Category Archives: Security

SpaceX Dumpster Fire in the Sky Seeks Rapid Approval

If you thought Tesla making cars more deadly than Ford Pinto was bad, after lying to the public and regulators the whole time, have I got news for you.

Big Tech billionaires are exhibiting historic levels of cruelty towards society, as if to usher in harms

SpaceX filed with the FCC to launch up to one million satellites. The filing contains no deployment schedule, no cost estimate, no hardware specifications, and no satellite mass. It contains the phrase “Kardashev Type II civilization” and requests to waive every milestone requirement.

The FCC is accepting public comments. The deadline is unpublished, meaning it could close without notice.

Objection, Objection

The FCC has categorically excluded satellites from environmental review since 1986. The GAO recommended the agency revisit this. The FCC agreed they would, then started making the exemption permanent instead. Chairman Brendan Carr is formally arguing that orbital operations are “extraterritorial” and things falling on the U.S. are outside the scope of U.S. environmental law. It’s like a factory arguing their smoke stack is so tall it’s the next town’s problem.

There are roughly 15,000 satellites in orbit. Starlink already tangled up 300,000 collision avoidance maneuvers in 2025. That rate doubles every six months. A January 2026 study calculated that if any avoidance maneuvers failed, a catastrophic collision would occur within 2.8 days. Does anyone remember that in 2018 that window was 121 days? Now imagine the window after trying to fill 100X more satellites into the same space.

Last week, researchers published the first direct measurement of what happens when a satellite or rocket burns up overhead. One Falcon 9 upper stage dumped about 30 kg of lithium into the upper atmosphere—roughly 400 days’ worth of what arrives naturally from meteors. Along with the lithium: aluminum, copper, and lead. These metals stick around. They settle into the stratosphere, where aluminum oxides interact with the ozone layer in ways researchers have flagged but cannot yet quantify.

Every satellite ever launched comes back down and burns up. That has been the disposal plan, not unlike when everyone dumped barrels of toxins into the ocean. At a million satellites with five-year lifespans, you get about 550 burning up per day, each one shedding metal pollution into the air above your head. We know this is happening because scientists proved it for the first time seven days ago. We do not know what it does at scale because nobody has studied it yet. Nobody has studied it because the FCC has never required a study.

Environmental review under the current framework, despite the obviousness of the need, still is not triggered.

How to Object

Go to the FCC CORES portal. Create an account. File a comment on application SAT-LOA-20260108-00016.

Demand environmental review under NEPA before any approval. There is also a Reflect Orbital filing (satellites with giant mirrors beaming sunlight to Earth at night) with a March 6 deadline.

The request is simple: make the FCC comply with the law Congress passed in 1969 requiring agencies to assess environmental consequences before acting. A categorical exclusion written for a few hundred satellites does not hold above 1,000 let alone 100K. A million? Fuhgetaboutit.

Decoder Ring for Trump’s 15 Dictator Tactics in One White House Press Release

The White House published its official summary of the 2026 State of the Union address on February 25th.

…[Texas Rep. Al] Green quietly unfurled a sign declaring that “Black People Aren’t Apes,” an apparent reference to a video that was briefly posted on Trump’s Truth Social account earlier this month that depicted President Barack Obama and first lady Michelle Obama as apes. Republican lawmakers were incensed, with Sen. Markwayne Mullin of Oklahoma at one point trying to tear the sign out of Green’s hand.

What was Mullin so angry about?

To no one’s surprise the White House recount reads like a dispatch from North Korea, a silly propaganda operation. To me it looks like a military-grade influence technique buffet.

As a historian of disinformation I assure you that every line from the White House maps to a known information warfare tactic. Most of them are catalogued in military doctrine manuals from RAND, NATO StratCom, and the old Soviet active measures playbook.

None of this is subtle.

None of it is new.

The only thing novel is that the .gov domain has been captured by people who type like they only have thumbs.

Here is the secret decoder ring you should be able to find in any box of Cheerios.

Loyalty Enumeration

What They Published How It Works Who Did It Before
1. The entire “Democrats refused to applaud” list structure Documenting who failed to perform sufficient enthusiasm for the leader transforms a press release into a denunciation register. The content of the speech becomes secondary to cataloguing the reactions of potential enemies. Stalin’s Pravda tracked applause levels at Party Congresses. Mao’s Hundred Flowers campaign invited criticism, then used responses as a purge list. Ceausescu’s final speech was structured identically.

Dehumanization Lexicon

What They Published How It Works Who Did It Before
2. “Savage criminal illegal aliens — killers, rapists, gang members, and traffickers,” “illegal alien monster,” “invasion” Categorical dehumanization collapses an entire population into threat archetypes. Once a group is linguistically recategorized as subhuman, any action against them reads as self-defense rather than aggression. Nazi Ungeziefer (vermin) and Untermenschen. Rwandan Hutu Power radio used inyenzi (cockroaches). Ottoman authorities framed Armenians as existential threats. Khmer Rouge called targets “parasites.”

Firehose of Falsehood

What They Published How It Works Who Did It Before
3. Over 47 claims in a single document: “ending eight wars,” “total victory over terrorists,” “single largest drop in the murder rate in 125 years,” soaring 401(k)s, secure border, falling crime Volume overwhelms verification. Each claim would require independent fact-checking, but the sheer density ensures no single lie gets adequate scrutiny. Documented by RAND as a core Russian information warfare technique. The goal is not persuasion but exhaustion. Russian IRA operations 2014-2020. Goebbels’ principle of the Big Lie scaled through repetition. Iraqi Information Minister “Baghdad Bob” during the 2003 invasion. Erdogan’s post-coup media blitz in 2016.

Atrocity Propaganda

What They Published How It Works Who Did It Before
4. “The grieving families of innocent American women and children murdered by criminal illegal aliens — including the mother of Iryna Zarutska” Showcase individual victims of the target group to generalize criminality across an entire population. The named victim creates emotional specificity; the category does the political work. Individual tragedy becomes collective indictment. The Nazis published Der Stürmer with a regular feature on crimes allegedly committed by Jews. The British WWI Bryce Report fabricated Belgian atrocity stories. Willie Horton was the American domestic version.

Blood Libel / Ethnic Financial Crime

What They Published How It Works Who Did It Before
5. “Ending widespread fraud schemes — like the $19 billion Somali fraud scandal that burdened Minnesota taxpayers” Attach an outrageous financial crime to a specific ethnic community as a collective. Position the native population as victims. The dollar figure gives false precision. Whether a kernel of fraud exists is irrelevant — the function is to weld an ethnic identity to criminality in public memory. Medieval blood libel against Jews. The Protocols of the Elders of Zion. Chinese Exclusion Act propaganda about wage theft. Japanese internment justified partly through claims of economic sabotage.

Child Protection Pretext

What They Published How It Works Who Did It Before
6. “Protecting minor children from the horrors of irreversible sex changes” Position the state as rescuer of children from a demonized minority. “Protect the children” is the single most reliable authoritarian mobilization frame because it makes opposition impossible to articulate without appearing to endorse harm to minors. Anita Bryant’s “Save Our Children” (1977). UK Section 28 (1988). Putin’s “gay propaganda” law (2013). QAnon’s child trafficking mythology. Nazi campaign against “degenerate” influences on youth.

War Buried in Consumer Metrics

What They Published How It Works Who Did It Before
7. Military invasion of Venezuela listed between gas prices and tax cuts Normalization through sequencing. Embedding an act of war inside a consumer satisfaction list makes conquest read as just another deliverable. By the time the reader scrolls past “No Tax on Tips,” the overthrow of a sovereign government is just another bullet point. Mussolini buried the invasion of Ethiopia inside domestic economic messaging. Bush administration embedded Iraq escalation inside State of the Union laundry lists. Israel’s settlement expansion reported alongside economic indicators.

Sovereignty Laundering

What They Published How It Works Who Did It Before
8. “The decisive military action that brought indicted narcoterrorist Nicolás Maduro to justice, crippling drug cartels and liberating our hemisphere” Reframe military invasion of a sovereign nation as law enforcement. “Indicted” provides the legal costume. “Narcoterrorist” merges drug policy with war on terror framing. “Liberating our hemisphere” recycles Monroe Doctrine language to present aggression as regional stewardship. Panama 1989 (Noriega). Grenada 1983. Iraq 2003 framed as “liberation.” Soviet “fraternal assistance” for Hungary 1956, Czechoslovakia 1968, Afghanistan 1979.

Credit Claiming / Post Hoc Fallacy

What They Published How It Works Who Did It Before
9. “Inflation finally subsiding,” gas prices dropping, stock market surging, crime falling Claim credit for trends that precede your administration or result from factors beyond executive control. Economic indicators move on multi-year cycles; presenting inherited momentum as personal achievement is a universal autocratic move. Mussolini and the trains. Stalin and industrialization (achieved through mass death). Putin claiming credit for oil-price-driven GDP growth in the 2000s. Xi claiming poverty reduction that was already trending.

Phantom Threat / Voter Fraud Myth

What They Published How It Works Who Did It Before
10. “Protecting the integrity of our elections by preventing illegal aliens from undermining our democracy” Manufacture a nonexistent threat to justify voter suppression infrastructure. Noncitizen voting is statistically negligible, but asserting its existence creates the pretext for purging voter rolls and restricting access. The “protection” is the weapon. Jim Crow literacy tests framed as “election integrity.” Hungary’s Orbán used “Soros-funded” migration to justify election law changes. Putin frames managed elections as defense against Western interference.

Militarism as Nostalgia

What They Published How It Works Who Did It Before
11. “A World War II hero who helped liberate the largest internment camp in the Philippines,” “Warrior Dividends,” law enforcement “respected once again” Wrap current militarism in the unimpeachable moral authority of WWII. Conflating a genuine hero’s story with contemporary military adventurism transfers legitimacy from a justified war to unjustified ones. “Warrior Dividends” monetizes the mythology. Reagan’s WWII references to justify Cold War escalation. Putin’s “Great Patriotic War” cult used to legitimize the Ukraine invasion. Mussolini invoking Rome. Every authoritarian regime attaches itself to prior military glory to launder current aggression.

Unfalsifiable Victory Claims

What They Published How It Works Who Did It Before
12. “Ending eight wars,” “total victory over terrorists abroad,” “peace through unmatched American strength” Declare victory in conflicts the audience cannot independently verify. Which eight wars? Total victory where? These claims exist in a verification vacuum — they cannot be checked in real time, and by the time anyone tries, the news cycle has moved on. Nixon’s “peace with honor” in Vietnam. Bush’s “Mission Accomplished.” Soviet claims of victory in Afghanistan. The forever war’s perpetual “turning the corner.”

Populist Bribery

What They Published How It Works Who Did It Before
13. “No Tax on Tips, No Tax on Overtime, No Tax on Social Security,” “Trump Accounts” for newborns, banning corporations from buying single-family homes Scatter enough consumer-facing promises to create personal financial stakes in regime loyalty. Each item targets a specific demographic. The policies need not be real or enacted — the announcement itself is the product. Perón’s aguinaldo (mandatory bonus). Chavez’s Bolivarian missions. Erdogan’s pre-election handouts. Putin’s pension increases timed to elections. Bread and circuses, updated for the 401(k) era.

Sacred Calendar

What They Published How It Works Who Did It Before
14. “National Day of Patriotic Devotion, 2026” in the related articles Sacralizing the regime through mandatory civic ritual. Creating regime-specific holidays displaces existing civic traditions and establishes the leader’s calendar as the national temporal framework. Mussolini’s Fascist calendar (Year I of the Fascist Era). Franco’s “Day of the Race.” Nazi Nationalfeiertag. North Korea’s Juche calendar. Turkmenistan’s Ruhnama Day.

Enemy Media Designation

What They Published How It Works Who Did It Before
15. “Media Offenders” page linked in site navigation Official government designation of press outlets as enemies of the state, maintained as a permanent institutional feature rather than rhetorical flourish. Converts press criticism from democratic function to act of disloyalty. Nazi Lügenpresse (lying press). Stalin’s purges of journalists. Erdogan’s mass closure of media outlets post-2016. Orbán’s systematic acquisition of independent Hungarian media. Duterte’s shutdown of ABS-CBN.

The Architecture, Not the Ingredients

Any single tactic on this list normally would be dismissed as deranged political hyperbole, excessive partisan messaging, or rhetorical overreach that causes conflict. That is exactly how military intelligence sets up a disinformation buffet to work. The effect does not depend on any individual dish, because it serves them all simultaneously on official White House china. As Trump loyalists monitor everyone in the house, those who digest what’s served are in trouble, while those who resist are in even more danger.

Nazis wore red. A scene from a 2025 movie about Hitler pressing women into tasting his food for poison, based on the 2018 book: “Le assaggiatrici”

Military information operations doctrine FM 3-13 distinguishes between content and architecture.

Content is each of the fifteen individual tactics. Architecture is the system that connects all the content, such as the .gov blog post methodology. The White House use of military intelligence doctrine in an attack on the American public does three things at once with a known authoritarian architecture:

  1. Establishes a loyalty test (who applauded)
  2. Designates enemies both domestic (Democrats, media) and foreign (immigrants, Somalis, Venezuela)
  3. Buries an act of war inside a consumer rewards program

That triple function of loyalty enforcement, enemy designation, and normalization of violence does something far beyond an actual press release. It is an operations order, which comes along with news that mass political prisons are being rushed at high cost to begin spraying people with “war power” authorized pesticides.

Use of the .gov domain and a blog post to attack Americans tells you how far and informal a normalization of military dictatorship has already progressed. Every technique was field-tested by a regime that did not survive its own ambitions. The historical record is not ambiguous about where an all-you-can-eat buffet approach to military intelligence leads.

The only question is whether Americans recognize the price of swallowing what Trump is dishing, before the bill is due.

Epstein Files: Trump Hit 13-year Old Girl in Head When She Bit His Penis

Trump signed the Epstein Files Transparency Act. His DOJ released three million pages.

And then, as NPR documented, it surgically withheld over 50 pages of FBI interviews.

With who?

With a woman who told agents that around 1983, when she was 13, Epstein introduced her to Trump. And that Trump forced her head down to his exposed penis, and when she bit down, he punched her in the head and threw her out.

The FBI interviewed this woman four times. Only the first interview made the public database, which means the one that doesn’t mention Trump.

A second woman similarly described being taken to Mar-a-Lago as a 13-year-old Epstein victim, where Epstein told Trump, “This is a good one, huh.”

That interview was published January 30, quietly pulled from the database, then restored February 19 after journalists noticed the gambit.

Rep. Robert Garcia has reviewed unredacted evidence logs at the DOJ and confirmed the files were illegally withheld.

Confirmed files. Illegally withheld.

The DOJ’s response has been to launch deranged lunatic rants like North Korea, claiming any criticism of Trump is “radical.” This is what institutional capture looks like in practice: you pass a transparency law, release a mountain of paper, and bury the pages that matter, to attack anyone who counts the serial numbers as the threat or conspiracy theorist.

Trump told reporters last week the files “totally exonerated” him. The files do the opposite, which is exactly why his stuffed crony DOJ doesn’t want anyone to hear the testimony about 13-year old girls.

Peter Thiel Caught Spying on Kids: Discord Backdoor Brews Shitstorm

Peter Thiel’s Founders Fund backs a controversial company called Persona Identities. Persona provides “age verification” to consumer platforms including Discord, OpenAI, Roblox, LinkedIn, and Lime.

Researchers have exposed Persona’s entire frontend architecture, with nearly 2,500 files at 53MB, sitting open on a FedRAMP government endpoint tagged with codenames from active intelligence programs. Fortune has the details, and the researchers published their findings on Twitter.

Yeah. FedRAMP. Thiel exposed, again.

The files show Thiel’s Persona version of surveillance runs 269 distinct verification checks on users. These include expected facial recognition against watchlists, but also screening against lists of politically exposed persons, and adverse media categorization across 14 categories including terrorism and espionage. The system assigns risk and similarity scores to every person.

EVERY person.

He has deployed a biometric surveillance pipeline, connected to Palantir money and dubious motives, through consumer products It’s a thin front to government intelligence infrastructure.

And he has it running right now on platforms used by hundreds of millions of people, to manipulate children by tricking them into believing they are just proving their age, unaware it’s literally Big Brother.

Discord Deployed, Not a Test

Earlier this month Discord defaulted all accounts to teen-safety settings.

ALL on by DEFAULT.

The announcement forced users into a binary: verify age using the Persona gate or lose platform access.

Discord hosts roughly 200 million monthly active users. Its population includes political organizers, activist communities, open source developers, security researchers, journalists and their sources, student groups, and gaming communities that overlap heavily with military-age males.

Thiel was targeting precisely the populations his private intelligence services would want to enumerate and categorize, as a Palantir-adjacent system.

Discord users specifically chose to join as a pseudonymous platform. They use handles, avatars, anonymous identities. Persona maps real biometric identity onto those pseudonymous accounts.

Before Thiel slammed in Persona, a Discord user was a handle. After the Thiel Persona gate was in place, that handle is linked to a face, a government ID, a watchlist status, a politically-exposed-person score, an adverse media categorization across terrorism and espionage categories.

The pseudonymity that made Discord attractive to its users is exactly what made it valuable to Thiel’s extremist ACTS 17 congregations as a collection target. The operation was to de-anonymize the precise population that specifically chose anonymity as protection from Thiel.

The Constitutional Bypass

The Fourth Amendment constrains what the government can compel from citizens. The political and legal cost of requiring 300 million people to submit biometrics to a federal database would be astronomical.

Thiel routed around American legal rights entirely. A private company provides “age verification” to platforms people already use. Users submit biometrics to Discord, not directly to the government. Persona processes the data as a private service provider.

The fact that data landed on FedRAMP government endpoints tagged with intelligence program codenames gives away the corruption. At no point does the state compel anything from anyone, because the surveillance becomes the product. The Third Party Doctrine that information voluntarily given to a third party loses Fourth Amendment protection does the rest.

This is obviously a laundering mechanism to undermine constitutional constraints on state power. The private sector collects what the state cannot legally demand. Commercial authorization frameworks move the data to government infrastructure. The child safety language is disinformation to make opposition politically suicidal.

The Franchise Model

The Thiel portfolio has to be seen as a vertically integrated surveillance supply chain to understand his documented upbringing as a Nazi.

Compulsion Thiel backs politicians — Vance, Trump — who support age verification mandates. Bipartisan cover is guaranteed because child safety is politically inarguable. These mandates create legal pressure for civilians to submit biometrics through consumer products they already use.
Collection Persona embeds in platforms where billions of users live. Age verification framing makes biometric submission feel routine and protective. Users submit to Discord or Roblox, not to the government. Every parent who consents on behalf of a minor is enrolling a child in a system whose back end they cannot see.
Processing Persona’s 269 checks are a civilian threat assessment engine. Watchlist matching, politically exposed persons screening, adverse media categorization, risk scoring. This is intelligence-grade analysis running on people who think they are confirming a birthday.
Bridging FedRAMP authorization formalizes the government channel. Persona CEO Rick Song frames this as “workforce security.” The infrastructure is bidirectional. Once civilian biometrics sit on government-authorized endpoints tagged with intelligence program codenames, the distinction between “workforce verification” and “population surveillance” is a configuration setting.
Action Palantir correlates identity data with intelligence streams. Anduril operationalizes it for defense and border enforcement. The supply chain runs from a teenager’s selfie on Discord to an actionable targeting package.

Each platform is an independent collection node. Each has its own justification. Each feeds the same backend. Each can be severed independently if exposed without disrupting the others.

Discord got burned and got cut off.

Persona continues operating through OpenAI, Roblox, LinkedIn, and Lime.

The Rollback Story

Last year, hackers accessed 70,000 government IDs collected through Discord’s previous verification vendor, 5CA. Discord’s response to that breach was to switch vendors — to Persona, which has deeper capability and a direct pipeline to government infrastructure. The breach provided cover for upgrading the collection system.

When researchers published that Persona’s architecture was sitting on government endpoints, the cleanup began immediately. Discord cuts ties. Both companies coordinate messaging to say the partnership lasted “less than a month.” Song tells Fortune the exposed files are just “uncompressed frontend” and that internally this was not considered a major vulnerability. He posted screenshots of an email exchange with the researcher, claiming the implication of connections between Persona, Palantir, and ICE has led to threats against company employees.

The data that flowed during that month already flowed. The biometrics already hit the government endpoint. The watchlist checks already ran. The 269 verification checks already executed against every user who submitted. Dissolving the partnership does not un-run those checks.

A since-deleted version of Discord’s FAQ on age verification contradicts the company’s claims about data retention, stating information would be “temporarily stored for up to 7 days.”

Discord amended its universal age-verification announcement to say verification would be “optional” — unless users want access to age-restricted servers and channels, which means most of the platform’s actual functionality. This is compulsion through architecture rather than law.

A CEO Knows

Song was attacked for lacking a profile photo on his own LinkedIn page — the same LinkedIn whose identity verification Persona handles. His response: “It’s dystopian that we want people to facedox themselves to everyone to be real online.”

The CEO of a facial recognition verification company argues against making faces publicly visible — while his product links faces to identity databases, intelligence watchlists, and government endpoints for hundreds of millions of people. He knows linking faces to identity databases is dangerous. He built a system that does it at population scale. His defense is that he personally should not have to participate.

That is hierarchy, stated plainly. The system makes identity transparent downward and opaque upward.

Recognition Time

In 2009, Peter Thiel wrote that freedom and democracy are incompatible. He was describing a design constraint. Democracy creates legal barriers to population-scale surveillance. Market mechanisms achieve what democratic governance prohibits.

Age verification mandates are spreading across state legislatures. Persona is embedded in platforms used by hundreds of millions of people. FedRAMP authorization formalizes the government pipeline. The administration dismantling institutional checks — inspectors general fired, DOGE gutting federal agencies, loyalty tests replacing competence — is the same administration receiving the output of this biometric collection network.

The 269 checks exist now. The watchlist screening exists now. The politically exposed persons matching exists now. The adverse media categorization across terrorism and espionage categories exists now. The intelligence program codenames exist for a reason that Discord isn’t disclosing. The question is whether anyone treats this Thiel story as the emergency it already is.