolini’s Fascist calendar (Year I of the Fascist Era). Franco’s “Day of the Race.” Nazi Nationalfeiertag. North Korea’s Juche calendar. Turkmenistan’s Ruhnama Day.

Enemy Media Designation

What They Published How It Works Who Did It Before
15. “Media Offenders” page linked in site navigation Official government designation of press outlets as enemies of the state, maintained as a permanent institutional feature rather than rhetorical flourish. Converts press criticism from democratic function to act of disloyalty. Nazi Lügenpresse (lying press). Stalin’s purges of journalists. Erdogan’s mass closure of media outlets post-2016. Orbán’s systematic acquisition of independent Hungarian media. Duterte’s shutdown of ABS-CBN.

The Architecture, Not the Ingredients

Any single tactic on this list normally would be dismissed as deranged political hyperbole, excessive partisan messaging, or rhetorical overreach that causes conflict. That is exactly how military intelligence sets up a disinformation buffet to work. The effect does not depend on any individual dish, because it serves them all simultaneously on official White House china. As Trump loyalists monitor everyone in the house, those who digest what’s served are in trouble, while those who resist are in even more danger.

Nazis wore red. A scene from a 2025 movie about Hitler pressing women into tasting his food for poison, based on the 2018 book: “Le assaggiatrici”

Military information operations doctrine FM 3-13 distinguishes between content and architecture.

Content is each of the fifteen individual tactics. Architecture is the system that connects all the content, such as the .gov blog post methodology. The White House use of military intelligence doctrine in an attack on the American public does three things at once with a known authoritarian architecture:

  1. Establishes a loyalty test (who applauded)
  2. Designates enemies both domestic (Democrats, media) and foreign (immigrants, Somalis, Venezuela)
  3. Buries an act of war inside a consumer rewards program

That triple function of loyalty enforcement, enemy designation, and normalization of violence does something far beyond an actual press release. It is an operations order, which comes along with news that mass political prisons are being rushed at high cost to begin spraying people with “war power” authorized pesticides.

Use of the .gov domain and a blog post to attack Americans tells you how far and informal a normalization of military dictatorship has already progressed. Every technique was field-tested by a regime that did not survive its own ambitions. The historical record is not ambiguous about where an all-you-can-eat buffet approach to military intelligence leads.

The only question is whether Americans recognize the price of swallowing what Trump is dishing, before the bill is due.

Epstein Connection to Khmer Loot Reveals Blood on MoMA Hands

Looting vulnerable populations and laundering their assets through institutional prestige has a long, documented history.

Look at how Prussia strip-mined the Ottoman territory and built their Pergamon museum around the loot. Look at how the Nazis then systematized that art theft across occupied Europe. The hunt for all the stolen works continues eight decades later.

Don’t look too hard in the estates around the Wannsee.

Powerful actors extract cultural wealth from people in crisis, then use institutional credibility to convert stolen goods into legitimate collections.

Enter Epstein.

Leon Black paid a convicted sex trafficker over $150 million for “financial advice” on looting. That trafficker’s files contain an inventory of Black’s $27.7 million collection of Southeast Asian antiquities, which happen to be objects extracted from Cambodian sites during conflicts that killed roughly two million people.

The supply chain for these objects runs through mass violence, displacement, and exploitation of vulnerable populations.

It brings to light Douglas Latchford’s network, which depended on local labor operating under coercion or desperation in conflict zones to loot these sites. Trafficking in looted cultural property produced by conditions indistinguishable from trafficking in persons. Latchford published one of Black’s pieces in a book, corresponded about selling bronzes to Black, and when an Australian museum canceled a purchase over insufficient provenance, redirected the same piece toward Black. He was indicted for fraud and conspiracy in trafficking Cambodian artifacts. His family returned the collection to Cambodia. The Metropolitan Museum returned 14 sculptures. The US government returned 30 objects.

Black still has his, somehow.

Epstein’s files contain the inventory of these looted acquisitions. I mean Epstein had operational visibility into Black’s holdings. The same Epstein whose own operation depended on exploiting vulnerable people. The financial plumbing connects both trafficking streams together. The wealth extracted through cultural looting in conflict zones, is managed by an operation funded through sexual exploitation.

The Epstein network actively gatekept women out of professional advancement while trafficking girls. Same dehumanization, different expression. Hatred as doctrine underlies the trafficking to make it possible. Trafficking humans by definition is the act of regarding some as lesser, if not inhuman.

The same files show Epstein explicitly ordered women excluded from elite scientific conferences he funded. “The women are all weak, and a distraction,” he wrote to literary agent John Brockman. Larry Summers joked about women’s IQ. A Yale computer scientist described a female undergrad to Epstein as a “v small good-looking blonde.” The network that looted Cambodian antiquities and trafficked underage girls also systematically excluded women from professional advancement. The dehumanization is the operating system.

Looting, trafficking, gatekeeping.

Black’s spokesperson offers the standard laundering fallacy: looting was done “through a well-regarded and highly reputable art dealer.”

Yeah, we get it. Trump and Epstein were well-regarded. Latchford was reputable too right up until his indictment. An Australian museum canceling a purchase for insufficient provenance, followed by Latchford redirecting that piece to Black, shows conscious avoidance that normally triggers trafficking statutes.

The “reputation” defense works the same in every laundering operation from 1880s Berlin to 1940s Paris to 2013 New York. Buy through a middleman to claim distance from the act. Hire a hit man to say you didn’t do the hit.

Black “cooperated” with a DOJ inquiry five years ago. And then? Somehow he remains a MoMA trustee, a known Epstein associate who now shows up flaunting the files.

…art insiders were wide-eyed to see Black, as well as fellow Epstein pal Glenn Dubin, stride into a private party, apparently hosted by the [MoMA] institution itself…. Black…stepped down as chairman of the museum in 2021 after protest from artists and workers over his connections to Epstein. On Tuesday, a rep for Black told us, “Mr. Black was proud to be at the dinner….” Both Black and Dubin have galleries in MoMA named after them.

The Nazis looted art and trafficked underage girls, building their white man’s empire atop mass suffering. The Epstein network does the same. Black represents how an institutional playbook for elites converts mass atrocity into cultural capital even today.

Fishing Nets Reverse Russian Drone Kill Zone

The most important detail in the Financial Times’ investigation of Ukraine’s front lines isn’t the kill zone, the fiber-optic drones, or the soldiers trapped for 165 days without rotation. It’s the fishing nets.

French and Swedish fishing nets, suspended over roads, hospitals, and critical infrastructure in Kherson, are intercepting 95% of incoming Russian drones. Up from 80% last May. Not with radar-guided missiles, not with electronic warfare, not with AI-powered counter-drone systems. Nets. The oldest barrier technology in human history is defeating precision-guided munitions at a cost ratio that inverts everything the defense industry has been selling for decades.

Simple Economics as Strategy

An FPV drone costs a few hundred dollars. A fiber-optic variant under $1000. Russia produces them by the million. And soon they’ll be 3D printed by field teams themselves. The standard counter-drone response of jamming, directed energy, and kinetic intercept costs orders of magnitude more per engagement than the drone itself. That’s an attacker’s economy. The defender bleeds money and time faster than the attacker spends it.

Fishing nets flip the ratio back. The cost per meter of industrial netting is trivial. Once installed, it works continuously with zero per-engagement cost. No operator, no ammunition, no power supply. A drone hits the net, tangles, detonates harmlessly or falls. The net gets repaired or replaced for almost nothing. The attacker has to keep spending thousands per attempt against a barrier that costs pennies per interception.

That’s an economic advantage that’s sustainable.

Who Built It First

Kherson has been the laboratory. The city’s population dropped from 250,000 to 60,000 under relentless Russian drone strikes, with over 9,500 attacks on civilians by December 2024. Governor Prokudin responded with what he calls a “drone dome”: layered netting over critical routes and buildings, combined with EW systems, sensors, and civilians trained with shotguns. In some districts the sky is barely visible through the mesh.

The FT describes the same approach spreading across the front. Thousands of kilometers of nets now form tunnels over main highways, stopping suicide FPV drones from diving at vehicles. The Pentagon recently issued guidance recommending nets, barriers, and camouflage as low-cost physical defenses against small drones. Taiwan is building its T-Dome program directly from Kherson’s experience.

Nets Answer the Drone Zone Question

Last November I wrote about Ukraine’s quartermaster problem in Pokrovsk — the 20km death zone where centralized linear logistics had become suicidal under persistent drone interdiction. The FT’s kill zone report confirms that condition now covers the entire front. Two soldiers held position near Orikhiv for 165 days, thirty relief attempts failed, fog saved them. Supplies move by cargo drone and UGV. Troops crawl under thermal cloaks for days.

I compared the problem to Grant’s quartermaster insight: you don’t counter interdiction with better tactics, you build a supply architecture more resilient than the enemy’s ability to disrupt it. Multiple independent routes, pre-positioned caches, expendable logistics with losses built into planning ratios.

Nets are one such logistics architecture. Cover the supply routes with physical barriers, and the kill zone starts to shrink. Vehicles can move under netting. Positions can be resupplied. The 30 failed relief attempts become possible when the approach route is physically shielded. The engineering problem I described, to sustain forces inside a drone-saturated environment, has an inexpensive answer.

Machine Guns and Barbed Wire

The defense establishment keeps comparing drones to the tank of 1916 as if a new offensive capability awaiting doctrinal innovation. That’s backwards. Drones are the machine gun. They destroyed the old paradigm of conventional movement.

The kill zone is no man’s land. And nets are barbed wire’s inversion.

In WWI, barbed wire made from surplus telegraph supplies was cheap passive defense that made the kill zone lethal for attackers. Nets are cheap passive defense that makes the kill zone survivable for defenders. Same principle. Physical barriers that cost almost nothing defeat expensive offensive systems, by working in the opposite direction. Wire aided the machine guns. Nets defeat the drones.

The 40km fiber-optic cables, the dynamic mining, the electronic warfare stalemate — all of that is real and accelerating. But the counter already exists. It’s sitting in declining or dormant fishing ports. Defense spending could revive coastal economies instead of enriching bumbling contractors.

The question is whether militaries will scale it as infrastructure or keep chasing expensive technological and ideological unicorns while soldiers crawl through the mud under thermal blankets.

General Grant would have ordered net production over six months ago.

De Oppresso Liber Was a Trust Doctrine: SOF Can’t Get Back There From Venezuela

Sitting on my desk is a ship in a bottle my father gave me, made by Bill Donovan. When I look at the tiny masts, their delicate rigging, above the blue painted waves, I’m reminded how the precise qualities of an operator used to be measured.

And then I look over at Seth Harp’s book.

He explains Special Operations missions in the GWOT as:

…covertly liquidating the male population base of recalcitrant ethnic and tribal groups that resist U.S. military occupation.

Ouch.

The book gets reviewed plainly by some as an emerging revelation about how badly things turned out under Bush. The far more important exposure actually needs to be about what’s developing post-GWOT.

SOF operators increasingly hint towards decoupled regional commands, district-style zones of interest, an end to the global sharing frameworks that defined twenty years of allied operations. Everyone points to the Delta operation in Venezuela using narrow cartel designations as proof the model works without foundational coalition architecture.

This is regressive doctrine dressed as adaptation. It’s like how people invoke Monroe as cover for the exact opposite doctrine. I mean, look at what “special” has meant and what operators increasingly want it to mean next.

Tailored and Relative Defense

The original Special Forces mission that we study, such as Bank, the OSS lineage, and de oppresso liber all defined “special” as being tight and tailored. Small teams shaped to specific cultural contexts, building indigenous defensive capability relative to local threats. The operator learned the language, lived in the village, measured success by what the partner force could do after Americans left. The 12-man ODA existed to enable durable local resilience. Medic as community entry point, intelligence sergeant building networks through relationships, team sergeant as institutional memory.

“Special” meant fit to context and oriented toward defense that enabled populations to protect themselves. Force multiplication structure, training, selection all followed from this. The screens were for cultural adaptability, communication aptitude, comfort with ambiguity, patience measured in years.

Universal and Industrialized Offense

GWOT flushed all that away with a rush to produce body tags. McChrystal’s F3EAD cycle (Find, Fix, Finish, Exploit, Analyze, Disseminate) redefined “special” as universal champions of death tolls. One kill chain applied anywhere and everywhere. Track a target, kill him and every military-age male nearby, seize documents, generate more names, repeat again hours later. Speed through targets, shoot first, and only ask questions so you can start shooting again. The same process in Anbar, Helmand, Mogadishu, the Sahel. Context didn’t exist beyond the shape of the kill zones. Cultural knowledge didn’t matter beyond the direction the door kicked in. The machine was industrialized offense, optimized for speed and volume of kills on a full sprint.

This required total information access across allied networks and worked because Five Eyes plus NATO SOF plus partner nations operated as a single organism with shared targeting databases. The global architecture made universal application possible.

It also inverted de oppresso liber completely. Indigenous partners became consumable inputs to the targeting machine. Afghan commandos serviced American kill lists. A force designed to enable tailored local defense was reoptimized into universal industrial offense that depopulated resistance. And the more the thoughtless machinery depopulated areas, the higher the percentage of resistance. Just like Vietnam. Go figure.

Decoupled and Unleashed

The operators calling for regional decoupling lately think they are wisely preparing for a world where the U.S. no longer has authority. Turkey running SOF against the American-trained forces in Syria. France pushed out of the Sahel by Wagner. Gulf states with SOF relationships that bypass JSOC. The global sharing framework broke when Hegseth used it for war crimes in the Caribbean, so formalize it.

What they actually propose is a third model worse than either predecessor. Not tailored defense. Not even universal offense with its coalition constraints. It’s a decoupled offense of regional fiefdoms operating under their own legal authority, political cover, and information control, answerable to whoever holds the designation authority in their district.

“Special” stops meaning tailored or even universal. It means unleashed, above the law because loyal to the directed mission only. A force pointed at whatever target the political sponsor designates, with no doctrinal requirement to build anything, no allied framework providing oversight, and no cooperative architecture satisfying the SOF truths that most special operations require non-SOF assistance.

The GWOT model, for all the horrors that Harp documents in his book, at least maintained the structural possibility of allied pushback. Partners who share a common operational picture can object. Decoupled districts eliminate that. Each zone operates in its own information silo, like Chad or Guatemala under Reagan. Nobody outside sees the full picture until criminal tribunals investigate decades later.

De oppresso liber is a trust doctrine.

Populations considering partnership with American SOF watched what happened to the Montagnards, the Kurds, the Hmong, the Afghans. The institutional record is politically conditional treatment. Decoupled regional commands with rotating political sponsorship will only make that worse. What serious opposition figure in Venezuela or anywhere else will invest in a relationship with a force that has no doctrinal commitment to their survival and no allied framework holding it accountable?

Tailored relative defense built things that lasted. Universal industrialized offense destroyed them. The new trend towards decoupled and unleashed doesn’t even pretend to try.